Tag #using
13251 papers:
PADL-2020-BrikX #pipes and filters- Diagnosing Data Pipeline Failures Using Action Languages: A Progress Report (AB, JX), pp. 73–81.
PADL-2020-ChanC #distance #edit distance #flexibility #graph #programming #set- Flexible Graph Matching and Graph Edit Distance Using Answer Set Programming (SCC, JC), pp. 20–36.
PADL-2020-ShakerinG #induction #mining- Whitebox Induction of Default Rules Using High-Utility Itemset Mining (FS, GG), pp. 168–176.
POPL-2020-AnSMS #relational #synthesis- Augmented example-based synthesis using relational perturbation properties (SA, RS, SM, RS), p. 24.
ASPLOS-2020-HildebrandKTLA #automation #integer #linear #memory management #named #programming- AutoTM: Automatic Tensor Movement in Heterogeneous Memory Systems using Integer Linear Programming (MH, JK, ST, JLP, VA), pp. 875–890.
ASPLOS-2020-LimN #hardware #optimisation #performance- Optimizing Nested Virtualization Performance Using Direct Virtual Hardware (JTL, JN), pp. 557–574.
ASPLOS-2020-Mathur0 #linear- Atomicity Checking in Linear Time using Vector Clocks (UM, MV0), pp. 183–199.
ASPLOS-2020-YangGLSPNBCHRKH #named #scheduling- Interstellar: Using Halide's Scheduling Language to Analyze DNN Accelerators (XY, MG, QL, JS, JP, AN, SB, KC, HH, PR, CK, MH), pp. 369–383.
CC-2020-FegadeW #analysis #data type #modelling #pointer #scalability #semantics- Scalable pointer analysis of data structures using semantic models (PF, CW), pp. 39–50.
CC-2020-PuriniBCB #analysis #image #pipes and filters #smt- Bitwidth customization in image processing pipelines using interval analysis and SMT solvers (SP, VB, ZC, UB), pp. 167–178.
CGO-2020-JavanmardAKPCH #algorithm #compilation #divide and conquer #multi #parametricity #programming #recursion- Deriving parametric multi-way recursive divide-and-conquer dynamic programming algorithms using polyhedral compilers (MMJ, ZA, MK, LNP, RC, RJH), pp. 317–329.
CGO-2020-ShobakiKM #approach #combinator #gpu #optimisation- Optimizing occupancy and ILP on the GPU using a combinatorial approach (GS, AK, SM), pp. 133–144.
EDM-2019-ArthursSKP #modelling- Grades are not Normal: Improving Exam Score Models Using the Logit-Normal Distribution (NA, BS, SK, CP).
EDM-2019-BanjadeR #logic #probability #student #tutorial- Assessing Student Response in Tutorial Dialogue Context using Probabilistic Soft Logic (RB, VR).
EDM-2019-GruverMCPSP #modelling- Using Latent Variable Models to Observe Academic Pathways (NG, AM, BC, CP, MLS, AP).
EDM-2019-GuoB #analysis #collaboration #detection- Collaboration Analysis Using Object Detection (ZG, RB).
EDM-2019-HarrakBL #approach #categorisation #hybrid #student- Categorizing students' questions using an ensemble hybrid approach (FH, FB, VL).
EDM-2019-HicksCL #analysis #process #student- Students' Use of Support Functions in DBAs: Analysis of NAEP Grade 8 Mathematics Process Data (JH, RC, M(L).
EDM-2019-HowlinD #approach #behaviour #clustering #detection #fuzzy #student- Detecting Outlier Behaviors in Student Progress Trajectories Using a Repeated Fuzzy Clustering Approach (CPH, CDD).
EDM-2019-HuangBS #collaboration #identification #machine learning- Identifying Collaborative Learning States Using Unsupervised Machine Learning on Eye-Tracking, Physiological and Motion Sensor Data (KH, TB, BS).
EDM-2019-Ikeda #analysis #education #learning #quality- Learning Feature Analysis for Quality Improvement of Web-Based Teaching Materials Using Mouse Cursor Tracking (MI).
EDM-2019-JayaramanGG #identification #machine learning #student- Supporting Minority Student Success by using Machine Learning to Identify At-Risk Students (JDJ, SG, JG).
EDM-2019-JeonSBLR #online #process #student- Time-series Insights into the Process of Passing or Failing Online University Courses using Neural-Induced Interpretable Student States (BJ, ES, LB, JL, CPR).
EDM-2019-MalekianBKBN #analysis #process #student- Characterising Students' Writing Processes Using Temporal Keystroke Analysis (DM, JB0, GEK, PGdB, SN).
EDM-2019-NguyenWSM #component #comprehension #game studies #learning #modelling- Using Knowledge Component Modeling to Increase Domain Understanding in a Digital Learning Game (HN, YW, JCS, BMM).
EDM-2019-RamirezYCRS #learning #student #towards- Toward Instrumenting Makerspaces: Using Motion Sensors to Capture Students' Affective States in Open-Ended Learning Environments (LR, WY, EC, IR, BS).
EDM-2019-Reddick #algorithm #learning- Using a Glicko-based Algorithm to Measure In-Course Learning (RR).
EDM-2019-Sher #learning #mobile- Anatomy of mobile learners: Using learning analytics to unveil learning in presence of mobile devices (VS).
EDM-2019-Unal #composition #modelling #performance #student- Modeling Student Performance and Disengagement Using Decomposition of Response Time Data (DSU).
EDM-2019-WampflerKSSG #mobile #predict #smarttech- Affective State Prediction in a Mobile Setting using Wearable Biometric Sensors and Stylus (RW, SK, BS, VRS, MG0).
EDM-2019-WeitekampHMRK #learning #predict #student #towards- Toward Near Zero-Parameter Prediction Using a Computational Model of Student Learning (DWI, EH, CJM, NR, KRK).
EDM-2019-YahyaMO #data mining #education #effectiveness #mining #novel #source code- A Novel Use of Educational Data Mining to Inform Effective Management of Academic Programs (AAY, FAM, AO).
EDM-2019-Yeung #learning #named- Deep-IRT: Make Deep Learning Based Knowledge Tracing Explainable Using Item Response Theory (CKY).
EDM-2019-ZaidiCDMBR #learning #modelling #student- Accurate Modelling of Language Learning Tasks and Students Using Representations of Grammatical Proficiency (AHZ, AC, CD, RM, PB, AR).
ICPC-2019-AlrubayeM0 #detection #information retrieval #java #library #migration #on the- On the use of information retrieval to automate the detection of third-party Java library migration at the method level (HA, MWM, AO0), pp. 347–357.
ICPC-2019-FontanaP #debugging #sequence #visualisation- Visualizing sequences of debugging sessions using swarm debugging (EAF, FP), pp. 139–143.
ICPC-2019-FucciGNQL #comprehension #lightweight #replication- A replication study on code comprehension and expertise using lightweight biometric sensors (DF, DG, NN, LQ, FL), pp. 311–322.
ICPC-2019-KuangG0M0ME #analysis #feedback #traceability- Using frugal user feedback with closeness analysis on code to improve IR-based traceability recovery (HK, HG, HH0, XM, JL0, PM, AE), pp. 369–379.
ICPC-2019-MizouchiSII #adaptation #detection #named #online- PADLA: a dynamic log level adapter using online phase detection (TM, KS, TI, KI), pp. 135–138.
ICSME-2019-AungHS #interactive #traceability #visualisation- Interactive Traceability Links Visualization using Hierarchical Trace Map (TWWA, HH, YS), pp. 367–369.
ICSME-2019-PalacioMMBPS #identification #learning #network- Learning to Identify Security-Related Issues Using Convolutional Neural Networks (DNP, DM, KM, CBC, DP, CS), pp. 140–144.
ICSME-2019-ShimariI0I #debugging #execution #java- Near-Omniscient Debugging for Java Using Size-Limited Execution Trace (KS, TI, TK0, KI), pp. 398–401.
MSR-2019-DamPN0GGKK #fault #lessons learnt #predict- Lessons learned from using a deep tree-based model for software defect prediction in practice (HKD, TP, SWN, TT0, JCG, AG, TK, CJK), pp. 46–57.
MSR-2019-EfstathiouS #identifier #modelling #semantics #source code- Semantic source code models using identifier embeddings (VE, DS), pp. 29–33.
MSR-2019-KiehnPC #classification #empirical #version control- Empirical study in using version histories for change risk classification (MK, XP, FC), pp. 58–62.
MSR-2019-LiuLZFDQ #commit #generative #network- Generating commit messages from diffs using pointer-generator network (QL, ZL, HZ, HF, BD, YQ), pp. 299–309.
SANER-2019-KirinukiTN #named #recommendation #testing #web- COLOR: Correct Locator Recommender for Broken Test Scripts using Various Clues in Web Application (HK, HT, KN), pp. 310–320.
SANER-2019-MuscedereHAADG #analysis #detection #lightweight- Detecting Feature-Interaction Symptoms in Automotive Software using Lightweight Analysis (BJM, RH, DA, JMA, IJD, MWG), pp. 175–185.
SANER-2019-SunBBS #documentation #mining #specification- Mining Specifications from Documentation using a Crowd (PS, CB, IB, KTS), pp. 275–286.
SANER-2019-VerhaegheEASDDD #case study #industrial #migration #user interface- GUI Migration using MDE from GWT to Angular 6: An Industrial Case (BV, AE, NA, AS, LD, SD, MD), pp. 579–583.
SANER-2019-ZhangLML #approach #effectiveness #fault #named #network- CNN-FL: An Effective Approach for Localizing Faults using Convolutional Neural Networks (ZZ0, YL, XM, PL), pp. 445–455.
SCAM-2019-HendersonPK #automation #fault #locality #markov #process- Evaluating Automatic Fault Localization Using Markov Processes (TADH, AP, YK), pp. 115–126.
SCAM-2019-MasudC #towards- Towards Constructing the SSA form using Reaching Definitions Over Dominance Frontiers (ANM, FC), pp. 23–33.
SCAM-2019-MondalRS #analysis #architecture #automation #case study #natural language- An Exploratory Study on Automatic Architectural Change Analysis Using Natural Language Processing Techniques (AKM, BR, KAS), pp. 62–73.
SCAM-2019-PerumaMDN #commit #refactoring- Contextualizing Rename Decisions using Refactorings and Commit Messages (AP, MWM, MJD, CDN), pp. 74–85.
FM-2019-BardBD #fault #smt- Formally Verified Roundoff Errors Using SMT-based Certificates and Subdivisions (JB, HB, ED), pp. 38–44.
FM-2019-GomesB19a #csp #model checking #named- Circus2CSP: A Tool for Model-Checking Circus Using FDR (AOG, AB), pp. 235–242.
FM-2019-SilveiraJVJ #formal method #implementation #specification- Formal Methods Applicability on Space Applications Specification and Implementation Using MORA-TSP (DS, AJ, MV, TJ), pp. 727–737.
- IFM-2019-BenesBGPS #algebra #constraints #parametricity #synthesis
- Accelerating Parameter Synthesis Using Semi-algebraic Constraints (NB, LB, MG, SP, DS), pp. 27–45.
- IFM-2019-BruckerW #certification #ontology
- Using Ontologies in Formal Developments Targeting Certification (ADB, BW), pp. 65–82.
- IFM-2019-LutebergetCJ #automation #optimisation #satisfiability
- Automated Drawing of Railway Schematics Using Numerical Optimization in SAT (BL, KC, CJ), pp. 341–359.
SEFM-2019-BeckertBGHLU #relational #slicing #verification- Using Relational Verification for Program Slicing (BB, TB, SG, MH, DL, MU), pp. 353–372.
SEFM-2019-FarrellBFDDYM #analysis #case study #verification- Using Threat Analysis Techniques to Guide Formal Verification: A Case Study of Cooperative Awareness Messages (MF, MB, MF0, LAD, CD, HY, CM), pp. 471–490.
- ICFP-2019-HameerP #automation #case study #education #experience #functional #programming
- Teaching the art of functional programming using automated grading (experience report) (AH, BP), p. 15.
AIIDE-2019-BehroozRJ #matter #quality #word- Story Quality as a Matter of Perception: Using Word Embeddings to Estimate Cognitive Interest (MB, JR, AJ), pp. 3–9.
AIIDE-2019-Sanghrajka #authoring #interactive #modelling- Interactive Narrative Authoring Using Cognitive Models in Narrative Planning (RS), pp. 224–226.
AIIDE-2019-Shirvani #towards- Towards More Believable Characters Using Personality and Emotion (AS), pp. 230–232.
CHI-PLAY-2019-SchertlerKW #analysis #game studies #semantics- User Guided Movement Analysis in Games using Semantic Trajectories (RS, SK, GW), pp. 613–623.
CoG-2019-Aitchison #experience- Optimal Use of Experience in First Person Shooter Environments (MA), pp. 1–4.
CoG-2019-ChangAS #assurance #automation #named #quality #testing- Reveal-More: Amplifying Human Effort in Quality Assurance Testing Using Automated Exploration (KC, BA, AMS), pp. 1–8.
CoG-2019-ChristiansenGW #bias #game studies- Resolving Simultaneity Bias: Using Features to Estimate Causal Effects in Competitive Games (AHC, EG, BSW), pp. 1–8.
CoG-2019-Eidelberg0D #game studies #performance- Using Active Probing by a Game Management AI to Faster Classify Players (AE, CJ0, JD), pp. 1–8.
CoG-2019-FendtA #education #game studies #learning #student- Using Learning Games to Teach Texas Civil War History to Public Middle School Students (MWF, EA), pp. 1–4.
CoG-2019-IshiiITH #game studies #generative- A Fighting Game AI Using Highlight Cues for Generation of Entertaining Gameplay (RI, SI, RT, TH), pp. 1–6.
CoG-2019-JooK #game studies #how #learning #question #visualisation- Visualization of Deep Reinforcement Learning using Grad-CAM: How AI Plays Atari Games? (HTJ, KJK), pp. 1–2.
CoG-2019-JoppenSF #approximate #game studies- Ordinal Bucketing for Game Trees using Dynamic Quantile Approximation (TJ, TS, JF), pp. 1–8.
CoG-2019-KatonaSHDBDW #learning #predict- Time to Die: Death Prediction in Dota 2 using Deep Learning (AK, RJS, VJH, SD, FB, AD, JAW), pp. 1–8.
CoG-2019-KimLLHK #algorithm #automation #game studies #generative #graph- Automatic Generation of Game Content using a Graph-based Wave Function Collapse Algorithm (HK, SL, HL, TH, SK), pp. 1–4.
CoG-2019-KusanoLPTH #game studies- Motion Gaming AI using Time Series Forecasting and Dynamic Difficulty Adjustment (TK, YL, PP, RT, TH), pp. 1–6.
CoG-2019-Lanzi #complexity- Evaluating the Complexity of Players' Strategies using MCTS Iterations (PLL), pp. 1–8.
CoG-2019-LipinskiSRA #generative #graph #incremental- Level Graph - Incremental Procedural Generation of Indoor Levels using Minimum Spanning Trees (BvRL, SS, JR, DA), pp. 1–7.
CoG-2019-LiuR0S #heuristic #performance- Using Restart Heuristics to Improve Agent Performance in Angry Birds (TL, JR, PZ0, MS), pp. 1–8.
CoG-2019-MassoudBBGP #behaviour #game studies #profiling- Eco-driving Profiling and Behavioral Shifts Using IoT Vehicular Sensors Combined with Serious Games (RM, FB, RB, ADG, SP), pp. 1–8.
CoG-2019-NamI #game studies #generative #learning- Generation of Diverse Stages in Turn-Based Role-Playing Game using Reinforcement Learning (SN, KI), pp. 1–8.
CoG-2019-NygrenD #case study #concept #game studies #self- Using Simple Games to Evaluate Self-Organization Concepts: a Whack-a-mole Case Study (NN, JD), pp. 1–8.
CoG-2019-SarkarC #game studies- Inferring and Comparing Game Difficulty Curves using Player-vs-Level Match Data (AS, SC), pp. 1–4.
CoG-2019-SpickCW #generative #learning- Procedural Generation using Spatial GANs for Region-Specific Learning of Elevation Data (RJS, PC, JAW), pp. 1–8.
FDG-2019-GandhiH #generative #modelling #probability #visual notation- Guided open story generation using probabilistic graphical models (SG, BH), p. 7.
FDG-2019-JemmaliKBARE #concept #design #game studies #learning #programming- Using game design mechanics as metaphors to enhance learning of introductory programming concepts (CJ, EK, SB, MVA, ER, MSEN), p. 5.
FDG-2019-LiGH #game studies #generative #multi #video- End-to-end let's play commentary generation using multi-modal video representations (CL0, SG, BH), p. 7.
FDG-2019-LiuLLMHSWCGLDT #automation #generative- Automatic generation of tower defense levels using PCG (SCL, CL, YL, HM, XH, YS, LW, ZC, XG, HL, YD, QT), p. 9.
FDG-2019-LuoGR #network #parsing #video- Making CNNs for video parsing accessible: event extraction from DOTA2 gameplay video using transfer, zero-shot, and network pruning (ZL, MG, MR), p. 10.
FDG-2019-MacCormickZ #development #game studies #named #programming #visual notation- SuBViS: the use of subjunctive visual programming environments for exploring alternatives in game development (DM, LZ), p. 11.
FDG-2019-OuelletteBC #analysis #comprehension #design #education #game studies- Using applied cognitive load theory and difficulty analysis for educational game design for understanding and transference of literacy skills in adults (MO, LB, CC), p. 11.
FDG-2019-SarkarC #array #rating- Using rating arrays to estimate score distributions for player-versus-level matchmaking (AS, SC), p. 8.
VS-Games-2019-BakalosRDDPV #identification #network- Choreographic Pose Identification using Convolutional Neural Networks (NB, IR, ND, AD, EP, AV), pp. 1–7.
VS-Games-2019-Gabriel #concept #design #game studies- We Make Games. Using Serious Game Design Concepts in Secondary School (SG), pp. 1–4.
VS-Games-2019-HeinzS #design #evaluation #heuristic #simulation- Addressing Spatio-Temporal Geogame Relocation Issues Using Design Evaluation Heuristics and Agent-based Simulation (TH0, CS), pp. 1–4.
VS-Games-2019-KharvariH #3d #architecture #artificial reality #game studies #visualisation- The Role of Serious Gaming using Virtual Reality Applications for 3D Architectural Visualization (FK, WH), pp. 1–2.
VS-Games-2019-KicoL #comparison- Comparison of Trajectories and Quaternions of Folk Dance Movements Using Dynamic Time Warping (IK, FL), pp. 1–4.
CIKM-2019-ChristmannRASW #graph- Look before you Hop: Conversational Question Answering over Knowledge Graphs Using Judicious Context Expansion (PC, RSR, AA, JS, GW), pp. 729–738.
CIKM-2019-DuongRN #multi #sketching #streaming- Sketching Streaming Histogram Elements using Multiple Weighted Factors (QHD, HR, KN), pp. 19–28.
CIKM-2019-GongZ00XWH #community #detection #developer #learning #online- Detecting Malicious Accounts in Online Developer Communities Using Deep Learning (QG, JZ, YC0, QL0, YX, XW, PH), pp. 1251–1260.
CIKM-2019-HanMNKURNS #detection #image #learning- Learning More with Less: Conditional PGGAN-based Data Augmentation for Brain Metastases Detection Using Highly-Rough Annotation on MR Images (CH, KM, TN, YK, FU, LR, HN, SS), pp. 119–127.
CIKM-2019-IslamMR #graph #named #network #predict #social- NActSeer: Predicting User Actions in Social Network using Graph Augmented Neural Network (MRI, SM, NR), pp. 1793–1802.
CIKM-2019-JungLPP #framework #named- PRIVATA: Differentially Private Data Market Framework using Negotiation-based Pricing Mechanism (KJ, JL, KP, SP), pp. 2897–2900.
CIKM-2019-KangPKCC #modelling #recommendation #topic- Recommender System Using Sequential and Global Preference via Attention Mechanism and Topic Modeling (KK, JP, WK, HC, JC), pp. 1543–1552.
CIKM-2019-LinPLO #network #recognition- An Explainable Deep Fusion Network for Affect Recognition Using Physiological Signals (JL, SP, CSL, SLO), pp. 2069–2072.
CIKM-2019-LinWXLB #estimation #hybrid #network- Path Travel Time Estimation using Attribute-related Hybrid Trajectories Network (XL, YW, XX, ZL, SSB), pp. 1973–1982.
CIKM-2019-YangWCW #graph #network #predict- Using External Knowledge for Financial Event Prediction Based on Graph Neural Networks (YY, ZW, QC, LW), pp. 2161–2164.
CIKM-2019-YanLWLWZG #classification #image #multi #random- Imbalance Rectification in Deep Logistic Regression for Multi-Label Image Classification Using Random Noise Samples (WY, RL, JW, YL, JW, PZ, XG), pp. 1131–1140.
CIKM-2019-ZhangL - Interpretable MTL from Heterogeneous Domains using Boosted Tree (YLZ, LL), pp. 2053–2056.
ECIR-p1-2019-BalikasDMAA #learning #semantics- Learning Lexical-Semantic Relations Using Intuitive Cognitive Links (GB, GD, RM, HA, MRA), pp. 3–18.
ECIR-p1-2019-DavilaJSGZ #graph #image #named- Tangent-V: Math Formula Image Search Using Line-of-Sight Graphs (KD, RJ, SS, VG, RZ), pp. 681–695.
ECIR-p1-2019-GlavasV #bidirectional #retrieval- Zero-Shot Language Transfer for Cross-Lingual Sentence Retrieval Using Bidirectional Attention Model (GG, IV), pp. 523–538.
ECIR-p1-2019-JeawakJS #modelling- Embedding Geographic Locations for Modelling the Natural Environment Using Flickr Tags and Structured Data (SSJ, CBJ, SS), pp. 51–66.
ECIR-p1-2019-NguyenV - End-to-End Neural Relation Extraction Using Deep Biaffine Attention (DQN, KV), pp. 729–738.
ECIR-p1-2019-ZhongZ #similarity- Structural Similarity Search for Formulas Using Leaf-Root Paths in Operator Subtrees (WZ, RZ), pp. 116–129.
ECIR-p2-2019-AkbariCBOSW #modelling #process- Modeling User Return Time Using Inhomogeneous Poisson Process (MA, AC, SB, ADO, MS, JW0), pp. 37–44.
ECIR-p2-2019-Ghosh #information retrieval- Exploring Result Presentation in Conversational IR Using a Wizard-of-Oz Study (SG), pp. 327–331.
ECIR-p2-2019-ImaniVMS19a #network #query #word- Deep Neural Networks for Query Expansion Using Word Embeddings (AI, AV, AM, AS), pp. 203–210.
ECIR-p2-2019-PritsosRS #distance #identification #nearest neighbour #web- Open-Set Web Genre Identification Using Distributional Features and Nearest Neighbors Distance Ratio (DAP, AR0, ES), pp. 3–11.
ICML-2019-ChangMG #metric #scheduling- Dynamic Measurement Scheduling for Event Forecasting using Deep RL (CHC, MM, AG), pp. 951–960.
ICML-2019-DaoGERR #algorithm #learning #linear #performance- Learning Fast Algorithms for Linear Transforms Using Butterfly Factorizations (TD, AG, ME, AR, CR), pp. 1517–1527.
ICML-2019-ElfekiCRE #learning #named #process- GDPP: Learning Diverse Generations using Determinantal Point Processes (ME, CC, MR, ME), pp. 1774–1783.
ICML-2019-GordalizaBGL - Obtaining Fairness using Optimal Transport Theory (PG, EdB, FG, JML), pp. 2357–2365.
ICML-2019-HendrycksLM #nondeterminism #robust- Using Pre-Training Can Improve Model Robustness and Uncertainty (DH, KL, MM), pp. 2712–2721.
ICML-2019-HollandI #robust- Better generalization with less data using robust gradient descent (MJH, KI), pp. 2761–2770.
ICML-2019-HuntBLH #policy- Composing Entropic Policies using Divergence Correction (JJH, AB, TPL, NH), pp. 2911–2920.
ICML-2019-MendisRAC #estimation #named #network #performance #throughput- Ithemal: Accurate, Portable and Fast Basic Block Throughput Estimation using Deep Neural Networks (CM, AR, SPA, MC), pp. 4505–4515.
ICML-2019-Ravi #modelling #performance- Efficient On-Device Models using Neural Projections (SR), pp. 5370–5379.
ICML-2019-ThulasidasanBBC #learning- Combating Label Noise in Deep Learning using Abstention (ST, TB, JAB, GC, JMY), pp. 6234–6243.
ICML-2019-TranKSK #named #network- DeepNose: Using artificial neural networks to represent the space of odorants (NBT, DRK, SS, AAK), pp. 6305–6314.
ICML-2019-TrippeHAB #approximate #named #rank- LR-GLM: High-Dimensional Bayesian Inference Using Low-Rank Data Approximations (BLT, JHH, RA, TB), pp. 6315–6324.
ICML-2019-WangDWK #learning #logic #named #reasoning #satisfiability- SATNet: Bridging deep learning and logical reasoning using a differentiable satisfiability solver (PWW, PLD, BW, JZK), pp. 6545–6554.
ICML-2019-X #bound #named #policy #predict- POLITEX: Regret Bounds for Policy Iteration using Expert Prediction, pp. 3692–3702.
ICML-2019-YangW #parametricity- Sample-Optimal Parametric Q-Learning Using Linearly Additive Features (LY, MW), pp. 6995–7004.
ICML-2019-ZanetteB #bound #learning #problem- Tighter Problem-Dependent Regret Bounds in Reinforcement Learning without Domain Knowledge using Value Function Bounds (AZ, EB), pp. 7304–7312.
ICML-2019-ZhaoHDSZ #network- Improving Neural Network Quantization without Retraining using Outlier Channel Splitting (RZ, YH, JD, CDS, ZZ), pp. 7543–7552.
KDD-2019-ChenLPS #predict #twitter- Using Twitter to Predict When Vulnerabilities will be Exploited (HC0, RL, NP, VSS), pp. 3143–3152.
KDD-2019-ChenSJ0Z0 #behaviour #effectiveness #performance #recommendation #reuse- Effective and Efficient Reuse of Past Travel Behavior for Route Recommendation (LC, SS, CSJ, BY0, ZZ, LS0), pp. 488–498.
KDD-2019-DeshpandeS #adaptation #modelling #streaming- Streaming Adaptation of Deep Forecasting Models using Adaptive Recurrent Units (PD, SS), pp. 1560–1568.
KDD-2019-GuoHJZW0 #behaviour #multi #network #predict #realtime- Buying or Browsing?: Predicting Real-time Purchasing Intent using Attention-based Deep Network with Multiple Behavior (LG, LH, RJ, BZ, XW, BC0), pp. 1984–1992.
KDD-2019-KillianWSCDT #learning- Learning to Prescribe Interventions for Tuberculosis Patients Using Digital Adherence Data (JAK, BW, AS, VC, BD, MT), pp. 2430–2438.
KDD-2019-KitadaIS #effectiveness #multi #network #predict- Conversion Prediction Using Multi-task Conditional Attention Networks to Support the Creation of Effective Ad Creatives (SK, HI, YS), pp. 2069–2077.
KDD-2019-LeeIFSM #approach #data-driven #estimation #named- DeepRoof: A Data-driven Approach For Solar Potential Estimation Using Rooftop Imagery (SL, SI, MF, PJS, SM), pp. 2105–2113.
KDD-2019-MarxV - Identifiability of Cause and Effect using Regularized Regression (AM, JV), pp. 852–861.
KDD-2019-MonathZSMA #clustering- Gradient-based Hierarchical Clustering using Continuous Representations of Trees in Hyperbolic Space (NM, MZ, DS, AM, AA), pp. 714–722.
KDD-2019-OhI #detection #learning- Sequential Anomaly Detection using Inverse Reinforcement Learning (MhO, GI), pp. 1480–1490.
KDD-2019-PanLW00Z #learning #predict- Urban Traffic Prediction from Spatio-Temporal Data Using Deep Meta Learning (ZP, YL, WW, YY0, YZ0, JZ), pp. 1720–1730.
KDD-2019-ParkKDZF #graph #network- Estimating Node Importance in Knowledge Graphs Using Graph Neural Networks (NP, AK, XLD, TZ, CF), pp. 596–606.
KDD-2019-RawatLY #learning #multi- Naranjo Question Answering using End-to-End Multi-task Learning Model (BPSR, FL, HY0), pp. 2547–2555.
KDD-2019-SchonD0 #fault #how #predict- The Error is the Feature: How to Forecast Lightning using a Model Prediction Error (CS, JD, RM0), pp. 2979–2988.
KDD-2019-SchulzeMRLB #identification- Context by Proxy: Identifying Contextual Anomalies Using an Output Proxy (JPS, AM, ER, HAL, KB), pp. 2059–2068.
KDD-2019-SheehanMTUJBLE #development #predict #wiki- Predicting Economic Development using Geolocated Wikipedia Articles (ES, CM, MT, BU, NJ, MB, DBL, SE), pp. 2698–2706.
KDD-2019-ShenVAAHN #learning #monitoring #smarttech- Ambulatory Atrial Fibrillation Monitoring Using Wearable Photoplethysmography with Deep Learning (YS, MV, AA, AA, AYH, AYN), pp. 1909–1916.
KDD-2019-SiciliaPG #named- DeepHoops: Evaluating Micro-Actions in Basketball Using Deep Feature Representations of Spatio-Temporal Data (AS, KP, KG), pp. 2096–2104.
KDD-2019-TariqLSLJCW #detection #multi #probability- Detecting Anomalies in Space using Multivariate Convolutional LSTM with Mixtures of Probabilistic PCA (ST, SL, YS, MSL, OJ, DC, SSW), pp. 2123–2133.
KDD-2019-WangZTWX #named #network- AlphaStock: A Buying-Winners-and-Selling-Losers Investment Strategy using Interpretable Deep Reinforcement Attention Networks (JW, YZ0, KT, JW, ZX), pp. 1900–1908.
KDD-2019-WuYZXZPXA #graph #kernel #random #scalability- Scalable Global Alignment Graph Kernel Using Random Features: From Node Embedding to Graph Embedding (LW, IEHY, ZZ0, KX, LZ0, XP0, YX, CCA), pp. 1418–1428.
KDD-2019-YabeTSSU #behaviour #predict #web- Predicting Evacuation Decisions using Representations of Individuals' Pre-Disaster Web Search Behavior (TY, KT, TS, YS, SVU), pp. 2707–2717.
KDD-2019-ZhengXKWMAY #linear #predict- Glaucoma Progression Prediction Using Retinal Thickness via Latent Space Linear Regression (YZ, LX, TK, JW0, HM, RA, KY), pp. 2278–2286.
KDD-2019-ZhouMGBB #comprehension #network- Understanding Consumer Journey using Attention based Recurrent Neural Networks (YZ, SM, JG, TB, NB), pp. 3102–3111.
BX-2019-Tullsen #encoding- ASN.1 Encoding Schemes Done Right Using CMPCT (MT), pp. 1–15.
MoDELS-2019-BencomoP #learning #modelling #named #ram #runtime- RaM: Causally-Connected and Requirements-Aware Runtime Models using Bayesian Learning (NB, LHGP), pp. 216–226.
MoDELS-2019-TorreSSBAG #case study #experience #modelling- Using Models to Enable Compliance Checking Against the GDPR: An Experience Report (DT, GS, MS, LCB, YA, PG), pp. 1–11.
OOPSLA-2019-ChenWFBD #learning #relational #verification- Relational verification using reinforcement learning (JC, JW, YF, OB, ID), p. 30.
OOPSLA-2019-GoelV #design #implementation #lazy evaluation #on the- On the design, implementation, and use of laziness in R (AG, JV), p. 27.
OOPSLA-2019-KrikavaMV #scala #scalability- Scala implicits are everywhere: a large-scale study of the use of Scala implicits in the wild (FK, HM, JV), p. 28.
PADL-2019-AriasC #composition #evaluation #incremental #logic programming- Incremental Evaluation of Lattice-Based Aggregates in Logic Programming Using Modular TCLP (JA, MC), pp. 98–114.
PADL-2019-KahramanE #personalisation #programming #set- Personalized Course Schedule Planning Using Answer Set Programming (MKK, EE0), pp. 37–45.
PLDI-2019-0001R #database #learning #modelling- Using active learning to synthesize models of applications that access databases (JS0, MCR), pp. 269–285.
PLDI-2019-DhulipalaBS #graph #streaming- Low-latency graph streaming using compressed purely-functional trees (LD, GEB, JS), pp. 918–934.
PLDI-2019-HeoRSN #difference #reasoning #source code- Continuously reasoning about programs using differential Bayesian inference (KH, MR, XS, MN), pp. 561–575.
PLDI-2019-LeZN #dynamic analysis #invariant #logic #named- SLING: using dynamic analysis to infer program invariants in separation logic (TCL, GZ, TN), pp. 788–801.
POPL-2019-BaeL #bound #logic #model checking- Bounded model checking of signal temporal logic properties using syntactic separation (KB, JL), p. 30.
POPL-2019-CastroHJNY #api #communication #distributed #parametricity #programming #static typing- Distributed programming using role-parametric session types in go: statically-typed endpoint APIs for dynamically-instantiated communication structures (DCP, RH, SSJ, NN, NY), p. 30.
POPL-2019-SkorstengaardDB #control flow #encapsulation #linear #named #stack- StkTokens: enforcing well-bracketed control flow and stack encapsulation using linear capabilities (LS, DD, LB), p. 28.
POPL-2019-SpathAB #analysis #automaton #data flow- Context-, flow-, and field-sensitive data-flow analysis using synchronized Pushdown systems (JS, KA0, EB), p. 29.
SAS-2019-DelmasM #abstract interpretation #analysis- Analysis of Software Patches Using Numerical Abstract Interpretation (DD, AM), pp. 225–246.
ASE-2019-Balasubramaniam #machine learning #representation #towards- Towards Comprehensible Representation of Controllers using Machine Learning (GB), pp. 1283–1285.
ASE-2019-ChenSHWL #behaviour #case study #experience #generative #testing- An Experience Report of Generating Load Tests Using Log-Recovered Workloads at Varying Granularities of User Behaviour (JC, WS, AEH, YW, JL), pp. 669–681.
ASE-2019-KimC #embedded #model checking- Model Checking Embedded Control Software using OS-in-the-Loop CEGAR (DK, YC), pp. 565–576.
ASE-2019-MehraSKP #artificial reality #named #towards- XRaSE: Towards Virtually Tangible Software using Augmented Reality (RM, VSS, VK, SP), pp. 1194–1197.
ASE-2019-NafiKRRS #api #clone detection #detection #documentation #named- CLCDSA: Cross Language Code Clone Detection using Syntactical Features and API Documentation (KWN, TSK, BR, CKR, KAS), pp. 1026–1037.
ASE-2019-Ramamoorthy #game studies #multi- User Preference Aware Multimedia Pricing Model using Game Theory and Prospect Theory for Wireless Communications (KMKR), pp. 1265–1267.
ASE-2019-Sharma #adaptation #automation #source code #synthesis- Automatically Repairing Binary Programs Using Adapter Synthesis (VS), pp. 1238–1241.
ASE-2019-ZhengFXS0HMLSC #automation #game studies #learning #named #online #testing- Wuji: Automatic Online Combat Game Testing Using Evolutionary Deep Reinforcement Learning (YZ, CF, XX, TS, LM0, JH, ZM, YL0, RS, YC), pp. 772–784.
ESEC-FSE-2019-BarashFJRTZ #feature model #interactive #ml #requirements- Bridging the gap between ML solutions and their business requirements using feature interactions (GB, EF, IJ, OR, RTB, MZ), pp. 1048–1058.
ESEC-FSE-2019-Cetin #developer #graph #identification #traceability- Identifying the most valuable developers using artifact traceability graphs (HAC), pp. 1196–1198.
ESEC-FSE-2019-Correia #industrial #testing- An industrial application of test selection using test suite diagnosability (DC), pp. 1214–1216.
ESEC-FSE-2019-CorreiaASN #multi #named #testing- MOTSD: a multi-objective test selection tool using test suite diagnosability (DC, RA, PS, JN), pp. 1070–1074.
ESEC-FSE-2019-Denkers #case study #domain-specific language #industrial- A longitudinal field study on creation and use of domain-specific languages in industry (JD), pp. 1152–1155.
ESEC-FSE-2019-FucciMM #api #documentation #identification #machine learning #on the- On using machine learning to identify knowledge in API reference documentation (DF, AM, WM), pp. 109–119.
ESEC-FSE-2019-LiewCDS #constraints #float #fuzzing- Just fuzz it: solving floating-point constraints using coverage-guided fuzzing (DL, CC, AFD, JRS), pp. 521–532.
ESEC-FSE-2019-NguyenSCMBL #as a service #multitenancy- Using microservices for non-intrusive customization of multi-tenant SaaS (PHN, HS, FC, RM, SB, EL), pp. 905–915.
ESEC-FSE-2019-Radavelli #modelling #testing- Using software testing to repair models (MR), pp. 1253–1255.
ESEC-FSE-2019-SangleM #on the #open source #python- On the use of lambda expressions in 760 open source Python projects (SS, SM), pp. 1232–1234.
ESEC-FSE-2019-Sulun #graph #traceability- Suggesting reviewers of software artifacts using traceability graphs (ES), pp. 1250–1252.
- ICSE-2019-FanLLWNZL #analysis #android #graph #learning
- Graph embedding based familial analysis of Android malware using unsupervised learning (MF, XL, JL0, MW, CN, QZ, TL0), pp. 771–782.
- ICSE-2019-HuangLKSHLW #data type
- Distilling neural representations of data structure manipulation using fMRI and fNIRS (YH0, XL, RK, TS, XH, KL, WW), pp. 396–407.
- ICSE-2019-KimFY #learning #testing
- Guiding deep learning system testing using surprise adequacy (JK, RF, SY), pp. 1039–1049.
- ICSE-2019-ZhangHMBLU #ltl #named #source code
- AutoTap: synthesizing and repairing trigger-action programs using LTL properties (LZ, WH, JM, NB, SL, BU), pp. 281–291.
GPCE-2019-Dimovski #abstract domain #diagrams #static analysis- Lifted static analysis using a binary decision diagram abstract domain (ASD), pp. 102–114.
ASPLOS-2019-KondguliH #hardware #named #performance #smt #thread- Bootstrapping: Using SMT Hardware to Improve Single-Thread Performance (SK, MH), pp. 687–700.
ASPLOS-2019-RenZYLXQLW #co-evolution #design #framework #multi #named- ADMM-NN: An Algorithm-Hardware Co-Design Framework of DNNs Using Alternating Direction Methods of Multipliers (AR, TZ, SY, JL, WX, XQ, XL, YW), pp. 925–938.
ASPLOS-2019-WuSCL #pointer- Protecting Page Tables from RowHammer Attacks using Monotonic Pointers in DRAM True-Cells (XCW, TS, FTC, YL), pp. 645–657.
CASE-2019-AndersonlPL #estimation #mobile #recursion- Mobile Robotic Radiation Surveying Using Recursive Bayesian Estimation (RBA, MP, SL), pp. 1187–1192.
CASE-2019-AshouriNSG #predict- Day-ahead Prediction of Building Occupancy using WiFi Signals (AA, GRN, ZS, HBG), pp. 1237–1242.
CASE-2019-AyoobiCVV #learning- Handling Unforeseen Failures Using Argumentation-Based Learning (HA, MC0, RV, BV), pp. 1699–1704.
CASE-2019-BiedigerMB #artificial reality- Investigating the survivability of drone swarms with flocking and swarming flight patterns using Virtual Reality (DB, AM, ATB), pp. 1718–1723.
CASE-2019-ChangLH #coordination #detection #network #realtime- Real-Time Object Coordinate Detection and Manipulator Control Using Rigidly Trained Convolutional Neural Networks (YMC, CHGL, YFH), pp. 1347–1352.
CASE-2019-ChengT #flexibility #tool support- Control of a mechatronics-assisted system for surgeries using flexible tools (LC, MT), pp. 1768–1773.
CASE-2019-ChenLVR #machine learning #process- Strip Snap Analytics in Cold Rolling Process Using Machine Learning (ZC, YL, AVM, FR), pp. 368–373.
CASE-2019-DasSAP #estimation #interactive #physics- Joint Torque Estimation using Base Force-Torque Sensor to Facilitate Physical Human-Robot Interaction (pHRI) (SKD, MNS, SA, DOP), pp. 1367–1372.
CASE-2019-DuHD #identification #physics- Model Identification and Physical Exercise Control using Nonlinear Heart Rate Model and Particle Filter (DD, ZH, YD), pp. 405–410.
CASE-2019-FarooquiF #learning #modelling #synthesis- Synthesis of Supervisors for Unknown Plant Models Using Active Learning (AF, MF), pp. 502–508.
CASE-2019-FujitaDKRKSHAFA #multi- Bin-picking Robot using a Multi-gripper Switching Strategy based on Object Sparseness (MF, YD, RK, GAGR, KK, KS, RH, RA, HF, SA, MH, AJC, AN, HO, TO), pp. 1540–1547.
CASE-2019-HagelskjaerSKB #constraints #estimation #industrial #performance #precise- Using spatial constraints for fast set-up of precise pose estimation in an industrial setting (FH, TRS, NK, AGB), pp. 1308–1314.
CASE-2019-HekmatnejadPF #scheduling #smt- Task Scheduling with Nonlinear Costs using SMT Solvers (MH, GP, GF), pp. 183–188.
CASE-2019-HoangPDZH #configuration management #multi- Reconfigurable Multi-UAV Formation Using Angle-Encoded PSO (VTH, MDP, THD, QZ, QPH), pp. 1670–1675.
CASE-2019-HongCL #learning #locality #mobile #realtime- Real-time Visual-Based Localization for Mobile Robot Using Structured-View Deep Learning (YFH, YMC, CHGL), pp. 1353–1358.
CASE-2019-HuML #petri net- Active Diagnosis of Petri Nets Using Q-Diagnoser (YH, ZM, ZL), pp. 203–208.
CASE-2019-ImamM #metric #modelling- Thermal Modeling of Indoor Spaces using Illumination Measurement as a Surrogate for Solar Heat Gain (MHTI, SM), pp. 1093–1098.
CASE-2019-JoshiLBB - Motion-planning Using RRTs for a Swarm of Robots Controlled by Global Inputs (PJ, JL, DB, ATB), pp. 1163–1168.
CASE-2019-KazmiNVRC #detection #learning #recognition- Vehicle tire (tyre) detection and text recognition using deep learning (WK, IN, GV, PR, AC), pp. 1074–1079.
CASE-2019-KumarAS #array #monitoring- Speed and Separation Monitoring using On-Robot Time-of-Flight Laser-ranging Sensor Arrays (SK, SA, FS), pp. 1684–1691.
CASE-2019-LaiL #detection #learning- Video-Based Windshield Rain Detection and Wiper Control Using Holistic-View Deep Learning (CCL, CHGL), pp. 1060–1065.
CASE-2019-LiGZYWSZ #detection #fault- Detection model of invisible weld defects using magneto-optical imaging induced by rotating magnetic field (YL, XG, YZ, DY, CW, YS, NZ), pp. 1–5.
CASE-2019-LiuZHZWW #estimation #learning #network- sEMG-Based Continuous Estimation of Knee Joint Angle Using Deep Learning with Convolutional Neural Network (GL, LZ, BH, TZ, ZW, PW), pp. 140–145.
CASE-2019-LuoLLWG #multi #optimisation #problem #scheduling- Green Job Shop Scheduling Problem with Machine at Different Speeds using a multi-objective grey wolf optimization algorithm* (YL, CL, XL, LW, LG0), pp. 573–578.
CASE-2019-MackensenKRS #automation #energy #smarttech- Energy autonomous automation of Smart Home applications using the example of a wireless Indoor Smart Gardening system (EM, JK, AR, AS), pp. 1087–1092.
CASE-2019-MerktIYV #towards- Towards Shared Autonomy Applications using Whole-body Control Formulations of Locomanipulation (WM, VI, YY, SV), pp. 1206–1211.
CASE-2019-NguyenLLGL #network #self- Visual-Guided Robot Arm Using Self-Supervised Deep Convolutional Neural Networks (VTN, CL, CHGL, SMG, JJJL), pp. 1415–1420.
CASE-2019-NiuLNLW #detection #fault #generative #named #network- DefectGAN: Weakly-Supervised Defect Detection using Generative Adversarial Network (SN, HL, TN, BL, XW), pp. 127–132.
CASE-2019-PangXHP #modelling #multi #optimisation- optimizing outpatient Department Staffing Level using Multi-Fidelity Models (BP, XX, BH, YP), pp. 715–720.
CASE-2019-PirehgalinTOV #analysis #automation #image #video #visual notation- Automatic Visual Leakage Inspection by Using Thermographic Video and Image Analysis (MFP, ET, MO, BVH), pp. 1282–1288.
CASE-2019-PitschlP #adaptation #maintenance #mobile #persistent #reasoning- Obstacle Persistent Adaptive Map Maintenance for Autonomous Mobile Robots using Spatio-temporal Reasoning (MLP, MWP), pp. 1023–1028.
CASE-2019-RobinsonSP #heuristic #visual notation- Bin-Picking using Model-Free Visual Heuristics and Grasp-Constrained Imaging (CR, MNS, DOP), pp. 1618–1624.
CASE-2019-RoselliHRFA #equivalence #on the- On the Use of Equivalence Classes for Optimal and Sub-Optimal Bin Covering (SFR, FH, SR, MF, KÅ), pp. 1004–1009.
CASE-2019-RoyMN #adaptation #visual notation- Dynamic Eye-in-Hand Visual Servoing using Adaptive Backstepping with a Supervisory Feature Jacobian (PLGR, CJBM, JN), pp. 1131–1137.
CASE-2019-SchulerS #analysis #automation #modelling #process #towards- Spray pattern analysis using wet-mix concrete for model based process control towards automated construction (BS, OS), pp. 661–666.
CASE-2019-SharabianiBGND #algorithm #kernel #polynomial- A Computer-Aided System for Determining the Application Range of a Warfarin Clinical Dosing Algorithm Using Support Vector Machines with a Polynomial Kernel Function (AS, AB, WLG, RN, HD), pp. 418–423.
CASE-2019-SunLY #detection #network- Railway Joint Detection Using Deep Convolutional Neural Networks (YS, YL, CY), pp. 235–240.
CASE-2019-ThonnessenSFCK #quickcheck #safety #testing- Testing Safety PLCs Using QuickCheck (DT, NS, MF, KC, SK), pp. 1–6.
CASE-2019-WangJRH #image #realtime #scalability- Real-time control for large scale additive manufacturing using thermal images (FW, FJ, KR, NH), pp. 36–41.
CASE-2019-WannerS #flexibility #polynomial #programming- Tool-center-point control of a flexible link concrete pump with hydraulic limitations using quadratic programming (JW, OS), pp. 561–566.
CASE-2019-WarsewaBRST #design #distributed #scalability- Decentralized and Distributed Observer Design for Large-Scale Structures using Dynamic Condensation (AW, MB, PR, OS, CT), pp. 1256–1262.
CASE-2019-XiaoH0HZ #detection #fault- Surface Defect Detection using Hierarchical Features (LX, TH, BW0, YH, JZ), pp. 1592–1596.
CASE-2019-ZhangLWGG #fault #learning #network- Fault Diagnosis Using Unsupervised Transfer Learning Based on Adversarial Network (ZZ, XL, LW, LG0, YG), pp. 305–310.
CGO-2019-KimK #generative #hardware- Translating CUDA to OpenCL for Hardware Generation using Neural Machine Translation (YK, HK), pp. 285–286.
CGO-2019-KruppeOS0 #lightweight- Extending LLVM for Lightweight SPMD Vectorization: Using SIMD and Vector Instructions Easily from Any Language (RK, JO, LS, AK0), pp. 278–279.
CGO-2019-SunBSB #graph #reasoning- Reasoning about the Node.js Event Loop using Async Graphs (HS, DB, FS, WB), pp. 61–72.
CAV-2019-DavisHK #fault #formal method #multi #protocol #proving- When Human Intuition Fails: Using Formal Methods to Find an Error in the “Proof” of a Multi-agent Protocol (JAD, LRH, DBK), pp. 366–375.
CAV-2019-ElfarWP #game studies #synthesis- Security-Aware Synthesis Using Delayed-Action Games (ME, YW0, MP), pp. 180–199.
CAV-2019-LiuWL #source code #verification- Verifying Asynchronous Event-Driven Programs Using Partial Abstract Transformers (PL, TW, AL), pp. 386–404.
CAV-2019-LiuZWYLLYZ #algorithm #hoare #logic #quantum #verification- Formal Verification of Quantum Algorithms Using Quantum Hoare Logic (JL, BZ, SW, SY, TL, YL, MY, NZ), pp. 187–207.
ICST-2019-CoppikSS #fuzzing #memory management #named- MemFuzz: Using Memory Accesses to Guide Fuzzing (NC, OS, NS), pp. 48–58.
ICST-2019-HellhakeSW #black box #data flow #distributed #integration #test coverage #testing- Using Data Flow-Based Coverage Criteria for Black-Box Integration Testing of Distributed Software Systems (DH, TS, SW0), pp. 420–429.
ICST-2019-LeeHYKKY #integration #network #static analysis- Classifying False Positive Static Checker Alarms in Continuous Integration Using Convolutional Neural Networks (SL, SH, JY, TK, CJK, SY), pp. 391–401.
ICST-2019-PatersonCAKFM #empirical #fault #predict #testing- An Empirical Study on the Use of Defect Prediction for Test Case Prioritization (DP, JC, RA, GMK, GF, PM), pp. 346–357.
ICST-2019-Radavelli #modelling #testing- Using Testing to Repair Models (MR), pp. 489–491.
ICTSS-2019-BombardaBGRDL #consistency #generative #protocol #refinement #state machine #testing- Combining Model Refinement and Test Generation for Conformance Testing of the IEEE PHD Protocol Using Abstract State Machines (AB, SB, AG, MR, FD, YL), pp. 67–85.
ICTSS-2019-BozicW #testing- Testing Chatbots Using Metamorphic Relations (JB, FW), pp. 41–55.
ICTSS-2019-Huerta-GuevaraA19a #adaptation #named #performance #testing- DYNAMOJM: A JMeter Tool for Performance Testing Using Dynamic Workload Adaptation (OHG, VAR, LM0, AOPD), pp. 234–241.
TAP-2019-CavalcantiBHL #csp #testing- Testing Robots Using CSP (AC, JB, RMH, RL), pp. 21–38.
VMCAI-2019-AndreFMS #abstraction #algorithm #industrial #model checking #parametricity #verification- Verification of an Industrial Asynchronous Leader Election Algorithm Using Abstractions and Parametric Model Checking (ÉA, LF, JMM, RS), pp. 409–424.
VMCAI-2019-BallabrigaFGLR #memory management #static analysis- Static Analysis of Binary Code with Memory Indirections Using Polyhedra (CB, JF, LG, GL, JR), pp. 114–135.
VMCAI-2019-DeckerP #ltl #model checking #quantifier- Flat Model Checking for Counting LTL Using Quantifier-Free Presburger Arithmetic (ND, AP), pp. 513–534.
VMCAI-2019-NguyenTC #automation #program repair #verification- Automatic Program Repair Using Formal Verification and Expression Templates (TTN, QTT, WNC), pp. 70–91.
ECSA-2018-ChangS #as a service #mobile- Providing Context as a Service Using Service-Oriented Mobile Indie Fog and Opportunistic Computing (CC, SNS), pp. 219–235.
ECSA-2018-SchneiderBK #information management #quality #trade-off- Using Informal Knowledge for Improving Software Quality Trade-Off Decisions (YS, AB, AK), pp. 265–283.
ICSA-2018-Yasaweerasinghelage #architecture #data analysis #modelling #performance #predict #privacy #simulation- Predicting the Performance of Privacy-Preserving Data Analytics Using Architecture Modelling and Simulation (RY, MS, IW, HYP), pp. 166–175.
JCDL-2018-AlonsoKT #evolution #how #social- How it Happened: Discovering and Archiving the Evolution of a Story Using Social Signals (OA, VK, SET), pp. 193–202.
JCDL-2018-KobayashiS0 #distributed #recommendation #representation- Citation Recommendation Using Distributed Representation of Discourse Facets in Scientific Articles (YK, MS, YM0), pp. 243–251.
JCDL-2018-MaiGS #learning #performance #semantics- Using Deep Learning for Title-Based Semantic Subject Indexing to Reach Competitive Performance to Full-Text (FM, LG, AS), pp. 169–178.
JCDL-2018-PoziMBJK #editing- Preserving Author Editing History Using Blockchain Technology (MSMP, GM, AAB, AJ, YK), pp. 165–168.
EDM-2018-BotelhoBOH #detection- Studying Affect Dynamics and Chronometry Using Sensor-Free Detectors (AFB, RSB, JO, NTH).
EDM-2018-CookOKD #approach #authentication #education- An Open Vocabulary Approach for Estimating Teacher Use of Authentic Questions in Classroom Discourse (CC, AO, SK, SD).
EDM-2018-EstebanGR #algorithm #approach #hybrid #multi #recommendation #search-based #student- A Hybrid Multi-Criteria approach using a Genetic Algorithm for Recommending Courses to University Students (AE, AZG, CR).
EDM-2018-HalpernTWGPDG - Knowledge Tracing Using the Brain (DH, ST, HYW, CG, POP, LD, TMG).
EDM-2018-HoernleGGPR #interactive #markov #modelling #simulation #student- Modeling the Effects of Students' Interactions with Immersive Simulations using Markov Switching Systems (NH, YG, BJG, PP, AR).
EDM-2018-MittalNSDDK #knowledge base #multi- Using a Common Sense Knowledge Base to Auto Generate Multi-Dimensional Vocabulary Assessments (RSM, SN, MS, UD, PD, RK).
EDM-2018-NandaHWDG #comprehension #modelling #online #topic- Understanding Learners' Opinion about Participation Certificates in Online Courses using Topic Modeling (GN, NMH, DRW, KAD, DG).
EDM-2018-NguyenL #modelling #student- Using Student Logs to Build Bayesian Models of Student Knowledge and Skills (HN, CWL).
EDM-2018-ReillyRS #collaboration #learning #multi- Exploring Collaboration Using Motion Sensors and Multi-Modal Learning Analytics (JMR, MR, BS).
EDM-2018-SalesBPH #big data #testing- Using Big Data to Sharpen Design-Based Inference in A/B Tests (AS, AB, TP, NTH).
ICPC-2018-OttAHBAFL #learning #network #programming language- Learning lexical features of programming languages from imagery using convolutional neural networks (JO, AA, PH, NB, HA, CF, EL), pp. 336–339.
ICPC-2018-TakahashiSHS #case study #debugging #locality #smell- A preliminary study on using code smells to improve bug localization (AT, NSL, SH, MS), pp. 324–327.
ICSME-2018-Alsolai #maintenance #object-oriented #predict- Predicting Software Maintainability in Object-Oriented Systems Using Ensemble Techniques (HA), pp. 716–721.
ICSME-2018-FrickG0P #difference #generative- Generating Accurate and Compact Edit Scripts Using Tree Differencing (VF, TG, FB0, MP0), pp. 264–274.
ICSME-2018-IshioMSI #detection #distance #normalisation- Cloned Buggy Code Detection in Practice Using Normalized Compression Distance (TI, NM, KS, KI), pp. 591–594.
ICSME-2018-PalombaZL #automation #detection #information retrieval #smell- Automatic Test Smell Detection Using Information Retrieval Techniques (FP, AZ, ADL), pp. 311–322.
ICSME-2018-RahmanR #code search #crowdsourcing #data analysis #effectiveness #query- Effective Reformulation of Query for Code Search Using Crowdsourced Knowledge and Extra-Large Data Analytics (MMR0, CKR), pp. 473–484.
ICSME-2018-RahmanR18a #api #code search #crowdsourcing #data analysis #named #query- NLP2API: Query Reformulation for Code Search Using Crowdsourced Knowledge and Extra-Large Data Analytics (MMR0, CKR), p. 714.
ICSME-2018-SchlieSS #analysis #matlab #matrix #modelling #multi- Comparing Multiple MATLAB/Simulink Models Using Static Connectivity Matrix Analysis (AS, SS, IS), pp. 160–171.
MSR-2018-AfzalG #case study #debugging #ide- A study on the use of IDE features for debugging (AA, CLG), pp. 114–117.
MSR-2018-CiborowskaKD #behaviour #detection #developer #reuse #web- Detecting and characterizing developer behavior following opportunistic reuse of code snippets from the web (AC, NAK, KD), pp. 94–97.
MSR-2018-LamotheS08 #android #api #automation #case study #experience #migration- Exploring the use of automated API migrating techniques in practice: an experience report on Android (ML, WS), pp. 503–514.
MSR-2018-MoslehiAR #feature model- Feature location using crowd-based screencasts (PM, BA, JR), pp. 192–202.
MSR-2018-RabbaniHSGM #fault #ide #interactive #replication #visual notation- Revisiting “programmers' build errors” in the visual studio context: a replication study using IDE interaction traces (NR, MSH, SS, KG, SM), pp. 98–101.
MSR-2018-WilkieHKLNRPK #developer #ide #identification- Who's this?: developer identification using IDE event data (JW, ZAH, AK, JL, GN, CR, MP, JK), pp. 90–93.
SANER-2018-KatzRS #decompiler #network- Using recurrent neural networks for decompilation (DSK, JR, ES), pp. 346–356.
SANER-2018-LeemansAB18a #analysis #mining #process #scalability #statechart- The Statechart Workbench: Enabling scalable software event log analysis using process mining (ML, WMPvdA, MGJvdB), pp. 502–506.
SANER-2018-NucciPTSL #detection #machine learning #question #smell- Detecting code smells using machine learning techniques: Are we there yet? (DDN, FP, DAT, AS, ADL), pp. 612–621.
SANER-2018-SantosCPHA #detection #fault #modelling #syntax- Syntax and sensibility: Using language models to detect and correct syntax errors (EAS, JCC, DP, AH, JNA), pp. 311–322.
SANER-2018-SotoG #debugging #predict #probability- Using a probabilistic model to predict bug fixes (MS, CLG), pp. 221–231.
SCAM-2018-IslamIMRRS #detection #research #transitive- [Research Paper] Detecting Evolutionary Coupling Using Transitive Association Rules (MAI, MMI, MM, BR, CKR, KAS), pp. 113–122.
SCAM-2018-JiangCZPP0 #code search #research #semantics- [Research Paper] Semantics-Based Code Search Using Input/Output Examples (RJ, ZC, ZZ, YP0, MP, TZ0), pp. 92–102.
SCAM-2018-MostaeenSRRS #automation #design #machine learning #research #tool support #towards #validation- [Research Paper] On the Use of Machine Learning Techniques Towards the Design of Cloud Based Automatic Code Clone Validation Tools (GM, JS, BR, CKR, KAS), pp. 155–164.
SCAM-2018-MuylaertR #commit #research #slicing- [Research Paper] Untangling Composite Commits Using Program Slicing (WM, CDR), pp. 193–202.
SCAM-2018-NafiRRS #api #detection #documentation #research #similarity- [Research Paper] CroLSim: Cross Language Software Similarity Detector Using API Documentation (KWN, BR, CKR, KAS), pp. 139–148.
SCAM-2018-PaceTG #architecture #predict #research #smell #towards- [Research Paper] Towards Anticipation of Architectural Smells Using Link Prediction Techniques (JADP, AT, DG), pp. 62–71.
CIAA-2018-NozakiHYS #automaton #finite- Enumeration of Cryptarithms Using Deterministic Finite Automata (YN, DH, RY, AS), pp. 286–298.
FM-2018-0001BFLMR #automaton #energy #nondeterminism #robust #synthesis- Optimal and Robust Controller Synthesis - Using Energy Timed Automata with Uncertainty (GB0, PB, UF, KGL, NM, PAR), pp. 203–221.
FM-2018-AkazakiLYDH #cyber-physical #learning- Falsification of Cyber-Physical Systems Using Deep Reinforcement Learning (TA, SL, YY, YD, JH), pp. 456–465.
FM-2018-Boralv #automation #design #proving- Interlocking Design Automation Using Prover Trident (AB), pp. 653–656.
FM-2018-GeislerH #development #distributed #model checking- Stepwise Development and Model Checking of a Distributed Interlocking System - Using RAISE (SG, AEH), pp. 277–293.
- IFM-2018-DoughertyGR #analysis #protocol #security #smt
- Security Protocol Analysis in Context: Computing Minimal Executions Using SMT and CPSA (DJD, JDG, JDR), pp. 130–150.
- IFM-2018-GlabbeekHW
- Analysing AWN-Specifications Using mCRL2 (Extended Abstract) (RJvG, PH, DvdW), pp. 398–418.
- IFM-2018-KangMH #constraints #probability #verification
- Probabilistic Verification of Timing Constraints in Automotive Systems Using UPPAAL-SMC (EYK0, DM, LH), pp. 236–254.
- IFM-2018-KornerLM #model checking #state of the art
- State-of-the-Art Model Checking for B and Event-B Using ProB and LTSmin (PK, ML, JM), pp. 275–295.
- IFM-2018-SchmidtKL #formal method #generative #modelling #synthesis
- Repair and Generation of Formal Models Using Synthesis (JS, SK, ML), pp. 346–366.
SEFM-2018-BabaeeGF #framework #learning #predict #runtime #statistics #verification- Prevent : A Predictive Run-Time Verification Framework Using Statistical Learning (RB, AG, SF), pp. 205–220.
SEFM-2018-DinSC #exception #verification- Program Verification for Exception Handling on Active Objects Using Futures (CCD, RS, TCC), pp. 73–88.
SEFM-2018-DuboisGPC #interactive #protocol #proving #theorem proving- Exploring Properties of a Telecommunication Protocol with Message Delay Using Interactive Theorem Prover (CD, OG, JP, MC), pp. 239–253.
SEFM-2018-GolraDSSG #requirements #specification- Bridging the Gap Between Informal Requirements and Formal Specifications Using Model Federation (FRG, FD, JS, IS, SG), pp. 54–69.
- ICFP-2018-AlmeidaCM0P #assessment #automation #case study #education #experience #functional #game studies #how
- Teaching how to program using automated assessment and functional glossy games (experience report) (JBA, AC, NM, HP0, JP), p. 17.
- ICFP-2018-StampoulisC #functional #higher-order #learning #logic programming #prolog #prototype
- Prototyping a functional language using higher-order logic programming: a functional pearl on learning the ways of λProlog/Makam (AS, AC), p. 30.
AIIDE-2018-MathewsonM #game studies #named- Improbotics: Exploring the Imitation Game Using Machine Intelligence in Improvised Theatre (KWM, PM), pp. 59–66.
CHI-PLAY-2018-ByrneMM #case study #experience #game studies- AR Fighter: Using HMDs to create Vertigo Play Experiences (RB, JM, F'M), pp. 45–57.
CHI-PLAY-2018-FrommelFR0 #self- Emotion-based Dynamic Difficulty Adjustment Using Parameterized Difficulty and Self-Reports of Emotion (JF, FF, KR, MW0), pp. 163–171.
CHI-PLAY-2018-VellaPKPMJ #case study #game studies- Using Applied Games to Engage mHealth Users: A Case Study of MindMax (KV, NP, MK, BP, JM, DJ0), pp. 511–522.
CIG-2018-GlavinM #experience #learning- Skilled Experience Catalogue: A Skill-Balancing Mechanism for Non-Player Characters using Reinforcement Learning (FGG, MGM), pp. 1–8.
CIG-2018-Guerrero-Romero #algorithm #design #game studies #testing- Using a Team of General AI Algorithms to Assist Game Design and Testing (CGR, SML, DPL), pp. 1–8.
CIG-2018-KaravolosLY #automation #design- Using a Surrogate Model of Gameplay for Automated Level Design (DK, AL, GNY), pp. 1–8.
CIG-2018-KosmidesDAKOL #game studies #named- InLife: Combining Real Life with Serious Games using IoT (PK, KPD, EFA, NK, YO, VDL), pp. 1–7.
CIG-2018-StreckW #animation #markov- Using Discrete Time Markov Chains for Control of Idle Character Animation (AS, TW), pp. 1–4.
CIG-2018-TziortziotiMMVC #education #game studies #internet #process- Scenarios for Educational and Game Activities using Internet of Things Data (CT, IM, GM, AV, IC), pp. 1–8.
FDG-2018-PlumbKS #clustering #game studies #hybrid #multi #network #online- Hybrid network clusters using common gameplay for massively multiplayer online games (JNP, SKK, RS), p. 10.
FDG-2018-SiljebratAP #towards- Towards human-like artificial intelligence using StarCraft 2 (HS, CA, AP), p. 4.
FDG-2018-SmithPV #generative #graph #programming #set- Graph-based generation of action-adventure dungeon levels using answer set programming (TS0, JAP, AV), p. 10.
VS-Games-2018-BardisKSVD #evolution #image- Image Warping Using WebGL for a Smart Avatar Animating Body Weight Evolution (GB, YK, NS, AV, ND), pp. 1–4.
VS-Games-2018-LewisAMCKBDM #game studies #mobile- Balance Trucks: Using Crowd-Sourced Data to Procedurally-Generate Gameplay within Mobile Games (MRL, SA, LM, SC, LCK, AB, SD, AM), pp. 1–4.
VS-Games-2018-Lim #case study #protocol- Using Think-Aloud Protocol in Looking at the Framing of One's Character with a Case Study on Terraria (JSL), pp. 1–4.
VS-Games-2018-MunozVCMH #artificial reality #coordination #diagrams- Dynamic Systems Theory in Human Movement Exploring Coordination Patterns by Angle-Angle Diagrams Using Kinect (JEMC, JFV, SC, MFM, ÓAH), pp. 1–4.
VS-Games-2018-OberdorferL #game studies- Effectivity of Affine Transformation Knowledge Training Using Game Mechanics (SO, MEL), pp. 1–8.
VS-Games-2018-OberdorferL18a #encoding #game studies- Gamified Knowledge Encoding: Knowledge Training Using Game Mechanics (SO, MEL), pp. 1–2.
VS-Games-2018-OberdorferL18b #effectiveness #game studies- Effective Orbital Mechanics Knowledge Training Using Game Mechanics (SO, MEL), pp. 1–8.
VS-Games-2018-OhmotoTN #comprehension- Improving Context Understanding Using Avatar's Affective Expressions Reflecting Operator's Mental States (YO, ST, TN), pp. 1–4.
VS-Games-2018-RallisLGVDD #analysis #artificial reality #game studies #learning #visualisation- An Embodied Learning Game Using Kinect and Labanotation for Analysis and Visualization of Dance Kinesiology (IR, AL, IG, AV, ND, AD), pp. 1–8.
VS-Games-2018-Ramic-Brkic #education #game studies- Enhancing Progressive Education through the Use of Serious Games (BRB), pp. 1–4.
VS-Games-2018-WuGHL #3d #data fusion #multi #robust #towards- Towards Robust 3D Skeleton Tracking Using Data Fusion from Multiple Depth Sensors (YW, LG, SH, RWL), pp. 1–4.
CIKM-2018-AdigaCKMRRS #modelling #network #probability #query- Inferring Probabilistic Contagion Models Over Networks Using Active Queries (AA, VCM, CJK, MVM, SSR, DJR, RES), pp. 377–386.
CIKM-2018-ANR #algorithm #generative #higher-order #scalability- A Scalable Algorithm for Higher-order Features Generation using MinHash (PA, NN, RR), pp. 1213–1222.
CIKM-2018-CirsteaMMG0 #correlation #multi #network- Correlated Time Series Forecasting using Multi-Task Deep Neural Networks (RGC, DVM, GMM, CG, BY0), pp. 1527–1530.
CIKM-2018-DeutchGM #detection #privacy- Preserving Privacy of Fraud Detection Rule Sharing Using Intel's SGX (DD, YG, TM), pp. 1935–1938.
CIKM-2018-GeDJNW #personalisation- Personalizing Search Results Using Hierarchical RNN with Query-aware Attention (SG, ZD, ZJ, JYN, JRW), pp. 347–356.
CIKM-2018-GeZZCLYHLSLYHZZ #behaviour #image #matter #modelling #visual notation- Image Matters: Visually Modeling User Behaviors Using Advanced Model Server (TG, LZ, GZ, KC, SL, HY, ZH, BL, PS, HL, PY, SH, ZZ, XZ, YZ, KG), pp. 2087–2095.
CIKM-2018-HashemiWKZC #query #user satisfaction- Measuring User Satisfaction on Smart Speaker Intelligent Assistants Using Intent Sensitive Query Embeddings (SHH, KW, AEK, IZ, PAC), pp. 1183–1192.
CIKM-2018-Kieu0GJ - Distinguishing Trajectories from Different Drivers using Incompletely Labeled Trajectories (TK, BY0, CG, CSJ), pp. 863–872.
CIKM-2018-KweeCPL #lifecycle #mining #named #visualisation- Traffic-Cascade: Mining and Visualizing Lifecycles of Traffic Congestion Events Using Public Bus Trajectories (ATK, MFC, PKP, EPL), pp. 1955–1958.
CIKM-2018-LinmansVK #detection #robust #scalability #semantics #web- Improved and Robust Controversy Detection in General Web Pages Using Semantic Approaches under Large Scale Conditions (JL, BvdV, EK), pp. 1647–1650.
CIKM-2018-PandeyKS #learning #recommendation- Recommending Serendipitous Items using Transfer Learning (GP0, DK, AS), pp. 1771–1774.
CIKM-2018-PatidarAVS #automation #modelling- Automatic Conversational Helpdesk Solution using Seq2Seq and Slot-filling Models (MP, PA, LV, GMS), pp. 1967–1975.
CIKM-2018-PrasojoKN #fine-grained #information management #named #semantics- StuffIE: Semantic Tagging of Unlabeled Facets Using Fine-Grained Information Extraction (REP, MK, WN), pp. 467–476.
CIKM-2018-RoleMN #algorithm #clustering #evaluation #word- Unsupervised Evaluation of Text Co-clustering Algorithms Using Neural Word Embeddings (FR, SM, MN), pp. 1827–1830.
CIKM-2018-RoyGBBM #how #information retrieval #normalisation #performance #word- Using Word Embeddings for Information Retrieval: How Collection and Term Normalization Choices Affect Performance (DR, DG, SB, SB, MM), pp. 1835–1838.
CIKM-2018-ShangSSLGKLY0 - Investigating Rumor News Using Agreement-Aware Search (JS, JS, TS, XL, AG, FK, ÁDL, CY0, JH0), pp. 2117–2125.
CIKM-2018-ShenYZPZ #parallel- Parallel Hashing Using Representative Points in Hyperoctants (CS, MY, CZ, YP, GZ), pp. 813–822.
CIKM-2018-SyedRN #named #rdf #validation- FactCheck: Validating RDF Triples Using Textual Evidence (ZHS, MR, ACNN), pp. 1599–1602.
CIKM-2018-Voorhees #on the #reuse- On Building Fair and Reusable Test Collections using Bandit Techniques (EMV), pp. 407–416.
CIKM-2018-ZhangNCC #database #parallel #probability #scalability- Scalable Entity Resolution Using Probabilistic Signatures on Parallel Databases (YZ, KSN, TC, PC), pp. 2213–2221.
ECIR-2018-BalikasLRA #distance #documentation #retrieval- Cross-Lingual Document Retrieval Using Regularized Wasserstein Distance (GB, CL, IR, MRA), pp. 398–410.
ECIR-2018-DeySK #detection #topic #twitter- Topical Stance Detection for Twitter: A Two-Phase LSTM Model Using Attention (KD, RS, SK), pp. 529–536.
ECIR-2018-Jalan0V #classification #learning- Medical Forum Question Classification Using Deep Learning (RSJ, MG0, VV), pp. 45–58.
ECIR-2018-McDonaldMO18a #overview #predict #towards- Towards Maximising Openness in Digital Sensitivity Review Using Reviewing Time Predictions (GM, CM, IO), pp. 699–706.
ECIR-2018-SinghM #recommendation #symmetry- Benefits of Using Symmetric Loss in Recommender Systems (GS, SM), pp. 345–356.
ECIR-2018-Zhang0LZ #analysis #matrix #representation #sentiment #twitter- Unsupervised Sentiment Analysis of Twitter Posts Using Density Matrix Representation (YZ, DS0, XL, PZ0), pp. 316–329.
ICML-2018-0001JCCJ #robust- Reinforcing Adversarial Robustness using Model Confidence Induced by Adversarial Training (XW0, UJ, JC, LC, SJ), pp. 5330–5338.
ICML-2018-AghazadehSLDSB #feature model #named #scalability #sketching- MISSION: Ultra Large-Scale Feature Selection using Count-Sketches (AA, RS, DL, GD, AS, RGB), pp. 80–88.
ICML-2018-ArenzZN #performance #policy- Efficient Gradient-Free Variational Inference using Policy Search (OA, MZ, GN), pp. 234–243.
ICML-2018-BajajGHHL #clustering #named- SMAC: Simultaneous Mapping and Clustering Using Spectral Decompositions (CB, TG, ZH, QH, ZL), pp. 334–343.
ICML-2018-BangS #generative #network- Improved Training of Generative Adversarial Networks using Representative Features (DB, HS), pp. 442–451.
ICML-2018-BansalAB #agile #design- Using Inherent Structures to design Lean 2-layer RBMs (AB, AA, CB), pp. 452–460.
ICML-2018-BarretoBQSSHMZM #learning #policy- Transfer in Deep Reinforcement Learning Using Successor Features and Generalised Policy Improvement (AB, DB, JQ, TS, DS, MH, DJM, AZ, RM), pp. 510–519.
ICML-2018-ChenLW #learning #scalability- Scalable Bilinear Learning Using State and Action Features (YC, LL0, MW), pp. 833–842.
ICML-2018-DaiZGW #network- Compressing Neural Networks using the Variational Information Bottleneck (BD, CZ, BG, DPW), pp. 1143–1152.
ICML-2018-DharGE #generative #modelling- Modeling Sparse Deviations for Compressed Sensing using Generative Models (MD, AG, SE), pp. 1222–1231.
ICML-2018-FengWCS #learning #multi #network #parametricity- Nonparametric variable importance using an augmented neural network with multi-task learning (JF, BDW, MC, NS), pp. 1495–1504.
ICML-2018-GaninKBEV #image #learning #source code- Synthesizing Programs for Images using Reinforced Adversarial Learning (YG, TK, IB, SMAE, OV), pp. 1652–1661.
ICML-2018-HuangA0S #learning- Learning Deep ResNet Blocks Sequentially using Boosting Theory (FH, JTA, JL0, RES), pp. 2063–2072.
ICML-2018-HuWL #analysis #probability #reduction #source code- Dissipativity Theory for Accelerating Stochastic Variance Reduction: A Unified Analysis of SVRG and Katyusha Using Semidefinite Programs (BH, SW, LL), pp. 2043–2052.
ICML-2018-IcarteKVM #composition #learning #specification- Using Reward Machines for High-Level Task Specification and Decomposition in Reinforcement Learning (RTI, TQK, RAV, SAM), pp. 2112–2121.
ICML-2018-JohnH #fourier #process #scalability- Large-Scale Cox Process Inference using Variational Fourier Features (STJ, JH), pp. 2367–2375.
ICML-2018-KaiserBRVPUS #modelling #performance #sequence- Fast Decoding in Sequence Models Using Discrete Latent Variables (LK, SB, AR, AV, NP, JU, NS), pp. 2395–2404.
ICML-2018-KalimerisSSW #learning- Learning Diffusion using Hyperparameters (DK, YS, KS, UW), pp. 2425–2433.
ICML-2018-KeivaniS #nearest neighbour- Improved nearest neighbor search using auxiliary information and priority functions (OK, KS), pp. 2578–2586.
ICML-2018-KuleshovFE #learning #nondeterminism- Accurate Uncertainties for Deep Learning Using Calibrated Regression (VK, NF, SE), pp. 2801–2809.
ICML-2018-RaileanuDSF #learning #modelling #multi- Modeling Others using Oneself in Multi-Agent Reinforcement Learning (RR, ED, AS, RF), pp. 4254–4263.
ICML-2018-SharmaNK #clique #problem #random- Solving Partial Assignment Problems using Random Clique Complexes (CS, DN, MK), pp. 4593–4602.
ICML-2018-Sinha #clustering #matrix #random- K-means clustering using random matrix sparsification (KS), pp. 4691–4699.
ICML-2018-WeissGY #automaton #network #query- Extracting Automata from Recurrent Neural Networks Using Queries and Counterexamples (GW, YG, EY), pp. 5244–5253.
ICML-2018-YoonJS #generative #named- GAIN: Missing Data Imputation using Generative Adversarial Nets (JY, JJ, MvdS), pp. 5675–5684.
ICML-2018-YoonJS18a #dataset #generative #modelling #multi #named #network #predict- RadialGAN: Leveraging multiple datasets to improve target-specific predictive models using Generative Adversarial Networks (JY, JJ, MvdS), pp. 5685–5693.
ICPR-2018-AbdeldayemB #automation #detection- Automatically Detecting Arrhythmia-related Irregular Patterns using the Temporal and Spectro-Temporal Textures of ECG Signals (SSA, TB), pp. 2301–2307.
ICPR-2018-AfonsoPSP #classification #learning- Improving Optimum- Path Forest Classification Using Unsupervised Manifold Learning (LCSA, DCGP, ANdS, JPP), pp. 560–565.
ICPR-2018-AkdemirBS #locality #realtime- Real-time Vehicle Localization and Tracking Using Monocular Panomorph Panoramic Vision (BA, ANB, LMS), pp. 2350–2355.
ICPR-2018-AzzopardiFGSV #gender #image #recognition- Gender recognition from face images using trainable shape and color features (GA, PF, AG, AS, MV), pp. 1983–1988.
ICPR-2018-BeheraDDR #recognition- Air Signature Recognition Using Deep Convolutional Neural Network-Based Sequential Model (SKB, AKD, DPD, PPR0), pp. 3525–3530.
ICPR-2018-BhuniaBBKB0P #network- Handwriting Trajectory Recovery using End-to-End Deep Encoder-Decoder Network (AKB, AB, AKB, AK, PB, PPR0, UP0), pp. 3639–3644.
ICPR-2018-BhuniaBBKB0P18a #generative #image #network #word- Word Level Font-to-Font Image Translation using Convolutional Recurrent Generative Adversarial Networks (AKB, AKB, PB, AK, AB, PPR0, UP0), pp. 3645–3650.
ICPR-2018-BicegoLDGA #mining #modelling #topic- Mining NMR Spectroscopy Using Topic Models (MB, PL, MD, FG, MA), pp. 3784–3789.
ICPR-2018-CombinidoMA #approach #image #network- A Convolutional Neural Network Approach for Estimating Tropical Cyclone Intensity Using Satellite-based Infrared Images (JSC, JRM, JA), pp. 1474–1480.
ICPR-2018-CuiZZH #learning #multi #network #recognition- Multi-source Learning for Skeleton -based Action Recognition Using Deep LSTM Networks (RC, AZ, SZ, GH0), pp. 547–552.
ICPR-2018-CzovnyBSC #3d- Minutia Matching using 3D Pore Clouds (RKC, ORPB, LS, HSGC), pp. 3138–3143.
ICPR-2018-DehzangiBI #detection #multi #process- Activity Detection using Fusion of Multi-Pressure Sensors in Insoles (OD, BAB, OI), pp. 3315–3321.
ICPR-2018-DehzangiM #behaviour #predict- Unobtrusive Driver Drowsiness Prediction Using Driving Behavior from Vehicular Sensors (OD, SM), pp. 3598–3603.
ICPR-2018-DehzangiS #analysis #process #recognition #reduction #robust- IMU-Based Robust Human Activity Recognition using Feature Analysis, Extraction, and Reduction (OD, VS), pp. 1402–1407.
ICPR-2018-DehzangiT #detection #network #representation- Driver Distraction Detection using MEL Cepstrum Representation of Galvanic Skin Responses and Convolutional Neural Networks (OD, MT), pp. 1481–1486.
ICPR-2018-Dey0GVLP #image #learning #multi #retrieval #sketching- Learning Cross-Modal Deep Embeddings for Multi-Object Image Retrieval using Text and Sketch (SD, AD0, SKG, EV, JL0, UP0), pp. 916–921.
ICPR-2018-DongTC #automation #image- Automatic Inspection of Aerospace Welds Using X-Ray Images (XD, CJT, TFC), pp. 2002–2007.
ICPR-2018-DuanMKY #classification #image- A New Single Image Super-resolution Method Using SIMK-based Classification and ISRM Technique (PD, AM, XK, CY), pp. 3043–3048.
ICPR-2018-El-GamalEAGBHKE #framework- Significant Region-Based Framework for Early Diagnosis of Alzheimer's Disease Using 11C PiB-PET Scans (FEZAEG, MME, AA, MG, GNB, HH, RK, ASEB), pp. 2989–2994.
ICPR-2018-EskenaziGO #component #image- Watercolor, Segmenting Images Using Connected Color Components (SE, PGK, JMO), pp. 3633–3638.
ICPR-2018-GarciaLSH #classification #complexity #metric #recommendation- Classifier Recommendation Using Data Complexity Measures (LPFG, ACL, MCPdS, TKH), pp. 874–879.
ICPR-2018-GarrettR #3d #network #performance- Fast Descriptor Extraction for Contextless 3D Registration Using a Fully Convolutional Network (TG, RR), pp. 1211–1216.
ICPR-2018-HeYLXLHS #estimation #physics- Variational Mode Decomposition-Based Heart Rate Estimation Using Wrist-Type Photoplethysmography During Physical Exercise (WH, YY, YL, HX, LL0, WH, MS), pp. 3766–3771.
ICPR-2018-HibrajVSP #clustering #set- Speaker Clustering Using Dominant Sets (FH, SV, TS, MP), pp. 3549–3554.
ICPR-2018-JaberiPF #clustering #probability- Probabilistic Sparse Subspace Clustering Using Delayed Association (MJ, MP, HF), pp. 2087–2092.
ICPR-2018-JiQYKZ #automation #image #network #segmentation- Automatic Prostate Segmentation on MR Images Using Enhanced Holistically-Nested Networks (DJ, JQ, JY, TK, SZ), pp. 3820–3825.
ICPR-2018-JohnKGKM #estimation- Free Space, Visible and Missing Lane Marker Estimation using the PsiNet and Extra Trees Regression (VJ, NMK, CG, KK, SM), pp. 189–194.
ICPR-2018-JyotiD #automation #estimation #geometry #network- Automatic Eye Gaze Estimation using Geometric & Texture-based Networks (SJ, AD), pp. 2474–2479.
ICPR-2018-KateFG #visual notation- Visual Tracking with Breeding Fireflies using Brightness from Background-Foreground Information (PK, MF, PG), pp. 2570–2575.
ICPR-2018-KawanishiMXTY #estimation- Which Content in a Booklet is he/she Reading? Reading Content Estimation using an Indoor Surveillance Camera (YK, HM, JX, KT, HY), pp. 1731–1736.
ICPR-2018-KilKC - Scene text rectification using glyph and character alignment properties (THK, HIK, NIC), pp. 3663–3668.
ICPR-2018-KimuraSDNKBI #3d #representation- Representing a Partially Observed Non-Rigid 3D Human Using Eigen-Texture and Eigen-Deformation (RK, AS, FLD, YN, HK, AB, KI), pp. 1043–1048.
ICPR-2018-KokakiTKHO #modelling- Sequential Fish Catch Forecasting Using Bayesian State Space Models (YK, NT, TK, KH, TO), pp. 776–781.
ICPR-2018-KonwerBBBB0P #generative #network- Staff line Removal using Generative Adversarial Networks (AK, AKB, AB, AKB, PB, PPR0, UP0), pp. 1103–1108.
ICPR-2018-KurzendorferBSB #analysis #classification #random #segmentation- Myocardial Scar Segmentation in LGE-MRI using Fractal Analysis and Random Forest Classification (TK, KB, SS, AB, CF, AKM), pp. 3168–3173.
ICPR-2018-LeeLC - Cancelable Biometrics Using Noise Embedding (DHL, SHL, NIC), pp. 3390–3395.
ICPR-2018-LiangYLH #classification- A Segmented Local Offset Method for Imbalanced Data Classification Using Quasi-Linear Support Vector Machine (PL, XY, WL, JH), pp. 746–751.
ICPR-2018-LiaoCQ #image #visualisation- Visualization of Hyperspectral Images Using Moving Least Squares (DL, SC, YQ), pp. 2851–2856.
ICPR-2018-LiCGJH #gesture #multimodal #recognition- Multimodal Gesture Recognition Using Densely Connected Convolution and BLSTM (DL, YC, MkG, SJ, CH), pp. 3365–3370.
ICPR-2018-LiciottiPPFZ #network #segmentation #semantics- Convolutional Networks for Semantic Heads Segmentation using Top-View Depth Data in Crowded Environment (DL, MP, RP, EF, PZ), pp. 1384–1389.
ICPR-2018-LiH #algorithm #estimation #performance #robust- Fast and Robust Pose Estimation Algorithm for Bin Picking Using Point Pair Feature (ML, KH), pp. 1604–1609.
ICPR-2018-Liu0H #integration- High-Quality and Memory-Efficient Volumetric Integration of Depth Maps Using Plane Priors (YL, WG0, ZH), pp. 1749–1754.
ICPR-2018-LiuH0 #online #optimisation- Online Temporal Calibration of Camera and IMU using Nonlinear Optimization (JL, ZH, WG0), pp. 1761–1766.
ICPR-2018-LiW18a #detection #semantics #visual notation- Visual Relationship Detection Using Joint Visual-Semantic Embedding (BL, YW0), pp. 3291–3296.
ICPR-2018-LiWK18a #framework #image #learning- Infrared and Visible Image Fusion using a Deep Learning Framework (HL0, XJW, JK), pp. 2705–2710.
ICPR-2018-LocBO #documentation #image #network #security- Document Images Watermarking for Security Issue using Fully Convolutional Networks (CVL, JCB, JMO), pp. 1091–1096.
ICPR-2018-LuoCCTTKH - Oil Price Forecasting Using Supervised GANs with Continuous Wavelet Transform Features (ZL, JC, XJC, KT, TT, TK, SH), pp. 830–835.
ICPR-2018-MaH #generative #network- Perceptual Face Completion using a Local-Global Generative Adversarial Network (RM, HH0), pp. 1670–1675.
ICPR-2018-MaierSSWSCF #learning #network #precise #towards- Precision Learning: Towards Use of Known Operators in Neural Networks (AKM, FS, CS, TW, SS, JHC, RF), pp. 183–188.
ICPR-2018-MaLHY #estimation #hybrid #network- Image-based Air Pollution Estimation Using Hybrid Convolutional Neural Network (JM, KL, YH, JY), pp. 471–476.
ICPR-2018-MerchantSKM #dataset #image- Appearance-based data augmentation for image datasets using contrast preserving sampling (AKM, TQS, BK, RM), pp. 1235–1240.
ICPR-2018-MohantyDG #detection #performance- An Efficient System for Hazy Scene Text Detection using a Deep CNN and Patch-NMS (SM, TD, HPG), pp. 2588–2593.
ICPR-2018-MustaniemiKSMH #detection #metric #performance- Fast Motion Deblurring for Feature Detection and Matching Using Inertial Measurements (JM, JK, SS, JM, JH), pp. 3068–3073.
ICPR-2018-NadeemHS #algorithm #automation #detection #image #segmentation- An automated airway segmentation algorithm for CT images using topological leakage detection and volume freezing (SAN, EAH, PKS), pp. 1181–1186.
ICPR-2018-NguyenTL #data-driven #learning- Are French Really That Different? Recognizing Europeans from Faces Using Data-Driven Learning (VDN, MT, JL), pp. 2729–2734.
ICPR-2018-PassalisT #information management #network #similarity- Neural Network Knowledge Transfer using Unsupervised Similarity Matching (NP, AT), pp. 716–721.
ICPR-2018-PengSCCXJ #architecture #detection #multi- Detecting Heads using Feature Refine Net and Cascaded Multi-scale Architecture (DP, ZS, ZC, ZC, LX, LJ), pp. 2528–2533.
ICPR-2018-PereraAP #generative #multi #named #network- In2I: Unsupervised Multi-Image-to-Image Translation Using Generative Adversarial Networks (PP, MA, VMP), pp. 140–146.
ICPR-2018-RhifWF #3d #network #recognition #sequence- Action Recognition from 3D Skeleton Sequences using Deep Networks on Lie Group Features (MR, HW, IRF), pp. 3427–3432.
ICPR-2018-RoyT #higher-order #learning- Learning to Learn Second-Order Back-Propagation for CNNs Using LSTMs (AR, ST), pp. 97–102.
ICPR-2018-SadafiKHPMS #multi- Multiple Mice Tracking: Occlusions Disentanglement using a Gaussian Mixture Model (AS, VMK, HH, FP, VM, DS), pp. 2433–2437.
ICPR-2018-Savchenko #performance #recognition #statistics- Efficient Statistical Face Recognition Using Trigonometric Series and CNN Features (AVS), pp. 3262–3267.
ICPR-2018-ShibataIHM #image #set- Restoration of Sea Surface Temperature Satellite Images Using a Partially Occluded Training Set (SS, MI, AH, MM), pp. 2771–2776.
ICPR-2018-SuHK #analysis #classification #component #multi #performance- Efficient Text Classification Using Tree-structured Multi-linear Principal Component Analysis (YS, YH, CCJK), pp. 585–590.
ICPR-2018-SuJ #analysis #image #multi- Multi-Spectral Fusion and Denoising of RGB and NIR Images Using Multi-Scale Wavelet Analysis (HS, CJ), pp. 1779–1784.
ICPR-2018-TayanovKS #classification #learning #predict- Prediction-based classification using learning on Riemannian manifolds (VT, AK, CYS), pp. 591–596.
ICPR-2018-UekiHKK #fine-grained #query #retrieval #video- Fine-grained Video Retrieval using Query Phrases - Waseda_Meisei TRECVID 2017 AVS System - (KU, KH, KK, TK), pp. 3322–3327.
ICPR-2018-VinayavekhinCMA #comprehension #learning #what- Focusing on What is Relevant: Time-Series Learning and Understanding using Attention (PV, SC, AM, DJA, GDM, DK, RT), pp. 2624–2629.
ICPR-2018-WangF #detection- Saliency Detection using Iterative Dynamic Guided Filtering (CW, YF), pp. 3396–3401.
ICPR-2018-WangHJ #learning- Focus on Scene Text Using Deep Reinforcement Learning (HW, SH, LJ), pp. 3759–3765.
ICPR-2018-WangSH #algorithm #black box #generative- Universal Perturbation Generation for Black-box Attack Using Evolutionary Algorithms (SW, YS, YH), pp. 1277–1282.
ICPR-2018-WangZGW #detection #image #multi #network #parametricity- Fully convolutional neural networks for prostate cancer detection using multi-parametric magnetic resonance images: an initial investigation (YW, BZ, DG, JW), pp. 3814–3819.
ICPR-2018-WeiCYLL #black box #classification #image- Explain Black-box Image Classifications Using Superpixel-based Interpretation (YW, MCC, YY, SNL, SL), pp. 1640–1645.
ICPR-2018-Windeatt #analysis #classification #optimisation- Optimising Ensemble of Two-Class classifiers using Spectral Analysis (TW), pp. 710–715.
ICPR-2018-WitmerB #classification #image #learning #multi- Multi-label Classification of Stem Cell Microscopy Images Using Deep Learning (AW, BB), pp. 1408–1413.
ICPR-2018-WuW #gesture #recognition- Applying hand gesture recognition and joint tracking to a TV controller using CNN and Convolutional Pose Machine (YW, CMW), pp. 3086–3091.
ICPR-2018-WuY0Y #robust- Robust ECG Biometrics Using Two-Stage Model (BW, GY, LY0, YY), pp. 1062–1067.
ICPR-2018-XinCCZYW #locality #recognition #visual notation- Visual Localization in Changing Environments using Place Recognition Techniques (ZX, YC, SC, JZ0, YY, YW), pp. 1785–1790.
ICPR-2018-XiongJXXLW #documentation #energy #estimation #image- Historical document image binarization using background estimation and energy minimization (WX0, XJ, JX, ZX, ML, JW), pp. 3716–3721.
ICPR-2018-XuCG #learning #modelling #multi #random- Common Random Subgraph Modeling Using Multiple Instance Learning (TX, DKYC, IG), pp. 1205–1210.
ICPR-2018-XuD #detection #modelling- Human Routine Change Detection using Bayesian Modelling (YX, DD), pp. 1833–1838.
ICPR-2018-XuDMB #recognition- Video-based Emotion Recognition using Aggregated Features and Spatio-temporal Information (JX, YD, LM, HB), pp. 2833–2838.
ICPR-2018-XuZZ #image #network #recognition- Screen-rendered text images recognition using a deep residual network based segmentation-free method (XX0, JZ, HZ), pp. 2741–2746.
ICPR-2018-YamadaIYK #network #segmentation- Texture Segmentation using Siamese Network and Hierarchical Region Merging (RY, HI, NY, TK), pp. 2735–2740.
ICPR-2018-Yang0CF #analysis #canonical #correlation #detection #image- Heterogeneous image change detection using Deep Canonical Correlation Analysis (JY, YZ0, YC, LF), pp. 2917–2922.
ICPR-2018-YangZT - Reducing Tongue Shape Dimensionality from Hundreds of Available Resources Using Autoencoder (MY, DZ, JT), pp. 2875–2880.
ICPR-2018-YanWSLZ #image #learning #network- Image Captioning using Adversarial Networks and Reinforcement Learning (SY, FW, JSS, WL, BZ), pp. 248–253.
ICPR-2018-YlimakiHK #3d #re-engineering #refinement- Accurate 3-D Reconstruction with RGB-D Cameras using Depth Map Fusion and Pose Refinement (MY, JH, JK), pp. 1977–1982.
ICPR-2018-YuanTLDZ #automation #learning #multi #segmentation- Fully Automatic Segmentation of the Left Ventricle Using Multi-Scale Fusion Learning (TY, QT, XL, XD, JZ), pp. 3838–3843.
ICPR-2018-ZhangSOS #identification #network- Person Re-identification Using Two-Stage Convolutional Neural Network (YZ, JS, DO, HTS), pp. 3341–3346.
ICPR-2018-ZhanLL #network #recognition #string- Handwritten Digit String Recognition using Convolutional Neural Network (HZ, SL, YL), pp. 3729–3734.
ICPR-2018-ZhaoLZTNM #analysis #automation #component #image #multi #robust #segmentation- Automatic Multi-Atlas Segmentation for Abdominal Images Using Template Construction and Robust Principal Component Analysis (YZ0, HL0, RZ, GT, MN, BHM), pp. 3880–3885.
ICPR-2018-ZhaoPL0DWQ #learning #locality #semantics #topic- Learning Topics Using Semantic Locality (ZZ, KP, SL, ZL0, CD, YW, QQ), pp. 3710–3715.
ICPR-2018-ZhaoSJ #integer #linear #locality #programming- Temporal Pattern Localization using Mixed Integer Linear Programming (RZ, GS, QJ), pp. 1361–1365.
ICPR-2018-ZhaoYT #network #order #predict- Pen Tip Motion Prediction for Handwriting Drawing Order Recovery using Deep Neural Network (BZ, MY, JT), pp. 704–709.
KDD-2018-DaltayanniDA #automation #segmentation- Automated Audience Segmentation Using Reputation Signals (MD, AD, LdA), pp. 186–195.
KDD-2018-DasSCHLCKC #learning #named #performance- SHIELD: Fast, Practical Defense and Vaccination for Deep Learning using JPEG Compression (ND, MS, STC, FH, SL, LC, MEK, DHC), pp. 196–204.
KDD-2018-GittensRWMGPKRM #data analysis #library #scalability- Accelerating Large-Scale Data Analysis by Offloading to High-Performance Computing Libraries using Alchemist (AG, KR, SW, MWM, LG, P, JK, MFR, KJM), pp. 293–301.
KDD-2018-GohSVH #learning #predict #rule-based- Using Rule-Based Labels for Weak Supervised Learning: A ChemNet for Transferable Chemical Property Prediction (GBG, CS, AV, NOH), pp. 302–310.
KDD-2018-GrbovicC #personalisation #ranking #realtime- Real-time Personalization using Embeddings for Search Ranking at Airbnb (MG, HC), pp. 311–320.
KDD-2018-HarelR #network #prototype- Accelerating Prototype-Based Drug Discovery using Conditional Diversity Networks (SH, KR), pp. 331–339.
KDD-2018-He0LRLTZ #detection- Detecting Vehicle Illegal Parking Events using Sharing Bikes' Trajectories (TH, JB0, RL, SR, YL, CT, YZ0), pp. 340–349.
KDD-2018-HundmanCLCS #detection #parametricity- Detecting Spacecraft Anomalies Using LSTMs and Nonparametric Dynamic Thresholding (KH, VC, CL, IC, TS), pp. 387–395.
KDD-2018-Janakiraman #learning #multi #safety- Explaining Aviation Safety Incidents Using Deep Temporal Multiple Instance Learning (VMJ), pp. 406–415.
KDD-2018-JauvionGSGG #optimisation- Optimization of a SSP's Header Bidding Strategy using Thompson Sampling (GJ, NG, PDS, AG, SG), pp. 425–432.
KDD-2018-KhuranaASV - Resolving Abstract Anaphora Implicitly in Conversational Assistants using a Hierarchically stacked RNN (PK, PA, GMS, LV), pp. 433–442.
KDD-2018-KumarRBVWKEFMZG #machine learning- Using Machine Learning to Assess the Risk of and Prevent Water Main Breaks (AK, SAAR, BB, RAV, KHW, CK, SE, AF, AM, JZ, RG), pp. 472–480.
KDD-2018-LeeRK #classification #graph- Graph Classification using Structural Attention (JBL, RAR, XK), pp. 1666–1674.
KDD-2018-OshriHACDWBLE #assessment #framework #learning #quality- Infrastructure Quality Assessment in Africa using Satellite Imagery and Deep Learning (BO, AH, PA, XC, PD, JW, MB, DBL, SE), pp. 616–625.
KDD-2018-RouxPMVF #approach #detection #machine learning- Tax Fraud Detection for Under-Reporting Declarations Using an Unsupervised Machine Learning Approach (DdR, BP, AM, MDPV, CF), pp. 215–222.
KDD-2018-Ruhrlander0U #modelling #predict- Improving Box Office Result Predictions for Movies Using Consumer-Centric Models (RPR, MB0, MU), pp. 655–664.
KDD-2018-ShashikumarSCN #bidirectional #detection #network- Detection of Paroxysmal Atrial Fibrillation using Attention-based Bidirectional Recurrent Neural Networks (SPS, AJS, GDC, SN), pp. 715–723.
KDD-2018-Ting #bound #empirical #estimation #fault #named- Count-Min: Optimal Estimation and Tight Error Bounds using Empirical Error Distributions (DT), pp. 2319–2328.
KDD-2018-WuCYXXA #clustering #random #scalability- Scalable Spectral Clustering Using Random Binning Features (LW, PYC, IEHY, FX, YX, CCA), pp. 2506–2515.
KDD-2018-WuZW #graph #on the- On Discrimination Discovery and Removal in Ranked Data using Causal Graph (YW, LZ0, XW), pp. 2536–2544.
KDD-2018-XuLDH #learning #metric #robust- New Robust Metric Learning Model Using Maximum Correntropy Criterion (JX0, LL, CD, HH), pp. 2555–2564.
KDD-2018-ZhaoAS0 #classification #dependence #performance #predict- Prediction-time Efficient Classification Using Feature Computational Dependencies (LZ0, AAF, MS, KZ0), pp. 2787–2796.
ECMFA-2018-RutleIKD #automation #co-evolution #graph transformation #modelling #traceability- Automatic Transformation Co-evolution Using Traceability Models and Graph Transformation (AR, LI, HK, ZD), pp. 80–96.
ICMT-2018-Voelter #design #evolution #functional #kernel- The Design, Evolution, and Use of KernelF — An Extensible and Embeddable Functional Language (MV), pp. 3–55.
MoDELS-2018-MarussySV #incremental #modelling- Incremental View Model Synchronization Using Partial Models (KM, OS, DV), pp. 323–333.
MoDELS-2018-PouraliA #challenge #empirical #modelling #tool support- An Empirical Investigation to Understand the Difficulties and Challenges of Software Modellers When Using Modelling Tools (PP, JMA), pp. 224–234.
ECOOP-2018-QunaibitBNVF #dynamic typing #optimisation #platform- Accelerating Dynamically-Typed Languages on Heterogeneous Platforms Using Guards Optimization (MQ, SB, YN, SV, MF), p. 29.
OOPSLA-2018-AlpernasFFRSSW #data flow #information management- Secure serverless computing using dynamic information flow control (KA, CF, SF, LR, MS, TS, KW), p. 26.
OOPSLA-2018-WilliamsMW #contract- The root cause of blame: contracts for intersection and union types (JW, JGM, PW), p. 29.
AdaEurope-2018-JaradatP #contract #design #runtime #safety #verification- Using Safety Contracts to Verify Design Assumptions During Runtime (OJ, SP), pp. 3–18.
LOPSTR-2018-PapapanagiotouF #approach #composition #linear #logic #process #scalability- A Pragmatic, Scalable Approach to Correct-by-Construction Process Composition Using Classical Linear Logic Inference (PP, JDF), pp. 77–93.
PADL-2018-AnandCN #automation #consistency #detection #logic #nondeterminism- An Automated Detection of Inconsistencies in SBVR-based Business Rules Using Many-sorted Logic (KA, PKC, RN), pp. 80–96.
PADL-2018-Crary #code generation #source code- Hygienic Source-Code Generation Using Functors - (Extended Abstract) (KC), pp. 53–60.
PLDI-2018-DuckY #c #c++ #detection #effectiveness #fault #memory management #named- EffectiveSan: type and memory error detection using dynamically typed C/C++ (GJD, RHCY), pp. 181–195.
PLDI-2018-FengMBD #learning #synthesis- Program synthesis using conflict-driven learning (YF, RM, OB, ID), pp. 420–435.
PLDI-2018-HongSKRKPRS #analysis #gpu #kernel #optimisation- GPU code optimization using abstract kernel emulation and sensitivity analysis (CH, ASR, JK, PSR, SK, LNP, FR, PS), pp. 736–751.
PLDI-2018-LeeHAN #modelling #probability #search-based #synthesis- Accelerating search-based program synthesis using learned probabilistic models (WL, KH, RA, MN), pp. 436–449.
PLDI-2018-RaghothamanKHN #reasoning- User-guided program reasoning using Bayesian inference (MR, SK, KH, MN), pp. 722–735.
POPL-2018-Danielsson - Up-to techniques using sized types (NAD), p. 28.
POPL-2018-InalaS #named #spreadsheet #web- WebRelate: integrating web data with spreadsheets using examples (JPI, RS), p. 28.
POPL-2018-WangDS #abstraction #refinement #synthesis- Program synthesis using abstraction refinement (XW0, ID, RS), p. 30.
PPDP-2018-NogatzKS #definite clause grammar #prolog #visualisation- Web-based Visualisation for Definite Clause Grammars Using Prolog Meta-Interpreters: System Description (FN, JK, DS), p. 10.
SAS-2018-RothenbergDH #abstraction #incremental #verification- Incremental Verification Using Trace Abstraction (BCR, DD, MH), pp. 364–382.
SAS-2018-Shoham #decidability #distributed #interactive #logic #protocol #verification- Interactive Verification of Distributed Protocols Using Decidable Logic (SS), pp. 77–85.
ASE-2018-AbdessalemPNBS #feature model #interactive #testing- Testing autonomous cars for feature interaction failures using many-objective search (RBA, AP, SN, LCB, TS), pp. 143–154.
ASE-2018-HabibP #documentation #graph #learning #thread- Is this class thread-safe? inferring documentation using graph-based learning (AH, MP), pp. 41–52.
ASE-2018-PatwardhanSSKG #ambiguity #automation #towards- Towards automating disambiguation of regulations: using the wisdom of crowds (MP, AS, RS, SK, SG), pp. 850–855.
ASE-2018-QuLCJCHZ #2d #fault #named #network #predict- node2defect: using network embedding to improve software defect prediction (YQ, TL0, JC, YJ, DC, AH, QZ), pp. 844–849.
ESEC-FSE-2018-AmarBB0M #difference #finite #modelling- Using finite-state models for log differencing (HA, LB, NB, DL0, SM), pp. 49–59.
ESEC-FSE-2018-DashAB #named- RefiNym: using names to refine types (SKD, MA, ETB), pp. 107–117.
ESEC-FSE-2018-HuaZWK #approach #automation #generative #lazy evaluation #named #program repair #sketching- SketchFix: a tool for automated program repair approach using lazy candidate generation (JH, MZ, KW, SK), pp. 888–891.
ESEC-FSE-2018-HuZY #machine learning #named #reuse #robust #testing #user interface- AppFlow: using machine learning to synthesize robust, reusable UI tests (GH, LZ, JY), pp. 269–282.
ESEC-FSE-2018-KimC0 #fault- Which generated test failures are fault revealing? prioritizing failures based on inferred precondition violations using PAF (MK, SCC, SK0), pp. 679–690.
ESEC-FSE-2018-LeB0 #mining #named #network #specification- DSM: a specification mining tool using recurrent neural network based language model (TDBL, LB, DL0), pp. 896–899.
ESEC-FSE-2018-StoccoYM18a #named #web- Vista: web test repair using computer vision (AS0, RY, AM0), pp. 876–879.
ESEC-FSE-2018-TuZZZ #empirical #issue tracking- Be careful of when: an empirical study on time-related misuse of issue tracking data (FT, JZ, QZ, MZ), pp. 307–318.
- ICSE-2018-AbdessalemNBS #algorithm #testing
- Testing vision-based control systems using learnable evolutionary algorithms (RBA, SN, LCB, TS), pp. 1016–1026.
- ICSE-2018-DamevskiCSKP #behaviour #developer #ide #modelling #predict #topic
- Predicting future developer behavior in the IDE using topic models (KD, HC, DCS, NAK, LLP), p. 932.
- ICSE-2018-HabayebMMB #debugging #markov #on the #predict
- On the use of hidden Markov model to predict the time to fix bugs (MH, SSM, AVM, ABB), p. 700.
- ICSE-2018-KimCK #c #precise #source code #testing
- Precise concolic unit testing of C programs using extended units and symbolic alarm filtering (YK, YC, MK), pp. 315–326.
- ICSE-2018-LangeNTY #behaviour #framework #message passing #verification
- A static verification framework for message passing in Go using behavioural types (JL, NN, BT, NY), pp. 1137–1148.
- ICSE-2018-MechtaevNNGR #implementation #program repair #semantics
- Semantic program repair using a reference implementation (SM, MDN, YN, LG, AR), pp. 129–139.
SLE-2018-MeySHSKFOA #attribute grammar #validation- Continuous model validation using reference attribute grammars (JM, RS, GH, ES, TK0, NF, JÖ, UA), pp. 70–82.
ASPLOS-2018-DickensGFH #encryption #named #performance- StrongBox: Confidentiality, Integrity, and Performance using Stream Ciphers for Full Drive Encryption (BDI, HSG, AJF, HH), pp. 708–721.
CASE-2018-AshouriHNS #approximate #detection #energy #performance- Energy Performance Based Anomaly Detection in Non-Residential Buildings Using Symbolic Aggregate Approximation (AA, YH, GRN, WS0), pp. 1400–1405.
CASE-2018-BarretoC #multi #simulation- Matching the Free-Vibration Response of a Delta Robot with Pick-and-Place Tasks Using Multi-Body Simulation (JPB, BC), pp. 1487–1492.
CASE-2018-CheonKKKC #design #fuzzy #optimisation- Systematic Design Method of Controller using Discrete Fuzzy PI Control and Particle Swarm Optimization (JC, JK, HK, SK, YC), pp. 1581–1586.
CASE-2018-ChuBIICS #learning #multi #online #power management- Plug-and-Play Power Management Control of All-Electric Vehicles Using Multi-Agent System and On-line Gaussian Learning (KCC, GB, MI, AI, CC, KS), pp. 1599–1604.
CASE-2018-DasWSP #adaptation #detection #interactive- Whole Body Human-Robot Collision Detection Using Base-sensor Neuroadaptive Interaction (SKD, IW, MNS, DOP), pp. 278–283.
CASE-2018-DingLWL #automation #testing- 6-DOF Automated Flight Testing Using a Humanoid Robot Arm (CD, LL0, CW0, JL), pp. 217–222.
CASE-2018-FrancoAGABB #approach #deployment #optimisation #probability- Strategic territorial deployment of hospital pharmacy robots using a stochastic p-robust optimization approach (CF, VA, TG, EAL, MB, HB), pp. 390–395.
CASE-2018-GaoXDCSG #detection- Detection of Weld Cracks Using Magneto-optical Imaging (XG, YX, LD, ZC, YS, PPG), pp. 559–564.
CASE-2018-HaghighiRATMC #detection- Depth-based Object Detection using Hierarchical Fragment Matching Method (RH, MR, SMA, KPT, AAM0, CMC), pp. 780–785.
CASE-2018-InuiEMZ #geometry #gpu #process #simulation- Geometric Simulation of Infeed Grinding Process of Silicon Wafer Using GPU (MI, YE, TM, LZ), pp. 1519–1524.
CASE-2018-JulienN #coordination #exponential- Dynamics and Control of Tree-Type Manipulator Systems using Exponential Coordinates (AJ, KN), pp. 136–143.
CASE-2018-KacarMU #problem #reduction- Problem Reduction Approaches for Production Planning Using Clearing Functions (NBK, LM, RU), pp. 931–938.
CASE-2018-KangYJ #analysis #performance #realtime- Real-time Production Performance Analysis Using Machine Degradation Signals: a Two-Machine Case (YK, HY, FJ), pp. 1501–1506.
CASE-2018-KuoC #algorithm #capacity #industrial #scheduling #search-based- Using Auxiliary Capacity Planning Strategy Genetic Algorithm for TFT-LCD photolithography scheduling to empower Industry 3.5 (HAK, CFC0), pp. 920–925.
CASE-2018-LowO #hybrid #implementation #predict #realtime- Real-time Implementation of Nonlinear Model Predictive Control for Mechatronic Systems Using a Hybrid Model (SL, DO), pp. 164–167.
CASE-2018-RibeiroRPS #approach #architecture #design- An Approach for Architectural Design of Automotive Systems using MARTE and SysML (FGCR, AR, CEP, MSS), pp. 1574–1580.
CASE-2018-ShimasakiOJTIY #image #pattern matching #pattern recognition #recognition- HFR-video-based Image Pattern Recognition Using Pixel-level Temporal Frequency Response Matching (KS, TO, MJ, TT, II, KY), pp. 451–456.
CASE-2018-SpenrathP #heuristic #network #random- Using Neural Networks for Heuristic Grasp Planning in Random Bin Picking (FS, AP), pp. 258–263.
CASE-2018-StarkGDBG #integration- Cloud-based integration of robot engineering data using AutomationML (KS, TG, JD, PB, DG), pp. 645–648.
CASE-2018-TerzimehicVW #deployment #design- Using Design Space Exploration to Calculate Deployment Configurations of IEC 61499-based Systems (TT, SV, MW), pp. 881–886.
CASE-2018-ToriiH #3d #approximate #estimation #parametricity- Model-less Estimation Method for Robot Grasping Parameters Using 3D Shape Primitive Approximation (TT, MH), pp. 580–585.
CASE-2018-WijayasingheSPP #adaptation #algorithm #interface #search-based- Adaptive Interface for Robot Teleoperation using a Genetic Algorithm (IBW, MNS, SP, DOP, SC), pp. 50–56.
CASE-2018-XuLS0L #realtime #recognition #self- Real-time Shape Recognition of a Deformable Link by Using Self-Organizing Map (SX, GL, DS, LS0, JL), pp. 586–591.
CASE-2018-ZhangLFL #integer #linear #programming #sequence- Shortest Legal Firing Sequence of Net Condition/Event Systems Using Integer Linear Programming (JZ, HL, GF, ZL), pp. 1556–1561.
CGO-2018-0001LQDL #android #detection #distributed #logic- Resilient decentralized Android application repackaging detection using logic bombs (QZ0, LL, ZQ, XD, ZL), pp. 50–61.
ESOP-2018-Matsuda0 #combinator #lens #named #programming- HOBiT: Programming Lenses Without Using Lens Combinators (KM, MW0), pp. 31–59.
FASE-2018-Dimovski #model checking- Abstract Family-Based Model Checking Using Modal Featured Transition Systems: Preservation of CTL* (ASD), pp. 301–318.
FASE-2018-KatirtzisDS #api #clustering- Summarizing Software API Usage Examples Using Clustering Techniques (NK, TD, CAS), pp. 189–206.
FASE-2018-LandsbergSK #fault #locality #optimisation #source code #specification- Optimising Spectrum Based Fault Localisation for Single Fault Programs Using Specifications (DL, YS, DK), pp. 246–263.
FASE-2018-ParkSR #analysis #framework #web- EventHandler-Based Analysis Framework for Web Apps Using Dynamically Collected States (JP, KS, SR), pp. 129–145.
CAV-2018-KongBH #approximate #set- Reachable Set Over-Approximation for Nonlinear Systems Using Piecewise Barrier Tubes (HK, EB, TAH), pp. 449–467.
CAV-2018-BouajjaniEMT #abstraction #reasoning #reduction #source code- Reasoning About TSO Programs Using Reduction and Abstraction (AB, CE, SOM, ST), pp. 336–353.
CAV-2018-NiemetzPRBT #quantifier- Solving Quantified Bit-Vectors Using Invertibility Conditions (AN, MP, AR, CWB, CT), pp. 236–255.
ICST-2018-MahajanAMH #automation #clustering #search-based #similarity #web- Automated Repair of Internationalization Presentation Failures in Web Pages Using Style Similarity Clustering and Search-Based Techniques (SM, AA, PM, WGJH), pp. 215–226.
ICST-2018-PradhanW00L #mining #multi #named #testing- REMAP: Using Rule Mining and Multi-objective Search for Dynamic Test Case Prioritization (DP, SW0, SA0, TY0, ML), pp. 46–57.
ICST-2018-Rajaram #fault #taxonomy #testing- Taxonomy Based Testing Using SW91, a Medical Device Software Defect Taxonomy (HKR), pp. 422–423.
IJCAR-2018-KazakovS - Enumerating Justifications Using Resolution (YK, PS), pp. 609–626.
IJCAR-2018-ZeljicBWR #approximate #float- Exploring Approximations for Floating-Point Arithmetic Using UppSAT (AZ, PB, CMW, PR), pp. 246–262.
TAP-2018-HerdaTB #data flow #dependence #graph #testing #verification- Using Dependence Graphs to Assist Verification and Testing of Information-Flow Properties (MH, SST, BB), pp. 83–102.
TAP-2018-VorobyovKS #c #case study #detection #experience #runtime #security #verification- Detection of Security Vulnerabilities in C Code Using Runtime Verification: An Experience Report (KV, NK, JS), pp. 139–156.
VMCAI-2018-KranzS #analysis #bytecode #composition #on-demand- Modular Analysis of Executables Using On-Demand Heyting Completion (JK, AS), pp. 291–312.
ECSA-2017-FilhoRAB #architecture #consistency #design #exception- Preventing Erosion in Exception Handling Design Using Static-Architecture Conformance Checking (JLMF, LSR, RMCA, RB), pp. 67–83.
ICSA-2017-GesvindrBG #as a service #design #evaluation #prototype #quality- Quality Evaluation of PaaS Cloud Application Design Using Generated Prototypes (DG, BB, OG), pp. 31–40.
ICSA-2017-Yasaweerasinghelage #architecture #latency #modelling #predict #simulation- Predicting Latency of Blockchain-Based Systems Using Architectural Modelling and Simulation (RY, MS, IW), pp. 253–256.
JCDL-2017-AlamKWN #re-engineering- Client-Side Reconstruction of Composite Mementos Using ServiceWorker (SA, MK, MCW, MLN), pp. 237–240.
JCDL-2017-CastroCWPF #framework #platform #semistructured data- Classifying Short Unstructured Data Using the Apache Spark Platform (EPSC, SC, EW, DAP, EAF), pp. 129–138.
JCDL-2017-ChironDCVM #fault #library #towards- Impact of OCR Errors on the Use of Digital Libraries: Towards a Better Access to Information (GC, AD, MC, MV, JPM), pp. 249–252.
JCDL-2017-GippBMB #feedback #named #overview- CryptSubmit: Introducing Securely Timestamped Manuscript Submission and Peer Review Feedback Using the Blockchain (BG, CB, NM, JB), pp. 273–276.
JCDL-2017-HassanAH #identification #information management- Identifying Important Citations Using Contextual Information from Full Text (SUH, AA, PH), pp. 41–48.
JCDL-2017-KleinS - Discovering Scholarly Orphans Using ORCID (MK, HVdS), pp. 189–198.
JCDL-2017-KocherS #clustering- Author Clustering Using SPATIUM (MK, JS), pp. 265–268.
JCDL-2017-YangHHOZKG #identification #learning #library- Smart Library: Identifying Books on Library Shelves Using Supervised Deep Learning for Scene Text Reading (XY, DH, WH, AO, ZZ, DK, CLG), pp. 245–248.
CSEET-2017-IacobF #education #requirements- Using Extreme Characters to Teach Requirements Engineering (CI, SF), pp. 107–111.
CSEET-2017-PintoFSG #open source #perspective- Training Software Engineers Using Open-Source Software: The Professors' Perspective (GHLP, FFF, IS, MAG), pp. 117–121.
CSEET-2017-PortelaVOS #case study #experience #industrial #re-engineering- The Use of Industry Training Strategies in a Software Engineering Course: An Experience Report (CSP, AV, SRBO, MRdAS), pp. 29–36.
EDM-2017-AndresBSGSC #framework #replication #scalability- Studying MOOC Completion at Scale Using the MOOC Replication Framework (JMLA, RSB, GS, DG, CAS, SAC).
EDM-2017-GrawemeyerWSHMP #graph #learning #modelling #student- Using Graph-based Modelling to explore changes in students' affective states during exploratory learning tasks (BG, AW, SGS, WH, MM, AP).
EDM-2017-HongB #learning #predict- A Prediction and Early Alert Model Using Learning Management System Data and Grounded in Learning Science Theory (WJH, MLB).
EDM-2017-LiuL #student- Exploring the Relationship Between Student Pre-knowledge and Engagement in MOOC Class Using Polytomous IRT (JL, HL).
EDM-2017-MadaioLCO #mining #predict- Using Temporal Association Rule Mining to Predict Dyadic Rapport in Peer Tutoring (MAM, RL, JC, AO).
EDM-2017-McBride #simulation #student- Student Use of Inquiry Simulations in Middle School Science (EM).
EDM-2017-McBrideVL #simulation #student- Student Use of Scaffolded Inquiry Simulations in Middle School Science (EM, JMV, MCL).
EDM-2017-MichalenkoLB #feedback #memory management #network #personalisation- Personalized Feedback for Open-Response Mathematical Questions using Long Short-Term Memory Networks (JJM, ASL, RGB).
EDM-2017-MiF #adaptation #recommendation- Adaptive Sequential Recommendation for Discussion Forums on MOOCs using Context Trees (FM, BF).
EDM-2017-ParedesHH #behaviour #comprehension #programming #student- Understanding Student's Reviewing and Reflection Behaviors Using Web-based Programming Grading Assistant (YVMP, PKH, SIHH).
EDM-2017-PatikornSHBZ #detection #multi- Using a Single Model Trained across Multiple Experiments to Improve the Detection of Treatment Effects (TP, DS, NTH, JB, JZ).
EDM-2017-PokrajacSYH #markov #modelling- Modeling Dormitory Occupancy Using Markov Chains (DDP, KS, DY, TH).
EDM-2017-RihakP #education #performance #similarity- Measuring Similarity of Educational Items Using Data on Learners' Performance (JR, RP).
EDM-2017-ShenC #clustering #student- Clustering Student Sequential Trajectories Using Dynamic Time Wrapping (SS, MC).
EDM-2017-ShiPG #analysis #learning #performance- Using an Additive Factor Model and Performance Factor Analysis to Assess Learning Gains in a Tutoring System to Help Adults with Reading Difficulties (GS, PIPJ, ACG).
EDM-2017-WanDGP #predict- Dropout Prediction in MOOCs using Learners' Study Habits Features (HW, JD, XG, DP).
EDM-2017-WangSLP #learning #programming #student- Learning to Represent Student Knowledge on Programming Exercises Using Deep Learning (LW, AS, LL, CP).
EDM-2017-YasudaNKKH #automation #network- Automatic Scoring Method for Descriptive Test Using Recurrent Neural Network (KY, IN, HK, HK, MH).
ICPC-2017-AlexandruPG #behaviour #parsing- Replicating parser behavior using neural machine translation (CVA, SP, HCG), pp. 316–319.
ICPC-2017-HatanoM #compilation #industrial- Removing code clones from industrial systems using compiler directives (TH, AM), pp. 336–345.
ICSME-2017-ChaparroFM #behaviour #debugging #locality #query- Using Observed Behavior to Reformulate Queries during Text Retrieval-based Bug Localization (OC, JMF, AM), pp. 376–387.
ICSME-2017-DeshmukhMPSD #debugging #learning #retrieval #towards- Towards Accurate Duplicate Bug Retrieval Using Deep Learning Techniques (JD, KMA, SP, SS, ND), pp. 115–124.
ICSME-2017-Gupta #maintenance #mining #predict #process- Improving Software Maintenance Using Process Mining and Predictive Analytics (MG0), pp. 681–686.
ICSME-2017-HanLXLF #learning #predict- Learning to Predict Severity of Software Vulnerability Using Only Vulnerability Description (ZH, XL0, ZX, HL, ZF0), pp. 125–136.
ICSME-2017-TerdchanakulHPM #classification #debugging #n-gram- Bug or Not? Bug Report Classification Using N-Gram IDF (PT, HH, PP, KM), pp. 534–538.
MSR-2017-CartaxoPRKSSS - Using Q&A websites as a method for assessing systematic reviews (BC, GP0, DMR, FK, RESS, FQBdS, SS), pp. 238–242.
MSR-2017-NiL #classification #effectiveness #predict- Cost-effective build outcome prediction using cascaded classifiers (AN, ML0), pp. 455–458.
MSR-2017-RahmanRK #code review #developer #experience #overview #predict- Predicting usefulness of code review comments using textual features and developer experience (MMR0, CKR, RGK), pp. 215–226.
MSR-2017-RajbahadurWKH #classification #fault #modelling- The impact of using regression models to build defect classifiers (GKR, SW0, YK, AEH), pp. 135–145.
SANER-2017-DurieuxCSM #exception #generative #metaprogramming #null #pointer- Dynamic patch generation for null pointer exceptions using metaprogramming (TD, BC, LS, MM), pp. 349–358.
SANER-2017-LaverdiereM #modelling #security- Computing counter-examples for privilege protection losses using security models (MAL, EM), pp. 240–249.
SANER-2017-LiuLNB #fault #locality #modelling #predict #search-based #testing- Improving fault localization for Simulink models using search-based testing and prediction models (BL, L, SN, LCB), pp. 359–370.
SANER-2017-TangL #approach #mining #named #novel #probability- StiCProb: A novel feature mining approach using conditional probability (YT, HL), pp. 45–55.
SCAM-2017-0008SMOBL #analysis #consistency #identifier- Investigating the Use of Code Analysis and NLP to Promote a Consistent Usage of Identifiers (BL0, SS, AM, RO, GB, ML), pp. 81–90.
- IFM-2017-AronisFS #model checking #testing #verification
- Testing and Verifying Chain Repair Methods for Corfu Using Stateless Model Checking (SA, SLF, KS), pp. 227–242.
- IFM-2017-FerreiraJMB #authentication #case study #coq #linux #quality
- Certified Password Quality - A Case Study Using Coq and Linux Pluggable Authentication Modules (JFF, SAJ, AM, PJB), pp. 407–421.
- IFM-2017-KovalovLGL #network #smt
- Task-Node Mapping in an Arbitrary Computer Network Using SMT Solver (AK, EL, AG, DL), pp. 177–191.
SEFM-2017-TomascoN0TP #abstraction #design #memory management #modelling- Using Shared Memory Abstractions to Design Eager Sequentializations for Weak Memory Models (ET, TLN, BF0, SLT, GP), pp. 185–202.
Haskell-2017-WiegleyD #coq #haskell #performance- Using Coq to write fast and correct Haskell (JW, BD), pp. 52–62.
- ICFP-2017-AuerbachHMSS #case study #compilation #coq #experience #prototype #query
- Prototyping a query compiler using Coq (experience report) (JSA, MH, LM, AS, JS), p. 15.
AIIDE-2017-BunianCCE #behaviour #difference #game studies #modelling- Modeling Individual Differences in Game Behavior Using HMM (SB, AC, RCC, MSEN), pp. 158–164.
AIIDE-2017-FarrellW #interactive- Influencing User Choices in Interactive Narratives Using Indexter's Pairwise Event Salience Hypothesis (RF, SGW), pp. 37–42.
AIIDE-2017-FarrellW17a #semantics- Causal Link Semantics for Narrative Planning Using Numeric Fluents (RF, SGW), pp. 193–199.
AIIDE-2017-ViljanenAHP - A/B-Test of Retention and Monetization Using the Cox Model (MV, AA, JH, TP), pp. 248–254.
CHI-PLAY-2017-BoweyM #game studies #prototype- Those are not the Stories you are Looking For: Using Text Prototypes to Evaluate Game Narratives Early (JTB, RLM), pp. 265–276.
CHI-PLAY-2017-Peddycord-LiuCK #game studies #question #student #what- Using Serious Game Analytics to Inform Digital Curricular Sequencing: What Math Objective Should Students Play Next? (ZPL, CC, SK, TB, CFL, TR), pp. 195–204.
CIG-2017-ApeldoornV #game studies #knowledge base- Measuring strategic depth in games using hierarchical knowledge bases (DA, VV), pp. 9–16.
CIG-2017-BaldwinDFH #design pattern #game studies #generative- Mixed-initiative procedural generation of dungeons using game design patterns (AB0, SD, JMF, JH), pp. 25–32.
CIG-2017-BrownA #game studies #multi- Using multiple worlds for multiple agent roles in games (JAB, DA), pp. 37–44.
CIG-2017-BurnsT #detection #game studies- Detecting flow in games using facial expressions (AB, JRT), pp. 45–52.
CIG-2017-JiangHT #generative- Procedural generation of angry birds fun levels using pattern-struct and preset-model (YJ0, TH, RT), pp. 154–161.
CIG-2017-JustesenR #learning- Learning macromanagement in starcraft from replays using deep learning (NJ, SR), pp. 162–169.
CIG-2017-MinK #game studies #learning #visual notation- Learning to play visual doom using model-free episodic control (BJM, KJK), pp. 223–225.
CIG-2017-OonishiI #game studies #learning- Improving generalization ability in a puzzle game using reinforcement learning (HO, HI), pp. 232–239.
CIG-2017-PhucNK #behaviour #learning #statistics- Learning human-like behaviors using neuroevolution with statistical penalties (LHP, KN, KI), pp. 207–214.
CIG-2017-SilvaVT #game studies #monte carlo- Using Monte Carlo tree search and google maps to improve game balancing in location-based games (LFMS, WV, FT), pp. 215–222.
CIG-2017-SnodgrassO #generative #multi- Procedural level generation using multi-layer level representations with MdMCs (SS, SO), pp. 280–287.
FDG-2017-Abuzuraiq #clustering #constraints #generative #graph #morphism #on the- On using graph partitioning with isomorphism constraint in procedural content generation (AMA), p. 10.
FDG-2017-AllartLPGN #analysis #game studies #motivation #video- Difficulty influence on motivation over time in video games using survival analysis (TA, GL, MP, AG, SN), p. 6.
FDG-2017-CampbellV - Exploration in NetHack using occupancy maps (JC, CV), p. 4.
FDG-2017-CleghernLOR #modelling #predict- Predicting future states in DotA 2 using value-split models of time series attribute data (ZC, SL, OYÖ, DLR), p. 10.
FDG-2017-Mawhorter #case study #generative #performance #product line #representation- Efficiency, realism, and representation in generated content: a case study using family tree generation (PAM), p. 4.
FDG-2017-MelcerI17a #challenge #collaboration #education #game studies #programming- Embodiment, collaboration, and challenge in educational programming games: exploring use of tangibles and mouse (EFM, KI), p. 6.
FDG-2017-MurrayMW #graph #interactive- Proposal for analyzing player emotions in an interactive narrative using story intention graphs (JTM, MM, NWF), p. 4.
FDG-2017-SeguraIBW #design- Design, appropriation, and use of technology in larps (EMS, KI, JB, AW), p. 4.
VS-Games-2017-FerkovaZUM #database #image #re-engineering- Single image reconstruction of human faces using database of depth images (ZF, MZ, PU, PM), pp. 109–116.
VS-Games-2017-KontadakisCPM #3d #low cost- Gamified 3D orthopaedic rehabilitation using low cost and portable inertial sensors (GK, DC, DP, KM), pp. 165–168.
CIKM-2017-BouadjenekVZ #biology #learning #sequence- Learning Biological Sequence Types Using the Literature (MRB, KV, JZ), pp. 1991–1994.
CIKM-2017-BrayteeLCK #correlation #feature model #multi- Multi-Label Feature Selection using Correlation Information (AB, WL0, DRC, PJK), pp. 1649–1656.
CIKM-2017-ChavaryEL #mining #network- Summarizing Significant Changes in Network Traffic Using Contrast Pattern Mining (EAC, SME, CL), pp. 2015–2018.
CIKM-2017-DasMBS #word- Estimating Event Focus Time Using Neural Word Embeddings (SD, AM, KB, VS), pp. 2039–2042.
CIKM-2017-DhakadDBDKM #named #process- SOPER: Discovering the Influence of Fashion and the Many Faces of User from Session Logs using Stick Breaking Process (LD, MKD, CB, SD, MK, VM), pp. 1609–1618.
CIKM-2017-DingLHM #fault tolerance #performance #recommendation- Efficient Fault-Tolerant Group Recommendation Using alpha-beta-core (DD, HL, ZH0, NM), pp. 2047–2050.
CIKM-2017-GarciaM #energy #network- Inferring Appliance Energy Usage from Smart Meters using Fully Convolutional Encoder Decoder Networks (FCCG, EQBM), pp. 2075–2078.
CIKM-2017-GaurBB #graph #query- Tracking the Impact of Fact Deletions on Knowledge Graph Queries using Provenance Polynomials (GG, SJB, AB0), pp. 2079–2082.
CIKM-2017-GuptaLHA #induction #sequence #taxonomy- Taxonomy Induction Using Hypernym Subsequences (AG, RL, HH, KA), pp. 1329–1338.
CIKM-2017-HalderKS #concurrent #health #recommendation #thread #topic- Health Forum Thread Recommendation Using an Interest Aware Topic Model (KH, MYK, KS), pp. 1589–1598.
CIKM-2017-KhandpurJJ0LR #crowdsourcing #detection #social #social media- Crowdsourcing Cybersecurity: Cyber Attack Detection using Social Media (RPK, TJ, STKJ, GW0, CTL, NR), pp. 1049–1057.
CIKM-2017-KhoaAW #analysis #framework #incremental #maintenance- Smart Infrastructure Maintenance Using Incremental Tensor Analysis: Extended Abstract (NLDK, AA, YW), pp. 959–967.
CIKM-2017-KimJY #multi #online- Construction of a National Scale ENF Map using Online Multimedia Data (HK, YBJ, JWY), pp. 19–28.
CIKM-2017-KwonKS #recognition #robust- A Robust Named-Entity Recognition System Using Syllable Bigram Embedding with Eojeol Prefix Information (SK, YK, JS), pp. 2139–2142.
CIKM-2017-MehrotraY #learning #query- Task Embeddings: Learning Query Embeddings using Task Context (RM, EY), pp. 2199–2202.
CIKM-2017-Ni0ZYM #fine-grained #learning #metric #similarity- Fine-grained Patient Similarity Measuring using Deep Metric Learning (JN, JL0, CZ, DY, ZM), pp. 1189–1198.
CIKM-2017-ParmarBBK #online #process- Forecasting Ad-Impressions on Online Retail Websites using Non-homogeneous Hawkes Processes (KP, SB, SB, SK), pp. 1089–1098.
CIKM-2017-ProskurniaM0AC #detection #documentation #performance #topic- Efficient Document Filtering Using Vector Space Topic Expansion and Pattern-Mining: The Case of Event Detection in Microposts (JP, RM, CC0, KA, PCM), pp. 457–466.
CIKM-2017-TengLW #detection #learning #multi #network- Anomaly Detection in Dynamic Networks using Multi-view Time-Series Hypersphere Learning (XT, YRL, XW), pp. 827–836.
CIKM-2017-VellosoD #approach #web- Extracting Records from the Web Using a Signal Processing Approach (RPV, CFD), pp. 197–206.
CIKM-2017-WangCL #graph #twitter- Using Knowledge Graphs to Explain Entity Co-occurrence in Twitter (YW, MJC, YFL), pp. 2351–2354.
CIKM-2017-YeHHCLQS #classification- Nationality Classification Using Name Embeddings (JY, SH, YH, BC, ML, HQ, SS), pp. 1897–1906.
CIKM-2017-ZhangH #ambiguity #graph #network- Name Disambiguation in Anonymized Graphs using Network Embedding (BZ, MAH), pp. 1239–1248.
CIKM-2017-ZhangJT #retrieval- Temporal Analog Retrieval using Transformation over Dual Hierarchical Structures (YZ, AJ, KT), pp. 717–726.
CIKM-2017-ZhiSLZ0 #database #named #realtime #verification #web- ClaimVerif: A Real-time Claim Verification System Using the Web and Fact Databases (SZ, YS, JL, CZ0, JH0), pp. 2555–2558.
ECIR-2017-AletrasM #image #network #topic- Labeling Topics with Images Using a Neural Network (NA, AM), pp. 500–505.
ECIR-2017-ArguelloA0 #performance #predict #query- Using Query Performance Predictors to Reduce Spoken Queries (JA, SA, FD0), pp. 27–39.
ECIR-2017-AyadiKHDJ #image #learning- Learning to Re-rank Medical Images Using a Bayesian Network-Based Thesaurus (HA, MTK, JXH, MD, MBJ), pp. 160–172.
ECIR-2017-BaruaP #classification #query- Named Entity Classification Using Search Engine's Query Suggestions (JB, DP), pp. 612–618.
ECIR-2017-J0V #twitter- Improving Tweet Representations Using Temporal and User Context (GJ, MG0, VV), pp. 575–581.
ECIR-2017-McDonaldMO #classification #semantics #word- Enhancing Sensitivity Classification with Semantic Features Using Word Embeddings (GM, CM, IO), pp. 450–463.
ECIR-2017-ParamitaCG #similarity #wiki- Using Section Headings to Compute Cross-Lingual Similarity of Wikipedia Articles (MLP, PDC, RJG), pp. 633–639.
ICML-2017-BernsteinMSSHM #learning #modelling #visual notation- Differentially Private Learning of Undirected Graphical Models Using Collective Graphical Models (GB, RM, TS, DS, MH, GM), pp. 478–487.
ICML-2017-BoraJPD #generative #modelling- Compressed Sensing using Generative Models (AB, AJ, EP, AGD), pp. 537–546.
ICML-2017-ChenKB #equation #identification #linear #modelling #testing- Identification and Model Testing in Linear Structural Equation Models using Auxiliary Variables (BC, DK, EB), pp. 757–766.
ICML-2017-ChouMS #learning #policy #probability- Improving Stochastic Policy Gradients in Continuous Control with Deep Reinforcement Learning using the Beta Distribution (PWC, DM, SAS), pp. 834–843.
ICML-2017-EcksteinGK #generative- Rule-Enhanced Penalized Regression by Column Generation using Rectangular Maximum Agreement (JE, NG, AK), pp. 1059–1067.
ICML-2017-JaderbergCOVGSK #interface- Decoupled Neural Interfaces using Synthetic Gradients (MJ, WMC, SO, OV, AG, DS, KK), pp. 1627–1635.
ICML-2017-Kallus #clustering #personalisation #recursion- Recursive Partitioning for Personalization using Observational Data (NK), pp. 1789–1798.
ICML-2017-MhammediHRB #network #orthogonal #performance- Efficient Orthogonal Parametrisation of Recurrent Neural Networks Using Householder Reflections (ZM, ADH, AR, JB0), pp. 2401–2409.
ICML-2017-MollaysaSK #modelling- Regularising Non-linear Models Using Feature Side-information (AM, PS, AK), pp. 2508–2517.
ICML-2017-NguyenLST #machine learning #named #novel #probability #problem #recursion- SARAH: A Novel Method for Machine Learning Problems Using Stochastic Recursive Gradient (LMN, JL, KS, MT), pp. 2613–2621.
ICML-2017-SchlegelPCW #adaptation #kernel #online- Adapting Kernel Representations Online Using Submodular Maximization (MS, YP, JC, MW), pp. 3037–3046.
ICML-2017-Villacampa-Calvo #classification #multi #process #scalability- Scalable Multi-Class Gaussian Process Classification using Expectation Propagation (CVC, DHL), pp. 3550–3559.
ICML-2017-YangHSB #modelling- Improved Variational Autoencoders for Text Modeling using Dilated Convolutions (ZY, ZH, RS, TBK), pp. 3881–3890.
KDD-2017-AgarwalBSJ #effectiveness #evaluation #feedback #multi- Effective Evaluation Using Logged Bandit Feedback from Multiple Loggers (AA, SB0, TS, TJ), pp. 687–696.
KDD-2017-AlbertKG #identification #network #scalability- Using Convolutional Networks and Satellite Imagery to Identify Patterns in Urban Environments at a Large Scale (AA, JK, MCG), pp. 1357–1366.
KDD-2017-ChamberlainCLPD #predict- Customer Lifetime Value Prediction Using Embeddings (BPC, ÂC, CHBL, RP, MPD), pp. 1753–1762.
KDD-2017-EmraniMX #learning #multi- Prognosis and Diagnosis of Parkinson's Disease Using Multi-Task Learning (SE, AM, WX), pp. 1457–1466.
KDD-2017-FoxAJPW - Contextual Motifs: Increasing the Utility of Motifs using Contextual Data (IF, LA, MJ, RPB, JW), pp. 155–164.
KDD-2017-LiHG #concept #enterprise #spreadsheet- Discovering Enterprise Concepts Using Spreadsheet Tables (KL, YH, KG), pp. 1873–1882.
KDD-2017-MaurusP #detection- Let's See Your Digits: Anomalous-State Detection using Benford's Law (SM, CP), pp. 977–986.
KDD-2017-MottiniA #network #pointer #predict- Deep Choice Model Using Pointer Networks for Airline Itinerary Prediction (AM, RAA), pp. 1575–1583.
KDD-2017-WoodsAMM #feedback #modelling #predict- Formative Essay Feedback Using Predictive Scoring Models (BW, DA, SM, EM), pp. 2071–2080.
ICMT-2017-BurguenoHVG #modelling #testing- Testing Transformation Models Using Classifying Terms (LB, FH, AV, MG), pp. 69–85.
ICMT-2017-GerkingSB #imperative- Reducing the Verbosity of Imperative Model Refinements by Using General-Purpose Language Facilities (CG, DS, IB), pp. 19–34.
OOPSLA-2017-MazinanianKTD #comprehension #java- Understanding the use of lambda expressions in Java (DM, AK, NT, DD), p. 31.
OOPSLA-2017-WangDS #automaton #finite #synthesis- Synthesis of data completion scripts using finite tree automata (XW0, ID, RS), p. 26.
AdaEurope-2017-JeongYB #transaction- Lock Elision for Protected Objects Using Intel Transactional Synchronization Extensions (SJ, SY, BB), pp. 121–136.
PADL-2017-MantadelisR #logic #probability- Using Iterative Deepening for Probabilistic Logic Inference (TM, RR0), pp. 198–213.
PEPM-2017-HengleinR #dynamic analysis #parsing expression grammar- PEG parsing in less space using progressive tabling and dynamic analysis (FH, UTR), pp. 35–46.
PEPM-2017-WolffH #typescript- Refining types using type guards in TypeScript (IGdW, JH), pp. 111–122.
PLDI-2017-HuD #automation #transducer- Automatic program inversion using symbolic transducers (QH, LD), pp. 376–389.
PLDI-2017-PetrashkoLO #compilation #composition #named #performance #program transformation- Miniphases: compilation using modular and efficient tree transformations (DP, OL, MO), pp. 201–216.
POPL-2017-SrikanthSH #complexity #theorem #verification- Complexity verification using guided theorem enumeration (AS, BS, WRH), pp. 639–652.
QAPL-2017-LidmanS #fuzzy #logic #program analysis- Bridging Static and Dynamic Program Analysis using Fuzzy Logic (JL, JS), pp. 111–126.
SAS-2017-OuadjaoutM #communication #markov #protocol #static analysis- Quantitative Static Analysis of Communication Protocols Using Abstract Markov Chains (AO, AM), pp. 277–298.
ASE-2017-Abdelrasoul #order #random #scheduling- Promoting secondary orders of event pairs in randomized scheduling using a randomized stride (MA), pp. 741–752.
ASE-2017-JiangAM #automation #commit #generative- Automatically generating commit messages from diffs using neural machine translation (SJ, AA, CM), pp. 135–146.
ASE-2017-KrugerNRAMBGGWD #developer #encryption #named- CogniCrypt: supporting developers in using cryptography (SK, SN, MR, KA0, MM, EB, FG, FG0, CW, DD, RK), pp. 931–936.
ASE-2017-LinZZX #concept #retrieval #source code- Improving software text retrieval using conceptual knowledge in source code (ZL, YZ, JZ, BX), pp. 123–134.
ASE-2017-NguyenDV #invariant #named- SymInfer: inferring program invariants using symbolic states (TN, MBD, WV), pp. 804–814.
ASE-2017-RahmanR #concept #documentation #query- Improved query reformulation for concept location using CodeRank and document structures (MMR, CKR), pp. 428–439.
ASE-2017-Sultana #metric #predict #towards- Towards a software vulnerability prediction model using traceable code patterns and software metrics (KZS), pp. 1022–1025.
ASE-2017-SunCWB - Improving missing issue-commit link recovery using positive and unlabeled data (YS, CC, QW0, BWB), pp. 147–152.
ESEC-FSE-2017-Abdalkareem #developer #perspective- Reasons and drawbacks of using trivial npm packages: the developers' perspective (RA), pp. 1062–1064.
ESEC-FSE-2017-LabuschagneIH #case study #cost analysis #integration #java #testing- Measuring the cost of regression testing in practice: a study of Java projects using continuous integration (AL, LI, RH), pp. 821–830.
ESEC-FSE-2017-MaggioPFH #automation #multi- Automated control of multiple software goals using multiple actuators (MM, AVP, AF, HH), pp. 373–384.
ESEC-FSE-2017-NairMSA - Using bad learners to find good configurations (VN, TM, NS, SA), pp. 257–267.
ESEC-FSE-2017-Oliveira #architecture #co-evolution #dependence #fine-grained #named #refactoring- DRACO: discovering refactorings that improve architecture using fine-grained co-change dependencies (MCdO0), pp. 1018–1021.
ESEC-FSE-2017-Schramm #automation #heuristic #performance #program repair- Improving performance of automatic program repair using learned heuristics (LS), pp. 1071–1073.
ESEC-FSE-2017-Wang #adaptation #nondeterminism #re-engineering #search-based #self- Using search-based software engineering to handle the changes with uncertainties for self-adaptive systems (LW), pp. 1014–1017.
ESEC-FSE-2017-YiAKTR #automation #program repair #programming- A feasibility study of using automated program repair for introductory programming assignments (JY, UZA, AK, SHT, AR), pp. 740–751.
- ICSE-2017-0004CC #learning #semantics #traceability
- Semantically enhanced software traceability using deep learning techniques (JG0, JC, JCH), pp. 3–14.
GPCE-2017-GrebeYG #compilation #domain-specific language #haskell- Rewriting a shallow DSL using a GHC compiler extension (MG, DY, AG), pp. 246–258.
SLE-2017-BrambillaCIM #crowdsourcing #domain-specific language- Better call the crowd: using crowdsourcing to shape the notation of domain-specific languages (MB, JC, JLCI, AM), pp. 129–138.
ASPLOS-2017-GeCJ #control flow #named- GRIFFIN: Guarding Control Flows Using Intel Processor Trace (XG, WC, TJ), pp. 585–598.
ASPLOS-2017-RenLDQWLQY #named #network #probability- SC-DCNN: Highly-Scalable Deep Convolutional Neural Network using Stochastic Computing (AR, ZL0, CD, QQ, YW, JL0, XQ, BY0), pp. 405–418.
CASE-2017-0013YG #graph #image #optimisation- Accurate image mosaicing for bridge deck using graph optimization with GPS data (FL0, JY, NG), pp. 1090–1095.
CASE-2017-CarliD #distributed #grid #monitoring #multi #smarttech- Using the distributed proximal alternating direction method of multipliers for smart grid monitoring (RC, MD), pp. 418–423.
CASE-2017-CarliD17a #distributed #energy #programming #scalability- A decentralized control strategy for energy retrofit planning of large-scale street lighting systems using dynamic programming (RC, MD), pp. 1196–1200.
CASE-2017-ChenZ #automation #detection #multi- An automatic seizure detection method using multi-channel EEG signals (SC, XZ0), pp. 94–95.
CASE-2017-DuHZL #automation #petri net #robust- Robust control of automated manufacturing systems with complex structures using Petri Nets (ND, HH, YZ0, YL0), pp. 364–369.
CASE-2017-HuangMY #algorithm #difference #evolution #performance #throughput- Forecasting of throughput performance using an ARMA model with improved differential evolution algorithm (JTH, YM, YY), pp. 376–381.
CASE-2017-InuiKU #gpu #parallel #performance- Fast extraction of cutter engagement features by using the parallel processing function of a GPU (MI, MK, NU), pp. 668–673.
CASE-2017-KeL #mobile #predict #robust #visual notation- Visual servoing of constrained differential-drive mobile robots using robust tube-based predictive control (FK, ZL0), pp. 1073–1078.
CASE-2017-KongN #approach #fault #predict- A practical yield prediction approach using inline defect metrology data for system-on-chip integrated circuits (YK, DN), pp. 744–749.
CASE-2017-LeeJFBGBL #analysis #modelling #process #simulation- Modeling and analysis of postoperative intervention process for total joint replacement patients using simulations (HKL, RJ, YF, PAB, JG, CB, JL), pp. 568–573.
CASE-2017-LiangMLLG #automation #industrial #learning- Using dVRK teleoperation to facilitate deep learning of automation tasks for an industrial robot (JL, JM, ML, PL, KG), pp. 1–8.
CASE-2017-LiLHTCLW #analysis- The mechanism analysis of bipolar vessel sealing in vitro using EDM model (LL, LL, ZH, MT, RC, HL, JW), pp. 813–818.
CASE-2017-OhKKSC - Calibration of 6 axis force/torque sensor by using deep-learning method (HSO, GK, UK, JKS, HRC), pp. 1316–1317.
CASE-2017-QinLG #data analysis #energy #internet- Data analytics for energy consumption of digital manufacturing systems using Internet of Things method (JQ, YL, RIG), pp. 482–487.
CASE-2017-SugimotoMMM #3d #modelling- A 3D block printer using toy bricks for various models (CS, YM, TM, SM), pp. 958–963.
CASE-2017-SunLYLL #simulation #smarttech- Muscle control of fore-aft and vertical body center of mass accelerations of human slip recovery gait: A simulation study using wearable sensor shoes (WS, GL, JY, QL, TL0), pp. 1408–1413.
CASE-2017-SunLZJ #framework #functional #learning- Exploring functional variant using a deep learning framework (TS, ZL, XMZ, RJ), pp. 98–99.
CASE-2017-ToneS - A ferrofluid-based robotic sheet for liquid manipulation by using vibration control (TT, KS), pp. 776–781.
CASE-2017-WangOLC #big data #problem #self- Capacitated competitive facility location problem of self-collection lockers by using public big data (YW0, TO, LHL, EPC), p. 1344.
CASE-2017-WangW #approach #constraints #higher-order #programming- Resolve reactive robot control with perturbed constraints using a second order cone programming approach (YW, LW), pp. 124–129.
CASE-2017-WangZLHSMGY #online- Smart control of indoor thermal environment based on online learned thermal comfort model using infrared thermal imaging (FW, BZ, RL, DH, ZS, SM, ZG, WY), pp. 924–925.
CASE-2017-Xiao #constraints- Selecting the best system using transient means with sequential sampling constraints (HX), p. 1052.
CASE-2017-ZhangJ17a #estimation- An occupancy distribution estimation method using the surveillance cameras in buildings (CZ, QSJ), pp. 894–899.
CC-2017-ShirakoHS #gpu #parallel- Optimized two-level parallelization for GPU accelerators using the polyhedral model (JS, AH, VS), pp. 22–33.
CGO-2017-SenguptaCBK #bound #hardware #memory management #named #transaction- Legato: end-to-end bounded region serializability using commodity hardware transactional memory (AS, MC, MDB, MK0), pp. 1–13.
ESOP-2017-0001P #source code #syntax- Programs Using Syntax with First-Class Binders (FF0, BP), pp. 504–529.
ESOP-2017-KhyzhaDGP #partial order #proving- Proving Linearizability Using Partial Orders (AK, MD, AG, MJP), pp. 639–667.
ESOP-2017-KopS #complexity #higher-order #nondeterminism #power of #programming- The Power of Non-determinism in Higher-Order Implicit Complexity - Characterising Complexity Classes Using Non-deterministic Cons-Free Programming (CK, JGS), pp. 668–695.
FASE-2017-LeblebiciAS #consistency #graph grammar #linear #optimisation- Inter-model Consistency Checking Using Triple Graph Grammars and Linear Optimization Techniques (EL, AA, AS), pp. 191–207.
CAV-2017-Vafeiadis #consistency #logic #memory management #verification- Program Verification Under Weak Memory Consistency Using Separation Logic (VV), pp. 30–46.
CAV-2017-BouajjaniEEM #proving #simulation- Proving Linearizability Using Forward Simulations (AB, ME, CE, SOM), pp. 542–563.
CAV-2017-ReynoldsWBBLT #scalability #string- Scaling Up DPLL(T) String Solvers Using Context-Dependent Simplification (AR, MW, CWB, DB, TL, CT), pp. 453–474.
ICST-2017-ChanWSPS #analysis #concurrent #fault #invariant #multi #named #source code #thread- IPA: Error Propagation Analysis of Multi-Threaded Programs Using Likely Invariants (AC, SW0, HS, KP, NS), pp. 184–195.
ICST-2017-ConverseOK #execution #generative #semantics #symbolic computation #testing- Non-Semantics-Preserving Transformations for Higher-Coverage Test Generation Using Symbolic Execution (HC, OO, SK), pp. 241–252.
ICST-2017-DarkeCCV #abstraction #bound #model checking #performance #proving #safety- Efficient Safety Proofs for Industry-Scale Code Using Abstractions and Bounded Model Checking (PD, BC, AC, RV), pp. 468–475.
ICST-2017-DiasFFLSSV #concurrent #contract #source code #verification- Verifying Concurrent Programs Using Contracts (RJD, CF0, JF, JML, AS, DGS, TV), pp. 196–206.
ICST-2017-LinWC #semantics #similarity #testing #web- Using Semantic Similarity in Crawling-Based Web Application Testing (JWL, FW, PC), pp. 138–148.
ICST-2017-LuckowKP #analysis #complexity- Symbolic Complexity Analysis Using Context-Preserving Histories (KSL, RK, CSP), pp. 58–68.
ICST-2017-SunRJB #android #named #runtime #verification #weaving- ADRENALIN-RV: Android Runtime Verification Using Load-Time Weaving (HS, AR, OJ, WB), pp. 532–539.
ICST-2017-XuLC #concurrent #data type #debugging #testing- Using Delta Debugging to Minimize Stress Tests for Concurrent Data Structures (JX, YL, RHC), pp. 35–46.
ICTSS-2017-HusterSRKR #robust #testing #verification- Using Robustness Testing to Handle Incomplete Verification Results When Combining Verification and Testing Techniques (SH, JS, JR, TK, WR), pp. 54–70.
ICTSS-2017-SalvaR #integration #security #testing- Using Data Integration for Security Testing (SS, LR), pp. 178–194.
ICTSS-2017-SimosBDGKLW #combinator #execution #framework #testing- Testing TLS Using Combinatorial Methods and Execution Framework (DES, JB, FD, BG, KK, YL, FW), pp. 162–177.
VMCAI-2017-BotbolCG #communication #process #static analysis #transducer- Static Analysis of Communicating Processes Using Symbolic Transducers (VB, EC, TLG), pp. 73–90.
VMCAI-2017-FerraraT0K #abstract interpretation #fault- Using Abstract Interpretation to Correct Synchronization Faults (PF, OT, PL0, EK), pp. 187–208.
VMCAI-2017-GuW #analysis #float #source code- Stabilizing Floating-Point Programs Using Provenance Analysis (YG, TW), pp. 228–245.
VMCAI-2017-MonatM #abstract interpretation #abstraction #concurrent #precise #relational #source code #thread- Precise Thread-Modular Abstract Interpretation of Concurrent Programs Using Relational Interference Abstractions (RM, AM), pp. 386–404.
VMCAI-2017-OzeriPRS #abstract interpretation- Conjunctive Abstract Interpretation Using Paramodulation (OO, OP, NR, MS), pp. 442–461.
CBSE-2016-CrnkovicMMS #architecture #component #cyber-physical #on the- On the Use of Component-Based Principles and Practices for Architecting Cyber-Physical Systems (IC, IM, HM, MS), pp. 23–32.
CBSE-2016-StevaneticZ #architecture #component #experience #metric #modelling- Exploring the Understandability of Components in Architectural Component Models Using Component Level Metrics and Participants' Experience (SS, UZ), pp. 1–6.
ECSA-2016-ErsoyKAS #architecture #clustering #re-engineering- Using Hypergraph Clustering for Software Architecture Reconstruction of Data-Tier Software (EE, KK, MA, HS), pp. 326–333.
QoSA-2016-LehrigB #as a service #case study #modelling #performance- Using Performance Models for Planning the Redeployment to Infrastructure-as-a-Service Environments: A Case Study (SL, SB0), pp. 11–20.
WICSA-2016-KazmanCHH #architecture #design #summary #tutorial- Tutorial Summary for Designing Software Architectures Using ADD 3.0 (RK, HC, SH, OH), p. 253.
WICSA-2016-SobernigZ #architecture #design- Distilling Architectural Design Decisions and Their Relationships Using Frequent Item-Sets (SS, UZ), pp. 61–70.
JCDL-2016-BornandBS #classification- Routing Memento Requests Using Binary Classifiers (NJB, LB, HVdS), pp. 63–72.
JCDL-2016-Frick #framework #library #platform #research- The State of Practice and Use of Digital Collections: The Digital Public Library of America as a platform for research (RF), p. 3.
JCDL-2016-JettNCPD #comparative #library #metadata #ontology #overview- Enhancing Scholarly Use of Digital Libraries: A Comparative Survey and Review of Bibliographic Metadata Ontologies (JJ, TNF, TWC, KRP, JSD), pp. 35–44.
CSEET-2016-FreitasSM #learning #student- Using an Active Learning Environment to Increase Students' Engagement (SAAdF, WCMPS, GM), pp. 232–236.
CSEET-2016-GeorgasPM #architecture #learning #runtime #visualisation- Supporting Software Architecture Learning Using Runtime Visualization (JCG, JDP, MJM), pp. 101–110.
CSEET-2016-LiebelHS #education #industrial #modelling #tool support- Impact of the Use of Industrial Modelling Tools on Modelling Education (GL, RH, JPS), pp. 18–27.
CSEET-2016-SrinivasanLY #comprehension #diagrams #object-oriented #programming #sequence chart- Enhancing Object-Oriented Programming Comprehension Using Optimized Sequence Diagram (MS, YL, JY), pp. 81–85.
EDM-2016-ChenDP #diagrams #problem- Examining the necessity of problem diagrams using MOOC AB experiments (ZC, ND, DEP), pp. 579–580.
EDM-2016-FouhFHKS #data analysis #data type #topic- Investigating Difficult Topics in a Data Structures Course Using Item Response Theory and Logged Data Analysis (EF, MFF, SH, KHK, CAS), pp. 370–375.
EDM-2016-Kyrilov #automation #feedback #programming #reasoning- Using Case-Based Reasoning to Automatically Generate High-Quality Feedback for Programming Exercises (AK), pp. 669–671.
EDM-2016-LiuDS #data type #data-driven #multi #towards- Beyond Log Files: Using Multi-Modal Data Streams Towards Data-Driven KC Model Improvement (RL0, JLD, JCS), pp. 436–441.
EDM-2016-Mojarad #performance #student- Studying Assignment Size and Student Performance Using Propensity Score Matching (SM), pp. 701–702.
EDM-2016-NgHLK #learning #modelling #sequence- Modelling the way: Using action sequence archetypes to differentiate learning pathways from learning outcomes (KHRN, KH, KL, AWHK), pp. 167–174.
EDM-2016-NogaitoYK #automation #case study #similarity #testing- Study on Automatic Scoring of Descriptive Type Tests using Text Similarity Calculations (IN, KY, HK), pp. 616–617.
EDM-2016-Penteado #assessment #data mining #estimation #mining #scalability #semantics- Estimation of prerequisite skills model from large scale assessment data using semantic data mining (BEP), pp. 675–677.
EDM-2016-RaffertyJG #feedback #personalisation- Using Inverse Planning for Personalized Feedback (ANR, RJ, TLG), pp. 472–477.
EDM-2016-RenRJ #modelling #multi #performance #predict- Predicting Performance on MOOC Assessments using Multi-Regression Models (ZR, HR, AJ), pp. 484–489.
EDM-2016-Yee-KingGd #collaboration #learning #metric #online #predict #social #student- Predicting student grades from online, collaborative social learning metrics using K-NN (MYK, AGR, Md), pp. 654–655.
EDM-2016-ZhengKTG #clustering #concept #physics- Soft Clustering of Physics Misconceptions Using a Mixed Membership Model (GZ, SK, YT, AG), pp. 658–659.
ICPC-2016-MetcalfFYF #interactive #parametricity #static analysis- Extracting configuration parameter interactions using static analysis (CAM, FF, TY, JF), pp. 1–4.
ICSME-2016-AndersonDS #testing- Customized Regression Testing Using Telemetry Usage Patterns (JA, HD, SS), pp. 572–581.
ICSME-2016-GopinathWHK #fault #machine learning- Repairing Intricate Faults in Code Using Machine Learning and Path Exploration (DG, KW, JH, SK), pp. 453–457.
ICSME-2016-KargenS #towards- Towards Accurate Binary Correspondence Using Runtime-Observed Values (UK, NS), pp. 438–442.
ICSME-2016-KhourySH #comprehension #principle- Key Elements Extraction and Traces Comprehension Using Gestalt Theory and the Helmholtz Principle (RK, LS, AHL), pp. 478–482.
ICSME-2016-LevinY #developer #maintenance #predict #process #semantics- Using Temporal and Semantic Developer-Level Information to Predict Maintenance Activity Profiles (SL, AY), pp. 463–467.
ICSME-2016-NguyenNN #fine-grained #source code #topic- Using Topic Model to Suggest Fine-Grained Source Code Changes (HAN, ATN0, TNN), pp. 200–210.
ICSME-2016-PalombaZFLO #debugging #performance #predict #smell- Smells Like Teen Spirit: Improving Bug Prediction Performance Using the Intensity of Code Smells (FP, MZ, FAF, ADL, RO), pp. 244–255.
ICSME-2016-XiaBLL #automation #case study #debugging #fault #harmful #locality #scalability #user study- “Automated Debugging Considered Harmful” Considered Harmful: A User Study Revisiting the Usefulness of Spectra-Based Fault Localization Techniques with Professionals Using Real Bugs from Large Systems (XX0, LB, DL0, SL), pp. 267–278.
MSR-2016-DamevskiCSP #developer #interactive #markov- Interactive exploration of developer interaction traces using a hidden markov model (KD, HC0, DCS, LLP), pp. 126–136.
MSR-2016-KikasDP #git #predict- Using dynamic and contextual features to predict issue lifetime in GitHub projects (RK, MD, DP), pp. 291–302.
MSR-2016-RolfsnesMABB #recommendation- Improving change recommendation using aggregated association rules (TR, LM, SDA, RB, DWB), pp. 73–84.
SANER-2016-0029BKT #android #library- An Investigation into the Use of Common Libraries in Android Apps (LL0, TFB, JK, YLT), pp. 403–414.
SANER-2016-BorckBSHHJSS #named #source code- Frankencode: Creating Diverse Programs Using Code Clones (HB, MSB, IJDS, SAH, KH, SJ, AS, MS), pp. 604–608.
SANER-2016-MazinanianT #css #empirical #preprocessor- An Empirical Study on the Use of CSS Preprocessors (DM, NT), pp. 168–178.
SANER-2016-MendesVHS #identification #random- Identifying Utility Functions Using Random Forests (TM, MTV, ACH, AS), pp. 614–618.
SANER-2016-NishimuraM #fine-grained- Supporting Merge Conflict Resolution by Using Fine-Grained Code Change History (YN, KM), pp. 661–664.
SANER-2016-PanichellaDOPPL #algorithm #search-based- Parameterizing and Assembling IR-Based Solutions for SE Tasks Using Genetic Algorithms (AP, BD, RO, MDP, DP, ADL), pp. 314–325.
SANER-2016-RahmanRL #api #automation #crowdsourcing #named #recommendation- RACK: Automatic API Recommendation Using Crowdsourced Knowledge (MMR0, CKR, DL0), pp. 349–359.
SANER-2016-ZhengRSLSJBCQB #analysis #hybrid #named- AutoBench: Finding Workloads That You Need Using Pluggable Hybrid Analyses (YZ, AR, LS, YL0, HS, OJ, LB, LYC, ZQ, WB), pp. 639–643.
CIAA-2016-StasioMPV #algorithm #game studies- Solving Parity Games Using an Automata-Based Algorithm (ADS, AM, GP, MYV), pp. 64–76.
CIAA-2016-WeidemanMBW #ambiguity #automaton #backtracking #behaviour #nondeterminism #regular expression- Analyzing Matching Time Behavior of Backtracking Regular Expression Matchers by Using Ambiguity of NFA (NW, BvdM, MB, BWW), pp. 322–334.
DLT-2016-Basten #ambiguity #automaton #detection #multi- Context-Free Ambiguity Detection Using Multi-stack Pushdown Automata (HJSB), pp. 1–12.
FM-2016-CavadaCCRT #design #embedded #energy #modelling- Model-Based Design of an Energy-System Embedded Controller Using Taste (RC, AC, LC, MR, ST), pp. 741–747.
FM-2016-StoenescuSPI #analysis #execution #framework #named #symbolic computation- RIVER: A Binary Analysis Framework Using Symbolic Execution and Reversible x86 Instructions (TS, AS, SP, FI), pp. 779–785.
FM-2016-VakiliD #finite #logic #similarity- Finite Model Finding Using the Logic of Equality with Uninterpreted Functions (AV, NAD), pp. 677–693.
- IFM-2016-AntoninoGR #analysis #performance #satisfiability
- Efficient Deadlock-Freedom Checking Using Local Analysis and SAT Solving (PA, TGR, AWR), pp. 345–360.
- IFM-2016-KumarBLDUB #verification
- CloudSDV Enabling Static Driver Verifier Using Microsoft Azure (RK, TB, JL, ND, AU, CB), pp. 523–536.
- IFM-2016-Preoteasa #invariant #logic #pointer #programming #source code #verification
- Verifying Pointer Programs Using Separation Logic and Invariant Based Programming in Isabelle (VP), pp. 457–473.
- IFM-2016-SchutsHV #case study #equivalence #experience #industrial #learning #legacy #refactoring
- Refactoring of Legacy Software Using Model Learning and Equivalence Checking: An Industrial Experience Report (MS, JH, FWV), pp. 311–325.
SEFM-2016-FeistMP #control flow #execution #symbolic computation- Guided Dynamic Symbolic Execution Using Subgraph Control-Flow Information (JF, LM, MLP), pp. 76–81.
SEFM-2016-HusienS #generative #model checking- Program Generation Using Simulated Annealing and Model Checking (IH, SS), pp. 155–171.
Haskell-2016-WangNF #algorithm #named #search-based #strict- Autobahn: using genetic algorithms to infer strictness annotations (YRW, DN, KF), pp. 114–126.
- ICFP-2016-CastroHS #morphism #parallel #pipes and filters #process #reasoning
- Farms, pipes, streams and reforestation: reasoning about structured parallel processes using types and hylomorphisms (DC, KH, SS), pp. 4–17.
AIIDE-2016-DebkowskiMYYYFK #behaviour #collaboration #game studies #multi #named #online- Contained: Using Multiplayer Online Games to Quantify Success of Collaborative Group Behavior (DD, AM, NY, LY, YY, SF, MK), pp. 149–154.
AIIDE-2016-GeibWMKCP #recognition- Building Helpful Virtual Agents Using Plan Recognition and Planning (CWG, JW, SM, PK, BGWC, RPAP), pp. 162–168.
AIIDE-2016-GunesSAES #approach #modelling- A Generic Approach for Player Modeling Using Event-Trait Mapping and Feature Weighting (MAG, GS, UA, OE, SS), pp. 169–175.
AIIDE-2016-HarrisonR #crowdsourcing #learning- Learning From Stories: Using Crowdsourced Narratives to Train Virtual Agents (BH, MOR), pp. 183–189.
AIIDE-2016-SinghDHJPM #network- Recognizing Actions in Motion Trajectories Using Deep Neural Networks (KYS, NMD, CPH, MJ, KP, BM), pp. 211–217.
AIIDE-2016-SooLC #monte carlo- Generate Believable Causal Plots with User Preferences Using Constrained Monte Carlo Tree Search (VWS, CML, THC), pp. 218–224.
CHI-PLAY-2016-ReinschluesselM #game studies #self- Using Positive or Negative Reinforcement in Neurofeedback Games for Training Self-Regulation (AVR, RLM), pp. 186–198.
CHI-PLAY-2016-SavardBW #challenge #collaboration #game studies- Collaborative Solving in a Human Computing Game Using a Market, Skills and Challenges (OTS, AB, JW), pp. 130–141.
CHI-PLAY-2016-SharmaTDKJ #artificial reality #game studies- Evaluating Display Modalities Using a Mixed Reality Game (HNS, ZOT, ID, AK, AJ), pp. 65–77.
CHI-PLAY-2016-ZayerTF #mobile #named- PAWdio: Hand Input for Mobile VR using Acoustic Sensing (MAZ, ST, EF), pp. 154–158.
CIG-2016-Bursztein #learning #statistics- I am a legend: Hacking hearthstone using statistical learning methods (EB), pp. 1–8.
CIG-2016-CazenaveLTT #game studies #learning #random- Learning opening books in partially observable games: Using random seeds in Phantom Go (TC, JL0, FT, OT), pp. 1–7.
CIG-2016-KiourtK #modelling #social- Using opponent models to train inexperienced synthetic agents in social environments (CK, DK), pp. 1–4.
CIG-2016-ParkK #visual notation- Deep Q-learning using redundant outputs in visual doom (HSP, KJK), pp. 1–2.
CIG-2016-SephtonCDHS #android #mining #predict- Using association rule mining to predict opponent deck content in android: Netrunner (NS, PIC, SD, VJH, NHS), pp. 1–8.
CIG-2016-StanescuBHB #game studies #network #realtime- Evaluating real-time strategy game states using convolutional neural networks (MS, NAB, AH, MB), pp. 1–7.
CIG-2016-YooK #algorithm #game studies #video- Changing video game graphic styles using neural algorithms (BY, KJK), pp. 1–2.
DiGRA-FDG-2016-GoddardM #assembly #design #game studies- Designing Unconventional Use of Conventional Displays in Games: Some Assembly Required (WG, AM).
DiGRA-FDG-2016-LimLH #approach #bottom-up #category theory #clustering #image #social- Discovering Social and Aesthetic Categories of Avatars: A Bottom-Up Artificial Intelligence Approach Using Image Clustering (CUL, AL, DFH).
DiGRA-FDG-2016-ZhuKCL #education #game studies #interactive #social- Using Interactive Social Story Games to Teach Social Skills to Children with Autism (JZ, CK, JC, NL).
VS-Games-2016-AyedGJAVM #game studies #people- Fall Prevention Serious Games for Elderly People Using RGBD Devices (IA, AG, AJiC, BMA, JV, PMB), pp. 1–3.
VS-Games-2016-LopeM #education #game studies #uml- Using UML to Model Educational Games (RPdL, NMM), pp. 1–4.
VS-Games-2016-NicolaouLL #artificial reality- Stroke Event Simulator Using Virtual Reality (PN, ML, FL), pp. 1–2.
VS-Games-2016-PaliokasS #game studies- The Use of Serious Games in Museum Visits and Exhibitions: A Systematic Mapping Study (IP, SS), pp. 1–8.
VS-Games-2016-Piedra-Fernandez #artificial reality #communication #people- Sign Communication for People with Disabilities Using Kinect Technology at Home (JAPF, JJOC, CBB, LIM), pp. 1–2.
VS-Games-2016-VosinakisKMS #approach #artificial reality- A Kinesthetic Approach to Digital Heritage Using Leap Motion: The Cycladic Sculpture Application (SV, PK, DM, ES), pp. 1–8.
CIKM-2016-0001H #adaptation #interactive #learning #multi #named- aptMTVL: Nailing Interactions in Multi-Task Multi-View Multi-Label Learning using Adaptive-basis Multilinear Factor Analyzers (XL0, JH), pp. 1171–1180.
CIKM-2016-AgrawalC #data mining #mining #predict- A Fatigue Strength Predictor for Steels Using Ensemble Data Mining: Steel Fatigue Strength Predictor (AA, ANC), pp. 2497–2500.
CIKM-2016-Balaneshinkordan #concept #graph #query- Sequential Query Expansion using Concept Graph (SB, AK), pp. 155–164.
CIKM-2016-CheemaKALWCR #analysis #health #monitoring #on the- On Structural Health Monitoring Using Tensor Analysis and Support Vector Machine with Artificial Negative Data (PC, NLDK, MMA, WL0, YW0, FC0, PR), pp. 1813–1822.
CIKM-2016-ChenWPT #community #network #performance- Efficient Computation of Importance Based Communities in Web-Scale Networks Using a Single Machine (SC, RW, DP, AT), pp. 1553–1562.
CIKM-2016-HanadaPCL #effectiveness #fault #type system- Effective Spelling Correction for Eye-based Typing using domain-specific Information about Error Distribution (RH, MdGCP, MC, FAL), pp. 1723–1732.
CIKM-2016-HansenLM #predict #query #web- Ensemble Learned Vaccination Uptake Prediction using Web Search Queries (NDH, CL, KM), pp. 1953–1956.
CIKM-2016-JatowtKT #predict #wiki- Predicting Importance of Historical Persons using Wikipedia (AJ, DK, KT), pp. 1909–1912.
CIKM-2016-KuziSK #query #word- Query Expansion Using Word Embeddings (SK, AS, OK), pp. 1929–1932.
CIKM-2016-LiCL #approximate #graph #query- Approximating Graph Pattern Queries Using Views (JL, YC0, XL), pp. 449–458.
CIKM-2016-LiuKL #predict #social #social media- Collective Traffic Prediction with Partially Observed Traffic History using Location-Based Social Media (XL, XK, YL), pp. 2179–2184.
CIKM-2016-ManotumruksaMO #modelling #recommendation- Regularising Factorised Models for Venue Recommendation using Friends and their Comments (JM, CM, IO), pp. 1981–1984.
CIKM-2016-MartinoBR0M #community #learning- Learning to Re-Rank Questions in Community Question Answering Using Advanced Features (GDSM, ABC, SR, AU0, AM), pp. 1997–2000.
CIKM-2016-Najork #email #experience #machine learning- Using Machine Learning to Improve the Email Experience (MN), p. 891.
CIKM-2016-RoyGMJ #composition #estimation #feedback #kernel #word- Word Vector Compositionality based Relevance Feedback using Kernel Density Estimation (DR, DG, MM, GJFJ), pp. 1281–1290.
CIKM-2016-RuanSXTFLZ #network- Forecasting Seasonal Time Series Using Weighted Gradient RBF Network based Autoregressive Model (WR, QZS, PX, NKT0, NJGF, XL0, WEZ), pp. 2021–2024.
CIKM-2016-SinghC #aspect-oriented #query- Iterative Search using Query Aspects (MS, WBC), pp. 2037–2040.
CIKM-2016-TongKIKSV - Deep Match between Geology Reports and Well Logs Using Spatial Information (BT, MK, MI, YK, AS, RV), pp. 1833–1842.
CIKM-2016-TutekGSMB #concept #detection #knowledge base #ranking- Detecting and Ranking Conceptual Links between Texts Using a Knowledge Base (MT, GG, JS, NMF, BDB), pp. 2077–2080.
CIKM-2016-WangJYJM #learning- Learning to Extract Conditional Knowledge for Question Answering using Dialogue (PW, LJ, JY0, LJ, WYM), pp. 277–286.
CIKM-2016-WangOWWLPG #concept- Using Prerequisites to Extract Concept Maps fromTextbooks (SW, AO, ZW0, KW, CL0, BP, CLG), pp. 317–326.
CIKM-2016-WangWZ #distributed #graph #partial evaluation #performance #query #rdf- Efficient Distributed Regular Path Queries on RDF Graphs Using Partial Evaluation (XW0, JW, XZ), pp. 1933–1936.
CIKM-2016-Wu0XTL #named #recommendation #word- Tag2Word: Using Tags to Generate Words for Content Based Tag Recommendation (YW, YY0, FX0, HT, JL0), pp. 2287–2292.
CIKM-2016-XuCLMM #personalisation #recommendation #semantics #similarity- Tag-Aware Personalized Recommendation Using a Deep-Semantic Similarity Model with Negative Sampling (ZX, CC0, TL, YM, XM), pp. 1921–1924.
CIKM-2016-YuanGJCYZ #learning #named #ranking- LambdaFM: Learning Optimal Ranking with Factorization Machines Using Lambda Surrogates (FY, GG, JMJ, LC0, HY, WZ0), pp. 227–236.
CIKM-2016-ZhangDH #ambiguity #case study #classification #online- Bayesian Non-Exhaustive Classification A Case Study: Online Name Disambiguation using Temporal Record Streams (BZ, MD, MAH), pp. 1341–1350.
CIKM-2016-ZhangLDCKS #big data #locality #privacy #scalability- Scalable Local-Recoding Anonymization using Locality Sensitive Hashing for Big Data Privacy Preservation (XZ, CL, WD, JC, KR, ZS), pp. 1793–1802.
CIKM-2016-ZhengWPYFX #big data #predict- Urban Traffic Prediction through the Second Use of Inexpensive Big Data from Buildings (ZZ, DW0, JP, YY, CF, LFX), pp. 1363–1372.
ECIR-2016-0002B #information retrieval- Diversifying Search Results Using Time - An Information Retrieval Method for Historians (DG0, KB), pp. 789–795.
ECIR-2016-ArguelloAD #performance #predict #query- Using Query Performance Predictors to Improve Spoken Queries (JA, SA, FD0), pp. 309–321.
ECIR-2016-BalikasA #classification #multi- Multi-label, Multi-class Classification Using Polylingual Embeddings (GB, MRA), pp. 723–728.
ECIR-2016-WangME #category theory #fine-grained #image #visual notation- Harvesting Training Images for Fine-Grained Object Categories Using Visual Descriptions (JW, KM, ME), pp. 549–560.
ICML-2016-AroraMM #learning #multi #optimisation #probability #representation- Stochastic Optimization for Multiview Representation Learning using Partial Least Squares (RA, PM, TVM), pp. 1786–1794.
ICML-2016-BuiHHLT #approximate #process- Deep Gaussian Processes for Regression using Approximate Expectation Propagation (TDB, DHL, JMHL, YL, RET), pp. 1472–1481.
ICML-2016-GonenOS #sketching- Solving Ridge Regression using Sketched Preconditioned SVRG (AG, FO, SSS), pp. 1397–1405.
ICML-2016-GuanRW #learning #markov #multi #performance #process #recognition- Efficient Multi-Instance Learning for Activity Recognition from Time Series Data Using an Auto-Regressive Hidden Markov Model (XG, RR, WKW), pp. 2330–2339.
ICML-2016-JasinskaDBPKH #probability- Extreme F-measure Maximization using Sparse Probability Estimates (KJ, KD, RBF, KP, TK, EH), pp. 1435–1444.
ICML-2016-JohnsonZ #categorisation- Supervised and Semi-Supervised Text Categorization using LSTM for Region Embeddings (RJ, TZ0), pp. 526–534.
ICML-2016-JunN #multi- Anytime Exploration for Multi-armed Bandits using Confidence Information (KSJ, RDN), pp. 974–982.
ICML-2016-LarsenSLW #encoding #metric #similarity- Autoencoding beyond pixels using a learned similarity metric (ABLL, SKS, HL, OW), pp. 1558–1566.
ICML-2016-NiuRFH #parametricity #performance- Fast Parameter Inference in Nonlinear Dynamical Systems using Iterative Gradient Matching (MN, SR, MF, DH), pp. 1699–1707.
ICML-2016-RoychowdhuryKP #monte carlo #robust- Robust Monte Carlo Sampling using Riemannian Nosé-Poincaré Hamiltonian Dynamics (AR, BK, SP0), pp. 2673–2681.
ICML-2016-SangnierGR #detection #proximity #reliability #representation- Early and Reliable Event Detection Using Proximity Space Representation (MS, JG, AR), pp. 2310–2319.
ICML-2016-SiHD #approximate #performance- Computationally Efficient Nyström Approximation using Fast Transforms (SS, CJH, ISD), pp. 2655–2663.
ICML-2016-ZhuQRY #coordination #performance- Even Faster Accelerated Coordinate Descent Using Non-Uniform Sampling (ZAZ, ZQ, PR, YY), pp. 1110–1119.
ICPR-2016-AhmedCSNN #image #smarttech- Using fusion of iris code and periocular biometric for matching visible spectrum iris images captured by smart phone cameras (NUA, SC, EHS, AN, IN), pp. 176–180.
ICPR-2016-Al-DulaimiBTC #automation #geometry #image #segmentation #set- Automatic segmentation of HEp-2 cell Fluorescence microscope images using level set method via geometric active contours (KAD, JB, ITR, VC), pp. 81–83.
ICPR-2016-Alonso-Fernandez #multi #recognition- Compact multi-scale periocular recognition using SAFE features (FAF, AM, JB), pp. 1455–1460.
ICPR-2016-AntonyMOM #network- Quantifying radiographic knee osteoarthritis severity using deep convolutional neural networks (JA, KM, NEO, KM), pp. 1195–1200.
ICPR-2016-AydinKAA #automation #predict #random- Automatic personality prediction from audiovisual data using random forest regression (BA, AAK, OA, LA), pp. 37–42.
ICPR-2016-BachaAB #probability #recognition #visual notation- Event recognition in photo albums using probabilistic graphical model and feature relevance (SB, MSA, NB), pp. 2819–2823.
ICPR-2016-BartoliLSB #estimation #profiling- User interest profiling using tracking-free coarse gaze estimation (FB, GL, LS, ADB), pp. 1839–1844.
ICPR-2016-BertoliniOS #difference #identification #multi- Multi-script writer identification using dissimilarity (DB, LSO, RS), pp. 3025–3030.
ICPR-2016-BhagavatulaAS #estimation- Pose estimation using Spectral and Singular Value recomposition (CB, RA, MS), pp. 4095–4100.
ICPR-2016-Brandtberg #analysis #classification #fourier #fuzzy #multi #order #rank- Virtual hexagonal and multi-scale operator for fuzzy rank order texture classification using one-dimensional generalised Fourier analysis (TB), pp. 2018–2024.
ICPR-2016-BrownF #detection #smarttech- Enhanced face detection using body part detections for wearable cameras (LMB, QF), pp. 715–720.
ICPR-2016-BSSH #approach #classification #network- HEp-2 cell classification using artificial neural network approach (DB, KS, NH), pp. 84–89.
ICPR-2016-BullingerBWA #bound #generative #re-engineering #video- Moving object reconstruction in monocular video data using boundary generation (SB, CB, SW, MA), pp. 240–246.
ICPR-2016-CamgozHKB #3d #gesture #independence #network #recognition- Using Convolutional 3D Neural Networks for User-independent continuous gesture recognition (NCC, SH, OK, RB), pp. 49–54.
ICPR-2016-CarbonneauGG #identification #learning #multi #random- Witness identification in multiple instance learning using random subspaces (MAC, EG, GG), pp. 3639–3644.
ICPR-2016-ChakrabortyPK #information management #recognition #speech- Spontaneous speech emotion recognition using prior knowledge (RC, MP, SKK), pp. 2866–2871.
ICPR-2016-ChowdhuryBMKS #image #network #performance #retrieval- An efficient radiographic Image Retrieval system using Convolutional Neural Network (MC, SRB, RM, MKK, ÖS), pp. 3134–3139.
ICPR-2016-Chun #adaptation #authentication- Small scale single pulse ECG-based authentication using GLRT that considers T wave shift and adaptive template update with prior information (SYC), pp. 3043–3048.
ICPR-2016-DaiDCLY #multi #rank #representation #segmentation- Object segmentation using low-rank representation with multiple block-diagonal priors (LD, JD, JC, JL0, JY0), pp. 1959–1964.
ICPR-2016-DaoodRB #classification #multi #recognition- Pollen recognition using a multi-layer hierarchical classifier (AD, ER, MB), pp. 3091–3096.
ICPR-2016-DutaNAIS #recognition- Boosting VLAD with double assignment using deep features for action recognition in videos (ICD, TAN0, KA, BI, NS), pp. 2210–2215.
ICPR-2016-EichhardtH - Improvement of camera calibration using surface normals (IE, LH), pp. 3745–3750.
ICPR-2016-ElTantawyS #matrix #novel #physics- A novel method for segmenting moving objects in aerial imagery using matrix recovery and physical spring model (AE, MSS), pp. 3898–3903.
ICPR-2016-EumD #evaluation #multi- Content selection using frontalness evaluation of multiple frames (SE, DSD), pp. 3404–3409.
ICPR-2016-FariaCLI #dependence #recognition- Information fusion for cocaine dependence recognition using fMRI (FAF, FAMC, CsRL, JSI), pp. 1107–1112.
ICPR-2016-FengLL #effectiveness #learning- Learning effective Gait features using LSTM (YF0, YL, JL), pp. 325–330.
ICPR-2016-FoareLT16a #calculus #functional #image #segmentation- Image restoration and segmentation using the Ambrosio-Tortorelli functional and Discrete Calculus (MF, JOL, HT), pp. 1418–1423.
ICPR-2016-GaoCZFZ #image #segmentation- Texture image segmentation using fused features and active contour (MG, HC, SZ, BF0, LZ), pp. 2036–2041.
ICPR-2016-GaoYGC #approach #constraints #network- Bayesian approach to learn Bayesian networks using data and constraints (XGG, YY, ZgG, DQC0), pp. 3667–3672.
ICPR-2016-GhoraiMC #image #kernel #statistics- Patch sparsity based image inpainting using local patch statistics and steering kernel descriptor (MG, SM, BC), pp. 781–786.
ICPR-2016-GiraudTP #linear #named- SCALP: Superpixels with Contour Adherence using Linear Path (RG, VTT, NP), pp. 2374–2379.
ICPR-2016-GrimmMBS #classification- Sleep position classification from a depth camera using Bed Aligned Maps (TG, MM, AB, RS), pp. 319–324.
ICPR-2016-GuoDFS #detection #robust- A robust UAV landing site detection system using mid-level discriminative patches (XG, SD, CF, SS), pp. 1659–1664.
ICPR-2016-HafemannSO #verification- Analyzing features learned for Offline Signature Verification using Deep CNNs (LGH, RS, LSO), pp. 2989–2994.
ICPR-2016-HajduHBLEHT #algorithm #approximate #grid #network- Measuring regularity of network patterns by grid approximations using the LLL algorithm (AH, BH, RB, IL, GE, LH, RT), pp. 1524–1529.
ICPR-2016-HasegawaH #classification #image #named #network- PLSNet: A simple network using Partial Least Squares regression for image classification (RH, KH), pp. 1601–1606.
ICPR-2016-HsuCH #representation #verification- Object verification in two views using Sparse representation (SCH, ICC, CLH), pp. 504–509.
ICPR-2016-HuangY #3d #network- Point cloud labeling using 3D Convolutional Neural Network (JH0, SY), pp. 2670–2675.
ICPR-2016-ItoA #authentication- A score calculation method using positional information of feature points for biometric authentication (KI, TA), pp. 3049–3054.
ICPR-2016-JafariKNSSWN #image #learning #segmentation- Skin lesion segmentation in clinical images using deep learning (MHJ, NK, ENE, SS, SMRS, KRW, KN), pp. 337–342.
ICPR-2016-JhuangLT #3d #network #verification- Face verification with three-dimensional point cloud by using deep belief networks (DHJ, DTL, CHT), pp. 1430–1435.
ICPR-2016-JiaoZ #learning #multi #taxonomy- Multiple Instance Dictionary Learning using Functions of Multiple Instances (CJ, AZ), pp. 2688–2693.
ICPR-2016-JohnKGNMI #learning #modelling #performance #segmentation- Fast road scene segmentation using deep learning and scene-based models (VJ, KK, CG, HTN, SM, KI), pp. 3763–3768.
ICPR-2016-JoyR0V #big data #optimisation- Hyperparameter tuning for big data using Bayesian optimisation (TTJ, SR, SG0, SV), pp. 2574–2579.
ICPR-2016-KalraSRT #learning #network- Learning opposites using neural networks (SK, AS, SR, HRT), pp. 1213–1218.
ICPR-2016-Kamkar0LPV #graph #predict- Stable clinical prediction using graph support vector machines (IK, SG0, CL0, DQP, SV), pp. 3332–3337.
ICPR-2016-KhanH #adaptation #learning #polynomial- Adapting instance weights for unsupervised domain adaptation using quadratic mutual information and subspace learning (MNAK, DRH), pp. 1560–1565.
ICPR-2016-KilicarslanZ #video- Bridge motion to collision alarming using driving video (MK, JYZ), pp. 1870–1875.
ICPR-2016-KimP #approach #detection #network- A shape preserving approach for salient object detection using convolutional neural networks (JK, VP), pp. 609–614.
ICPR-2016-KimP16a #network- Discovering characteristic landmarks on ancient coins using convolutional networks (JK, VP), pp. 1595–1600.
ICPR-2016-KimV #classification #semantics- Deep Action Unit classification using a binned intensity loss and semantic context model (EK, SV), pp. 4136–4141.
ICPR-2016-KondratevS #automation #constraints #detection #geometry #image- Automatic detection of laser-induced structures in live cell fluorescent microscopy images using snakes with geometric constraints (AYK, DVS), pp. 331–336.
ICPR-2016-LeiT #modelling- Modeling human-skeleton motion patterns using conditional deep Boltzmann machine (PL, ST), pp. 1845–1850.
ICPR-2016-Lezoray #image- High dynamic range image processing using manifold-based ordering (OL), pp. 289–294.
ICPR-2016-LiaoLL #classification #multi #network #robust- Skin disease classification versus skin lesion characterization: Achieving robust diagnosis using multi-label deep neural networks (HL, YL, JL), pp. 355–360.
ICPR-2016-LiuHWLL #image #performance #retrieval #segmentation- Efficient segmentation for Region-based Image Retrieval using Edge Integrated Minimum Spanning Tree (YL0, LH0, SW, XL, BL), pp. 1929–1934.
ICPR-2016-LuoGPWY #locality #mobile #multi- Accurate localization for mobile device using a multi-planar city model (YL, TG, HP, YW, JY), pp. 3733–3738.
ICPR-2016-MarronePFPSS #fuzzy #segmentation- Breast segmentation using Fuzzy C-Means and anatomical priors in DCE-MRI (SM0, GP, RF, AP, MS, CS), pp. 1472–1477.
ICPR-2016-Martinez-DiazCH #encoding #performance #recognition #video- Efficient video face recognition by using Fisher Vector encoding of binary features (YMD, LC, NH, HMV, LES), pp. 1436–1441.
ICPR-2016-MatsukawaS #identification- Person re-identification using CNN features learned from combination of attributes (TM, ES), pp. 2428–2433.
ICPR-2016-MatsuzakiUSS #2d #3d #constraints #geometry #retrieval #verification- Geometric verification using semi-2D constraints for 3D object retrieval (KM, YU, SS, SS), pp. 2338–2343.
ICPR-2016-MohagheghKSSN #estimation #image- Single image depth estimation using joint local-global features (HM, NK, SMRS, SS, KN), pp. 727–732.
ICPR-2016-MollerNN16a #clustering #detection #image- Change detection in marine observatory image streams using Bi-Domain Feature Clustering (TM, IN, TWN), pp. 793–798.
ICPR-2016-MontenegroA #artificial reality #estimation #human-computer- Gaze estimation using EEG signals for HCI in augmented and virtual reality headsets (JMFM, VA), pp. 1159–1164.
ICPR-2016-NahaW16a #learning #segmentation- Object figure-ground segmentation using zero-shot learning (SN, YW0), pp. 2842–2847.
ICPR-2016-NairKNG #documentation #network #segmentation- Segmentation of highly unstructured handwritten documents using a neural network technique (RRN, BUK, IN, VG), pp. 1291–1296.
ICPR-2016-Nakazawa #image #random- Noise stable image registration using RANdom RESAmple Consensus (AN), pp. 853–858.
ICPR-2016-NaminAP #2d #3d #higher-order #segmentation #semantics- 2D-3D semantic segmentation using cardinality as higher-order loss (SRN, JMA, LP), pp. 3775–3780.
ICPR-2016-Nguyen #automation #generative #image- Automatic generation of a realistic looking single image stereogram using stereo vision (MN), pp. 3826–3831.
ICPR-2016-NishiyamaNYYIS #identification #physics- Person re-identification using co-occurrence attributes of physical and adhered human characteristics (MN, SN, TY, HY, YI, KS), pp. 2085–2090.
ICPR-2016-OnZEB #multi #pattern matching #pattern recognition #recognition- Spatio-temporal pattern recognition of dendritic spines and protein dynamics using live multichannel fluorescence microscopy (VO, AZ, IE, BB), pp. 2042–2047.
ICPR-2016-OrriteRM #distance #learning #process #sequence- One-shot learning of temporal sequences using a distance dependent Chinese Restaurant Process (CO, MR, CM), pp. 2694–2699.
ICPR-2016-OrueG #graph #process #recognition- Face recognition using activities of directed graphs in spatial pyramid (JPMO, WNG), pp. 3162–3167.
ICPR-2016-Oskarsson - Characterizing the structure tensor using gamma distributions (MO), pp. 763–768.
ICPR-2016-PalaniappanPAVF #detection- Moving object detection for vehicle tracking in Wide Area Motion Imagery using 4D filtering (KP, MP, HA, RV, JF, FB, AB, SS, EB, RMR, GS), pp. 2830–2835.
ICPR-2016-PalCGCC #learning #multi- Severity grading of psoriatic plaques using deep CNN based multi-task learning (AP, AC, UG, AC, RC), pp. 1478–1483.
ICPR-2016-PengRP #learning #network #recognition- Learning face recognition from limited training data using deep neural networks (XP, NKR, SP), pp. 1442–1447.
ICPR-2016-Ponce-Hinestroza #adaptation- Using a MRF-BP model with color adaptive training for underwater color restoration (ANPH, LATM, PDJ), pp. 787–792.
ICPR-2016-PrasathKOGHSP #classification #random #segmentation- HEp-2 cell classification and segmentation using motif texture patterns and spatial features with random forests (VBSP, YMK, ZAO, JBG, AH, GS, KP), pp. 90–95.
ICPR-2016-QinJYW #image #recognition- Building facade recognition from aerial images using Delaunay Triangulation induced feature perceptual grouping (XQ, MJ, XY, JW0), pp. 3368–3373.
ICPR-2016-QuachtranHS #detection #learning- Detection of Intracranial Hypertension using Deep Learning (BQ, RBH, FS), pp. 2491–2496.
ICPR-2016-QuWL #recognition #representation- In-air handwritten Chinese character recognition using discriminative projection based on locality-sensitive sparse representation (XQ, WW, KL), pp. 1137–1140.
ICPR-2016-RaiNCD #clustering #graph #multi- Partial Multi-View Clustering using Graph Regularized NMF (NR, SN, SC, OD), pp. 2192–2197.
ICPR-2016-RaytchevKTK #kernel #recognition #representation- Higher-level representation of local spatio-temporal features for human action recognition using Subspace Matching Kernels (BR, HK, TT, KK), pp. 3862–3867.
ICPR-2016-Robles-KellyW #graph #image- Semi-supervised image labelling using barycentric graph embeddings (ARK, RW), pp. 1518–1523.
ICPR-2016-Rowekamp #performance- Fast thresholding of high dimensional Euclidean distances using binary squaring (JHR), pp. 3103–3108.
ICPR-2016-SagawaSHOKF #automation #feature model #robust- Automatic feature extraction using CNN for robust active one-shot scanning (RS, YS, TH, SO, HK, RF), pp. 234–239.
ICPR-2016-SahooA0 #approach #automation #clustering #generative #multi- Automatic generation of biclusters from gene expression data using multi-objective simulated annealing approach (PS, SA, SS0), pp. 2174–2179.
ICPR-2016-SaikiaSSKG #analysis #kernel #learning #multi- Multiple kernel learning using data envelopment analysis and feature vector selection and projection (GS, SS, VVS, RDK, PG), pp. 520–524.
ICPR-2016-SerinoB #3d- Using local convexities as anchor points for 3D curve skeletonization (LS, GSdB), pp. 2854–2859.
ICPR-2016-ShigetaMKSTMI #segmentation- A bone marrow cavity segmentation method using wavelet-based texture feature (HS, TM, JK, SS, HT, HM, MI), pp. 2133–2138.
ICPR-2016-ShiWXW #adaptation #image- OTSU guided adaptive binarization of CAPTCHA image using gamma correction (CS, YW, BX, CW), pp. 3962–3967.
ICPR-2016-SidibeRM #detection #multi #on the- On spatio-temporal saliency detection in videos using multilinear PCA (DS, MR, FM), pp. 1876–1880.
ICPR-2016-SuCHH #detection #image #modelling #recognition #symmetry- Moment-based symmetry detection for scene modeling and recognition using RGB-D images (JYS, SCC, JWH, THH), pp. 3621–3626.
ICPR-2016-SunBTTH #detection #learning #locality- Tattoo detection and localization using region-based deep learning (ZS, JB, PT, MT, AH), pp. 3055–3060.
ICPR-2016-SunHL #detection #image- Context based face spoofing detection using active near-infrared images (XS0, LH0, CL), pp. 4262–4267.
ICPR-2016-TakabeTKSMNY #consistency #detection- Moving object detection from a point cloud using photometric and depth consistencies (AT, HT, NK, TS, TM, SN, NY), pp. 561–566.
ICPR-2016-TakadaHJ - Human tracking in crowded scenes using target information at previous frames (HT, KH, PJ), pp. 1809–1814.
ICPR-2016-TakahashiIKOM #multi #robust- Robust volleyball tracking system using multi-view cameras (MT, KI, MK, HO, TM), pp. 2740–2745.
ICPR-2016-TakezawaHT #detection #documentation #image- Camera-captured document image perspective distortion correction using vanishing point detection based on Radon transform (YT, MH, ST), pp. 3968–3974.
ICPR-2016-TianMO #detection #embedded #low cost #recognition- Spoofing detection for embedded face recognition system using a low cost stereo camera (GT, TM, YO), pp. 1017–1022.
ICPR-2016-TizhooshMZD #image #retrieval- Barcodes for medical image retrieval using autoencoded Radon transform (HRT, CM, SZ, SD), pp. 3150–3155.
ICPR-2016-ToyamaMS #clustering #performance- Fast template matching using Brick Partitioning and initial threshold (FT, HM, KS), pp. 687–691.
ICPR-2016-VinhEPBLR #modelling #random #robust- Training robust models using Random Projection (XVN, SME, SP, JB0, CL, KR), pp. 531–536.
ICPR-2016-WangLLGTO #gesture #network #recognition #scalability- Large-scale Isolated Gesture Recognition using Convolutional Neural Networks (PW, WL, SL, ZG, CT, PO), pp. 7–12.
ICPR-2016-WangLLZGO #gesture #network #recognition #scalability- Large-scale Continuous Gesture Recognition Using Convolutional Neural Networks (PW, WL, SL, YZ, ZG, PO), pp. 13–18.
ICPR-2016-WangWH #analysis #network- Network entropy analysis using the Maxwell-Boltzmann partition function (JW, RCW0, ERH), pp. 1321–1326.
ICPR-2016-WarisIG - Object proposals using CNN-based edge filtering (MAW, AI, MG), pp. 627–632.
ICPR-2016-Williams #classification #network- Underwater target classification in synthetic aperture sonar imagery using deep convolutional neural networks (DPW), pp. 2497–2502.
ICPR-2016-WuLZN #modelling #re-engineering- Model-based face reconstruction using SIFT flow registration and spherical harmonics (FW, SL, TZ, KNN), pp. 1774–1779.
ICPR-2016-XuLHWLWHC #3d #image #multi #retrieval #word- Bag of temporal co-occurrence words for retrieval of focal liver lesions using 3D multiphase contrast-enhanced CT images (YX, LL, HH, DW, YL, JW0, XHH, YWC), pp. 2282–2287.
ICPR-2016-YamashitaFYF #detection #multi #network- Pedestrian and part position detection using a regression-based multiple task deep convolutional neural network (TY, HF, YY, HF), pp. 3500–3505.
ICPR-2016-YangJNL #network #normalisation #online #recognition- Rotation-free online handwritten character recognition using dyadic path signature features, hanging normalization, and deep neural network (WY, LJ, HN, TL), pp. 4083–4088.
ICPR-2016-YangL #learning #nondeterminism- Active learning using uncertainty information (YY, ML), pp. 2646–2651.
ICPR-2016-YB #3d #optimisation #video- Rate distortion optimization using SSIM for 3D video coding (HY, PKB), pp. 1261–1266.
ICPR-2016-YeWH #generative #graph- Analyzing graph time series using a generative model (CY, RCW0, ERH), pp. 3338–3343.
ICPR-2016-YildizU #classification #incremental #order- Incremental construction of rule ensembles using classifiers produced by different class orderings (OTY, AU), pp. 492–497.
ICPR-2016-YodaNTKYK #image #multi- Dynamic photometric stereo method using multi-tap CMOS image sensor (TY, HN, RiT, KK, KY, SK), pp. 2356–2361.
ICPR-2016-YuLC #multi- Recognizing text in historical maps using maps from multiple time periods (RY, ZL, YYC), pp. 3993–3998.
ICPR-2016-YuWSH #invariant #recognition- View invariant gait recognition using only one uniform model (SY, QW, LS, YH), pp. 889–894.
ICPR-2016-ZemeneTPP #clustering #detection #set- Simultaneous clustering and outlier detection using dominant sets (EZ, YTT, AP0, MP), pp. 2325–2330.
ICPR-2016-ZhangGSSL #robust- Robust tensor factorization using maximum correntropy criterion (MZ, YG, CS, JLS, JL), pp. 4184–4189.
ICPR-2016-ZhangLQ #network- Wake-up-word spotting using end-to-end deep neural network system (SZ, WL, YQ0), pp. 2878–2883.
ICPR-2016-ZhangWY #correlation #image- Theoretical criterion for image matching using GPT correlation (SZ, TW, YY), pp. 555–560.
ICPR-2016-ZhaoIBJ #fault #predict- Wind turbine fault prediction using soft label SVM (RZ, MRAI, KPB, QJ), pp. 3192–3197.
ICPR-2016-ZhaoMFQH #performance #predict- Fast motion deblurring using gyroscopes and strong edge prediction (JZ, JM, BF, SQ, FH), pp. 739–744.
ICPR-2016-ZhengCZZL #independence #network- Text-independent voice conversion using deep neural network based phonetic level features (HZ, WC, TZ, SZ, ML0), pp. 2872–2877.
ICPR-2016-ZhengLZW #image #multi- Multi-focus image fusion using quaternion wavelet transform (XNZ, XL, ZZ, XJW), pp. 883–888.
ICPR-2016-ZhugeHNY #clustering #feature model #graph- Unsupervised feature extraction using a learned graph with clustering structure (WZ, CH, FN, DY), pp. 3597–3602.
ICPR-2016-ZhuZMSSS #3d #gesture #network #recognition #scalability- Large-scale Isolated Gesture Recognition using pyramidal 3D convolutional networks (GZ, LZ0, LM, JS, JS, PS), pp. 19–24.
KDD-2016-AgostaGHIKZ #clustering #data analysis #scalability- Scalable Data Analytics Using R: Single Machines to Hadoop Spark Clusters (JMA, DG, RH, MI, SK, MZ), p. 2115.
KDD-2016-BrooksKG #data-driven #predict #ranking- Developing a Data-Driven Player Ranking in Soccer Using Predictive Model Weights (JB, MK, JVG), pp. 49–55.
KDD-2016-ChakrabortyVJS #predict- Predicting Socio-Economic Indicators using News Events (SC, AV, SJ, LS), pp. 1455–1464.
KDD-2016-ChenLHYGG - City-Scale Map Creation and Updating using GPS Collections (CC0, CL, QH, QY0, DG, LJG), pp. 1465–1474.
KDD-2016-HaarenSDF #machine learning- Analyzing Volleyball Match Data from the 2014 World Championships Using Machine Learning Techniques (JVH, HBS, JD, PF), pp. 627–634.
KDD-2016-HaPK #categorisation #e-commerce #multi #network #scalability- Large-Scale Item Categorization in e-Commerce Using Multiple Recurrent Neural Networks (JH, HP, JK), pp. 107–115.
KDD-2016-HuoNH #effectiveness #learning #metric #robust- Robust and Effective Metric Learning Using Capped Trace Norm: Metric Learning via Capped Trace Norm (ZH, FN, HH), pp. 1605–1614.
KDD-2016-KuangTCPSP #self- Computational Drug Repositioning Using Continuous Self-Controlled Case Series (ZK, JAT, MC, PLP, RMS, DP), pp. 491–500.
KDD-2016-NandiMADB #control flow #detection #execution #graph #mining- Anomaly Detection Using Program Control Flow Graph Mining From Execution Logs (AN, AM, SA, GBD, SB), pp. 215–224.
KDD-2016-ReisFMB #detection #incremental #online #performance- Fast Unsupervised Online Drift Detection Using Incremental Kolmogorov-Smirnov Test (DMdR, PAF, SM, GEAPAB), pp. 1545–1554.
KDD-2016-SinghSA #independence #machine learning- Question Independent Grading using Machine Learning: The Case of Computer Program Grading (GS, SS, VA), pp. 263–272.
KDD-2016-TaghaviLK #machine learning #memory management #recommendation- Compute Job Memory Recommender System Using Machine Learning (TT, ML, YK), pp. 609–616.
KDD-2016-TingZCZZ #difference- Overcoming Key Weaknesses of Distance-based Neighbourhood Methods using a Data Dependent Dissimilarity Measure (KMT, YZ, MJC, YZ, ZHZ), pp. 1205–1214.
KDD-2016-YinW #algorithm #clustering #online- A Text Clustering Algorithm Using an Online Clustering Scheme for Initialization (JY, JW), pp. 1995–2004.
KDD-2016-ZhangZYZHH #modelling #named #social #social media- GMove: Group-Level Mobility Modeling Using Geo-Tagged Social Media (CZ0, KZ, QY0, LZ, TH, JH0), pp. 1305–1314.
KDD-2016-ZhaoATBDBKD #approach #detection #parametricity #strict- A Non-parametric Approach to Detect Epileptogenic Lesions using Restricted Boltzmann Machines (YZ, BA, TT, KEB, JGD, CEB, RK, OD), pp. 373–382.
BX-2016-SemerathDHV #co-evolution #logic #modelling #satisfiability #synthesis- Change Propagation of View Models by Logic Synthesis using SAT solvers (OS, CD, ÁH0, DV), pp. 40–44.
ECMFA-2016-HeimNRW #composition #static typing #type safety- Compositional Language Engineering Using Generated, Extensible, Static Type-Safe Visitors (RH, PMSN, BR, AW), pp. 67–82.
ECMFA-2016-KessentiniSW #approach #automation #co-evolution #metamodelling #multi #optimisation- Automated Metamodel/Model Co-evolution Using a Multi-objective Optimization Approach (WK, HAS, MW), pp. 138–155.
ICMT-2016-MooijJEJR #industrial #open source #parsing- Industrial Software Rejuvenation Using Open-Source Parsers (AJM, MMJ, GE, PJ, AR), pp. 157–172.
ICMT-2016-RoccoRPCLG #atl #collaboration #framework #modelling #platform- Using ATL Transformation Services in the MDEForge Collaborative Modeling Platform (JDR, DDR, AP, JSC, JdL, EG), pp. 70–78.
ICMT-2016-SalayZC #reuse- Correct Reuse of Transformations is Hard to Guarantee (RS, SZ, MC), pp. 107–122.
MoDELS-2016-BergmannDRV #bidirectional #collaboration #data access #modelling- Query-based access control for secure collaborative modeling using bidirectional transformations (GB, CD, IR, DV), pp. 351–361.
MoDELS-2016-Blache #bound #c #development #embedded #modelling #safety- Handling index-out-of-bounds in safety-critical embedded C code using model-based development (GB), pp. 143–149.
MoDELS-2016-GolraBDGG #agile #modelling- Using free modeling as an agile method for developing domain specific modeling languages (FRG, AB, FD, SG, CG), pp. 24–34.
MoDELS-2016-KalenkovaALR #mining #modelling #process- Process mining using BPMN: relating event logs and process models (AAK, WMPvdA, IAL, VAR), p. 123.
MoDELS-2016-SzvetitsZ #comprehension #design #empirical #modelling #runtime- Controlled experiment on the comprehension of runtime phenomena using models created at design time (MS, UZ), pp. 151–161.
Onward-2016-MarterBLH #identifier #lightweight #programming #readability #similarity #source code- Lightweight programming experiments without programmers and programs: an example study on the effect of similarity and number of object identifiers on the readability of source code using natural texts (TM, PB, PL, SH), pp. 1–14.
OOPSLA-2016-GollamudiC #automation #policy #security- Automatic enforcement of expressive security policies using enclaves (AG, SC), pp. 494–513.
OOPSLA-2016-Itzhaky0SYLLC #algorithm #divide and conquer #programming- Deriving divide-and-conquer dynamic programming algorithms using solver-aided transformations (SI, RS0, ASL, KY, YL, CEL, RAC), pp. 145–164.
OOPSLA-2016-SteimannHU #attribute grammar #constraints #source code- Computing repair alternatives for malformed programs using constraint attribute grammars (FS, JH, BU), pp. 711–730.
OOPSLA-2016-WangGS #named #spreadsheet- FIDEX: filtering spreadsheet data using examples (XW0, SG, RS), pp. 195–213.
AdaEurope-2016-LaaliLHSS #detection #fault #online #testing- Test Case Prioritization Using Online Fault Detection Information (ML, HL, MH, MS, HWS), pp. 78–93.
AdaEurope-2016-MohaqeqiAY #analysis #data flow #graph #modelling #realtime- Modeling and Analysis of Data Flow Graphs Using the Digraph Real-Time Task Model (MM, JA, WY0), pp. 15–29.
AdaEurope-2016-Wittiger #csp- Eliminating Data Race Warnings Using CSP (MW), pp. 30–43.
LOPSTR-2016-AngelisFMPP #horn clause #process #verification- Verification of Time-Aware Business Processes Using Constrained Horn Clauses (EDA, FF, MCM, AP, MP), pp. 38–55.
PADL-2016-CaretteS #algebra #probability #source code- Simplifying Probabilistic Programs Using Computer Algebra (JC, CcS), pp. 135–152.
PADL-2016-JelinekB #array #constraints #logic programming- Using Constraint Logic Programming to Schedule Solar Array Operations on the International Space Station (JJ, RB), pp. 3–12.
PLDI-2016-KimJJKL #distributed #framework #replication- A distributed OpenCL framework using redundant computation and data replication (JK, GJ, JJ, JK, JL), pp. 553–569.
PLDI-2016-LaurenzanoHSMMT #approximate #latency- Input responsiveness: using canary inputs to dynamically steer approximation (MAL, PH, MS, SAM, JM, LT), pp. 161–176.
POPL-2016-0001NMR #invariant #learning- Learning invariants using decision trees and implication counterexamples (PG0, DN, PM, DR), pp. 499–512.
POPL-2016-AltenkirchK #induction #type system- Type theory in type theory using quotient inductive types (TA, AK), pp. 18–29.
POPL-2016-KatzEY #modelling #predict- Estimating types in binaries using predictive modeling (OK, REY, EY), pp. 313–326.
POPL-2016-PlotkinBLRV #network #scalability #symmetry #verification- Scaling network verification using symmetry and surgery (GDP, NB, NPL, AR, GV), pp. 69–83.
POPL-2016-SinghG #data type #spreadsheet- Transforming spreadsheet data types using examples (RS, SG), pp. 343–356.
PPDP-2016-AlbertAG #concurrent #imperative #testing- Testing of concurrent and imperative software using CLP (EA, PA, MGZ), pp. 1–8.
SAS-2016-GharatKM #analysis #graph #points-to- Flow- and Context-Sensitive Points-To Analysis Using Generalized Points-To Graphs (PMG, UPK, AM), pp. 212–236.
ASE-2016-AbdessalemNBS #multi #network #testing- Testing advanced driver assistance systems using multi-objective search and neural networks (RBA, SN, LCB, TS), pp. 63–74.
ASE-2016-AlmhanaMK0 #debugging #multi #recommendation- Recommending relevant classes for bug reports using multi-objective search (RA, WM, MK, AO), pp. 286–295.
ASE-2016-AlshanqitiHK #contract #dynamic analysis #reverse engineering #visual notation- Visual contract extractor: a tool for reverse engineering visual contracts using dynamic analysis (AMA, RH, TK), pp. 816–821.
ASE-2016-BaekB #android #automation #comparison #modelling #multi #testing #user interface- Automated model-based Android GUI testing using multi-level GUI comparison criteria (YMB, DHB), pp. 238–249.
ASE-2016-FengJCF #comprehension #image #multi- Multi-objective test report prioritization using image understanding (YF, JAJ, ZC, CF), pp. 202–213.
ASE-2016-MoonenABR #guidelines #mining #recommendation- Practical guidelines for change recommendation using association rule mining (LM, SDA, DB, TR), pp. 732–743.
ASE-2016-Mougouei #dependence #graph #integer #programming #requirements- Factoring requirement dependencies in software requirement selection using graphs and integer programming (DM), pp. 884–887.
ASE-2016-Nishi #bound #model checking #programming #towards- Towards bounded model checking using nonlinear programming solver (MN), pp. 560–565.
ASE-2016-PatrickCSG #automation #generative #image- Automatic test image generation using procedural noise (MP, MDC, ROJHS, CAG), pp. 654–659.
ASE-2016-PeldszusKLS #design #detection #evolution #incremental #multi #object-oriented #pattern matching #source code- Continuous detection of design flaws in evolving object-oriented programs using incremental multi-pattern matching (SP, GK, ML, SS), pp. 578–589.
ASE-2016-RahmanR #automation #concept #crowdsourcing #named #query- QUICKAR: automatic query reformulation for concept location using crowdsourced knowledge (MMR, CKR), pp. 220–225.
ASE-2016-YamadaBAKC #combinator #generative #satisfiability #testing- Greedy combinatorial test case generation using unsatisfiable cores (AY, AB, CA, TK, EHC), pp. 614–624.
FSE-2016-Alexandru #network #synthesis- Guided code synthesis using deep neural networks (CVA), pp. 1068–1070.
FSE-2016-Hammoudi #testing #tool support #web- Regression testing of web applications using Record/Replay tools (MH), pp. 1079–1081.
FSE-2016-Luo16a #automation #performance #profiling #testing- Automatic performance testing using input-sensitive profiling (QL), pp. 1139–1141.
FSE-2016-NguyenHCNMRND #api #fine-grained #learning #recommendation #statistics- API code recommendation using statistical learning from fine-grained changes (ATN0, MH, MC, HAN, LM, ER, TNN, DD), pp. 511–522.
FSE-2016-NiuWG #requirements #traceability- Gray links in the use of requirements traceability (NN, WW0, AG), pp. 384–395.
FSE-2016-Rolim #automation- Automating repetitive code changes using examples (RR), pp. 1063–1065.
- ICSE-2016-BersaniBGKP #performance #pipes and filters #scalability
- Efficient large-scale trace checking using mapreduce (MMB, DB, CG, SK, PSP), pp. 888–898.
- ICSE-2016-CheungCLX #automation #clustering #detection #named #smell #spreadsheet
- CUSTODES: automatic spreadsheet cell clustering and smell detection using strong and weak features (SCC, WC, YL, CX0), pp. 464–475.
- ICSE-2016-DesaiGHJKMRR #natural language #synthesis
- Program synthesis using natural language (AD, SG, VH, NJ, AK, MM, SR, SR), pp. 345–356.
- ICSE-2016-MullerF #metric #online #predict #quality
- Using (bio)metrics to predict code quality online (SCM, TF0), pp. 452–463.
- ICSE-2016-NearJ #data access #debugging #security #web
- Finding security bugs in web applications using a catalog of access control patterns (JPN, DJ0), pp. 947–958.
- ICSE-2016-Rubio-Gonzalez0 #analysis #float #precise
- Floating-point precision tuning using blame analysis (CRG, CN0, BM, KS, JD, WK, CI, WL, DHB, DH), pp. 1074–1085.
- ICSE-2016-SuRT #evaluation #model checking #parametricity #reliability #runtime
- Reliability of Run-Time Quality-of-Service evaluation using parametric model checking (GS, DSR, GT), pp. 73–84.
- ICSE-2016-ZhangZZH #classification #fault #predict
- Cross-project defect prediction using a connectivity-based unsupervised classifier (FZ0, QZ, YZ0, AEH), pp. 309–320.
GPCE-2016-Al-HajjajiKTLS #incremental #named #performance #product line #testing- IncLing: efficient product-line testing using incremental pairwise sampling (MAH, SK, TT, ML, GS), pp. 144–155.
SLE-2016-AmorimEWV #code completion- Principled syntactic code completion using placeholders (LEdSA, SE, GW, EV), pp. 163–175.
SLE-2016-VoelterSLKEB #consistency #development #editing #performance #projectional- Efficient development of consistent projectional editors using grammar cells (MV, TS, SL, BK, SE, TB), pp. 28–40.
ASPLOS-2016-BrownNE #how #order #static analysis- How to Build Static Checking Systems Using Orders of Magnitude Less Code (FB, AN, DRE), pp. 143–157.
ASPLOS-2016-GuoSCM #approximate #image #memory management- High-Density Image Storage Using Approximate Memory Cells (QG, KS, LC, HSM), pp. 413–426.
ASPLOS-2016-ZhangLJ #concurrent #detection #hardware #memory management #named #performance #transaction- TxRace: Efficient Data Race Detection Using Commodity Hardware Transactional Memory (TZ, DL, CJ), pp. 159–173.
CASE-2016-AndreJT #assembly #modelling #reliability- Reliable robot assembly using haptic rendering models in combination with particle filters (RA, MJ, UT), pp. 1134–1139.
CASE-2016-ChengZWCJL #case study #data mining #energy #fault #mining- Case studies of fault diagnosis and energy saving in buildings using data mining techniques (ZC, QZ, FW, ZC, YJ, YL), pp. 646–651.
CASE-2016-DuH #petri net #robust- Robust control of Backward Conflict Free Systems with Resources using Petri nets (ND, HH), pp. 1034–1041.
CASE-2016-GargSKJMMG #adaptation #automation #locality #process- Tumor localization using automated palpation with Gaussian Process Adaptive Sampling (AG, SS, RK, YJ, SM, LM, KG), pp. 194–200.
CASE-2016-HsuYL #analysis #process- Effect analysis and optimal combination of cutting conditions on the cutting torque of tapping processes using Taguchi methods (CCH, SSY, JIL), pp. 1215–1218.
CASE-2016-IrieST #dependence- Target-less camera-LiDAR extrinsic calibration using a bagged dependence estimator (KI, MS, MT), pp. 1340–1347.
CASE-2016-LaskeyLCGHPDG #learning- Robot grasping in clutter: Using a hierarchy of supervisors for learning from demonstrations (ML, JL, CC, DVG, WYSH, FTP, ADD, KG), pp. 827–834.
CASE-2016-LiSXSL #framework #hybrid #low cost- A hybrid model and kinematic-free control framework for a low-cost deformable manipulator using in home service (GL, LS0, SX, DS, JL), pp. 1002–1007.
CASE-2016-LiuT #distributed #hybrid #multi #network- Distributed vision network for multiple target tracking using a dynamic hybrid consensus filter (GL, GT), pp. 805–808.
CASE-2016-MahadevKRFB #grid- Collecting a swarm in a grid environment using shared, global inputs (AVM, DK, JMR, SPF, ATB), pp. 1231–1236.
CASE-2016-ShahrokhiB - Object manipulation and position control using a swarm with global inputs (SS, ATB), pp. 561–566.
CASE-2016-SrinivasanC #approach #approximate #orthogonal- Path planning with user route preference - A reward surface approximation approach using orthogonal Legendre polynomials (ARS, SC), pp. 1100–1105.
CASE-2016-TanCPT #automation #design #diagrams #evaluation #layout- Automated design evaluation on layout of Piping and Instrumentation Diagram using Histogram of Connectivity (WCT, IMC, SJP, HKT), pp. 1295–1300.
CASE-2016-TsaiWPXLFZ #behaviour #predict #process #smarttech- Context-aware activity prediction using human behavior pattern in real smart home environments (MJT, CLW, SKP, YX, TYL, LCF, YCZ), pp. 168–173.
CASE-2016-WiebeRRV #approach #automation #composition #delivery #fault #generative #injection #simulation #testing- Automated test suite generation to test modular designed packaging machines using Fault Injection and a simulink-based simulation approach (FW, SR, SR, BVH), pp. 758–765.
CASE-2016-YangH #distributed #petri net- Mono-T-semiflow systems with resources and their distributed control using Petri nets (YY, HH), pp. 1042–1048.
CASE-2016-ZouFP #estimation #metric #network- Psychoacoustic impacts estimation in manufacturing based on accelerometer measurement using artificial neural networks (MZ, LF, JP), pp. 1203–1208.
CAV-2016-KafleGM #abstract interpretation #automaton #finite #horn clause #named #verification- Rahft: A Tool for Verifying Horn Clauses Using Abstract Interpretation and Finite Tree Automata (BK, JPG, JFM), pp. 261–268.
CAV-2016-MuellerSS #automation #execution #symbolic computation #verification- Automatic Verification of Iterated Separating Conjunctions Using Symbolic Execution (PM, MS, AJS), pp. 405–425.
CAV-2016-PernsteinerLTTW #modelling #safety- Investigating Safety of a Radiotherapy Machine Using System Models with Pluggable Checkers (SP, CL, ET, ZT, XW0, MDE, JJ), pp. 23–41.
ICST-2016-HuoC - Interpreting Coverage Information Using Direct and Indirect Coverage (CH, JC), pp. 234–243.
ICST-2016-MahajanLBH #debugging #visual notation #web- Using Visual Symptoms for Debugging Presentation Failures in Web Applications (SM, BL, PB, WGJH), pp. 191–201.
ICST-2016-MarculescuFT #evaluation #search-based #testing- Using Exploration Focused Techniques to Augment Search-Based Software Testing: An Experimental Evaluation (BM, RF, RT), pp. 69–79.
ICTSS-2016-EnoiuSCFP #embedded #generative #model checking #testing- Mutation-Based Test Generation for PLC Embedded Software Using Model Checking (EPE, DS, AC, RF, PP), pp. 155–171.
ICTSS-2016-PradhanWAYL #industrial #multi #named #testing- STIPI: Using Search to Prioritize Test Cases Based on Multi-objectives Derived from Industrial Practice (DP, SW0, SA0, TY0, ML), pp. 172–190.
ICTSS-2016-ReichstallerEKR #learning #testing- Risk-Based Interoperability Testing Using Reinforcement Learning (AR, BE, AK, WR, MG), pp. 52–69.
IJCAR-2016-AthanasiouLW #bound #equation #thread #verification- Unbounded-Thread Program Verification using Thread-State Equations (KA, PL, TW), pp. 516–531.
IJCAR-2016-DawsonBG #calculus #logic #theorem- Machine-Checked Interpolation Theorems for Substructural Logics Using Display Calculi (JED, JB, RG), pp. 452–468.
TAP-2016-ReichlFT #formal method #validation #verification- Using Formal Methods for Verification and Validation in Railway (KR, TF, PT), pp. 3–13.
VMCAI-2016-MarechalFKMP #approximate #multi #theorem- Polyhedral Approximation of Multivariate Polynomials Using Handelman's Theorem (AM, AF, TK0, DM, MP), pp. 166–184.
CBSE-2015-MouelhiACM #behaviour #component #contract #design #object-oriented- Object-Oriented Component-Based Design using Behavioral Contracts: Application to Railway Systems (SM, KA, SC, HM), pp. 49–58.
ECSA-2015-AgrawalP #adaptation #framework #towards #web- Towards a Framework for Building Adaptive App-Based Web Applications Using Dynamic Appification (AA, TVP), pp. 37–44.
ECSA-2015-GalsterA #agile #architecture #comprehension #development- Understanding the Use of Reference Architectures in Agile Software Development Projects (MG, SA), pp. 268–276.
ECSA-2015-HansenM #automation #community #composition #detection- (Automated) Software Modularization Using Community Detection (KMH, KM), pp. 95–102.
ECSA-2015-TahriDP #architecture #deployment #distributed #feature model #modelling #smarttech- Using Feature Models for Distributed Deployment in Extended Smart Home Architecture (AT, LD, JP), pp. 285–293.
QoSA-2015-HofigZS #automation #dependence- Automated Failure Propagation using Inner Port Dependency Traces (KH, MZ, KS), pp. 123–128.
DocEng-2015-FerreiraLCFSR #automation #classification #documentation #summary- Automatic Document Classification using Summarization Strategies (RF, RDL, LdSC, FF, SJS, MR), pp. 69–72.
DocEng-2015-LesnikovaDE #rdf- Interlinking English and Chinese RDF Data Using BabelNet (TL, JD, JE), pp. 39–42.
DRR-2015-BideaultMCP #architecture #regular expression #word- Spotting handwritten words and REGEX using a two stage BLSTM-HMM architecture (GB, LM, CC, TP).
DRR-2015-MehriSHGAM #documentation #image #segmentation- Use of SLIC superpixels for ancient document image enhancement and segmentation (MM, NS, PH, PGK, NEBA, RM), p. 940205.
DRR-2015-PengCN #approach- Boost OCR accuracy using iVector based system combination approach (XP, HC, PN).
DRR-2015-RabaevCEK #documentation #programming- Aligning transcript of historical documents using dynamic programming (IR, RC, JES, KK).
DRR-2015-SitaramHPSK #recognition #word- Offline handwritten word recognition using MQDF-HMMs (RS, MH, AP, DS, SK).
DRR-2015-StalnakerZ #retrieval- Math expression retrieval using an inverted index over symbol pairs (DS, RZ), p. 940207.
HT-2015-Bayomi #adaptation #corpus #framework #reuse- A Framework to Provide Customized Reuse of Open Corpus Content for Adaptive Systems (MB), pp. 315–318.
HT-2015-BlountMW #logic #social #web- An Investigation into the Use of Logical and Rhetorical Tactics within Eristic Argumentation on the Social Web (TB, DEM, MJW), pp. 195–199.
JCDL-2015-CuongCKL #documentation #higher-order #information management #performance- Scholarly Document Information Extraction using Extensible Features for Efficient Higher Order Semi-CRFs (NVC, MKC, MYK, WSL), pp. 61–64.
PODS-2015-CateCST #ontology- High-Level Why-Not Explanations using Ontologies (BtC, CC, ES, WCT), pp. 31–43.
SIGMOD-2015-BarthelsLAK #in memory- Rack-Scale In-Memory Join Processing using RDMA (CB, SL, GA, DK), pp. 1463–1475.
SIGMOD-2015-HuLWTGY #automation #documentation #named #social #social media- DocRicher: An Automatic Annotation System for Text Documents Using Social Media (QH, QL, XW, AKHT, SG, JY), pp. 901–906.
SIGMOD-2015-NothaftMDZLYKAH #data-driven #scalability- Rethinking Data-Intensive Science Using Scalable Analytics Systems (FAN, MM, TD, ZZ, UL, CY, JK, AA, JH, ML, MJF, ADJ, DAP), pp. 631–646.
SIGMOD-2015-TuR #named #query- DunceCap: Query Plans Using Generalized Hypertree Decompositions (ST, CR), pp. 2077–2078.
SIGMOD-2015-WongHFXL #approach #as a service #database #named #parallel- Thrifty: Offering Parallel Database as a Service using the Shared-Process Approach (PW, ZH, ZF, WX, EL), pp. 1063–1068.
SIGMOD-2015-XiaoBME #metadata #summary- Even Metadata is Getting Big: Annotation Summarization using InsightNotes (DX, AB, TM, MYE), pp. 1409–1414.
SIGMOD-2015-YanZHSMZM #detection #distributed- Distributed Outlier Detection using Compressive Sensing (YY, JZ, BH, XS, JM, ZZ, TM), pp. 3–16.
SIGMOD-2015-ZhangCPSX #graph #statistics- Private Release of Graph Statistics using Ladder Functions (JZ, GC, CMP, DS, XX), pp. 731–745.
VLDB-2015-DeutchGM #datalog #query #source code- Selective Provenance for Datalog Programs Using Top-K Queries (DD, AG, YM), pp. 1394–1405.
VLDB-2015-HeCMPS #named #synthesis- DPT: Differentially Private Trajectory Synthesis Using Hierarchical Reference Systems (XH, GC, AM, CMP, DS), pp. 1154–1165.
VLDB-2015-HeGC #corpus #named #semantics- SEMA-JOIN: Joining Semantically-Related Tables Using Big Table Corpora (YH, KG, XC), pp. 1358–1369.
VLDB-2015-LazersonSKSGS #distributed #monitoring- Monitoring Distributed Streams using Convex Decompositions (AL, IS, DK, AS, MNG, VS), pp. 545–556.
VLDB-2015-ParkMS #pipes and filters #probability #query- Processing of Probabilistic Skyline Queries Using MapReduce (YP, JKM, KS), pp. 1406–1417.
VLDB-2015-ShinWWSZR #incremental #knowledge base- Incremental Knowledge Base Construction Using DeepDive (JS, SW, FW, CDS, CZ, CR), pp. 1310–1321.
CSEET-2015-SedanoP #experience #student- Enhancing Student Experience in Team-Based Project Courses Using Essence Reflection Meetings (TS, CP), pp. 10–12.
EDM-2015-AlHarbiH #automation #modelling #segmentation #topic- Using Topic Segmentation Models for the Automatic Organisation of MOOCs resources (GA, TH), pp. 524–527.
EDM-2015-AnayaGLH #analysis #approach #collaboration #diagrams #network #social- An Approach of Collaboration Analytics in MOOCs Using Social Network Analysis and Influence Diagram (ARA, JGB, EL, FHdO), pp. 492–495.
EDM-2015-BorjiginMSZ #assessment #behaviour- Skill Assessment Using Behavior Data in Virtual World (AB, CM, ZS, ZZ), pp. 570–571.
EDM-2015-BotelhoAWH #performance #predict #student- Predicting Student Aptitude Using Performance History (AFB, SAA, HW, NTH), pp. 622–623.
EDM-2015-EmondB #classification #process #sequence #student- Analyzing Student Inquiry Data Using Process Discovery and Sequence Classification (BE, SB), pp. 412–415.
EDM-2015-Fancsali #algebra #behaviour #learning #modelling #visual notation- Confounding Carelessness? Exploring Causal Relationships Between Carelessness, Affect, Behavior, and Learning in Cognitive Tutor Algebra Using Graphical Causal Models (SF), pp. 508–511.
EDM-2015-Feild #performance #student- Improving Student Performance Using Nudge Analytics (JLF), pp. 464–467.
EDM-2015-GandhiBD #education #topic #visual notation #word- Topic Transition in Educational Videos Using Visually Salient Words (AG, AB, OD), pp. 289–296.
EDM-2015-Geryk #comprehension #visual notation- Using Visual Analytics Tool for Improving Data Comprehension (JG), pp. 327–334.
EDM-2015-InwegenAWH - Using Partial Credit and Response History to Model User Knowledge (EVI, SA, YW0, NTH), pp. 313–319.
EDM-2015-LuoSMG #predict #student #word- Predicting Student Grade based on Free-style Comments using Word2Vec and ANN by Considering Prediction Results Obtained in Consecutive Lessons (JL, SES, TM, KG), pp. 396–399.
EDM-2015-MacHardyP #big data #education- Evaluating Educational Videos using Bayesian Knowledge Tracing and Big Data (ZM, ZAP), pp. 424–427.
EDM-2015-NicolajsenP #adaptation #collaboration #component- Using Knowledge Components for Collaborative Filtering in Adaptive Tutoring Systems (PHN, BP), pp. 536–539.
EDM-2015-Rihak #adaptation #modelling- Use of Time Information in Models behind Adaptive Practice System for Building Fluency in Mathematics (JR), pp. 642–644.
ITiCSE-2015-Dickson #development #education #game studies- Using Unity to Teach Game Development: When You’ve Never Written a Game (PED), pp. 75–80.
ITiCSE-2015-Harms15a #java- Using Personal Robots and Myro/Java in the First Computer Science Course (DEH), p. 332.
ITiCSE-2015-KirkpatrickP #assurance #operating system #process- Using the Readiness Assurance Process and Metacognition in an Operating Systems Course (MSK, SP), pp. 183–188.
ITiCSE-2015-Rubio #analysis #automation #categorisation #clustering #programming #student- Automatic Categorization of Introductory Programming Students using Cluster Analysis (MAR), p. 340.
ITiCSE-2015-TarmazdiVSFF #learning #visualisation- Using Learning Analytics to Visualise Computer Science Teamwork (HT, RV, CS, KEF, NJGF), pp. 165–170.
ITiCSE-2015-WangMSLCW #data access #education #named #visualisation- RBACvisual: A Visualization Tool for Teaching Access Control using Role-based Access Control (MW, JM, CKS, TL, SC, CW), pp. 141–146.
SIGITE-2015-ZhouCKNCUG #collaboration #feedback #scalability #student- M-CAFE 1.0: Motivating and Prioritizing Ongoing Student Feedback During MOOCs and Large on-Campus Courses using Collaborative Filtering (MZ, AC, SK, BN, CC, KU, KG), pp. 153–158.
ICPC-2015-CosmaM #component #comprehension #visual notation #web- Understanding web applications using component based visual patterns (DCC, PFM), pp. 281–284.
ICPC-2015-Escobar-AvilaVH #bytecode #categorisation- Unsupervised software categorization using bytecode (JEA, MLV, SH), pp. 229–239.
ICPC-2015-HillSP #evaluation #feature model- Exploring the use of concern element role information in feature location evaluation (EH, DCS, LLP), pp. 140–150.
ICPC-2015-JbaraF #empirical #eye tracking #how- How programmers read regular code: a controlled experiment using eye tracking (AJ, DGF), pp. 244–254.
ICPC-2015-LafetaMR #dynamic analysis #framework- Framework instantiation using cookbooks constructed with static and dynamic analysis (RFL, MdAM, DR), pp. 125–128.
ICPC-2015-MacLeodSB #developer #documentation #how- Code, camera, action: how software developers document and share program knowledge using YouTube (LM, MAS, AB), pp. 104–114.
ICPC-2015-SaiedABS #api #library #question #source code- Could we infer unordered API usage patterns only using the library source code? (MAS, HA, OB, HAS), pp. 71–81.
ICSME-2015-AbidDCM #automation #c++ #generative #natural language #summary- Using stereotypes in the automatic generation of natural language summaries for C++ methods (NJA, ND, MLC, JIM), pp. 561–565.
ICSME-2015-CorleyDK #feature model #learning- Exploring the use of deep learning for feature location (CSC, KD, NAK), pp. 556–560.
ICSME-2015-DongAS #fault #static analysis- Practical and accurate pinpointing of configuration errors using static analysis (ZD, AA, KS), pp. 171–180.
ICSME-2015-DorningerPK #industrial #static analysis #user interface- Using static analysis for knowledge extraction from industrial User Interfaces (BD, JP, AK), pp. 497–500.
ICSME-2015-HardtM #empirical #evaluation #maintenance- An empirical evaluation of ant build maintenance using Formiga (RH, EVM), pp. 201–210.
ICSME-2015-MedicherlaKN #specification #verification- Program specialization and verification using file format specifications (RKM, RK, SN), pp. 191–200.
ICSME-2015-ValeM #architecture #dynamic analysis #mining #named- Keecle: Mining key architecturally relevant classes using dynamic analysis (LdNV, MdAM), pp. 566–570.
MSR-2015-BlincoeHD #ecosystem #git #identification- Ecosystems in GitHub and a Method for Ecosystem Identification Using Reference Coupling (KB, FH, DD), pp. 202–211.
MSR-2015-DonadelliZR #case study #fault #replication- Organizational Volatility and Post-release Defects: A Replication Case Study Using Data from Google Chrome (SMD, YCZ, PCR), pp. 391–395.
MSR-2015-WangPWG #comprehension #git #what- What Is the Gist? Understanding the Use of Public Gists on GitHub (WW, GPC, EW, DMG), pp. 314–323.
MSR-2015-ZanjaniKB #developer- Using Developer-Interaction Trails to Triage Change Requests (MBZ, HHK, CB), pp. 88–98.
MSR-2015-ZouXGYYZ #analysis #developer #empirical #non-functional #requirements #stack overflow #topic- Which Non-functional Requirements Do Developers Focus On? An Empirical Study on Stack Overflow Using Topic Analysis (JZ, LX, WG, MY, DY, XZ), pp. 446–449.
SANER-2015-BezemerPG #comprehension #difference #graph #performance- Understanding software performance regressions using differential flame graphs (CPB, JP, BG), pp. 535–539.
SANER-2015-CabotICR #open source- Exploring the use of labels to categorize issues in Open-Source Software projects (JC, JLCI, VC, BR), pp. 550–554.
SANER-2015-HuSLL #development #evolution #modelling #topic- Modeling the evolution of development topics using Dynamic Topic Models (JH, XS, DL, BL), pp. 3–12.
SANER-2015-LaverdiereBM #analysis #composition #graph- Taint analysis of manual service compositions using Cross-Application Call Graphs (MAL, BJB, EM), pp. 585–589.
SANER-2015-NayrollesHTL #approach #debugging #model checking #named- JCHARMING: A bug reproduction approach using crash traces and directed model checking (MN, AHL, ST, AL), pp. 101–110.
SANER-2015-QiuSM #graph #identification #library #morphism- Library functions identification in binary code by using graph isomorphism testings (JQ, XS, PM), pp. 261–270.
SCAM-2015-BonifacioCRKC #c++ #exception- The use of C++ exception handling constructs: A comprehensive study (RB, FC, GNR, UK, RC), pp. 21–30.
SCAM-2015-ChochlovEB #data flow #feature model- Using changeset descriptions as a data source to assist feature location (MC, ME, JB), pp. 51–60.
SCAM-2015-LemosPSL #code search #query #question #scalability- Can the use of types and query expansion help improve large-scale code search? (OALL, ACdP, HS, CVL), pp. 41–50.
SCAM-2015-PanditaJSW #api #mining- Discovering likely mappings between APIs using text mining (RP, RPJ, SDS, LAW), pp. 231–240.
SCAM-2015-RahmanRK #crowdsourcing #recommendation #source code- Recommending insightful comments for source code using crowdsourced knowledge (MMR, CKR, IK), pp. 81–90.
SCAM-2015-RenatusBE #modelling #security- Improving prioritization of software weaknesses using security models with AVUS (SR, CB, JE), pp. 259–264.
SCAM-2015-UddinGGR #comprehension #eye tracking #on the #visualisation- On the comprehension of code clone visualizations: A controlled study using eye tracking (MSU, VG, CG, CKR), pp. 161–170.
ICALP-v1-2015-KhotS #approximate- Approximating CSPs Using LP Relaxation (SK, RS), pp. 822–833.
FM-2015-0001K #bound #model checking- Property-Driven Fence Insertion Using Reorder Bounded Model Checking (SJ, DK), pp. 291–307.
FM-2015-AlTurkiA #distributed #framework #towards #verification #𝕂- Towards Formal Verification of Orchestration Computations Using the 𝕂 Framework (MAA, OA), pp. 40–56.
FM-2015-ChimdyalwarDCVC #abstraction #bound #model checking #static analysis- Eliminating Static Analysis False Positives Using Loop Abstraction and Bounded Model Checking (BC, PD, AC, SV, AC), pp. 573–576.
FM-2015-MirandaMR #automation #design #generative #testing #verification- Using Simulink Design Verifier for Automatic Generation of Requirements-Based Tests (BM, HM, RR), pp. 601–604.
FM-2015-Nakajima #behaviour #energy #maude #realtime- Using Real-Time Maude to Model Check Energy Consumption Behavior (SN), pp. 378–394.
RTA-2015-AvanziniST #certification #complexity #proving- Certification of Complexity Proofs using CeTA (MA, CS, RT), pp. 23–39.
SEFM-2015-JonesY #abstraction #reasoning- Reasoning about Separation Using Abstraction and Reification (CBJ, NY), pp. 3–19.
SEFM-2015-RochaBC #bound #c #generative #memory management #model checking #source code #testing- Memory Management Test-Case Generation of C Programs Using Bounded Model Checking (HR, RSB, LCC), pp. 251–267.
SEFM-2015-SavaryFLL #modelling #robust #testing- Model-Based Robustness Testing in Event-B Using Mutation (AS, MF, ML, JLL), pp. 132–147.
ICFP-2015-SteuwerFLD #functional #generative #performance- Generating performance portable code using rewrite rules: from high-level functional expressions to high-performance OpenCL code (MS, CF, SL, CD), pp. 205–217.
AIIDE-2015-StanescuBB #predict- Using Lanchester Attrition Laws for Combat Prediction in StarCraft (MAS, NAB, MB), pp. 86–92.
CHI-PLAY-2015-CollinsELG #2d #artificial reality #game studies #platform- Alaska Steve: Using Virtual Reality to Enhance a 2D Platforming Game (LC, SE, JL, TCNG), pp. 767–770.
CHI-PLAY-2015-HarpsteadA #analysis #design #education #empirical #game studies #learning- Using Empirical Learning Curve Analysis to Inform Design in an Educational Game (EH, VA), pp. 197–207.
CHI-PLAY-2015-HicksG #game studies- Exploring Casual Exergames with Kids Using Wheelchairs (KH, KG), pp. 541–546.
CHI-PLAY-2015-KeumRMCLBC #composition #development #game studies- Exergame Development Using Body Composition Data for Obesity Care (JK, JHR, YJM, HC, NL, BCB, JDC), pp. 577–582.
CHI-PLAY-2015-Schwind0HK #generative- Determining the Characteristics of Preferred Virtual Faces Using an Avatar Generator (VS, KW0, NH, OK), pp. 221–230.
CIG-2015-Garcia-SanchezT #automation #generative #programming #search-based #towards- Towards automatic StarCraft strategy generation using genetic programming (PGS, APT, AMM, GS, JJMG), pp. 284–291.
CIG-2015-OliveiraM #game studies #performance #realtime- Creating efficient walls using potential fields in real-time strategy games (CFdO, CAGM), pp. 138–145.
CIG-2015-RunarssonL #approximate #evaluation #game studies #on the- On imitating Connect-4 game trajectories using an approximate n-tuple evaluation function (TPR, SML), pp. 208–213.
CIG-2015-SatoIW #estimation #monte carlo #multi- Estimation of player's preference for cooperative RPGs using multi-strategy Monte-Carlo method (NS, KI, TW), pp. 51–59.
DiGRA-2015-BartonSQMKK #bias #design #game studies #reduction- The Use of Theory in Designing a Serious Game for the Reduction of Cognitive Biases (MB, CS, MMQ, CKM, KSK, JK).
DiGRA-2015-MarczakSH #comprehension #experience #matrix #similarity- Understanding Player Experience Through the Use of Similarity Matrix (RM, GS, PH).
DiGRA-2015-Warpefelt #visual notation- Cues and insinuations: Indicating affordances of non-player character using visual indicators (HW).
FDG-2015-IsaksenGN #analysis #game studies- Exploring Game Space Using Survival Analysis (AI, DG, AN).
FDG-2015-KaoH15b #game studies #learning- Exploring the Construction, Play, Use of Virtual Identities in a STEM Learning Game (DK, DFH).
FDG-2015-Martens #game studies #proving- Using Proof Theory to Study Game Mechanics (CM).
FDG-2015-ReuterGS #automation #detection #game studies #multi #petri net- Detecting structural deadlocks in Multiplayer Games using automatically generated Petri Nets (CR0, SG0, RS).
FDG-2015-RyanKMW15a #analysis #game studies #semantics #tool support- Tools for Game Discovery Built Using Latent Semantic Analysis (JOR, EK, MM, NWF).
VS-Games-2015-BrichRFWBMDRS0 #game studies #named #research- LiverDefense: Using a Tower Defense Game as a Customisable Research Tool (JB, KR, JF, MW, AB, SM, TD, VR, CS, MW0), pp. 1–8.
VS-Games-2015-Cejka #detection- Continuous Collision Detection Using Tetrahedral Structures (JC), pp. 1–4.
VS-Games-2015-DiazDHS #development #game studies #learning #multi #online #video- Explicit Fun, Implicit Learning in Multiplayer Online Battle Arenas: Methodological Proposal for Studying the Development of Cognitive Skills Using Commercial Video Games (CMCD, BD, HH, JWS), pp. 1–3.
VS-Games-2015-DiazWLT #game studies #visitor- Your Answer Will Make an Impression. Using Quiz Game Mechanics for the Collection of Visitor Data at an Exhibition (MGAD, UW, ML, MT), pp. 1–4.
VS-Games-2015-RobbWW #design #development #game studies- The Development of TASTER, a Cognitive Training Game Using Human-Centered Design, Tailored for Children with Global and Specific Cognitive Impairments (NR, AW, KW), pp. 1–2.
VS-Games-2015-WilhelmssonEBO #design #game studies #visual notation- Accessible Game Culture Using Inclusive Game Design - Participating in a Visual Culture That You Cannot See (UW, HE, JB, PAÖ), pp. 1–8.
GCM-2015-BottoniNP #constraints #contract #modelling #policy- Conditions, Constraints and Contracts: On the Use of Annotations for Policy Modeling (PB, RN, FPP), pp. 18–33.
ICGT-2015-Bruggink0NZ #graph #graph transformation #proving #termination- Proving Termination of Graph Transformation Systems Using Weighted Type Graphs over Semirings (HJSB, BK, DN, HZ), pp. 52–68.
ICGT-2015-Stuckrath #analysis #graph transformation #named #verification- Uncover: Using Coverability Analysis for Verifying Graph Transformation Systems (JS), pp. 266–274.
ICGT-2015-WeberDP #formal method #graph transformation #monitoring- Using Graph Transformations for Formalizing Prescriptions and Monitoring Adherence (JHW, SD, MP), pp. 205–220.
CHI-2015-AsenieroWLRTC #named #release planning #visualisation- STRATOS: Using Visualization to Support Decisions in Strategic Software Release Planning (BAA, TW, DL, GR, AT, SC), pp. 1479–1488.
CHI-2015-BachynskyiPOSW #case study #comparative #performance #simulation- Performance and Ergonomics of Touch Surfaces: A Comparative Study using Biomechanical Simulation (MB, GP, AO, JS, TW), pp. 1817–1826.
CHI-2015-BellottiATGDC #modelling #motivation #peer-to-peer- A Muddle of Models of Motivation for Using Peer-to-Peer Economy Systems (VB, AA, DT, CG, KD, JMC), pp. 1085–1094.
CHI-2015-BentleyC #composition #mobile- The Composition and Use of Modern Mobile Phonebooks (FRB, YYC), pp. 2749–2758.
CHI-2015-DaltonCM - Display Blindness?: Looking Again at the Visibility of Situated Displays using Eye-tracking (NSD, EC, PM), pp. 3889–3898.
CHI-2015-DamianTBSLA #behaviour #feedback #interactive #realtime #social- Augmenting Social Interactions: Realtime Behavioural Feedback using Social Signal Processing Techniques (ID, CSST, TB, JS, KL, EA), pp. 565–574.
CHI-2015-FleckCR #bound #multi- Balancing Boundaries: Using Multiple Devices to Manage Work-Life Balance (RF, ALC, RAVR), pp. 3985–3988.
CHI-2015-GerlingML #game studies #video- Long-Term Use of Motion-Based Video Games in Care Home Settings (KMG, RLM, CL), pp. 1573–1582.
CHI-2015-GoelZVP #detection #flexibility #gesture #named- Tongue-in-Cheek: Using Wireless Signals to Enable Non-Intrusive and Flexible Facial Gestures Detection (MG, CZ, RV, SNP), pp. 255–258.
CHI-2015-GrevetG #prototype #scalability #social- Piggyback Prototyping: Using Existing, Large-Scale Social Computing Systems to Prototype New Ones (CG, EG), pp. 4047–4056.
CHI-2015-GunaratneN #behaviour #performance #user interface- Informing and Improving Retirement Saving Performance using Behavioral Economics Theory-driven User Interfaces (JG, ON), pp. 917–920.
CHI-2015-HaqueNV #named- Myopoint: Pointing and Clicking Using Forearm Mounted Electromyography and Inertial Motion Sensors (FH, MN, DV), pp. 3653–3656.
CHI-2015-HiguchiCCZL #experience #named- ImmerseBoard: Immersive Telepresence Experience using a Digital Whiteboard (KH, YC, PAC, ZZ, ZL), pp. 2383–2392.
CHI-2015-HolzBK #identification #mobile #named- Bodyprint: Biometric User Identification on Mobile Devices Using the Capacitive Touchscreen to Scan Body Parts (CH, SB, MK), pp. 3011–3014.
CHI-2015-HourcadeMWP #analysis #exclamation- Look, My Baby Is Using an iPad! An Analysis of YouTube Videos of Infants and Toddlers Using Tablets (JPH, SLM, DW, LP), pp. 1915–1924.
CHI-2015-HydeCKH #interactive #persuasion- Using an Interactive Avatar’s Facial Expressiveness to Increase Persuasiveness and Socialness (JH, EJC, SBK, JKH), pp. 1719–1728.
CHI-2015-JonesCDTPDH #delphi #information management- “For Telling” the Present: Using the Delphi Method to Understand Personal Information Management Practices (WJ, RC, AD, JT, MAPQ, JDD, BMH), pp. 3513–3522.
CHI-2015-KatanGF #development #interactive #interface #machine learning #people- Using Interactive Machine Learning to Support Interface Development Through Workshops with Disabled People (SK, MG, RF), pp. 251–254.
CHI-2015-KosmallaDK #automation #metric #named #recognition- ClimbSense: Automatic Climbing Route Recognition using Wrist-worn Inertia Measurement Units (FK, FD, AK), pp. 2033–2042.
CHI-2015-LeeLCWSK #education #interactive #online #social- Using Time-Anchored Peer Comments to Enhance Social Interaction in Online Educational Videos (YCL, WCL, FYC, HCW, CYS, JTK), pp. 689–698.
CHI-2015-LugerURG #design #game studies #process- Playing the Legal Card: Using Ideation Cards to Raise Data Protection Issues within the Design Process (EL, LU, TR, MG), pp. 457–466.
CHI-2015-MaiorPSW #human-computer #reliability- Examining the Reliability of Using fNIRS in Realistic HCI Settings for Spatial and Verbal Tasks (HAM, MP, SCS, MLW), pp. 3039–3042.
CHI-2015-MariakakisGAPW #mobile #named- SwitchBack: Using Focus and Saccade Tracking to Guide Users’ Attention for Mobile Task Resumption (AM, MG, MTIA, SNP, JOW), pp. 2953–2962.
CHI-2015-ParkPN - The Trial of Bendi in a Coffeehouse: Use of a Shape-Changing Device for a Tactile-Visual Phone Conversation (YP, JP, TJN), pp. 2181–2190.
CHI-2015-PatelO - Contextual Influences on the Use and Non-Use of Digital Technology While Exercising at the Gym (MP, AAO), pp. 2923–2932.
CHI-2015-PfeifferDSAR - Cruise Control for Pedestrians: Controlling Walking Direction using Electrical Muscle Stimulation (MP, TD, SS, FA, MR), pp. 2505–2514.
CHI-2015-PreistJ #education #game studies #motivation- The Use of Games as Extrinisic Motivation in Education (CP, RJ), pp. 3735–3738.
CHI-2015-SimeoneVG #artificial reality #case study #design #experience #physics- Substitutional Reality: Using the Physical Environment to Design Virtual Reality Experiences (ALS, EV, HG), pp. 3307–3316.
CHI-2015-SlegersRVD #elicitation #game studies #research #user interface- Using Game Principles in UX Research: A Board Game for Eliciting Future User Needs (KS, SR, JV, PD), pp. 1225–1228.
CHI-2015-TholanderN #experience #performance- Snot, Sweat, Pain, Mud, and Snow: Performance and Experience in the Use of Sports Watches (JT, SN), pp. 2913–2922.
CHI-2015-VertanenMERK #mobile #named #performance- VelociTap: Investigating Fast Mobile Text Entry using Sentence-Based Decoding of Touchscreen Keyboard Input (KV, HM, JE, SR, POK), pp. 659–668.
CHI-2015-WangGXZYB #interactive #named #privacy #visualisation- VeilMe: An Interactive Visualization Tool for Privacy Configuration of Using Personality Traits (YW, LG, AX, MXZ, HY, HB), pp. 817–826.
CHI-2015-ZugerF #developer #predict- Interruptibility of Software Developers and its Prediction Using Psycho-Physiological Sensors (MZ, TF), pp. 2981–2990.
CSCW-2015-ChangHT #recommendation- Using Groups of Items to Bootstrap New Users in Recommender Systems (SC, FMH, LGT), pp. 1258–1269.
CSCW-2015-FreitasD15a #detection #multi- Using Multiple Contexts to Detect and Form Opportunistic Groups (AAdF, AKD), pp. 1612–1621.
CSCW-2015-KaziunasBJCHA #health- Transition and Reflection in the Use of Health Information: The Case of Pediatric Bone Marrow Transplant Caregivers (EK, AGB, JJ, SWC, DAH, MSA), pp. 1763–1774.
CSCW-2015-MaddockSASOM #behaviour #multi #online- Characterizing Online Rumoring Behavior Using Multi-Dimensional Signatures (JM, KS, HJAH, DES, MO, RMM), pp. 228–241.
CSCW-2015-ProstMT #design #energy #towards- From Awareness to Empowerment: Using Design Fiction to Explore Paths towards a Sustainable Energy Future (SP, EEM, MT), pp. 1649–1658.
CSCW-2015-XuRDB #design #feedback #process- A Classroom Study of Using Crowd Feedback in the Iterative Design Process (AX, HR, SPD, BPB), pp. 1637–1648.
DHM-EH-2015-BoZDYWF #hybrid #kernel #performance #recognition- Hybrid BFO-PSO and Kernel FCM for the Recognition of Pilot Performance Influenced by Simulator Movement Using Diffusion Maps (JB, YBZ, LD, BTY, QW, SF), pp. 239–247.
DHM-EH-2015-GieserBM #artificial reality #gesture #realtime #recognition- Real-Time Static Gesture Recognition for Upper Extremity Rehabilitation Using the Leap Motion (SNG, AB, FM), pp. 144–154.
DHM-EH-2015-KollingKHC #design #evaluation #feedback #interactive #process- Estimating Ergonomic Comfort During the Process of Mechanism Design by Interaction with a Haptic Feedback-System — Evaluation of Simulated and Kinesthetically Displayed Mechanisms Using the Haptic Feedback System RePlaLink (TK, MK, MH, BC), pp. 62–73.
DHM-EH-2015-MeryS #modelling #requirements- Analyzing Requirements Using Environment Modelling (DM, NKS), pp. 345–357.
DHM-EH-2015-NakamuraKKMK #development #self #student- Development of a Self-learning System for Chest Auscultation Skills Using an RFID Reader for Nursing Students (MN, KK, YK, JM, MKP), pp. 474–481.
DHM-EH-2015-UchidaHKEMOUG #analysis #process- Process Analysis of the Hand Lay-Up Method Using CFRP Prepreg Sheets (TU, HH, KK, AE, MM, JO, TU, AG), pp. 227–236.
DHM-EH-2015-ZhengBISEL #behaviour #monitoring- Driving-Behavior Monitoring Using an Unmanned Aircraft System (UAS) (CZ, AB, WI, IS, EE, KL), pp. 305–312.
DHM-HM-2015-FurukawaTKG #evaluation #image- Evaluation of Kimono Clothes in Kyo-Yuzen-Zome using Image (TF, YT, NK, AG), pp. 277–288.
DUXU-DD-2015-AsthanaS #modelling #named #testing #usability #xml- Maareech: Usability Testing Tool for Voice Response System Using XML Based User Models (SA, PS), pp. 101–112.
DUXU-IXD-2015-AkerO #effectiveness #interactive #social #social media- Social Media Interactions and the Use of Third-Party Management Applications on Effectiveness and Perception of Information (ÇA, ÖÖ), pp. 3–12.
DUXU-IXD-2015-DasBRD #co-evolution #design #generative- The Use of Generative Techniques in Co-design of mHealth Technology and Healthcare Services for COPD Patients (AD, SB, JR, YD), pp. 587–595.
DUXU-IXD-2015-HalbeyKZ - Going on a Road-Trip with My Electric Car: Acceptance Criteria for Long-Distance-Use of Electric Vehicles (JH, SK, MZ), pp. 473–484.
DUXU-IXD-2015-IwamotoKM #analysis #case study- A Study of Conversation Support System Between the Elderly Person and Young Adults by Using Facial Expression Analysis (MI, NK, KM), pp. 616–627.
DUXU-UI-2015-AyanogluBTD #artificial reality #case study- Effects of Packages’ Color as a Cue for Hazard-Related Perceptions: A Study Using Virtual Reality (HA, RB, JT, ED), pp. 3–13.
DUXU-UI-2015-DuWDXJ #case study #metric- Study on Operating Clearance Measurement of Some Connectors by Using Motion Capture (HD, LW, LD, YX, CJ), pp. 45–53.
DUXU-UI-2015-LiHF #quality #requirements #scalability #user interface- Scaling Preferences of Different Stakeholders — Using the Example of Prioritizing Quality Requirements on User Interface Texts (YL, TH, PF), pp. 75–86.
HCI-DE-2015-Hensely-Schinkinger #design- The Definition and Use of Personas in the Design of Technologies for Informal Caregivers (SHS, AFPdC, MG, HT), pp. 202–213.
HCI-DE-2015-SantosFD #case study #evaluation #heuristic #set #visualisation- Heuristic Evaluation in Information Visualization Using Three Sets of Heuristics: An Exploratory Study (BSS, BQF, PD), pp. 259–270.
HCI-DE-2015-SantosST #interactive #open source #visualisation- Interactive Clinical Pedigree Visualization Using an Open Source Pedigree Drawing Engine (JMS, BSS, LT), pp. 405–414.
HCI-DE-2015-SchutzSO - Using Diary Studies to Evaluate Railway Dispatching Software (IS, AS, AO), pp. 248–258.
HCI-DE-2015-SugiuraSO #implementation #metric #security- Improving IT Security Through Security Measures: Using Our Game-Theory-Based Model of IT Security Implementation (MS, HS, TO), pp. 82–95.
HCI-DE-2015-WatsonS #assessment- Using Readers’ and Organizations’ Goals to Guide Assessment of Success in Information Websites (RBW, JHS), pp. 283–294.
HCI-IT-2015-BandeiraCXK #gesture #interface- Using Gesture-Based Interfaces to Control Robots (GMB, MC, BHX, JK), pp. 3–12.
HCI-IT-2015-FukumotoTE #detection- Improvement of Accuracy in Remote Gaze Detection for User Wearing Eyeglasses Using Relative Position Between Centers of Pupil and Corneal Sphere (KF, TT, YE), pp. 13–23.
HCI-IT-2015-GuXCZ - To Write not Select, a New Text Entry Method Using Joystick (ZG, XX, CC, YZ), pp. 35–43.
HCI-IT-2015-HakodaKSST #bound #gesture #mobile #named- AirFlip: A Double Crossing In-Air Gesture Using Boundary Surfaces of Hover Zone for Mobile Devices (HH, TK, KS, BS, JT), pp. 44–53.
HCI-IT-2015-KondoTT #communication #smarttech- Information Select and Transfer Between Touch Panel and Wearable Devices Using Human Body Communication (YK, ST, JT), pp. 208–216.
HCI-IT-2015-KuribaraST - Mouse Augmentation Using a Malleable Mouse Pad (TK, BS, JT), pp. 217–226.
HCI-IT-2015-MullerLBSKSW #data-driven #network #overview #predict- Using Neural Networks for Data-Driven Backchannel Prediction: A Survey on Input Features and Training Techniques (MM, DL, LB, MS, KK, SS, AW), pp. 329–340.
HCI-IT-2015-MurataM #analysis #eye tracking- Nonlinear Dynamical Analysis of Eye Movement Characteristics Using Attractor Plot and First Lyapunov Exponent (AM, TM), pp. 78–85.
HCI-IT-2015-Nagaraju #framework #gesture- Swift Gestures: Seamless Bend Gestures Using Graphics Framework Capabilities (SN), pp. 118–129.
HCI-UC-2015-AzhariF #approach #experience #social #social media #user interface- Using a Lexical Approach to Investigate User Experience of Social Media Applications (AA, XF), pp. 15–24.
HCI-UC-2015-ClarkeBK #experience #question #what- What Learnability Issues Do Primary Care Physicians Experience When Using CPOE? (MAC, JLB, MSK), pp. 373–383.
HCI-UC-2015-OhJK #approach #human-computer #simulation- Simulation of an Affordance-Based Human-Machine Cooperative Control Model Using an Agent-Based Simulation Approach (YgO, IJ, NK), pp. 226–237.
HCI-UC-2015-Ujita #analysis #reliability- Accident Analysis by Using Methodology of Resilience Engineering, High Reliability Organization, and Risk Literacy (HU), pp. 358–369.
HIMI-IKC-2015-FilhoHTJM #smarttech- Using Wearable and Contextual Computing to Optimize Field Engineering Work Practices (RSSF, CLH, AT, JJ, PM), pp. 522–533.
HIMI-IKC-2015-HamaguchiMTKN #design #generative #matrix- A Method for Generation and Check of Alarm Configurations Using Cause-Effect Matrices for Plant Alarm System Design (TH, BM, KT, NK, MN), pp. 549–556.
HIMI-IKC-2015-ItaiM #development #interactive- Study About Creation of “Maai” Involving Intention Using Rhythm Controller — Development of Maai Creating Agent and Interaction Experiments Between Human and Agent (SI, YM), pp. 599–609.
HIMI-IKC-2015-KajitaTMI #3d #design- Designing the Embodied Shadow Media Using Virtual Three-Dimensional Space (YK, TT, YM, SI), pp. 610–621.
HIMI-IKC-2015-MatsudaOHT #analysis #automation #generative #multi #problem #testing- Analysis of Multiple-Choice Tests Through Erroneous Choices Using a Technique of Automatic Problem Generation (NM, HO, TH, HT), pp. 362–369.
HIMI-IKC-2015-MayerBPGV #automation #generative #process #visualisation- Automatic Generation of Integrated Process Data Visualizations Using Human Knowledge (FM, UB, DP, DG, BVH), pp. 488–498.
HIMI-IKC-2015-OliveiraCBA #artificial reality #gamification #interface #motivation- A Head-up Display with Augmented Reality and Gamification for an E-Maintenance System: Using Interfaces and Gamification to Motivate Workers in Procedural Tasks (AO, NC, LCB, RBdA), pp. 499–510.
HIMI-IKC-2015-SturreCVS #assessment #eye tracking- Using Eye Movements to Test Assumptions of the Situation Present Assessment Method (LS, DC, KPLV, TZS), pp. 45–52.
HIMI-IKC-2015-TogawaK #collaboration #framework- Disaster Recovery Framework for e-Learning Environment Using Private Cloud Collaboration and Emergency Alerts (ST, KK), pp. 588–596.
HIMI-IKC-2015-UeokaK #interactive- Fortune Air: An Interactive Fortune Telling System Using Vortex Air Cannon (RU, NK), pp. 646–656.
HIMI-IKC-2015-UjitokoH #interface- Application of the Locomotion Interface Using Anthropomorphic Finger Motion (YU, KH), pp. 666–674.
HIMI-IKD-2015-AraiOM #web- A Filtering System of Web History Using the Browsing Characteristic (KA, MO, HM), pp. 273–279.
HIMI-IKD-2015-ChouSW #case study #quality- Improving Service Quality by Prioritizing Service Attributes Using SERVQUAL and Kano Model — A Case Study of Nursing Home in Taiwan (CMC, CS, SKW), pp. 513–525.
HIMI-IKD-2015-ItouNM #information management #twitter- Travel-Information Sharing System Using Tweets with Location Information (JI, KN, JM), pp. 526–534.
HIMI-IKD-2015-IwamotoH #induction- Induction of a Relaxed State Using a Vibration Stimulus Based on the Respiratory Cycle (NI, HH), pp. 386–395.
HIMI-IKD-2015-KalkattawiN #ubiquitous- Ubiquitous Healthcare Systems: Improving the Adherence Level within Diabetic Medication Using Cloud-Based Reminder System (MK, TN), pp. 535–546.
HIMI-IKD-2015-KastratiIY #classification #documentation #framework- A General Framework for Text Document Classification Using SEMCON and ACVSR (ZK, ASI, SYY), pp. 310–319.
HIMI-IKD-2015-KotaniIAS #interface #variability- Changes in Heart Rate Variability by Using Tactile Thermal Interface Device (KK, SI, TA, SS), pp. 405–411.
HIMI-IKD-2015-MatsunoAIMM - Computer Input System Using Eye Glances (SM, KA, NI, TM, KM), pp. 425–432.
HIMI-IKD-2015-MorizumiA #analysis- Analysis Using Purchasing Data in Japan (RM, YA), pp. 640–647.
HIMI-IKD-2015-SasajimaOOS #communication #twitter #visualisation- Proposal of a Visualization Method to Support Informal Communication Using Twitter Attributes (RS, KO, MO, AS), pp. 107–114.
HIMI-IKD-2015-SuzukiNSTH #artificial reality #behaviour- Changing Drinking Behavior and Beverage Consumption Using Augmented Reality (ES, TN, SS, TT, MH), pp. 648–660.
HIMI-IKD-2015-YoshinoO - Proposal of a Data Presentation Technique Using Four-Frame Cartoon Expression for a LifeLog System (TY, IO), pp. 235–246.
LCT-2015-BoonbrahmKB #artificial reality #learning #student- Using Augmented Reality Technology in Assisting English Learning for Primary School Students (SB, CK, PB), pp. 24–32.
LCT-2015-DalipiYK #analysis #performance #semantics- Enhancing the Learner’s Performance Analysis Using SMEUS Semantic E-learning System and Business Intelligence Technologies (FD, SYY, ZK), pp. 208–217.
LCT-2015-HiramatsuIISS #case study #communication #mobile- A Study to Activate Communication by Using SNS on Mobile Phone — An Essay Lesson at the Elementary School (YH, AI, KI, FS, FS), pp. 492–502.
LCT-2015-IbanezN #design #implementation #multi- Contextualization of Archaeological Findings Using Virtual Worlds. Issues on Design and Implementation of a Multiuser Enabled Virtual Museum (LAHI, VBN), pp. 384–393.
LCT-2015-PyperLWJ #mobile #personalisation- The Potential Use of the Flexilevel Test in Providing Personalised Mobile E-Assessments (AP, ML, PW, AJ), pp. 271–278.
LCT-2015-SalazarOD #adaptation #education #mobile #multi #personalisation #ubiquitous- Adaptive and Personalized Educational Ubiquitous Multi-Agent System Using Context-Awareness Services and Mobile Devices (OMS, DAO, NDD), pp. 301–312.
LCT-2015-SebilloTVPG #artificial reality #interface- The Use of Augmented Reality Interfaces for On-site Crisis Preparedness (MS, GT, GV, LP, AG), pp. 136–147.
LCT-2015-Sein-EchaluceBG #education #information management #social- A Knowledge Management System to Classify Social Educational Resources Within a Subject Using Teamwork Techniques (MLSE, ÁFB, FJGP, MÁCG), pp. 510–519.
SCSM-2015-KastratiIYD #analysis #network #online #social- Analysis of Online Social Networks Posts to Investigate Suspects Using SEMCON (ZK, ASI, SYY, FD), pp. 148–157.
SCSM-2015-ManssourSSFS #image #network #social #visualisation- Using Information Visualization Techniques to Improve the Perception of the Organizations’ Image on Social Networks (IHM, MSS, CQS, AJF, FTS), pp. 55–66.
CAiSE-2015-Francescomarino #workflow- Completing Workflow Traces Using Action Languages (CDF, CG, ST, IVS), pp. 314–330.
CAiSE-2015-TsuchiyaWFOM #configuration management #feedback #interactive #requirements #traceability- Interactive Recovery of Requirements Traceability Links Using User Feedback and Configuration Management Logs (RT, HW, YF, KO, RM), pp. 247–262.
ICEIS-v1-2015-BorgesDRAS #approach #generative- An Economic Approach for Generation of Train Driving Plans using Continuous Case-based Planning (APB, OBD, RR, BCÁ, EES), pp. 440–451.
ICEIS-v1-2015-BouakkazLO #distance #named #similarity- GOTA — Using the Google Similarity Distance for OLAP Textual Aggregation (MB, SL, YO), pp. 121–127.
ICEIS-v1-2015-Castanon-PugaSG #algorithm #data mining #fuzzy #logic #mining #mobile- Hybrid-Intelligent Mobile Indoor Location Using Wi-Fi Signals — Location Method Using Data Mining Algorithms and Type-2 Fuzzy Logic Systems (MCP, ASC, CGP, GLS, MFP, EAT), pp. 609–615.
ICEIS-v1-2015-Marques-LucenaA #framework #information management- Knowledge Management Framework using Wiki-based Front-end Modules (CML, CA, SK, JS), pp. 79–86.
ICEIS-v1-2015-MpindaMSR #database #graph #simulation- Graph Database Application using Neo4j — Railroad Planner Simulation (SATM, LGM, MTPS, MXR), pp. 399–403.
ICEIS-v1-2015-RezendeJ #concurrent #process #workflow- Deadlock Avoidance in Interorganizational Business Processes using a Possibilistic WorkFlow Net (LPdR, SJ), pp. 429–439.
ICEIS-v1-2015-Roos-FrantzBFSF #concept #integration #modelling #petri net #simulation- Using Petri Nets to Enable the Simulation of Application Integration Solutions Conceptual Models (FRF, MB, RZF, SS, VBF), pp. 87–96.
ICEIS-v1-2015-SarmentoCG #network #streaming- Streaming Networks Sampling using top-K Networks (RS, MC, JG), pp. 228–234.
ICEIS-v1-2015-VaroneA #multi- Multi-modal Transportation with Public Transport and Ride-sharing — Multi-modal Transportation using a Path-based Method (SV, KA), pp. 479–486.
ICEIS-v2-2015-AizebojeP #approach #pointer- An Approach to using a Laser Pointer as a Mouse (JA, TP), pp. 543–552.
ICEIS-v2-2015-AlahmadiLN #detection #internet #process #profiling- Using Internet Activity Profiling for Insider-threat Detection (BAA, PAL, JRCN), pp. 709–720.
ICEIS-v2-2015-Brant-RibeiroAM #approach #interactive #modelling #petri net #web- A User-centered Approach for Modeling Web Interactions Using Colored Petri Nets (TBR, RDA, IM, MSS, RGC), pp. 37–48.
ICEIS-v2-2015-FrantzSRYE #ecosystem #integration #markov #on the #process- On using Markov Decision Processes to Model Integration Solutions for Disparate Resources in Software Ecosystems (RZF, SS, FRF, IY, MTME), pp. 260–267.
ICEIS-v2-2015-JaouachiKHHJ #image #ontology #rdf #semantics #web- Semantic Annotation of Images Extracted from the Web using RDF Patterns and a Domain Ontology (RTJ, MTK, NH, OH, MBJ), pp. 137–144.
ICEIS-v2-2015-KamalKVB #delivery #performance- Efficient Use of Voice as a Channel for Delivering Public Services (KKK, MK, BV, KB), pp. 626–631.
ICEIS-v2-2015-MagnavitaNM #evolution- Using EVOWAVE to Analyze Software Evolution (RCM, RLN, MGM), pp. 126–136.
ICEIS-v2-2015-Martin-Fernandez #alias #encryption #performance- Efficient Management of Revoked Pseudonyms in VANETs using ID-Based Cryptography (FMF, PCG, CCG), pp. 701–708.
ICEIS-v2-2015-MendesAASNM #evolution #monitoring #named #open source #technical debt #visualisation- VisMinerTD — An Open Source Tool to Support the Monitoring of the Technical Debt Evolution using Software Visualization (TSM, DAA, NSRA, ROS, RLN, MGM), pp. 457–462.
ICEIS-v2-2015-PereiraD #formal method #logic #semantics #uml- Systematic Mapping — Formalization of UML Semantics using Temporal Logic (VP, MED), pp. 486–493.
ICEIS-v2-2015-SariK #analysis #debugging #monitoring #predict- Bug Prediction for an ATM Monitoring Software — Use of Logistic Regression Analysis for Bug Prediction (ÖS, OK), pp. 382–387.
ICEIS-v2-2015-ThommazoCHGPBF #complexity #dependence #requirements #testing- Using the Dependence Level Among Requirements to Priorize the Regression Testing Set and Characterize the Complexity of Requirements Change (ADT, KC, EMH, GG, JP, AB, SF), pp. 231–241.
ICEIS-v2-2015-TrujilloOP #authoring #framework #re-engineering #validation- Using Technical-Action-Research to Validate a Framework for Authoring Software Engineering Methods (MMT, HO, MP), pp. 15–27.
ICEIS-v3-2015-NyameB #information management- The Adoption and Use of Human Resource Information System (HRIS) in Ghana (PKON, RB), pp. 130–138.
ICEIS-v3-2015-RiveroC #case study #evaluation #experience #user interface- Using a Study to Assess User eXperience Evaluation Methods from the Point of View of Users (LR, TC), pp. 88–95.
ICEIS-v3-2015-SaidCAB #adaptation #modelling #named #process- BPMN4V — An Extension of BPMN for Modelling Adaptive Processes using Versions (IBS, MAC, EA, RB), pp. 258–267.
ICEIS-v3-2015-SilvaMLFNS #architecture #experience #health #information management #modelling- An Experience of using SoaML for Modeling a Service-Oriented Architecture for Health Information Systems (FGS, JSSdM, JdSL, JMSF, RPCdN, MSS), pp. 322–327.
CIKM-2015-BagdouriO #microblog #set- Profession-Based Person Search in Microblogs: Using Seed Sets to Find Journalists (MB, DWO), pp. 593–602.
CIKM-2015-BuchA #approximate #learning #string- Approximate String Matching by End-Users using Active Learning (LB, AA0), pp. 93–102.
CIKM-2015-JeongKL #on the fly- A Flash-aware Buffering Scheme using On-the-fly Redo (KSJ, SWK, SL), pp. 1683–1686.
CIKM-2015-MaGWLW #detection #information management #microblog #social- Detect Rumors Using Time Series of Social Context Information on Microblogging Websites (JM, WG0, ZW, YL, KFW), pp. 1751–1754.
CIKM-2015-MishraH #clustering #learning #multi- Learning Task Grouping using Supervised Task Space Partitioning in Lifelong Multitask Learning (MM, JH), pp. 1091–1100.
CIKM-2015-ParkHL #nearest neighbour #performance- A Fast k-Nearest Neighbor Search Using Query-Specific Signature Selection (YP, HH, SgL), pp. 1883–1886.
CIKM-2015-RoychoudhuryKB #documentation #ontology #process- Analyzing Document Intensive Business Processes using Ontology (SR, VK, NB), pp. 1899–1902.
CIKM-2015-SiersdorferKAZ #how #network #scalability #social- Who With Whom And How?: Extracting Large Social Networks Using Search Engines (SS, PK, HA, SZ), pp. 1491–1500.
CIKM-2015-Teevan #information retrieval- Slow Search: Improving Information Retrieval Using Human Assistance (JT), p. 1.
CIKM-2015-TuarobTSR #modelling #network #social- Modeling Individual-Level Infection Dynamics Using Social Network Information (ST, CST, MS, NR), pp. 1501–1510.
CIKM-2015-WangSL #distance #learning #summary- Update Summarization using Semi-Supervised Learning Based on Hellinger Distance (DW0, SS, TL0), pp. 1907–1910.
CIKM-2015-ZhangSWFW #crowdsourcing #quality- Improving Label Quality in Crowdsourcing Using Noise Correction (JZ0, VSS, JW0, XF, XW0), pp. 1931–1934.
ECIR-2015-BiyaniBCM #analysis #concurrent #online #retrieval #thread- Using Subjectivity Analysis to Improve Thread Retrieval in Online Forums (PB, SB, CC, PM), pp. 495–500.
ECIR-2015-ChongDL #modelling #predict #topic- Prediction of Venues in Foursquare Using Flipped Topic Models (WHC, BTD, EPL), pp. 623–634.
ECIR-2015-Dutta #approximate #mining #named #statistics #string- MIST: Top-k Approximate Sub-string Mining Using Triplet Statistical Significance (SD), pp. 284–290.
ECIR-2015-GogMP #identification #on the #statistics- On Identifying Phrases Using Collection Statistics (SG, AM, MP), pp. 278–283.
ECIR-2015-HagenPBS #classification #detection #sentiment #twitter- Twitter Sentiment Detection via Ensemble Classification Using Averaged Confidence Scores (MH, MP, MB, BS), pp. 741–754.
ECIR-2015-JameelLB #modelling #parametricity #topic- Nonparametric Topic Modeling Using Chinese Restaurant Franchise with Buddy Customers (SJ, WL, LB), pp. 648–659.
ECIR-2015-LiC #effectiveness- Effective Healthcare Advertising Using Latent Dirichlet Allocation and Inference Engine (YCL, CCC), pp. 672–677.
ECIR-2015-LimCLK #community #constraints #detection- Detecting Location-Centric Communities Using Social-Spatial Links with Temporal Constraints (KHL, JC, CL, SK), pp. 489–494.
ECIR-2015-LuoZDY #design- Designing States, Actions, and Rewards for Using POMDP in Session Search (JL, SZ, XD, HY), pp. 526–537.
ECIR-2015-MaddalenaMST #estimation- Judging Relevance Using Magnitude Estimation (EM, SM, FS, AT), pp. 215–220.
ICML-2015-AvronH #community #detection #personalisation #rank- Community Detection Using Time-Dependent Personalized PageRank (HA, LH), pp. 1795–1803.
ICML-2015-ChangYXY #detection #semantics- Complex Event Detection using Semantic Saliency and Nearly-Isotonic SVM (XC, YY, EPX, YY), pp. 1348–1357.
ICML-2015-LeC #learning #metric- Unsupervised Riemannian Metric Learning for Histograms Using Aitchison Transformations (TL, MC), pp. 2002–2011.
ICML-2015-SnoekRSKSSPPA #network #optimisation #scalability- Scalable Bayesian Optimization Using Deep Neural Networks (JS, OR, KS, RK, NS, NS, MMAP, P, RPA), pp. 2171–2180.
ICML-2015-Sohl-DicksteinW #learning- Deep Unsupervised Learning using Nonequilibrium Thermodynamics (JSD, EAW, NM, SG), pp. 2256–2265.
ICML-2015-SrivastavaMS #learning #video- Unsupervised Learning of Video Representations using LSTMs (NS, EM, RS), pp. 843–852.
ICML-2015-SunQW #optimisation #taxonomy- Complete Dictionary Recovery Using Nonconvex Optimization (JS, QQ, JW), pp. 2351–2360.
ICML-2015-UbaruMS #approximate #fault #matrix #rank- Low Rank Approximation using Error Correcting Coding Matrices (SU, AM, YS), pp. 702–710.
ICML-2015-ZhuE #approach #hybrid #probability #random- A Hybrid Approach for Probabilistic Inference using Random Projections (MZ, SE), pp. 2039–2047.
KDD-2015-AhnKLRW #distributed #matrix #probability #scalability- Large-Scale Distributed Bayesian Matrix Factorization using Stochastic Gradient MCMC (SA, AK, NL, SR, MW), pp. 9–18.
KDD-2015-GleichM #algorithm #graph #learning- Using Local Spectral Methods to Robustify Graph-Based Learning Algorithms (DFG, MWM), pp. 359–368.
KDD-2015-IkonomovskaJD #predict #realtime- Real-Time Bid Prediction using Thompson Sampling-Based Expert Selection (EI, SJ, AD), pp. 1869–1878.
KDD-2015-JohanssonD #geometry #graph #learning #similarity- Learning with Similarity Functions on Graphs using Matchings of Geometric Embeddings (FDJ, DPD), pp. 467–476.
KDD-2015-KotziasDFS - From Group to Individual Labels Using Deep Features (DK, MD, NdF, PS), pp. 597–606.
KDD-2015-MayaMMAY #clustering- Discovery of Glaucoma Progressive Patterns Using Hierarchical MDL-Based Clustering (SM, KM, HM, RA, KY), pp. 1979–1988.
KDD-2015-MomtazpourZRSR #cyber-physical #invariant- Analyzing Invariants in Cyber-Physical Systems using Latent Factor Regression (MM, JZ, SR, RKS, NR), pp. 2009–2018.
KDD-2015-Ojjeh #open source #realtime- Powering Real-time Decision Engines in Finance and Healthcare using Open Source Software (BO), p. 1633.
KDD-2015-PengKLC #approximate #clustering #rank- Subspace Clustering Using Log-determinant Rank Approximation (CP, ZK, HL, QC), pp. 925–934.
KDD-2015-SethiYRVR #classification #machine learning #scalability- Scalable Machine Learning Approaches for Neighborhood Classification Using Very High Resolution Remote Sensing Imagery (MS, YY, AR, RRV, SR), pp. 2069–2078.
KDD-2015-ShanahanD #distributed #scalability- Large Scale Distributed Data Science using Apache Spark (JGS, LD), pp. 2323–2324.
KDD-2015-SomanchiALEG #predict- Early Prediction of Cardiac Arrest (Code Blue) using Electronic Medical Records (SS, SA, AL, EE, RG), pp. 2119–2126.
KDD-2015-WangYLXXCR #predict- Regularity and Conformity: Location Prediction Using Heterogeneous Mobility Data (YW, NJY, DL, LX, XX, EC, YR), pp. 1275–1284.
KDD-2015-WeiLMCRS #predict- Predicting Serves in Tennis using Style Priors (XW, PL, SM, PC, MR, SS), pp. 2207–2215.
KDD-2015-YuanBM #process #re-engineering- Gas Concentration Reconstruction for Coal-Fired Boilers Using Gaussian Process (CY, MB, BM), pp. 2247–2256.
KDD-2015-ZhengYX #composition #linear #modelling #topic- Linear Time Samplers for Supervised Topic Models using Compositional Proposals (XZ, YY, EPX), pp. 1523–1532.
MLDM-2015-Babu #classification #identification- Offline Writer Identification in Tamil Using Bagged Classification Trees (SB), pp. 342–354.
MLDM-2015-CostaFK #multi- Classifying Grasslands and Cultivated Pastures in the Brazilian Cerrado Using Support Vector Machines, Multilayer Perceptrons and Autoencoders (WC, LMGF, TSK), pp. 187–198.
MLDM-2015-GovadaJMS #approach #hybrid #induction #learning- Hybrid Approach for Inductive Semi Supervised Learning Using Label Propagation and Support Vector Machine (AG, PJ, SM, SKS), pp. 199–213.
MLDM-2015-MojahedBWI #analysis #clustering #matrix #semistructured data #similarity- Applying Clustering Analysis to Heterogeneous Data Using Similarity Matrix Fusion (SMF) (AM, JHBS, WW, BdlI), pp. 251–265.
MLDM-2015-MoldovanM #data mining #learning #mining #performance- Learning the Relationship Between Corporate Governance and Company Performance Using Data Mining (DM, SM), pp. 368–381.
MLDM-2015-PatchalaBG #email- Author Attribution of Email Messages Using Parse-Tree Features (JP, RB, SG), pp. 313–327.
MLDM-2015-TreechalongRW #clustering- Semi-Supervised Stream Clustering Using Labeled Data Points (KT, TR, KW), pp. 281–295.
RecSys-2015-AghdamHMB #adaptation #markov #modelling #recommendation- Adapting Recommendations to Contextual Changes Using Hierarchical Hidden Markov Models (MHA, NH, BM, RDB), pp. 241–244.
RecSys-2015-BanksRS #game studies #recommendation- The Recommendation Game: Using a Game-with-a-Purpose to Generate Recommendation Data (SB, RR, BS), pp. 305–308.
RecSys-2015-ChaneyBE #network #personalisation #probability #recommendation #social- A Probabilistic Model for Using Social Networks in Personalized Item Recommendation (AJBC, DMB, TER), pp. 43–50.
RecSys-2015-MagnusonDM #process #recommendation #twitter- Event Recommendation using Twitter Activity (AM, VD, DM), pp. 331–332.
SEKE-2015-CaoHH #design #evaluation #quality- Experimental Frame Design Using E-DEVSML for Software Quality Evaluation (BC, LH, JH), pp. 310–313.
SEKE-2015-ChavezM #information retrieval #ontology #query- An Information Retrieval Model using Query Expansion based on Ontologies in the Computer Science Domain (BGCC, AM), pp. 652–655.
SEKE-2015-DingZ #modelling #petri net- Modeling and Analyzing Publish Subscribe Architcture using Petri Nets (JD, DZ), pp. 589–594.
SEKE-2015-GoswamiWS #learning #performance- Using Learning Styles of Software Professionals to Improve their Inspection Team Performance (AG, GSW, AS), pp. 680–685.
SEKE-2015-ManiPW #co-evolution #modelling #performance- Exploring SOA Pattern Performance using Coupled Transformations and Performance Models (NM, DCP, CMW), pp. 552–557.
SEKE-2015-Murillo-MoreraJ #algorithm #approach #framework #learning #predict #search-based- A Software Defect-Proneness Prediction Framework: A new approach using genetic algorithms to generate learning schemes (JMM, MJ), pp. 445–450.
SEKE-2015-NetoSZD #network- Using implications from FCA to represent a two mode network data (SMN, MAJS, LEZ, SMD), pp. 256–259.
SEKE-2015-SunSWZ #analysis #data flow #detection #fault #integer- Improving the Accuracy of Integer Signedness Error Detection Using Data Flow Analysis (HS, CS, YW, QZ), pp. 601–606.
SEKE-2015-TakahashiNT #automation #elicitation #feedback #requirements #topic #towards- Towards Automatic Requirements Elicitation from Feedback Comments: Extracting Requirements Topics Using LDA (HT, HN, TT), pp. 489–494.
SEKE-2015-Tasse #analysis #identification #metric- Using peak analysis for identifying lagged effects between software metrics (JT), pp. 512–515.
SEKE-2015-TrinkenreichSCS #metric #process #towards- Toward using Business Process Intelligence to Support Incident Management Metrics Selection and Service Improvement (BT, GS, VTFC, FMS), pp. 522–527.
SEKE-2015-TunnellA #fault #modelling #predict #release planning- Using Time Series Models for Defect Prediction in Software Release Planning (JT, JA), pp. 451–454.
SEKE-2015-XuB #multi #reliability- A Reliable and Secure Cloud Storage Schema Using Multiple Service Providers (HX, DB), pp. 116–121.
SIGIR-2015-AlbakourMO #data type #identification #metadata #topic- Using Sensor Metadata Streams to Identify Topics of Local Events in the City (MDA, CM, IO), pp. 711–714.
SIGIR-2015-AzzopardiZ #modelling #retrieval #tutorial- Building and Using Models of Information Seeking, Search and Retrieval: Full Day Tutorial (LA, GZ), pp. 1107–1110.
SIGIR-2015-CapraACV #complexity #difference- Differences in the Use of Search Assistance for Tasks of Varying Complexity (RC, JA, AC, EV), pp. 23–32.
SIGIR-2015-HaraSKF #recommendation- Reducing Hubness: A Cause of Vulnerability in Recommender Systems (KH, IS, KK, KF), pp. 815–818.
SIGIR-2015-Kiseleva #behaviour #information management- Using Contextual Information to Understand Searching and Browsing Behavior (JK), p. 1059.
SIGIR-2015-LiLZS #matrix #modelling #multi #retrieval- Modeling Multi-query Retrieval Tasks Using Density Matrix Transformation (QL, JL, PZ, DS), pp. 871–874.
SIGIR-2015-LiuAH #information retrieval #probability- Using Term Location Information to Enhance Probabilistic Information Retrieval (BL, XA, JXH), pp. 883–886.
SIGIR-2015-Lu #statistics- Improving Search using Proximity-Based Statistics (XL), p. 1065.
SIGIR-2015-MehrotraY #learning #query #rank- Representative & Informative Query Selection for Learning to Rank using Submodular Functions (RM, EY), pp. 545–554.
SIGIR-2015-Mitra #distributed #query- Exploring Session Context using Distributed Representations of Queries and Reformulations (BM), pp. 3–12.
SIGIR-2015-NovakBZ #image #retrieval #scalability- Large-scale Image Retrieval using Neural Net Descriptors (DN, MB, PZ), pp. 1039–1040.
SIGIR-2015-ParkC #concept #retrieval- Using Key Concepts in a Translation Model for Retrieval (JHP, WBC), pp. 927–930.
SIGIR-2015-WeiG #summary #twitter- Gibberish, Assistant, or Master?: Using Tweets Linking to News for Extractive Single-Document Summarization (ZW, WG), pp. 1003–1006.
SIGIR-2015-YaoSQWSH #recommendation #social- Context-aware Point-of-Interest Recommendation Using Tensor Factorization with Social Regularization (LY, QZS, YQ, XW, AS, QH), pp. 1007–1010.
SKY-2015-Oliveira #learning- Learning the Meaning of Language and using It Creatively (HGO), p. 3.
ECMFA-J-2012-PuissantSM15 #automation #consistency #nondeterminism- Resolving model inconsistencies using automated regression planning (JPP, RVDS, TM), pp. 461–481.
AMT-2015-HilkenBGV #development #modelling- Iterative Development of Transformation Models by Using Classifying Terms (FH, LB, MG, AV), pp. 1–6.
ICMT-2015-CriadoMIC #model transformation #reuse- Enabling the Reuse of Stored Model Transformations Through Annotations (JC, SMP, LI, JC), pp. 43–58.
ICMT-2015-MooijEHW #effectiveness #industrial #modelling- Cost-Effective Industrial Software Rejuvenation Using Domain-Specific Models (AJM, GE, JH, HvW), pp. 66–81.
MoDELS-2015-Fernandez-SaezC #documentation #industrial #maintenance #on the #overview #uml- On the use of UML documentation in software maintenance: Results from a survey in industry (AMFS, DC, MG, MRVC), pp. 292–301.
MoDELS-2015-LuddeckeSSS #modelling #network- Modeling user intentions for in-car infotainment systems using Bayesian networks (DL, CS, JS, IS), pp. 378–385.
MoDELS-2015-SchottleK #api #modelling #reuse- Concern-oriented interfaces for model-based reuse of APIs (MS, JK), pp. 286–291.
MoDELS-2015-StephanC #clone detection #detection #identification- Identification of Simulink model antipattern instances using model clone detection (MS, JRC), pp. 276–285.
SPLC-2015-BeekFGM #analysis #product line- Using FMC for family-based analysis of software product lines (MHtB, AF, SG, FM), pp. 432–439.
SPLC-2015-BeucheH #lifecycle #product line- Using pure: : variants across the product line lifecycle (DB, RH), pp. 352–354.
SPLC-2015-ChavarriagaRNCJ #case study #configuration management #experience #feature model #modelling #multi- Using multiple feature models to specify configuration options for electrical transformers: an experience report (JC, CR, CN, RC, VJ), pp. 216–224.
SPLC-2015-DimovskiABW #model checking #off the shelf- Family-based model checking using off-the-shelf model checkers: extended abstract (ASD, ASAS, CB, AW), p. 397.
SPLC-2015-DomisAB #analysis #modelling #safety #tool support #uml #variability- Integrating variability and safety analysis models using commercial UML-based tools (DD, RA, MB), pp. 225–234.
SPLC-2015-DudderRH #composition #design #staged #type safety- Synthesizing type-safe compositions in feature oriented software designs using staged composition (BD, JR, GTH), pp. 398–401.
SPLC-2015-PatelS #as a service #automation #testing #variability- Automated testing of software-as-a-service configurations using a variability language (SP, VS), pp. 253–262.
Onward-2015-CitoLGDKR #developer #feedback #metric #runtime- Runtime metric meets developer: building better cloud applications using feedback (JC, PL, HCG, AD, AK, AR), pp. 14–27.
OOPSLA-2015-VoelterDKE #c #case study #embedded- Using C language extensions for developing embedded software: a case study (MV, AvD, BK, SE), pp. 655–674.
PLATEAU-2015-KristenssonL #lightweight #visualisation- Aiding programmers using lightweight integrated code visualization (POK, CLL), pp. 17–24.
AdaEurope-2015-JaradatBP #analysis #maintenance #safety- Using Sensitivity Analysis to Facilitate the Maintenance of Safety Cases (OJ, IB, SP), pp. 162–176.
LOPSTR-2015-CaballeroMKH #automation #generative #java #testing- Checking Java Assertions Using Automated Test-Case Generation (RC0, MM, HK, VvH), pp. 221–226.
LOPSTR-2015-MantelMPW #analysis #automaton #composition #data flow #network- Using Dynamic Pushdown Networks to Automate a Modular Information-Flow Analysis (HM, MMO, MP, AW), pp. 201–217.
PADL-2015-BassedaK #logic #transaction- State Space Planning Using Transaction Logic (RB, MK), pp. 17–33.
PLDI-2015-BarowyGHZ #named #relational #spreadsheet- FlashRelate: extracting relational data from semi-structured spreadsheets using examples (DWB, SG, TH, BGZ), pp. 218–228.
PLDI-2015-CraryS #peer-to-peer- Peer-to-peer affine commitment using bitcoin (KC, MJS), pp. 479–488.
PLDI-2015-GonnordMR #ranking #synthesis- Synthesis of ranking functions using extremal counterexamples (LG, DM, GR), pp. 608–618.
POPL-2015-BastaniAA #context-free grammar #reachability #specification- Specification Inference Using Context-Free Language Reachability (OB, SA, AA), pp. 553–566.
PPDP-2015-RondogiannisT #logic programming- Expressing preferences in logic programming using an infinite-valued logic (PR, AT), pp. 208–219.
SAS-2015-AdjeGM #generative #invariant #optimisation #polynomial- Property-based Polynomial Invariant Generation Using Sums-of-Squares Optimization (AA, PLG, VM), pp. 235–251.
ASE-2015-CarinoA #optimisation #testing #user interface- Dynamically Testing GUIs Using Ant Colony Optimization (T) (SC, JHA), pp. 138–148.
ASE-2015-ChoetkiertikulD #classification #predict- Predicting Delays in Software Projects Using Networked Classification (T) (MC, HKD, TT, AG), pp. 353–364.
ASE-2015-DeweyRH #fuzzing #rust- Fuzzing the Rust Typechecker Using CLP (T) (KD, JR, BH), pp. 482–493.
ASE-2015-KhatchadourianR #detection- Detecting Broken Pointcuts Using Structural Commonality and Degree of Interest (N) (RK, AR, HM, TW), pp. 641–646.
ASE-2015-LemieuxB #behaviour #ltl #mining #specification- Investigating Program Behavior Using the Texada LTL Specifications Miner (CL, IB), pp. 870–875.
ASE-2015-MaAZSGR15a #automation #generative #named #program analysis- GRT: An Automated Test Generator Using Orchestrated Program Analysis (LM, CA, CZ, HS, JG, RR), pp. 842–847.
ASE-2015-MercerAVS #model checking #parallel #source code- Model Checking Task Parallel Programs Using Gradual Permissions (N) (EGM, PA, NV, VS), pp. 535–540.
ASE-2015-NardoPAB #modelling #robust #testing- Evolutionary Robustness Testing of Data Processing Systems Using Models and Data Mutation (T) (DDN, FP, AA, LCB), pp. 126–137.
ASE-2015-OdaFNHSTN #learning #pseudo #source code #statistics- Learning to Generate Pseudo-Code from Source Code Using Statistical Machine Translation (T) (YO, HF, GN, HH, SS, TT, SN), pp. 574–584.
ASE-2015-SohanAM #api #automation #documentation #named #rest- SpyREST: Automated RESTful API Documentation Using an HTTP Proxy Server (N) (SMS, CA, FM), pp. 271–276.
ASE-2015-Vargas-Baldrich #automation #bytecode #dependence- Automated Tagging of Software Projects Using Bytecode and Dependencies (N) (SVB, MLV, DP), pp. 289–294.
ASE-2015-WangD #architecture #behaviour #message passing- A Message-Passing Architecture without Public Ids Using Send-to-Behavior (ESSW, ZD), pp. 902–905.
ESEC-FSE-2015-HammoudiBBR #debugging #on the #web- On the use of delta debugging to reduce recordings and facilitate debugging of web applications (MH, BB, GB, GR), pp. 333–344.
ESEC-FSE-2015-KargenS #slicing #source code- Turning programs against each other: high coverage fuzz-testing using binary-code mutation and dynamic slicing (UK, NS), pp. 782–792.
ESEC-FSE-2015-NorthBSC #developer #named- GitSonifier: using sound to portray developer conflict history (KJN, SB, AS, MBC), pp. 886–889.
ESEC-FSE-2015-SenNGC #execution #multi #named #summary #symbolic computation- MultiSE: multi-path symbolic execution using value summaries (KS, GCN, LG, WC), pp. 842–853.
ESEC-FSE-2015-White #generative #parametricity #performance #search-based #testing- Increasing the efficiency of search-based unit test generation using parameter control (TW), pp. 1042–1044.
ESEC-FSE-2015-XuKB #ubiquitous- Using software theater for the demonstration of innovative ubiquitous applications (HX, SK, BB), pp. 894–897.
ICSE-v1-2015-Ben-DavidSAB #model checking #product line #requirements #satisfiability- Symbolic Model Checking of Product-Line Requirements Using SAT-Based Methods (SBD, BS, JMA, SB), pp. 189–199.
ICSE-v1-2015-JiaCHP #combinator #generative #interactive #learning #testing- Learning Combinatorial Interaction Test Generation Strategies Using Hyperheuristic Search (YJ, MBC, MH, JP), pp. 540–550.
ICSE-v1-2015-KalliamvakouDBS #collaboration #development #git #open source- Open Source-Style Collaborative Development Practices in Commercial Projects Using GitHub (EK, DED, KB, LS, DMG), pp. 574–585.
ICSE-v1-2015-PetrosyanRM #api #classification #information management- Discovering Information Explaining API Types Using Text Classification (GP, MPR, RDM), pp. 869–879.
ICSE-v1-2015-YangXALXE #behaviour #mobile #named- AppContext: Differentiating Malicious and Benign Mobile App Behaviors Using Context (WY, XX, BA, SL, TX, WE), pp. 303–313.
ICSE-v1-2015-YuanWWLYHFLCG #concurrent #debugging #named- ReCBuLC: Reproducing Concurrency Bugs Using Local Clocks (XY, CW, ZW, JL, PCY, JH, XF, YL, YC, YG), pp. 824–834.
ICSE-v2-2015-ArnaoudovaHMA #natural language #re-engineering #retrieval- The Use of Text Retrieval and Natural Language Processing in Software Engineering (VA, SH, AM, GA), pp. 949–950.
ICSE-v2-2015-BaoLXWZ #behaviour #developer #interactive #modelling #named #video- scvRipper: Video Scraping Tool for Modeling Developers’ Behavior Using Interaction Data (LB, JL, ZX, XW, BZ), pp. 673–676.
ICSE-v2-2015-CamilloniVA #evaluation #re-engineering- Using GSwE2009 for the Evaluation of a Master Degree in Software Engineering in the Universidad de la República (LC, DV, MAA), pp. 323–332.
ICSE-v2-2015-Cornu #debugging #named #null- Casper: Using Ghosts to Debug Null Deferences with Dynamic Causality Traces (BC), pp. 790–791.
ICSE-v2-2015-Escobar-Avila #automation #bytecode #categorisation #library- Automatic Categorization of Software Libraries Using Bytecode (JEA), pp. 784–786.
ICSE-v2-2015-GveroK #interactive #query #synthesis- Interactive Synthesis Using Free-Form Queries (TG, VK), pp. 689–692.
ICSE-v2-2015-HerzigN #detection #empirical- Empirically Detecting False Test Alarms Using Association Rules (KH, NN), pp. 39–48.
ICSE-v2-2015-LutellierCGTRMK #architecture #dependence- Comparing Software Architecture Recovery Techniques Using Accurate Dependencies (TL, DC, JG, LT, DR, NM, RK), pp. 69–78.
ICSE-v2-2015-MaleticC #analysis #semiparsing #source code- Exploration, Analysis, and Manipulation of Source Code Using srcML (JIM, MLC), pp. 951–952.
ICSE-v2-2015-MaplesdenRTHG #analysis #case study #industrial #performance- Performance Analysis Using Subsuming Methods: An Industrial Case Study (DM, KvR, EDT, JGH, JCG), pp. 149–158.
ICSE-v2-2015-PaasivaaraBLDSH #agile #learning #re-engineering- Learning Global Agile Software Engineering Using Same-Site and Cross-Site Teams (MP, KB, CL, DED, JS, FH, PC, AY, VI), pp. 285–294.
ICSE-v2-2015-SadeghiBM #analysis #android #security- Analysis of Android Inter-App Security Vulnerabilities Using COVERT (AS, HB, SM), pp. 725–728.
SAC-2015-BarrosCMP #education #learning #repository #reuse- Integrating educational repositories to improve the reuse of learning objects (HB, EC, JM, RP), pp. 270–272.
SAC-2015-BolockA #automation #constraints #generative #towards- Towards automatic poetry generation using constraint handling rules (AEB, SA), pp. 1868–1873.
SAC-2015-BorgesDSEAS #approach #performance #reasoning #reuse- Efficient approach for reusing and sharing train driving plans using case-based reasoning (APB, OBD, DMVS, FE, BCÁ, EES), pp. 505–508.
SAC-2015-ByunC #automation #constraints #operating system #safety #testing- Automated system-level safety testing using constraint patterns for automotive operating systems (TB, YC), pp. 1815–1822.
SAC-2015-CamaraHJJ #graph #modelling #persuasion #recommendation #social- Using graph-based models in a persuasive social recommendation system (JPC, SH, JJ, VJ), pp. 189–194.
SAC-2015-ChaudhuriMG #network #predict- QoS prediction for network data traffic using hierarchical modified regularized least squares rough support vector regression (AC, SM, SKG), pp. 659–661.
SAC-2015-CorcoglionitiRM #rdf #sorting #streaming- Processing billions of RDF triples on a single machine using streaming and sorting (FC, MR, MM, MA), pp. 368–375.
SAC-2015-CruzPQSSOBO #algorithm #game studies #named #probability- Amê: an environment to learn and analyze adversarial search algorithms using stochastic card games (ABC, LP, JQ, US, SS, AO, EB, ESO), pp. 208–213.
SAC-2015-DabainMT #design pattern #detection- Design pattern detection using FINDER (HD, AM, VT), pp. 1586–1593.
SAC-2015-DarabiG #personalisation #summary #video- Personalized video summarization using sift (KD, GG), pp. 1252–1256.
SAC-2015-DasK - Dynamic associativity management using utility based way-sharing (SD, HKK), pp. 1919–1924.
SAC-2015-DionisisCP #adaptation #execution #feedback #framework #hybrid #monitoring- A hybrid framework for WS-BPEL scenario execution adaptation, using monitoring and feedback data (MD, VC, GP), pp. 1672–1679.
SAC-2015-GouthamLY #authentication #protocol #smarttech- An anonymous ID-based remote mutual authentication with key agreement protocol on ECC using smart cards (RAG, GJL, KYY), pp. 169–174.
SAC-2015-HamataniUH #smarttech- Estimating core body temperature based on human thermal model using wearable sensors (TH, AU, TH), pp. 521–526.
SAC-2015-HozanoFSFC #detection #developer #feedback #smell- Using developers’ feedback to improve code smell detection (MH, HF, ICLS, BF, EC), pp. 1661–1663.
SAC-2015-HublerRFS #data flow #named- P-SaMI: a data-flow pattern to perform massively-parallel molecular docking experiments using a fully-flexible receptor model (PH, DDAR, JEF, ONdS), pp. 54–57.
SAC-2015-JeongYAYP #algorithm #interactive #network #search-based- Inference of disease-specific gene interaction network using a Bayesian network learned by genetic algorithm (DJ, YY, JA, YY, SP), pp. 47–53.
SAC-2015-Jo #algorithm #image #interactive #search-based- Color image quantization using interactive genetic algorithm (SJ), pp. 139–140.
SAC-2015-KimK #scalability- Dual region write buffering: making large-scale nonvolatile buffer using small capacitor in SSD (DK, SK), pp. 2039–2046.
SAC-2015-KimL #diagrams #qvt #sequence chart- Pattern-based transformation of sequence diagrams using QVT (DKK, BL), pp. 1492–1497.
SAC-2015-KrutzMS #analysis #detection #effectiveness- Examining the effectiveness of using concolic analysis to detect code clones (DEK, SAM, ES), pp. 1610–1615.
SAC-2015-LeTN #requirements #verification- Verifying eventuality properties of imprecise system requirements using event-B (HAL, NTT, SN), pp. 1651–1653.
SAC-2015-LiuI #clustering #framework #optimisation #parallel- An ETL optimization framework using partitioning and parallelization (XL, NI), pp. 1015–1022.
SAC-2015-MainiS #communication #distributed #multi- Distributed task servicing using multiple robots with human-in-the-loop under limited communication range (PM, PBS), pp. 301–306.
SAC-2015-OliveiraQMM #community #complexity #detection- Community detection, with lower time complexity, using coupled Kuramoto oscillators (JEMdO, MGQ, MDNM, EENM), pp. 1160–1166.
SAC-2015-PintoMCS #process- Using event logs and the Ψ-theory to analyse business processes (PLP, CM, AC, MMdS), pp. 1195–1202.
SAC-2015-Rekha #big data #detection #performance- A fast support vector data description system for anomaly detection using big data (AGR), pp. 931–932.
SAC-2015-RochaRCOMVADGF #algorithm #classification #dataset #documentation #named #performance- G-KNN: an efficient document classification algorithm for sparse datasets on GPUs using KNN (LCdR, GSR, RC, RSO, DM, FV, GA, SD, MAG, RF), pp. 1335–1338.
SAC-2015-RodriguesBM #approach #behaviour #clustering #correlation #energy- Using fractal clustering to explore behavioral correlation: a new approach to reduce energy consumption in WSN (FR, AB, JEBM), pp. 589–591.
SAC-2015-RodriguesJD #recommendation- Accelerating recommender systems using GPUs (AVR, AJ, ID), pp. 879–884.
SAC-2015-SilvaBAR #clustering #multi #prototype- Semi-supervised clustering using multi-assistant-prototypes to represent each cluster (WJS, MCNB, SdA, HLR), pp. 831–836.
SAC-2015-SilvaMR #algorithm #approach #problem- An approach to the MOGAS initialization problem using an algorithm based on path relinking (TGNdS, JEBM, LSR), pp. 118–124.
SAC-2015-SilvaSBVS #assessment #framework #process- Using ArchiMate to model a process assessment framework (NS, MMdS, BB, MV, PS), pp. 1189–1194.
SAC-2015-StracciaM #concept #estimation #fuzzy #learning #named #owl #probability- pFOIL-DL: learning (fuzzy) EL concept descriptions from crisp OWL data using a probabilistic ensemble estimation (US, MM), pp. 345–352.
SAC-2015-TizzeiABC #architecture #case study #product line #tool support- Architecting cloud tools using software product line techniques: an exploratory study (LPT, LGA, MdB, RFGC), pp. 1441–1448.
SAC-2015-XuanLXT #empirical #fault #metric #predict #set- Evaluating defect prediction approaches using a massive set of metrics: an empirical study (XX, DL, XX, YT), pp. 1644–1647.
SAC-2015-XuYYHHK #multi #predict- Solar irradiance forecasting using multi-layer cloud tracking and numerical weather prediction (JX, SY, DY, DH, JH, PK), pp. 2225–2230.
GPCE-2015-InostrozaS #algebra #composition- Modular interpreters for the masses: implicit context propagation using object algebras (PI, TvdS), pp. 171–180.
GPCE-2015-SeidlSS #design pattern #development #generative #product line #variability- Generative software product line development using variability-aware design patterns (CS, SS, IS), pp. 151–160.
SLE-2015-GammaitoniKG #design- Designing languages using lightning (LG, PK, CG), pp. 77–82.
SLE-2015-OchoaRT #feature model #modelling- Using decision rules for solving conflicts in extended feature models (LO, OGR, TT), pp. 149–160.
ASPLOS-2015-OrrCYBHW - Synchronization Using Remote-Scope Promotion (MSO, SC, AY, BMB, MDH, DAW), pp. 73–86.
ASPLOS-2015-Sidiroglou-Douskos #automation #branch #integer- Targeted Automatic Integer Overflow Discovery Using Goal-Directed Conditional Branch Enforcement (SSD, EL, NR, PP, FL, DK, MCR), pp. 473–486.
ASPLOS-2015-TanQCAP #named #network- DIABLO: A Warehouse-Scale Computer Network Simulator using FPGAs (ZT, ZQ, XC, KA, DAP), pp. 207–221.
CASE-2015-AmriBARF #multi #robust- Robust indoor location tracking of multiple inhabitants using only binary sensors (MHA, YB, DA, NR, MF), pp. 194–199.
CASE-2015-ArdakaniORJ #generative #predict #realtime- Real-time trajectory generation using model predictive control (MMGA, BO, AR, RJ), pp. 942–948.
CASE-2015-BergagardF #automation #on the- On restart of automated manufacturing systems using restart states (PB, MF), pp. 166–167.
CASE-2015-CarliDEAV #automation #evaluation- Automated evaluation of urban traffic congestion using bus as a probe (RC, MD, NE, BA, AV), pp. 967–972.
CASE-2015-CarliDPR #energy #multi #optimisation #performance- Using multi-objective optimization for the integrated energy efficiency improvement of a smart city public buildings’ portfolio (RC, MD, RP, LR), pp. 21–26.
CASE-2015-CarmenateRLBM #analysis #approach #behaviour #energy #modelling- Modeling and analyzing occupant behaviors in building energy analysis using an information space approach (TC, MMR, DL, LB, AM), pp. 425–431.
CASE-2015-ChengHL #automation #petri net #robust #synthesis- Robust supervisor synthesis for automated manufacturing systems using Petri nets (YC, HH, YL), pp. 1029–1035.
CASE-2015-ChenH #assembly #automation #distributed #petri net- Maximally permissive distributed control of automated manufacturing systems with assembly operations using Petri nets (CC, HH), pp. 532–538.
CASE-2015-DobslawGZ #challenge #industrial #network- Challenges for the use of data aggregation in industrial Wireless Sensor Networks (FD, MG, TZ), pp. 138–144.
CASE-2015-FarhanPWL #algorithm #machine learning #predict- Predicting individual thermal comfort using machine learning algorithms (AAF, KRP, BW, PBL), pp. 708–713.
CASE-2015-FeiAR #bound #clustering #resource management #symbolic computation- Symbolic computation of boundary unsafe states in complex resource allocation systems using partitioning techniques (ZF, KÅ, SAR), pp. 799–806.
CASE-2015-FeldmannHKWKQLK #case study #comparison #consistency #design #nondeterminism- A comparison of inconsistency management approaches using a mechatronic manufacturing system design case study (SF, SJIH, KK, TW, DK, AQ, UL, HK, CJJP, BVH), pp. 158–165.
CASE-2015-FerreiraBGV #framework- Consolidation of the control system of a chemical polishing machine for superconducting RF cavities using the UNICOS-CPC framework (RF, SB, PG, HV), pp. 1471–1476.
CASE-2015-ForstnerM #optimisation #safety- Using simulation-based optimization to determine production strategies and safety stock levels in semiconductor supply chains (LF, LM), pp. 655–656.
CASE-2015-GiulianiC #optimisation #problem- Derivative-free optimization with use of problem structure: Applications to oil production (CMG, EC), pp. 764–768.
CASE-2015-JiaJCS #locality #named- SoundLoc: Accurate room-level indoor localization using acoustic signatures (RJ, MJ, ZC, CJS), pp. 186–193.
CASE-2015-KaipaTSKLG #automation- Resolving automated perception system failures in bin-picking tasks using assistance from remote human operators (KNK, SSTK, SS, AMK, JDL, SKG), pp. 1453–1458.
CASE-2015-KeroglouH #communication #constraints #distributed- Distributed diagnosis using predetermined synchronization strategies in the presence of communication constraints (CK, CNH), pp. 831–836.
CASE-2015-KimCLJ #design #estimation- Design of pitch controller for wind turbines using time-delay estimation (JK, JC, JL, MJ), pp. 1131–1136.
CASE-2015-KreutzerRREL #automation #detection #metric- Automatically detecting fluid intake using conductivity measurements of beverages in a cup (JFK, SR, SMFR, KE, TCL), pp. 1546–1551.
CASE-2015-LeeKK #online #parametricity- Control of an aerial manipulator using on-line parameter estimator for an unknown payload (HL, SK, HJK), pp. 316–321.
CASE-2015-LiangSQLY #agile #assessment #development- Criteria for lean practice selection: Development an assessment tool using the rooted arborescence (YL, SS, LQ, YL, GY), pp. 237–242.
CASE-2015-LinZW #predict #realtime- Using real-time sensing data for predicting future state of building fires (CCL, GZ, LLW), pp. 1313–1318.
CASE-2015-LiuC #algorithm #evaluation #performance #quality- A fast algorithm for grasp quality evaluation using the object wrench space (SL, SC), pp. 558–563.
CASE-2015-MeddouriDF #analysis #generative #induction #performance #predict- Performance analysis of an autonomous induction generator under different operating conditions using predictive control (SM, LAD, LF), pp. 1118–1124.
CASE-2015-MillerM #locality- Optimal planning for target localization and coverage using range sensing (LMM, TDM), pp. 501–508.
CASE-2015-ParisACAR #behaviour #learning #markov #smarttech- Using Hidden Semi-Markov Model for learning behavior in smarthomes (AP, SA, NC, AEA, NR), pp. 752–757.
CASE-2015-ProdelAXJL #database #integer #linear #mining #process #programming- Discovery of patient pathways from a national hospital database using process mining and integer linear programming (MP, VA, XX, BJ, LL), pp. 1409–1414.
CASE-2015-QuangTH #adaptation- FPGA-based sensorless PMSM speed control using adaptive extended Kalman filter (NKQ, DDT, QPH), pp. 1650–1655.
CASE-2015-RoyelYLLH #identification #optimisation #parametricity- A hysteresis model and parameter identification for MR pin joints using immune particle swarm optimization (SR, YY, YL, JL, QPH), pp. 1319–1324.
CASE-2015-SaksenaNKK #2d #assembly #automation #parametricity- Automatic tuning of impedance parameter using configuration space for two dimensional assembly system (AS, TN, JK, KK), pp. 1110–1117.
CASE-2015-Schwung #automaton #cyber-physical #hybrid #modelling- Cyber-physical modeling of compression systems using hybrid automata (AS), pp. 1125–1130.
CASE-2015-SrinivasanBSSR #automation #machine learning #modelling #network- Modelling time-varying delays in networked automation systems with heterogeneous networks using machine learning techniques (SS, FB, GS, BS, SR), pp. 362–368.
CASE-2015-TorresP #multi- Cooperative control of multiple untethered magnetic microrobots using a single magnetic field source (NAT, DOP), pp. 1608–1613.
CASE-2015-WahrburgMCMD #estimation- Cartesian contact force estimation for robotic manipulators using Kalman filters and the generalized momentum (AW, EM, GC, BM, HD), pp. 1230–1235.
CASE-2015-WareS #synthesis- Synthesis time optimal accepting traces using language projection and pruning (SW, RS), pp. 1363–1368.
CASE-2015-Yen #realtime- Optimize the flight path for airlines using real-time information (JRY), p. 1649.
CASE-2015-ZafarKSMJA #health #monitoring #process- Tool health monitoring for wood milling process using airborne acoustic emission (TZ, KK, ZS, SM, AJ, UA), pp. 1521–1526.
CASE-2015-ZhangTYL #assessment #markov #reliability- CAN node reliability assessment using segmented discrete time Markov chains (LZ, LT, FY, YL), pp. 231–236.
CASE-2015-ZhuCS #energy #linear #process #recognition- Using unlabeled acoustic data with locality-constrained linear coding for energy-related activity recognition in buildings (QZ, ZC, YCS), pp. 174–179.
CASE-2015-ZonEHJVSB #delivery #detection #multi #realtime- Real-time collision detection for multiple packaging robots using monotonicity of configuration subspaces (RvZ, DE, DH, IJ, RV, RIS, KB), pp. 1638–1643.
CGO-2015-NagarajG #analysis #approximate #mining #pointer- Approximating flow-sensitive pointer analysis using frequent itemset mining (VN, RG), pp. 225–234.
DAC-2015-AsadJ #programming #verification- Verifying inevitability of phase-locking in a charge pump phase lock loop using sum of squares programming (HuA, KDJ), p. 6.
DAC-2015-CampbellLMC #debugging #detection #fault #hybrid #synthesis #validation- Hybrid quick error detection (H-QED): accelerator validation and debug using high-level synthesis principles (KAC, DL, SM, DC), p. 6.
DAC-2015-Engblom #integration #platform- Virtual to the (near) end: using virtual platforms for continuous integration (JE), p. 6.
DAC-2015-HanKL #design #evaluation- Evaluation of BEOL design rule impacts using an optimal ILP-based detailed router (KH, ABK, HL), p. 6.
DAC-2015-HelalBH #parallel #simulation- Parallel circuit simulation using the direct method on a heterogeneous cloud (AEH, AMB, YYH), p. 6.
DAC-2015-HerdtLD #simulation #verification- Verifying SystemC using stateful symbolic simulation (VH, HML, RD), p. 6.
DAC-2015-LahiouelZT #smt #towards- Towards enhancing analog circuits sizing using SMT-based techniques (OL, MHZ, ST), p. 6.
DAC-2015-MundhenkSLFC #analysis #architecture #model checking #probability #security- Security analysis of automotive architectures using probabilistic model checking (PM, SS, ML, SAF, SC), p. 6.
DAC-2015-PapamichaelMH #algorithm #automation #design #named #performance #search-based- Nautilus: fast automated IP design space search using guided genetic algorithms (MKP, PM, JCH), p. 6.
DAC-2015-SonghoriHSK #logic #nearest neighbour #privacy #synthesis- Compacting privacy-preserving k-nearest neighbor search using logic synthesis (EMS, SUH, ARS, FK), p. 6.
DAC-2015-TashjianD #identification #on the- On using control signals for word-level identification in a gate-level netlist (ET, AD), p. 6.
DAC-2015-TsaiYPLTCC #design #energy #in memory #memory management- Energy-efficient non-volatile TCAM search engine design using priority-decision in memory technology for DPI (HJT, KHY, YCP, CCL, YHT, MFC, TFC), p. 6.
DAC-2015-XuLP #adaptation #modelling #physics #statistics- Adaptive characterization and emulation of delay-based physical unclonable functions using statistical models (TX, DL, MP), p. 6.
DAC-2015-YoonSMC #behaviour #detection #embedded #heatmap #memory management #realtime- Memory heat map: anomaly detection in real-time embedded systems using memory behavior (MKY, LS, SM, JC), p. 6.
DAC-2015-ZhouAZYUGUJ #detection #embedded #hardware- Detecting hardware trojans using backside optical imaging of embedded watermarks (BZ, RA, MZ, TY, AU, BBG, MSÜ, AJ), p. 6.
DAC-2015-ZhuangYKWC #algorithm #exponential #framework #performance #scalability #simulation- An algorithmic framework for efficient large-scale circuit simulation using exponential integrators (HZ, WY, IK, XW, CKC), p. 6.
DATE-2015-AhsanK #architecture #optimisation #quantum- Optimization of quantum computer architecture using a resource-performance simulator (MA, JK), pp. 1108–1113.
DATE-2015-BalboniFB #configuration management #distributed #latency #multi #network #scalability- Synergistic use of multiple on-chip networks for ultra-low latency and scalable distributed routing reconfiguration (MB, JF, DB), pp. 806–811.
DATE-2015-BaldwinBRPB #analysis #array #predict- Gait analysis for fall prediction using hierarchical textile-based capacitive sensor arrays (RB, SB, RR, CP, NB), pp. 1293–1298.
DATE-2015-BarraganL #case study #feature model- Feature selection for alternate test using wrappers: application to an RF LNA case study (MJB, GL), pp. 1229–1232.
DATE-2015-BillointSRVBFRC #2d #3d #design- A comprehensive study of monolithic 3D cell on cell design using commercial 2D tool (OB, HS, IR, MV, PB, CFB, OR, GC, FD, AF, JM, OF, OT, JFC, ST, FC), pp. 1192–1196.
DATE-2015-CakirM #clustering #correlation #detection #hardware- Hardware Trojan detection for gate-level ICs using signal correlation based clustering (BÇ, SM), pp. 471–476.
DATE-2015-ChangD #analysis #model checking #modelling- May-happen-in-parallel analysis of ESL models using UPPAAL model checking (CWC, RD), pp. 1567–1570.
DATE-2015-ChenYQFM #evaluation #model checking #scheduling #statistics- Variation-aware evaluation of MPSoC task allocation and scheduling strategies using statistical model checking (MC, DY, XQ, XF, PM), pp. 199–204.
DATE-2015-CuiZSW #towards- Towards trustable storage using SSDs with proprietary FTL (XC, MZ, LS, KW), pp. 1213–1216.
DATE-2015-DarkeCVSM #approximate #bound #model checking- Over-approximating loops to prove properties using bounded model checking (PD, BC, RV, US, RM), pp. 1407–1412.
DATE-2015-ErolOSPB #metric- On-chip measurement of bandgap reference voltage using a small form factor VCO based zoom-in ADC (OEE, SO, CKHS, RAP, LB), pp. 1559–1562.
DATE-2015-FernandoWNKC #agile #algorithm #design #synthesis- (AS)2: accelerator synthesis using algorithmic skeletons for rapid design space exploration (SF, MW, CN, AK, HC), pp. 305–308.
DATE-2015-HashemianSWWCP #array #authentication #robust- A robust authentication methodology using physically unclonable functions in DRAM arrays (MSH, BPS, FGW, DJW, SC, CAP), pp. 647–652.
DATE-2015-HerberRWH #realtime #scheduling- Real-time capable CAN to AVB ethernet gateway using frame aggregation and scheduling (CH, AR, TW, AH), pp. 61–66.
DATE-2015-JiRML #hardware #implementation #logic #network #probability- A hardware implementation of a radial basis function neural network using stochastic logic (YJ, FR, CM, DJL), pp. 880–883.
DATE-2015-KauerNLSC #geometry #optimisation #programming- Inductor optimization for active cell balancing using geometric programming (MK, SN, ML, SS, SC), pp. 281–284.
DATE-2015-LiaperdosSATAL #deployment #performance- Fast deployment of alternate analog test using Bayesian model fusion (JL, HGDS, LA, YT, AA, XL), pp. 1030–1035.
DATE-2015-LiJHWCGLKW #design #optimisation- Variation-aware, reliability-emphasized design and optimization of RRAM using SPICE model (HL, ZJ, PH, YW, HYC, BG, XYL, JFK, HSPW), pp. 1425–1430.
DATE-2015-LiXWNP #fine-grained #multi #power management #reduction- Leakage power reduction for deeply-scaled FinFET circuits operating in multiple voltage regimes using fine-grained gate-length biasing technique (JL, QX, YW, SN, MP), pp. 1579–1582.
DATE-2015-LourencoMH - Layout-aware sizing of analog ICs using floorplan & routing estimates for parasitic extraction (NCL, RM, NH), pp. 1156–1161.
DATE-2015-MadhukarSWKM #abstraction #lazy evaluation #verification- Verifying synchronous reactive systems using lazy abstraction (KM, MS, BW, DK, RM), pp. 1571–1574.
DATE-2015-MunchPHH #embedded #manycore #named #realtime #scalability- MPIOV: scaling hardware-based I/O virtualization for mixed-criticality embedded real-time systems using non transparent bridges to (multi-core) multi-processor systems (DM, MP, OH, AH), pp. 579–584.
DATE-2015-PaulinoFBC #configuration management #execution #hardware- Transparent acceleration of program execution using reconfigurable hardware (NMCP, JCF, JB, JMPC), pp. 1066–1071.
DATE-2015-RanjanRVPRR #configuration management #memory management #named- DyReCTape: a dynamically reconfigurable cache using domain wall memory tapes (AR, SGR, RV, VSP, KR, AR), pp. 181–186.
DATE-2015-SaifhashemiHBB #equivalence #logic #tool support- Logical equivalence checking of asynchronous circuits using commercial tools (AS, HHH, PB, PAB), pp. 1563–1566.
DATE-2015-SalfelderH #adaptation #evaluation #simulation- Ageing simulation of analogue circuits and systems using adaptive transient evaluation (FS, LH), pp. 1261–1264.
DATE-2015-ShutoYS #architecture #case study #comparative- Comparative study of power-gating architectures for nonvolatile FinFET-SRAM using spintronics-based retention technology (YS, SY, SS), pp. 866–871.
DATE-2015-StrobelBOSP #named- Scandalee: a side-channel-based disassembler using local electromagnetic emanations (DS, FB, DO, FS, CP), pp. 139–144.
DATE-2015-SunKPE #algebra #geometry #verification- Formal verification of sequential Galois field arithmetic circuits using algebraic geometry (XS, PK, TP, FE), pp. 1623–1628.
DATE-2015-TanLF #memory management #reliability- Soft-error reliability and power co-optimization for GPGPUS register file using resistive memory (JT, ZL, XF), pp. 369–374.
DATE-2015-TeysseyreNOCCG #performance #set #simulation- Fast optical simulation from a reduced set of impulse responses using SystemC-AMS (FT, DN, IO, FC, FC, OG), pp. 405–409.
DATE-2015-VenkataramanKSE #design #heuristic- Designing inexact systems efficiently using elimination heuristics (SV, AK, JS, CCE), pp. 758–763.
DATE-2015-WengCCHW - Using structural relations for checking combinationality of cyclic circuits (WCW, YCC, JHC, CYH, CYW), pp. 325–328.
DATE-2015-YuSHEAB #library #multi #statistics- Statistical library characterization using belief propagation across multiple technology nodes (LY, SS, CH, IME, DAA, DSB), pp. 1383–1388.
DATE-2015-ZhuM #linear #machine learning #optimisation #programming- Optimizing dynamic trace signal selection using machine learning and linear programming (CSZ, SM), pp. 1289–1292.
HPCA-2015-HungerKRDVT #comprehension- Understanding contention-based channels and using them for defense (CH, MK, ASR, AGD, SV, MT), pp. 639–650.
HPCA-2015-LoCIS #monitoring #runtime- Run-time monitoring with adjustable overhead using dataflow-guided filtering (DL, TC, MI, GES), pp. 662–674.
HPCA-2015-WuGLJC #estimation #machine learning #performance- GPGPU performance and power estimation using machine learning (GYW, JLG, AL, NJ, DC), pp. 564–576.
HPDC-2015-HeSSI #cost analysis #online- Cutting the Cost of Hosting Online Services Using Cloud Spot Markets (XH, PJS, RKS, DEI), pp. 207–218.
ISMM-2015-OsterlundL #concurrent #protocol- Concurrent compaction using a field pinning protocol (EÖ, WL), pp. 56–69.
LCTES-2015-BardizbanyanSWL #data access #performance- Improving Data Access Efficiency by Using Context-Aware Loads and Stores (AB, MS, DBW, PLE), p. 10.
PDP-2015-El-KazzazE #detection #framework #scalability #ubiquitous- A Hadoop-Based Framework for Large-Scale Landmine Detection Using Ubiquitous Big Satellite Imaging Data (SEK, AEM), pp. 274–278.
PDP-2015-GianariaG #image #realtime #simulation- Real-Time Simulation of Radiological Images Using CUDA Technology (EG, EG), pp. 669–673.
PDP-2015-HernandezCBTA #case study #experience #simulation- Experiences of Using Cassandra for Molecular Dynamics Simulations (RH, CC, YB, JT, EA), pp. 288–295.
PDP-2015-MiwaN #thread- Progression of MPI Non-blocking Collective Operations Using Hyper-Threading (MM, KN), pp. 163–171.
PDP-2015-SimonetCFF - Using Active Data to Provide Smart Data Surveillance to E-Science Users (AS, KC, GF, ITF), pp. 269–273.
PDP-2015-TrahayBBL - Selecting Points of Interest in Traces Using Patterns of Events (FT, EB, MMB, JL), pp. 70–77.
PPoPP-2015-RamachandranM #concurrent #named #performance- CASTLE: fast concurrent internal binary search tree using edge-based locking (AR, NM), pp. 281–282.
SOSP-2015-ChenZCCKZ #file system #hoare #logic- Using Crash Hoare logic for certifying the FSCQ file system (HC, DZ, TC, AC, MFK, NZ), pp. 18–37.
SOSP-2015-RaychevMM #execution #symbolic computation- Parallelizing user-defined aggregations using symbolic execution (VR, MM, TM), pp. 153–167.
SOSP-2015-WeiSCCC #in memory #performance #transaction- Fast in-memory transaction processing using RDMA and HTM (XW, JS, YC, RC, HC), pp. 87–104.
FASE-2015-AndriescuMI #automaton #data type- Composing Message Translators and Inferring Their Data Types Using Tree Automata (EA, TM, VI), pp. 35–50.
STOC-2015-AggarwalDRS #problem- Solving the Shortest Vector Problem in 2n Time Using Discrete Gaussian Sampling: Extended Abstract (DA, DD, OR, NSD), pp. 733–742.
STOC-2015-Czumaj #network #permutation #random- Random Permutations using Switching Networks (AC), pp. 703–712.
TACAS-2015-BransenBCD #attribute grammar #order #scheduling- Linearly Ordered Attribute Grammar Scheduling Using SAT-Solving (JB, LTvB, KC, AD), pp. 289–303.
TACAS-2015-HolikHLRSV #analysis #automaton #contest #named- Forester: Shape Analysis Using Tree Automata — (Competition Contribution) (LH, MH, OL, AR, JS, TV), pp. 432–435.
TACAS-2015-KriouileS #formal method #verification- Using a Formal Model to Improve Verification of a Cache-Coherent System-on-Chip (AK, WS), pp. 708–722.
TACAS-2015-Thierry-Mieg #model checking- Symbolic Model-Checking Using ITS-Tools (YTM), pp. 231–237.
CADE-2015-GransdenWR #automaton #named #proving- SEPIA: Search for Proofs Using Inferred Automata (TG, NW, RR), pp. 246–255.
CADE-2015-MaricJM #correctness #higher-order #proving- Proving Correctness of a KRK Chess Endgame Strategy by Using Isabelle/HOL and Z3 (FM, PJ, MM), pp. 256–271.
CADE-2015-Paulson #automaton #finite #formal method #set- A Formalisation of Finite Automata Using Hereditarily Finite Sets (LCP), pp. 231–245.
CADE-2015-TiwariGD #synthesis- Program Synthesis Using Dual Interpretation (AT, AG, BD), pp. 482–497.
CAV-2015-BacchusK #satisfiability #set- Using Minimal Correction Sets to More Efficiently Compute Minimal Unsatisfiable Sets (FB, GK), pp. 70–86.
CAV-2015-CernyCHRRST #scheduling #synthesis- From Non-preemptive to Preemptive Scheduling Using Synchronization Synthesis (PC, EMC, TAH, AR, LR, RS, TT), pp. 180–197.
CAV-2015-DeshmukhMP #consistency #metric- Quantifying Conformance Using the Skorokhod Metric (JVD, RM, VSP), pp. 234–250.
CAV-2015-ErezN #automation #bound #graph #smt- Finding Bounded Path in Graph Using SMT for Automatic Clock Routing (AE, AN), pp. 20–36.
ICLP-2015-Charwat #diagrams #programming #research #summary- Dynamic Programming on Tree Decompositions using Binary Decision Diagrams: Research Summary (GC), pp. 301–310.
ICLP-2015-LeeWZ #automation #programming #reasoning #set- Automated Reasoning about XACML 3.0 Delegation Using Answer Set Programming (JL, YW, YZ), pp. 247–259.
ICLP-2015-LiVPSB #debugging- Debugging ASP using ILP (TL, MDV, JP, KS, TB), pp. 100–113.
ICLP-J-2015-BogaertsB #approximate #compilation #fixpoint #logic programming #source code- Knowledge compilation of logic programs using approximation fixpoint theory (BB, GVdB), pp. 464–480.
ICLP-J-2015-KoponenOJS #optimisation #programming #set- Optimizing phylogenetic supertrees using answer set programming (LK, EO, TJ, LS), pp. 604–619.
ICST-2015-0001YPGS #analysis #generative #testing- Generating Succinct Test Cases Using Don’t Care Analysis (CN, HY, MRP, IG, KS), pp. 1–10.
ICST-2015-BaiSP #fault #named- NUMFL: Localizing Faults in Numerical Software Using a Value-Based Causal Model (ZB, GS, AP), pp. 1–10.
ICST-2015-Felbinger #assessment #model inference #quality #testing- Test Suite Quality Assessment Using Model Inference Techniques (HF), pp. 1–2.
ICST-2015-LeottaSRT #multi #robust #testing #web- Using Multi-Locators to Increase the Robustness of Web Test Cases (ML, AS, FR, PT), pp. 1–10.
ICST-2015-MahajanH #detection #html #locality- Detection and Localization of HTML Presentation Failures Using Computer Vision-Based Techniques (SM, WGJH), pp. 1–10.
ICST-2015-NoguchiWFSO #black box #optimisation #testing- History-Based Test Case Prioritization for Black Box Testing Using Ant Colony Optimization (TN, HW, YF, AS, KO), pp. 1–2.
ICST-2015-RaposD #execution #fuzzy #logic #symbolic computation #testing #uml- Using Fuzzy Logic and Symbolic Execution to Prioritize UML-RT Test Cases (EJR, JD), pp. 1–10.
ICST-2015-SantosC #agile #challenge #industrial #mobile #testing- Mobile Testing in Software Industry Using Agile: Challenges and Opportunities (AS, IC), pp. 1–2.
ICTSS-2015-GrozSPO #finite #identification #sequence #state machine- Inferring Finite State Machines Without Reset Using State Identification Sequences (RG, AdSS, AP, CO), pp. 161–177.
ICTSS-2015-GunicenJY #adaptation #generative #multi #sequence- Using Multiple Adaptive Distinguishing Sequences for Checking Sequence Generation (CG, GVJ, HY), pp. 19–34.
ICTSS-2015-HentzVM #cost analysis #grammarware #testing- Reducing the Cost of Grammar-Based Testing Using Pattern Coverage (CH, JJV, AMM), pp. 71–85.
ISSTA-2015-JiaGY #constraints #execution #reuse #symbolic computation- Enhancing reuse of constraint solutions to improve symbolic execution (XJ, CG, SY), pp. 177–187.
ISSTA-2015-ShenLPG #automation #detection #performance #profiling #search-based- Automating performance bottleneck detection using search-based application profiling (DS, QL, DP, MG), pp. 270–281.
SAT-2015-AnsoteguiGLS #community #detection- Using Community Structure to Detect Relevant Learnt Clauses (CA, JGC, JL, LS), pp. 238–254.
TAP-2015-AthanasiouLS #concurrent #generative #testing- Test Case Generation for Concurrent Systems Using Event Structures (KA, HPdL, SS), pp. 19–37.
TAP-2015-MoreiraHDMNM #case study #code generation #testing #tool support #verification- Verifying Code Generation Tools for the B-Method Using Tests: A Case Study (AMM, CH, DD, ECBdM, JBSN, VdMJ), pp. 76–91.
VMCAI-2015-ChristakisG #composition #image #memory management #parsing #proving #safety #testing- Proving Memory Safety of the ANI Windows Image Parser Using Compositional Exhaustive Testing (MC, PG), pp. 373–392.
VMCAI-2015-NagarS #analysis- Path Sensitive Cache Analysis Using Cache Miss Paths (KN, YNS), pp. 43–60.
CBSE-2014-BenedittoW #configuration management #runtime- Using a model to generate reconfiguration plans at runtime (MEMDB, CMLW), pp. 65–74.
CBSE-2014-MateescuSY #model checking #parallel #process- Quantifying the parallelism in BPMN processes using model checking (RM, GS, LY), pp. 159–168.
ECSA-2014-FreudenreichAFB #architecture #complexity #policy- Using Policies for Handling Complexity of Event-Driven Architectures (TF, SA, SF, APB), pp. 114–129.
QoSA-2014-BrunnertWK #architecture #enterprise #modelling #performance- Using architecture-level performance models as resource profiles for enterprise applications (AB, KW, HK), pp. 53–62.
QoSA-2014-FouquetNDBBPM #architecture #design #distributed #evolution- Designing and evolving distributed architecture using kevoree (FF, GN, ED, JB, OB, NP, BM), pp. 147–148.
DocEng-2014-Fan0N - Paper stitching using maximum tolerant seam under local distortions (WF, JS, SN), pp. 35–44.
DocEng-2014-KolbergFRF #analysis #documentation #performance #throughput- JAR tool: using document analysis for improving the throughput of high performance printing environments (MLK, LGF, MR, CF), pp. 175–178.
DocEng-2014-NourashrafeddinMA #approach #clustering #concept #documentation #wiki- An ensemble approach for text document clustering using Wikipedia concepts (SN, EEM, DVA), pp. 107–116.
DocEng-2014-SouzaMH #metadata #named- ARCTIC: metadata extraction from scientific papers in pdf using two-layer CRF (AS, VPM, CAH), pp. 121–130.
DRR-2014-BanerjeeC #locality #video- Video text localization using wavelet and shearlet transforms (PB, BBC), p. ?–10.
DRR-2014-JainOD #documentation #image #retrieval #scalability- Scalable ranked retrieval using document images (RJ, DWO, DSD), p. ?–15.
DRR-2014-KleberDS #classification #retrieval #word- Form classification and retrieval using bag of words with shape features of line structures (FK, MD, RS), pp. 902107–9.
DRR-2014-LemaitreCC #image #segmentation- Handwritten text segmentation using blurred image (AL, JC, BC), p. ?–12.
DRR-2014-ParkerFF #documentation #heuristic #image #robust- Robust binarization of degraded document images using heuristics (JP, OF, GF), p. ?–12.
DRR-2014-TaoTX #documentation #learning #random- Document page structure learning for fixed-layout e-books using conditional random fields (XT, ZT, CX), p. ?–9.
HT-2014-AbbasiTL #learning #scalability- Scalable learning of users’ preferences using networked data (MAA, JT, HL), pp. 4–12.
HT-2014-NoorianMV #adaptation #feedback #self- Self-adaptive filtering using pid feedback controller in electronic commerce (ZN, MM, JV), pp. 267–272.
JCDL-2014-BatjargalKKM #database #identification #image #multi- Identifying the same records across multiple Ukiyo-e image databases using textual data in different languages (BB, TK, FK, AM), pp. 193–196.
JCDL-2014-ChenF #education #metadata- Using ACM DL paper metadata as an auxiliary source for building educational collections (YC, EAF), pp. 137–140.
JCDL-2014-ChoiLD #automation #classification #what- What is this song about anyway?: Automatic classification of subject using user interpretations and lyrics (KC, JHL, JSD), pp. 453–454.
JCDL-2014-DibieMS #approach #behaviour #comprehension #education #online #predict- A computational approach to understanding and predicting the behavior of educators using an online curriculum planning tool (OD, KEM, TS), pp. 487–488.
JCDL-2014-GuoGL #education- Using affective embodied agents in information literacy education (YG, DHLG, BL), pp. 389–398.
JCDL-2014-KellyNW14a #experience #named #web- Mink: Integrating the live and archived web viewing experience using web browsers and memento (MK, MLN, MCW), pp. 469–470.
JCDL-2014-MeuschkeG #detection #retrieval- Reducing computational effort for plagiarism detection by using citation characteristics to limit retrieval space (NM, BG), pp. 197–200.
JCDL-2014-PereiraSE - Disambiguating publication venue titles using association rules (DAP, EEBdS, AAAE), pp. 77–86.
SIGMOD-2014-DyresonBG #query- Querying virtual hierarchies using virtual prefix-based numbers (CED, SSB, RG), pp. 791–802.
SIGMOD-2014-ElmeleegyOR #distributed #memory management #named #pipes and filters- SpongeFiles: mitigating data skew in mapreduce using distributed memory (KE, CO, BR), pp. 551–562.
SIGMOD-2014-HeMD #policy #privacy #trade-off- Blowfish privacy: tuning privacy-utility trade-offs using policies (XH, AM, BD), pp. 1447–1458.
SIGMOD-2014-KalininCZ #data analysis #interactive #semantics- Interactive data exploration using semantic windows (AK, UÇ, SBZ), pp. 505–516.
SIGMOD-2014-LevinK #network #pipes and filters #social- Stratified-sampling over social networks using mapreduce (RL, YK), pp. 863–874.
SIGMOD-2014-SatishSPSPHSYD #dataset #framework #graph #navigation- Navigating the maze of graph analytics frameworks using massive graph datasets (NS, NS, MMAP, JS, JP, MAH, SS, ZY, PD), pp. 979–990.
VLDB-2014-FuOPZ #component #declarative #javascript #named- FORWARD: Data-Centric UIs using Declarative Templates that Efficiently Wrap Third-Party JavaScript Components (YF, KWO, YP, EZ), pp. 1649–1652.
VLDB-2014-SarmaHC #clustering #framework #named #similarity- ClusterJoin: A Similarity Joins Framework using Map-Reduce (ADS, YH, SC), pp. 1059–1070.
VLDB-2014-SunRYD #classification #crowdsourcing #machine learning #named #scalability- Chimera: Large-Scale Classification using Machine Learning, Rules, and Crowdsourcing (CS, NR, FY, AD), pp. 1529–1540.
VLDB-2014-YangDCC #keyword #knowledge base- Finding Patterns in a Knowledge Base using Keywords to Compose Table Answers (MY, BD, SC, KC), pp. 1809–1820.
VLDB-2014-YuMS #random- Reverse Top-k Search using Random Walk with Restart (AWY, NM, HS), pp. 401–412.
VLDB-2014-ZhangJSR #big data #recommendation- Getting Your Big Data Priorities Straight: A Demonstration of Priority-based QoS using Social-network-driven Stock Recommendation (RZ, RJ, PS, LR), pp. 1665–1668.
VLDB-2015-Li0QYZ014 #query #set- Processing Moving kNN Queries Using Influential Neighbor Sets (CL, YG, JQ, GY, RZ, WY), pp. 113–124.
VLDB-2015-WangZZLW14 #correlation #estimation #streaming- Selectivity Estimation on Streaming Spatio-Textual Data Using Local Correlations (XW, YZ, WZ, XL, WW), pp. 101–112.
VLDB-2015-ZhouGSY14 #distributed #graph #named #online #scalability- MOCgraph: Scalable Distributed Graph Processing Using Message Online Computing (CZ, JG, BS, JXY), pp. 377–388.
CSEET-2014-AkpolatS #gamification #programming #re-engineering #student- Enhancing software engineering student team engagement in a high-intensity extreme programming course using gamification (BSA, WS), pp. 149–153.
CSEET-2014-Lethbridge #development #education #effectiveness #modelling- Teaching modeling using Umple: Principles for the development of an effective tool (TCL), pp. 23–28.
CSEET-2014-SedelmaierL #modelling #process #requirements- Using business process models to foster competencies in requirements engineering (YS, DL), pp. 13–22.
CSEET-2014-ShankararamanD #challenge #delivery #design #education #re-engineering- Opportunities and challenges in using competencies during design and delivery of software engineering curriculum (VS, JD), pp. 179–182.
CSEET-2014-Steppe #analysis #dependence #design #education #graph- Teaching analysis of software designs using dependency graphs (KS), pp. 65–73.
EDM-2014-EaglePMB #logic #student- Exploration of Student's Use of Rule Application References in a Propositional Logic Tutor (ME, VP, BM, TB), pp. 249–252.
EDM-2014-FuentesRGV #data mining #mining #self #student- Accepting or Rejecting Students_ Self-grading in their Final Marks by using Data Mining (JF, CR, CGM, SV), pp. 327–328.
EDM-2014-GerykP #analysis #student #visual notation- Analysis of Student Retention and Drop-out using Visual Analytics (JG, LP), pp. 331–332.
EDM-2014-KimPSJ #comparison #learning #linear #online #predict #student- Predicting students' learning achievement by using online learning patterns in blended learning environments: Comparison of two cases on linear and non-linear model (JK, YP, JS, IHJ), pp. 407–408.
EDM-2014-Lang #predict #student- The Use of Student Confidence for Prediction & Resolving Individual Student Knowledge Structure (CL), pp. 438–440.
EDM-2014-NiznanPR #detection #problem- Using Problem Solving Times and Expert Opinion to Detect Skills (JN, RP, JR), pp. 433–434.
EDM-2014-PeddycordHB #generative #problem #programming- Generating Hints for Programming Problems Using Intermediate Output (BWPI, AH, TB), pp. 92–98.
EDM-2014-RayBR #data mining #mining- Using Data Mining to Automate ADDIE (FR, KWB, RR), pp. 429–430.
EDM-2014-SaarelaK #education- Discovering Gender-Specific Knowledge from Finnish Basic Education using PISA Scale Indices (MS, TK), pp. 60–67.
EDM-2014-SchneiderB #gesture #interactive #interface #recognition #student- Unraveling Students' Interaction Around a Tangible Interface Using Gesture Recognition (BS, PB), pp. 320–323.
EDM-2014-ToussaintLT #automation #behaviour #detection #similarity #towards- Towards Using Similarity Measure for Automatic Detection of Significant Behaviors from Continuous Data (BMT, VL, JT), pp. 427–428.
EDM-2014-WorsleyB #learning #multimodal- Using Multimodal Learning Analytics to Study Learning Mechanisms (MW, PB), pp. 431–432.
EDM-2014-XuCYM - Using EEG in Knowledge Tracing (YX, KmC, YY, JM), pp. 361–362.
EDM-2014-ZhengP #algorithm #learning- Dynamic Re-Composition of Learning Groups Using PSO-Based Algorithms (ZZ, NP), pp. 357–358.
ITiCSE-2014-BenottiMS #student- Engaging high school students using chatbots (LB, MCM, FS), pp. 63–68.
ITiCSE-2014-FerreiraM #algorithm #analysis #design #education- The magic of algorithm design and analysis: teaching algorithmic skills using magic card tricks (JFF, AM), pp. 75–80.
ITiCSE-2014-GibsonM #collaboration #tool support- A small scale project to investigate the current and potential use of collaborative tools at sheffield hallam university (TMG, CM), p. 342.
ITiCSE-2014-Kann - Using reflections in a program integrating course (VK), p. 350.
ITiCSE-2014-MedinaSGG #learning #student- Learning outcomes using objectives with computer science students (JAM, JJS, EGL, AGC), p. 339.
ITiCSE-2014-MI14a #principle #problem- Problem-solving using the extremality principle (JM, SI), pp. 87–92.
ITiCSE-2014-StrieweG14a #runtime- Code reading exercises using run time traces (MS, MG), p. 346.
ITiCSE-2014-WangCMSW #data access #education #multi #named #security #visualisation- MLSvisual: a visualization tool for teaching access control using multi-level security (MW, SC, JM, CKS, CW), pp. 93–98.
SIGITE-2014-DekhaneJ #mobile #programming #student- Using mobile apps to support novice programming students (SD, CJ), pp. 133–134.
SIGITE-2014-Halper #android #education #framework #platform #programming- Using android as a platform for programming in the IT curriculum (MH), pp. 127–132.
SIGITE-2014-Trabelsi #approach #comprehension #education #network #security- Enhancing the comprehension of network sniffing attack in information security education using a hands-on lab approach (ZT), pp. 39–44.
CSMR-WCRE-2014-Grosjean #biology #maintenance #question- Using biology and ecology as inspiration for software maintenance? (PG), p. 1.
CSMR-WCRE-2014-KashiwabaraOIHYI #mining #recommendation- Recommending verbs for rename method using association rule mining (YK, YO, TI, YH, TY, KI), pp. 323–327.
CSMR-WCRE-2014-RooverS #development #library #metaprogramming #tool support- Building development tools interactively using the EKEKO meta-programming library (CDR, RS), pp. 429–433.
CSMR-WCRE-2014-SantosVA #analysis #clustering #semantics- Remodularization analysis using semantic clustering (GS, MTV, NA), pp. 224–233.
ICPC-2014-KulkarniM #framework #obfuscation- A code obfuscation framework using code clones (AK, RM), pp. 295–299.
ICPC-2014-SuzukiSIH #approach #modelling #n-gram- An approach for evaluating and suggesting method names using n-gram models (TS, KS, FI, SH), pp. 271–274.
ICPC-2014-ThungLOC #classification #design #diagrams #metric #network- Condensing class diagrams by analyzing design and network metrics using optimistic classification (FT, DL, MHO, MRVC), pp. 110–121.
ICSME-2014-EddyK #code search #query #source code- Using Structured Queries for Source Code Search (BPE, NAK), pp. 431–435.
ICSME-2014-MorenoTMS #debugging #locality #on the #stack- On the Use of Stack Traces to Improve Text Retrieval-Based Bug Localization (LM, JJT, AM, WS), pp. 151–160.
ICSME-2014-Reiss #code search #testing #towards- Towards Creating Test Cases Using Code Search (SPR), pp. 436–440.
ICSME-2014-RomanoRP #algorithm #interface #refactoring #search-based- Refactoring Fat Interfaces Using a Genetic Algorithm (DR, SR, MP), pp. 351–360.
ICSME-2014-ShangNHJ #comprehension #development- Understanding Log Lines Using Development Knowledge (WS, MN, AEH, ZMJ), pp. 21–30.
ICSME-2014-Stephan #analysis #clone detection #detection #evaluation #mutation testing- Model Clone Detector Evaluation Using Mutation Analysis (MS), pp. 633–638.
ICSME-2014-StevensR #query- Querying the History of Software Projects Using QWALKEKO (RS, CDR), pp. 585–588.
ICSME-2014-VieiraFC #embedded #maintenance #metric #performance- Using Software Metrics to Estimate the Impact of Maintenance in the Performance of Embedded Software (AV, PF, ÉFC), pp. 521–525.
ICSME-2014-WangG #design #recommendation #refactoring- Recommending Clones for Refactoring Using Design, Context, and History (WW, MWG), pp. 331–340.
ICSME-2014-YeasminRS #debugging #evolution #interactive #summary #topic #visualisation- Interactive Visualization of Bug Reports Using Topic Evolution and Extractive Summaries (SY, CKR, KAS), pp. 421–425.
MSR-2014-FukushimaKMYU #empirical #fault #modelling #predict- An empirical study of just-in-time defect prediction using cross-project models (TF, YK, SM, KY, NU), pp. 172–181.
MSR-2014-LazarRS #debugging #detection #metric #similarity- Improving the accuracy of duplicate bug report detection using textual similarity measures (AL, SR, BS), pp. 308–311.
SCAM-2014-Abi-AntounCVG #abstract interpretation #graph #question- Are Object Graphs Extracted Using Abstract Interpretation Significantly Different from the Code? (MAA, SC, RV, AG), pp. 245–254.
SCAM-2014-KallenHH #object-oriented #refactoring- Impact of Code Refactoring Using Object-Oriented Methodology on a Scientific Computing Application (MK, SH, EÞH), pp. 125–134.
SCAM-2014-KawamitsuIKKRI #identification #repository #reuse #similarity #source code- Identifying Source Code Reuse across Repositories Using LCS-Based Source Code Similarity (NK, TI, TK, RGK, CDR, KI), pp. 305–314.
SCAM-2014-RahmanR14a #exception #on the #recommendation- On the Use of Context in Recommending Exception Handling Code Examples (MMR, CKR), pp. 285–294.
CIAA-2014-AmorimMR #canonical #finite #linear #transducer- Counting Equivalent Linear Finite Transducers Using a Canonical Form (IA, AM, RR), pp. 70–83.
ICALP-v1-2014-Lampis #approximate #graph- Parameterized Approximation Schemes Using Graph Widths (ML), pp. 775–786.
ICALP-v1-2014-PrabhakaranSW - Secure Computation Using Leaky Tokens (MP, AS, AW), pp. 907–918.
FM-2014-LakshmiAK #analysis #liveness #reachability- Checking Liveness Properties of Presburger Counter Systems Using Reachability Analysis (KVL, AA, RK), pp. 335–350.
FM-2014-SanatiMM #decidability #guidelines #logic #metric- Analyzing Clinical Practice Guidelines Using a Decidable Metric Interval-Based Temporal Logic (MYS, WM, TSEM), pp. 611–626.
FM-2014-ShanWFZZWQC #verification- Formal Verification of Lunar Rover Control Software Using UPPAAL (LS, YW, NF, XZ, LZ, LW, LQ, JC), pp. 718–732.
HOFM-2014-BagheriSH #development #maintenance #modelling- Using Z in the Development and Maintenance of Computational Models of Real-World Systems (SMB, GS, JH), pp. 36–53.
HOFM-2014-BeckertGB #evaluation #interactive #proving #theorem proving #usability- A Usability Evaluation of Interactive Theorem Provers Using Focus Groups (BB, SG, FB), pp. 3–19.
IFM-2014-BrideKP #constraints #specification #theorem proving #verification #workflow- Verifying Modal Workflow Specifications Using Constraint Solving (HB, OK, FP), pp. 171–186.
SEFM-2014-BianculliGK #logic #metric #pipes and filters- Trace Checking of Metric Temporal Logic with Aggregating Modalities Using MapReduce (DB, CG, SK), pp. 144–158.
SEFM-2014-DobrikovL #model checking #optimisation #partial order #reduction- Optimising the ProB Model Checker for B Using Partial Order Reduction (ID, ML), pp. 220–234.
SEFM-2014-DuboisR #functional- Verified Functional Iterators Using the FoCaLiZe Environment (CD, RR), pp. 317–331.
SEFM-2014-HajisheykhiEK #fault #modelling- Evaluating the Effect of Faults in SystemC TLM Models Using UPPAAL (RH, AE, SSK), pp. 175–189.
SEFM-2014-ReicherdtG #matlab #modelling #verification- Formal Verification of Discrete-Time MATLAB/Simulink Models Using Boogie (RR, SG), pp. 190–204.
FLOPS-2014-Bahr #compilation #correctness #graph #proving- Proving Correctness of Compilers Using Structured Graphs (PB), pp. 221–237.
FLOPS-2014-Riesco #debugging #declarative #maude #semantics- Using Big-Step and Small-Step Semantics in Maude to Perform Declarative Debugging (AR), pp. 52–68.
ICFP-2014-Fisher #formal method- Using formal methods to enable more secure vehicles: DARPA’s HACMS program (KF), p. 1.
AIIDE-2014-Abou-ZleikhaS #authoring #design #matrix #named- PaTux: An Authoring Tool for Level Design through Pattern Customisation Using Non-Negative Matrix Factorization (MAZ, NS).
AIIDE-2014-CernyBBA #constraints #exclamation #simulation- Spice It Up! Enriching Open World NPC Simulation Using Constraint Satisfaction (MC0, CB, RB, MA).
AIIDE-2014-SnodgrassO #approach #generative #markov- A Hierarchical Approach to Generating Maps Using Markov Chains (SS, SO).
AIIDE-2014-ZhaoS #behaviour #game studies #scheduling- Using Cyclic Scheduling to Generate Believable Behavior in Games (RZ, DS).
CHI-PLAY-2014-BahamonLWGLY #game studies #generative- IC-CRIME snapshots: training crime scene photographers using procedural content generation in games (JCB, ML, PW, RG, KL, RMY), pp. 403–404.
CHI-PLAY-2014-GaoGMS #behaviour #game studies- Decreasing sedentary behaviours in pre-adolescents using casual exergames at school (YG, KMG, RLM, KGS), pp. 97–106.
CHI-PLAY-2014-GerlingB #game studies- Last tank rolling: exploring shared motion-based play to empower persons using wheelchairs (KMG, LB), pp. 415–416.
CHI-PLAY-2014-GoldmanLZ #comprehension #game studies #video- Using video games to facilitate understanding of attention deficit hyperactivity disorder: a feasibility study (TAG, FJL, JZ), pp. 115–120.
CHI-PLAY-2014-MoranMG #game studies- IRC quest: using the commons dilemma to support a single-screen game for hundreds of players (DJM, CM, TCNG), pp. 359–362.
CHI-PLAY-2014-Richards #game studies- Using an invisible coach to help players achieve fitness goals in exergames while retaining immersion (CR), pp. 299–302.
CHI-PLAY-2014-SajjadiGTT #artificial reality #collaboration #game studies- Maze commander: a collaborative asynchronous game using the oculus rift & the sifteo cubes (PS, EOCG, ST, ODT), pp. 227–236.
CHI-PLAY-2014-SheininG #contest #game studies- Jelly polo: increasing richness and competition in sports games using small-scale exertion (MS, CG), pp. 367–370.
CHI-PLAY-2014-SmithJ #game studies #quote- “Toru”: a game that reverses the wisdom of age using mosquito sound (JS, KJ), pp. 375–378.
CHI-PLAY-2014-Wood #game studies #lens #physics- Using play as a lens to bridge the physical with the digital (GW), pp. 307–310.
CIG-2014-BauckhageSDTH #behaviour #clustering #game studies #heatmap- Beyond heatmaps: Spatio-temporal clustering using behavior-based partitioning of game levels (CB, RS, AD, CT, FH), pp. 1–8.
CIG-2014-KimYK #geometry #graph #monte carlo #representation- Solving Geometry Friends using Monte-Carlo Tree Search with directed graph representation (HTK, DMY, KJK), pp. 1–2.
CIG-2014-LabrancheSCB #automation #game studies #simulation- Using partial satisfaction planning to automatically select NPCs' goals and generate plans in a simulation game (SL, NS, SC, EB), pp. 1–8.
CIG-2014-LanctotWPS #heuristic #monte carlo- Monte Carlo Tree Search with heuristic evaluations using implicit minimax backups (ML, MHMW, TP, NRS), pp. 1–8.
CIG-2014-LeeceJ #game studies #markov #modelling #random- Opponent state modeling in RTS games with limited information using Markov random fields (MAL, AJ), pp. 1–7.
CIG-2014-LimH #approach #automation #evaluation #game studies #generative- An approach to general videogame evaluation and automatic generation using a description language (CUL, DFH), pp. 1–8.
CIG-2014-ParkK #game studies #learning- Learning to play fighting game using massive play data (HSP, KJK), pp. 1–2.
CIG-2014-PenaVMLP #3d- Designer-driven 3D buildings generated using Variable Neighborhood Search (JMPS, JV, SM, AL, LP), pp. 1–8.
CIG-2014-SanseloneSSPD #game studies #monte carlo- Constrained control of non-playing characters using Monte Carlo Tree Search (MS, SS, CS, DP, YD), pp. 1–8.
CIG-2014-YamamotoMCT #algorithm #deduction #game studies #nearest neighbour- Deduction of fighting-game countermeasures using the k-nearest neighbor algorithm and a game simulator (KY, SM, CYC, RT), pp. 1–5.
DiGRA-2014-SchottMN #experience #game studies #what- Exploring the Cause of Game (Derived) Arousal: What biometric accounts of player experience revealed (GS, RM, LN).
FDG-2014-BroeckhovenT #aspect-oriented #game studies #learning #specification- Specifying the pedagogical aspects of narrative-based digital learning games using annotations (FVB, ODT).
FDG-2014-CanossaBN #design pattern #game studies #named- X-COM: UFO Defense vs. XCOM: Enemy Unknown - Using gameplay design patterns to understand game remakes (AC, SB, MJN).
FDG-2014-GeishauserCN #prototype #simulation #social- A prototype using territories and an affordance tree for social simulation gameplay (TG, YGC, MJN).
FDG-2014-SchutterA #design #game studies- Gradequest - Evaluating the impact of using game design techniques in an undergraduate course (BDS, VVA).
FDG-2014-SnodgrassO #generative #markov- Experiments in map generation using Markov chains (SS, SO).
FDG-2014-TomaiF #adaptation #behaviour #learning- Adapting in-game agent behavior by observation of players using learning behavior trees (ET, RF).
FDG-2014-ZhaoS #architecture #behaviour #scheduling- Virtual character behavior architecture using cyclic scheduling (RZ, DS).
VS-Games-2014-BugejaDSC #distributed- High-Fidelity Graphics for Dynamically Generated Environments Using Distributed Computing (KB, KD, SS, AC), pp. 1–8.
VS-Games-2014-CassolaPFMACCM #artificial reality #multi #named- Online-Gym: Multiuser Virtual Gymnasium Using RINIONS and Multiple Kinect Devices (FC, HP, BF, PM0, SA, FC, FdC, LM), pp. 1–4.
VS-Games-2014-NinausKFNW #learning- The Potential Use of Neurophysiological Signals for Learning Analytics (MN, SEK, EVCF, CN, GW), pp. 1–5.
GT-VMT-2014-WangBL #alloy #graph #model transformation #verification- Verification of Graph-based Model Transformations Using Alloy (XW, FB, YL).
CHI-2014-AferganPSJHBCJ #metric- Dynamic difficulty using brain metrics of workload (DA, EMP, ETS, AJ, SWH, ETB, RC, RJKJ), pp. 3797–3806.
CHI-2014-BalataCM #2d #on the- On the selection of 2D objects using external labeling (JB, LC, ZM), pp. 2255–2258.
CHI-2014-DancuFF #navigation- Smart flashlight: map navigation using a bike-mounted projector (AD, ZF, MF), pp. 3627–3630.
CHI-2014-FeinbergCB #database #design #interactive- Always somewhere, never there: using critical design to understand database interactions (MF, DC, JB), pp. 1941–1950.
CHI-2014-FritzHMZ #case study #persuasion #process- Persuasive technology in the real world: a study of long-term use of activity sensing devices for fitness (TF, EMH, GCM, TZ), pp. 487–496.
CHI-2014-GerlingMBMO #game studies #people #persuasion #towards- The effects of embodied persuasive games on player attitudes toward people using wheelchairs (KMG, RLM, MVB, MM, RO), pp. 3413–3422.
CHI-2014-GoelLAPBHB #interactive #multi #named- SurfaceLink: using inertial and acoustic sensing to enable multi-device interaction on a surface (MG, BL, MTIA, SP, GB, SH, BB), pp. 1387–1396.
CHI-2014-HachisuF #feedback #interactive #interface #named- VacuumTouch: attractive force feedback interface for haptic interactive surface using air suction (TH, MF), pp. 411–420.
CHI-2014-HarbachHWS #communication #privacy #security- Using personal examples to improve risk communication for security & privacy decisions (MH, MH, SW, MS), pp. 2647–2656.
CHI-2014-HarpsteadMAM #design #education #game studies- Using extracted features to inform alignment-driven design ideas in an educational game (EH, CJM, VA, BAM), pp. 3329–3338.
CHI-2014-HayashiMH #gesture #identification- Wave to me: user identification using body lengths and natural gestures (EH, MM, JIH), pp. 3453–3462.
CHI-2014-HeoGL - Expanding touch input vocabulary by using consecutive distant taps (SH, JG, GL), pp. 2597–2606.
CHI-2014-HongA #modelling #performance #predict #recommendation #user interface- Novice use of a predictive human performance modeling tool to produce UI recommendations (KWH, RSA), pp. 2251–2254.
CHI-2014-HuangTTTYCHC #named- TouchSense: expanding touchscreen input vocabulary using different areas of users’ finger pads (DYH, MCT, YCT, MLT, YTY, LWC, YPH, MYC), pp. 189–192.
CHI-2014-HuangYWZLMLZS #named- FOCUS: enhancing children’s engagement in reading by using contextual BCI training sessions (JH, CY, YW, YZ, SL, CM, JL, LZ, YS), pp. 1905–1908.
CHI-2014-KihmGKM #interactive #power management #symmetry- Using asymmetric cores to reduce power consumption for interactive devices with bi-stable displays (JK, FG, JK, RM), pp. 1059–1062.
CHI-2014-LaseckiWFB #dependence- Finding dependencies between actions using the crowd (WSL, LW, GF, JPB), pp. 3095–3098.
CHI-2014-LiR #online- Using annotations in online group chats (NL, MBR), pp. 863–866.
CHI-2014-LuFL #gesture- Gesture script: recognizing gestures and their structure using rendering scripts and interactively trained parts (HL, JF, YL), pp. 1685–1694.
CHI-2014-MarananASPSB #design #modelling- Designing for movement: evaluating computational models using LMA effort qualities (DSM, SFA, TS, PP, PS, LB), pp. 991–1000.
CHI-2014-MorrisSGK #named #smarttech- RecoFit: using a wearable sensor to find, recognize, and count repetitive exercises (DM, TSS, AG, IK), pp. 3225–3234.
CHI-2014-MottW #lens- Beating the bubble: using kinematic triggering in the bubble lens for acquiring small, dense targets (MEM, JOW), pp. 733–742.
CHI-2014-NielsenH #case study- Personas is applicable: a study on the use of personas in Denmark (LN, KSH), pp. 1665–1674.
CHI-2014-PasqualW #predict- Mouse pointing endpoint prediction using kinematic template matching (PTP, JOW), pp. 743–752.
CHI-2014-PedersenSH #scalability- Is my phone alive?: a large-scale study of shape change in handheld devices using videos (EWP, SS, KH), pp. 2579–2588.
CHI-2014-PikeMPSW #protocol- Measuring the effect of think aloud protocols on workload using fNIRS (MFP, HAM, MP, SCS, MLW), pp. 3807–3816.
CHI-2014-ProcykNPTJ #chat #distance #mobile #streaming #video- Exploring video streaming in public settings: shared geocaching over distance using mobile video chat (JP, CN, CP, AT, TKJ), pp. 2163–2172.
CHI-2014-PuciharCA #visual notation- The use of surrounding visual context in handheld AR: device vs. user perspective rendering (KCP, PC, JA), pp. 197–206.
CHI-2014-SchildLM #3d #behaviour #design #game studies #video- Altering gameplay behavior using stereoscopic 3D vision-based video game design (JS, JJLJ, MM), pp. 207–216.
CHI-2014-SchwarzXMHH #classification #probability- Probabilistic palm rejection using spatiotemporal touch features and iterative classification (JS, RX, JM, SEH, CH), pp. 2009–2012.
CHI-2014-SerranoEI - Exploring the use of hand-to-face input for interacting with head-worn displays (MS, BME, PPI), pp. 3181–3190.
CHI-2014-Smith-ClarkeMC #communication #mobile #network- Poverty on the cheap: estimating poverty maps using aggregated mobile communication networks (CSC, AJM, LC), pp. 511–520.
CHI-2014-SoloveyZPRM #performance- Classifying driver workload using physiological and driving performance data: two field studies (ETS, MZ, EAGP, BR, BM), pp. 4057–4066.
CHI-2014-SuhPHK #design #evaluation #twitter- @BabySteps: design and evaluation of a system for using twitter for tracking children’s developmental milestones (HS, JRP, AH, JAK), pp. 2279–2288.
CHI-2014-SunDLLG #case study- Being senior and ICT: a study of seniors using ICT in China (YS, XD, SL, TL, NG), pp. 3933–3942.
CHI-2014-TanSLC #collaboration #visual notation- Investigating the effects of using biofeedback as visual stress indicator during video-mediated collaboration (CSST, JS, KL, KC), pp. 71–80.
CHI-2014-UzorB #game studies- Investigating the long-term use of exergames in the home with elderly fallers (SU, LB), pp. 2813–2822.
CHI-2014-WangL #communication #gesture #similarity- Kinect-taped communication: using motion sensing to study gesture use and similarity in face-to-face and computer-mediated brainstorming (HCW, CTL), pp. 3205–3214.
CHI-2014-WeiMZ #social- Food messaging: using edible medium for social messaging (JW, XM, SZ), pp. 2873–2882.
CSCW-2014-CastilloEPS #lifecycle #online #social #social media- Characterizing the life cycle of online news stories using social media reactions (CC, MEH, JP, MS), pp. 211–223.
CSCW-2014-LiuJPP #feedback #visual notation- Supporting task resumption using visual feedback (YL, YJ, WP, MSP), pp. 767–777.
CSCW-2014-NakazatoYSNTH #realtime #video- Smart Face: enhancing creativity during video conferences using real-time facial deformation (NN, SY, SS, TN, TT, MH), pp. 75–83.
CSCW-2014-XuHB #design #feedback #generative #named #visual notation- Voyant: generating structured feedback on visual designs using a crowd of non-experts (AX, SWH, BPB), pp. 1433–1444.
CSCW-2014-YueHH #collaboration #modelling #process #web- Modeling search processes using hidden states in collaborative exploratory web search (ZY, SH, DH), pp. 820–830.
DHM-2014-DuWZHM #evolution #image- Human Skeleton Extraction of Depth Images Using the Polygon Evolution (HD, JW, XxZ, YH, LM), pp. 15–23.
DHM-2014-Kull - Using the Critical Path Method in Analyzing the Interdependencies of Critical Services — Feasibility Study (AK), pp. 620–629.
DHM-2014-Luo #artificial reality #case study #metric #re-engineering- Study on Three Dimensions Body Reconstruction and Measurement by Using Kinect (QL), pp. 35–42.
DHM-2014-MamessierDO #artificial reality #assessment #online- Calibration of Online Situation Awareness Assessment Systems Using Virtual Reality (SM, DD, MO), pp. 124–135.
DHM-2014-RasoolSPK #image- Virtual Knee Arthroscopy Using Haptic Devices and Real Surgical Images (SR, AS, VP, FK), pp. 436–447.
DHM-2014-SantosST #information management #ontology #semantics #web- Using Ontologies and Semantic Web Technology on a Clinical Pedigree Information System (JMS, BSS, LT), pp. 448–459.
DHM-2014-YoganathanK - ENT Disease Diagnosis Using an Expert System (DY, SK), pp. 472–483.
DUXU-DI-2014-BarrosSF - Use of Immersive Reality and Haptic Devices in Rehabilitation after Cerebral Vascular Accident: Clinical Perspectives and Neuro-Image Evidence (HOB, MMS, ELRF), pp. 501–508.
DUXU-DI-2014-EschrichKKHG #mobile- Controlling Light Environments Using Segmented Light Sources and Mobile Devices (BE, DK, KK, JH, RG), pp. 533–540.
DUXU-DI-2014-SchusterHBRJ #experience #how- Diving in? How Users Experience Virtual Environments Using the Virtual Theatre (KS, MH, UB, AR, SJ), pp. 636–646.
DUXU-DP-2014-BarrosSF14a #analysis #artificial reality #evaluation- Ergonomic Evaluation of Manual Force Levels of the Elderly in the Handling of Products: An Analysis Using Virtual Reality (RQB, MMS, MGF), pp. 124–132.
DUXU-DP-2014-ItoHN #design #interface #social- Throwing a Smile: Using Smile Icons to Design Social Interfaces (KI, SH, SN), pp. 297–307.
DUXU-DP-2014-SilvaPS #analysis #concept- Brands Analysis Using Informational Ergonomics Concepts: A Proposal (JCRPdS, LCP, JCPdS), pp. 90–101.
DUXU-ELAS-2014-Chunpir0B #comprehension- Using Soft Systems Methodology (SSM) in Understanding Current User-Support Scenario in the Climate Science Domain of Cyber-Infrastructures (HIC, TL, AAB), pp. 495–506.
DUXU-ELAS-2014-GeabelJHABA #identification- Pilgrim Smart Identification Using RFID Technology (PSI) (AG, KJ, RAH, RA, MB, MA), pp. 273–280.
DUXU-ELAS-2014-KamiyaKASNMF #design- Timeaxis Design of a Service System Growing Values of Mobility Using the M-V Model (KK, AK, JA, KS, HN, YM, SF), pp. 281–292.
DUXU-ELAS-2014-MontAlvao #health #overview- Health Care Professionals vs Other Professionals: Do They Have Different Perceptions about Health Care Waste and Dangerous Products Pictograms? Some Findings Using a Digital Device in Field Survey (CRM), pp. 83–90.
DUXU-ELAS-2014-VilarDRNV #artificial reality #case study- A Pilot Study Using Virtual Reality to Investigate the Effects of Emergency Egress Signs Competing with Environmental Variables on Route Choices (EV, ED, FR, PN, EV), pp. 369–377.
DUXU-TMT-2014-HeimgartnerS #agile #design #human-computer- Using Agile Methods in Intercultural HCI Design Projects (RH, AS), pp. 123–129.
DUXU-TMT-2014-HeimgartnerSH #agile #usability- Enhancing Usability Engineering in Rural Areas Using Agile Methods (RH, AS, BH), pp. 445–452.
DUXU-TMT-2014-WetzlingerAD #effectiveness #experience #performance #usability #user interface- Comparing Effectiveness, Efficiency, Ease of Use, Usability and User Experience When Using Tablets and Laptops (WW, AA, MD), pp. 402–412.
HCI-AIMT-2014-BoulabiarCP14a #3d #artificial reality #gesture #recognition- The Issues of 3D Hand Gesture and Posture Recognition Using the Kinect (MIB, GC, FP), pp. 205–214.
HCI-AIMT-2014-ChakravartyC #artificial reality #identification- Frontal-Standing Pose Based Person Identification Using Kinect (KC, TC), pp. 215–223.
HCI-AIMT-2014-KuribaraMOST #named- HandyScope: A Remote Control Technique Using Circular Widget on Tabletops (TK, YM, KO, BS, JT), pp. 69–80.
HCI-AIMT-2014-Man #hardware #video- Analysing Emotional Video Using Consumer EEG Hardware (JdM), pp. 729–738.
HCI-AIMT-2014-NiLF #interactive- Hand-Object Interaction: From Grasping to Using (LN, YL, XF), pp. 113–120.
HCI-AIMT-2014-ReddyC #artificial reality #process #recognition- Human Activity Recognition from Kinect Captured Data Using Stick Model (VRR, TC), pp. 305–315.
HCI-AIMT-2014-RoyC #artificial reality #detection #invariant #markov- View-Invariant Human Detection from RGB-D Data of Kinect Using Continuous Hidden Markov Model (SR, TC), pp. 325–336.
HCI-AIMT-2014-TsurudaHYI #mobile- Emotion Transmission System Using a Cellular Phone-Type Teleoperated Robot with a Mobile Projector (YT, MH, HY, YI), pp. 707–714.
HCI-AIMT-2014-VaidyanathanR #case study #comparative #gesture #interactive- “Will Use It, Because I Want to Look Cool” A Comparative Study of Simple Computer Interactions Using Touchscreen and In-Air Hand Gestures (VV, DR), pp. 170–181.
HCI-AS-2014-DiasDH #fuzzy #interactive #modelling #quality- Exploring B-Learning Scenarios Using Fuzzy Logic-Based Modeling of Users’ LMS Quality of Interaction in Ergonomics and Psychomotor Rehabilitation Academic Courses (SBD, JAD, LJH), pp. 233–243.
HCI-AS-2014-DotencoGG #smarttech- Smartphone Input Using Its Integrated Projector and Built-In Camera (SD, TG, FG), pp. 124–133.
HCI-AS-2014-KadomuraITRS #named #visualisation- AwareCycle: Application for Sports Visualization Using an Afterimage Display Attached to the Wheel of a Bicycle (AK, YI, KT, JR, IS), pp. 256–264.
HCI-AS-2014-LeeYJ #predict- Data Preloading Technique using Intention Prediction (SL, JY, DYJ), pp. 32–41.
HCI-AS-2014-OgataII #smarttech- Sweat Sensing Technique for Wearable Device Using Infrared Transparency (MO, MI, MI), pp. 323–331.
HCI-TMT-2014-BrownTBKLMCEGA #design- Using Cultural Probes to Inform the Design of Assistive Technologies (MAB, AT, SB, TK, GL, JLM, TC, ME, SG, UA), pp. 35–46.
HCI-TMT-2014-ColetiMN #evaluation #named #recognition #speech #usability- ErgoSV: An Environment to Support Usability Evaluation Using Face and Speech Recognition (TAC, MM, FdLdSN), pp. 554–564.
HCI-TMT-2014-HankiewiczB #performance #quality #source code #word- Efficiency in Performing Basic Tasks Using Word Processing Programs by the Elderly as a Measure of the Ergonomic Quality of Software (KH, MB), pp. 481–488.
HCI-TMT-2014-HenschenLSZL #design #documentation #mvc #user interface- Intelligent Document User Interface Design Using MVC and UIML (LJH, NL, YS, YZ, JCL), pp. 423–432.
HCI-TMT-2014-OrtegaLHBRA #formal method #modelling #multi #named #petri net- PeNTa: Formal Modeling for Multi-touch Systems Using Petri Net (FRO, SL, FH, AB, NR, MA), pp. 361–372.
HCI-TMT-2014-TiefenbacherBR #architecture #composition #evaluation #industrial #interface- Evaluation of Industrial Touch Interfaces Using a Modular Software Architecture (PT, FB, GR), pp. 589–600.
HIMI-AS-2014-AlkhateebHH #comprehension- The Effects of Using Kit-Build Method to Support Reading Comprehension of EFL (MA, YH, TH), pp. 3–11.
HIMI-AS-2014-IizukaG #mobile- Basic Study on Personal Space while Using Mobile Devices in Public (SI, KG), pp. 404–412.
HIMI-AS-2014-MakiY #3d #image #multi- 3D CG Integral Photography Artwork Using Glittering Effects in the Post-processing of Multi-viewpoint Rendered Images (NM, KY), pp. 546–554.
HIMI-AS-2014-TanakaTH #development #education- Development of Teaching Material Volume Calculations Using a Wooden Puzzle (TT, MT, IH), pp. 109–117.
HIMI-AS-2014-TogawaK #collaboration #framework #smarttech- Private Cloud Collaboration Framework for e-Learning Environment for Disaster Recovery Using Smartphone Alert Notification (ST, KK), pp. 118–126.
HIMI-DE-2014-AlghamdiT #image #mining #multimodal #retrieval #semantics #towards- Towards Semantic Image Retrieval Using Multimodal Fusion with Association Rules Mining (RAA, MT), pp. 407–418.
HIMI-DE-2014-HottaOM #user interface- Liquid Tangible User Interface: Using Liquid in TUI (MH, MO, HM), pp. 167–176.
HIMI-DE-2014-JungAK #interface #web- A Map-Based Web Search Interface Using Point of Interest Aggregation (KJ, SCA, HK), pp. 342–351.
HIMI-DE-2014-KatoM #deployment #modelling #quality- Quality Function Deployment Using Improved Interpretive Structural Modeling (TK, YM), pp. 352–363.
HIMI-DE-2014-KhodaskarL #image #retrieval #semantics- Content Based Image Retrieval Using Quantitative Semantic Features (AK, SL), pp. 439–448.
HIMI-DE-2014-SakaguchiIH #development #performance- Development of High-Speed Thermal Display Using Water Flow (MS, KI, KH), pp. 233–240.
HIMI-DE-2014-SakuraiKNTH #pseudo- Evoking Emotions in a Story Using Tactile Sensations as Pseudo-body Responses with Contextual Cues (SS, TK, TN, TT, MH), pp. 241–250.
HIMI-DE-2014-SugayaNT #clustering #recognition- Enhancement of Accuracy of Hand Shape Recognition Using Color Calibration by Clustering Scheme and Majority Voting Method (TS, HN, HT), pp. 251–260.
HIMI-DE-2014-TakahashiA #comparison #comprehension #difference #mining- User Needs Search Using the Text Mining — From Commodity Comparison, Understanding the Difference of Users Awareness (YT, YA), pp. 461–467.
HIMI-DE-2014-TeixeiraSFSS #prototype #requirements #tool support- Requirements Engineering Using Mockups and Prototyping Tools: Developing a Healthcare Web-Application (LT, VS, CF, JS, BSS), pp. 652–663.
LCT-NLE-2014-NicolaouC - Blogging Revisited: The Use of Blogs in ESAP Courses (AN, EKC), pp. 95–106.
LCT-NLE-2014-OrehovackiBJ #education #quality #web- Exploring the Validity of an Instrument to Measure the Perceived Quality in Use of Web 2.0 Applications with Educational Potential (TO, SB, MJ), pp. 192–203.
LCT-TRE-2014-HafnerHO #artificial reality #physics- Experiencing Physical and Technical Phenomena in Schools Using Virtual Reality Driving Simulator (PH, VH, JO), pp. 50–61.
LCT-TRE-2014-HiramatsuIFS #development #learning- Development of the Learning System for Outdoor Study Using Zeigarnik Effect (YH, AI, MF, FS), pp. 127–137.
LCT-TRE-2014-SofticVMWE #research- Finding and Exploring Commonalities between Researchers Using the ResXplorer (SS, LDV, EM, RVdW, ME), pp. 486–494.
LCT-TRE-2014-TzanavariMCP #experience #performance #user interface- User Experience Observations on Factors That Affect Performance in a Road-Crossing Training Application for Children Using the CAVE (AT, SM, CGC, CP), pp. 91–101.
SCSM-2014-Abascal-MenaLZGLM #crowdsourcing #named- Worker-Community: Using Crowdsourcing to Link Informal Workers with Potential Clients (RAM, ÉLO, JSZH, BEGT, GLM, HMF), pp. 287–297.
SCSM-2014-AbdallaY #network #online #overview #process #social- A Review of Using Online Social Networks for Investigative Activities (AA, SYY), pp. 3–12.
SCSM-2014-Ahangama #detection #realtime #social #social media #twitter- Use of Twitter Stream Data for Trend Detection of Various Social Media Sites in Real Time (SA), pp. 151–159.
SCSM-2014-HuangG #empirical #health #network #social- Exploring Health Care Professionals’ Attitudes of Using Social Networking Sites for Health Care: An Empirical Study (ZH, NG), pp. 365–372.
SCSM-2014-MendesFFC #analysis #classification #how #social- How Do Users Express Their Emotions Regarding the Social System in Use? A Classification of Their Postings by Using the Emotional Analysis of Norman (MSM, EF, VF, MFdC), pp. 229–241.
SCSM-2014-OtakeSOSUS #gamification #motivation- A Proposal of a Support System for Motivation Improvement Using Gamification (KO, RS, MO, YS, TU, AS), pp. 571–580.
SCSM-2014-PensasVGKKCV #communication #network #social- Using Ambient Communication and Social Networking Technologies to Reduce Loneliness of Elders (HP, AMV, MG, TK, SK, SC, JV), pp. 91–102.
SCSM-2014-RayaRRP #adaptation #game studies- Using Serious Games to Train Adaptive Emotional Regulation Strategies (MAR, ARO, BR, EP), pp. 541–549.
SCSM-2014-SchaarVZELJ #motivation #network #social- Reasons for Using Social Networks Professionally — The Influence of User Diversity on Usage Motivation (AKS, ACV, MZ, DE, AKL, EMJ), pp. 385–396.
VISSOFT-2014-SchotsW #framework #visualisation- Using a Task-Oriented Framework to Characterize Visualization Approaches (MS, CMLW), pp. 70–74.
CAiSE-2014-CarvalhoAG #domain-specific language #ontology #semantics- Using Reference Domain Ontologies to Define the Real-World Semantics of Domain-Specific Languages (VAdC, JPAA, GG), pp. 488–502.
CAiSE-2014-PikaWFHLA #behaviour #framework- An Extensible Framework for Analysing Resource Behaviour Using Event Logs (AP, MTW, CJF, AHMtH, ML, WMPvdA), pp. 564–579.
CAiSE-2014-PolyvyanyyRH #modelling #performance #process #retrieval- Indexing and Efficient Instance-Based Retrieval of Process Models Using Untanglings (AP, MLR, AHMtH), pp. 439–456.
CAiSE-2014-Reinhartz-BergerIW #ontology #product line #semantics #variability- Analyzing Variability of Software Product Lines Using Semantic and Ontological Considerations (IRB, NI, YW), pp. 150–164.
CAiSE-2014-VergneS #community #markov #network #open source- Expert Finding Using Markov Networks in Open Source Communities (MV, AS), pp. 196–210.
ICEIS-v1-2014-CoelhoAABB #network- Router Nodes Positioning for Wireless Networks Using Artificial Immune Systems (PHGC, JLMdA, JFMdA, LFdAB, AVdB), pp. 415–421.
ICEIS-v1-2014-DominguezAERLE #data mining #fuzzy #logic #mining #roadmap- Advances in the Decision Making for Treatments of Chronic Patients Using Fuzzy Logic and Data Mining Techniques (MD, JA, JGE, IMR, JMLS, MJE), pp. 325–330.
ICEIS-v1-2014-KleinSRF #formal method #integration #on the- On the Formalisation of an Application Integration Language Using Z Notation (MJK, SS, FRF, RZF), pp. 314–319.
ICEIS-v1-2014-Malgorzata #algorithm #mobile #search-based- The Use of Genetic Algorithms in Mobile Applications (MPW), pp. 520–525.
ICEIS-v1-2014-MamcenkoG #mobile #predict- Customer Churn Prediction in Mobile Operator Using Combined Model (JM, JG), pp. 233–240.
ICEIS-v1-2014-PenaAMFF #algorithm #gpu #parallel- An Improved Parallel Algorithm Using GPU for Siting Observers on Terrain (GCP, MVAA, SVGM, WRF, CRF), pp. 367–375.
ICEIS-v1-2014-Rios-AguilarLP #behaviour #information management #mobile #monitoring- Business Information System for the Control of Workforce Through Behaviour Monitoring Using Reactive and Terminal-based Mobile Location Technologies (SRA, FJLM, APS), pp. 30–38.
ICEIS-v1-2014-SilvaNMFMM #algorithm #detection #distributed #performance #pipes and filters- Efficient and Distributed DBScan Algorithm Using MapReduce to Detect Density Areas on Traffic Data (TLCdS, ACAN, RPM, VAEdF, JAFdM, JCM), pp. 52–59.
ICEIS-v2-2014-BarretoFSJ #formal method #petri net- A Straightforward Introduction to Formal Methods Using Coloured Petri Nets (FMB, JCJdF, MSS, SJ), pp. 145–152.
ICEIS-v2-2014-BorattoC #clustering #collaboration #recommendation- Using Collaborative Filtering to Overcome the Curse of Dimensionality when Clustering Users in a Group Recommender System (LB, SC), pp. 564–572.
ICEIS-v2-2014-FonsecaC #concept #reuse- Reuse of Service Concepts Based on Service Patterns (WRF, PLPC), pp. 290–297.
ICEIS-v2-2014-GippMBPN #detection #semantics #similarity #visualisation- Web-based Demonstration of Semantic Similarity Detection Using Citation Pattern Visualization for a Cross Language Plagiarism Case (BG, NM, CB, JP, AN), pp. 677–683.
ICEIS-v2-2014-HernandesTTF #analysis #mining #visualisation- Using Visualization and Text Mining to Improve Qualitative Analysis (EMH, ET, ADT, SCPFF), pp. 201–208.
ICEIS-v2-2014-JulianoTS #detection #metric #object-oriented- Detection of Software Anomalies Using Object-oriented Metrics (RCJ, BANT, MSS), pp. 241–248.
ICEIS-v2-2014-KaramtiTG #image #network #process #retrieval- Vectorization of Content-based Image Retrieval Process Using Neural Network (HK, MT, FG), pp. 435–439.
ICEIS-v2-2014-MeloS #design #modelling #uml- Model-driven Structural Design of Software-intensive Systems Using SysML Blocks and UML Classes (MdSM, MSS), pp. 193–200.
ICEIS-v2-2014-OtonBGGB #learning #metadata- Description of Accessible Learning Resources by Using Metadata (SO, CB, EG, AGC, RB), pp. 620–626.
ICEIS-v2-2014-ThommazoRROHWF #traceability- Using Artificial Intelligence Techniques to Enhance Traceability Links (ADT, RR, TRdO, GO, EMH, VW, SCPFF), pp. 26–38.
ICEIS-v2-2014-ZhengJL #hybrid #learning #taxonomy- Cross-Sensor Iris Matching using Patch-based Hybrid Dictionary Learning (BRZ, DYJ, YHL), pp. 169–174.
ICEIS-v3-2014-GoncalvesSC #case study #diagrams #metric #process- Using Activity Diagrams and DEMO to Capture Relevant Measures in an Organizational Control — A Case Study on Remote Assistance Service (AG, PS, AC), pp. 303–310.
ICEIS-v3-2014-NunoG #in the cloud #outsourcing- Methodology for Developing and Application Outsourcing in the Cloud Using SOA (AGN, CMG), pp. 419–426.
ICEIS-v3-2014-RavasanRH #approach #framework #fuzzy #process- A Practical Framework for Business Process Management Suites Selection Using Fuzzy TOPSIS Approach (AZR, SR, HH), pp. 295–302.
ICEIS-v3-2014-RibeiroS #case study #evaluation #usability- A Study on the Use of Personas as a Usability Evaluation Method (TR, PdS), pp. 168–175.
ICEIS-v3-2014-ZacepinsBA - Administration of Government Subsidies Using Contactless Bank Cards (AZ, NB, IA), pp. 128–132.
CIKM-2014-AgrawalGKK #concept #graph #similarity- Similarity Search using Concept Graphs (RA, SG, AK, KK), pp. 719–728.
CIKM-2014-CarmelMPS #analysis #community- Improving Term Weighting for Community Question Answering Search Using Syntactic Analysis (DC, AM, YP, IS), pp. 351–360.
CIKM-2014-DavletovAC #predict- High Impact Academic Paper Prediction Using Temporal and Topological Features (FD, ASA, AC), pp. 491–498.
CIKM-2014-FangQHZ #composition #overview #ranking #sentiment #summary- Ranking Sentiment Explanations for Review Summarization Using Dual Decomposition (LF, QQ, MH, XZ), pp. 1931–1934.
CIKM-2014-HanWP #classification- Within-Network Classification Using Radius-Constrained Neighborhood Patterns (JH, JRW, JP), pp. 1539–1548.
CIKM-2014-HustonC #comparison #dependence #modelling #retrieval- A Comparison of Retrieval Models using Term Dependencies (SH, WBC), pp. 111–120.
CIKM-2014-LiuLK #classification #information management #performance- Using Local Information to Significantly Improve Classification Performance (WL, DL, RK), pp. 1947–1950.
CIKM-2014-NguyenTT #crowdsourcing #similarity- Using Crowdsourcing to Investigate Perception of Narrative Similarity (DN, DT, MT), pp. 321–330.
CIKM-2014-PfeifferNB #learning #network #probability- Active Exploration in Networks: Using Probabilistic Relationships for Learning and Inference (JJPI, JN, PNB), pp. 639–648.
CIKM-2014-RahmanH #network #strict- Sampling Triples from Restricted Networks using MCMC Strategy (MR, MAH), pp. 1519–1528.
CIKM-2014-UysalBSS #approximate #database #distance #multi #performance #scalability- Efficient Filter Approximation Using the Earth Mover’s Distance in Very Large Multimedia Databases with Feature Signatures (MSU, CB, JS, TS), pp. 979–988.
CIKM-2014-YangLLLH #automation #clustering #detection #multi #social- Automatic Social Circle Detection Using Multi-View Clustering (YY, CL, XL, BL, JH), pp. 1019–1028.
CIKM-2014-ZhuMHZC #social #social media #topic- Customized Organization of Social Media Contents using Focused Topic Hierarchy (XZ, ZM, YH, XZ, TSC), pp. 1509–1518.
ECIR-2014-Aly #normalisation #parametricity- Score Normalization Using Logistic Regression with Expected Parameters (RA), pp. 579–584.
ECIR-2014-GaoWO #comparison- Reducing Reliance on Relevance Judgments for System Comparison by Using Expectation-Maximization (NG, WW, DWO), pp. 1–12.
ECIR-2014-KabaryS #gesture #query #retrieval #sketching #specification #video- Using Hand Gestures for Specifying Motion Queries in Sketch-Based Video Retrieval (IAK, HS), pp. 733–736.
ECIR-2014-KapteinKVB #semantics #web- Needle Custom Search — Recall-Oriented Search on the Web Using Semantic Annotations (RK, GK, MAAHi'V, ELvdB), pp. 750–753.
ECIR-2014-LefortierSRR #case study #video #web- Blending Vertical and Web Results — A Case Study Using Video Intent (DL, PS, FR, MdR), pp. 184–196.
ECIR-2014-Lommatzsch #realtime #recommendation- Real-Time News Recommendation Using Context-Aware Ensembles (AL), pp. 51–62.
ECIR-2014-PanemBGV #detection #realtime #topic #twitter- Entity Tracking in Real-Time Using Sub-topic Detection on Twitter (SP, RB, MG, VV), pp. 528–533.
ECIR-2014-SchuthSWR #case study #optimisation- Optimizing Base Rankers Using Clicks — A Case Study Using BM25 (AS, FS, SW, MdR), pp. 75–87.
ECIR-2014-YangPSS #case study #e-commerce #query #scalability- A Study of Query Term Deletion Using Large-Scale E-commerce Search Logs (BY, NP, GS, NS), pp. 235–246.
ICML-c1-2014-LiuJL #approximate #kernel #performance- Efficient Approximation of Cross-Validation for Kernel Methods using Bouligand Influence Function (YL, SJ, SL), pp. 324–332.
ICML-c2-2014-Busa-FeketeHS #elicitation #modelling #rank #statistics- Preference-Based Rank Elicitation using Statistical Models: The Case of Mallows (RBF, EH, BS), pp. 1071–1079.
ICML-c2-2014-ChagantyL #modelling #visual notation- Estimating Latent-Variable Graphical Models using Moments and Likelihoods (ATC, PL), pp. 1872–1880.
ICML-c2-2014-Chen0 #big data #learning #modelling #topic- Topic Modeling using Topics from Many Domains, Lifelong Learning and Big Data (ZC, BL), pp. 703–711.
ICML-c2-2014-Cherian #nearest neighbour- Nearest Neighbors Using Compact Sparse Codes (AC), pp. 1053–1061.
ICML-c2-2014-GalG #parallel #process- Pitfalls in the use of Parallel Inference for the Dirichlet Process (YG, ZG), pp. 208–216.
ICML-c2-2014-JohanssonJDB #geometry #graph #kernel- Global graph kernels using geometric embeddings (FJ, VJ, DPD, CB), pp. 694–702.
ICML-c2-2014-KnowlesGP #infinity #metric #normalisation #random- A reversible infinite HMM using normalised random measures (DAK, ZG, KP), pp. 1998–2006.
ICML-c2-2014-SatoN #analysis #approximate #equation #probability #process- Approximation Analysis of Stochastic Gradient Langevin Dynamics by using Fokker-Planck Equation and Ito Process (IS, HN), pp. 982–990.
ICML-c2-2014-SchwingHPU #algorithm #convergence #parallel- Globally Convergent Parallel MAP LP Relaxation Solver using the Frank-Wolfe Algorithm (AGS, TH, MP, RU), pp. 487–495.
ICML-c2-2014-ShamirS0 #approximate #distributed #optimisation- Communication-Efficient Distributed Optimization using an Approximate Newton-type Method (OS, NS, TZ), pp. 1000–1008.
ICML-c2-2014-TamarMX #approximate #robust #scalability- Scaling Up Robust MDPs using Function Approximation (AT, SM, HX), pp. 181–189.
ICPR-2014-AlathariNB #segmentation- Femur Bone Segmentation Using a Pressure Analogy (TSA, MSN, MTB), pp. 972–977.
ICPR-2014-AlemdarKNME #behaviour #modelling- A Unified Model for Human Behavior Modeling Using a Hierarchy with a Variable Number of States (HÖA, TvK, MEN, AM, CE), pp. 3804–3809.
ICPR-2014-AlmogahedK #game studies #named- NEATER: Filtering of Over-sampled Data Using Non-cooperative Game Theory (BAA, IAK), pp. 1371–1376.
ICPR-2014-AzizWH #graph #kernel- Graph Characterization Using Wave Kernel Trace (FA, RCW, ERH), pp. 3822–3827.
ICPR-2014-BashbaghiGSB #multi- Watch-List Screening Using Ensembles Based on Multiple Face Representations (SB, EG, RS, GAB), pp. 4489–4494.
ICPR-2014-BayramogluKEANKH #approach #detection #image #machine learning- Detection of Tumor Cell Spheroids from Co-cultures Using Phase Contrast Images and Machine Learning Approach (NB, MK, LE, MA, MN, JK, JH), pp. 3345–3350.
ICPR-2014-BekhetA #video- Compact Signature-Based Compressed Video Matching Using Dominant Color Profiles (DCP) (SB, AA), pp. 3933–3938.
ICPR-2014-BeraM #multi #realtime- Realtime Multilevel Crowd Tracking Using Reciprocal Velocity Obstacles (AB, DM), pp. 4164–4169.
ICPR-2014-BicegoRFRG #behaviour- Behavioural Biometrics Using Electricity Load Profiles (MB, FR, AF, SDR, EG), pp. 1764–1769.
ICPR-2014-BiswasZLMV #analysis #detection #image- Lesion Detection in Breast Ultrasound Images Using Tissue Transition Analysis (SB, FZ, XL, RM, VV), pp. 1185–1188.
ICPR-2014-BogunKCR #interactive #recognition- Interaction Recognition Using Sparse Portraits (IB, HK, JC, ER), pp. 2531–2536.
ICPR-2014-BorgiLEA14a #multi #recognition- Sparse Multi-regularized Shearlet-Network Using Convex Relaxation for Face Recognition (MAB, DL, ME, CBA), pp. 4636–4641.
ICPR-2014-BrownFP #detection #self- Temporal Non-maximum Suppression for Pedestrian Detection Using Self-Calibration (LMGB, RSF, SP), pp. 2239–2244.
ICPR-2014-BuiNK #graph #music- Staff Line Removal Using Line Adjacency Graph and Staff Line Skeleton for Camera-Based Printed Music Scores (HNB, ISN, SHK), pp. 2787–2789.
ICPR-2014-BuiNLYK #detection #order #statistics- Boosted Stable Path for Staff-Line Detection Using Order Statistic Downscaling and Coarse-to-Fine Technique (HNB, ISN, GL, HJY, SHK), pp. 522–526.
ICPR-2014-ByeonLB #2d #classification #network- Texture Classification Using 2D LSTM Networks (WB, ML, TMB), pp. 1144–1149.
ICPR-2014-CaliskanA - Atmospheric Turbulence Mitigation Using Optical Flow (TC, NA), pp. 883–888.
ICPR-2014-ChanK #geometry #identification #image- Using Leg Geometry to Align Androgenic Hair Patterns in Low Resolution Images for Criminal and Victim Identification (FKSC, AWKK), pp. 495–500.
ICPR-2014-ChaudhariM #clustering #matrix #semistructured data #symmetry- Average Overlap for Clustering Incomplete Data Using Symmetric Non-negative Matrix Factorization (SC, MNM), pp. 1431–1436.
ICPR-2014-ChenK #gesture #recognition- Using Appearance-Based Hand Features for Dynamic RGB-D Gesture Recognition (XC, MK), pp. 411–416.
ICPR-2014-ChenLHLLH #detection- Vision-Based Road Bump Detection Using a Front-Mounted Car Camcorder (HTC, CYL, CCH, SYL, BSPL, CPH), pp. 4537–4542.
ICPR-2014-ChenWLHI #image #robust #segmentation- Robust Text Line Segmentation for Historical Manuscript Images Using Color and Texture (KC, HW, ML, JH, RI), pp. 2978–2983.
ICPR-2014-ChevallierCA #estimation #image #metric #orthogonal- Computing Histogram of Tensor Images Using Orthogonal Series Density Estimation and Riemannian Metrics (EC, AC, JA), pp. 900–905.
ICPR-2014-ChironGM #behaviour #parametricity- Discovering Emergent Behaviors from Tracks Using Hierarchical Non-parametric Bayesian Methods (GC, PGK, MM), pp. 2185–2190.
ICPR-2014-Climent-PerezMR #detection #multi- Multi-view Event Detection in Crowded Scenes Using Tracklet Plots (PCP, DNM, PR), pp. 4370–4375.
ICPR-2014-DahlCB #image #multi #segmentation- Multiphase Image Segmentation Using the Deformable Simplicial Complex Method (VAD, ANC, JAB), pp. 1002–1007.
ICPR-2014-DominguesMMSR #information management #recommendation #topic- Using Contextual Information from Topic Hierarchies to Improve Context-Aware Recommender Systems (MAD, MGM, RMM, CVS, SOR), pp. 3606–3611.
ICPR-2014-DongPHLDJ #classification #network- Vehicle Type Classification Using Unsupervised Convolutional Neural Network (ZD, MP, YH, TL, YD, YJ), pp. 172–177.
ICPR-2014-DuanHZCZ #image #segmentation- A Two-Stage Image Segmentation Method Using Euler’s Elastica Regularized Mumford-Shah Model (YD, WH, JZ, HC, TZ), pp. 118–123.
ICPR-2014-DuCZ #aspect-oriented #identification- A Product Aspects Identification Method by Using Translation-Based Language Model (JD, WC, XZ), pp. 2790–2795.
ICPR-2014-DuDA #modelling #topic- Signature Matching Using Supervised Topic Models (XD, DSD, WAA), pp. 327–332.
ICPR-2014-DuHZWD #case study #classification #design #network #online #recognition- A Study of Designing Compact Classifiers Using Deep Neural Networks for Online Handwritten Chinese Character Recognition (JD, JSH, BZ, SW, LRD), pp. 2950–2955.
ICPR-2014-ElmikatyS #detection #image #multi- Car Detection in High-Resolution Urban Scenes Using Multiple Image Descriptors (ME, TS), pp. 4299–4304.
ICPR-2014-EvangelidisSH #recognition- Skeletal Quads: Human Action Recognition Using Joint Quadruples (GE, GS, RH), pp. 4513–4518.
ICPR-2014-FahadTR #classification #clustering #process #recognition #smarttech- Activity Recognition in Smart Homes Using Clustering Based Classification (LGF, SFT, MR), pp. 1348–1353.
ICPR-2014-GavriilidisT #classification #kernel #random- Random Walk Kernel Applications to Classification Using Support Vector Machines (VG, AT), pp. 3898–3903.
ICPR-2014-GeXYS #image #synthesis- Image Completion Using Global Patch Matching and Optimal Seam Synthesis (SG, KX, RY, ZS), pp. 871–876.
ICPR-2014-GhoraiC #algorithm #composition #higher-order #image- An Image Inpainting Algorithm Using Higher Order Singular Value Decomposition (MG, BC), pp. 2867–2872.
ICPR-2014-GiordanoPS #estimation #kernel #modelling- Kernel Density Estimation Using Joint Spatial-Color-Depth Data for Background Modeling (DG, SP, CS), pp. 4388–4393.
ICPR-2014-GognaSM #matrix- Matrix Recovery Using Split Bregman (AG, AS, AM), pp. 1031–1036.
ICPR-2014-Gonzalez-CastroDC #adaptation #classification- Pixel Classification Using General Adaptive Neighborhood-Based Features (VGC, JD, VC), pp. 3750–3755.
ICPR-2014-Gonzalez-SosaVFO #comparison #image #recognition- Comparison of Body Shape Descriptors for Biometric Recognition Using MMW Images (EGS, RVR, JF, JOG), pp. 124–129.
ICPR-2014-GuptaBVS #on the- On Iris Spoofing Using Print Attack (PG, SB, MV, RS), pp. 1681–1686.
ICPR-2014-HafemannOC #network #recognition- Forest Species Recognition Using Deep Convolutional Neural Networks (LGH, LSO, PRC), pp. 1103–1107.
ICPR-2014-HaoXPSK #automation #semantics #topic- Automated Chinese Essay Scoring from Topic Perspective Using Regularized Latent Semantic Indexing (SH, YX, HP, KS, DK), pp. 3092–3097.
ICPR-2014-HaqBBA #modelling #segmentation- Using Shape-Aware Models for Lumbar Spine Intervertebral Disc Segmentation (RH, DAB, RCB, MAA), pp. 3191–3196.
ICPR-2014-HasnatAT #clustering #image- Unsupervised Clustering of Depth Images Using Watson Mixture Model (MAH, OA, AT), pp. 214–219.
ICPR-2014-HeDY0PJ #multi #random #visual notation- Visual Tracking Using Multi-stage Random Simple Features (YH, ZD, MY, LC, MP, YJ), pp. 4104–4109.
ICPR-2014-HuangZPZ #canonical #correlation #recognition #robust- Robust Facial Expression Recognition Using Revised Canonical Correlation (XH, GZ, MP, WZ), pp. 1734–1739.
ICPR-2014-HusainDT #random- Recognizing Point Clouds Using Conditional Random Fields (FH, BD, CT), pp. 4257–4262.
ICPR-2014-HuWSC #detection #framework #robust- Robust Head-Shoulder Detection Using a Two-Stage Cascade Framework (RH, RW, SS, XC), pp. 2796–2801.
ICPR-2014-HuynhCM #3d #constraints #geometry #video- Aerial Implicit 3D Video Stabilization Using Epipolar Geometry Constraint (LH, JC, GGM), pp. 3487–3492.
ICPR-2014-IoannidisCL #clustering #modelling #multi- Key-Frame Extraction Using Weighted Multi-view Convex Mixture Models and Spectral Clustering (AI, VC, AL), pp. 3463–3468.
ICPR-2014-ItohIS #2d #image #linear- Two-Dimensional Global Image Registration Using Local Linear Property of Image Manifold (HI, AI, TS), pp. 3862–3867.
ICPR-2014-JangLSK #automation #classification #multi #video- Automatic Video Genre Classification Using Multiple SVM Votes (WDJ, CL, JYS, CSK), pp. 2655–2660.
ICPR-2014-JinIHS #approach- A New Approach of Arc Skeletonization for Tree-like Objects Using Minimum Cost Path (DJ, KSI, EAH, PKS), pp. 942–947.
ICPR-2014-JoshiGG #automation #predict #visual notation- Automatic Prediction of Perceived Traits Using Visual Cues under Varied Situational Context (JJ, HG, RG), pp. 2855–2860.
ICPR-2014-JudV - Using Object Probabilities in Deformable Model Fitting (CJ, TV), pp. 3310–3314.
ICPR-2014-KacheleZMS #feature model #quality #recognition- Prosodic, Spectral and Voice Quality Feature Selection Using a Long-Term Stopping Criterion for Audio-Based Emotion Recognition (MK, DZ, SM, FS), pp. 803–808.
ICPR-2014-KapsourasN #approach #recognition- Action Recognition in Motion Capture Data Using a Bag of Postures Approach (IK, NN), pp. 2649–2654.
ICPR-2014-KarM #fuzzy- Extraction of Retinal Blood Vessel Using Curvelet Transform and Fuzzy C-Means (SSK, SPM), pp. 3392–3397.
ICPR-2014-KeceliC #approach #multimodal- A Multimodal Approach for Recognizing Human Actions Using Depth Information (ASK, ABC), pp. 421–426.
ICPR-2014-KimP14a #3d #interactive #physics- Sensor-Display Registration for 3D Physical User Interaction Using a Flat-Panel Display (JSK, JMP), pp. 1675–1680.
ICPR-2014-KramarevZWL #categorisation #composition #image #representation- Object Categorization from Range Images Using a Hierarchical Compositional Representation (VK, SZ, JLW, AL), pp. 586–591.
ICPR-2014-KuangOA #estimation- Revisiting Trifocal Tensor Estimation Using Lines (YK, MO, KÅ), pp. 2419–2423.
ICPR-2014-KumarA2 #stack- Non-frontal Camera Calibration Using Focal Stack Imagery (AK, NA), pp. 202–207.
ICPR-2014-KumarK #adaptation #multimodal #recognition #security #set- Adaptive Security for Human Surveillance Using Multimodal Open Set Biometric Recognition (AK, AK), pp. 405–410.
ICPR-2014-KurtekS #analysis #segmentation- Handwritten Text Segmentation Using Elastic Shape Analysis (SK, AS), pp. 2501–2506.
ICPR-2014-LaiSTH #3d- 3-D Gaze Tracking Using Pupil Contour Features (CCL, SWS, HRT, YPH), pp. 1162–1166.
ICPR-2014-LandgrenOH #image #segmentation- A Measure of Septum Shape Using Shortest Path Segmentation in Echocardiographic Images of LVAD Patients (ML, NCO, AH), pp. 3398–3403.
ICPR-2014-LeeSL #3d #invariant #recognition #self- View-Invariant 3D Action Recognition Using Spatiotemporal Self-Similarities from Depth Camera (ARL, HIS, SWL), pp. 501–505.
ICPR-2014-LeNVOT #documentation #retrieval- Document Retrieval Based on Logo Spotting Using Key-Point Matching (VPL, NN, MV, JMO, CDT), pp. 3056–3061.
ICPR-2014-LiCGW #hybrid #interactive #recognition- A Hybrid Method for Human Interaction Recognition Using Spatio-temporal Interest Points (NL, XC, HG, ZW), pp. 2513–2518.
ICPR-2014-LinH #analysis- Crossroad Traffic Surveillance Using Superpixel Tracking and Vehicle Trajectory Analysis (DTL, CHH), pp. 2251–2256.
ICPR-2014-LiRPV #modelling #topic- Regularizing Topic Discovery in EMRs with Side Information by Using Hierarchical Bayesian Models (CL, SR, DQP, SV), pp. 1307–1312.
ICPR-2014-LuoZW #image #segmentation- Image Fusion Using Region Segmentation and Sigmoid Function (XL, ZZ, XW), pp. 1049–1054.
ICPR-2014-LuYXYWP #recognition- Finger Vein Recognition Using Histogram of Competitive Gabor Responses (YL, SY, SJX, JCY, ZW, DSP), pp. 1758–1763.
ICPR-2014-MaHXP #3d #approach #robust- A Lighting Robust Fitting Approach of 3D Morphable Model Using Spherical Harmonic Illumination (MM, XH, YX, SP), pp. 2101–2106.
ICPR-2014-MatsuoSY #detection #image- Vehicle Driver Face Detection in Various Sunlight Environments Using Composed Face Images (HM, TS, NY), pp. 1687–1691.
ICPR-2014-MittalKKK #recognition- Small Object Discovery and Recognition Using Actively Guided Robot (SM, MSK, SK, KMK), pp. 4334–4339.
ICPR-2014-MiyanS #consistency #image- Finding Corresponding Patches in Texture Images Using Tensor Consistency Check (SBM, JS), pp. 4021–4026.
ICPR-2014-MoeiniMF14b #2d #3d #image #invariant #re-engineering #recognition- Expression-Invariant Face Recognition via 3D Face Reconstruction Using Gabor Filter Bank from a 2D Single Image (AM, HM, KF), pp. 4708–4713.
ICPR-2014-MoilanenZP #agile #analysis #difference- Spotting Rapid Facial Movements from Videos Using Appearance-Based Feature Difference Analysis (AM, GZ, MP), pp. 1722–1727.
ICPR-2014-MolderCCH #automation #detection #reduction- Automatic Detection of Embryo Location in Medical Imaging Using Trigonometric Rotation for Noise Reduction (ALM, SC, NC, GH), pp. 3239–3244.
ICPR-2014-MollerPB #analysis #quantifier- Quantification of Actin Structures Using Unsupervised Pattern Analysis Techniques (BM, EP, NB), pp. 3251–3256.
ICPR-2014-MoriKNK #detection #video- Video Content Detection with Single Frame Level Accuracy Using Dynamic Thresholding Technique (MM, TK, HN, KK), pp. 2560–2565.
ICPR-2014-MoyouIP #3d #estimation #performance #retrieval- LBO-Shape Densities: Efficient 3D Shape Retrieval Using Wavelet Density Estimation (MM, KEI, AMP), pp. 52–57.
ICPR-2014-MuddamsettySTM #detection- Spatio-temporal Saliency Detection in Dynamic Scenes Using Local Binary Patterns (SMM, DS, AT, FM), pp. 2353–2358.
ICPR-2014-NakashikaHTA #3d #recognition- 3D-Object Recognition Based on LLC Using Depth Spatial Pyramid (TN, TH, TT, YA), pp. 4224–4228.
ICPR-2014-NegrelPG #image #learning #metric #performance #reduction #retrieval- Efficient Metric Learning Based Dimension Reduction Using Sparse Projectors for Image Near Duplicate Retrieval (RN, DP, PHG), pp. 738–743.
ICPR-2014-NguyenGVP #framework #parametricity #process #recognition- A Bayesian Nonparametric Framework for Activity Recognition Using Accelerometer Data (TN, SKG, SV, DQP), pp. 2017–2022.
ICPR-2014-NguyenP #linear #multi- Tracking Using Multiple Linear Searches and Motion Direction Sampling (TN, TPP), pp. 2191–2196.
ICPR-2014-NieJ #learning #linear- Feature Learning Using Bayesian Linear Regression Model (SN, QJ), pp. 1502–1507.
ICPR-2014-NieKZ #learning #recognition- Periocular Recognition Using Unsupervised Convolutional RBM Feature Learning (LN, AK, SZ), pp. 399–404.
ICPR-2014-Nilsson #polynomial- Elastic Net Regularized Logistic Regression Using Cubic Majorization (MN), pp. 3446–3451.
ICPR-2014-NilssonAGF #detection- Pedestrian Detection Using Augmented Training Data (JN, PA, IYHG, JF), pp. 4548–4553.
ICPR-2014-NishimuraOAN #image #modelling #speech #web- Selection of Unknown Objects Specified by Speech Using Models Constructed from Web Images (HN, YO, YA, MN), pp. 477–482.
ICPR-2014-OhyamaYWK #recognition- Improving Accuracy of Printed Character Recognition Using Hexagonal Zoning of Directional Histogram Feature (WO, AY, TW, FK), pp. 2697–2702.
ICPR-2014-OtteSZ #algorithm #named- ANTSAC: A Generic RANSAC Variant Using Principles of Ant Colony Algorithms (SO, US, AZ), pp. 3558–3563.
ICPR-2014-PandaKC #graph #random #scalability #summary #video- Scalable Video Summarization Using Skeleton Graph and Random Walk (RP, SKK, ASC), pp. 3481–3486.
ICPR-2014-PaudelDHV #2d #3d #locality- Localization of 2D Cameras in a Known Environment Using Direct 2D-3D Registration (DPP, CD, AH, PV), pp. 196–201.
ICPR-2014-PerinaKB #array #classification #kernel- Expression Microarray Data Classification Using Counting Grids and Fisher Kernel (AP, MK, MB), pp. 1770–1775.
ICPR-2014-QureshiHA #probability- A Probabilistic Model for the Optimal Configuration of Retinal Junctions Using Theoretically Proven Features (TAQ, AH, BAD), pp. 3304–3309.
ICPR-2014-RaghavendraRYB #assessment #automation #empirical #matrix #quality #video- Automatic Face Quality Assessment from Video Using Gray Level Co-occurrence Matrix: An Empirical Study on Automatic Border Control System (RR, KBR, BY, CB), pp. 438–443.
ICPR-2014-RavalTJ #classification #encoding #evaluation #fault #performance- Efficient Evaluation of SVM Classifiers Using Error Space Encoding (NR, RVT, CVJ), pp. 4411–4416.
ICPR-2014-RazavianASC #smarttech- Estimating Attention in Exhibitions Using Wearable Cameras (ASR, OA, JS, SC), pp. 2691–2696.
ICPR-2014-RenL #gender #recognition- Gender Recognition Using Complexity-Aware Local Features (HR, ZNL), pp. 2389–2394.
ICPR-2014-RingLRE #assessment- A Two-Stage Regression Using Bioimpedance and Temperature for Hydration Assessment During Sports (MR, CL, MR, BE), pp. 4519–4524.
ICPR-2014-RosaCJPFT #clustering #network #on the- On the Training of Artificial Neural Networks with Radial Basis Function Using Optimum-Path Forest Clustering (GHR, KAPC, LAPJ, JPP, AXF, JMRST), pp. 1472–1477.
ICPR-2014-SaitoAFRSGC #learning- Active Semi-supervised Learning Using Optimum-Path Forest (PTMS, WPA, AXF, PJdR, CTNS, JFG, MHdC), pp. 3798–3803.
ICPR-2014-SamantaC #classification- Indian Classical Dance Classification on Manifold Using Jensen-Bregman LogDet Divergence (SS, BC), pp. 4507–4512.
ICPR-2014-SariE #analysis #detection #fault #independence- Texture Defect Detection Using Independent Vector Analysis in Wavelet Domain (LS, AE), pp. 1639–1644.
ICPR-2014-SavakisRP #difference #gesture #learning- Gesture Control Using Active Difference Signatures and Sparse Learning (AES, RR, RWP), pp. 3969–3974.
ICPR-2014-SaygiliMH #metric #similarity- Stereo Similarity Metric Fusion Using Stereo Confidence (GS, LvdM, EAH), pp. 2161–2166.
ICPR-2014-SeckDT #3d #analysis #geometry- 3D Facial Skin Texture Analysis Using Geometric Descriptors (AS, HD, BT), pp. 1126–1131.
ICPR-2014-Shirakawa #multi #performance #similarity- Fast Similarity Search Using Multiple Binary Codes (SS), pp. 3714–3719.
ICPR-2014-SlitiHBA #analysis #robust- A More Robust Mean Shift Tracker Using Joint Monogenic Signal Analysis and Color Histogram (OS, HH, FB, HA), pp. 2453–2458.
ICPR-2014-SongLZC #adaptation #performance- Scale Adaptive Tracking Using Mean Shift and Efficient Feature Matching (YS, SL, JZ, HC), pp. 2233–2238.
ICPR-2014-SuLTLT #recognition- Character Recognition in Natural Scenes Using Convolutional Co-occurrence HOG (BS, SL, ST, JHL, CLT), pp. 2926–2931.
ICPR-2014-SunTL #online- Sparse Online Co-regularization Using Conjugate Functions (BS, MT, GL), pp. 3666–3671.
ICPR-2014-TabiaV #3d #classification- 3D Shape Classification Using Information Fusion (HT, NSV), pp. 297–302.
ICPR-2014-TaniH #detection #robust- Robust Human Detection to Pose and Occlusion Using Bag-of-Words (YT, KH), pp. 4376–4381.
ICPR-2014-TegenWHOJMNA #image #segmentation #semantics- Image Segmentation and Labeling Using Free-Form Semantic Annotation (AT, RW, LH, MO, FJ, DM, PN, KÅ), pp. 2281–2286.
ICPR-2014-TerissiPG #classification #random- Lip Reading Using Wavelet-Based Features and Random Forests Classification (LDT, MP, JCG), pp. 791–796.
ICPR-2014-VuEIYY #image- Segmenting Reddish Lesions in Capsule Endoscopy Images Using a Gastrointestinal Color Space (HV, TE, YI, YY, YY), pp. 3263–3268.
ICPR-2014-WangCH #hybrid #markov #multi #random #video- Wide Baseline Multi-view Video Matting Using a Hybrid Markov Random Field (TW, JPC, AH), pp. 136–141.
ICPR-2014-WangGJ #learning- Learning with Hidden Information Using a Max-Margin Latent Variable Model (ZW, TG, QJ), pp. 1389–1394.
ICPR-2014-WangS #automation #dataset #multi #segmentation- Automatic Multi-organ Segmentation in Non-enhanced CT Datasets Using Hierarchical Shape Priors (CW, ÖS), pp. 3327–3332.
ICPR-2014-WangWJ14a #markov #modelling #recognition- Early Facial Expression Recognition Using Hidden Markov Models (JW, SW, QJ), pp. 4594–4599.
ICPR-2014-WangYLZF #independence #recognition- Micro-expression Recognition Using Dynamic Textures on Tensor Independent Color Space (SW, WJY, XL, GZ, XF), pp. 4678–4683.
ICPR-2014-WuMCXC #gesture #invariant #parametricity #recognition- View-Invariant Gesture Recognition Using Nonparametric Shape Descriptor (XW, XM, LC, YLX, AC), pp. 544–549.
ICPR-2014-XiaoCJF #recognition- Position-Based Action Recognition Using High Dimension Index Tree (QX, JC, JJ, WF), pp. 4400–4405.
ICPR-2014-XuS #learning #network- Bayesian Network Structure Learning Using Causality (ZX, SNS), pp. 3546–3551.
ICPR-2014-YamadaM #approach #behaviour- Estimating Driver Awareness of Crossing Pedestrians While Turning Left Based on Vehicle Behavior Using Bayesian Approach (KY, TM), pp. 1898–1903.
ICPR-2014-YamashitaW #classification- k-NN Classification of Handwritten Characters Using a New Distortion-Tolerant Matching Measure (YY, TW), pp. 262–267.
ICPR-2014-YangD #identification #novel- Novel HHT-Based Features for Biometric Identification Using EEG Signals (SY, FD), pp. 1922–1927.
ICPR-2014-YangTL #energy #image #recognition- Gait Recognition Using Flow Histogram Energy Image (YY, DT, GL), pp. 444–449.
ICPR-2014-YingWMYZ #problem- The Perspective-3-Point Problem When Using a Planar Mirror (XY, GW, XM, SY, HZ), pp. 4033–4037.
ICPR-2014-YuCK #distance #recognition #set- Pill Recognition Using Imprint Information by Two-Step Sampling Distance Sets (JY, ZC, SiK), pp. 3156–3161.
ICPR-2014-YuGZ #3d #recognition- Face Recognition Using 3D Directional Corner Points (XY, YG, JZ), pp. 2802–2807.
ICPR-2014-YuncuHB #automation #modelling #recognition #speech- Automatic Speech Emotion Recognition Using Auditory Models with Binary Decision Tree and SVM (EY, HH, CB), pp. 773–778.
ICPR-2014-ZhangLWZ #image #modelling #multi #statistics- Statistical Modeling of Multi-modal Medical Image Fusion Method Using C-CHMM and M-PCNN (HZ, XL, XW, ZZ), pp. 1067–1072.
ICPR-2014-ZhangT #recognition #word- Unconstrained Handwritten Word Recognition Based on Trigrams Using BLSTM (XZ, CLT), pp. 2914–2919.
ICPR-2014-ZhangWGZZ #analysis #verification- Low Computation Face Verification Using Class Center Analysis (XZ, JW, YG, SZ, SZ), pp. 4543–4547.
ICPR-2014-ZhangWL #video- Video Text Extraction Using the Fusion of Color Gradient and Log-Gabor Filter (ZZ, WW, KL), pp. 2938–2943.
KDD-2014-GaddeAO #graph #learning- Active semi-supervised learning using sampling theory for graph signals (AG, AA, AO), pp. 492–501.
KDD-2014-JinKSDGCPR #community #geometry #modelling #network #social- Modeling mass protest adoption in social network communities using geometric brownian motion (FJ, RPK, NS, ERD, SG, FC, BAP, NR), pp. 1660–1669.
KDD-2014-QianHJPZ #approach #distance #learning #metric- Distance metric learning using dropout: a structured regularization approach (QQ, JH, RJ, JP, SZ), pp. 323–332.
KDD-2014-RamakrishnanBMSKSWCVKKMZHCLHSTGKDAZFSFAGM #open source- “Beating the news” with EMBERS: forecasting civil unrest using open source indicators (NR, PB, SM, NS, RPK, PS, WW, JC, AV, GK, CJK, AM, LZ, TH, FC, CTL, BH, AS, KT, LG, GK, AD, CA, IZ, JF, KMS, YF, JA, DG, DM), pp. 1799–1808.
KDD-2014-SintosT #network #social- Using strong triadic closure to characterize ties in social networks (SS, PT), pp. 1466–1475.
KDD-2014-SrikantA #machine learning #programming- A system to grade computer programming skills using machine learning (SS, VA), pp. 1887–1896.
KDD-2014-TayebiEGB #embedded #learning #predict- Spatially embedded co-offence prediction using supervised learning (MAT, ME, UG, PLB), pp. 1789–1798.
KDD-2014-WangZQZ - Improving the modified nyström method using spectral shifting (SW, CZ, HQ, ZZ), pp. 611–620.
KDD-2014-WangZX #estimation- Travel time estimation of a path using sparse trajectories (YW, YZ, YX), pp. 25–34.
KDD-2014-WuZTH0 #crowdsourcing #modelling #personalisation #topic #video- Crowdsourced time-sync video tagging using temporal and personalized topic modeling (BW, EZ, BT, AH, QY), pp. 721–730.
KDD-2014-Yoshida #adaptation #algorithm #linear #sketching- Almost linear-time algorithms for adaptive betweenness centrality using hypergraph sketches (YY), pp. 1416–1425.
KDIR-2014-AbdallahI #classification #modelling #n-gram #web- URL-based Web Page Classification — A New Method for URL-based Web Page Classification Using n-Gram Language Models (TAA, BdlI), pp. 14–21.
KDIR-2014-AlahmadiJM #classification #concept #representation- Arabic Text Classification using Bag-of-Concepts Representation (AA, AJ, AEM), pp. 374–380.
KDIR-2014-BarcanteJDCCS #identification #mining- Identifying Drug Repositioning Targets using Text Mining (EB, MJ, FD, EC, OGC, FS), pp. 348–353.
KDIR-2014-BatistaCRF #ambiguity #wiki- Context-based Disambiguation using Wikipedia (HB, DC, RR, JF), pp. 549–553.
KDIR-2014-Bleiweiss #execution #machine learning- SoC Processor Discovery for Program Execution Matching Using Unsupervised Machine Learning (AB), pp. 192–201.
KDIR-2014-KudamaL #random #semantics- Semantic Annotation of UMLS using Conditional Random Fields (SK, RBL), pp. 335–341.
KDIR-2014-MorenoGV #data mining #mining #recognition #word- Violence Recognition in Spanish Words using Data Mining (AFM, SBGB, JGVR), pp. 210–216.
KDIR-2014-NagwanshiM #detection #semantics #sentiment- Sarcasm Detection using Sentiment and Semantic Features (PN, CEVM), pp. 418–424.
KDIR-2014-SatoNS #classification #kernel- A Simple Classification Method for Class Imbalanced Data using the Kernel Mean (YS, KN, AS), pp. 327–334.
KEOD-2014-DogduKG #information management #ontology- Waste Management Information System — An Expert System Using Ontologies (ED, BK, UG), pp. 312–318.
KEOD-2014-OlszewskaSM #design #ontology #owl #uml- Dynamic OWL Ontology Design Using UML and BPMN (JIO, RMS, TLM), pp. 436–444.
KEOD-2014-TarakciC #recommendation- Using Hypergraph-based User Profile in a Recommendation System (HT, NKC), pp. 27–35.
KMIS-2014-FrancoisMA #communication #design #email #problem #traceability- Discovering Problem-Solving Knowledge in Business Emails — Traceability in Software Design Using Computer Mediated Communication (RF, NM, HA), pp. 186–193.
KMIS-2014-Grim-Yefsah #case study #information management #process #requirements- A First Step in Improving the Requirements Engineering Process by Using the Knowledge Management Perspective — Case Study from French Public Institute (MGY), pp. 280–288.
KR-2014-ClercqBSCN #game studies #programming #set- Using Answer Set Programming for Solving Boolean Games (SDC, KB, SS, MDC, AN).
KR-2014-Dyrkolbotn #how #set- How to Argue for Anything: Enforcing Arbitrary Sets of Labellings using AFs (SKD).
MLDM-2014-AbdullahiCM #approach #identification #novel- A Novel Approach for Identifying Banded Patterns in Zero-One Data Using Column and Row Banding Scores (FBA, FC, RM), pp. 58–72.
MLDM-2014-BugaychenkoZ #diagrams #learning #multi #pattern matching #pattern recognition #performance #recognition- Fast Pattern Recognition and Deep Learning Using Multi-Rooted Binary Decision Diagrams (DB, DZ), pp. 73–77.
MLDM-2014-JavedA #classification #dataset #network #social- Creation of Bi-lingual Social Network Dataset Using Classifiers (IJ, HA), pp. 523–533.
MLDM-2014-KhasnabishSDS #detection #learning #programming language #source code- Detecting Programming Language from Source Code Using Bayesian Learning Techniques (JNK, MS, JD, GS), pp. 513–522.
MLDM-2014-LarinSKKHC #classification #parametricity #representation- Parametric Representation of Objects in Color Space Using One-Class Classifiers (AL, OS, AK, SYK, SCH, BHC), pp. 300–314.
MLDM-2014-SandovalH #learning #network- Learning of Natural Trading Strategies on Foreign Exchange High-Frequency Market Data Using Dynamic Bayesian Networks (JS, GH), pp. 408–421.
MLDM-2014-SchraagenK #consistency #graph- Record Linkage Using Graph Consistency (MS, WAK), pp. 471–483.
RecSys-2014-BachrachFGKKNP #recommendation- Speeding up the Xbox recommender system using a euclidean transformation for inner-product spaces (YB, YF, RGB, LK, NK, NN, UP), pp. 257–264.
RecSys-2014-BhagatWIT #learning #matrix #recommendation- Recommending with an agenda: active learning of private attributes using matrix factorization (SB, UW, SI, NT), pp. 65–72.
RecSys-2014-LercheJ #feedback #personalisation #ranking- Using graded implicit feedback for bayesian personalized ranking (LL, DJ), pp. 353–356.
RecSys-2014-LiuGWB #power of- Improving the discriminative power of inferred content information using segmented virtual profile (HL, AG, TW, AB), pp. 97–104.
SEKE-2014-ChenHQJ #performance #static analysis- Improving Static Analysis Performance Using Rule-Filtering Technique (DC, RH, BQ, SJ), pp. 19–24.
SEKE-2014-GayedLB #case study #forensics #lightweight #ontology #process- Creating Proprietary Terms Using Lightweight Ontology: A Case Study on Acquisition Phase in a Cyber Forensic Process (TFG, HL, MB), pp. 76–81.
SEKE-2014-GuimaraesSALC #alloy #consistency #verification- A Method for Verifying the Consistency of Business Rules Using Alloy (DG, EAS, AJA, PL, ALC), pp. 381–386.
SEKE-2014-GuptaAWD #empirical #modelling #verification- Evaluating the Use of Model-Based Requirement Verification Method: An Empirical Study (MG, DA, GSW, HD), pp. 397–401.
SEKE-2014-HartmannFNMKT #approach #modelling #reasoning #runtime- Reasoning at Runtime using time-distorted Contexts: A Models@run.time based Approach (TH, FF, GN, BM, JK, YLT), pp. 586–591.
SEKE-2014-JiangCKZD #model transformation #source code #testing- Testing Model Transformation Programs using Metamorphic Testing (MJ, TYC, FCK, ZZ, ZD), pp. 94–99.
SEKE-2014-KaurKF #low cost #mining #web- Using Web Mining to Support Low Cost Historical Vehicle Traffic Analytics (CK, DK, BHF), pp. 365–370.
SEKE-2014-NetoASFM #architecture #behaviour #data transformation #framework #modelling #named- CoMoVi: a Framework for Data Transformation in Credit Behavioral Scoring Applications Using Model Driven Architecture (RFON, PJLA, ACS, DRdCF, GRM), pp. 286–291.
SEKE-2014-ParkSHSHB #algorithm #resource management #search-based- Practical Human Resource Allocation in Software Projects Using Genetic Algorithm (JP, DS, GH, DS, JH, DHB), pp. 688–694.
SEKE-2014-SalmanSD14a #concept analysis #impact analysis- Feature-Level Change Impact Analysis Using Formal Concept Analysis (HES, AS, CD), pp. 447–452.
SEKE-2014-SatapathyPR #agile #approach #estimation #kernel- Story Point Approach based Agile Software Effort Estimation using Various SVR Kernel Methods (SMS, AP, SKR), pp. 304–307.
SEKE-2014-SinghS #machine learning #requirements- Software Requirement Prioritization using Machine Learning (DS, AS), pp. 701–704.
SEKE-2014-SouzaRS #empirical #predict- A Proposal for the Improvement of Project’s Cost Predictability using Earned Value Management and Historical Data of Cost — An Empirical Study (ADdS, ARR, DCSdS), pp. 729–734.
SEKE-2014-TianWHZG #feedback #recommendation #web #web service- Cold-Start Web Service Recommendation Using Implicit Feedback (GT, JW, KH, WZ, PG), pp. 371–376.
SEKE-2014-Wang #composition #web #web service- QoS-Based Web Service Composition by GA Using Consumer Decision-Making Function (GW), pp. 361–364.
SEKE-2014-WangGZ #network #predict- Artificial neural networks for infectious diarrhea prediction using meteorological factors in Shanghai (YW, JG, ZZ), pp. 501–506.
SEKE-2014-XuL #approach #architecture #automation #synthesis- Automated Software Architectural Synthesis using Patterns: A Cooperative Coevolution Approach (YX, PL), pp. 174–180.
SEKE-2014-XuL14a #ontology #reasoning #semantics- Two-Level Smart Search Engine Using Ontology-Based Semantic Reasoning (HX, AL), pp. 648–652.
SIGIR-2014-AnilSS #evolution #kernel #modelling #network #social- Modeling evolution of a social network using temporalgraph kernels (AA, NS, SRS), pp. 1051–1054.
SIGIR-2014-CeroniTKN - Bridging temporal context gaps using time-aware re-contextualization (AC, NKT, NK, CN), pp. 1127–1130.
SIGIR-2014-DaltonDA #knowledge base #query- Entity query feature expansion using knowledge base links (JD, LD, JA), pp. 365–374.
SIGIR-2014-GrausDTWR #communication #email #enterprise #graph #recommendation- Recipient recommendation in enterprises using communication graphs and email content (DG, DvD, MT, WW, MdR), pp. 1079–1082.
SIGIR-2014-Ifada #modelling #personalisation #recommendation #topic- A tag-based personalized item recommendation system using tensor modeling and topic model approaches (NI), p. 1280.
SIGIR-2014-KeikhaPC #metric #summary- Evaluating answer passages using summarization measures (MK, JHP, WBC), pp. 963–966.
SIGIR-2014-KharazmiSSV #difference- Using score differences for search result diversification (SK, MS, FS, DV), pp. 1143–1146.
SIGIR-2014-KumarJF #detection #twitter- Where not to go?: detecting road hazards using twitter (AK, MJ, YF), pp. 1223–1226.
SIGIR-2014-LivneGTDA #difference #named #recommendation- CiteSight: supporting contextual citation recommendation using differential search (AL, VG, JT, STD, EA), pp. 807–816.
SIGIR-2014-RoitmanHK - Using the cross-entropy method to re-rank search results (HR, SH, OK), pp. 839–842.
SIGIR-2014-RoyVGC #query #segmentation #sequence- Improving unsupervised query segmentation using parts-of-speech sequence information (RSR, YV, NG, MC), pp. 935–938.
SIGIR-2014-Sebastian #clustering #predict #semantics- Cluster links prediction for literature based discovery using latent structure and semantic features (YS), p. 1275.
SIGIR-2014-WuKS #behaviour #online- Using information scent and need for cognition to understand online search behavior (WCW, DK, AS), pp. 557–566.
SKY-2014-Ben-Av #algebra #generative #multi #ontology- Ontology Hierarchy Self Generation using Algebraic Multi-Grid (AMG) (RBA), pp. 79–85.
SKY-2014-OsetinskyY #abstraction #case study #effectiveness #legacy- Working More Effectively with Legacy Code Using Domain Knowledge and Abstractions: A Case Study (IO, RY), pp. 63–70.
AMT-2014-RichaBPBR #algebra #graph transformation #model transformation #testing #towards- Towards Testing Model Transformation Chains Using Precondition Construction in Algebraic Graph Transformation (ER, EB, LP, MB, JFR), pp. 34–43.
MoDELS-2014-OgunyomiRK #incremental #model-to-text #on the- On the Use of Signatures for Source Incremental Model-to-text Transformation (BO, LMR, DSK), pp. 84–98.
MoDELS-2014-SoltanaFASB #approach #case study #modelling #uml- Using UML for Modeling Procedural Legal Rules: Approach and a Study of Luxembourg’s Tax Law (GS, EF, MA, MS, LCB), pp. 450–466.
SPLC-2014-KnappRS #development #modelling #on the #product line #testing- On the use of test cases in model-based software product line development (AK, MR, BHS), pp. 247–251.
SPLC-2014-Lantz #agile #case study #development #modelling- Using models to scale agile mechatronics development in cars: case studies at Volvo car group (JL), p. 20.
ECOOP-2014-LavoieDF #javascript #monitoring #performance #runtime #virtual machine- Portable and Efficient Run-time Monitoring of JavaScript Applications Using Virtual Machine Layering (EL, BD, MF), pp. 541–566.
OOPSLA-2014-Desai0M #proving #reduction #source code- Natural proofs for asynchronous programs using almost-synchronous reductions (AD, PG, PM), pp. 709–725.
OOPSLA-2014-GligoricSPVNL #automation #dynamic analysis #migration #refactoring #search-based- Automated migration of build scripts using dynamic analysis and search-based refactoring (MG, WS, CP, DvV, IN, BL), pp. 599–616.
OOPSLA-2014-HsiaoCN #corpus #program analysis #statistics #web- Using web corpus statistics for program analysis (CHH, MJC, SN), pp. 49–65.
OOPSLA-2014-VoraKG #algorithm #consistency #named #parallel- ASPIRE: exploiting asynchronous parallelism in iterative algorithms using a relaxed consistency based DSM (KV, SCK, RG), pp. 861–878.
PEPM-J-2013-Simon14 #type inference- Deriving a complete type inference for Hindley-Milner and vector sizes using expansion (AS), pp. 254–271.
PADL-2014-CampeottoPDFP #constraints #theorem proving- Exploring the Use of GPUs in Constraint Solving (FC, ADP, AD, FF, EP), pp. 152–167.
PADL-2014-LakinP #compilation #functional #programming language- Compiling DNA Strand Displacement Reactions Using a Functional Programming Language (MRL, AP), pp. 81–86.
PLDI-2014-DeVitoRFAH #generative #runtime- First-class runtime generation of high-performance types using exotypes (ZD, DR, MF, AA, PH), p. 11.
PLDI-2014-PekQM #c #data type #logic #proving- Natural proofs for data structure manipulation in C using separation logic (EP, XQ, PM), p. 46.
POPL-2014-ChaudhuriCS #proving #synthesis- Bridging boolean and quantitative synthesis using smoothed proof search (SC, MC, ASL), pp. 207–220.
PPDP-2014-Schopp #low level #source code- Organising Low-Level Programs using Higher Types (US), pp. 199–210.
QAPL-2014-Feng #distributed #hybrid #modelling #probability- Patch-based Hybrid Modelling of Spatially Distributed Systems by Using Stochastic HYPE — ZebraNet as an Example (CF0), pp. 64–77.
SAS-2014-ChenHTWW #recursion #source code #verification- Verifying Recursive Programs Using Intraprocedural Analyzers (YFC, CH, MHT, BYW, FW), pp. 118–133.
RE-2014-AntonelliRLO - Language Extended Lexicon points: Estimating the size of an application using its language (LA, GR, JCSdPL, AO), pp. 263–272.
RE-2014-MartinsO #analysis #case study #fault #functional #protocol #requirements #safety- A case study using a protocol to derive safety functional requirements from Fault Tree Analysis (LEGM, TdO), pp. 412–419.
RE-2014-PorterLS #case study #experience #feedback #framework #requirements- Building a National E-Service using Sentire experience report on the use of Sentire: A volere-based requirements framework driven by calibrated personas and simulated user feedback (CP, EL, MAS), pp. 374–383.
RE-2014-SlavinLNB #diagrams #feature model #requirements #security- Managing security requirements patterns using feature diagram hierarchies (RS, JML, JN, TDB), pp. 193–202.
REFSQ-2014-OjameruayeB #requirements- Systematic Elaboration of Compliance Requirements Using Compliance Debt and Portfolio Theory (BO, RB), pp. 152–167.
ASE-2014-Borg #debugging #re-engineering- Embrace your issues: compassing the software engineering landscape using bug reports (MB), pp. 891–894.
ASE-2014-CaiS #dependence #impact analysis #named #precise- Diver: precise dynamic impact analysis using dependence-based trace pruning (HC, RAS), pp. 343–348.
ASE-2014-DeweyRH #constraints #fuzzing #logic programming- Language fuzzing using constraint logic programming (KD, JR, BH), pp. 725–730.
ASE-2014-DingesA #execution #generative- Targeted test input generation using symbolic-concrete backward execution (PD, GAA), pp. 31–36.
ASE-2014-HamidiAL #adaptation- Constructing adaptive configuration dialogs using crowd data (SH, PA, SL), pp. 485–490.
ASE-2014-LutzD #comparison #data flow #difference #interactive #programming #visual notation- Using visual dataflow programming for interactive model comparison (RL, SD), pp. 653–664.
ASE-2014-MaezawaNWH #ajax #validation- Validating ajax applications using a delay-based mutation technique (YM, KN, HW, SH), pp. 491–502.
ASE-2014-MahajanH #comparison #html #image- Finding HTML presentation failures using image comparison techniques (SM, WGJH), pp. 91–96.
ASE-2014-MatinnejadNBB #configuration management #modelling #scalability #testing- MiL testing of highly configurable continuous controllers: scalable search using surrogate models (RM, SN, LCB, TB), pp. 163–174.
ASE-2014-MkaouerKBDC #interactive #optimisation #recommendation #refactoring- Recommendation system for software refactoring using innovization and interactive dynamic optimization (MWM, MK, SB, KD, MÓC), pp. 331–336.
ASE-2014-OsterlundL #component #concurrent- Concurrent transformation components using contention context sensors (EÖ, WL), pp. 223–234.
ASE-2014-RajanSSK #execution- Accelerated test execution using GPUs (AR, SS, PS, DK), pp. 97–102.
ASE-2014-RanganathVG #comparison #testing- Compatibility testing using patterns-based trace comparison (VPR, PV, PG), pp. 469–478.
ASE-2014-WangWWYSYLFG #concurrent #debugging #locality #memory management- Localization of concurrency bugs using shared memory access pairs (WW, ZW, CW, PCY, XS, XY, JL, XF, YG), pp. 611–622.
FSE-2014-LalQ #verification- Powering the static driver verifier using corral (AL, SQ), pp. 202–212.
FSE-2014-VakiliD #infinity #modelling #smt #verification- Verifying CTL-live properties of infinite state models using an SMT solver (AV, NAD), pp. 213–223.
FSE-2014-YeBL #debugging #learning #rank- Learning to rank relevant files for bug reports using domain knowledge (XY, RCB, CL), pp. 689–699.
ICSE-2014-ChenSJHNF #anti #detection #performance- Detecting performance anti-patterns for applications developed using object-relational mapping (THC, WS, ZMJ, AEH, MNN, PF), pp. 1001–1012.
ICSE-2014-FritzBMYZ #development #metric- Using psycho-physiological measures to assess task difficulty in software development (TF, AB, SCM, SYE, MZ), pp. 402–413.
ICSE-2014-LeeJP #behaviour #detection #machine learning #memory management #modelling- Detecting memory leaks through introspective dynamic behavior modelling using machine learning (SL, CJ, SP), pp. 814–824.
ICSE-2014-MinkuY #estimation #how #question- How to make best use of cross-company data in software effort estimation? (LLM, XY), pp. 446–456.
ICSE-2014-MiyashitaTA #modelling #spreadsheet- Controlled modeling environment using flexibly-formatted spreadsheets (HM, HT, SA), pp. 978–988.
ICSE-2014-NguyenKWF #dynamic analysis #invariant- Using dynamic analysis to generate disjunctive invariants (TN, DK, WW, SF), pp. 608–619.
ICSE-2014-SingerFS #developer #how #re-engineering #twitter- Software engineering at the speed of light: how developers stay current using twitter (LS, FMFF, MADS), pp. 211–221.
ICSE-2014-YaoHJ #analysis #case study #equivalence- A study of equivalent and stubborn mutation operators using human analysis of equivalence (XY, MH, YJ), pp. 919–930.
ICSE-2014-ZayanAC #comprehension #empirical- Effects of using examples on structural model comprehension: a controlled experiment (DZ, MA, KC), pp. 955–966.
SAC-2014-AdibuzzamanAL #monitoring #personalisation #smarttech- A personalized model for monitoring vital signs using camera of the smart phone (MA, SIA, RL), pp. 444–449.
SAC-2014-Al-RefaiCF #modelling #runtime- Using models to dynamically refactor runtime code (MAR, WC, RBF), pp. 1108–1113.
SAC-2014-AnderssonDA #artificial reality #identification- Anthropometric and human gait identification using skeleton data from Kinect sensor (VOA, RD, RMdA), pp. 60–61.
SAC-2014-BergamascoN #3d #approach #feature model #retrieval- A new local feature extraction approach for content-based 3D medical model retrieval using shape descriptor (LCCB, FLSN), pp. 902–907.
SAC-2014-BernardiCL #aspect-oriented #declarative #design pattern #development #programming- Declarative design pattern-based development using aspect oriented programming (MLB, MC, GADL), pp. 1625–1630.
SAC-2014-BoghratiHK #framework #process- Activities performed by programmers while using framework examples as a guide (RB, AH, MK), pp. 1146–1151.
SAC-2014-ChangHL #adaptation #clustering #optimisation- Optimizing FTL mapping cache for random-write workloads using adaptive block partitioning (LPC, SMH, WPL), pp. 1504–1510.
SAC-2014-ChoiKK #modelling #ontology- Modeling for context-aware healthcare service using ontology (JC, JK, PK), pp. 1729–1730.
SAC-2014-Daniel #communication #protocol- Vehicle to vehicle communication using Zigbee protocol (AD), pp. 715–716.
SAC-2014-EngielCL #approach #concept #elicitation- Eliciting concepts from the Brazilian access law using a combined approach (PE, CC, JCSdPL), pp. 1001–1006.
SAC-2014-GomesACHS #agile #development #framework #game studies #platform- Rapid development of first person serious games using the APEX platform: the asthma game (TG, TA, JCC, MDH, JLS), pp. 169–174.
SAC-2014-HoritaHSNTO #approach #modelling #refinement- Transformation approach from KAOS goal models to BPMN models using refinement patterns (HH, KH, YS, HN, YT, AO), pp. 1023–1024.
SAC-2014-HuergoPD #approach #identification #modelling- A method to identify services using master data and artifact-centric modeling approach (RSH, PFP, FCD), pp. 1225–1230.
SAC-2014-JunAK #detection- DDoS attack detection by using packet sampling and flow features (JHJ, CWA, SHK), pp. 711–712.
SAC-2014-KawsarAL #detection #multimodal #process #smarttech- Smartphone based multimodal activity detection system using plantar pressure sensors (FAK, SIA, RL), pp. 468–469.
SAC-2014-KrikavaCF14a #domain-specific language #modelling- Manipulating models using internal domain-specific languages (FK, PC, RBF), pp. 1612–1614.
SAC-2014-LiMZ #visualisation- Visualization of oceanographic applications using a common data model (JL, ZPM, KZ), pp. 933–938.
SAC-2014-ManhaesCZ #architecture #named #predict- WAVE: an architecture for predicting dropout in undergraduate courses using EDM (LMBM, SMSdC, GZ), pp. 243–247.
SAC-2014-OmatuY #classification #smell- Smell classification using weakly responding data (SO, MY), pp. 213–214.
SAC-2014-PalVCS #detection #smarttech- Improved heart rate detection using smart phone (AP, AV, ADC, AS), pp. 8–13.
SAC-2014-ParkKC #framework #kernel #memory management #online #platform- Cooperative kernel: online memory test platform using inter-kernel context switch and memory isolation (HP, DK, JC), pp. 1517–1522.
SAC-2014-PedrosaP - Text entry using a foot for severely motor-impaired individuals (DdCP, MdGCP), pp. 957–963.
SAC-2014-PengYYHKH #3d #detection #multi- 3D cloud detection and tracking for solar forecast using multiple sky imagers (ZP, SY, DY, DH, PK, JH), pp. 512–517.
SAC-2014-RossiLR #algorithm #classification #network- A parameter-free label propagation algorithm using bipartite heterogeneous networks for text classification (RGR, AAL, SOR), pp. 79–84.
SAC-2014-ShahriarH #assessment #fuzzy #injection #risk management- Risk assessment of code injection vulnerabilities using fuzzy logic-based system (HS, HH), pp. 1164–1170.
SAC-2014-SypeS #case study #online #requirements #social- Case study: legal requirements for the use of social login features for online reputation updates (YSVDS, JMS), pp. 1698–1705.
SAC-2014-TragatschnigTZ #impact analysis- Impact analysis for event-based systems using change patterns (ST, HT, UZ), pp. 763–768.
SAC-2014-WijenayakeP #estimation #visual notation- Respiratory motion estimation using visual coded markers for radiotherapy (UW, SYP), pp. 1751–1752.
SAC-2014-YokoyamaKM - Secure positioning in a UAV swarm using on-board stereo cameras (RSY, BYLK, EdSM), pp. 769–774.
SAC-2014-YoonY #authentication #network- A biometric-based authenticated key agreement scheme using ECC for wireless sensor networks (EJY, KYY), pp. 699–705.
SAC-2014-ZardariBE - Cloud adoption: prioritizing obstacles and obstacles resolution tactics using AHP (SZ, RB, AE), pp. 1013–1020.
SAC-2014-Zheng #matrix- Semi-supervised context-aware matrix factorization: using contexts in a way of “latent” factors (YZ), pp. 292–293.
SLE-J-2012-GuizzardiZ #concept #modelling #ontology- Using a trope-based foundational ontology for bridging different areas of concern in ontology-driven conceptual modeling (GG, VZ), pp. 417–443.
GPCE-2014-Asai #compilation- Compiling a reflective language using MetaOCaml (KA), pp. 113–122.
SLE-2014-Ridge #combinator #context-free grammar #parsing #performance- Simple, Efficient, Sound and Complete Combinator Parsing for All Context-Free Grammars, Using an Oracle (TR), pp. 261–281.
ASPLOS-2014-RuanVLS #case study #experience #legacy #transaction- Transactionalizing legacy code: an experience report using GCC and Memcached (WR, TV, YL, MFS), pp. 399–412.
ASPLOS-2014-SantosRSW #mobile #runtime- Using ARM trustzone to build a trusted language runtime for mobile applications (NS, HR, SS, AW), pp. 67–80.
CASE-2014-ChenLL #adaptation #design #predict- Design of lane keeping system using adaptive model predictive control (BCC, BCL, KL), pp. 922–926.
CASE-2014-ChenS #approach #markov #modelling #novel- Modeling building occupancy using a novel inhomogeneous Markov chain approach (ZC, YCS), pp. 1079–1084.
CASE-2014-ChuLSO #analysis #contract #flexibility #linear #parametricity #programming- Flexibility analysis on a supply chain contract using a parametric Linear Programming model (CC, EEL, XS, DO), pp. 704–709.
CASE-2014-FeyzabadiC #markov #process- Risk-aware path planning using hirerachical constrained Markov Decision Processes (SF, SC), pp. 297–303.
CASE-2014-GaoLWA #monitoring #petri net #problem #sequence- A monitor solution to enforce legal transition firing sequences problems by using Petri nets (XG, ZL, AW, AMAA), pp. 419–424.
CASE-2014-GlorieuxDSL #approach #optimisation- Optimisation of interacting production stations using a Constructive Cooperative Coevolutionary approach (EG, FD, BS, BL), pp. 322–327.
CASE-2014-HsiehHP #generative #predict- Improving the stability and fuel economy for Belt-Starter Generator Mild HEV at idle speed using model predict control (FCH, YDH, YWP), pp. 916–921.
CASE-2014-HuCLY #approach #automation #comparative #petri net- A comparative approach to supervisor simplification in automated manufacturing systems using Petri nets (HH, CC, YL, YY), pp. 619–625.
CASE-2014-JiangCWWS #3d #analysis #fault #re-engineering- Error analysis and experiments of 3D reconstruction using a RGB-D sensor (SYJ, NYCC, CCW, CHW, KTS), pp. 1020–1025.
CASE-2014-KernWGBM #estimation #machine learning- COD and NH4-N estimation in the inflow of Wastewater Treatment Plants using Machine Learning Techniques (PK, CW, DG, MB, SFM), pp. 812–817.
CASE-2014-LeePP #locality- Coarse-to-fine robot localization method using radio fingerprint and Particle Filter (YCL, BP, SP), pp. 290–296.
CASE-2014-LinHC #gesture #network #recognition- Human hand gesture recognition using a convolution neural network (HIL, MHH, WKC), pp. 1038–1043.
CASE-2014-LinWF - Grasping unknown objects using depth gradient feature with eye-in-hand RGB-D sensor (YCL, STW, LCF), pp. 1258–1263.
CASE-2014-LiWC - Pedestrian tracking system by using human shape prior model (KCL, HCW, JMC), pp. 1139–1143.
CASE-2014-MahlerKLSMKPWFAG #learning #process- Learning accurate kinematic control of cable-driven surgical robots using data cleaning and Gaussian Process Regression (JM, SK, ML, SS, AM, BK, SP, JW, MF, PA, KYG), pp. 532–539.
CASE-2014-NagataO #approach #multi- Electric power interchange between micro-grids by using multi-agent approach (TN, KO), pp. 50–55.
CASE-2014-ParkLH #generative #performance- Trajectory generation method using Bézier spiral curves for high-speed on-road autonomous vehicles (BP, YCL, WYH), pp. 927–932.
CASE-2014-WahrburgZMD #assembly #estimation- Contact force estimation for robotic assembly using motor torques (AW, SZ, BM, HD), pp. 1252–1257.
CC-2014-Dinechin #code generation- Using the SSA-Form in a Code Generator (BDdD), pp. 1–17.
CC-2014-SurendranBZS #array- Inter-iteration Scalar Replacement Using Array SSA Form (RS, RB, JZ, VS), pp. 40–60.
DAC-2014-AdirGGS #generative #network #testing- Using a High-Level Test Generation Expert System for Testing In-Car Networks (AA, AG, LG, TS), p. 6.
DAC-2014-AthavaleMHV #analysis #source code #test coverage- Code Coverage of Assertions Using RTL Source Code Analysis (VA, SM, SH, SV), p. 6.
DAC-2014-ChangJC #configuration management #functional- Functional ECO Using Metal-Configurable Gate-Array Spare Cells (HYC, IHRJ, YWC), p. 6.
DAC-2014-GebalaMMRT #on the- On Using Implied Values in EDT-based Test Compression (MG, GM, NM, JR, JT), p. 6.
DAC-2014-KhosraviRGT #multi #optimisation #reliability- Multi-Objective Local-Search Optimization using Reliability Importance Measuring (FK, FR, MG, JT), p. 6.
DAC-2014-LiuCTKD #component #realtime- Computation Offloading by Using Timing Unreliable Components in Real-Time Systems (WL, JJC, AT, TWK, QD), p. 6.
DAC-2014-LiuFC #process #self- Overlay-Aware Detailed Routing for Self-Aligned Double Patterning Lithography Using the Cut Process (IJL, SYF, YWC), p. 6.
DAC-2014-LuCCSHTC #named- ePlace: Electrostatics Based Placement Using Nesterov’s Method (JL, PC, CCC, LS, DJHH, CCT, CKC), p. 6.
DAC-2014-MaoWZCL #architecture #memory management- Exploration of GPGPU Register File Architecture Using Domain-wall-shift-write based Racetrack Memory (MM, WW, YZ, YC, HHL), p. 6.
DAC-2014-OetjensBBBBCCDEGKKLM0MPPRRRSSTV #challenge #evaluation #prototype #research #safety #state of the art- Safety Evaluation of Automotive Electronics Using Virtual Prototypes: State of the Art and Research Challenges (JHO, NB, MB, OB, AB, MC, SC, RD, WE, KG, TK, CK, HML, MM, WM, DMG, FP, HP, SR, WR, SR, US, AvS, BAT, AV), p. 6.
DAC-2014-PrussKE #abstraction #equivalence #scalability #verification- Equivalence Verification of Large Galois Field Arithmetic Circuits using Word-Level Abstraction via Gröbner Bases (TP, PK, FE), p. 6.
DAC-2014-RaoEST #multi- Protecting SRAM-based FPGAs Against Multiple Bit Upsets Using Erasure Codes (PMBR, ME, RS, MBT), p. 6.
DAC-2014-RenMRZ #fault tolerance #network- Fault-tolerant Routing for On-chip Network Without Using Virtual Channels (PR, QM, XR, NZ), p. 6.
DAC-2014-RoyKCBC #streaming- Demand-Driven Mixture Preparation and Droplet Streaming using Digital Microfluidic Biochips (SR, SK, PPC, BBB, KC), p. 6.
DAC-2014-StoermerT #functional #interface #mockup #standard- Powertrain Co-Simulation using AUTOSAR and the Functional Mockup Interface standard (CS, GT), p. 1.
DAC-2014-TsaiCYYHCCC #energy- Leveraging Data Lifetime for Energy-Aware Last Level Non-Volatile SRAM Caches using Redundant Store Elimination (HJT, CCC, KHY, TCY, LYH, CHC, MFC, TFC), p. 6.
DAC-2014-VaidyanathanDP #detection #reliability #stack- Detecting Reliability Attacks during Split Fabrication using Test-only BEOL Stack (KV, BPD, LP), p. 6.
DAC-2014-WeiWNP #physics #reverse engineering- Reverse Engineering and Prevention Techniques for Physical Unclonable Functions Using Side Channels (SW, JBW, AN, MP), p. 6.
DAC-2014-YuSHEAB #metric #parametricity- Remembrance of Transistors Past: Compact Model Parameter Extraction Using Bayesian Inference and Incomplete New Measurements (LY, SS, CH, IAME, DAA, DSB), p. 6.
DATE-2014-AhariAKT #architecture #configuration management #power management- A power-efficient reconfigurable architecture using PCM configuration technology (AA, HA, BK, MBT), pp. 1–6.
DATE-2014-AlaghiH #performance #probability- Fast and accurate computation using stochastic circuits (AA, JPH), pp. 1–4.
DATE-2014-BalckGP #generative #modelling #protocol #testing- Model-based protocol log generation for testing a telecommunication test harness using CLP (KB, OG, JP), pp. 1–4.
DATE-2014-Braak #adaptation #embedded #scalability- Using guided local search for adaptive resource reservation in large-scale embedded systems (TDtB), pp. 1–4.
DATE-2014-CannellaBS #approach #realtime #scheduling #streaming- System-level scheduling of real-time streaming applications using a semi-partitioned approach (EC, MB, TS), pp. 1–6.
DATE-2014-CasparLH #automation #strict #testing- Automated system testing using dynamic and resource restricted clients (MC, ML, WH), pp. 1–4.
DATE-2014-ConosMDP #coordination #energy #power management- Provably minimal energy using coordinated DVS and power gating (NAC, SM, FD, MP), pp. 1–6.
DATE-2014-DoanJP #flexibility #implementation #multi #scalability- Flexible and scalable implementation of H.264/AVC encoder for multiple resolutions using ASIPs (HCD, HJ, SP), pp. 1–6.
DATE-2014-FerentD #comparison #mining #novel #synthesis- Novel circuit topology synthesis method using circuit feature mining and symbolic comparison (CF, AD), pp. 1–4.
DATE-2014-FriedlerKMNS #effectiveness #locality #slicing- Effective post-silicon failure localization using dynamic program slicing (OF, WK, AM, AN, VS), pp. 1–6.
DATE-2014-KamalGAP #approximate #performance- Improving efficiency of extensible processors by using approximate custom instructions (MK, AG, AAK, MP), pp. 1–4.
DATE-2014-LagraaTP #data mining #mining #scalability #simulation- Scalability bottlenecks discovery in MPSoC platforms using data mining on simulation traces (SL, AT, FP), pp. 1–6.
DATE-2014-LeeA #architecture #hybrid #novel #power management- A novel low power 11-bit hybrid ADC using flash and delay line architectures (HCL, JAA), pp. 1–4.
DATE-2014-MahmoodPM #performance #reduction- Cache aging reduction with improved performance using dynamically re-sizable cache (HM, MP, EM), pp. 1–6.
DATE-2014-MarianiPZS #design #named #predict #scheduling #simulation- DeSpErate: Speeding-up design space exploration by using predictive simulation scheduling (GM, GP, VZ, CS), pp. 1–4.
DATE-2014-MoralesHBHV #energy #implementation- Energy-efficient FPGA implementation for binomial option pricing using OpenCL (VMM, PHH, AB, EH, SV), pp. 1–6.
DATE-2014-NarayananDCCLW #video- Video analytics using beyond CMOS devices (VN, SD, GC, DMC, SPL, PW), pp. 1–5.
DATE-2014-ReimerSSB - Using MaxBMC for Pareto-optimal circuit initialization (SR, MS, TS, BB), pp. 1–6.
DATE-2014-Sadri0WWB #3d #energy #optimisation- Energy optimization in 3D MPSoCs with Wide-I/O DRAM using temperature variation aware bank-wise refresh (MS, MJ, CW, NW, LB), pp. 1–4.
DATE-2014-SarafBLR #probability- IIR filters using stochastic arithmetic (NS, KB, DJL, MDR), pp. 1–6.
DATE-2014-ShinPM #architecture #hybrid- Thermal management of batteries using a hybrid supercapacitor architecture (DS, MP, EM), pp. 1–6.
DATE-2014-TurkyilmazCRBC #3d #integration- 3D FPGA using high-density interconnect Monolithic Integration (OT, GC, OR, PB, FC), pp. 1–4.
DATE-2014-VartziotisKCPJ #multi #optimisation- Multi-site test optimization for multi-Vdd SoCs using space- and time- division multiplexing (FV, XK, KC, RAP, AJ), pp. 1–6.
DATE-2014-VijaykumarV #analysis #canonical #statistics- Statistical static timing analysis using a skew-normal canonical delay model (MV, VV), pp. 1–6.
DATE-2014-YangMPOP #logic- Complementary resistive switch based stateful logic operations using material implication (YY, JM, DKP, MO, SP), pp. 1–4.
DATE-2014-ZangenehJ #design #feedback #logic- Sub-threshold logic circuit design using feedback equalization (MZ, AJ), pp. 1–6.
HPCA-2014-KhanAWMJ #clustering #performance- Improving cache performance using read-write partitioning (SMK, ARA, CW, OM, DAJ), pp. 452–463.
HPCA-2014-KimLJK #architecture #gpu #memory management #named- GPUdmm: A high-performance and memory-oblivious GPU architecture using dynamic memory management (YK, JL, JEJ, JK), pp. 546–557.
HPDC-2014-XiangMA #matrix #pipes and filters #scalability- Scalable matrix inversion using MapReduce (JX, HM, AA), pp. 177–190.
ISMM-2014-LiDL #liveness #modelling- Modeling heap data growth using average liveness (PL, CD, HL), pp. 71–82.
ISMM-2014-Printezis #perspective #twitter #virtual machine- Use of the JVM at twitter: a bird’s eye view (TP), p. 1.
LCTES-2014-MartinsNDMC #clustering #compilation #optimisation #sequence- Exploration of compiler optimization sequences using clustering-based selection (LGAM, RN, ACBD, EM, JMPC), pp. 63–72.
PDP-2014-AshrafP #multi #web- Using Ant Colony System to Consolidate Multiple Web Applications in a Cloud Environment (AA, IP), pp. 482–489.
PDP-2014-BrownJHSIG #parallel #performance #refactoring #tool support- Agricultural Reform: More Efficient Farming Using Advanced Parallel Refactoring Tools (CB, VJ, KH, HS, KI, CWG), pp. 36–43.
PDP-2014-BuiFVHHLPH #parallel #scalability- Scalable Parallel I/O on a Blue Gene/Q Supercomputer Using Compression, Topology-Aware Data Aggregation, and Subfiling (HB, HF, VV, SH, KH, JL, MEP, KH), pp. 107–111.
PDP-2014-BuonoMMV #architecture #hardware #manycore #message passing #optimisation #thread- Optimizing Message-Passing on Multicore Architectures Using Hardware Multi-threading (DB, TDM, GM, MV), pp. 262–270.
PDP-2014-ChervenakSGSH #adaptation #performance #resource management #staging- Efficient Data Staging Using Performance-Based Adaptation and Policy-Based Resource Allocation (ALC, AS, JG, RS, NH), pp. 244–247.
PDP-2014-DalKT #graph #performance #scalability- Fast Diameter Computation of Large Sparse Graphs Using GPUs (GHD, WAK, FWT), pp. 632–639.
PDP-2014-DavtyanPGS #coordination- Coordinated Cooperative Work Using Undependable Processors with Unreliable Broadcast (SD, RDP, CG, AAS), pp. 17–26.
PDP-2014-FarahnakianLP #energy #learning #virtual machine- Energy-Efficient Virtual Machines Consolidation in Cloud Data Centers Using Reinforcement Learning (FF, PL, JP), pp. 500–507.
PDP-2014-ItoF #analysis #hardware #problem #resource management- An Experimental Analysis for Hardware Resource Management Using a New Strip Packing Problem (RI, NF), pp. 360–364.
PDP-2014-KerteszMD #distributed #logic #multi- Multi-job Meta-brokering in Distributed Computing Infrastructures Using Pliant Logic (AK, GM, JDD), pp. 138–145.
PDP-2014-Kwedlo #algorithm #modelling #parallel- A Parallel EM Algorithm for Gaussian Mixture Models Implemented on a NUMA System Using OpenMP (WK), pp. 292–298.
PDP-2014-NaughtonEVB #development #message passing #simulation- Supporting the Development of Resilient Message Passing Applications Using Simulation (TN, CE, GV, SB), pp. 271–278.
PDP-2014-ONeillMMK #named #platform #scheduling- SHEPARD: Scheduling on Heterogeneous Platforms Using Application Resource Demands (EO, JM, PM, PK), pp. 213–217.
PPoPP-2014-ThomsonDB #bound #concurrent #empirical #testing- Concurrency testing using schedule bounding: an empirical study (PT, AFD, AB), pp. 15–28.
PPoPP-2014-WangWYYWL0 #concurrent #debugging #locality #memory management- Concurrency bug localization using shared memory access pairs (WW, CW, PCY, XY, ZW, JL, XF), pp. 375–376.
ESOP-2014-MatosGR #fault #named- REAP: Reporting Errors Using Alternative Paths (JM, JG, PR), pp. 453–472.
ESOP-2014-PercontiA #compilation #multi #semantics #verification- Verifying an Open Compiler Using Multi-language Semantics (JTP, AA), pp. 128–148.
FASE-2014-AnjorinSLS #graph grammar #refinement- Modularizing Triple Graph Grammars Using Rule Refinement (AA, KS, ML, AS), pp. 340–354.
FASE-2014-MasciZJCT #user interface #verification- Formal Verification of Medical Device User Interfaces Using PVS (PM, YZ, PLJ, PC, HWT), pp. 200–214.
FASE-2014-MudduluruR #abstraction #incremental #performance #static analysis- Efficient Incremental Static Analysis Using Path Abstraction (RM, MKR), pp. 125–139.
FASE-2014-StruberRTC #crawling #information retrieval #modelling- Splitting Models Using Information Retrieval and Model Crawling Techniques (DS, JR, GT, MC), pp. 47–62.
STOC-2014-MillerS #protocol #quantum #robust- Robust protocols for securely expanding randomness and distributing keys using untrusted quantum devices (CAM, YS), pp. 417–426.
TACAS-2014-BozzanoCGT #component #design #detection #fault #identification #logic- Formal Design of Fault Detection and Identification Components Using Temporal Epistemic Logic (MB, AC, MG, ST), pp. 326–340.
TACAS-2014-SalemDKT #automaton #invariant #model checking #testing- Symbolic Model Checking of Stutter-Invariant Properties Using Generalized Testing Automata (AEBS, ADL, FK, YTM), pp. 440–454.
TACAS-2014-WijsB #manycore #named #on the fly- GPUexplore: Many-Core On-the-Fly State Space Exploration Using GPUs (AW, DB), pp. 233–247.
WRLA-2014-BaeM #infinity #model checking- Infinite-State Model Checking of LTLR Formulas Using Narrowing (KB, JM), pp. 113–129.
WRLA-2014-Genet #automaton #functional #source code #static analysis #towards- Towards Static Analysis of Functional Programs Using Tree Automata Completion (TG), pp. 147–161.
CAV-2014-0001A #invariant #random- From Invariant Checking to Invariant Inference Using Randomized Search (RS, AA), pp. 88–105.
CAV-2014-BinghamL #bound #fault #simulation #verification- Verifying Relative Error Bounds Using Symbolic Simulation (JB, JLH), pp. 277–292.
CAV-2014-Hagemann #analysis #hybrid #orthogonal #reachability- Reachability Analysis of Hybrid Systems Using Symbolic Orthogonal Projections (WH), pp. 407–423.
CAV-2014-LarrazNORR #proving- Proving Non-termination Using Max-SMT (DL, KN, AO, ERC, AR), pp. 779–796.
ICLP-J-2014-BartakZ #logic programming #problem- Using Tabled Logic Programming to Solve the Petrobras Planning Problem (RB, NFZ), pp. 697–710.
ICLP-J-2014-BogaertsJBCVD #calculus #linear #simulation- Simulating Dynamic Systems Using Linear Time Calculus Theories (BB, JJ, MB, BdC, JV, MD), pp. 477–492.
ICLP-J-2014-CominiTV #linear #logic- Abstract Diagnosis for tccp using a Linear Temporal Logic (MC, LT, AV), pp. 787–801.
ICLP-J-2014-SerranoLH #abstract interpretation #analysis #logic programming #resource management #source code- Resource Usage Analysis of Logic Programs via Abstract Interpretation Using Sized Types (AS, PLG, MVH), pp. 739–754.
ICTSS-2014-MossigeGM #case study #constraints #industrial #programming #testing- Testing Robotized Paint System Using Constraint Programming: An Industrial Case Study (MM, AG, HM), pp. 145–160.
IJCAR-2014-GoreOT #calculus #implementation- Implementing Tableau Calculi Using BDDs: BDDTab System Description (RG, KO, JT), pp. 337–343.
IJCAR-2014-GoreTW #logic #proving #theorem proving- A History-Based Theorem Prover for Intuitionistic Propositional Logic Using Global Caching: IntHistGC System Description (RG, JT, JW), pp. 262–268.
ISSTA-2014-LinK #automation #concurrent #multi #satisfiability #source code #thread- Automatic repair for multi-threaded programs with Deadlock/Livelock using maximum satisfiability (YL, SSK), pp. 237–247.
ISSTA-2014-NejatiB #constraints #cpu #identification #trade-off- Identifying optimal trade-offs between CPU time usage and temporal constraints using search (SN, LCB), pp. 351–361.
ISSTA-2014-YandrapallyTSC #automation #robust #testing- Robust test automation using contextual clues (RY, ST, SS, SC), pp. 304–314.
ISSTA-2014-ZhangGA #execution #reduction #symbolic computation #testing- Using test case reduction and prioritization to improve symbolic execution (CZ, AG, MAA), pp. 160–170.
SAT-2014-BelovHM #proving- MUS Extraction Using Clausal Proofs (AB, MH, JMS), pp. 48–57.
SAT-2014-HeymanSMLA - Dominant Controllability Check Using QBF-Solver and Netlist Optimizer (TH, DS, YM, LL, HAH), pp. 227–242.
SAT-2014-WetzlerHH #named #performance #proving- DRAT-trim: Efficient Checking and Trimming Using Expressive Clausal Proofs (NW, MH, WAHJ), pp. 422–429.
TAP-2014-KurthSW #constraints #generative #interface #process #testing #theorem proving #uml- Generating Test Data from a UML Activity Using the AMPL Interface for Constraint Solvers (FK, SS, SW), pp. 169–186.
VMCAI-2014-GustavssonGL #analysis #execution #parallel- Timing Analysis of Parallel Software Using Abstract Execution (AG, JG, BL), pp. 59–77.
VMCAI-2014-SinghSXKS #composition #modelling #sketching #synthesis- Modular Synthesis of Sketches Using Models (RS, RS, ZX, RK, ASL), pp. 395–414.
CBSE-2013-BurtonS #correctness #data type #mixin- Correctness of intrusive data structures using mixins (EB, ES), pp. 53–58.
CBSE-2013-GortonLLED #case study #component #delivery #experience #platform- Build less code deliver more science: an experience report on composing scientific environments using component-based and commodity software platforms (IG, YL, CL, TE, KKvD), pp. 159–168.
QoSA-2013-DurdikR #design pattern #documentation #on the- On the appropriate rationale for using design patterns and pattern documentation (ZD, RHR), pp. 107–116.
DocEng-2013-DoTT #documentation #taxonomy- Document noise removal using sparse representations over learned dictionary (THD, ST, ORT), pp. 161–168.
DocEng-2013-NourashrafeddinMA #clustering #documentation #interactive- Interactive text document clustering using feature labeling (SN, EEM, DVA), pp. 61–70.
DocEng-2013-SatkhozhinaAA #random #recognition- Optical font recognition using conditional random field (AS, IA, JPA), pp. 119–122.
DocEng-2013-TorabiDT - Early modern OCR project (eMOP) at Texas A&M University: using Aletheia to train Tesseract (KT, JD, BT), pp. 23–26.
DocEng-2013-Vion-Dury #documentation #integration #owl #semantics- Using RDFS/OWL to ease semantic integration of structured documents (JYVD), pp. 189–192.
DRR-2013-AriesON #algorithm #automation #classification #clustering #summary- Using clustering and a modified classification algorithm for automatic text summarization (AA, HO, ON).
DRR-2013-KumarPR13a #composition #documentation #evaluation- Evaluation of document binarization using eigen value decomposition (DK, MNAP, AGR).
DRR-2013-KumarWGS #framework #keyword- Segmentation-free keyword spotting framework using dynamic background model (GK, SW, VG, RS).
DRR-2013-MedjkouneMPV #approach #online #recognition- Using online handwriting and audio streams for mathematical expressions recognition: a bimodal approach (SM, HM, SP, CVG).
DRR-2013-MehriGHM #analysis #documentation #image #multi #segmentation- Old document image segmentation using the autocorrelation function and multiresolution analysis (MM, PGK, PH, RM).
DRR-2013-SrihariKTB #verification- Combining evidence using likelihood ratios in writer verification (SNS, DK, YT, GRB).
DRR-2013-ZhuHZ #image #recognition #retrieval- Rotation-robust math symbol recognition and retrieval using outer contours and image subsampling (SZ, LH, RZ).
HT-2013-WolffMC #data flow #named- Storyscope: using theme and setting to guide story enrichment from external data sources (AW, PM, TDC), pp. 79–88.
HT-2013-WuCH #recommendation- Using personality to adjust diversity in recommender systems (WW, LC, LH), pp. 225–229.
ICDAR-2013-AhmedKILD #automation #documentation #generative #image #retrieval- Automatic Ground Truth Generation of Camera Captured Documents Using Document Image Retrieval (SA, KK, MI, ML, AD), pp. 528–532.
ICDAR-2013-AhmedSLD #segmentation- A Generic Method for Stamp Segmentation Using Part-Based Features (SA, FS, ML, AD), pp. 708–712.
ICDAR-2013-AlaeiDG #detection #probability #representation- Logo Detection Using Painting Based Representation and Probability Features (AA, MD, NG), pp. 1235–1239.
ICDAR-2013-BaechlerLI #classification- Text Line Extraction Using DMLP Classifiers for Historical Manuscripts (MB, ML, RI), pp. 1029–1033.
ICDAR-2013-BaiYL #correlation #locality- Scene Text Localization Using Gradient Local Correlation (BB, FY, CLL), pp. 1380–1384.
ICDAR-2013-BaroniaN #reduction- Ink-Bleed Reduction Using Layer Separation (SB, AMN), pp. 215–219.
ICDAR-2013-BouillonLAR #gesture #learning- Using Confusion Reject to Improve (User and) System (Cross) Learning of Gesture Commands (MB, PL, ÉA, GR), pp. 1017–1021.
ICDAR-2013-BreuelUAS #network- High-Performance OCR for Printed English and Fraktur Using LSTM Networks (TMB, AUH, MIAAA, FS), pp. 683–687.
ICDAR-2013-ChengSAT #classification #data fusion #image #visual notation- Graphical Figure Classification Using Data Fusion for Integrating Text and Image Features (BC, RJS, SA, GRT), pp. 693–697.
ICDAR-2013-ChowdhuryBP #distance #metric #online #recognition- Online Handwriting Recognition Using Levenshtein Distance Metric (SDC, UB, SKP), pp. 79–83.
ICDAR-2013-DuAD #multi #scalability- Large-Scale Signature Matching Using Multi-stage Hashing (XD, WAA, DSD), pp. 976–980.
ICDAR-2013-FeildLS #probability #recognition- Using a Probabilistic Syllable Model to Improve Scene Text Recognition (JLF, EGLM, DAS), pp. 897–901.
ICDAR-2013-FielS #identification #retrieval #visual notation- Writer Identification and Writer Retrieval Using the Fisher Vector on Visual Vocabularies (SF, RS), pp. 545–549.
ICDAR-2013-Furukawa #composition- A New Method for Discriminating Printers Based on Contours Qualities of Printed Characters Using Wavelet Decomposition (TF), pp. 1115–1119.
ICDAR-2013-GebhardtGSD #authentication #detection #documentation- Document Authentication Using Printing Technique Features and Unsupervised Anomaly Detection (JG, MG, FS, AD), pp. 479–483.
ICDAR-2013-GotoIFU #graph #scalability #set- Analyzing the Distribution of a Large-Scale Character Pattern Set Using Relative Neighborhood Graph (MG, RI, YF, SU), pp. 3–7.
ICDAR-2013-HamdaniMN #composition #recognition- Open Vocabulary Arabic Handwriting Recognition Using Morphological Decomposition (MH, AEDM, HN), pp. 280–284.
ICDAR-2013-HerzogSN #graph #retrieval- Using Harris Corners for the Retrieval of Graphs in Historical Manuscripts (RH, AS, BN), pp. 1295–1299.
ICDAR-2013-HuC #classification #pseudo #verification- Offline Signature Verification Using Real Adaboost Classifier Combination of Pseudo-dynamic Features (JH, YC), pp. 1345–1349.
ICDAR-2013-HuZ #multi- Segmenting Handwritten Math Symbols Using AdaBoost and Multi-scale Shape Context Features (LH, RZ), pp. 1180–1184.
ICDAR-2013-ItaniHI - Text Line Extraction Method Using Domain-Based Active Contour Model (YI, TH, JI), pp. 1230–1234.
ICDAR-2013-JainD13a #identification- Writer Identification Using an Alphabet of Contour Gradient Descriptors (RJ, DSD), pp. 550–554.
ICDAR-2013-KasarBACP #detection #documentation #image #learning- Learning to Detect Tables in Scanned Document Images Using Line Information (TK, PB, SA, CC, TP), pp. 1185–1189.
ICDAR-2013-KieuJVMD #3d #documentation #generative #image- Semi-synthetic Document Image Generation Using Texture Mapping on Scanned 3D Document Shapes (VCK, NJ, MV, RM, JPD), pp. 489–493.
ICDAR-2013-KimLT #classification #heuristic #identification- Identification of Investigator Name Zones Using SVM Classifiers and Heuristic Rules (JK, DXL, GRT), pp. 140–144.
ICDAR-2013-KirbyH #analysis- Analysis of Topographic Maps for Recreational Purposes Using Decision Trees (RK, TCH), pp. 1105–1109.
ICDAR-2013-KrayemSEO #recognition #word- Holistic Arabic Whole Word Recognition Using HMM and Block-Based DCT (AK, NS, LJE, TO), pp. 1120–1124.
ICDAR-2013-KunzeKYK #documentation #eye tracking #image #mobile #retrieval #word- The Wordometer — Estimating the Number of Words Read Using Document Image Retrieval and Mobile Eye Tracking (KK, HK, KY, KK), pp. 25–29.
ICDAR-2013-KunzeSIK #detection #documentation #off the shelf #process #recognition- Reading Activity Recognition Using an Off-the-Shelf EEG — Detecting Reading Activities and Distinguishing Genres of Documents (KK, YS, SI, KK), pp. 96–100.
ICDAR-2013-LuoOWK #approach #automation #classification- Automatic Chinese Text Classification Using Character-Based and Word-Based Approach (XL, WO, TW, FK), pp. 329–333.
ICDAR-2013-MalikRPK #documentation #retrieval- Handwritten Musical Document Retrieval Using Music-Score Spotting (RM, PPR, UP, FK), pp. 832–836.
ICDAR-2013-Martin-AlboRV #feedback #interactive #online- Interactive Off-Line Handwritten Text Transcription Using On-Line Handwritten Text as Feedback (DMA, VR, EV), pp. 1280–1284.
ICDAR-2013-MiyoshiNS #image- Moment-Based Character-Normalization Methods Using a Contour Image Combined with an Original Image (TM, TN, HS), pp. 1066–1070.
ICDAR-2013-OpreanLPM #recognition #web #word- Using the Web to Create Dynamic Dictionaries in Handwritten Out-of-Vocabulary Word Recognition (CO, LLS, AP, CM), pp. 989–993.
ICDAR-2013-ParvezM #recognition #reduction- Lexicon Reduction Using Segment Descriptors for Arabic Handwriting Recognition (MTP, SAM), pp. 1265–1269.
ICDAR-2013-PrumVFO #approach #modelling #online #recognition- A Discriminative Approach to On-Line Handwriting Recognition Using Bi-character Models (SP, MV, AF, JMO), pp. 364–368.
ICDAR-2013-RayCC #random #recognition- Character Recognition Using Conditional Random Field Based Recognition Engine (AR, AC, SC), pp. 18–22.
ICDAR-2013-RazaSDE #detection #multi- Multilingual Artificial Text Detection Using a Cascade of Transforms (AR, IS, CD, AE), pp. 309–313.
ICDAR-2013-RoeM #documentation #image- Binarization of Color Historical Document Images Using Local Image Equalization and XDoG (ER, CABM), pp. 205–209.
ICDAR-2013-RoySSJ #documentation #n-gram #segmentation- Character N-Gram Spotting on Handwritten Documents Using Weakly-Supervised Segmentation (UR, NS, KPS, CVJ), pp. 577–581.
ICDAR-2013-Saabni #distance #embedded #image #performance #retrieval #word- Efficient Word Image Retrieval Using Earth Movers Distance Embedded to Wavelets Coefficients Domain (RS), pp. 314–318.
ICDAR-2013-SunBOK #detection- Specific Comic Character Detection Using Local Feature Matching (WS, JCB, JMO, KK), pp. 275–279.
ICDAR-2013-TatawRK #clustering- Clustering of Symbols Using Minimal Description Length (OMT, TR, EJK), pp. 180–184.
ICDAR-2013-TianLST #recognition- Scene Text Recognition Using Co-occurrence of Histogram of Oriented Gradients (ST, SL, BS, CLT), pp. 912–916.
ICDAR-2013-TuarobBMG #automation #detection #documentation #machine learning #pseudo- Automatic Detection of Pseudocodes in Scholarly Documents Using Machine Learning (ST, SB, PM, CLG), pp. 738–742.
ICDAR-2013-WemhoenerYM #multi- Creating an Improved Version Using Noisy OCR from Multiple Editions (DW, IZY, RM), pp. 160–164.
ICDAR-2013-YadavCK - Most Discriminative Primitive Selection for Identity Determination Using Handwritten Devanagari Script (NY, SC, PKK), pp. 1390–1394.
ICDAR-2013-ZagorisP #detection #image #modelling- Text Detection in Natural Images Using Bio-inspired Models (KZ, IP), pp. 1370–1374.
ICDAR-2013-ZhouTLW #markov #random #recognition- Minimum Risk Training for Handwritten Chinese/Japanese Text Recognition Using Semi-Markov Conditional Random Fields (XDZ, FT, CLL, HW), pp. 940–944.
ICDAR-2013-ZhuSSGN #2d #online #recognition #word- Online Handwritten Cursive Word Recognition Using Segmentation-Free MRF in Combination with P2DBMN-MQDF (BZ, AS, SS, VG, MN), pp. 349–353.
ICDAR-2013-ZhuZ #detection #image #recognition- Label Detection and Recognition for USPTO Images Using Convolutional K-Means Feature Quantization and Ada-Boost (SZ, RZ), pp. 633–637.
ICDAR-2013-ZirariENM #analysis #component #documentation #image #segmentation- A Document Image Segmentation System Using Analysis of Connected Components (FZ, AE, SN, DM), pp. 753–757.
JCDL-2013-BeckerD #benchmark #corpus #metric #modelling #set- Free benchmark corpora for preservation experiments: using model-driven engineering to generate data sets (CB, KD), pp. 349–358.
JCDL-2013-GollapalliMG #graph #ranking #topic- Ranking experts using author-document-topic graphs (SDG, PM, CLG), pp. 87–96.
JCDL-2013-HeMNS #identification- Identification of works of manga using LOD resources: an experimental FRBRization of bibliographic data of comic books (WH, TM, MN, SS), pp. 253–256.
JCDL-2013-SchererLS #multi #query #repository #research- Visual-interactive querying for multivariate research data repositories using bag-of-words (MS, TvL, TS), pp. 285–294.
JCDL-2013-TuarobPG #automation #metadata #modelling #probability #recommendation #topic- Automatic tag recommendation for metadata annotation using probabilistic topic modeling (ST, LCP, CLG), pp. 239–248.
SIGMOD-2013-AbiteboulAMST #development #rule-based- Rule-based application development using Webdamlog (SA, ÉA, GM, JS, JT), pp. 965–968.
SIGMOD-2013-CaiVPAHJ #markov #simulation- Simulation of database-valued markov chains using SimSQL (ZC, ZV, LLP, SA, PJH, CMJ), pp. 637–648.
SIGMOD-2013-Cohen #distance #edit distance- Indexing for subtree similarity-search using edit distance (SC), pp. 49–60.
SIGMOD-2013-DeshpandeLTDSRHD #knowledge base #maintenance- Building, maintaining, and using knowledge bases: a report from the trenches (OD, DSL, MT, SD, SS, AR, VH, AD), pp. 1209–1220.
SIGMOD-2013-FernandezMKP #fault tolerance- Integrating scale out and fault tolerance in stream processing using operator state management (RCF, MM, EK, PP), pp. 725–736.
SIGMOD-2013-GiannikisMAK #optimisation- Workload optimization using SharedDB (GG, DM, GA, DK), pp. 1045–1048.
SIGMOD-2013-WhangYYSKK #approach #named #parallel- ODYS: an approach to building a massively-parallel search engine using a DB-IR tightly-integrated parallel DBMS for higher-level functionality (KYW, TSY, YMY, IYS, HYK, IJK), pp. 313–324.
SIGMOD-2013-YangWQWL #string- Improving regular-expression matching on strings using negative factors (XY, BW, TQ, YW, CL), pp. 361–372.
SIGMOD-2013-ZhangGBFRP #named #statistics- GeoDeepDive: statistical inference using familiar data-processing languages (CZ, VG, JB, TF, CR, SP), pp. 993–996.
SIGMOD-2013-ZhangXYZW #algorithm #named #search-based- PrivGene: differentially private model fitting using genetic algorithms (JZ, XX, YY, ZZ, MW), pp. 665–676.
TPDL-2013-CauteruccioI - A Domain Meta-wrapper Using Seeds for Intelligent Author List Extraction in the Domain of Scholarly Articles (FC, GI), pp. 309–314.
TPDL-2013-FedoryszakTB #scalability- Large Scale Citation Matching Using Apache Hadoop (MF, DT, LB), pp. 362–365.
TPDL-2013-HallC #library #scalability #visualisation- Exploring Large Digital Library Collections Using a Map-Based Visualisation (MMH, PDC), pp. 216–227.
TPDL-2013-KemmanKM #eye tracking #interface- Eye Tracking the Use of a Collapsible Facets Panel in a Search Interface (MK, MK, JM), pp. 405–408.
TPDL-2013-KohnckeB #library #ranking- Context-Sensitive Ranking Using Cross-Domain Knowledge for Chemical Digital Libraries (BK, WTB), pp. 285–296.
TPDL-2013-MenesesBSFS #documentation #semantics- Restoring Semantically Incomplete Document Collections Using Lexical Signatures (LM, HB, SS, RF, FS), pp. 321–332.
TPDL-2013-SalahEldeenN #social #web- Resurrecting My Revolution — Using Social Link Neighborhood in Bringing Context to the Disappearing Web (HS, MLN), pp. 333–345.
VLDB-2013-0002GJ #correlation #markov #modelling- Travel Cost Inference from Sparse, Spatio-Temporally Correlated Time Series Using Markov Models (BY, CG, CSJ), pp. 769–780.
VLDB-2013-DengJLLY #concept #knowledge base #scalability #web- Scalable Column Concept Determination for Web Tables Using Large Knowledge Bases (DD, YJ, GL, JL, CY), pp. 1606–1617.
VLDB-2013-KondaKRS #data analysis #enterprise #feature model- Feature Selection in Enterprise Analytics: A Demonstration using an R-based Data Analytics System (PK, AK, CR, VS), pp. 1306–1309.
VLDB-2013-KotsakosSKG #health #monitoring #named #smarttech- SmartMonitor: Using Smart Devices to Perform Structural Health Monitoring (DK, PS, VK, DG), pp. 1282–1285.
VLDB-2013-MahmoudNPAA #commit #database #multi- Low-Latency Multi-Datacenter Databases using Replicated Commit (HAM, FN, AP, DA, AEA), pp. 661–672.
VLDB-2013-OgdenTP #automaton #parallel #query #scalability #transducer #xml- Scalable XML Query Processing using Parallel Pushdown Transducers (PO, DBT, PP), pp. 1738–1749.
VLDB-2013-ParkMS #parallel #pipes and filters #query- Parallel Computation of Skyline and Reverse Skyline Queries Using MapReduce (YP, JKM, KS), pp. 2002–2013.
VLDB-2013-SimoesGG #algorithm #approximate #information management #performance- When Speed Has a Price: Fast Information Extraction Using Approximate Algorithms (GS, HG, LG), pp. 1462–1473.
VLDB-2013-StoicaA #performance- Improving Flash Write Performance by Using Update Frequency (RS, AA), pp. 733–744.
VLDB-2013-SundaramTSMIMD #parallel #similarity #streaming #twitter- Streaming Similarity Search over one Billion Tweets using Parallel Locality-Sensitive Hashing (NS, AT, NS, TM, PI, SM, PD), pp. 1930–1941.
VLDB-2013-YuanL013a - Making Updates Disk-I/O Friendly Using SSDs (MS, KAR, MC, BB), pp. 997–1008.
CSEET-2013-ArdisBCVI #education #re-engineering #source code- Using GSwE2009 in the creation and modification of graduate software engineering programs and related curricula (MAA, SB, LC, DV, SI), pp. 109–118.
CSEET-2013-CookDSSCH #ide #reasoning #specification #web- Specification and reasoning in SE projects using a Web IDE (CTC, SDS, YSS, MS, JCC, JEH), pp. 229–238.
CSEET-2013-FortalezaVJPC #collaboration #communication #development #distributed- Using Distributed Software Development in the improvement of communication and collaboration skills in SE courses: An observational study (LLF, SRCV, OOMJ, RP, TC), pp. 139–148.
ITiCSE-2013-Alabdulqader #visualisation- Visualizing computer ethics using infographics (EA), p. 355.
ITiCSE-2013-Baumgartner #approach #case study #delivery #design #education #information management- Using case studies to design and deliver technology-centered computing education courses: an innovative approach from an undergraduate information systems program in singapore (IB), pp. 189–194.
ITiCSE-2013-BeltranGP #architecture #concept #in the cloud- Using CloudSim to learn cloud computing architecture/system concepts in a graduate course (MB, AG, MP), pp. 82–87.
ITiCSE-2013-BuckD #authentication #education #modelling- Authentic object modeling in the early computer science curriculum using objektgraph (DB, ID), p. 363.
ITiCSE-2013-EllisHD - Developing HFOSS projects using integrated teams across levels and institutions (HJCE, GWH, JD), p. 349.
ITiCSE-2013-Law #interactive- Interactive lectures using quick response codes (RL), p. 317.
ITiCSE-2013-Law13a #feedback #game studies #programming #student- Using screencasts to enhance coursework feedback for game programming students (RL), p. 329.
ITiCSE-2013-MedinaPGR #data mining #education #learning #mining #programming- Assistance in computer programming learning using educational data mining and learning analytics (CFM, JRPP, VMÁG, MdPPR), pp. 237–242.
ITiCSE-2013-MellodgeR #arduino #case study #experience #framework #learning #platform #student- Using the arduino platform to enhance student learning experiences (PM, IR), p. 338.
ITiCSE-2013-RowanD #learning #mobile #overview- A systematic literature review on using mobile computing as a learning intervention (MR, JD), p. 339.
ITiCSE-2013-TrabelsiA #education #generative #network- Using network packet generators and snort rules for teaching denial of service attacks (ZT, LA), pp. 285–290.
ITiCSE-2013-VihavainenVLP #learning #student- Scaffolding students’ learning using test my code (AV, TV, ML, MP), pp. 117–122.
SIGITE-2013-BrannockN #android #development- An early introduction to android app development for CS1 using sofia (EB, NPN), pp. 135–136.
SIGITE-2013-Cold #case study #experience- Partially flipped: experiences using POGIL (SJC), pp. 133–134.
SIGITE-2013-EllisJBHD - Developing HFOSS projects using integrated teams across levels and institutions (HJCE, SJ, DB, GWH, JD), pp. 139–140.
SIGITE-2013-GasparLBT #overview #programming #student #testing- A preliminary review of undergraduate programming students’ perspectives on writing tests, working with others, & using peer testing (AG, SL, NRB, RT), pp. 109–114.
SIGITE-2013-HeinonenHLV #agile #learning #re-engineering- Learning agile software engineering practices using coding dojo (KH, KH, ML, AV), pp. 97–102.
SIGITE-2013-HillC #development #education #framework #hardware #low cost #open source #platform #programming #student- Using a low-cost open source hardware development platform in teaching young students programming skills (LWH, SC), pp. 63–68.
SIGITE-2013-KawashD #assembly #development #game studies #programming #student #video- Using video game development to engage undergraduate students of assembly language programming (JK, RDC), pp. 71–76.
SIGITE-2013-LiG #communication #empirical #social #social media #student- Can you hear me now?: an empirical study on using social media to improve student-instructor communication (LL, RG), pp. 147–148.
SIGITE-2013-Lutz #3d #education- Enhancing information technology education (ITE) with the use of 3D printer technology (RL), pp. 157–158.
SIGITE-2013-PackR #student- Training cyber-defense and securing information assets using student blue teams (SJP, DCR), pp. 3–6.
SIGITE-2013-StokerAM #learning #virtual machine- Using virtual machines to improve learning and save resources in an introductory IT course (GS, TA, PM), pp. 91–96.
CSMR-2013-AsgharMSS #metric #requirements #traceability- Maintainability-Based Requirements Prioritization by Using Artifacts Traceability and Code Metrics (MWA, AM, AS, GS), pp. 417–420.
CSMR-2013-NerellaMW #approach #optimisation #query- An Approach for Optimization of Object Queries on Collections Using Annotations (VKSN, SKM, TW), pp. 273–282.
CSMR-2013-OuniKS #refactoring #search-based- Search-Based Refactoring Using Recorded Code Changes (AO, MK, HAS), pp. 221–230.
CSMR-2013-PanichellaMMPOPL #how #traceability- When and How Using Structural Information to Improve IR-Based Traceability Recovery (AP, CM, EM, DP, RO, DP, ADL), pp. 199–208.
CSMR-2013-ScannielloECG #gpu- Using the GPU to Green an Intensive and Massive Computation System (GS, UE, GC, CG), pp. 384–387.
CSMR-2013-SnajberkHB #component #visualisation- Visualization of Component-Based Applications Structure Using AIVA (JS, LH, PB), pp. 409–412.
CSMR-2013-TothNFS #source code #version control- Using Version Control History to Follow the Changes of Source Code Elements (ZT, GN, RF, IS), pp. 319–322.
ICPC-2013-DiazBMOTL #traceability- Using code ownership to improve IR-based Traceability Link Recovery (DD, GB, AM, RO, ST, ADL), pp. 123–132.
ICSM-2013-CruzIP #development #empirical #validation- An Empirical Illustration to Validate a FLOSS Development Model Using S-Shaped Curves (AECC, HI, NP), pp. 468–471.
ICSM-2013-DitMVP #component #library #maintenance #research- Supporting and Accelerating Reproducible Research in Software Maintenance Using TraceLab Component Library (BD, EM, MLV, DP), pp. 330–339.
ICSM-2013-KhanBEL #evolution #named- eCITY: A Tool to Track Software Structural Changes Using an Evolving City (TK, HB, AE, PL), pp. 492–495.
ICSM-2013-NordOSDGK #architecture- Variations on Using Propagation Cost to Measure Architecture Modifiability Properties (RLN, IO, RSS, JD, MAG, PK), pp. 400–403.
ICSM-2013-SorOTS #approach #detection #machine learning #memory management #statistics- Improving Statistical Approach for Memory Leak Detection Using Machine Learning (VS, PO, TT, SNS), pp. 544–547.
ICSM-2013-TabaKZHN #debugging #predict- Predicting Bugs Using Antipatterns (SEST, FK, YZ, AEH, MN), pp. 270–279.
ICSM-2013-WrightJKCW #automation #refactoring #scalability- Large-Scale Automated Refactoring Using ClangMR (HKW, DJ, MK, CC, ZW), pp. 548–551.
MSR-2013-AlaliBNM #detection #distance #metric- A preliminary investigation of using age and distance measures in the detection of evolutionary couplings (AA, BB, CDN, JIM), pp. 169–172.
MSR-2013-AllamanisS13a #mining #modelling #repository #source code- Mining source code repositories at massive scale using language modeling (MA, CAS), pp. 207–216.
MSR-2013-CampbellZXHM #analysis #detection #documentation #topic- Deficient documentation detection: a methodology to locate deficient project documentation using topic analysis (JCC, CZ, ZX, AH, JM), pp. 57–60.
MSR-2013-HuW #fault #predict- Using citation influence to predict software defects (WH, KW), pp. 419–428.
MSR-2013-NaguibNBH #debugging #process #recommendation- Bug report assignee recommendation using activity profiles (HN, NN, BB, DH), pp. 22–30.
MSR-2013-RobbesR #developer #interactive #metric- Using developer interaction data to compare expertise metrics (RR, DR), pp. 297–300.
MSR-2013-VasquezDP #analysis #development #mobile #stack overflow- An exploratory analysis of mobile development issues using stack overflow (MLV, BD, DP), pp. 93–96.
MSR-2013-WangKZ #correlation #debugging #locality- Improving bug localization using correlations in crash reports (SW, FK, YZ), pp. 247–256.
SCAM-2013-NicolayNRM #javascript #type inference- Determining dynamic coupling in JavaScript using object type inference (JN, CN, CDR, WDM), pp. 126–135.
SCAM-2013-PapadakisDT #analysis #fault #mutation testing #named- Proteum/FL: A tool for localizing faults using mutation analysis (MP, MED, YLT), pp. 94–99.
WCRE-2013-KomondoorBDK #domain model #modelling- Using relationships for matching textual domain models with existing code (RK, IB, DD, SK), pp. 371–380.
WCRE-2013-SalesTMV #dependence #recommendation #refactoring #set- Recommending Move Method refactorings using dependency sets (VS, RT, LFM, MTV), pp. 232–241.
CIAA-2013-BelliB #testing- Using Regular Grammars for Event-Based Testing (FB, MB), pp. 48–59.
ICALP-v2-2013-BachrachP #big data #performance #pseudo #recommendation #sketching- Sketching for Big Data Recommender Systems Using Fast Pseudo-random Fingerprints (YB, EP), pp. 459–471.
IFM-2013-MorgensternGS #game studies #incremental #induction- Solving Games Using Incremental Induction (AM, MG, KS), pp. 177–191.
IFM-2013-SavaryFL #bytecode #detection #modelling #testing #verification- Detecting Vulnerabilities in Java-Card Bytecode Verifiers Using Model-Based Testing (AS, MF, JLL), pp. 223–237.
IFM-2013-VekrisLDM #specification #verification- Verification of EB3 Specifications Using CADP (DV, FL, CD, RM), pp. 61–76.
RTA-2013-BaeEM #infinity #logic #model checking- Abstract Logical Model Checking of Infinite-State Systems Using Narrowing (KB, SE, JM), pp. 81–96.
SEFM-2013-KeshishzadehMM #automation #debugging #detection #domain-specific language #fault #smt- Early Fault Detection in DSLs Using SMT Solving and Automated Debugging (SK, AJM, MRM), pp. 182–196.
SEFM-2013-SalehKBW #detection #fault #implementation #specification #static analysis- Static Detection of Implementation Errors Using Formal Code Specification (IS, GK, MBB, YW), pp. 197–211.
SEFM-2013-SuryadevaraSMP #behaviour #verification- Verifying MARTE/CCSL Mode Behaviors Using UPPAAL (JS, CCS, FM, PP), pp. 1–15.
TLCA-2013-SalvatiW #modelling #recursion- Using Models to Model-Check Recursive Schemes (SS, IW), pp. 189–204.
Haskell-2013-ClaessenP #encryption #generative #pseudo- Splittable pseudorandom number generators using cryptographic hashing (KC, MHP), pp. 47–58.
ICFP-2013-AxelssonC #functional #higher-order #source code #syntax- Using circular programs for higher-order syntax: functional pearl (EA, KC), pp. 257–262.
ICFP-2013-Dolan #algebra #functional #linear- Fun with semirings: a functional pearl on the abuse of linear algebra (SD), pp. 101–110.
AIIDE-2013-ComanM #automation #generative #nondeterminism- Automated Generation of Diverse NPC-Controlling FSMs Using Nondeterministic Planning Techniques (AC, HMA).
AIIDE-2013-DragertKV #composition #game studies #reuse- Scythe AI: A Tool for Modular Reuse of Game AI (CD, JK, CV).
AIIDE-2013-SchenkLCGDMDZSCS #framework #independence #platform- ScriptEase II: Platform Independent Story Creation Using High-Level Patterns (KS, AL, MC, EG0, JD, RM, ND, RZ, DS, MC, JS).
CIG-2013-AdrianL #approach #design #generative- An approach to level design using procedural content generation and difficulty curves (DFHA, ALSGC), pp. 1–8.
CIG-2013-AlayedFN #behaviour #detection #machine learning #online- Behavioral-based cheating detection in online first person shooters using machine learning techniques (HA, FF, CN), pp. 1–8.
CIG-2013-AlhejaliL #heuristic #monte carlo #programming #search-based- Using genetic programming to evolve heuristics for a Monte Carlo Tree Search Ms Pac-Man agent (AMA, SML), pp. 1–8.
CIG-2013-BallingerL #injection #robust- Finding robust strategies to defeat specific opponents using case-injected coevolution (CAB, SJL), pp. 1–8.
CIG-2013-EfthymiadisK - Using plan-based reward shaping to learn strategies in StarCraft: Broodwar (KE, DK), pp. 1–8.
CIG-2013-Harrell #case study #modelling #network #social- Modeling player preferences in avatar customization using social network data: A case-study using virtual items in Team Fortress 2 (CUL, DFH), pp. 1–8.
CIG-2013-LiuLN #behaviour #effectiveness #game studies- Using CIGAR for finding effective group behaviors in RTS game (SL0, SJL, MNN), pp. 1–8.
CIG-2013-MaycockT #navigation- Enhancing touch-driven navigation using informed search in Ms. Pac-Man (SM, TT), pp. 1–2.
CIG-2013-Polceanu #behaviour #named- MirrorBot: Using human-inspired mirroring behavior to pass a turing test (MP), pp. 1–8.
DiGRA-2013-SiG #interactive #social- Embodied Interactive Characters using Social Robots (MS, MGB).
DiGRA-2013-WarpefeltJV #behaviour #game studies #matrix- Analyzing the believability of game character behavior using the Game Agent Matrix (HW, MJ, HV).
FDG-2013-PapahristouR #game studies #named- AnyGammon: Playing backgammon variants using any board size (NP, IR), pp. 410–412.
FDG-2013-RyanSVC #education #game studies #network #security- Network Nightmares: Using games to teach networks and security (WR, JS, DV, JC), pp. 413–416.
VS-Games-2013-ParaskevopoulosT #artificial reality #framework #game studies- Use of Gaming Sensors and Customised Exergames for Parkinson's Disease Rehabilitation: A Proposed Virtual Reality Framework (IP, ET), pp. 1–5.
VS-Games-2013-Pignot #design #game studies #logic- Is Serious Games Design Political? The Competing Logics When Using a Game Engine (EP), pp. 1–2.
GT-VMT-2013-RungeKH #contract #generative #testing #visual notation- Test Case Generation Using Visual Contracts (OR, TAK, RH).
CHI-2013-BanNFSITH #artificial reality- Augmented endurance: controlling fatigue while handling objects by affecting weight perception using augmented reality (YB, TN, TF, SS, JI, TT, MH), pp. 69–78.
CHI-2013-BirnbaumBFDK #behaviour #identification- Using behavioral data to identify interviewer fabrication in surveys (BEB, GB, ADF, BD, ARK), pp. 2911–2920.
CHI-2013-BranzelHHSKLM0B13a #named #smarttech- GravitySpace: tracking users and their poses in a smart room using a pressure-sensing floor (AB, CH, DH, DS, MK, PL, RM, SR, PB), pp. 725–734.
CHI-2013-CassidyAR #game studies #mobile- Using an open card sort with children to categorize games in a mobile phone application store (BC, DSA, JCR), pp. 2287–2290.
CHI-2013-ChenGS #multi #student- Graduate student use of a multi-slate reading system (NC, FG, AS), pp. 1799–1808.
CHI-2013-CoughlanPM #collaboration #education #reuse- Building open bridges: collaborative remixing and reuse of open educational resources across organisations (TC, RP, PM), pp. 991–1000.
CHI-2013-DoornSG #design #experience #research #user interface- Design research by proxy: using children as researchers to gain contextual knowledge about user experience (FvD, PJS, MG), pp. 2883–2892.
CHI-2013-DowGW #case study- A pilot study of using crowds in the classroom (SD, EG, AW), pp. 227–236.
CHI-2013-GoelJMPW #mobile #named- ContextType: using hand posture information to improve mobile touch screen text entry (MG, AJ, TM, SNP, JOW), pp. 2795–2798.
CHI-2013-GuHHKL #named- LongPad: a touchpad using the entire area below the keyboard of a laptop computer (JG, SH, JH, SK, GL), pp. 1421–1430.
CHI-2013-HeklerKFB #behaviour #human-computer #research- Mind the theoretical gap: interpreting, using, and developing behavioral theory in HCI research (EBH, PVK, JF, MPB), pp. 3307–3316.
CHI-2013-HongYKAA #independence #network #social- Investigating the use of circles in social networks to support independence of individuals with autism (HH, SY, JGK, GDA, RIA), pp. 3207–3216.
CHI-2013-HuFM #community #social #social media- Whoo.ly: facilitating information seeking for hyperlocal communities using social media (YH, SDF, AMH), pp. 3481–3490.
CHI-2013-LomasPFK #challenge #design #education #game studies #optimisation #scalability- Optimizing challenge in an educational game using large-scale design experiments (DL, KP, JF, KRK), pp. 89–98.
CHI-2013-LucaZPH - Using fake cursors to secure on-screen password entry (ADL, EvZ, LP, HH), pp. 2399–2402.
CHI-2013-MankoffRF #research- Looking past yesterday’s tomorrow: using futures studies methods to extend the research horizon (JM, JAR, HF), pp. 1629–1638.
CHI-2013-MassungCCJP #community #crowdsourcing- Using crowdsourcing to support pro-environmental community activism (EM, DC, KFC, MJ, CP), pp. 371–380.
CHI-2013-MollersDLB #scalability- Improving touch accuracy on large tabletops using predecessor and successor (MM, ND, SL, JOB), pp. 755–758.
CHI-2013-NancelCPYIB #scalability- High-precision pointing on large wall displays using small handheld devices (MN, OC, EP, XDY, PPI, MBL), pp. 831–840.
CHI-2013-OneyHOW #named- ZoomBoard: a diminutive qwerty soft keyboard using iterative zooming for ultra-small devices (SO, CH, AO, JW), pp. 2799–2802.
CHI-2013-Ortega #3d #automation- 3D object position using automatic viewpoint transitions (MO), pp. 193–196.
CHI-2013-ParkBN - The roles of touch during phone conversations: long-distance couples’ use of POKE in their homes (YP, KMB, TJN), pp. 1679–1688.
CHI-2013-PeckYOJC #interface #visualisation- Using fNIRS brain sensing to evaluate information visualization interfaces (EMP, BFY, AO, RJKJ, RC), pp. 473–482.
CHI-2013-PriorWBK #agile #development- Use of an agile bridge in the development of assistive technology (SP, AW, RB, TK), pp. 1579–1588.
CHI-2013-RoudautRSPLB #feedback #gesture- Gesture output: eyes-free output using a force feedback touch surface (AR, AR, CS, MP, PL, PB), pp. 2547–2556.
CHI-2013-ShiXC #bound #network #social- Using contextual integrity to examine interpersonal information boundary on social network sites (PS, HX, YC), pp. 35–38.
CHI-2013-SpauldingF #design #prototype- Design-driven narrative: using stories to prototype and build immersive design worlds (ES, HF), pp. 2843–2852.
CHI-2013-SutcliffeIFPSG - Improving digital handoff using the space above the table (SWTS, ZI, DRF, AP, IS, CG), pp. 735–744.
CHI-2013-TausczikP #feedback #realtime- Improving teamwork using real-time language feedback (YRT, JWP), pp. 459–468.
CHI-2013-WisemanCBGO #detection #fault- Using redundancy to detect human error (SW, ALC, DPB, SG, SO), pp. 2403–2406.
CSCW-2013-Barlow #chat- Emergent roles in decision-making tasks using group chat (JBB), pp. 1505–1514.
CSCW-2013-BatemanGM #navigation #social- Social navigation for loosely-coupled information seeking in tightly-knit groups using webwear (SB, CG, GIM), pp. 955–966.
CSCW-2013-BurkeK #difference #facebook- Using facebook after losing a job: differential benefits of strong and weak ties (MB, RK), pp. 1419–1430.
CSCW-2013-ChoiHHLS #communication #mining #social- Mining social relationship types in an organization using communication patterns (JC, SH, JH, GL, JS), pp. 295–302.
CSCW-2013-GeigerH #wiki- Using edit sessions to measure participation in wikipedia (RSG, AH), pp. 861–870.
CSCW-2013-HuangF #consistency #evaluation #reliability- Enhancing reliability using peer consistency evaluation in human computation (SWH, WTF), pp. 639–648.
CSCW-2013-JungLDAHB - Engaging robots: easing complex human-robot teamwork using backchanneling (MFJ, JJL, ND, SOA, PJH, CB), pp. 1555–1566.
CSCW-2013-RobsonHKP #network #social- Comparing the use of social networking and traditional media channels for promoting citizen science (CR, MAH, CK, JSP), pp. 1463–1468.
CSCW-2013-SmithQC #analysis #identification- Finger on the pulse: identifying deprivation using transit flow analysis (CSC, DQ, LC), pp. 683–692.
CSCW-2013-ThayerSL - Recalibrating the ratio: enacting accountability in intimate relationships using shared calendars (AT, BS, CPL), pp. 203–214.
CSCW-2013-YaroshTMA #communication #quote- “Almost touching”: parent-child remote communication using the sharetable system (SY, AT, SM, GDA), pp. 181–192.
DHM-HB-2013-CaoJHK #assessment #modelling- Ergonomic Assessment of Patient Barrow Lifting Technique Using Digital Human Modeling (WC, MJ, YH, MTK), pp. 20–29.
DHM-HB-2013-HuhK #estimation #image- Human Pose Estimation from Depth Image Using Visibility Estimation and Key Points (SH, GK), pp. 333–342.
DHM-HB-2013-KeyvaniLBO #database #metric- Using Methods-Time Measurement to Connect Digital Humans and Motion Databases (AK, DL, GB, RÖ), pp. 343–352.
DHM-HB-2013-KuzMMS #human-computer #industrial #interactive #morphism- Using Anthropomorphism to Improve the Human-Machine Interaction in Industrial Environments (Part I) (SK, MPM, SM, CMS), pp. 76–85.
DHM-HB-2013-MayerKS #human-computer #industrial #interactive #morphism- Using Anthropomorphism to Improve the Human-Machine Interaction in Industrial Environments (Part II) (MPM, SK, CMS), pp. 93–100.
DHM-HB-2013-NakamuraKOOHNAKMK #artificial reality #learning #self #student #towards- The Relationship between Nursing Students’ Attitudes towards Learning and Effects of Self-learning System Using Kinect (MN, YK, JO, TO, ZH, AN, KA, NK, JM, MKP), pp. 111–116.
DHM-SET-2013-BaptistaSVQCD #interactive- Using Digital Interactive Television to Promote Healthcare and Wellness Inclusive Services (AB, ÁDS, IV, CQ, MC, MJD), pp. 150–156.
DHM-SET-2013-BrooksB #game studies #video- Facilitators’ Intervention Variance and Outcome Influence When Using Video Games with Fibromyalgia Patients (ALB, EPB), pp. 163–172.
DHM-SET-2013-KosugeIM #case study #multi- A Study for Conducting Waves by Using the Multi-channel Surface EMG (TK, NI, KM), pp. 223–231.
DHM-SET-2013-MurataKEH #behaviour #metric #predict- Prediction of Drowsy Driving Using Behavioral Measures of Drivers — Change of Neck Bending Angle and Sitting Pressure Distribution (AM, TK, TE, TH), pp. 78–87.
DHM-SET-2013-MurataKMH - Proposal of Automotive 8-directional Warning System That Makes Use of Tactile Apparent Movement (AM, SK, MM, TH), pp. 98–107.
DHM-SET-2013-PuchWFP #evaluation #interactive #simulation- Evaluation of Drivers Interaction with Assistant Systems Using Criticality Driven Guided Simulation (SP, BW, MF, TP), pp. 108–117.
DHM-SET-2013-YangYF #safety- Predicating the Safety of Airport Approaches Using a Cognitive Pilot Model (CY, TY, SF), pp. 126–133.
DUXU-CXC-2013-BamasakBAAAA #artificial reality #social- Improving Autistic Children’s Social Skills Using Virtual Reality (OB, RB, HAT, SAH, GAS, MAH), pp. 342–351.
DUXU-CXC-2013-LawrenceMPFSB #interactive #visualisation- Investigation of Interaction Modalities Designed for Immersive Visualizations Using Commodity Devices in the Classroom (KL, AM, NP, TF, JS, AUB), pp. 209–218.
DUXU-CXC-2013-PlogmannJJR #development #evaluation #knowledge-based #risk management- Development and Evaluation of a Knowledge-Based Method for the Treatment of Use-Oriented and Technical Risks Using the Example of Medical Devices (SP, AJ, AJT, KR), pp. 452–461.
DUXU-CXC-2013-Said #network #social- Young Egyptians Use of Social Networks and the January 2011 Revolution (GRES), pp. 38–43.
DUXU-NTE-2013-AyanogluRDNT #artificial reality #design- Using Virtual Reality to Examine Hazard Perception in Package Design (HA, FR, ED, PN, LT), pp. 30–39.
DUXU-NTE-2013-DinisDNTVR #artificial reality #case study #design- Evaluating Emotional Responses to the Interior Design of a Hospital Room: A Study Using Virtual Reality (SD, ED, PN, LT, EV, FR), pp. 475–483.
DUXU-NTE-2013-FeijsKSL #design- Design for Relaxation during Milk Expression Using Biofeedback (LMGF, JK, NHvS, MvL), pp. 494–503.
DUXU-NTE-2013-KakaraNM #behaviour #database #design #geometry #interactive- Interaction Design Using a Child Behavior-Geometry Database (HK, YN, HM), pp. 95–104.
DUXU-NTE-2013-KulkarniW #energy- Classifying Energy-Related Events Using Electromagnetic Field Signatures (ASK, KCW), pp. 105–111.
DUXU-NTE-2013-Lam #interactive- Creating Instantly Disappearing Prints Using Thermochromic Paint and Thermal Printer in an Interactive Art Installation (MLL), pp. 290–295.
DUXU-NTE-2013-ReisDR #usability- Main Usability Issues in Using Virtual Environments for Older Population Warning Studies (LR, ED, FR), pp. 189–198.
DUXU-NTE-2013-Shieh #design #segmentation- Designing a Product Satisfaction Model Using Customer Segmentation and Information Consolidation (MDS), pp. 568–577.
DUXU-PMT-2013-BuchdidPB #design- Designing iDTV Applications from Participatory Use of Patterns (SBB, RP, MCCB), pp. 459–468.
DUXU-PMT-2013-ChynalSS #data analysis #evaluation #eye tracking #usability- Remote Usability Evaluation Using Eye Tracking Enhanced with Intelligent Data Analysis (PC, JS, JMS), pp. 212–221.
DUXU-PMT-2013-JiangL #adaptation #effectiveness #matrix- Understand System’s Relative Effectiveness Using Adapted Confusion Matrix (NJ, HL), pp. 294–302.
DUXU-PMT-2013-KitamuraKNSYM #community- Community Participation Support Using an ICF-Based Community Map (SK, KK, YN, KIS, JY, HM), pp. 516–524.
DUXU-PMT-2013-PrisacariH #design- Using Eye-Tracking to Test and Improve Website Design (AP, TH), pp. 389–398.
DUXU-WM-2013-GencerBZV #framework #machine learning #mobile- A New Framework for Increasing User Engagement in Mobile Applications Using Machine Learning Techniques (MG, GB, ÖZ, TV), pp. 651–659.
DUXU-WM-2013-Iitaka - ARS Module of Contents Management System Using Cell Phones (TI), pp. 682–690.
DUXU-WM-2013-KondoK #development #evaluation #image #interactive #prototype #visual notation- Trial of Diagnostic to Find Preferable Job Using the Visual Image Information Interaction: Prototype Development and Evaluation in Global Human Resources Matching Site (AK, NK), pp. 525–532.
DUXU-WM-2013-MinJ #functional #named- TRIGGER: Maximizing Functional Effect of Using Products (KBM, ECJ), pp. 385–391.
HCI-AMTE-2013-AkiyoshiT #estimation #eye tracking #framework #interface #learning- An Estimation Framework of a User Learning Curve on Web-Based Interface Using Eye Tracking Equipment (MA, HT), pp. 159–165.
HCI-AMTE-2013-Bevan #documentation #industrial- Using the Common Industry Format to Document the Context of Use (NB), pp. 281–289.
HCI-AMTE-2013-GuWYL #design #interactive- A Color Schemer for Webpage Design Using Interactive Mood Board (ZG, ZW, JY, JL), pp. 555–564.
HCI-AMTE-2013-HirataY #design pattern #logic #user interface- A Logical Design Method for User Interface Using GUI Design Patterns (IH, TY), pp. 361–370.
HCI-AMTE-2013-HumayounEE #case study #framework #mobile #platform- Developing Mobile Apps Using Cross-Platform Frameworks: A Case Study (SRH, SE, AE), pp. 371–380.
HCI-AS-2013-BergmansS #behaviour #mobile #persuasion- Reducing Speeding Behavior in Young Drivers Using a Persuasive Mobile Application (AB, SS), pp. 541–550.
HCI-AS-2013-CharoenpitO #biology- A New E-learning System Focusing on Emotional Aspect Using Biological Signals (SC, MO), pp. 343–350.
HCI-AS-2013-DePaloPS #documentation #summary- Healthcare Interoperability: CDA Documents Consolidation Using Transport Record Summary (TRS) Construction (PD, KEP, YTS), pp. 56–65.
HCI-AS-2013-HarunBON #learning- Refining Rules Learning Using Evolutionary PD (AFH, SB, CO, NLMN), pp. 376–385.
HCI-AS-2013-HuseyinovT #algebra #evaluation #fuzzy- Evaluation of Computer Algebra Systems Using Fuzzy AHP at the Universities of Cyprus (IH, FST), pp. 391–397.
HCI-AS-2013-KrauseB #information management #process- Subjective Ratings in an Ergonomic Engineering Process Using the Example of an In-Vehicle Information System (MK, KB), pp. 596–605.
HCI-AS-2013-KroesS #mobile #persuasion- Empowering Young Adolescents to Choose the Healthy Lifestyle: A Persuasive Intervention Using Mobile Phones (LK, SS), pp. 117–126.
HCI-AS-2013-LimaRSBSO #learning- Innovation in Learning — The Use of Avatar for Sign Language (TL, MSR, TAS, AB, ES, HSdO), pp. 428–433.
HCI-AS-2013-MatsumotoAK #development #email #learning #word- Development of Push-Based English Words Learning System by Using E-Mail Service (SM, MA, TK), pp. 444–453.
HCI-AS-2013-Rauch #enterprise #gamification- Best Practices for Using Enterprise Gamification to Engage Employees and Customers (MR), pp. 276–283.
HCI-AS-2013-TakahashiISUSHO #biology #eye tracking- Proposal for Driver Distraction Indexes Using Biological Signals Including Eye Tracking (NT, SI, HS, SU, YS, KH, MO), pp. 647–653.
HCI-AS-2013-TsumoriN #design #evaluation- Design and Evaluation of Training System for Numerical Calculation Using Questions in SPI2 (ST, KN), pp. 511–520.
HCI-AS-2013-YajimaG - The Proposal of the Remote Consultation Service System Using the Outline Function for Consultation (HY, TG), pp. 216–225.
HCI-III-2013-AnKK #development #interface #usability- Development of a Virtual Keyboard System Using a Bio-signal Interface and Preliminary Usability Test (KOA, DHK, JK), pp. 3–9.
HCI-III-2013-HeLWG #image #segmentation- Semi-supervised Remote Sensing Image Segmentation Using Dynamic Region Merging (NH, KL, YW, YG), pp. 153–162.
HCI-III-2013-IteyaMK #analysis #visual notation- Responses Analysis of Visual and Linguistic Information on Digital Signage Using fNIRS (SI, AM, TK), pp. 411–420.
HCI-III-2013-MiwaWS #feedback #recognition #reliability #robust- Robust Face Recognition System Using a Reliability Feedback (SM, SW, MS), pp. 178–185.
HCI-III-2013-SakamotoSYO #3d #metric- Evaluating Emotional State during 3DTV Viewing Using Psychophysiological Measurements (KS, SS, KY, AO), pp. 353–361.
HCI-III-2013-ShinKS #image #probability #retrieval- Affect-Based Retrieval of Landscape Images Using Probabilistic Affective Model (YS, EYK, TES), pp. 362–371.
HCI-III-2013-TsurudaHYI #generative #mobile- Generation of Facial Expression Emphasized with Cartoon Techniques Using a Cellular-Phone-Type Teleoperated Robot with a Mobile Projector (YT, MH, HY, YI), pp. 391–400.
HCI-III-2013-Yang-MaoLLZW #evaluation #image- Evaluation of Mono/Binocular Depth Perception Using Virtual Image Display (SFYM, YTL, MHL, WJZ, YlW), pp. 483–490.
HCI-III-2013-YangZZJXW #detection #multi #realtime- Depth Camera Based Real-Time Fingertip Detection Using Multi-view Projection (WY, ZZ, XZ, LJ, CX, PW), pp. 254–261.
HCI-III-2013-ZhanZSY #image #multi #re-engineering #visual notation- Visual Image Reconstruction from fMRI Activation Using Multi-scale Support Vector Machine Decoders (YZ, JZ, SS, LY), pp. 491–497.
HCI-IMT-2013-EbisawaF #detection #video- Head-Free, Remote Gaze Detection System Based on Pupil-Corneal Reflection Method with Using Two Video Cameras — One-Point and Nonlinear Calibrations (YE, KF), pp. 205–214.
HCI-IMT-2013-HammerB #realtime #robust- Robust Hand Tracking in Realtime Using a Single Head-Mounted RGB Camera (JHH, JB), pp. 252–261.
HCI-IMT-2013-LeeBN #visual notation- Use of Reference Frame in Haptic Virtual Environments: Implications for Users with Visual Impairments (JYL, SB, CSN), pp. 610–617.
HCI-IMT-2013-LeeT #gesture #interactive- Finger Controller: Natural User Interaction Using Finger Gestures (UL, JT), pp. 281–290.
HCI-IMT-2013-MurataHMH #case study #interface- Study on Character Input Methods Using Eye-gaze Input Interface (AM, KH, MM, TH), pp. 320–329.
HCI-IMT-2013-PinoTIK #2d #3d #artificial reality #evaluation #performance- Using Kinect for 2D and 3D Pointing Tasks: Performance Evaluation (AP, ET, NI, GK), pp. 358–367.
HCI-IMT-2013-SakairiTKG #editing #multi #visual notation- Multi-layer Control and Graphical Feature Editing Using Server-Side Rendering on Ajax-GIS (TS, TT, KK, YG), pp. 722–729.
HCI-IMT-2013-SakamotoTT #music- A Method for Discussing Musical Expression between Music Ensemble Players Using a Web-Based System (TS, ST, JT), pp. 730–739.
HCI-IMT-2013-ShimizuNS #algorithm #generative #search-based- System of Generating Japanese Sound Symbolic Expressions Using Genetic Algorithm (YS, TN, MS), pp. 126–134.
HCI-IMT-2013-SrivastavaT #analysis #realtime- Real Time Mono-vision Based Customizable Virtual Keyboard Using Finger Tip Speed Analysis (SS, RCT), pp. 497–505.
HCI-IMT-2013-TungGKM #human-computer #interactive #multimodal- Multi-party Human-Machine Interaction Using a Smart Multimodal Digital Signage (TT, RG, TK, TM), pp. 408–415.
HCI-IMT-2013-WangGHL #collaboration #communication #elicitation #nondeterminism #speech- A Knowledge Elicitation Study for Collaborative Dialogue Strategies Used to Handle Uncertainties in Speech Communication While Using GIS (HW, AG, DH, RL), pp. 135–144.
HCI-IMT-2013-YoshikawaMKST - A Remote Pointing Technique Using Pull-out (TY, YM, TK, BS, JT), pp. 416–426.
HCI-UC-2013-ItouTM #communication #development #interface- Development of Communication Support System at Mealtimes Using Tabletop Interface (JI, ST, JM), pp. 174–182.
HCI-UC-2013-KuramochiOTHN #analysis #community #graph #network #semantics #twitter- Applying to Twitter Networks of a Community Extraction Method Using Intersection Graph and Semantic Analysis (TK, NO, KT, YH, SN), pp. 314–323.
HCI-UC-2013-LinHW #learning #visual notation- Establishing a Cognitive Map of Public Place for Blind and Visual Impaired by Using IVEO Hands-On Learning System (QWL, SLH, JLW), pp. 193–198.
HCI-UC-2013-OkiTS #named- AugmentedBacklight: Expansion of LCD Backlights Using Lighting Methods in the Real World (MO, KT, IS), pp. 209–216.
HCI-UC-2013-TsaiHCL #communication #named #network #online #product line #social- Memotree: Using Online Social Networking to Strengthen Family Communication (THT, YLH, HTC, YWL), pp. 359–367.
HIMI-D-2013-AsaoSK #estimation- Estimation of Driver’s Steering Intention by Using Mechanical Impedance (TA, SS, KK), pp. 3–11.
HIMI-D-2013-EnokidaKSAII #information management #metric- Assessing Mental Workload of In-Vehicle Information Systems by Using Physiological Metrics (SE, KK, SS, TA, TI, KI), pp. 584–593.
HIMI-D-2013-IizukaNG #case study #interactive #scalability- A Study for Personal Use of the Interactive Large Public Display (SI, WN, KG), pp. 55–61.
HIMI-D-2013-KotaniKSA #analysis #development #memory management- Analysis of Spatiotemporal Memory Using Air-Jets as Tactile Stimuli for Development of Noncontact Tactile Displays (KK, NK, SS, TA), pp. 620–627.
HIMI-D-2013-ManiwaKSA - Changes in Posture of the Upper Extremity Through the Use of Various Sizes of Tablets and Characters (HM, KK, SS, TA), pp. 89–96.
HIMI-D-2013-MorodomeSAK #biology #metric- Non-contact Measurement of Biological Signals Using Microwave Radar (HM, SS, TA, KK), pp. 117–125.
HIMI-D-2013-NakanoOM #3d #artificial reality- Leaning Origami Using 3D Mixed Reality Technique (AN, MO, HM), pp. 126–132.
HIMI-D-2013-ShengLD #comprehension #eye tracking- Eyes Don’t Lie: Understanding Users’ First Impressions on Websites Using Eye Tracking (HS, NSL, SD), pp. 635–641.
HIMI-D-2013-SugayaSNT #recognition- Basic Investigation into Hand Shape Recognition Using Colored Gloves Taking Account of the Peripheral Environment (TS, TS, HN, HT), pp. 133–142.
HIMI-D-2013-UedaA #people #predict- Prediction of the Concern of People Using CGM (YU, YA), pp. 284–292.
HIMI-D-2013-YanagimotoSY #classification #estimation #network #sentiment #word- Word Classification for Sentiment Polarity Estimation Using Neural Network (HY, MS, AY), pp. 669–677.
HIMI-HSM-2013-Campbell #safety #simulation- Safety Culture: An Examination of the Relationship between a Safety Management System and Pilot Judgment Using Simulation in Aeronautics (SAC), pp. 453–459.
HIMI-HSM-2013-ChunJHJSLCJ #natural language- Pathway Construction and Extension Using Natural Language Processing (HWC, SJJ, MNH, CHJ, SKS, SL, SPC, HJ), pp. 32–38.
HIMI-HSM-2013-DamrongratKI #multi #ontology #representation #simulation- Increasing Situational Awareness of Indoor Emergency Simulation Using Multilayered Ontology-Based Floor Plan Representation (CD, HK, MI), pp. 39–45.
HIMI-HSM-2013-KimuraHTN #evaluation #performance- Determination of Alarm Setpoint for Alarm System Rationalization Using Performance Evaluation (NK, TH, KT, MN), pp. 507–514.
HIMI-HSM-2013-LeeJ #analysis #simulation- Task Analysis of Soft Control Operations Using Simulation Data in Nuclear Power Plants (SJL, WJ), pp. 524–529.
HIMI-HSM-2013-MiyataWI #development- Development of a Chest X-ray Examination Support System for Foreigners Using a Personal Digital Assistant (MM, CW, MI), pp. 285–290.
HIMI-HSM-2013-SaitohI #detection #learning #visualisation- Visualization of Anomaly Data Using Peculiarity Detection on Learning Vector Quantization (FS, SI), pp. 181–188.
HIMI-HSM-2013-SakuradaH #interface #physics- A New Presence Display System Using Physical Interface Running on IP-Phones (TS, YH), pp. 411–420.
HIMI-HSM-2013-SasakiHAI #simulation- Train Ride Simulation Using Assist Strap Device (TS, KH, TA, YI), pp. 189–197.
HIMI-HSM-2013-Wesugi #approach #design #experience #novel #simulation- Design Approach of Simulation Exercise with Use of Device and Its Significance — Design of Novel Device for Realistic Experience of Being a Hemiplegia Patient (SW), pp. 315–324.
HIMI-LCCB-2013-AntolosLLV #analysis- Burglary Crime Analysis Using Logistic Regression (DA, DL, AL, DAV), pp. 549–558.
HIMI-LCCB-2013-BrynielssonJL #communication #design #process #prototype #social #social media #video- Using Video Prototyping as a Means to Involve Crisis Communication Personnel in the Design Process: Innovating Crisis Management by Creating a Social Media Awareness Tool (JB, FJ, SL), pp. 559–568.
HIMI-LCCB-2013-ItaiEM #design- Design of Space for Expression Media with the Use of Fog (SI, YE, YM), pp. 210–218.
HIMI-LCCB-2013-KometaniTFA #education #feedback #student #video- Video Feedback System for Teaching Improvement Using Students’ Sequential and Overall Teaching Evaluations (YK, TT, TF, TA), pp. 79–88.
HIMI-LCCB-2013-NahTRV #education #game studies #gamification- Gamification of Education Using Computer Games (FFHN, VRT, SR, PRV), pp. 99–107.
HIMI-LCCB-2013-NakaI #3d #communication #gesture #web- Consideration of the Effect of Gesture Exaggeration in Web3D Communication Using 3DAgent (TN, TI), pp. 511–520.
HIMI-LCCB-2013-TakahashiA #mining- User Needs Search Using Text Mining (YT, YA), pp. 607–615.
HIMI-LCCB-2013-YoshidaOSNSH #assessment #comprehension #concept- Instantaneous Assessment of Learners’ Comprehension for Lecture by Using Kit-Build Concept Map System (KY, TO, KS, YN, MS, TH), pp. 175–181.
OCSC-2013-BourimiK #case study #collaboration #community #experience #online- Experiences by Using AFFINE for Building Collaborative Applications for Online Communities (MB, DK), pp. 345–354.
OCSC-2013-FardounZC #collaboration #education #facebook #process- Using Facebook for Collaborative Academic Activities in Education (HMF, BZ, APC), pp. 137–146.
OCSC-2013-KashimaMM #content management- Effects of Sharing Farmers’ Information Using Content Management System (TK, SM, TM), pp. 296–303.
OCSC-2013-WangA #network #social- Adult Learners and Their Use of Social Networking Sites (Y(W, JA), pp. 222–229.
OCSC-2013-YuanOXS #classification #overview #sentiment #web- Sentiment Classification of Web Review Using Association Rules (MY, YO, ZX, HS), pp. 442–450.
VISSOFT-2013-GouveiaCA #fault #html #locality #visualisation- Using HTML5 visualizations in software fault localization (CG, JC, RA), pp. 1–10.
VISSOFT-2013-Wehrwein #lightweight #matrix #reverse engineering #visualisation- Lightweight software reverse engineering using augmented matrix visualizations (BW), pp. 1–4.
CAiSE-2013-FahlandG #design #enterprise #integration #middleware #petri net- Analyzing and Completing Middleware Designs for Enterprise Integration Using Coloured Petri Nets (DF, CG), pp. 400–416.
EDOC-2013-GallegeGHR #contract #monitoring #trust- Trustworthy Service Selection Using Long-Term Monitoring of Trust Contracts (LSG, DG, JHH, RRR), pp. 195–200.
EDOC-2013-PlataniotisKP #architecture #design #enterprise #graph- Relating Decisions in Enterprise Architecture Using Decision Design Graphs (GP, SdK, HAP), pp. 139–146.
EDOC-2013-SelwayGMS #approach #formal method #natural language #specification- Formalising Natural Language Specifications Using a Cognitive Linguistics/Configuration Based Approach (MS, GG, WM, MS), pp. 59–68.
EDOC-2013-SousaMGM #approach #architecture #data type #enterprise #risk management- Assessing Risks and Opportunities in Enterprise Architecture Using an Extended ADT Approach (SS, DM, KG, NM), pp. 81–90.
ICEIS-J-2013-KalsingITN13a #incremental #legacy #mining #modelling #process- Re-learning of Business Process Models from Legacy System Using Incremental Process Mining (ACK, CI, LHT, GSdN), pp. 314–330.
ICEIS-v1-2013-DombiD #modelling- Modelling Complex Systems using the Pliant Cognitive Map (JDD, JD), pp. 506–512.
ICEIS-v1-2013-IsmailHQDE #clustering #evaluation #query #simulation- Clustering using Hypergraph for P2P Query Routing — Simulation and Evaluation (AI, MH, MQ, ND, MES), pp. 247–254.
ICEIS-v1-2013-MaghrabyFRA #grid #image #retrieval- A Grid based Medical Image Retrieval System using Alchemi (FM, HMF, MR, MA), pp. 224–230.
ICEIS-v1-2013-MoritaN #classification- Classification Model using Contrast Patterns (HM, MN), pp. 334–339.
ICEIS-v1-2013-QasimR #analysis #classification #evaluation #linear- Classification of Hepatitis Patients and Fibrosis Evaluation using Decision Trees and Linear Discriminant Analysis (RQ, RMR), pp. 239–246.
ICEIS-v1-2013-SimrinAD #heuristic #problem- A Lagrangian Relaxation based Heuristic for the Static Berth Allocation Problem using the Cutting Plane Method (ASS, NNA, AHD), pp. 565–569.
ICEIS-v2-2013-KalsingITN #incremental #learning #legacy #mining #modelling #process- Evolutionary Learning of Business Process Models from Legacy Systems using Incremental Process Mining (ACK, CI, LHT, GSdN), pp. 58–69.
ICEIS-v2-2013-LiL #agile #network #object-oriented #predict #process- Predicting Fault-proneness of Object-Oriented System Developed with Agile Process using Learned Bayesian Network (LL, HL), pp. 5–16.
ICEIS-v2-2013-Milosz #case study #enterprise #legacy #performance #testing- Performance Testing of New Enterprise Applications using Legacy Load Data — A HIS Case Study (MM), pp. 151–156.
ICEIS-v2-2013-OliveiraS #aspect-oriented #modelling #requirements- Modeling Aspects in Requirements using SysML Extensions (KSdO, MdSS), pp. 126–133.
ICEIS-v2-2013-PradoB #evolution- Perspectives on using Actor-Network Theory and Organizational Semiotics to Address Organizational Evolution (ABP, MCCB), pp. 173–181.
ICEIS-v2-2013-SantaN #framework #learning #modelling- Modeling the Creation of a Learning Organization by using the Learning Organization Atlas Framework (MS, SN), pp. 278–285.
ICEIS-v2-2013-TomasSGGA #api #approach #architecture #framework- Synaptic City — An Architectural Approach using an OSGI Infrastructure and GMaps API to Build a City Simulator (GHRPT, WMdS, KG, VCG, AÁ), pp. 427–434.
ICEIS-v2-2013-TounsiHKKD #design pattern #modelling #specification- Using SoaML Models and Event-B Specifications for Modeling SOA Design Patterns (IT, ZH, MHK, AHK, KD), pp. 294–301.
ICEIS-v3-2013-ChinoRAOGTT #collaboration #framework #gesture #information management #interactive- The NInA Framework — Using Gesture to Improve Interaction and Collaboration in Geographical Information Systems (DYTC, LASR, LPSA, WDO, RRdVG, CTJ, AJMT), pp. 58–66.
ICEIS-v3-2013-DiefenthalerB #analysis #architecture #enterprise #semantics #web- Gap Analysis in Enterprise Architecture using Semantic Web Technologies (PD, BB), pp. 211–220.
ICEIS-v3-2013-LangermeierBB #approach #architecture #distributed #enterprise #framework #modelling- A Model Driven Approach for Open Distributed Systems using an Enterprise Architecture Framework (ML, AJB, BB), pp. 284–291.
ICEIS-v3-2013-Plechawska-WojcikLW #assessment #case study #experience #user interface #web- Assessment of User Experience with Responsive Web Applications using Expert Method and Cognitive Walkthrough — A Case Study (MPW, SLM, LW), pp. 111–118.
CIKM-2013-AyadiTDJH #correlation #image #modelling #query #retrieval- Correlating medical-dependent query features with image retrieval models using association rules (HA, MT, MD, MBJ, JXH), pp. 299–308.
CIKM-2013-ChanLKLBR #graph #matrix- Discovering latent blockmodels in sparse and noisy graphs using non-negative matrix factorisation (JC, WL, AK, CL, JB, KR), pp. 811–816.
CIKM-2013-ChenMLHCG #topic- Discovering coherent topics using general knowledge (ZC, AM, BL, MH, MC, RG), pp. 209–218.
CIKM-2013-ChuklinSHSR - Evaluating aggregated search using interleaving (AC, AS, KH, PS, MdR), pp. 669–678.
CIKM-2013-HermanssonKJJD #ambiguity #graph #kernel- Entity disambiguation in anonymized graphs using graph kernels (LH, TK, FJ, VJ, DPD), pp. 1037–1046.
CIKM-2013-KharitonovMSO - Using historical click data to increase interleaving sensitivity (EK, CM, PS, IO), pp. 679–688.
CIKM-2013-NguyenLT #code review #performance #set- Using micro-reviews to select an efficient set of reviews (TSN, HWL, PT), pp. 1067–1076.
CIKM-2013-ShirakawaNHN #metric #probability #semantics #similarity #wiki- Probabilistic semantic similarity measurements for noisy short texts using Wikipedia entities (MS, KN, TH, SN), pp. 903–908.
CIKM-2013-SordoniHN #information retrieval #interactive #modelling #quantum #topic- Modeling latent topic interactions using quantum interference for information retrieval (AS, JH, JYN), pp. 1197–1200.
CIKM-2013-VanderbauwhedeFACM #throughput- High throughput filtering using FPGA-acceleration (WV, AF, LA, SRC, MM), pp. 1245–1248.
CIKM-2013-WijayaTM #named #ontology #web- PIDGIN: ontology alignment using web text as interlingua (DTW, PPT, TMM), pp. 589–598.
ECIR-2013-AlhindiKF #case study #interactive #summary- A Pilot Study on Using Profile-Based Summarisation for Interactive Search Assistance (AA, UK, CF), pp. 672–675.
ECIR-2013-AnderssonMHR #retrieval- Exploring Patent Passage Retrieval Using Nouns Phrases (LA, PM, AH, AR), pp. 676–679.
ECIR-2013-ChenC #analysis #multi #network #topic- A Topic Person Multi-polarization Method Using Friendship Network Analysis (ZYC, CCC), pp. 688–692.
ECIR-2013-ChuklinSR #behaviour- Using Intent Information to Model User Behavior in Diversified Search (AC, PS, MdR), pp. 1–13.
ECIR-2013-Franco-SalvadorGR #detection #multi #network #semantics- Cross-Language Plagiarism Detection Using a Multilingual Semantic Network (MFS, PG, PR), pp. 710–713.
ECIR-2013-JeongM #classification #dependence #recognition- Using WordNet Hypernyms and Dependency Features for Phrasal-Level Event Recognition and Type Classification (YJ, SHM), pp. 267–278.
ECIR-2013-LagnierDGG #information management #network #predict #social- Predicting Information Diffusion in Social Networks Using Content and User’s Profiles (CL, LD, ÉG, PG), pp. 74–85.
ECIR-2013-MorenoD #clustering #image #interface #mobile #web- Using Text-Based Web Image Search Results Clustering to Minimize Mobile Devices Wasted Space-Interface (JGM, GD), pp. 532–544.
ECIR-2013-NguyenTT #classification #learning #rank- Folktale Classification Using Learning to Rank (DN, DT, MT), pp. 195–206.
ECIR-2013-RaiberK #effectiveness #metric #predict- Using Document-Quality Measures to Predict Web-Search Effectiveness (FR, OK), pp. 134–145.
ICML-c1-2013-ChenLYY #functional #matrix- General Functional Matrix Factorization Using Gradient Boosting (TC, HL, QY, YY), pp. 436–444.
ICML-c1-2013-GilboaSCG #approximate #multi #process #scalability- Scaling Multidimensional Gaussian Processes using Projected Additive Approximations (EG, YS, JPC, EG), pp. 454–461.
ICML-c1-2013-LiLSHD #generative #learning- Learning Hash Functions Using Column Generation (XL, GL, CS, AvdH, ARD), pp. 142–150.
ICML-c1-2013-WulsinFL #correlation #markov #parsing #process- Parsing epileptic events using a Markov switching process model for correlated time series (DW, EBF, BL), pp. 356–364.
ICML-c3-2013-HockingRVB #detection #learning- Learning Sparse Penalties for Change-point Detection using Max Margin Interval Regression (TH, GR, JPV, FRB), pp. 172–180.
ICML-c3-2013-IshtevaPS #order- Unfolding Latent Tree Structures using 4th Order Tensors (MI, HP, LS), pp. 316–324.
ICML-c3-2013-WanZZLF #network- Regularization of Neural Networks using DropConnect (LW, MDZ, SZ, YL, RF), pp. 1058–1066.
KDD-2013-AltinigneliPB #parallel- Massively parallel expectation maximization using graphics processing units (MCA, CP, CB), pp. 838–846.
KDD-2013-JhaSP #algorithm #performance #streaming- A space efficient streaming algorithm for triangle counting using the birthday paradox (MJ, CS, AP), pp. 589–597.
KDD-2013-JinSSBWR #modelling #named- Forex-foreteller: currency trend modeling using news articles (FJ, NS, PS, PB, WW, NR), pp. 1470–1473.
KDD-2013-KuoYHKL #network #predict #social #statistics- Unsupervised link prediction using aggregative statistics on heterogeneous social networks (TTK, RY, YYH, PHK, SDL), pp. 775–783.
KDD-2013-LeeAC #realtime #twitter- Real-time disease surveillance using Twitter data: demonstration on flu and cancer (KL, AA, ANC), pp. 1474–1477.
KDD-2013-LiuYK #adaptation #modelling #process- Adaptive collective routing using gaussian process dynamic congestion models (SL, YY, RK), pp. 704–712.
KDD-2013-LuceyOCRM - Assessing team strategy using spatiotemporal data (PL, DO, GPKC, JR, IM), pp. 1366–1374.
KDD-2013-MukherjeeKLWHCG #behaviour- Spotting opinion spammers using behavioral footprints (AM, AK, BL, JW, MH, MC, RG), pp. 632–640.
KDD-2013-Neumann #big data #problem- Using “big data” to solve “small data” problems (CN), p. 1140.
KDD-2013-RaederPDSP #clustering #reduction #scalability- Scalable supervised dimensionality reduction using clustering (TR, CP, BD, OS, FJP), pp. 1213–1221.
KDD-2013-StitelmanPDHRP #detection #network #online #scalability- Using co-visitation networks for detecting large scale online display advertising exchange fraud (OS, CP, BD, RH, TR, FJP), pp. 1240–1248.
KDD-2013-Vatsavai #approach #learning #multi- Gaussian multiple instance learning approach for mapping the slums of the world using very high resolution imagery (RRV), pp. 1419–1426.
KDD-2013-WangS #classification #multi #relational #social- Multi-label relational neighbor classification using social context features (XW, GS), pp. 464–472.
KDIR-KMIS-2013-BaliBBG #information management #tool support- Using Knowledge Management Tools and Techniques to Increase the Rate of Attendance at Breast Screening (RKB, JB, VB, MCG), pp. 344–350.
KDIR-KMIS-2013-CheetiSC #adaptation #approach #classification #naive bayes #sentiment #syntax- Cross-domain Sentiment Classification using an Adapted Naïve Bayes Approach and Features Derived from Syntax Trees (SC, AS, DC), pp. 169–176.
KDIR-KMIS-2013-CostaS #assessment #concept #enterprise #security- Enterprise to Cloud Security Assessment — A Method using OSSTMM 3.0 Concepts (RC, CS), pp. 571–578.
KDIR-KMIS-2013-DuarteFD #clustering #constraints #validation- Data Clustering Validation using Constraints (JMMD, ALNF, FJFD), pp. 17–27.
KDIR-KMIS-2013-Ibarra-SanchezPO #analysis #case study #risk management- Hospital Risk Management using Healthcare Failure Mode and Effects Analysis — A Case Study on Ventilators Whithin an Intensive Care Unit (MAIS, ABPA, MROP), pp. 328–335.
KDIR-KMIS-2013-ItalaH #behaviour #diagrams #process- Using Stocks and Flows Diagrams to Understand Business Process Behavior (TI, MH), pp. 552–558.
KDIR-KMIS-2013-Lindner #constraints #parsing #random- Using Conditional Random Fields with Constraints to Train Support Vector Machines — Locating and Parsing Bibliographic References (SL), pp. 28–36.
KDIR-KMIS-2013-NartTF #automation #personalisation #recommendation- Personalized Recommendation and Explanation by using Keyphrases Automatically extracted from Scientific Literature (DDN, CT, FF), pp. 96–103.
KDIR-KMIS-2013-RauchS #case study #mining- Using Domain Knowledge in Association Rules Mining — Case Study (JR, MS), pp. 104–111.
KDIR-KMIS-2013-SaidiDZC #process #requirements #semantics #towards #unification- Towards Unification of Requirements Engineering Approaches using Semantics-based Process (IES, TD, NZ, PJC), pp. 443–450.
KDIR-KMIS-2013-SousaM #tool support #web- Diagnosis of the Use of Web 2.0 Tools in the Portuguese Financial Institutions (CS, PM), pp. 368–372.
KDIR-KMIS-2013-SucaS #approach #documentation #ontology- An Ontology for Portability and Interoperability Digital Documents — An Approach in Document Engineering using Ontologies (EGS, FSCdS), pp. 373–380.
KEOD-2013-AlirezaieL #abduction #automation #data type #reasoning- Automatic Annotation of Sensor Data Streams using Abductive Reasoning (MA, AL), pp. 345–354.
KEOD-2013-CostaFML #approach #classification #information management #ontology- Classification of Knowledge Representations using an Ontology-based Approach (RC, PF, PMNM, CL), pp. 184–191.
KEOD-2013-DaramolaAAO #information management #ontology- Using Ontology-based Information Extraction for Subject-based Auto-grading (JOD, IA, IA, OOO), pp. 373–378.
KEOD-2013-TimonenPT #fuzzy #modelling #ontology #safety- Using Associations and Fuzzy Ontologies for Modeling Chemical Safety Information (MT, AP, TT), pp. 26–37.
KEOD-2013-ZouhaierDA #automation #generative #reasoning- Automatic Generation of UIs for Disabled Users using Context-aware Techniques and Reasoning (LZ, YBH, LJBA), pp. 413–418.
MLDM-2013-AmalamanER #detection- Using Turning Point Detection to Obtain Better Regression Trees (PKA, CFE, NJR), pp. 325–339.
MLDM-2013-CastroSAE #automation #classification #database #web- Automatic Classification of Web Databases Using Domain-Dictionaries (HMMC, VJSS, ILA, HJEB), pp. 340–351.
MLDM-2013-DincA #classification #evaluation #image #random- Evaluation of Hyperspectral Image Classification Using Random Forest and Fukunaga-Koontz Transform (SD, RSA), pp. 234–245.
MLDM-2013-GaoD #data mining #distributed #mining #performance- Improving the Efficiency of Distributed Data Mining Using an Adjustment Work Flow (JG, JD), pp. 69–83.
MLDM-2013-LeeBZ #fuzzy #logic #multi #summary #topic- Multi-document Text Summarization Using Topic Model and Fuzzy Logic (SL, SB, YZ), pp. 159–168.
MLDM-2013-ParraL #clustering #dataset- Unsupervised Tagging of Spanish Lyrics Dataset Using Clustering (FLP, EL), pp. 130–143.
MLDM-2013-PohlZ #automation #n-gram #recognition #speech- Using Part of Speech N-Grams for Improving Automatic Speech Recognition of Polish (AP, BZ), pp. 492–504.
MLDM-2013-PrieditisL #bound #classification #performance #problem- When Classification becomes a Problem: Using Branch-and-Bound to Improve Classification Efficiency (AP, ML), pp. 466–480.
RecSys-2013-AdamopoulosT #collaboration #predict #recommendation- Recommendation opportunities: improving item prediction using weighted percentile methods in collaborative filtering systems (PA, AT), pp. 351–354.
RecSys-2013-AlanaziB #markov #modelling #recommendation- A people-to-people content-based reciprocal recommender using hidden markov models (AA, MB), pp. 303–306.
RecSys-2013-HammarKN #e-commerce #recommendation- Using maximum coverage to optimize recommendation systems in e-commerce (MH, RK, BJN), pp. 265–272.
RecSys-2013-KaminskasRS #hybrid #music #recommendation- Location-aware music recommendation using auto-tagging and hybrid matching (MK, FR, MS), pp. 17–24.
RecSys-2013-KhroufT #hybrid #linked data #open data #recommendation- Hybrid event recommendation using linked data and user diversity (HK, RT), pp. 185–192.
RecSys-2013-LiuAYB #generative- Generating supplemental content information using virtual profiles (HL, MSA, BY, AB), pp. 295–302.
RecSys-2013-OstrikovRS #collaboration #metadata- Using geospatial metadata to boost collaborative filtering (AO, LR, BS), pp. 423–426.
RecSys-2013-SchelterBSAM #distributed #matrix #pipes and filters- Distributed matrix factorization with mapreduce using a series of broadcast-joins (SS, CB, MS, AA, VM), pp. 281–284.
RecSys-2013-TianJ #graph #recommendation- Recommending scientific articles using bi-relational graph-based iterative RWR (GT, LJ), pp. 399–402.
RecSys-2013-ZhangSKH #artificial reality #recommendation- Improving augmented reality using recommender systems (ZZ, SS, SRK, PH), pp. 173–176.
SEKE-2013-Al-JamimiA #design pattern #detection #prolog- Using Prolog Rules to Detect Software Design Patterns: Strengths and Weaknesses (HAAJ, MAA), pp. 727–730.
SEKE-2013-Al-MsiedeenSHUVS #concept analysis #mining #object-oriented #semantics #source code- Mining Features from the Object-Oriented Source Code of a Collection of Software Variants Using Formal Concept Analysis and Latent Semantic Indexing (RAM, ADS, MH, CU, SV, HES), pp. 244–249.
SEKE-2013-AlviD #classification #fuzzy #image- Image Steganography Using Fuzzy Domain Transformation and Pixel Classification (AKA, RD), pp. 277–282.
SEKE-2013-AnchietaSM #case study #diagrams #identification #prototype #uml #user interface- Using NLP Techniques for Identifying GUI Prototypes and UML Diagrams From Use Cases (RTA, RFdS, RSM), pp. 48–53.
SEKE-2013-AsuncionSPPDM #information management- Using Change Entries to Collect Software Project Information (HUA, MS, RP, KP, ND, WJMJ), pp. 184–189.
SEKE-2013-CorralSS #mobile #quality- Using a Partially Instantiated GQM to Measure the Quality of Mobile Applications (LC, AS, GS), pp. 520–524.
SEKE-2013-DelfimG #coordination #mining #multi #slicing- Multiple Coordinated Views to Support Aspect Mining Using Program Slicing (FMD, REG), pp. 531–536.
SEKE-2013-DengWH #algorithm #combinator #identification #multi- Combining multiple stress identification algorithms using combinatorial fusion (YD, ZW, DFH), pp. 421–428.
SEKE-2013-Lou0 #artificial reality #gesture #interactive #personalisation #realtime- A Real-time Personalized Gesture Interaction System Using Wii Remote and Kinect for Tiled-Display Environment (YL, WW), pp. 131–136.
SEKE-2013-MaffortVBHAM #design pattern #mining- Mining Architectural Patterns Using Association Rules (CAM, MTV, RdSB, AH, NA, JM), pp. 375–380.
SEKE-2013-MarcalGCJ #identification #mining #repository- Mining Software Repository to Identify Crosscutting Concerns Using Combined Techniques (IM, REG, RCMC, COJ), pp. 338–343.
SEKE-2013-MoshirpourEF #approach #automation #ontology- Automated Construction of System Domain Knowledge Using an Ontology-Based Approach (MM, AE, BHF), pp. 63–66.
SEKE-2013-ShahinLL #architecture #concept #documentation- Recovering Software Architectural Knowledge from Documentation using Conceptual Model (MS, PL, ZL), pp. 556–561.
SEKE-2013-ShamsHK #estimation #network- Software Effort Estimation using Regularized Radial Basis Function Neural Networks (KMS, HSH, AK), pp. 473–478.
SEKE-2013-SouzaSPFF #case study #generative- Generation of Thematic Maps using WPS-Cartographer: An experimental study (FCMS, ACCdS, VP, EF, VRTF), pp. 500–503.
SEKE-2013-SunSJ #architecture #maintenance- Using Architecture to Support the Collaborations in Software Maintenance (YS, HS, WJ), pp. 362–357.
SEKE-2013-TaoLG #approach #architecture #component #configuration management #incremental #testing- Testing Configurable Architectures For Component-Based Software Using an Incremental Approach (CT, BL, JG), pp. 356–361.
SEKE-2013-ZhangLK #debugging #on the #statistics- On the Use of Bug and Predicate Signatures for Statistical Debugging (YZ, EL, BK), pp. 249–299.
SIGIR-2013-AgeevLA #behaviour #summary- Improving search result summaries by using searcher behavior data (MA, DL, EA), pp. 13–22.
SIGIR-2013-AlyHD #named- Taily: shard selection using the tail of score distributions (RA, DH, TD), pp. 673–682.
SIGIR-2013-BouadjenekHBV #documentation #personalisation #representation #social- Using social annotations to enhance document representation for personalized search (MRB, HH, MB, AV), pp. 1049–1052.
SIGIR-2013-GaoXX #query #random- Query expansion using path-constrained random walks (JG, GX, JX), pp. 563–572.
SIGIR-2013-HassanWW #query #self #towards- Toward self-correcting search engines: using underperforming queries to improve search (AHA, RWW, YMW), pp. 263–272.
SIGIR-2013-LeeC #social #social media #web- Building a web test collection using social media (CJL, WBC), pp. 757–760.
SIGIR-2013-MahdabiGHC #ambiguity #concept #proximity #query #retrieval- Leveraging conceptual lexicon: query disambiguation using proximity information for patent retrieval (PM, SG, JXH, FC), pp. 113–122.
SIGIR-2013-MaxwellC #query #topic- Compact query term selection using topically related text (KTM, WBC), pp. 583–592.
SIGIR-2013-MoshfeghiJ #behaviour #effectiveness #feedback- An effective implicit relevance feedback technique using affective, physiological and behavioural features (YM, JMJ), pp. 133–142.
SIGIR-2013-RaiberK #clustering #documentation #markov #random #ranking- Ranking document clusters using markov random fields (FR, OK), pp. 333–342.
SIGIR-2013-Rodriguez-VaamondeTF #documentation #image #web #what- What can pictures tell us about web pages?: improving document search using images (SRV, LT, AWF), pp. 849–852.
SIGIR-2013-RossiMCS #performance #query- Fast document-at-a-time query processing using two-tier indexes (CR, ESdM, ALC, ASdS), pp. 183–192.
SIGIR-2013-SappelliVK #personalisation #recommendation- Recommending personalized touristic sights using google places (MS, SV, WK), pp. 781–784.
SIGIR-2013-SekiM #feedback #social- Finding impressive social content creators: searching for SNS illustrators using feedback on motifs and impressions (YS, KM), pp. 1041–1044.
SIGIR-2013-WangZS #modelling #semantics #topic- Semantic hashing using tags and topic modeling (QW, DZ, LS), pp. 213–222.
SIGIR-2013-Wu #behaviour #how #online #predict- How far will you go?: characterizing and predicting online search stopping behavior using information scent and need for cognition (WCW), p. 1149.
SIGIR-2013-Yeniterzi #effectiveness #social #social media- Effective approaches to retrieving and using expertise in social media (RY), p. 1150.
SKY-2013-Gomes #how #ontology #recommendation #representation- Representing Knowledge using Ontologies: How Search, Browse and Recommendation Can Be Performed (PG), pp. 1–3.
SKY-2013-RineF #complexity #information management #metric #quality #representation #requirements- Requirements Quality Knowledge Representation using Chunking Complexity Measurement: Prior to Formal Inspections (DCR, AF), pp. 3–13.
SKY-2013-SuarezMFM #automation #generative #natural language #semantics- Automatic Generation of Semantic Patterns using Techniques of Natural Language Processing (PS, VM, AF, JLM), pp. 34–44.
AMT-2013-FinotMSD #metamodelling #testing- Using Meta-model Coverage to Qualify Test Oracles (OF, JMM, GS, TD), pp. 12–21.
ECMFA-2013-SunCDF - Using Model Types to Support Contract-Aware Model Substitutability (WS, BC, SD, RBF), pp. 118–133.
ICMT-2013-HermannGNBMPE #automation #graph grammar #on the- On an Automated Translation of Satellite Procedures Using Triple Graph Grammars (FH, SG, NN, BB, GM, AP, TE), pp. 50–51.
MoDELS-2013-CazzolaRAF #evolution #fine-grained #modelling #process #uml- Fine-Grained Software Evolution Using UML Activity and Class Models (WC, NAR, MAR, RBF), pp. 271–286.
MoDELS-2013-NoyritGT #analysis #domain-specific language #integration #modelling- Computer Assisted Integration of Domain-Specific Modeling Languages Using Text Analysis Techniques (FN, SG, FT), pp. 505–521.
MoDELS-2013-SongBCC #adaptation #constraints #modelling #runtime #self #theorem proving- Self-adaptation with End-User Preferences: Using Run-Time Models and Constraint Solving (HS, SB, AC, SC), pp. 555–571.
MoDELS-2013-SunkleKR #architecture #enterprise #modelling #ontology- Analyzing Enterprise Models Using Enterprise Architecture-Based Ontology (SS, VK, SR), pp. 622–638.
MoDELS-2013-WangGAL #automation #case study #feature model #industrial #testing- Automated Test Case Selection Using Feature Model: An Industrial Case Study (SW, AG, SA, ML), pp. 237–253.
MoDELS-2013-ZurowskaD #composition #lazy evaluation #model checking #modelling #uml- Model Checking of UML-RT Models Using Lazy Composition (KZ, JD), pp. 304–319.
OOPSLA-2013-ShiBH #optimisation- Code optimizations using formally verified properties (YS, BB, GH), pp. 427–442.
AdaEurope-2013-BicchieraiBNV #development #functional #integration #ontology #process #safety- Using Ontologies in the Integration of Structural, Functional, and Process Perspectives in the Development of Safety Critical Systems (IB, GB, CN, EV), pp. 95–108.
HILT-2013-CourtieuACZRBHG #coq #formal method #runtime #semantics #towards- Towards the formalization of SPARK 2014 semantics with explicit run-time checks using coq (PC, MVA, TC, ZZ, R, JB, JH, JG, TJ), pp. 21–22.
HILT-2013-LarsonHFD #fault #modelling #safety- Illustrating the AADL error modeling annex (v.2) using a simple safety-critical medical device (BRL, JH, KF, JD), pp. 65–84.
HILT-2013-Whalen #analysis #architecture #development #formal method #modelling #scalability- Up and out: scaling formal analysis using model-based development and architecture modeling (MWW), pp. 41–42.
PADL-2013-MachadoAD #declarative #parallel #performance #programming- Parallel Performance of Declarative Programming Using a PGAS Model (RM, SA, DD), pp. 244–260.
PADL-2013-RodriguesASF #abstraction #analysis #composition #declarative #multi- A Declarative Compositional Timing Analysis for Multicores Using the Latency-Rate Abstraction (VR, BA, SMdS, MF), pp. 43–59.
PEPM-2013-AlpuenteFV #automation #logic #specification- Automatic inference of specifications using matching logic (MA, MAF, AV), pp. 127–136.
PEPM-2013-Simon #type inference- Deriving a complete type inference for hindley-milner and vector sizes using expansion (AS), pp. 13–22.
PLDI-2013-GaoSBMBL #runtime #smarttech- Using managed runtime systems to tolerate holes in wearable memories (TG, KS, SMB, KSM, DB, JRL), pp. 297–308.
PLDI-2013-GveroKKP - Complete completion using types and weights (TG, VK, IK, RP), pp. 27–38.
POPL-2013-UpadrastaC #scheduling- Sub-polyhedral scheduling using (unit-)two-variable-per-inequality polyhedra (RU, AC), pp. 483–496.
PPDP-2013-MontenegroPS #analysis #functional #regular expression- Shape analysis in a functional language by using regular languages (MM, RP, CS), pp. 251–262.
SAS-2013-WhiteM #algebra #analysis #memory management #optimisation- Concise Analysis Using Implication Algebras for Task-Local Memory Optimisation (LW, AM), pp. 433–453.
RE-2013-Cleland-HuangCH #design #empirical #requirements- Using tracelab to design, execute, and baseline empirical requirements engineering experiments (JCH, AC, JHH), pp. 338–339.
RE-2013-FeldererB #fault #industrial #requirements #taxonomy #validation- Using defect taxonomies for requirements validation in industrial projects (MF, AB), pp. 296–301.
REFSQ-2013-BreauxG #analysis #requirements #specification #traceability- Regulatory Requirements Traceability and Analysis Using Semi-formal Specifications (TDB, DGG), pp. 141–157.
REFSQ-2013-FerrariGT #clustering #documentation #natural language #requirements- Using Clustering to Improve the Structure of Natural Language Requirements Documents (AF, SG, GT), pp. 34–49.
ASE-2013-AvazpourGG #automation #model transformation #specification #tool support #visualisation- Tool support for automatic model transformation specification using concrete visualisations (IA, JG, LG), pp. 718–721.
ASE-2013-Fard #behaviour #detection #distributed #independence- Detecting and fixing emergent behaviors in Distributed Software Systems using a message content independent method (FHF), pp. 746–749.
ASE-2013-HuangMM #proving #smt- Proving MCAPI executions are correct using SMT (YH, EM, JM), pp. 26–36.
ASE-2013-KimKKLJK #automation #embedded #industrial #scalability #testing- Automated unit testing of large industrial embedded software using concolic testing (YK, YK, TK, GL, YJ, MK), pp. 519–528.
ASE-2013-KukrejaHT #game studies #testing- Randomizing regression tests using game theory (NK, WGJH, MT), pp. 616–621.
ASE-2013-PalombaBPOLP #detection #smell #source code- Detecting bad smells in source code using change history information (FP, GB, MDP, RO, ADL, DP), pp. 268–278.
ASE-2013-SaadaHNS #model transformation #multi #optimisation- Recovering model transformation traces using multi-objective optimization (HS, MH, CN, HAS), pp. 688–693.
ASE-2013-SagdeoEPV #automation #debugging #invariant #locality #testing- Using automatically generated invariants for regression testing and bug localization (PS, NE, DP, SV), pp. 634–639.
ASE-2013-SahaLKP #debugging #information retrieval #locality- Improving bug localization using structured information retrieval (RKS, ML, SK, DEP), pp. 345–355.
ASE-2013-ScannielloGMM #clustering #fault #predict- Class level fault prediction using software clustering (GS, CG, AM, TM), pp. 640–645.
ASE-2013-Servant #analysis #debugging- Supporting bug investigation using history analysis (FS), pp. 754–757.
ASE-2013-VanciuA #architecture #constraints- Finding architectural flaws using constraints (RV, MAA), pp. 334–344.
ASE-2013-Wu0LD #analysis #automation #component #dependence- Automatically partition software into least privilege components using dynamic data dependency analysis (YW, JS, YL, JSD), pp. 323–333.
ESEC-FSE-2013-ClaretRNGB #analysis #data flow- Bayesian inference using data flow analysis (GC, SKR, AVN, ADG, JB), pp. 92–102.
ESEC-FSE-2013-InozemtsevaHH #fault #reduction- Using fault history to improve mutation reduction (LI, HH, RH), pp. 639–642.
ESEC-FSE-2013-JiangLZDSGS #design #embedded #multi #optimisation- Design and optimization of multi-clocked embedded systems using formal technique (YJ, ZL, HZ, YD, XS, MG, JS), pp. 703–706.
ESEC-FSE-2013-Lopez #ecosystem #evolution #modelling #topic- Using topic models to understand the evolution of a software ecosystem (NL), pp. 723–726.
ICSE-2013-AlmorsyGI #analysis #architecture #automation #security- Automated software architecture security risk analysis using formalized signatures (MA, JG, ASI), pp. 662–671.
ICSE-2013-Balachandran #automation #code review #quality #recommendation #static analysis- Reducing human effort and improving quality in peer code reviews using automatic static analysis and reviewer recommendation (VB), pp. 931–940.
ICSE-2013-GargIBMG #c #c++ #execution #generative #testing- Feedback-directed unit test generation for C/C++ using concolic execution (PG, FI, GB, NM, AG), pp. 132–141.
ICSE-2013-HaoLHG #energy #mobile #program analysis- Estimating mobile application energy consumption using program analysis (SH, DL, WGJH, RG), pp. 92–101.
ICSE-2013-Jonsson #machine learning #performance #scalability- Increasing anomaly handling efficiency in large organizations using applied machine learning (LJ), pp. 1361–1364.
ICSE-2013-PaasivaaraLDRS #agile #distributed #education #re-engineering #student- Teaching students global software engineering skills using distributed scrum (MP, CL, DD, PR, AS), pp. 1128–1137.
ICSE-2013-Rimba #assurance #platform #security- Building high assurance secure applications using security patterns for capability-based platforms (PR), pp. 1401–1404.
ICSE-2013-SharTB #hybrid #injection #mining #program analysis #sql- Mining SQL injection and cross site scripting vulnerabilities using hybrid program analysis (LKS, HBKT, LCB), pp. 642–651.
ICSE-2013-Souza #predict- A proposal for the improvement of project’s cost predictability using EVM and historical data of cost (ADdS), pp. 1447–1449.
ICSE-2013-StephanASC #analysis #clone detection #comparison #detection #framework #mutation testing- Using mutation analysis for a model-clone detector comparison framework (MS, MHA, AS, JRC), pp. 1261–1264.
SAC-2013-AlnusairZY #automation #design #recognition #semantics- Automatic recognition of design motifs using semantic conditions (AA, TZ, GY), pp. 1062–1067.
SAC-2013-AraujoGA #artificial reality #identification #towards- Towards skeleton biometric identification using the microsoft kinect sensor (RMA, GG, VA), pp. 21–26.
SAC-2013-BanerjeeSS #detection #monitoring- Participatory sensing based traffic condition monitoring using horn detection (RB, AS, AS), pp. 567–569.
SAC-2013-BlondelSU #classification #constraints #learning- Learning non-linear classifiers with a sparsity constraint using L1 regularization (MB, KS, KU), pp. 167–169.
SAC-2013-CamposFHV #personalisation #query #ranking #xml- XML search personalization strategies using query expansion, reranking and a search engine modification (LMdC, JMFL, JFH, EVL), pp. 872–877.
SAC-2013-CapelleHHF #recommendation #semantics- Semantic news recommendation using wordnet and bing similarities (MC, FH, AH, FF), pp. 296–302.
SAC-2013-ChanHN #layout #semantics #wiki #word- Computing semantic relatedness using word frequency and layout information of Wikipedia (PC, YH, SN), pp. 282–287.
SAC-2013-ChocklerIMRS #satisfiability- Using cross-entropy for satisfiability (HC, AI, AM, SFR, NS), pp. 1196–1203.
SAC-2013-CohenA #composition #refactoring- Practical use of static composition of refactoring operations (JC, AA), pp. 1700–1705.
SAC-2013-DermevalCSPBBETS #architecture #design #metamodelling #on the #requirements- On the use of metamodeling for relating requirements and architectural design decisions (DD, JC, CTLLS, JP, IIB, PHdSB, EE, TT, APdS), pp. 1278–1283.
SAC-2013-HeckelerSK #component #execution #robust #testing- Accelerated robustness testing of state-based components using reverse execution (PH, BS, TK), pp. 1188–1195.
SAC-2013-InzingerHSLD #identification #implementation- Identifying incompatible service implementations using pooled decision trees (CI, WH, BS, PL, SD), pp. 485–492.
SAC-2013-Jean-BaptisteMJA #adaptation #feature model #modelling- Modeling dynamic adaptations using augmented feature models (JBL, MTS, JMG, AB), pp. 1734–1741.
SAC-2013-JungWKO #architecture #automation #interactive- Heterogeneous device interaction using an IPv6 enabled service-oriented architecture for building automation systems (MJ, JW, WK, AO), pp. 1939–1941.
SAC-2013-KalyanC #analysis #navigation- A feasibility analysis on using bathymetry for navigation of autonomous underwater vehicles (BK, MC), pp. 229–231.
SAC-2013-KannanMDS #navigation #predict- Predictive indoor navigation using commercial smart-phones (BK, FM, MBD, KPS), pp. 519–525.
SAC-2013-KimHCYWNPC #similarity- Measuring similarity of windows applications using static and dynamic birthmarks (DJK, YH, SC, HY, JW, YN, MP, LC), pp. 1628–1633.
SAC-2013-KimM #algorithm #detection #hybrid #search-based- Disguised malware script detection system using hybrid genetic algorithm (JK, BRM), pp. 182–187.
SAC-2013-LeitaoC #adaptation #detection #optimisation #performance #xml- Efficient XML duplicate detection using an adaptive two-level optimization (LL, PC), pp. 832–837.
SAC-2013-LeoniA #mining #process- Data-aware process mining: discovering decisions in processes using alignments (MdL, WMPvdA), pp. 1454–1461.
SAC-2013-MadeoLP #gesture #rest #segmentation- Gesture unit segmentation using support vector machines: segmenting gestures from rest positions (RCBM, CAML, SMP), pp. 46–52.
SAC-2013-MartinaP #induction #multi #protocol #security #verification- Verifying multicast-based security protocols using the inductive method (JEM, LCP), pp. 1824–1829.
SAC-2013-MehtaRCN #approach #dependence- Selecting among alternatives using dependencies: an NFR approach (RM, TRL, LC, MN), pp. 1292–1297.
SAC-2013-MeilingSSW #communication #framework #grid #multi #network #scalability #smarttech- A scalable communication infrastructure for smart grid applications using multicast over public networks (SM, TS, TCS, MW), pp. 690–694.
SAC-2013-MendesW #navigation #realtime- Real time autonomous navigation and obstacle avoidance using a semi-global stereo method (CCTM, DFW), pp. 235–236.
SAC-2013-PapadakisT #classification #mutation testing #testing- Mutation testing strategies using mutant classification (MP, YLT), pp. 1223–1229.
SAC-2013-ProvensiEVR #adaptation #fuzzy #policy #streaming #video- Improving context interpretation by using fuzzy policies: the case of adaptive video streaming (LP, FE, RV, RR), pp. 415–422.
SAC-2013-RabanalR #metaheuristic #polynomial #problem #reduction- Using polynomial reductions to test the suitability of metaheuristics for solving NP-complete problems (PR, IR), pp. 194–199.
SAC-2013-Sobieski0 #maude #sql #term rewriting- Using maude rewriting system to modularize and extend SQL (SS, BZ), pp. 853–858.
SAC-2013-SrivastavaSM #clustering #graph- Text clustering using one-mode projection of document-word bipartite graphs (AS, AJS, EEM), pp. 927–932.
SAC-2013-TeixeiraRG #detection #locality #parallel- Indoor localization using SLAM in parallel with a natural marker detector (LT, ABR, MG), pp. 27–33.
SAC-2013-TragatschnigZ #enterprise #integration- Enterprise integration using event actor based event transformations (ST, UZ), pp. 1434–1440.
GPCE-2013-GerakiosBS #java #parametricity- Reified type parameters using Java annotations (PG, AB, YS), pp. 61–64.
GPCE-2013-KramerOKC #product line #user interface- Using document-oriented GUIs in dynamic software product lines (DK, SO, PK, TC), pp. 85–94.
SLE-2013-DialloCL #approach #formal method #modelling- A Model-Driven Approach to Enhance Tool Interoperability Using the Theory of Models of Computation (PID, JC, LL), pp. 218–237.
ASPLOS-2013-AhnDT #alias #named- DeAliaser: alias speculation using atomic region support (WA, YD, JT), pp. 167–180.
ASPLOS-2013-CuiHWY #execution #symbolic computation #verification- Verifying systems rules using rule-directed symbolic execution (HC, GH, JW, JY), pp. 329–342.
ASPLOS-2013-KadavRS #fault tolerance #fine-grained- Fine-grained fault tolerance using device checkpoints (AK, MJR, MMS), pp. 473–484.
ASPLOS-2013-SahooCGA #automation #fault #invariant #locality- Using likely invariants for automated software fault localization (SKS, JC, CG, VSA), pp. 139–152.
CASE-2013-BagchiBNVSS - Incentive compatible green procurement using scoring rules (DB, SB, YN, NV, PS, SVS), pp. 504–509.
CASE-2013-BengtssonL #algorithm #behaviour #identification #modelling #visualisation- Operation behavior modeling using relation identification and visualization algorithms (KB, BL), pp. 368–373.
CASE-2013-BjorkenstamGBCL #energy #industrial #performance- Energy efficient and collision free motion of industrial robots using optimal control (SB, DG, RB, JSC, BL), pp. 510–515.
CASE-2013-ChenZS #metric- A severity measurement system for obstructive sleep apnea discrimination using a single ECG signal (LC, XZ, CS), pp. 1–6.
CASE-2013-FerreiraL #generative #multi #tool support- A method for generating tool paths for milling pockets in prismatic parts using multiple tools (JCEF, RAL), pp. 528–533.
CASE-2013-FerreiraR #comparison #design #layout #performance #simulation- Performance comparison of the virtual cell layout with cellular and job shop configurations using simulation and design of experiments (JCEF, PAR), pp. 795–800.
CASE-2013-Fries #agile #automation #fault #fuzzy #multi- Automation of rapid fault diagnosis in manufacturing systems using multiple fuzzy agents (TPF), pp. 65–70.
CASE-2013-Geldmann #image #monte carlo #simulation- Fine registration of SEM and AFM images using Monte Carlo simulations (CG), pp. 813–818.
CASE-2013-GrosbardKTR #composition #network- A queuing network model for wafer fabrication using decomposition without aggregation (DG, AK, IT, GR), pp. 717–722.
CASE-2013-HuZL #automation #performance #petri net #synthesis- Supervisor synthesis and performance improvement for automated manufacturing systems by using Petri nets (HH, MZ, YL), pp. 1139–1144.
CASE-2013-IsmailH #3d #anti #higher-order- Trajectory tracking and anti-sway control of three-dimensional offshore boom cranes using second-order sliding modes (RMTRI, QPH), pp. 996–1001.
CASE-2013-JeongMS #approximate #assessment #design #lifecycle #reasoning- Approximate life cycle assessment using case-based reasoning for the eco design of products (MGJ, JRM, HWS), pp. 486–491.
CASE-2013-LanzaKPSS #analysis #automation #detection #fault- Automated optical detection of particles and defects on a Li-Ion-cell surface using a single-point analysis (GL, AK, SP, AS, SS), pp. 675–680.
CASE-2013-LingoR #design- A sustainable building design using geosolar exergy storage technology (GEST) (LEL, UR), pp. 219–224.
CASE-2013-LuSXPO #automation #graph #multi- Automatic building exterior mapping using multilayer feature graphs (YL, DS, YX, AGAP, SO), pp. 162–167.
CASE-2013-MarturiDP #image #performance- Fast image drift compensation in scanning electron microscope using image registration (NM, SD, NP), pp. 807–812.
CASE-2013-MohajeraniMF #automaton #composition #finite #verification- Compositional nonblocking verification for extended finite-state automata using partial unfolding (SM, RM, MF), pp. 930–935.
CASE-2013-NammotoKH #assembly #modelling- Model-based compliant motion control scheme for assembly tasks using vision and force information (TN, KK, KH), pp. 948–953.
CASE-2013-PanHJ #concurrent #flexibility #petri net #policy- One computationally improved deadlock prevention policy for flexible manufacturing systems using Petri nets (YLP, HH, MJ), pp. 924–929.
CASE-2013-RoyerBTT #assessment #behaviour #energy #modelling #multi #simulation- Modelling of a multi-zone building and assessment of its thermal behaviour using an energy simulation software (SR, MB, ST, TT), pp. 735–740.
CASE-2013-ShisheieJBC #design #string- Design and fabrication of an assistive device for arm rehabilitation using twisted string system (RS, LJ, LEB, MHMC), pp. 255–260.
CASE-2013-SoviziK #matrix #nondeterminism #parallel #random- Uncertainty characterization in serial and parallel manipulators using random matrix theory (JS, VNK), pp. 312–317.
CASE-2013-WangBR #modelling #monitoring- Model based unbalance monitoring using augmented observer in rotor systems under the consideration of gyroscopic effect (ZW, MB, SR), pp. 59–64.
CASE-2013-XuJLYL #energy #optimisation- Optimal building energy management using intelligent optimization (YX, KJ, YL, YY, WL), pp. 95–99.
CASE-2013-YueH #concurrent #robust- Robust deadlock control using shared-resources for production systems with unreliable workstations (HY, HH), pp. 1095–1100.
CASE-2013-ZhangPJST #energy #interface #monitoring #scalability- A secure and scalable telemonitoring system using ultra-low-energy wireless sensor interface for long-term monitoring in life science applications (WZ, PP, EJ, RS, KT), pp. 617–622.
CASE-2013-ZhangYZH #design- Longitudinal attitude controller design for aircraft landing with disturbance using ADRC/LQR (GZ, LY, JZ, CH), pp. 330–335.
CC-2013-MooreC #automation #generative #machine learning #policy- Automatic Generation of Program Affinity Policies Using Machine Learning (RWM, BRC), pp. 184–203.
CGO-2013-BardizbanyanGWSLMS #data access #performance- Improving data access efficiency by using a tagless access buffer (TAB) (AB, PG, DBW, MS, PLE, SAM, PS), p. 11.
CGO-2013-HuangJBJA #automation #parallel #runtime- Automatically exploiting cross-invocation parallelism using runtime information (JH, TBJ, SRB, NPJ, DIA), p. 11.
CGO-2013-KulkarniCWS #automation #heuristic #machine learning- Automatic construction of inlining heuristics using machine learning (SK, JC, CW, DS), p. 12.
DAC-2013-DevWR #3d #integration #testing- High-throughput TSV testing and characterization for 3D integration using thermal mapping (KD, GW, SR), p. 6.
DAC-2013-GaillardonMABSLM #towards- Towards structured ASICs using polarity-tunable Si nanowire transistors (PEG, MDM, LGA, SB, DS, YL, GDM), p. 4.
DAC-2013-KarthikR #approximate #linear #modelling #named- ABCD-L: approximating continuous linear systems using boolean models (KVA, JSR), p. 9.
DAC-2013-LeGHD #simulation #verification- Verifying SystemC using an intermediate verification language and symbolic simulation (HML, DG, VH, RD), p. 6.
DAC-2013-LiuYLC #named- DuraCache: a durable SSD cache using MLC NAND flash (RSL, CLY, CHL, GYC), p. 6.
DAC-2013-MillerVG #modelling #physics #statistics- Exploration with upgradeable models using statistical methods for physical model emulation (BM, FV, TG), p. 6.
DAC-2013-SchurmansZALACW #architecture #automation #communication #modelling- Creation of ESL power models for communication architectures using automatic calibration (SS, DZ, DA, RL, GA, XC, LW), p. 58.
DAC-2013-SekitaniYTSS - Electrical artificial skin using ultraflexible organic transistor (TS, TY, MT, TS, TS), p. 3.
DAC-2013-StratigopoulosFCM #estimation #metric #multi #statistics- Multidimensional analog test metrics estimation using extreme value theory and statistical blockade (HGDS, PF, YC, FM), p. 7.
DAC-2013-WangK #control flow #detection #hardware #kernel #named #performance- NumChecker: detecting kernel control-flow modifying rootkits by using hardware performance counters (XW, RK), p. 7.
DAC-2013-YuLJC #classification #detection #feature model- Machine-learning-based hotspot detection using topological classification and critical feature extraction (YTY, GHL, IHRJ, CC), p. 6.
DATE-2013-AhmadyanKV #algorithm #incremental #runtime #verification- Runtime verification of nonlinear analog circuits using incremental time-augmented RRT algorithm (SNA, JAK, SV), pp. 21–26.
DATE-2013-AnanthanarayananGP #detection #fault #low cost #set- Low cost permanent fault detection using ultra-reduced instruction set co-processors (SA, SG, HDP), pp. 933–938.
DATE-2013-BackesR #reachability- Using cubes of non-state variables with property directed reachability (JDB, MDR), pp. 807–810.
DATE-2013-BakshiH #reduction #smt- LFSR seed computation and reduction using SMT-based fault-chaining (DB, MSH), pp. 1071–1076.
DATE-2013-BernasconiCTV - Minimization of P-circuits using Boolean relations (AB, VC, GT, TV), pp. 996–1001.
DATE-2013-BertaccoCBFVKP #on the- On the use of GP-GPUs for accelerating compute-intensive EDA applications (VB, DC, NB, FF, SV, AMK, HDP), pp. 1357–1366.
DATE-2013-BrandonW - Support for dynamic issue width in VLIW processors using generic binaries (AB, SW), pp. 827–832.
DATE-2013-BraojosAA #classification #embedded #random- A methodology for embedded classification of heartbeats using random projections (RB, GA, DA), pp. 899–904.
DATE-2013-ChenD #parallel #predict #simulation- Optimized out-of-order parallel discrete event simulation using predictions (WC, RD), pp. 3–8.
DATE-2013-ChiangTWHCDN #array #configuration management #on the #order #synthesis- On reconfigurable single-electron transistor arrays synthesis using reordering techniques (CEC, LFT, CYW, CYH, YCC, SD, VN), pp. 1807–1812.
DATE-2013-DeutschC #multi- Non-invasive pre-bond TSV test using ring oscillators and multiple voltage levels (SD, KC), pp. 1065–1070.
DATE-2013-EbrahimiDP #3d #algorithm #fault tolerance- Fault-tolerant routing algorithm for 3D NoC using Hamiltonian path strategy (ME, MD, JP), pp. 1601–1604.
DATE-2013-FakihGFR #analysis #architecture #model checking #performance #towards- Towards performance analysis of SDFGs mapped to shared-bus architectures using model-checking (MF, KG, MF, AR), pp. 1167–1172.
DATE-2013-GaoGB #fault tolerance #scheduling- Using explicit output comparisons for fault tolerant scheduling (FTS) on modern high-performance processors (YG, SKG, MAB), pp. 927–932.
DATE-2013-Gomez-PradoCT #latency #optimisation- FPGA latency optimization using system-level transformations and DFG restructuring (DGP, MJC, RT), pp. 1553–1558.
DATE-2013-HasanA #analysis #fault #feedback #formal method- Formal analysis of steady state errors in feedback control systems using HOL-light (OH, MA), pp. 1423–1426.
DATE-2013-HelmstetterCGMV #performance #simulation- Fast and accurate TLM simulations using temporal decoupling for FIFO-based communications (CH, JC, BG, MM, PV), pp. 1185–1188.
DATE-2013-HuNRK #detection #hardware #multimodal- High-sensitivity hardware trojan detection using multimodal characterization (KH, ANN, SR, FK), pp. 1271–1276.
DATE-2013-JooyaB #power management- Using synchronization stalls in power-aware accelerators (AJ, AB), pp. 400–403.
DATE-2013-LotfianJ #architecture #hardware #power management #smarttech- An ultra-low power hardware accelerator architecture for wearable computers using dynamic time warping (RL, RJ), pp. 913–916.
DATE-2013-LukasiewyczSC #programming- Priority assignment for event-triggered systems using mathematical programming (ML, SS, SC), pp. 982–987.
DATE-2013-MaricAV #architecture #hybrid #performance #reliability- Efficient cache architectures for reliable hybrid voltage operation using EDC codes (BM, JA, MV), pp. 917–920.
DATE-2013-PaternaR #problem- Mitigating dark-silicon problems using superlattice-based thermoelectric coolers (FP, SR), pp. 1391–1394.
DATE-2013-PontarelliOEW #detection #fault- Error detection in ternary CAMs using bloom filters (SP, MO, AE, SJW), pp. 1474–1479.
DATE-2013-QianJBTMM #analysis #named #performance- SVR-NoC: a performance analysis tool for network-on-chips using learning-based support vector regression model (ZQ, DCJ, PB, CYT, DM, RM), pp. 354–357.
DATE-2013-RaminiGBB #3d #analysis #manycore #power management- Contrasting wavelength-routed optical NoC topologies for power-efficient 3D-stacked multicore processors using physical-layer analysis (LR, PG, SB, DB), pp. 1589–1594.
DATE-2013-Rodriguez-RodriguezCCPT #memory management #performance #policy- Reducing writes in phase-change memory environments by using efficient cache replacement policies (RRR, FC, DC, LP, FT), pp. 93–96.
DATE-2013-RustLP #architecture #complexity- Low complexity QR-decomposition architecture using the logarithmic number system (JR, FL, SP), pp. 97–102.
DATE-2013-ShreejithVFL #approach #configuration management #network- An approach for redundancy in FlexRay networks using FPGA partial reconfiguration (SS, KV, SAF, ML), pp. 721–724.
DATE-2013-SubramanyanTPRSM #analysis #functional #reverse engineering- Reverse engineering digital circuits using functional analysis (PS, NT, KP, DR, AS, SM), pp. 1277–1280.
DATE-2013-TzouBHC #bound #composition- Periodic jitter and bounded uncorrelated jitter decomposition using incoherent undersampling (NT, DB, SWH, AC), pp. 1667–1672.
DATE-2013-UnutulmazDF #optimisation- Area optimization on fixed analog floorplans using convex area functions (AU, GD, FVF), pp. 1843–1848.
DATE-2013-VenkatesanSRR #energy #named #performance- DWM-TAPESTRI — an energy efficient all-spin cache using domain wall shift based writes (RV, MS, KR, AR), pp. 1825–1830.
DATE-2013-WangXZWYWNW - Active power-gating-induced power/ground noise alleviation using parasitic capacitance of on-chip memories (XW, JX, WZ, XW, YY, ZW, MN, ZW), pp. 1221–1224.
DATE-2013-YalcinUC #detection #fault #hardware #memory management #named #transaction- FaulTM: error detection and recovery using hardware transactional memory (GY, OSÜ, AC), pp. 220–225.
DATE-2013-ZakharenkoAM #cpu #gpu #performance- Characterizing the performance benefits of fused CPU/GPU systems using FusionSim (VZ, TMA, AM), pp. 685–688.
DATE-2013-ZhouZY #design #energy #memory management #network- The design of sustainable wireless sensor network node using solar energy and phase change memory (PZ, YZ, JY), pp. 869–872.
HPCA-2013-ArdestaniR #manycore #named #performance- ESESC: A fast multicore simulator using Time-Based Sampling (EKA, JR), pp. 448–459.
HPCA-2013-GoswamiCL #architecture #memory management #throughput- Power-performance co-optimization of throughput core architecture using resistive memory (NG, BC, TL), pp. 342–353.
HPCA-2013-KhanAWKJ #architecture #manycore #performance- Improving multi-core performance using mixed-cell cache architecture (SMK, ARA, CW, JK, DAJ), pp. 119–130.
HPCA-2013-KrishnaCKP #latency- Breaking the on-chip latency barrier using SMART (TK, CHOC, WCK, LSP), pp. 378–389.
HPCA-2013-SudanBLXMLB #architecture #lightweight #novel #web- A novel system architecture for web scale applications using lightweight CPUs and virtualized I/O (KS, SB, SL, MX, DM, GL, RB), pp. 167–178.
HPDC-2013-SuAWMWA #dataset #distributed- Taming massive distributed datasets: data sampling using bitmap indices (YS, GA, JW, KM, JW, JPA), pp. 13–24.
HPDC-2013-YinLBGN #dataset #order #performance #pipes and filters- Efficient analytics on ordered datasets using MapReduce (JY, YL, MB, LG, AN), pp. 125–126.
LCTES-2013-HuberPP #analysis #control flow #graph- Combined WCET analysis of bitcode and machine code using control-flow relation graphs (BH, DP, PPP), pp. 163–172.
LCTES-2013-KhudiaM #control flow #low cost- Low cost control flow protection using abstract control signatures (DSK, SAM), pp. 3–12.
LCTES-2013-WangCSCH #api #embedded #manycore- Portable mapping of openMP to multicore embedded systems using MCA APIs (CW, SC, PS, BMC, JH), pp. 153–162.
PDP-2013-ColmenaresODFR #equation- Solving the Linearized Poisson-Boltzmann Equation on GPUs Using CUDA (JC, JO, SD, AF, WR), pp. 420–426.
PDP-2013-DemirizBA #architecture #constraints #design #named #programming- CPNoC: On Using Constraint Programming in Design of Network-on-Chip Architecture (AD, NB, AA), pp. 486–493.
PDP-2013-EskandariKBJ #algorithm #constraints #optimisation #quality- Quality of Service Optimization for Network-on-Chip Using Bandwidth-Constraint Mapping Algorithm (AE, AK, NB, MJ), pp. 504–508.
PDP-2013-GuptaGV #3d #gpu #linear #simulation- 3D Bubbly Flow Simulation on the GPU — Iterative Solution of a Linear System Using Sub-domain and Level-Set Deflation (RG, MBvG, CV), pp. 359–366.
PDP-2013-LavilleMLPM #gpu #multi #simulation- Using GPU for Multi-Agent Soil Simulation (GL, KM, CL, LP, NM), pp. 392–399.
PDP-2013-MoosaviRLPT #3d #communication #multi #network #performance #protocol- Enhancing Performance of 3D Interconnection Networks using Efficient Multicast Communication Protocol (SRM, AMR, PL, JP, HT), pp. 294–301.
PPoPP-2013-DiceLLLM #algorithm #hardware #memory management #transaction- Using hardware transactional memory to correct and simplify and readers-writer lock algorithm (DD, YL, YL, VL, MM), pp. 261–270.
PPoPP-2013-EdmondsWL #algorithm #graph- Expressing graph algorithms using generalized active messages (NE, JW, AL), pp. 289–290.
SOSP-2013-RoyMZ #graph #named #streaming- X-Stream: edge-centric graph processing using streaming partitions (AR, IM, WZ), pp. 472–488.
FASE-2013-BouchouchaSL #behaviour #comprehension #modelling #probability #towards- Towards Understanding the Behavior of Classes Using Probabilistic Models of Program Inputs (AB, HAS, PL), pp. 99–113.
FASE-2013-MacedoC #alloy #bidirectional #implementation #model transformation #qvt- Implementing QVT-R Bidirectional Model Transformations Using Alloy (NM, AC), pp. 297–311.
STOC-2013-JainNS #matrix #rank- Low-rank matrix completion using alternating minimization (PJ, PN, SS), pp. 665–674.
STOC-2013-LeeRS #approach- A new approach to computing maximum flows using electrical flows (YTL, SR, NS), pp. 755–764.
STOC-2013-LenzenP #performance- Fast routing table construction using small messages: extended abstract (CL, BPS), pp. 381–390.
STOC-2013-Miller #graph #optimisation #problem #scalability- Solving large optimization problems using spectral graph theory (GLM), p. 981.
STOC-2013-Sherstov #bound #communication- Communication lower bounds using directional derivatives (AAS), pp. 921–930.
TACAS-2013-FalkeMS #bound #c #contest #model checking #named #source code- LLBMC: Improved Bounded Model Checking of C Programs Using LLVM — (Competition Contribution) (SF, FM, CS), pp. 623–626.
TACAS-2013-VizelGS #analysis #reachability- Intertwined Forward-Backward Reachability Analysis Using Interpolants (YV, OG, SS), pp. 308–323.
CADE-2013-ClaessenJRS #automation #induction #proving- Automating Inductive Proofs Using Theory Exploration (KC, MJ, DR, NS), pp. 392–406.
CADE-2013-HawblitzelKLR #automation #proving #source code #theorem proving #towards- Towards Modularly Comparing Programs Using Automated Theorem Provers (CH, MK, SKL, HR), pp. 282–299.
CAV-2013-BrimCDS #model checking #parametricity #probability- Exploring Parameter Space of Stochastic Biochemical Systems Using Quantitative Model Checking (LB, MC, SD, DS), pp. 107–123.
CAV-2013-ChagantyLNR #learning #relational #smt- Combining Relational Learning with SMT Solvers Using CEGAR (ATC, AL, AVN, SKR), pp. 447–462.
CAV-2013-ColangeBKT #diagrams #distributed #model checking #towards- Towards Distributed Software Model-Checking Using Decision Diagrams (MC, SB, FK, YTM), pp. 830–845.
CAV-2013-LaarmanODLP #abstraction #automaton #manycore- Multi-core Emptiness Checking of Timed Büchi Automata Using Inclusion Abstraction (AL, MCO, AED, KGL, JvdP), pp. 968–983.
CAV-2013-PiskacWZ #automation #logic #smt- Automating Separation Logic Using SMT (RP, TW, DZ), pp. 773–789.
CAV-2013-SosnovichGN #network #protocol #security- Finding Security Vulnerabilities in a Network Protocol Using Parameterized Systems (AS, OG, GN), pp. 724–739.
CSL-2013-Rieg - Extracting Herbrand trees in classical realizability using forcing (LR), pp. 597–614.
ICLP-J-2013-ArbelaezTC #parallel #predict #runtime #satisfiability- Using sequential runtime distributions for the parallel speedup prediction of SAT local search (AA, CT, PC), pp. 625–639.
ICST-2013-AfshanMS #evolution #natural language #string #testing- Evolving Readable String Test Inputs Using a Natural Language Model to Reduce Human Oracle Cost (SA, PM, MS), pp. 352–361.
ICST-2013-ArafeenD #clustering #testing- Test Case Prioritization Using Requirements-Based Clustering (MJA, HD), pp. 312–321.
ICST-2013-LinD #concurrent #java- CHECK-THEN-ACT Misuse of Java Concurrent Collections (YL, DD), pp. 164–173.
ICST-2013-MossigeGM #constraints #generative #integration #programming #testing- Test Generation for Robotized Paint Systems Using Constraint Programming in a Continuous Integration Environment (MM, AG, HM), pp. 489–490.
ICST-2013-TangHYW #metric #quality- Test Quality Measurement Using TBPP-R (JT, RH, JY, SW), pp. 48–55.
ICST-2013-Torsel #domain-specific language #model checking #modelling #testing #web- A Testing Tool for Web Applications Using a Domain-Specific Modelling Language and the NuSMV Model Checker (AMT), pp. 383–390.
ICST-2013-YeolekarUAKV #generative #model checking #scalability #testing- Scaling Model Checking for Test Generation Using Dynamic Inference (AY, DU, VA, SK, RV), pp. 184–191.
ICTSS-2013-EnoiuSP #diagrams #logic #testing- Using Logic Coverage to Improve Testing Function Block Diagrams (EPE, DS, PP), pp. 1–16.
ICTSS-2013-MauserKH #programming #towards #user interface- Towards a GUI Test Model Using State Charts and Programming Code (DM, AK, KH), pp. 271–276.
ICTSS-2013-SapraMCGC #execution #fault #python #source code #symbolic computation- Finding Errors in Python Programs Using Dynamic Symbolic Execution (SS, MM, SC, AG, EMC), pp. 283–289.
ICTSS-2013-StepienP #challenge #testing- Challenges of Testing Periodic Messages in Avionics Systems Using TTCN-3 (BS, LP), pp. 207–222.
ISSTA-2013-Buda #database #generative #testing- Generation of test databases using sampling methods (TSB), pp. 366–369.
ISSTA-2013-GligoricGZSAM #test coverage #testing- Comparing non-adequate test suites using coverage criteria (MG, AG, CZ, RS, MAA, DM), pp. 302–313.
ISSTA-2013-QiMLW #automation #effectiveness #fault #locality #program repair- Using automated program repair for evaluating the effectiveness of fault localization techniques (YQ, XM, YL, CW), pp. 191–201.
LICS-2013-Colcombet #logic #monad #set #word- Magnitude Monadic Logic over Words and the Use of Relative Internal Set Theory (TC), p. 123.
LICS-2013-Halpern #first-order #logic #proving #security- From Qualitative to Quantitative Proofs of Security Properties Using First-Order Conditional Logic (JYH), pp. 2–3.
SAT-2013-FingerLGS #constraints #probability #satisfiability- Solutions for Hard and Soft Constraints Using Optimized Probabilistic Satisfiability (MF, RL, CPG, BS), pp. 233–249.
TAP-2013-InsaSR #algorithm #debugging #execution- Speeding Up Algorithmic Debugging Using Balanced Execution Trees (DI, JS, AR), pp. 133–151.
VMCAI-2013-SeladjiB #abstract domain #analysis #fixpoint #tool support- Fixpoint Computation in the Polyhedra Abstract Domain Using Convex and Numerical Analysis Tools (YS, OB), pp. 149–168.
VMCAI-2013-ZhengS0LD0 #network #partial order #reduction- State Space Reduction for Sensor Networks Using Two-Level Partial Order Reduction (MZ, DS, JS, YL, JSD, YG), pp. 515–535.
QoSA-2012-EklundB #architecture #ecosystem #framework #multi #platform- Using architecture for multiple levels of access to an ecosystem platform (UE, JB), pp. 143–148.
WICSA-ECSA-2012-ElorantaHVK #architecture #documentation #generative #knowledge base #named #topic- TopDocs: Using Software Architecture Knowledge Base for Generating Topical Documents (VPE, OH, TV, KK), pp. 191–195.
WICSA-ECSA-2012-HilliardMMP #architecture #composition #framework #on the #reuse- On the Composition and Reuse of Viewpoints across Architecture Frameworks (RH, IM, HM, PP), pp. 131–140.
WICSA-ECSA-2012-MiesbauerW #architecture #information management #maintenance- Capturing and Maintaining Architectural Knowledge Using Context Information (CM, RW), pp. 206–210.
WICSA-ECSA-2012-RathfelderBKR #email #monitoring #performance #predict #scalability- Workload-aware System Monitoring Using Performance Predictions Applied to a Large-scale E-Mail System (CR, SB, KK, RHR), pp. 31–40.
WICSA-ECSA-2012-ThatSO #design pattern- Using Architectural Patterns to Define Architectural Decisions (MTTT, SS, FO), pp. 196–200.
WICSA-ECSA-2012-WoodsB #architecture #case study #experience #industrial #information management #scalability- Using an Architecture Description Language to Model a Large-Scale Information System — An Industrial Experience Report (EW, RB), pp. 239–243.
DocEng-2012-MahlowGHS #framework #retrieval #xquery- A framework for retrieval and annotation in digital humanities using XQuery full text and update in BaseX (CM, CG, AH, MHS), pp. 195–204.
DocEng-2012-PeroniSV #documentation #lens #semantics- Faceted documents: describing document characteristics using semantic lenses (SP, DS, FV), pp. 191–194.
DRR-2012-ChandaFP #clustering #documentation- Clustering document fragments using background color and texture information (SC, KF, UP).
DRR-2012-FengY #component #composition #detection #documentation- Using connected component decomposition to detect straight line segments in documents (XF, AY).
DRR-2012-LinGTHL #documentation #embedded #identification- Identification of embedded mathematical formulas in PDF documents using SVM (XL, LG, ZT, XH, XL).
DRR-2012-RashwanRAAK #2d #pseudo #robust- A robust omnifont open-vocabulary arabic OCR system using pseudo-2D-HMM (AMR, MR, AAH, SA, AHK).
DRR-2012-Silva #algorithm #detection #evaluation- Using specific evaluation for comparing and combining competing algorithms: applying it to table column detection (ACeS).
DRR-2012-TangSS #distance- Handwriting individualization using distance and rarity (YT, SNS, HS).
HT-2012-CravinoDF #clustering #community #network- Using the overlapping community structure of a network of tags to improve text clustering (NC, JLD, ÁF), pp. 239–244.
HT-2012-LevacherLW #adaptation #hypermedia #named #reuse- Slicepedia: providing customized reuse of open-web resources for adaptive hypermedia (KL, SL, VW), pp. 23–32.
HT-2012-SofeanS #architecture #design #detection #evaluation #implementation #network #realtime #social- A real-time architecture for detection of diseases using social networks: design, implementation and evaluation (MS, MS), pp. 309–310.
HT-2012-WeningerZH #web- Building enriched web page representations using link paths (TW, CZ, JH), pp. 53–62.
JCDL-2012-LeeH #classification #generative #music- Generating ground truth for music mood classification using mechanical turk (JHL, XH), pp. 129–138.
JCDL-2012-OhLMY #ranking- Evaluating and ranking patents using weighted citations (SO, ZL, PM, JY), pp. 281–284.
JCDL-2012-TuarobMG #algorithm #network- Improving algorithm search using the algorithm co-citation network (ST, PM, CLG), pp. 277–280.
SIGMOD-2012-El-HelwFI #information management- Just-in-time information extraction using extraction views (AEH, MHF, IFI), pp. 613–616.
SIGMOD-2012-EngleLXZFSS #data analysis #distributed #memory management #named #performance- Shark: fast data analysis using coarse-grained distributed memory (CE, AL, RX, MZ, MJF, SS, IS), pp. 689–692.
TPDL-2012-DamnjanovicH #content management #generative #interactive #library- Generating Content for Digital Libraries Using an Interactive Content Management System (UD, SH), pp. 474–479.
TPDL-2012-GeelNN #approach #named- PubLight: Managing Publications Using a Task-Oriented Approach (MG, MN, MCN), pp. 363–369.
TPDL-2012-HallCS #automation #clustering #library- Evaluating the Use of Clustering for Automatically Organising Digital Library Collections (MMH, PDC, MS), pp. 323–334.
TPDL-2012-KapidakisMP #query- Query Expansion of Zero-Hit Subject Searches: Using a Thesaurus in Conjunction with NLP Techniques (SK, AM, MP), pp. 433–438.
TPDL-2012-LlewellynGOH #analysis #tool support- Enhancing the Curation of Botanical Data Using Text Analysis Tools (CL, CG, JO, EH), pp. 480–485.
TPDL-2012-LoizidesVIZ #interactive #repository- Collaboratively Creating a Thematic Repository Using Interactive Table-Top Technology (FL, CV, AI, PZ), pp. 512–516.
TPDL-2012-TryfouT #image #semantics #visual notation #web- Using Visual Cues for the Extraction of Web Image Semantic Information (GT, NT), pp. 396–401.
TPDL-2012-ZhangKB #metadata #tool support- The CMDI MI Search Engine: Access to Language Resources and Tools Using Heterogeneous Metadata Schemas (JZ, MKS, HB), pp. 492–495.
TPDL-2012-ZhouLW #personalisation #social #web- Web Search Personalization Using Social Data (DZ, SL, VW), pp. 298–310.
VLDB-2012-CandanRSW #constraints #named- sDTW: Computing DTW Distances using Locally Relevant Constraints based on Salient Feature Alignments (KSC, RR, MLS, XW), pp. 1519–1530.
VLDB-2012-CautisK #complexity #probability #query #xml- Answering Queries using Views over Probabilistic XML: Complexity and Tractability (BC, EK), pp. 1148–1159.
VLDB-2012-IseleB #learning #programming #search-based- Learning Expressive Linkage Rules using Genetic Programming (RI, CB), pp. 1638–1649.
VLDB-2012-KanagalAPJYP #behaviour #learning #recommendation #taxonomy- Supercharging Recommender Systems using Taxonomies for Learning User Purchase Behavior (BK, AA, SP, VJ, JY, LGP), pp. 956–967.
VLDB-2012-LiKNC #estimation #query #robust #sql #statistics- Robust Estimation of Resource Consumption for SQL Queries using Statistical Techniques (JL, ACK, VRN, SC), pp. 1555–1566.
VLDB-2012-LuSCO #nearest neighbour #performance #pipes and filters- Efficient Processing of k Nearest Neighbor Joins using MapReduce (WL, YS, SC, BCO), pp. 1016–1027.
VLDB-2012-PimplikarS #keyword #query #web- Answering Table Queries on the Web using Column Keywords (RP, SS), pp. 908–919.
VLDB-2012-SachanB #mining #statistics #string- Mining Statistically Significant Substrings using the Chi-Square Statistic (MS, AB), pp. 1052–1063.
VLDB-2012-ZhangCW #multi #performance #pipes and filters- Efficient Multi-way Theta-Join Processing Using MapReduce (XZ, LC, MW), pp. 1184–1195.
CSEET-2012-BollinHS #concept #education #experience #project management #simulation- Teaching Software Project Management using Simulations — The AMEISE Environment: from Concepts to Class Room Experience (AB, EH, LS), pp. 85–86.
CSEET-2012-TillmannMHFX #education #mobile #student- Engage Your Students by Teaching Computer Science Using Only Mobile Devices with TouchDevelop (NT, MM, JdH, MF, TX), pp. 87–89.
ITiCSE-2012-CooperNS - Initial results of using an intelligent tutoring system with Alice (SC, YJN, LS), pp. 138–143.
ITiCSE-2012-GoldweberDJ #hardware #operating system- Supporting operating systems projects using the μMPS2 hardware simulator (MG, RD, TJ), pp. 63–68.
ITiCSE-2012-Impagliazzo - Using professional and ethical themes (JI), p. 374.
ITiCSE-2012-Law #interactive #student- Using quick response codes for student interaction during lectures (RL), p. 401.
ITiCSE-2012-Santos12a #education #java- Developing contexts for teaching Java using AGUIA/J (ALS), p. 378.
SIGITE-2012-AhmadzadehM #algorithm #clustering #education #programming #research- A feasibility study on using clustering algorithms in programming education research (MA, EM), pp. 145–150.
SIGITE-2012-AndersonG #case study #experience #programming #student- Engaging undergraduate programming students: experiences using lego mindstorms NXT (MA, CG), pp. 139–144.
SIGITE-2012-BrannockN #development #testing- Real-world testing: using FOSS for software development courses (EB, NPN), pp. 87–88.
SIGITE-2012-GirtonGMY #development #overview #perspective #student- Using student professional development planning to inform program review (AG, SG, JRM, DWY), pp. 71–74.
SIGITE-2012-KercherR #risk management #student- Risks, rewards and raising awareness: training a cyber workforce using student red teams (KEK, DCR), pp. 75–80.
SIGITE-2012-SeolSK #learning #mobile #student #towards- Use of a mobile application to promote scientific discovery learning: students’ perceptions towards and practical adoption of a mobile application (SS, AS, PK), pp. 121–126.
TFPIE-2012-ODonnell #education #functional #hardware- Connecting the Dots: Computer Systems Education using a Functional Hardware Description Language (JTO), pp. 20–39.
CSMR-2012-BettenburgTH #code search #fuzzy #source code- Using Fuzzy Code Search to Link Code Fragments in Discussions to Source Code (NB, SWT, AEH), pp. 319–328.
CSMR-2012-GoulaoFWA #analysis #case study #comparative #evolution #predict- Software Evolution Prediction Using Seasonal Time Analysis: A Comparative Study (MG, NF, MW, FBeA), pp. 213–222.
CSMR-2012-GrantCS #maintenance #modelling #topic- Using Topic Models to Support Software Maintenance (SG, JRC, DBS), pp. 403–408.
CSMR-2012-HosseiniNG #debugging #predict- A Market-Based Bug Allocation Mechanism Using Predictive Bug Lifetimes (HH, RN, MWG), pp. 149–158.
CSMR-2012-JaszSBOG #impact analysis- Impact Analysis Using Static Execute After in WebKit (JJ, LS, ÁB, CO, TG), pp. 95–104.
CSMR-2012-Koschke #clone detection #detection #scalability- Large-Scale Inter-System Clone Detection Using Suffix Trees (RK), pp. 309–318.
CSMR-2012-MoghadamC #automation #design #difference #refactoring- Automated Refactoring Using Design Differencing (IHM, MÓC), pp. 43–52.
CSMR-2012-PetersZ #mining #repository #smell- Evaluating the Lifespan of Code Smells using Software Repository Mining (RP, AZ), pp. 411–416.
ICPC-2012-LuciaPOPP #information retrieval #question #source code- Using IR methods for labeling source code artifacts: Is it worthwhile? (ADL, MDP, RO, AP, SP), pp. 193–202.
ICPC-2012-SajnaniOL #clone detection #detection #parallel #pipes and filters- Parallel code clone detection using MapReduce (HS, JO, CVL), pp. 261–262.
ICSM-2012-AliSGA #empirical #requirements #traceability- An empirical study on requirements traceability using eye-tracking (NA, ZS, YGG, GA), pp. 191–200.
ICSM-2012-KobayashiKKYM #clustering #composition #dependence- Feature-gathering dependency-based software clustering using Dedication and Modularity (KK, MK, KK, KY, AM), pp. 462–471.
ICSM-2012-KoutersVSB #gnome #repository- Who’s who in Gnome: Using LSA to merge software repository identities (EK, BV, AS, MvdB), pp. 592–595.
ICSM-2012-QiML #automation #performance #scalability #source code- Making automatic repair for large-scale programs more efficient using weak recompilation (YQ, XM, YL), pp. 254–263.
ICSM-2012-QuAR #impact analysis #testing- Configuration selection using code change impact analysis for regression testing (XQ, MA, BR), pp. 129–138.
ICSM-2012-RupakhetiH #constraints #fault #modelling #similarity #theorem proving- Finding errors from reverse-engineered equality models using a constraint solver (CRR, DH), pp. 77–86.
MSR-2012-ChenTNH #fault #modelling #topic- Explaining software defects using topic models (THC, SWT, MN, AEH), pp. 189–198.
SCAM-2012-AftandilianSPK #compilation #java #program analysis #tool support- Building Useful Program Analysis Tools Using an Extensible Java Compiler (EA, RS, SP, SK), pp. 14–23.
SCAM-2012-AliSGA #debugging- Improving Bug Location Using Binary Class Relationships (NA, AS, YGG, GA), pp. 174–183.
SCAM-2012-HillRK #debugging #java #locality #on the- On the Use of Stemming for Concern Location and Bug Localization in Java (EH, SR, ACK), pp. 184–193.
SCAM-2012-SchrettnerJGBG #clustering #dependence #impact analysis- Impact Analysis in the Presence of Dependence Clusters Using Static Execute after in WebKit (LS, JJ, TG, ÁB, TG), pp. 24–33.
WCRE-2012-DaviesRW #debugging #locality #similarity- Using Bug Report Similarity to Enhance Bug Localisation (SD, MR, MW), pp. 125–134.
WCRE-2012-HemelK #case study #clone detection #detection #linux #reverse engineering #source code #variability- Reverse Engineering Variability in Source Code Using Clone Detection: A Case Study for Linux Variants of Consumer Electronic Devices (AH, RK), pp. 357–366.
WCRE-2012-JanaN #detection #dynamic analysis #precise- Precise Detection of Uninitialized Variables Using Dynamic Analysis — Extending to Aggregate and Vector Types (AJ, RN), pp. 197–201.
WCRE-2012-LavoieKMZ #clone detection #detection #nearest neighbour #repository- Inferring Repository File Structure Modifications Using Nearest-Neighbor Clone Detection (TL, FK, EM, YZ), pp. 325–334.
WCRE-2012-RomanoRPK #fine-grained #source code- Analyzing the Impact of Antipatterns on Change-Proneness Using Fine-Grained Source Code Changes (DR, PR, MP, FK), pp. 437–446.
WCRE-2012-SteidlHJ #analysis #network #recommendation- Using Network Analysis for Recommendation of Central Software Classes (DS, BH, EJ), pp. 93–102.
WCRE-2012-ZiftciK #data mining #feature model #mining- Feature Location Using Data Mining on Existing Test-Cases (CZ, IK), pp. 155–164.
ICALP-v1-2012-JefferyKM #complexity #graph #matrix #multi #quantum #query- Improving Quantum Query Complexity of Boolean Matrix Multiplication Using Graph Collision (SJ, RK, FM), pp. 522–532.
ICALP-v1-2012-KrauthgamerZ - Preserving Terminal Distances Using Minors (RK, TZ), pp. 594–605.
FM-2012-BenkiraneNSS #algebra #process- Measles Epidemics and PEPA: An Exploration of Historic Disease Dynamics Using Process Algebra (SB, RN, ES, CS), pp. 101–115.
FM-2012-HieronsMN #distributed #order #testing- Using Time to Add Order to Distributed Testing (RMH, MGM, MN), pp. 232–246.
FM-2012-OsaiweranFGR #case study #component #design #experience #formal method- Experience Report on Designing and Developing Control Components Using Formal Methods (AO, TF, JFG, BJvR), pp. 341–355.
FM-2012-PlaggeL #validation- Validating B, Z and TLA + Using ProB and Kodkod (DP, ML), pp. 372–386.
FM-2012-SongT #detection #model checking #performance- Efficient Malware Detection Using Model-Checking (FS, TT), pp. 418–433.
FM-2012-YangKK #formal method #lightweight- Specification-Based Test Repair Using a Lightweight Formal Method (GY, SK, MK), pp. 455–470.
IFM-2012-HoomanMW #abstraction #detection #fault #industrial #modelling- Early Fault Detection in Industry Using Models at Various Abstraction Levels (JH, AJM, HvW), pp. 268–282.
IFM-2012-RochaBCN #bound #comprehension #debugging #model checking #programming- Understanding Programming Bugs in ANSI-C Software Using Bounded Model Checking Counter-Examples (HR, RSB, LCC, ADN), pp. 128–142.
SEFM-2012-BicknellRBCS #approach #verification- A Practical Approach for Closed Systems Formal Verification Using Event-B (BB, JR, MJB, JC, CFS), pp. 323–332.
SEFM-2012-LefticaruI #algorithm #approach #finite #generative #search-based #state machine #testing- An Improved Test Generation Approach from Extended Finite State Machines Using Genetic Algorithms (RL, FI), pp. 293–307.
SEFM-2012-MatichukM #automation #proving #specification- Extensible Specifications for Automatic Re-use of Specifications and Proofs (DM, TCM), pp. 333–341.
Haskell-2012-AdamsD #haskell #performance #programming- Template your boilerplate: using template haskell for efficient generic programming (MDA0, TD), pp. 13–24.
ICFP-2012-Danielsson #monad #semantics- Operational semantics using the partiality monad (NAD), pp. 127–138.
AIIDE-2012-DesaiS #behaviour- Enhancing the Believability of Character Behaviors Using Non-Verbal Cues (ND, DS).
AIIDE-2012-MullerHBS #game studies- Glengarry Glen Ross: Using BDI for Sales Game Dialogues (TJM, AH, KvdB, IS).
AIIDE-2012-ShakerYTNO #evolution #personalisation- Evolving Personalized Content for Super Mario Bros Using Grammatical Evolution (NS, GNY, JT, MN, MO0).
CIG-2012-BenbassatS #evolution #programming #search-based- Evolving both search and strategy for Reversi players using genetic programming (AB, MS), pp. 47–54.
CIG-2012-BrandstetterA #information retrieval #programming #search-based- Reactive control of Ms. Pac Man using information retrieval based on Genetic Programming (MFB, SA), pp. 250–256.
CIG-2012-ShakerNYTO #evolution- Evolving levels for Super Mario Bros using grammatical evolution (NS, MN, GNY, JT, MO0), pp. 304–311.
FDG-2012-IsbisterKF #exclamation- Scoop!: using movement to reduce math anxiety and affect confidence (KI, MK, JF), pp. 228–230.
FDG-2012-ScerboB #design #game studies- Design issues when using commodity gaming devices for virtual object manipulation (SS, DAB), pp. 294–295.
FDG-2012-SimmonsDG #development #game studies #programming- Using game development to reveal programming competency (SS, BJD, MG), pp. 89–96.
FDG-2012-YinRB #interactive #novel #visual notation- Using an interactive visual novel to promote patient empowerment through engagement (LY, LR, TWB), pp. 41–48.
VS-Games-2012-AsteriadisKSY #behaviour #clustering #detection #towards #visual notation- Towards Detecting Clusters of Players using Visual and Gameplay Behavioral Cues (SA, KK, NS, GNY), pp. 140–147.
VS-Games-2012-HaugePR #education #game studies- Workshop on the Use of Serious Games in the Education of Engineers (JBH, BP, JckhR), pp. 341–342.
VS-Games-2012-OostendorpK #3d #navigation- Using a Cognitive Model of Web-Navigation to Generate Support for 3D Virtual Navigation (HvO, SK), pp. 283–284.
ICGT-2012-Ong #graph transformation #multi #programming language #rule-based- Multi-scale Rule-Based Graph Transformation Using the Programming Language XL (YO), pp. 417–419.
CHI-2012-AndrewsBEK #branch #interactive- Creating and using interactive narratives: reading and writing branching comics (DA, CB, SE, MK), pp. 1703–1712.
CHI-2012-Barkhuus #human-computer #privacy- The mismeasurement of privacy: using contextual integrity to reconsider privacy in HCI (LB), pp. 367–376.
CHI-2012-BullingAS #security #visual notation- Increasing the security of gaze-based cued-recall graphical passwords using saliency masks (AB, FA, AS), pp. 3011–3020.
CHI-2012-CohnMPT #interactive #named #realtime- Humantenna: using the body as an antenna for real-time whole-body interaction (GC, DM, SP, DST), pp. 1901–1910.
CHI-2012-DearmanGT #mobile- Determining the orientation of proximate mobile devices using their back facing camera (DD, RTG, KNT), pp. 2231–2234.
CHI-2012-DearmanT - Evaluating the implicit acquisition of second language vocabulary using a live wallpaper (DD, KNT), pp. 1391–1400.
CHI-2012-DixonFW #analysis #interface #visual notation- A general-purpose target-aware pointing enhancement using pixel-level analysis of graphical interfaces (MD, JF, JOW), pp. 3167–3176.
CHI-2012-FallahABF #navigation #visual notation- The user as a sensor: navigating users with visual impairments in indoor spaces using tactile landmarks (NF, IA, KEB, EF), pp. 425–432.
CHI-2012-GhomiFHCB - Using rhythmic patterns as an input method (EG, GF, SH, OC, MBL), pp. 1253–1262.
CHI-2012-GoelFW #mobile #named- WalkType: using accelerometer data to accomodate situational impairments in mobile touch screen text entry (MG, LF, JOW), pp. 2687–2696.
CHI-2012-GuptaMPT #gesture #named- SoundWave: using the doppler effect to sense gestures (SG, DM, SP, DST), pp. 1911–1914.
CHI-2012-HarrisonH #2d #interactive- Using shear as a supplemental two-dimensional input channel for rich touchscreen interaction (CH, SEH), pp. 3149–3152.
CHI-2012-HayashiPOH #named- WebTicket: account management using printable tokens (EH, BAP, FO, JIH), pp. 997–1006.
CHI-2012-HenzeRB #behaviour #mobile #type system- Observational and experimental investigation of typing behaviour using virtual keyboards for mobile devices (NH, ER, SB), pp. 2659–2668.
CHI-2012-HietanenSAL #image- : helping the legal use of creative commons images (HH, AS, KA, YL), pp. 599–608.
CHI-2012-HuhnKLK #evaluation #on the- On the use of virtual environments for the evaluation of location-based applications (AEH, VJK, AL, PK), pp. 2569–2578.
CHI-2012-KjeldskovSPP #case study #mobile- Using mobile phones to support sustainability: a field study of residential electricity consumption (JK, MBS, JP, RP), pp. 2347–2356.
CHI-2012-KlempererLMSUBCGR #data access #exclamation- Tag, you can see it!: using tags for access control in photo sharing (PFK, YL, MLM, MS, BU, LB, LFC, NG, MKR), pp. 377–386.
CHI-2012-KumarRTAK #game studies #mobile #speech- Improving literacy in developing countries using speech recognition-supported games on mobile devices (AK, PR, AT, RA, MK), pp. 1149–1158.
CHI-2012-LicoppeI #case study #mobile #quote- “Timid encounters”: a case study in the use of proximity-based mobile technologies (CL, YI), pp. 2759–2768.
CHI-2012-LindsayJSO #design #people- Engaging older people using participatory design (SL, DJ, GS, PO), pp. 1199–1208.
CHI-2012-NicolauJ #comprehension #type system- Touch typing using thumbs: understanding the effect of mobility and hand posture (HN, JAJ), pp. 2683–2686.
CHI-2012-QiB #memory management- Animating paper using shape memory alloys (JQ, LB), pp. 749–752.
CHI-2012-SchwarzKHDW #ad hoc #mobile #scalability- Phone as a pixel: enabling ad-hoc, large-scale displays using mobile devices (JS, DK, CH, PD, AW), pp. 2235–2238.
CHI-2012-TangMHRIZC #interactive #lightweight #video- Time travel proxy: using lightweight video recordings to create asynchronous, interactive meetings (JCT, JM, AH, AR, KI, CZ, XC), pp. 3111–3120.
CHI-2012-VardoulakisKMSGT #mobile- Using mobile phones to present medical information to hospital patients (LPV, AKK, DM, GS, JG, DST), pp. 1411–1420.
CHI-2012-YataniBT #feedback #named #people #representation #visual notation- SpaceSense: representing geographical information to visually impaired people using spatial tactile feedback (KY, NB, KNT), pp. 415–424.
CHI-2012-YemKYSYY - Assisting hand skill transfer of tracheal intubation using outer-covering haptic display (VY, HK, NY, RS, HY, JY), pp. 3177–3180.
CSCW-2012-BoltonKV #comparison #performance- A comparison of competitive and cooperative task performance using spherical and flat displays (JB, KK, RV), pp. 529–538.
CSCW-2012-FollmerBRSI #interactive #people- People in books: using a FlashCam to become part of an interactive book for connected reading (SF, RB, HR, MS, HI), pp. 685–694.
CSCW-2012-JuAL #game studies #low cost- Using low cost game controllers to capture data for 6th grade science labs (WJ, UA, SL), pp. 1115–1124.
CSCW-2012-NagpalHJL #personalisation #social #web- Friends, romans, countrymen: lend me your URLs. using social chatter to personalize web search (AN, SH, RRJ, MSL), pp. 461–470.
CSCW-2012-RobinsonJVM #authoring #collaboration #named- PicoTales: collaborative authoring of animated stories using handheld projectors (SR, MJ, EV, GM), pp. 671–680.
CAiSE-2012-SchalerLRS #database #information management- Building Information System Variants with Tailored Database Schemas Using Features (MS, TL, MR, GS), pp. 597–612.
CAiSE-2012-ZawawyKMM #analysis #logic #markov #network- Requirements-Driven Root Cause Analysis Using Markov Logic Networks (HZ, KK, JM, SM), pp. 350–365.
ICEIS-J-2012-FabbriHTBZS12a #mining #visualisation- Using Information Visualization and Text Mining to Facilitate the Conduction of Systematic Literature Reviews (SF, EMH, ADT, AB, AZ, CS), pp. 243–256.
ICEIS-J-2012-GottardiPC12a #approach #framework #modelling #reuse- Accelerating Crosscutting Framework Reuse Using a Model-Based Approach (TG, OPL, VVdC), pp. 257–273.
ICEIS-v1-2012-AmarGMHLN #concept analysis- Using Formal Concept Analysis to Extract a Greatest Common Model (BA, AOG, AM, MH, TL, CN), pp. 27–37.
ICEIS-v1-2012-AyresS #fuzzy #mining #ontology #similarity- Mining Generalized Association Rules using Fuzzy Ontologies with Context-based Similarity (RMJA, MTPS), pp. 74–83.
ICEIS-v1-2012-KosorusBK #query #semantics #similarity #taxonomy- Semantic Similarity between Queries in QA System using a Domain-specific Taxonomy (HK, AB, JK), pp. 241–246.
ICEIS-v1-2012-TertiltBK #algorithm #enterprise #modelling #performance #scalability- Modeling the Performance and Scalability of a SAP ERP System using an Evolutionary Algorithm (DT, AB, HK), pp. 112–118.
ICEIS-v2-2012-AleixoKFCN #case study #comparative #modelling #process- Modularizing Software Process Lines using Model-driven Approaches — A Comparative Study (FAA, UK, MAF, DAdC, ECN), pp. 120–125.
ICEIS-v2-2012-AokiOOM #model checking #quality #requirements #specification- Quality Improvement of Requirements Specification using Model Checking Technique (YA, SO, HO, SM), pp. 401–406.
ICEIS-v2-2012-FonteBCGH #evaluation #program analysis- Program Analysis and Evaluation using Quimera (DF, IVB, DCdC, ALG, PRH), pp. 209–219.
ICEIS-v2-2012-FrancaS #aspect-oriented #evaluation #metric #overview #programming- A Systematic Review on Evaluation of Aspect Oriented Programming using Software Metrics (JMSF, MdSS), pp. 77–83.
ICEIS-v2-2012-LukaszewskiJL #data mining #mining #ontology #semantics- Attribute Value Ontology — Using Semantics in Data Mining (TL, JJ, AL), pp. 329–334.
ICEIS-v2-2012-PantojaC #approach #development- A MDA Approach for Agent-oriented Development using FAML (CEP, RC), pp. 415–420.
ICEIS-v2-2012-ReichelR #process #requirements- Prioritization of Product Requirements using the Analytic Hierarchy Process (TR, GR), pp. 70–76.
ICEIS-v2-2012-YiasemisA #automation #fault #locality #mutation testing #testing- Dynamic Localisation and Automatic Correction of Software Faults using Evolutionary Mutation Testing (PSY, ASA), pp. 15–26.
ICEIS-v3-2012-AkikiBY #adaptation #enterprise #modelling #runtime #user interface- Using Interpreted Runtime Models for Devising Adaptive User Interfaces of Enterprise Applications (PAA, AKB, YY), pp. 72–77.
ICEIS-v3-2012-CansadoVS #analysis #architecture #enterprise #multi- Using Multi-criteria Analysis to Evaluate Enterprise Architecture Scenarios (FC, AV, GS), pp. 232–237.
ICEIS-v3-2012-HamadaASO #classification #documentation #taxonomy- A Classification Method of Open-ended Questionnaires using Category-based Dictionary from Sampled Documents (KH, MA, MS, HO), pp. 193–198.
CIKM-2012-AgarwalCW #multi #ranking- Multi-faceted ranking of news articles using post-read actions (DA, BCC, XW), pp. 694–703.
CIKM-2012-BaeJKL #detection- Outlier detection using centrality and center-proximity (DHB, SJ, SWK, ML), pp. 2251–2254.
CIKM-2012-BambaSGBF #concept #recommendation #scalability- The twitaholic next door.: scalable friend recommender system using a concept-sensitive hash function (PB, JS, CG, NB, JF), pp. 2275–2278.
CIKM-2012-BannourH #image #semantics- Hierarchical image annotation using semantic hierarchies (HB, CH), pp. 2431–2434.
CIKM-2012-CheungSM #recommendation #social #synthesis- Using program synthesis for social recommendations (AC, ASL, SM), pp. 1732–1736.
CIKM-2012-ChiangWD #clustering #network #normalisation #scalability- Scalable clustering of signed networks using balance normalized cut (KYC, JJW, ISD), pp. 615–624.
CIKM-2012-ChongCZSQZ #pattern matching #rdf- RDF pattern matching using sortable views (ZC, HC, ZZ, HS, GQ, AZ), pp. 315–324.
CIKM-2012-Chung - Finding food entity relationships using user-generated data in recipe service (YjC), pp. 2611–2614.
CIKM-2012-CosciaR #how #web- Knowing where and how criminal organizations operate using web content (MC, VR), pp. 1412–1421.
CIKM-2012-GopalakrishnanIMRS - Matching product titles using web-based enrichment (VG, SPI, AM, RR, SHS), pp. 605–614.
CIKM-2012-HuangCLL #predict #probability #process #social- Predicting aggregate social activities using continuous-time stochastic process (SH, MC, BL, DL), pp. 982–991.
CIKM-2012-HwangLKL #on the #performance #recommendation- On using category experts for improving the performance and accuracy in recommender systems (WSH, HJL, SWK, ML), pp. 2355–2358.
CIKM-2012-KhabsaTG - Entity resolution using search engine results (MK, PT, CLG), pp. 2363–2366.
CIKM-2012-KimYK #equation #query #retrieval #word- Mathematical equation retrieval using plain words as a query (SK, SY, YK), pp. 2407–2410.
CIKM-2012-LinDH0S #automation #image #random #visual notation- Automatic image annotation using tag-related random search over visual neighbors (ZL, GD, MH, JW, JS), pp. 1784–1788.
CIKM-2012-LinTCXS #effectiveness #performance #sentiment- Effective and efficient?: bilingual sentiment lexicon extraction using collocation alignment (ZL, ST, XC, XX, WS), pp. 1542–1546.
CIKM-2012-LongCZZ #classification #named- TCSST: transfer classification of short & sparse text using external data (GL, LC, XZ, CZ), pp. 764–772.
CIKM-2012-LongGXK #approach #design- A simple approach to the design of site-level extractors using domain-centric principles (CL, XG, CX, SK), pp. 1517–1521.
CIKM-2012-McCreadieMOGJ #crowdsourcing #web- An examination of content farms in web search using crowdsourcing (RM, CM, IO, JG, FJ), pp. 2551–2554.
CIKM-2012-MendesMZB #graph #similarity- Measuring website similarity using an entity-aware click graph (PNM, PM, HZ, RB), pp. 1697–1701.
CIKM-2012-NegahbanRG #learning #multi #performance #scalability #statistics- Scaling multiple-source entity resolution using statistically efficient transfer learning (SN, BIPR, JG), pp. 2224–2228.
CIKM-2012-NoroziAV #documentation #wiki- Contextualization using hyperlinks and internal hierarchical structure of Wikipedia documents (MAN, PA, APdV), pp. 734–743.
CIKM-2012-QureshiOP #n-gram #wiki- Short-text domain specific key terms/phrases extraction using an n-gram model with wikipedia (MAQ, CO, GP), pp. 2515–2518.
CIKM-2012-RaiberKT #estimation #web- Content-based relevance estimation on the web using inter-document similarities (FR, OK, MT), pp. 1769–1773.
CIKM-2012-SiposSSJ #corpus #summary #word- Temporal corpus summarization using submodular word coverage (RS, AS, PS, TJ), pp. 754–763.
CIKM-2012-SrinivasanBC #modelling- Segmenting web-domains and hashtags using length specific models (SS, SB, RC), pp. 1113–1122.
CIKM-2012-TsatsaronisVN #documentation #named #semantics- SemaFor: semantic document indexing using semantic forests (GT, IV, KN), pp. 1692–1696.
CIKM-2012-WangQD #automation #clustering #documentation- Improving document clustering using automated machine translation (XW, BQ, ID), pp. 645–653.
CIKM-2012-WangWLL #graph #keyword #ranking #wiki- Exploring simultaneous keyword and key sentence extraction: improve graph-based ranking using wikipedia (XW, LW, JL, SL), pp. 2619–2622.
CIKM-2012-WangZCM #network #retrieval- Top-k retrieval using conditional preference networks (HW, XZ, WC, PM), pp. 2075–2079.
CIKM-2012-WeiFLC #canonical #dependence- Model the complex dependence structures of financial variables by using canonical vine (WW, XF, JL, LC), pp. 1382–1391.
CIKM-2012-WongCTP #web- Mixed-initiative conversational system using question-answer pairs mined from the web (WW, LC, JT, LP), pp. 2707–2709.
CIKM-2012-YanGLCW #clustering #matrix- Clustering short text using Ncut-weighted non-negative matrix factorization (XY, JG, SL, XC, YW), pp. 2259–2262.
CIKM-2012-YangZW #collaboration #incremental #predict #scalability- Scalable collaborative filtering using incremental update and local link prediction (XY, ZZ, KW), pp. 2371–2374.
CIKM-2012-YuSNMH #network #similarity- User guided entity similarity search using meta-path selection in heterogeneous information networks (XY, YS, BN, TM, JH), pp. 2025–2029.
ECIR-2012-BoudinND #predict #query- Using a Medical Thesaurus to Predict Query Difficulty (FB, JYN, MD), pp. 480–484.
ECIR-2012-MantrachR12a #multi #query- A Mailbox Search Engine Using Query Multi-modal Expansion and Community-Based Smoothing (AM, JMR), pp. 576–577.
ECIR-2012-NawabSC #documentation #query- Retrieving Candidate Plagiarised Documents Using Query Expansion (RMAN, MS, PDC), pp. 207–218.
ECIR-2012-OghinaBTR #predict #social #social media- Predicting IMDB Movie Ratings Using Social Media (AO, MB, MT, MdR), pp. 503–507.
ECIR-2012-TholpadiDBS #clustering #corpus #multi- Cluster Labeling for Multilingual Scatter/Gather Using Comparable Corpora (GT, MKD, CB, SKS), pp. 388–400.
ECIR-2012-ZucconAZW #analysis #retrieval- Top-k Retrieval Using Facility Location Analysis (GZ, LA, DZ, JW), pp. 305–316.
ICML-2012-Araya-LopezBT - Near-Optimal BRL using Optimistic Local Transitions (MAL, OB, VT), p. 70.
ICML-2012-Ben-DavidLSS #classification #fault- Minimizing The Misclassification Error Rate Using a Surrogate Convex Loss (SBD, DL, NS, KS), p. 16.
ICML-2012-BoukouvalasBC #process- Gaussian Process Quantile Regression using Expectation Propagation (AB, RB, DC), p. 123.
ICML-2012-Busa-FeketeBK #classification #graph #performance- Fast classification using sparse decision DAGs (RBF, DB, BK), p. 99.
ICML-2012-DhillonRFU #modelling #word- Using CCA to improve CCA: A new spectral method for estimating vector models of words (PSD, JR, DPF, LHU), p. 13.
ICML-2012-HaiderS #clustering #graph- Finding Botnets Using Minimal Graph Clusterings (PH, TS), p. 37.
ICML-2012-JalaliS12a #clustering #optimisation- Clustering using Max-norm Constrained Optimization (AJ, NS), p. 205.
ICML-2012-JiangLS #3d #learning- Learning Object Arrangements in 3D Scenes using Human Context (YJ, ML, AS), p. 119.
ICML-2012-LeRMDCCDN #learning #scalability- Building high-level features using large scale unsupervised learning (QVL, MR, RM, MD, GC, KC, JD, AYN), p. 69.
ICML-2012-SejdinovicGSF #kernel #testing- Hypothesis testing using pairwise distances and associated kernels (DS, AG, BKS, KF), p. 104.
ICML-2012-ShanKRBSR #matrix #predict #probability- Gap Filling in the Plant Kingdom — Trait Prediction Using Hierarchical Probabilistic Matrix Factorization (HS, JK, PBR, AB, FS, MR), p. 47.
ICML-2012-SilverC #composition #modelling- Compositional Planning Using Optimal Option Models (DS, KC), p. 165.
ICML-2012-YuSL #network #speech- Conversational Speech Transcription Using Context-Dependent Deep Neural Networks (DY, FS, GL), p. 1.
ICML-2012-ZhaiHBW #image #modelling #process- Modeling Images using Transformed Indian Buffet Processes (KZ, YH, JLBG, SW), p. 118.
ICPR-2012-0001ZP #segmentation- Unsupervised dynamic texture segmentation using local descriptors in volumes (JC, GZ, MP), pp. 3622–3625.
ICPR-2012-AfzalBKSB #documentation #image #parametricity #robust- Robust stereo matching for document images using parameter selection of text-line extraction (MZA, SSB, MK, FS, TMB), pp. 331–334.
ICPR-2012-AhmedA #gesture #modelling- Flow Modeling and skin-based Gaussian pruning to recognize gestural actions using HMM (ORA, AAH), pp. 3488–3491.
ICPR-2012-AliGBPNP #biology #classification- Classification of biological cells using bio-inspired descriptors (WBHA, DG, MB, PP, RN, TP), pp. 3353–3357.
ICPR-2012-AotoTSMY #estimation- Position estimation of near point light sources using a clear hollow sphere (TA, TT, TS, YM, NY), pp. 3721–3724.
ICPR-2012-AryafarJS #automation #classification- Automatic musical genre classification using sparsity-eager support vector machines (KA, SJ, AS), pp. 1526–1529.
ICPR-2012-AttamimiNN #markov #multi #recognition- Hierarchical multilevel object recognition using Markov model (MA, TN, TN), pp. 2963–2966.
ICPR-2012-AydemirEGK #summary #video- Video summarization using simple action patterns (MSA, UE, AG, MEK), pp. 2047–2050.
ICPR-2012-AzizWH - Shape signature using the edge-based Laplacian (FA, RCW, ERH), pp. 1594–1597.
ICPR-2012-BaiHHR #clustering #complexity #graph- Graph clustering using graph entropy complexity traces (LB, ERH, LH, PR), pp. 2881–2884.
ICPR-2012-BaiHR #graph #kernel- Jensen-Shannon graph kernel using information functionals (LB, ERH, PR), pp. 2877–2880.
ICPR-2012-BanerjeeN #kernel #learning #multi #process #recognition- Pose based activity recognition using Multiple Kernel learning (PB, RN), pp. 445–448.
ICPR-2012-BarbulescuGGMR #2d #3d #detection #estimation- 3D human pose estimation using 2D body part detectors (AB, WG, JG, TBM, FXR), pp. 2484–2487.
ICPR-2012-BespalovQBS #classification #image #scalability- Large-scale image classification using supervised spatial encoder (DB, YQ, BB, AS), pp. 581–584.
ICPR-2012-BicegoL #2d #biology #recognition #sequence #tool support- 2D shape recognition using biological sequence alignment tools (MB, PL), pp. 1359–1362.
ICPR-2012-BoomHHF #clustering #dataset #image- Supporting ground-truth annotation of image datasets using clustering (BJB, PXH, JH, RBF), pp. 1542–1545.
ICPR-2012-BougesCBL #classification #nearest neighbour- Using k-nearest neighbors to handle missing weak classifiers in a boosted cascade (PB, TC, CB, GL), pp. 1763–1766.
ICPR-2012-BoulmerkaA #segmentation- Thresholding-based segmentation revisited using mixtures of generalized Gaussian distributions (AB, MSA), pp. 2894–2897.
ICPR-2012-BuchholzKWW #3d #image #locality- 3D object localization using single camera images (DB, DK, SW, FMW), pp. 821–824.
ICPR-2012-ChangDZDW #representation #sketching #synthesis- Smoothness-constrained face photo-sketch synthesis using sparse representation (LC, XD, MZ, FD, ZW), pp. 3025–3029.
ICPR-2012-ChenHCHC #analysis- Occluded human action analysis using dynamic manifold model (LCC, JWH, CHC, CYH, DYC), pp. 1245–1248.
ICPR-2012-ChenLL #artificial reality #image- Depth image enhancement for Kinect using region growing and bilateral filter (LC, HL, SL), pp. 3070–3073.
ICPR-2012-ChenXF #approximate- Compression of GPS trajectories using optimized approximation (MC, MX, PF), pp. 3180–3183.
ICPR-2012-CheungP #detection- Salient region detection using local and global saliency (YmC, QP), pp. 210–213.
ICPR-2012-ChowdhuryBP #detection- Scene text detection using sparse stroke information and MLP (ARC, UB, SKP), pp. 294–297.
ICPR-2012-ChowdhuryKPD #design #graph #video- Video storyboard design using Delaunay graphs (ASC, SKK, RP, MND), pp. 3108–3111.
ICPR-2012-CrandallFP #modelling #probability #visual notation- Layer-finding in radar echograms using probabilistic graphical models (DJC, GCF, JP), pp. 1530–1533.
ICPR-2012-DattaBFP #identification #modelling- Appearance modeling for person re-identification using Weighted Brightness Transfer Functions (AD, LMGB, RF, SP), pp. 2367–2370.
ICPR-2012-DoTT #multi #representation- Text/graphic separation using a sparse representation with multi-learned dictionaries (THD, ST, ORT), pp. 689–692.
ICPR-2012-EdmundsonS #image #performance #retrieval- Fast JPEG image retrieval using optimised Huffman tables (DE, GS), pp. 3188–3191.
ICPR-2012-El-GaalyT #kernel #multi #recognition- RGBD object pose recognition using local-global multi-kernel regression (TEG, MT), pp. 2468–2471.
ICPR-2012-ElnakibNCPGE #3d #analysis #quantifier- Quantification of age-related brain cortex change using 3D shape analysis (AE, MN, MC, HYP, GLG, AEB), pp. 41–44.
ICPR-2012-ErsoyBPP #classification #image- HEp-2 cell classification in IIF images using Shareboost (IE, FB, JP, KP), pp. 3362–3365.
ICPR-2012-FernandezT #documentation #segmentation- Document segmentation using Relative Location Features (FCF, ORT), pp. 1562–1565.
ICPR-2012-Gao12a #clustering #estimation #multi- Facial age estimation using Clustered Multi-task Support Vector Regression Machine (PXG), pp. 541–544.
ICPR-2012-GaoM #analysis #canonical #correlation #detection #kernel #multi- Multi-modality movie scene detection using Kernel Canonical Correlation Analysis (GG, HM), pp. 3074–3077.
ICPR-2012-GlodekSPS #classification #markov #multi #network- Multi-modal Fusion based on classifiers using reject options and Markov Fusion Networks (MG, MS, GP, FS), pp. 1084–1087.
ICPR-2012-GonfausGGRG #classification #geometry- Edge classification using photo-geometric features (JMG, TG, AG, FXR, JG), pp. 1497–1500.
ICPR-2012-GujraniyaM #classification #modelling #performance #topic- Efficient classification using phrases generated by topic models (DG, MNM), pp. 2331–2334.
ICPR-2012-HaraKMM #3d #generative #video- Fast-accurate 3D face model generation using a single video camera (TH, HK, AM, SM), pp. 1269–1272.
ICPR-2012-HeLL #image- Single image super-resolution using Gaussian Mixture Model (HH, JL, XL), pp. 1916–1919.
ICPR-2012-HesseGGE #multi #recognition- Multi-view facial expression recognition using local appearance features (NH, TG, HG, HKE), pp. 3533–3536.
ICPR-2012-HsuNWC #component- Pedestrian tracking in low contrast regions using aggregated background model and Silhouette Components (GSH, HPN, CHW, SLC), pp. 3680–3683.
ICPR-2012-HuangH #invariant- Binary invariant cross color descriptor using galaxy sampling (GHH, CRH), pp. 2610–2613.
ICPR-2012-HuiC #robust #towards- Towards a robust hand-eye calibration using normal flows (TWH, RC), pp. 2545–2548.
ICPR-2012-IkemuraF #detection- Human detection by Haar-like filtering using depth information (SI, HF), pp. 813–816.
ICPR-2012-Imajo #algorithm #performance- Fast Gaussian filtering algorithm using splines (KI), pp. 489–492.
ICPR-2012-InoueSK #representation- Local intensity compensation using sparse representation (KI, HS, YK), pp. 951–954.
ICPR-2012-IshidaKKN #generative #recognition- Road marking recognition for map generation using sparse tensor voting (HI, KK, YK, TN), pp. 1132–1135.
ICPR-2012-ItohTA #3d #graph #image #sequence- 3D tracking of soccer players using time-situation graph in monocular image sequence (HI, TT, YA), pp. 2532–2536.
ICPR-2012-IwamotoHSTXC #image #representation #self- Super-resolution of MR volumetric images using sparse representation and self-similarity (YI, XHH, SS, KT, WX, YWC), pp. 3758–3761.
ICPR-2012-KananA #order #pseudo #recognition- Recognition of facial expressions using locally weighted and adjusted order Pseudo Zernike Moments (HRK, MA), pp. 3419–3422.
ICPR-2012-KataokaSM #detection- Region of Interest detection using indoor structure and saliency map (KK, KS, MM), pp. 3329–3332.
ICPR-2012-KawabataK #approach #multi- Plane based multi camera calibration under unknown correspondence using ICP-like approach (SK, YK), pp. 3700–3703.
ICPR-2012-KawaiMHIY #identification- Person re-identification using view-dependent score-level fusion of gait and color features (RK, YM, CH, HI, YY), pp. 2694–2697.
ICPR-2012-KennardBS #2d #approach #detection #geometry #verification- Offline signature verification and forgery detection using a 2-D geometric warping approach (DJK, WAB, TWS), pp. 3733–3736.
ICPR-2012-KrijtheHL #classification- Improving cross-validation based classifier selection using meta-learning (JHK, TKH, ML), pp. 2873–2876.
ICPR-2012-KuriharaA #correlation #image- Motion blur free photometric stereo using correlation image sensor (TK, SA), pp. 1872–1875.
ICPR-2012-KusumaSLL #recognition #sequence- Appearance-based object recognition using weighted longest increasing subsequence (GPK, AS, YL, JAL), pp. 3668–3671.
ICPR-2012-LamSS #image #statistics- Denoising hyperspectral images using spectral domain statistics (AL, IS, YS), pp. 477–480.
ICPR-2012-LeeCP #estimation- Articulated hand configuration and rotation estimation using extended torus manifold embedding (CSL, SYC, SWP), pp. 441–444.
ICPR-2012-LeeLCY #lightweight #random #representation- Lightweight Random Ferns using binary representation (SL, SWL, YNC, HSY), pp. 1342–1345.
ICPR-2012-LinnerS #comparison #normalisation #quality- Comparison of restoration quality on square and hexagonal grids using normalized convolution (EL, RS), pp. 3046–3049.
ICPR-2012-LinSCLH #recognition- Human action recognition using Action Trait Code (SYL, CKS, SCC, MSL, YPH), pp. 3456–3459.
ICPR-2012-LiPMH #classification #email #incremental #learning- Business email classification using incremental subspace learning (ML, YP, RM, HYH), pp. 625–628.
ICPR-2012-LiST #locality- Accurate iris localization using contour segments (HL, ZS, TT), pp. 3398–3401.
ICPR-2012-LiuLS #documentation #image #modelling #probability #visual notation- Document image matching using probabilistic graphical models (LL, YL, CYS), pp. 637–640.
ICPR-2012-LiuWZL - Pan-sharpening using weighted red-black wavelet (QL, YW, ZZ, LL), pp. 1908–1911.
ICPR-2012-LiuXAR #geometry #recognition- Hand posture recognition using finger geometric feature (LL, JX, HA, XR), pp. 565–568.
ICPR-2012-LiVBB #clustering #learning- Feature learning using Generalized Extreme Value distribution based K-means clustering (ZL, OV, HB, RB), pp. 1538–1541.
ICPR-2012-LiW #encoding #matrix #recognition- Iris recognition using ordinal encoding of Log-Euclidean covariance matrices (PL, GW), pp. 2420–2423.
ICPR-2012-LiYLKZL #classification #multi- Multiclass boosting SVM using different texture features in HEp-2 cell staining pattern classification (KL, JY, ZL, XK, RZ, WL), pp. 170–173.
ICPR-2012-LuHLC #recognition- Insect species recognition using discriminative local soft coding (AL, XH, CLL, XC), pp. 1221–1224.
ICPR-2012-LuLZSCO - Learning-based deformable registration using weighted mutual information (YL, RL, LZ, YS, CC, SHO), pp. 2626–2629.
ICPR-2012-LuoKM #3d- Endoscope 3-D motion tracking using an aggressive particle filtering for boosting electromagnetic guidance endoscopy (XL, TK, KM), pp. 117–120.
ICPR-2012-MaLXS #detection #image- Anomaly detection with spatio-temporal context using depth images (XM, TL, FX, FS), pp. 2590–2593.
ICPR-2012-MartinezS #monitoring- Breath rate monitoring during sleep using near-ir imagery and PCA (MM, RS), pp. 3472–3475.
ICPR-2012-McCloskeyD #detection #metadata #process #video- Activity detection in the wild using video metadata (SM, PD), pp. 3140–3143.
ICPR-2012-MinKCK #approach #detection #higher-order- A superpixel MRF approach using high-order likelihood for moving object detection (JM, HK, JC, ISK), pp. 266–269.
ICPR-2012-MoriyamaAS #analysis- Face analysis of aggressive moods in automobile driving using mutual subspace method (TM, KA, NS), pp. 2898–2901.
ICPR-2012-MotlicekSWMM #authentication #mobile #modelling #variability- Bi-modal authentication in mobile environments using session variability modelling (PM, LES, RW, CM, SM), pp. 1100–1103.
ICPR-2012-MujumdarVK #framework #multi #novel #segmentation- A novel framework for segmentation of stroke lesions in Diffusion Weighted MRI using multiple b-value data (SM, RV, LTK), pp. 3762–3765.
ICPR-2012-NaitoKSS - Deblurring depth blur and motion blur simultaneously by using space-time coding (RN, TK, FS, JS), pp. 2177–2180.
ICPR-2012-NakazawaMMNHYY #multi #re-engineering- Dynamic scene reconstruction using asynchronous multiple Kinects (MN, IM, YM, HN, HH, HY, YY), pp. 469–472.
ICPR-2012-NarayanR #segmentation- Motion segmentation using curve fitting on Lagrangian particle trajectories (SN, KRR), pp. 3692–3695.
ICPR-2012-NegrelPG #categorisation #image- Using spatial pyramids with compacted VLAT for image categorization (RN, DP, PHG), pp. 2460–2463.
ICPR-2012-NgC #verification- Face verification using temporal affective cues (ESN, AYSC), pp. 1249–1252.
ICPR-2012-NguyenVC #multi #recognition- Face recognition using Multi-modal Binary Patterns (TPN, NSV, AC), pp. 2343–2346.
ICPR-2012-NiigakiSM #detection- Circular object detection based on separability and uniformity of feature distributions using Bhattacharyya Coefficient (HN, JS, MM), pp. 2009–2012.
ICPR-2012-NikanA #recognition- Human face recognition under occlusion using LBP and entropy weighted voting (SN, MA), pp. 1699–1702.
ICPR-2012-OumerP #3d #estimation #image- 3D point tracking and pose estimation of a space object using stereo images (NWO, GP), pp. 796–800.
ICPR-2012-PalenichkaPKL #image #modelling #multi- Model-based extraction of image area descriptors using a multi-scale attention operator (RMP, MP, YK, AL), pp. 853–856.
ICPR-2012-PerdigotoA #3d #image #re-engineering- Reconstruction of 3D lines from a single axial catadioptric image using cross-ratio (LP, HA), pp. 857–860.
ICPR-2012-PerezMMSV #recognition- Combining gradient histograms using orientation tensors for human action recognition (EdAP, VFM, LMM, DOS, MBV), pp. 3460–3463.
ICPR-2012-PhanST #detection #symmetry- Text detection in natural scenes using Gradient Vector Flow-Guided symmetry (TQP, PS, CLT), pp. 3296–3299.
ICPR-2012-PorwalZG #network #recognition- Handwritten Arabic text recognition using Deep Belief Networks (UP, YZ, VG), pp. 302–305.
ICPR-2012-RebagliatiSPS #distance #edit distance #graph #set- Computing the graph edit distance using dominant sets (NR, ASR, MP, FS), pp. 1080–1083.
ICPR-2012-ReinbacherRB #game studies #named- RoμNect: Hand mounted depth sensing using a commodity gaming sensor (CR, MR, HB), pp. 461–464.
ICPR-2012-RiechertZMK #estimation #hybrid #realtime #recursion- Real-time disparity estimation using line-wise hybrid recursive matching and cross-bilateral median up-sampling (CR, FZ, MM, PK), pp. 3168–3171.
ICPR-2012-RodriguesPBPM #image #multi #segmentation #towards- Towards breast ultrasound image segmentation using multi-resolution pixel descriptors (RR, AMGP, RB, MP, JM), pp. 2833–2836.
ICPR-2012-RohithK #3d #estimation #modelling- Augmenting monocular motion estimation using intermittent 3D models from depth sensors (MVR, CK), pp. 473–476.
ICPR-2012-RoyH #classification #component #detection #documentation #image- Text detection on camera acquired document images using supervised classification of connected components in wavelet domain (UR, GH), pp. 270–273.
ICPR-2012-SankaranJ #network #recognition- Recognition of printed Devanagari text using BLSTM Neural Network (NS, CVJ), pp. 322–325.
ICPR-2012-SantosPTGPF #classification #image #multi #visual notation #word- Improving texture description in remote sensing image multi-scale classification tasks by using visual words (JAdS, OABP, RdST, PHG, SPF, AXF), pp. 3090–3093.
ICPR-2012-SchmeingJ #optimisation- Faithful Spatio-Temporal disocclusion filling using local optimization (MS, XJ), pp. 3799–3802.
ICPR-2012-SchuldhausKJESL #classification- Classification of surfaces and inclinations during outdoor running using shoe-mounted inertial sensors (DS, PK, UJ, BE, HS, ML), pp. 2258–2261.
ICPR-2012-ShenZ #3d #recognition- Hyperspectral face recognition using 3D Gabor wavelets (LS, SZ), pp. 1574–1577.
ICPR-2012-ShibataK #modelling #recognition- Emotion recognition modeling of sitting postures by using pressure sensors and accelerometers (TS, YK), pp. 1124–1127.
ICPR-2012-ShinPJB #detection- Moving objects detection using freely moving depth sensing camera (YDS, JHP, GRJ, MB), pp. 1314–1317.
ICPR-2012-SimoesSW #detection #image- Using local texture maps of brain MR images to detect Mild Cognitive Impairment (RS, CHS, AMvCvW), pp. 153–156.
ICPR-2012-SoranHLS #detection- Tremor detection using motion filtering and SVM (BS, JNH, SIL, LGS), pp. 178–181.
ICPR-2012-SuLT #documentation #framework #image #learning #markov #random- A learning framework for degraded document image binarization using Markov Random Field (BS, SL, CLT), pp. 3200–3203.
ICPR-2012-SuYLW #bound #classification #editing- Local color editing using color classification and boundary inpainting (ZS, XY, XL, DW), pp. 3196–3199.
ICPR-2012-SvarmSEO #image- Point track creation in unordered image collections using Gomory-Hu trees (LS, ZS, OE, CO), pp. 2116–2119.
ICPR-2012-TajimaIA #3d #correlation- A non-rigid registration method for medical volume data using 3D Phase-Only Correlation (YT, KI, TA), pp. 93–96.
ICPR-2012-TangS #independence #learning #network #performance #testing- Efficient and accurate learning of Bayesian networks using chi-squared independence tests (YT, SNS), pp. 2723–2726.
ICPR-2012-ThanhMNMY #detection #recognition #robust- Inertial-sensor-based walking action recognition using robust step detection and inter-class relationships (TNT, YM, HN, YM, YY), pp. 3811–3814.
ICPR-2012-TianC12a #image #optimisation- Depth image up-sampling using ant colony optimization (JT, LC), pp. 3795–3798.
ICPR-2012-TsuboshitaKFO #adaptation #image- Image annotation using adapted Gaussian mixture model (YT, NK, MF, MO), pp. 1346–1350.
ICPR-2012-TsuruKO - Mixed-reality snapshot system using environmental depth sensors (HT, IK, YO), pp. 97–100.
ICPR-2012-UddinCKS - Accurate genomic signal recovery using compressed sensing (BU, MEC, HAK, GS), pp. 3144–3147.
ICPR-2012-Ugurlu #detection- Head posture detection using skin and hair information (YU), pp. 1–4.
ICPR-2012-ValevY #classification #clustering #graph- Classification using graph partitioning (VV, NY), pp. 1261–1264.
ICPR-2012-VaradarajanV #semantics #visual notation- Semantic saliency using k-TR theory of visual perception (KMV, MV), pp. 3676–3679.
ICPR-2012-VillamizarGSM #learning #online #random- Online human-assisted learning using Random Ferns (MV, AG, AS, FMN), pp. 2821–2824.
ICPR-2012-VitaladevuniCPN #detection #documentation #image- Detecting near-duplicate document images using interest point matching (SNPV, FC, RP, PN), pp. 347–350.
ICPR-2012-WangCCP #detection #realtime- Real-time smoke detection using texture and color features (YW, TWC, RC, NTP), pp. 1727–1730.
ICPR-2012-WangHWZ #classification #gender- Facial image-based gender classification using Local Circular Patterns (CW, DH, YW, GZ), pp. 2432–2435.
ICPR-2012-WangOJBK - Tracking Tetrahymena pyriformis cells using decision trees (QW, YO, AAJ, KLB, MK), pp. 1843–1847.
ICPR-2012-WeibelDWR #detection #graph- Contrast-enhancing seam detection and blending using graph cuts (TW, CD, DW, RR), pp. 2732–2735.
ICPR-2012-WittW #programming- Sparse stereo by edge-based search using dynamic programming (JW, UW), pp. 3631–3635.
ICPR-2012-XiaSF #towards #verification #visual notation- Toward kinship verification using visual attributes (SX, MS, YF), pp. 549–552.
ICPR-2012-XuanSCS #algorithm- An Enhanced EM algorithm using maximum entropy distribution as initial condition (GX, YQS, PC, PS), pp. 849–852.
ICPR-2012-XuGN #image- Morphological filtering in shape spaces: Applications using tree-based image representations (YX, TG, LN), pp. 485–488.
ICPR-2012-YagiMM #online #retrieval #robust #similarity- Robust on-line handwritten object retrieval using a similarity measure based on overlap area of circles (TY, HM, MM), pp. 721–724.
ICPR-2012-YangZLP #3d #optimisation- Coupled 3D tracking and pose optimization of rigid objects using particle filter (HY, YZ, XL, IP), pp. 1451–1454.
ICPR-2012-YlioinasHP #classification- Age Classification in Unconstrained Conditions Using LBP Variants (JY, AH, MP), pp. 1257–1260.
ICPR-2012-Yu #locality #video- Localization and extraction of the four clock-digits using the knowledge of the digital video clock (XY), pp. 1217–1220.
ICPR-2012-ZarifFR #image #multi #performance #similarity- Fast and efficient multichannel image completion using local similarity (SZ, IF, DR), pp. 3116–3119.
ICPR-2012-ZhangFWZJ #image #scalability- Scalable image co-segmentation using color and covariance features (SZ, WF, LW, JZ, JJ), pp. 3708–3711.
ICPR-2012-ZhangH #feature model #recognition- Face recognition using semi-supervised spectral feature selection (ZZ, ERH), pp. 1294–1297.
ICPR-2012-ZhangH12b #estimation- Simultaneous reflectance estimation and surface shape recovery using polarisation (LZ, ERH), pp. 1876–1879.
ICPR-2012-ZhangL #detection- Arbitrarily oriented text detection using geodesic distances between corners and skeletons (YZ, JL), pp. 1896–1899.
ICPR-2012-ZhangLM #composition #multi #recognition- Multi-subregion face recognition using coarse-to-fine Quad-tree decomposition (CZ, XL, TM), pp. 1004–1007.
ICPR-2012-ZhangXSS #modelling #process #recognition #representation #smarttech- Sparse representation for motion primitive-based human activity modeling and recognition using wearable sensors (MZ, WX, AAS, MS), pp. 1807–1810.
ICPR-2012-ZhuoCQYX #algorithm #classification #image #learning- Image classification using HTM cortical learning algorithms (WZ, ZC, YQ, ZY, YX), pp. 2452–2455.
ICPR-2012-ZhuW #gesture #kernel #recognition- Single-frame hand gesture recognition using color and depth kernel descriptors (XZ, KYKW), pp. 2989–2992.
ICPR-2012-ZillyRMWSK #multi- Multi-camera rectification using linearized trifocal tensor (FZ, CR, MM, WW, TS, PK), pp. 2727–2731.
ICPR-2012-ZouKR #image #segmentation #semantics- Semantic image segmentation using region bank (WZ, KK, JR), pp. 922–925.
KDD-2012-BoleyMG #linear- Linear space direct pattern sampling using coupling from the past (MB, SM, TG), pp. 69–77.
KDD-2012-CorreaL #clustering #graph- Locally-scaled spectral clustering using empty region graphs (CDC, PL), pp. 1330–1338.
KDD-2012-GunnemannFS #clustering #modelling #multi- Multi-view clustering using mixture models in subspace projections (SG, IF, TS), pp. 132–140.
KDD-2012-HiraiY #clustering #detection #normalisation- Detecting changes of clustering structures using normalized maximum likelihood coding (SH, KY), pp. 343–351.
KDD-2012-KimLX #image #multi #predict #process #web- Web image prediction using multivariate point processes (GK, FFL, EPX), pp. 1068–1076.
KDD-2012-LiLP #coordination #performance- Fast bregman divergence NMF using taylor expansion and coordinate descent (LL, GL, HP), pp. 307–315.
KDD-2012-RamG - Maximum inner-product search using cone trees (PR, AGG), pp. 931–939.
KDD-2012-YuanZX - Discovering regions of different functions in a city using human mobility and POIs (JY, YZ, XX), pp. 186–194.
KDIR-2012-ArbelaitzGLMPP #adaptation #clustering #mining #navigation #profiling- Adaptation of the User Navigation Scheme using Clustering and Frequent Pattern Mining Techiques for Profiling (OA, IG, AL, JM, JMP, IP), pp. 187–192.
KDIR-2012-BallEC #named #open source #social- Undermining — Social Engineering using Open Source Intelligence Gathering (LB, GE, NC), pp. 275–280.
KDIR-2012-BhattacharjeeBG #data mining #mining #network #optimisation- Product Assortment Decisions for a Network of Retail Stores using Data Mining with Optimization (SB, FB, RDG), pp. 319–323.
KDIR-2012-ChueaphunKMC #nearest neighbour #random #recognition- Lanna Dharma Printed Character Recognition using k-Nearest Neighbor and Conditional Random Fields (CC, AK, SM, JC), pp. 169–174.
KDIR-2012-DuarteFD #clustering #constraints- Evidence Accumulation Clustering using Pairwise Constraints (JMMD, ALNF, FJFD), pp. 293–299.
KDIR-2012-FormosoFCC #performance #recommendation- Using Neighborhood Pre-computation to Increase Recommendation Efficiency (VF, DF, FC, VC), pp. 333–335.
KDIR-2012-IkebeKT #learning #predict #smarttech- Friendship Prediction using Semi-supervised Learning of Latent Features in Smartphone Usage Data (YI, MK, HT), pp. 199–205.
KDIR-2012-MedinaFRF #semantics #wiki- Measuring Entity Semantic Relatedness using Wikipedia (LASM, ALNF, RR, JF), pp. 431–437.
KDIR-2012-Potuzak #algorithm #network #optimisation #search-based- Issues of Optimization of a Genetic Algorithm for Traffic Network Division using a Genetic Algorithm (TP), pp. 340–343.
KEOD-2012-AbdelazzizN #ontology #recommendation- Enhancing the Results of Recommender Systems using Implicit Ontology Relations (LA, KN), pp. 5–14.
KEOD-2012-DiasMS #enterprise #health #ontology- Using Enterprise Ontology for Improving the National Health System — Demonstrated in the Case of a Pharmacy and an Emergency Department (DGD, CM, MMdS), pp. 441–451.
KEOD-2012-GirardiAG #framework #independence #ontology- An Ontology-based Data Acquisition Infrastructure — Using Ontologies to Create Domain-independent Software Systems (DG, KA, MG), pp. 155–160.
KEOD-2012-HmidaCBN #3d #logic- From 9-IM Topological Operators to Qualitative Spatial Relations using 3D Selective Nef Complexes and Logic Rules for Bodies (HBH, CC, FB, CN), pp. 208–213.
KEOD-2012-KawtrakulMCRPNK #latency #social #social media- Improving Disaster Responsiveness using a Mix of Social Media and e-Government (AK, IM, HC, SR, KP, MN, VK), pp. 423–426.
KEOD-2012-KhairMZ #data mining #education #mining #roadmap #student- Creating an Educational Roadmap for Engineering Students via an Optimal and Iterative Yearly Regression Tree using Data Mining (MK, CEM, WZ), pp. 43–52.
KEOD-2012-LiangCI #approach #development- A Product Development System using Knowledge-intensive Support Approach (JSL, KMC, PI), pp. 25–33.
KEOD-2012-MendesASS - Using DEMO-based SLAs for Improving City Council Services (CM, MA, NS, MMdS), pp. 431–440.
KEOD-2012-NogueiraG #programming #set- Recall-driven Product Tracing and Supply Chain Tracking using Answer Set Programming (MLN, NPG), pp. 125–133.
KEOD-2012-SchlenoffFB #approach #ontology #recognition- An Approach to Ontology-based Intention Recognition using State Representations (CS, SF, SB), pp. 178–183.
KEOD-2012-SuzukiF #overview #segmentation #similarity #word- Segmentation of Review Texts by using Thesaurus and Corpus-based Word Similarity (YS, FF), pp. 381–384.
KMIS-2012-Borchardt #information management #social #social media- Using Social Media for Knowledge Management in SME (UB), pp. 31–39.
KMIS-2012-HamadaAS #generative #learning- A Generation Method of Reference Operation using Reinforcement Learning on Project Manager Skill-up Simulator (KH, MA, MS), pp. 15–20.
KMIS-2012-MarsanCE #analysis #behaviour #enterprise #framework #information management #platform #scalability #tool support- Factors Influencing the Behavioral Intention of using Enterprise 2.0 Tools as a Knowledge Management Platform — An Analysis of the UTAUT Model in an Large Real Estate Company (BM, LC, EE), pp. 281–284.
KMIS-2012-NgocIC #case study #modelling- Modeling of Indicators using UTL — A Study Case with Hop3x System (DPTN, SI, CC), pp. 269–272.
KMIS-2012-OtsukiAS - An Improvement Method of User Operations using Decision Tree on Project Manager Skill-up Simulator (MO, MA, MS), pp. 158–163.
KR-2012-ChaudhriS #knowledge base #programming #reasoning #set #specification- Specifying and Reasoning with Underspecified Knowledge Bases Using Answer Set Programming (VKC, TCS).
KR-2012-MorettiT #ranking #set- Ranking Sets of Possibly Interacting Objects Using Shapley Extensions (SM, AT).
MLDM-2012-Ba-KaraitSS #classification #hybrid #optimisation- EEG Signals Classification Using a Hybrid Method Based on Negative Selection and Particle Swarm Optimization (NOSBK, SMS, RS), pp. 427–438.
MLDM-2012-CarvalhoPS #classification #image- Classification of Breast Tissues in Mammographic Images in Mass and Non-mass Using McIntosh’s Diversity Index and SVM (PMdSC, ACdP, ACS), pp. 482–494.
MLDM-2012-KalpakisYHMSSS #analysis #permutation #predict- Outcome Prediction for Patients with Severe Traumatic Brain Injury Using Permutation Entropy Analysis of Electronic Vital Signs Data (KK, SY, PFMH, CFM, LGS, DMS, TMS), pp. 415–426.
MLDM-2012-MondalPMMB #approach #clustering #concept analysis #mining- A New Approach for Association Rule Mining and Bi-clustering Using Formal Concept Analysis (KCM, NP, AM, UM, SB), pp. 86–101.
MLDM-2012-Moreira-MatiasMGB #categorisation #classification #matrix- Text Categorization Using an Ensemble Classifier Based on a Mean Co-association Matrix (LMM, JMM, JG, PB), pp. 525–539.
MLDM-2012-NascimentoPS #classification #image- Lung Nodules Classification in CT Images Using Shannon and Simpson Diversity Indices and SVM (LBN, ACdP, ACS), pp. 454–466.
MLDM-2012-SapkotaBS #grammar inference #principle- Unsupervised Grammar Inference Using the Minimum Description Length Principle (US, BRB, APS), pp. 141–153.
MLDM-2012-SinghCS #approach #hybrid #performance #recognition- A Hybrid Approach to Increase the Performance of Protein Folding Recognition Using Support Vector Machines (LS, GC, DS), pp. 660–668.
MLDM-2012-TaTB #approach #clustering #data type- Clustering Data Stream by a Sub-window Approach Using DCA (MTT, LTHA, LBA), pp. 279–292.
MLDM-2012-VlaseMI #clustering #metadata- Improvement of K-means Clustering Using Patents Metadata (MV, DM, AI), pp. 293–305.
MLDM-2012-XuCG #concept #learning #multi- Constructing Target Concept in Multiple Instance Learning Using Maximum Partial Entropy (TX, DKYC, IG), pp. 169–182.
RecSys-2012-BelloginP #clustering #collaboration #graph- Using graph partitioning techniques for neighbour selection in user-based collaborative filtering (AB, JP), pp. 213–216.
RecSys-2012-DeDGM #difference #learning- Local learning of item dissimilarity using content and link structure (AD, MSD, NG, PM), pp. 221–224.
RecSys-2012-Lathia #health- Using ratings to profile your health (NL), pp. 303–304.
RecSys-2012-Ninaus #heuristic #recommendation #requirements- Using group recommendation heuristics for the prioritization of requirements (GN), pp. 329–332.
RecSys-2012-PhelanMS #named #realtime #twitter- Yokie: explorations in curated real-time search & discovery using twitter (OP, KM, BS), pp. 307–308.
RecSys-2012-YangSGL #network #on the #recommendation #social- On top-k recommendation using social networks (XY, HS, YG, YL), pp. 67–74.
SEKE-2012-AlbuquerquePL #approach #case study #experience #natural language #requirements #reuse- Reuse of Experiences Applied to Requirements Engineering: An Approach Based on Natural Language Processing (AA, VP, TL), pp. 574–577.
SEKE-2012-AlvesGBMA #named- SciprovMiner: Provenance Capture Using the OPM Model (TOMA, WG, RMMB, MAM, WA), pp. 491–494.
SEKE-2012-DagninoSR #fault #machine learning- Forecasting Fault Events in Power Distribution Grids Using Machine Learning (AD, KS, LR), pp. 458–463.
SEKE-2012-DingS #architecture #collaboration #mobile- Proactive Two Way Mobile Advertisement Using a Collaborative Client Server Architecture (WD, XS), pp. 768–773.
SEKE-2012-El-SherifFE #concept #learning #multi #network #social- Using Social Networks for Learning New Concepts in Multi-Agent Systems (SMES, BHF, AE), pp. 261–266.
SEKE-2012-FarfelederMK #elicitation #locality #requirements #semantics- Using Semantic Relatedness and Locality for Requirements Elicitation Guidance (SF, TM, AK), pp. 19–24.
SEKE-2012-FreireCAK #monitoring #process #statistics #workflow- Software Process Monitoring Using Statistical Process Control Integrated in Workflow Systems (MAF, DAdC, EA, UK), pp. 557–562.
SEKE-2012-HumayunG #empirical #trust- An Empirical Study on Improving Trust among GSD Teams Using KMR (MH, GC), pp. 131–134.
SEKE-2012-JangidPE #analysis #mobile #predict #sentiment- A Mobile Application for Stock Market Prediction Using Sentiment Analysis (KJ, PP, ME), pp. 13–18.
SEKE-2012-Lozano-FuentesGBSEWHGT - Using Cell Phones for Mosquito Vector Surveillance and Control (SLF, SG, JMB, DS, LE, FW, EHG, JGR, DTC), pp. 763–767.
SEKE-2012-MarchettiG #framework #logic #model transformation- Model Transformation for Frameworks Using Logical Planning (GAM, ESG), pp. 563–569.
SEKE-2012-MaZQQXY #analysis #dependence #design pattern #identification- Identification of Design Patterns Using Dependence Analysis (WM, XZ, XQ, JQ, LX, RY), pp. 289–292.
SEKE-2012-PittoliSN #monitoring #network- Investigating the Use of Bayesian Networks as a Support Tool for Monitoring Software Projects (FP, ALRdS, DJN), pp. 570–573.
SEKE-2012-RiveroC #usability #web- Using the Results from a Systematic Mapping Extension to Define a Usability Inspection Method for Web Applications (LR, TC), pp. 582–587.
SEKE-2012-SalamahEO #automaton #consistency #ltl- Consistency Checks of System Properties Using LTL and Büchi Automata (SS, ME, OO), pp. 39–44.
SEKE-2012-SalamiA #algorithm #diagrams #framework #retrieval #search-based- A Framework for Class Diagram Retrieval Using Genetic Algorithm (HOS, MAA), pp. 737–740.
SEKE-2012-ShinKKJR #configuration management #dependence #impact analysis- Reconfiguration of Robot Applications using Data Dependency and Impact Analysis (MES, TK, SK, SJ, MR), pp. 684–687.
SEKE-2012-SunLTZ #impact analysis #testing- Using FCA-based Change Impact Analysis for Regression Testing (XS, BL, CT, QZ), pp. 452–457.
SEKE-2012-VieiraVNC #elicitation #empirical- Using Empirical Studies to Evaluate the REMO Requirement Elicitation Technique (SRCV, DV, RdN, TC), pp. 33–38.
SEKE-2012-ZhuLLCZJ #continuation #difference #logic #verification- HybridUML Based Verification of CPS Using Differential Dynamic Logic (MZ, BL, JL, QC, XZ, SJ), pp. 235–238.
SIGIR-2012-BenderskyC #dependence #higher-order #information retrieval #modelling #query- Modeling higher-order term dependencies in information retrieval using query hypergraphs (MB, WBC), pp. 941–950.
SIGIR-2012-ChaC #analysis #modelling #topic- Social-network analysis using topic models (YC, JC), pp. 565–574.
SIGIR-2012-ChandarC #documentation #novel #retrieval- Using preference judgments for novel document retrieval (PC, BC), pp. 861–870.
SIGIR-2012-ChandarC12a #rank- Using PageRank to infer user preferences (PC, BC), pp. 1167–1168.
SIGIR-2012-Cummins #modelling #monte carlo #performance #predict #simulation- Investigating performance predictors using monte carlo simulation and score distribution models (RC), pp. 1097–1098.
SIGIR-2012-Ghosh #information retrieval- Improving e-discovery using information retrieval (KG), p. 996.
SIGIR-2012-HuangWBW #modelling #process- Improving searcher models using mouse cursor activity (JH, RWW, GB, KW), pp. 195–204.
SIGIR-2012-HuO #classification #dataset- Genre classification for million song dataset using confidence-based classifiers combination (YH, MO), pp. 1083–1084.
SIGIR-2012-Khatiban #mining #trust- Building reputation and trust using federated search and opinion mining (SK), p. 994.
SIGIR-2012-Ko #case study #classification- A study of term weighting schemes using class information for text classification (YK), pp. 1029–1030.
SIGIR-2012-LieblingBW - Anticipatory search: using context to initiate search (DJL, PNB, RWW), pp. 1035–1036.
SIGIR-2012-LiuBC #behaviour #interactive #personalisation- Personalization of search results using interaction behaviors in search sessions (CL, NJB, MJC), pp. 205–214.
SIGIR-2012-MahdabiAKC #automation #concept #predict #query #refinement- Automatic refinement of patent queries using concept importance predictors (PM, LA, MK, FC), pp. 505–514.
SIGIR-2012-MarquesL #information retrieval #java #visual notation- Visual information retrieval using Java and LIRE (OM, ML), p. 1193.
SIGIR-2012-MinLLSJ #image #multi #platform- Multi-platform image search using tag enrichment (JM, CL, JL, DS, GJFJ), p. 1018.
SIGIR-2012-ONeil #ranking #sentiment- Entity sentiment extraction using text ranking (JO), p. 1024.
SIGIR-2012-ShuklaLT - Parallelizing ListNet training using spark (SS, ML, AT), pp. 1127–1128.
SIGIR-2012-Sun #classification #word- Short text classification using very few words (AS), pp. 1145–1146.
SIGIR-2012-TranF #information retrieval #interactive- Using eye-tracking with dynamic areas of interest for analyzing interactive information retrieval (VTT, NF), pp. 1165–1166.
ECMFA-2012-BurtonPRKPS #modelling #problem- Solving Acquisition Problems Using Model-Driven Engineering (FRB, RFP, LMR, DSK, SMP, SS), pp. 428–443.
ICMT-2012-SenMTC #model transformation #modelling- Using Models of Partial Knowledge to Test Model Transformations (SS, JMM, MT, JC), pp. 24–39.
ICMT-2012-VallecilloG #model transformation #type system- Typing Model Transformations Using Tracts (AV, MG), pp. 56–71.
MoDELS-2012-AranegaEM #feature model #model transformation- Using Feature Model to Build Model Transformation Chains (VA, AE, SM), pp. 562–578.
MoDELS-2012-BehjatiYB #approach #modelling #reuse #similarity- A Modeling Approach to Support the Similarity-Based Reuse of Configuration Data (RB, TY, LCB), pp. 497–513.
MoDELS-2012-ButtnerEC #atl #off the shelf #on the #smt #verification- On Verifying ATL Transformations Using “off-the-shelf” SMT Solvers (FB, ME, JC), pp. 432–448.
MoDELS-2012-ShinJB #analysis #empirical #evaluation #modelling #mutation testing #test coverage- Empirical Evaluation on FBD Model-Based Test Coverage Criteria Using Mutation Analysis (DS, EJ, DHB), pp. 465–479.
PLEASE-2012-BaumgartFP #approach #certification #component #functional #performance #safety #towards- Towards efficient functional safety certification of construction machinery using a component-based approach (SB, JF, SP), pp. 1–4.
PLEASE-2012-QuintonDHMC #feature model #modelling- Using feature modelling and automations to select among cloud solutions (CQ, LD, PH, SM, EC), pp. 17–20.
SPLC-2012-HeiderRGL #impact analysis #modelling #testing #variability- Using regression testing to analyze the impact of changes to variability models on products (WH, RR, PG, DL), pp. 196–205.
OOPSLA-2012-Anderson #fine-grained #parallel #policy #resource management- Efficiently combining parallel software using fine-grained, language-level, hierarchical resource management policies (ZRA), pp. 717–736.
OOPSLA-2012-BocqD #monad #named #network #process #streaming #virtual machine- Molecule: using monadic and streaming I/O to compose process networks on the JVM (SB, KD), pp. 315–334.
OOPSLA-2012-KulkarniC #compilation #machine learning #optimisation #problem- Mitigating the compiler optimization phase-ordering problem using machine learning (SK, JC), pp. 147–162.
OOPSLA-2012-RosuS #logic #reachability- Checking reachability using matching logic (GR, AS), pp. 555–574.
OOPSLA-2012-SiddiquiK #analysis #execution #scalability #symbolic computation- Scaling symbolic execution using ranged analysis (JHS, SK), pp. 523–536.
TOOLS-EUROPE-2012-MehnertA #type system #verification- Verification of Snapshotable Trees Using Access Permissions and Typestate (HM, JA), pp. 187–201.
TOOLS-EUROPE-2012-SoekenWD #behaviour #development #natural language- Assisted Behavior Driven Development Using Natural Language Processing (MS, RW, RD), pp. 269–287.
AdaEurope-2012-GregertsenS #execution #hardware #performance- Improving the Performance of Execution Time Control by Using a Hardware Time Management Unit (KNG, AS), pp. 177–192.
HILT-2012-BeltCHR #ada #automation #contract #verification- Leading-edge Ada verification technologies: highly automated Ada contract checking using bakar kiasan (JB, PC, JH, R), pp. 3–4.
HILT-2012-Leino12a #proving #verification #why- Program proving using intermediate verification languages (IVLs) like boogie and why3 (KRML), pp. 25–26.
HILT-2012-Taft #divide and conquer #manycore #named #programming #tutorial- Tutorial: multicore programming using divide-and-conquer and work stealing (STT), pp. 13–14.
PADL-2012-BalducciniL #aspect-oriented #tool support- Practical and Methodological Aspects of the Use of Cutting-Edge ASP Tools (MB, YL), pp. 78–92.
PADL-2012-GillN #logic- Handshaking in Kansas Lava Using Patch Logic (AG, BN), pp. 212–226.
PADL-2012-HaveC #performance #program transformation- Efficient Tabling of Structured Data Using Indexing and Program Transformation (CTH, HC), pp. 93–107.
PEPM-2012-HirzelG #metaprogramming- Streams that compose using macros that oblige (MH, BG), pp. 141–150.
PLDI-2012-DilligDA #abduction #automation #fault- Automated error diagnosis using abductive inference (ID, TD, AA), pp. 181–192.
PPDP-2012-SulzmannL #regular expression- Regular expression sub-matching using partial derivatives (MS, KZML), pp. 79–90.
QAPL-2012-BelardinelliGL #automation #protocol #quantum #verification- Automated Verification of Quantum Protocols using MCMAS (FB, PG, AL), pp. 48–62.
SAS-2012-HoweK #analysis #parametricity- Polyhedral Analysis Using Parametric Objectives (JMH, AK), pp. 41–57.
SAS-2012-SanchezSSC #generative #invariant #self- Invariant Generation for Parametrized Systems Using Self-reflection — (Extended Version) (AS, SS, CS, BYEC), pp. 146–163.
RE-2012-BerenbachSN #industrial #modelling #requirements- The use of a requirements modeling language for industrial applications (BB, FS, HN), pp. 285–290.
RE-2012-FerrariG #detection- Using collective intelligence to detect pragmatic ambiguities (AF, SG), pp. 191–200.
RE-2012-Ott #fault #legacy #natural language #specification- Defects in natural language requirement specifications at Mercedes-Benz: An investigation using a combination of legacy data and expert opinion (DO), pp. 291–296.
REFSQ-2012-DaramolaMSB #perspective #reasoning #requirements #research #semantics- Managing Implicit Requirements Using Semantic Case-Based Reasoning Research Preview (OD, TM, GS, SB), pp. 172–178.
SAC-PL-J-2009-J-CervelleFLR12 #implementation #parsing- Banzai+Tatoo: Using cutting-edge parsers for implementing high-performance servers (JC, RF, GL, GR), pp. 990–1005.
ASE-2012-AlmorsyGI #analysis #automation- Supporting automated vulnerability analysis using formalized vulnerability signatures (MA, JG, ASI), pp. 100–109.
ASE-2012-AlmorsyGI12a #automation #re-engineering- Supporting automated software re-engineering using re-aspects (MA, JG, ASI), pp. 230–233.
ASE-2012-AmalfitanoFTCM #android #automation #testing #user interface- Using GUI ripping for automated testing of Android applications (DA, ARF, PT, SDC, AMM), pp. 258–261.
ASE-2012-FaunesSB #algorithm #generative #model transformation- Generating model transformation rules from examples using an evolutionary algorithm (MF, HAS, MB), pp. 250–253.
ASE-2012-GopinathZK #effectiveness #fault #locality #specification- Improving the effectiveness of spectra-based fault localization using specifications (DG, RNZ, SK), pp. 40–49.
ASE-2012-HarmanLJWAC #challenge #programming #search-based #source code- The GISMOE challenge: constructing the pareto program surface using genetic programming to find better programs (MH, WBL, YJ, DRW, AA, JAC), pp. 1–14.
ASE-2012-IbrahimGHA #ambiguity #analysis #kernel #operating system #points-to- Supporting operating system kernel data disambiguation using points-to analysis (ASI, JG, JHHH, MA), pp. 234–237.
ASE-2012-KahkonenSH #automation #parallel #source code #testing #thread- Using unfoldings in automated testing of multithreaded programs (KK, OS, KH), pp. 150–159.
ASE-2012-LuCC #fault #learning #predict #reduction- Software defect prediction using semi-supervised learning with dimension reduction (HL, BC, MC), pp. 314–317.
ASE-2012-Lutz0D #collaboration #mobile #requirements- Using mobile devices for collaborative requirements engineering (RL, SS, SD), pp. 298–301.
ASE-2012-NijjarB #bound #smt #verification- Unbounded data model verification using SMT solvers (JN, TB), pp. 210–219.
ASE-2012-RubinC #difference #set- Locating distinguishing features using diff sets (JR, MC), pp. 242–245.
FSE-2012-ZaeemK #generative #programming- Test input generation using dynamic programming (RNZ, SK), p. 34.
ICSE-2012-AlkhalafBG #analysis #string #validation #verification- Verifying client-side input validation functions using string analysis (MA, TB, JLG), pp. 947–957.
ICSE-2012-Bavota #refactoring #semantics- Using structural and semantic information to support software refactoring (GB), pp. 1479–1482.
ICSE-2012-Chioasca #automation #machine learning #model transformation #requirements- Using machine learning to enhance automated requirements model transformation (EVC), pp. 1487–1490.
ICSE-2012-CookHSS #compilation #composition #specification #verification- Specification engineering and modular verification using a web-integrated verifying compiler (CTC, HKH, HS, MS), pp. 1379–1382.
ICSE-2012-DevosPDBMA #case study #industrial #performance #reuse #smarttech- Efficient reuse of domain-specific test knowledge: An industrial case in the smart card domain (ND, CP, JCD, RB, BM, GA), pp. 1123–1132.
ICSE-2012-Dilshener #concept #information retrieval- Improving information retrieval-based concept location using contextual relationships (TD), pp. 1499–1502.
ICSE-2012-Ghardallou #analysis #invariant #termination- Using invariant relations in the termination analysis of while loops (WG), pp. 1519–1522.
ICSE-2012-Johnson #case study #question #static analysis #tool support #why- A study on improving static analysis tools: Why are we not using them? (BJ), pp. 1607–1609.
ICSE-2012-KimKKJ #approach #case study #industrial #testing- Industrial application of concolic testing approach: A case study on libexif by using CREST-BV and KLEE (YK, MK, YJK, YJ), pp. 1143–1152.
ICSE-2012-Mendes #case study #elicitation #estimation #industrial #lessons learnt #web- Using knowledge elicitation to improve Web effort estimation: Lessons from six industrial case studies (EM), pp. 1112–1121.
ICSE-2012-NaganoNKAHUF #mining #repository #scalability- Using the GPGPU for scaling up Mining Software Repositories (RN, HN, YK, BA, KH, NU, AF), pp. 1435–1436.
ICSE-2012-NguyenKWF #array #dynamic analysis #invariant #polynomial- Using dynamic analysis to discover polynomial and array invariants (TN, DK, WW, SF), pp. 683–693.
ICSE-2012-SamirniSAMTH #automation #constraints #fault #generative #html #php #string #theorem proving- Automated repair of HTML generation errors in PHP applications using string constraint solving (HS, MS, SA, TDM, FT, LJH), pp. 277–287.
ICSE-2012-Shang #developer- Bridging the divide between software developers and operators using logs (WS), pp. 1583–1586.
ICSE-2012-SingerS #re-engineering #social- Influencing the adoption of software engineering methods using social software (LS, KS), pp. 1325–1328.
ICSE-2012-SongPF #interactive #named- iTree: Efficiently discovering high-coverage configurations using interaction trees (CS, AP, JSF), pp. 903–913.
ICSE-2012-SusB #education #integration #re-engineering- Using continuous integration of code and content to teach software engineering with limited resources (JGS, WB), pp. 1175–1184.
ICSE-2012-TreudeGGS #development #interactive #named #visualisation- WorkItemExplorer: Visualizing software development tasks using an interactive exploration environment (CT, PG, LG, MADS), pp. 1399–1402.
ICSE-2012-VakilianCNRBJ #automation #refactoring- Use, disuse, and misuse of automated refactorings (MV, NC, SN, BAR, BPB, REJ), pp. 233–243.
ICSE-2012-Vetro #automation #identification #static analysis #technical debt- Using automatic static analysis to identify technical debt (AV), pp. 1613–1615.
ICSE-2012-Yu #analysis #identification- Improving failure-inducing changes identification using coverage analysis (KY), pp. 1604–1606.
SAC-2012-AbdullahRTN #performance- Efficient matching of SPARQL subscriptions using rete (HA, MR, ST, EN), pp. 372–377.
SAC-2012-BernardiH #contract #modelling- Modelling session types using contracts (GB, MH), pp. 1941–1946.
SAC-2012-CarvalhoSG #adaptation #fuzzy #segmentation- Texture fuzzy segmentation using adaptive affinity functions (BMC, TSS, EG), pp. 51–53.
SAC-2012-ChenGZG #metric #network #similarity- Discovering missing links in networks using vertex similarity measures (HHC, LG, X(Z, CLG), pp. 138–143.
SAC-2012-ChenZD #algorithm #effectiveness #search-based #segmentation- Effective radical segmentation of offline handwritten Chinese characters by using an enhanced snake model and Genetic Algorithm (ZC, BZ, SD), pp. 54–55.
SAC-2012-ChhelLGS #biology #multi- Minimum multiple characterization of biological data using partially defined boolean formulas (FC, FL, AG, FS), pp. 1399–1405.
SAC-2012-ChoeYYR #algorithm #automation #realtime #scheduling #search-based- Real-time scheduling of twin stacking cranes in an automated container terminal using a genetic algorithm (RC, HY, YY, KRR), pp. 238–243.
SAC-2012-ChunM #health #integration #semantics #social #web- Social health data integration using semantic Web (SAC, BM), pp. 392–397.
SAC-2012-DasguptaK #analysis #precise- Precise shape analysis using field sensitivity (SD, AK), pp. 1300–1307.
SAC-2012-DavtyanKMRS #encryption- Integrity of electronic voting systems: fallacious use of cryptography (SD, AK, LM, AR, AAS), pp. 1486–1493.
SAC-2012-DayehH #biology #network- Analyzing incomplete biological pathways using network motifs (MED, MH), pp. 1355–1360.
SAC-2012-DiasDHS #sorting #symmetry- Sorting genomes using almost-symmetric inversions (ZD, UD, LSH, JCS), pp. 1368–1374.
SAC-2012-FkiJST #approach #composition #flexibility- A flexible approach for service composition using service patterns (EF, MJ, CSD, ST), pp. 1976–1983.
SAC-2012-FouqueLV #fault- Using faults for buffer overflow effects (PAF, DL, FV), pp. 1638–1639.
SAC-2012-HasegawaT #distance #invariant- Affine invariant shape matching using radon transform and dynamic time warping distance (MH, ST), pp. 777–781.
SAC-2012-HopRFH #ontology #visualisation- Using Hierarchical Edge Bundles to visualize complex ontologies in GLOW (WH, SdR, FF, FH), pp. 304–311.
SAC-2012-JeonC #javascript #jit #reuse- Reuse of JIT compiled code in JavaScript engine (SJ, JC), pp. 1840–1842.
SAC-2012-KamieHK #clustering #effectiveness #video #web- Effective web video clustering using playlist information (MK, TH, HK), pp. 949–956.
SAC-2012-KangJC #3d #scalability #video- Scalable depth map coding for 3D video using contour information (JK, HJ, KC), pp. 1028–1029.
SAC-2012-KuttyCN #modelling #recommendation- A people-to-people recommendation system using tensor space models (SK, LC, RN), pp. 187–192.
SAC-2012-MaamarFLH #implementation #social #specification #web #web service- Specifying and implementing social Web services operation using commitments (ZM, NF, ML, SH), pp. 1955–1960.
SAC-2012-MahdianGTM #smarttech- Location based routing using smartphones in an infrastructureless environment (AM, HG, ST, SM), pp. 594–599.
SAC-2012-MajchrzakS #agile #development #testing #web- Using spring Roo for the test-driven development of Web applications (TAM, AS), pp. 664–671.
SAC-2012-MaloneG #case study #groovy- A case study in the use of Groovy and Grails (KM, JG), pp. 1254–1255.
SAC-2012-MaruhashiTT #identification- A method for identification of moving objects by integrative use of a camera and accelerometers (NM, TT, MT), pp. 1–6.
SAC-2012-MbarekKPA #design #modelling #power management- Using model driven engineering to reliably accelerate early Low Power Intent Exploration for a system-on-chip design (OM, AK, AP, MA), pp. 1580–1587.
SAC-2012-MenorPB #kernel #predict #probability- Probabilistic prediction of protein phosphorylation sites using kernel machines (MM, GP, KB), pp. 1393–1398.
SAC-2012-NagarAB #functional #graph #similarity- Computing gene functional similarity using combined graphs (AN, HAM, SB), pp. 1381–1386.
SAC-2012-OliveiraCS #bound #on the- On using adversary simulators to obtain tight lower bounds for response times (RSdO, AC, RAS), pp. 1573–1579.
SAC-2012-OSullivanWL #design #integer- Designing data storage tier using Integer Programing (MJO, CGW, DL), pp. 426–433.
SAC-2012-ParraRMRDS #adaptation #constraints #optimisation #self #variability- Using constraint-based optimization and variability to support continuous self-adaptation (CAP, DR, SM, RR, LD, LS), pp. 486–491.
SAC-2012-QiCLHW #collaboration- Using inferred tag ratings to improve user-based collaborative filtering (QQ, ZC, JL, CH, QW), pp. 2008–2013.
SAC-2012-RajeDFRR #data access #implementation #ontology- Using ontology-based methods for implementing role-based access control in cooperative systems (SR, CD, MF, RR, JR), pp. 763–764.
SAC-2012-SarroMFG #algorithm #analysis #fault #predict #search-based- A further analysis on the use of Genetic Algorithm to configure Support Vector Machines for inter-release fault prediction (FS, SDM, FF, CG), pp. 1215–1220.
SAC-2012-SchluterC #correlation #detection #markov #modelling #predict- Hidden markov model-based time series prediction using motifs for detecting inter-time-serial correlations (TS, SC), pp. 158–164.
SAC-2012-SouzaPEMOW #navigation #network- Vision and GPS-based autonomous vehicle navigation using templates and artificial neural networks (JRS, GP, GBE, CCTM, FSO, DFW), pp. 280–285.
SAC-2012-SwainCNB #analysis #markov #performance- Performance analysis of IEEE 802.11 IBSS power save mode using a discrete-time markov model (PS, SC, SN, PB), pp. 631–633.
SAC-2012-WickerPK #classification #composition #matrix #multi- Multi-label classification using boolean matrix decomposition (JW, BP, SK), pp. 179–186.
SAC-2012-ZaraketNSJ #architecture #library #parallel #source code- Portable Parallel Programs using architecture-aware libraries (FAZ, MN, MS, AJ), pp. 1922–1924.
SLE-2012-AfroozehBBJMMS #gll #grammarware #semiparsing- Island Grammar-Based Parsing Using GLL and Tom (AA, JCB, MvdB, AJ, MM, PEM, ES), pp. 224–243.
SLE-2012-Storey #challenge #design #ontology #social- Addressing Cognitive and Social Challenges in Designing and Using Ontologies in the Biomedical Domain (MADS), pp. 1–3.
ASPLOS-2012-ClementsKZ #scalability- Scalable address spaces using RCU balanced trees (ATC, MFK, NZ), pp. 199–210.
ASPLOS-2012-LeeS #architecture #scheduling- Region scheduling: efficiently using the cache architectures via page-level affinity (ML, KS), pp. 451–462.
ASPLOS-2012-LinWLZ #named #power management #smarttech- Reflex: using low-power processors in smartphones without knowing them (FXL, ZW, RL, LZ), pp. 13–24.
CASE-2012-Chang #detection #fault #feature model #process- Fault detection for plasma-enhanced chemical vapor deposition process using feature extraction (YJC), pp. 491–496.
CASE-2012-ChowdhuryTWSLG #automation #biology- Automated indirect transport of biological cells with optical tweezers using planar gripper formations (SC, AT, CW, PS, WL, SKG), pp. 267–272.
CASE-2012-DinhamF #detection- Weld seam detection using computer vision for robotic Arc Welding (MD, GF), pp. 771–776.
CASE-2012-DotoliFIR #agile #modelling #simulation- A lean manufacturing strategy using Value Stream Mapping, the Unified Modeling Language, and discrete event simulation (MD, MPF, GI, GR), pp. 668–673.
CASE-2012-FelekisWMRBSN #automation- Automated stiffness characterization of living tobacco BY2 cells using the Cellular Force Microscope (DF, AW, SM, ALRK, FB, RSS, BJN), pp. 285–290.
CASE-2012-FrankHEFDV #automation #modelling #realtime #requirements- Using contact points to integrate discipline spanning real-time requirements in modeling Networked Automation Systems for manufacturing systems (TF, TH, KE, AF, CD, BVH), pp. 851–856.
CASE-2012-HeZWZ #identification- Identification of dynamic posture in lower extremity using optical fiber sensor (CH, XZ, YW, ZZ), pp. 1057–1060.
CASE-2012-IsmailDH #higher-order- Observer-based trajectory tracking for a class of underactuated Lagrangian systems using higher-order sliding modes (RMTRI, TDN, QPH), pp. 1204–1209.
CASE-2012-JoKOO #feedback- Contact force control of a robotic hand using F/T sensory feedback with a rigid object (JJ, SKK, YO, SRO), pp. 436–441.
CASE-2012-JungCKM #detection- Collision detection using band designed Disturbance Observer (BjJ, HRC, JK, HM), pp. 1080–1085.
CASE-2012-KawarazakiY #recognition #speech- Remote control system of home electrical appliances using speech recognition (NK, TY), pp. 761–764.
CASE-2012-KimKHHL #framework #platform- A robot platform for unmanned weeding in a paddy field using sensor fusion (GHK, SCK, YKH, KSH, SGL), pp. 904–907.
CASE-2012-KimKS #algorithm #detection #recognition- Hole detection algorithm for square peg-in-hole using force-based shape recognition (YLK, BSK, JBS), pp. 1074–1079.
CASE-2012-KimKYOO #navigation- Actionable topological mapping for navigation using nearby objects (JK, JK, SY, YO, SO), pp. 1162–1167.
CASE-2012-KimYSP #detection #visual notation- Window detection for gondola robot using a visual camera (DYK, JY, HS, CWP), pp. 998–1003.
CASE-2012-KurzDP - Sampling Decision System in semiconductor manufacturing using Virtual Metrology (DK, CDL, JP), pp. 74–79.
CASE-2012-LeeB #execution #framework #lifecycle #simulation- Executable simulation lifecycle management framework using extensible and interoperable simulation language (HL, AB), pp. 237–242.
CASE-2012-LeeHJKL #matlab #simulation- Dynamic simulation of radial active magnetic bearing system for high speed rotor using ADAMS and MATLAB co-simulation (KCL, DKH, YHJ, CYK, MCL), pp. 880–885.
CASE-2012-LiK #automation #automaton #finite #generative #modelling #testing- Model-based automatic test generation for Simulink/Stateflow using extended finite automaton (ML, RK), pp. 857–862.
CASE-2012-LuiP #assembly #difference #evolution #flexibility #scheduling- Scheduling Flexible Assembly Lines using variants of Differential Evolution (WHVL, SGP), pp. 594–599.
CASE-2012-Ralston #automation- Automated longwall shearer horizon control using thermal infrared-based seam tracking (JCR), pp. 20–25.
CASE-2012-RyuOC - COM control of dual arm robot using COM Jacobian (KR, YO, MC), pp. 1071–1073.
CASE-2012-ShinPB #2d #3d #estimation- 6DOF pose estimation using 2D-3D sensor fusion (YDS, JHP, MB), pp. 714–717.
CASE-2012-TangLY #nondeterminism- Tracking control of a compliant XY nano-positioner under plant uncertainty using a transfigured loop-shaping H∞ controller (HT, YL, QY), pp. 103–108.
CASE-2012-WangHDS #agile #analysis #protocol #simulation- Analysis of hospital rapid response protocols using simulation (SW, LEH, PD, CHS), pp. 315–322.
CASE-2012-WuY #estimation #linear #markov #metric- State estimation for Markovian Jump Linear System using quantized measurements (HW, HY), pp. 527–531.
CASE-2012-ZhangWZX #fault #memory management- A dynamic memory model for mechanical fault diagnosis using one-class support vector machine (QZ, JW, JZ, GX), pp. 497–501.
CASE-2012-ZhaoLKH #data fusion #locality #simulation- A simulation study of sensor data fusion using UKF for bucket wheel reclaimer localization (SZ, TFL, BK, AH), pp. 1192–1197.
CGO-2012-ParkCA #graph #modelling #predict- Using graph-based program characterization for predictive modeling (EP, JC, MAA), pp. 196–206.
CGO-2012-VankaT #data flow #dependence #performance #profiling- Efficient and accurate data dependence profiling using software signatures (RV, JT), pp. 186–195.
DAC-2012-ChangJC #configuration management #optimisation- Timing ECO optimization using metal-configurable gate-array spare cells (HYC, IHRJ, YWC), pp. 802–807.
DAC-2012-CropPC #detection #logic #throughput- Regaining throughput using completion detection for error-resilient, near-threshold logic (JC, RP, PC), pp. 974–979.
DAC-2012-DonkohLS #adaptation #design #hybrid #predict- A hybrid and adaptive model for predicting register file and SRAM power using a reference design (ED, AL, ES), pp. 62–67.
DAC-2012-ForoutanSP #3d #interface #low cost- Cost-efficient buffer sizing in shared-memory 3D-MPSoCs using wide I/O interfaces (SF, AS, FP), pp. 366–375.
DAC-2012-HamzehSV #morphism #named- EPIMap: using epimorphism to map applications on CGRAs (MH, AS, SBKV), pp. 1284–1291.
DAC-2012-HuangLR #energy #hardware #trade-off- A methodology for energy-quality tradeoff using imprecise hardware (JH, JL, GR), pp. 504–509.
DAC-2012-HuLWR #array #hardware- Hardware realization of BSB recall function using memristor crossbar arrays (MH, HL, QW, GSR), pp. 498–503.
DAC-2012-JungSB #off the shelf- Tracking appliance usage information in residential settings using off-the-shelf low-frequency meters (DJ, AS, AB), pp. 163–168.
DAC-2012-KumarBKV #analysis #predict #source code- Early prediction of NBTI effects using RTL source code analysis (JAK, KMB, HK, SV), pp. 808–813.
DAC-2012-LinMK #logic #satisfiability- Boolean satisfiability using noise based logic (PCKL, AM, SPK), pp. 1260–1261.
DAC-2012-MalburgFF #automation #design #hardware #locality #metric- Automated feature localization for hardware designs using coverage metrics (JM, AF, GF), pp. 941–946.
DAC-2012-MeirR #analysis #biology #named #network #performance- BLAST: efficient computation of nonlinear delay sensitivities in electronic and biological networks using barycentric Lagrange enabled transient adjoint analysis (AM, JSR), pp. 301–310.
DAC-2012-MorrisBZP #logic #named- mLogic: ultra-low voltage non-volatile logic circuits using STT-MTJ devices (DM, DB, JG(Z, LTP), pp. 486–491.
DAC-2012-ParkGMRR #architecture #design #energy #performance- Future cache design using STT MRAMs for improved energy efficiency: devices, circuits and architecture (SPP, SKG, NNM, AR, KR), pp. 492–497.
DAC-2012-SasanianWM #quantum- Realizing reversible circuits using a new class of quantum gates (ZS, RW, DMM), pp. 36–41.
DAC-2012-Suto #design- Rule agnostic routing by using design fabrics (GS), pp. 471–475.
DAC-2012-YuCSJC #design #detection- Accurate process-hotspot detection using critical design rule extraction (YTY, YCC, SS, IHRJ, CC), pp. 1167–1172.
DAC-2012-ZhangTT #identification- Identification of recovered ICs using fingerprints from a light-weight on-chip sensor (XZ, NT, MT), pp. 703–708.
DATE-2012-0002EGB #performance- Area efficient asynchronous SDM routers using 2-stage Clos switches (WS, DAE, JDG, WJB), pp. 1495–1500.
DATE-2012-AridhiZT #order #reduction #simulation #towards- Towards improving simulation of analog circuits using model order reduction (HA, MHZ, ST), pp. 1337–1342.
DATE-2012-BeaumontHN #architecture #execution #hardware #replication #security- SAFER PATH: Security architecture using fragmented execution and replication for protection against trojaned hardware (MRB, BDH, TN), pp. 1000–1005.
DATE-2012-ChatziparaskevasBP #difference #finite #parallel- An FPGA-based parallel processor for Black-Scholes option pricing using finite differences schemes (GC, AB, IP), pp. 709–714.
DATE-2012-CordesM #algorithm #parallel #search-based- Multi-objective aware extraction of task-level parallelism using genetic algorithms (DC, PM), pp. 394–399.
DATE-2012-Gamatie #design #streaming- Design of streaming applications on MPSoCs using abstract clocks (AG), pp. 763–768.
DATE-2012-KatzRZ #csp #generative- Generating instruction streams using abstract CSP (YK, MR, AZ), pp. 15–20.
DATE-2012-LeMKV #debugging #satisfiability- Non-solution implications using reverse domination in a modern SAT-based debugging environment (BL, HM, BK, AGV), pp. 629–634.
DATE-2012-MarianiSPZSB #architecture #configuration management #design #multi #resource management #runtime- Using multi-objective design space exploration to enable run-time resource management for reconfigurable architectures (GM, VMS, GP, VZ, CS, KB), pp. 1379–1384.
DATE-2012-MaricauJG #analysis #learning #multi #reliability- Hierarchical analog circuit reliability analysis using multivariate nonlinear regression and active learning sample selection (EM, DdJ, GGEG), pp. 745–750.
DATE-2012-MarinMLB #design #incremental #verification- Verification of partial designs using incremental QBF solving (PM, CM, MDTL, BB), pp. 623–628.
DATE-2012-MillerVG #automation #cyber-physical #mockup #named #testing- MEDS: Mockup Electronic Data Sheets for automated testing of cyber-physical systems using digital mockups (BM, FV, TG), pp. 1417–1420.
DATE-2012-NarayananDZT #design #verification- Verifying jitter in an analog and mixed signal design using dynamic time warping (RN, AD, MHZ, ST), pp. 1413–1416.
DATE-2012-QianTT #configuration management #self- A flit-level speedup scheme for network-on-chips using self-reconfigurable bi-directional channels (ZQ, YFT, CYT), pp. 1295–1300.
DATE-2012-RoxEG #analysis #design #network- Using timing analysis for the design of future switched based Ethernet automotive networks (JR, RE, PG), pp. 57–62.
DATE-2012-SabrySA #3d- Thermal balancing of liquid-cooled 3D-MPSoCs using channel modulation (MMS, AS, DA), pp. 599–604.
DATE-2012-ShahRK #bound #scheduling- Bounding WCET of applications using SDRAM with Priority Based Budget Scheduling in MPSoCs (HS, AR, AK), pp. 665–670.
DATE-2012-ShoaibJV - Enabling advanced inference on sensor nodes through direct use of compressively-sensed signals (MS, NKJ, NV), pp. 437–442.
DATE-2012-StattelmannGCBR #hybrid #modelling #simulation- Hybrid source-level simulation of data caches using abstract cache models (SS, GG, CC, OB, WR), pp. 376–381.
DATE-2012-WilleDOO #automation #design #power management #synthesis- Automatic design of low-power encoders using reversible circuit synthesis (RW, RD, CO, AGO), pp. 1036–1041.
HPCA-2012-BalakrishnanS #behaviour #named #probability- WEST: Cloning data cache behavior using Stochastic Traces (GB, YS), pp. 387–398.
HPCA-2012-BattleHHR #flexibility- Flexible register management using reference counting (SJB, ADH, MH, AR), pp. 273–284.
HPDC-2012-DelamareFKL #distributed #named- SpeQuloS: a QoS service for BoT applications using best effort distributed computing infrastructures (SD, GF, DK, OL), pp. 173–186.
HPDC-2012-LeeWF #distributed #named #resource management- PonD: dynamic creation of HTC pool on demand using a decentralized resource discovery system (KL, DW, RJOF), pp. 161–172.
ISMM-2012-OCallahan #memory management #question #web #why- Why is your web browser using so much memory? (RO), pp. 1–2.
LCTES-2012-KhudiaWM #embedded #fault #performance- Efficient soft error protection for commodity embedded microprocessors using profile information (DSK, GW, SAM), pp. 99–108.
LCTES-2012-KyleBFLT #embedded #manycore #set #simulation- Efficiently parallelizing instruction set simulation of embedded multi-core processors using region-based just-in-time dynamic binary translation (SCK, IB, BF, HL, NPT), pp. 21–30.
OSDI-2012-KotlaRRSW #data access #hardware #named- Pasture: Secure Offline Data Access Using Commodity Trusted Hardware (RK, TR, IR, PS, BW), pp. 321–334.
PDP-2012-GrutzLFVHDK #parallel- Enabling Parallel Computing of a Brain Connectivity Map Using the MediGRID-Infrastructure and FSL (RG, BL, NKF, FV, AH, FD, DK), pp. 596–602.
PDP-2012-HernandezGCGIS #estimation- Accelerating Fibre Orientation Estimation from Diffusion Weighted Magnetic Resonance Imaging Using GPUs (MH, GDG, JMC, JMG, AI, SNS), pp. 622–626.
PPoPP-2012-TaoBB #development #gpu #kernel #scalability- Using GPU’s to accelerate stencil-based computation kernels for the development of large scale scientific applications on heterogeneous systems (JT, MB, SRB), pp. 287–288.
FASE-2012-SalayFC #independence #modelling #refinement- Language Independent Refinement Using Partial Modeling (RS, MF, MC), pp. 224–239.
FASE-2012-ShiCD #composition #execution #integration #product line #symbolic computation #testing- Integration Testing of Software Product Lines Using Compositional Symbolic Execution (JS, MBC, MBD), pp. 270–284.
FASE-2012-UsaolaML #reduction #testing- Reduction of Test Suites Using Mutation (MPU, PRM, BPL), pp. 425–438.
FoSSaCS-2012-PreugschatW #automaton #effectiveness #logic- Effective Characterizations of Simple Fragments of Temporal Logic Using Prophetic Automata (SP, TW), pp. 135–149.
STOC-2012-AbrahamN - Using petal-decompositions to build a low stretch spanning tree (IA, ON), pp. 395–406.
STOC-2012-KelnerMP #approximate #multi #performance- Faster approximate multicommodity flow using quadratically coupled flows (JAK, GLM, RP), pp. 1–18.
TACAS-2012-FehnkerGHMPT #analysis #automation- Automated Analysis of AODV Using UPPAAL (AF, RJvG, PH, AM, MP, WLT), pp. 173–187.
TACAS-2012-HolzerKSTV #contest #proving #reachability- Proving Reachability Using FShell — (Competition Contribution) (AH, DK, CS, MT, HV), pp. 538–541.
TACAS-2012-LangM #equation #lts #model checking #network- Partial Model Checking Using Networks of Labelled Transition Systems and Boolean Equation Systems (FL, RM), pp. 141–156.
TACAS-2012-ZaeemGKM #data type #satisfiability- History-Aware Data Structure Repair Using SAT (RNZ, DG, SK, KSM), pp. 2–17.
WRLA-2012-Riesco #maude #specification- Using Narrowing to Test Maude Specifications (AR), pp. 201–220.
CAV-2012-EsparzaGK #probability #proving #source code #termination- Proving Termination of Probabilistic Programs Using Patterns (JE, AG, SK), pp. 123–138.
CAV-2012-FredriksonJJRPSY #abstraction #performance #policy #refinement #runtime- Efficient Runtime Policy Enforcement Using Counterexample-Guided Abstraction Refinement (MF, RJ, SJ, TWR, PAP, HS, VY), pp. 548–563.
ICLP-2012-SchandaB #development #programming #set- Using Answer Set Programming in the Development of Verified Software (FS, MB), pp. 72–85.
ICLP-2012-ZomboriCS #constraints #logic programming #static typing #type inference- Static Type Inference for the Q language using Constraint Logic Programming (ZZ, JC, PS), pp. 119–129.
ICLP-J-2012-AreiasR #concurrent #multi #thread #towards- Towards multi-threaded local tabling using a common table space (MA, RR), pp. 427–443.
ICLP-J-2012-BliemMW #declarative #named #problem #programming- D-FLAT: Declarative problem solving using tree decompositions and answer-set programming (BB, MM, SW), pp. 445–464.
ICST-2012-AlesioGNB #constraints #optimisation #realtime #testing- Testing Deadline Misses for Real-Time Systems Using Constraint Optimization Techniques (SDA, AG, SN, LCB), pp. 764–769.
ICST-2012-BorjessonF #automation #case study #comparative #industrial #testing #tool support #user interface #visual notation- Automated System Testing Using Visual GUI Testing Tools: A Comparative Study in Industry (EB, RF), pp. 350–359.
ICST-2012-DucheneGRR #detection #fuzzing #model inference- XSS Vulnerability Detection Using Model Inference Assisted Evolutionary Fuzzing (FD, RG, SR, JLR), pp. 815–817.
ICST-2012-ElrakaibyMT #analysis #mutation testing #policy #testing- Testing Obligation Policy Enforcement Using Mutation Analysis (YE, TM, YLT), pp. 673–680.
ICST-2012-EnderlinDGB #grammarware #php #testing- Grammar-Based Testing Using Realistic Domains in PHP (IE, FD, AG, FB), pp. 509–518.
ICST-2012-GotliebHB #constraints #programming- Minimum Pairwise Coverage Using Constraint Programming Techniques (AG, AH, BB), pp. 773–774.
ICST-2012-GrooteOW #formal method- Analyzing a Controller of a Power Distribution Unit Using Formal Methods (JFG, AO, JHW), pp. 420–428.
ICST-2012-JonssonBSE #automation #scalability #towards- Towards Automated Anomaly Report Assignment in Large Complex Systems Using Stacked Generalization (LJ, DB, KS, SE), pp. 437–446.
ICST-2012-LiuNT #bound #case study #smt #verification- Bounded Program Verification Using an SMT Solver: A Case Study (TL, MN, MT), pp. 101–110.
ICST-2012-MalikK #analysis #graph- Dynamic Shape Analysis Using Spectral Graph Properties (MZM, SK), pp. 211–220.
ICST-2012-MalzJG #fuzzy #logic #testing- Prioritization of Test Cases Using Software Agents and Fuzzy Logic (CM, NJ, PG), pp. 483–486.
ICST-2012-McMinnSS #data type #generative #query #search-based #string #web- Search-Based Test Input Generation for String Data Types Using the Results of Web Queries (PM, MS, MS), pp. 141–150.
ICST-2012-Nguyen #comprehension #detection #performance #scalability- Using Control Charts for Detecting and Understanding Performance Regressions in Large Software (THDN), pp. 491–494.
ICST-2012-PapadakisT #fault- Using Mutants to Locate “Unknown” Faults (MP, YLT), pp. 691–700.
ICST-2012-RaposD #execution #generative #incremental #modelling #symbolic computation #testing #uml- Incremental Test Case Generation for UML-RT Models Using Symbolic Execution (EJR, JD), pp. 962–963.
ICST-2012-ShakyaXLLKK #classification #combinator #testing- Isolating Failure-Inducing Combinations in Combinatorial Testing Using Test Augmentation and Classification (KS, TX, NL, YL, RK, DRK), pp. 620–623.
ICST-2012-WehbiOB #monitoring #security- Events-Based Security Monitoring Using MMT Tool (BW, EMdO, MB), pp. 860–863.
ICST-2012-Wotawa #challenge #constraints #fault #open science #research #source code- Open Research Challenges of Localizing Faults in Programs Using Constraints (FW), pp. 770–771.
ICTSS-2012-LahamiKBJ #adaptation #architecture #design #distributed #problem- Using Knapsack Problem Model to Design a Resource Aware Test Architecture for Adaptable and Distributed Systems (ML, MK, MB, MJ), pp. 103–118.
ICTSS-2012-TaylorHBD #behaviour #testing- Using Behaviour Inference to Optimise Regression Test Sets (RT, MH, KB, JD), pp. 184–199.
IJCAR-2012-JacquelBDD #automation #deduction #modulo theories #proving #theorem proving #verification- Tableaux Modulo Theories Using Superdeduction — An Application to the Verification of B Proof Rules with the Zenon Automated Theorem Prover (MJ, KB, DD, CD), pp. 332–338.
ISSTA-2012-SuiYX #analysis #detection #memory management- Static memory leak detection using full-sparse value-flow analysis (YS, DY, JX), pp. 254–264.
LICS-2012-GrigorieffV #algorithm #bound- Functionals Using Bounded Information and the Dynamics of Algorithms (SG, PV), pp. 345–354.
SAT-2012-TanjoTB #csp #encoding #named #order #satisfiability- Azucar: A SAT-Based CSP Solver Using Compact Order Encoding — (TT, NT, MB), pp. 456–462.
TAP-2012-BengoleaAMF #bound #test coverage #testing- Using Coverage Criteria on RepOK to Reduce Bounded-Exhaustive Test Suites (VSB, NA, DM, MFF), pp. 19–34.
TAP-2012-SenniF #constraints #data type #generative #logic programming #testing- Generation of Test Data Structures Using Constraint Logic Programming (VS, FF), pp. 115–131.
CBSE-2011-TambeG #component #distributed #embedded #realtime- Rectifying orphan components using group-failover in distributed real-time and embedded systems (ST, ASG), pp. 139–148.
ECSA-2011-BruckmannGP #architecture #enterprise #monitoring #realtime #towards- Towards Real-Time Monitoring and Controlling of Enterprise Architectures Using Business Software Control Centers (TB, VG, MP), pp. 287–294.
ECSA-2011-NavarroCPR #architecture #model transformation- Using Model Transformation Techniques for the Superimposition of Architectural Styles (EN, CEC, DEP, CR), pp. 379–387.
ECSA-2011-SilvaB #architecture #specification- A Model for Specifying Rationale Using an Architecture Description Language (LdS, DB), pp. 319–327.
ECSA-2011-TibermacineZ #evolution #quality #requirements #web #web service- Supervising the Evolution of Web Service Orchestrations Using Quality Requirements (CT, TZ), pp. 1–16.
WICSA-2011-TsakirisKM #case study #evaluation #hybrid #industrial #plugin #quality- Evaluation of the Use of Quality Attribute Scenarios in a Plug-In Hybrid Electric Vehicle Controls System — Industrial Case Study (AT, JK, RM), pp. 66–72.
WICSA-2011-Woods #architecture #assessment #industrial- Industrial Architectural Assessment Using TARA (EW), pp. 56–65.
DocEng-2011-RossiR #representation #topic- Building a topic hierarchy using the bag-of-related-words representation (RGR, SOR), pp. 195–204.
DRR-2011-BallS #automation #statistics #tool support- Statistical characterization of handwriting characteristics using automated tools (GRB, SNS), pp. 1–10.
DRR-2011-BukhariSB #algorithm #documentation #image #multi #segmentation- Improved document image segmentation algorithm using multiresolution morphology (SSB, FS, TMB), pp. 1–10.
DRR-2011-ChenCL #constraints #identification- Using perturbed handwriting to support writer identification in the presence of severe data constraints (JC, WC, DPL), pp. 1–10.
DRR-2011-CutterBSB #identification- Font group identification using reconstructed fonts (MPC, JvB, FS, TMB), pp. 1–10.
DRR-2011-HamdaniAHMA #optimisation #recognition- Improving a HMM-based off-line handwriting recognition system using MME-PSO optimization (MH, HEA, TMH, VM, AMA), pp. 1–10.
DRR-2011-KimLT #automation #identification- Automated identification of biomedical article type using support Vector machines (ICK, DXL, GRT), pp. 1–10.
DRR-2011-KunduHBCFJM #online #recognition #tablet- Online medical symbol recognition using a Tablet PC (AK, QH, SB, CC, RF, SJ, SM), pp. 1–10.
DRR-2011-LiuZ #image #mobile- Segmenting texts from outdoor images taken by mobile phones using color features (ZL, HZ), pp. 1–10.
DRR-2011-PengSGS #approach #documentation- Binarization of camera-captured document using A MAP approach (XP, SS, VG, RS), pp. 1–10.
DRR-2011-SaabniE #distance #documentation #word- Word spotting for handwritten documents using Chamfer Distance and Dynamic Time Warping (RS, JES), pp. 1–10.
HT-2011-Contractor #multi #network #web- From disasters to WOW: using web science to understand and enable 21st century multidimensional networks (NSC), pp. 1–2.
HT-2011-GoedeMNW #network #social #summary- Succinct summaries of narrative events using social networks (BdG, MM, AN, JvW), pp. 299–304.
HT-2011-SahW #automation #fuzzy #metadata #mining- Automatic mining of cognitive metadata using fuzzy inference (MS, VW), pp. 37–46.
HT-2011-SeroussiBZ #modelling #personalisation #predict #rating- Personalised rating prediction for new users using latent factor models (YS, FB, IZ), pp. 47–56.
HT-2011-SolisA #experience #hypermedia #wiki- An experience using a spatial hypertext Wiki (CS, NA), pp. 133–142.
HT-2011-TakahashiOYIOT #analysis #wiki- Evaluating significance of historical entities based on tempo-spatial impacts analysis using Wikipedia link structure (YT, HO, MY, HI, SO, KT), pp. 83–92.
ICDAR-2011-AbediF #analysis #documentation #image #locality #string- Localization of Digit Strings in Farsi/Arabic Document Images Using Structural Features and Syntactical Analysis (AA, KF), pp. 728–733.
ICDAR-2011-AlvaroSB #2d #context-free grammar #probability #recognition- Recognition of Printed Mathematical Expressions Using Two-Dimensional Stochastic Context-Free Grammars (FA, JAS, JMB), pp. 1225–1229.
ICDAR-2011-AtanasiuLV #novel #retrieval- Writer Retrieval — Exploration of a Novel Biometric Scenario Using Perceptual Features Derived from Script Orientation (VA, LLS, NV), pp. 628–632.
ICDAR-2011-BaechlerI #analysis #layout #multi- Multi Resolution Layout Analysis of Medieval Manuscripts Using Dynamic MLP (MB, RI), pp. 1185–1189.
ICDAR-2011-BarbozaLP #automation #documentation #summary- Using Readers’ Highlighting on Monochromatic Documents for Automatic Text Transcription and Summarization (RdSB, RDL, VMdSP), pp. 212–216.
ICDAR-2011-BuiVPO #identification #recognition #word- Writer Identification Using TF-IDF for Cursive Handwritten Word Recognition (QAB, MV, SP, JMO), pp. 844–848.
ICDAR-2011-BukhariSB #set- Text-Line Extraction Using a Convolution of Isotropic Gaussian Filter with a Set of Line Filters (SSB, FS, TMB), pp. 579–583.
ICDAR-2011-CaoPN11a #identification #markov #modelling #recognition- Handwritten and Typewritten Text Identification and Recognition Using Hidden Markov Models (HC, RP, PN), pp. 744–748.
ICDAR-2011-CelikY #2d #graph grammar #probability #recognition- Probabilistic Mathematical Formula Recognition Using a 2D Context-Free Graph Grammar (MC, BAY), pp. 161–166.
ICDAR-2011-ColuttoG #difference #performance #recognition #word- Efficient Word Recognition Using a Pixel-Based Dissimilarity Measure (SC, BG), pp. 1110–1114.
ICDAR-2011-CoustatyBBL #algorithm #image #ontology #semantic gap- Using Ontologies to Reduce the Semantic Gap between Historians and Image Processing Algorithms (MC, AB, KB, GL), pp. 156–160.
ICDAR-2011-CoustatyO #documentation #image- Discrimination of Old Document Images Using Their Style (MC, JMO), pp. 389–393.
ICDAR-2011-DuHSS - Snap and Translate Using Windows Phone (JD, QH, LS, JS), pp. 809–813.
ICDAR-2011-EmilieBA #constraints #network #physics #recognition #semantics- Use of Semantic and Physical Constraints in Bayesian Networks for Form Recognition (EP, YB, AB), pp. 946–950.
ICDAR-2011-Epshtein #documentation- Determining Document Skew Using Inter-line Spaces (BE), pp. 27–31.
ICDAR-2011-GarzSD #analysis #layout- Layout Analysis for Historical Manuscripts Using Sift Features (AG, RS, MD), pp. 508–512.
ICDAR-2011-HaddadHKA #adaptation #network #online #recognition- Improvement of On-line Recognition Systems Using a RBF-Neural Network Based Writer Adaptation Module (LH, TMH, MK, AMA), pp. 284–288.
ICDAR-2011-HamamuraINOS #clustering #concurrent #optimisation #recognition #word- Concurrent Optimization of Context Clustering and GMM for Offline Handwritten Word Recognition Using HMM (TH, BI, TN, NO, SS), pp. 523–527.
ICDAR-2011-HassanCG #distance #documentation #edit distance #image- Document Image Indexing Using Edit Distance Based Hashing (EH, SC, MG), pp. 1200–1204.
ICDAR-2011-HuangYCL #documentation #keyword #statistics- Keyword Spotting in Offline Chinese Handwritten Documents Using a Statistical Model (LH, FY, QHC, CLL), pp. 78–82.
ICDAR-2011-HuZ #online #recognition- HMM-Based Recognition of Online Handwritten Mathematical Symbols Using Segmental K-Means Initialization and a Modified Pen-Up/Down Feature (LH, RZ), pp. 457–462.
ICDAR-2011-IndermuhleFFB #documentation #keyword #network #online- Keyword Spotting in Online Handwritten Documents Containing Text and Non-text Using BLSTM Neural Networks (EI, VF, AF, HB), pp. 73–77.
ICDAR-2011-IwamuraKK #image #multi #recognition- Recognition of Multiple Characters in a Scene Image Using Arrangement of Local Features (MI, TK, KK), pp. 1409–1413.
ICDAR-2011-JainD #identification- Offline Writer Identification Using K-Adjacent Segments (RJ, DSD), pp. 769–773.
ICDAR-2011-JiangDLW #algorithm #markov #novel #segmentation #string- A Novel Short Merged Off-line Handwritten Chinese Character String Segmentation Algorithm Using Hidden Markov Model (ZJ, XD, CL, YW), pp. 668–672.
ICDAR-2011-KatoDTIM #recognition- Low Resolution QR-Code Recognition by Applying Super-Resolution Using the Property of QR-Codes (YK, DD, TT, II, HM), pp. 992–996.
ICDAR-2011-KimO #documentation #image #segmentation- Script-Free Text Line Segmentation Using Interline Space Model for Printed Document Images (MK, ISO), pp. 1354–1358.
ICDAR-2011-KleberDS #estimation- Scale Space Binarization Using Edge Information Weighted by a Foreground Estimation (FK, MD, RS), pp. 1180–1184.
ICDAR-2011-KluznerT - Page Curling Correction for Scanned Books Using Local Distortion Information (VK, AT), pp. 890–894.
ICDAR-2011-KonyaES - Character Enhancement for Historical Newspapers Printed Using Hot Metal Typesetting (IVK, SE, CS), pp. 936–940.
ICDAR-2011-KumarD #image #performance- Fast Rule-Line Removal Using Integral Images and Support Vector Machines (JK, DSD), pp. 584–588.
ICDAR-2011-KumarPD #classification #documentation #image #learning #multi- Document Image Classification and Labeling Using Multiple Instance Learning (JK, JP, DSD), pp. 1059–1063.
ICDAR-2011-KunwarR #geometry #online #recognition- Online Handwriting Recognition of Tamil Script Using Fractal Geometry (RK, AGR), pp. 1389–1393.
ICDAR-2011-LeBS #documentation #image- Ternary Entropy-Based Binarization of Degraded Document Images Using Morphological Operators (THNL, TDB, CYS), pp. 114–118.
ICDAR-2011-LiuLS #graph #image #retrieval- Retrieval of Envelope Images Using Graph Matching (LL, YL, CYS), pp. 99–103.
ICDAR-2011-MandalRP #documentation #random #segmentation- Signature Segmentation from Machine Printed Documents Using Conditional Random Field (RM, PPR, UP), pp. 1170–1174.
ICDAR-2011-MarinaiMS11a #distance #retrieval- Using Earth Mover’s Distance in the Bag-of-Visual-Words Model for Mathematical Symbol Retrieval (SM, BM, GS), pp. 1309–1313.
ICDAR-2011-NeumannM #image #locality- Text Localization in Real-World Images Using Efficiently Pruned Exhaustive Search (LN, JM), pp. 687–691.
ICDAR-2011-PanZSN #invariant- Recognizing Characters with Severe Perspective Distortion Using Hash Tables and Perspective Invariants (PP, YZ, JS, SN), pp. 548–552.
ICDAR-2011-PengCPN #random #video- Text Extraction from Video Using Conditional Random Fields (XP, HC, RP, PN), pp. 1029–1033.
ICDAR-2011-PinsonB #component- Connected Component Level Discrimination of Handwritten and Machine-Printed Text Using Eigenfaces (SJP, WAB), pp. 1394–1398.
ICDAR-2011-RahnemoonfarA #documentation #image- Restoration of Arbitrarily Warped Historical Document Images Using Flow Lines (MR, AA), pp. 905–909.
ICDAR-2011-RoyRR #documentation #retrieval #word- Word Retrieval in Historical Document Using Character-Primitives (PPR, JYR, NR), pp. 678–682.
ICDAR-2011-SaabniE #independence- Language-Independent Text Lines Extraction Using Seam Carving (RS, JES), pp. 563–568.
ICDAR-2011-SaldarriagaC #network #online #word- Indexing On-line Handwritten Texts Using Word Confusion Networks (SPS, MC), pp. 197–201.
ICDAR-2011-SituLT #image #locality #probability #web- Text Localization in Web Images Using Probabilistic Candidate Selection Model (LS, RL, CLT), pp. 1359–1363.
ICDAR-2011-SunK #retrieval #visual notation- Similar Manga Retrieval Using Visual Vocabulary Based on Regions of Interest (WS, KK), pp. 1075–1079.
ICDAR-2011-TaoLJG #learning #locality #recognition- Similar Handwritten Chinese Character Recognition Using Discriminative Locality Alignment Manifold Learning (DT, LL, LJ, YG), pp. 1012–1016.
ICDAR-2011-VincentNP #algorithm #documentation- Document Recto-verso Registration Using a Dynamic Time Warping Algorithm (VR, NJ, JPD), pp. 1230–1234.
ICDAR-2011-WakaharaK #clustering #image #string- Binarization of Color Character Strings in Scene Images Using K-Means Clustering and Support Vector Machines (TW, KK), pp. 274–278.
ICDAR-2011-WangWZ #graph #online #verification- On-line Signature Verification Using Segment-to-Segment Graph Matching (KW, YW, ZZ), pp. 804–808.
ICDAR-2011-XiaWL #clustering #keyword #knowledge-based- Chinese Keyword Spotting Using Knowledge-Based Clustering (YX, KW, ML), pp. 789–793.
ICDAR-2011-XuYWL #analysis- Touching Character Separation in Chinese Handwriting Using Visibility-Based Foreground Analysis (LX, FY, QFW, CLL), pp. 859–863.
ICDAR-2011-YouADGT #detection- Detecting Figure-Panel Labels in Medical Journal Articles Using MRF (DY, SA, DDF, VG, GRT), pp. 967–971.
ICDAR-2011-ZanibbiY #documentation #image #query- Math Spotting: Retrieving Math in Technical Documents Using Handwritten Query Images (RZ, LY), pp. 446–451.
ICDAR-2011-ZhangLYDW #random #recognition- An Improved Scene Text Extraction Method Using Conditional Random Field and Optical Character Recognition (HZ, CL, CY, XD, KW), pp. 708–712.
ICDAR-2011-ZhouYWWNL #random- Transcript Mapping for Handwritten Text Lines Using Conditional Random Fields (XDZ, FY, DHW, QFW, MN, CLL), pp. 58–62.
ICDAR-2011-ZhuN #online #optimisation #parametricity #recognition- On-line Handwritten Japanese Characters Recognition Using a MRF Model with Parameter Optimization by CRF (BZ, MN), pp. 603–607.
ICDAR-2011-ZhuN11b #online #recognition- Trie-Lexicon-Driven Recognition for On-line Handwritten Japanese Disease Names Using a Time-Synchronous Method (BZ, MN), pp. 1130–1134.
JCDL-2011-FreireJ - Using national bibliographies for rights clearance (NF, AJ), pp. 167–174.
JCDL-2011-GippMB #comparative #detection #evaluation- Comparative evaluation of text- and citation-based plagiarism detection approaches using guttenplag (BG, NM, JB), pp. 255–258.
JCDL-2011-KawaseH #classification #folksonomy- Classification of user interest patterns using a virtual folksonomy (RK, EH), pp. 105–108.
JCDL-2011-KleinWN #web- Rediscovering missing web pages using link neighborhood lexical signatures (MK, JW, MLN), pp. 137–140.
JCDL-2011-LiZYWWW #gpu #recommendation #social- A social network-aware top-N recommender system using GPU (RL, YZ, HY, XW, JW, BW), pp. 287–296.
JCDL-2011-MarshallS #reuse #visual notation- The ownership and reuse of visual media (CCM, FMSI), pp. 157–166.
JCDL-2011-MartinHRF - Indexing musical pieces using their major repetition (BM, PH, MR, PF), pp. 153–156.
JCDL-2011-MurthyLHFPDT #identification- Use of subimages in fish species identification: a qualitative study (UM, LTL, EH, EAF, MAPQ, LMLD, RdST), pp. 185–194.
JCDL-2011-SaadG #case study #web- Archiving the web using page changes patterns: a case study (MBS, SG), pp. 113–122.
JCDL-2011-SanchezCRNLB #collaboration #library #network #visualisation- Visualizing collaboration networks implicit in digital libraries using OntoStarFish (JAS, OC, AR, MAMN, JCL, EB), pp. 213–222.
JCDL-2011-SchererBS #multi #repository #research #retrieval- Retrieval and exploratory search in multivariate research data repositories using regressional features (MS, JB, TS), pp. 363–372.
PODS-2011-CohenK - Get the most out of your sample: optimal unbiased estimators using partial information (EC, HK), pp. 13–24.
SIGMOD-2011-ArasuKL #constraints #declarative #generative- Data generation using declarative constraints (AA, RK, JL), pp. 685–696.
SIGMOD-2011-DoZPDNH - Turbocharging DBMS buffer pool using SSDs (JD, DZ, JMP, DJD, JFN, AH), pp. 1113–1124.
SIGMOD-2011-KohlerYZ #parallel #performance- Efficient parallel skyline processing using hyperplane projections (HK, JY, XZ), pp. 85–96.
SIGMOD-2011-LiMDMS #framework #pipes and filters #platform #scalability- A platform for scalable one-pass analytics using MapReduce (BL, EM, YD, AM, PJS), pp. 985–996.
SIGMOD-2011-LiuRGGWAM #analysis #multi #named #query #sequence- E-Cube: multi-dimensional event sequence analysis using hierarchical pattern query sharing (ML, EAR, KG, CG, SW, IA, AM), pp. 889–900.
SIGMOD-2011-OkcanR #pipes and filters- Processing theta-joins using MapReduce (AO, MR), pp. 949–960.
TPDL-2011-BronHR #documentation- Linking Archives Using Document Enrichment and Term Selection (MB, BH, MdR), pp. 360–371.
TPDL-2011-CeccarelliGLNT #experience #query- Improving Europeana Search Experience Using Query Logs (DC, SG, CL, FMN, GT), pp. 384–395.
TPDL-2011-KnothRZ #mining #repository #semantics- Connecting Repositories in the Open Access Domain Using Text Mining and Semantic Data (PK, VR, ZZ), pp. 483–487.
TPDL-2011-SaadPG #crawling #navigation #web- Coherence-Oriented Crawling and Navigation Using Patterns for Web Archives (MBS, ZP, SG), pp. 421–433.
TPDL-2011-SmithOG #capacity #case study #named- CloudCAP: A Case Study in Capacity Planning Using the Cloud (JAS, JFO, JRG), pp. 110–117.
VLDB-2011-AliCFWDR #online #visualisation- Online Visualization of Geospatial Stream Data using the WorldWide Telescope (MHA, BC, JF, CW, SMD, BSR), pp. 1379–1382.
VLDB-2011-AoZWSWLLL #algorithm #parallel #performance- Efficient Parallel Lists Intersection and Index Compression Algorithms using Graphics Processing Units (NA, FZ, DW, DSS, GW, XL, JL, SL), pp. 470–481.
VLDB-2011-ArasuKL #constraints #declarative #generative #named- DataSynth: Generating Synthetic Data using Declarative Constraints (AA, RK, JL), pp. 1418–1421.
VLDB-2011-DasNAA #database #lightweight #migration #named- Albatross: Lightweight Elasticity in Shared Storage Databases for the Cloud using Live Data Migration (SD, SN, DA, AEA), pp. 494–505.
VLDB-2011-KimRA #algebra #pipes and filters- From SPARQL to MapReduce: The Journey Using a Nested TripleGroup Algebra (HK, PR, KA), pp. 1426–1429.
VLDB-2011-KocR #classification #incremental #maintenance- Incrementally maintaining classification using an RDBMS (MLK, CR), pp. 302–313.
VLDB-2011-LeeNS #estimation #locality #similarity- Similarity Join Size Estimation using Locality Sensitive Hashing (HL, RTN, KS), pp. 338–349.
VLDB-2011-NiuRDS #logic #markov #named #network #scalability #statistics- Tuffy: Scaling up Statistical Inference in Markov Logic Networks using an RDBMS (FN, CR, AD, JWS), pp. 373–384.
VLDB-2011-RaoST #consistency #scalability- Using Paxos to Build a Scalable, Consistent, and Highly Available Datastore (JR, EJS, ST), pp. 243–254.
VLDB-2012-KruegerKGSSCPDZ11 #database #manycore #performance- Fast Updates on Read-Optimized Databases Using Multi-Core CPUs (JK, CK, MG, NS, DS, JC, HP, PD, AZ), pp. 61–72.
VLDB-2012-KumarR11 #probability- Probabilistic Management of OCR Data using an RDBMS (AK, CR), pp. 322–333.
VLDB-2012-RuttenbergS11 #distance- Indexing the Earth Mover’s Distance Using Normal Distributions (BER, AKS), pp. 205–216.
CSEET-2011-BollinHM #education #project management #simulation- Teaching software project management using simulations (AB, EH, RTM), pp. 81–90.
CSEET-2011-LethbridgeMFB #education #programming #uml- Teaching UML using umple: Applying model-oriented programming in the classroom (TCL, GM, AF, OBB), pp. 421–428.
CSEET-2011-LongstreetC #education #game studies #re-engineering #student- Using games in software engineering education to increase student success and retention (CSL, KMLC), p. 554.
CSEET-2011-LuLL #analysis- Competence analysis of IT professionals involved in business services — Using a qualitative method (HKL, CHL, PCL), pp. 61–70.
CSEET-2011-OffuttLAX #abstraction #design #education #web- Using abstraction and Web applications to teach criteria-based test design (JO, NL, PA, WX), pp. 227–236.
CSEET-2011-RadermacherW #empirical #interactive #programming #student- Investigating student-instructor interactions when using pair programming: An empirical study (AR, GSW), pp. 41–50.
CSEET-2011-RoshandelGL #education #re-engineering- Using community-based projects in software engineering education (RR, JG, RL), pp. 472–476.
CSEET-2011-Scharff #agile #assurance #development #quality- Guiding global software development projects using Scrum and Agile with quality assurance (CS), pp. 274–283.
ITiCSE-2011-BackCMM #case study #modelling #student- A study in engaging female students in computer science using role models (JB, PC, CM, PWM), pp. 63–67.
ITiCSE-2011-GuimaraesSA #education #game studies #security #video- Using video games to teach security (MAMG, HES, RA), p. 346.
ITiCSE-2011-Harms #api #implementation #java- A Java implementation of the myro API for using personal robots in CS1 (DEH), p. 338.
ITiCSE-2011-HarrachA #collaboration #learning #optimisation #process #recommendation- Optimizing collaborative learning processes by using recommendation systems (SH, MA), p. 389.
ITiCSE-2011-KleinKT #analysis #assessment #automation #semantics- Automated assessment of short free-text responses in computer science using latent semantic analysis (RK, AK, MT), pp. 158–162.
ITiCSE-2011-LangeFL - An update on the use of community-based non-profit organizations in capstone projects (DKL, RCF, PML), p. 372.
ITiCSE-2011-Law #development #documentation #student- Using student blogs for documentation in software development projects (RL), p. 366.
ITiCSE-2011-MarkhamB #bound #twitter- Collaborating across international boundaries: using twitter as a tool in the classroom (SM, SB), p. 382.
ITiCSE-2011-MesserK #problem #process- The use of mediating artifacts in embedding problem solving processes in an e-learning environment (OMM, AK), p. 390.
ITiCSE-2011-StrieweG11a #automation #programming #runtime- Using run time traces in automated programming tutoring (MS, MG), pp. 303–307.
ITiCSE-2011-VilnerZT #education #inheritance- Using greenfoot in teaching inheritance in CS1 (TV, EZ, ST), p. 342.
ITiCSE-2011-WittmannBK #programming- Using the SCORE software package to analyse novice computer graphics programming (MRAW, MB, MKT), pp. 118–122.
SIGITE-2011-Li #concept #framework #open source- Introducing virtualization management concepts using open source cloud infrastructure managers (PL), pp. 309–310.
SIGITE-2011-SettleWS #design #evaluation #game studies #student- Engaging game design students using peer evaluation (AS, CW, CS), pp. 73–78.
SIGITE-2011-VillaromanRS #artificial reality #education #interactive- Teaching natural user interaction using OpenNI and the Microsoft Kinect sensor (NV, DR, BS), pp. 227–232.
CSMR-2011-CorazzaMMS #clustering- Investigating the Use of Lexical Information for Software System Clustering (AC, SDM, VM, GS), pp. 35–44.
CSMR-2011-CoutoVF #case study #compilation #product line- Extracting Software Product Lines: A Case Study Using Conditional Compilation (MVC, MTV, EF), pp. 191–200.
CSMR-2011-KohlKPDM #analysis #maintenance #multi- Using Multivariate Split Analysis for an Improved Maintenance of Automotive Diagnosis Functions (JK, AK, JPP, AD, SM), pp. 305–308.
CSMR-2011-SilvaPAM #execution #on the- On the Use of Execution Trace Alignment for Driving Perfective Changes (LLS, KRP, SdA, MdAM), pp. 221–230.
ICPC-2011-Cordy #clone detection #detection #incremental #scalability #similarity- Exploring Large-Scale System Similarity Using Incremental Clone Detection and Live Scatterplots (JRC), pp. 151–160.
ICPC-2011-HouL #api #case study #framework- Obstacles in Using Frameworks and APIs: An Exploratory Study of Programmers’ Newsgroup Discussions (DH, LL), pp. 91–100.
ICPC-2011-LuciaPOPP #traceability- Improving IR-based Traceability Recovery Using Smoothing Filters (ADL, MDP, RO, AP, SP), pp. 21–30.
ICPC-2011-PanchenkoKPZ #database #precise #query #scalability #source code- Precise and Scalable Querying of Syntactical Source Code Patterns Using Sample Code Snippets and a Database (OP, JK, HP, AZ), pp. 41–50.
ICSM-2011-DraganCHM #commit- Using stereotypes to help characterize commits (ND, MLC, MH, JIM), pp. 520–523.
ICSM-2011-KhomhCZSD #fault #predict #testing- Predicting post-release defects using pre-release field testing results (FK, BC, YZ, AS, DD), pp. 253–262.
ICSM-2011-MirakhorliC #architecture #information management #maintenance #modelling #traceability- Using tactic traceability information models to reduce the risk of architectural degradation during system maintenance (MM, JCH), pp. 123–132.
ICSM-2011-PaymalPBS #evolution #graph #metric #process- Measuring disruption from software evolution activities using graph-based metrics (PP, RP, SB, HPS), pp. 532–535.
ICSM-2011-QusefBOLB #concept #named #slicing #traceability- SCOTCH: Test-to-code traceability using slicing and conceptual coupling (AQ, GB, RO, ADL, DB), pp. 63–72.
ICSM-2011-RomanoP #interface #java #metric #predict #source code- Using source code metrics to predict change-prone Java interfaces (DR, MP), pp. 303–312.
ICSM-2011-ShternT #clustering #multi- Evaluating software clustering using multiple simulated authoritative decompositions (MS, VT), pp. 353–361.
MSR-2011-BinkleyHL #identifier #speech- Improving identifier informativeness using part of speech information (DB, MH, DL), pp. 203–206.
MSR-2011-LiZ #re-engineering #semantics #web- Integrating software engineering data using semantic web technologies (YFL, HZ), pp. 211–214.
WCRE-2011-AryaniPLMN #dependence #predict #question- Can We Predict Dependencies Using Domain information? (AA, FP, ML, ANM, ON), pp. 55–64.
WCRE-2011-Beard #debugging #information retrieval #locality- Extending Bug Localization Using Information Retrieval and Code Clone Location Techniques (MDB), pp. 425–428.
WCRE-2011-FuhrHR #clustering #dynamic analysis #implementation #legacy #reuse- Using Dynamic Analysis and Clustering for Implementing Services by Reusing Legacy Code (AF, TH, VR), pp. 275–279.
WCRE-2011-GrantCS #analysis #concept #reverse engineering #source code- Reverse Engineering Co-maintenance Relationships Using Conceptual Analysis of Source Code (SG, JRC, DBS), pp. 87–91.
WCRE-2011-KellensRNSJ #evolution #quantifier #reasoning #source code- Reasoning over the Evolution of Source Code Using Quantified Regular Path Expressions (AK, CDR, CN, RS, VJ), pp. 389–393.
WCRE-2011-MyersS #execution- Focusing on Execution Traces Using Diver (DM, MADS), pp. 439–440.
WCRE-2011-WangLXJ #empirical #information retrieval #kernel #linux #locality- Concern Localization using Information Retrieval: An Empirical Study on Linux Kernel (SW, DL, ZX, LJ), pp. 92–96.
CIAA-J-2010-YuBI11 #automaton #multi #relational #string #verification- Relational String Verification Using Multi-Track Automata (FY, TB, OHI), pp. 1909–1924.
CIAA-2011-CarninoF #automaton #generative #markov #random- Random Generation of Deterministic Acyclic Automata Using Markov Chains (VC, SDF), pp. 65–75.
DLT-2011-KuncO #automaton #finite- Describing Periodicity in Two-Way Deterministic Finite Automata Using Transformation Semigroups (MK, AO), pp. 324–336.
LATA-2011-LabathR #information management- Simplifying DPDA Using Supplementary Information (PL, BR), pp. 342–353.
IFM-J-2009-ColvinH11 #behaviour #csp #semantics #specification- A semantics for Behavior Trees using CSP with specification commands (RC, IJH), pp. 891–914.
FM-2011-BartheCK #relational #source code #verification- Relational Verification Using Product Programs (GB, JMC, CK), pp. 200–214.
FM-2011-MullerR #verification- Using Debuggers to Understand Failed Verification Attempts (PM, JNR), pp. 73–87.
RTA-2011-FalkeKS #analysis #c #compilation #source code #termination- Termination Analysis of C Programs Using Compiler Intermediate Languages (SF, DK, CS), pp. 41–50.
RTA-2011-KochemsO #analysis #functional #linear #reachability- Improved Functional Flow and Reachability Analyses Using Indexed Linear Tree Grammars (JK, CHLO), pp. 187–202.
SEFM-2011-JacquelBDD #automation #proving #theorem proving #verification- Verifying B Proof Rules Using Deep Embedding and Automated Theorem Proving (MJ, KB, DD, CD), pp. 253–268.
SEFM-2011-OnoHTNH #coq #pipes and filters #specification- Using Coq in Specification and Program Extraction of Hadoop MapReduce Applications (KO, YH, YT, NN, MH), pp. 350–365.
SEFM-2011-Sanchez - Using System Dynamics to Assess the Role of Socio-economic Status in Tuberculosis Incidence (MAS), pp. 464–475.
ICFP-2011-ChyzakD #generative #ml #runtime #web- Using camlp4 for presenting dynamic mathematics on the web: DynaMoW, an OCaml language extension for the run-time generation of mathematical contents and their presentation on the web (FC, AD), pp. 259–265.
IFL-2011-Thomsen #functional #logic #optimisation- Describing and Optimising Reversible Logic Using a Functional Language (MKT), pp. 148–163.
AIIDE-2011-FujitaIM #detection #network- Detecting Real Money Traders in MMORPG by Using Trading Network (AF, HI, HM).
AIIDE-2011-TastanS #game studies #learning #policy- Learning Policies for First Person Shooter Games Using Inverse Reinforcement Learning (BT, GRS).
CIG-2011-AgapitosOBT #learning #modelling #programming #search-based- Learning environment models in car racing using stateful Genetic Programming (AA, MO0, AB, TT), pp. 219–226.
CIG-2011-AlhejaliL #programming #search-based- Using a training camp with Genetic Programming to evolve Ms Pac-Man agents (AMA, SML), pp. 118–125.
CIG-2011-AntonioFCP #algorithm #evaluation #game studies #optimisation #search-based- Optimization of an evaluation function of the 4-sided dominoes game using a genetic algorithm (NSA, CFFCF, MGFC, RP), pp. 24–30.
CIG-2011-SarjantPDS #game studies #online #policy #relational- Using the online cross-entropy method to learn relational policies for playing different games (SS, BP, KD, TS), pp. 182–189.
CIG-2011-ThawonmasT #automation #evolution #game studies #generative- Frame selection using iterative grammatical evolution for automatic comic generation from game logs (RT, YT), pp. 31–38.
CIG-2011-UusitaloJ #approach- A reactive mutli-agent approach to car driving using artificial potential fields (TU, SJJ), pp. 203–210.
DiGRA-2011-CederholmHLSE #game studies- The Aiming Game: Using a Game with Biofeedback for Training in Emotion Regulation (HC, OH, CL, CCS, JE).
DiGRA-2011-KultimaA #game studies- Using the VNA Ideation Game at Global Game Jam (AK, KA).
DiGRA-2011-LacasaBC #game studies #online- Adolescent thinking and online writing after the use of commercial games in the classroom (PL, RMB, HdC).
DiGRA-2011-SoppittM #analysis #comprehension #experience- Understanding Player Experience using Sequential Analysis (MS, GM).
FDG-2011-Consalvo #game studies #social- Using your friends: social mechanics in social games (MC), pp. 188–195.
FDG-2011-FolmerLE #3d #navigation- Navigating a 3D avatar using a single switch (EF, FL, BE), pp. 154–160.
FDG-2011-HaleY #detection #navigation- Using navigation meshes for collision detection (DHH, GMY), pp. 316–318.
FDG-2011-HarrisonR #behaviour #predict- Using sequential observations to model and predict player behavior (BEH, DLR), pp. 91–98.
FDG-2011-LavioleHS #game studies #physics #simulation- Tabletop games using real environment and physical simulation (JL, MH, CS), pp. 322–324.
FDG-2011-MorelliF #game studies #gesture #realtime #video- Real-time sensory substitution to enable players who are blind to play video games using whole body gestures (TM, EF), pp. 147–153.
FDG-2011-SloanKN #game studies- Feeling the ambiance: using smart ambiance to increase contextual awareness in game agents (CS, JDK, BMN), pp. 298–300.
VS-Games-2011-AnagnostouV #artificial reality- Square AR: Using Augmented Reality for Urban Planning (KA, PV), pp. 128–131.
VS-Games-2011-BirchallG #development #education #evaluation #game studies #named- Elemental: An Insight into the Development and Evaluation of a Secondary Education Chemistry Game Using XNA (JB, CG), pp. 32–39.
VS-Games-2011-Broin #game studies- Using a Criteria-Based User Model for Facilitating Flow in Serious Games (DO), pp. 63–69.
VS-Games-2011-ChilcottS #3d #learning #multi #online #web- Ageing Well and Learning through Online Immersive Participation Using a Multi-user Web 3D Environment (MC, AS), pp. 70–75.
VS-Games-2011-ChristopoulosMAK - Using Virtual Environments to Tell the Story: “The Battle of Thermopylae” (DC, PM, AA, JNK), pp. 84–91.
VS-Games-2011-HulusicR #education- The Use of Live Virtual Guides in Educational Applications (VH, SR), pp. 92–97.
VS-Games-2011-NetoSNPF #game studies #interactive- Solis'Curse - A Cultural Heritage Game Using Voice Interaction with a Virtual Agent (JNN, RS, JPN, JMP, JF), pp. 164–167.
VS-Games-2011-Schwenk #realtime- Real-Time Rendering of Dynamic Area and Volume Lights Using Hierarchical Irradiance Volumes (KS), pp. 136–139.
CHI-2011-ChangL #framework #migration #mobile- Deep shot: a framework for migrating tasks across devices using mobile phone cameras (THC, YL), pp. 2163–2172.
CHI-2011-ChiZXYW #authoring #collaboration #coordination #email- Using email to facilitate wiki-based coordinated, collaborative authoring (CYC, MXZ, WX, MY, EW), pp. 3459–3468.
CHI-2011-CohnMPT #gesture- Your noise is my command: sensing gestures using the body as an antenna (GC, DM, SNP, DST), pp. 791–800.
CHI-2011-CowanL #interactive #mobile #named- ShadowPuppets: supporting collocated interaction with mobile projector phones using hand shadows (LGC, KAL), pp. 2707–2716.
CHI-2011-CramerHTYH #interactive #student #visual notation- Classroom-based assistive technology: collective use of interactive visual schedules by students with autism (MC, SHH, MT, MTY, GRH), pp. 1–10.
CHI-2011-EllingLJ #eye tracking- Retrospective think-aloud method: using eye movements as an extra cue for participants’ verbalizations (SE, LL, MdJ), pp. 1161–1170.
CHI-2011-EppLM #identification- Identifying emotional states using keystroke dynamics (CE, ML, RLM), pp. 715–724.
CHI-2011-Freeman #eye tracking #protocol #usability- Triggered think-aloud protocol: using eye tracking to improve usability test moderation (BF), pp. 1171–1174.
CHI-2011-HarrisonHWFH #design #named #user interface #visual notation- Kineticons: using iconographic motion in graphical user interface design (CH, GH, KDDW, JF, SEH), pp. 1999–2008.
CHI-2011-HuangWD #problem- No clicks, no problem: using cursor movements to understand and improve search (JH, RWW, STD), pp. 1225–1234.
CHI-2011-HutamaSFG #correlation #interactive #multi- Distinguishing multiple smart-phone interactions on a multi-touch wall display using tilt correlation (WH, PS, CWF, WBG), pp. 3315–3318.
CHI-2011-John #design #modelling #performance #predict #recommendation #user interface- Using predictive human performance models to inspire and support UI design recommendations (BEJ), pp. 983–986.
CHI-2011-JunuzovicIHZTB #multimodal #overview #what- What did i miss?: in-meeting review using multimodal accelerated instant replay (air) conferencing (SJ, KI, RH, ZZ, JCT, CB), pp. 513–522.
CHI-2011-KhotSK #authentication #named #novel- MARASIM: a novel jigsaw based authentication scheme using tagging (RAK, KS, PK), pp. 2605–2614.
CHI-2011-KimP #reuse- Practices in the creative reuse of e-waste (SK, EP), pp. 2395–2404.
CHI-2011-KimS #community #health #interface #online- Using interface cues in online health community boards to change impressions and encourage user contribution (HSK, SSS), pp. 599–608.
CHI-2011-KuhnCQS - Using tags to encourage reflection and annotation on data during nomadic inquiry (AK, CC, CQ, SS), pp. 667–670.
CHI-2011-LaheyGBV #comprehension #flexibility #gesture #mobile #named- PaperPhone: understanding the use of bend gestures in mobile devices with flexible electronic paper displays (BL, AG, WB, RV), pp. 1303–1312.
CHI-2011-Light #design #performance- Democratising technology: making transformation using designing, performance and props (AL), pp. 2239–2242.
CHI-2011-LuceroHJ #collaboration #mobile #named- Pass-them-around: collaborative use of mobile phones for photo sharing (AL, JH, TJ), pp. 1787–1796.
CHI-2011-LuL #gesture #mobile #user interface- Gesture avatar: a technique for operating mobile user interfaces using gestures (HL, YL), pp. 207–216.
CHI-2011-MarshallB #case study #experience #interactive #performance- Using fast interaction to create intense experiences (JM, SB), pp. 1255–1264.
CHI-2011-MarshallS #social #social media #twitter- Social media ownership: using twitter as a window onto current attitudes and beliefs (CCM, FMSI), pp. 1081–1090.
CHI-2011-MatthewsD #mobile- In the mood: engaging teenagers in psychotherapy using mobile phones (MM, GD), pp. 2947–2956.
CHI-2011-NackeKLM #design #game studies #interactive- Biofeedback game design: using direct and indirect physiological control to enhance game interaction (LEN, MK, CL, RLM), pp. 103–112.
CHI-2011-NiKW #communication #named- AnatOnMe: facilitating doctor-patient communication using a projection-based handheld device (TN, AKK, DW), pp. 3333–3342.
CHI-2011-SporkaFKPHM #named #predict- CHANTI: predictive text entry using non-verbal vocal input (AJS, TF, SHK, OP, PH, ISM), pp. 2463–2472.
CHI-2011-TamakiMR #named- PossessedHand: techniques for controlling human hands using electrical muscles stimuli (ET, TM, JR), pp. 543–552.
CHI-2011-WeilenmannJ #comprehension #interactive #people- Understanding people and animals: the use of a positioning system in ordinary human-canine interaction (AW, OJ), pp. 2631–2640.
CHI-2011-WobbrockFGH #analysis #parametricity #rank- The aligned rank transform for nonparametric factorial analyses using only anova procedures (JOW, LF, DG, JJH), pp. 143–146.
CHI-2011-YangGIF #proximity- TouchCuts and TouchZoom: enhanced target selection for touch displays using finger proximity sensing (XDY, TG, PI, GWF), pp. 2585–2594.
CHI-2011-YataniNTT #overview #user interface #word- Review spotlight: a user interface for summarizing user-generated reviews using adjective-noun word pairs (KY, MN, AT, KNT), pp. 1541–1550.
CHI-2011-ZhaoCB #multi #named #navigation #visual notation- KronoMiner: using multi-foci navigation for the visual exploration of time-series data (JZ, FC, RB), pp. 1737–1746.
CSCW-2011-FanLZTSW #game studies #gesture #social- Surprise Grabber: a co-located tangible social game using phone hand gesture (MF, XL, YZ, LT, YS, HW), pp. 625–628.
CSCW-2011-GergleC #collaboration #eye tracking #mobile #what- See what I’m saying?: using Dyadic Mobile Eye tracking to study collaborative reference (DG, ATC), pp. 435–444.
CSCW-2011-GuibourdencheVGFH #distributed #multi #process #product line- Using multiple scores for transcribing the distributed activities of a family (JG, JVR, MG, MF, YH), pp. 637–640.
CSCW-2011-KamranC #collaboration #ontology #social #social media- Defining ontology by using users collaboration on social media (SK, FC), pp. 657–660.
CSCW-2011-MarshallRP #interactive #physics- Using F-formations to analyse spatial patterns of interaction in physical environments (PM, YR, NP), pp. 445–454.
CSCW-2011-MistryNM11a #named- SPARSH: passing data using the body as a medium (PM, SN, PM), pp. 689–692.
CSCW-2011-NewmanLMRM #challenge #facebook #health #network #online #problem #social- It’s not that I don’t have problems, I’m just not putting them on facebook: challenges and opportunities in using online social networks for health (MWN, DL, SAM, PR, MEM), pp. 341–350.
DHM-2011-EilersM #composition #learning #modelling- Learning the Relevant Percepts of Modular Hierarchical Bayesian Driver Models Using a Bayesian Information Criterion (ME, CM), pp. 463–472.
DHM-2011-OdenthalMKKS #empirical- An Empirical Study of Disassembling Using an Augmented Vision System (BO, MPM, WK, BK, CMS), pp. 399–408.
DHM-2011-QinTD #type system- The Upper Extremity Loading during Typing Using One, Two and Three Fingers (JQ, MT, JTD), pp. 178–185.
DHM-2011-WuHYNH #parametricity- Using Physiological Parameters to Evaluate Operator’s Workload in Manual Controlled Rendezvous and Docking (RVD) (BW, FH, ZY, JN, WH), pp. 426–435.
DUXU-v1-2011-BjorndalRM #industrial #lessons learnt #requirements #specification- Lessons Learned from Using Personas and Scenarios for Requirements Specification of Next-Generation Industrial Robots (PB, MJR, SM), pp. 378–387.
DUXU-v1-2011-BotellaGT #evaluation #heuristic #interactive- Using Interaction Patterns in Heuristic Evaluation (FB, JAG, RT), pp. 23–32.
DUXU-v1-2011-KashiwaseKKFYJ #mobile- Comparisons on Kansei Factors of Attractiveness between Initial and Long Term Use of Mobile Phone (NK, KK, HK, SF, MY, HJ), pp. 593–601.
DUXU-v1-2011-OhgiS #case study #enterprise #standard- ISO Standards and Enterprise Software: A Case Study Using SUMI and SUS in an International Sale (JO, JS), pp. 178–184.
DUXU-v1-2011-RitterE #segmentation- An Extensible Tool for the Annotation of Videos Using Segmentation and Tracking (MR, ME), pp. 295–304.
DUXU-v1-2011-YamagishiJKKF #mobile- Proposal for Indices to Assess Attractiveness on Initial Use of Mobile Phones (MY, HJ, KK, HK, SF), pp. 696–705.
DUXU-v2-2011-ChaeKN #experience- Measuring Drivers’ Dynamic Seating Experience Using Pressure Mats (SC, GK, KN), pp. 368–375.
DUXU-v2-2011-ChenL11a #2d #3d #design #evaluation #interface- Design and Evaluation of the Customized Product Color Combination Interfaces Using 3D Model and 2D Illustration Display (CYC, YJL), pp. 269–275.
DUXU-v2-2011-KhashmanL - Measuring Cultural Markers in Arabic Government Websites Using Hofstede’s Cultural Dimensions (NK, AL), pp. 431–439.
DUXU-v2-2011-RubegniML #interactive #scalability #social- Talking to Strangers: Using Large Public Displays to Facilitate Social Interaction (ER, NM, ML), pp. 195–204.
DUXU-v2-2011-ShenPC - A Solution to Revisitation Using Organic Bookmark Management (STS, SDP, KMC), pp. 46–52.
HCD-2011-BurkhardtNBSK #named #semantics- SemaZoom: Semantics Exploration by Using a Layer-Based Focus and Context Metaphor (DB, KN, MB, CS, AK), pp. 491–499.
HCD-2011-Lin #communication #design #research #semantics- Research in the Use of Product Semantics to Communicate Product Design Information (CHL), pp. 556–565.
HCI-DDA-2011-DittmarF #implementation #interactive #modelling- Intertwined Modeling and Implementation of Interactive Systems Using HOPS (AD, PF), pp. 194–203.
HCI-DDA-2011-HessMT #interactive- Differentiating between Successful and Less Successful Products by Using MAInEEAC — A Model for Interaction Characterization (SH, AM, MT), pp. 238–247.
HCI-DDA-2011-IglesiasT #component #representation #user interface- User Interface Representation Using Simple Components (JRI, PMTF), pp. 278–287.
HCI-DDA-2011-KimJRWS #behaviour #simulation- Human Behavioral Simulation Using Affordance-Based Agent Model (NK, JJ, LR, RAW, YJS), pp. 368–377.
HCI-DDA-2011-KogaT #recommendation #topic #twitter- Developing a User Recommendation Engine on Twitter Using Estimated Latent Topics (HK, TT), pp. 461–470.
HCI-DDA-2011-LuoY #algorithm #clustering #framework #network #novel #parallel- A Novel Parallel Clustering Algorithm Based on Artificial Immune Network Using nVidia CUDA Framework (RL, QY), pp. 598–607.
HCI-DDA-2011-ShiraiT #composition #interactive #music- A Proposal of an Interactive Music Composition System Using Gibbs Sampler (AS, TT), pp. 490–497.
HCI-ITE-2011-AbushamB #graph #recognition- Face Recognition Using Local Graph Structure (LGS) (EEAA, HKB), pp. 169–175.
HCI-ITE-2011-AngeliniCCKM #gesture #interactive #multi #scalability- Multi-user Pointing and Gesture Interaction for Large Screen Using Infrared Emitters and Accelerometers (LA, MC, SC, OAK, EM), pp. 185–193.
HCI-ITE-2011-ChoiHK #3d #estimation #gesture #interface- 3D-Position Estimation for Hand Gesture Interface Using a Single Camera (SHC, JHH, JHK), pp. 231–237.
HCI-ITE-2011-JayaramanB #interface- Uni-model Human System Interface Using sEMG (SJ, VB), pp. 446–453.
HCI-ITE-2011-KimiokaST #multi- Niboshi for Slate Devices: A Japanese Input Method Using Multi-touch for Slate Devices (GK, BS, JT), pp. 81–89.
HCI-ITE-2011-LeeOL #recognition- Facial Expression Recognition Using AAMICPF (JSL, CMO, CWL), pp. 268–274.
HCI-ITE-2011-MorieCB #case study- Report on a Preliminary Study Using Breath Control and a Virtual Jogging Scenario as Biofeedback for Resilience Training (JFM, EC, JGB), pp. 474–480.
HCI-ITE-2011-NakaI #3d #communication #gesture #interface- Web-Based Nonverbal Communication Interface Using 3DAgents with Natural Gestures (TN, TI), pp. 565–574.
HCI-ITE-2011-NebeKJF #interactive #multi- Exploiting New Interaction Techniques for Disaster Control Management Using Multitouch-, Tangible- and Pen-Based-Interaction (KN, FK, HJ, HF), pp. 100–109.
HCI-ITE-2011-NebeMK #multi #requirements- An Investigation on Requirements for Co-located Group-Work Using Multitouch-, Pen-Based- and Tangible-Interaction (KN, TM, FK), pp. 90–99.
HCI-ITE-2011-OkamotoYW #visual notation- A Configuration Method of Visual Media by Using Characters of Audiences for Embodied Sport Cheering (KO, MY, TW), pp. 585–592.
HCI-MIIE-2011-ForutanpourR #collaboration #mobile #named- ProJest: Enabling Higher Levels of Collaboration Using Today’s Mobile Devices (BF, JR), pp. 48–58.
HCI-MIIE-2011-GaoG #mobile #representation- The Effect of Time Orientation and Representation of Points of Interests on the Use of Mobile Tour Guide (FG, QG), pp. 59–68.
HCI-MIIE-2011-KimHJHMJ #analysis #behaviour #video- Analysis of Low-Floor Bus Passengers’ Behavior Patterns Using Video Observation (JYK, HH, BSJ, BHH, YJM, YGJ), pp. 391–400.
HCI-MIIE-2011-MinKH #recognition- Spectral Subtraction Based Emotion Recognition Using EEG (JHM, HOK, KSH), pp. 569–576.
HCI-MIIE-2011-PlocherJC - Using Sound Patterns to Enhance Directional Sound for Emergency Route Guidance (TP, ZJJ, FYDC), pp. 329–337.
HCI-MIIE-2011-RattanyuM #biology #recognition- Emotion Recognition Using Biological Signal in Intelligent Space (KR, MM), pp. 586–592.
HCI-UA-2011-BellegoBBT #smarttech- Using a Smart Phone for Information Rendering in Computer-Aided Surgery (GLB, MB, IB, JT), pp. 202–209.
HCI-UA-2011-ItoIN #bias #information management #parametricity- Method for Cultivating the “Inquiry-Mindset” Using the Information Access-Based Belief Bias Parameter (KI, YI, SN), pp. 48–57.
HCI-UA-2011-KimCD #health- Using Pen-Based Computing in Technology for Health (HK, YSC, EYLD), pp. 192–201.
HCI-UA-2011-LargeB #comparison #interface #retrieval #visualisation- A Comparison of Children’s and Adults’ Retrieval Performances and Affective Reactions When Using a Conventional Interface and an Information Visualization Interface (AL, JB), pp. 590–598.
HCI-UA-2011-Levis #communication #towards #women- Working toward Women’s Economic Empowerment: Using Information and Communication Technology in Developing Areas to Market Traditional Crafts (MSL), pp. 266–273.
HCI-UA-2011-LinHLYH #mining- Using Grounded Theory and Text Mining to Find Interesting Reading Materials for Slow EFL Learners (YCL, ClH, MHL, HFY, CFH), pp. 77–85.
HCI-UA-2011-MaehigashiMTKMH #automation- Experimental Investigation of Misuse and Disuse in Using Automation System (AM, KM, HT, KK, JM, YH), pp. 384–393.
HCI-UA-2011-Nesset #evaluation #visual notation- Following the Signs: Children’s Use of Visual Cues to Facilitate Website Evaluation (VN), pp. 599–606.
HCI-UA-2011-OhkuraKKTESIW - Restoration Support System for a Historic Textile Market Using Virtual Environment (MO, MK, YK, ST, HE, AS, TI, YW), pp. 413–422.
HCI-UA-2011-Wang11a #interactive #learning #network #student #tool support- Interactions between Human and Computer Networks: EFL College Students Using Computer Learning Tools in Remedial English Classes (ALW), pp. 107–112.
HIMI-v1-2011-KinoshitaTN #visualisation- Kansei Stroll Map: Walking around a City Using Visualized Impressions of Streetscapes (YK, ST, TN), pp. 211–220.
HIMI-v1-2011-KomatsuO #case study #evaluation #visual notation- Study on Evaluation of Kawaii Colors Using Visual Analog Scale (TK, MO), pp. 103–108.
HIMI-v1-2011-KotaniHKA #information management- Characteristics of Information Transmission Rates Using Noncontact Tactile Display (KK, MH, NK, TA), pp. 450–453.
HIMI-v1-2011-LeeKW #authentication #multi #smarttech- Cryptanalysis to a Remote User Authentication Scheme Using Smart Cards for Multi-server Environment (YL, JK, DW), pp. 321–329.
HIMI-v1-2011-MitaWKM #case study #communication- A Study of Attention Control by Using Eye Communication with an Anthropomorphic Agent (TM, RW, NK, KM), pp. 603–611.
HIMI-v1-2011-NakanishiY - Applicability of Touch Sense Controllers Using Warm and Cold Sensations (MN, SY), pp. 470–477.
HIMI-v1-2011-TanakaYSN #comparison- Characteristics of Comfortable Sheet Switches on Control Panels of Electrical Appliances: Comparison Using Older and Younger Users (YT, YY, MS, MN), pp. 498–507.
HIMI-v1-2011-TogawaKY #communication #detection #network #peer-to-peer #visualisation- Peer-to-Peer File Sharing Communication Detection Using Spherical SOM Visualization for Network Management (ST, KK, YY), pp. 259–267.
HIMI-v2-2011-BagciMKKT #adaptation #recognition- Object and Scene Recognition Using Color Descriptors and Adaptive Color KLT (VHB, MGM, RK, RK, VT), pp. 355–363.
HIMI-v2-2011-FagerstromG #empirical #facebook #network #social- Co-Creation of Value through Social Network Marketing: A Field Experiment Using a Facebook Campaign to Increase Conversion Rate (AF, GG), pp. 229–235.
HIMI-v2-2011-FukadaKKH #evaluation #information management #user interface- Evaluation of Disaster Information Management System Using Tabletop User Interfaces (HF, KK, AK, NH), pp. 373–380.
HIMI-v2-2011-SagaTKTM #analysis #comparison- Comparison Analysis for Text Data by Using FACT-Graph (RS, ST, KK, HT, KM), pp. 75–83.
HIMI-v2-2011-TanumaSNN #artificial reality #design- Comfortable Design of Task-Related Information Displayed Using Optical See-Through Head-Mounted Display (KT, TS, MN, MN), pp. 419–429.
IDGD-2011-BrandND #embedded #interactive #network #social- Using Embedded Technology Badges to Derive Social Networks, Patterns of Interaction and Space Utilization in a Corporate Headquarters (JLB, GN, HD), pp. 353–360.
IDGD-2011-SalgadoSL #design- Using Metaphors to Explore Cultural Perspectives in Cross-Cultural Design (LCdCS, CSdS, CFL), pp. 94–103.
OCSC-2011-Alducin-QuinteroCMGJ #design #modelling #process- Productivity Improvement by Using Social-Annotations about Design Intent in CAD Modelling Process (GAQ, MC, JMG, DAGZ, MDJ), pp. 153–161.
OCSC-2011-BaekSH #research- Meet Researcher in the Real World Using the ConAR: Context-Aware Researcher (SWB, JS, TDH), pp. 12–19.
OCSC-2011-YoshinoM #communication- GAZO GAZO KUN: Photo-Sharing System Using an Anthropomorphic Photo Frame for Communication Support (TY, TM), pp. 297–305.
CAiSE-2011-BiderJS #architecture #case study #communication #experience #process- Experiences of Using Different Communication Styles in Business Process Support Systems with the Shared Spaces Architecture (IB, PJ, RS), pp. 299–313.
CAiSE-2011-GuabtniNB #correlation #graph #interactive- Using Graph Aggregation for Service Interaction Message Correlation (AG, HRMN, BB), pp. 642–656.
CAiSE-2011-LemaitreH #database #evaluation #fault #framework #quality #taxonomy- Quality Evaluation and Improvement Framework for Database Schemas — Using Defect Taxonomies (JL, JLH), pp. 536–550.
CAiSE-2011-NobauerSMZ #elicitation #enterprise #named #requirements- S3C: Using Service Discovery to Support Requirements Elicitation in the ERP Domain (MN, NS, NAMM, KZ), pp. 18–32.
CAiSE-2011-RoySSWB #design #enterprise- Using SOA Governance Design Methodologies to Augment Enterprise Service Descriptions (MR, BS, DS, IW, BB), pp. 566–581.
CAiSE-2011-SchmidtJ #analysis #design #requirements #security- Connecting Security Requirements Analysis and Secure Design Using Patterns and UMLsec (HS, JJ), pp. 367–382.
CAiSE-2011-SpindlerLNGN - Using Synchronised Tag Clouds for Browsing Data Collections (AdS, SL, MN, MG, MCN), pp. 214–228.
EDOC-2011-AdriansyahDA #consistency #cost analysis- Conformance Checking Using Cost-Based Fitness Analysis (AA, BFvD, WMPvdA), pp. 55–64.
EDOC-2011-CurleyK #case study #framework #maturity- Using the IT Capability Maturity Framework to Improve IT Capability and Value Creation: An Intel IT Case Study (MC, JK), pp. 107–115.
EDOC-2011-HildebrandtMS #design #graph- Designing a Cross-Organizational Case Management System Using Dynamic Condition Response Graphs (TTH, RRM, TS), pp. 161–170.
EDOC-2011-Hull #flexibility #towards- Towards Flexible Service Interoperation Using Business Artifacts (RH), pp. 20–21.
ICEIS-J-2011-Li11f #analysis #approach #case study #machine learning #type system- A Study on Noisy Typing Stream Analysis Using Machine Learning Approach (JL0), pp. 149–161.
ICEIS-J-2011-NovaisCJM11a #approach #difference #evolution #interactive #on the #visualisation- On the Use of Software Visualization to Analyze Software Evolution: An Interactive Differential Approach (RLN, GdFC, PRMSJ, MGM), pp. 241–255.
ICEIS-v1-2011-AsghariNAA #approach #enterprise #fuzzy #implementation #resource management #risk management- Risk Management in Enterprise Resource Planning Implementation using a Fuzzy Approach (HAA, MN, FA, FA), pp. 290–294.
ICEIS-v1-2011-Kim #communication #network- CRL Distribution using an Alternative Communication Media for Vehicular Networks (HK), pp. 217–222.
ICEIS-v1-2011-RamirezC #fault #process- Fault Diagnosis of Batch Processes Release using PCA Contribution Plots as Fault Signatures (AWR, JCL), pp. 223–228.
ICEIS-v1-2011-VaneaP #metadata #multi #ontology #semantics- Semantically Enhancing Multimedia Data Warehouses — Using Ontologies as Part of the Metadata (AV, RP), pp. 163–168.
ICEIS-v2-2011-KisilevichKBTR #open source #tool support- Developing a Price Management Decision Support System for Hotel Brokers using Free and Open Source Tools (SK, DAK, RB, MT, LR), pp. 147–156.
ICEIS-v2-2011-LiOAK #fault #identification #modelling #network- Patterns Identification for Hitting Adjacent Key Errors Correction using Neural Network Models (JL, KO, MSA, HBK), pp. 5–12.
ICEIS-v2-2011-TarsauliyaTS #network #search-based- Financial Time Series Forecast using Simulated Annealing and Threshold Acceptance Genetic BPA Neural Network (AT, RT, AS), pp. 172–177.
ICEIS-v2-2011-TianZX #analysis #case study #network #social- Study on the Knowledge -Sharing Network of Innovation Teams using Social Network Analysis (ZT, ZZ, DX), pp. 438–443.
ICEIS-v2-2011-ZhuXM #assessment #network #risk management- Operational Hazard Risk Assessment using Bayesian Networks (ZJZ, YX, EM), pp. 135–139.
ICEIS-v3-2011-BhuiyanRH #case study #modelling #multi- Supporting Business Modeling using Multiple Notations — A Case Study (MB, SR, KH), pp. 301–306.
ICEIS-v3-2011-NovaisCJM #approach #difference #evolution #interactive #on the #visualisation- On the Use of Software Visualization to Analyze Software Evolution — An Interactive Differential Approach (RLN, GdFC, PRMSJ, MGdMN), pp. 15–24.
ICEIS-v3-2011-PapatheocharousTYA #agile #cost analysis #development #diagrams #estimation #modelling- Cost Modeling and Estimation in Agile Software Development Environments using Influence Diagrams (EP, DT, PSY, ASA), pp. 117–127.
ICEIS-v3-2011-WangWWL #modelling #workflow- Formally Modeling and Analyzing Data-centric Workflow using WFCP-net and ASK-CTL (ZW, JW, LW, GL), pp. 139–144.
ICEIS-v4-2011-Ganesan #enterprise #framework #modelling #process- Composite Enterprise Process Modeling (CEProM) Framework — Setting up a Process Modeling Center of Excellence using CEProM Framework (EG), pp. 378–383.
ICEIS-v4-2011-LuCGD #algorithm #multi #network #optimisation #quality- Quality of Service Optimization of Wireless Sensor Networks using a Multi-objective Immune Co-evolutionary Algorithm (XL, ZRC, LG, YD), pp. 160–164.
ICEIS-v4-2011-Naderipour #ad hoc #industrial #mining #process- Mining of Ad-hoc Business Processes using Microsoft Sharepoint, Nitro & Prom 6.0 — An Industrial Practice (FN), pp. 413–418.
ICEIS-v4-2011-OuazzaneAKL #design #framework #web- An e-Business Framework Design using Enhanced Web 2.0 Technology (KO, MSA, HBK, JL), pp. 97–102.
CIKM-2011-Ando #encoding #relational- Latent feature encoding using dyadic and relational data (SA), pp. 2201–2204.
CIKM-2011-BanerjeeC #distributed #feature model #privacy- Privacy preserving feature selection for distributed data using virtual dimension (MB, SC), pp. 2281–2284.
CIKM-2011-BicerTN #keyword #modelling #ranking- Ranking support for keyword search on structured data using relevance models (VB, TT, RN), pp. 1669–1678.
CIKM-2011-BingLW #query #social #topic- Using query log and social tagging to refine queries based on latent topics (LB, WL, TLW), pp. 583–592.
CIKM-2011-BykauMRV #evolution #query- Supporting queries spanning across phases of evolving artifacts using Steiner forests (SB, JM, FR, YV), pp. 1649–1658.
CIKM-2011-DangXC #aspect-oriented #clustering #query- Inferring query aspects from reformulations using clustering (VD, XX, WBC), pp. 2117–2120.
CIKM-2011-GangulyLMJ #feedback #pseudo #query #reduction- Patent query reduction using pseudo relevance feedback (DG, JL, WM, GJFJ), pp. 1953–1956.
CIKM-2011-GaoL #adaptation #analysis #classification #probability #sentiment- A cross-domain adaptation method for sentiment classification using probabilistic latent analysis (SG, HL), pp. 1047–1052.
CIKM-2011-Garcia-Alvarado0O #named #ontology #performance- ONTOCUBE: efficient ontology extraction using OLAP cubes (CGA, ZC, CO), pp. 2429–2432.
CIKM-2011-HeerschopGHFKJ #analysis- Polarity analysis of texts using discourse structure (BH, FG, AH, FF, UK, FdJ), pp. 1061–1070.
CIKM-2011-HeRSOQ #case study #generative- Generating links to background knowledge: a case study using narrative radiology reports (JH, MdR, MS, RCvO, YQ), pp. 1867–1876.
CIKM-2011-HuiHLW #statistics- Relevance weighting using within-document term statistics (KH, BH, TL, BW), pp. 99–104.
CIKM-2011-HuTL #microblog #semantics- Enhancing accessibility of microblogging messages using semantic knowledge (XH, LT, HL), pp. 2465–2468.
CIKM-2011-JacobDG #classification #corpus #multi #social- Classification and annotation in social corpora using multiple relations (YJ, LD, PG), pp. 1215–1220.
CIKM-2011-KasiviswanathanMBS #detection #learning #taxonomy #topic- Emerging topic detection using dictionary learning (SPK, PM, AB, VS), pp. 745–754.
CIKM-2011-KongDH #matrix #robust- Robust nonnegative matrix factorization using L21-norm (DK, CHQD, HH), pp. 673–682.
CIKM-2011-KustarevULGSS #metric- Smoothing NDCG metrics using tied scores (AK, YU, YL, EG, IS, PS), pp. 2053–2056.
CIKM-2011-LeeRK #algorithm #recognition- Named entity recognition using a modified Pegasos algorithm (CL, PMR, HK), pp. 2337–2340.
CIKM-2011-LinTC #classification #independence #sentiment #word- Language-independent sentiment classification using three common words (ZL, ST, XC), pp. 1041–1046.
CIKM-2011-LiuWZ #clustering #feature model- Feature selection using hierarchical feature clustering (HL, XW, SZ), pp. 979–984.
CIKM-2011-MagdyJ #performance- An efficient method for using machine translation technologies in cross-language patent search (WM, GJFJ), pp. 1925–1928.
CIKM-2011-MaLL - Selecting related terms in query-logs using two-stage SimRank (YM, HL, YL), pp. 1969–1972.
CIKM-2011-NiuLX #graph #named #ranking- DIGRank: using global degree to facilitate ranking in an incomplete graph (XN, LL, KX), pp. 2297–2300.
CIKM-2011-OzertemVL #set- Suggestion set utility maximization using session logs (UO, EV, LL), pp. 105–114.
CIKM-2011-Pasca #query #web #what- Asking what no one has asked before: using phrase similarities to generate synthetic web search queries (MP), pp. 1347–1352.
CIKM-2011-PeelWZ #string- Collection-based compression using discovered long matching strings (AP, AW, JZ), pp. 2361–2364.
CIKM-2011-PilzP #distance- From names to entities using thematic context distance (AP, GP), pp. 857–866.
CIKM-2011-QuattroneCMFU #effectiveness #folksonomy #retrieval #similarity- Effective retrieval of resources in folksonomies using a new tag similarity measure (GQ, LC, PDM, EF, DU), pp. 545–550.
CIKM-2011-SoodL #detection #probability- Probabilistic near-duplicate detection using simhash (SS, DL), pp. 1117–1126.
CIKM-2011-VinzamuriK #classification #convergence #design- Designing an ensemble classifier over subspace classifiers using iterative convergence routine (BV, KK), pp. 693–698.
CIKM-2011-VirgilioM #calculus #data analysis- RFID data analysis using tensor calculus for supply chain management (RDV, FM), pp. 1743–1748.
CIKM-2011-WangZLBW #classification #multi #random- Using random walks for multi-label classification (CW, WZ, ZL, YB, JW), pp. 2197–2200.
CIKM-2011-WeichselbraunGS #game studies #sentiment- Using games with a purpose and bootstrapping to create domain-specific sentiment lexicons (AW, SG, AS), pp. 1053–1060.
CIKM-2011-WesselOVBK #3d #modelling #performance #retrieval- Efficient retrieval of 3D building models using embeddings of attributed subgraphs (RW, SO, RV, IB, RK), pp. 2097–2100.
CIKM-2011-WuQD #owl #pipes and filters- Finding all justifications of OWL entailments using TMS and MapReduce (GW, GQ, JD), pp. 1425–1434.
ECIR-2011-AktolgaAS #ranking- Passage Reranking for Question Answering Using Syntactic Structures and Answer Types (EA, JA, DAS), pp. 617–628.
ECIR-2011-AlbakourKNKSFR #evaluation #named #query- AutoEval: An Evaluation Methodology for Evaluating Query Suggestions Using Query Logs (MDA, UK, NN, YK, DS, MF, ANDR), pp. 605–610.
ECIR-2011-AlonsoB #crowdsourcing #design #implementation- Design and Implementation of Relevance Assessments Using Crowdsourcing (OA, RABY), pp. 153–164.
ECIR-2011-BadrinathVM #query #summary- Improving Query Focused Summarization Using Look-Ahead Strategy (RB, SV, CEVM), pp. 641–652.
ECIR-2011-BuccioMS #framework #predict #towards- Towards Predicting Relevance Using a Quantum-Like Framework (EDB, MM, DS), pp. 755–758.
ECIR-2011-GeraniKCC #retrieval- Personal Blog Retrieval Using Opinion Features (SG, MK, MJC, FC), pp. 747–750.
ECIR-2011-KinsellaPB #classification #metadata #social #social media #topic- Topic Classification in Social Media Using Metadata from Hyperlinked Objects (SK, AP, JGB), pp. 201–206.
ECIR-2011-OhCM #classification #modelling #scalability #taxonomy- Text Classification for a Large-Scale Taxonomy Using Dynamically Mixed Local and Global Models for a Node (HSO, YC, SHM), pp. 7–18.
ECIR-2011-PhelanMBS #recommendation #twitter- Terms of a Feather: Content-Based News Recommendation and Discovery Using Twitter (OP, KM, MB, BS), pp. 448–459.
ECIR-2011-ZhaoJWHLYL #modelling #topic #twitter- Comparing Twitter and Traditional Media Using Topic Models (WXZ, JJ, JW, JH, EPL, HY, XL), pp. 338–349.
ICML-2011-CrammerG #adaptation #classification #feedback #multi- Multiclass Classification with Bandit Feedback using Adaptive Regularization (KC, CG), pp. 273–280.
ICML-2011-HockingVBJ #algorithm #clustering #named- Clusterpath: an Algorithm for Clustering using Convex Fusion Penalties (TH, JPV, FRB, AJ), pp. 745–752.
ICML-2011-HuWC #coordination #kernel #learning #named #parametricity #scalability- BCDNPKL: Scalable Non-Parametric Kernel Learning Using Block Coordinate Descent (EH, BW, SC), pp. 209–216.
ICML-2011-JawanpuriaNR #kernel #learning #performance- Efficient Rule Ensemble Learning using Hierarchical Kernels (PJ, JSN, GR), pp. 161–168.
ICML-2011-JegelkaB11a #approximate #bound- Approximation Bounds for Inference using Cooperative Cuts (SJ, JAB), pp. 577–584.
ICML-2011-JetchevT #feedback #retrieval- Task Space Retrieval Using Inverse Feedback Control (NJ, MT), pp. 449–456.
ICML-2011-KamisettyXL #approximate #correlation- Approximating Correlated Equilibria using Relaxations on the Marginal Polytope (HK, EPX, CJL), pp. 1153–1160.
ICML-2011-LiuI #bound #difference- Bounding the Partition Function using Holder’s Inequality (QL, ATI), pp. 849–856.
ICML-2011-Potetz #linear #problem- Estimating the Bayes Point Using Linear Knapsack Problems (BP), pp. 257–264.
ICML-2011-SuSM #classification #multi #naive bayes #scalability- Large Scale Text Classification using Semisupervised Multinomial Naive Bayes (JS, JSS, SM), pp. 97–104.
ICML-2011-YangR #learning #on the #visual notation- On the Use of Variational Inference for Learning Discrete Graphical Model (EY, PDR), pp. 1009–1016.
KDD-2011-ApplegateDKU #clustering #distance #multi- Unsupervised clustering of multidimensional distributions using earth mover distance (DA, TD, SK, SU), pp. 636–644.
KDD-2011-DalviKMR #nearest neighbour- Sampling hidden objects using nearest-neighbor oracles (NND, RK, AM, VR), pp. 1325–1333.
KDD-2011-Dhurandhar #predict- Improving predictions using aggregate information (AD), pp. 1118–1126.
KDD-2011-EneIM #clustering #performance #pipes and filters- Fast clustering using MapReduce (AE, SI, BM), pp. 681–689.
KDD-2011-HendersonGLAETF #graph #mining #recursion- It’s who you know: graph mining using recursive structural features (KH, BG, LL, LA, TER, HT, CF), pp. 663–671.
KDD-2011-Inchiosa #data mining #mining #scalability- Accelerating large-scale data mining using in-database analytics (MEI), p. 778.
KDD-2011-LeeOYK #privacy #semantics- Protecting location privacy using location semantics (BL, JO, HY, JK), pp. 1289–1297.
KDD-2011-McCloskeyKIKB #behaviour #data mining #mining- From market baskets to mole rats: using data mining techniques to analyze RFID data describing laboratory animal behavior (DPM, MEK, SPI, IK, SBM), pp. 301–306.
KDD-2011-MenonCGAK #collaboration #predict- Response prediction using collaborative filtering with hierarchies and side-information (AKM, KPC, SG, DA, NK), pp. 141–149.
KDD-2011-MesterharmP #algorithm #learning #online- Active learning using on-line algorithms (CM, MJP), pp. 850–858.
KDD-2011-PereiraB #classification #functional- Classification of functional magnetic resonance imaging data using informative pattern features (FP, MB), pp. 940–946.
KDD-2011-SatpalBSRS #information management #logic #markov #network #web- Web information extraction using markov logic networks (SS, SB, SS, RR, PS), pp. 1406–1414.
KDD-2011-SimonLJV #comprehension #image- Understanding atrophy trajectories in alzheimer’s disease using association rules on MRI images (GJS, PWL, CRJJ, PV), pp. 369–376.
KDIR-2011-ArmanoGV #concept #semantics- Semantic Enrichment of Contextual Advertising by using Concepts (GA, AG, EV), pp. 232–237.
KDIR-2011-BallesterosFDHG #analysis #dependence- Inferring the Scope of Speculation using Dependency Analysis (MB, VF, AD, JH, PG), pp. 256–261.
KDIR-2011-BressoBSMKSND #mining #reduction- Use of Domain Knowledge for Dimension Reduction — Application to Mining of Drug Side Effects (EB, SB, MST, GM, ASK, MS, AN, MDD), pp. 271–276.
KDIR-2011-GuoK #ontology #research- Discovering Relationship Associations from the Literature Related to Research Projects in Sustainability Science using Ontology and Inference (WG, SBK), pp. 390–393.
KDIR-2011-LachetarB #algorithm #categorisation #metadata- Application of an Ant Colony Algorithm — For Song Categorising using Metadata (NL, HB), pp. 379–384.
KDIR-2011-LiVM #graph #learning #relational #visual notation- Unsupervised Handwritten Graphical Symbol Learning — Using Minimum Description Length Principle on Relational Graph (JL, CVG, HM), pp. 172–178.
KDIR-2011-MartelotH #algorithm #community #detection #multi #optimisation- Multi-scale Community Detection using Stability as Optimisation Criterion in a Greedy Algorithm (ELM, CH), pp. 216–225.
KDIR-2011-MauleKR #approach #automation- Automated Approach for Whole Brain Infarction Core Delineation — Using Non-contrast and Computed Tomography Angiography (PM, JK, VR), pp. 433–437.
KDIR-2011-OmerBG #algorithm #mining #motivation- A New Frequent Similar Tree Algorithm Motivated by Dom Mining — Using RTDM and its New Variant — SiSTeR (OB, RB, SG), pp. 238–243.
KDIR-2011-PrachuabsupakijS #classification #multi #set- Multi-class Data Classification for Imbalanced Data Set using Combined Sampling Approaches (WP, NS), pp. 166–171.
KDIR-2011-RavulaCL #dynamic analysis- Dynamic Analysis of Malware using Decision Trees (RRR, CCC, KJL), pp. 74–83.
KDIR-2011-ReuterC #identification #learning #similarity- Learning Similarity Functions for Event Identification using Support Vector Machines (TR, PC), pp. 208–215.
KDIR-2011-RomeiT #process #programming #xquery- Programming the KDD Process using XQuery (AR, FT), pp. 131–139.
KEOD-2011-GerberGM #ambiguity #consistency #development #ontology #standard- Using Formal Ontologies for the Development of Consistent and Unambiguous Financial Accounting Standards (MCG, AG, AvdM), pp. 419–424.
KEOD-2011-KohnMSL #complexity #ontology- Use of Existing Ontologies as Input for Structural Complexity Management — Reducing the Effort for Analysing and Improving Engineering Systems (AK, MM, HXS, UL), pp. 195–201.
KEOD-2011-MendesFS - Comparing Services using DEMO (CM, JF, MMdS), pp. 528–537.
KEOD-2011-OkumuraH #concept- A Refining Method of Obtained Attributes to Characterize Undefined Concepts using Search Engine (NO, YH), pp. 493–497.
KEOD-2011-Rios-AlvaradoLS #taxonomy #web- Structuring Taxonomies by using Linguistic Patterns and WordNet on Web Search (ABRA, ILA, VSS), pp. 273–278.
KEOD-2011-SuzukiF #classification #documentation #multi- Multi-labeled Patent Document Classification using Technical Term Thesaurus (YS, FF), pp. 425–428.
KMIS-2011-AlaviJY #performance- An Investigation of the Use of KMS on Clinical Performance (MA, SLJ, YY), pp. 236–240.
KMIS-2011-Chebel-MorelloHZ #adaptation #modelling #reasoning- Adaptation based on Knowledge Models for Diagnostic Systems using Case-base Reasoning (BCM, MKH, NZ), pp. 223–229.
KMIS-2011-CostantinoDFS #analysis #evaluation #nondeterminism- A Model using Data Envelopment Analysis for the Cross Evaluation of Suppliers under Uncertainty (NC, MD, MF, FS), pp. 152–157.
KMIS-2011-FortierS #modelling #process #requirements- Defining Information Requirements — Using Business Process Modeling for Incident Response for Chemical Facilities (SCF, GLS), pp. 411–417.
KMIS-2011-Grim-YefsahRT11a #network #process #robust- Using Information of an Informal Network to Evaluate Business Process Robustness (MGY, CRS, VTG), pp. 430–435.
KMIS-2011-LunesuPC11a #approach #knowledge base #multi #standard- Using a Standards-based Approach for a Multimedia Knowledge-base (MIL, FEP, GC), pp. 87–95.
KMIS-2011-Nishioka #process- Quotation Process Management of One-of-a-kind Production using PSLX Information Model (YN), pp. 167–172.
KMIS-2011-SchmidlK #information management- Using Task Histories to Support Person-to-person Knowledge Exchange — Extracting and using Contextual Overlap and Levels of Expertise to Connect Knowledge Workers (JS, HK), pp. 77–86.
MLDM-2011-AlshukriCZ #bound #detection #incremental #random- Incremental Web-Site Boundary Detection Using Random Walks (AA, FC, MZ), pp. 414–427.
MLDM-2011-CataltepeSBE #classification- Collective Classification Using Heterogeneous Classifiers (ZÇ, AS, KB, AE), pp. 155–169.
MLDM-2011-ChenER #mining #parametricity- Mining Spatial Trajectories Using Non-parametric Density Functions (CSC, CFE, NJR), pp. 496–510.
MLDM-2011-Garcia-ConstantinoCNRST #classification #generative #summary- An Investigation Concerning the Generation of Text Summarisation Classifiers Using Secondary Data (MGC, FC, PJN, AR, CS, AT), pp. 387–398.
MLDM-2011-GunesCO #algorithm #classification #named #novel #relational #search-based- GA-TVRC: A Novel Relational Time Varying Classifier to Extract Temporal Information Using Genetic Algorithms (IG, ZÇ, SGÖ), pp. 568–583.
MLDM-2011-Kessl #mining #parallel- Static Load Balancing of Parallel Mining of Frequent Itemsets Using Reservoir Sampling (RK), pp. 553–567.
MLDM-2011-PerezR #array #detection- Detection of Phenotypes in Microarray Data Using Force- Directed Placement Transformss (DVP, KAR), pp. 320–334.
MLDM-2011-PiatkowskaMNP #analysis #image #multi #semantics- A Decision Support System Based on the Semantic Analysis of Melanoma Images Using Multi-elitist PSO and SVM (WP, JM, LN, KP), pp. 362–374.
RecSys-2011-DalyG #effectiveness #recommendation #social- Effective event discovery: using location and social information for scoping event recommendations (EMD, WG), pp. 277–280.
RecSys-2011-Faridani #analysis #canonical #correlation #recommendation #sentiment- Using canonical correlation analysis for generalized sentiment analysis, product recommendation and search (SF), pp. 355–358.
RecSys-2011-KatzOSRS #collaboration #wiki- Using Wikipedia to boost collaborative filtering techniques (GK, NO, BS, LR, GS), pp. 285–288.
RecSys-2011-SekoYMM #behaviour #recommendation #representation- Group recommendation using feature space representing behavioral tendency and power balance among members (SS, TY, MM, SyM), pp. 101–108.
SEKE-2011-AlmeidaMA #analysis #execution #process- Analysis of the continuity of software processes execution in software organizations assessed in MPS.BR using Grounded Theory (CDAdA, TCM, AA), pp. 792–797.
SEKE-2011-AndradeDBW #approach #communication #documentation #retrieval- An approach for retrieval and knowledge communication using medical documents (RA, MARD, FCB, AvW), pp. 169–174.
SEKE-2011-AntunesCCG #development #information management- Using Contextual Information to Improve Awareness in Software Development(S) (BA, JC, PC, PG), pp. 349–352.
SEKE-2011-BhattacharyaCSK #enterprise- Dynamic Service Choreography using Context Aware Enterprise Service Bus (SB, JC, SS, AK), pp. 319–324.
SEKE-2011-BragaD #detection #information management #tool support- Fraud Detection in Selection Exams Using Knowledge Engineering Tools (MdMB, MARD), pp. 163–168.
SEKE-2011-El-KharboutlyG #analysis #architecture #concurrent #probability #reliability- Architecture-based Reliability Analysis of Concurrent Software Applications using Stochastic Reward Nets (REK, SSG), pp. 635–639.
SEKE-2011-FronzaSSV #predict- Failure Prediction based on Log Files Using the Cox Proportional Hazard Model (IF, AS, GS, JV), pp. 456–461.
SEKE-2011-GregoriadesLP11a #calculus #risk management- Project Risk Management Using Event Calculus(S) (AG, VPL, PP), pp. 335–338.
SEKE-2011-Kaiser #concurrent #debugging #higher-order- Constructing Subtle Concurrency Bugs Using Synchronization-Centric Second-Order Mutation Operators (LWGK), pp. 244–249.
SEKE-2011-MachadoAF #evolution #requirements #semantics- Using Semantic Annotations for Supporting Requirements Evolution (BNM, LdOA, RdAF), pp. 185–190.
SEKE-2011-SanfordWX #analysis #modelling #security- Security Analysis of FileZilla Server Using Threat Models (MS, DW, DX), pp. 678–682.
SEKE-2011-ScatalonGC #approach #delivery #ontology- Packaging Controlled Experiments Using an Evolutionary Approach Based on Ontology(S) (LPS, REG, RCMC), pp. 408–413.
SEKE-2011-SouzaSMCSZ #concurrent #quality #reachability #testing- Using Coverage and Reachability Testing to Improve Concurrent Program Testing Quality (SdRSdS, PSLdS, MCCM, MSC, AdSS, EZ), pp. 207–212.
SEKE-2011-SunHGZWY #detection #novel #petri net- A Novel Method for Formally Detecting RFID Event Using Petri Nets (JS, YH, XG, SZ, LW, CYY), pp. 122–125.
SEKE-2011-SunWH #architecture #design #modelling #ontology- Design Software Architecture Models using Ontology (JS, HHW, TH), pp. 191–196.
SEKE-2011-VilkomirKT #algorithm #case study #interface #testing- Interface Testing Using a Subgraph Splitting Algorithm: A Case Study (SV, AAK, NT), pp. 219–224.
SEKE-2011-WagnerFF #process #security- Using Security Patterns to Tailor Software Process (RW, LMF, ABF), pp. 672–677.
SEKE-2011-WangKN #empirical #metric- An Empirical Study of Software Metrics Selection Using Support Vector Machine (HW, TMK, AN), pp. 83–88.
SIGIR-2011-AgeevGLA #game studies #interactive #modelling #web- Find it if you can: a game for modeling different types of web search success using interaction data (MA, QG, DL, EA), pp. 345–354.
SIGIR-2011-BennettRWY #metadata #personalisation #web- Inferring and using location metadata to personalize web search (PNB, FR, RWW, EY), pp. 135–144.
SIGIR-2011-BlancoHHMPTT #crowdsourcing #evaluation #reliability- Repeatable and reliable search system evaluation using crowdsourcing (RB, HH, DMH, PM, JP, HST, DTT), pp. 923–932.
SIGIR-2011-BouadjenekHBD #personalisation #query #social- Personalized social query expansion using social bookmarking systems (MRB, HH, MB, JD), pp. 1113–1114.
SIGIR-2011-Campos #analysis #query #web- Using k-Top retrieved web snippets to date temporalimplicit queries based on web content analysis (RNTC), pp. 1325–1326.
SIGIR-2011-CumminsJO #performance #predict #query #standard- Improved query performance prediction using standard deviation (RC, JMJ, CO), pp. 1089–1090.
SIGIR-2011-DingS #documentation #performance #retrieval- Faster top-k document retrieval using block-max indexes (SD, TS), pp. 993–1002.
SIGIR-2011-InagakiBCM #mobile #web- Enhancing mobile search using web search log data (YI, JB, YC, MM), pp. 1201–1202.
SIGIR-2011-JethavaCBBD #identification #multi #scalability- Scalable multi-dimensional user intent identification using tree structured distributions (VJ, LCB, RABY, CB, DPD), pp. 395–404.
SIGIR-2011-LappasPS #mining #network #social- Mining tags using social endorsement networks (TL, KP, TS), pp. 195–204.
SIGIR-2011-LeeHWHS #dataset #graph #image #learning #multi #pipes and filters #scalability- Multi-layer graph-based semi-supervised learning for large-scale image datasets using mapreduce (WYL, LCH, GLW, WHH, YFS), pp. 1121–1122.
SIGIR-2011-Li11a #information retrieval- Domain-specific information retrieval using rcommenders (WL), pp. 1327–1328.
SIGIR-2011-LiDS #concept #recommendation #semantics- Semantic tag recommendation using concept model (CL, AD, AS), pp. 1159–1160.
SIGIR-2011-LiHZW #information retrieval #query #segmentation- Unsupervised query segmentation using clickthrough for information retrieval (YL, BJPH, CZ, KW), pp. 285–294.
SIGIR-2011-LimsopathamSMO - Disambiguating biomedical acronyms using EMIM (NL, RLTS, CM, IO), pp. 1213–1214.
SIGIR-2011-LiZMWCGX #comparative #comparison- Product comparison using comparative relations (SL, ZJZ, ZM, MW, TSC, JG, WX), pp. 1151–1152.
SIGIR-2011-MoshfeghiPJ #collaboration #semantics- Handling data sparsity in collaborative filtering using emotion and semantic based features (YM, BP, JMJ), pp. 625–634.
SIGIR-2011-OchiOO #predict #rating #word- Rating prediction using feature words extracted from customer reviews (MO, MO, RO), pp. 1205–1206.
SIGIR-2011-PaikPP #algorithm #novel #statistics- A novel corpus-based stemming algorithm using co-occurrence statistics (JHP, DP, SKP), pp. 863–872.
SIGIR-2011-SakaiS - Evaluating diversified search results using per-intent graded relevance (TS, RS), pp. 1043–1052.
SIGIR-2011-Wang #comprehension #information management #recommendation- Understanding and using contextual information in recommender systems (LW), pp. 1329–1330.
SIGIR-2011-WangHND #classification #information management #matrix #web- Cross-language web page classification via dual knowledge transfer using nonnegative matrix tri-factorization (HW, HH, FN, CHQD), pp. 933–942.
SIGIR-2011-WuYLLYX #learning #rank- Learning to rank using query-level regression (JW, ZY, YL, HL, ZY, KX), pp. 1091–1092.
SIGIR-2011-YangLSZZ #collaboration #learning #recommendation- Collaborative competitive filtering: learning recommender using context of user choice (SHY, BL, AJS, HZ, ZZ), pp. 295–304.
SIGIR-2011-ZhaoHH #information retrieval #named #probability- CRTER: using cross terms to enhance probabilistic information retrieval (JZ, JXH, BH), pp. 155–164.
SIGIR-2011-ZhouHH #ad hoc #estimation #probability- Enhancing ad-hoc relevance weighting using probability density estimation (XZ, JXH, BH), pp. 175–184.
BX-2011-Boronat #consistency #detection #maude #modelling #nondeterminism #specification- Inconsistency detection and resolution in heterogenous model-based specifications using Maude (AB), p. 53.
BX-2011-Cleve #co-evolution #source code- Co-evolving schemas and programs using coupled transformations (AC), p. 54.
ECMFA-2011-ColomboKL #analysis #design #generative #modelling #problem #requirements- Generating Early Design Models from Requirements Analysis Artifacts Using Problem Frames and SysML (PC, FK, LL), pp. 97–114.
MoDELS-2011-AliBAW #algorithm #aspect-oriented #industrial #modelling #robust #testing #uml- An Industrial Application of Robustness Testing Using Aspect-Oriented Modeling, UML/MARTE, and Search Algorithms (SA, LCB, AA, SW), pp. 108–122.
MoDELS-2011-Chimiak-Opoka #framework #metric #modelling #ocl #uml- Measuring UML Models Using Metrics Defined in OCL within the SQUAM Framework (JCO), pp. 47–61.
MoDELS-2011-IzukuraYOSKX #approach #development #modelling- Applying a Model-Based Approach to IT Systems Development Using SysML Extension (SI, KY, TO, HS, DK, JX), pp. 563–577.
MoDELS-2011-MaozRR11a #alloy #analysis #diagrams #named #revisited- CD2Alloy: Class Diagrams Analysis Using Alloy Revisited (SM, JOR, BR), pp. 592–607.
MoDELS-2011-MoffettBD #consistency #model checking #protocol #uml #verification- Verifying UML-RT Protocol Conformance Using Model Checking (YM, AB, JD), pp. 410–424.
MoDELS-2011-ZhangK #architecture #collaboration #industrial #modelling- Using Delta Model for Collaborative Work of Industrial Large-Scaled E/E Architecture Models (RZ, AK), pp. 714–728.
PLEASE-2011-Kulkarni #challenge #delivery- Use of SPLE to deliver custom solutions at product cost: challenges and a way forward (VK), pp. 1–5.
PLEASE-2011-SunCGW #approach #feature model- Supporting feature model configuration using a demonstration-based approach (YS, HC, JGG, JW), pp. 55–59.
SPLC-2011-GhezziS #approach #model checking #non-functional #parametricity #performance #product line #towards #verification- Verifying Non-functional Properties of Software Product Lines: Towards an Efficient Approach Using Parametric Model Checking (CG, AMS), pp. 170–174.
SPLC-2011-VolterV #domain-specific language #product line- Product Line Engineering Using Domain-Specific Languages (MV, EV), pp. 70–79.
ECOOP-2011-Duala-EkokoR #api #recommendation- Using Structure-Based Recommendations to Facilitate Discoverability in APIs (EDE, MPR), pp. 79–104.
ECOOP-2011-RichardsHBV #javascript #scalability- The Eval That Men Do — A Large-Scale Study of the Use of Eval in JavaScript Applications (GR, CH, BB, JV), pp. 52–78.
OOPSLA-2011-Golan-GuetaBARSY #automation- Automatic fine-grain locking using shape properties (GGG, NGB, AA, GR, MS, EY), pp. 225–242.
OOPSLA-2011-KeLZBJD #dependence #parallel #programming- Safe parallel programming using dynamic dependence hints (CK, LL, CZ, TB, BJ, CD), pp. 243–258.
OOPSLA-2011-WeeratungeZJ - Accentuating the positive: atomicity inference and enforcement using correct executions (DW, XZ, SJ), pp. 19–34.
PLATEAU-2011-BarisicAGB #case study #domain-specific language #quality- Quality in use of domain-specific languages: a case study (AB, VA, MG, BB), pp. 65–72.
PLATEAU-2011-ShonleGL #design- Using metaphors from natural discussion to improve the design of arcum (MS, WGG, SL), pp. 39–44.
PLATEAU-2011-StefikSSS #comparison #empirical #perl #programming language- An empirical comparison of the accuracy rates of novices using the quorum, perl, and randomo programming languages (AS, SS, MS, KS), pp. 3–8.
AdaEurope-2011-ChilAOP #ada #interface- Using Robotics as a Motivational Tool: An Ada Interface to a Pioneer Robot (RC, DA, FJO, JAP), pp. 147–159.
AdaEurope-2011-OLeary #reliability #web #web service- Assuring Software Reliability While Using Web Services and Commercial Products (JO), pp. 1–16.
AdaEurope-2011-SaezTC #ada #framework #multi #platform #realtime- A Real-Time Framework for Multiprocessor Platforms Using Ada 2012 (SS, ST, AC), pp. 46–60.
LOPSTR-2011-FioravantiPPS - Using Real Relaxations during Program Specialization (FF, AP, MP, VS), pp. 106–122.
LOPSTR-2011-Gallagher #analysis #logic programming #source code- Analysis of Logic Programs Using Regular Tree Languages — (JPG), pp. 1–3.
LOPSTR-2011-PilozziS #analysis #self #termination- Improved Termination Analysis of CHR Using Self-sustainability Analysis (PP, DDS), pp. 189–204.
PADL-2011-ChristakisS #detection #fault #message passing #static analysis- Detection of Asynchronous Message Passing Errors Using Static Analysis (MC, KFS), pp. 5–18.
PADL-2011-RedlEK #declarative #set- Declarative Belief Set Merging Using Merging Plans (CR, TE, TK), pp. 99–114.
PADL-2011-SalgueiroDBA #constraints #detection- Using Constraints for Intrusion Detection: The NeMODe System (PDS, DD, IB, SA), pp. 115–129.
PEPM-2011-AlbertBGHPR - Verified resource guarantees using COSTA and KeY (EA, RB, SG, RH, GP, GRD), pp. 73–76.
PLDI-2011-BohmKKFT #compilation #parallel- Generalized just-in-time trace compilation using a parallel task farm in a dynamic binary translator (IB, TJKEvK, SCK, BF, NPT), pp. 74–85.
PLDI-2011-JoseM #fault #locality #satisfiability- Cause clue clauses: error localization using maximum satisfiability (MJ, RM), pp. 437–446.
PLDI-2011-LuciaWC #comprehension #concurrent #execution #fault- Isolating and understanding concurrency errors using reconstructed execution fragments (BL, BPW, LC), pp. 378–388.
PLDI-2011-RamanKOLA #distributed #parallel- Parallelism orchestration using DoPE: the degree of parallelism executive (AR, HK, TO, JWL, DIA), pp. 26–37.
PLDI-2011-SrivastavaBMS #api #detection #implementation #multi #policy #security- A security policy oracle: detecting security holes using multiple API implementations (VS, MDB, KSM, VS), pp. 343–354.
PLDI-2011-ZengWL #concurrent #data type #monitoring #named- Cruiser: concurrent heap buffer overflow monitoring using lock-free data structures (QZ, DW, PL), pp. 367–377.
POPL-2011-DilligDA #precise #reasoning #source code- Precise reasoning for programs using containers (ID, TD, AA), pp. 187–200.
POPL-2011-Gulwani #automation #spreadsheet #string- Automating string processing in spreadsheets using input-output examples (SG), pp. 317–330.
POPL-2011-JoishaSBBC #automation #compilation #effectiveness #optimisation #parallel #reuse #thread- A technique for the effective and automatic reuse of classical compiler optimizations on multithreaded code (PGJ, RSS, PB, HJB, DRC), pp. 623–636.
POPL-2011-RamseyD #composition #dependent type #independence #low level #type system- Resourceable, retargetable, modular instruction selection using a machine-independent, type-based tiling of low-level intermediate code (NR, JD), pp. 575–586.
PPDP-2011-BourdierC #analysis #network #policy #security #term rewriting- Symbolic analysis of network security policies using rewrite systems (TB, HC), pp. 77–88.
PPDP-2011-EscobarKLMMNS #analysis #encryption #protocol #unification- Protocol analysis in Maude-NPA using unification modulo homomorphic encryption (SE, DK, CL, CM, JM, PN, RS), pp. 65–76.
PPDP-2011-InabaHHKN #higher-order #logic #monad #verification- Graph-transformation verification using monadic second-order logic (KI, SH, ZH, HK, KN), pp. 17–28.
SAS-2011-DonaldsonHKR #verification- Software Verification Using k-Induction (AFD, LH, DK, PR), pp. 351–368.
SAS-2011-MadhusudanQ #performance- Efficient Decision Procedures for Heaps Using STRAND (PM, XQ), pp. 43–59.
SAS-2011-MonniauxG #bound #fixpoint #model checking- Using Bounded Model Checking to Focus Fixpoint Iterations (DM, LG), pp. 369–385.
SIGAda-2011-BeltHRCHD #contract #execution #symbolic computation- Enhancing spark’s contract checking facilities using symbolic execution (JB, JH, R, PC, DH, XD), pp. 47–60.
RE-2011-FranchMTC #framework #modelling #on the- On the joint use of i* with other modelling frameworks: A vision paper (XF, AM, JT, CC), pp. 133–142.
REFSQ-2011-DhunganaSG #elicitation #modelling #product line #requirements #research #variability- Research Preview: Supporting End-User Requirements Elicitation Using Product Line Variability Models (DD, NS, FG), pp. 66–71.
ASE-2011-AlshahwanH #automation #re-engineering #testing #web- Automated web application testing using search based software engineering (NA, MH), pp. 3–12.
ASE-2011-AlvesGJd #impact analysis #slicing- Fault-localization using dynamic slicing and change impact analysis (EA, MG, VJ, Md), pp. 520–523.
ASE-2011-ApelSWRB #detection #feature model #interactive #verification- Detection of feature interactions using feature-aware verification (SA, HS, PW, AvR, DB), pp. 372–375.
ASE-2011-Bandyopadhyay #fault #locality #testing- Improving spectrum-based fault localization using proximity-based weighting of test cases (AB), pp. 660–664.
ASE-2011-GarciaPMMC #architecture- Enhancing architectural recovery using concerns (JG, DP, CM, NM, YC), pp. 552–555.
ASE-2011-KhalekYZMK #alloy #java #named #source code #specification #testing- TestEra: A tool for testing Java programs using alloy specifications (SAK, GY, LZ, DM, SK), pp. 608–611.
ASE-2011-LutzJP #assurance #modelling- Using model-based assurance to strengthen diagnostic procedures (RRL, JJ, APH), pp. 516–519.
ASE-2011-RathfelderKE #automation #capacity #performance #predict- Capacity planning for event-based systems using automated performance predictions (CR, SK, DE), pp. 352–361.
ASE-2011-SagdeoAKV #clustering #invariant #named- PRECIS: Inferring invariants using program path guided clustering (PS, VA, SK, SV), pp. 532–535.
ASE-2011-StehleLSRM #geometry- Diagnosis of software failures using computational geometry (ES, KL, MS, CR, SM), pp. 496–499.
ASE-2011-SunL #concept analysis- Using Formal Concept Analysis to support change analysis (XS, BL), pp. 641–645.
ASE-2011-VakiliD #declarative #model checking #modelling- Using model checking to analyze static properties of declarative models (AV, NAD), pp. 428–431.
ESEC-FSE-2011-BarzilayHY #developer #social #social media- Using social media to study the diversity of example usage among professional developers (OB, OH, AY), pp. 472–475.
ESEC-FSE-2011-CifuentesKLHVBZCTH #fault #scalability- Static deep error checking in large system applications using parfait (CC, NK, LL, NH, MV, AB, JZ, AC, DT, CH), pp. 432–435.
ESEC-FSE-2011-LiCK #analysis #performance #points-to- Boosting the performance of flow-sensitive points-to analysis using value flow (LL, CC, NK), pp. 343–353.
ESEC-FSE-2011-PalmaST #interactive #requirements #smt- Using an SMT solver for interactive requirements prioritization (FP, AS, PT), pp. 48–58.
ESEC-FSE-2011-RamamurthiRS #analysis #data flow #graph #probability- Probabilistic dataflow analysis using path profiles on structure graphs (AR, SR, YNS), pp. 512–515.
ESEC-FSE-2011-ZhengZL #api #recommendation #web- Cross-library API recommendation using web search engines (WZ, QZ, MRL), pp. 480–483.
ICSE-2011-ArcuriB #algorithm #random #re-engineering #statistics #testing- A practical guide for using statistical tests to assess randomized algorithms in software engineering (AA, LCB), pp. 1–10.
ICSE-2011-Bhattacharya #development #evolution #maintenance- Using software evolution history to facilitate development and maintenance (PB), pp. 1122–1123.
ICSE-2011-CordeiroF #bound #concurrent #model checking #multi #smt #thread #verification- Verifying multi-threaded software using smt-based context-bounded model checking (LC, BF), pp. 331–340.
ICSE-2011-DietlDEMS - Building and using pluggable type-checkers (WD, SD, MDE, KM, TWS), pp. 681–690.
ICSE-2011-FeinRSMGGBCLSMMSD #automation #deployment #tool support- Using MATCON to generate CASE tools that guide deployment of pre-packaged applications (EF, NR, SS, PM, SG, RG, MB, SKC, JL, VSS, SM, DM, BS, PD), pp. 1016–1018.
ICSE-2011-Goeritzer #impact analysis #industrial- Using impact analysis in industry (RG), pp. 1155–1157.
ICSE-2011-KamalrudinHG #case study #interactive #quality #requirements- Improving requirements quality using essential use case interaction patterns (MK, JGH, JCG), pp. 531–540.
ICSE-2011-LimDF #identification #network #requirements #social- StakeSource2.0: using social networks of stakeholders to identify and prioritise requirements (SLL, DD, AF), pp. 1022–1024.
ICSE-2011-Malik #analysis #graph- Dynamic shape analysis of program heap using graph spectra (MZM), pp. 952–955.
ICSE-2011-MurtazaMGL #fault- Diagnosing new faults using mutants and prior faults (SSM, NHM, MG, ZL), pp. 960–963.
ICSE-2011-Smith #functional #requirements #security #testing- Systematizing security test case planning using functional requirements phrases (BS), pp. 1136–1137.
ICSE-2011-Thomas #mining #modelling #repository #topic- Mining software repositories using topic models (SWT), pp. 1138–1139.
ICSE-2011-TofanGA #architecture #grid- Capturing tacit architectural knowledge using the repertory grid technique (DT, MG, PA), pp. 916–919.
SAC-2011-BabichCPK #abstraction #case study #eclipse #fault #object-oriented #predict- Using a class abstraction technique to predict faults in OO classes: a case study through six releases of the Eclipse JDT (DB, PJC, JFP, BMGK), pp. 1419–1424.
SAC-2011-BelcaidBHP #clustering #performance- Efficient clustering of populations using a minimal SNP panel (MB, KB, DH, GP), pp. 83–88.
SAC-2011-ChangH #approach #model transformation #multi #verification- A model transformation approach for verifying multi-agent systems using SPIN (LC, XH), pp. 37–42.
SAC-2011-FabreKT #lessons learnt #robust- Robustness of automotive applications using reflective computing: lessons learnt (JCF, MOK, FT), pp. 230–235.
SAC-2011-HeinenE #incremental #modelling- Incremental feature-based mapping from sonar data using Gaussian mixture models (MRH, PME), pp. 1370–1375.
SAC-2011-HuLCHXL #image #segmentation- Image segmentation of cervical vertebra in X-ray radiographs using the curve fitting strategy (HH, HL, LC, CCH, XX, ZL), pp. 853–858.
SAC-2011-Jamil #graph #query #unification- Computing subgraph isomorphic queries using structural unification and minimum graph structures (HMJ), pp. 1053–1058.
SAC-2011-KimuraEFYN #behaviour #detection #motivation #named #persuasion #smarttech- iDetective: a persuasive application to motivate healthier behavior using smart phone (HK, JE, YF, AY, TN), pp. 399–404.
SAC-2011-KostakisKMM #comparison #graph- Improved call graph comparison using simulated annealing (OK, JK, HM, KM), pp. 1516–1523.
SAC-2011-LeungJ #data type #mining #nondeterminism- Frequent itemset mining of uncertain data streams using the damped window model (CKSL, FJ), pp. 950–955.
SAC-2011-LinXYYZGQCG #anti #hardware #named- SPAD: software protection through anti-debugging using hardware virtualization (QL, MX, MY, PY, MZ, SG, ZQ, KC, HG), pp. 623–624.
SAC-2011-Liu #agile #configuration management- Rapid application configuration in Amazon cloud using configurable virtual appliances (HL), pp. 147–154.
SAC-2011-MakanjuZM #retrieval- Storage and retrieval of system log events using a structured schema based on message type transformation (AM, ANZH, EEM), pp. 528–533.
SAC-2011-MeerBHFK #automation #framework #web- A framework for automatic annotation of web pages using the Google rich snippets vocabulary (JvdM, FB, FH, FF, UK), pp. 765–772.
SAC-2011-NakajimaLYZGXYDQCG #hybrid #optimisation #virtual machine- Optimizing virtual machines using hybrid virtualization (JN, QL, SY, MZ, SG, MX, PY, YD, ZQ, KC, HG), pp. 573–578.
SAC-2011-SebastianC #approach #design #re-engineering #towards- Towards designing a tool for event reconstruction using Gladyshev Approach (MS, PC), pp. 193–194.
SAC-2011-SunLZTCW #dependence #impact analysis #object-oriented #source code- Using lattice of class and method dependence for change impact analysis of object oriented programs (XS, BL, SZ, CT, XC, WW), pp. 1439–1444.
SAC-2011-TranCTV #automation #modelling #process #reuse- Automatic reuse of process patterns in process modeling (HNT, BC, TDT, MHV), pp. 1431–1438.
SAC-2011-TrindadeR #3d #multi #navigation- Improving 3D navigation in multiscale environments using cubemap-based techniques (DRT, ABR), pp. 1215–1221.
SAC-2011-VenkateshGBC #fixpoint #implementation #markov #modelling #recognition #speech- Fixed-point implementation of isolated sub-word level speech recognition using hidden Markov models (NV, RG, RB, MGC), pp. 368–373.
SAC-2011-YuLGZZ #fault #modelling #multi- Locating faults using multiple spectra-specific models (KY, ML, QG, HZ, XZ), pp. 1404–1410.
SAC-2011-YuMGTBGGTL - System-level co-simulation of integrated avionics using polychrony (HY, YM, YG, JPT, LB, TG, PLG, AT, OL), pp. 354–359.
SAC-2011-ZhangWAWLL #performance- Fast lists intersection with Bloom filter using graphics processing units (FZ, DW, NA, GW, XL, JL), pp. 825–826.
SAC-2011-ZouaqGH #concept #graph- Ontologizing concept maps using graph theory (AZ, DG, MH), pp. 1687–1692.
LDTA-2011-SoderbergH #editing #jastadd #semantics #tool support- Building semantic editors using JastAdd: tool demonstration (ES, GH), p. 11.
SLE-2011-JoncheereS #composition #workflow- Uniform Modularization of Workflow Concerns Using Unify (NJ, RVDS), pp. 77–96.
SLE-2011-StappersWRAN #case study #domain-specific language #formal method #industrial- Formalizing a Domain Specific Language Using SOS: An Industrial Case Study (FPMS, SW, MAR, SA, IN), pp. 223–242.
ASPLOS-2011-KamruzzamanST #manycore #migration #thread- Inter-core prefetching for multicore processors using migrating helper threads (MK, SS, DMT), pp. 393–404.
CASE-2011-BoemPFP #clustering #distance #multi- Multi-feature trajectory clustering using Earth Mover’s Distance (FB, FAP, GF, TP), pp. 310–315.
CASE-2011-CabasinoGSSZ #fault #petri net- Fault diagnosis of an ABS system using Petri nets (MPC, AG, CS, AS, KZ), pp. 594–599.
CASE-2011-FantiSU #constraints #problem #scheduling #symmetry- Solving scheduling problems in distribution centers using symmetry breaking constraints (MPF, GS, WU), pp. 58–65.
CASE-2011-FeiMA #automaton #finite #modelling #resource management- Modeling sequential resource allocation systems using Extended Finite Automata (ZF, SM, KÅ), pp. 444–449.
CASE-2011-GhomriA #hybrid #petri net- Continuous flow systems and control methodology using Hybrid Petri nets (LG, HA), pp. 419–424.
CASE-2011-HajiD #case study #simulation- A simulation case study: Reducing outpatient waiting time of otolaryngology care services using VBA (MH, HD), pp. 525–530.
CASE-2011-HaoD #incremental #optimisation- Optimization of tool trajectory for Incremental Sheet Forming using closed loop control (WH, SD), pp. 779–784.
CASE-2011-HeoOP #locality #mobile- A localization system of mobile robots using artificial landmarks (DHH, ARO, THP), pp. 139–144.
CASE-2011-JamesBHACC #mining #mobile- Tele-operation of a mobile mining robot using a panoramic display: an exploration of operators sense of presence (CAJ, TPB, KH, LA, CC, AC), pp. 279–284.
CASE-2011-JulvezMV #analysis #simulation- Analysis and simulation of manufacturing systems using SimHPN toolbox (JJ, CM, CRV), pp. 432–437.
CASE-2011-KurzKP #maintenance #network- Dynamic Maintenance in semiconductor manufacturing using Bayesian networks (DK, JK, JP), pp. 238–243.
CASE-2011-MohanSBKE #3d #image- 3D scanning of object surfaces using structured light and a single camera image (SM, KBS, IB, VK, RDE), pp. 151–156.
CASE-2011-RatnakarZ #detection- An ultrasound system for tumor detection in soft tissues using low transient pulse (ARR, MZ), pp. 684–689.
CASE-2011-StyliosG #fuzzy #modelling- Modeling complex logistics systems using soft computing methodology of Fuzzy Cognitive Maps (CDS, GKG), pp. 72–77.
CASE-2011-UrliM #industrial #realtime- Use of Ethernet communications for real-time control systems in the metals industry (LU, SM), pp. 6–11.
CASE-2011-XieZSL #fuzzy- Position servo control of the slider in double toggle mechanical press using Bezier curve model and fuzzy control (JX, SZ, ZS, JL), pp. 773–778.
CC-2011-GreweO #approach #clustering- A Static Task Partitioning Approach for Heterogeneous Systems Using OpenCL (DG, MFPO), pp. 286–305.
CC-2011-JenistaED #parallel #reachability- Using Disjoint Reachability for Parallelization (JCJ, YHE, BD), pp. 198–224.
CC-2011-NaeemL #alias #analysis #performance #set #summary- Faster Alias Set Analysis Using Summaries (NAN, OL), pp. 82–103.
CGO-2011-LiuM #analysis #locality #problem- Pinpointing data locality problems using data-centric analysis (XL, JMMC), pp. 171–180.
CGO-2011-SanchezASPS #compilation- Using machines to learn method-specific compilation strategies (RNS, JNA, DS, MP, MGS), pp. 257–266.
DAC-2011-GeQ #machine learning #multi- Dynamic thermal management for multimedia applications using machine learning (YG, QQ), pp. 95–100.
DAC-2011-GhaniN #branch #grid #power management #verification- Power grid verification using node and branch dominance (NHAG, FNN), pp. 682–687.
DAC-2011-HaddadN #analysis #grid #power management- Power grid correction using sensitivity analysis under an RC model (PAH, FNN), pp. 688–693.
DAC-2011-KesturIPANC #architecture #co-evolution #design #framework #re-engineering- An algorithm-architecture co-design framework for gridding reconstruction using FPGAs (SK, KMI, SP, AAM, VN, CC), pp. 585–590.
DAC-2011-KuoSR #analysis #performance #reachability #source code- Efficient WCRT analysis of synchronous programs using reachability (MMYK, RS, PSR), pp. 480–485.
DAC-2011-LinH #satisfiability- Using SAT-based Craig interpolation to enlarge clock gating functions (THL, CY(H), pp. 621–626.
DAC-2011-MirandaRBW #design #modelling #standard #statistics- Statistical characterization of standard cells using design of experiments with response surface modeling (MM, PR, LB, GIW), pp. 77–82.
DAC-2011-NowrozWR #modelling- Improved post-silicon power modeling using AC lock-in techniques (ANN, GW, SR), pp. 101–106.
DAC-2011-SorgenfreiS #detection- Single-molecule electronic detection using nanoscale field-effect devices (SS, KLS), pp. 712–717.
DAC-2011-TsaiZCH #bidirectional #fault tolerance- A fault-tolerant NoC scheme using bidirectional channel (WCT, DYZ, SJC, YHH), pp. 918–923.
DAC-2011-WangXAP #classification #learning #policy #power management- Deriving a near-optimal power management policy using model-free reinforcement learning and Bayesian classification (YW, QX, ACA, MP), pp. 41–46.
DAC-2011-WeiP #security- Integrated circuit security techniques using variable supply voltage (SW, MP), pp. 248–253.
DAC-2011-YangBC #detection #embedded #energy #fault- Energy-efficient MIMO detection using unequal error protection for embedded joint decoding system (YSY, PB, GC), pp. 579–584.
DATE-2011-Al-DujailyMXYP #concurrent #detection #network #runtime #transitive- Run-time deadlock detection in networks-on-chip using coupled transitive closure networks (RAD, TSTM, FX, AY, MP), pp. 497–502.
DATE-2011-AlordaTBS #embedded #optimisation- Stability optimization of embedded 8T SRAMs using Word-Line Voltage modulation (BA, GT, SAB, JS), pp. 986–991.
DATE-2011-AmoryOMML #energy- Evaluating energy consumption of homogeneous MPSoCs using spare tiles (AMA, LO, CAMM, FGM, ML), pp. 1164–1167.
DATE-2011-AsadiniaMTS - Supporting non-contiguous processor allocation in mesh-based CMPs using virtual point-to-point links (MA, MM, AT, HSA), pp. 413–418.
DATE-2011-ButtrickK #3d #network #on the #testing- On testing prebond dies with incomplete clock networks in a 3D IC using DLLs (MB, SK), pp. 1418–1423.
DATE-2011-DammHJPS #architecture #component #contract #design #integration #specification #testing- Using contract-based component specifications for virtual integration testing and architecture design (WD, HH, BJ, TP, IS), pp. 1023–1028.
DATE-2011-EggersglusD #fault #generative #optimisation #pseudo #testing- As-Robust-As-Possible test generation in the presence of small delay defects using pseudo-Boolean optimization (SE, RD), pp. 1291–1296.
DATE-2011-GoyalN #grid #performance #power management #verification- Efficient RC power grid verification using node elimination (AG, FNN), pp. 257–260.
DATE-2011-GrammatikakisPSP #estimation- System-level power estimation methodology using cycle- and bit-accurate TLM (MDG, SP, JPS, CP), pp. 1125–1126.
DATE-2011-KaraklajicFSV #detection #fault #low cost- Low-cost fault detection method for ECC using Montgomery powering ladder (DK, JF, JMS, IV), pp. 1016–1021.
DATE-2011-KimCSY #modelling #parallel #performance #simulation- Temporal parallel simulation: A fast gate-level HDL simulation using higher level models (DK, MJC, KS, SY), pp. 1584–1589.
DATE-2011-LiuHRG #optimisation #process- Global optimization of integrated transformers for high frequency microwave circuits using a Gaussian process based surrogate model (BL, YH, PR, GGEG), pp. 1101–1106.
DATE-2011-LiuSTV #design #generative #towards #validation- Towards coverage closure: Using GoldMine assertions for generating design validation stimulus (LL, DS, WT, SV), pp. 173–178.
DATE-2011-MeyerGCLS #cost analysis #execution #safety- Reducing the cost of redundant execution in safety-critical systems using relaxed dedication (BHM, NJG, BHC, JL, KS), pp. 1249–1254.
DATE-2011-MeyerNHBSGSB #configuration management #performance- Fast Start-up for Spartan-6 FPGAs using Dynamic Partial Reconfiguration (JM, JN, MH, LB, OS, RMG, RS, JB), pp. 1542–1547.
DATE-2011-NarayananZT #correctness #pattern matching #process- Ensuring correctness of analog circuits in presence of noise and process variations using pattern matching (RN, MHZ, ST), pp. 1188–1191.
DATE-2011-SinghSG #generative #performance #testing- Testing of high-speed DACs using PRBS generation with “Alternate-Bit-Tapping” (MS, MS, SG), pp. 377–382.
DATE-2011-VissersNN #interface #realtime #synthesis #tool support- Building real-time HDTV applications in FPGAs using processors, AXI interfaces and high level synthesis tools (KAV, SN, JN), pp. 848–850.
DATE-2011-WangKAWMA #energy #simulation- Accelerated simulation of tunable vibration energy harvesting systems using a linearised state-space technique (LW, TJK, BMAH, ASW, GVM, INAG), pp. 1267–1272.
DATE-2011-WangNKWRLMB #configuration management- High-temperature (>500°C) reconfigurable computing using silicon carbide NEMS switches (XW, SN, ARK, FGW, SR, THL, MM, SB), pp. 1065–1070.
DATE-2011-YeHL #fault #multi #on the- On diagnosis of multiple faults using compacted responses (JY, YH, XL), pp. 679–684.
HPCA-2011-CarreteroVARMG #hardware #process- Hardware/software-based diagnosis of load-store queues using expandable activity logs (JC, XV, JA, TR, MM, AG), pp. 321–331.
HPCA-2011-GhasemiDK #architecture- Low-voltage on-chip cache architecture using heterogeneous cell sizes for high-performance processors (HRG, SCD, NSK), pp. 38–49.
HPCA-2011-MehraraHSM #javascript #parallel- Dynamic parallelization of JavaScript applications using an ultra-lightweight speculation mechanism (MM, PCH, MS, SAM), pp. 87–98.
HPCA-2011-PellauerAKPE #manycore #named #simulation- HAsim: FPGA-based high-detail multicore simulation using time-division multiplexing (MP, MA, MAK, AP, JSE), pp. 406–417.
HPDC-2011-BalkirFR #architecture #distributed #mining #pipes and filters- A distributed look-up architecture for text mining applications using mapreduce (ASB, ITF, AR), pp. 279–280.
HPDC-2011-HudsonNRWJP #case study #data-driven #experience #simulation- Experiences using smaash to manage data-intensive simulations (RH, JN, LBR, KW, GCJI, MEP), pp. 205–216.
HPDC-2011-WolinskyF #case study #distributed #experience #grid #self- Experiences with self-organizing, decentralized grids using the grid appliance (DIW, RJOF), pp. 183–194.
HPDC-2011-ZhouKB #debugging #detection #locality #named #parallel #scalability #source code- Vrisha: using scaling properties of parallel programs for bug detection and localization (BZ, MK, SB), pp. 85–96.
LCTES-2011-NavabpourBF #debugging #testing- Software debugging and testing using the abstract diagnosis theory (SN, BB, SF), pp. 111–120.
PDP-2011-CorneaB #benchmark #distributed #metric #performance #predict- Performance Prediction of Distributed Applications Using Block Benchmarking Methods (BFC, JB), pp. 183–190.
PDP-2011-MotokubotaIH #parametricity- Accelerating Parameter Sweep Applications Using CUDA (MM, FI, KH), pp. 111–118.
PDP-2011-ReyesS #optimisation #prototype- Optimize or Wait? Using llc Fast-Prototyping Tool to Evaluate CUDA Optimizations (RR, FdS), pp. 257–261.
PDP-2011-WathWL #estimation #grid #parallel- Parallel Hematopoietic Stem Cell Division Rate Estimation Using an Agent-Based Model on the Grid (RCvdW, EvdW, PL), pp. 311–317.
SOSP-2011-VeeraraghavanCFN #detection- Detecting and surviving data races using complementary schedules (KV, PMC, JF, SN), pp. 369–384.
ESOP-2011-GuhaSK #analysis #type system- Typing Local Control and State Using Flow Analysis (AG, CS, SK), pp. 256–275.
FASE-2011-EhrigET #graph #version control- A Formal Resolution Strategy for Operation-Based Conflicts in Model Versioning Using Graph Modifications (HE, CE, GT), pp. 202–216.
FASE-2011-KelsenMG #complexity #modelling- Models within Models: Taming Model Complexity Using the Sub-model Lattice (PK, QM, CG), pp. 171–185.
FASE-2011-KhanH #analysis #contract #dependence #modelling #on the #testing #visual notation- On Model-Based Regression Testing of Web-Services Using Dependency Analysis of Visual Contracts (TAK, RH), pp. 341–355.
STOC-2011-Goyal #constant #protocol- Constant round non-malleable protocols using one way functions (VG), pp. 695–704.
TACAS-2011-GarbervetskyGN #invariant- Enforcing Structural Invariants Using Dynamic Frames (DG, DG, AN), pp. 65–80.
TACAS-2011-GopinathMK #program repair #satisfiability- Specification-Based Program Repair Using SAT (DG, MZM, SK), pp. 173–188.
TACAS-2011-TalupurH #model checking- Biased Model Checking Using Flows (MT, HH), pp. 239–253.
CADE-2011-SchneiderS #automation #first-order #ontology #owl #proving #reasoning #theorem proving- Reasoning in the OWL 2 Full Ontology Language Using First-Order Automated Theorem Proving (MS, GS), pp. 461–475.
CAV-2011-DudkaPV #data type #logic #named- Predator: A Practical Tool for Checking Manipulation of Dynamic Data Structures Using Separation Logic (KD, PP, TV), pp. 372–378.
CAV-2011-Jhala #verification- Using Types for Software Verification (RJ), p. 20.
CAV-2011-JhalaMR #functional #named #source code #verification- HMC: Verifying Functional Programs Using Abstract Interpreters (RJ, RM, AR), pp. 470–485.
CAV-2011-RamanK #behaviour #specification- Analyzing Unsynthesizable Specifications for High-Level Robot Behavior Using LTLMoP (VR, HKG), pp. 663–668.
CAV-2011-SharmaDDA #generative #invariant- Simplifying Loop Invariant Generation Using Splitter Predicates (RS, ID, TD, AA), pp. 703–719.
CAV-2011-SinghalA #simulation #verification- Using Coverage to Deploy Formal Verification in a Simulation World (VS, PA), pp. 44–49.
ICLP-2011-ChishamPSW #logic programming #named #repository #web #web service- CDAOStore: A Phylogenetic Repository Using Logic Programming and Web Services (BC, EP, TCS, BW), pp. 209–219.
ICLP-2011-NicholsonSS #generative #logic #music #probability- Improving the Outcome of a Probabilistic Logic Music System Generator by Using Perlin Noise (CJN, DDS, JS), pp. 231–239.
ICLP-2011-OstrowskiFSA #evolution #ontology- Evolution of Ontologies using ASP (MO, GF, TS, GA), pp. 16–27.
ICLP-J-2011-CodishGBFG #analysis #constraints #integer #satisfiability #termination- SAT-based termination analysis using monotonicity constraints over the integers (MC, IG, AMBA, CF, JG), pp. 503–520.
ICLP-J-2011-CorapiRVPS #design #induction #learning- Normative design using inductive learning (DC, AR, MDV, JAP, KS), pp. 783–799.
ICLP-J-2011-DurzinskyMOSW #automation #network #re-engineering- Automatic network reconstruction using ASP (MD, WM, MO, TS, AW), pp. 749–766.
ICST-2011-ChenCZXF #clustering #testing- Using semi-supervised clustering to improve regression test selection techniques (SC, ZC, ZZ, BX, YF), pp. 1–10.
ICST-2011-KhalekK #constraints #database #relational #testing #theorem proving- Systematic Testing of Database Engines Using a Relational Constraint Solver (SAK, SK), pp. 50–59.
ICST-2011-MalikSK #constraints #data type #debugging- Constraint-Based Program Debugging Using Data Structure Repair (MZM, JHS, SK), pp. 190–199.
ICST-2011-Nica #on the #testing- On the Improvement of the Mutation Score Using Distinguishing Test Cases (SN), pp. 423–426.
ICST-2011-SmithW #detection #heuristic #sql #web- Using SQL Hotspots in a Prioritization Heuristic for Detecting All Types of Web Application Vulnerabilities (BHS, LW), pp. 220–229.
ICST-2011-YuSSR #embedded #testing- Using Property-Based Oracles when Testing Embedded System Applications (TY, AS, WSa, GR), pp. 100–109.
ICTSS-2011-MammarCJMO #c #detection #source code #testing- Using Testing Techniques for Vulnerability Detection in C Programs (AM, ARC, WJ, WM, EMdO), pp. 80–96.
ICTSS-2011-MeinkeN #term rewriting #testing- Learning-Based Testing for Reactive Systems Using Term Rewriting Technology (KM, FN), pp. 97–114.
ICTSS-2011-SchwarzlAW #composition #random testing #testing- Compositional Random Testing Using Extended Symbolic Transition Systems (CS, BKA, FW), pp. 179–194.
ISSTA-2011-GuoE #automation #data analysis #persistent- Using automatic persistent memoization to facilitate data analysis scripting (PJG, DRE), pp. 287–297.
ISSTA-2011-NaminK #testing- The use of mutation in testing experiments and its sensitivity to external threats (ASN, SK), pp. 342–352.
ISSTA-2011-SegallTF #combinator #design #diagrams- Using binary decision diagrams for combinatorial test design (IS, RTB, EF), pp. 254–264.
SAT-2011-BennettS #principle- Model Counting Using the Inclusion-Exclusion Principle (HB, SS), pp. 362–363.
SAT-2011-GableskeH #named #random #satisfiability- EagleUP: Solving Random 3-SAT Using SLS with Unit Propagation (OG, MH), pp. 367–368.
TAP-2011-HeamM #approach #automaton #random testing #testing- A Random Testing Approach Using Pushdown Automata (PCH, CM), pp. 119–133.
VMCAI-2011-ChengRKB #embedded #fault tolerance #game studies #synthesis #theory and practice- Synthesis of Fault-Tolerant Embedded Systems Using Games: From Theory to Practice (CHC, HR, AK, CB), pp. 118–133.
CBSE-2010-AllierSSV #component #consistency #execution #object-oriented- Restructuring Object-Oriented Applications into Component-Oriented Applications by Using Consistency with Execution Traces (SA, HAS, SS, SV), pp. 216–231.
CBSE-2010-EichbergKMM #component #composition #feature model #modelling- Component Composition Using Feature Models (ME, KK, RM, MM), pp. 200–215.
ECSA-2010-ChristensenHL #architecture #assurance #lightweight #quality- Lightweight and Continuous Architectural Software Quality Assurance Using the aSQA Technique (HBC, KMH, BL), pp. 118–132.
ECSA-2010-ElorantaK #architecture #evaluation- Using Domain Knowledge to Boost Software Architecture Evaluation (VPE, KK), pp. 319–326.
ECSA-2010-PerezDGA #agile #architecture #flexibility- Flexible Working Architectures: Agile Architecting Using PPCs (JP, JD, JG, PPA), pp. 102–117.
QoSA-2010-ChauvelSCHM #adaptation #architecture #self- Using QoS-Contracts to Drive Architecture-Centric Self-adaptation (FC, HS, XC, GH, HM), pp. 102–118.
DocEng-2010-BeaudouxBJ #authoring #modelling- Using model driven engineering technologies for building authoring applications (OB, AB, JMJ), pp. 279–282.
DocEng-2010-KarolHHA #documentation #feature model #modelling #product line- Using feature models for creating families of documents (SK, MH, FH, UA), pp. 259–262.
DocEng-2010-NamaneSM #feature model #matrix #recognition- Degraded dot matrix character recognition using CSM-based feature extraction (AN, EHS, PM), pp. 207–210.
DocEng-2010-OllisBB #documentation- Optimized reprocessing of documents using stored processor state (JAO, DFB, SRB), pp. 135–138.
DocEng-2010-SojkaH #documentation #library #optimisation- Document engineering for a digital library: PDF recompression using JBIG2 and other optimizations of PDF documents (PS, RH), pp. 3–12.
DocEng-2010-ThaoM #data type #detection #version control #xml- Using versioned tree data structure, change detection and node identity for three-way XML merging (CT, EVM), pp. 77–86.
DRR-2010-BallKSN #analysis #documentation- Analysis of line structure in handwritten documents using the Hough transform (GRB, HK, SNS, AN), pp. 1–10.
DRR-2010-BianneKL #clustering #modelling #recognition #word- Context-dependent HMM modeling using tree-based clustering for the recognition of handwritten words (ALB, CK, LLS), pp. 1–10.
DRR-2010-ChazalonC #definite clause grammar #documentation- Using definite clause grammars to build a global system for analyzing collections of documents (JC, BC), pp. 1–10.
DRR-2010-ChenMT #automation #performance #validation #word- Efficient automatic OCR word validation using word partial format derivation and language model (SC, DM, GRT), pp. 1–10.
DRR-2010-PeredaT #precise #semiparsing- Date of birth extraction using precise shallow parsing (RP, KT), pp. 1–10.
DRR-2010-YouADRGT #image #multimodal #retrieval- Biomedical article retrieval using multimodal features and image annotations in region-based CBIR (DY, SA, DDF, MMR, VG, GRT), pp. 1–10.
ECDL-2010-BiaMG #library- Estimating Digitization Costs in Digital Libraries Using DiCoMo (AB, RM, JG), pp. 136–147.
ECDL-2010-BiaMG10a #documentation #mindmap- Using Mind Maps to Model Semistructured Documents (AB, RM, JG), pp. 421–424.
ECDL-2010-BillerbeckDFIK #query #ranking #web- Ranking Entities Using Web Search Query Logs (BB, GD, CSF, TI, RK), pp. 273–281.
ECDL-2010-Black #data type #framework #metadata #pattern matching- Using Pattern Language as a Framework for Future Metadata Structure (EAB), pp. 393–396.
ECDL-2010-CamargoCG #image #matrix #multimodal #visualisation- Multimodal Image Collection Visualization Using Non-negative Matrix Factorization (JEC, JCC, FAG), pp. 429–432.
HT-2010-ChoudhuryFAGLY #automation #social- Automatic construction of travel itineraries using social breadcrumbs (MDC, MF, SAY, NG, RL, CY), pp. 35–44.
HT-2010-FossC #adaptation #authoring #generative #hypermedia #tool support- The next generation authoring adaptive hypermedia: using and evaluating the MOT3.0 and PEAL tools (JGKF, AIC), pp. 83–92.
HT-2010-GasslerZTS #named #recommendation- SnoopyDB: narrowing the gap between structured and unstructured information using recommendations (WG, EZ, MT, GS), pp. 271–272.
JCDL-2010-AngroshCS #identification #library #random #towards- Context identification of sentences in related work sections using a conditional random field: towards intelligent digital libraries (MAA, SC, NS), pp. 293–302.
JCDL-2010-BammanBC #multi- Transferring structural markup across translations using multilingual alignment and projection (DB, AB, GRC), pp. 11–20.
JCDL-2010-MonroyFC #library #multi #ontology #taxonomy- Using an ontology and a multilingual glossary for enhancing the nautical archaeology digital library (CM, RF, FC), pp. 259–262.
JCDL-2010-TahmasebiNTR #documentation #word- Using word sense discrimination on historic document collections (NT, KN, TT, TR), pp. 89–98.
PODS-2010-ReS #comprehension #estimation- Understanding cardinality estimation using entropy maximization (CR, DS), pp. 53–64.
SIGMOD-2010-BaoDKR #workflow- An optimal labeling scheme for workflow provenance using skeleton labels (ZB, SBD, SK, SR), pp. 711–722.
SIGMOD-2010-GatterbauerS #trust- Data conflict resolution using trust mappings (WG, DS), pp. 219–230.
SIGMOD-2010-JinYW #classification #graph #named- GAIA: graph classification using evolutionary computation (NJ, CY, WW), pp. 879–890.
SIGMOD-2010-ShindeGGD #locality #similarity- Similarity search and locality sensitive hashing using ternary content addressable memories (RS, AG, PG, DD), pp. 375–386.
SIGMOD-2010-VernicaCL #parallel #performance #pipes and filters- Efficient parallel set-similarity joins using MapReduce (RV, MJC, CL), pp. 495–506.
SIGMOD-2010-YangWLW #keyword #optimisation #web- Optimizing content freshness of relations extracted from the web using keyword search (MY, HW, LL, MW), pp. 819–830.
VLDB-2010-DyresonBM #xml- Using XMorph to Transform XML Data (CED, SSB, KM), pp. 1541–1544.
VLDB-2010-GolabKKS #quality #semantics- Data Auditor: Exploring Data Quality and Semantics using Pattern Tableaux (LG, HJK, FK, DS), pp. 1641–1644.
VLDB-2010-KazemitabarDAAS #query #sql- Geospatial Stream Query Processing using Microsoft SQL Server StreamInsight (SJK, UD, MHA, AA, CS), pp. 1537–1540.
VLDB-2010-LimayeSC #web- Annotating and Searching Web Tables Using Entities, Types and Relationships (GL, SS, SC), pp. 1338–1347.
VLDB-2010-MiddelfartP - Using Sentinel Technology in the TARGIT BI Suite (MM, TBP), pp. 1629–1632.
VLDB-2010-TermehchyW #keyword #named #xml- EXTRUCT: Using Deep Structural Information in XML Keyword Search (AT, MW), pp. 1593–1596.
VLDB-2011-LeeH10 #clustering #named #performance- QSkycube: Efficient Skycube Computation using Point-Based Space Partitioning (JL, SwH), pp. 185–196.
CSEET-2010-LewHS #re-engineering- Using LEGO MINDSTORMS NXT and LEJOS in an Advanced Software Engineering Course (MWL, TBH, MS), pp. 121–128.
EDM-2010-BousbiaLBR #behaviour #learning #web- Analyzing Learning Styles using Behavioral Indicators in Web based Learning Environments (NB, JML, AB, IR), pp. 279–280.
EDM-2010-CadeO #modelling #topic- Using Topic Models to Bridge Coding Schemes of Differing Granularity (WLC, AO), pp. 281–282.
EDM-2010-FalakmasirH #data mining #education #mining- Using Educational Data Mining Methods to Study the Impact of Virtual Classroom in E-Learning (MHF, JH), pp. 241–248.
EDM-2010-FinchamABF #modelling- Using Neural Imaging and Cognitive Modeling to Infer Mental States while Using an Intelligent Tutoring System (JMF, JRA, SB, JLF), pp. 51–60.
EDM-2010-GongBH #multi #parametricity- Using multiple Dirichlet distributions to improve parameter plausibility (YG, JEB, NTH), pp. 61–70.
EDM-2010-HowardJN #mining #process- Examining Learner Control in a Structured Inquiry Cycle Using Process Mining (LH, JJ, CN), pp. 71–80.
EDM-2010-JeongBJH #analysis #behaviour #effectiveness #learning #markov #modelling- Analysis of Productive Learning Behaviors in a Structured Inquiry Cycle Using Hidden Markov Models (HJ, GB, JJ, LH), pp. 81–90.
EDM-2010-KhodeirWDH #abduction #difference #network #probability #student- Inferring the Differential Student Model in a Probabilistic Domain Using Abduction inference in Bayesian networks (NK, NMW, NMD, NH), pp. 299–300.
EDM-2010-MacfadyenS #design #interactive #monitoring #online- Using LiMS (the Learner Interaction Monitoring System) to Track Online Learner Engagement and Evaluate Course Design (LM, PS), pp. 301–302.
EDM-2010-MontalvoBPNG #identification #machine learning #student- Identifying Students’ Inquiry Planning Using Machine Learning (OM, RSJdB, MASP, AN, JDG), pp. 141–150.
EDM-2010-PedroBMNG #behaviour #detection- Using Text Replay Tagging to Produce Detectors of Systematic Experimentation Behavior Patterns (MSP, RSJdB, OM, AN, JDG), pp. 181–190.
EDM-2010-ShanabrookCWA #behaviour #identification #student- Identifying High-Level Student Behavior Using Sequence-based Motif Discovery (DHS, DGC, BPW, IA), pp. 191–200.
EDM-2010-StamperBC #knowledge base #problem- Using a Bayesian Knowledge Base for Hint Selection on Domain Specific Problems (JCS, TB, MJC), pp. 327–328.
EDM-2010-YudelsonBMM #adaptation #education #integration #optimisation #semantics- Using Numeric Optimization To Refine Semantic User Model Integration Of Adaptive Educational Systems (MY, PB, AM, MM), pp. 221–230.
ITiCSE-2010-AlaoutinenS #programming #self #student #taxonomy- Student self-assessment in a programming course using bloom’s revised taxonomy (SA, KS), pp. 155–159.
ITiCSE-2010-AydinolG #web- Advantage of using web 2.0 applications in class (ABA, ÖG), p. 308.
ITiCSE-2010-BasawapatnaKR #design #education #game studies #scalability- Using scalable game design to teach computer science from middle school to graduate school (ARB, KHK, AR), pp. 224–228.
ITiCSE-2010-BasawapatnaR #feedback #how #physics #student- Cyberspace meets brick and mortar: an investigation into how students engage in peer to peer feedback using both cyberlearning and physical infrastructures (ARB, AR), pp. 184–188.
ITiCSE-2010-Crescenzi - Using AVs to explain NP-completeness (PC), p. 299.
ITiCSE-2010-FinkelsteinPHDCB #game studies #named #network #social #student- SNAG: using social networking games to increase student retention in computer science (SLF, EP, AH, KD, SRC, TB), pp. 142–146.
ITiCSE-2010-GarlickC #empirical- Using alice in CS1: a quantitative experiment (RG, ECC), pp. 165–168.
ITiCSE-2010-GunawardenaTK #collaboration- Encouraging reading and collaboration using classroom salon (AG, AT, DK), pp. 254–258.
ITiCSE-2010-HowardJN #behaviour #design #learning #online- Reflecting on online learning designs using observed behavior (LH, JJ, CN), pp. 179–183.
ITiCSE-2010-KiesmullerSBR #identification #online #pattern matching #pattern recognition #problem #recognition- Online identification of learner problem solving strategies using pattern recognition methods (UK, SS, TB, KR), pp. 274–278.
ITiCSE-2010-KyrilovCT #assessment #case study #education #evaluation #online- Improving CS education at Wits using an online assessment and evaluation system: a case study (AK, JC, MT), p. 314.
ITiCSE-2010-Larraza-MendiluzeG #game studies #learning #process #topic- Changing the learning process of the input/output topic using a game in a portable console (ELM, NGV), p. 316.
ITiCSE-2010-MarkhamK #case study #experience- Using personal robots in CS1: experiences, outcomes, and attitudinal influences (SM, KNK), pp. 204–208.
ITiCSE-2010-MartinezLDC #case study #experience #re-engineering- Experiences in software engineering courses using psychometrics with RAMSET (LGM, GL, ARD, JRC), pp. 244–248.
SIGITE-2010-KulgachevJ #evaluation #network #performance- 802.11 networks performance evaluation using OPNET (VK, HJ), pp. 149–152.
SIGITE-2010-WangHY #education #network #security- Using VMware VCenter lab manager in undergraduate education for system administration and network security (XW, GCH, RY), pp. 43–52.
CSMR-2010-MadaniGPGA #identifier #recognition #source code #speech #word- Recognizing Words from Source Code Identifiers Using Speech Recognition Techniques (NM, LG, MDP, YGG, GA), pp. 68–77.
CSMR-2010-NadiHM #predict #set- Does the Past Say It All? Using History to Predict Change Sets in a CMDB (SN, RCH, SM), pp. 97–106.
CSMR-2010-OzkayaPGC #architecture #evolution #requirements- Using Architecturally Significant Requirements for Guiding System Evolution (IO, JADP, AG, SC), pp. 127–136.
CSMR-2010-Shrinivasan #migration- Data Migration from a Product to a Data Warehouse Using ETL Tool (CS), pp. 63–65.
ICPC-2010-ChenR #case study #dependence #feature model #graph- Case Study of Feature Location Using Dependence Graph, after 10 Years (KC, VR), pp. 1–3.
ICPC-2010-RevelleDP #data fusion #feature model #mining #web- Using Data Fusion and Web Mining to Support Feature Location in Software (MR, BD, DP), pp. 14–23.
ICPC-2010-ScannielloDDD #algorithm #clustering- Using the Kleinberg Algorithm and Vector Space Model for Software System Clustering (GS, AD, CD, TD), pp. 180–189.
ICSM-2010-AbdallahMG #robust #slicing- Certifying software robustness using program slicing (MA, MM, KG), pp. 1–2.
ICSM-2010-CanforaCCP #detection #empirical #logic #multi- Using multivariate time series and association rules to detect logical change coupling: An empirical study (GC, MC, LC, MDP), pp. 1–10.
ICSM-2010-DajsurenGM #legacy- Modernizing legacy software using a System Grokking technology (YD, MG, DM), pp. 1–7.
ICSM-2010-GethersP #modelling #object-oriented #relational #topic- Using Relational Topic Models to capture coupling among classes in object-oriented software systems (MG, DP), pp. 1–10.
ICSM-2010-HindleGH #process- Software process recovery using Recovered Unified Process Views (AH, MWG, RCH), pp. 1–10.
ICSM-2010-JalbertB #clone detection #concurrent #debugging #detection #identification- Using clone detection to identify bugs in concurrent software (KJ, JSB), pp. 1–5.
ICSM-2010-KameiMMMAH #debugging #modelling #predict- Revisiting common bug prediction findings using effort-aware models (YK, SM, AM, KiM, BA, AEH), pp. 1–10.
ICSM-2010-SaleckerG #graph #testing- Pairwise test set calculation using k-partite graphs (ES, SG), pp. 1–5.
ICSM-2010-SavageDGP #named #source code #topic- TopicXP: Exploring topics in source code using Latent Dirichlet Allocation (TS, BD, MG, DP), pp. 1–6.
ICSM-2010-Wilson #concept #ontology- Using ontology fragments in concept location (LAW), pp. 1–2.
MSR-2010-JuzgadoV #difference #re-engineering- Using differences among replications of software engineering experiments to gain knowledge (NJJ, SV).
MSR-2010-PentaGA #approach #identification- Identifying licensing of jar archives using a code-search approach (MDP, DMG, GA), pp. 151–160.
SCAM-2010-KatsV #aspect-oriented #case study #encapsulation #framework #logic #platform #programming- Encapsulating Software Platform Logic by Aspect-Oriented Programming: A Case Study in Using Aspects for Language Portability (LCLK, EV), pp. 147–156.
SCAM-2010-ThomasAHB #evolution #modelling #topic #validation- Validating the Use of Topic Models for Software Evolution (SWT, BA, AEH, DB), pp. 55–64.
WCRE-2010-BittencourtSGM #automation #information retrieval #modelling- Improving Automated Mapping in Reflexion Models Using Information Retrieval Techniques (RAB, GJdSS, DDSG, GCM), pp. 163–172.
WCRE-2010-GratiSP #diagrams #execution #interactive #sequence chart #visualisation- Extracting Sequence Diagrams from Execution Traces Using Interactive Visualization (HG, HAS, PP), pp. 87–96.
WCRE-2010-HaiducAMM #automation #on the #source code #summary- On the Use of Automated Text Summarization Techniques for Summarizing Source Code (SH, JA, LM, AM), pp. 35–44.
WCRE-2010-SelimFZ #clone detection #detection #representation- Enhancing Source-Based Clone Detection Using Intermediate Representation (GMKS, KCF, YZ), pp. 227–236.
WCRE-2010-WongASLM #behaviour #detection #programming #reverse engineering #search-based- Reverse Engineering Utility Functions Using Genetic Programming to Detect Anomalous Behavior in Software (SW, MA, JS, KL, SM), pp. 141–149.
CIAA-2010-Johnson #natural language- Uniformizing Rational Relations for Natural Language Applications Using Weighted Determinization (JHJ), pp. 173–180.
CIAA-2010-Jonoska #automaton #self- Using Automata to Describe Self-Assembled Nanostructures (NJ), pp. 1–3.
CIAA-2010-YuBI #automaton #multi #relational #string #verification- Relational String Verification Using Multi-track Automata (FY, TB, OHI), pp. 290–299.
DLT-2010-Head #algebra #parallel- Using Light to Implement Parallel Boolean Algebra (TH), pp. 231–242.
ICALP-v1-2010-BojanczykP #automaton #evaluation #nondeterminism #performance- Efficient Evaluation of Nondeterministic Automata Using Factorization Forests (MB, PP), pp. 515–526.
ICALP-v2-2010-FontaineLV #algebra #approach #automaton- Automata for Coalgebras: An Approach Using Predicate Liftings (GF, RAL, YV), pp. 381–392.
LATA-2010-KasprzikK #learning #string- String Extension Learning Using Lattices (AK, TK), pp. 380–391.
LATA-2010-LetichevskySS #automaton #equivalence #finite #multi #problem #proving- The Equivalence Problem of Deterministic Multitape Finite Automata: A New Proof of Solvability Using a Multidimensional Tape (AAL, ASS, SKS), pp. 392–402.
LATA-2010-Penaloza #reasoning #standard- Using Sums-of-Products for Non-standard Reasoning (RP), pp. 488–499.
IFM-2010-LanoR #model transformation #specification #uml #verification- Specification and Verification of Model Transformations Using UML-RSDS (KL, SKR), pp. 199–214.
SEFM-2010-GothelG #automation #invariant #network #realtime #towards #verification- Towards the Semi-Automatic Verification of Parameterized Real-Time Systems Using Network Invariants (TG, SG), pp. 310–314.
SEFM-2010-LindsayWY #assessment #behaviour #model checking #safety- Safety Assessment Using Behavior Trees and Model Checking (PAL, KW, NY), pp. 181–190.
SEFM-2010-ScannielloRT #architecture #empirical #evaluation #semantics- Architecture Recovery Using Latent Semantic Indexing and K-Means: An Empirical Evaluation (GS, MR, GT), pp. 103–112.
SEFM-2010-TudoseO #design pattern #execution #symbolic computation #testing- A Method for Testing Software Systems Based on State Design Pattern Using Symbolic Execution (CT, RO), pp. 113–117.
FLOPS-2010-MorihataM #automation #parallel #quantifier #recursion- Automatic Parallelization of Recursive Functions Using Quantifier Elimination (AM, KM), pp. 321–336.
FLOPS-2010-Sagonas #concurrent #detection #erlang #fault #source code #static analysis- Using Static Analysis to Detect Type Errors and Concurrency Defects in Erlang Programs (KFS), pp. 13–18.
Haskell-2010-Morris #case study #design #experience- Experience report: using hackage to inform language design (JGM), pp. 61–66.
ICFP-2010-BradyH #domain-specific language #implementation #partial evaluation- Scrapping your inefficient engine: using partial evaluation to improve domain-specific language implementation (EB, KH), pp. 297–308.
ICFP-2010-Pop #case study #experience #haskell #python- Experience report: Haskell as a reagent: results and observations on the use of Haskell in a python project (IP), pp. 369–374.
ICFP-2010-ScottSGM #functional #industrial #programming- Using functional programming within an industrial product group: perspectives and perceptions (DJS, RS, TG, AM), pp. 87–92.
IFL-2010-BjornsonTG #f# #user interface- Composing Reactive GUIs in F# Using WebSharper (JB, AT, AG), pp. 203–216.
ILC-2010-YuasaY #low level #validation- Validating low-level instructions for fixnums using BDDs (SY, MY), pp. 11–20.
AIIDE-2010-GoldO #game studies- Using Machine Translation to Convert Between Difficulties in Rhythm Games (KG, AO).
AIIDE-2010-HeckelY #behaviour #coordination #multi- Multi-Agent Coordination Using Dynamic Behavior-Based Subsumption (FWPH, GMY).
AIIDE-2010-SharifiZS #behaviour #game studies #learning- Learning Companion Behaviors Using Reinforcement Learning in Games (AS, RZ, DS).
AIIDE-2010-YoungbloodHHC #agile #behaviour #development #game studies- Rapid Development of Characters in FPS/3PS Games Using Visually-Specified Behavior-based Control (GMY, FWPH, DHH, AC).
CIG-2010-BeaudryBCK #challenge #game studies #markov- Using Markov decision theory to provide a fair challenge in a roll-and-move board game (EB, FB, SC, FK), pp. 1–8.
CIG-2010-BenbassatS #evolution #programming #search-based- Evolving Lose-Checkers players using genetic programming (AB, MS), pp. 30–37.
CIG-2010-CardamoneLLB #algorithm #search-based- Searching for the optimal racing line using genetic algorithms (LC, DL, PLL, APB), pp. 388–394.
CIG-2010-LevillainORB #experience #fuzzy- Characterizing player's experience from physiological signals using fuzzy decision trees (FL, JOO, MR, BBM), pp. 75–82.
CIG-2010-MawhorterM #generative- Procedural level generation using occupancy-regulated extension (PAM, MM), pp. 351–358.
CIG-2010-OnievaCLL #fuzzy #logic- Overtaking opponents with blocking strategies using fuzzy logic (EO, LC, DL, PLL), pp. 123–130.
CIG-2010-RawalRM #behaviour- Constructing competitive and cooperative agent behavior using coevolution (AR, PR, RM), pp. 107–114.
CIG-2010-SmithAHL #education- Using co-evolved RTS opponents to teach spatial tactics (GS, PA, RH, SJL), pp. 146–153.
FDG-2010-BoyceB #game studies #learning #motivation- BeadLoom Game: using game elements to increase motivation and learning (AKB, TB), pp. 25–31.
FDG-2010-SheldonPKOCTR #approach #game studies #learning #mobile #named #student- Weatherlings: a new approach to student learning using web-based mobile games (JS, JP, EK, JO, VHHC, PWT, LR), pp. 203–208.
FDG-2010-TreanorMW #design #exclamation #game studies #logic #visual notation- Kaboom! is a many-splendored thing: an interpretation and design methodology for message-driven games using graphical logics (MT, MM, NWF), pp. 224–231.
VS-Games-2010-YusoffCG #game studies #validation- Validation of Serious Games Attributes Using the Technology Acceptance Model (AY, RC, LG), pp. 45–51.
ICGT-2010-Qayum #automation #graph transformation #refactoring #search-based- Automated Assistance for Search-Based Refactoring Using Unfolding of Graph Transformation Systems (FQ), pp. 407–409.
ICGT-2010-SpicherMG #declarative- Declarative Mesh Subdivision Using Topological Rewriting in MGS (AS, OM, JLG), pp. 298–313.
ICGT-2010-Zambon #abstraction #graph transformation #verification- Using Graph Transformations and Graph Abstractions for Software Verification (EZ), pp. 416–418.
CHI-2010-BillingsW #comprehension #online- Understanding dispute resolution online: using text to reflect personal and substantive issues in conflict (MB, LAW), pp. 1447–1456.
CHI-2010-ChangYM #testing #user interface- GUI testing using computer vision (THC, TY, RCM), pp. 1535–1544.
CHI-2010-ChevalierDBF #documentation #navigation- Using text animated transitions to support navigation in document histories (FC, PD, AB, JDF), pp. 683–692.
CHI-2010-DixonF #behaviour #implementation #interface #named #reverse engineering- Prefab: implementing advanced behaviors using pixel-based reverse engineering of interface structure (MD, JF), pp. 1525–1534.
CHI-2010-DixonPH #feedback #named #recognition #sketching- iCanDraw: using sketch recognition and corrective feedback to assist a user in drawing human faces (DD, MP, TH), pp. 897–906.
CHI-2010-DruinFHGH #interface #keyword- Children’s roles using keyword search interfaces at home (AD, EF, HH, EG, LH), pp. 413–422.
CHI-2010-HeerB #crowdsourcing #design #visual notation #visualisation- Crowdsourcing graphical perception: using mechanical turk to assess visualization design (JH, MB), pp. 203–212.
CHI-2010-HogganB #interface #multimodal #named #testing- Crosstrainer: testing the use of multimodal interfaces in situ (EEH, SAB), pp. 333–342.
CHI-2010-HuhNS #comprehension #reuse- Finding the lost treasure: understanding reuse of used computing devices (JH, KN, NS), pp. 1875–1878.
CHI-2010-LankST #documentation #fault #injection- Estimating residual error rate in recognized handwritten documents using artificial error injection (EL, RS, MAT), pp. 1–4.
CHI-2010-McGookinRB #graph #interactive- Clutching at straws: using tangible interaction to provide non-visual access to graphs (DKM, ER, SAB), pp. 1715–1724.
CHI-2010-SongGGF #interactive #mobile #named- MouseLight: bimanual interactions on digital paper using a pen and a spatially-aware mobile projector (HS, FG, TG, GWF), pp. 2451–2460.
CHI-2010-VertanenM #performance #speech- Speech dasher: fast writing using speech and gaze (KV, DJCM), pp. 595–598.
CHI-2010-Villamarin-SalomonB #behaviour- Using reinforcement to strengthen users’ secure behaviors (RVS, JCB), pp. 363–372.
CHI-2010-WeaverBSIL #analysis #artificial reality #empirical #order- An empirical task analysis of warehouse order picking using head-mounted displays (KW, HB, TS, HI, ML), pp. 1695–1704.
CHI-2010-WuDM #detection #enterprise #network #social- Detecting professional versus personal closeness using an enterprise social network site (AW, JMD, DRM), pp. 1955–1964.
CHI-2010-YukselDTS #human-computer #interface #multi #novel- A novel brain-computer interface using a multi-touch surface (BFY, MD, JT, AS), pp. 855–858.
CSCW-2010-BurkeKW #communication #social- Social use of computer-mediated communication by adults on the autism spectrum (MB, RK, DW), pp. 425–434.
SOFTVIS-2010-AnslowMNTB #evaluation #scalability #visualisation- User evaluation of polymetric views using a large visualization wall (CA, SM, JN, EDT, RB), pp. 25–34.
SOFTVIS-2010-LinTOB #comprehension #profiling #towards- Towards anomaly comprehension: using structural compression to navigate profiling call-trees (SL, FT, TCO, LJB), pp. 103–112.
SOFTVIS-2010-TrumperBD #comprehension #parallel #thread #visualisation- Understanding complex multithreaded software systems by using trace visualization (JT, JB, JD), pp. 133–142.
SOFTVIS-2010-Zeckzer #layout #matrix #visualisation- Visualizing software entities using a matrix layout (DZ), pp. 207–208.
CAiSE-2010-CastanoFM #semantics #variability #web- Dealing with Matching Variability of Semantic Web Data Using Contexts (SC, AF, SM), pp. 194–208.
CAiSE-2010-Paraszczak - The Influence of IT Systems on the Use of the Earth’s Resources (JRP), pp. 7–8.
EDOC-2010-AmarLCN #aspect-oriented #imperative #programming- Using Aspect-Oriented Programming to Trace Imperative Transformations (BA, HL, BC, CN), pp. 143–152.
EDOC-2010-EshuisN #framework #outsourcing #process- A Framework for Service Outsourcing Using Process Views (RE, AN), pp. 99–108.
EDOC-2010-QuartelSL #architecture #enterprise #modelling #requirements- IT Portfolio Valuation — Using Enterprise Architecture and Business Requirements Modeling (DACQ, MWAS, MML), pp. 3–13.
EDOC-2010-ZdravkovicI #approach #design #framework #modelling #ontology- A Model-Driven Approach for Designing E-Services Using Business Ontological Frameworks (JZ, TI), pp. 121–130.
ICEIS-AIDSS-2010-AdamLDB #clustering #parallel #performance- Performance Gain for Clustering with Growing Neural Gas using Parallelization Methods (AA, SL, SD, WB), pp. 264–269.
ICEIS-AIDSS-2010-FariaGSMM #automation #natural language #ontology- Using Natural Language Processing for Automatic Extraction of Ontology Instances (CGdF, RG, IS, MM, DM), pp. 278–283.
ICEIS-AIDSS-2010-GerberKM #formal method #metamodelling #ontology #towards- Towards the Formalisation of the TOGAF Content Metamodel using Ontologies (AG, PK, AvdM), pp. 54–64.
ICEIS-AIDSS-2010-GilS #implementation #performance #process- Using Key Performance Indicators to Facilitate the Strategy Implementation and Business Process Improvement in SME’s (MMG, DNS), pp. 193–197.
ICEIS-AIDSS-2010-HaasMSD #information management #named- ConTask — Using Context-sensitive Assistance to Improve Task-oriented Knowledge Work (JH, HM, SS, AD), pp. 30–39.
ICEIS-AIDSS-2010-MoriyasuYN #learning #self- Supervised Learning for Agent Positioning by using Self-organizing Map (KM, TY, HN), pp. 368–372.
ICEIS-AIDSS-2010-SahaPMB #classification #clustering #difference #image- Improvement of Differential Crisp Clustering using ANN Classifier for Unsupervised Pixel Classification of Satellite Image (IS, DP, UM, SB), pp. 21–29.
ICEIS-AIDSS-2010-SalasPRR #identification- Identification of Areas with Similar Wind Patterns using SOFM (JCPS, AAP, JJGdlR, JGR), pp. 40–45.
ICEIS-AIDSS-2010-TomeAC #architecture #enterprise #experience #named- TREEAD — A Tool that Enables the Re-use of Experience in Enterprise Architecture Description (PT, LA, EC), pp. 332–343.
ICEIS-AIDSS-2010-VialeBGP #approach #modelling #process #scalability #sequence- Modeling Large Scale Manufacturing Process from Timed Data — Using the TOM4L Approach and Sequence Alignment Information for Modeling STMicroelectronics’ Production Processes (PV, NB, MLG, JP), pp. 129–138.
ICEIS-DISI-2010-BarczynskiFBS #adaptation #concept #information management #modelling #named- AdaptIE — Using Domain Language Concept to Enable Domain Experts in Modeling of Information Extraction Plans (WMB, FF, FB, DS), pp. 249–256.
ICEIS-DISI-2010-FerrucciGOS #development- Estimating Software Development Effort using Tabu Search (FF, CG, RO, FS), pp. 236–241.
ICEIS-DISI-2010-KasprzakBCO #effectiveness #enterprise #scalability- Access Rights in Enterprise Full-text Search — Searching Large Intranets Effectively using Virtual Terms (JK, MB, MC, TO), pp. 32–39.
ICEIS-DISI-2010-LemosCV #query #relational #sql #xml- Using SQL/XML for Efficiently Translating Queries over XML View of Relational Data (FCL, CC, VMPV), pp. 269–274.
ICEIS-DISI-2010-PanZH #library #open source #query #retrieval- An Open Source Software based Library Catalogue System using Soundexing Retrieval and Query Caching (ZP, YZ, JH), pp. 182–189.
ICEIS-DISI-2010-PopovicCJ #process #quality- Absorption of Information Provided by Business Intelligence Systems — The Effect of Information Quality on the Use of Information in Business Processes (AP, PSC, JJ), pp. 176–181.
ICEIS-DISI-2010-SchusterJS #web- Finding and Classifying Product Relationships using Information from the Public Web (DS, TMJ, AS), pp. 300–309.
ICEIS-DISI-2010-SunyaevKDK #framework #health- Attack Scenarios for Possible Misuse of Peripheral Parts in the German Health Information Infrastructure (AS, AK, SD, HK), pp. 229–235.
ICEIS-HCI-2010-AstolfiMSA #difference #enterprise #people #problem- Using Cultural Differences to Join People with Common Interests or Problems in Enterprise Environment (GA, VMAdM, MARS, JCA), pp. 192–197.
ICEIS-HCI-2010-TranKVW #declarative #generative #modelling #user interface- Using Task and Data Models for user Interface Declarative Generation (VT, MK, JV, YW), pp. 155–160.
ICEIS-ISAS-2010-GradlMWK #enterprise #modelling #network #process- Modeling ERP Business Processes using Layered Queueing Networks (SG, MM, HW, HK), pp. 255–260.
ICEIS-J-2010-BottcherHM10a #xml- Using XML Schema Subtraction to Compress Electronic Payment Messages (SB, RH, CM), pp. 451–463.
ICEIS-J-2010-Cruz-LaraOGBBC #chat #communication #interface #standard- A Chat Interface Using Standards for Communication and e-Learning in Virtual Worlds (SCL, TO, JG, NB, LB, JPC), pp. 541–554.
ICEIS-J-2010-HernandesSF10a #collaboration #concept #ontology #taxonomy #visualisation- Using Visualization and a Collaborative Glossary to Support Ontology Conceptualization (EMH, DS, SF), pp. 90–103.
ICEIS-J-2010-LopesVSS - Using Cases, Evidences and Context to Support Decision Making (ECL, VV, ACS, US), pp. 340–356.
ICEIS-J-2010-UrbanoRO10a #metric- Extracting Trustworthiness Tendencies Using the Frequency Increase Metric (JU, APR, ECO), pp. 208–221.
ICEIS-SAIC-2010-GoyalK #approach #automation #fuzzy #multi #set- Using Fuzzy Set Approach in Multi-attribute Automated Auctions (MLG, SK), pp. 81–85.
ICEIS-SAIC-2010-Kristensen #abstraction #collaboration #message passing- Abstraction from Collaboration between Agents using Asynchronous Message-passing (BBK), pp. 86–92.
CIKM-2010-AjiWAG #analysis #modelling- Using the past to score the present: extending term weighting models through revision history analysis (AA, YW, EA, EG), pp. 629–638.
CIKM-2010-BatalH #classification #predict- Constructing classification features using minimal predictive patterns (IB, MH), pp. 869–878.
CIKM-2010-BenderskyCS #feedback #pseudo #query- Structural annotation of search queries using pseudo-relevance feedback (MB, WBC, DAS), pp. 1537–1540.
CIKM-2010-CarmanCHB #modelling #personalisation #query #topic #towards- Towards query log based personalization using topic models (MJC, FC, MH, MB), pp. 1849–1852.
CIKM-2010-CartrightALM #approximate #modelling #performance #query- Fast query expansion using approximations of relevance models (MAC, JA, VL, AM), pp. 1573–1576.
CIKM-2010-ChrysakisCP #algorithm #evaluation #network #peer-to-peer #query- Evaluation of top-k queries in peer-to-peer networks using threshold algorithms (IC, CC, DP), pp. 1305–1308.
CIKM-2010-DingSBVWLC #automation #detection #embedded #feature model #framework #image- Automatic detection of craters in planetary images: an embedded framework using feature selection and boosting (WD, TFS, LPCB, RV, YW, ZL, TC), pp. 749–758.
CIKM-2010-FengZXY #crawling #rank- Focused crawling using navigational rank (SF, LZ, YX, CY), pp. 1513–1516.
CIKM-2010-Grefenstette #semantics- Use of semantics in real life applications (GG), pp. 5–6.
CIKM-2010-GuptaGNM #query- Efficiently querying archived data using Hadoop (RG, HG, UN, MKM), pp. 1301–1304.
CIKM-2010-HarveyRC #modelling #ranking #social #topic- Ranking social bookmarks using topic models (MH, IR, MJC), pp. 1401–1404.
CIKM-2010-HuangSN #graph #query #refinement #word- Query model refinement using word graphs (YH, LS, JYN), pp. 1453–1456.
CIKM-2010-JindalLL #overview- Finding unusual review patterns using unexpected rules (NJ, BL, EPL), pp. 1549–1552.
CIKM-2010-KapteinSVK #ranking #wiki- Entity ranking using Wikipedia as a pivot (RK, PS, APdV, JK), pp. 69–78.
CIKM-2010-KohnckeB #category theory #documentation #wiki- Using Wikipedia categories for compact representations of chemical documents (BK, WTB), pp. 1809–1812.
CIKM-2010-KurashimaIIF #recommendation- Travel route recommendation using geotags in photo sharing sites (TK, TI, GI, KF), pp. 579–588.
CIKM-2010-LangMWL #concept #markov #random- Improved latent concept expansion using hierarchical markov random fields (HL, DM, BW, JTL), pp. 249–258.
CIKM-2010-LiLY #named #query #semantics- EntityEngine: answering entity-relationship queries using shallow semantics (XL, CL, CY), pp. 1925–1926.
CIKM-2010-LimNJLL #behaviour #detection #overview #rating- Detecting product review spammers using rating behaviors (EPL, VAN, NJ, BL, HWL), pp. 939–948.
CIKM-2010-LiQKG #automation #constraints #model merging- Automatic schema merging using mapping constraints among incomplete sources (XL, CQ, DK, SG), pp. 299–308.
CIKM-2010-MoonLCLZC #feedback #learning #online #ranking #realtime- Online learning for recency search ranking using real-time user feedback (TM, LL, WC, CL, ZZ, YC), pp. 1501–1504.
CIKM-2010-NguyenYLF #case study #experience #learning #multi #ranking- Experiences with using SVM-based learning for multi-objective ranking (LTN, WGY, RL, OF), pp. 1917–1920.
CIKM-2010-PobleteBMB #graph #image #query #retrieval #semantic gap #web- Visual-semantic graphs: using queries to reduce the semantic gap in web image retrieval (BP, BB, MM, JMB), pp. 1553–1556.
CIKM-2010-ShavittWW #peer-to-peer #recommendation- Building recommendation systems using peer-to-peer shared content (YS, EW, UW), pp. 1457–1460.
CIKM-2010-ShiN #dependence- Using various term dependencies according to their utilities (LS, JYN), pp. 1493–1496.
CIKM-2010-SotoudehA #detection #framework #induction- Partial drift detection using a rule induction framework (DS, AA), pp. 769–778.
CIKM-2010-VijayalakshmiMMDRM #algorithm #search-based- Intelligent sales forecasting engine using genetic algorithms (MV, BM, RM, AD, RR, KM), pp. 1669–1672.
CIKM-2010-WangL #clustering #documentation #incremental #summary- Document update summarization using incremental hierarchical clustering (DW, TL), pp. 279–288.
CIKM-2010-WhiteBD #predict- Predicting short-term interests using activity-based search context (RWW, PNB, STD), pp. 1009–1018.
CIKM-2010-WoodLH #concept #image- Searching consumer image collections using web-based concept expansion (MDW, ACL, SH), pp. 679–688.
CIKM-2010-XueCS #analysis #modelling- Modeling reformulation using passage analysis (XX, WBC, DAS), pp. 1497–1500.
CIKM-2010-XueHC #query #set- Improving verbose queries using subset distribution (XX, SH, WBC), pp. 1059–1068.
ECIR-2010-AltingovdeAU #retrieval #xml- XML Retrieval Using Pruned Element-Index Files (ISA, DA, ÖU), pp. 306–318.
ECIR-2010-AlyDHS #concept #modelling #retrieval- Beyond Shot Retrieval: Searching for Broadcast News Items Using Language Models of Concepts (RA, ARD, DH, AFS), pp. 241–252.
ECIR-2010-CoxZFH #approximate #correctness #query- Improving Query Correctness Using Centralized Probably Approximately Correct (PAC) Search (IJC, JZ, RF, LKH), pp. 265–280.
ECIR-2010-GoharianFYM #peer-to-peer #query- Enriching Peer-to-Peer File Descriptors Using Association Rules on Query Logs (NG, OF, WGY, JM), pp. 636–639.
ECIR-2010-KabadjovSSPP #evaluation #summary #taxonomy- Enhancing N-Gram-Based Summary Evaluation Using Information Content and a Taxonomy (MAK, JS, RS, MP, BP), pp. 662–666.
ECIR-2010-KimCLL #detection #effectiveness #image #named #sequence- BASIL: Effective Near-Duplicate Image Detection Using Gene Sequence Alignment (HsK, HWC, JL, DL), pp. 229–240.
ECIR-2010-RamanUBB #documentation #feedback #on the #pseudo- On Improving Pseudo-Relevance Feedback Using Pseudo-Irrelevant Documents (KR, RU, PB, AB), pp. 573–576.
ECIR-2010-UdupaK #analysis #canonical #correlation #equivalence- Transliteration Equivalence Using Canonical Correlation Analysis (RU, MMK), pp. 75–86.
ECIR-2010-YangJX #enterprise- Using Weighted Tagging to Facilitate Enterprise Search (SY, JJ, YX), pp. 590–593.
ECIR-2010-YinHL #information retrieval #ranking #wiki- Promoting Ranking Diversity for Biomedical Information Retrieval Using Wikipedia (XY, XH, ZL), pp. 495–507.
ECIR-2010-ZucconA #documentation #probability #quantum #rank #ranking- Using the Quantum Probability Ranking Principle to Rank Interdependent Documents (GZ, LA), pp. 357–369.
ICML-2010-BshoutyL #clustering #linear- Finding Planted Partitions in Nearly Linear Time using Arrested Spectral Clustering (NHB, PML), pp. 135–142.
ICML-2010-Busa-FeketeK #performance- Fast boosting using adversarial bandits (RBF, BK), pp. 143–150.
ICML-2010-CumminsN #named #recognition #visual notation- FAB-MAP: Appearance-Based Place Recognition and Mapping using a Learned Visual Vocabulary Model (MJC, PMN), pp. 3–10.
ICML-2010-DruckM #generative #learning #modelling- High-Performance Semi-Supervised Learning using Discriminatively Constrained Generative Models (GD, AM), pp. 319–326.
ICML-2010-KokD #learning #logic #markov #network- Learning Markov Logic Networks Using Structural Motifs (SK, PMD), pp. 551–558.
ICML-2010-LayB #classification #predict- Supervised Aggregation of Classifiers using Artificial Prediction Markets (NL, AB), pp. 591–598.
ICML-2010-PetrikTPZ #approximate #feature model #linear #markov #process #source code- Feature Selection Using Regularization in Approximate Linear Programs for Markov Decision Processes (MP, GT, RP, SZ), pp. 871–878.
ICML-2010-Salakhutdinov #adaptation #learning- Learning Deep Boltzmann Machines using Adaptive MCMC (RS), pp. 943–950.
ICML-2010-YuZ #coordination- Improved Local Coordinate Coding using Local Tangents (KY, TZ), pp. 1215–1222.
ICPR-2010-AdluruTWD #re-engineering- Improving Undersampled MRI Reconstruction Using Non-local Means (GA, TT, RTW, EVRDB), pp. 4000–4003.
ICPR-2010-Allili #retrieval- Wavelet-Based Texture Retrieval Using a Mixture of Generalized Gaussian Distributions (MSA), pp. 3143–3146.
ICPR-2010-AlySTT #multi #recognition #robust #self #similarity- Robust Face Recognition Using Multiple Self-Organized Gabor Features and Local Similarity Matching (SKHA, AS, NT, RiT), pp. 2909–2912.
ICPR-2010-AmanoK #predict- Appearance Control Using Projection with Model Predictive Control (TA, HK), pp. 2832–2835.
ICPR-2010-AnYB #documentation #segmentation- Document Segmentation Using Pixel-Accurate Ground Truth (CA, DY, HSB), pp. 245–248.
ICPR-2010-AriA #estimation #modelling #optimisation- Maximum Likelihood Estimation of Gaussian Mixture Models Using Particle Swarm Optimization (CA, SA), pp. 746–749.
ICPR-2010-ArvanitopoulosBT #fault #linear #subclass- Subclass Error Correcting Output Codes Using Fisher’s Linear Discriminant Ratio (NA, DB, AT), pp. 2953–2956.
ICPR-2010-AshrafSF #constraints #invariant #rank #recognition- View-Invariant Action Recognition Using Rank Constraint (NA, YS, HF), pp. 3611–3614.
ICPR-2010-AslanAFRAX #3d #graph #segmentation- 3D Vertebral Body Segmentation Using Shape Based Graph Cuts (MSA, AMA, AAF, HMR, BA, PX), pp. 3951–3954.
ICPR-2010-AtmosukartoSH #3d #learning #programming #search-based- The Use of Genetic Programming for Learning 3D Craniofacial Shape Quantifications (IA, LGS, CH), pp. 2444–2447.
ICPR-2010-AzarM #automation #image #network #sequence- Automated Tracking of the Carotid Artery in Ultrasound Image Sequences Using a Self Organizing Neural Network (JCA, HHM), pp. 2544–2547.
ICPR-2010-BanimahdE #distance #image #segmentation #set- Lip Segmentation Using Level Set Method: Fusing Landmark Edge Distance and Image Information (SRB, HE), pp. 2432–2435.
ICPR-2010-BassiouK #clustering #distance #word- Word Clustering Using PLSA Enhanced with Long Distance Bigrams (NB, CK), pp. 4226–4229.
ICPR-2010-BayramogluA #image #recognition- Shape Index SIFT: Range Image Recognition Using Local Features (NB, AAA), pp. 352–355.
ICPR-2010-BaysalKD - Recognizing Human Actions Using Key Poses (SB, MCK, PD), pp. 1727–1730.
ICPR-2010-BenabbasLID #modelling #recognition- Action Recognition Using Direction Models of Motion (YB, AL, NI, CD), pp. 4295–4298.
ICPR-2010-BicegoMMAF #2d #kernel #recognition- 2D Shape Recognition Using Information Theoretic Kernels (MB, AFTM, VM, PMQA, MATF), pp. 25–28.
ICPR-2010-BimboLMP #detection #geometry- Person Detection Using Temporal and Geometric Context with a Pan Tilt Zoom Camera (ADB, GL, IM, FP), pp. 3886–3889.
ICPR-2010-BouchrikaCNMT #detection #people- Using Gait Features for Improving Walking People Detection (IB, JNC, MSN, RM, GT), pp. 3097–3100.
ICPR-2010-BozkurtEEE #recognition #speech- Use of Line Spectral Frequencies for Emotion Recognition from Speech (EB, EE, ÇEE, ATE), pp. 3708–3711.
ICPR-2010-BuloP #clustering #difference #probability- Probabilistic Clustering Using the Baum-Eagon Inequality (SRB, MP), pp. 1429–1432.
ICPR-2010-CadavidA #automation #detection #modelling #visual notation- Exploiting Visual Quasi-periodicity for Automated Chewing Event Detection Using Active Appearance Models and Support Vector Machines (SC, MAM), pp. 1714–1717.
ICPR-2010-CakirC #2d #feature model #image- Image Feature Extraction Using 2D Mel-Cepstrum (SÇ, AEÇ), pp. 674–677.
ICPR-2010-CalderaraPC #people #similarity #statistics- Alignment-Based Similarity of People Trajectories Using Semi-directional Statistics (SC, AP, RC), pp. 4275–4278.
ICPR-2010-CandamoGKG #detection- Detecting Wires in Cluttered Urban Scenes Using a Gaussian Model (JC, DBG, RK, SG), pp. 432–435.
ICPR-2010-CaoZL #markov #random- Human Body Parts Tracking Using Sequential Markov Random Fields (XQC, JZ, ZQL), pp. 1759–1762.
ICPR-2010-Carneiro #automation #case study #comparative #design #image- A Comparative Study on the Use of an Ensemble of Feature Extractors for the Automatic Design of Local Image Descriptors (GC), pp. 3356–3359.
ICPR-2010-CeolinH #difference #gender #metric- Characterising Facial Gender Difference Using Fisher-Rao Metric (SC, ERH), pp. 4308–4311.
ICPR-2010-ChenNW #estimation #multi- Actual Midline Estimation from Brain CT Scan Using Multiple Regions Shape Matching (WC, KN, KW), pp. 2552–2555.
ICPR-2010-ChoiMLSBPF #3d #multi #re-engineering- 3D Face Reconstruction Using a Single or Multiple Views (JC, GGM, YL, LS, ORPB, MP, TCF), pp. 3959–3962.
ICPR-2010-ChoPPKKALL #hybrid #segmentation- Level-Set Segmentation of Brain Tumors Using a New Hybrid Speed Function (WC, JP, SYP, SHK, SWK, GA, MEL, GL), pp. 1545–1548.
ICPR-2010-ChoudhuryM #standard- Color Constancy Using Standard Deviation of Color Channels (AC, GGM), pp. 1722–1726.
ICPR-2010-ChowdhuryCGR #graph #video- Cell Tracking in Video Microscopy Using Bipartite Graph Matching (ASC, RC, MG, NR), pp. 2456–2459.
ICPR-2010-CiompiPR #approach #random- A Meta-Learning Approach to Conditional Random Fields Using Error-Correcting Output Codes (FC, OP, PR), pp. 710–713.
ICPR-2010-ColemanSG #architecture #feature model- Coarse Scale Feature Extraction Using the Spiral Architecture Structure (SAC, BWS, BG), pp. 2370–2373.
ICPR-2010-CoutinhoFF #identification #parsing- One-Lead ECG-based Personal Identification Using Ziv-Merhav Cross Parsing (DPC, ALNF, MATF), pp. 3858–3861.
ICPR-2010-DahmG #2d #3d #approach #invariant #novel #recognition- A Novel Pose Invariant Face Recognition Approach Using a 2D-3D Searching Strategy (ND, YG), pp. 3967–3970.
ICPR-2010-DaubneyX #3d #image #refinement- Estimating 3D Human Pose from Single Images Using Iterative Refinement of the Prior (BD, XX), pp. 3440–3443.
ICPR-2010-DehzangiMCL #classification #fuzzy- Framewise Phone Classification Using Weighted Fuzzy Classification Rules (OD, BM, EC, HL), pp. 4186–4189.
ICPR-2010-DickinsonHA #multi #video- Segmenting Video Foreground Using a Multi-Class MRF (PD, AH, KA), pp. 1848–1851.
ICPR-2010-DornaikaC #classification #detection #performance- Efficient Object Detection and Matching Using Feature Classification (FD, FC), pp. 3073–3076.
ICPR-2010-DuboisPM #adaptation #analysis #component #composition- Decomposition of Dynamic Textures Using Morphological Component Analysis: A New Adaptative Strategy (SD, RP, MM), pp. 2258–2261.
ICPR-2010-EkbalSG #feature model #multi #optimisation #recognition- Feature Selection Using Multiobjective Optimization for Named Entity Recognition (AE, SS, CSG), pp. 1937–1940.
ICPR-2010-EklundAOYK #communication #interface #realtime- A Brain Computer Interface for Communication Using Real-Time fMRI (AE, MTA, HO, AY, HK), pp. 3665–3669.
ICPR-2010-ElmezainAM #gesture #random #recognition #robust #segmentation- A Robust Method for Hand Gesture Segmentation and Recognition Using Forward Spotting Scheme in Conditional Random Fields (ME, AAH, BM), pp. 3850–3853.
ICPR-2010-ErdoganG - Semi-blind Speech-Music Separation Using Sparsity and Continuity Priors (HE, EMG), pp. 4573–4576.
ICPR-2010-ErgulA #classification #topic- Scene Classification Using Spatial Pyramid of Latent Topics (EE, NA), pp. 3603–3606.
ICPR-2010-FischerKFB #documentation #modelling #word- HMM-based Word Spotting in Handwritten Documents Using Subword Models (AF, AK, VF, HB), pp. 3416–3419.
ICPR-2010-FleckD #image #invariant- Using Local Affine Invariants to Improve Image Matching (DF, ZD), pp. 1844–1847.
ICPR-2010-FornesELV #classification- Symbol Classification Using Dynamic Aligned Shape Descriptor (AF, SE, JL, EV), pp. 1957–1960.
ICPR-2010-FouheySB #detection #image #multi- Multiple Plane Detection in Image Pairs Using J-Linkage (DFF, DS, AJB), pp. 336–339.
ICPR-2010-FraundorferWP #locality #mobile #visual notation #word- Combining Monocular and Stereo Cues for Mobile Robot Localization Using Visual Words (FF, CW, MP), pp. 3927–3930.
ICPR-2010-FujitaHSTS #detection #image- An Improved Method for Cirrhosis Detection Using Liver’s Ultrasound Images (YF, YH, MS, ST, IS), pp. 2294–2297.
ICPR-2010-GajsekSM #canonical #correlation #multi #recognition- Multi-modal Emotion Recognition Using Canonical Correlations and Acoustic Features (RG, VS, FM), pp. 4133–4136.
ICPR-2010-GhaeminiaSS #adaptation- Adaptive Motion Model for Human Tracking Using Particle Filter (MHG, AHS, SBS), pp. 2073–2076.
ICPR-2010-Gonzalez-RubioC #multi #on the #string- On the Use of Median String for Multi-source Translation (JGR, FC), pp. 4328–4331.
ICPR-2010-GrazziniDS #image #multi- Multichannel Image Regularisation Using Anisotropic Geodesic Filtering (JG, SED, PS), pp. 2664–2667.
ICPR-2010-GriptonL #kernel #semistructured data- Kernel Domain Description with Incomplete Data: Using Instance-Specific Margins to Avoid Imputation (AG, WL), pp. 2921–2924.
ICPR-2010-GuoBC #approach #learning- Support Vectors Selection for Supervised Learning Using an Ensemble Approach (LG, SB, NC), pp. 37–40.
ICPR-2010-GuoH - Cascaded Background Subtraction Using Block-Based and Pixel-Based Codebooks (JMG, CSH), pp. 1373–1376.
ICPR-2010-GuoM #detection- Action Detection in Crowded Videos Using Masks (PG, ZM), pp. 1767–1770.
ICPR-2010-GuoMR #database #performance #recognition #scalability- Cross-Age Face Recognition on a Very Large Database: The Performance versus Age Intervals and Improvement Using Soft Biometric Traits (GG, GM, KR), pp. 3392–3395.
ICPR-2010-HaberdarS #detection #framework #mobile #platform #refinement #video- Disparity Map Refinement for Video Based Scene Change Detection Using a Mobile Stereo Camera Platform (HH, SKS), pp. 3890–3893.
ICPR-2010-HafnerGLUVW #classification #image- Endoscopic Image Classification Using Edge-Based Features (MH, AG, ML, AU, AV, FW), pp. 2724–2727.
ICPR-2010-HarirchiRMDG #algorithm #detection- Two-Level Algorithm for MCs Detection in Mammograms Using Diverse-Adaboost-SVM (FH, PR, HAM, FD, MG), pp. 269–272.
ICPR-2010-HassanAMHW #authentication #image #self- Secure Self-Recovery Image Authentication Using Randomly-Sized Blocks (AMH, AAH, BM, YMYH, MAAW), pp. 1445–1448.
ICPR-2010-HassanCG #documentation #image #kernel #retrieval- Document Image Retrieval Using Feature Combination in Kernel Space (EH, SC, MG), pp. 2009–2012.
ICPR-2010-HoriKY #generative #image #multi #sequence- Arbitrary Stereoscopic View Generation Using Multiple Omnidirectional Image Sequences (MH, MK, NY), pp. 286–289.
ICPR-2010-Hotta #classification #visual notation #word- Scene Classification Using Local Co-occurrence Feature in Subspace Obtained by KPCA of Local Blob Visual Words (KH), pp. 4230–4233.
ICPR-2010-HsinLLC #image- Image Inpainting Using Structure-Guided Priority Belief Propagation and Label Transformations (HFH, JJL, CSL, HYC), pp. 4492–4495.
ICPR-2010-HuC #distance #retrieval #sketching #video- Motion-sketch Based Video Retrieval Using a Trellis Levenshtein Distance (RH, JPC), pp. 121–124.
ICPR-2010-HuQHJT #recognition- Action Recognition Using Spatial-Temporal Context (QH, LQ, QH, SJ, QT), pp. 1521–1524.
ICPR-2010-HuYLS #3d #locality #multi #novel- A Novel Facial Localization for Three-dimensional Face Using Multi-level Partition of Unity Implicits (YH, JY, WL, PS), pp. 682–685.
ICPR-2010-IbrahimKKG #analysis #online #verification- On-Line Signature Verification Using 1-D Velocity-Based Directional Analysis (MTI, MJK, MAK, LG), pp. 3830–3833.
ICPR-2010-InoueSSF #feature model #modelling- High-Level Feature Extraction Using SIFT GMMs and Audio Models (NI, TS, KS, SF), pp. 3220–3223.
ICPR-2010-IzadiS #automation #detection #image #segmentation- Automatic Building Detection in Aerial Images Using a Hierarchical Feature Based Image Segmentation (MI, PS), pp. 472–475.
ICPR-2010-JabidKC #classification #gender- Gender Classification Using Local Directional Pattern (LDP) (TJ, MHK, OC), pp. 2162–2165.
ICPR-2010-JagerPCC #3d #analysis- Dual Channel Colocalization for Cell Cycle Analysis Using 3D Confocal Microscopy (SJ, KP, CSCD, MCC), pp. 2580–2583.
ICPR-2010-JakkojuKJ #classification #performance- Fast and Spatially-Smooth Terrain Classification Using Monocular Camera (CJ, KMK, CVJ), pp. 4060–4063.
ICPR-2010-JammalamadakaJKM #matrix- Discriminative Basis Selection Using Non-negative Matrix Factorization (AJ, SJ, SK, BSM), pp. 1533–1536.
ICPR-2010-JiaM #design- Classifying Textile Designs Using Bags of Shapes (WJ, SJM), pp. 294–297.
ICPR-2010-Jiang #3d #re-engineering- 3D Human Pose Reconstruction Using Millions of Exemplars (HJ), pp. 1674–1677.
ICPR-2010-JiI #recognition- Using Moments on Spatiotemporal Plane for Facial Expression Recognition (YJ, KI), pp. 3806–3809.
ICPR-2010-JoshiWL #semantics- Suggesting Songs for Media Creation Using Semantics (DJ, MDW, JL), pp. 3208–3211.
ICPR-2010-KalafatlarY #3d #segmentation- 3D Articulated Shape Segmentation Using Motion Information (EK, YY), pp. 3595–3598.
ICPR-2010-KanetoNB #estimation #realtime- Real-Time User Position Estimation in Indoor Environments Using Digital Watermarking for Audio Signals (RK, YN, NB), pp. 97–100.
ICPR-2010-KayaCC #design- Designing a Pattern Stabilization Method Using Scleral Blood Vessels for Laser Eye Surgery (AK, ABC, HBC), pp. 698–701.
ICPR-2010-KeustermansMVS #automation #identification #modelling- Automated Cephalometric Landmark Identification Using Shape and Local Appearance Models (JK, WM, DV, PS), pp. 2464–2467.
ICPR-2010-KhosrowabadiQWA #bound #detection #recognition #self- EEG-based Emotion Recognition Using Self-Organizing Map for Boundary Detection (RK, HCQ, AW, KKA), pp. 4242–4245.
ICPR-2010-KhwajaAG #invariant #recognition #representation- Illumination and Expression Invariant Recognition Using SSIM Based Sparse Representation (AAK, AA, RG), pp. 4028–4031.
ICPR-2010-KimL #markov #monte carlo #optimisation #random- Continuous Markov Random Field Optimization Using Fusion Move Driven Markov Chain Monte Carlo Technique (WK, KML), pp. 1364–1367.
ICPR-2010-KimYOC #optimisation #video- Recovery Video Stabilization Using MRF-MAP Optimization (SWK, KMY, SO, JYC), pp. 2804–2807.
ICPR-2010-KitaW #clustering #image- Binarization of Color Characters in Scene Images Using k-means Clustering and Support Vector Machines (KK, TW), pp. 3183–3186.
ICPR-2010-KohGC #locality #robust- A Robust Iris Localization Method Using an Active Contour Model and Hough Transform (JK, VG, VC), pp. 2852–2856.
ICPR-2010-KootstraBK #segmentation #symmetry- Using Symmetry to Select Fixation Points for Segmentation (GK, NB, DK), pp. 3894–3897.
ICPR-2010-KrauszB #recognition- Action Recognition in Videos Using Nonnegative Tensor Factorization (BK, CB), pp. 1763–1766.
ICPR-2010-KrishnanS #detection- Detecting Group Turn Patterns in Conversations Using Audio-Video Change Scale-Space (RK, SS), pp. 137–140.
ICPR-2010-KryszczukHS #orthogonal #predict- Direct Printability Prediction in VLSI Using Features from Orthogonal Transforms (KK, PH, RS), pp. 2764–2767.
ICPR-2010-KumarCCAPH #classification #complexity- Heart Murmur Classification Using Complexity Signatures (DK, PC, RC, MA, RPP, JH), pp. 2564–2567.
ICPR-2010-KumeTSY #estimation #image #parametricity #video- Extrinsic Camera Parameter Estimation Using Video Images and GPS Considering GPS Positioning Accuracy (HK, TT, TS, NY), pp. 3923–3926.
ICPR-2010-KusakunniranWZL #multi #recognition- Multi-view Gait Recognition Based on Motion Regression Using Multilayer Perceptron (WK, QW, JZ, HL), pp. 2186–2189.
ICPR-2010-LawalAM #abduction #classification #network #recognition- Recognition of Handwritten Arabic (Indian) Numerals Using Freeman’s Chain Codes and Abductive Network Classifiers (IAL, REAA, SAM), pp. 1884–1887.
ICPR-2010-LeeCL #algorithm #data-driven #graph #markov #monte carlo- A Graph Matching Algorithm Using Data-Driven Markov Chain Monte Carlo Sampling (JL, MC, KML), pp. 2816–2819.
ICPR-2010-LeeHH #automation #gender #recognition- Automatic Gender Recognition Using Fusion of Facial Strips (PHL, JYH, YPH), pp. 1140–1143.
ICPR-2010-LeeP #information retrieval- Tracking Hand Rotation and Grasping from an IR Camera Using Cylindrical Manifold Embedding (CSL, SWP), pp. 2612–2615.
ICPR-2010-Lei #distance #verification- Combining the Likelihood and the Kullback-Leibler Distance in Estimating the Universal Background Model for Speaker Verification Using SVM (ZL), pp. 4553–4556.
ICPR-2010-Liao - Region Description Using Extended Local Ternary Patterns (WHL), pp. 1003–1006.
ICPR-2010-LiGW #adaptation #image #reduction- Adaptive Enhancement with Speckle Reduction for SAR Images Using Mirror-Extended Curvelet and PSO (YL, HG, QW), pp. 4520–4523.
ICPR-2010-LiIK #recognition #robust #word- Robust Face Recognition Using Block-Based Bag of Words (ZL, JiI, MK), pp. 1285–1288.
ICPR-2010-LiLD #learning- Learning GMM Using Elliptically Contoured Distributions (BL, WL, LD), pp. 511–514.
ICPR-2010-LinW #detection #framework #platform- Detecting Moving Objects Using a Camera on a Moving Platform (CCL, MW), pp. 460–463.
ICPR-2010-LiuA #learning #semantics- Learning Scene Semantics Using Fiedler Embedding (JL, SA), pp. 3627–3630.
ICPR-2010-LiuCLL #automation #locality #parametricity- A Lip Contour Extraction Method Using Localized Active Contour Model with Automatic Parameter Selection (XL, YmC, ML, HL), pp. 4332–4335.
ICPR-2010-LiuLH #learning #multi #representation- Semi-supervised Trajectory Learning Using a Multi-Scale Key Point Based Trajectory Representation (YL, XL, WH), pp. 3525–3528.
ICPR-2010-LiuR - Estimating Nonrigid Shape Deformation Using Moments (WL, ER), pp. 185–188.
ICPR-2010-LiuS #similarity #visual notation- Visual Tracking Using Sparsity Induced Similarity (HL, FS), pp. 1702–1705.
ICPR-2010-LiuWWY #adaptation #linear- Pan-Sharpening Using an Adaptive Linear Model (LL, YW, YW, HY), pp. 4512–4515.
ICPR-2010-LiZ - One-Shot Scanning Using a Color Stripe Pattern (RL, HZ), pp. 1666–1669.
ICPR-2010-LiZZ #detection #invariant- Abandoned Objects Detection Using Double Illumination Invariant Foreground Masks (XL, CZ, DZ), pp. 436–439.
ICPR-2010-LlobetCPA #finite #transducer- OCR Post-processing Using Weighted Finite-State Transducers (RL, JRCN, JCPC, JA), pp. 2021–2024.
ICPR-2010-LutfYL #identification- Offline Arabic Handwriting Identification Using Language Diacritics (ML, XY, HL), pp. 1912–1915.
ICPR-2010-LvBYD #verification #visual notation- Off-Line Signature Verification Using Graphical Model (HL, XB, WY, JD), pp. 3784–3788.
ICPR-2010-Machucho-CadenaB #3d #algebra #geometry #re-engineering- 3D Reconstruction of Tumors for Applications in Laparoscopy Using Conformal Geometric Algebra (RMC, EBC), pp. 2532–2535.
ICPR-2010-MalgireddyCSGM #framework #gesture #modelling #recognition- A Framework for Hand Gesture Recognition and Spotting Using Sub-gesture Modeling (MRM, JJC, SS, VG, DM), pp. 3780–3783.
ICPR-2010-MansouriAT #video- MPEG-2 Video Watermarking Using Pattern Consideration (AM, AMA, FTA), pp. 2428–2431.
ICPR-2010-MatsukawaK #recognition- Action Recognition Using Three-Way Cross-Correlations Feature of Local Moton Attributes (TM, TK), pp. 1731–1734.
ICPR-2010-MaTW #analysis #random- Nonlinear Blind Source Separation Using Slow Feature Analysis with Random Features (KM, QT, JW), pp. 830–833.
ICPR-2010-MehmoodN #detection #kernel- Anomaly Detection for Longwave FLIR Imagery Using Kernel Wavelet-RX (AM, NMN), pp. 1385–1388.
ICPR-2010-MonzoAAM #case study #comparative #locality #recognition- A Comparative Study of Facial Landmark Localization Methods for Face Recognition Using HOG descriptors (DM, AA, AA, JMM), pp. 1330–1333.
ICPR-2010-MoriMY #recognition- Gait Recognition Using Period-Based Phase Synchronization for Low Frame-Rate Videos (AM, YM, YY), pp. 2194–2197.
ICPR-2010-MoroTU #detection- Detection of Moving Objects with Removal of Cast Shadows and Periodic Changes Using Stereo Vision (AM, KT, KU), pp. 328–331.
ICPR-2010-MozaffariBA #classification #gender #geometry #image- Gender Classification Using Single Frontal Image Per Person: Combination of Appearance and Geometric Based Features (SM, HB, RA), pp. 1192–1195.
ICPR-2010-NacereddineTZH #image #retrieval- Shape-Based Image Retrieval Using a New Descriptor Based on the Radon and Wavelet Transforms (NN, ST, DZ, LH), pp. 1997–2000.
ICPR-2010-NasonovK #performance- Fast Super-Resolution Using Weighted Median Filtering (AVN, ASK), pp. 2230–2233.
ICPR-2010-NishidaKOH #algorithm #visual notation- Visual Tracking Algorithm Using Pixel-Pair Feature (KN, TK, YO, MH), pp. 1808–1811.
ICPR-2010-NordbergZ #2d #geometry #image #multi #segmentation- Multibody Motion Segmentation Using the Geometry of 6 Points in 2D Images (KN, VZ), pp. 1783–1787.
ICPR-2010-NymanHA #constraints #framework #multi #platform- Multi-camera Platform Calibration Using Multi-linear Constraints (PN, AH, KÅ), pp. 53–56.
ICPR-2010-OhH #learning #process #video- Unsupervised Learning of Activities in Video Using Scene Context (SO, AH), pp. 3579–3582.
ICPR-2010-OliverTLM #automation #segmentation #set- Automatic Diagnosis of Masses by Using Level set Segmentation and Shape Description (AO, AT, XL, JM), pp. 2528–2531.
ICPR-2010-OzdemirA #classification #image #representation- Image Classification Using Subgraph Histogram Representation (BÖ, SA), pp. 1112–1115.
ICPR-2010-PaivaJT #analysis #image- Using Sequential Context for Image Analysis (ARCP, EJ, TT), pp. 2800–2803.
ICPR-2010-PaivaT #detection #image- Detection of Salient Image Points Using Principal Subspace Manifold Structure (ARCP, TT), pp. 1389–1392.
ICPR-2010-PanMSHN #adaptation #estimation #video- A Dual Pass Video Stabilization System Using Iterative Motion Estimation and Adaptive Motion Smoothing (PP, AM, JS, YH, SN), pp. 2298–2301.
ICPR-2010-PapalazarouRW #detection #estimation #image #multi- Multiple Model Estimation for the Detection of Curvilinear Segments in Medical X-ray Images Using Sparse-plus-dense-RANSAC (CP, PMJR, PHNdW), pp. 2484–2487.
ICPR-2010-PapariCP #detection #novel- Steerable Filtering Using Novel Circular Harmonic Functions with Application to Edge Detection (GP, PC, NP), pp. 3947–3950.
ICPR-2010-ParkKS #detection #markov #modelling #recognition #visual notation- Visual Recognition of Types of Structural Corridor Landmarks Using Vanishing Points Detection and Hidden Markov Models (YP, SSK, IHS), pp. 3292–3295.
ICPR-2010-PatrauceanGC #identification #invariant- Bubble Tag Identification Using an Invariant — Under — Perspective Signature (VP, PG, JC), pp. 408–411.
ICPR-2010-PaulaOBS #recognition- Forest Species Recognition Using Color-Based Features (PLdP, LSO, AdSBJ, RS), pp. 4178–4181.
ICPR-2010-PengSGS #classification #documentation- Text Separation from Mixed Documents Using a Tree-Structured Classifier (XP, SS, VG, RS), pp. 241–244.
ICPR-2010-PengYZC #classification #segmentation- Retinal Blood Vessels Segmentation Using the Radial Projection and Supervised Classification (QP, XY, LZ, YmC), pp. 1489–1492.
ICPR-2010-PhamTN #bound #segmentation #similarity- Bounding-Box Based Segmentation with Single Min-cut Using Distant Pixel Similarity (VQP, KT, TN), pp. 4420–4423.
ICPR-2010-PiroonratanaWUALC #identification #morphism #nondeterminism #ranking #symmetry- Identification of Ancestry Informative Markers from Chromosome-Wide Single Nucleotide Polymorphisms Using Symmetrical Uncertainty Ranking (TP, WW, TU, AA, CL, NC), pp. 2448–2451.
ICPR-2010-PlumptonKLJ #classification #linear #online- On-Line fMRI Data Classification Using Linear and Ensemble Classifiers (COP, LIK, DEJL, SJJ), pp. 4312–4315.
ICPR-2010-PrumVO #online #recognition #word- On-Line Handwriting Word Recognition Using a Bi-character Model (SP, MV, JMO), pp. 2700–2703.
ICPR-2010-QiaoC #3d #analysis #component #modelling #statistics- Statistical Texture Modeling for Medical Volume Using Generalized N-Dimensional Principal Component Analysis Method and 3D Volume Morphing (XQ, YWC), pp. 2488–2491.
ICPR-2010-QuelhasMC #3d #quantifier- 3D Cell Nuclei Fluorescence Quantification Using Sliding Band Filter (PQ, AMM, ACC), pp. 2508–2511.
ICPR-2010-QuWL #difference #image #recognition- Action Recognition Using Space-Time Shape Difference Images (HQ, LW, CL), pp. 3661–3664.
ICPR-2010-RahtuSH #random- Compressing Sparse Feature Vectors Using Random Ortho-Projections (ER, MS, JH), pp. 1397–1400.
ICPR-2010-RantosonSFM #3d #metric- Non Contact 3D Measurement Scheme for Transparent Objects Using UV Structured light (RR, CS, DF, FM), pp. 1646–1649.
ICPR-2010-RaraAESF #re-engineering #recognition- Face Recognition at-a-Distance Using Texture, Dense- and Sparse-Stereo Reconstruction (HMR, AMA, SYE, TLS, AAF), pp. 1221–1224.
ICPR-2010-ReckyL #detection- Windows Detection Using K-means in CIE-Lab Color Space (MR, FL), pp. 356–359.
ICPR-2010-RoyM #video- Crossmodal Matching of Speakers Using Lip and Voice Features in Temporally Non-overlapping Audio and Video Streams (AR, SM), pp. 4504–4507.
ICPR-2010-RoySB #game studies #image #segmentation- Segmentation of Unideal Iris Images Using Game Theory (KR, CYS, PB), pp. 2844–2847.
ICPR-2010-SadekAMS #automation #realtime #recognition- Real-Time Automatic Traffic Accident Recognition Using HFG (SS, AAH, BM, US), pp. 3348–3351.
ICPR-2010-SagheerHNS #recognition #word- Holistic Urdu Handwritten Word Recognition Using Support Vector Machine (MWS, CLH, NN, CYS), pp. 1900–1903.
ICPR-2010-SanromaAS #approach #graph- A Discrete Labelling Approach to Attributed Graph Matching Using SIFT Features (GS, RA, FS), pp. 954–957.
ICPR-2010-SantoshWL #visual notation- Using Spatial Relations for Graphical Symbol Description (KCS, LW, BL), pp. 2041–2044.
ICPR-2010-SarginGMR - Object Tracking with Ratio Cycles Using Shape and Appearance Cues (MES, PG, BSM, KR), pp. 3649–3652.
ICPR-2010-SatakeM #multi- Stereo-Based Multi-person Tracking Using Overlapping Silhouette Templates (JS, JM), pp. 4304–4307.
ICPR-2010-ScharfenbergerCF #artificial reality #predict- Driver Body-Height Prediction for an Ergonomically Optimized Ingress Using a Single Omnidirectional Camera (CS, SC, GF), pp. 298–301.
ICPR-2010-SenechalBP #automation #detection- Automatic Facial Action Detection Using Histogram Variation Between Emotional States (TS, KB, LP), pp. 3752–3755.
ICPR-2010-SenkoK #clustering #pattern matching #pattern recognition #recognition- Pattern Recognition Method Using Ensembles of Regularities Found by Optimal Partitioning (OVS, AVK), pp. 2957–2960.
ICPR-2010-SeppkeDH #detection #energy #image #symmetry- Using Snakes with Asymmetric Energy Terms for the Detection of Varying-Contrast Edges in SAR Images (BS, LSDF, NH), pp. 2792–2795.
ICPR-2010-SeppkeDHW #equation #multi #parametricity #performance- Fast Derivation of Soil Surface Roughness Parameters Using Multi-band SAR Imagery and the Integral Equation Model (BS, LSDF, JAH, FW), pp. 3931–3934.
ICPR-2010-SfikasHN #analysis #clustering #multi- Multiple Atlas Inference and Population Analysis Using Spectral Clustering (GS, CH, CN), pp. 2500–2503.
ICPR-2010-ShamiliBA #detection #distributed #machine learning #mobile- Malware Detection on Mobile Devices Using Distributed Machine Learning (ASS, CB, TA), pp. 4348–4351.
ICPR-2010-ShiSG #documentation #image- Removing Rule-Lines from Binary Handwritten Arabic Document Images Using Directional Local Profile (ZS, SS, VG), pp. 1916–1919.
ICPR-2010-ShobeirinejadG #classification #gender- Gender Classification Using Interlaced Derivative Patterns (AS, YG), pp. 1509–1512.
ICPR-2010-SilveiraM #image- Boosting Alzheimer Disease Diagnosis Using PET Images (MS, JSM), pp. 2556–2559.
ICPR-2010-Simsekli #automation #classification #music- Automatic Music Genre Classification Using Bass Lines (US), pp. 4137–4140.
ICPR-2010-SirmacekU #detection #network- Road Network Extraction Using Edge Detection and Spatial Voting (BS, CÜ), pp. 3113–3116.
ICPR-2010-SmeetsFHVS #3d #approach #composition #invariant #modelling #recognition- Fusion of an Isometric Deformation Modeling Approach Using Spectral Decomposition and a Region-Based Approach Using ICP for Expression-Invariant 3D Face Recognition (DS, TF, JH, DV, PS), pp. 1172–1175.
ICPR-2010-SoldeaESU #approach #image #segmentation- Segmentation of Anatomical Structures in Brain MR Images Using Atlases in FSL — A Quantitative Approach (OS, AE, DFS, DU, MÇ, AE, MGU, ZF, MC), pp. 2592–2595.
ICPR-2010-SoltanaACA #adaptation #algorithm #search-based- Adaptive Feature and Score Level Fusion Strategy Using Genetic Algorithms (WBS, MA, LC, CBA), pp. 4316–4319.
ICPR-2010-SrikrishnanC #analysis #linear- Crowd Motion Analysis Using Linear Cyclic Pursuit (VS, SC), pp. 3340–3343.
ICPR-2010-StarkWP #representation #speech- Single Channel Speech Separation Using Source-Filter Representation (MS, MW, FP), pp. 826–829.
ICPR-2010-SteerAM #data fusion #recognition- Audio-Visual Data Fusion Using a Particle Filter in the Application of Face Recognition (MAS, AAH, BM), pp. 4392–4395.
ICPR-2010-SulicPKK #distributed #random #reduction- Dimensionality Reduction for Distributed Vision Systems Using Random Projection (VS, JP, MK, SK), pp. 380–383.
ICPR-2010-SultaniC #detection- Abnormal Traffic Detection Using Intelligent Driver Model (WS, JYC), pp. 324–327.
ICPR-2010-SuryanarayanSM #recognition- Dynamic Hand Pose Recognition Using Depth Data (PS, AS, DM), pp. 3105–3108.
ICPR-2010-SuzukiIAT #algorithm #estimation #image- A Scale Estimation Algorithm Using Phase-Based Correspondence Matching for Electron Microscope Images (AS, KI, TA, RT), pp. 2420–2423.
ICPR-2010-SzeptyckiACZGS #2d #composition- Partial Face Biometry Using Shape Decomposition on 2D Conformal Maps of Faces (PS, MA, LC, WZ, XDG, DS), pp. 1505–1508.
ICPR-2010-TabiaCDV #3d #retrieval- 3D-Shape Retrieval Using Curves and HMM (HT, OC, MD, JPV), pp. 3147–3150.
ICPR-2010-Tagawa #eye tracking #modelling #statistics- Depth Perception Model Based on Fixational Eye Movements Using Bayesian Statistical Inference (NT), pp. 1662–1665.
ICPR-2010-TangHLL #retrieval- A Person Retrieval Solution Using Finger Vein Patterns (DT, BH, RL, WL), pp. 1306–1309.
ICPR-2010-TanveerI #approach- A Bayesian Approach to Face Hallucination Using DLPP and KRR (MT, NI), pp. 2154–2157.
ICPR-2010-TaxHVP #clustering #concept #detection #learning #multi- The Detection of Concept Frames Using Clustering Multi-instance Learning (DMJT, EH, MFV, MP), pp. 2917–2920.
ICPR-2010-TekeT #image #multi #strict- Multi-spectral Satellite Image Registration Using Scale-Restricted SURF (MT, AT), pp. 2310–2313.
ICPR-2010-ThiCZWS #modelling #recognition- Weakly Supervised Action Recognition Using Implicit Shape Models (THT, LC, JZ, LW, SS), pp. 3517–3520.
ICPR-2010-TorrentPLFSMP #approach #detection- Detecting Faint Compact Sources Using Local Features and a Boosting Approach (AT, MP, XL, JF, JRSS, JM, JMP), pp. 4613–4616.
ICPR-2010-TrummerMD #online #optimisation- Online Next-Best-View Planning for Accuracy Optimization Using an Extended E-Criterion (MT, CM, JD), pp. 1642–1645.
ICPR-2010-TsaiHTC #detection #pipes and filters #predict #scalability- Learning-Based Vehicle Detection Using Up-Scaling Schemes and Predictive Frame Pipeline Structures (YMT, KYH, CCT, LGC), pp. 3101–3104.
ICPR-2010-TumaIP #classification #kernel #set- Hydroacoustic Signal Classification Using Kernel Functions for Variable Feature Sets (MT, CI, MP), pp. 1011–1014.
ICPR-2010-TurkerKG #classification #image #network- Classification of Polarimetric SAR Images Using Evolutionary RBF Networks (TI, SK, MG), pp. 4324–4327.
ICPR-2010-UbukataTMU #multi #segmentation- Multi-object Segmentation in a Projection Plane Using Subtraction Stereo (TU, KT, AM, KU), pp. 3296–3299.
ICPR-2010-Velasco-ForeroA #modelling #statistics- Statistical Shape Modeling Using Morphological Representations (SVF, JA), pp. 3537–3540.
ICPR-2010-VenkateshaT #process #recognition- Human Activity Recognition Using Local Shape Descriptors (SV, MT), pp. 3704–3707.
ICPR-2010-VenkateshJ - Human Electrocardiogram for Biometrics Using DTW and FLDA (NV, SJ), pp. 3838–3841.
ICPR-2010-VenkateshKM #3d #approach #recognition- Resampling Approach to Facial Expression Recognition Using 3D Meshes (YVV, AAK, OVRM), pp. 3772–3775.
ICPR-2010-Wang #detection #documentation #recognition- Document Logo Detection and Recognition Using Bayesian Model (HW), pp. 1961–1964.
ICPR-2010-WangAYL #bottom-up #estimation #learning #top-down- Combined Top-Down/Bottom-Up Human Articulated Pose Estimation Using AdaBoost Learning (SW, HA, TY, SL), pp. 3670–3673.
ICPR-2010-WangC10a #3d #estimation- Articulated Human Body: 3D Pose Estimation Using a Single Camera (ZW, RC), pp. 3768–3771.
ICPR-2010-WangH #multi #random #recognition- Cancelable Face Recognition Using Random Multiplicative Transform (YW, DH), pp. 1261–1264.
ICPR-2010-WangH10a #case study #classification #design #multi #prototype- A Study of Designing Compact Recognizers of Handwritten Chinese Characters Using Multiple-Prototype Based Classifiers (YW, QH), pp. 1872–1875.
ICPR-2010-WangJMS #process- Decoding Finger Flexion from Electrocorticographic Signals Using a Sparse Gaussian Process (ZW, QJ, KJM, GS), pp. 3756–3759.
ICPR-2010-WangLL #3d #linear #programming- Monocular 3D Tracking of Deformable Surfaces Using Linear Programming (CW, XL, YL), pp. 1710–1713.
ICPR-2010-WangLS #documentation #identification- Noise Tolerant Script Identification of Printed Oriental and English Documents Using a Downgraded Pixel Density Feature (NW, LL, CYS), pp. 2037–2040.
ICPR-2010-WangM #learning #order #process- Gaussian Process Learning from Order Relationships Using Expectation Propagation (RW, SJM), pp. 605–608.
ICPR-2010-WangSLYB #classification- Shape Classification Using Tree -Unions (BW, WS, WL, XY, XB), pp. 983–986.
ICPR-2010-WartakB #estimation- Optical Flow Estimation Using Diffusion Distances (SW, AGB), pp. 189–192.
ICPR-2010-WatanabeNKI #estimation- Estimation of Non-rigid Surface Deformation Using Developable Surface Model (YW, TN, TK, MI), pp. 197–200.
ICPR-2010-WijnhovenW #detection #performance #probability- Fast Training of Object Detection Using Stochastic Gradient Descent (RGJW, PHNdW), pp. 424–427.
ICPR-2010-WuHCCT #detection #interactive #visual notation- Human Smoking Event Detection Using Visual Interaction Clues (PW, JWH, JCC, SCC, SYT), pp. 4344–4347.
ICPR-2010-WuLW #image #learning #retrieval- Enhancing SVM Active Learning for Image Retrieval Using Semi-supervised Bias-Ensemble (JW, ML, CLW), pp. 3175–3178.
ICPR-2010-XiaLH #mining #modelling- Mining Exemplars for Object Modelling Using Affinity Propagation (SX, JL, ERH), pp. 918–921.
ICPR-2010-Xie #segmentation #set- Level Set Based Segmentation Using Local Feature Distribution (XX), pp. 2780–2783.
ICPR-2010-XuHW #similarity- Rectifying Non-Euclidean Similarity Data Using Ricci Flow Embedding (WX, ERH, RCW), pp. 3324–3327.
ICPR-2010-YaegashiY #kernel #learning #multi #recognition- Geotagged Photo Recognition Using Corresponding Aerial Photos with Multiple Kernel Learning (KY, KY), pp. 3272–3275.
ICPR-2010-YamanakaSS #adaptation #image- Adaptive Image Projection onto Non-planar Screen Using Projector-Camera Systems (TY, FS, JS), pp. 307–310.
ICPR-2010-YamauchiBS #3d #modelling- 3D Human Body Modeling Using Range Data (KY, BB, HS), pp. 3476–3479.
ICPR-2010-YangSZ #analysis #multi #recognition- Face Recognition Using a Multi-manifold Discriminant Analysis Method (WY, CS, LZ), pp. 527–530.
ICPR-2010-YoonK #recognition- Human Action Recognition Using Segmented Skeletal Features (SMY, AK), pp. 3740–3743.
ICPR-2010-ZareG #multi #pattern matching #pattern recognition #recognition- Pattern Recognition Using Functions of Multiple Instances (AZ, PDG), pp. 1092–1095.
ICPR-2010-ZhangGC #detection #invariant- Water Reflection Detection Using a Flip Invariant Shape Detector (HZ, XG, XC), pp. 633–636.
ICPR-2010-ZhangHTW #3d #evaluation #framework #modelling- 3D Model Based Vehicle Tracking Using Gradient Based Fitness Evaluation under Particle Filter Framework (ZZ, KH, TT, YW), pp. 1771–1774.
ICPR-2010-ZhangK10a #detection #graph- Text Detection Using Edge Gradient and Graph Spectrum (JZ, RK), pp. 3979–3982.
ICPR-2010-ZhangSSQ #keyword- Improved Mandarin Keyword Spotting Using Confusion Garbage Model (SZ, ZS, QS, YQ), pp. 3700–3703.
ICPR-2010-ZhangWB #classification- Age Classification Base on Gait Using HMM (DZ, YW, BB), pp. 3834–3837.
ICPR-2010-ZhangZ #analysis #canonical #correlation #image- Exposing Digital Image Forgeries by Using Canonical Correlation Analysis (CZ, HZ), pp. 838–841.
ICPR-2010-ZhangZZZ #classification #kernel #metric- Time Series Classification Using Support Vector Machine with Gaussian Elastic Metric Kernel (DZ, WZ, DZ, HZ), pp. 29–32.
ICPR-2010-ZhouK #identification #image #locality- Personal Identification from Iris Images Using Localized Radon Transform (YZ, AK), pp. 2840–2843.
ICPR-2010-ZhouWH #2d #3d #realtime- Real-Time 3D Face and Facial Action Tracking Using Extended 2D+3D AAMs (MZ, YW, XH), pp. 3963–3966.
ICPR-2010-ZhuHYL #behaviour #learning #metric #prototype #recognition- Prototype Learning Using Metric Learning Based Behavior Recognition (PZ, WH, CY, LL), pp. 2604–2607.
ICPR-2010-ZouH #3d #performance- Recovering 3D Shape Using an Improved Fast Marching Method (CZ, ERH), pp. 1678–1681.
ICPR-2010-ZwengK #behaviour #image #multi #recognition #sequence- Unexpected Human Behavior Recognition in Image Sequences Using Multiple Features (AZ, MK), pp. 368–371.
KDD-2010-AbeMPRJTBACKDG #learning #optimisation- Optimizing debt collections using constrained reinforcement learning (NA, PM, CP, CKR, DLJ, VPT, JJB, GFA, BRC, MK, MD, TG), pp. 75–84.
KDD-2010-ChuaL #generative #modelling #network #online #rating #trust- Trust network inference for online rating data using generative models (FCTC, EPL), pp. 889–898.
KDD-2010-LiuMTLL #learning #metric #optimisation- Semi-supervised sparse metric learning using alternating linearization optimization (WL, SM, DT, JL, PL), pp. 1139–1148.
KDD-2010-MaxwellBR #graph #memory management #mining- Diagnosing memory leaks using graph mining on heap dumps (EKM, GB, NR), pp. 115–124.
KDD-2010-PrestonBKSF #clustering #constraints- Redefining class definitions using constraint-based clustering: an application to remote sensing of the earth’s surface (DP, CEB, RK, DSM, MAF), pp. 823–832.
KDD-2010-RothBDFHLLMM #graph #social- Suggesting friends using the implicit social graph (MR, ABD, DD, GF, IH, AL, NL, YM, RM), pp. 233–242.
KDD-2010-SatoN #modelling #process #topic- Topic models with power-law using Pitman-Yor process (IS, HN), pp. 673–682.
KDD-2010-YangO #feature model #predict #probability- Feature selection for support vector regression using probabilistic prediction (JBY, CJO), pp. 343–352.
KDD-2010-YeLCJ #automation #categorisation #clustering- Automatic malware categorization using cluster ensemble (YY, TL, YC, QJ), pp. 95–104.
KDD-2010-ZhengSTLLCH #data mining #mining #network- Using data mining techniques to address critical information exchange needs in disaster affected public-private networks (LZ, CS, LT, TL, SL, SCC, VH), pp. 125–134.
KDIR-2010-BallesterosBG #dependence #parsing- Text Simplification using Dependency Parsing for Spanish (MB, SB, PG), pp. 330–335.
KDIR-2010-BallesterosHFG #dependence #parsing- Giving Shape to an N-version Dependency Parser — Improving Dependency Parsing Accuracy for Spanish using Maltparser (MB, JH, VF, PG), pp. 336–341.
KDIR-2010-Bernard #formal method #modelling #reuse- Characterisation, Formalisation and Reuse of Knowledge — Models, Methods and Application Cases (AB), p. 13.
KDIR-2010-CamposMO #random #recognition- Recognition of Gene/Protein Names using Conditional Random Fields (DC, SM, JLO), pp. 275–280.
KDIR-2010-Ghosh #locality #mining #modelling #multi #predict #scalability- Actionable Mining of Large, Multi-relational Data using Localized Predictive Models (JG), pp. 9–10.
KDIR-2010-HelouA #metric #multi #semantics- Semantic Measures based on Wordnet using Multiple Information Sources (MAH, AA), pp. 500–503.
KDIR-2010-JedrzejczakW #generative #query- Integrated Candidate Generation in Processing Batches of Frequent Itemset Queries using Apriori (PJ, MW), pp. 487–490.
KDIR-2010-KrainesGHMT #generative- Generating Literature-based Knowledge Discoveries in Life Sciences using Relationship Associations (SBK, WG, DH, HM, TT), pp. 35–44.
KDIR-2010-MollerEDS #automation #ontology #recognition- Automatic Spatial Plausibility Checks for Medical Object Recognition Results using a Spatio-anatomical Ontology (MM, PE, AD, DS), pp. 5–13.
KDIR-2010-Studer #lightweight #modelling #process #semantics #web- Process-oriented Semantic Web Search — Using Lightweight Semantic Models for Supporting the Search Process (RS), p. 7.
KDIR-2010-TsengPF #classification #markov- The Typhoon Track Classification using Tri-plots and Markov Chain (JCHT, HKKP, CF), pp. 364–369.
KDIR-2010-ZhangUC #information management- A Comprehensive Solution to Procedural Knowledge Acquisition using Information Extraction (ZZ, VSU, FC), pp. 432–437.
KEOD-2010-CasasCC #fibonacci #modelling #representation #specification #towards- Towards a Representation of Enviromental Models using Specification and Description Language — From the Fibonacci Model to a Wildfire Model (PFiC, MC, JC), pp. 343–346.
KEOD-2010-ChatterjeeB #documentation #network #random #summary- Single Document Text Summarization using Random Indexing and Neural Networks (NC, AB), pp. 171–176.
KEOD-2010-ChatterjeeKRD #automation #classification #email #ontology- Automatic Email Classification using user Preference Ontology (NC, SK, SR, VD), pp. 165–170.
KEOD-2010-EynardMM #analysis #on the #ontology- On the Use of Correspondence Analysis to Learn Seed Ontologies from Text (DE, FM, MM), pp. 430–437.
KEOD-2010-KamelR #ontology #parallel- Ontology Building using Parallel Enumerative Structures (MK, BR), pp. 276–281.
KEOD-2010-NairM #multi #network- Informledge System — A Modified Knowledge Network with Autonomous Nodes using Multi-lateral Links (TRGN, MM), pp. 351–354.
KEOD-2010-TiwariAMK #mobile #web #web service- Dynamic Discovery of Web Services using Mobile Agents (GT, RA, SM, DSK), pp. 497–500.
KEOD-2010-ValienteRV #modelling #owl #semantics- Defining the Semantics of It Service Management Models using OWL and SWRL (MCV, DR, CVC), pp. 378–381.
KEOD-2010-YunSNYKK #framework #platform #semantics #web #workflow- Improving the Workflow of Semantic Web Portals using M/R in Cloud Platform (SY, MS, HN, SKY, HK, HGK), pp. 485–488.
KEOD-2010-ZakraouiZ #interactive #programming #set #web- Integrating Context Knowledge in user Interaction using Answer Set Programming for Enhancing Web Accessibility (JZ, WLZ), pp. 459–466.
KMIS-2010-BornerL #enterprise- Using Role-plays to Acquire Process-oriented Knowledge in Enterprises (RB, ML), pp. 149–156.
KMIS-2010-BrockV #analysis #data flow #semantics- A Method for Interoperability between Structured Data Sources using Semantic Analysis (DLB, JV), pp. 234–239.
KMIS-2010-Caballero-GilCM #analysis #clustering #information management #simulation- Knowledge Management using Clusters in VANETs — Description, Simulation and Analysis (CCG, PCG, JMG), pp. 170–175.
KMIS-2010-KrainesG #ontology #reuse #semantics- Supporting Reuse of Knowledge of Failures through Ontology-based Semantic Search (SBK, WG), pp. 164–169.
KMIS-2010-SrivastavaS #composition #game studies #validation- The Validation of a Dynamic Service Composition Model using a Simple Game (AS, PGS), pp. 260–266.
RecSys-2010-HannonBS #collaboration #recommendation #twitter- Recommending twitter users to follow using content and collaborative filtering approaches (JH, MB, BS), pp. 199–206.
RecSys-2010-LeeB #collaboration #process #recommendation #self- Using self-defined group activities for improvingrecommendations in collaborative tagging systems (DHL, PB), pp. 221–224.
RecSys-2010-VasukiNLD #network #recommendation- Affiliation recommendation using auxiliary networks (VV, NN, ZL, ISD), pp. 103–110.
SEKE-2010-ArrudaCD #detection #framework- A Framework for Detecting Code Piracy Using Class Structure (PA, PC, DD), pp. 559–564.
SEKE-2010-FagundesS #estimation #fault- Software Defect Estimation using Support Vector Regression (RAdAF, RMCRdS), pp. 265–268.
SEKE-2010-JuniorLAMW #impact analysis #learning #multi- Impact Analysis Model for Brasília Area Control Center using Multi-agent System with Reinforcement Learning (ACdAJ, AFL, CRFdA, ACMAdM, LW), pp. 499–502.
SEKE-2010-KhoshgoftaarG #machine learning #metric #novel #re-engineering- Software Engineering with Computational Intelligence and Machine Learning A Novel Software Metric Selection Technique Using the Area Under ROC Curves (TMK, KG), pp. 203–208.
SEKE-2010-KhounSiavashB #metric #ontology #semantics- Using the whole structure of ontology for semantic relatedness measurement (EK, ABD), pp. 79–83.
SEKE-2010-MarcaciniR #clustering #incremental #topic- Incremental Construction of Topic Hierarchies using Hierarchical Term Clustering (RMM, SOR), p. 553.
SEKE-2010-MoshirpourMF #behaviour #detection #distributed #specification- Detecting Emergent Behavior in Distributed Systems Using Scenario-Based Specifications (MM, AM, BHF), pp. 349–354.
SEKE-2010-PaikariRR #case study #comparative #fault #predict #reasoning- A Comparative Study of Attribute Weighting Techniques for Software Defect Prediction Using Case-based Reasoning (EP, MMR, GR), pp. 380–386.
SEKE-2010-Radlinski #development #predict #quality- Software Development Effort and Quality Prediction Using Bayesian Nets and small Local Qualitative Data (LR), pp. 113–116.
SEKE-2010-RodriguesVZ #automation #modelling #product line #testing- PLeTs-Test Automation using Software Product Lines and Model Based Testing (EdMR, LDV, AFZ), pp. 483–488.
SEKE-2010-ShewchukG #experience #functional #maintenance #testing #user interface- Experience with Maintenance of a Functional GUI Test Suite using IBM Rational Functional Tester (YS, VG), pp. 489–494.
SEKE-2010-VilaMF #adaptation #analysis #qvt #strict- Using QVT for adapting question analysis to restricted domain QA systems (KV, JNM, AF), pp. 335–338.
SEKE-2010-Wang #black box #parametricity #testing- Reducing Black-box Test Suite Using Input Parameter Relationships (LW), pp. 180–185.
SEKE-2010-XuanJRYL #automation #classification #debugging- Automatic Bug Triage using Semi-Supervised Text Classification (JX, HJ, ZR, JY, ZL), pp. 209–214.
SIGIR-2010-ChandarC - Diversification of search results using webgraphs (PC, BC), pp. 869–870.
SIGIR-2010-ClementsSVR #behaviour #predict- Using flickr geotags to predict user travel behaviour (MC, PS, APdV, MJTR), pp. 851–852.
SIGIR-2010-DuZYCC #query #recognition- Using search session context for named entity recognition in query (JD, ZZ, JY, YC, ZC), pp. 765–766.
SIGIR-2010-GaoCWZ #learning #rank- Learning to rank only using training data from related domain (WG, PC, KFW, AZ), pp. 162–169.
SIGIR-2010-GoharianM #classification #query- Context aware query classification using dynamic query window and relationship net (NG, SSRM), pp. 723–724.
SIGIR-2010-KimC #documentation #multi #ranking- Ranking using multiple document types in desktop search (JK, WBC), pp. 50–57.
SIGIR-2010-LeeLSR #precise #retrieval #sentiment- High precision opinion retrieval using sentiment-relevance flows (SWL, JTL, YIS, HCR), pp. 817–818.
SIGIR-2010-LopesR #health #information retrieval #precise- Using local precision to compare search engines in consumer health information retrieval (CTL, CR), pp. 835–836.
SIGIR-2010-MeijR #modelling #query #wiki- Supervised query modeling using wikipedia (EM, MdR), pp. 875–876.
SIGIR-2010-MerhavMBYF #recognition #relational- Incorporating global information into named entity recognition systems using relational context (YM, FdSM, DB, WGY, OF), pp. 883–884.
SIGIR-2010-MojdehC #consistency #learning- Semi-supervised spam filtering using aggressive consistency learning (MM, GVC), pp. 751–752.
SIGIR-2010-RothK #modelling #retrieval- Cross-language retrieval using link-based language models (BR, DK), pp. 773–774.
SIGIR-2010-ShtokKC #modelling #predict #statistics- Using statistical decision theory and relevance models for query-performance prediction (AS, OK, DC), pp. 259–266.
SIGIR-2010-WhiteC - Exploring the use of labels to shortcut search trails (RWW, RC), pp. 811–812.
SIGIR-2010-WooLLSR #ranking #retrieval- Achieving high accuracy retrieval using intra-document term ranking (HWW, JTL, SWL, YIS, HCR), pp. 885–886.
SIGIR-2010-YiLWR #video- Contextual video advertising system using scene information inferred from video scripts (BJY, JTL, HWW, HCR), pp. 771–772.
SIGIR-2010-YinHZL #approach #modelling #wiki- A survival modeling approach to biomedical search result diversification using wikipedia (XY, XH, XZ, ZL), pp. 901–902.
SIGIR-2010-ZhangWL #interactive #multi #named #summary #visualisation- VisualSum: an interactive multi-document summarization system using visualization (YZ, DW, TL), pp. 857–858.
ECMFA-2010-JohannesF #abstraction #composition #framework #modelling #network #reuse- Adding Abstraction and Reuse to a Network Modelling Tool Using the Reuseware Composition Framework (JJ, MAF), pp. 132–143.
ECMFA-2010-KessentiniBSB #diagrams #heuristic #petri net #sequence chart- Example-Based Sequence Diagrams to Colored Petri Nets Transformation Using Heuristic Search (MK, AB, HAS, MB), pp. 156–172.
MoDELS-v1-2010-KolovosRAPPB #emf #model transformation- Taming EMF and GMF Using Model Transformation (DSK, LMR, SbA, RFP, FACP, GB), pp. 211–225.
MoDELS-v1-2010-NoyritGTS #consistency #modelling #multi #uml- Consistent Modeling Using Multiple UML Profiles (FN, SG, FT, BS), pp. 392–406.
MoDELS-v2-2010-GerthKLE #detection #precise #process- Precise Detection of Conflicting Change Operations Using Process Model Terms (CG, JMK, ML, GE), pp. 93–107.
MoDELS-v2-2010-LanoR #model transformation #modelling #slicing #uml- Slicing of UML Models Using Model Transformations (KL, SKR), pp. 228–242.
MoDELS-v2-2010-LoniewskiIA #development #modelling #overview #requirements- A Systematic Review of the Use of Requirements Engineering Techniques in Model-Driven Development (GL, EI, SA), pp. 213–227.
SPLC-2010-Elizondo #composition #development- Using Composition Connectors to Support Software Asset Development (PVE), pp. 496–497.
SPLC-2010-GadelhaCGCFL #approach #component #product line- An Approach for Developing Component-Based Groupware Product Lines Using the Groupware Workbench (BG, EC, MAG, AC, HF, CJPdL), pp. 446–450.
SPLC-2010-GhanamM #execution #feature model #modelling #testing- Linking Feature Models to Code Artifacts Using Executable Acceptance Tests (YG, FM), pp. 211–225.
SPLC-2010-HartmannKMRTY #component #integration- Using MDA for Integration of Heterogeneous Components in Software Supply Chains (HH, MK, AAJM, JR, TT, TYH), pp. 361–376.
ECOOP-2010-DhooliaMSS #debugging- Debugging Model-Transformation Failures Using Dynamic Tainting (PD, SM, VSS, SS), pp. 26–51.
ECOOP-2010-GilL #java #source code- The Use of Overloading in Java Programs (JYG, KL), pp. 529–551.
ECOOP-2010-ZaeemK #alloy #contract #data type- Contract-Based Data Structure Repair Using Alloy (RNZ, SK), pp. 577–598.
OOPSLA-2010-Kell #adaptation #assembly #component #interface- Component adaptation and assembly using interface relations (SK), pp. 322–340.
OOPSLA-2010-LernerVG #aspect-oriented #javascript- Supporting dynamic, third-party code customizations in JavaScript using aspects (BSL, HV, DG), pp. 361–376.
AdaEurope-2010-AnderssonP #ada #algorithm #implementation #manycore #realtime #scheduling- Implementing Multicore Real-Time Scheduling Algorithms Based on Task Splitting Using Ada 2012 (BA, LMP), pp. 54–67.
AdaEurope-2010-PastorASA #approach #modelling #realtime #sequence #towards- Towards the Definition of a Pattern Sequence for Real-Time Applications Using a Model-Driven Engineering Approach (JAP, DA, PS, BÁ), pp. 167–180.
AdaEurope-2010-White #ada #hardware #scheduling- Using Hardware Support for Scheduling with Ada (RW), pp. 125–138.
LOPSTR-2010-VoetsS #analysis #logic programming #source code- Non-termination Analysis of Logic Programs Using Types (DV, DDS), pp. 133–148.
PADL-2010-DieterleHL #composition- Skeleton Composition Using Remote Data (MD, TH, RL), pp. 73–87.
PEPM-2010-Henglein #algebra #equivalence #lazy evaluation #optimisation #relational- Optimizing relational algebra operations using generic equivalence discriminators and lazy products (FH), pp. 73–82.
PEPM-2010-HofmannK #detection #morphism #problem #towards- I/O guided detection of list catamorphisms: towards problem specific use of program templates in IP (MH, EK), pp. 93–100.
PLDI-2010-BaekC #approximate #energy #framework #named #programming- Green: a framework for supporting energy-conscious programming using controlled approximation (WB, TMC), pp. 198–209.
PLDI-2010-WestbrookRIYAT #java #multi #named #programming- Mint: Java multi-stage programming using weak separability (EMW, MR, JI, YY, TA, WT), pp. 400–411.
POPL-2010-DiasR #automation #declarative #generative- Automatically generating instruction selectors using declarative machine descriptions (JD, NR), pp. 403–416.
PPDP-2010-BrabrandT #ambiguity #pattern matching #regular expression #string- Typed and unambiguous pattern matching on strings using regular expressions (CB, JGT), pp. 243–254.
QAPL-2010-AltisenLM #automaton #calculus #component #evaluation #interface #performance #realtime- Performance Evaluation of Components Using a Granularity-based Interface Between Real-Time Calculus and Timed Automata (KA, YL, MM), pp. 16–33.
SAS-2010-BrauerK #abstraction #automation- Automatic Abstraction for Intervals Using Boolean Formulae (JB, AK), pp. 167–183.
SAS-2010-Lesens #question #static analysis #why- Using Static Analysis in Space: Why Doing so? (DL), pp. 51–70.
SIGAda-2010-BradleyPZ #ada #development #realtime- Real-time system development in ada using LEGO® mindstorms® NXT (PJB, JAdlP, JZ), pp. 37–40.
SIGAda-2010-JemliR #compilation #problem #static analysis- A methodology for avoiding known compiler problems using static analysis (MJ, JPR), pp. 23–30.
SIGAda-2010-Pettit #ada #concurrent #design #embedded #realtime #uml- Designing real-time, concurrent, and embedded software systems using UML and Ada (RGPI), pp. 7–8.
SIGAda-2010-Rosen #object-oriented #reliability- Use of object oriented technologies in high reliability system (JPR), pp. 3–4.
RE-2010-BittnerRGW #multi #requirements- Manufacturer-Supplier Requirements Synchronization Using Exchange Containers and Multi-Level Systems (MB, MOR, HG, MW), pp. 325–330.
RE-2010-ClementsB #architecture- Using Business Goals to Inform a Software Architecture (PCC, LB), pp. 69–78.
RE-2010-LockerbieBMBE #analysis #concept #modelling #simulation- Using i* Modelling as a Bridge between Air Traffic Management Operational Concepts and Agent-based Simulation Analysis (JL, DB, NAMM, HAPB, MHCE), pp. 351–356.
RE-2010-SalinesiMDD #constraints #integer #requirements #reuse #theorem proving- Using Integer Constraint Solving in Reuse Based Requirements Engineering (CS, RM, DD, OD), pp. 243–251.
RE-2010-SawahMR #elicitation #modelling #overview #perspective #requirements- Using Cognitive Mapping to Elicit Modelling Requirements: An Overview (SES, AM, MR), pp. 357–363.
RE-2010-SeyffGG #information management- Using Contextual Information to Guide on-site Analysts (NS, FG, PG), pp. 397–398.
RE-2010-SeyffGM #mobile #tool support- Using Mobile RE Tools to Give End-Users Their Own Voice (NS, FG, NAMM), pp. 37–46.
RE-2010-Stanbridge #analysis #test coverage #testing #user interface- Retrospective Requirement Analysis Using Code Coverage of GUI Driven System Tests (CS), pp. 411–412.
RE-2010-WnukCR #reduction #requirements #towards- Guiding Requirements Scoping Using ROI: Towards Agility, Openness and Waste Reduction (KW, DC, BR), pp. 409–410.
REFSQ-2010-ProynovaPWW #perspective #requirements #research- Use of Personal Values in Requirements Engineering — A Research Preview (RP, BP, AW, TW), pp. 17–22.
ASE-2010-KimYS #debugging #memory management #model checking #named- JRF-E: using model checking to give advice on eliminating memory model-related bugs (KK, TYK, BAS), pp. 215–224.
ASE-2010-NgocO #fault- Checking roundoff errors using counterexample-guided narrowing (DTBN, MO), pp. 301–304.
ASE-2010-RatanotayanonCS #feature model #transitive- Using transitive changesets to support feature location (SR, HJC, SES), pp. 341–344.
ASE-2010-ShangAH #case study #experience #mining #pipes and filters #repository #scalability #tool support- An experience report on scaling tools for mining software repositories using MapReduce (WS, BA, AEH), pp. 275–284.
ASE-2010-TrezentosLO #dependence #named #optimisation #problem #pseudo- Apt-pbo: solving the software dependency problem using pseudo-boolean optimization (PT, IL, ALO), pp. 427–436.
FSE-2010-ErnstA #type system- Building and using pluggable type systems (MDE, MA), pp. 375–376.
FSE-2010-HalleB #analysis #interactive #message passing- Realizability analysis for message-based interactions using shared-state projections (SH, TB), pp. 27–36.
FSE-2010-KanadeARR #dependence #representation #testing- Representation dependence testing using program inversion (AK, RA, SKR, GR), pp. 277–286.
FSE-2010-MyersS #dynamic analysis #ide #user interface- Using dynamic analysis to create trace-focused user interfaces for IDEs (DM, MADS), pp. 367–368.
FSE-2010-Shokry #behaviour #synthesis #towards- Towards behavior elaboration and synthesis using modes (HS), pp. 349–352.
ICSE-2010-AdamsJH #identification- Identifying crosscutting concerns using historical code changes (BA, ZMJ, AEH), pp. 305–314.
ICSE-2010-FritzM #developer- Using information fragments to answer the questions developers ask (TF, GCM), pp. 175–184.
ICSE-2010-GorschekTA #concept #empirical #object-oriented #scalability- A large-scale empirical study of practitioners’ use of object-oriented concepts (TG, EDT, LA), pp. 115–124.
ICSE-2010-JilaniMLGM #invariant- Using invariant functions and invariant relations to compute loop functions (LLJ, OM, AL, WG, AM), pp. 317–318.
ICSE-2010-KrkaBPGM #behaviour #execution #invariant #model inference- Using dynamic execution traces and program invariants to enhance behavioral model inference (IK, YB, DP, JG, NM), pp. 179–182.
ICSE-2010-LewisW #fault #monitoring #runtime- Runtime repair of software faults using event-driven monitoring (CL, JW), pp. 275–280.
ICSE-2010-LimQF #named #network #scalability #social- StakeNet: using social networks to analyse the stakeholders of large-scale software projects (SLL, DQ, AF), pp. 295–304.
ICSE-2010-Marinho #consistency #modelling #ocl #product line- A proposal for consistency checking in dynamic software product line models using OCL (FGM), pp. 333–334.
ICSE-2010-NitaN #adaptation #api #source code- Using twinning to adapt programs to alternative APIs (MN, DN), pp. 205–214.
ICSE-2010-ReisnerSMFP #behaviour #configuration management #evaluation #symbolic computation- Using symbolic evaluation to understand behavior in configurable software systems (ER, CS, KKM, JSF, AP), pp. 445–454.
ICSE-2010-SallehMGB #empirical #programming- An empirical study of the effects of conscientiousness in pair programming using the five-factor personality model (NS, EM, JCG, GSJB), pp. 577–586.
ICSE-2010-SharpdD #re-engineering #research- Using ethnographic methods in software engineering research (HS, CRBdS, YD), pp. 491–492.
ICSE-2010-TreudeS #developer- Awareness 2.0: staying aware of projects, developers and tasks using dashboards and feeds (CT, MADS), pp. 365–374.
SAC-2010-AlmeidaYA10a #principle- Filtering spams using the minimum description length principle (TAA, AY, JA), pp. 1854–1858.
SAC-2010-BechikhSG #mobile #multi #optimisation- Searching for knee regions in multi-objective optimization using mobile reference points (SB, LBS, KG), pp. 1118–1125.
SAC-2010-BettiniDS #implementation #product line- Implementing software product lines using traits (LB, FD, IS), pp. 2096–2102.
SAC-2010-BicegoLOP #array #classification #modelling #topic- Expression microarray classification using topic models (MB, PL, BO, AP), pp. 1516–1520.
SAC-2010-BrogleBB #multi #quality- Quality of service for multicasting using NICE (MB, SB, TB), pp. 670–677.
SAC-2010-BucchiaroneGFT #experience #natural language #requirements #scalability #set- An experience in using a tool for evaluating a large set of natural language requirements (AB, SG, AF, GT), pp. 281–286.
SAC-2010-ChokshiB #analysis #calculus #performance #realtime #revisited- Performance analysis of FlexRay-based systems using real-time calculus, revisited (DBC, PB), pp. 351–356.
SAC-2010-DrumondG #concept #logic #markov #ontology- Extracting ontology concept hierarchies from text using Markov logic (LD, RG), pp. 1354–1358.
SAC-2010-FunfzigTA #constraints #parametricity- Haptic manipulation of rational parametric planar cubics using shape constraints (CF, PT, GA), pp. 1253–1257.
SAC-2010-FuPTW - Mitigating denial of capability attacks using sink tree based quota allocation (ZF, MP, PT, WW), pp. 713–718.
SAC-2010-GabrielSN #clustering #matrix #similarity- Eigenvector-based clustering using aggregated similarity matrices (HHG, MS, AN), pp. 1083–1087.
SAC-2010-GiuntaPT #aspect-oriented #design pattern- Using aspects and annotations to separate application code from design patterns (RG, GP, ET), pp. 2183–2189.
SAC-2010-GoncalvesCCGS #modelling #towards- Towards the modeling reactive and proactive agents by using MAS-ML (EJTG, MIC, GALdC, GFG, VTdS), pp. 936–937.
SAC-2010-GongWWLZY - Recognizing affect from non-stylized body motion using shape of Gaussian descriptors (LG, TW, CW, FL, FZ, XY), pp. 1203–1206.
SAC-2010-GuermaziHH #analysis #classification #image #web- Classification of violent web images using context based analysis (RG, MH, ABH), pp. 1768–1773.
SAC-2010-GuoQL #configuration management #energy #network #optimisation- A general energy optimization model for wireless networks using configurable antennas (SG, ZQ, SL), pp. 246–250.
SAC-2010-HassanB #distributed #file system- Semi-join computation on distributed file systems using map-reduce-merge model (MAHH, MB), pp. 406–413.
SAC-2010-HautakorpiM #algorithm #network- Load balancing for structured P2P networks using the advanced finger selection algorithm (AFSA) (JH, JM), pp. 655–662.
SAC-2010-HeinzlS #validation #xml- Using XML schema to improve writing, validation, and structure of WS-policies (SH, BS), pp. 2422–2429.
SAC-2010-HoqueRA #named #protocol #scalability- S-search: finding RFID tags using scalable and secure search protocol (MEH, FR, SIA), pp. 439–443.
SAC-2010-JiKYC #3d #how #interactive- How to manage interactive dialogues of avatar agents by using 3D spatial information of virtual world (SHJ, JWK, TY, HGC), pp. 1181–1187.
SAC-2010-KimKMY #multi #network #predict #probability- Probabilistic context prediction using time-inferred multiple pattern networks (YHK, WK, KM, YY), pp. 1015–1019.
SAC-2010-Kuzume - Input device for disabled persons using expiration and tooth-touch sound signals (KK), pp. 1159–1164.
SAC-2010-LanLSH #algorithm #classification #image- An improved K-view algorithm for image texture classification using new characteristic views selection methods (YL, HL, ES, CCH), pp. 959–963.
SAC-2010-LeeJL #detection #graph- Detecting metamorphic malwares using code graphs (JL, KJ, HL), pp. 1970–1977.
SAC-2010-LeeKWAHP #3d #finite #random- Tracking random finite objects using 3D-LIDAR in marine environments (KWL, BK, WSW, MA, FSH, NMP), pp. 1282–1287.
SAC-2010-MacielNJIS #interactive- Reality cues-based interaction using whole-body awareness (AM, LPN, VAMJ, JMTI, LFMSS), pp. 1224–1228.
SAC-2010-MalkowskiJHPKP #analysis #benchmark #database #empirical #metric #scalability- Empirical analysis of database server scalability using an N-tier benchmark with read-intensive workload (SM, DJ, MH, JP, YK, CP), pp. 1680–1687.
SAC-2010-MaranzatoPLN #detection- Fraud detection in reputation systems in e-markets using logistic regression (RM, AMP, APdL, MN), pp. 1454–1455.
SAC-2010-McDonaldTKG #component #reduction- Using logic-based reduction for adversarial component recovery (JTM, EDT, YCK, MRG), pp. 1993–2000.
SAC-2010-MenorBBGP #classification #markov #taxonomy- Virus DNA-fragment classification using taxonomic hidden Markov model profiles (MM, KB, MB, YG, GP), pp. 1567–1571.
SAC-2010-MiaoOWS #distributed #network- Coverage-hole trap model in target tracking using distributed relay-robot network (HM, CCO, XW, CS), pp. 1299–1304.
SAC-2010-MigotinaRF #automation #detection #fuzzy #parametricity- Automatic K-complex detection using Hjorth parameters and fuzzy decision (DM, ACR, ALNF), pp. 979–980.
SAC-2010-MillerRPW #identification- Personal identification using periocular skin texture (PEM, AWR, SJP, DLW), pp. 1496–1500.
SAC-2010-MissenBC #detection- Using passage-based language model for opinion detection in blogs (MMSM, MB, GC), pp. 1821–1822.
SAC-2010-MustaphaZAG #composition #ontology #semantics- Enhancing semantic search using case-based modular ontology (NBM, HBZ, MAA, HHBG), pp. 1438–1439.
SAC-2010-NinagawaE #modelling #network #predict #probability- Link prediction using probabilistic group models of network structure (AN, KE), pp. 1115–1116.
SAC-2010-ParizekY #component #interactive #traversal- Extraction of component-environment interaction model using state space traversal (PP, NY), pp. 2203–2210.
SAC-2010-Perez-CastilloGP #on the #process- On the use of patterns to recover business processes (RPC, IGRdG, MP), pp. 165–166.
SAC-2010-PirkolaT #approach #crawling #problem- Addressing the limited scope problem of focused crawling using a result merging approach (AP, TT), pp. 1735–1740.
SAC-2010-PortugalR #algorithm #clustering #graph #multi- MSP algorithm: multi-robot patrolling based on territory allocation using balanced graph partitioning (DP, RPR), pp. 1271–1276.
SAC-2010-RiponGHT #approach #layout #multi #problem- Multi-objective evolutionary approach for solving facility layout problem using local search (KSNR, KG, MH, JT), pp. 1155–1156.
SAC-2010-Roder #interactive #requirements #usability- Using interaction requirements to operationalize usability (HR), pp. 318–319.
SAC-2010-RoyPL #component #detection #documentation #image- Seal object detection in document images using GHT of local component shapes (PPR, UP, JL), pp. 23–27.
SAC-2010-RyuCC #image #layout #named- PHOTOLAND: a new image layout system using spatio-temporal information in digital photos (DSR, WKC, HGC), pp. 1884–1891.
SAC-2010-ShahinLK #architecture #design #visualisation- Rationale visualization of software architectural design decision using compendium (MS, PL, MRK), pp. 2367–2368.
SAC-2010-ShinKNNTO #named #ontology #recommendation- ONTOMO: web-based ontology building system: ---instance recommendation using bootstrapping--- (IS, TK, HN, KN, YT, AO), pp. 1442–1443.
SAC-2010-SmithH #documentation #image #retrieval- Document retrieval using image features (DS, RH), pp. 47–51.
SAC-2010-StoffelSKK #analysis #documentation #visual notation- Enhancing document structure analysis using visual analytics (AS, DS, HK, DAK), pp. 8–12.
SAC-2010-VermolenHL #consistency #modelling #proving- Proving consistency of VDM models using HOL (SV, JH, PGL), pp. 2503–2510.
SAC-2010-WeeL - Client-side load balancer using cloud (SW, HL), pp. 399–405.
SAC-2010-Youssef #metric #parallel #performance- Using surface effect measures to model parallel performance (BBY), pp. 2400–2401.
LDTA-J-2007-AkessonEH #attribute grammar #compilation #implementation #jastadd- Implementation of a Modelica compiler using JastAdd attribute grammars (JÅ, TE, GH), pp. 21–38.
LDTA-J-2007-CamachoMBV #automation #generative #tool support #verification- Automated generation of program translation and verification tools using annotated grammars (DOC, KM, MvdB, JJV), pp. 3–20.
LDTA-2010-Freudenthal #domain-specific language #enterprise- Using DSLs for developing enterprise systems (MF), p. 11.
SLE-2010-HostO #canonical #identification #implementation #java #semantics- Canonical Method Names for Java — Using Implementation Semantics to Identify Synonymous Verbs (EWH, BMØ), pp. 226–245.
SLE-2010-JohnstoneS10a #generative- Translator Generation Using ART (AJ, ES), pp. 306–315.
ASPLOS-2010-KirmanM #power management- A power-efficient all-optical on-chip interconnect using wavelength-based oblivious routing (NK, JFM), pp. 15–28.
ASPLOS-2010-RamanKMJA #concurrent #parallel #thread #transaction- Speculative parallelization using software multi-threaded transactions (AR, HK, TRM, TBJ, DIA), pp. 65–76.
ASPLOS-2010-WooL #gpu #named #programmable- COMPASS: a programmable data prefetcher using idle GPU shaders (DHW, HHSL), pp. 297–310.
CASE-2010-AnandFLM #distributed #implementation #network- A practical implementation of distributed system control over an asynchronous Ethernet network using time stamped data (DMA, JGF, YSLB, JRM), pp. 515–520.
CASE-2010-AngererPA #configuration management #mobile #named- MobComm: Using BDI-agents for the reconfiguration of mobile commissioning robots (SA, RP, RA), pp. 822–827.
CASE-2010-CabasinoGS #fault #petri net- Diagnosis using labeled Petri nets: Faults may either be silent or undistinguishable events (MPC, AG, CS), pp. 485–490.
CASE-2010-DhupatiKRR #analysis #detection #novel #speech #validation- A novel drowsiness detection scheme based on speech analysis with validation using simultaneous EEG recordings (LSD, SK, AR, AR), pp. 917–921.
CASE-2010-FrohlichS #automation #constraints #matrix #modelling #problem #scheduling- Relation matrices for automated MILP modeling of scheduling problems using temporal constraints (RF, SCS), pp. 69–74.
CASE-2010-GujarathiM #generative #integration- Generative CAD and CAE integration using common data model (GPG, YM), pp. 586–591.
CASE-2010-HuSF #analysis #biology- Dynamics analysis and closed-loop control of biological cells in transportation using robotic manipulation system with optical tweezers (SH, DS, GF), pp. 240–245.
CASE-2010-IshiiONTOTM #analysis #image- Cardiac motion analysis of a rat model for myocardial infarction using high-frame-rate stereo images (II, TO, YN, TT, KO, AT, HM), pp. 780–785.
CASE-2010-JohnsonM #optimisation- Local planning using switching time optimization (ERJ, TDM), pp. 828–834.
CASE-2010-Kanamori #design- Anti-windup controller design using gravity compensation for Euler-Lagrange systems with actuator saturation (MK), pp. 798–803.
CASE-2010-KwokHFRW #approach #image- Color image contrast enhancement using a local equalization and weighted sum approach (NMK, QPH, GF, ABR, DW), pp. 568–573.
CASE-2010-LeBSK #modelling #realtime #towards- Towards virtual instruments for cardiovascular healthcare: Real-time modeling of cardiovascular dynamics using ECG signals (TQL, STSB, AS, RK), pp. 903–910.
CASE-2010-MaruyamaKHTA - Nanomanipulation of single virus using Dielectrophoretic concentration on a microfluidic chip (HM, KK, AH, TT, FA), pp. 710–715.
CASE-2010-MikosFBF #design #development #distributed #ontology #reuse- Development of a system for distributed sharing and reuse of design and manufacturing knowledge in the PFMEA domain using a description logics-based ontology (WLM, JCEF, PEAB, LSF), pp. 598–603.
CASE-2010-PaullGLM #adaptation- An information gain based adaptive path planning method for an autonomous underwater vehicle using sidescan sonar (LP, SSG, HL, VM), pp. 835–840.
CASE-2010-RososhanskyXL #automation- Coverage based tool path planning for automated polishing using contact stress theory (MR, FX, YL), pp. 592–597.
CASE-2010-SunCL #algorithm #scheduling- Scheduling of steel-making and continuous casting system using the surrogate subgradient algorithm for lagrangian relaxation (LS, TC, PBL), pp. 885–890.
CC-2010-CraikK #object-oriented #parallel #source code- Using Ownership to Reason about Inherent Parallelism in Object-Oriented Programs (AC, WK), pp. 145–164.
CGO-2010-GottschlichVS #memory management #performance #transaction- An efficient software transactional memory using commit-time invalidation (JEG, MV, JGS), pp. 101–110.
DAC-2010-Ababei #design #modelling #network #optimisation- Network on chip design and optimization using specialized influence models (CA), pp. 625–626.
DAC-2010-CallegariDWA #classification #learning- Classification rule learning using subgroup discovery of cross-domain attributes responsible for design-silicon mismatch (NC, DGD, LCW, MSA), pp. 374–379.
DAC-2010-ChoRXP #network- History-based VLSI legalization using network flow (MC, HR, HX, RP), pp. 286–291.
DAC-2010-ConstantinidesA #debugging #testing- Using introspective software-based testing for post-silicon debug and repair (KC, TMA), pp. 537–542.
DAC-2010-DadgourHSB #analysis #design #energy #logic- Design and analysis of compact ultra energy-efficient logic gates using laterally-actuated double-electrode NEMS (HFD, MMH, CS, KB), pp. 893–896.
DAC-2010-DhimanMR #modelling #online #predict- A system for online power prediction in virtualized environments using Gaussian mixture models (GD, KM, TR), pp. 807–812.
DAC-2010-LiangM #reuse- Instruction cache locking using temporal reuse profile (YL, TM), pp. 344–349.
DAC-2010-ParkBWM #debugging #graph #locality #named- BLoG: post-silicon bug localization in processors using bug localization graphs (SBP, AB, HW, SM), pp. 368–373.
DAC-2010-PigorschS #preprocessor #satisfiability- An AIG-Based QBF-solver using SAT for preprocessing (FP, CS), pp. 170–175.
DAC-2010-Potkonjak #synthesis #tool support- Synthesis of trustable ICs using untrusted CAD tools (MP), pp. 633–634.
DAC-2010-WangM #approximate #named #realtime #scalability- PreDVS: preemptive dynamic voltage scaling for real-time systems using approximation scheme (WW, PM), pp. 705–710.
DATE-2010-AndalamRG #multi #predict #thread- Deterministic, predictable and light-weight multithreading using PRET-C (SA, PSR, AG), pp. 1653–1656.
DATE-2010-ArtiagaC #metadata- Using filesystem virtualization to avoid metadata bottlenecks (EA, TC), pp. 562–567.
DATE-2010-Aue #internet #mobile #power management- Low power mobile internet devices using LTE technology (VA), p. 794.
DATE-2010-BarrioMMHM #functional #synthesis- Using Speculative Functional Units in high level synthesis (AADB, MCM, JMM, RH, SOM), pp. 1779–1784.
DATE-2010-BolteSBNB - Non-intrusive virtualization management using libvirt (MB, MS, GB, ON, AB), pp. 574–579.
DATE-2010-ChenABF #monitoring- Non-invasive blood oxygen saturation monitoring for neonates using reflectance pulse oximeter (WC, IA, SBO, LMGF), pp. 1530–1535.
DATE-2010-ChengDMMRWRA #parametricity- Capturing intrinsic parameter fluctuations using the PSP compact model (BC, DD, NM, CM, GR, XW, SR, AA), pp. 650–653.
DATE-2010-ChenLJC #distributed #manycore #memory management- Supporting Distributed Shared Memory on multi-core Network-on-Chips using a dual microcoded controller (XC, ZL, AJ, SC), pp. 39–44.
DATE-2010-DadgourB #architecture #design #detection #novel #pipes and filters- Aging-resilient design of pipelined architectures using novel detection and correction circuits (HFD, KB), pp. 244–249.
DATE-2010-DammMHG #modelling #network #simulation #transaction- Using Transaction Level Modeling techniques for wireless sensor network simulation (MD, JM, JH, CG), pp. 1047–1052.
DATE-2010-DietrichEH #analysis #statistics- Digital statistical analysis using VHDL (MD, UE, JH), pp. 1007–1010.
DATE-2010-El-MoselhyD #order #reduction #statistics- Variation-aware interconnect extraction using statistical moment preserving model order reduction (TAEM, LD), pp. 453–458.
DATE-2010-GaoH #geometry #optimisation #programming- A power optimization method for CMOS Op-Amps using sub-space based geometric programming (WG, RH), pp. 508–513.
DATE-2010-GiraldoMJM #hardware- A HMMER hardware accelerator using divergences (JFEG, NM, RPJ, ACMAdM), pp. 405–410.
DATE-2010-HatamiP #analysis #component #library #performance #representation #robust- Efficient representation, stratification, and compression of variational CSM library waveforms using Robust Principle Component Analysis (SH, MP), pp. 1285–1290.
DATE-2010-KanoriaMM #analysis #markov #monte carlo #statistics- Statistical static timing analysis using Markov chain Monte Carlo (YK, SM, AM), pp. 813–818.
DATE-2010-KarnerASW #network #runtime #simulation- Holistic simulation of FlexRay networks by using run-time model switching (MK, EA, CS, RW), pp. 544–549.
DATE-2010-KlemmF #c++ #embedded #metaprogramming- Bitstream processing for embedded systems using C++ metaprogramming (RK, GF), pp. 909–913.
DATE-2010-LarsenLNP #analysis #realtime #synthesis- Scenario-based analysis and synthesis of real-time systems using uppaal (KGL, SL, BN, SP), pp. 447–452.
DATE-2010-MishraJ #optimisation #power management #synthesis- Low-power FinFET circuit synthesis using surface orientation optimization (PM, NKJ), pp. 311–314.
DATE-2010-PomeranzR #requirements #sequence #testing- Reducing the storage requirements of a test sequence by using a background vector (IP, SMR), pp. 1237–1242.
DATE-2010-ShafiqueMH #adaptation #complexity #reduction #video- An HVS-based Adaptive Computational Complexity Reduction Scheme for H.264/AVC video encoder using Prognostic Early Mode Exclusion (MS, BM, JH), pp. 1713–1718.
DATE-2010-SoekenWKGD #modelling #ocl #satisfiability #uml #verification- Verifying UML/OCL models using Boolean satisfiability (MS, RW, MK, MG, RD), pp. 1341–1344.
DATE-2010-TajalliL #design #framework #power management- Ultra-low power mixed-signal design platform using subthreshold source-coupled circuits (AT, YL), pp. 711–716.
DATE-2010-VadlamaniZBT #adaptation #composition #fault #manycore- Multicore soft error rate stabilization using adaptive dual modular redundancy (RV, JZ, WPB, RT), pp. 27–32.
DATE-2010-VasudevanSPTTJ #automation #data mining #generative #mining #named #static analysis- GoldMine: Automatic assertion generation using data mining and static analysis (SV, DS, SJP, DT, WT, DRJ), pp. 626–629.
DATE-2010-ZengC #metric- Interconnect delay and slew metrics using the beta distribution (JKZ, CPC), pp. 1329–1332.
DATE-2010-ZhangLL #approach #markov #modelling #simulation #verification- An abstraction-guided simulation approach using Markov models for microprocessor verification (TZ, TL, XL), pp. 484–489.
HPCA-2010-BiswasRMACJPPS #metric- Explaining cache SER anomaly using DUE AVF measurement (AB, CR, SSM, VA, LC, AJ, AEP, MP, NS), pp. 1–12.
HPCA-2010-KaseridisSCJ #resource management #scalability- A bandwidth-aware memory-subsystem resource management using non-invasive resource profilers for large CMP systems (DK, JS, JC, LKJ), pp. 1–11.
HPCA-2010-TangBHC #architecture #cpu #performance- DMA cache: Using on-chip storage to architecturally separate I/O data from CPU data for improving I/O performance (DT, YB, WH, MC), pp. 1–12.
HPDC-2010-BatiniGM #architecture #enterprise- Optimal enterprise data architecture using publish and subscribe (CB, SG, AM), pp. 541–547.
HPDC-2010-BhagawatyJPABK #design #implementation #simulation- Design, implementation and use of a simulation data archive for coastal science (HB, LJ, SP, GA, NB, TK), pp. 651–657.
HPDC-2010-BuiYT #abstraction #distributed #named #python #workflow- Weaver: integrating distributed computing abstractions into scientific workflows using Python (PB, LY, DT), pp. 636–643.
HPDC-2010-ChenCHCH #adaptation- Improving host swapping using adaptive prefetching and paging notifier (WZC, HC, WH, XC, DH), pp. 300–303.
HPDC-2010-CoutinhoOOBLDM #parallel #workflow- Data parallelism in bioinformatics workflows using Hydra (FC, ESO, DdO, VPB, AABL, AMRD, MM), pp. 507–515.
HPDC-2010-DonassoloCLV #performance #scalability #simulation #volunteer- Fast and scalable simulation of volunteer computing systems using SimGrid (BD, HC, AL, PV), pp. 605–612.
HPDC-2010-HenschelMS #distributed #workflow- A distributed workflow for an astrophysical OpenMP application: using the data capacitor over WAN to enhance productivity (RH, SM, SCS), pp. 644–650.
HPDC-2010-JabriM - Authorization within grid-computing using certificateless identity-based proxy signature (MAJ, SM), pp. 292–295.
HPDC-2010-KimHMAJ #distributed #energy #scalability- Exploring the RNA folding energy landscape using scalable distributed cyberinfrastructure (JK, WH, SM, FAE, SJ), pp. 477–488.
HPDC-2010-LiewAHH #data type #distributed #graph #optimisation #parallel #streaming #towards- Towards optimising distributed data streaming graphs using parallel streams (CSL, MPA, JIvH, LH), pp. 725–736.
HPDC-2010-LimPF #named #performance- SoftPower: fine-grain power estimations using performance counters (MYL, AP, RJF), pp. 308–311.
HPDC-2010-StoutFMG #clustering #network #scalability- Scaling virtual organization clusters over a wide area network using the Kestrel workload management system (LS, MF, MAM, SG), pp. 692–698.
HPDC-2010-StuartCMO #multi #pipes and filters- Multi-GPU volume rendering using MapReduce (JAS, CKC, KLM, JDO), pp. 841–848.
ISMM-2010-TianFG #parallel #predict- Speculative parallelization using state separation and multiple value prediction (CT, MF, RG), pp. 63–72.
OSDI-2010-AnanthanarayananKGSLSH #clustering- Reining in the Outliers in Map-Reduce Clusters using Mantri (GA, SK, AGG, IS, YL, BS, EH), pp. 265–278.
OSDI-2010-FeldmanZFF #collaboration #named- SPORC: Group Collaboration using Untrusted Cloud Resources (AJF, WPZ, MJF, EWF), pp. 337–350.
OSDI-2010-KimWZK - Intrusion Recovery Using Selective Re-execution (TK, XW, NZ, MFK), pp. 89–104.
OSDI-2010-PengD #distributed #incremental #scalability #transaction- Large-scale Incremental Processing Using Distributed Transactions and Notifications (DP, FD), pp. 251–264.
PDP-2010-BittencourtSM #algorithm #graph #lookahead #scheduling- DAG Scheduling Using a Lookahead Variant of the Heterogeneous Earliest Finish Time Algorithm (LFB, RS, ERMM), pp. 27–34.
PDP-2010-EbrahimiDLPT #architecture #interface #network- A High-Performance Network Interface Architecture for NoCs Using Reorder Buffer Sharing (ME, MD, PL, JP, HT), pp. 546–550.
PDP-2010-FloresAA #energy #hardware- Energy-Efficient Hardware Prefetching for CMPs Using Heterogeneous Interconnects (AF, JLA, MEA), pp. 147–154.
PDP-2010-LeoAGZ #analysis #clustering #data transformation #throughput- Using Virtual Clusters to Decouple Computation and Data Management in High Throughput Analysis Applications (SL, PA, MG, GZ), pp. 411–415.
PDP-2010-MarosiKFL - Sandboxing for Desktop Grids Using Virtualization (CAM, PK, GF, OL), pp. 559–566.
PDP-2010-MartinezCPRP #modelling #performance- Performance Modeling of MPI Applications Using Model Selection Techniques (DRM, JCC, TFP, FFR, VBP), pp. 95–102.
PDP-2010-MinhW #parallel #predict- Using Historical Data to Predict Application Runtimes on Backfilling Parallel Systems (TNM, LW), pp. 246–252.
PPoPP-2010-CastaldoW #parallel #scalability- Scaling LAPACK panel operations using parallel cache assignment (AMC, RCW), pp. 223–232.
PPoPP-2010-LupeiSPMBKA #game studies #memory management #parallel #scalability #towards #transaction- Towards scalable and transparent parallelization of multiplayer games using transactional memory support (DL, BS, DP, MM, MB, WK, CA), pp. 325–326.
PPoPP-2010-SandesM #comparison #gpu #named #sequence- CUDAlign: using GPU to accelerate the comparison of megabase genomic sequences (EFdOS, ACMAdM), pp. 137–146.
PPoPP-2010-UpadhyayaMP #data type #generative #performance- Using data structure knowledge for efficient lock generation and strong atomicity (GU, SPM, VSP), pp. 281–292.
PPoPP-2010-ZhaiCZ #named #parallel #performance #predict #scalability- PHANTOM: predicting performance of parallel applications on large-scale parallel machines using a single node (JZ, WC, WZ), pp. 305–314.
FASE-2010-DarvasM #consistency #proving- Proving Consistency and Completeness of Model Classes Using Theory Interpretation (ÁD, PM), pp. 218–232.
TACAS-2010-ParizekK #component #detection #fault #java #performance #random- Efficient Detection of Errors in Java Components Using Random Environment and Restarts (PP, TK), pp. 451–465.
CAV-2010-TorreMP #concurrent #interface #linear #model checking #source code- Model-Checking Parameterized Concurrent Programs Using Linear Interfaces (SLT, PM, GP), pp. 629–644.
ICLP-2010-ShakarianSS10 #network #optimisation #problem #social #source code- Using Generalized Annotated Programs to Solve Social Network Optimization Problems (PS, VSS, MLS), pp. 182–191.
ICST-2010-DebroyW #automation #source code- Using Mutation to Automatically Suggest Fixes for Faulty Programs (VD, WEW), pp. 65–74.
ICST-2010-HuangCM #algorithm #search-based #testing #user interface- Repairing GUI Test Suites Using a Genetic Algorithm (SH, MBC, AMM), pp. 245–254.
ICST-2010-Laurent #concept #formal method #process #testing #validation #verification- Using Formal Methods and Testability Concepts in the Avionics Systems Validation and Verification (V&V) Process (OL), pp. 1–10.
ICTSS-2010-AartsJU #abstraction #communication #generative #infinity #modelling #protocol- Generating Models of Infinite-State Communication Protocols Using Regular Inference with Abstraction (FA, BJ, JU), pp. 188–204.
ICTSS-2010-ArcuriIB #black box #embedded #random #realtime #search-based #testing- Black-Box System Testing of Real-Time Embedded Systems Using Random and Search-Based Testing (AA, MZZI, LCB), pp. 95–110.
ICTSS-2010-LamanchaU #generative #product line #testing- Testing Product Generation in Software Product Lines Using Pairwise for Features Coverage (BPL, MPU), pp. 111–125.
ISSTA-2010-DanielGM #execution #on the #symbolic computation- On test repair using symbolic execution (BD, TG, DM), pp. 207–218.
ISSTA-2010-WeeratungeZSJ #concurrent #debugging #slicing- Analyzing concurrency bugs using dual slicing (DW, XZ, WNS, SJ), pp. 253–264.
SAT-2010-Ehlers #automaton #satisfiability- Minimising Deterministic Büchi Automata Precisely Using SAT Solving (RE), pp. 326–332.
SAT-2010-FuhsS #linear #satisfiability #source code- Synthesizing Shortest Linear Straight-Line Programs over GF(2) Using SAT (CF, PSK), pp. 71–84.
TAP-2010-BueDKB #abstraction #behaviour- Building a Test-Ready Abstraction of a Behavioral Model Using CLP (PCB, FD, ADK, FB), pp. 167–182.
TAP-2010-ClaessenSH #named #specification #testing- QuickSpec: Guessing Formal Specifications Using Testing (KC, NS, JH), pp. 6–21.
TAP-2010-GladischTBY #generative #testing #verification- Generating Regression Unit Tests Using a Combination of Verification and Capture & Replay (CG, SST, BB, AY), pp. 61–76.
VMCAI-2010-BuZL #automaton #hybrid #programming #reachability #verification- Path-Oriented Reachability Verification of a Class of Nonlinear Hybrid Automata Using Convex Programming (LB, JZ, XL), pp. 78–94.
CBSE-2009-Bickford #component #specification- Component Specification Using Event Classes (MB), pp. 140–155.
QoSA-2009-KrogmannSBKMM #architecture #feedback #performance #predict #visualisation- Improved Feedback for Architectural Performance Prediction Using Software Cartography Visualizations (KK, CMS, SB, MK, AM, FM), pp. 52–69.
WICSA-ECSA-2009-AboudAFHTUV #architecture #automation #classification #component #concept- Automated architectural component classification using concept lattices (NAA, GA, JRF, MH, CT, CU, SV), pp. 21–30.
WICSA-ECSA-2009-Babar #agile #architecture #case study #challenge #development- An exploratory study of architectural practices and challenges in using agile software development approaches (MAB), pp. 81–90.
WICSA-ECSA-2009-BucchiaronePVR #modelling #self #verification- Self-Repairing systems modeling and verification using AGG (AB, PP, CV, OR), pp. 181–190.
WICSA-ECSA-2009-EmeryH #architecture #framework- Every architecture description needs a framework: Expressing architecture frameworks using ISO/IEC 42010 (DEE, RH), pp. 31–40.
WICSA-ECSA-2009-HenttonenM #architecture #open source #reuse #tool support- Open source based tools for sharing and reuse of software architectural knowledge (KH, MM), pp. 41–50.
WICSA-ECSA-2009-LiuLXSZ #architecture #enterprise #integration- Using architecture integration patterns to compose enterprise mashups (YL, XL, LX, MS, LZ), pp. 111–120.
WICSA-ECSA-2009-NordCEH #architecture #documentation #set- Reviewing architecture documents using question sets (RLN, PCC, DEE, RH), pp. 325–328.
WICSA-ECSA-2009-RooSA #adaptation #architecture #embedded #multi #optimisation- An architectural style for optimizing system qualities in adaptive embedded systems using Multi-Objective Optimization (AdR, HS, MA), pp. 349–352.
DocEng-2009-DiazAK #product line- Using DITA for documenting software product lines (OD, FIA, JK), pp. 231–240.
DocEng-2009-Hassan09a #documentation #graph #interactive #named- GraphWrap: a system for interactive wrapping of pdf documents using graph matching techniques (TH), pp. 247–248.
DocEng-2009-JoshiL #analysis #documentation #image #natural language #web- Web document text and images extraction using DOM analysis and natural language processing (PMJ, SL), pp. 218–221.
DRR-2009-HalimaA #concept #recognition #segmentation- Simultaneous segmentation and recognition of Arabic printed text using linguistic concepts of vocabulary (MBH, AMA), pp. 1–10.
DRR-2009-LiD #difference #independence #verification- Improving semi-text-independent method of writer verification using difference vector (XL, XD), pp. 1–10.
DRR-2009-NakaiKI #documentation #image- Camera-based document image mosaicing using LLAH (TN, KK, MI), pp. 1–10.
DRR-2009-NonnemakerB #classification- Using synthetic data safely in classification (JN, HSB), pp. 1–10.
DRR-2009-TaghvaC #analysis #bound #documentation- Document boundary determination using structural and lexical analysis (KT, MAC), pp. 1–10.
DRR-2009-TanVK #clustering #identification #online- Online writer identification using alphabetic information clustering (GXT, CVG, ACK), pp. 1–10.
ECDL-2009-DammKFC #concept #library #multimodal #music #query- A Concept for Using Combined Multimodal Queries in Digital Music Libraries (DD, FK, CF, MC), pp. 261–272.
ECDL-2009-MachadoPFMM #component #user interface- User Interface for a Geo-Temporal Search Service Using DIGMAP Components (JM, GP, NF, BM, HM), pp. 483–486.
ECDL-2009-OlsenS #distributed #library- Gaining Access to Decentralised Library Resources Using Location-Aware Services (BSO, ITS), pp. 388–391.
ECDL-2009-TonniesB #evaluation #library #quality #roadmap #semantics- Using Semantic Technologies in Digital Libraries — A Roadmap to Quality Evaluation (ST, WTB), pp. 168–179.
HT-2009-AmitayCHOSYG #approach #social- Social search and discovery using a unified approach (EA, DC, NH, SOK, AS, SY, NG), pp. 199–208.
HT-2009-HargoodMW - Using a thematic model to enrich photo montages (CH, DEM, MJW), pp. 135–140.
HT-2009-Martinez-RomoA #approach #information management #web- Retrieving broken web links using an approach based on contextual information (JMR, LA), pp. 351–352.
ICDAR-2009-Abd-AlmageedKD #documentation #linear- Page Rule-Line Removal Using Linear Subspaces in Monochromatic Handwritten Arabic Documents (WAA, JK, DSD), pp. 768–772.
ICDAR-2009-AbdulkaderC #fault #learning #low cost #multi- Low Cost Correction of OCR Errors Using Learning in a Multi-Engine Environment (AA, MRC), pp. 576–580.
ICDAR-2009-AhmadVK #markov #recognition #word- Lexicon-Based Word Recognition Using Support Vector Machine and Hidden Markov Model (ARA, CVG, MK), pp. 161–165.
ICDAR-2009-BarratT #image #modelling #network- Modeling, Classifying and Annotating Weakly Annotated Images Using Bayesian Network (SB, ST), pp. 1201–1205.
ICDAR-2009-BledaBGZLMPV #online #recognition- Improving a DTW-Based Recognition Engine for On-line Handwritten Characters by Using MLPs (MJCB, SEB, JGM, FZM, DLP, AMV, FPV, JMVT), pp. 1260–1264.
ICDAR-2009-BodicLAHLK #detection #graph #integer #linear #programming- Symbol Detection Using Region Adjacency Graphs and Integer Linear Programming (PLB, HL, SA, PH, YL, AK), pp. 1320–1324.
ICDAR-2009-BoussellaaBZAA #algorithm #documentation #image- Enhanced Text Extraction from Arabic Degraded Document Images Using EM Algorithm (WB, AB, AZ, HEA, AMA), pp. 743–747.
ICDAR-2009-BukhariSB09a #independence #segmentation- Script-Independent Handwritten Textlines Segmentation Using Active Contours (SSB, FS, TMB), pp. 446–450.
ICDAR-2009-CaoPSN #adaptation #clustering- Unsupervised HMM Adaptation Using Page Style Clustering (HC, RP, SS, PN), pp. 1091–1095.
ICDAR-2009-DiemS #recognition- Recognition of Degraded Handwritten Characters Using Local Features (MD, RS), pp. 221–225.
ICDAR-2009-ElbaatiBKEAA #recognition- Arabic Handwriting Recognition Using Restored Stroke Chronology (AE, HB, MK, AE, HEA, AMA), pp. 411–415.
ICDAR-2009-FornesLSB #identification #music #on the- On the Use of Textural Features for Writer Identification in Old Handwritten Music Scores (AF, JL, GS, HB), pp. 996–1000.
ICDAR-2009-GalballyFMO #evaluation #verification- Evaluation of Brute-force Attack to Dynamic Signature Verification Using Synthetic Samples (JG, JF, MMD, JOG), pp. 131–135.
ICDAR-2009-GarainP #identification #multi- Off-Line Multi-Script Writer Identification Using AR Coefficients (UG, TP), pp. 991–995.
ICDAR-2009-HamdaniAKA #multi #online #recognition- Combining Multiple HMMs Using On-line and Off-line Features for Off-line Arabic Handwriting Recognition (MH, HEA, MK, AMA), pp. 201–205.
ICDAR-2009-HanifP #algorithm #detection #image #locality- Text Detection and Localization in Complex Scene Images using Constrained AdaBoost Algorithm (SMH, LP), pp. 1–5.
ICDAR-2009-Hassan #documentation #graph- User-Guided Wrapping of PDF Documents Using Graph Matching Techniques (TH), pp. 631–635.
ICDAR-2009-HeH09a #classification #estimation #online- Affine Distortion Compensation for an Isolated Online Handwritten Chinese Character Using Combined Orientation Estimation and HMM-Based Minimax Classification (TH, QH), pp. 1226–1230.
ICDAR-2009-HoangTP #diagrams #image- Extraction of Nom Text Regions from Stele Images Using Area Voronoi Diagram (TVH, ST, NYP), pp. 921–925.
ICDAR-2009-HuangDJG #adaptation #analysis #incremental #linear #online #recognition- Writer Adaptive Online Handwriting Recognition Using Incremental Linear Discriminant Analysis (ZH, KD, LJ, XG), pp. 91–95.
ICDAR-2009-IbrahimKKAG #analysis #dependence #online #verification- On-Line Signature Verification: Directional Analysis of a Signature Using Weighted Relative Angle Partitions for Exploitation of Inter-Feature Dependencies (MTI, MJK, MAK, KSA, LG), pp. 41–45.
ICDAR-2009-ImpedovoFM #recognition #word- HMM Based Handwritten Word Recognition System by Using Singularities (SI, AF, RM), pp. 783–787.
ICDAR-2009-KimLK #mobile- Scene Text Extraction Using Focus of Mobile Camera (EK, SL, JHK), pp. 166–170.
ICDAR-2009-LandreMR #classification #difference #image- Ornamental Letters Image Classification Using Local Dissimilarity Maps (JL, FMN, SR), pp. 186–190.
ICDAR-2009-LeloreB #documentation #image #markov- Document Image Binarisation Using Markov Field Model (TL, FB), pp. 551–555.
ICDAR-2009-LuqmanBR #classification #graph #network #recognition- Graphic Symbol Recognition Using Graph Based Signature and Bayesian Network Classifier (MML, TB, JYR), pp. 1325–1329.
ICDAR-2009-MansjurWJ #automation #categorisation #classification #kernel #learning #topic- Using Kernel Density Classifier with Topic Model and Cost Sensitive Learning for Automatic Text Categorization (DSM, TSW, BHJ), pp. 1086–1090.
ICDAR-2009-MarinaiMS #clustering #order- Mathematical Symbol Indexing Using Topologically Ordered Clusters of Shape Contexts (SM, BM, GS), pp. 1041–1045.
ICDAR-2009-MiyaoM #adaptation #online #recognition- Writer Adaptation for Online Handwriting Recognition System Using Virtual Examples (HM, MM), pp. 1156–1160.
ICDAR-2009-MoghaddamRC #approach #classification #independence #multi #segmentation #set- Restoration and Segmentation of Highly Degraded Characters Using a Shape-Independent Level Set Approach and Multi-level Classifiers (RFM, DRH, MC), pp. 828–832.
ICDAR-2009-MontreuilGHN #2d #documentation #layout #random- Unconstrained Handwritten Document Layout Extraction Using 2D Conditional Random Fields (FM, EG, LH, SN), pp. 853–857.
ICDAR-2009-MuramatsuYM #authentication #online- Biometric Person Authentication Method Using Camera-Based Online Signature Acquisition (DM, KY, TM), pp. 46–50.
ICDAR-2009-NakaiKI #documentation #image #realtime #retrieval #web- Real-Time Retrieval for Images of Documents in Various Languages Using a Web Camera (TN, KK, MI), pp. 146–150.
ICDAR-2009-PalWK #case study #classification #comparative #recognition- Comparative Study of Devnagari Handwritten Character Recognition Using Different Feature and Classifiers (UP, TW, FK), pp. 1111–1115.
ICDAR-2009-PanBS #recognition- Isolated Handwritten Farsi Numerals Recognition Using Sparse and Over-Complete Representations (WP, TDB, CYS), pp. 586–590.
ICDAR-2009-PavelecOJNB #identification #modelling- Author Identification Using Compression Models (DP, LSO, EJRJ, FDNN, LVB), pp. 936–940.
ICDAR-2009-RomeroTV #feedback #image- Using Mouse Feedback in Computer Assisted Transcription of Handwritten Text Images (VR, AHT, EV), pp. 96–100.
ICDAR-2009-RoyPLD #multi #programming #segmentation- Multi-Oriented and Multi-Sized Touching Character Segmentation Using Dynamic Programming (PPR, UP, JL, MD), pp. 11–15.
ICDAR-2009-SaldarriagaMV #documentation #online #recognition- Using top n Recognition Candidates to Categorize On-line Handwritten Documents (SPS, EM, CVG), pp. 881–885.
ICDAR-2009-SundaramR #online #recognition- An Improved Online Tamil Character Recognition Engine Using Post-Processing Methods (SS, AGR), pp. 1216–1220.
ICDAR-2009-WakaharaU #2d #composition- Hierarchical Decomposition of Handwriting Deformation Vector Field Using 2D Warping and Global/Local Affine Transformation (TW, SU), pp. 1141–1145.
ICDAR-2009-WangBA #automation #documentation- Document Content Extraction Using Automatically Discovered Features (SYW, HSB, CA), pp. 1076–1080.
ICDAR-2009-WangH #classification #design #fault #modelling #parametricity #precise- Design Compact Recognizers of Handwritten Chinese Characters Using Precision Constrained Gaussian Models, Minimum Classification Error Training and Parameter Compression (YW, QH), pp. 36–40.
ICDAR-2009-YiPX #integration #multi #recognition #video- Using Multiple Frame Integration for the Text Recognition of Video (JY, YP, JX), pp. 71–75.
ICDAR-2009-ZhouLN #online #random #recognition #string- Online Handwritten Japanese Character String Recognition Using Conditional Random Fields (XDZ, CLL, MN), pp. 521–525.
JCDL-2009-Barker #education #library #online- Science teachers’ use of online resources and the digital library for Earth system education (LJB), pp. 1–10.
JCDL-2009-GaleasKF #analysis #assessment #documentation #fourier- Document relevance assessment via term distribution analysis using fourier series expansion (PG, RK, BF), pp. 277–284.
JCDL-2009-HaqN #encryption- Using timed-release cryptography to mitigate the preservation risk of embargo periods (RH, MLN), pp. 183–192.
JCDL-2009-MurataTMK #ranking- Query-page intention matching using clicked titles and snippets to boost search rankings (MM, HT, YM, RK), pp. 105–114.
JCDL-2009-PereiraRZLGF #ambiguity #web- Using web information for author name disambiguation (DAP, BARN, NZ, AHFL, MAG, AAF), pp. 49–58.
JCDL-2009-TreeratpitukG #random- Disambiguating authors in academic publications using random forests (PT, CLG), pp. 39–48.
SIGMOD-2009-ChaudhuriNS #profiling #static analysis- Bridging the application and DBMS divide using static analysis and dynamic profiling (SC, VRN, MS), pp. 1039–1042.
SIGMOD-2009-ChenOG #performance- Fast and dynamic OLAP exploration using UDFs (ZC, CO, CGA), pp. 1087–1090.
SIGMOD-2009-Chi #social #web- Augmented social cognition: using social web technology to enhance the ability of groups to remember, think, and reason (EHC), pp. 973–984.
SIGMOD-2009-IsardY #distributed #programming language- Distributed data-parallel computing using a high-level programming language (MI, YY), pp. 987–994.
SIGMOD-2009-PaparizosNSA #data flow #query #web- Answering web queries using structured data sources (SP, AN, JCS, RA), pp. 1127–1130.
SIGMOD-2009-Plattner #approach #database #in memory- A common database approach for OLTP and OLAP using an in-memory column database (HP), pp. 1–2.
SIGMOD-2009-ZhangMC #clustering #scalability- Scalable skyline computation using object-based space partitioning (SZ, NM, DWC), pp. 483–494.
VLDB-2009-CanimBMLR - An Object Placement Advisor for DB2 Using Solid State Storage (MC, BB, GAM, CAL, KAR), pp. 1318–1329.
VLDB-2009-CautisDOV #performance #query #set #specification #xpath- Efficient Rewriting of XPath Queries Using Query Set Specifications (BC, AD, NO, VV), pp. 301–312.
VLDB-2009-JohnsonPA #inheritance #scalability- Improving OLTP Scalability using Speculative Lock Inheritance (RJ, IP, AA), pp. 479–489.
VLDB-2009-LeglerLSK #distributed #mining #robust- Robust Distributed Top-N Frequent Pattern Mining Using the SAP BW Accelerator (TL, WL, JS, JK), pp. 1438–1449.
VLDB-2009-LiuJ - Using Trees to Depict a Forest (BL, HVJ), pp. 133–144.
VLDB-2009-NandiB #named #taxonomy- HAMSTER: Using Search Clicklogs for Schema and Taxonomy Matching (AN, PAB), pp. 181–192.
VLDB-2009-PereiraRSTWH #question #web- Answering Web Questions Using Structured Data — Dream or Reality? (FP, AR, SS, WTP, GW, AYH), p. 1646.
VLDB-2009-Rajaraman #named #topic #web- Kosmix: High-Performance Topic Exploration using the Deep Web (AR), pp. 1524–1529.
VLDB-2009-WangSCMKZPY #data transformation #named #semantics #web- SMDM: Enhancing Enterprise-Wide Master Data Management Using Semantic Web Technologies (XW, XS, FC, LM, NK, KZ, YP, YY), pp. 1594–1597.
VLDB-2009-WillhalmPBPZS #in memory #named #performance- SIMD-Scan: Ultra Fast in-Memory Table Scan using on-Chip Vector Processing Units (TW, NP, YB, HP, AZ, JS), pp. 385–394.
CSEET-2009-Al-Yahya #re-engineering #wiki- Using Wikis to Support Teamwork Skills in Software Engineering Courses (MMAY), pp. 142–149.
CSEET-2009-GB #education #ontology #re-engineering- Using Ontologies to Aid the Teaching of Software Engineering (SPG, AB), pp. 224–231.
CSEET-2009-KoolmanojwongB #case study #education #experience #research- Using Software Project Courses to Integrate Education and Research: An Experience Report (SK, BWB), pp. 26–33.
CSEET-2009-McMeekinKCC #taxonomy- Evaluating Software Inspection Cognition Levels Using Bloom’s Taxonomy (DAM, BRvK, EC, DJAC), pp. 232–239.
CSEET-2009-Padua #quality- Using Quality Audits to Assess Software Course Projects (WP), pp. 162–165.
CSEET-2009-TaranMSS #authoring #case study #framework #industrial #multi #platform #scalability- Using Rich Multimedia Case Studies: Developing a Scalable Authoring Platform for Academia and Industry (GT, RM, RS, AS), pp. 61–68.
CSEET-2009-WuWSK #development #education #evaluation #framework #game studies- An Evaluation of Using a Game Development Framework in Higher Education (BW, AIW, JES, TBK), pp. 41–44.
EDM-2009-AbbasS #learning- an Argument Learning Environment Using Agent-Based ITS (ALES) (SA, HS), pp. 200–209.
EDM-2009-AgapitoO #detection #performance- Detecting Symptoms of Low Performance Using Production Rules (JBA, AO), pp. 31–40.
EDM-2009-FengBH #composition #education #learning- Using Learning Decomposition and Bootstrapping with Randomization to Compare the Impact of Different Educational Interventions on Learning (MF, JB, NTH), pp. 51–60.
EDM-2009-PavlikCK #analysis #automation #domain model #learning #modelling- Learning Factors Transfer Analysis: Using Learning Curve Analysis to Automatically Generate Domain Models (PIPJ, HC, KRK), pp. 121–130.
EDM-2009-RaiGB #parametricity- Using Dirichlet priors to improve model parameter plausibility (DR, YG, JB), pp. 141–150.
EDM-2009-SacinASO #data mining #education #mining #recommendation- Recommendation in Higher Education Using Data Mining Techniques (CVS, JBA, LS, AO), pp. 191–199.
ITiCSE-2009-AhoniemiK - Analyzing the use of a rubric-based grading tool (TA, VK), pp. 333–337.
ITiCSE-2009-Al-BowAEFFLLM #education #game studies #programming #student- Using game creation for teaching computer programming to high school students and teachers (MAB, DA, JE, RF, JF, CL, STL, SM), pp. 104–108.
ITiCSE-2009-AltinBEKOSSSMPR09a #experience #learning #student #tool support #user interface- Use of intuitive tools to enhance student learning and user experience (RA, MB, NE, CK, ÖCÖ, MS, HS, DS, CCM, CP, CRR), p. 365.
ITiCSE-2009-BlasGMB #analysis #automation #composition- Automatic E-learning contents composition by using gap analysis techniques (JMdB, JMG, LdM, RB), p. 369.
ITiCSE-2009-BrabrandD #taxonomy- Analyzing CS competencies using the SOLO taxonomy (CB, BD), p. 1.
ITiCSE-2009-Dooley - Peer assessments using the moodle workshop tool (JFD), p. 344.
ITiCSE-2009-Draganova #learning #mobile- Use of mobile phone technologies in learning (CD), p. 399.
ITiCSE-2009-EnglishR #assessment #automation #case study #source code #student- Evaluating students’ programs using automated assessment: a case study (JE, TR), p. 371.
ITiCSE-2009-Garcia-MateosA #algorithm #data type #online- A course on algorithms and data structures using on-line judging (GGM, JLFA), pp. 45–49.
ITiCSE-2009-Gomez-MartinJA #design pattern #education #game studies #product line- Teaching design patterns using a family of games (MAGM, GJD, JA), pp. 268–272.
ITiCSE-2009-Kultur - Keeping the pace in CS-1 through the use of CMS (CK), p. 398.
ITiCSE-2009-MaFRRW #modelling #visualisation- Improving the mental models held by novice programmers using cognitive conflict and jeliot visualisations (LM, JDF, MR, IR, MW), pp. 166–170.
ITiCSE-2009-MoffatT #algorithm #education- The use of MUVE technology in teaching AI algorithms (DCM, KT), p. 396.
ITiCSE-2009-PatersonHC #approach #education #modelling #object-oriented #programming- Using coding patterns in a model-driven approach to teaching object oriented programming (JHP, JH, KFC), p. 358.
ITiCSE-2009-Rubio-SanchezV #recursion- Tail recursion by using function generalization (MRS, JÁVI), p. 394.
ITiCSE-2009-SoriaP #architecture #aspect-oriented #development #education #open source- Teaching software architectures and aspect-oriented software development using open-source projects (CCS, JP), p. 385.
ITiCSE-2009-Steenkiste - The use of a controlled wireless testbed in courses (PS), pp. 80–84.
ITiCSE-2009-Townsend #student- Using a groupware system in CS1 to engage introverted students (GCT), pp. 16–20.
ITiCSE-2009-VillalobosCJ #interactive #learning #programming- Developing programming skills by using interactive learning objects (JV, NAC, CJ), pp. 151–155.
SIGITE-2009-Connolly #design #education #guidelines #web- No longer partying like it’s 1999: designing a modern web stream using the it2008 curriculum guidelines (RWC), pp. 74–79.
SIGITE-2009-Cross #protocol- Using a protocol analyzer to introduce communications protocols (GWC), pp. 178–181.
SIGITE-2009-HansenBGRM #novel #open source- A novel IP telephony course using open-source software (RAH, VMB, RG, DR, LM), pp. 43–49.
SIGITE-2009-OhMP #education #encryption #internet #protocol #simulation- Teaching high-assurance internet protocol encryption (haipe) using opnet modeler simulation tool (THO, SM, YP), pp. 161–165.
SIGITE-2009-PakC #assessment #markov #modelling #risk management- Asset priority risk assessment using hidden markov models (CP, JC), pp. 65–73.
SIGITE-2009-Stanley #architecture #education #hardware #logic #network #operating system #simulation- Using digital logic simulation as a teaching aid in discrete mathematics, hardware and operating systems, networking, computer organization and computer architecture: a workshop outline (TDS), pp. 1–2.
ICPC-J-2008-HindleGH09 #complexity #rank- Reading beside the lines: Using indentation to rank revisions by complexity (AH, MWG, RCH), pp. 414–429.
CSMR-2009-BurenR #analysis #architecture #maintenance- Architectural Maintenance Using a Data Warehouse System for Availability Analysis (GB, CR), pp. 307–308.
CSMR-2009-Chikofsky #architecture #process- Using the ACART Process for Architecture Compliance (EJC), pp. 313–314.
CSMR-2009-FrankeJLUHEK #assessment #metric #network- A Method for Choosing Software Assessment Measures Using Bayesian Networks and Diagnosis (UF, PJ, RL, JU, DH, ME, JK), pp. 241–246.
CSMR-2009-Gimnich #design- Using Existing Software Assets in SOA Design (RG), pp. 309–310.
CSMR-2009-KpodjedoRGA #algorithm #evolution #question- Recovering the Evolution Stable Part Using an ECGM Algorithm: Is There a Tunnel in Mozilla? (SK, FR, PG, GA), pp. 179–188.
CSMR-2009-PatelHR #clustering #dependence #dynamic analysis- Software Clustering Using Dynamic Analysis and Static Dependencies (CP, AHL, JR), pp. 27–36.
CSMR-2009-Rombach #design #maintenance #product line- Design for Maintenance — Use of Engineering Principles and Product Line Technology (HDR), pp. 1–2.
CSMR-2009-SoriaPC #architecture #fault #locality #modelling #tool support- Tool Support for Fault Localization Using Architectural Models (AS, JADP, MRC), pp. 59–68.
CSMR-2009-SoriaPC09a #architecture #aspect-oriented #configuration management- Handling the Dynamic Reconfiguration of Software Architectures Using Aspects (CCS, JP, JÁC), pp. 263–266.
ICPC-2009-GueheneucKM #comprehension- Working session: Using eye-tracking to understand program comprehension (YGG, HHK, JIM), pp. 278–279.
ICPC-2009-MurphyVS #behaviour #process #programming- Using activity traces to characterize programming behaviour beyond the lab (GCM, PV, DCS), pp. 90–94.
ICPC-2009-StefikG #debugging #empirical- Using spoken text to aid debugging: An empirical study (AS, EG), pp. 110–119.
ICSM-2009-AlamAH #dependence- Measuring the progress of projects using the time dependence of code changes (OA, BA, AEH), pp. 329–338.
ICSM-2009-BettenburgSH #empirical #off the shelf #risk management- An empirical study on the risks of using off-the-shelf techniques for processing mailing list data (NB, ES, AEH), pp. 539–542.
ICSM-2009-DaraLLST #execution #testing- Using dynamic execution data to generate test cases (RD, SL, WL, ASG, LT), pp. 433–436.
ICSM-2009-DongG #comprehension #hybrid- Understanding source package organization using the hybrid model (XD, MWG), pp. 575–578.
ICSM-2009-DraganCM - Using method stereotype distribution as a signature descriptor for software systems (ND, MLC, JIM), pp. 567–570.
ICSM-2009-FerzundAW #classification #metric- Software change classification using hunk metrics (JF, SNA, FW), pp. 471–474.
ICSM-2009-FokaefsTCS #clustering #object-oriented- Decomposing object-oriented class modules using an agglomerative clustering technique (MF, NT, AC, JS), pp. 93–101.
ICSM-2009-GayHMM #concept #feedback #on the- On the use of relevance feedback in IR-based concept location (GG, SH, AM, TM), pp. 351–360.
ICSM-2009-HolmesCWD #case study #source code- The end-to-end use of source code examples: An exploratory study (RH, RC, RJW, JD), pp. 555–558.
ICSM-2009-JeffreyGG #effectiveness #fault #locality #multi #performance- Effective and efficient localization of multiple faults using value replacement (DJ, NG, RG), pp. 221–230.
ICSM-2009-Li #analysis #dependence #identification- Identifying high-level dependence structures using slice-based dependence analysis (ZL), pp. 457–460.
ICSM-2009-Poshyvanyk #information retrieval #maintenance- Using information retrieval to support software maintenance tasks (DP), pp. 453–456.
ICSM-2009-ShihabJH #developer #open source- Studying the use of developer IRC meetings in open source projects (ES, ZMJ, AEH), pp. 147–156.
ICSM-2009-ShternT #clustering #evaluation- Refining clustering evaluation using structure indicators (MS, VT), pp. 297–305.
ICSM-2009-VasaLBN #analysis #comparative #evolution- Comparative analysis of evolving software systems using the Gini coefficient (RV, ML, PB, ON), pp. 179–188.
ICSM-2009-WitZD #clone tracking- Managing code clones using dynamic change tracking and resolution (MdW, AZ, AvD), pp. 169–178.
ICSM-2009-YokomoriSNI #component #framework #impact analysis #ranking- Assessing the impact of framework changes using component ranking (RY, HPS, MN, KI), pp. 189–198.
ICSM-2009-Yoo #impact analysis #metric #performance- Performance impact analysis with KPP using application response measurement in E-government systems (NY), pp. 503–506.
ICSM-2009-YoshikawaHS #natural language #ontology #source code #traceability- Recovering traceability links between a simple natural language sentence and source code using domain ontologies (TY, SH, MS), pp. 551–554.
MSR-2009-EkanayakeTGB #concept #fault #predict #quality- Tracking concept drift of software projects using defect prediction quality (JE, JT, HCG, AB), pp. 51–60.
MSR-2009-Kuhn #automation #component #evolution #source code #word- Automatic labeling of software components and their evolution using log-likelihood ratio of word frequencies in source code (AK), pp. 175–178.
MSR-2009-LubsenZP #co-evolution- Using association rules to study the co-evolution of production & test code (ZL, AZ, MP), pp. 151–154.
MSR-2009-MatterKN #debugging #developer- Assigning bug reports using a vocabulary-based expertise model of developers (DM, AK, ON), pp. 131–140.
MSR-2009-ShihabJH #chat #developer #gnome #internet #on the- On the use of Internet Relay Chat (IRC) meetings by developers of the GNOME GTK+ project (ES, ZMJ, AEH), pp. 107–110.
MSR-2009-TianRP #automation #categorisation- Using Latent Dirichlet Allocation for automatic categorization of software (KT, MR, DP), pp. 163–166.
WCRE-1999-CapobiancoLOPP99a #analysis #traceability- Traceability Recovery Using Numerical Analysis (GC, ADL, RO, AP, SP), pp. 195–204.
WCRE-1999-GatrellCH99a #c# #design pattern #replication- Design Patterns and Change Proneness: A Replication Using Proprietary C# Software (MG, SC, TH), pp. 160–164.
WCRE-1999-Perez-CastilloGAP99a #legacy #on the #source code- On the Use of ADM to Contextualize Data on Legacy Source Code for Software Modernization (RPC, IGRdG, OAG, MP), pp. 128–132.
WCRE-1999-YangPZ99a #concept analysis #data access #feature model #multi #semantics- Domain Feature Model Recovery from Multiple Applications Using Data Access Semantics and Formal Concept Analysis (YY, XP, WZ), pp. 215–224.
CIAA-2009-AhnH #heuristic #implementation- Implementation of State Elimination Using Heuristics (JHA, YSH), pp. 178–187.
CIAA-2009-Sastre-Martinez #network #parsing #performance #recursion- Efficient Parsing Using Filtered-Popping Recursive Transition Networks (JMSM), pp. 241–244.
ICALP-v1-2009-Jansen #constant #scheduling- An EPTAS for Scheduling Jobs on Uniform Processors: Using an MILP Relaxation with a Constant Number of Integral Variables (KJ), pp. 562–573.
ICALP-v1-2009-Nederlof #algorithm #performance #problem- Fast Polynomial-Space Algorithms Using Möbius Inversion: Improving on Steiner Tree and Related Problems (JN), pp. 713–725.
ICALP-v2-2009-CooperIKK #graph #random- Derandomizing Random Walks in Undirected Graphs Using Locally Fair Exploration Strategies (CC, DI, RK, AK), pp. 411–422.
LATA-2009-Blanchet-SadriMRW #algorithm #word- An Answer to a Conjecture on Overlaps in Partial Words Using Periodicity Algorithms (FBS, RM, AR, EW), pp. 188–199.
LATA-2009-Onodera #locality- New Morphic Characterizations of Languages in Chomsky Hierarchy Using Insertion and Locality (KO), pp. 648–659.
FM-2009-HjortRLPS #modelling #testing #user interface- Model-Based GUI Testing Using Uppaal at Novo Nordisk (UHH, JIR, KGL, MAP, AS), pp. 814–818.
FM-2009-JeffordsHAL #composition #fault tolerance #formal method #refinement- A Formal Method for Developing Provably Correct Fault-Tolerant Systems Using Partial Refinement and Composition (RDJ, CLH, MA, EIL), pp. 173–189.
FM-2009-JostLHSH #analysis #bound- “Carbon Credits” for Resource-Bounded Computations Using Amortised Analysis (SJ, HWL, KH, NS, MH), pp. 354–369.
FM-2009-LangM #composition #confluence #detection #partial order #reduction- Partial Order Reductions Using Compositional Confluence Detection (FL, RM), pp. 157–172.
FM-2009-ShaoKP #approach #bound #formal method #incremental #lightweight- An Incremental Approach to Scope-Bounded Checking Using a Lightweight Formal Method (DS, SK, DEP), pp. 757–772.
IFM-2009-SalaunB #algebra #encoding #process- Realizability of Choreographies Using Process Algebra Encodings (GS, TB), pp. 167–182.
SEFM-2009-BertoliniM #model checking #probability #testing #user interface- Using Probabilistic Model Checking to Evaluate GUI Testing Techniques (CB, AM), pp. 115–124.
SEFM-2009-HieronsJUY #adaptation #sequence- Checking Sequence Construction Using Adaptive and Preset Distinguishing Sequences (RMH, GVJ, HU, HY), pp. 157–166.
SEFM-2009-HummelT #behaviour #specification- Behavioral Specification of Reactive Systems Using Stream-Based I/O Tables (BH, JT), pp. 137–146.
SEFM-2009-SubramaniamGP #finite #impact analysis #state machine #testing- Using Change Impact Analysis to Select Tests for Extended Finite State Machines (MS, BG, ZP), pp. 93–102.
SEFM-2009-TruongTN #analysis #coordination #multi- Coordinated Consensus Analysis of Multi-agent Systems Using Event-B (NTT, TBT, VHN), pp. 201–209.
SFM-2009-ClarkGT #analysis #web #web service- Quantitative Analysis of Web Services Using SRMC (AC, SG, MT), pp. 296–339.
TLCA-2009-Atkey #for free #parametricity #representation #syntax- Syntax for Free: Representing Syntax with Binding Using Parametricity (RA), pp. 35–49.
CEFP-2009-TothBHLTK #behaviour #dependence #erlang #graph #impact analysis #source code- Impact Analysis of Erlang Programs Using Behaviour Dependency Graphs (MT, IB, ZH, LL, MT, TK), pp. 372–390.
ICFP-2009-GazagnaireH #database #functional #named #performance #programming #transaction- OXenstored: an efficient hierarchical and transactional database using functional programming with reference cell comparisons (TG, VH), pp. 203–214.
ICFP-2009-PaganoAMCCWMC #case study #certification #embedded #experience #framework #ml #safety #tool support- Experience report: using objective caml to develop safety-critical embedded tools in a certification framework (BP, OA, TM, BC, EC, PW, PM, JLC), pp. 215–220.
ICFP-2009-Pierce #education #programming language #proving- λ, the ultimate TA: using a proof assistant to teach programming language foundations (BCP), pp. 121–122.
AIIDE-2009-TutenelSBK #design #game studies #semantics- Using Semantics to Improve the Design of Game Worlds (TT, RMS, RB, KJdK).
AIIDE-2009-ZhaoS #behaviour #game studies #learning #modelling- Learning Character Behaviors Using Agent Modeling in Games (RZ, DS).
CIG-2009-AveryLA #coordination #evolution- Evolving coordinated spatial tactics for autonomous entities using influence maps (PA, SJL, BA), pp. 341–348.
CIG-2009-CardamoneLL #learning- Learning drivers for TORCS through imitation using supervised methods (LC, DL, PLL), pp. 148–155.
CIG-2009-CowleyCBH #behaviour #modelling #predict- Analyzing player behavior in Pacman using feature-driven decision theoretic predictive modeling (BC, DC, MMB, RJH), pp. 170–177.
CIG-2009-DrachenCY #modelling #self- Player modeling using self-organization in Tomb Raider: Underworld (AD, AC, GNY), pp. 1–8.
CIG-2009-EbnerT #evolution #programming #search-based- Evolving driving controllers using Genetic Programming (ME, TT), pp. 279–286.
CIG-2009-GalwayCB #difference #game studies #learning- Improving Temporal Difference game agent control using a dynamic exploration during control learning (LG, DC, MMB), pp. 38–45.
CIG-2009-JangYC #algorithm #game studies #realtime- Optimal strategy selection of non-player character on real time strategy game using a speciated evolutionary algorithm (SHJ, JY, SBC), pp. 75–79.
CIG-2009-MalikD #behaviour #coordination #metaprogramming #multi #testing- Improving testing of multi-unit computer players for unwanted behavior using coordination macros (AM, JD), pp. 355–362.
CIG-2009-ThompsonL #automation #execution #realtime- Realtime execution of automated plans using evolutionary robotics (TT, JL), pp. 333–340.
DiGRA-2009-AndersonBCDLM #game studies #problem #video- Using microgenetic methods to investigate problem solving in video games (AA, CB, KMC, JD, AL, WM).
DiGRA-2009-DahlskogKA #classification #functional #game studies- Mapping the game landscape: Locating genres using functional classification (SD, AK, EA).
DiGRA-2009-EylesE #game studies- Using an RFID game to phenomenologically test a theoretical systemic model for describing ambient games (ME, RE).
DiGRA-2009-RibbensP #case study #experience #research- Researching player experiences through the use of different qualitative methods (WR, YP).
DiGRA-2009-RyanS #comprehension #game studies #interactive #learning #video- Evaluating Interactive Entertainment using Breakdown: Understanding Embodied Learning in Video Games (WR, MAS).
DiGRA-2009-Salazar #framework #multi #simulation- Simulating a Quasi-Simulation: A framework for using Multi Agent Simulation Techniques for studying MMORPGs (JS).
FDG-2009-ChertoffBLL #3d #game studies- An exploration of menu techniques using a 3D game input device (DBC, RWB, JJLJ), pp. 256–262.
VS-Games-2009-CharlesCM #game studies #representation #student- Using Player and World Representation Techniques from Computer Games to Improve Student Engagement (DC, TC, MM), pp. 36–42.
VS-Games-2009-Halloran #communication #game studies- It's Talk, But Not as We Know It: Using VoIP to Communicate in War Games (JH0), pp. 133–140.
VS-Games-2009-ValerioPMMSC - Second Life Information Desk System Using Instant Messaging and Short Messaging Service Technologies (SV, JP, LM, PM, CS, FdC), pp. 125–132.
VS-Games-2009-VidaniC #design #game studies #modelling- Using a Task Modeling Formalism in the Design of Serious Games for Emergency Medical Procedures (ACV, LC), pp. 95–102.
GT-VMT-2009-MazanekM09a #diagrams #parsing- Contraction of Unconnected Diagrams using Least Cost Parsing (SM, MM), pp. 189–201.
CHI-2009-AokiHMMPSW #community #research- A vehicle for research: using street sweepers to explore the landscape of environmental community action (PMA, RJH, AMM, CM, EP, SS, AW), pp. 375–384.
CHI-2009-AppertZ #tool support- Using strokes as command shortcuts: cognitive benefits and toolkit support (CA, SZ), pp. 2289–2298.
CHI-2009-BaoG #what- What’s “this” you say?: the use of local references on distant displays (PB, DG), pp. 1029–1032.
CHI-2009-BergmanTBCW - It’s not that important: demoting personal information of low subjective importance using GrayArea (OB, ST, RBM, EC, SW), pp. 269–278.
CHI-2009-BuscherCM #eye tracking #predict #web #what- What do you see when you’re surfing?: using eye tracking to predict salient regions of web pages (GB, EC, MRM), pp. 21–30.
CHI-2009-FeketeEG #named- Motion-pointing: target selection using elliptical motions (JDF, NE, YG), pp. 289–298.
CHI-2009-FindlaterMMD #adaptation #performance- Ephemeral adaptation: the use of gradual onset to improve menu selection performance (LF, KM, JM, JQD), pp. 1655–1664.
CHI-2009-Gerber #effectiveness- Using improvisation to enhance the effectiveness of brainstorming (EG), pp. 97–104.
CHI-2009-HongC - Annotate once, appear anywhere: collective foraging for snippets of interest using paragraph fingerprinting (LH, EHC), pp. 1791–1794.
CHI-2009-HornSCJ #education #programming language #visual notation- Comparing the use of tangible and graphical programming languages for informal science education (MSH, ETS, RJC, RJKJ), pp. 975–984.
CHI-2009-JakobsenH #source code #visualisation- Fisheyes in the field: using method triangulation to study the adoption and use of a source code visualization (MRJ, KH), pp. 1579–1588.
CHI-2009-KitturCS #topic #what #wiki- What’s in Wikipedia?: mapping topics and conflict using socially annotated category structure (AK, EHC, BS), pp. 1509–1512.
CHI-2009-LawA #game studies #named- Input-agreement: a new mechanism for collecting data using human computation games (EL, LvA), pp. 1197–1206.
CHI-2009-MarshallFHRHRYD #interactive #physics- Fighting for control: children’s embodied interactions when using physical and digital representations (PM, RF, AH, JR, EH, YR, NY, NSD), pp. 2149–2152.
CHI-2009-WonJH #visual notation #web- Contextual web history: using visual and contextual cues to improve web browser history (SSW, JJ, JIH), pp. 1457–1466.
CHI-2009-YamashitaIKI #multi- Difficulties in establishing common ground in multiparty groups using machine translation (NY, RI, HK, TI), pp. 679–688.
DHM-2009-Butler #3d- Using 3D Head and Respirator Shapes to Analyze Respirator Fit (KMB), pp. 483–491.
DHM-2009-EllegastHS #assessment- Workload Assessment in Field Using the Ambulatory CUELA System (RPE, IH, CS), pp. 221–226.
DHM-2009-FaustC #3d- 3D Body Scanning’s Contribution to the Use of Apparel as an Identity Construction Tool (MEF, SC), pp. 19–28.
DHM-2009-JeonJKH #classification #gender- Facial Gender Classification Using LUT-Based Sub-images and DIE (JBJ, SHJ, DJK, KSH), pp. 36–45.
DHM-2009-McInnesSP #reliability- Within and Between-Subject Reliability Using Classic Jack for Ergonomic Assessments (BM, AS, JP), pp. 653–660.
DHM-2009-PandithLD #evaluation- The Impact of Change in Software on Satisfaction: Evaluation Using Critical Incident Technique (CIT) (AP, ML, VGD), pp. 717–726.
DHM-2009-SummerskillMCGSD #case study #evaluation #validation- Validation of the HADRIAN System Using an ATM Evaluation Case Study (SJS, RM, KC, DEG, RES, PD), pp. 727–736.
HCD-2009-CantoniBFB #human-computer #requirements- Playful Holistic Support to HCI Requirements Using LEGO Bricks (LC, LB, MF, DB), pp. 844–853.
HCD-2009-ChuangO #correlation #design #mobile- A Photo Correlation Map Using Mobile AP II for Scenario-Based Design (YLC, MO), pp. 177–183.
HCD-2009-HasanMP #e-commerce #usability- Using Google Analytics to Evaluate the Usability of E-Commerce Sites (LH, AM, SGP), pp. 697–706.
HCD-2009-HashizumeKY #communication #difference- Regional Difference in the Use of Cell Phone and Other Communication Media among Senior Users (AH, MK, TY), pp. 426–435.
HCD-2009-JarrettQRAS #analysis #development #metric #testing #usability #web- Using Measurements from Usability Testing, Search Log Analysis and Web Traffic Analysis to Inform Development of a Complex Web Site Used for Complex Tasks (CJ, WQ, IR, SA, VS), pp. 729–738.
HCD-2009-JonesND #information retrieval #set- Use of Nursing Management Minimum Data Set (NMMDS) for a Focused Information Retrieval (JFJ, ETN, CD), pp. 972–978.
HCD-2009-MisawaF #case study #experience #generative #idea #user interface- A Proposal of XB-Method, an Idea Generation System for New Services Using User Experiences (NM, MF), pp. 276–283.
HCD-2009-Rocker - Perceived Usefulness and Perceived Ease-of-Use of Ambient Intelligence Applications in Office Environments (CR), pp. 1052–1061.
HCD-2009-Seland #design #game studies #mobile- Empowering End Users in Design of Mobile Technology Using Role Play as a Method: Reflections on the Role-Play Conduction (GS), pp. 912–921.
HCD-2009-ShibukawaFIN #effectiveness- Fundamental Studies on Effective e-Learning Using Physiology Indices (MS, MFF, YI, SPN), pp. 795–804.
HCD-2009-YuL #generative #idea- Facilitating Idea Generation Using Personas (DJY, WCL), pp. 381–388.
HCI-AUII-2009-FanS #3d #navigation #user interface- Pull and Push: Proximity-Aware User Interface for Navigating in 3D Space Using a Handheld Camera (MF, YS), pp. 133–140.
HCI-AUII-2009-IizukaAM #behaviour- The Anticipation of Human Behavior Using “Parasitic Humanoid” (HI, HA, TM), pp. 284–293.
HCI-AUII-2009-JeongSGKJ - Object Scanning Using a Sensor Frame (SJ, TS, GG, KHK, JWJ), pp. 433–439.
HCI-AUII-2009-JiK #named- CLURD: A New Character-Inputting System Using One 5-Way Key Module (HJ, TK), pp. 39–47.
HCI-AUII-2009-KimPS #3d #design- Menu Design in Cell Phones: Use of 3D Menus (KK, RWP, GS), pp. 48–57.
HCI-AUII-2009-KubickiLLSKC #human-computer #interactive- New Human-Computer Interactions Using Tangible Objects: Application on a Digital Tabletop with RFID Technology (SK, SL, YL, PDS, CK, JC), pp. 446–455.
HCI-AUII-2009-LeeJLJCY #monitoring #smarttech- Wearable ECG Monitoring System Using Conductive Fabrics and Active Electrodes (SHL, SMJ, CKL, KSJ, GC, SKY), pp. 778–783.
HCI-AUII-2009-MatsuiIK #image #recognition- Front Environment Recognition of Personal Vehicle Using the Image Sensor and Acceleration Sensors for Everyday Computing (TM, TI, YK), pp. 151–158.
HCI-AUII-2009-SongPJPKJ #effectiveness #human-computer #interactive #multi- Multi-pointing Method Using a Desk Lamp and Single Camera for Effective Human-Computer Interaction (TS, TCP, SJ, JHP, KHK, JWJ), pp. 520–525.
HCI-AUII-2009-SungJC #metric- Establishing a Measurement System for Human Motions Using a Textile-Based Motion Sensor (MS, KJ, GC), pp. 784–792.
HCI-AUII-2009-TakadaOKT #navigation #smarttech- A Context-Aware AR Navigation System Using Wearable Sensors (DT, TO, KK, HT), pp. 793–801.
HCI-AUII-2009-TokiwaYNSI - Motion Capture System Using an Optical Resolver (TT, MY, HN, MS, MI), pp. 536–543.
HCI-NIMT-2009-BeinhauerH #evaluation #mobile #multimodal- Using Acoustic Landscapes for the Evaluation of Multimodal Mobile Applications (WB, CH), pp. 3–11.
HCI-NIMT-2009-ChoumaneS #interactive #modelling #multimodal- Modeling and Using Salience in Multimodal Interaction Systems (AC, JS), pp. 12–18.
HCI-NIMT-2009-Jain #human-computer #multimodal- Value of Using Multimodal Data in HCI Methodologies (JJ), pp. 48–57.
HCI-NIMT-2009-KotaniYAH #representation- Representation of Velocity Information by Using Tactile Apparent Motion (KK, TY, TA, KH), pp. 470–478.
HCI-NIMT-2009-KoudaKS #design #interface- Motion Stroke-A Tablet-Based Interface for Motion Design Tool Using Drawing (HK, IK, KS), pp. 821–829.
HCI-NIMT-2009-MikhailAGSSE #communication #named- BEXPLORER: Computer and Communication Control Using EEG (MM, MAS, MG, NS, BS, KEA), pp. 579–587.
HCI-NIMT-2009-MiwaIWIN - Shadow Awareness: Bodily Expression Supporting System with Use of Artificial Shadow (YM, SI, TW, KI, HN), pp. 226–235.
HCI-NIMT-2009-OkitaNS #communication- Non-verbal Communication System Using Pictograms (MO, YN, HS), pp. 720–724.
HCI-NIMT-2009-SadP09a #gesture #representation- Using Pictographic Representation, Syntactic Information and Gestures in Text Entry (HHS, FP), pp. 735–744.
HCI-NIMT-2009-SanchezFFP #development #interface- Development of Symbiotic Brain-Machine Interfaces Using a Neurophysiology Cyberworkstation (JCS, RJOF, JABF, JCP), pp. 606–615.
HCI-NIMT-2009-SchreiberWB #concept #interactive- New Interaction Concepts by Using the Wii Remote (MS, MvWM, RB), pp. 261–270.
HCI-NIMT-2009-SuzukiMT #interactive #interface- Interaction Technique for a Pen-Based Interface Using Finger Motions (YS, KM, JT), pp. 503–512.
HCI-NT-2009-AbeOO #automation #image- Automatic Method for Measuring Eye Blinks Using Split-Interlaced Images (KA, SO, MO), pp. 3–11.
HCI-NT-2009-BeeldersBMD #interface #performance #prototype #word- Measuring User Performance for Different Interfaces Using a Word Processor Prototype (TRB, PJB, TM, ED), pp. 395–404.
HCI-NT-2009-HaesenMLC #design #multi- Supporting Multidisciplinary Teams and Early Design Stages Using Storyboards (MH, JM, KL, KC), pp. 616–623.
HCI-NT-2009-HermannJSS #internet- Acceptance of Future Technologies Using Personal Data: A Focus Group with Young Internet Users (FH, DJ, DS, AS), pp. 431–437.
HCI-NT-2009-KimWW #adaptation #parametricity #process #recognition #research- The Research on Adaptive Process for Emotion Recognition by Using Time-Dependent Parameters of Autonomic Nervous Response (JK, MCW, JW), pp. 77–84.
HCI-NT-2009-MiyazakiSY #behaviour #distributed #java #runtime #virtual machine- Investigating the Run Time Behavior of Distributed Applications by Using Tiny Java Virtual Machines with Wireless Communications (TM, TS, FY), pp. 882–889.
HCI-NT-2009-OkuboF #development #estimation- Development of Estimation System for Concentrate Situation Using Acceleration Sensor (MO, AF), pp. 131–140.
HCI-NT-2009-SuzukiMSANYF #estimation #on the #performance- On the Possibility about Performance Estimation Just before Beginning a Voluntary Motion Using Movement Related Cortical Potential (SS, TM, YS, KA, NN, TY, SF), pp. 184–191.
HCI-VAD-2009-BuxtonTF #evaluation #heuristic #scalability- Heuristic Evaluation of Mission-Critical Software Using a Large Team (TB, AT, ALF), pp. 673–682.
HCI-VAD-2009-CasasOP #education #tablet- Using Tablet PCs and Pen-Based Technologies to Support Engineering Education (IC, SFO, JP), pp. 31–38.
HCI-VAD-2009-MampadiCG #adaptation #hypermedia #information management #learning- The Effects of Prior Knowledge on the Use of Adaptive Hypermedia Learning Systems (FM, SYC, GG), pp. 156–165.
HCI-VAD-2009-OHearB #enterprise #process #user interface- Using Activity Descriptions to Generate User Interfaces for ERP Software (TO, YB), pp. 577–586.
HCI-VAD-2009-Sano #framework- A Proposal for a Framework for an e-Alumni Program Using SNS (HS), pp. 209–216.
HIMI-DIE-2009-KumeS #analysis #web- Construction of the Data Save System of the Cusp Surface Analysis Using Web Application (YK, JSS), pp. 665–674.
HIMI-DIE-2009-LaquaiAPR #3d #interactive #multimodal #user interface- Using 3D Touch Interaction for a Multimodal Zoomable User Interface (FL, MA, TP, GR), pp. 543–552.
HIMI-DIE-2009-LeeLKC #detection #enterprise #fault #information management #process #statistics- Proactive Fault Detection Schema for Enterprise Information System Using Statistical Process Control (CL, DL, JK, JWC), pp. 113–122.
HIMI-DIE-2009-MistrzykR #industrial #modelling- Practical Use of Task Models for Building and Modeling Operations Chart in the Industrial Production (TM, AR), pp. 140–148.
HIMI-DIE-2009-NakagawaNM - Determination of Inspection Threshold Using Perceptive Sensitivities of Experienced Panel (MN, HN, TM), pp. 279–286.
HIMI-DIE-2009-Soderston #experience #tool support #user interface- A Retrospective and Prospective View of Information Technology Professionals’ Use of Tools: Maturing the User Experience (CS), pp. 306–315.
HIMI-DIE-2009-SrinivasSPK #classification #feature model #performance- Efficient Text Classification Using Best Feature Selection and Combination of Methods (MS, KPS, EVP, SAK), pp. 437–446.
HIMI-II-2009-HadaS #development #mobile #process- Development of an Annotation-Based Classroom Activities Support Environment Using Digital Appliance, Mobile Device and PC (YH, MS), pp. 642–649.
HIMI-II-2009-HasegawaOWMM #estimation #mobile- Legible Character Size on Mobile Terminal Screens: Estimation Using Pinch-in/Out on the iPod Touch Panel (SH, MO, TW, SM, MM), pp. 395–402.
HIMI-II-2009-KimMC #clustering #network #protocol- A Hierarchical Data Dissemination Protocol Using Probability-Based Clustering for Wireless Sensor Networks (MK, MWM, HC), pp. 149–158.
HIMI-II-2009-KimMPH #performance #visualisation- Efficient Annotation Visualization Using Distinctive Features (SKK, SHM, JP, SYH), pp. 295–303.
HIMI-II-2009-LigdaJLJ #automation #distributed #tool support- Pilot Confidence with ATC Automation Using Cockpit Situation Display Tools in a Distributed Traffic Management Environment (SVL, NHJ, JL, WWJ), pp. 816–825.
HIMI-II-2009-MilanovaKRTK #adaptation #image #representation #retrieval- Content Based Image Retrieval Using Adaptive Inverse Pyramid Representation (MGM, RK, SHR, VT, RK), pp. 304–314.
HIMI-II-2009-SawaragiIHN #approach #identification- Identifying Latent Similarities among Near-Miss Incident Records Using a Text-Mining Method and a Scenario-Based Approach (TS, KI, YH, HN), pp. 594–603.
HIMI-II-2009-SchwarzlerRWR #modelling #visual notation- Using Graphical Models for an Intelligent Mixed-Initiative Dialog Management System (SS, GR, FW, GR), pp. 201–209.
HIMI-II-2009-WatanabeOHMM #mobile- Usefulness of Mobile Information Provision Systems Using Graphic Text -Visibility of Graphic Text on Mobile Phones (TW, MO, SH, SM, MM), pp. 476–485.
HIMI-II-2009-YajimaSM - Remote Consultation System Using Hierarchically Structured Agents (HY, JS, KM), pp. 609–618.
IDGD-2009-BoseS #hypermedia- The Use of Hypertext as a Vocabulary Acquisition Strategy for English as Second Language Learners (DB, DS), pp. 147–155.
IDGD-2009-EngleF #metric #multi #scalability- Rescaling Non-metric Data to Metric Data Using Multi-Dimensional Scaling (KME, GAF), pp. 245–253.
IDGD-2009-PhukanR #eye tracking #usability- Considerations for Using Eye Trackers during Usability Studies (AP, MR), pp. 301–307.
IDGD-2009-SwansonSG #framework- Exploring Cultural Context Using the Contextual Scenario Framework (ES, KS, JG), pp. 117–126.
OCSC-2009-AndersenFLN #development #game studies- The Coming Revolution in Competence Development: Using Serious Games to Improve Cross-Cultural Skills (BA, MF, PL, VPN), pp. 413–422.
OCSC-2009-ChaLHK #evaluation- User Reputation Evaluation Using Co-occurrence Feature and Collective Intelligence (JWC, HwL, YSH, LK), pp. 305–311.
OCSC-2009-JohnsonB #community #wiki- Creating Community through the Use of a Class Wiki (KAJ, JB), pp. 471–478.
OCSC-2009-KadenbachK #challenge #collaboration #development #education #social- Benefits and Challenges of Using Collaborative Development Environments with Social Software in Higher Computer Science Education (DK, CK), pp. 479–487.
OCSC-2009-SongNKE #recommendation #word- A Proposed Movie Recommendation Method Using Emotional Word Selection (MS, HN, HGK, JE), pp. 525–534.
OCSC-2009-TsuchihashiO #case study #interface- A Study on the Interface for Viewing the Information Menu of a Town from Intersections Using a Digital Compass (MT, KO), pp. 126–133.
CAiSE-2009-GaillyP #modelling #ontology #standard- Using the REA Ontology to Create Interoperability between E-Collaboration Modeling Standards (FG, GP), pp. 395–409.
CAiSE-2009-GiachettiMP #automation #domain-specific language #generative #modelling #uml- Using UML as a Domain-Specific Modeling Language: A Proposal for Automatic Generation of UML Profiles (GG, BM, OP), pp. 110–124.
CAiSE-2009-KaiyaTSSK #analysis #quality #requirements- Spectrum Analysis for Quality Requirements by Using a Term-Characteristics Map (HK, MT, SS, TS, KK), pp. 546–560.
CAiSE-2009-LiuLYWH #analysis #constraints #verification #workflow- ETL Workflow Analysis and Verification Using Backwards Constraint Propagation (JL, SL, DY, JW, TH), pp. 455–469.
CAiSE-2009-MaoBPF #automation #generative- Defining and Using Schematic Correspondences for Automatically Generating Schema Mappings (LM, KB, NWP, AAAF), pp. 79–93.
CAiSE-2009-SalayM #diagrams #quality #test coverage- Improving Model Quality Using Diagram Coverage Criteria (RS, JM), pp. 186–200.
CAiSE-2009-SalayME #megamodelling #modelling- Using Macromodels to Manage Collections of Related Models (RS, JM, SME), pp. 141–155.
EDOC-2009-BoukhebouzeABM #modelling #process #rule-based #verification- Rule-Based Modeling and Verification of Business Processes Using ECAPE Net (MB, YA, ANB, ZM), p. 74–?.
EDOC-2009-BucklEMRS #architecture #enterprise- Using Enterprise Architecture Management Patterns to Complement TOGAF (SB, AME, FM, RR, CMS), pp. 34–41.
ICEIS-AIDSS-2009-CastroAP #approach #concept #implementation #metadata #named- K-annotations — An Approach for Conceptual Knowledge Implementation using Metadata Annotations (ESEC, MA, RTP), pp. 66–72.
ICEIS-AIDSS-2009-CastroO #multi #quality- Using Quality Costs in a Multi-agent System for an Airline Operations Control (AJMC, EO), pp. 19–24.
ICEIS-AIDSS-2009-ChongC - An Investigation into Dynamic Customer Requirement using Computational Intelligence (YTC, CHC), pp. 113–117.
ICEIS-AIDSS-2009-KhashmanD #image #network- Optimum DCT Compression of Medical Images using Neural Networks (AK, KD), pp. 90–95.
ICEIS-AIDSS-2009-KuoWHH #clustering #network #optimisation #order- An Order Clustering System using ART2 Neural Network and Particle Swarm Optimization Methodn (RJK, MJW, TWH, TLH), pp. 54–59.
ICEIS-AIDSS-2009-MarinicaOG #algorithm #mining- User-driven Association Rule Mining using a Local Algorithm (CM, AO, FG), pp. 200–205.
ICEIS-AIDSS-2009-OReilly #algorithm #multi #optimisation- Frequency Assignment Optimization using the Swarm Intelligence Multi-agent based Algorithm (SIMBA) (GBO), pp. 25–32.
ICEIS-AIDSS-2009-RaimbaultGL #diagrams #information management #uml- Using UML Class Diagram as a Knowledge Engineering Tool (TR, DG, SL), pp. 60–65.
ICEIS-AIDSS-2009-RodriguesNCM - Estimating Greenhouse Gas Emissions using Computational Intelligence (JAPR, LBN, PHGC, JCCBSdM), pp. 248–250.
ICEIS-AIDSS-2009-SunLTT #2d #invariant #recognition- Using GRA for 2D Invariant Object Recognition (THS, JCL, CHT, FCT), pp. 108–112.
ICEIS-AIDSS-2009-TsengCH #approach #assembly #multi #sequence- A Decision Support System for Multi-plant Assembly Sequence Planning using a PSO Approach (YJT, JYC, FYH), pp. 124–129.
ICEIS-DISI-2009-GroppeGK #optimisation- Optimization of SPARQL by using coreSPARQL (JG, SG, JK), pp. 107–112.
ICEIS-DISI-2009-GuerraBOSS #keyword #named- Keymantic: A Keyword-based Search Engine using Structural Knowledge (FG, SB, MO, AS, CS), pp. 241–246.
ICEIS-DISI-2009-GustienePH #analysis #design #framework #integration #semantics- Semantic Framework for Information Integration — Using Service-oriented Analysis and Design (PG, IP, HH), pp. 64–69.
ICEIS-DISI-2009-MoserMBM #approach #integration #modelling #performance #requirements #semantics- Efficient System Integration using Semantic Requirements and Capability Models — An Approach for Integrating Heterogeneous Business Services (TM, RM, SB, AM), pp. 56–63.
ICEIS-DISI-2009-RomeuAC #integration #metric- Integration Method Among BSC, CMMI and Six Sigma using GQM to Support Measurement Definition (MIBCIS) (LR, JA, AC), pp. 171–176.
ICEIS-HCI-2009-JuniorJATPASN #interactive #internet #multi #prototype #web- Back Channel in Interactive Digital Television Systems: Strategies for Prototyping Applications using an Interactive Service Provider — Internet Computing — Interactive and Multimedia Web Applications (JBdSJ, JCdMMJ, ICA, FCT, GMP, PMdÁ, MdS, RFdN), pp. 130–135.
ICEIS-HCI-2009-NakanishiTO #artificial reality #complexity #design #effectiveness #guidelines #verification- Study for Establishing Design Guidelines for Manuals using Augmented Reality Technology — Verification and Expansion of the Basic Model Describing “Effective Complexity” (MN, SiT, YO), pp. 21–26.
ICEIS-HCI-2009-NetoD #case study #gesture #scalability- A Study on the use of Gestures for Large Displays (AN, CD), pp. 55–60.
ICEIS-ISAS-2009-CiaramellaCLM #agile #process #prototype- Using BPMN and Tracing for Rapid Business Process Prototyping Environments (AC, MGCAC, BL, FM), pp. 206–212.
ICEIS-ISAS-2009-FerreiraCAB #modelling #requirements- Keeping the Rationale of IS Requirements using Organizational Business Models (JJF, VMC, RMdA, FAB), pp. 292–297.
ICEIS-ISAS-2009-KinderenGA #modelling #multi #reasoning- Reasoning about Customer Needs in Multi-supplier ICT Service Bundles using Decision Models (SdK, JG, HA), pp. 131–136.
ICEIS-ISAS-2009-MansourH #approach #database #framework #rule-based #xml- A Rule-based Approach and Framework for Managing Best Practices — An XML-based Management using Pure Database System Utilities (EM, HH), pp. 109–115.
ICEIS-ISAS-2009-NascimentoITR #legacy #process- A Method for Rewriting Legacy Systems using Business Process Management Technology (GSdN, CI, LHT, MR), pp. 57–62.
ICEIS-ISAS-2009-OussenaB #analysis #implementation #modelling #process- Layered Process Models — Analysis and Implementation (using MDA Principles) (SO, BSB), pp. 168–175.
ICEIS-J-2009-CallegariB #fuzzy #logic #multi- A Multi-criteria Resource Selection Method for Software Projects Using Fuzzy Logic (DAC, RMB), pp. 376–388.
ICEIS-J-2009-CarrascoHRSE #embedded #interface #monitoring #safety- Remote Controlling and Monitoring of Safety Devices Using Web-Interface Embedded Systems (AC, MDH, MCR, FS, JIE), pp. 737–744.
ICEIS-J-2009-GadK #clustering #performance #semantics #similarity- Enhancing Text Clustering Performance Using Semantic Similarity (WKG, MSK), pp. 325–335.
ICEIS-J-2009-MohebiS #ambiguity #analysis #clustering #detection #hybrid #network- An Optimized Hybrid Kohonen Neural Network for Ambiguity Detection in Cluster Analysis Using Simulated Annealing (EM, MNMS), pp. 389–401.
ICEIS-J-2009-NachevHS #fuzzy #network #predict- Insolvency Prediction of Irish Companies Using Backpropagation and Fuzzy ARTMAP Neural Networks (AN, SH, BS), pp. 287–298.
ICEIS-J-2009-NollR #concept #traceability- Concepts-Based Traceability: Using Experiments to Evaluate Traceability Techniques (RPN, MBR), pp. 539–550.
ICEIS-J-2009-Sun #network- Stereo Matching Using Synchronous Hopfield Neural Network (THS), pp. 336–347.
ICEIS-SAIC-2009-CernuzziZ #design #named #tool support- Gaia4E: A Tool Supporting the Design of MAS using Gaia (LC, FZ), pp. 82–88.
ICEIS-SAIC-2009-CiuffoI #case study #collaboration #information management #recommendation- Using Grids to Support Information Filtering Systems — A Case Study of Running Collaborative Filtering Recommendations on gLite (LNC, EI), pp. 12–18.
ICEIS-SAIC-2009-GandhiT #categorisation #email #ontology- Ontology-based Email Categorization and Task Inference using a Lexicon-enhanced Ontology (PG, RT), pp. 102–107.
ICEIS-SAIC-2009-LeeLK #classification- Blog Classification using K-means (KJL, ML, WK), pp. 61–67.
CIKM-2009-AchananuparpYC - Using negative voting to diversify answers in non-factoid question answering (PA, CCY, XC), pp. 1681–1684.
CIKM-2009-AlgarniLXL #effectiveness #feedback #information management- An effective model of using negative relevance feedback for information filtering (AA, YL, YX, RYKL), pp. 1605–1608.
CIKM-2009-AlonsoGB #clustering #timeline- Clustering and exploring search results using timeline constructions (OA, MG, RABY), pp. 97–106.
CIKM-2009-AnastasakosHKR #approach #collaboration #graph #recommendation- A collaborative filtering approach to ad recommendation using the query-ad click graph (TA, DH, SK, HR), pp. 1927–1930.
CIKM-2009-BalasubramanianC #automation #generative #modelling #topic- Automatic generation of topic pages using query-based aspect models (NB, SC), pp. 2049–2052.
CIKM-2009-BatalH #classification- Boosting KNN text classification accuracy by using supervised term weighting schemes (IB, MH), pp. 2041–2044.
CIKM-2009-BohmNPW #clustering- Density-based clustering using graphics processors (CB, RN, CP, BW), pp. 661–670.
CIKM-2009-CaoCCJZ #categorisation #modelling #retrieval- The use of categorization information in language models for question retrieval (XC, GC, BC, CSJ, CZ), pp. 265–274.
CIKM-2009-DasdanDKD #automation #interface #query #retrieval- Automatic retrieval of similar content using search engine query interface (AD, PD, SK, CD), pp. 701–710.
CIKM-2009-DengKL #retrieval- Enhancing expertise retrieval using community-aware strategies (HD, IK, MRL), pp. 1733–1736.
CIKM-2009-FernandezL #retrieval- Using opinion-based features to boost sentence retrieval (RTF, DEL), pp. 1617–1620.
CIKM-2009-GurajadaK #clustering #maintenance #online- On-line index maintenance using horizontal partitioning (SG, PSK), pp. 435–444.
CIKM-2009-GwaderaC #mining #ranking- Mining and ranking streams of news stories using cross-stream sequential patterns (RG, FC), pp. 1709–1712.
CIKM-2009-HuSZC #clustering #semantics- Exploiting internal and external semantics for the clustering of short texts using world knowledge (XH, NS, CZ, TSC), pp. 919–928.
CIKM-2009-IslamI #set #web- Real-word spelling correction using Google web 1Tn-gram data set (AI, DI), pp. 1689–1692.
CIKM-2009-KatoOOT #query #relational #web- Query by analogical example: relational search using web search engine indices (MPK, HO, SO, KT), pp. 27–36.
CIKM-2009-KhareA #empirical #interface #markov #segmentation- An empirical study on using hidden markov model for search interface segmentation (RK, YA), pp. 17–26.
CIKM-2009-KimC #pseudo #retrieval- Retrieval experiments using pseudo-desktop collections (JK, WBC), pp. 1297–1306.
CIKM-2009-KobayakawaKTOKT #analysis #classification #kernel- Opinion classification with tree kernel SVM using linguistic modality analysis (TSK, TK, HT, NO, JDK, JT), pp. 1791–1794.
CIKM-2009-KuttyNL #approach #clustering #documentation #named #xml- XCFS: an XML documents clustering approach using both the structure and the content (SK, RN, YL), pp. 1729–1732.
CIKM-2009-LeeNL #approach #feedback #retrieval- An improved feedback approach using relevant local posts for blog feed retrieval (YL, SHN, JHL), pp. 1971–1974.
CIKM-2009-LeeVRKMI #adaptation #performance #topic- Measuring system performance and topic discernment using generalized adaptive-weight mean (CTL, VV, EMR, GK, NMF, AI), pp. 2033–2036.
CIKM-2009-LiuZ #classification #sentiment- Cross-domain sentiment classification using a two-stage method (KL, JZ), pp. 1717–1720.
CIKM-2009-LuHM #algorithm #approximate #performance- Efficient algorithms for approximate member extraction using signature-based inverted lists (JL, JH, XM), pp. 315–324.
CIKM-2009-MabroukehE #mining #ontology #predict #semantics #web- Using domain ontology for semantic web usage mining and next page prediction (NRM, CIE), pp. 1677–1680.
CIKM-2009-MaCQG #game studies- Improving search engines using human computation games (HM, RC, CQ, AG), pp. 275–284.
CIKM-2009-MartineauFJP #classification #difference #problem #word- Improving binary classification on text problems using differential word features (JM, TF, AJ, SP), pp. 2019–2024.
CIKM-2009-MouzaLRS #algebra #n-gram #named #string- AS-index: a structure for string search using n-grams and algebraic signatures (CdM, WL, PR, TJES), pp. 295–304.
CIKM-2009-PanCASD #feature model #ranking- Feature selection for ranking using boosted trees (FP, TC, DA, FS, GD), pp. 2025–2028.
CIKM-2009-ParkG #automation #metric #realtime #towards- Towards real-time measurement of customer satisfaction using automatically generated call transcripts (YP, SCG), pp. 1387–1396.
CIKM-2009-ParkR #analysis #information retrieval #kernel #semantics- Kernel latent semantic analysis using an information retrieval based kernel (LAFP, KR), pp. 1721–1724.
CIKM-2009-PuH #clustering #feedback #pseudo #semantics- Pseudo relevance feedback using semantic clustering in relevance language model (QP, DH), pp. 1931–1934.
CIKM-2009-RachakondaS #topic- Finding the topical anchors of a context using lexical cooccurrence data (ARR, SS), pp. 1741–1744.
CIKM-2009-RafieiL #query #web- Data extraction from the web using wild card queries (DR, HL), pp. 1939–1942.
CIKM-2009-SeoCS #community #concurrent #online #thread- Online community search using thread structure (JS, WBC, DAS), pp. 1907–1910.
CIKM-2009-VienVCYKC #kernel #locality #named #visualisation- VRIFA: a nonlinear SVM visualization tool using nomogram and localized radial basis function (LRBF) kernels (NAV, NHV, TC, HY, SK, BHC), pp. 2081–2082.
CIKM-2009-ViyanonM #database #detection #relational #similarity #xml- A system for detecting xml similarity in content and structure using relational database (WV, SKM), pp. 1197–1206.
CIKM-2009-VriesKCC #array #robust- Robust record linkage blocking using suffix arrays (TdV, HK, SC, PC), pp. 305–314.
CIKM-2009-WangML #learning #programming #question #rank #search-based- Learning to rank using evolutionary computation: immune programming or genetic programming? (SW, JM, JL), pp. 1879–1882.
CIKM-2009-WimalasuriyaD #information management #multi #ontology- Using multiple ontologies in information extraction (DCW, DD), pp. 235–244.
CIKM-2009-WuCZZ #approach #definite clause grammar #learning #novel #rank- Smoothing DCG for learning to rank: a novel approach using smoothed hinge functions (MW, YC, ZZ, HZ), pp. 1923–1926.
CIKM-2009-WuTW #query #revisited #xml- Answering XML queries using materialized views revisited (XW, DT, WHW), pp. 475–484.
CIKM-2009-XiaYZ #automation #web- Automatic web data extraction using tree alignment (YX, HY, SZ), pp. 1645–1648.
CIKM-2009-XuFZH #feature model #orthogonal- To obtain orthogonal feature extraction using training data selection (YX, SF, JZ, OH), pp. 1819–1822.
CIKM-2009-YangXBHSY #case study #cumulative #generative #information retrieval #social- A study of information retrieval on accumulative social descriptions using the generation features (LY, SX, SB, DH, ZS, YY), pp. 721–730.
ECIR-2009-Ailon #algorithm #linear #query #ranking- A Simple Linear Ranking Algorithm Using Query Dependent Intercept Variables (NA), pp. 685–690.
ECIR-2009-BolelliEG #detection #topic- Topic and Trend Detection in Text Collections Using Latent Dirichlet Allocation (LB, SE, CLG), pp. 776–780.
ECIR-2009-Efron #aspect-oriented #multi #query- Using Multiple Query Aspects to Build Test Collections without Human Relevance Judgments (ME), pp. 276–287.
ECIR-2009-HalveyPHVHGJ #case study #difference #low level #metric #retrieval #video- Diversity, Assortment, Dissimilarity, Variety: A Study of Diversity Measures Using Low Level Features for Video Retrieval (MH, PP, DH, RV, FH, AG, JMJ), pp. 126–137.
ECIR-2009-KarimzadehganWR - Enhancing Expert Finding Using Organizational Hierarchies (MK, RWW, MR), pp. 177–188.
ECIR-2009-LlorenteR #automation #higher-order #image #statistics- Using Second Order Statistics to Enhance Automated Image Annotation (AL, SMR), pp. 570–577.
ECIR-2009-MissenB #detection #semantics- Using WordNet’s Semantic Relations for Opinion Detection in Blogs (MMSM, MB), pp. 729–733.
ECIR-2009-WeerkampBR #email #information management- Using Contextual Information to Improve Search in Email Archives (WW, KB, MdR), pp. 400–411.
ECIR-2009-YinSC #query- Query Expansion Using External Evidence (ZY, MS, NC), pp. 362–374.
ICML-2009-CamposZJ #constraints #learning #network- Structure learning of Bayesian networks using constraints (CPdC, ZZ, QJ), pp. 113–120.
ICML-2009-LiKZ #learning- Semi-supervised learning using label mean (YFL, JTK, ZHZ), pp. 633–640.
ICML-2009-PlathTN #classification #image #multi #random #segmentation- Multi-class image segmentation using conditional random fields and global classification (NP, MT, SN), pp. 817–824.
ICML-2009-RainaMN #learning #scalability- Large-scale deep unsupervised learning using graphics processors (RR, AM, AYN), pp. 873–880.
ICML-2009-Schmidt #process- Function factorization using warped Gaussian processes (MNS), pp. 921–928.
ICML-2009-TielemanH #performance #persistent- Using fast weights to improve persistent contrastive divergence (TT, GEH), pp. 1033–1040.
ICML-2009-Toussaint #approximate #optimisation- Robot trajectory optimization using approximate inference (MT), pp. 1049–1056.
ICML-2009-YiWSS #probability- Stochastic search using the natural gradient (YS, DW, TS, JS), pp. 1161–1168.
ICML-2009-YuLZG #collaboration #parametricity #predict #random #scalability- Large-scale collaborative prediction using a nonparametric random effects model (KY, JDL, SZ, YG), pp. 1185–1192.
ICML-2009-ZhanLLZ #learning #metric- Learning instance specific distances using metric propagation (DCZ, ML, YFL, ZHZ), pp. 1225–1232.
KDD-2009-DundarHBRR #case study #dataset #detection #learning- Learning with a non-exhaustive training dataset: a case study: detection of bacteria cultures using optical-scattering technology (MD, EDH, AKB, JPR, BR), pp. 279–288.
KDD-2009-FuxmanKGATS #automation #classification- Improving classification accuracy using automatically extracted training data (AF, AK, ABG, RA, PT, JCS), pp. 1145–1154.
KDD-2009-JiYLZKY #interactive- Drosophila gene expression pattern annotation using sparse features and term-term interactions (SJ, LY, YXL, ZHZ, SK, JY), pp. 407–416.
KDD-2009-Macskassy #empirical #graph #learning #metric- Using graph-based metrics with empirical risk minimization to speed up active learning on networked data (SAM), pp. 597–606.
KDD-2009-MakanjuZM #clustering- Clustering event logs using iterative partitioning (AM, ANZH, EEM), pp. 1255–1264.
KDD-2009-MaunzHK #graph #mining #refinement #scalability- Large-scale graph mining using backbone refinement classes (AM, CH, SK), pp. 617–626.
KDD-2009-PatnaikMSR #data mining #mining- Sustainable operation and management of data center chillers using temporal data mining (DP, MM, RKS, NR), pp. 1305–1314.
KDD-2009-SatuluriP #clustering #community #graph #probability #scalability- Scalable graph clustering using stochastic flows: applications to community discovery (VS, SP), pp. 737–746.
KDD-2009-VatturiW #detection- Category detection using hierarchical mean shift (PV, WKW), pp. 847–856.
KDD-2009-XuYL #mining- Named entity mining from click-through data using weakly supervised latent dirichlet allocation (GX, SHY, HL), pp. 1365–1374.
KDIR-2009-DuarteDRF #clustering #consistency- Cluster Ensemble Selection — Using Average Cluster Consistency (FJFD, JMMD, FR, ALNF), pp. 85–95.
KDIR-2009-FatemiPRS #concept #mining #retrieval #semantics #video- Using Association Rule Mining to Enrich Semantic Concepts for Video Retrieval (NF, FP, LER, AFS), pp. 119–126.
KDIR-2009-GoyalBM #query- Entailment of Causal Queries in Narratives using Action Language (PG, LB, TMM), pp. 112–118.
KDIR-2009-GuoK #ontology- Discovering Relationship Associations in Life Sciences using Ontology and Inference (WG, SBK), pp. 10–17.
KDIR-2009-KimRM #retrieval #semantics- A Patent Retrieval Method using Semantic Annotations (YK, JR, SHM), pp. 211–218.
KDIR-2009-KulkarniC #concept #semantics #word- Computation of the Semantic Relatedness between Words using Concept Clouds (SK, DC), pp. 183–188.
KDIR-2009-LamB #categorisation #invariant #multi- Invariant Categorisation of Polygonal Objects using Multi-resolution Signatures (RL, JMHdB), pp. 168–173.
KDIR-2009-WangVH #documentation #probability #retrieval- Document Retrieval using a Probabilistic Knowledge Model (SW, SV, MH), pp. 26–33.
KEOD-2009-CeaGMS #development #ontology- Using Linguistic Patterns to Enhance Ontology Development (GAdC, AGP, EMP, MdCSF), pp. 206–213.
KEOD-2009-DumitrescuK #performance #reuse #self #towards- Towards Social-software for the Efficient Reuse of Solution Patterns for Self-optimizing Systems (RD, BK), pp. 342–347.
KEOD-2009-Hufflen #component #framework #non-functional- A Framework for Managing Components using Non-functional Properties (JMH), pp. 460–463.
KEOD-2009-YiR #algorithm #clustering #ontology- Using a Clustering Algorithm for Domain Related Ontology Construction (HY, VJRS), pp. 336–341.
KEOD-2009-ZghalKYN #composition #named #ontology- OACAS — Ontologies Alignment using Composition and Aggregation of Similarities (SZ, MK, SBY, EMN), pp. 233–238.
KMIS-2009-AlvesM #correlation- Best use of Knowledge in a Space Program — Managing the Correlated Technologies (MBA, AMM), pp. 301–304.
KMIS-2009-Kume #analysis #visual notation #web- Application of Cusp Surface Analysis using Web Application to Visual Perception (YK), pp. 251–257.
MLDM-2009-CelepcikayEO #dataset- Regional Pattern Discovery in Geo-referenced Datasets Using PCA (OUC, CFE, CO), pp. 719–733.
MLDM-2009-GadK #clustering #semantics #similarity- New Semantic Similarity Based Model for Text Clustering Using Extended Gloss Overlaps (WKG, MSK), pp. 663–677.
MLDM-2009-GoncalvesQ #classification #kernel #semantics- Using Graph-Kernels to Represent Semantic Information in Text Classification (TG, PQ), pp. 632–646.
MLDM-2009-KobayashiS #classification #distributed #linear #representation- A Linear Classification Method in a Very High Dimensional Space Using Distributed Representation (TK, IS), pp. 137–147.
MLDM-2009-NunesSP #detection #image- Detection of Masses in Mammographic Images Using Simpson’s Diversity Index in Circular Regions and SVM (APN, ACS, ACdP), pp. 540–553.
MLDM-2009-QureshiZ #quality- Using Resampling Techniques for Better Quality Discretization (TQ, DAZ), pp. 68–81.
MLDM-2009-RiesenB #difference #graph #prototype #reduction- Dissimilarity Based Vector Space Embedding of Graphs Using Prototype Reduction Schemes (KR, HB), pp. 617–631.
MLDM-2009-SilvaSNPJN #classification #geometry #image #metric- Lung Nodules Classification in CT Images Using Simpson’s Index, Geometrical Measures and One-Class SVM (CAdS, ACS, SMBN, ACdP, GBJ, RAN), pp. 810–822.
RecSys-2009-Golbeck #recommendation #social #trust #tutorial- Tutorial on using social trust for recommender systems (JG), pp. 425–426.
RecSys-2009-JamaliE #network #recommendation #trust- Using a trust network to improve top-N recommendation (MJ, ME), pp. 181–188.
RecSys-2009-MoghaddamJEH #feedback #named #recommendation #trust- FeedbackTrust: using feedback effects in trust-based recommendation systems (SM, MJ, ME, JH), pp. 269–272.
RecSys-2009-PhelanMS #realtime #recommendation #topic #twitter- Using twitter to recommend real-time topical news (OP, KM, BS), pp. 385–388.
RecSys-2009-QuerciaC #mobile #named #recommendation- FriendSensing: recommending friends using mobile phones (DQ, LC), pp. 273–276.
RecSys-2009-UmyarovT #estimation #modelling #rating #recommendation- Improving rating estimation in recommender systems using aggregation- and variance-based hierarchical models (AU, AT), pp. 37–44.
SEKE-2009-AhsanFW #debugging #estimation #machine learning- Program File Bug Fix Effort Estimation Using Machine Learning Methods for OSS (SNA, JF, FW), pp. 129–134.
SEKE-2009-AndresMN #mining #realtime #testing- Using a Mining Frequency Patterns Model to Automate Passive Testing of Real-time Systems (CA, MGM, MN), pp. 426–431.
SEKE-2009-FarZYA #concept #documentation #learning #semantics- Realization of Semantic Search Using Concept Learning and Document Annotation Agents (BHF, CZ, Z(Y, MA), pp. 164–169.
SEKE-2009-GarlanCSBC #analysis #architecture- Using Service-oriented Architectures for Socio-Cultural Analysis (DG, KMC, BRS, MWB, OC), pp. 370–375.
SEKE-2009-HuangCPHP #automation #information management- Automated Nursing Knowledge Management Using Indexing (SH, SC, ASP, SH, MP), pp. 93–96.
SEKE-2009-LemkeR #framework #platform- Using Knowledge Objects to Exchange Knowledge in a MAS Platform (APL, MBR), pp. 206–211.
SEKE-2009-PengLPF #algorithm #requirements- Requirements Discovery Based on RGPS Using Evolutionary Algorithm (TP, BL, WP, ZF), pp. 286–290.
SEKE-2009-PortoMF #comprehension #visualisation- The Use of Reading Technique and Visualization for Program Understanding (DP, MGM, SCPFF), pp. 386–391.
SEKE-2009-RusNSC #algorithm #clustering #fault #graph- Clustering of Defect Reports Using Graph Partitioning Algorithms (VR, XN, SGS, YC), pp. 442–445.
SEKE-2009-WilliamsR #risk management #statistics- Accelerated Risk Management using Statistical Triggers (RW, KR), pp. 643–648.
SIGIR-2009-ArampatzisKR #optimisation- Where to stop reading a ranked list?: threshold optimization using truncated score distributions (AA, JK, SR), pp. 524–531.
SIGIR-2009-BolourianMR #named #quantifier #topic- SugarCube: quantification of topic propagation in the blogosphere using percolation theory (AAB, YM, CJvR), pp. 786–787.
SIGIR-2009-Bossard #automation #documentation #summary- Using document structure for automatic summarization (AB), p. 849.
SIGIR-2009-BrunoM #approach #clustering #modelling #multi- Multiview clustering: a late fusion approach using latent models (EB, SMM), pp. 736–737.
SIGIR-2009-CarmelRZ #clustering #wiki- Enhancing cluster labeling using wikipedia (DC, HR, NZ), pp. 139–146.
SIGIR-2009-Collins-ThompsonB #performance #predict #query- Estimating query performance using class predictions (KCT, PNB), pp. 672–673.
SIGIR-2009-DouSNW #web- Using anchor texts with their hyperlink structure for web search (ZD, RS, JYN, JRW), pp. 227–234.
SIGIR-2009-GuanBMCW #graph #multi #personalisation #ranking #recommendation- Personalized tag recommendation using graph-based ranking on multi-type interrelated objects (ZG, JB, QM, CC, CW), pp. 540–547.
SIGIR-2009-ItakuraC #detection #markov #wiki- Using dynamic markov compression to detect vandalism in the wikipedia (KYI, CLAC), pp. 822–823.
SIGIR-2009-KapteinKK #ad hoc #category theory #wiki- Using wikipedia categories for ad hoc search (RK, MK, JK), pp. 824–825.
SIGIR-2009-KeikhaCC #random- Blog distillation using random walks (MK, MJC, FC), pp. 638–639.
SIGIR-2009-KumaranC #predict #quality #query- Reducing long queries using query quality predictors (GK, VRC), pp. 564–571.
SIGIR-2009-LeeLP #reduction #similarity- Tag-based object similarity computation using term space dimension reduction (YKL, SJL, JP), pp. 790–791.
SIGIR-2009-Liu #community #ranking- Using computational community interest as an indicator for ranking (XL), p. 851.
SIGIR-2009-Liu09a #information retrieval #personalisation #topic- Personalizing information retrieval using task features, topic knowledge, and task product (JL), p. 855.
SIGIR-2009-MaCQG #game studies- Page hunt: improving search engines using human computation games (HM, RC, CQ, AG), pp. 746–747.
SIGIR-2009-McDougallM - Expertise search in academia using facets (DM, CM), p. 834.
SIGIR-2009-MetzlerNCR #documentation- Building enriched document representations using aggregated anchor text (DM, JN, HC, SR), pp. 219–226.
SIGIR-2009-NohPYLP #automation #folksonomy #multi #network- An automatic translation of tags for multimedia contents using folksonomy networks (TGN, SBP, HGY, SJL, SYP), pp. 492–499.
SIGIR-2009-PunithaJG #automation #feature model #multi #query #retrieval #topic #video- Topic prerogative feature selection using multiple query examples for automatic video retrieval (PP, JMJ, AG), pp. 804–805.
SIGIR-2009-RavanaPM - System scoring using partial prior information (SDR, LAFP, AM), pp. 788–789.
SIGIR-2009-SeoJ #graph #precise #retrieval- High precision retrieval using relevance-flow graph (JS, JJ), pp. 694–695.
SIGIR-2009-SiersdorferPS #automation #video- Automatic video tagging using content redundancy (SS, JSP, MS), pp. 395–402.
SIGIR-2009-SubramaniamSDV #fuzzy #similarity #string- Experiments in CLIR using fuzzy string search based on surface similarity (SS, AKS, PD, VV), pp. 682–683.
SIGIR-2009-TomasikTT #classification #image- Tagging products using image classification (BT, PT, DT), pp. 792–793.
SIGIR-2009-WangLF #automation #fuzzy #predict- Automatic URL completion and prediction using fuzzy type-ahead search (JW, GL, JF), pp. 634–635.
SIGIR-2009-XuM #web- Evaluating web search using task completion time (YX, DM), pp. 676–677.
SIGIR-2009-YehK #documentation #image- Searching documentation using text, OCR, and image (TY, BK), pp. 776–777.
ECMDA-FA-2009-EvansFM #case study #eclipse #experience #modelling #network- Experiences of Developing a Network Modeling Tool Using the Eclipse Environment (AE, MAF, PM), pp. 301–312.
ECMDA-FA-2009-KublerG #approach #mining #qvt- A Pattern Mining Approach Using QVT (JK, TG), pp. 50–65.
ECMDA-FA-2009-TisiJFCB #higher-order #model transformation #on the- On the Use of Higher-Order Model Transformations (MT, FJ, PF, SC, JB), pp. 18–33.
ICMT-2009-AmstelLB #asf+sdf #metric #model transformation #quality- Using Metrics for Assessing the Quality of ASF+SDF Model Transformations (MvA, CFJL, MvdB), pp. 239–248.
ICMT-2009-FabroABJ #model transformation- Achieving Rule Interoperability Using Chains of Model Transformations (MDDF, PA, JB, FJ), pp. 249–259.
MoDELS-2009-DrusinskyS #logic #uml- Using UML Statecharts with Knowledge Logic Guards (DD, MtS), pp. 586–590.
MoDELS-2009-JurackT #concept #distributed #graph transformation #model transformation #towards- Towards Composite Model Transformations Using Distributed Graph Transformation Concepts (SJ, GT), pp. 226–240.
MoDELS-2009-KusterGZ #automation #development #incremental #model transformation #testing- Incremental Development of Model Transformation Chains Using Automated Testing (JMK, TG, OZ), pp. 733–747.
MoDELS-2009-LeungMLLSTL #ontology #scalability #semantics- Scalable Semantic Annotation Using Lattice-Based Ontologies (MKL, TM, EAL, EL, CPS, ST, BL), pp. 393–407.
MoDELS-2009-LloydJ #analysis #authentication #ml #security- Security Analysis of a Biometric Authentication System Using UMLsec and JML (JL, JJ), pp. 77–91.
MoDELS-2009-MaozMK #modelling #testing- Model-Based Testing Using LSCs and S2A (SM, JM, MK), pp. 301–306.
MoDELS-2009-WimmerKSKRS #debugging #modelling #petri net #qvt- Reviving QVT Relations: Model-Based Debugging Using Colored Petri Nets (MW, AK, JS, GK, WR, WS), pp. 727–732.
SPLC-2009-SchmidL #optimisation #product line- Introducing and optimizing software product lines using the FEF (KS, FvdL), p. 311.
SPLC-2009-Voelter #domain-specific language #product line- Using domain specific languages for product line engineering (MV), p. 329.
MoDELS-2009-DrusinskyS #logic #uml- Using UML Statecharts with Knowledge Logic Guards (DD, MtS), pp. 586–590.
MoDELS-2009-JurackT #concept #distributed #graph transformation #model transformation #towards- Towards Composite Model Transformations Using Distributed Graph Transformation Concepts (SJ, GT), pp. 226–240.
MoDELS-2009-KusterGZ #automation #development #incremental #model transformation #testing- Incremental Development of Model Transformation Chains Using Automated Testing (JMK, TG, OZ), pp. 733–747.
MoDELS-2009-LeungMLLSTL #ontology #scalability #semantics- Scalable Semantic Annotation Using Lattice-Based Ontologies (MKL, TM, EAL, EL, CPS, ST, BL), pp. 393–407.
MoDELS-2009-LloydJ #analysis #authentication #ml #security- Security Analysis of a Biometric Authentication System Using UMLsec and JML (JL, JJ), pp. 77–91.
MoDELS-2009-MaozMK #modelling #testing- Model-Based Testing Using LSCs and S2A (SM, JM, MK), pp. 301–306.
MoDELS-2009-WimmerKSKRS #debugging #modelling #petri net #qvt- Reviving QVT Relations: Model-Based Debugging Using Colored Petri Nets (MW, AK, JS, GK, WR, WS), pp. 727–732.
ECOOP-2009-CutsemBDM - Adding State and Visibility Control to Traits Using Lexical Nesting (TVC, AB, SD, WDM), pp. 220–243.
ECOOP-2009-XuRS #alias #analysis #points-to #scalability- Scaling CFL-Reachability-Based Points-To Analysis Using Context-Sensitive Must-Not-Alias Analysis (G(X, AR, MS), pp. 98–122.
OOPSLA-2009-Abi-AntounA #analysis #architecture #consistency #runtime- Static extraction and conformance analysis of hierarchical runtime architectural structure using annotations (MAA, JA), pp. 321–340.
TOOLS-EUROPE-2009-BruniV #generative #named #prototype #virtual machine- PyGirl: Generating Whole-System VMs from High-Level Prototypes Using PyPy (CB, TV), pp. 328–347.
TOOLS-EUROPE-2009-SadilekW #grammarware #semantics- Using Grammarware Languages to Define Operational Semantics of Modelled Languages (DAS, GW), pp. 348–356.
TOOLS-EUROPE-2009-StrickerHS #constraints #design #diagrams #uml- Designing Design Constraints in the UML Using Join Point Designation Diagrams (VS, SH, DS), pp. 57–76.
AdaEurope-2009-Montoya-DatoAG #ada #experience #online #programming- An Experience on Ada Programming Using On-Line Judging (FJMD, JLFA, GGM), pp. 75–89.
LOPSTR-2009-AstefanoaeiBR #testing- Using Rewrite Strategies for Testing BUpL Agents (LA, FSdB, MBvR), pp. 143–157.
LOPSTR-2009-CzenkoE #flexibility- LP with Flexible Grouping and Aggregates Using Modes (MC, SE), pp. 67–81.
LOPSTR-2009-ScandoloKH #parallel #pipes and filters- Program Parallelization Using Synchronized Pipelining (LS, CK, MVH), pp. 173–187.
PADL-2009-MaldeO #analysis #haskell #scalability #sequence- Using Bloom Filters for Large Scale Gene Sequence Analysis in Haskell (KM, BO), pp. 183–194.
PEPM-2009-CifuentesKLS #debugging #detection #program analysis- Program analysis for bug detection using parfait: invited talk (CC, NK, LL, BS), pp. 7–8.
PEPM-2009-SalamaMTGO #consistency #dependent type- Static consistency checking for verilog wire interconnects: using dependent types to check the sanity of verilog descriptions (CS, GM, WT, JG, JO), pp. 121–130.
PLDI-2009-AftandilianG #garbage collection- GC assertions: using the garbage collector to check heap properties (EA, SZG), pp. 235–244.
PLDI-2009-KunduTL #equivalence #optimisation #proving- Proving optimizations correct using parameterized program equivalence (SK, ZT, SL), pp. 327–337.
PLDI-2009-MehraraHHM #hardware #low cost #memory management #transaction- Parallelizing sequential applications on commodity hardware using a low-cost software transactional memory (MM, JH, PCH, SAM), pp. 166–176.
PLDI-2009-RavitchJAL #automation #generative #library #static analysis- Automatic generation of library bindings using static analysis (TR, SJ, EA, BL), pp. 352–362.
PLDI-2009-SrivastavaG #abstraction #verification- Program verification using templates over predicate abstraction (SS, SG), pp. 223–234.
PLDI-2009-TorreMP #calculus #fixpoint #recursion #source code- Analyzing recursive programs using a fixed-point calculus (SLT, PM, GP), pp. 211–222.
POPL-2009-BrunelDHLM #logic #model checking- A foundation for flow-based program matching: using temporal logic and model checking (JB, DD, RRH, JLL, GM), pp. 114–126.
SAS-2009-DohKS #parsing #static analysis #string- Abstract Parsing: Static Analysis of Dynamically Generated String Output Using LR-Parsing Technology (KGD, HK, DAS), pp. 256–272.
SAS-2009-Qadeer #algorithm #smt #verification- Algorithmic Verification of Systems Software Using SMT Solvers (SQ), p. 2.
SAS-2009-Simon #analysis #optimisation #pointer #similarity- Optimizing Pointer Analysis Using Bisimilarity (LS), pp. 222–237.
SIGAda-2009-Barkstrom #ada #algorithm #concurrent #multi #on the #problem- On using Ada to solve problems in computational economics and related disciplines with concurrent, multiagent algorithms (BRB), pp. 61–72.
SIGAda-2009-DelangePPKSK #simulation #validation- Validate, simulate, and implement ARINC653 systems using the AADL (JD, LP, AP, MK, FS, FK), pp. 31–44.
SIGAda-2009-LosebyCB #embedded- Use of SPARK in a resource constrained embedded system (CL, PC, CB), pp. 87–90.
SIGAda-2009-Sward09a #ada- Georegistration of imagery from unmanned aircraft systems using Ada (RES), pp. 121–126.
RE-2009-AdamDEG #requirements- Using Task-oriented Requirements Engineering in Different Domains (SA, JD, ME, AG), pp. 267–272.
RE-2009-CarvalloF #component #on the #process #requirements- On the Use of Requirements for Driving Call-for-Tender Processes for Procuring Coarse-grained OTS Components (JPC, XF), pp. 287–292.
RE-2009-KonradD #industrial #lessons learnt #modelling- Lessons Learned from the Use of Artifact Models in Industrial Projects (SK, HD), pp. 349–354.
RE-2009-TunJLNY #problem- Are Your Lights Off? Using Problem Frames to Diagnose System Failures (TTT, MJ, RCL, BN, YY), pp. 343–348.
ASE-2009-CassellAGN #automation #clustering #towards- Towards Automating Class-Splitting Using Betweenness Clustering (KC, PA, LG, JN), pp. 595–599.
ASE-2009-GuldaliFJSE #automation #clustering #requirements #testing- Semi-automated Test Planning for e-ID Systems by Using Requirements Clustering (BG, HF, MJ, SS, GE), pp. 29–39.
ASE-2009-KimYS #concurrent #detection #heuristic #memory management #model checking #precise- Precise Data Race Detection in a Relaxed Memory Model Using Heuristic-Based Model Checking (KK, TYK, BAS), pp. 495–499.
ASE-2009-LedruPB #string #testing- Using String Distances for Test Case Prioritisation (YL, AP, SB), pp. 510–514.
ASE-2009-LiXTHS #automation #generative #named #regular expression #source code #testing- Reggae: Automated Test Generation for Programs Using Complex Regular Expressions (NL, TX, NT, JdH, WS), pp. 515–519.
ASE-2009-MalikGEK #automation #data type #debugging- A Case for Automated Debugging Using Data Structure Repair (MZM, KG, BE, SK), pp. 620–624.
ASE-2009-RayMACSM #validation #verification- Validating Automotive Control Software Using Instrumentation-Based Verification (AR, IM, CA, RC, CPS, CM), pp. 15–25.
ASE-2009-WeiglhoferFW #fault #locality #testing- Using Spectrum-Based Fault Localization for Test Case Grouping (MW, GF, FW), pp. 630–634.
ASE-2009-YuAB #analysis #generative #source code #string- Generating Vulnerability Signatures for String Manipulating Programs Using Automata-Based Forward and Backward Symbolic Analyses (FY, MA, TB), pp. 605–609.
ESEC-FSE-2009-MaiaKUM #modelling #probability #refinement #towards- Towards accurate probabilistic models using state refinement (PHMM, JK, SU, NCM), pp. 281–284.
ESEC-FSE-2009-VangalaCT #clustering #comparison #execution #testing- Test case comparison and clustering using program profiles and static execution (VV, JC, PT), pp. 293–294.
ICSE-2009-CalinescuK #analysis- Using quantitative analysis to implement autonomic IT systems (RC, MZK), pp. 100–110.
ICSE-2009-CasoBGU #abstraction #contract #finite #validation- Validation of contracts using enabledness preserving finite state abstractions (GdC, VAB, DG, SU), pp. 452–462.
ICSE-2009-ComanSS #analysis #automation #case study #industrial #metric #re-engineering- A case-study on using an Automated In-process Software Engineering Measurement and Analysis system in an industrial environment (IDC, AS, GS), pp. 89–99.
ICSE-2009-Hassan #complexity #fault #predict- Predicting faults using the complexity of code changes (AEH), pp. 78–88.
ICSE-2009-MenziesWBH #how #probability #process- How to avoid drastic software process change (using stochastic stability) (TM, SW, BWB, JH), pp. 540–550.
ICSE-2009-MorinBNJ #adaptation #aspect-oriented #modelling- Taming Dynamically Adaptive Systems using models and aspects (BM, OB, GN, JMJ), pp. 122–132.
ICSE-2009-SantelicesJYH #lightweight #multi- Lightweight fault-localization using multiple coverage types (RAS, JAJ, YY, MJH), pp. 56–66.
ICSE-2009-WeimerNGF #automation #programming #search-based- Automatically finding patches using genetic programming (WW, TN, CLG, SF), pp. 364–374.
ICSE-2009-WolfSDN #analysis #communication #developer #network #predict #social- Predicting build failures using social network analysis on developer communication (TW, AS, DD, THDN), pp. 1–11.
SAC-2009-Abbadeni #database #information retrieval #multi #query #visual notation- Information retrieval from visual databases using multiple representations and multiple queries (NA), pp. 1523–1527.
SAC-2009-BaechlerBH #image #modelling #verification- Labeled images verification using Gaussian mixture models (MB, JLB, JH), pp. 1331–1335.
SAC-2009-BreauxLOA #identification #requirements- Identifying vulnerabilities and critical requirements using criminal court proceedings (TDB, JDL, PNO, AIA), pp. 355–359.
SAC-2009-BuresHM #component #product line- Using a product line for creating component systems (TB, PH, MM), pp. 501–508.
SAC-2009-CaldersGPR #mining #process- Using minimum description length for process mining (TC, CWG, MP, AR), pp. 1451–1455.
SAC-2009-CasadeiV #design #model checking #probability #self #simulation- Using probabilistic model checking and simulation for designing self-organizing systems (MC, MV), pp. 2103–2104.
SAC-2009-ChunLSC #multi #predict #video- An enhanced multi-view video compression using the constrained inter-view prediction (SC, SL, KS, KC), pp. 1811–1815.
SAC-2009-DaiMSZ #concept analysis #towards- Towards “WYDIWYS” for MIMI using concept analysis (JD, RM, JS, GQZ), pp. 91–97.
SAC-2009-DaoudTBC #ontology #personalisation- A session based personalized search using an ontological user profile (MD, LTL, MB, BC), pp. 1732–1736.
SAC-2009-DelicatoSPOBP #adaptation #aspect-oriented #composition #mobile- Using aspects and dynamic composition to provide context-aware adaptation for mobile applications (FCD, ILAS, PFP, ALSO, TVB, LP), pp. 456–460.
SAC-2009-DemailleLS #abstract syntax tree #effectiveness #named #parsing- TWEAST: a simple and effective technique to implement concrete-syntax AST rewriting using partial parsing (AD, RL, BS), pp. 1924–1929.
SAC-2009-EsfahaniMSU #mining #process- Using process mining to business process distribution (FSE, MAAM, MNS, NIU), pp. 2140–2145.
SAC-2009-FilhoNLA #framework #memory management #mobile #visualisation- A framework for text visualization using memory traffic management for mobile devices (JBFF, JdSRN, CRFL, RMCA), pp. 1847–1848.
SAC-2009-FloraTB #forensics #identification #image- Forensic bite mark identification using image processing methods (GF, MT, HB), pp. 903–907.
SAC-2009-GonzalesLL #community #online #requirements- Requirements engineering using appreciative inquiry for an online community of caregivers of children with autism (CHG, GL, GDL), pp. 142–146.
SAC-2009-HalleV #monitoring #runtime #streaming #web #web service #xml- Runtime monitoring of web service choreographies using streaming XML (SH, RV), pp. 2118–2125.
SAC-2009-HarshN #multi- Using geo-spatial session tagging for smart multicast session discovery (PH, REN), pp. 22–27.
SAC-2009-HijikataHON #algorithm #analysis- HITS algorithm improvement using anchor-related text extracted by DOM structure analysis (YH, BQH, MO, SN), pp. 1691–1698.
SAC-2009-HoqueRA #authentication #privacy #protocol #robust #security- Supporting recovery, privacy and security in RFID systems using a robust authentication protocol (MEH, FR, SIA), pp. 1062–1066.
SAC-2009-HuangSMZH #approach- A new cross-training approach by using labeled data (DH, ES, GM, HZ, CCH), pp. 941–942.
SAC-2009-JeschkePV #development #web- Using web accessibility patterns for web application development (SJ, OP, HV), pp. 129–135.
SAC-2009-LemosBOML #code search #reuse #testing- Applying test-driven code search to the reuse of auxiliary functionality (OALL, SKB, JO, PCM, CVL), pp. 476–482.
SAC-2009-LimaH #approach- Computing data cubes using exact sub-graph matching: the sequential MCG approach (JdCL, CMH), pp. 1541–1548.
SAC-2009-LindvallFKCJ #network #semantics- Searching for relevant software change artifacts using semantic networks (ML, RLF, GK, ZC, VPJ), pp. 496–500.
SAC-2009-LiuDSYH #algorithm #classification #image #invariant- A new K-View algorithm for texture image classification using rotation-invariant feature (HL, SD, ES, CY, CCH), pp. 914–921.
SAC-2009-LiuTS #classification #complexity #learning- Assessing complexity of service-oriented computing using learning classifier systems (LL, ST, HS), pp. 2170–2171.
SAC-2009-LuYLELW #correlation #data type #detection #incremental- Incremental outlier detection in data streams using local correlation integral (XL, TY, ZL, ME, WL, HW), pp. 1520–1521.
SAC-2009-MacielH #architecture #rest #transaction- An optimistic technique for transactions control using REST architectural style (LAHdSM, CMH), pp. 664–669.
SAC-2009-MagaudNS #coq #formal method #theorem- Formalizing Desargues’ theorem in Coq using ranks (NM, JN, PS), pp. 1110–1115.
SAC-2009-MarquesF #documentation- Reconstructing strip-shredded documents using color as feature matching (MAOM, COAF), pp. 893–894.
SAC-2009-MartinsHM #image #multi #re-engineering- Super-resolution image reconstruction using the generalized isotropic multi-level logistic model (ALDM, MRPH, NDAM), pp. 934–938.
SAC-2009-MattheT #query- Bipolar query satisfaction using satisfaction and dissatisfaction degrees: bipolar satisfaction degrees (TM, GDT), pp. 1699–1703.
SAC-2009-MoallemL #distributed #grid #scheduling- Using artificial life techniques for distributed grid job scheduling (AM, SAL), pp. 1091–1097.
SAC-2009-NetoFP #named #people- MATRACA: a tool to provide support for people with impaired vision when using the computer for simple tasks (FGdON, JMF, RRGP), pp. 158–159.
SAC-2009-OlowoyeyeTF #segmentation- Medical volume segmentation using bank of Gabor filters (AO, MT, SF), pp. 826–829.
SAC-2009-PaganoPL #multi #realtime- Real-time multi-view vision systems using WSNs (PP, FP, YL), pp. 2191–2196.
SAC-2009-ParkH #embedded #fine-grained #operating system #programming- Building a customizable embedded operating system with fine-grained joinpoints using the AOX programming environment (JP, SH), pp. 1952–1956.
SAC-2009-ParkKLKK #network #realtime- A mobility management scheme using SCTP-SIP for real-time services across heterogeneous networks (HP, MK, SL, SK, YK), pp. 196–200.
SAC-2009-ParkPR #algorithm #automation- Planning for remarshaling in an automated container terminal using cooperative coevolutionary algorithms (KP, TP, KRR), pp. 1098–1105.
SAC-2009-ParkYAMP #algorithm #approach #detection #novel #search-based #segmentation- A novel approach to detect copy number variation using segmentation and genetic algorithm (CP, YY, JA, MM, SP), pp. 788–792.
SAC-2009-PassitoMM #analysis #network #protocol- Analysis of the secure RTP protocol on voice over wireless networks using extended MedQoS (AP, EdSM, EM), pp. 86–87.
SAC-2009-PostarnakevichS #modelling #representation #visualisation- Global-to-local representation and visualization of molecular surfaces using deformable models (NP, RS), pp. 782–787.
SAC-2009-RamanathanRG #delivery #framework #people #process #trade-off- The people, the process or the technology?: Using the ACE framework to make tradeoffs in service delivery improvement (JR, RR, RG), pp. 259–264.
SAC-2009-RodriguesSC #composition #embedded #functional #set #verification- Improving functional verification of embedded systems using hierarchical composition and set theory (CLR, KRGdS, HdNC), pp. 1632–1636.
SAC-2009-RyuKC #algorithm #detection #documentation #evolution- A detecting and tracing algorithm for unauthorized internet-news plagiarism using spatio-temporal document evolution model (CKR, HJK, HGC), pp. 863–868.
SAC-2009-SchmidtSS #approach #personalisation #social #web- Socially filtered web search: an approach using social bookmarking tags to personalize web search (KUS, TS, LS), pp. 670–674.
SAC-2009-ShaLW #classification #visual notation- Foreground classification using active template in the scene context for visual surveillance (XS, XL, JW), pp. 943–944.
SAC-2009-SherminO #network- Using dynamic bayesian networks to infer gene regulatory networks from expression profiles (AS, MAO), pp. 799–803.
SAC-2009-TanakaKTN #navigation #predict- A destination prediction method using driving contexts and trajectory for car navigation systems (KT, YK, TT, SN), pp. 190–195.
SAC-2009-TarratacaSC #gesture #recognition #smarttech- The current feasibility of gesture recognition for a smartphone using J2ME (LT, ACS, JMPC), pp. 1642–1649.
SAC-2009-TokoroTT #smarttech- A pointing method using two accelerometers for wearable computing (YT, TT, MT), pp. 136–141.
SAC-2009-YounM #email #ontology #personalisation- Spam decisions on gray e-mail using personalized ontologies (SY, DM), pp. 1262–1266.
LDTA-2008-FokkerS09 #abstract interpretation #attribute grammar #functional #source code- Abstract Interpretation of Functional Programs using an Attribute Grammar System (JF, SDS), pp. 117–133.
GPCE-2009-Nikhil #design #hardware- Using GPCE principles for hardware systems and accelerators: (bridging the gap to HW design) (RSN), pp. 1–2.
ASPLOS-2009-CaulfieldGS #clustering #data-driven #memory management #named #performance #power management- Gordon: using flash memory to build fast, power-efficient clusters for data-intensive applications (AMC, LMG, SS), pp. 217–228.
ASPLOS-2009-SidiroglouLPVNK #automation #named #self- ASSURE: automatic software self-healing using rescue points (SS, OL, CP, NV, JN, ADK), pp. 37–48.
CASE-2009-AlenljungL #graph #verification- Formal verification of PLC controlled systems using Sensor Graphs (TA, BL), pp. 164–170.
CASE-2009-BalajiGK #case study- Selection of a machine tool for FMS using ELECTRE III — a case study (CMB, AG, RK), pp. 171–176.
CASE-2009-BeraN - A Simple instrumentation calibration technique for Electrical Impedance Tomography (EIT) using a 16-electrode phantom (TKB, JN), pp. 347–352.
CASE-2009-BukkapatnamMKSK #monitoring #realtime- Real-time monitoring of container stability loss using wireless vibration sensor tags (STSB, SM, JK, VS, RK), pp. 221–226.
CASE-2009-ChakiC #approach #automation #fuzzy #multi- An Automatic decission support system for medical instrument suppliers using fuzzy multifactor based approach (AC, TC), pp. 158–163.
CASE-2009-GargM #agile #algorithm #clustering #named- RACK: RApid clustering using K-means algorithm (VKG, MNM), pp. 621–626.
CASE-2009-HariharanB #markov #process- Misplaced item search in a warehouse using an RFID-based Partially Observable Markov Decision Process (POMDP) model (SH, STSB), pp. 443–448.
CASE-2009-JohnsonM #animation #automation #optimisation #synthesis- Automated trajectory synthesis from animation data using trajectory optimization (ERJ, TDM), pp. 274–279.
CASE-2009-KumarWKSS #analysis #fuzzy #predict #variability- A fuzzy filtering based system for maximal oxygen uptake prediction using heart rate variability analysis (MK, MW, SK, NS, RS), pp. 604–608.
CASE-2009-Makkapati #segmentation- Improved wavelet-based microscope autofocusing for blood smears by using segmentation (VM), pp. 208–211.
CASE-2009-NaveenRR #algorithm #difference #evolution #network #search-based- Rule extraction from differential evolution trained radial basis function network using genetic algorithms (NN, VR, CRR), pp. 152–157.
CASE-2009-SenguptaDBMD #detection #fault #modelling- Fault detection of Air Intake Systems of SI gasoline engines using mean value and within cycle models (SS, SD, AKB, SM, AKD), pp. 361–366.
CASE-2009-VoronovA #model checking #process #verification- Verification of process operations using model checking (AV, KÅ), pp. 415–420.
CASE-2009-YuanZ - Micro-mixing of highly viscous bio-samples using orbital shaking (LY, YFZ), pp. 579–584.
CC-2009-AbadiBHHI #implementation #memory management #transaction- Implementation and Use of Transactional Memory with Dynamic Separation (MA, AB, TH, JH, MI), pp. 63–77.
DAC-2009-AbercrombiePC #design #equation #simulation- Use of lithography simulation for the calibration of equation-based design rule checks (DA, FP, CC), pp. 67–70.
DAC-2009-BaiocchiC #in memory #memory management- Heterogeneous code cache: using scratchpad and main memory in dynamic binary translators (JB, BRC), pp. 744–749.
DAC-2009-ChoudhuryM #logic #lookahead #optimisation- Timing-driven optimization using lookahead logic circuits (MRC, KM), pp. 390–395.
DAC-2009-EllithorpeTK #architecture #named #network- Internet-in-a-Box: emulating datacenter network architectures using FPGAs (JDE, ZT, RHK), pp. 880–883.
DAC-2009-FeySD #bound #fault tolerance- Computing bounds for fault tolerance using formal techniques (GF, AS, RD), pp. 190–195.
DAC-2009-GhaniN #approximate #grid #performance #power management #verification- Fast vectorless power grid verification using an approximate inverse technique (NHAG, FNN), pp. 184–189.
DAC-2009-HelinskiAP #physics- A physical unclonable function defined using power distribution system equivalent resistance variations (RH, DA, JP), pp. 676–681.
DAC-2009-JainC #graph #performance #satisfiability- Efficient SAT solving for non-clausal formulas using DPLL, graphs, and watched cuts (HJ, EMC), pp. 563–568.
DAC-2009-LeeK #manycore #optimisation #throughput- Optimizing throughput of power- and thermal-constrained multicore processors using DVFS and per-core power-gating (JL, NSK), pp. 47–50.
DAC-2009-MehrotraS #performance #robust- A robust and efficient harmonic balance (HB) using direct solution of HB Jacobian (AM, AS), pp. 370–375.
DAC-2009-PatilLZWM #logic- Digital VLSI logic technology using Carbon Nanotube FETs: frequently asked questions (NP, AL, JZ, HSPW, SM), pp. 304–309.
DAC-2009-PotkonjakNNM #detection #hardware- Hardware Trojan horse detection using gate-level characterization (MP, AN, MN, TM), pp. 688–693.
DAC-2009-SarbisheiAF #clustering #heuristic #optimisation #polynomial- Polynomial datapath optimization using partitioning and compensation heuristics (OS, BA, MF), pp. 931–936.
DAC-2009-ShinPS #synthesis- Register allocation for high-level synthesis using dual supply voltages (IS, SP, YS), pp. 937–942.
DAC-2009-StrojwasJRP - Creating an affordable 22nm node using design-lithography co-optimization (AJS, TJ, VR, LTP), pp. 95–96.
DAC-2009-WangCSC #graph #power management #synthesis- Low power gated bus synthesis using shortest-path Steiner graph for system-on-chip communications (RW, NCC, BS, CKC), pp. 166–171.
DAC-2009-WuDL #3d #integer #named #programming #scalability- GRIP: scalable 3D global routing using integer programming (THW, AD, JTL), pp. 320–325.
DAC-2009-ZengZNGGS #optimisation #scheduling- Scheduling the FlexRay bus using optimization techniques (HZ, WZ, MDN, AG, PG, ALSV), pp. 874–877.
DAC-2009-ZhangS #estimation- Accurate temperature estimation using noisy thermal sensors (YZ, AS), pp. 472–477.
DATE-2009-AlvesNDB #detection #fault #multi- Detecting errors using multi-cycle invariance information (NA, KN, JD, RIB), pp. 791–796.
DATE-2009-BaertBWA - Exploring parallelizations of applications for MPSoC platforms using MPA (RB, EB, SW, TJA), pp. 1148–1153.
DATE-2009-BildBD #performance- Minimization of NBTI performance degradation using internal node control (DRB, GEB, RPD), pp. 148–153.
DATE-2009-ChangBM #design- Customizing IP cores for system-on-chip designs using extensive external don’t-cares (KHC, VB, ILM), pp. 582–585.
DATE-2009-DarbariAFB #design #simulation- Selective state retention design using symbolic simulation (AD, BMAH, DF, JB), pp. 1644–1649.
DATE-2009-DensmoreSDPS #design #evaluation #framework- UMTS MPSoC design evaluation using a system level design framework (DD, AS, AD, RP, ALSV), pp. 478–483.
DATE-2009-GuoS #bound #design #distributed #optimisation- Optimizing the HW/SW boundary of an ECC SoC design using control hierarchy and distributed storage (XG, PS), pp. 454–459.
DATE-2009-KinsmanN #finite #modulo theories #precise- Finite Precision bit-width allocation using SAT-Modulo Theory (ABK, NN), pp. 1106–1111.
DATE-2009-KirchnerBG #simulation- Analogue mixed signal simulation using spice and SystemC (TK, NB, CG), pp. 284–287.
DATE-2009-KochteZIKRWCP #modelling #transaction #validation- Test exploration and validation using transaction level models (MAK, CGZ, MEI, RSK, MR, HJW, SDC, PP), pp. 1250–1253.
DATE-2009-KravetsM #logic #synthesis- Sequential logic synthesis using symbolic bi-decomposition (VNK, AM), pp. 1458–1463.
DATE-2009-LinW - Rewiring using IRredundancy Removal and Addition (CCL, CYW), pp. 324–327.
DATE-2009-MitraZPW #logic- Imperfection-immune VLSI logic circuits using Carbon Nanotube Field Effect Transistors (SM, JZ, NP, HW), pp. 436–441.
DATE-2009-MollCRB #modelling #performance #protocol- Fast and accurate protocol specific bus modeling using TLM 2.0 (HWMvM, HC, VR, MB), pp. 316–319.
DATE-2009-OzturkK #compilation #execution #memory management- Using dynamic compilation for continuing execution under reduced memory availability (ÖÖ, MTK), pp. 1373–1378.
DATE-2009-PurandareWK #abstraction #refinement- Strengthening properties using abstraction refinement (MP, TW, DK), pp. 1692–1697.
DATE-2009-RealVD #correlation- Enhancing correlation electromagnetic attack using planar near-field cartography (DR, FV, MD), pp. 628–633.
DATE-2009-RobertsKM #energy #memory management- Using non-volatile memory to save energy in servers (DR, TK, TNM), pp. 743–748.
DATE-2009-SafizadehTATB #nondeterminism- Using randomization to cope with circuit uncertainty (HS, MT, EKA, GT, KB), pp. 815–820.
DATE-2009-SinhaRBS #design #multi #protocol- Multi-clock Soc design using protocol conversion (RS, PSR, SB, ZS), pp. 123–128.
DATE-2009-TannirK #analysis- Computation of IP3 using single-tone moments analysis (DT, RK), pp. 718–723.
DATE-2009-WangCTHR #modelling #optimisation #performance #polynomial- An efficient decoupling capacitance optimization using piecewise polynomial models (XW, YC, SXDT, XH, JR), pp. 1190–1195.
DATE-2009-WangM - An accurate interconnect thermal model using equivalent transmission line circuit (BW, PM), pp. 280–283.
HPCA-2009-PowellBEMSY #named #parametricity #runtime- CAMP: A technique to estimate per-structure power at run-time using a few simple parameters (MDP, AB, JSE, SSM, BRS, SMY), pp. 289–300.
HPCA-2009-ReddiGHWSB #predict- Voltage emergency prediction: Using signatures to reduce operating margins (VJR, MSG, GHH, GYW, MDS, DMB), pp. 18–29.
HPDC-2009-AssuncaoCB #capacity #clustering #in the cloud- Evaluating the cost-benefit of using cloud computing to extend the capacity of clusters (MDdA, AdC, RB), pp. 141–150.
HPDC-2009-HironakaST #concurrent #performance- High performance wide-area overlay using deadlock-free routing (KH, HS, KT), pp. 81–90.
HPDC-2009-Reeuwijk #data flow #framework #learning #named #peer-to-peer #self- Maestro: a self-organizing peer-to-peer dataflow framework using reinforcement learning (CvR), pp. 187–196.
ISMM-2009-GuanSJ #performance #policy- Investigating the effects of using different nursery sizing policies on performance (XG, WSa, CJ), pp. 59–68.
ISMM-2009-NaeemL #alias #analysis #performance #set- Efficient alias set analysis using SSA form (NAN, OL), pp. 79–88.
ISMM-2009-SerranoZ #garbage collection #optimisation- Placement optimization using data context collected during garbage collection (MJS, XZ), pp. 69–78.
PDP-2009-AchourNS #adaptation #algorithm #clustering #modelling #on the #performance- On the Use of Performance Models for Adaptive Algorithm Selection on Heterogeneous Clusters (SA, WN, LAS), pp. 85–89.
PDP-2009-CasconOHDR #concurrent #interface #multi #network #thread- A Multi-Threaded Network Interface Using Network Processors (PC, JO, WMH, AFD, IR), pp. 196–200.
PDP-2009-EngelmannVNS #fault tolerance #migration- Proactive Fault Tolerance Using Preemptive Migration (CE, GV, TN, SLS), pp. 252–257.
PDP-2009-FrancoBFA #2d #implementation #parallel- A Parallel Implementation of the 2D Wavelet Transform Using CUDA (JF, GB, JF, MEA), pp. 111–118.
PDP-2009-KunisR #algorithm #constraints #optimisation #parallel #precedence #scheduling- Optimization of Layer-based Scheduling Algorithms for Mixed Parallel Applications with Precedence Constraints Using Move-blocks (RK, GR), pp. 70–77.
PDP-2009-SantosAPDRS #monitoring #performance #scheduling #web #web service- Using Web Services for Performance Monitoring and Scheduling (AS, FA, VBP, DD, JR, ES), pp. 361–368.
PPoPP-2009-AbadiHM #hardware #memory management #off the shelf #transaction- Transactional memory with strong atomicity using off-the-shelf memory protection hardware (MA, TH, MM), pp. 185–196.
PPoPP-2009-LiBH #distributed #multi #performance #scalability #scheduling- Efficient and scalable multiprocessor fair scheduling using distributed weighted round-robin (TL, DPB, SH), pp. 65–74.
PPoPP-2009-ZyulkyarovGUCAHV #game studies #interactive #memory management #multi #transaction- Atomic quake: using transactional memory in an interactive multiplayer game server (FZ, VG, OSÜ, AC, EA, TH, MV), pp. 25–34.
SOSP-2009-DunaganZS #combinator #graph #named #optimisation- Heat-ray: combating identity snowball attacks using machinelearning, combinatorial optimization and attack graphs (JD, AXZ, DRS), pp. 305–320.
ESOP-2009-Campbell #analysis #data type #memory management- Amortised Memory Analysis Using the Depth of Data Structures (BC), pp. 190–204.
ESOP-2009-Reynolds #category theory #design #programming language- Using Category Theory to Design Programming Languages (JCR), pp. 62–63.
FASE-2009-AguirreFMMW #alloy #behaviour #specification- Describing and Analyzing Behaviours over Tabular Specifications Using (Dyn)Alloy (NA, MFF, MMM, TSEM, AW), pp. 155–170.
FASE-2009-ChatterjeeJS #java #named #query- SNIFF: A Search Engine for Java Using Free-Form Queries (SC, SJ, KS), pp. 385–400.
FASE-2009-KovacsV #array #invariant #proving #source code #theorem proving- Finding Loop Invariants for Programs over Arrays Using a Theorem Prover (LK, AV), pp. 470–485.
STOC-2009-AndersenP #evolution #set- Finding sparse cuts locally using evolving sets (RA, YP), pp. 235–244.
STOC-2009-Gentry #encryption- Fully homomorphic encryption using ideal lattices (CG), pp. 169–178.
STOC-2009-Liu #algorithm #quantum- Quantum algorithms using the curvelet transform (YKL), pp. 391–400.
CAV-2009-BeerBCOT - Explaining Counterexamples Using Causality (IB, SBD, HC, AO, RJT), pp. 94–108.
CAV-2009-DangS #image #polynomial- Image Computation for Polynomial Dynamical Systems Using the Bernstein Expansion (TD, DS), pp. 219–232.
CAV-2009-GuernicG #analysis #hybrid #reachability- Reachability Analysis of Hybrid Systems Using Support Functions (CLG, AG), pp. 540–554.
CAV-2009-LahiriQR #concurrent #detection #fault #precise #smt- Static and Precise Detection of Concurrency Errors in Systems Code Using SMT Solvers (SKL, SQ, ZR), pp. 509–524.
CAV-2009-MajumdarX #testing- Reducing Test Inputs Using Information Partitions (RM, RGX), pp. 555–569.
CAV-2009-Monniaux #float #linear #on the- On Using Floating-Point Computations to Help an Exact Linear Arithmetic Decision Procedure (DM), pp. 570–583.
CAV-2009-VerdoolaegeJB #equivalence #source code- Equivalence Checking of Static Affine Programs Using Widening to Handle Recurrences (SV, GJ, MB), pp. 599–613.
CSL-2009-GaboardiP #bound #semantics- Upper Bounds on Stream I/O Using Semantic Interpretations (MG, RP), pp. 271–286.
ICLP-2009-BroechelerSS #logic programming #probability #query #source code- Using Histograms to Better Answer Queries to Probabilistic Logic Programs (MB, GIS, VSS), pp. 40–54.
ICLP-2009-Mungall #case study #experience #logic programming- Experiences Using Logic Programming in Bioinformatics (CM), pp. 1–21.
ICLP-2009-PaluDPR #constraints #lazy evaluation #programming #set- Answer Set Programming with Constraints Using Lazy Grounding (ADP, AD, EP, GR), pp. 115–129.
ICLP-2009-Raiser #constraints #graph transformation- Analysing Graph Transformation Systems Using Extended Methods from Constraint Handling Rules (FR), pp. 540–541.
ICLP-2009-Todorova #natural language #prolog- Answering Questions from Natural Language Using A-Prolog (YT), pp. 544–546.
ICLP-2009-Wielemaker #prolog #web- Enabling Serendipitous Search on the Web of Data Using Prolog (JW), p. 36.
ICST-2009-BandyopadhyayG #generative #modelling #sequence #state machine #uml- Test Input Generation Using UML Sequence and State Machines Models (AB, SG), pp. 121–130.
ICST-2009-KaminskiA #detection #fault #logic #testing- Using Logic Criterion Feasibility to Reduce Test Set Size While Guaranteeing Fault Detection (GKK, PA), pp. 356–365.
ICST-2009-KaminskiA09a #fault #logic #mutation testing #performance #testing- Using a Fault Hierarchy to Improve the Efficiency of DNF Logic Mutation Testing (GKK, PA), pp. 386–395.
ICST-2009-MurphyKVC #approach #assurance #quality #testing- Quality Assurance of Software Applications Using the In Vivo Testing Approach (CM, GEK, IV, MC), pp. 111–120.
ICST-2009-MurphySK #ml #runtime #testing- Using JML Runtime Assertion Checking to Automate Metamorphic Testing in Applications without Test Oracles (CM, KS, GEK), pp. 436–445.
ICST-2009-PostS #bound #equivalence #functional #implementation #model checking #proving- Proving Functional Equivalence of Two AES Implementations Using Bounded Model Checking (HP, CS), pp. 31–40.
ISSTA-2009-AdlerFKPRSUZ #analysis #string #test coverage- Advanced code coverage analysis using substring holes (YA, EF, MK, DP, OR, MS, SU, AZ), pp. 37–46.
ISSTA-2009-ChengLZWY #debugging #graph #identification #mining- Identifying bug signatures using discriminative graph mining (HC, DL, YZ, XW, XY), pp. 141–152.
ISSTA-2009-ClauseO #automation #identification #named- Penumbra: automatically identifying failure-relevant inputs using dynamic tainting (JAC, AO), pp. 249–260.
ISSTA-2009-ZhangHGXM #integer #linear #programming #testing- Time-aware test-case prioritization using integer linear programming (LZ, SSH, CG, TX, HM), pp. 213–224.
MBT-2009-DadeauLH #automaton #generative #on the #random #testing- On the Use of Uniform Random Generation of Automata for Testing (FD, JL, PCH), pp. 37–51.
MBT-2009-SchumannSH #graph #nondeterminism #testing- Computing Optimal Tests for Non-deterministic Systems Using DNNF Graphs (AS, MS, JH), pp. 87–99.
SAT-2009-BonetJ #metric #satisfiability- Efficiently Calculating Evolutionary Tree Measures Using SAT (MLB, KSJ), pp. 4–17.
SAT-2009-HaimW #machine learning- Restart Strategy Selection Using Machine Learning Techniques (SH, TW), pp. 312–325.
SAT-2009-KojevnikovKY #performance- Finding Efficient Circuits Using SAT-Solvers (AK, ASK, GY), pp. 32–44.
TestCom-FATES-2009-AdjirSR #realtime #testing- Testing Real-Time Systems Using TINA (NA, PdSS, KMR), pp. 1–15.
TestCom-FATES-2009-ErnitsRJV #modelling #testing #web- Model-Based Testing of Web Applications Using NModel (JPE, RR, JJ, MV), pp. 211–216.
TestCom-FATES-2009-SubramaniamXGP #approach #proving #testing #theorem proving- An Approach for Test Selection for EFSMs Using a Theorem Prover (MS, LX, BG, ZP), pp. 146–162.
VMCAI-2009-KiddRDV #debugging #random- Finding Concurrency-Related Bugs Using Random Isolation (NK, TWR, JD, MV), pp. 198–213.
VMCAI-2009-TalyGT #constraints #logic #theorem proving- Synthesizing Switching Logic Using Constraint Solving (AT, SG, AT), pp. 305–319.
VMCAI-2009-WimmerBB #bound #generative #markov #model checking- Counterexample Generation for Discrete-Time Markov Chains Using Bounded Model Checking (RW, BB, BB), pp. 366–380.
CBSE-2008-KuperbergKR #behaviour #black box #component #modelling #parametricity #performance #predict- Performance Prediction for Black-Box Components Using Reengineered Parametric Behaviour Models (MK, KK, RHR), pp. 48–63.
ECSA-2008-DamaseviciusST #component #design #diagrams #feature model #generative #metaprogramming #ontology- Domain Ontology-Based Generative Component Design Using Feature Diagrams and Meta-programming Techniques (RD, VS, JT), pp. 338–341.
ECSA-2008-FilhoCNOLAM #design #overview #perspective- Evaluating Domain Design Approaches Using Systematic Review (EDdSF, RdOC, DFSN, THBdO, LBL, ESdA, SRdLM), pp. 50–65.
ECSA-2008-KamalA #behaviour #design pattern #modelling- Modeling Architectural Patterns’ Behavior Using Architectural Primitives (AWK, PA), pp. 164–179.
ECSA-2008-NavarroC #approach #architecture #automation #design- Automating the Trace of Architectural Design Decisions and Rationales Using a MDD Approach (EN, CEC), pp. 114–130.
ECSA-2008-Perry #architecture #design #evolution #maintenance- Issues in Architecture Evolution: Using Design Intent in Maintenance and Controlling Dynamic Evolution (DEP), p. 1.
ECSA-2008-SanzQCMO #architecture #modelling #representation- Representing Service-Oriented Architectural Models Using pi-ADL (MLS, ZQ, CEC, EM, FO), pp. 273–280.
QoSA-2008-ArdagnaGM #architecture #modelling- Rethinking the Use of Models in Software Architecture (DA, CG, RM), pp. 1–27.
WICSA-2008-Aldrich #architecture- Using Types to Enforce Architectural Structure (JA), pp. 211–220.
WICSA-2008-LaMantiaCMR #design #evolution #matrix #scalability- Analyzing the Evolution of Large-Scale Software Systems Using Design Structure Matrices and Design Rule Theory: Two Exploratory Cases (MJL, YC, AM, JR), pp. 83–92.
DocEng-2008-AlkhateebL #composition #documentation #generative #towards- Towards extending and using SPARQL for modular document generation (FA, SL), pp. 164–172.
DocEng-2008-KumarS #automation #documentation #n-gram- Automatic keyphrase extraction from scientific documents using N-gram filtration technique (NK, KS), pp. 199–208.
DocEng-2008-Nguyen #algorithm #documentation #image- A rotation method for binary document images using DDA algorithm (DTN), pp. 267–270.
DocEng-2008-RonnauPB #documentation #reliability #xml- Merging changes in XML documents using reliable context fingerprints (SR, CP, UMB), pp. 52–61.
DocEng-2008-ValleCP #documentation #identification #performance #visual notation- Fast identification of visual documents using local descriptors (EV, MC, SPF), pp. 173–176.
DRR-2008-AntaniDLST #image- Exploring use of images in clinical articles for decision support in evidence-based medicine (SA, DDF, JL, BVS, GRT), p. 68150.
DRR-2008-BaiNS #composition- Extracting curved text lines using the chain composition and the expanded grouping method (NNB, KN, YS), p. 68150.
DRR-2008-ChanVT #identification #online #prototype- Online writer identification using character prototypes distributions (SKC, CVG, YHT), p. 68150.
DRR-2008-El-HajjML #modelling #recognition #word- Recognition of Arabic handwritten words using contextual character models (REH, CM, LLS), p. 681503.
DRR-2008-ShafaitKB #adaptation #image #implementation #performance- Efficient implementation of local adaptive thresholding techniques using integral images (FS, DK, TMB), p. 681510.
DRR-2008-XiangTLW #recognition #reliability- Achieving high recognition reliability using decision trees and AdaBoost (JX, XT, YL, PSPW), p. 68150.
DRR-2008-XiuB #adaptation #recognition- Whole-book recognition using mutual-entropy-driven model adaptation (PX, HSB), p. 681506.
DRR-2008-ZouLT #html #online- Extracting a sparsely located named entity from online HTML medical articles using support vector machine (JZ, DXL, GRT), p. 68150.
ECDL-2008-BindingT #web #web service- Using Terminology Web Services for the Archaeological Domain (CB, DT), pp. 392–393.
ECDL-2008-FernandezMFVA #agile #development #library- Agile DL: Building a DELOS-ConformedDigital Library Using Agile Software Development (JDF, MAMP, PdlF, JV, JA), pp. 398–399.
ECDL-2008-IkedaZG - Matching Hierarchies Using Shared Objects (RI, KZ, HGM), pp. 209–220.
ECDL-2008-UematsuIFKO #proximity- Proximity Scoring Using Sentence-Based Inverted Index for Practical Full-Text Search (YU, TI, KF, RK, HO), pp. 308–319.
ECDL-2008-YangPJLH #ambiguity #correlation #topic #web- Author Name Disambiguation for Citations Using Topic and Web Correlation (KHY, HTP, JYJ, HML, JMH), pp. 185–196.
HT-2008-ChiM #comprehension #performance #social- Understanding the efficiency of social tagging systems using information theory (EHC, TM), pp. 81–88.
HT-2008-ChoudhurySJS #communication #predict #social- Dynamic prediction of communication flow using social context (MDC, HS, AJ, DDS), pp. 49–54.
HT-2008-Diniz #education #hypermedia- Efl and hypertext: using webquests to maximize english teaching (MGD), pp. 223–224.
HT-2008-LeeBG #community #ranking #similarity- Extracting and ranking viral communities using seeds and content similarity (HCL, AB, LG), pp. 139–148.
HT-2008-TomsaB #social #visualisation- Hyperlinks visualization using social bookmarking (MT, MB), pp. 245–246.
JCDL-2008-CarmelYR #analysis #library- Enhancing digital libraries using missing content analysis (DC, EYT, HR), pp. 1–10.
JCDL-2008-HariharanHM #summary #web- Discovering gis sources on the web using summaries (RH, BH, SM), pp. 94–103.
JCDL-2008-Hetzner #markov #metadata #modelling- A simple method for citation metadata extraction using hidden markov models (EH), pp. 280–284.
JCDL-2008-KhooPWRPD #library #metric #web- Using web metrics to analyze digital libraries (MK, JP, ALW, MR, BP, RAD), pp. 375–384.
JCDL-2008-PereiraRZL #web- Using web information for creating publication venue authority files (DAP, BARN, NZ, AHFL), pp. 295–304.
JCDL-2008-TibenderanaO #library- Acceptance and use of electronic library services in ugandan universities (PKGT, PJO), pp. 323–332.
SIGMOD-2008-BohmFP #clustering #component #independence- Outlier-robust clustering using independent components (CB, CF, CP), pp. 185–198.
SIGMOD-2008-LeeC #performance #query- Efficient storage scheme and query processing for supply chain management using RFID (CHL, CWC), pp. 291–302.
VLDB-2008-Cohen #constraints #generative #xml- Generating XML structure using examples and constraints (SC), pp. 490–501.
VLDB-2008-CohenK #estimation #sketching- Tighter estimation using bottom k sketches (EC, HK), pp. 213–224.
VLDB-2008-CormodeSYZ #graph- Anonymizing bipartite graph data using safe groupings (GC, DS, TY, QZ), pp. 833–844.
VLDB-2008-FontouraJKOTV #taxonomy- Relaxation in text search using taxonomies (MF, VJ, RK, CO, AT, SV), pp. 672–683.
VLDB-2008-KwonBG #distributed #fault tolerance #file system- Fault-tolerant stream processing using a distributed, replicated file system (YK, MB, AGG), pp. 574–585.
VLDB-2008-LeeHLG #classification #clustering #named- TraClass: trajectory classification using hierarchical region-based and trajectory-based clustering (JGL, JH, XL, HG), pp. 1081–1094.
VLDB-2008-MetwallyEAA #correlation #detection #named- SLEUTH: Single-pubLisher attack dEtection Using correlaTion Hunting (AM, FE, DA, AEA), pp. 1217–1228.
CSEET-2008-GotterbarnM #re-engineering- Using the Software Engineering Code of Ethics in Professional Computing Issues (DG, KWM), p. 273.
CSEET-2008-JohnsgardM #overview #programming- Using Alice in Overview Courses to Improve Success Rates in Programming I (KJ, JM), pp. 129–136.
CSEET-2008-RasR #information management #learning- Improving Knowledge Acquisition in Capstone Projects Using Learning Spaces for Experiential Learning (ER, JR), pp. 77–84.
CSEET-2008-SalamahG #education #model checking #specification- A Technique for Using Model Checkers to Teach Formal Specifications (SS, AQG), pp. 181–188.
EDM-2008-BarnesSLC #case study #logic #proving #student- A pilot study on logic proof tutoring using hints generated from historical student data (TB, JCS, LL, MJC), pp. 197–201.
EDM-2008-PavlikCWK #performance- Using Item-type Performance Covariance to Improve the Skill Model of an Existing Tutor (PIP, HC, LW, KRK), pp. 77–86.
ITiCSE-2008-Albin-ClarkK #game studies #simulation- The use of role play to simulate a tethered swarm of robots for urban search and rescue (USAR) (AAC, TRVAK), p. 335.
ITiCSE-2008-Connolly #design #development #education #multi #platform- Complecto mutatio: teaching software design best practices using multi-platform development (RWC), p. 345.
ITiCSE-2008-DennyLH #student- Student use of the PeerWise system (PD, ALR, JH), pp. 73–77.
ITiCSE-2008-Deugo08a #eclipse- Using eclipse in the classroom (DD), p. 322.
ITiCSE-2008-Kurmas #automation #logic #performance #student #testing- Improving student performance using automated testing of simulated digital logic circuits (ZK), pp. 265–270.
ITiCSE-2008-LinhoffS #education #game studies #programming- Teaching game programming using XNA (JL, AS), pp. 250–254.
ITiCSE-2008-MorenoICM #database #design #distance #education #learning #towards- Using accessible digital resources for teaching database design: towards an inclusive distance learning proposal (LM, AI, EC, PM), pp. 32–36.
ITiCSE-2008-SalterD #logic #multi #scalability- Using DLSim 3: a scalable, extensible, multi-level logic simulator (RMS, JLD), p. 315.
SIGITE-2008-Edirisinghe #education #fault #game studies #identification #programming #student- Teaching students to identify common programming errors using a game (EMNSE), pp. 95–98.
SIGITE-2008-MullinsC #programming #student- Engaging students in programming fundamentals using alice 2.0 (PMM, MC), pp. 81–88.
CSMR-2008-CosmaM #comprehension #dependence #distributed #object-oriented- Understanding the Impact of Distribution in Object-Oriented Distributed Systems Using Structural Program Dependencies (DCC, RM), pp. 103–112.
CSMR-2008-GlorieZHD #case study #concept analysis #evolution #experience #industrial #scalability- Splitting a Large Software Archive for Easing Future Software Evolution — An Industrial Experience Report using Formal Concept Analysis (MG, AZ, LH, AvD), pp. 153–162.
CSMR-2008-LagerstromJ #architecture #enterprise #maintenance #modelling #predict- Using Architectural Models to Predict the Maintainability of Enterprise Systems (RL, PJ), pp. 248–252.
CSMR-2008-MendeBKM #clone detection #detection #evolution #product line- Supporting the Grow-and-Prune Model in Software Product Lines Evolution Using Clone Detection (TM, FB, RK, GM), pp. 163–172.
CSMR-2008-SpekKL #architecture #concept #semantics #towards- Towards Recovering Architectural Concepts Using Latent Semantic Indexing (PvdS, SK, PvdL), pp. 253–257.
CSMR-2008-Trifu #data flow #identification #object-oriented- Using Dataflow Information for Concern Identification in Object-Oriented Software Systems (MT), pp. 193–202.
ICPC-2008-EaddyAAG #dynamic analysis #information retrieval #named #program analysis #requirements #source code- CERBERUS: Tracing Requirements to Source Code Using Information Retrieval, Dynamic Analysis, and Program Analysis (ME, AVA, GA, YGG), pp. 53–62.
ICPC-2008-HaiducM #on the #source code- On the Use of Domain Terms in Source Code (SH, AM), pp. 113–122.
ICPC-2008-Parr #embedded #reuse #semantics- The Reuse of Grammars with Embedded Semantic Actions (TP), pp. 5–10.
ICPC-2008-RoyC08a #detection #flexibility #named #normalisation #pretty-printing- NICAD: Accurate Detection of Near-Miss Intentional Clones Using Flexible Pretty-Printing and Code Normalization (CKR, JRC), pp. 172–181.
ICSM-2008-JeffreyGG #debugging #identification #memory management- Identifying the root causes of memory bugs using corrupted memory location suppression (DJ, NG, RG), pp. 356–365.
ICSM-2008-KothariBMS #algebra #development #on the #performance- On evaluating the efficiency of software feature development using algebraic manifolds (JK, DB, SM, AS), pp. 7–16.
ICSM-2008-LiH #random testing #testing- Using random test selection to gain confidence in modified software (WL, MJH), pp. 267–276.
ICSM-2008-LuciaOV #metric #semantics- Using structural and semantic metrics to improve class cohesion (ADL, RO, LV), pp. 27–36.
ICSM-2008-MalikH #adaptation #co-evolution #evolution #heuristic- Supporting software evolution using adaptive change propagation heuristics (HM, AEH), pp. 177–186.
ICSM-2008-RiccaPT #guidelines #lessons learnt #maintenance- Guidelines on the use of Fit tables in software maintenance tasks: Lessons learned from 8 experiments (FR, MDP, MT), pp. 317–326.
MSR-2008-HataMK #precise- An extension of fault-prone filtering using precise training and a dynamic threshold (HH, OM, TK), pp. 89–98.
MSR-2008-SiyCS #challenge #developer #segmentation- Summarizing developer work history using time series segmentation: challenge report (HPS, PC, MS), pp. 137–140.
SCAM-2008-BoogerdM #analysis #data flow #on the #profiling- On the Use of Data Flow Analysis in Static Profiling (CB, LM), pp. 79–88.
SCAM-2008-CeccatoDT #legacy #program transformation- Using Program Transformations to Add Structure to a Legacy Data Model (MC, TRD, PT), pp. 197–206.
SCAM-2008-GiffhornH #analysis #java #precise #source code- Precise Analysis of Java Programs Using JOANA (DG, CH), pp. 267–268.
SCAM-2008-JiaH #fault #higher-order #mutation testing #testing- Constructing Subtle Faults Using Higher Order Mutation Testing (YJ, MH), pp. 249–258.
WCRE-2008-GrantCS #analysis #automation #component #concept #independence- Automated Concept Location Using Independent Component Analysis (SG, JRC, DBS), pp. 138–142.
WCRE-2008-LukinsKE #debugging #locality #retrieval #source code- Source Code Retrieval for Bug Localization Using Latent Dirichlet Allocation (SKL, NAK, LHE), pp. 155–164.
WCRE-2008-Muliawan #higher-order #model transformation #transformation language- Extending a Model Transformation Language Using Higher Order Transformations (OM), pp. 315–318.
WCRE-2008-RompaeyD #estimation- Estimation of Test Code Changes Using Historical Release Data (BVR, SD), pp. 269–278.
CIAA-2008-GarciaPAR #automaton #finite #learning #nondeterminism #regular expression- Learning Regular Languages Using Nondeterministic Finite Automata (PG, MVdP, GIA, JR), pp. 92–101.
ICALP-B-2008-AxelssonHL #context-free grammar #incremental #satisfiability- Analyzing Context-Free Grammars Using an Incremental SAT Solver (RA, KH, ML), pp. 410–422.
LATA-2008-Klunder #automaton #finite- Characterization of Star-Connected Languages Using Finite Automata (BK), pp. 311–320.
FM-2008-ChalinR #fault #ml #performance #runtime- JML Runtime Assertion Checking: Improved Error Reporting and Efficiency Using Strong Validity (PC, FR), pp. 246–261.
FM-2008-ChetaliN #evaluation #formal method #industrial #security- Industrial Use of Formal Methods for a High-Level Security Evaluation (BC, QHN), pp. 198–213.
FM-2008-MacedoLF #development #distributed #incremental #realtime- Incremental Development of a Distributed Real-Time Model of a Cardiac Pacing System Using VDM (HDM, PGL, JSF), pp. 181–197.
RTA-2008-MoserS #polynomial #proving- Proving Quadratic Derivational Complexities Using Context Dependent Interpretations (GM, AS), pp. 276–290.
SEFM-2008-GuoS #finite #impact analysis #proving #state machine #theorem proving- Formal Change Impact Analyses of Extended Finite State Machines Using a Theorem Prover (BG, MS), pp. 335–344.
SEFM-2008-SalasK #modelling #policy #privacy #testing- Testing Privacy Policies Using Models (PAPS, PK), pp. 117–126.
SEFM-2008-TruongTHNTH #aspect-oriented #interactive #interface #programming #protocol- Checking Interface Interaction Protocols Using Aspect-Oriented Programming (AHT, TBT, DVH, VHN, NTTT, PDH), pp. 382–386.
SEFM-2008-XavierHM #fault tolerance #source code #verification- Using Formal Verification to Reduce Test Space of Fault-Tolerant Programs (KSX, SH, ACVdM), pp. 181–190.
FLOPS-2008-Julien #induction #integer- Certified Exact Real Arithmetic Using Co-induction in Arbitrary Integer Base (NJ), pp. 48–63.
FLOPS-2008-PrinceGM #proving- Proving Properties about Lists Using Containers (RP, NG, CM), pp. 97–112.
IFL-2008-LijnseP #automation #data type #database #programming #relational- Between Types and Tables — Using Generic Programming for Automated Mapping between Data Types and Relational Databases (BL, RP), pp. 272–290.
AIIDE-2008-CutumisuSBS #game studies #learning- Agent Learning using Action-Dependent Learning Rates in Computer Role-Playing Games (MC, DS, MHB, RSS).
CIG-2008-ChiouW #adaptation #programming #user satisfaction- Player Adaptive Entertainment Computing (PAEC): Mechanism to model user satisfaction by using Neuro Linguistic Programming (NLP) techniques (AC, KWW), pp. 343–349.
CIG-2008-DjordjevichXBWGV #game studies- Preparing for the aftermath: Using emotional agents in game-based training for disaster response (DD, PGX, MLB, JW, MRG, SJV), pp. 266–275.
CIG-2008-OlesenYH #challenge #game studies #realtime- Real-time challenge balance in an RTS game using rtNEAT (JKO, GNY, JH), pp. 87–94.
CIG-2008-OsakiSTK #difference #evaluation #learning #probability- An Othello evaluation function based on Temporal Difference Learning using probability of winning (YO, KS, YT, YK), pp. 205–211.
CIG-2008-Sahraei-ArdakaniRRL #case study #optimisation- A study of electricity market dynamics using Invasive Weed Colonization Optimization (MSA, MR, ARK, CL), pp. 276–282.
CIG-2008-WenderW #game studies #learning- Using reinforcement learning for city site selection in the turn-based strategy game Civilization IV (SW, IDW), pp. 372–377.
CIG-2008-WestraHDD #adaptation #game studies #online- On-line adapting games using agent organizations (JW, HvH, VD, FD), pp. 243–250.
CIG-2008-WittkampBH #adaptation- Using NEAT for continuous adaptation and teamwork formation in Pacman (MW, LB, PH), pp. 234–242.
GT-VMT-2006-JakobS08 #graph grammar #metamodelling #modelling- View Creation of Meta Models by Using Modified Triple Graph Grammars (JJ, AS), pp. 181–190.
GT-VMT-2006-Varro08 #database #graph transformation #implementation #independence #plugin #query- Implementing an EJB3-Specific Graph Transformation Plugin by Using Database Independent Queries (GV), pp. 121–132.
GT-VC-2007-BruniBGM08 #architecture #graph grammar #modelling- Modelling Dynamic Software Architectures using Typed Graph Grammars (RB, AB, SG, HCM), pp. 39–53.
GT-VMT-2008-BaresiGMM #abstraction #graph transformation #verification- Using Graph Transformation Systems to Specify and Verify Data Abstractions (LB, CG, AM, MM).
GT-VMT-2008-BucchiaroneG #architecture #verification- Dynamic Software Architectures Verification using DynAlloy (AB, JPG).
GT-VMT-2008-GrabskaSL #design #graph transformation #reasoning #visual notation- Visual Design and Reasoning with the Use of Hypergraph Transformations (EG, GMS, TLL).
ICGT-2008-EhrigE #correctness #graph #model transformation #semantics- Semantical Correctness and Completeness of Model Transformations Using Graph and Rule Transformation (HE, CE), pp. 194–210.
ICGT-2008-Khan #analysis #configuration management #graph transformation #modelling #network- Model-Based Analysis of Network Reconfigurations Using Graph Transformation Systems (AK), pp. 502–504.
ICGT-2008-RangelLKEB #behaviour #refactoring- Behavior Preservation in Model Refactoring Using DPO Transformations with Borrowed Contexts (GR, LL, BK, HE, PB), pp. 242–256.
ICGT-2008-Striewe #graph grammar #implementation #state machine- Using a Triple Graph Grammar for State Machine Implementations (MS), pp. 514–516.
CHI-2008-BuechleyECC #arduino #education- The LilyPad Arduino: using computational textiles to investigate engagement, aesthetics, and diversity in computer science education (LB, ME, JC, AC), pp. 423–432.
CHI-2008-ClawsonLRIS #automation #fault #type system- Automatic whiteout++: correcting mini-QWERTY typing errors using keypress timing (JC, KL, AR, RAI, TS), pp. 573–582.
CHI-2008-DugganP #topic #web- Knowledge in the head and on the web: using topic expertise to aid search (GBD, SJP), pp. 39–48.
CHI-2008-GeyerDDMBM #reuse #social- Use and reuse of shared lists as a social content type (WG, CD, JMD, DRM, BB, MJM), pp. 1545–1554.
CHI-2008-GrafSSWR #interactive #search-based #user interface- In-car interaction using search-based user interfaces (SG, WS, AS, AW, GR), pp. 1685–1688.
CHI-2008-GuoS #case study #comparative #interactive #user interface- Exploring the use of tangible user interfaces for human-robot interaction: a comparative study (CG, ES), pp. 121–130.
CHI-2008-HornbaekF #empirical #evaluation #usability- Making use of business goals in usability evaluation: an experiment with novice evaluators (KH, EF), pp. 903–912.
CHI-2008-HsiehLHK #communication- Using tags to assist near-synchronous communication (GH, JL, SEH, RK), pp. 223–226.
CHI-2008-Joinson #facebook #people- Looking at, looking up or keeping up with people?: motives and use of facebook (ANJ), pp. 1027–1036.
CHI-2008-KangWA #interactive #mobile #social #video- Social copresence in anonymous social interactions using a mobile video telephone (SHK, JHW, SKA), pp. 1535–1544.
CHI-2008-KatsanosTA #analysis #architecture #design #named #semantics #web- AutoCardSorter: designing the information architecture of a web site using latent semantic analysis (CK, NKT, NMA), pp. 875–878.
CHI-2008-KobayashiI #multi #scalability- Ninja cursors: using multiple cursors to assist target acquisition on large screens (MK, TI), pp. 949–958.
CHI-2008-LanirBF #design #visual notation- Observing presenters’ use of visual aids to inform the design of classroom presentation software (JL, KSB, LF), pp. 695–704.
CHI-2008-LawranceBBR #behaviour #maintenance- Using information scent to model the dynamic foraging behavior of programmers in maintenance tasks (JL, RKEB, MMB, KR), pp. 1323–1332.
CHI-2008-MorrisBM #named #type system- SuperBreak: using interactivity to enhance ergonomic typing breaks (DM, AJBB, BM), pp. 1817–1826.
CHI-2008-MoscovichH #multi- Indirect mappings of multi-touch input using one and two hands (TM, JFH), pp. 1275–1284.
CHI-2008-OganAJ #learning #predict- Pause, predict, and ponder: use of narrative videos to improve cultural discussion and learning (AO, VA, CJ), pp. 155–162.
CHI-2008-RatwaniMT #eye tracking #fault #predict- Predicting postcompletion errors using eye movements (RMR, JMM, JGT), pp. 539–542.
CHI-2008-SankarpandianLE #named- Talc: using desktop graffiti to fight software vulnerability (KS, TL, WKE), pp. 1055–1064.
CHI-2008-SaponasTMB #interface- Demonstrating the feasibility of using forearm electromyography for muscle-computer interfaces (TSS, DST, DM, RB), pp. 515–524.
CHI-2008-SzentgyorgyiTL #game studies #social- Renegade gaming: practices surrounding social use of the Nintendo DS handheld gaming system (CS, MAT, EL), pp. 1463–1472.
CHI-2008-TianXWZLSD #3d #user interface- Tilt menu: using the 3D orientation information of pen devices to extend the selection capability of pen-based user interfaces (FT, LX, HW, XZ, YL, VS, GD), pp. 1371–1380.
CHI-2008-YataniPBN #gesture #named- Escape: a target selection technique using visually-cued gestures (KY, KP, MWB, MWN), pp. 285–294.
CSCW-2008-HancockTF #symmetry- I know something you don’t: the use of asymmetric personal information for interpersonal advantage (JTH, CLT, KF), pp. 413–416.
CSCW-2008-ReillyMWI - Small details: using one device to navigate together (DFR, BM, CRW, KMI), pp. 253–256.
SOFTVIS-2008-AnslowNMB #3d #visualisation #web- Web software visualization using extensible 3D (X3D) graphics (CA, JN, SM, RB), pp. 213–214.
SOFTVIS-2008-ParduhnSW #algorithm #graph #visualisation- Algorithm visualization using concrete and abstract shape graphs (SAP, RS, RW), pp. 33–36.
SOFTVIS-2008-ZeckzerKSHK #3d #clustering #communication #graph #reliability #visualisation- Analyzing the reliability of communication between software entities using a 3D visualization of clustered graphs (DZ, RK, LS, HH, TK), pp. 37–46.
CAiSE-2008-DeckerKLPW #modelling- Modeling Service Choreographies Using BPMN and BPEL4Chor (GD, OK, FL, KP, MW), pp. 79–93.
CAiSE-2008-HerssensJF - Capturing and Using QoS Relationships to Improve Service Selection (CH, IJ, SF), pp. 312–327.
CAiSE-2008-MuehlenR #how #modelling #process- How Much Language Is Enough? Theoretical and Practical Use of the Business Process Modeling Notation (MzM, JR), pp. 465–479.
CAiSE-2008-ViscusiTS #approach #case study #empirical- Strategic Alignment in the Context of e-Services — An Empirical Investigation of the INSTAL Approach Using the Italian eGovernment Initiative Case Study (GV, LHT, CS), pp. 163–166.
EDOC-2008-KavimandanKG #automation #enterprise #model transformation #synthesis #workflow- Automated Context-Sensitive Dialog Synthesis for Enterprise Workflows Using Templatized Model Transformations (AK, RK, ASG), pp. 159–168.
EDOC-2008-NarmanSJEC #analysis #architecture #enterprise #modelling #quality- Using Enterprise Architecture Models for System Quality Analysis (PN, MS, PJ, ME, MC), pp. 14–23.
EDOC-2008-TakahashiTIHF #approach #composition #coordination #metadata #multi #protocol- Coordination Protocol Composition Approach Using Metadata in Multi-agent Systems (RT, KT, FI, SH, YF), pp. 372–378.
ICEIS-AIDSS-2008-BurdescuML #concept #student- Building a Decision Support System for Students by Using Concept Maps (DDB, MCM, BL), pp. 130–135.
ICEIS-AIDSS-2008-MahdaviSP #approach #automation- Machine Grouping in Cellular Manufacturing System Using Tandem Automated Guided vehicle with ACO Based Six Sigma Approach (IM, BS, MMP), pp. 261–267.
ICEIS-AIDSS-2008-Nachev #network- Forecasting with ARTMAP-IC Neural Networks — An Application Using Corporate Bankruptcy Data (AN), pp. 167–172.
ICEIS-AIDSS-2008-SchmidtV #reasoning- Using Case-Based Reasoning to Explain Exceptional Cases (RS, OV), pp. 119–124.
ICEIS-AIDSS-2008-TsengKH #approach #assembly- A Decision Support System for Integrated Assembly and Disassembly Planning Using a GA Approach (YJT, HTK, FYH), pp. 348–355.
ICEIS-DISI-2008-MoraGRPBGCR #metric #qvt- Software Measurement by Using QVT Transformations in an MDA Context (BM, FG, FR, MP, AB, AG, JÁC, IR), pp. 117–124.
ICEIS-HCI-2008-LeivaCGA #development #maintenance #workflow- A Cooperative Method for System Development and Maintenance Using Workflow Technologies (JLL, JLC, AG, MAA), pp. 130–135.
ICEIS-HCI-2008-MordechaiFD #interface #named #taxonomy- TTLS: A Grouped Display of Search Results Based on Organizational Taxonomy Using the LCC&K Interface (VM, AJF, OD), pp. 47–53.
ICEIS-ISAS1-2008-GullaBK #concept #ontology- Using Association Rules to Learn Concept Relationships in Ontologies (JAG, TB, GSK), pp. 58–65.
ICEIS-ISAS1-2008-LoewensternS #lifecycle- IT Service Management of Using Heterogeneous, Dynamically Alterable Configuration Item Lifecycles (DL, LS), pp. 155–160.
ICEIS-ISAS2-2008-BrunetSLG #modelling- Using Variants in KAOS Goal Modelling (JB, FS, RL, CG), pp. 339–344.
ICEIS-ISAS2-2008-PivetaMPAGP #process #ranking #refactoring- Ranking Refactoring Patterns Using the Analytical Hierarchy Process (EKP, AMDM, MSP, JA, PG, RTP), pp. 195–200.
ICEIS-ISAS2-2008-Prpitsch #process- From Process to Software Systems’ Service — Using a Layered Model to Connect Technical and Process-related Views (CP), pp. 298–304.
ICEIS-J-2008-PapatheocharousA08a #algorithm #approach #hybrid #modelling #network #predict #search-based- Hybrid Computational Models for Software Cost Prediction: An Approach Using Artificial Neural Networks and Genetic Algorithms (EP, ASA), pp. 87–100.
ICEIS-SAIC-2008-BaguesBBGI #communication #protocol #semantics- Use of Semantic Technology to Describe and Reason about Communication Protocols (MIB, IB, JB, AG, AI), pp. 67–72.
ICEIS-SAIC-2008-BoukadiGV #aspect-oriented #collaboration #enterprise- Enhancing Enterprise Collaboration Using Context-Aware Service Based on Aspects (KB, CG, LV), pp. 29–36.
ICEIS-SAIC-2008-BrockeTW #e-commerce #mobile- Making Use of Mobile Devices in E-Commerce — Overcoming Organizational Barriers through User Participation (JvB, BT, DW), pp. 168–173.
ICEIS-SAIC-2008-DAgostiniFDG #semantics- Contextual Semantic Search — Capturing, using the User’s Context to Direct Semantic Search (CSD, RF, MARD, FAOG), pp. 154–159.
ICEIS-SAIC-2008-KangasharjuK #data transfer #mobile #xml- Using Bit-Efficient XML to Optimize Data Transfer of XForms-Based Mobile Services (JK, OK), pp. 5–11.
ICEIS-SAIC-2008-RanW #adaptation #metric #performance- Develop Adaptive Workplace E-Learning Environments by Using Performance Measurement Systems (WR, MW), pp. 142–147.
ICEIS-SAIC-2008-StellerKCNL #approach #pervasive #reasoning #semantics- A Weighted Approach for Optimised Reasoning for Pervasive Service Discovery Using Semantics and Context (LS, SK, SC, JN, SWL), pp. 113–118.
CIKM-2008-BaoYFXSY #social- Boosting social annotations using propagation (SB, BY, BF, SX, ZS, YY), pp. 1507–1508.
CIKM-2008-BarskySTU - A new method for indexing genomes using on-disk suffix trees (MB, US, AT, CU), pp. 649–658.
CIKM-2008-BroderCFGJR #feedback #web- Search advertising using web relevance feedback (AZB, PC, MF, EG, VJ, LR), pp. 1013–1022.
CIKM-2008-ChanLY #logic #modelling- Coreference resolution using expressive logic models (KC, WL, XY), pp. 1373–1374.
CIKM-2008-DaoudTB #graph #ontology #personalisation- Using a graph-based ontological user profile for personalizing search (MD, LTL, MB), pp. 1495–1496.
CIKM-2008-HuangS #markov #query- A latent variable model for query expansion using the hidden markov model (QH, DS), pp. 1417–1418.
CIKM-2008-MahouiTSC #identification #modelling #predict- Identification of gene function using prediction by partial matching (PPM) language models (MM, WJT, AKTS, SC), pp. 779–786.
CIKM-2008-MaYLK #mining #network #process #social- Mining social networks using heat diffusion processes for marketing candidates selection (HM, HY, MRL, IK), pp. 233–242.
CIKM-2008-MaYLK08a #matrix #named #probability #recommendation #social- SoRec: social recommendation using probabilistic matrix factorization (HM, HY, MRL, IK), pp. 931–940.
CIKM-2008-MeiZC #query- Query suggestion using hitting time (QM, DZ, KWC), pp. 469–478.
CIKM-2008-QuMG #network #semantics- Using tag semantic network for keyphrase extraction in blogs (LQ, CM, IG), pp. 1381–1382.
CIKM-2008-RahurkarC - Using the current browsing context to improve search relevance (MR, SC), pp. 1493–1494.
CIKM-2008-RaviP #scalability- Using structured text for large-scale attribute extraction (SR, MP), pp. 1183–1192.
CIKM-2008-RosenfeldFU #classification #sequence #web- Using sequence classification for filtering web pages (BR, RF, LHU), pp. 1355–1356.
CIKM-2008-SeoC - Blog site search using resource selection (JS, WBC), pp. 1053–1062.
CIKM-2008-ShiNC - Relating dependent indexes using dempster-shafer theory (LS, JYN, GC), pp. 429–438.
CIKM-2008-VinayMC #effectiveness #rank #retrieval- Estimating retrieval effectiveness using rank distributions (VV, NMF, IJC), pp. 1425–1426.
CIKM-2008-WangZRM #automation #online #ranking #topic- Automatic online news topic ranking using media focus and user attention based on aging theory (CW, MZ, LR, SM), pp. 1033–1042.
CIKM-2008-XinLTL #comprehension #random- Academic conference homepage understanding using constrained hierarchical conditional random fields (XX, JL, JT, QL), pp. 1301–1310.
CIKM-2008-XuDW #query #wiki- Entity-based query reformulation using wikipedia (YX, FD, BW), pp. 1441–1442.
ECIR-2008-AbdullahG #approach #usability- Using a Task-Based Approach in Evaluating the Usability of BoBIs in an E-book Environment (NA, FG), pp. 246–257.
ECIR-2008-AyacheQ #corpus #learning #video- Video Corpus Annotation Using Active Learning (SA, GQ), pp. 187–198.
ECIR-2008-CloughR #design #image #visualisation- Key Design Issues with Visualising Images Using Google Earth (PDC, SR), pp. 570–574.
ECIR-2008-EidoonYO #ontology- Ontology Matching Using Vector Space (ZE, NY, FO), pp. 472–481.
ECIR-2008-HeLR #metric #predict #query- Using Coherence-Based Measures to Predict Query Difficulty (JH, ML, MdR), pp. 689–694.
ECIR-2008-HuangBCQ #image #network #retrieval #web- Improving Web Image Retrieval Using Image Annotations and Inference Network (PH, JB, CC, GQ), pp. 617–621.
ECIR-2008-LillisTCD #data fusion #probability- Extending Probabilistic Data Fusion Using Sliding Windows (DL, FT, RWC, JD), pp. 358–369.
ECIR-2008-NaKL08c #probability #similarity- Query-Based Inter-document Similarity Using Probabilistic Co-relevance Model (SHN, ISK, JHL), pp. 684–688.
ECIR-2008-NunesRD #web- Use of Temporal Expressions in Web Search (SN, CR, GD), pp. 580–584.
ECIR-2008-RitchieTR #information retrieval- Using Terms from Citations for IR: Some First Results (AR, ST, SR), pp. 211–221.
ECIR-2008-ScholerSBT - Using Clicks as Implicit Judgments: Expectations Versus Observations (FS, MS, BB, AT), pp. 28–39.
ECIR-2008-SongHRB #composition #mining #modelling #multi #query- Facilitating Query Decomposition in Query Language Modeling by Association Rule Mining Using Multiple Sliding Windows (DS, QH, SMR, PB), pp. 334–345.
ECIR-2008-ValletHJ #evaluation #graph #recommendation- Use of Implicit Graph for Recommending Relevant Videos: A Simulated Evaluation (DV, FH, JMJ), pp. 199–210.
ECIR-2008-ZhaoST #effectiveness #performance #predict #query #similarity #variability- Effective Pre-retrieval Query Performance Prediction Using Similarity and Variability Evidence (YZ, FS, YT), pp. 52–64.
ICML-2008-DoshiPR #learning- Reinforcement learning with limited reinforcement: using Bayes risk for active learning in POMDPs (FD, JP, NR), pp. 256–263.
ICML-2008-KirshnerP #dependence- ICA and ISA using Schweizer-Wolff measure of dependence (SK, BP), pp. 464–471.
ICML-2008-LarochelleB #classification #strict- Classification using discriminative restricted Boltzmann machines (HL, YB), pp. 536–543.
ICML-2008-SahbiARK #kernel #recognition #robust- Robust matching and recognition using context-dependent kernels (HS, JYA, JR, RK), pp. 856–863.
ICML-2008-SalakhutdinovM08a #markov #matrix #monte carlo #probability- Bayesian probabilistic matrix factorization using Markov chain Monte Carlo (RS, AM), pp. 880–887.
ICML-2008-ShiBY #learning #modelling- Data spectroscopy: learning mixture models using eigenspaces of convolution operators (TS, MB, BY), pp. 936–943.
ICML-2008-SyedBS #learning #linear #programming- Apprenticeship learning using linear programming (US, MHB, RES), pp. 1032–1039.
ICML-2008-Tieleman #approximate #strict- Training restricted Boltzmann machines using approximations to the likelihood gradient (TT), pp. 1064–1071.
ICML-2008-WangM #analysis- Manifold alignment using Procrustes analysis (CW, SM), pp. 1120–1127.
ICML-2008-YueJ #predict #set- Predicting diverse subsets using structural SVMs (YY, TJ), pp. 1224–1231.
ICPR-2008-Abd-AlmageedASD #classification #hybrid- Document-zone classification using partial least squares and hybrid classifiers (WAA, MA, WS, DSD), pp. 1–4.
ICPR-2008-AgrisBK #adaptation #agile #approach #recognition- Rapid signer adaptation for continuous sign language recognition using a combined approach of eigenvoices, MLLR, and MAP (UvA, CB, KFK), pp. 1–4.
ICPR-2008-AmanoK #feedback- Appearance enhancement using a projector-camera feedback system (TA, HK), pp. 1–4.
ICPR-2008-Baradarani #segmentation- Moving object segmentation using the 9/7-10/8 dual-tree complex filter bank (AB), pp. 1–4.
ICPR-2008-BarratT #effectiveness #image #network #retrieval #semantics #visual notation- Visual features with semantic combination using Bayesian network for a more effective image retrieval (SB, ST), pp. 1–4.
ICPR-2008-BazinKDV #image- Improvement of feature matching in catadioptric images using gyroscope data (JCB, IK, CD, PV), pp. 1–5.
ICPR-2008-CamposJ #constraints #learning #network #parametricity- Improving Bayesian Network parameter learning using constraints (CPdC, QJ), pp. 1–4.
ICPR-2008-ChakrabortyE #constraints #invariant #locality- Object localization using affine invariant substructure constraints (IC, AME), pp. 1–5.
ICPR-2008-ChamaretM #validation #video- Attention-based video reframing: Validation using eye-tracking (CC, OLM), pp. 1–4.
ICPR-2008-ChandraS - A method for removing cyclic artefacts in discrete tomography using latin squares (SC, IDS), pp. 1–4.
ICPR-2008-ChangLAH #clique #clustering #constraints- Unsupervised clustering using hyperclique pattern constraints (YC, DJL, JKA, YH), pp. 1–4.
ICPR-2008-ChangLAH08a #collaboration #image #learning- Using collaborative learning for image contrast enhancement (YC, DJL, JKA, YH), pp. 1–4.
ICPR-2008-ChenCW #higher-order #named #performance- HOPS: Efficient region labeling using Higher Order Proxy Neighborhoods (AYCC, JJC, LW), pp. 1–4.
ICPR-2008-ChenSXS #algorithm #identification #search-based- Computer graphics identification using genetic algorithm (WC, YQS, GX, WS), pp. 1–4.
ICPR-2008-ChenZP #segmentation- Unsupervised dynamic texture segmentation using local spatiotemporal descriptors (JC, GZ, MP), pp. 1–4.
ICPR-2008-CheongL #approach #image #matrix #multi #orthogonal #recognition- An approach to texture-based image recognition by deconstructing multispectral co-occurrence matrices using Tchebichef orthogonal polynomials (MCYC, KSL), pp. 1–4.
ICPR-2008-ChoB #dependence #image- Image inpainting using wavelet-based inter- and intra-scale dependency (DC, TDB), pp. 1–4.
ICPR-2008-ChoiMSH #analysis- Quantitative analysis of Iaido proficiency by using motion data (WC, SM, HS, KH), pp. 1–4.
ICPR-2008-ChuangHFH #detection #multi- Monocular multi-human detection using Augmented Histograms of Oriented Gradients (CHC, SSH, LCF, PYH), pp. 1–4.
ICPR-2008-DehzangiMCL #classification #fuzzy #learning #speech- Fuzzy rule selection using Iterative Rule Learning for speech data classification (OD, BM, CES, HL), pp. 1–4.
ICPR-2008-DonoserB #matrix #segmentation- Using covariance matrices for unsupervised texture segmentation (MD, HB), pp. 1–4.
ICPR-2008-EmmsHW #graph #quantum- Graph drawing using quantum commute time (DE, ERH, RCW), pp. 1–4.
ICPR-2008-FabletLSMCB #learning- Weakly supervised learning using proportion-based information: An application to fisheries acoustics (RF, RL, CS, JM, PC, JMB), pp. 1–4.
ICPR-2008-FengGDJ #retrieval- Motion capture data retrieval using an artist’s doll (TCF, PG, JD, BJ), pp. 1–4.
ICPR-2008-FerrerVSRB #algorithm #approximate #graph- An approximate algorithm for median graph computation using graph embedding (MF, EV, FS, KR, HB), pp. 1–4.
ICPR-2008-GatosPP #adaptation #documentation #image #multi- Improved document image binarization by using a combination of multiple binarization techniques and adapted edge information (BG, IP, SJP), pp. 1–4.
ICPR-2008-GhoshM #classification #documentation #kernel #similarity #xml- Combining content and structure similarity for XML document classification using composite SVM kernels (SG, PM), pp. 1–4.
ICPR-2008-GongC #graph #learning #online #optimisation #realtime #segmentation- Real-time foreground segmentation on GPUs using local online learning and global graph cut optimization (MG, LC), pp. 1–4.
ICPR-2008-Gonzalez-AguirreABD #geometry #graph #modelling #self #visual notation- Model-based visual self-localization using geometry and graphs (DIGA, TA, EBC, RD), pp. 1–5.
ICPR-2008-GuehamBC #automation #classification #correlation #forensics- Automatic classification of partial shoeprints using Advanced Correlation Filters for use in forensic science (MG, AB, DC), pp. 1–4.
ICPR-2008-GuimaraesPP #approach #detection #difference #distance #graph #video- An approach for video cut detection using bipartite graph matching as dissimilarity distance (SJFG, ZKGdPJ, HBdP), pp. 1–4.
ICPR-2008-GuoYZZY #embedded #markov #random- Face super-resolution using 8-connected Markov Random Fields with embedded prior (KG, XY, RZ, GZ, SY), pp. 1–4.
ICPR-2008-HahnKW #3d #algorithm #estimation- Spatio-temporal 3D pose estimation and tracking of human body parts using the Shape Flow algorithm (MH, LK, CW), pp. 1–4.
ICPR-2008-HainesW #random- Combining shape-from-shading and stereo using Gaussian-Markov random fields (TSFH, RCW), pp. 1–4.
ICPR-2008-HanYJ #evaluation #online- Online feature evaluation for object tracking using Kalman Filter (ZH, QY, JJ), pp. 1–4.
ICPR-2008-HidakaK #feature model #optimisation- Non-Neighboring Rectangular Feature selection using Particle Swarm Optimization (AH, TK), pp. 1–4.
ICPR-2008-HortaMF #algorithm #clustering #comparison #image- A comparison of clustering fully polarimetric SAR images using SEM algorithm and G0P mixture modelwith different initializations (MMH, NDAM, ACF), pp. 1–4.
ICPR-2008-HossainMJY #adaptation #identification #invariant- Clothes-invariant gait identification using part-based adaptive weight control (MAH, YM, WJ, YY), pp. 1–4.
ICPR-2008-HsiaoCC #recognition- Human action recognition using temporal-state shape contexts (PCH, CSC, LWC), pp. 1–4.
ICPR-2008-HuangST #detection #video- Detecting moving text in video using temporal information (WH, PS, CLT), pp. 1–4.
ICPR-2008-HuAS08a #learning- Learning motion patterns in crowded scenes using motion flow field (MH, SA, MS), pp. 1–5.
ICPR-2008-HuSM #categorisation #clustering- Categorization using semi-supervised clustering (JH, MS, AM), pp. 1–4.
ICPR-2008-IbrahimG #online #verification- On-line signature verification by using most discriminating points (MTI, LG), pp. 1–4.
ICPR-2008-Ilic #recognition- Object labeling for recognition using vocabulary trees (SI), pp. 1–4.
ICPR-2008-IzadiS #robust- Robust region-based background subtraction and shadow removing using color and gradient information (MI, PS), pp. 1–5.
ICPR-2008-JiaDQA #3d #estimation #metric- Directionality measurement and illumination estimation of 3D surface textures by using mojette transform (PJ, JD, LQ, FA), pp. 1–4.
ICPR-2008-KaholV #analysis #modelling #process- Hand motion expertise analysis using dynamic hierarchical activity modeling and isomap (KK, MV), pp. 1–4.
ICPR-2008-KangKNN #image #multi #recognition #segmentation- Multiband image segmentation and object recognition using texture filter banks (YK, KK, TN, YN), pp. 1–4.
ICPR-2008-KarnickMP #approach #classification #concept #incremental #learning #multi- Incremental learning in non-stationary environments with concept drift using a multiple classifier based approach (MTK, MM, RP), pp. 1–4.
ICPR-2008-KashimaHRS #clustering #distance- K-means clustering of proportional data using L1 distance (HK, JH, BKR, MS), pp. 1–4.
ICPR-2008-KasuyaKKO #estimation #robust- Robust trajectory estimation of soccer players by using two cameras (NK, IK, YK, YO), pp. 1–4.
ICPR-2008-KatayamaUS #coordination #online #recognition- A new HMM for on-line character recognition using pen-direction and pen-coordinate features (YK, SU, HS), pp. 1–4.
ICPR-2008-KazuiMMF #detection #matrix- Incoherent motion detection using a time-series Gram matrix feature (MK, MM, SM, HF), pp. 1–5.
ICPR-2008-KimS #consistency #detection #sequence #video- Static text region detection in video sequences using color and orientation consistencies (DK, KS), pp. 1–4.
ICPR-2008-Kita #case study #detection #image- A study of change detection from satellite images using joint intensity histogram (YK), pp. 1–4.
ICPR-2008-KleinLM - Preceding car tracking using belief functions and a particle filter (JK, CL, PM), pp. 1–4.
ICPR-2008-KonKAT #adaptation #detection #interactive #realtime- Adaptive habituation detection to build human computer interactive systems using a real-time cross-modal computation (MK, TK, KA, HT), pp. 1–4.
ICPR-2008-LachezeB #image #locality- Image sampling for localization using entropy (LL, RB), pp. 1–4.
ICPR-2008-LeeWN #detection #performance- Very fast ellipse detection using GPU-based RHT (JKL, BAW, TSN), pp. 1–4.
ICPR-2008-LiDM #feature model #learning #locality- Localized feature selection for Gaussian mixtures using variational learning (YL, MD, YM), pp. 1–4.
ICPR-2008-LinG #infinity- Depth recovery using defocus blur at infinity (HYL, KDG), pp. 1–4.
ICPR-2008-LiuS08a #detection #robust- Robust outdoor text detection using text intensity and shape features (ZL, SS), pp. 1–4.
ICPR-2008-LiYWS #invariant- Bi-model tracking of object of interest using invariant spatiogram descriptor (JL, WYY, JGW, WS), pp. 1–4.
ICPR-2008-Machucho-CadenaCB - Rendering of brain tumors using endoneurosonography (RMC, SdlCR, EBC), pp. 1–4.
ICPR-2008-MakiHM #image- Tracking features on a moving object using local image bases (AM, YH, TM), pp. 1–5.
ICPR-2008-MandalW #recognition- Face recognition using curvelet based PCA (TM, QMJW), pp. 1–4.
ICPR-2008-MaruyamaKYT #3d #locality- 3D object localization based on occluding contour using STL CAD model (KM, YK, TY, FT), pp. 1–4.
ICPR-2008-MeiS #image #parametricity #statistics- Unsupervised image embedding using nonparametric statistics (GM, CRS), pp. 1–4.
ICPR-2008-MirzaeiR #clustering #transitive- Combining hierarchical clusterings using min-transitive closure (AM, MR), pp. 1–4.
ICPR-2008-MohantaSC #detection #multi- Detection of representative frames of a shot using multivariate Wald-Wolfowitz test (PPM, SKS, BC), pp. 1–4.
ICPR-2008-MooreSLD #image #segmentation #top-down- Top down image segmentation using congealing and graph-cut (DM, JS, SL, BAD), pp. 1–4.
ICPR-2008-MunizCR #classification #independence- Use of band ratioing for building illumination independent texture classification systems (RM, JAC, MRS), pp. 1–4.
ICPR-2008-MuraiF #bound #detection #video- Shot boundary detection using co-occurrence of global motion in video stream (YM, HF), pp. 1–4.
ICPR-2008-OkaKXLW #authentication #named #similarity #sketching- Scribble-a-Secret: Similarity-based password authentication using sketches (MO, KK, YX, LL, FW), pp. 1–4.
ICPR-2008-OnishiTA #3d #estimation #image- 3D human posture estimation using the HOG features from monocular image (KO, TT, YA), pp. 1–4.
ICPR-2008-PaclikLND #analysis #estimation #multi- Variance estimation for two-class and multi-class ROC analysis using operating point averaging (PP, CL, JN, RPWD), pp. 1–4.
ICPR-2008-PalaioB #adaptation #multi- Multi-object tracking using an adaptive transition model particle filter with region covariance data association (HP, JB), pp. 1–4.
ICPR-2008-PanBS #detection #image #representation- Text detection from scene images using sparse representation (WP, TDB, CYS), pp. 1–5.
ICPR-2008-PengXXD #recognition- Face recognition using anisotropic dual-tree complex wavelet packets (YP, XX, WX, QD), pp. 1–4.
ICPR-2008-PohK #authentication #bound #fault #multimodal #on the- On using error bounds to optimize cost-sensitive multimodal biometric authentication (NP, JK), pp. 1–4.
ICPR-2008-RebiereAD #image- Image mosaicing using local optical flow registration (NR, MFAF, FD), pp. 1–5.
ICPR-2008-Rokui - Tree-structure lossless coding using intervector angle (JR), pp. 1–4.
ICPR-2008-RyooA #fuzzy #nondeterminism #process- Human activities: Handling uncertainties using fuzzy time intervals (MSR, JKA), pp. 1–5.
ICPR-2008-SahaB #clustering #multi #symmetry- A new multiobjective simulated annealing based clustering technique using stability and symmetry (SS, SB), pp. 1–4.
ICPR-2008-SanromaSA #clique #graph- Improving the matching of graphs generated from shapes by the use of procrustes distances into a clique-based MAP formulation (GS, FS, RA), pp. 1–4.
ICPR-2008-SekiH #3d #multi #realtime- Real-time 3D tracking using multiple sample points (AS, HH), pp. 1–4.
ICPR-2008-ShenCH #image #retrieval- Face image retrieval by using Haar features (BCS, CSC, HHH), pp. 1–4.
ICPR-2008-ShenCLB #random- Stereo matching using random walks (RS, IC, XL, AB), pp. 1–4.
ICPR-2008-ShenZL #detection #higher-order #programming- Deformable surface stereo tracking-by-detection using Second Order Cone Programming (SS, YZ, YL), pp. 1–4.
ICPR-2008-ShinK #algorithm- Enhanced Resolution-aware Fitting algorithm using interpolation operator (JS, DK), pp. 1–4.
ICPR-2008-ShivakumaraHT #detection #performance #video- Efficient video text detection using edge features (PS, WH, CLT), pp. 1–4.
ICPR-2008-SinghNGBSP #hybrid #random- Hybrid SVM — Random Forest classication system for oral cancer screening using LIF spectra (RKS, SKN, LG, SB, CS, KMP), pp. 1–4.
ICPR-2008-Stelldinger #re-engineering- Topologically correct surface reconstruction using alpha shapes and relations to ball-pivoting (PS), pp. 1–4.
ICPR-2008-SugaFTA #graph #recognition #segmentation- Object recognition and segmentation using SIFT and Graph Cuts (AS, KF, TT, YA), pp. 1–4.
ICPR-2008-SugimotoO #array #image #synthesis- Virtual focusing image synthesis for user-specified image region using camera array (SS, MO), pp. 1–4.
ICPR-2008-SukumarBPKA #locality #multi #nondeterminism- Uncertainty minimization in multi-sensor localization systems using model selection theory (SRS, HB, DLP, AK, MAA), pp. 1–4.
ICPR-2008-SuS #generative #modelling- Generative models for fingerprint individuality using ridge models (CS, SNS), pp. 1–4.
ICPR-2008-SuzukiSZ #network- Supervised enhancement of lung nodules by use of a massive-training artificial neural network (MTANN) in computer-aided diagnosis (CAD) (KS, ZS, JZ), pp. 1–4.
ICPR-2008-TaketomiSY #database #estimation #realtime- Real-time camera position and posture estimation using a feature landmark database with priorities (TT, TS, NY), pp. 1–4.
ICPR-2008-ThomeeHBL #retrieval- Using an artificial imagination for texture retrieval (BT, MJH, EMB, MSL), pp. 1–4.
ICPR-2008-Trujillo-RomeroD #pseudo- Registration by using a pseudo color attribute (FTR, MD), pp. 1–4.
ICPR-2008-TsolakisFD #framework #performance- A framework for efficient correspondence using feature interrelations (AGT, MF, AD), pp. 1–4.
ICPR-2008-TsuchiyaF #feature model- A method of feature selection using contribution ratio based on boosting (MT, HF), pp. 1–4.
ICPR-2008-UedaT #locality #on the #scalability- On the scalability of robot localization using high-dimensional features (TU, KT), pp. 1–4.
ICPR-2008-UkitaKK - IBR-based free-viewpoint imaging of a complex scene using few cameras (NU, SK, MK), pp. 1–4.
ICPR-2008-VajariaSK #multi #retrieval- Clip retrieval using multi-modal biometrics in meeting archives (HV, SS, RK), pp. 1–4.
ICPR-2008-Vega-PonsRV #algorithm #segmentation #set- Active contour algorithm for texture segmentation using a texture feature set (SVP, JLGR, OLV), pp. 1–4.
ICPR-2008-WachenfeldTJ #recognition #robust- Robust recognition of 1-D barcodes using camera phones (SW, ST, XJ), pp. 1–4.
ICPR-2008-WangC #classification #semantics- Film shot classification using directing semantics (HLW, LFC), pp. 1–4.
ICPR-2008-WangM #invariant #probability #recognition #similarity- Scale invariant face recognition using probabilistic similarity measure (ZW, ZM), pp. 1–4.
ICPR-2008-WangTHW #bound- Object boundary extraction using Active B-Snake Model (YW, EKT, ZH, JGW), pp. 1–4.
ICPR-2008-WatanabeIHY #algorithm #performance #reduction #video- A fast algorithm of video super-resolution using dimensionality reduction by DCT and example selection (KW, YI, TH, MY), pp. 1–5.
ICPR-2008-WetzkerPKBAM #detection #generative #probability #roadmap #social- Detecting trends in social bookmarking systems using a probabilistic generative model and smoothing (RW, TP, AK, CB, TA, FM), pp. 1–4.
ICPR-2008-WongCF #adaptation #image- Phase-adaptive image signal fusion using complex-valued wavelets (AW, DAC, PWF), pp. 1–4.
ICPR-2008-WuF #3d #classification #learning #multi- Multiple view based 3D object classification using ensemble learning of local subspaces (JW, KF), pp. 1–4.
ICPR-2008-XiaoL #higher-order- Improvement on Mean Shift based tracking using second-order information (LX, PL), pp. 1–4.
ICPR-2008-XiaoWH #graph #invariant #recognition- Object recognition using graph spectral invariants (XB, RCW, ERH), pp. 1–4.
ICPR-2008-YamaguchiWNN #estimation #image #sequence- Road region estimation using a sequence of monocular images (KY, AW, TN, YN), pp. 1–4.
ICPR-2008-YangB #algorithm #fault #sketching- Curve fitting algorithm using iterative error minimization for sketch beautification (JY, HB), pp. 1–4.
ICPR-2008-YangQ #analysis #component #detection #independence #network- A network intrusion detection method using independent component analysis (DY, HQ), pp. 1–4.
ICPR-2008-YangYWY #fuzzy #recognition- Face recognition using Complete Fuzzy LDA (WY, HY, JW, JY), pp. 1–4.
ICPR-2008-YanZ #correlation #multimodal- Multimodal biometrics fusion using Correlation Filter Bank (YY, YJZ), pp. 1–4.
ICPR-2008-YaoADTHM - Computer-aided grading of lymphangioleiomyomatosis (LAM) using HRCT (JY, NA, AD, AMTD, OMH, JM), pp. 1–4.
ICPR-2008-YaoCAPKA #probability- Sensor planning for PTZ cameras using the probability of camera overload (YY, CHC, BRA, DLP, AK, MAA), pp. 1–5.
ICPR-2008-YenCWWC #video- A scene-based video watermarking technique using SVMs (SHY, HWC, CJW, PSPW, MCC), pp. 1–4.
ICPR-2008-YiAC #invariant #kernel- Orientation and scale invariant mean shift using object mask-based kernel (KMY, HSA, JYC), pp. 1–4.
ICPR-2008-YingZ #detection #performance- Efficient detection of projected concentric circles using four intersection points on a secant line (XY, HZ), pp. 1–4.
ICPR-2008-ZareG #detection #process- Endmember detection using the Dirichlet process (AZ, PDG), pp. 1–4.
ICPR-2008-ZhangYDG #recognition- Handwritten Chinese character recognition using Local Discriminant Projection with Prior Information (HZ, JY, WD, JG), pp. 1–4.
ICPR-2008-ZhaoG #multi #recognition- Establishing point correspondence using multidirectional binary pattern for face recognition (SZ, YG), pp. 1–4.
ICPR-2008-ZhongYSCG #clustering- Hierarchical background subtraction using local pixel clustering (BZ, HY, SS, XC, WG), pp. 1–4.
ICPR-2008-ZhouWS #classification #process #recognition- Human motion recognition using Gaussian Processes classification (HZ, LW, DS), pp. 1–4.
ICPR-2008-ZhuangZHH #estimation #markov- Face age estimation using patch-based hidden Markov model supervectors (XZ, XZ, MHJ, TSH), pp. 1–4.
ICPR-2008-ZitouniSOD #algorithm #graph #image #ranking #web- Re-ranking of web image search results using a graph algorithm (HZ, SGS, DO, PD), pp. 1–4.
KDD-2008-CaroCS - Using tagflake for condensing navigable tag hierarchies from tag clouds (LDC, KSC, MLS), pp. 1069–1072.
KDD-2008-ChowGS #detection #privacy- Detecting privacy leaks using corpus-based association rules (RC, PG, JS), pp. 893–901.
KDD-2008-Christen #automation #classification #nearest neighbour- Automatic record linkage using seeded nearest neighbour and support vector machine classification (PC), pp. 151–159.
KDD-2008-GallagherTEF #classification #network- Using ghost edges for classification in sparsely labeled networks (BG, HT, TER, CF), pp. 256–264.
KDD-2008-GrossmanG #data mining #mining #performance- Data mining using high performance data clouds: experimental studies using sector and sphere (RLG, YG), pp. 920–927.
KDD-2008-HallSM #dependence- Unsupervised deduplication using cross-field dependencies (RH, CAS, AM), pp. 310–317.
KDD-2008-HoT #automation #multi- Automated cyclone discovery and tracking using knowledge sharing in multiple heterogeneous satellite data (SSH, AT), pp. 928–936.
KDD-2008-KoenigsteinST #analysis #query #string- Spotting out emerging artists using geo-aware analysis of P2P query strings (NK, YS, TT), pp. 937–945.
KDD-2008-LaxmanTW #generative #modelling #predict #sequence- Stream prediction using a generative model based on frequent episodes in event sequences (SL, VT, RWW), pp. 453–461.
KDD-2008-MelvilleRL #modelling #web- Customer targeting models using actively-selected web content (PM, SR, RDL), pp. 946–953.
KDD-2008-SarmaGI #query- Bypass rates: reducing query abandonment using negative inferences (ADS, SG, SI), pp. 177–185.
KDD-2008-SatoYN #graph #information management #parametricity #semantics #word- Knowledge discovery of semantic relationships between words using nonparametric bayesian graph model (IS, MY, HN), pp. 587–595.
KDD-2008-ShengPI #data mining #mining #multi #quality- Get another label? improving data quality and data mining using multiple, noisy labelers (VSS, FJP, PGI), pp. 614–622.
KDD-2008-WangD #classification #kernel #semantics #wiki- Building semantic kernels for text classification using wikipedia (PW, CD), pp. 713–721.
KDD-2008-YuJ #kernel- Training structural svms with kernels using sampled cuts (CNJY, TJ), pp. 794–802.
KDD-2008-ZengMLBM #analysis #predict- Using predictive analysis to improve invoice-to-cash collection (SZ, PM, CAL, IMBM, CM), pp. 1043–1050.
KR-2008-DohertyS #reasoning- Reasoning with Qualitative Preferences and Cardinalities using Generalized Circumscription (PD, AS), pp. 560–570.
KR-2008-MotikGHS #graph #representation- Representing Structured Objects using Description Graphs (BM, BCG, IH, US), pp. 296–306.
RecSys-2008-BogersB #recommendation- Recommending scientific articles using citeulike (TB, AvdB), pp. 287–290.
RecSys-2008-KagieWG #difference- Choosing attribute weights for item dissimilarity using clikstream data with an application to a product catalog map (MK, MCvW, PJFG), pp. 195–202.
RecSys-2008-Kwon #rating #recommendation- Improving top-n recommendation techniques using rating variance (YK), pp. 307–310.
RecSys-2008-ShepitsenGMB #clustering #personalisation #recommendation #social- Personalized recommendation in social tagging systems using hierarchical clustering (AS, JG, BM, RDB), pp. 259–266.
RecSys-2008-ZanardiC #ranking #recommendation #social- Social ranking: uncovering relevant content using tag-based recommender systems (VZ, LC), pp. 51–58.
SEKE-2008-AssawamekinSP #automation #multi #ontology #requirements #traceability- Automated Multiperspective Requirements Traceability Using Ontology Matching Technique (NA, TS, CP), pp. 460–465.
SEKE-2008-BalushiSPCL #identification #ontology #quality- Identifying NFRs Conflicts Using Quality Ontology (THAB, PRFS, MP, ÓC, PL), pp. 929–934.
SEKE-2008-Barros #information management #predict- Predicting Software Project Size Using Project Generated Information (MdOB), pp. 149–154.
SEKE-2008-BrandlFW #modelling #reasoning #testing- Coverage-based Testing Using Qualitative Reasoning Models (HB, GF, FW), pp. 393–398.
SEKE-2008-CuiSXM #architecture #design #reuse- A Decision-centric Architecture Design Method Facilitating the Contextually Capture and Reuse of Design Knowledge (XC, YS, SX, HM), pp. 321–326.
SEKE-2008-DasguptaEFKSV #design #fault tolerance #grid #standard- Design of a Fault-tolerant Job-flow Manager for Grid Environments Using Standard Technologies, Job-flow Patterns, and a Transparent Proxy (GD, OE, LF, SK, SMS, BV), pp. 814–819.
SEKE-2008-DuZR #concept analysis #release planning- Explaining Product Release Planning Results Using Concept Analysis (GD, TZ, GR), pp. 137–142.
SEKE-2008-FilhoV #testing #web #web service #xml- Using XML Patterns to Guide Perturbation Based Testing of Web Services (PNCF, SRV), pp. 197–202.
SEKE-2008-FraserWW #automaton #testing- Using Observer Automata to Select Test Cases for Test Purposes (GF, MW, FW), pp. 709–714.
SEKE-2008-HittleG #fault #file system #injection #testing- Fault Injection Testing of User-space File Systems Using Traditional and Aspect-based Techniques (JH, SG), pp. 873–876.
SEKE-2008-KimBBSA #behaviour #named #visualisation- VisRFID: Visualizing Customer Behavior in Geotemporal Space Using RFID Technology (BK, KB, MB, RS, BA), pp. 422–427.
SEKE-2008-KornerG #automation #ontology- Improving Automatic Model Creation Using Ontologies (SJK, TG), pp. 691–696.
SEKE-2008-LucasSM #classification #personalisation #recommendation #towards- Comparing the Use of Traditional and Associative Classifiers towards Personalized Recommendations (JPL, SS, MNMG), pp. 607–612.
SEKE-2008-MahoneyE #monitoring- Using Scenario Monitoring to Address State Based Crosscutting Concerns (MM, TE), pp. 581–586.
SEKE-2008-MarquesMNF #approach #interface #ontology #semantics #web #web service- Active Ontologies — an Approach for Using Ontologies as Semantic Web Services Interfaces (TCM, MGM, JCCN, PPMF), pp. 847–852.
SEKE-2008-MuhlenfeldMMS #execution #modelling #ontology #process- Ontology-based Process Modeling and Execution Using STEP/EXPRESS (AM, WM, FM, MS), pp. 935–940.
SEKE-2008-ParkK #automaton #bound #constraints #lts #model checking- Using Boolean Cardinality Constraint for LTS Bounded Model Checking (SP, GK), pp. 537–542.
SEKE-2008-ReddyreddyX #xml- Securing Service-oriented Systems Using State-Based XML Firewall (AR, HX), pp. 512–518.
SEKE-2008-TekbacakTD #approach #certification #data access #security #semantics- A Semantic Based Certification and Access Control Approach Using Security Patterns on SEAGENT (FT, TT, OD), pp. 741–744.
SEKE-2008-ZhongYAF - Ontology-learning Supported Sematic Search Using Cooperative Agents (CZ, Z(Y, MA, BHF), pp. 123–128.
SIGIR-2008-BalogRW #modelling #retrieval- Bloggers as experts: feed distillation using expert retrieval models (KB, MdR, WW), pp. 753–754.
SIGIR-2008-Banerjee #classification #corpus #modelling #topic- Improving text classification accuracy using topic modeling over an additional corpus (SB), pp. 867–868.
SIGIR-2008-BenderskyK #graph #ranking- Re-ranking search results using document-passage graphs (MB, OK), pp. 853–854.
SIGIR-2008-BuscherDE #feedback #query- Query expansion using gaze-based feedback on the subdocument level (GB, AD, LvE), pp. 387–394.
SIGIR-2008-DingLLP #clustering #probability- Posterior probabilistic clustering using NMF (CHQD, TL, DL, WP), pp. 831–832.
SIGIR-2008-DruckMM #learning- Learning from labeled features using generalized expectation criteria (GD, GSM, AM), pp. 595–602.
SIGIR-2008-Gan #approach #query- Using a mediated query approach for matching unstructured query with structured resources (KHG), p. 895.
SIGIR-2008-GengLQALS #nearest neighbour #query #ranking- Query dependent ranking using K-nearest neighbor (XG, TYL, TQ, AA, HL, HYS), pp. 115–122.
SIGIR-2008-GuanWCBW #crawling #effectiveness #estimation #online #topic- Guide focused crawler efficiently and effectively using on-line topical importance estimation (ZG, CW, CC, JB, JW), pp. 757–758.
SIGIR-2008-HeMO #metric #retrieval- Retrieval sensitivity under training using different measures (BH, CM, IO), pp. 67–74.
SIGIR-2008-HeMO08a #ranking- Ranking opinionated blog posts using OpinionFinder (BH, CM, IO), pp. 727–728.
SIGIR-2008-JiangN #video #visual notation- Bag-of-visual-words expansion using visual relatedness for video indexing (YGJ, CWN), pp. 769–770.
SIGIR-2008-JohoHJ #documentation #summary- Emulating query-biased summaries using document titles (HJ, DH, JMJ), pp. 709–710.
SIGIR-2008-KapteinLHK #modelling #web- Using parsimonious language models on web data (RK, RL, DH, JK), pp. 763–764.
SIGIR-2008-PengL #analysis #evolution #topic- Author-topic evolution analysis using three-way non-negative Paratucker (WP, TL), pp. 819–820.
SIGIR-2008-TanWC #detection #sentiment- Combining learn-based and lexicon-based techniques for sentiment detection without using labeled examples (ST, YW, XC), pp. 743–744.
SIGIR-2008-TrieschniggMRK #concept #modelling- Measuring concept relatedness using language models (DT, EM, MdR, WK), pp. 823–824.
SIGIR-2008-VelosoAGM #learning #rank- Learning to rank at query-time using association rules (AV, HMdA, MAG, WMJ), pp. 267–274.
SIGIR-2008-WangH #documentation #retrieval- Improving biomedical document retrieval using domain knowledge (SW, MH), pp. 785–786.
SIGIR-2008-WanY #analysis #clustering #multi #summary- Multi-document summarization using cluster-based link analysis (XW, JY), pp. 299–306.
SIGIR-2008-YuZXG #categorisation #design #learning- trNon-greedy active learning for text categorization using convex ansductive experimental design (KY, SZ, WX, YG), pp. 635–642.
BX-2008-Hidaka1 #bidirectional #graph transformation- Bidirectional Graph Transformation using UnCAL (SH), p. 43.
ECMDA-FA-2008-BercoviciFW #architecture- From Business Architecture to SOA Realization Using MDD (AB, FF, AJW), pp. 381–392.
ECMDA-FA-2008-NogueraD #domain model #framework #modelling #validation- Annotation Framework Validation Using Domain Models (CN, LD), pp. 48–62.
ICMT-2008-VignagaPB #contract #interactive #model transformation- Extracting Object Interactions Out of Software Contracts Using Model Transformations (AV, DP, MCB), pp. 245–259.
MoDELS-2008-El-BoussaidiM #constraints #design #detection- Detecting Patterns of Poor Design Solutions Using Constraint Propagation (GEB, HM), pp. 189–203.
MoDELS-2008-OberCL #behaviour #composition #modelling #slicing- Behavioral Modelling and Composition of Object Slices Using Event Observation (IO, BC, YL), pp. 219–233.
MoDELS-2008-RosseboR #composition #policy #specification #uml- Specifying Service Composition Using UML 2.x and Composition Policies (JEYR, RKR), pp. 520–536.
MoDELS-2008-SinhaKPW #case study #modelling #requirements #validation- Requirements Modeling and Validation Using Bi-layer Use Case Descriptions (AS, MK, AMP, CW), pp. 97–112.
SPLC-2008-GustavssonA #embedded #flexibility #product line- Evaluating Flexibility in Embedded Automotive Product Lines Using Real Options (HG, JA), pp. 235–242.
SPLC-2008-HartmannT #diagrams #feature model #multi #product line #variability- Using Feature Diagrams with Context Variability to Model Multiple Product Lines for Software Supply Chains (HH, TT), pp. 12–21.
MoDELS-2008-El-BoussaidiM #constraints #design #detection- Detecting Patterns of Poor Design Solutions Using Constraint Propagation (GEB, HM), pp. 189–203.
MoDELS-2008-OberCL #behaviour #composition #modelling #slicing- Behavioral Modelling and Composition of Object Slices Using Event Observation (IO, BC, YL), pp. 219–233.
MoDELS-2008-RosseboR #composition #policy #specification #uml- Specifying Service Composition Using UML 2.x and Composition Policies (JEYR, RKR), pp. 520–536.
MoDELS-2008-SinhaKPW #case study #modelling #requirements #validation- Requirements Modeling and Validation Using Bi-layer Use Case Descriptions (AS, MK, AMP, CW), pp. 97–112.
TOOLS-EUROPE-2008-CohenGM #program transformation- Guarded Program Transformations Using JTL (TC, JYG, IM), pp. 100–120.
AdaEurope-2008-Evequoz #concurrent #performance #word- Practical, Fast and Simple Concurrent FIFO Queues Using Single Word Synchronization Primitives (CE), pp. 59–72.
PADL-2008-Marpons-UceroMCHMF #automation #consistency #logic programming- Automatic Coding Rule Conformance Checking Using Logic Programming (GMU, JMC, MC, ÁHN, JJMN, LÅF), pp. 18–34.
PEPM-2008-GillenwaterMSZTGO #hardware #static typing- Synthesizable high level hardware descriptions: using statically typed two-level languages to guarantee verilog synthesizability (JG, GM, CS, AYZ, WT, JG, JO), pp. 41–50.
PEPM-2008-ZhuK #library- Specialization for applications using shared libraries (PZ, SCK), pp. 159–168.
PLDI-2008-ChughVJL #analysis #concurrent #data flow #detection #source code- Dataflow analysis for concurrent programs using datarace detection (RC, JWV, RJ, SL), pp. 316–326.
POPL-2008-LahiriQ #precise #smt #verification- Back to the future: revisiting precise program verification using SMT solvers (SKL, SQ), pp. 171–182.
PPDP-2008-MoralesCH #automaton #generative- Comparing tag scheme variations using an abstract machine generator (JFM, MC, MVH), pp. 32–43.
PPDP-2008-PlasmeijerJKA #ajax #declarative #evaluation #workflow- Declarative Ajax and client side evaluation of workflows using iTasks (RP, JMJ, PWMK, PA), pp. 56–66.
QAPL-2008-Smith #abstract interpretation #imperative #probability #source code- Probabilistic Abstract Interpretation of Imperative Programs using Truncated Normal Distributions (MJAS), pp. 43–59.
SAS-2008-AllamigeonGG #invariant- Inferring Min and Max Invariants Using Max-Plus Polyhedra (XA, SG, EG), pp. 189–204.
SAS-2008-LalR #data flow #multi #query- Solving Multiple Dataflow Queries Using WPDSs (AL, TWR), pp. 93–109.
SAS-2008-PrabhuS #analysis #array #java #pointer- Field Flow Sensitive Pointer and Escape Analysis for Java Using Heap Array SSA (PP, PS), pp. 110–127.
SAS-2008-RamanathanSGJ #protocol- Protocol Inference Using Static Path Profiles (MKR, KS, AG, SJ), pp. 78–92.
SIGAda-2008-Moore #ada- A buffer container class hierarchy using Ada 2005 (BJM), pp. 57–74.
SIGAda-2008-SwardW #architecture #enterprise #multi- A multi-language service-oriented architecture using an enterprise service bus (RES, KJW), pp. 85–90.
RE-2008-Castro-HerreraDCM #data mining #elicitation #mining #process #recommendation #requirements #scalability- Using Data Mining and Recommender Systems to Facilitate Large-Scale, Open, and Inclusive Requirements Elicitation Processes (CCH, CD, JCH, BM), pp. 165–168.
RE-2008-FeatherHMU #analysis #deployment #requirements- Guiding Technology Deployment Decisions using a Quantitative Requirements Analysis Technique (MSF, KAH, RMM, SU), pp. 271–276.
RE-2008-MavinNWML #requirements- Using Scenarios to Discover Requirements for Engine Control Systems (AM, MN, PW, NAMM, PL), pp. 235–240.
RE-2008-RifautD #assessment #framework #quality #requirements- Using Goal-Oriented Requirements Engineering for Improving the Quality of ISO/IEC 15504 based Compliance Assessment Frameworks (AR, ED), pp. 33–42.
RE-2008-Szoke #automation #scheduling- A Proposed Method for Automated Project Scheduling using Goals and Scenarios (AS), pp. 339–340.
REFSQ-2008-SchlosserJM #database #requirements- Using a Creativity Workshop to Generate Requirements for an Event Database Application (CS, SJ, NAMM), pp. 109–122.
ASE-2008-AdnanGDZ #analysis #clustering #component #design #interface- Using Cluster Analysis to Improve the Design of Component Interfaces (RA, BG, AvD, JZ), pp. 383–386.
ASE-2008-AndreouP #estimation #fuzzy- Software Cost Estimation using Fuzzy Decision Trees (ASA, EP), pp. 371–374.
ASE-2008-BrichauKM #source code- Enforcing Structural Regularities in Source Code using IntensiVE (JB, AK, KM), pp. 471–472.
ASE-2008-CamachoM #automation #named- APPAREIL: A Tool for Building Automated Program Translators Using Annotated Grammars (DOC, KM), pp. 489–490.
ASE-2008-Hall #modelling #queue #realtime #specification #validation- Validating Real Time Specifications using Real Time Event Queue Modeling (RJH), pp. 79–88.
ASE-2008-KhalekELK #constraints #generative #relational #testing #theorem proving- Query-Aware Test Generation Using a Relational Constraint Solver (SAK, BE, YOL, SK), pp. 238–247.
ASE-2008-PortOM #requirements #simulation- Using Simulation to Investigate Requirements Prioritization Strategies (DP, AO, TM), pp. 268–277.
ASE-2008-RakamaricH #automation #axiom #static analysis- Automatic Inference of Frame Axioms Using Static Analysis (ZR, AJH), pp. 89–98.
ASE-2008-TurnerPKC #approach #automation #code generation #process #web- An Automated Test Code Generation Method for Web Applications using Activity Oriented Approach (DAT, MP, JK, JC), pp. 411–414.
FSE-2008-DragertDR #concurrent #generative- Generation of concurrency control code using discrete-event systems theory (CD, JD, KR), pp. 146–157.
FSE-2008-KoesnandarERHSS #metaprogramming #web- Using assertions to help end-user programmers create dependable web macros (AK, SGE, GR, LH, CS, KTS), pp. 124–134.
FSE-2008-KulturTB #estimation #memory management #named #network- ENNA: software effort estimation using ensemble of neural networks with associative memory (YK, BT, ABB), pp. 330–338.
FSE-2008-OsterweilCEPWBH #dataset #experience #process #workflow- Experience in using a process language to define scientific workflow and generate dataset provenance (LJO, LAC, AME, RMP, AEW, ERB, JLH), pp. 319–329.
FSE-2008-YuWGB #composition #encoding #performance #summary #verification #web #web service- Modular verification of web services using efficient symbolic encoding and summarization (FY, CW, AG, TB), pp. 192–202.
ICSE-2008-BunyakiatiFSC #standard #testing #uml- Using JULE to generate a compliance test suite for the UML standard (PB, AF, JS, CC), pp. 827–830.
ICSE-2008-GannodBH #education #re-engineering- Using the inverted classroom to teach software engineering (GCG, JEB, MTH), pp. 777–786.
ICSE-2008-SankaranarayananIG #induction #library #logic programming #mining #specification- Mining library specifications using inductive logic programming (SS, FI, AG), pp. 131–140.
ICSE-2008-SicardBP #architecture #component #self- Using components for architecture-based management: the self-repair case (SS, FB, NDP), pp. 101–110.
ICSE-2008-WangZXAS #approach #debugging #detection #execution #natural language- An approach to detecting duplicate bug reports using natural language and execution information (XW, LZ, TX, JA, JS), pp. 461–470.
ICSE-2008-XuR #detection #java #memory management #precise #profiling- Precise memory leak detection for java software using container profiling (G(X, AR), pp. 151–160.
ICSE-2008-YilmazPW #fault #locality- Time will tell: fault localization using time spectra (CY, AMP, CW), pp. 81–90.
ICSE-2008-ZimmermannN #analysis #dependence #fault #graph #network #predict- Predicting defects using network analysis on dependency graphs (TZ, NN), pp. 531–540.
SAC-2008-AbedMS #analysis #graph #multi #proving #reachability #theorem proving- Reachability analysis using multiway decision graphs in the HOL theorem prover (SA, OAM, GAS), pp. 333–338.
SAC-2008-AbreuGZG #automation #fault #invariant #locality- Automatic software fault localization using generic program invariants (RA, AG, PZ, AJCvG), pp. 712–717.
SAC-2008-AgulhariSB - Compressing electrocardiogram signals using parameterized wavelets (CMA, RMRS, ISB), pp. 1348–1352.
SAC-2008-AhamedRH #architecture #distributed #identification #scalability- Secured tag identification using EDSA (enhanced distributed scalable architecture) (SIA, FR, MEH), pp. 1902–1907.
SAC-2008-AiresSM - Optical flow using color information: preliminary results (KRTA, AMS, AADM), pp. 1607–1611.
SAC-2008-AndresAN #experience #formal method #information management- Using formal methods to develop a complex information system: a practical/theoretical experience (CA, RGA, MN), pp. 848–849.
SAC-2008-AntonellisMT #clustering #documentation #named #summary #xml- XEdge: clustering homogeneous and heterogeneous XML documents using edge summaries (PA, CM, NT), pp. 1081–1088.
SAC-2008-AntonyBHP #approach #biology #interactive #mining #validation- Computational approach to biological validation of protein-protein interactions discovered using literature mining (AA, SB, SH, MJP), pp. 1302–1306.
SAC-2008-AraujoPFLO #distributed #named- FlagelLink: a decision support system for distributed flagellar data using data warehouse (FFA, ÂMAP, KMF, BFL, DMO), pp. 1268–1272.
SAC-2008-BadishiK #adaptation- Improving denial of service resistance using dynamic local adaptations (GB, IK), pp. 2212–2218.
SAC-2008-BraghettoFP #algebra #execution #process- Using process algebra to control the execution of business processes (KRB, JEF, CP), pp. 128–129.
SAC-2008-BroiniziFG #framework #requirements- Using annotations in the naked objects framework to explore data requirements (MEBB, JEF, AG), pp. 630–637.
SAC-2008-BuenoWJ #automation #generative #testing- Automatic test data generation using particle systems (PMSB, WEW, MJ), pp. 809–814.
SAC-2008-BussBSE #analysis #flexibility #graph #pointer- Flexible pointer analysis using assign-fetch graphs (MB, DB, VCS, SAE), pp. 234–239.
SAC-2008-CarvalhoLGS #identification #programming #search-based- Replica identification using genetic programming (MGdC, AHFL, MAG, ASdS), pp. 1801–1806.
SAC-2008-ChongKLG #energy #network- Using association rules for energy conservation in wireless sensor networks (SKC, SK, SWL, MMG), pp. 971–975.
SAC-2008-CorreaIZF #analysis #image #mobile- Medical image analysis using mobile devices (BC, EI, AZ, MF), pp. 1380–1384.
SAC-2008-Denner-Broser #algorithm #analysis #problem- An algorithm for the tracing problem using interval analysis (BDB), pp. 1832–1837.
SAC-2008-DingMH #approach #refinement #specification- An approach for specification construction using property-preserving refinement patterns (JD, LM, XH), pp. 797–803.
SAC-2008-FonsecaVM #data access #detection #online- Online detection of malicious data access using DBMS auditing (JF, MV, HM), pp. 1013–1020.
SAC-2008-GarciaH #analysis #functional #metric- Integrating functional metrics, COCOMO II and earned value analysis for software projects using PMBoK (CALG, CMH), pp. 820–825.
SAC-2008-GarciaT #security #semantics #web #web service- Web service security management using semantic web techniques (DZGG, MBFdT), pp. 2256–2260.
SAC-2008-HieronsJUY #adaptation #sequence- Using adaptive distinguishing sequences in checking sequence constructions (RMH, GVJ, HU, HY), pp. 682–687.
SAC-2008-KeyvanpourA #approach #image #interactive #retrieval #semantics- A new approach for interactive semantic image retrieval using the high level semantics (MK, SA), pp. 1175–1179.
SAC-2008-KuangZ #algorithm #detection- An anomaly intrusion detection method using the CSI-KNN algorithm (LK, MZ), pp. 921–926.
SAC-2008-LiG #detection #network #optimisation- TCM-KNN scheme for network anomaly detection using feature-based optimizations (YL, LG), pp. 2103–2109.
SAC-2008-LuizPBR #approach #mobile #programming #search-based- A new approach to control a population of mobile robots using genetic programming (AL, FP, GB, MR), pp. 1602–1606.
SAC-2008-MaagG #approach #protocol #self #testing- Interoperability testing of a MANET routing protocol using a node self-similarity approach (SM, CG), pp. 1908–1912.
SAC-2008-MatosBP #recognition- Face recognition using DCT coefficients selection (FMdSM, LVB, JvdP), pp. 1753–1757.
SAC-2008-MengleG #algorithm #ambiguity #classification #feature model- Using ambiguity measure feature selection algorithm for support vector machine classifier (SSRM, NG), pp. 916–920.
SAC-2008-MengleGP #category theory #classification- Discovering relationships among categories using misclassification information (SSRM, NG, AP), pp. 932–937.
SAC-2008-MorimotoO #metric #video- Eyelid measurements using digital video processing (CHM, TFdO), pp. 1369–1373.
SAC-2008-Nassiri #3d #e-commerce #trust- Increasing trust through the use of 3d e-commerce environment (NN), pp. 1463–1466.
SAC-2008-NecaskyP #concept #design #semantics #web #web service- Designing semantic web services using conceptual model (MN, JP), pp. 2243–2247.
SAC-2008-OsadaOKKK #diagrams #metric- Proposing metrics of difficulty of domain knowledge using usecase diagrams (AO, DO, NK, HK, KK), pp. 624–629.
SAC-2008-PavelecJBO #identification #independence- Author identification using writer-dependent and writer-independent strategies (DP, EJRJ, LVB, LSO), pp. 414–418.
SAC-2008-PereiraAGS #architecture #configuration management #hybrid- Using traditional loop unrolling to fit application on a new hybrid reconfigurable architecture (MMP, SRFdA, BCdO, ISS), pp. 1552–1553.
SAC-2008-RadtkeSW #algorithm #classification- Using the RRT algorithm to optimize classification systems for handwritten digits and letters (PVWR, RS, TW), pp. 1748–1752.
SAC-2008-ReynosoCGP #diagrams #metric #ocl #statechart #uml- Formal definition of measures for UML statechart diagrams using OCL (LR, JACL, MG, MP), pp. 846–847.
SAC-2008-RochaR #animation #evaluation- An evaluation of a collision handling system using sphere-trees for plausible rigid body animation (RdSR, MAFR), pp. 1241–1245.
SAC-2008-SchobelP #case study #clustering #cpu #kernel #research #scheduling- Kernel-mode scheduling server for CPU partitioning: a case study using the Windows research kernel (MS, AP), pp. 1700–1704.
SAC-2008-SuKZG #classification #collaboration #machine learning- Imputation-boosted collaborative filtering using machine learning classifiers (XS, TMK, XZ, RG), pp. 949–950.
SAC-2008-SungCM #clustering #concept #learning #lifecycle #ontology #performance #web- Efficient concept clustering for ontology learning using an event life cycle on the web (SS, SC, DM), pp. 2310–2314.
SAC-2008-TanWWC #detection #problem #semantics- Using unlabeled data to handle domain-transfer problem of semantic detection (ST, YW, GW, XC), pp. 896–903.
SAC-2008-TierneyJ #ontology #semantics- C-SAW---contextual semantic alignment of ontologies: using negative semantic reinforcement (BT, MJ), pp. 2346–2347.
SAC-2008-VictorPB - Context addressing using context-aware flooding (KV, JP, YB), pp. 1960–1961.
SAC-2008-Willassen #calculus- Using simplified event calculus in digital investigation (SYW), pp. 1438–1442.
SAC-2008-XuWQ #modelling #verification- Modeling and verifying BPEL using synchronized net (CX, HW, WQ), pp. 2358–2362.
SAC-2008-YuiMUK #distributed #named #parallel #xquery- XBird/D: distributed and parallel XQuery processing using remote proxy (MY, JM, SU, HK), pp. 1003–1007.
SAC-2008-ZhangMD #feature model #fuzzy #image #retrieval #set- Texture feature extraction and description using fuzzy set of main dominant directions of variable scales in content-based medical image retrieval (GZ, ZMM, LD), pp. 1760–1761.
SAC-2008-ZhuDXW #documentation #image #linear- Perspective rectification of camera-based document images using local linear structure (YZ, RD, BX, CW), pp. 451–452.
LDTA-2007-AkessonEH08 #compilation #development #jastadd- Development of a Modelica Compiler Using JastAdd (JÅ, TE, GH), pp. 117–131.
LDTA-2007-HameyG08 #domain-specific language #experience #implementation #stratego- Implementing a Domain-Specific Language Using Stratego/XT: An Experience Paper (LGCH, SG), pp. 37–51.
GPCE-2008-ApelKB #aspect-oriented #functional #refactoring- Program refactoring using functional aspects (SA, CK, DSB), pp. 161–170.
GPCE-2008-Batory #modelling- Using modern mathematics as an FOSD modeling language (DSB), pp. 35–44.
GPCE-2008-GottschlingL #c++ #compilation #concept #library #performance #reuse #robust #semantics- Integrating semantics and compilation: using c++ concepts to develop robust and efficient reusable libraries (PG, AL), pp. 67–76.
SLE-2008-LiangD #evaluation #model transformation #txl- A Practical Evaluation of Using TXL for Model Transformation (HL, JD), pp. 245–264.
SLE-2008-Nilsson-NymanEH #semiparsing- Practical Scope Recovery Using Bridge Parsing (ENN, TE, GH), pp. 95–113.
ASPLOS-2008-GummarajuCTR #manycore #named #programming- Streamware: programming general-purpose multicore processors using streams (JG, JC, YT, MR), pp. 297–307.
CASE-2008-AddadA #algebra #architecture #evaluation #graph #modelling- Modeling and response time evaluation of ethernet-based control architectures using timed event graphs and Max-Plus algebra (BA, SA), pp. 418–423.
CASE-2008-Andoh #identification- Coulomb friction identification for mechatronic servo systems with limited strokes using two reference inputs (FA), pp. 265–272.
CASE-2008-ChoiJSKRKKSACC #automation #development #flexibility #framework #mobile #platform- Development of flexible laboratory automation platform using Mobile Agents in the clinical laboratory (BC, SMJ, SHS, JK, SR, MCK, JK, WHS, KTA, WC, HRC), pp. 918–923.
CASE-2008-DaiCL - Robot tracking using vision and laser sensors (WD, AC, PXL), pp. 169–174.
CASE-2008-HanX #identification #multi #network- Nonlinear systems identification using dynamic multi-time scales neural networks (XH, WFX), pp. 448–453.
CASE-2008-HooverMR #3d #detection #image #matrix- Pose detection of 3-D objects using images sampled on SO(3), spherical harmonics, and wigner-D matrices (RCH, AAM, RGR), pp. 47–52.
CASE-2008-HouZWCT #adaptation #approach #fuzzy #nondeterminism- Adaptive dynamic surface control of a class of uncertain nonlinear systems in pure-feedback form using fuzzy backstepping approach (ZGH, AMZ, FXW, LC, MT), pp. 821–826.
CASE-2008-LiuSXYLZF #agile #approach- Rapid robot/workcell calibration using line-based approach (YL, YS, NX, RY, XL, GZ, TAF), pp. 510–515.
CASE-2008-MitaniH #analysis #metric #symmetry- Analysis of contact between feeder surface and microparts based on measurements for microparts feeder using an asymmetric surface (AM, SH), pp. 720–725.
CASE-2008-MittalYBB #difference #equation #modelling #multi #performance #probability- Dynamics and performance modeling of multi-stage manufacturing systems using nonlinear stochastic differential equations (UM, HY, STSB, LGB), pp. 498–503.
CASE-2008-NagleW #named- GSP: Extending G-Code using JSP servlet technologies (SN, JW), pp. 953–958.
CASE-2008-PonnambalamPMS #network- Modified ART1 neural networks for cell formation using production data (SGP, RSP, SSM, SS), pp. 603–608.
CASE-2008-RohPSYC0LC #flexibility- Flexible docking mechanism using combination of magnetic force with error-compensation capability (SgR, JHP, YKS, KY, MC, HSK, HL, HRC), pp. 697–702.
CASE-2008-SharmaBDC #assembly #generative #optimisation #sequence- Generation of optimized robotic assembly sequence using ant colony optimization (SS, BBB, PD, BBC), pp. 894–899.
CASE-2008-SrivastavaVK #combinator- Procurement of global logistics services using combinatorial auctions (NKS, NV, SK), pp. 297–302.
CASE-2008-TamadazteDFF #automation #multi #visual notation- Automatic micromanipulation using multiscale visual servoing (BT, SD, GF, NLFP), pp. 977–982.
CASE-2008-UnverM #automation #composition #design pattern #throughput- Using architectural software patterns in support of controlling modular high throughput screening automation systems (HÖÜ, JM), pp. 912–917.
CASE-2008-XuDAG #3d #random- Motion planning for steerable needles in 3D environments with obstacles using rapidly-exploring Random Trees and backchaining (JX, VD, RA, KG), pp. 41–46.
CASE-2008-ZhuCS #markov #recognition- Human intention recognition in Smart Assisted Living Systems using a Hierarchical Hidden Markov Model (CZ, QC, WS), pp. 253–258.
CC-2008-ZhaoRARW #debugging #how #performance- How to Do a Million Watchpoints: Efficient Debugging Using Dynamic Instrumentation (QZ, RMR, SPA, LR, WFW), pp. 147–162.
DAC-2008-BharathES #algorithm #automation #search-based- Automatic package and board decoupling capacitor placement using genetic algorithms and M-FDM (KB, EE, MS), pp. 560–565.
DAC-2008-BrockmanLKKM #array #design #memory management #multi #programmable- Design of a mask-programmable memory/multiplier array using G4-FET technology (JBB, SL, PMK, AK, MMM), pp. 337–338.
DAC-2008-CookS #design #predict- Predictive design space exploration using genetically programmed response surfaces (HC, KS), pp. 960–965.
DAC-2008-CoskunRG #learning #multi #online- Temperature management in multiprocessor SoCs using online learning (AKC, TSR, KCG), pp. 890–893.
DAC-2008-DargaSM #performance #symmetry- Faster symmetry discovery using sparsity of symmetries (PTD, KAS, ILM), pp. 149–154.
DAC-2008-DasikaDFMB - DVFS in loop accelerators using BLADES (GSD, SD, KF, SAM, DMB), pp. 894–897.
DAC-2008-GaoKKLAM #estimation #hybrid #multi #performance #simulation- Multiprocessor performance estimation using hybrid simulation (LG, KK, SK, RL, GA, HM), pp. 325–330.
DAC-2008-GulatiK #fault #simulation #towards- Towards acceleration of fault simulation using graphics processing units (KG, SPK), pp. 822–827.
DAC-2008-JinC #benchmark #case study #metric #performance #simulation #statistics- Improve simulation efficiency using statistical benchmark subsetting: an ImplantBench case study (ZJ, ACC), pp. 970–973.
DAC-2008-JoshiCSBA #power management #reduction- Leakage power reduction using stress-enhanced layouts (VJ, BC, DS, DB, KA), pp. 912–917.
DAC-2008-Ng #challenge #modelling #verification- Challenges in using system-level models for RTL verification (KN), pp. 812–815.
DAC-2008-OzisikyilmazMC #design #machine learning #performance- Efficient system design space exploration using machine learning techniques (BÖ, GM, ANC), pp. 966–969.
DAC-2008-PaulB #configuration management #memory management #performance #resource management- Reconfigurable computing using content addressable memory for improved performance and resource usage (SP, SB), pp. 786–791.
DAC-2008-SauerGL #framework #functional #modelling #named #performance- SystemClick: a domain-specific framework for early exploration using functional performance models (CS, MG, HPL), pp. 480–485.
DAC-2008-TamPB #analysis #automation #layout #locality #precise- Precise failure localization using automated layout analysis of diagnosis candidates (WCT, OP, RD(B), pp. 367–372.
DAC-2008-YuB #fault #multi- Multiple defect diagnosis using no assumptions on failing pattern characteristics (XY, RD(B), pp. 361–366.
DAC-2008-ZhangYZDKDKC #optimisation #power management- Low power passive equalizer optimization using tritonic step response (LZ, WY, HZ, AD, GAK, DMD, ESK, CKC), pp. 570–573.
DATE-2008-BadarogluDLC - Calibration of Integrated CMOS Hall Sensors Using Coil-on-Chip in ATE Environment (MB, GD, FL, OC), pp. 873–878.
DATE-2008-BrisolaraORLCW #code generation #uml- Using UML as Front-end for Heterogeneous Software Code Generation Strategies (LBdB, MFdSO, RMR, LCL, LC, FRW), pp. 504–509.
DATE-2008-ChoiC #testing- Digital bit stream jitter testing using jitter expansion (HWC, AC), pp. 1468–1473.
DATE-2008-CopeCL #configuration management #gpu #logic #memory management- Using Reconfigurable Logic to Optimise GPU Memory Accesses (BC, PYKC, WL), pp. 44–49.
DATE-2008-CorderoK - Clock Distribution Scheme using Coplanar Transmission Lines (VHCC, SPK), pp. 985–990.
DATE-2008-FarahaniFS #architecture #network #scalability- Scalable Architecture for on-Chip Neural Network Training using Swarm Intelligence (AFF, SMF, SS), pp. 1340–1345.
DATE-2008-FeinsteinTM #detection #equivalence #logic- Partially Redundant Logic Detection Using Symbolic Equivalence Checking in Reversible and Irreversible Logic Circuits (DYF, MAT, DMM), pp. 1378–1381.
DATE-2008-GhoshNR #adaptation #fault tolerance #novel- A Novel Low Overhead Fault Tolerant Kogge-Stone Adder Using Adaptive Clocking (SG, PN, KR), pp. 366–371.
DATE-2008-KazmierskiZA #approximate #mobile #modelling #performance- Efficient circuit-level modelling of ballistic CNT using piecewise non-linear approximation of mobile charge density (TJK, DZ, BMAH), pp. 146–151.
DATE-2008-LiMM #concurrent #named #self- CASP: Concurrent Autonomous Chip Self-Test Using Stored Test Patterns (YL, SM, SM), pp. 885–890.
DATE-2008-Marques-SilvaP #algorithm #satisfiability- Algorithms for Maximum Satisfiability using Unsatisfiable Cores (JMS, JP), pp. 408–413.
DATE-2008-MuraliMAGBBM #manycore #optimisation #platform- Temperature Control of High-Performance Multi-core Platforms Using Convex Optimization (SM, AM, DA, RG, SPB, LB, GDM), pp. 110–115.
DATE-2008-NagpalGK #approach #design- A Delay-efficient Radiation-hard Digital Design Approach Using CWSP Elements (CN, RG, SPK), pp. 354–359.
DATE-2008-PakbazniaP - Coarse-Grain MTCMOS Sleep Transistor Sizing Using Delay Budgeting (EP, MP), pp. 385–390.
DATE-2008-ParkSP #embedded #execution- Hiding Cache Miss Penalty Using Priority-based Execution for Embedded Processors (SP, AS, YP), pp. 1190–1195.
DATE-2008-PlazaMB #constraints #generative #random- Random Stimulus Generation using Entropy and XOR Constraints (SP, ILM, VB), pp. 664–669.
DATE-2008-PradhanV #performance #synthesis- Fast Analog Circuit Synthesis Using Sensitivity Based Near Neighbor Searches (AP, RV), pp. 523–526.
DATE-2008-SchirnerD #modelling #scheduling- Introducing Preemptive Scheduling in Abstract RTOS Models using Result Oriented Modeling (GS, RD), pp. 122–127.
DATE-2008-SteinhorstH #model checking #specification- Model Checking of Analog Systems using an Analog Specification Language (SS, LH), pp. 324–329.
DATE-2008-TanQ #framework #markov #power management #probability- A Framework of Stochastic Power Management Using Hidden Markov Model (YT, QQ), pp. 92–97.
DATE-2008-ThoguluvaRC #architecture #performance #programmable #security- Efficient Software Architecture for IPSec Acceleration Using a Programmable Security Processor (JT, AR, STC), pp. 1148–1153.
DATE-2008-VillarJGK #specification- Heterogeneous System-level Specification Using SystemC (EV, AJ, CG, TK).
DATE-2008-YonedaF #functional #reuse- Wrapper and TAM Co-Optimization for Reuse of SoC Functional Interconnects (TY, HF), pp. 1366–1369.
DATE-2008-YuanHX - Re-Examining the Use of Network-on-Chip as Test Access Mechanism (FY, LH, QX), pp. 808–811.
DATE-2008-ZhangHXL #fault #manycore- Defect Tolerance in Homogeneous Manycore Processors Using Core-Level Redundancy with Unified Topology (LZ, YH, QX, XL), pp. 891–896.
DATE-2008-ZhouPB #analysis #generative #metric #modelling- Harvesting Wasted Heat in a Microprocessor Using Thermoelectric Generators: Modeling, Analysis and Measurement (YZ, SP, SB), pp. 98–103.
HPCA-2008-ChenMP #constraints #graph #memory management #runtime #validation- Runtime validation of memory ordering using constraint graph checking (KC, SM, PP), pp. 415–426.
HPCA-2008-ChungDKK #memory management #thread #transaction- Thread-safe dynamic binary translation using transactional memory (JC, MD, HK, CK), pp. 279–289.
HPCA-2008-KimGWB #analysis #performance- System level analysis of fast, per-core DVFS using on-chip switching regulators (WK, MSG, GYW, DMB), pp. 123–134.
HPCA-2008-LeeKMP #predict- Performance-aware speculation control using wrong path usefulness prediction (CJL, HK, OM, YNP), pp. 39–49.
HPDC-2008-CarreraSWTA - Managing SLAs of heterogeneous workloads using dynamic application placement (DC, MS, IW, JT, EA), pp. 217–218.
HPDC-2008-KhannaCKSSKF #data transfer #multi #network #optimisation- Multi-hop path splitting and multi-pathing optimizations for data transfers over shared wide-area networks using gridFTP (GK, ÜVÇ, TMK, PS, JHS, RK, ITF), pp. 225–226.
HPDC-2008-ManosMKCKT #distributed #performance- Distributed mpi cross-site run performance using mpig (SM, MDM, OK, PVC, NTK, BRT), pp. 229–230.
HPDC-2008-ShiPRJJ #adaptation #fault tolerance #grid #named #safety- Dynasa: adapting grid applications to safety using fault-tolerant methods (XS, JLP, ER, HJ, HJ), pp. 237–238.
HPDC-2008-SotomayorKF #execution #virtual machine- Combining batch execution and leasing using virtual machines (BS, KK, ITF), pp. 87–96.
LCTES-2008-EbnerBSKWK - Generalized instruction selection using SSA-graphs (DE, FB, BS, AK, PW, AK), pp. 31–40.
OSDI-2008-BansalA - Binary Translation Using Peephole Superoptimizers (SB, AA), pp. 177–192.
OSDI-2008-YuIFBEGC #distributed #named- DryadLINQ: A System for General-Purpose Distributed Data-Parallel Computing Using a High-Level Language (YY, MI, DF, MB, ÚE, PKG, JC), pp. 1–14.
OSDI-2008-ZeldovichKDK #hardware #memory management #policy #security- Hardware Enforcement of Application Security Policies Using Tagged Memory (NZ, HK, MD, CK), pp. 225–240.
PDP-2008-BerbecaruA #performance- An Optimized Double Cache Technique for Efficient Use of Forward-secure Signature Schemes (DB, LA), pp. 581–589.
PDP-2008-ColmenarMGLH #modelling #probability- Modelling Asynchronous Systems using Probability Distribution Functions (JMC, NM, OG, JL, JIH), pp. 3–11.
PDP-2008-GoswamiG #contract- Resource Selection in Grids Using Contract Net (KG, AG), pp. 105–109.
PDP-2008-KecskemetiKTKD #automation #deployment- Automatic Service Deployment Using Virtualisation (GK, PK, GT, TK, TD), pp. 628–635.
PDP-2008-KrenekPKFSDSWM #analysis #multi #simulation- Multiple Ligand Trajectory Docking Study — Semiautomatic Analysis of Molecular Dynamics Simulations using EGEE gLite Services (AK, MP, JK, JF, ZS, FD, JS, JW, LM), pp. 447–454.
PDP-2008-LouatiZ #network- Personal Overlay Networks Management Using a P2P-based Publish/Subscribe Naming System (WL, DZ), pp. 95–99.
PDP-2008-MerzPW #coordination #distributed #framework #network #simulation- A Simulation Framework for Distributed Super-Peer Topology Construction Using Network Coordinates (PM, MP, SW), pp. 491–498.
PDP-2008-TaillardGD #approach #framework #performance #visual notation- A Graphical Framework for High Performance Computing Using An MDE Approach (JT, FG, JLD), pp. 165–173.
PPoPP-2008-AnsariKJLKW #adaptation #algorithm #case study #concurrent #experience #memory management #transaction- Experiences using adaptive concurrency in transactional memory with Lee’s routing algorithm (MA, CK, KJ, ML, CCK, IW), pp. 261–262.
PPoPP-2008-ChengCHT #classification #manycore #platform #scalability- Scalable packet classification using interpreting: a cross-platform multi-core solution (HC, ZC, BH, XT), pp. 33–42.
PPoPP-2008-LevM #hardware #memory management #transaction- Split hardware transactions: true nesting of transactions using best-effort hardware transactional memory (YL, JWM), pp. 197–206.
PPoPP-2008-PraunBC #analysis #concurrent #dependence #modelling- Modeling optimistic concurrency using quantitative dependence analysis (CvP, RB, CC), pp. 185–196.
PPoPP-2008-RyooRBSKH #evaluation #gpu #optimisation #parallel #performance #thread- Optimization principles and application performance evaluation of a multithreaded GPU using CUDA (SR, CIR, SSB, SSS, DBK, WmWH), pp. 73–82.
FASE-2008-AlrajehRU #behaviour #modelling- Deriving Non-zeno Behavior Models from Goal Models Using ILP (DA, AR, SU), pp. 1–15.
FASE-2008-BergJR #similarity #state machine #testing- Regular Inference for State Machines Using Domains with Equality Tests (TB, BJ, HR), pp. 317–331.
FASE-2008-JurjensSY #analysis #automation #security- Automated Analysis of Permission-Based Security Using UMLsec (JJ, JS, YY), pp. 292–295.
FoSSaCS-2008-GruberJ #bound #communication #complexity #regular expression- Optimal Lower Bounds on Regular Expression Size Using Communication Complexity (HG, JJ), pp. 273–286.
STOC-2008-Ben-AroyaT #combinator #graph- A combinatorial construction of almost-ramanujan graphs using the zig-zag product (ABA, ATS), pp. 325–334.
STOC-2008-DeKSS #composition #integer #multi #performance- Fast integer multiplication using modular arithmetic (AD, PPK, CS, RS), pp. 499–506.
TACAS-2008-ChocklerGY #automation #performance #refinement- Efficient Automatic STE Refinement Using Responsibility (HC, OG, AY), pp. 233–248.
TACAS-2008-McMillan #generative #invariant #proving #quantifier- Quantified Invariant Generation Using an Interpolating Saturation Prover (KLM), pp. 413–427.
TACAS-2008-SankaranarayananDI #hybrid #model checking- Symbolic Model Checking of Hybrid Systems Using Template Polyhedra (SS, TD, FI), pp. 188–202.
CAV-2008-KashyapG - Producing Short Counterexamples Using “Crucial Events” (SK, VKG), pp. 491–503.
CAV-2008-KingS #congruence #equation #satisfiability- Inferring Congruence Equations Using SAT (AK, HS), pp. 281–293.
CSL-2008-Nguyen #proving- Proving Infinitude of Prime Numbers Using Binomial Coefficients (PN), pp. 184–198.
ICLP-2008-AlpuenteEI #dependence #termination- Termination of Narrowing Using Dependency Pairs (MA, SE, JI), pp. 317–331.
ICLP-2008-AnhRD #implementation- An Implementation of Extended P-Log Using XASP (HTA, CDPKR, CVD), pp. 739–743.
ICLP-2008-Baral #information management #programming #reasoning #representation #set- Using Answer Set Programming for Knowledge Representation and Reasoning: Future Directions (CB), pp. 69–70.
ICLP-2008-BeniniBM #constraints #multi #platform #policy #programming #resource management- Resource Management Policy Handling Multiple Use-Cases in MPSoC Platforms Using Constraint Programming (LB, DB, MM), pp. 470–484.
ICLP-2008-CliffeVBP #animation #declarative #named #programming #set #visualisation- ASPVIZ: Declarative Visualisation and Animation Using Answer Set Programming (OC, MDV, MB, JAP), pp. 724–728.
ICLP-2008-EglyGW #framework #implementation #named #programming- ASPARTIX: Implementing Argumentation Frameworks Using Answer-Set Programming (UE, SAG, SW), pp. 734–738.
ICLP-2008-MontaliTACGLM #declarative #logic programming #specification #verification- Verification from Declarative Specifications Using Logic Programming (MM, PT, MA, FC, MG, EL, PM), pp. 440–454.
ICLP-2008-MuggletonST #bias #declarative #logic programming #named- TopLog: ILP Using a Logic Program Declarative Bias (SM, JCAS, ATN), pp. 687–692.
ICLP-2008-Santos #bias #declarative #logic programming #named- TopLog: ILP Using a Logic Program Declarative Bias (JCAS), pp. 818–819.
ICLP-2008-Tsitovich #detection #model checking #security- Detection of Security Vulnerabilities Using Guided Model Checking (AT), pp. 822–823.
ICST-2008-HaslingGB #case study #modelling #requirements #testing #uml- Model Based Testing of System Requirements using UML Use Case Models (BH, HG, KB), pp. 367–376.
ICST-2008-McQuillanP #alloy #analysis #metamodelling #metric #object-oriented- A Metamodel for the Measurement of Object-Oriented Systems: An Analysis using Alloy (JAM, JFP), pp. 288–297.
ICST-2008-RingsNG #grid #testing #workflow- Testing Grid Application Workflows Using TTCN-3 (TR, HN, JG), pp. 210–219.
ICST-2008-SherriffW #composition #empirical #impact analysis- Empirical Software Change Impact Analysis using Singular Value Decomposition (MS, LW), pp. 268–277.
ICST-2008-WareWS #metric #predict- The Use of Intra-Release Product Measures in Predicting Release Readiness (MPW, FGW, MS), pp. 230–237.
IJCAR-2008-MouraB #effectiveness #logic #set- Deciding Effectively Propositional Logic Using DPLL and Substitution Sets (LMdM, NB), pp. 410–425.
ISSTA-2008-BoddenH #aspectj #concurrent #detection #effectiveness #named- Racer: effective race detection using aspectj (EB, KH), pp. 155–166.
ISSTA-2008-DoR #analysis #modelling #testing- Using sensitivity analysis to create simplified economic models for regression testing (HD, GR), pp. 51–62.
ISSTA-2008-JeffreyGG #fault #locality- Fault localization using value replacement (DJ, NG, RG), pp. 167–178.
LICS-2008-Burel #deduction #first-order #representation #type system- A First-Order Representation of Pure Type Systems Using Superdeduction (GB), pp. 253–263.
MBT-2008-Jurjens #case study #modelling #security #testing- Model-based Security Testing Using UMLsec: A Case Study (JJ), pp. 93–104.
SAT-2008-EibachPV #satisfiability- Attacking Bivium Using SAT Solvers (TE, EP, GV), pp. 63–76.
SAT-2008-KottlerKS08a #bound #np-hard #satisfiability #subclass- A New Bound for an NP-Hard Subclass of 3-SAT Using Backdoors (SK, MK, CS), pp. 161–167.
TestCom-FATES-2008-DangN #generative #hybrid #testing- Using Disparity to Enhance Test Generation for Hybrid Systems (TD, TN), pp. 54–69.
CBSE-2007-FornasierWG #component #composition #named #programming #runtime- Soya: A Programming Model and Runtime Environment for Component Composition Using SSDL (PF, JW, IG), pp. 227–241.
ECSA-2007-FuentesGPV #architecture- Using Connectors to Model Crosscutting Influences in Software Architectures (LF, NG, MP, JAV), pp. 292–295.
ECSA-2007-OrtizPAAS #approach #architecture #case study #component #experience #framework- Experiences Using a Component-Oriented Architectural Framework for Robots and Its Improvement with a MDE Approach (FJO, JAP, DA, BÁ, PS), pp. 335–338.
QoSA-2007-PaceC #architecture #design #quality- Using Planning Techniques to Assist Quality-Driven Architectural Design Exploration (JADP, MRC), pp. 33–52.
WICSA-2007-RossoM #approach #architecture #knowledge-based #scalability- Assessing the Architectonics of Large, Software-Intensive Systems Using a Knowledge-Based Approach (CDR, AM), p. 2.
DocEng-2007-Storey #documentation #folksonomy #navigation #ontology #taxonomy- Navigating documents using ontologies, taxonomies and folksonomies (MADS), p. 2.
DRR-2007-KimLT #documentation #identification #online- Identification of comment-on sentences in online biomedical documents using support vector machines (ICK, DXL, GRT).
DRR-2007-Likforman-SulemS #network #recognition- Recognition of degraded handwritten digits using dynamic Bayesian networks (LLS, MS).
DRR-2007-ShettySBS #documentation #random #segmentation- Segmentation and labeling of documents using conditional random fields (SS, HS, MJB, SNS).
ECDL-2007-ChenWL #image- Using Watermarks and Offline DRM to Protect Digital Images in DIAS (HYC, HAW, CLL), pp. 529–531.
ECDL-2007-GortonFF #framework #generative #library #specification- Specification and Generation of Digital Libraries into DSpace Using the 5S Framework (DG, WF, EAF), pp. 567–569.
ECDL-2007-ImaiKS #library #mobile- Retrieving Tsunami Digital Library by Use of Mobile Phones (SI, YK, NS), pp. 525–528.
ECDL-2007-KongL #logic #multi #xml- Using XML Logical Structure to Retrieve (Multimedia) Objects (ZK, ML), pp. 100–111.
ECDL-2007-Martinez-PrietoFVA #logic #xml- Electronic Work : Building Dynamic Services over Logical Structure Using Aqueducts for XML Processing (MAMP, PdlF, JV, JA), pp. 445–448.
ECDL-2007-Shiri #interface #library #metadata #visual notation- The Use of Metadata in Visual Interfaces to Digital Libraries (AS), pp. 489–494.
HT-2007-ChinC #hypermedia #identification #social- Identifying subcommunities using cohesive subgroups in social hypertext (AC, MHC), pp. 175–178.
HT-2007-FigueiraL #interactive #learning #visualisation- Interaction visualization in web-based learning using igraphs (ÁRF, JBL), pp. 45–46.
HT-2007-LeblancA #learning- Using forum in an organizational learning context (AL, MHA), pp. 41–42.
HT-2007-MasonT #case study #network #social- Tags, networks, narrative: exploring the use of social software for the study of narrative in digital contexts (BLM, ST), pp. 39–40.
HT-2007-SinclairML #wiki- Dynamic link service 2.0: using wikipedia as a linkbase (PASS, KM, PHL), pp. 161–162.
ICDAR-2007-BernardAH #random #recognition- Using Random Forests for Handwritten Digit Recognition (SB, SA, LH), pp. 1043–1047.
ICDAR-2007-BhardwajSSS #on the #verification- On the Use of Lexeme Features for Writer Verification (AB, AS, HS, SNS), pp. 1088–1092.
ICDAR-2007-BrinkSB #identification #towards #verification- Towards Explainable Writer Verification and Identification Using Vantage Writers (AB, LS, MB), pp. 824–828.
ICDAR-2007-ChouGC #classification #multi #recognition- Recognition of Fragmented Characters Using Multiple Feature-Subset Classifiers (CHC, CYG, FC), pp. 198–202.
ICDAR-2007-CostagliolaDR #diagrams #grammarware #sketching- Using Grammar-Based Recognizers for Symbol Completion in Diagrammatic Sketches (GC, VD, MR), pp. 1078–1082.
ICDAR-2007-DasariB #identification- Identification of Non-Black Inks Using HSV Colour Space (HD, CB), pp. 486–490.
ICDAR-2007-FinkP #modelling #on the #recognition- On the Use of Context-Dependent Modeling Units for HMM-Based Offline Handwriting Recognition (GAF, TP), pp. 729–733.
ICDAR-2007-FujimotoSTSN #documentation #image #parallel #programming- Curved paper rectification for digital camera document images by shape from parallel geodesics using continuous dynamic programming (KF, JS, HT, MS, SN), pp. 267–271.
ICDAR-2007-Furmaniak #segmentation- Unsupervised Newspaper Segmentation Using Language Context (RF), pp. 1263–1267.
ICDAR-2007-GaoWHD #documentation #image #integer #linear #programming- Decompose Document Image Using Integer Linear Programming (DG, YW, HH, MD), pp. 397–401.
ICDAR-2007-GazzahA #analysis #identification- Arabic Handwriting Texture Analysis for Writer Identification Using the DWT-Lifting Scheme (SG, NEBA), pp. 1133–1137.
ICDAR-2007-HamamuraAI #algorithm #probability #recognition #word- An Analytic Word Recognition Algorithm Using a Posteriori Probability (TH, TA, BI), pp. 669–673.
ICDAR-2007-HirayamaNK #classification #difference- A Classifier of Similar Characters using Compound Mahalanobis Function based on Difference Subspace (JH, HN, NK), pp. 432–436.
ICDAR-2007-HuangLM #string- Cryptogram Decoding for OCR Using Numerization Strings (GBH, EGLM, AM), pp. 208–212.
ICDAR-2007-HuangSHFN #approach #difference #recognition- An SVM-Based High-accurate Recognition Approach for Handwritten Numerals by Using Difference Features (KH, JS, YH, KF, SN), pp. 589–593.
ICDAR-2007-HummIH #modelling #statistics #verification- Spoken Handwriting Verification Using Statistical Models (AH, RI, JH), pp. 999–1003.
ICDAR-2007-ImdadBERE #identification- Writer Identification Using Steered Hermite Features and SVM (AI, SB, VE, CRM, HE), pp. 839–843.
ICDAR-2007-JinZ #synthesis- Synthesis of Chinese Character Using Affine Transformation (LJ, XZ), pp. 218–222.
ICDAR-2007-KeshariW #hybrid #recognition- Hybrid Mathematical Symbol Recognition Using Support Vector Machines (BK, SMW), pp. 859–863.
ICDAR-2007-KramerKKB #finite #metadata #probability #transducer- Bibliographic Meta-Data Extraction Using Probabilistic Finite State Transducers (MK, HK, DK, TMB), pp. 609–613.
ICDAR-2007-KunduHHPG #recognition- Arabic Handwriting Recognition Using Variable Duration HMM (AK, TH, BH, JP, LVG), pp. 644–648.
ICDAR-2007-Likforman-SulemS #network #recognition- Recognition of Broken Characters from Historical Printed Books Using Dynamic Bayesian Networks (LLS, MS), pp. 173–177.
ICDAR-2007-LiwickiIB #detection #online #programming- On-Line Handwritten Text Line Detection Using Dynamic Programming (ML, EI, HB), pp. 447–451.
ICDAR-2007-LouloudisGH #approach #detection #documentation- Text Line Detection in Unconstrained Handwritten Documents Using a Block-Based Hough Transform Approach (GL, BG, CH), pp. 599–603.
ICDAR-2007-LuthyVB #markov #modelling #segmentation- Using Hidden Markov Models as a Tool for Handwritten Text Line Segmentation (FL, TV, HB), p. 8–?.
ICDAR-2007-NamboodiriNJ #on the- On Using Classical Poetry Structure for Indian Language Post-Processing (AMN, PJN, CVJ), pp. 1238–1242.
ICDAR-2007-NguyenBML #classification #verification- Off-line Signature Verification Using Enhanced Modified Direction Features in Conjunction with Neural Classifiers and Support Vector Machines (VN, MB, VM, GL), pp. 734–738.
ICDAR-2007-NicolasDPH #2d #documentation #image #random #segmentation- Document Image Segmentation Using a 2D Conditional Random Field Model (SN, JD, TP, LH), pp. 407–411.
ICDAR-2007-PanBS #segmentation- Text Segmentation from Complex Background Using Sparse Representations (WP, TDB, CYS), pp. 412–416.
ICDAR-2007-PrasanthBSRM #online- Elastic Matching of Online Handwritten Tamil and Telugu Scripts Using Local Features (LP, VB, RS, GVR, DM), pp. 1028–1032.
ICDAR-2007-PrusaH #2d #recognition- Mathematical Formulae Recognition Using 2D Grammars (DP, VH), pp. 849–853.
ICDAR-2007-QuiniouA #detection #fault #network #online #recognition- Use of a Confusion Network to Detect and Correct Errors in an On-Line Handwritten Sentence Recognition System (SQ, ÉA), pp. 382–386.
ICDAR-2007-RinglstetterRGS #fault- Deriving Symbol Dependent Edit Weights for Text Correction_The Use of Error Dictionaries (CR, UR, AG, KUS), pp. 639–643.
ICDAR-2007-SekiFNSM #analysis #documentation #information management- Information Management System Using Structure Analysis of Paper/Electronic Documents and Its Applications (MS, MF, TN, HS, KM), pp. 689–693.
ICDAR-2007-ShettySS #random #recognition #word- Handwritten Word Recognition Using Conditional Random Fields (SS, HS, SNS), pp. 1098–1102.
ICDAR-2007-TanakaG - Autonomous Text Capturing Robot Using Improved DCT Feature and Text Tracking (MT, HG), pp. 1178–1182.
ICDAR-2007-TonouchiK #mobile #online #recognition- Text Input System Using Online Overlapped Handwriting Recognition for Mobile Devices (YT, AK), pp. 754–758.
ICDAR-2007-ToujAA #segmentation- Two Approaches for Arabic Script Recognition-Based Segmentation Using the Hough Transform (ST, NEBA, HA), pp. 654–658.
ICDAR-2007-WendlingR #recognition- Symbol Recognition Using a 2-class Hierarchical Model of Choquet Integrals (LW, JR), pp. 634–638.
ICDAR-2007-WickRL #fault #modelling #topic- Context-Sensitive Error Correction: Using Topic Models to Improve OCR (MLW, MGR, EGLM), pp. 1168–1172.
ICDAR-2007-YangJ #kernel #recognition- Handwritten Chinese Character Recognition Using Modified LDA and Kernel FDA (DY, LJ), pp. 914–918.
ICDAR-2007-YangJZH #recognition- Finger-Written Chinese Characters Recognition Using Hierarchical LDA (DY, LJ, LXZ, JCH), pp. 322–326.
ICDAR-2007-ZhangYT #documentation #image- Removing Shading Distortions in Camera-based Document Images Using Inpainting and Surface Fitting With Radial Basis Functions (LZ, AMY, CLT), pp. 984–988.
ICDAR-2007-ZiaratbanFE - Use of Legal Amount to Confirm or Correct the Courtesy Amount on Farsi Bank Checks (MZ, KF, ME), pp. 1123–1127.
ICDAR-2007-ZiaratbanFF #feature model #recognition- Language-Based Feature Extraction Using Template-Matching In Farsi/Arabic Handwritten Numeral Recognition (MZ, KF, FF), pp. 297–301.
JCDL-2007-AbbasiC #analysis #categorisation #communication #visualisation- Categorization and analysis of text in computer mediated communication archives using visualization (AA, HC), pp. 11–18.
JCDL-2007-BorgmanWMP #architecture #embedded #library #network- Drowning in data: digital library architecture to support scientific use of embedded sensor networks (CLB, JCW, MSM, AP), pp. 269–277.
JCDL-2007-CheeS #clustering #community #documentation- Document clustering using small world communities (BWC, BRS), pp. 53–62.
JCDL-2007-DruinWMB #case study #library- Children’s interests and concerns when using the international children’s digital library: a four-country case study (AD, AW, SM, BBB), pp. 167–176.
JCDL-2007-Ernst-GerlachF #retrieval- Retrieval in text collections with historic spelling using linguistic and spelling variants (AEG, NF), pp. 333–341.
JCDL-2007-LiCZL #automation #case study #classification #network- Automatic patent classification using citation network information: an experimental study in nanotechnology (XL, HC, ZZ, JL), pp. 419–427.
JCDL-2007-NewmanHCS #metadata #modelling #statistics #topic- Subject metadata enrichment using statistical topic models (DN, KH, CC, PS), pp. 366–375.
JCDL-2007-RichardsonF - Using bilingual ETD collections to mine phrase translations (RR, EAF), pp. 352–353.
JCDL-2007-TakedaT #clustering #named #performance #summary- UpdateNews: a news clustering and summarization system using efficient text processing (TT, AT), pp. 438–439.
SIGMOD-2007-BandiMAA #algorithm #data type #performance- Fast data stream algorithms using associative memories (NB, AM, DA, AEA), pp. 247–256.
SIGMOD-2007-ChandyG #database- Event processing using database technology (KMC, DG), pp. 1169–1170.
SIGMOD-2007-FaloutsosKS #graph #matrix #mining #scalability #tool support- Mining large graphs and streams using matrix and tensor tools (CF, TGK, JS), p. 1174.
SIGMOD-2007-FangHLYGLS #named #query- GPUQP: query co-processing using graphics processors (RF, BH, ML, KY, NKG, QL, PVS), pp. 1061–1063.
SIGMOD-2007-LarsonLZZ #assurance #estimation #quality- Cardinality estimation using sample views with quality assurance (PÅL, WL, JZ, PZ), pp. 175–186.
SIGMOD-2007-NandiJ #interface #query- Assisted querying using instant-response interfaces (AN, HVJ), pp. 1156–1158.
SIGMOD-2007-TufteLMPBR #estimation- Travel time estimation using NiagaraST and latte (KT, JL, DM, VP, RLB, JR), pp. 1091–1093.
SIGMOD-2007-ZhouGBN #query- Query relaxation using malleable schemas (XZ, JG, WTB, WN), pp. 545–556.
VLDB-2007-AbadiMMH #clustering #data transformation #scalability #semantics #web- Scalable Semantic Web Data Management Using Vertical Partitioning (DJA, AM, SM, KJH), pp. 411–422.
VLDB-2007-BhattacharyaMS #distributed #modelling #named #network #query #statistics- MIST: Distributed Indexing and Querying in Sensor Networks using Statistical Models (AB, AM, AKS), pp. 854–865.
VLDB-2007-Helmer #documentation #similarity- Measuring the Structural Similarity of Semistructured Documents Using Entropy (SH), pp. 1022–1032.
VLDB-2007-LimWW - Unifying Data and Domain Knowledge Using Virtual Views (LL, HW, MW), pp. 255–266.
VLDB-2007-LitwinMRS #algebra #performance #string- Fast nGram-Based String Search Over Data Encoded Using Algebraic Signatures (WL, RM, PR, TJES), pp. 207–218.
VLDB-2007-LiuWC #keyword #named #semantics #xml- XSeek: A Semantic XML Search Engine Using Keywords (ZL, JW, YC), pp. 1330–1333.
VLDB-2007-LiWY #approximate #named #performance #query #string- VGRAM: Improving Performance of Approximate Queries on String Collections Using Variable-Length Grams (CL, BW, XY), pp. 303–314.
VLDB-2007-PapadomanolakisDA #automation #database #design #performance #query- Efficient Use of the Query Optimizer for Automated Database Design (SP, DD, AA), pp. 1093–1104.
VLDB-2007-ShenDNR #datalog #declarative #embedded #information management- Declarative Information Extraction Using Datalog with Embedded Extraction Predicates (WS, AD, JFN, RR), pp. 1033–1044.
VLDB-2007-ZinnBG #modelling #query- Modeling and Querying Vague Spatial Objects Using Shapelets (DZ, JB, MG), pp. 567–578.
CSEET-2007-CarverHHHR #programming #re-engineering #student- Increased Retention of Early Computer Science and Software Engineering Students Using Pair Programming (JCC, LH, LH, JEH, DSR), pp. 115–122.
CSEET-2007-Chao #collaboration #student #wiki- Student Project Collaboration Using Wikis (JC), pp. 255–261.
CSEET-2007-McGregorBBBK #architecture #education #reasoning- Using an Architecture Reasoning Tool to Teach Software Architecture (JDM, FB, LB, PB, MK), pp. 275–282.
CSEET-2007-Padua #development #modelling- Using Model-Driven Development in Time-Constrained Course Projects (WP), pp. 133–140.
CSEET-2007-RootRT #concept #re-engineering- Key Software Engineering Concepts for Project Success: The Use of “Boot Camp” to Establish Successful Software Projects (DR, MRL, GT), pp. 203–210.
CSEET-2007-Staron #analysis #learning #student- Using Students as Subjects in Experiments--A Quantitative Analysis of the Influence of Experimentation on Students’ Learning Proces (MS), pp. 221–228.
CSEET-2007-Taran #education #game studies #re-engineering #risk management- Using Games in Software Engineering Education to Teach Risk Management (GT), pp. 211–220.
ITiCSE-2007-CaronnaSMIHT #predict- Prediction of modulators of pyruvate kinase in smiles text using aprori methods (JSC, RS, JDM, VLI, KGH, JHT), p. 348.
ITiCSE-2007-DistasioW #education #framework #game studies- Inclusive computer science education using a ready-made computer game framework (JD, TPW), pp. 116–120.
ITiCSE-2007-FreireFPT #education #web- Using screen readers to reinforce web accessibility education (APF, RPdMF, DMBP, MAST), pp. 82–86.
ITiCSE-2007-GorraLC #assessment #database #student- An account of the use of synoptic assessment for students in the area of databases at level 2 (AG, SL, JC), p. 334.
ITiCSE-2007-Impagliazzo #approach #source code- Using an outcome-based approach to assess computing programs (JI), p. 344.
ITiCSE-2007-KheirW #realtime #speech #student- Inclusion of deaf students in computer science classes using real-time speech transcription (RK, TW), pp. 261–265.
ITiCSE-2007-Lewis #student #word- Are pictures worth 1000 words? the use of affective imagery surveys to capture student perceptions of the computing discipline (TLL), p. 312.
ITiCSE-2007-OliverGMA #learning- Using disruptive technology for explorative learning (IO, KG, AM, CA), pp. 96–100.
SIGITE-2007-Bailey #web- A web systems laboratory using portable hard drives (MGB), pp. 107–112.
SIGITE-2007-ChaKL #abstraction #problem- Using puzzles: problem-solving and abstraction (SC, DK, WGL), pp. 135–140.
SIGITE-2007-GuimaraesM #animation #database #education #security- Using animation courseware in the teaching of database security (MAMG, MM), pp. 253–258.
SIGITE-2007-MiertschinW #concept #learning- Using concept maps to navigate complex learning environments (SLM, CLW), pp. 175–184.
SIGITE-2007-ToderickL #linux #physics- Using VPN technology to remove physical barriers in linux lab experiments (LT, PJLI), pp. 113–118.
CSMR-2007-BrandBEJKKSV #ide #legacy #maintenance- Using The Meta-Environment for Maintenance and Renovation (MvdB, MB, GRE, HAdJ, PK, ATK, TvdS, JJV), pp. 331–332.
CSMR-2007-LoeschP #concept analysis #product line #variability- Restructuring Variability in Software Product Lines using Concept Analysis of Product Configurations (FL, EP), pp. 159–170.
CSMR-2007-Lormans #evolution #monitoring #requirements- Monitoring Requirements Evolution using Views (ML), pp. 349–352.
ICPC-2007-CornelissenHZMWD #comprehension #execution #sequence- Understanding Execution Traces Using Massive Sequence and Circular Bundle Views (BC, DH, AZ, LM, JJvW, AvD), pp. 49–58.
ICPC-2007-MirarabHT #co-evolution #network #predict- Using Bayesian Belief Networks to Predict Change Propagation in Software Systems (SM, AH, LT), pp. 177–188.
ICPC-2007-StefikAPB #debugging #named- WAD: A Feasibility study using the Wicked Audio Debugger (AS, RTA, RP, JB), pp. 69–80.
ICPC-2007-Vivanco #algorithm #complexity #identification #metric #modelling #predict #search-based #source code- Use of a Genetic Algorithm to Identify Source Code Metrics Which Improves Cognitive Complexity Predictive Models (RAV), pp. 297–300.
ICSM-2007-Anda #maintenance #metric- Assessing Software System Maintainability using Structural Measures and Expert Assessments (BA), pp. 204–213.
ICSM-2007-CossetteW #analysis #dependence #evaluation #semiparsing- Polylingual Dependency Analysis Using Island Grammars: A Cost Versus Accuracy Evaluation (BC, RJW), pp. 214–223.
ICSM-2007-GustavssonLLMB #development #distributed #maintenance #modelling #uml- Simplifying maintenance by using XSLT to unlock UML models in a distributed development environment (HG, BL, BL, AM, MB), pp. 465–468.
ICSM-2007-LuccaFT #classification #concept analysis #web- Web Pages Classification using Concept Analysis (GADL, ARF, PT), pp. 385–394.
ICSM-2007-Salahuddin #testing- Analysing the Impact of Change on Test Sets Using X-Machines (SS), pp. 511–512.
ICSM-2007-Vivanco #approach #modelling #predict #quality- Improving Predictive Models of Software Quality Using an Evolutionary Computational Approach (RV), pp. 503–504.
ICSM-2007-WalkinshawRW #feature model- Feature Location and Extraction using Landmarks and Barriers (NW, MR, MW), pp. 54–63.
MSR-2007-German #open source- Using Software Distributions to Understand the Relationship among Free and Open Source Software Projects (DMG), p. 24.
MSR-2007-HerraizGR07a #analysis #eclipse- Forecasting the Number of Changes in Eclipse Using Time Series Analysis (IH, JMGB, GR), p. 32.
MSR-2007-LivieriHMI #analysis #evolution #kernel #linux- Analysis of the Linux Kernel Evolution Using Code Clone Coverage (SL, YH, MM, KI), p. 22.
MSR-2007-Masticola #development #lightweight #mining #repository- Lightweight Risk Mitigation for Software Development Projects Using Repository Mining (SPM), p. 13.
MSR-2007-ValettoHECWW #congruence #development #repository- Using Software Repositories to Investigate Socio-technical Congruence in Development Projects (GV, MEH, KE, SC, MNW, CW), p. 25.
SCAM-2007-MolinaS #approximate #open source #performance #source code- Fast Approximate Matching of Programs for Protecting Libre/Open Source Software by Using Spatial Indexes (AJMM, TS), pp. 111–122.
SCAM-2007-RodenVEM #agile #empirical #metric #modelling #process #quality- An Empirical Study of the Relationship of Stability Metrics and the QMOOD Quality Models Over Software Developed Using Highly Iterative or Agile Software Processes (PLR, SV, LHE, SLM), pp. 171–179.
WCRE-2007-McNairGW #architecture #evolution #visualisation- Visualizing Software Architecture Evolution Using Change-Sets (AM, DMG, JHWJ), pp. 130–139.
WCRE-2007-RaberL #data mining #debugging #mining- Emulated Breakpoint Debugger and Data Mining Using Detours (JR, EL), pp. 271–272.
WCRE-2007-Staiger #analysis #reverse engineering #user interface #visual notation- Reverse Engineering of Graphical User Interfaces Using Static Analyses (SS), pp. 189–198.
CIAA-2007-Marschner #transducer- Efficiently Matching with Local Grammars Using Prefix Overlay Transducers (CM), pp. 314–316.
LATA-2007-KutribM #automaton #performance #recognition- Fast Reversible Language Recognition Using Cellular Automata (MK, AM), pp. 331–342.
IFM-2007-HasanT #cumulative #probability #verification- Verification of Probabilistic Properties in HOL Using the Cumulative Distribution Function (OH, ST), pp. 333–352.
IFM-2007-PlaggeL #model checking #specification #validation- Validating Z Specifications Using the ProBAnimator and Model Checker (DP, ML), pp. 480–500.
IFM-2007-PodorozhnyKPZ #alloy #multi #verification- Verification of Multi-agent Negotiations Using the Alloy Analyzer (RMP, SK, DEP, XZ), pp. 501–517.
RTA-2007-EscobarM #infinity #model checking- Symbolic Model Checking of Infinite-State Systems Using Narrowing (SE, JM), pp. 153–168.
RTA-2007-KorpM #bound #proving #term rewriting #termination- Proving Termination of Rewrite Systems Using Bounds (MK, AM), pp. 273–287.
SEFM-2007-CrockerC #automation #c #reasoning #source code #verification- Verification of C Programs Using Automated Reasoning (DC, JC), pp. 7–14.
SEFM-2007-Lano #diagrams #interactive #specification- Formal Specification using Interaction Diagrams (KL), pp. 293–304.
SEFM-2007-SahaRC #modelling #protocol #verification- Modeling and Verification of TTCAN Startup Protocol Using Synchronous Calendar (IS, SR, KC), pp. 69–79.
SEFM-2007-SampathRSR #case study #generative #how- How to Test Program Generators? A Case Study using flex (PS, ACR, KCS, SR), pp. 80–92.
ICFP-2007-BeshersFS #case study #experience #functional #linux #programming- Experience report: using functional programming to manage a linux distribution (CB, DF, JS), pp. 213–218.
ICFP-2007-MarlowYJ #lazy evaluation #performance #pointer- Faster laziness using dynamic pointer tagging (SM, ARY, SLPJ), pp. 277–288.
IFL-2007-Kleeblatt #dependent type- Checking Dependent Types Using Compiled Code (DK), pp. 165–182.
IFL-2007-NaylorR #graph #reduction- The Reduceron: Widening the von Neumann Bottleneck for Graph Reduction Using an FPGA (MN, CR), pp. 129–146.
ILC-2007-Borden #classification- Classification using conditional probabilities and Shannon’s definition of information (AB), p. 15.
ILC-2007-HerzeelGCD #e-commerce #lisp- Modularizing crosscuts in an e-commerce application in Lisp using HALO (CH, KG, PC, TD), p. 11.
CIG-2007-CarterL #algorithm- An Investigation into Tournament Poker Strategy using Evolutionary Algorithms (RGC, JL), pp. 117–124.
CIG-2007-FinkDA #behaviour #game studies #machine learning- Extracting NPC behavior from computer games using computer vision and machine learning techniques (AF, JD, JA), pp. 24–31.
CIG-2007-LeighLM #algorithm #search-based- Using a Genetic Algorithm to Explore A*-like Pathfinding Algorithms (REL, SJL, CM), pp. 72–79.
CIG-2007-OommenGP #bound #finite #game studies #probability- Using Stochastic AI Techniques to Achieve Unbounded Resolution in Finite Player Goore Games and its Applications (BJO, OCG, AP), pp. 161–167.
CIG-2007-RunarssonJ #evaluation #learning- Effect of look-ahead search depth in learning position evaluation functions for Othello using -greedy exploration (TPR, EOJ), pp. 210–215.
CIG-2007-SeredynskiBK #ad hoc #behaviour #evolution #game studies #modelling #network- Modelling the Evolution of Cooperative Behavior in Ad Hoc Networks using a Game Based Model (MS, PB, MAK), pp. 96–103.
CIG-2007-VenessB #effectiveness #game studies #probability- Effective Use of Transposition Tables in Stochastic Game Tree Search (JV, AB), pp. 112–116.
DiGRA-2007-BraggeS #game studies #mining #profiling #research #tool support- Profiling Academic Research on Digital Games Using Text Mining Tools (JB, JS).
DiGRA-2007-DekkerC #game studies- Please Biofeed the Zombies: Enhancing the Gameplay and Display of a Horror Game Using Biofeedback (AD, EC).
DiGRA-2007-KamRTC #design pattern #game studies #mobile- Mobile Gaming with Children in Rural India: Contextual Factors in the Use of Game Design Patterns (MK, VR, AT, JFC).
DiGRA-2007-NatkinYJM #adaptation #game studies #modelling #multi #ubiquitous- Creating Multiplayer Ubiquitous Games using an adaptive narration model based on a user's model (SN, CY, SJ, BM).
DiGRA-2007-WyeldLCGLH #game studies- The Ethics of Indigenous Storytelling: using the Torque Game Engine to Support Australian Aboriginal Cultural Heritage (TGW, BL, JC, CG, BL, JH).
GDCSE-J-2007-Youngblood #education #game studies #student- Engaging Students in Advanced Computer Science Education Using Game Segments (GMY).
AGTIVE-2007-AschenbrennerG #graph #graph grammar- Transforming Scene Graphs Using Triple Graph Grammars — A Practice Report (NA, LG), pp. 32–43.
AGTIVE-2007-BiermannEET #eclipse #editing #generative #plugin- Generating Eclipse Editor Plug-Ins Using Tiger (EB, KE, CE, GT), pp. 583–584.
AGTIVE-2007-EngelsGSW #consistency #contract #modelling #process #visual notation #web #web service- Assuring Consistency of Business Process Models and Web Services Using Visual Contracts (GE, BG, CS, HW), pp. 17–31.
AGTIVE-2007-GogollaBD #graph transformation #ocl- From Graph Transformation to OCL Using USE (MG, FB, DHD), pp. 585–586.
AGTIVE-2007-LeenheerM #collaboration #evolution #graph transformation #ontology- Using Graph Transformation to Support Collaborative Ontology Evolution (PDL, TM), pp. 44–58.
GT-VMT-2007-BisztrayH #csp #process #verification- Rule-Level Verification of Business Process Transformations using CSP (DB, RH).
GT-VMT-2007-BonevaHKR #graph transformation #multi #simulation- Simulating Multigraph Transformations Using Simple Graphs (IB, FH, HK, AR).
CHI-2007-BirnholtzGMB #case study #process #scalability- An exploratory study of input configuration and group process in a negotiation task using a large display (JPB, TG, CM, RB), pp. 91–100.
CHI-2007-DingEKLCSWB #empirical #visual notation- An empirical study of the use of visually enhanced voip audio conferencing: the case of IEAC (XD, TE, WAK, SL, JC, JBS, TVW, WEB), pp. 1019–1028.
CHI-2007-KristenssonZ #gesture- Command strokes with and without preview: using pen gestures on keyboard for command selection (POK, SZ), pp. 1137–1146.
CHI-2007-KumarPW #named- EyePoint: practical pointing and selection using gaze and keyboard (MK, AP, TW), pp. 421–430.
CHI-2007-LankCR #predict- Endpoint prediction using motion kinematics (EL, YCNC, JR), pp. 637–646.
CHI-2007-LudfordPRT - Capturing, sharing, and using local place information (PJL, RP, KR, LGT), pp. 1235–1244.
CHI-2007-MoravejiLDOW #design #named- Comicboarding: using comics as proxies for participatory design with children (NM, JL, JD, PO, SW), pp. 1371–1374.
CHI-2007-NenonenLHLJH #game studies #interactive- Using heart rate to control an interactive game (VN, AL, VH, TL, MJ, PH), pp. 853–856.
CHI-2007-SchrammelGST #exclamation #quote- “Look!”: using the gaze direction of embodied agents (JS, AG, RS, MT), pp. 1187–1190.
CHI-2007-SeayK #game studies #online #problem #self- Project massive: self-regulation and problematic use of online gaming (AFS, REK), pp. 829–838.
CHI-2007-SellenFAHRW #case study #memory management- Do life-logging technologies support memory for the past?: an experimental study using sensecam (AS, AF, MA, SH, CR, KRW), pp. 81–90.
CHI-2007-TangLPWD #interactive #process- Recent shortcuts: using recent interactions to support shared activities (JCT, JL, JSP, SW, CD), pp. 1263–1272.
CHI-2007-VogelB #interface #named- Shift: a technique for operating pen-based interfaces using touch (DV, PB), pp. 657–666.
CHI-2007-ZhaoDCBB #feedback #named- Earpod: eyes-free menu selection using touch input and reactive audio feedback (SZ, PD, MHC, RB, PB), pp. 1395–1404.
DHM-2007-BeurierCMTW #approach #data-driven #database #simulation- Simulation of Digital Human Hand Postures of Car Controls Using a Data Based Approach (GB, NC, GM, JT, XW), pp. 13–22.
DHM-2007-EndoKKMKM #assessment #design- A Computer-Aided Ergonomic Assessment and Product Design System Using Digital Hands (YE, SK, TK, NM, MK, MM), pp. 833–842.
DHM-2007-FanC #adaptation- A Modified Particle Swarm Optimizer Using an Adaptive Dynamic Weight Scheme (SKSF, JMC), pp. 56–65.
DHM-2007-GeorgeG #modelling- Facilitating Pronunciation Skills for Children with Phonological Disorders Using Human Modelling (JG, PG), pp. 595–605.
DHM-2007-KimPHL #design #evaluation- Evaluation of Navy Shipboard Habitability for a Warship Design Using Human Model (HK, JHP, HH, CML), pp. 884–893.
DHM-2007-LeeFCBEAP #finite #modelling- Finite Element Modeling to Aid in Refining the Rehabilitation of Amputees Using Osseointegrated Prostheses (WL, LF, NJC, RB, JE, CA, MJP), pp. 655–658.
DHM-2007-VolzBHK #automation #generative #linear #metric- Automatic, Body Measurements Based Generation of Individual Avatars Using Highly Adjustable Linear Transformation (AV, RB, SH, KK), pp. 453–459.
DHM-2007-WashburnSG #maintenance #multimodal- Using Multimodal Technologies to Enhance Aviation Maintenance Inspection Training (CW, PS, AKG), pp. 1018–1026.
DHM-2007-YaoMW #3d #low cost- Low Cost 3D Shape Acquisition System Using Strip Shifting Pattern (LY, LM, DW), pp. 276–285.
DHM-2007-ZhaoL #3d #image #locality #orthogonal- Capturing 3D Human Motion from Monocular Images Using Orthogonal Locality Preserving Projection (XZ, YL), pp. 304–313.
HCI-AS-2007-KimuraTHTAOT #analysis #approach- The Analysis of Near-Miss Cases Using Data-Mining Approach (MK, KT, TH, YT, TA, MO, FT), pp. 474–483.
HCI-AS-2007-KojimaIN #documentation- Document Management and Information Organizing Method Using RFID Tags (HK, KI, NN), pp. 601–610.
HCI-AS-2007-LeeNB #monitoring #network #reliability- Personal Life Logger and Belonging Monitor Using Reliable ZigBee Networks (KL, KN, CB), pp. 961–970.
HCI-IDU-2007-BaranauskasN #design #flexibility #interactive- Using Patterns to Support the Design of Flexible User Interaction (MCCB, VPdAN), pp. 1033–1042.
HCI-IDU-2007-Forsman #experience #human-computer #research #tool support- After Hurricane Katrina: Post Disaster Experience Research Using HCI Tools and Techniques (CF), pp. 78–87.
HCI-IDU-2007-Gomez-CarneroI #representation- Evaluator of User’s Actions (Eua) Using the Model of Abstract Representation Dgaui (SGC, JRI), pp. 463–471.
HCI-IDU-2007-LingLX #complexity #validation #web- Validating Information Complexity Questionnaires Using Travel Web Sites (CL, ML, JX), pp. 901–910.
HCI-IDU-2007-OkamotoKGI #design- Participatory Design Using Scenarios in Different Cultures (MO, HK, IG, KI), pp. 223–231.
HCI-IDU-2007-StrybelVDKNCG #predict- Predicting Perceived Situation Awareness of Low Altitude Aircraft in Terminal Airspace Using Probe Questions (TZS, KPLV, JPD, JK, TKN, VC, FPG), pp. 939–948.
HCI-IDU-2007-TarbyERTLK #architecture #aspect-oriented #comparison #evaluation #interactive #programming #usability- Traces Using Aspect Oriented Programming and Interactive Agent-Based Architecture for Early Usability Evaluation: Basic Principles and Comparison (JCT, HE, JR, CDT, PL, CK), pp. 632–641.
HCI-IDU-2007-TranMC #independence #memory management- Using Memory Aid to Build Memory Independence (QTT, EDM, GC), pp. 959–965.
HCI-IDU-2007-VogiazouFL #design #process- The Use of Improvisational Role-Play in User Centered Design Processes (YV, JF, JL), pp. 262–272.
HCI-IPT-2007-ChenC - Using Agent Technology to Study Human Action and Perception Through a Virtual Street Simulator (CHC, MLC), pp. 560–568.
HCI-IPT-2007-DzwiarekLNRS #artificial reality #assessment #visual notation- Assessment of Perception of Visual Warning Signals Generated Using an Augmented Reality System (MD, AL, AN, CR, TS), pp. 579–586.
HCI-IPT-2007-GalludLTP #experience #interactive #mobile- Using Mobile Devices to Improve the Interactive Experience of Visitors in Art Museums (JAG, MDL, RT, VMRP), pp. 280–287.
HCI-IPT-2007-JeonKB #mobile- Interacting with a Tabletop Display Using a Camera Equipped Mobile Phone (SJ, GJK, MB), pp. 336–343.
HCI-IPT-2007-ParkJ #automation #detection #documentation #image #mobile #word- Automatic Word Detection System for Document Image Using Mobile Devices (AP, KJ), pp. 438–444.
HCI-IPT-2007-SongWT #game studies #interface- A Tangible Game Interface Using Projector-Camera Systems (PS, SW, JT), pp. 956–965.
HCI-IPT-2007-TsaoCC #concept #design #flexibility #research #smarttech- The Research of Using Image-Transformation to the Conceptual Design of Wearable Product with Flexible Display (YCT, LCC, SCC), pp. 1220–1229.
HCI-IPT-2007-YoshidaMS #interactive #mobile #visual notation- Mobile Magic Hand: Camera Phone Based Interaction Using Visual Code and Optical Flow (YY, KM, TS), pp. 513–521.
HCI-MIE-2007-Alexandris #human-computer #quote #semantics- “Show and Tell”: Using Semantically Processable Prosodic Markers for Spatial Expressions in an HCI System for Consumer Complaints (CA), pp. 13–22.
HCI-MIE-2007-ChanCCHH #detection #multi- A New Method for Multi-finger Detection Using a Regular Diffuser (LWC, YFC, YWC, YPH, JYjH), pp. 573–582.
HCI-MIE-2007-ChangKP #constraints #evolution #set- Lip Contour Extraction Using Level Set Curve Evolution with Shape Constraint (JSC, EYK, SHP), pp. 583–588.
HCI-MIE-2007-ChungK #classification- Classification of a Person Picture and Scenery Picture Using Structured Simplicity (MBC, IJK), pp. 821–828.
HCI-MIE-2007-DerakhshiK #bound #fuzzy #network #predict #sequence #word- Using Recurrent Fuzzy Neural Networks for Predicting Word Boundaries in a Phoneme Sequence in Persian Language (MRFD, MRK), pp. 50–59.
HCI-MIE-2007-HanYYJ #analysis #automation #image #mobile #semantics- Automatic Mobile Content Conversion Using Semantic Image Analysis (EH, JY, HY, KJ), pp. 298–307.
HCI-MIE-2007-HilligesKPBK #analysis #automation #classification #image #quality #sorting- Browsing and Sorting Digital Pictures Using Automatic Image Classification and Quality Analysis (OH, PK, AP, AB, HPK), pp. 882–891.
HCI-MIE-2007-HirotaWI #interface- Menu Selection Using Auditory Interface (KH, YW, YI), pp. 70–75.
HCI-MIE-2007-JangKC #geometry #visual notation- Position and Pose Computation of a Moving Camera Using Geometric Edge Matching for Visual SLAM (HJ, GYK, HIC), pp. 634–641.
HCI-MIE-2007-JangWB #named- MEMORIA: Personal Memento Service Using Intelligent Gadgets (HJ, JW, CB), pp. 331–339.
HCI-MIE-2007-JungKK #estimation #image #modelling- Human Pose Estimation Using a Mixture of Gaussians Based Image Modeling (DJJ, KSK, HJK), pp. 649–658.
HCI-MIE-2007-JuSK #game studies #people #quote- “Shooting a Bird”: Game System Using Facial Feature for the Handicapped People (JJ, YS, EYK), pp. 642–648.
HCI-MIE-2007-KangEKKASK #modelling #multi- Human Motion Modeling Using Multivision (BDK, JSE, JHK, CK, SHA, BJS, SKK), pp. 659–668.
HCI-MIE-2007-KimKEKASK #adaptation #detection #realtime- Real-Time Face Tracking System Using Adaptive Face Detector and Kalman Filter (JHK, BDK, JSE, CK, SHA, BJS, SKK), pp. 669–678.
HCI-MIE-2007-KimSK #network- Emotion-Based Textile Indexing Using Neural Networks (NYK, YS, EYK), pp. 349–357.
HCI-MIE-2007-KwonPKK #recognition- Human Shape Tracking for Gait Recognition Using Active Contours with Mean Shift (KSK, SHP, EYK, HJK), pp. 690–699.
HCI-MIE-2007-MehtaC #ontology- Developing a Conversational Agent Using Ontologies (MM, AC), pp. 154–164.
HCI-MIE-2007-OguraNS #communication #parallel #thread- Exploration of Possibility of Multithreaded Conversations Using a Voice Communication System (KO, KN, KS), pp. 186–195.
HCI-MIE-2007-ReveiuDF #adaptation #multi #retrieval- Using Content-Based Multimedia Data Retrieval for Multimedia Content Adaptation (AR, MD, FF), pp. 486–492.
HCI-MIE-2007-SetiawanHL #interactive #multi #people- Multiple People Labeling and Tracking Using Stereo for Human Computer Interaction (NAS, SJH, CWL), pp. 738–746.
HCI-MIE-2007-WangYCI #interactive #interface #multimodal #realtime- Character Agents in E-Learning Interface Using Multimodal Real-Time Interaction (HW, JY, MHC, MI), pp. 225–231.
HCI-MIE-2007-YoonK #case study #interactive- A Study on Interactive Artwork as an Aesthetic Object Using Computer Vision System (JY, JK), pp. 763–768.
HIMI-IIE-2007-AlsharaI #integration #learning- Business Integration Using the Interdisciplinary Project Based Learning Model (IPBL) (OKA, MI), pp. 823–833.
HIMI-IIE-2007-DoyoSA #case study #transaction- A Study of Production / Transaction-Related Model Using Control Theory (DD, KS, KA), pp. 855–862.
HIMI-IIE-2007-FisherBHSJ #email #lessons learnt #metadata #social- Using Social Metadata in Email Triage: Lessons from the Field (DF, AJBB, BH, MAS, AJ), pp. 13–22.
HIMI-IIE-2007-HarunN #user interface- User Interface for Knowledge Sharing Using Knowledge Gardening Metaphor (AFH, NLMN), pp. 319–327.
HIMI-IIE-2007-HashimotoN #community #memory management- Fond Memory Management System by Using Information About Communities (KH, YN), pp. 23–29.
HIMI-IIE-2007-HsuCSWY #analysis #assessment #game studies #interface #online- Function Interfaces Assessment of Online Game Websites in Great China Area Using Content Analysis (CIH, CC, CHS, PJW, YJY), pp. 337–346.
HIMI-IIE-2007-IshiiYIN #navigation- A Navigation System Using Ultrasonic Directional Speaker with Rotating Base (KI, YY, MI, KN), pp. 526–535.
HIMI-IIE-2007-KaminoyamaMHSKA #navigation #people- Walk Navigation System Using Photographs for People with Dementia (HK, TM, FH, KS, NK, SA), pp. 1039–1049.
HIMI-IIE-2007-KanekoNATT #analysis #generative #mining- A Method for Generating Plans for Retail Store Improvements Using Text Mining and Conjoint Analysis (TK, YN, MA, TT, YT), pp. 910–917.
HIMI-IIE-2007-LiuYCL #estimation #health #modelling- Health Risk Estimation of Dichlorobenzene Exposure Workers by Using Computer Models (PSL, RMY, YMC, CYL), pp. 1060–1066.
HIMI-IIE-2007-MaILJ - Use of Chinese Short Messages (DM, FI, YL, LJ), pp. 582–591.
HIMI-IIE-2007-NagamatsuKKS #development #eye tracking- Development of a Skill Acquisition Support System Using Expert’s Eye Movement (TN, YK, JK, HS), pp. 430–439.
HIMI-IIE-2007-WakitaAT #metric #mobile #prototype- Methodology for Constructing a Prototype Site for Finding Employment SPI Measures Using Mobile Phones (SW, MA, TT), pp. 983–993.
HIMI-IIE-2007-WangCH #memory management- Using Long Term Memory for Bookmark Management (MJW, KMC, TKH), pp. 812–820.
HIMI-IIE-2007-YamaguchiNAHKN #artificial reality #named #navigation- AR-Navi: An In-Vehicle Navigation System Using Video-Based Augmented Reality Technology (YY, TN, KA, MH, HK, SN), pp. 1139–1147.
HIMI-IIE-2007-YoonKPLY #game studies #modelling- Game Player Modeling Using D-FSMs (TBY, DMK, KHP, JHL, KHY), pp. 490–499.
HIMI-MTT-2007-AblassmeierPRR #network- Context-Aware Information Agents for the Automotive Domain Using Bayesian Networks (MA, TP, SR, GR), pp. 561–570.
HIMI-MTT-2007-ChienC #comprehension- The Use of Dynamic Display to Improve Reading Comprehension for the Small Screen of a Wrist Watch (YHC, CHC), pp. 814–823.
HIMI-MTT-2007-ChoBKC #difference #on the #probability- On Achieving Proportional Loss Differentiation Using Dynamic-MQDDP with Differential Drop Probability (KC, SB, JK, JWC), pp. 584–593.
HIMI-MTT-2007-CornsML #approach #development #machine learning #optimisation- Development of an Approach for Optimizing the Accuracy of Classifying Claims Narratives Using a Machine Learning Tool (TEXTMINER[4]) (HLC, HRM, MRL), pp. 411–416.
HIMI-MTT-2007-GoncalvesaMJ #documentation- Using Autobiographic Information to Retrieve Real and Electronic Documents (DG, TJVG, RM, JAJ), pp. 427–436.
HIMI-MTT-2007-Jeong #comprehension- Suggestion of Methods for Understanding User’s Emotional Changes While Using a Product (SHJ), pp. 59–67.
HIMI-MTT-2007-JiGC #comparison #word- Selecting Target Word Using Contexonym Comparison Method (HJ, BG, HC), pp. 463–470.
HIMI-MTT-2007-KwonSH #design #implementation #realtime- Design and Implementation of Enhanced Real Time News Service Using RSS and VoiceXML (HJK, JHS, KSH), pp. 677–686.
HIMI-MTT-2007-LeeJ #case study- A Study on a Stereoscopic Display System Using a Rotary Disk Type Beam Shutter (KHL, TJJ), pp. 868–875.
HIMI-MTT-2007-MarucciLC #approach #classification #fuzzy- Computer Classification of Injury Narratives Using a Fuzzy Bayes Approach: Improving the Model (HRM, MRL, HLC), pp. 500–506.
HIMI-MTT-2007-Miki #collaboration #development #guidelines- Use of Socio-technical Guidelines in Collaborative System Development (HM), pp. 90–97.
HIMI-MTT-2007-NagaiEK #comprehension #process- Measuring Brain Activities Related to Understanding Using Near-Infrared Spectroscopy (NIRS) (MN, NE, TK), pp. 884–893.
HIMI-MTT-2007-SakuradaHON #interface #online #recognition- A Japanese Text Input Interface Using On-Line Writing-Box-Free Handwriting Recognition and Kana-to-Kanji Conversion (TS, YH, HO, MN), pp. 940–949.
HIMI-MTT-2007-ShiIL #query #visual notation- Facilitating Visual Queries in the TreeMap Using Distortion Techniques (KS, PI, PCL), pp. 345–353.
HIMI-MTT-2007-TogawaKY #communication #detection #mining #network #peer-to-peer- Peer-to-Peer File Sharing Communication Detection System Using Network Traffic Mining (ST, KK, YY), pp. 769–778.
OCSC-2007-BlevisLRS #design #interactive #research- Using Design Critique as Research to Link Sustainability and Interactive Technologies (EB, YKL, DR, ES), pp. 22–31.
OCSC-2007-NuschkeJ #collaboration #communication #framework #information management #tool support- A Framework for Inter-organizational Collaboration Using Communication and Knowledge Management Tools (PN, XJ), pp. 406–415.
VISSOFT-2007-BohnerGHM #analysis #source code #uml #visual notation #visualisation- Evolutional Insights from UML and Source Code Versions using Information Visualization and Visual Analysis (SAB, DG, TH, KM), pp. 145–148.
VISSOFT-2007-HoltenCW #sequence #visualisation- Trace Visualization Using Hierarchical Edge Bundles and Massive Sequence Views (DH, BC, JJvW), pp. 47–54.
VISSOFT-2007-LangelierD #analysis #visual notation- Visual Analysis of Azureus using VERSO (GL, KD), pp. 163–164.
VISSOFT-2007-LienhardKG #agile #prototype #visualisation- Rapid Prototyping of Visualizations using Mondrian (AL, AK, OG), pp. 67–70.
CAiSE-2007-EderW #comparison #detection #graph #ontology- Change Detection in Ontologies Using DAG Comparison (JE, KW), pp. 21–35.
CAiSE-2007-LiuBW #behaviour #modelling- Modeling Business Contexture and Behavior Using Business Artifacts (RL, KB, FYW), pp. 324–339.
CAiSE-2007-SilvaAMC #design #social- Designing Social Patterns Using Advanced Separation of Concerns (CTLLS, JA, AMDM, JC), pp. 309–323.
EDOC-2007-LiningtonL #approach #behaviour #modelling #security- Incorporating Security Behaviour into Business Models Using a Model Driven Approach (PFL, PL), pp. 405–413.
EDOC-2007-MilanovicKGGWDH #integration #process- Business Process Integration by Using General Rule Markup Language (MM, NK, DG, AG, GW, VD, MH), pp. 353–364.
EDOC-2007-Molina-JimenezSC #consistency #implementation #message passing #middleware- Implementing Business Conversations with Consistency Guarantees Using Message-Oriented Middleware (CMJ, SKS, NC), pp. 51–62.
EDOC-2007-RosenbergEMPD #aspect-oriented #development #process #quality #top-down- Integrating Quality of Service Aspects in Top-Down Business Process Development Using WS-CDL and WS-BPEL (FR, CE, AM, CP, SD), pp. 15–26.
EDOC-2007-SunithaAK - Controlled Delegation in e-cheques Using Proxy Signatures (NRS, BBA, PK), pp. 414–422.
ICEIS-AIDSS-2007-BermejoGP #email- Attribute Construction for E-Mail Foldering by Using Wrappered Forward Greedy Search (PB, JAG, JMP), pp. 247–252.
ICEIS-AIDSS-2007-KirwanGM #adaptation #case study #energy #implementation #information management- Energy Management Information Systems: An Exploratory study of Implementations Using Adaptive Structuration Theory (OK, WG, PM), pp. 303–309.
ICEIS-AIDSS-2007-KrohaR #classification- Using Grammars for Text Classification (PK, TR), pp. 259–264.
ICEIS-AIDSS-2007-LiuCM #recognition- Named Entity Recognition in Biomedical Literature Using Two-Layer Support Vector Machines (FL, YC, BM), pp. 39–48.
ICEIS-AIDSS-2007-YingboJJ #learning #predict #process #workflow- Using Decision Tree Learning to Predict Workflow Activity Time Consumption (YL, JW, JS), pp. 69–75.
ICEIS-DISI-2007-AraqueSD #data flow #monitoring #web- Monitoring web data sources using temporal properties as an external resources of a data warehouse (FA, AS, CD), pp. 28–35.
ICEIS-DISI-2007-CairesC #architecture #semantics #web- Using semantic web and service oriented technologies to build loosely coupled systems: SWOAT — a service and semantic web oriented architecture technology (BC, JC), pp. 226–232.
ICEIS-DISI-2007-Calvo-FloresNGF #case study #fuzzy- Using fuzzy datacubes in the study of trading strategies (MDCF, JFNN, ELGG, JCFM), pp. 164–169.
ICEIS-DISI-2007-GroppeGL #order- Using an index of precomputed joins in order to speed up SPARQL processing (SG, JG, VL), pp. 13–20.
ICEIS-DISI-2007-PapatheocharousA #estimation #network- Software cost estimation using artificial neural networks with inputs selection (EP, ASA), pp. 398–407.
ICEIS-DISI-2007-RaminhosP #approach #declarative- Extraction and transformation of data from semi-structured text files using a declarative approach (RR, JMP), pp. 199–205.
ICEIS-DISI-2007-RayG - A method for early correspondence discovery using instance data (IR, CJMG), pp. 258–263.
ICEIS-EIS-2007-AddinquyT #enterprise #requirements #specification- Reducing Requirements to EIS Specifications GAP Using RM-ODP Enterprise Viewpoint (CA, BT), pp. 31–38.
ICEIS-EIS-2007-KarnouskosS #enterprise #network #towards- Towards Enterprise Applications Using Wireless Sensor Networks (SK, PS), pp. 230–236.
ICEIS-HCI-2007-AraujoB #architecture #education #game studies- Using Games in the Teaching of Digital Systems and of Computers Architecture (PJGdA, JVB), pp. 5–10.
ICEIS-HCI-2007-ArjunanWKY #human-computer #recognition #speech- Silent Bilingual Vowel Recognition — Using fSEMG for HCI based Speech Commands (SPA, HW, DKK, WCY), pp. 68–78.
ICEIS-HCI-2007-FariaBVR #framework #platform- Platform to Drive an Intelligent Wheelchair Using Facial Expressions (PMF, RAMB, EV, LPR), pp. 164–169.
ICEIS-HCI-2007-IshikawaYY #multi #novel- Novel View Telepresence with High-Scalability Using Multi-Casted Omni-Directional Videos (TI, KY, NY), pp. 148–156.
ICEIS-J-2007-ArjunanWKNY #recognition- Recognition of Human Voice Utterances from Facial Surface EMG without Using Audio Signals (SPA, HW, DKK, GRN, WCY), pp. 366–378.
ICEIS-J-2007-Barjis07a #modelling #process #simulation- A Business Process Modeling and Simulation Method Using DEMO (JB), pp. 254–265.
ICEIS-J-2007-CastroO07a #distributed #multi #problem- Solving Airline Operations Problems Using Specialized Agents in a Distributed Multi-Agent System (AJMC, ECO), pp. 173–184.
ICEIS-J-2007-TraversonA #requirements #specification- Linking Requirements to EIS Specifications Using Correspondence Rules (BT, CA), pp. 276–285.
ICEIS-SAIC-2007-BoukadiGMB #petri net #specification #verification #web #web service- Specification and Verification of Views over Composite Web Services Using High Level Petri-Nets (KB, CG, ZM, DB), pp. 107–112.
ICEIS-SAIC-2007-CheungSB #collaboration- Value Creation for SMES Using Collaborative Commerce Marketplaces (YPC, DS, JB), pp. 63–71.
ICEIS-SAIC-2007-GarcesQCHC #e-commerce #modelling #multi #transaction- E-Commerce Transaction Modeling Using Moderately Open Multi-Agent Systems (AG, RQ, MC, JH, EC), pp. 167–172.
ICEIS-SAIC-2007-Maximilien #approach #challenge #problem #ruby #semantics #web #web service- A Partial Solution to the Semantic Web Services Challenge Problem Using Swashup — The Ruby on Rails Services Mashup Approach (EMM), pp. 438–446.
ICEIS-SAIC-2007-PoloniaCO #scalability- A MODEL to Optimize the Use of Imaging Equipment and Human Skills Scattered in Very Large Geographical Areas (DFP, CMAC, JLO), pp. 208–212.
ICEIS-SAIC-2007-RezguiN #categorisation #composition #ontology #semantics- Ontology-Based Dynamic Service Composition Using Semantic Relatedness and Categorization Techniques (YR, SN), pp. 113–120.
ICEIS-SAIC-2007-RuizB #documentation- Summarizing Documents Using Fractal Techniques (MDR, ABB), pp. 26–33.
ICEIS-SAIC-2007-Silva #collaboration- Using Narratives in Collaborative Writing — An Example (NDS), pp. 351–358.
ICEIS-SAIC-2007-WuGRSM #automation #composition #process #semantics #web #web service- Automatic Composition of Semantic Web Services Using Process Mediation (ZW, KG, AR, APS, JAM), pp. 453–462.
CIKM-2007-CarteretteA #documentation #evaluation #retrieval- Semiautomatic evaluation of retrieval systems using document similarities (BC, JA), pp. 873–876.
CIKM-2007-GuoCXW #maintenance #online #performance- Efficient on-line index maintenance for dynamic text collections by using dynamic balancing tree (RG, XC, HX, BW), pp. 751–760.
CIKM-2007-JurczykA #analysis #community- Discovering authorities in question answer communities by using link analysis (PJ, EA), pp. 919–922.
CIKM-2007-LadY #feedback- Generalizing from relevance feedback using named entity wildcards (AL, YY), pp. 721–730.
CIKM-2007-LiMGDBM #predict #process- Predicting individual priorities of shared activities using support vector machines (LL, MJM, WG, CD, BB, DRM), pp. 515–524.
CIKM-2007-Pasca07a #query #web- Weakly-supervised discovery of named entities using web search queries (MP), pp. 683–690.
CIKM-2007-PeraN #email #similarity #word- Using word similarity to eradicate junk emails (MSP, YKN), pp. 943–946.
CIKM-2007-WangFZ #feedback #query #retrieval- Improve retrieval accuracy for difficult queries using negative feedback (XW, HF, CZ), pp. 991–994.
CIKM-2007-XuBCY #information retrieval #social- Using social annotations to improve language model for information retrieval (SX, SB, YC, YY), pp. 1003–1006.
CIKM-2007-YangQZGL #analysis #graph #web- Link analysis using time series of web graphs (LY, LQ, YPZ, BG, TYL), pp. 1011–1014.
CIKM-2007-YanH #feedback #multi #probability #query #retrieval- Query expansion using probabilistic local feedback with application to multimedia retrieval (RY, AGH), pp. 361–370.
CIKM-2007-YuTT #category theory #evaluation #ontology #wiki- Ontology evaluation using wikipedia categories for browsing (JY, JAT, AMT), pp. 223–232.
ECIR-2007-AshooriL #repository #topic #xml- Using Topic Shifts for Focussed Access to XML Repositories (EA, ML), pp. 444–455.
ECIR-2007-AslamP #estimation #multi #query- Query Hardness Estimation Using Jensen-Shannon Divergence Among Multiple Scoring Functions (JAA, VP), pp. 198–209.
ECIR-2007-BrunnertAR #enterprise #people #retrieval #visualisation- Enterprise People and Skill Discovery Using Tolerant Retrieval and Visualization (JB, OA, DR), pp. 674–677.
ECIR-2007-HeD #classification #naive bayes- Improving Naive Bayes Text Classifier Using Smoothing Methods (FH, XD), pp. 703–707.
ECIR-2007-MacdonaldO #feedback- Using Relevance Feedback in Expert Search (CM, IO), pp. 431–443.
ECIR-2007-MartinetS #documentation- Using Visual-Textual Mutual Information and Entropy for Inter-modal Document Indexing (JM, SS), pp. 549–556.
ECIR-2007-Medina-PagolaRHP #distance #documentation #representation- Document Representation Using Global Association Distance Model (JEMP, AYRG, AHD, JHP), pp. 565–572.
ECIR-2007-MeenaP #analysis #sentiment- Sentence Level Sentiment Analysis in the Presence of Conjuncts Using Linguistic Analysis (AM, TVP), pp. 573–580.
ECIR-2007-MeloS #classification #multi #ontology- Multilingual Text Classification Using Ontologies (GdM, SS), pp. 541–548.
ECIR-2007-MoreauCS #automation #machine learning #query- Automatic Morphological Query Expansion Using Analogy-Based Machine Learning (FM, VC, PS), pp. 222–233.
ECIR-2007-PaltoglouSS #algorithm #modelling #multi- Results Merging Algorithm Using Multiple Regression Models (GP, MS, MS), pp. 173–184.
ECIR-2007-RoullandKCRGPO #clustering #query #refinement- Query Reformulation and Refinement Using NLP-Based Sentence Clustering (FR, ANK, SC, CR, AG, KP, JO), pp. 210–221.
ECIR-2007-ShahE #detection #documentation #metric #representation #topic- Use of Topicality and Information Measures to Improve Document Representation for Story Link Detection (CS, KE), pp. 393–404.
ECIR-2007-YamoutOT #feedback #query- Relevance Feedback Using Weight Propagation Compared with Information-Theoretic Query Expansion (FY, MPO, JT), pp. 258–270.
ECIR-2007-YuSLWM #image #ranking- Improve Ranking by Using Image Information (QY, SS, ZL, JRW, WYM), pp. 645–652.
ECIR-2007-ZhangZC #performance #scalability- Efficient Construction of FM-index Using Overlapping Block Processing for Large Scale Texts (DZ, YZ, JC), pp. 113–123.
ECIR-2007-ZwolL #effectiveness #retrieval #semantics #xml- Effective Use of Semantic Structure in XML Retrieval (RvZ, TvL), pp. 621–628.
ICML-2007-DingL #adaptation #analysis #clustering #reduction- Adaptive dimension reduction using discriminant analysis and K-means clustering (CHQD, TL), pp. 521–528.
ICML-2007-GerberTW #reduction #robust- Robust non-linear dimensionality reduction using successive 1-dimensional Laplacian Eigenmaps (SG, TT, RTW), pp. 281–288.
ICML-2007-LeskovecF #graph #modelling #multi #scalability- Scalable modeling of real graphs using Kronecker multiplication (JL, CF), pp. 497–504.
ICML-2007-Mahadevan #3d #adaptation #learning #multi- Adaptive mesh compression in 3D computer graphics using multiscale manifold learning (SM), pp. 585–592.
ICML-2007-NilssonSJ #kernel #reduction- Regression on manifolds using kernel dimension reduction (JN, FS, MIJ), pp. 697–704.
ICML-2007-WipfN - Beamforming using the relevance vector machine (DPW, SSN), pp. 1023–1030.
KDD-2007-BeckerA #concept #ranking #realtime- Real-time ranking with concept drift using expert advice (HB, MA), pp. 86–94.
KDD-2007-ChewBKA #information retrieval- Cross-language information retrieval using PARAFAC2 (PAC, BWB, TGK, AA), pp. 143–152.
KDD-2007-CulottaWHMM #adaptation #database #metric #similarity- Canonicalization of database records using adaptive similarity measures (AC, MLW, RH, MM, AM), pp. 201–209.
KDD-2007-DingSJL #framework #kernel #learning #recommendation- A learning framework using Green’s function and kernel regularization with application to recommender system (CHQD, RJ, TL, HDS), pp. 260–269.
KDD-2007-SatoN #documentation #information management #multi #parametricity #topic- Knowledge discovery of multiple-topic document using parametric mixture model with dirichlet prior (IS, HN), pp. 590–598.
KDD-2007-Schickel-ZuberF #clustering #learning #recommendation- Using hierarchical clustering for learning theontologies used in recommendation systems (VSZ, BF), pp. 599–608.
KDD-2007-SrihariXS #documentation #generative- Use of ranked cross document evidence trails for hypothesis generation (RKS, LX, TS), pp. 677–686.
MLDM-2007-HanKK #performance #sequence- Efficient Subsequence Matching Using the Longest Common Subsequence with a Dual Match Index (TSH, SKK, JK), pp. 585–600.
MLDM-2007-MartinsSSPG #classification #image- Classification of Breast Masses in Mammogram Images Using Ripley’s K Function and Support Vector Machine (LdOM, ECdS, ACS, ACdP, MG), pp. 784–794.
MLDM-2007-PracnerTRI #attribute grammar #categorisation- Categorizing Evolved CoreWar Warriors Using EM and Attribute Evaluation (DP, NT, MR, MI), pp. 681–693.
MLDM-2007-SunV - Data Selection Using SASH Trees for Support Vector Machines (CS, RV), pp. 286–295.
MLDM-2007-ZagorisPK #algorithm #fuzzy #reduction #self- Color Reduction Using the Combination of the Kohonen Self-Organized Feature Map and the Gustafson-Kessel Fuzzy Algorithm (KZ, NP, IK), pp. 703–715.
RecSys-2007-LathiaHC #collaboration #distributed #metric- Private distributed collaborative filtering using estimated concordance measures (NL, SH, LC), pp. 1–8.
RecSys-2007-NathansonBG #adaptation #clustering #recommendation- Eigentaste 5.0: constant-time adaptability in a recommender system using item clustering (TN, EB, KYG), pp. 149–152.
RecSys-2007-Vuorikari #education #information retrieval #question #reuse #social- Can social information retrieval enhance the discovery and reuse of digital educational content? (RV), pp. 207–210.
SEKE-2007-AmouiST #network #predict- Temporal Software Change Prediction Using Neural Networks (MA, MS, LT), pp. 380–385.
SEKE-2007-GuzmanPP #modelling #pattern matching- Using Model-Driven Pattern Matching to derive functionalities in Models (IGRdG, MP, MP), pp. 529–534.
SEKE-2007-HofmeisterW #architecture #design #independence #platform- Designing a Platform-Independent Use-Case for a Composite Application using a Reference Architecture (HH, GW), pp. 227–231.
SEKE-2007-HuangL07a #composition #reasoning- Service Composition Using Planning and Case-Based Reasoning (KHH, AL), pp. 610–615.
SEKE-2007-KanaskarSR #analysis #approach #detection- A Dynamical System Approach to Intrusion Detection Using System Call Analysis (NK, RS, SR), pp. 710–717.
SEKE-2007-KrenickyWE #design #query- Exploratory Design of Derivation Business Rules Using Query Rewriting (RK, DW, SME), pp. 467–472.
SEKE-2007-MizouniSD #case study #composition #requirements- Using Formal Composition of Use Cases in Requirements Engineering (RM, AS, RD), p. 238–?.
SEKE-2007-MonteiroOG #implementation #source code #user interface- A Proposal to Delegate GUI Implementation using a Source Code based Model (MM, PO, RG), pp. 29–32.
SEKE-2007-MoserPS #agile #development #incremental #modelling #predict- Incremental Effort Prediction Models in Agile Development using Radial Basis Functions (RM, WP, GS), pp. 519–522.
SEKE-2007-PengJRZ #case study #component #database #product line #reuse- Reuse of Database Access Layer Components in JEE Product Lines: Limitations and a Possible Solution (Case Study) (DP, SJ, DCR, HZ), pp. 308–313.
SEKE-2007-Rhem #modelling #uml- Knowledge Modelling using UML (AJR), p. 755–?.
SEKE-2007-SettasS #ontology #project management- Using Ontologies to Represent Software Project Management Antipatterns (DS, IS), pp. 604–609.
SEKE-2007-TranCT #modelling #process- Broadening the Use of Process Patterns for Modeling Processes (HNT, BC, DTBT), pp. 57–62.
SEKE-2007-WongZQCD #effectiveness #fault #locality #network- Effective Fault Localization using BP Neural Networks (WEW, LZ, YQ, KYC, JD), pp. 374–379.
SIGIR-2007-AlonsoGB #timeline #visualisation- Search results using timeline visualizations (OA, MG, RABY), p. 908.
SIGIR-2007-AzzopardiRB #analysis #query #topic- Building simulated queries for known-item topics: an analysis using six european languages (LA, MdR, KB), pp. 455–462.
SIGIR-2007-BaiNCB #information retrieval #query- Using query contexts in information retrieval (JB, JYN, GC, HB), pp. 15–22.
SIGIR-2007-BanerjeeRG #clustering #wiki- Clustering short texts using wikipedia (SB, KR, AG), pp. 787–788.
SIGIR-2007-BroderFGJJZ #classification #query #robust #web- Robust classification of rare queries using web knowledge (AZB, MF, EG, AJ, VJ, TZ), pp. 231–238.
SIGIR-2007-CastilloDGMS #detection #web- Know your neighbors: web spam detection using the web topology (CC, DD, AG, VM, FS), pp. 423–430.
SIGIR-2007-Collins-ThompsonC #estimation #feedback #nondeterminism #pseudo- Estimation and use of uncertainty in pseudo-relevance feedback (KCT, JC), pp. 303–310.
SIGIR-2007-Diaz #performance #predict- Performance prediction using spatial autocorrelation (FD), pp. 583–590.
SIGIR-2007-FernandezL #analysis #detection- Novelty detection using local context analysis (RTF, DEL), pp. 725–726.
SIGIR-2007-FranzX #multi #segmentation- Story segmentation of broadcast news in Arabic, Chinese and English using multi-window features (MF, JMX), pp. 703–704.
SIGIR-2007-FuKS #collaboration #query #retrieval #topic- Using collaborative queries to improve retrieval for difficult topics (XF, DK, CS), pp. 879–880.
SIGIR-2007-GaoNNZHWH #query- Cross-lingual query suggestion using query logs of different languages (WG, CN, JYN, MZ, JH, KFW, HWH), pp. 463–470.
SIGIR-2007-KoAS #effectiveness #feedback #generative #pseudo- An effective snippet generation method using the pseudo relevance feedback technique (YK, HA, JS), pp. 711–712.
SIGIR-2007-KyriakopoulouK #classification #clustering- Using clustering to enhance text classification (AK, TK), pp. 805–806.
SIGIR-2007-LiLHC #ad hoc #corpus #query #wiki- Improving weak ad-hoc queries using wikipedia as external corpus (YL, RWPL, EKSH, KFLC), pp. 797–798.
SIGIR-2007-LiuHAY #named #performance #predict #sentiment- ARSA: a sentiment-aware model for predicting sales performance using blogs (YL, XH, AA, XY), pp. 607–614.
SIGIR-2007-Metzler #modelling #parametricity- Using gradient descent to optimize language modeling smoothing parameters (DM), pp. 687–688.
SIGIR-2007-MetzlerC #concept #markov #random- Latent concept expansion using markov random fields (DM, WBC), pp. 311–318.
SIGIR-2007-QiuLBCK #ambiguity #metadata #query- Quantify query ambiguity using ODP metadata (GQ, KL, JB, CC, ZK), pp. 697–698.
SIGIR-2007-SitbonB #segmentation #topic- Topic segmentation using weighted lexical links (WLL) (LS, PB), pp. 737–738.
SIGIR-2007-SmuckerA #similarity #web- Using similarity links as shortcuts to relevant web pages (MDS, JA), pp. 863–864.
SIGIR-2007-TurnbullBTL #semantics #set #towards- Towards musical query-by-semantic-description using the CAL500 data set (DT, LB, DAT, GRGL), pp. 439–446.
SIGIR-2007-Wan #clustering #documentation #evaluation #named- OMES: a new evaluation strategy using optimal matching for document clustering (XW), pp. 693–694.
SIGIR-2007-WhiteBC #interactive #web- Studying the use of popular destinations to enhance web search interaction (RWW, MB, SC), pp. 159–166.
SIGIR-2007-ZhangHRJ #learning #query- Query rewriting using active learning for sponsored search (WVZ, XH, BR, RJ), pp. 853–854.
SIGIR-2007-ZhengCSZ #framework #learning #ranking- A regression framework for learning ranking functions using relative relevance judgments (ZZ, KC, GS, HZ), pp. 287–294.
SIGIR-2007-ZhuYCG #classification #matrix- Combining content and link for classification using matrix factorization (SZ, KY, YC, YG), pp. 487–494.
ECMDA-FA-2007-Warmer #domain-specific language #modelling- A Model Driven Software Factory Using Domain Specific Languages (JW), pp. 194–203.
MoDELS-2007-JayaramanWEG #analysis #composition #detection #feature model #interactive #product line- Model Composition in Product Lines and Feature Interaction Detection Using Critical Pair Analysis (PKJ, JW, AME, HG), pp. 151–165.
MoDELS-2007-PilskalnsWI #debugging #runtime #uml- Runtime Debugging Using Reverse-Engineered UML (OP, SW, FI), pp. 605–619.
SPLC-2007-BeucheBDFGHJJKMW #product line #requirements #tool support- Using Requirements Management Tools in Software Product Line Engineering: The State of the Practice (DB, AB, HD, AF, HG, GH, DJ, IJ, RTK, TvdM, AW), pp. 84–96.
SPLC-2007-KastnerAB #aspectj #case study #implementation- A Case Study Implementing Features Using AspectJ (CK, SA, DSB), pp. 223–232.
SPLC-2007-VolterG #aspect-oriented #development #implementation #modelling #product line- Product Line Implementation using Aspect-Oriented and Model-Driven Software Development (MV, IG), pp. 233–242.
MoDELS-2007-JayaramanWEG #analysis #composition #detection #feature model #interactive #product line- Model Composition in Product Lines and Feature Interaction Detection Using Critical Pair Analysis (PKJ, JW, AME, HG), pp. 151–165.
MoDELS-2007-PilskalnsWI #debugging #runtime #uml- Runtime Debugging Using Reverse-Engineered UML (OP, SW, FI), pp. 605–619.
ECOOP-2007-DoorenS #abstraction #inheritance- A Higher Abstraction Level Using First-Class Inheritance Relations (MvD, ES), pp. 425–449.
ECOOP-2007-VaziriTFD #declarative- Declarative Object Identity Using Relation Types (MV, FT, SF, JD), pp. 54–78.
OOPSLA-2007-BuytaertGHAEB #compilation- Using hpm-sampling to drive dynamic compilation (DB, AG, MH, MA, LE, KDB), pp. 553–568.
OOPSLA-2007-Rinard #termination- Using early phase termination to eliminate load imbalances at barrier synchronization points (MCR), pp. 369–386.
AdaEurope-2007-AlonsoVSAL #ada #approach #automation #code generation #modelling- Automatic Ada Code Generation Using a Model-Driven Engineering Approach (DA, CVC, PS, BÁ, FL), pp. 168–179.
LOPSTR-2007-ZhangN #constraints #scalability #theorem proving #unification- A Scalable Inclusion Constraint Solver Using Unification (YZ, FN), pp. 121–137.
PADL-2007-AlbertGHP #analysis #bytecode #java #logic programming #source code #verification- Verification of Java Bytecode Using Analysis and Transformation of Logic Programs (EA, MGZ, LH, GP), pp. 124–139.
PADL-2007-FisselerKBKM #algebra #haskell #information management- Algebraic Knowledge Discovery Using Haskell (JF, GKI, CB, AK, CM), pp. 80–93.
PADL-2007-HuangHP #named #parallel #process- HPorter: Using Arrows to Compose Parallel Processes (LH, PH, JP), pp. 275–289.
PEPM-2007-RooverDBND #behaviour #logic #query #similarity #source code- Behavioral similarity matching using concrete source code templates in logic queries (CDR, TD, JB, CN, LD), pp. 92–101.
PLDI-2007-CheremPR #analysis #detection #memory management- Practical memory leak detection using guarded value-flow analysis (SC, LP, RR), pp. 480–491.
PLDI-2007-DilligDA #consistency #detection #fault #nondeterminism #semantics- Static error detection using semantic inconsistency inference (ID, TD, AA), pp. 435–445.
PLDI-2007-RamanathanGJ #mining #specification- Static specification inference using predicate mining (MKR, AG, SJ), pp. 123–134.
POPL-2007-ShenSMD #approximate #locality- Locality approximation using time (XS, JS, BM, CD), pp. 55–61.
PPDP-2007-Lucas #proving #termination- Practical use of polynomials over the reals in proofs of termination (SL), pp. 39–50.
PPDP-2007-Sagonas #detection #erlang #fault #source code #static analysis- Detecting defects in Erlang programs using static analysis (KFS), p. 37.
QAPL-2007-BistarelliMRS #constraints #graph #logic programming #modelling #multi- Modelling Multicast QoS Routing by using Best-Tree Search in And-or Graphs and Soft Constraint Logic Programming (SB, UM, FR, FS), pp. 111–127.
QAPL-2007-YaikhomCGH #approach #modelling #performance- A Structural Approach for Modelling Performance of Systems Using Skeletons (GY, MC, SG, JH), pp. 167–183.
SAS-2007-SankaranarayananIG #program analysis- Program Analysis Using Symbolic Ranges (SS, FI, AG), pp. 366–383.
SAS-2007-Tip #constraints #refactoring- Refactoring Using Type Constraints (FT), pp. 1–17.
SIGAda-2007-Lau #imperative #reasoning #source code- Using SPARK for a beginner’s course on reasoning about imperative programs (KKL), pp. 75–78.
SIGAda-2007-Maurer #ada #proving- Using mathematics to improve ada compiled code, part 2: the proof (WDM), pp. 11–26.
SIGAda-2007-PukiteL #design #logic #simulation- Generic discrete event simulations using DEGAS: application to logic design and digital signal processing (PP, LL), pp. 27–40.
SIGAda-2007-Sward #ada #architecture #named #web #web service- SP2: exposing ada web services using a service-oriented architecture (SOA) (RES), p. 4.
SIGAda-2007-Sward07a #ada #architecture- Using ada in a service-Ooriented architecture (RES), pp. 63–68.
RE-2007-BhatG #maintenance- Enhancing Requirement Stakeholder Satisfaction during Far-shore Maintenance of Custom Developed Software using Shift-Pattern Model (JMB, MG), pp. 322–327.
RE-2007-ConejeroHMA #requirements- Discovering Volatile and Aspectual Requirements Using a Crosscutting Pattern (JMC, JH, AMDM, JA), pp. 391–392.
RE-2007-Fricker #network #social- Explaining Stakeholder Negotiation Using Social Goal Networks (SF), pp. 387–388.
RE-2007-KartsevaGT #design #enterprise- Value-based Design of Networked Enterprises Using e3control Patterns (VK, JG, YHT), pp. 91–100.
RE-2007-MaidenLRJB #modelling- Using Satisfaction Arguments to Enhance i* Modelling of an Air Traffic Management System (NAMM, JL, DR, SJ, DB), pp. 49–52.
RE-2007-MunirajJ #prototype #requirements- Requirements Engineering using Prototyping Projects in Healthcare Diagnostic Software Applications (GM, VJ), pp. 307–312.
RE-2007-SmithG #game studies #lightweight #requirements- Using a Game to Introduce Lightweight Requirements Engineering (RS, OG), pp. 379–380.
REFSQ-2007-FrickerGM #implementation- Handshaking Between Software Projects and Stakeholders Using Implementation Proposals (SF, TG, PM), pp. 144–159.
ASE-2007-CabotCR #constraints #modelling #named #ocl #programming #uml #verification- UMLtoCSP: a tool for the formal verification of UML/OCL models using constraint programming (JC, RC, DR), pp. 547–548.
ASE-2007-ChenM #concurrent #source code #testing- Testing concurrent programs using value schedules (JC, SM), pp. 313–322.
ASE-2007-ClauseDOP #effectiveness #memory management- Effective memory protection using dynamic tainting (JAC, ID, AO, MP), pp. 284–292.
ASE-2007-LemosBOMMBL #named #reuse #source code- CodeGenie: using test-cases to search and reuse source code (OALL, SKB, JO, RSM, PCM, PB, CVL), pp. 525–526.
ASE-2007-MajumdarX #generative #testing- Directed test generation using symbolic grammars (RM, RGX), pp. 134–143.
ASE-2007-NaslavskyR #modelling #testing #traceability- Using traceability to support model-based regression testing (LN, DJR), pp. 567–570.
ASE-2007-PoshyvanykM #design #incremental #information retrieval- Using information retrieval to support design of incremental change of software (DP, AM), pp. 563–566.
ESEC-FSE-2007-Coman #analysis #automation #developer #low level- An analysis of developers’ tasks using low-level, automatically collected data (IDC), pp. 579–582.
ESEC-FSE-2007-GrechanikMP #traceability- Recovering and using use-case-diagram-to-source-code traceability links (MG, KSM, DEP), pp. 95–104.
ESEC-FSE-2007-HalfondO #automation #generative #interface #testing #web- Improving test case generation for web applications using automated interface discovery (WGJH, AO), pp. 145–154.
ESEC-FSE-2007-MajumdarX #generative #testing- Directed test generation using symbolic grammars (RM, RGX), pp. 553–556.
ESEC-FSE-2007-PatelBS #capacity #case study- A case study in assessing and improving capacity using an anatomy of good practice (MP, AB, KS), pp. 509–512.
ESEC-FSE-2007-SankaranarayananCJI #constraints #feedback #generative #monte carlo- State space exploration using feedback constraint generation and Monte-Carlo sampling (SS, RMC, GJ, FI), pp. 321–330.
ESEC-FSE-2007-SherriffHLW #identification #static analysis- Using groupings of static analysis alerts to identify files likely to contain field failures (MS, SSH, JML, LAW), pp. 565–568.
ESEC-FSE-2007-XuRTQ #java #performance- Efficient checkpointing of java software using context-sensitive capture and replay (G(X, AR, YT, FQ), pp. 85–94.
ESEC-FSE-2007-ZibinPAAKE #java- Object and reference immutability using java generics (YZ, AP, MA, SA, AK, MDE), pp. 75–84.
GTTSE-2007-SeguraBCT #automation #feature model #graph transformation #modelling- Automated Merging of Feature Models Using Graph Transformations (SS, DB, ARC, PT), pp. 489–505.
ICSE-2007-BernerWK #test coverage #testing- Enhancing Software Testing by Judicious Use of Code Coverage Information (SB, RW, RKK), pp. 612–620.
ICSE-2007-BestJN #distributed #information management #modelling #security- Model-Based Security Engineering of Distributed Information Systems Using UMLsec (BB, JJ, BN), pp. 581–590.
ICSE-2007-GanapathyKJJ #concept analysis #legacy #mining- Mining Security-Sensitive Operations in Legacy Code Using Concept Analysis (VG, DK, TJ, SJ), pp. 458–467.
ICSE-2007-LivieriHMI #analysis #distributed #open source #source code #visualisation- Very-Large Scale Code Clone Analysis and Visualization of Open Source Programs Using Distributed CCFinder: D-CCFinder (SL, YH, MM, KI), pp. 106–115.
ICSE-2007-RajapakseJ #analysis #trade-off #web- Using Server Pages to Unify Clones in Web Applications: A Trade-Off Analysis (DCR, SJ), pp. 116–126.
ICSE-2007-RunesonAN #detection #fault #natural language- Detection of Duplicate Defect Reports Using Natural Language Processing (PR, MA, ON), pp. 499–510.
ICSE-2007-Staron #education #evaluation #learning #process #re-engineering #student- Using Experiments in Software Engineering as an Auxiliary Tool for Teaching — A Qualitative Evaluation from the Perspective of Students’ Learning Process (MS), pp. 673–676.
ICSE-2007-YuanM #feedback #runtime #testing #user interface- Using GUI Run-Time State as Feedback to Generate Test Cases (XY, AMM), pp. 396–405.
ICSE-2007-Zualkernan #learning #programming- Using Soloman-Felder Learning Style Index to Evaluate Pedagogical Resources for Introductory Programming Classes (IAZ), pp. 723–726.
SAC-2007-AhamedHSK #pervasive- Wellness assistant: a virtual wellness assistant using pervasive computing (SIA, MMH, KS, AJK), pp. 782–787.
SAC-2007-Avila-GarciaER #modelling #product line- Using software product lines to manage model families in model-driven engineering (OAG, AE, EVSR), pp. 1006–1011.
SAC-2007-BistarelliFP - Using CP-nets as a guide for countermeasure selection (SB, FF, PP), pp. 300–304.
SAC-2007-BoussellaaZA #hybrid- A methodology for the separation of foreground/background in Arabic historical manuscripts using hybrid methods (WB, AZ, AMA), pp. 605–609.
SAC-2007-BraghettoFP #control flow #process #specification- Using control-flow patterns for specifying business processes in cooperative environments (KRB, JEF, CP), pp. 1234–1241.
SAC-2007-CambroneroPDV #modelling #web #web service- Using RT-UML for modelling web services (MEC, JJP, GD, VV), pp. 643–648.
SAC-2007-Cardoso-CachopoO #categorisation #classification- Semi-supervised single-label text categorization using centroid-based classifiers (ACC, ALO), pp. 844–851.
SAC-2007-ChenL #hardware- Use of hardware Z-buffered rasterization to accelerate ray tracing (CCC, DSML), pp. 1046–1050.
SAC-2007-Chiong #algorithm #search-based- Applying genetic algorithms to economy market using iterated prisoner’s dilemma (RC), pp. 733–737.
SAC-2007-CimadamoreV #approach #java- Reifying wildcards in Java using the EGO approach (MC, MV), pp. 1315–1322.
SAC-2007-DjelloulDF #constraints #finite #first-order #infinity #prolog #theorem proving #towards #unification- Toward a first-order extension of Prolog’s unification using CHR: a CHR first-order constraint solver over finite or infinite trees (KD, TBHD, TWF), pp. 58–64.
SAC-2007-FabroV #automation #integration #modelling #weaving- Semi-automatic model integration using matching transformations and weaving models (MDDF, PV), pp. 963–970.
SAC-2007-FangWLYD #assessment #detection #multi #sequence- The detection and assessment of possible RNA secondary structure using multiple sequence alignment (XF, ZW, ZL, BY, FD), pp. 133–137.
SAC-2007-GooneratneTH #algorithm #graph #traversal #verification #web #web service- Verification of web service descriptions using graph-based traversal algorithms (NG, ZT, JH), pp. 1385–1392.
SAC-2007-HuXP #approach #modelling- Modeling deceptive information dissemination using a holistic approach (YH, ZX, BP), pp. 1591–1598.
SAC-2007-KawsarFN #lightweight- A lightweight indoor location model for sentient artefacts using sentient artefacts (FK, KF, TN), pp. 1624–1631.
SAC-2007-Kofron #behaviour #component #protocol- Checking software component behavior using behavior protocols and spin (JK), pp. 1513–1517.
SAC-2007-LebbahMR #constraints #implementation #performance #reduction- Using constraint techniques for a safe and fast implementation of optimality-based reduction (YL, CM, MR), pp. 326–331.
SAC-2007-LeeHPLJK #performance #regular expression- A high performance NIDS using FPGA-based regular expression matching (JL, SHH, NP, SWL, SJ, YSK), pp. 1187–1191.
SAC-2007-MilsztajnG #3d #algorithm #markov #random #search-based #segmentation- Three-dimensional segmentation of brain tissues using Markov random fields and genetic algorithms (FM, KdG), pp. 745–746.
SAC-2007-NollR #ontology #traceability- Enhancing traceability using ontologies (RPN, MBR), pp. 1496–1497.
SAC-2007-NoordendeBT #mobile #security- Guarding security sensitive content using confined mobile agents (Gv'N, FMTB, AST), pp. 48–55.
SAC-2007-OHareGJLOS - Using text search for personal photo collections with the MediAssist system (NO, CG, GJFJ, HL, NEO, AFS), pp. 880–881.
SAC-2007-OliveiraAS #component #formal method #model checking #modelling #petri net #verification- Formal modelling and verification of a component model using coloured petri nets and model checking (EASO, HOdA, LDdS), pp. 1427–1431.
SAC-2007-PaliwalAB #distributed #verification #web #web service- Web service orchestration and verification using MSC and CP nets (AVP, NRA, CB), pp. 1693–1694.
SAC-2007-PaulK #precise #slicing- Precise dynamic slicing using execution-summary (AP, RK), pp. 1330–1331.
SAC-2007-PereraGB #low level #visualisation- Preattentive processing: using low-level vision psychology to encode information in visualisations (NP, AG, KB), pp. 1090–1091.
SAC-2007-PlattGM #detection #on the #query #sequence #topic- On using user query sequence to detect off-topic search (AP, NG, SSRM), pp. 882–883.
SAC-2007-PolatD #privacy- Effects of inconsistently masked data using RPT on CF with privacy (HP, WD), pp. 649–653.
SAC-2007-SarfrazR #algorithm #image #polynomial #random- A randomized knot insertion algorithm for outline capture of planar images using cubic spline (MS, AR), pp. 71–75.
SAC-2007-TanC #classification- Using hypothesis margin to boost centroid text classifier (ST, XC), pp. 398–403.
SAC-2007-TetsuyaAHN #ad hoc #generative #network- Topology information generation methods using a routing table in ad hoc network applications (TT, AK, TH, SN), pp. 896–900.
SAC-2007-VarroB #automation #induction #logic programming #model transformation- Automating model transformation by example using inductive logic programming (DV, ZB), pp. 978–984.
SAC-2007-VuMTA #knowledge base #web- Using a knowledge base to disambiguate personal name in web search results (QMV, TM, AT, JA), pp. 839–843.
SAC-2007-XingXE #approximate #automation #documentation #xml- Building automatic mapping between XML documents using approximate tree matching (GX, ZX, AE), pp. 525–526.
SAC-2007-XiongCL #classification #database #mining #multi- Mining multiple private databases using a kNN classifier (LX, SC, LL), pp. 435–440.
SAC-2007-YiYC #mobile #multi- Tracking multiple mobile objects using IEEE 802.15.4-based ultrasonic sensor devices (SY, JY, HC), pp. 1638–1639.
SAC-2007-ZhangMMB #locality #network #performance #problem #self- Performance problem localization in self-healing, service-oriented systems using Bayesian networks (RZ, SM, SM, AB), pp. 104–109.
SAC-2007-ZhouHP #database #image- An additive-attack-proof watermarking mechanism for databases’ copyrights protection using image (XZ, MH, ZP), pp. 254–258.
GPCE-2007-JarviMS #adaptation #c++ #composition #concept #library- Library composition and adaptation using c++ concepts (JJ, MAM, JNS), pp. 73–82.
CASE-2007-AramakiNKHT #interface #knowledge base- Human-Robot Interface by using frame like knowledge base (SA, TN, MK, YH, TT), pp. 729–734.
CASE-2007-BasileCT #fault #online- Improving on-line fault diagnosis for discrete event systems using time (FB, PC, GDT), pp. 26–32.
CASE-2007-BukkapatnamK #monitoring- Container Integrity and Condition Monitoring using RF Vibration Sensor Tags (STSB, RK), pp. 585–590.
CASE-2007-ChalfounBKP #fault #matrix- Calibration Using Generalized Error Matrices of a Long Reach Articulated Carrier (JC, CB, DK, YP), pp. 777–782.
CASE-2007-FalkmanLA #specification- Specification of Production Systems using PPN and Sequential Operation Charts (PF, BL, KA), pp. 20–25.
CASE-2007-FontanelliRS #algorithm #locality #metric #performance- A Fast RANSAC-Based Registration Algorithm for Accurate Localization in Unknown Environments using LIDAR Measurements (DF, LR, SS), pp. 597–602.
CASE-2007-Gonzalez-CastoloL #approximate #fuzzy #petri net- Approximating State of DES Using Fuzzy Timed Petri Nets (JCGC, ELM), pp. 722–728.
CASE-2007-JacksonCM - A Rationale for the use of Optical Mice Chips for Economic and Accurate Vehicle Tracking (JDJ, DWC, JM), pp. 939–944.
CASE-2007-KimCAY #mobile- RFID-enabled Target Tracking and Following with a Mobile Robot Using Direction Finding Antennas (MK, NYC, HSA, WY), pp. 1014–1019.
CASE-2007-KimLSSZ #approach #biology #metric #performance- Iterative Control Approach to High-Speed Force-Distance Curve Measurement Using AFM for Biological Applications (KSK, ZL, PS, SS, QZ), pp. 219–224.
CASE-2007-KimLSSZ07a #approach #biology #metric #performance- Iterative Control Approach to High-Speed Force-Distance Curve Measurement Using AFM for Biological Applications (KSK, ZL, PS, SS, QZ), p. 91–?.
CASE-2007-LamLY #automation #framework #platform #sketching- Robot Drawing Techniques for Contoured Surface Using an Automated Sketching Platform (JHML, KWL, YY), pp. 735–740.
CASE-2007-LiuWL #algorithm #design #effectiveness #multi #platform #product line #search-based #towards- Towards Effective Multi-platforming Design of Product Family using Genetic Algorithm (ZL, YSW, KSL), pp. 300–305.
CASE-2007-LjungkrantzA #case study #component #industrial #library #logic #programming- A Study of Industrial Logic Control Programming using Library Components (OL, KÅ), pp. 117–122.
CASE-2007-LuHF #network #process #robust #smarttech- Creating Robust Activity Maps Using Wireless Sensor Network in a Smart Home (CHL, YcH, LCF), pp. 741–746.
CASE-2007-LuimulaSPPAL #mobile #ubiquitous- Improving the Remote Control of a Mobile Robot Using Positioning and Ubiquitous Techniques (ML, KS, TP, SP, JA, AL), pp. 1027–1033.
CASE-2007-MarefatP #automation #modelling #process #retrieval #reuse #similarity- Similarity-Based Retrieval of CAD Solid Models for Automated Reuse of Machining Process Plans (MMM, CP), pp. 312–317.
CASE-2007-McVittieSMMLHM #automation #classification- Automated Classification of Macrophage Membrane Integrity using a Fluorescent Live/Dead Stain (PM, CSS, TWM, SM, MEL, MH, DRM), pp. 554–559.
CASE-2007-MitaniYH #analysis- Feeding of Submillimeter-sized Microparts along a Saw-tooth Surface Using Only Horizontal Vibration: Analysis of Convexities on the Surface of Microparts (AM, TY, SH), pp. 69–76.
CASE-2007-SarkisSD #automation #modelling #parametricity- Modeling the Variation of the Intrinsic Parameters of an Automatic Zoom Camera System using Moving Least-Squares (MS, CTS, KD), pp. 560–565.
CASE-2007-WangLS #injection- Autonomous Zebrafish Embryo Injection Using a Microrobotic System (WW, XL, YS), pp. 363–368.
CASE-2007-YamamotoFI #3d #metric #multi #performance- A High-Speed 3D Shape Measurement System Using a Multi-Sided Mirror (KY, HF, II), pp. 823–828.
CASE-2007-YogeswaranPT #algorithm #heuristic #hybrid #problem #search-based- An hybrid heuristic using genetic algorithm and simulated annealing algorithm to solve machine loading problem in FMS (MY, SGP, MKT), pp. 182–187.
CASE-2007-YoonHMSR #algorithm #image #navigation #performance- Efficient Navigation Algorithm Using 1D Panoramic Images (SY, WH, SKM, YS, KSR), pp. 536–541.
CASE-2007-YuanZCC #automation- Automatic Mixing of Bio-Samples Using Micro-Channel and Centrifugation (LY, YFZ, WC, MC), pp. 634–639.
CASE-2007-ZuHT #coordination #generative #integer #linear #programming- Trajectory Generation in Relative Velocity Coordinates Using Mixed Integer Linear Programming with IHDR Guidance (DZ, JH, DT), pp. 1125–1130.
CC-2007-JeonSH #data access #layout- Layout Transformations for Heap Objects Using Static Access Patterns (JJ, KS, HH), pp. 187–201.
CC-2007-LeeRBM #constraints #control flow #graph- Correcting the Dynamic Call Graph Using Control-Flow Constraints (BL, KR, MDB, KSM), pp. 80–95.
CC-2007-NagarakatteG #integer #linear #pipes and filters #programming #scheduling- Register Allocation and Optimal Spill Code Scheduling in Software Pipelined Loops Using 0-1 Integer Linear Programming Formulation (SGN, RG), pp. 126–140.
CC-2007-PazP #garbage collection- Using Prefetching to Improve Reference-Counting Garbage Collectors (HP, EP), pp. 48–63.
CC-2007-ScholzB #analysis #composition #data flow #framework- A New Elimination-Based Data Flow Analysis Framework Using Annotated Decomposition Trees (BS, JB), pp. 202–217.
CGO-2007-BarthouDCDJ #compilation #composition #kernel #optimisation- Loop Optimization using Hierarchical Compilation and Kernel Decomposition (DB, SD, PC, AD, WJ), pp. 170–184.
CGO-2007-CavazosFABOT #compilation #optimisation #performance- Rapidly Selecting Good Compiler Optimizations using Performance Counters (JC, GF, FVA, EVB, MFPO, OT), pp. 185–197.
CGO-2007-DaiLH #execution #network #pipes and filters- Pipelined Execution of Critical Sections Using Software-Controlled Caching in Network Processors (JD, LL, BH), pp. 312–324.
CGO-2007-GrzegorczykSKW #feedback- Isla Vista Heap Sizing: Using Feedback to Avoid Paging (CG, SS, CK, RW), pp. 325–340.
COCV-2007-FangS #bidirectional #compilation #generative #java- Generating Java Compiler Optimizers Using Bidirectional CTL (LF, MS), pp. 49–63.
DAC-2007-AksoyCFM #metric #optimisation- Optimization of Area in Digital FIR Filters using Gate-Level Metrics (LA, EACdC, PFF, JCM), pp. 420–423.
DAC-2007-ChenL #statistics #testing- Extraction of Statistical Timing Profiles Using Test Data (YYC, JJL), pp. 509–514.
DAC-2007-CzajkowskiB - Using Negative Edge Triggered FFs to Reduce Glitching Power in FPGA Circuits (TSC, SDB), pp. 324–329.
DAC-2007-DengBWYZ #named #performance #satisfiability- EHSAT: An Efficient RTL Satisfiability Solver Using an Extended DPLL Procedure (SD, JB, WW, XY, YZ), pp. 588–593.
DAC-2007-DongL #performance #simulation- Accelerating Harmonic Balance Simulation Using Efficient Parallelizable Hierarchical Preconditioning (WD, PL), pp. 436–439.
DAC-2007-FengLZ #analysis #higher-order #parametricity #performance #reduction #statistics- Fast Second-Order Statistical Static Timing Analysis Using Parameter Dimension Reduction (ZF, PL, YZ), pp. 244–249.
DAC-2007-GhodratLR #analysis #estimation #hybrid- Accelerating System-on-Chip Power Analysis Using Hybrid Power Estimation (MAG, KL, AR), pp. 883–886.
DAC-2007-HallschmidS #automation #energy #modelling- Automatic Cache Tuning for Energy-Efficiency using Local Regression Modeling (PH, RS), pp. 732–737.
DAC-2007-KangKIAR #estimation #metric #online #reliability- Characterization and Estimation of Circuit Reliability Degradation under NBTI using On-Line IDDQ Measurement (KK, KK, AEI, MAA, KR), pp. 358–363.
DAC-2007-KangKR #design #power management- Variation Resilient Low-Power Circuit Design Methodology using On-Chip Phase Locked Loop (KK, KK, KR), pp. 934–939.
DAC-2007-KocKEO #embedded #memory management #multi- Reducing Off-Chip Memory Access Costs Using Data Recomputation in Embedded Chip Multi-processors (HK, MTK, EE, ÖÖ), pp. 224–229.
DAC-2007-LiuLC #algorithm #approximate #multi #optimisation- A Provably Good Approximation Algorithm for Power Optimization Using Multiple Supply Voltages (HYL, WPL, YWC), pp. 887–890.
DAC-2007-RamalingamSNOP #analysis #composition #modelling- Accurate Waveform Modeling using Singular Value Decomposition with Applications to Timing Analysis (AR, AKS, SRN, MO, DZP), pp. 148–153.
DAC-2007-YeZL #optimisation #performance #power management #statistics- Statistical Leakage Power Minimization Using Fast Equi-Slack Shell Based Optimization (XY, YZ, PL), pp. 853–858.
DAC-2007-ZhouLS #bound #embedded #hybrid #multi #performance- Fast Capacitance Extraction in Multilayer, Conformal and Embedded Dielectric using Hybrid Boundary Element Method (NYZ, ZL, WS), pp. 835–840.
DAC-2007-ZhuGSDK #architecture #power management #towards- Towards An Ultra-Low-Power Architecture Using Single-Electron Tunneling Transistors (CZ, Z(G, LS, RPD, RGK), pp. 312–317.
DATE-2007-AnisN #architecture #debugging #interactive #low cost- Interactive presentation: Low cost debug architecture using lossy compression for silicon debug (EA, NN), pp. 225–230.
DATE-2007-BorremansLWR #analysis #multi- Nonlinearity analysis of Analog/RF circuits using combined multisine and volterra analysis (JB, LDL, PW, YR), pp. 261–266.
DATE-2007-ChangLR #performance- Improve CAM power efficiency using decoupled match line scheme (YJC, YHL, SJR), pp. 165–170.
DATE-2007-CiesielskiAGGB #data flow #diagrams- Data-flow transformations using Taylor expansion diagrams (MJC, SA, DGP, JG, EB), pp. 455–460.
DATE-2007-ClausZMS #configuration management #hardware #video- Using partial-run-time reconfigurable hardware to accelerate video processing in driver assistance system (CC, JZ, FHM, WS), pp. 498–503.
DATE-2007-ErdoganO #analysis- An ADC-BiST scheme using sequential code analysis (ESE, SO), pp. 713–718.
DATE-2007-FaragES #2d #configuration management- Improving utilization of reconfigurable resources using two dimensional compaction (AAEF, HMEB, SIS), pp. 135–140.
DATE-2007-GhoshBR #adaptation #scheduling #synthesis- Low-overhead circuit synthesis for temperature adaptation using dynamic voltage scheduling (SG, SB, KR), pp. 1532–1537.
DATE-2007-GuptaOJWB #comprehension #distributed #multi #network- Understanding voltage variations in chip multiprocessors using a distributed power-delivery network (MSG, JLO, RJ, GYW, DMB), pp. 624–629.
DATE-2007-HaastregtK #interactive #optimisation #performance #random- Interactive presentation: Feasibility of combined area and performance optimization for superscalar processors using random search (SvH, PMWK), pp. 606–611.
DATE-2007-HosseinabadyDN #testing- Using the inter- and intra-switch regularity in NoC switch testing (MH, AD, ZN), pp. 361–366.
DATE-2007-HuangT #analysis #correlation #multi #performance- Performance analysis of multimedia applications using correlated streams (KH, LT), pp. 912–917.
DATE-2007-KraemerLAM #interactive #parallel #program transformation #source code- Interactive presentation: SoftSIMD — exploiting subword parallelism using source code transformations (SK, RL, GA, HM), pp. 1349–1354.
DATE-2007-KroeningS #image #interactive #proving #refinement #word- Interactive presentation: Image computation and predicate refinement for RTL verilog using word level proofs (DK, NS), pp. 1325–1330.
DATE-2007-LaouamriA #framework #network #testing- Remote testing and diagnosis of System-on-Chips using network management frameworks (OL, CA), pp. 373–378.
DATE-2007-LataireVP #design #interactive #multi #optimisation- Interactive presentation: Optimizing analog filter designs for minimum nonlinear distortions using multisine excitations (JL, GV, RP), pp. 267–272.
DATE-2007-MangassarianVSNA #estimation #process #pseudo #satisfiability- Maximum circuit activity estimation using pseudo-boolean satisfiability (HM, AGV, SS, FNN, MSA), pp. 1538–1543.
DATE-2007-MarianiBC #design- Using an innovative SoC-level FMEA methodology to design in compliance with IEC61508 (RM, GB, FC), pp. 492–497.
DATE-2007-MuellerGS #design #polynomial #programming #trade-off- Trade-off design of analog circuits using goal attainment and “Wave Front” sequential quadratic programming (DM, HEG, US), pp. 75–80.
DATE-2007-NardiTNAGLS #analysis #design #statistics- Use of statistical timing analysis on real designs (AN, ET, SN, AA, SG, TL, JS), pp. 1605–1610.
DATE-2007-QuSN #configuration management #energy #interactive #runtime #scalability- Interactive presentation: Using dynamic voltage scaling to reduce the configuration energy of run time reconfigurable devices (YQ, JPS, JN), pp. 147–152.
DATE-2007-RenterghemDVVQ #compilation #development- Development of an ASIP enabling flows in ethernet access using a retargetable compilation flow (KVR, PD, DV, JV, XZQ), pp. 1418–1423.
DATE-2007-RousseauMGMLDG #certification #configuration management- Enabling certification for dynamic partial reconfiguration using a minimal flow (BR, PM, DG, DM, JDL, FD, YG), pp. 983–988.
DATE-2007-SeongM #performance #taxonomy- An efficient code compression technique using application-aware bitmask and dictionary selection methods (SWS, PM), pp. 582–587.
DATE-2007-SheldonVL #design #interactive #paradigm- Interactive presentation: Soft-core processor customization using the design of experiments paradigm (DS, FV, SL), pp. 821–826.
DATE-2007-TadesseSLBG #analysis #modelling #satisfiability- Accurate timing analysis using SAT and pattern-dependent delay models (DT, DS, EL, RIB, JG), pp. 1018–1023.
DATE-2007-TongbongMC #evaluation #interactive #metric #multi #statistics #testing- Interactive presentation: Evaluation of test measures for LNA production testing using a multinormal statistical model (JT, SM, JLC), pp. 731–736.
DATE-2007-WangCW #optimisation #scheduling #testing- SoC testing using LFSR reseeding, and scan-slice-based TAM optimization and test scheduling (ZW, KC, SW), pp. 201–206.
DATE-2007-Wong #equation #performance #symmetry- Fast positive-real balanced truncation of symmetric systems using cross Riccati equations (NW), pp. 1496–1501.
DATE-2007-YonedaIF #algorithm #configuration management #interactive #scheduling- Interactive presentation: An SoC test scheduling algorithm using reconfigurable union wrappers (TY, MI, HF), pp. 231–236.
DATE-2007-ZhouB #approach #reduction #scheduling #testing- Test cost reduction for SoC using a combined approach to test data compression and test scheduling (QZ, KJB), pp. 39–44.
HPCA-2007-ClarkHYMF #hardware #lightweight- Liquid SIMD: Abstracting SIMD Hardware using Lightweight Dynamic Mapping (NC, AH, SY, SAM, KF), pp. 216–227.
HPDC-2007-HackerM #queue #reliability- Using queue structures to improve job reliability (TJH, ZM), pp. 43–54.
HPDC-2007-KimKMBS #network- Using content-addressable networks for load balancing in desktop grids (JSK, PJK, MAM, BB, AS), pp. 189–198.
HPDC-2007-MullerGSF #case study #game studies #multi #online #replication #scalability- Scaling multiplayer online games using proxy-server replication: a case study of Quake 2 (JM, SG, TS, SF), pp. 219–220.
ISMM-2007-NguyenR #detection #memory management- Detecting and eliminating memory leaks using cyclic memory allocation (HHN, MCR), pp. 15–30.
LCTES-2007-AbouGhazalehFRXLCMM #cpu #machine learning #scalability- Integrated CPU and l2 cache voltage scaling using machine learning (NA, APF, CR, RX, FL, BRC, DM, RGM), pp. 41–50.
LCTES-2007-HinesTW - Addressing instruction fetch bottlenecks by using an instruction register file (SRH, GST, DBW), pp. 165–174.
PDP-2007-ChongHF #java #memory management- Pretenuring in Java by Object Lifetime and Reference Density Using Scratch-Pad Memory (KFC, CYH, ASF), pp. 205–212.
PDP-2007-PlazaVBP #detection #image #network #parallel- Parallel Detection of Targets in Hyperspectral Images Using Heterogeneous Networks of Workstations (AP, DV, SB, JP), pp. 333–340.
PDP-2007-Talia - Using Grids for Exploiting Data Abundance in Science (DT).
PPoPP-2007-GontmakherMS #energy #multi #performance #thread- Using fine grain multithreading for energy efficient computing (AG, AM, AS), pp. 259–269.
PPoPP-2007-KejariwalTGLKBNVP #analysis #concurrent #cpu #performance #specification #thread- Tight analysis of the performance potential of thread speculation using spec CPU 2006 (AK, XT, MG, WL, SK, UB, AN, AVV, CDP), pp. 215–225.
PPoPP-2007-MamidalaNVSP #on the #performance #scalability #trade-off- On using connection-oriented vs. connection-less transport for performance and scalability of collective and one-sided operations: trade-offs and impact (ARM, SN, AV, GS, DKP), pp. 46–54.
SOSP-2007-RossbachHPRAW #hardware #memory management #named #operating system #transaction- TxLinux: using and managing hardware transactional memory in an operating system (CJR, OSH, DEP, HER, BA, EW), pp. 87–102.
SOSP-2007-VandiverBLM #commit #fault #scheduling #transaction- Tolerating byzantine faults in transaction processing systems using commit barrier scheduling (BV, HB, BL, SM), pp. 59–72.
WRLA-J-2004-MeseguerT07 #analysis #encryption #protocol #reachability #verification- Symbolic reachability analysis using narrowing and its application to verification of cryptographic protocols (JM, PT), pp. 123–160.
ESOP-2007-LeinoS #invariant #verification- Using History Invariants to Verify Observers (KRML, WS), pp. 80–94.
FASE-2007-KleinG #diagrams #specification- Joint Structural and Temporal Property Specification Using Timed Story Scenario Diagrams (FK, HG), pp. 185–199.
FoSSaCS-2007-BengtsonP #formal method #logic #π-calculus- Formalising the π-Calculus Using Nominal Logic (JB, JP), pp. 63–77.
TACAS-2007-YuCL #bound #diagrams #reachability- Bounded Reachability Checking of Asynchronous Systems Using Decision Diagrams (AJY, GC, GL), pp. 648–663.
A-MOST-2007-ChenPU #analysis #dependence #generative #modelling #testing- Model-based regression test suite generation using dependence analysis (YC, RLP, HU), pp. 54–62.
A-MOST-2007-FraserW #generative #ltl #model checking #performance #testing- Using LTL rewriting to improve the performance of model-checker based test-case generation (GF, FW), pp. 64–74.
CADE-2007-GeBT #modulo theories #quantifier #satisfiability #verification- Solving Quantified Verification Conditions Using Satisfiability Modulo Theories (YG, CB, CT), pp. 167–182.
CADE-2007-Harrison #automation #proving- Automating Elementary Number-Theoretic Proofs Using Gröbner Bases (JH), pp. 51–66.
CADE-2007-KoprowskiM #dependence #predict #satisfiability- Predictive Labeling with Dependency Pairs Using SAT (AK, AM), pp. 410–425.
CADE-2007-MotikSH #logic #reasoning- Optimized Reasoning in Description Logics Using Hypertableaux (BM, RS, IH), pp. 67–83.
CADE-2007-TiwariG #logic #program analysis #proving #theorem proving- Logical Interpretation: Static Program Analysis Using Theorem Proving (AT, SG), pp. 147–166.
CAV-2007-SinhaC #composition #lazy evaluation #learning #satisfiability #verification- SAT-Based Compositional Verification Using Lazy Learning (NS, EMC), pp. 39–54.
CAV-2007-WangYGI #precise #reachability- Using Counterexamples for Improving the Precision of Reachability Computation with Polyhedra (CW, ZY, AG, FI), pp. 352–365.
ICLP-2007-NieuwenborghCV #fuzzy #set- Computing Fuzzy Answer Sets Using dlvhex (DVN, MDC, DV), pp. 449–450.
ICLP-2007-West #animation #logic programming #programming language #specification- The Use of a Logic Programming Language in the Animation of Z Specifications (MMW), pp. 451–452.
ISSTA-2007-Koster #consistency #quality- Using portfolio theory for better and more consistent quality (KK), pp. 108–117.
ISSTA-2007-NainarCRL #debugging #statistics- Statistical debugging using compound boolean predicates (PAN, TC, JR, BL), pp. 5–15.
ISSTA-2007-ShohamYFP #abstraction #mining #specification- Static specification mining using automata-based abstractions (SS, EY, SF, MP), pp. 174–184.
MBT-2007-DadeauLB #java #ml #specification #testing- Measuring a Java Test Suite Coverage Using JML Specifications (FD, YL, LdB), pp. 21–32.
MBT-2007-OuimetL #automation #consistency #satisfiability #specification #state machine #verification- Automated Verification of Completeness and Consistency of Abstract State Machine Specifications using a SAT Solver (MO, KL), pp. 85–97.
SAT-2007-DeKV - Inversion Attacks on Secure Hash Functions Using satSolvers (DD, AK, RV), pp. 377–382.
TAP-2007-Gargantini #detection #fault #model checking #testing- Using Model Checking to Generate Fault Detecting Tests (AG), pp. 189–206.
TAP-2007-LiuMS #automation #contract #generative #quality #query #testing- Using Contracts and Boolean Queries to Improve the Quality of Automatic Test Generation (L(L, BM, BS), pp. 114–130.
TAP-2007-RummerS #calculus #java #logic #proving #source code- Proving Programs Incorrect Using a Sequent Calculus for Java Dynamic Logic (PR, MAS), pp. 41–60.
VMCAI-2007-BouillaguetKWZR #data type #first-order #proving #theorem proving #verification- Using First-Order Theorem Provers in the Jahob Data Structure Verification System (CB, VK, TW, KZ, MCR), pp. 74–88.
CBSE-2006-CangussuCW #component #multi #process- Multi Criteria Selection of Components Using the Analytic Hierarchy Process (JWC, KMLC, WEW), pp. 67–81.
CBSE-2006-CervantesC #architecture #lightweight #product line #workflow- Using a Lightweight Workflow Engine in a Plugin-Based Product Line Architecture (HC, SCV), pp. 198–205.
DocEng-2006-GormishS #documentation #editing #image #standard- Standards based high resolution Document editing using low resolution proxy images (MJG, ELS), p. 33.
DocEng-2006-QeliF #aspect-oriented #documentation #programming #xml #xpath- Filtering XML documents using XPath expressions and aspect-oriented programming (EQ, BF), pp. 85–87.
DocEng-2006-QeliGF #detection #documentation #xml #xpath- Customizable detection of changes for XML documents using XPath expressions (EQ, JG, BF), pp. 88–90.
DRR-2006-TaghvaBCBPN #automation #information management #relational- Automatic redaction of private information using relational information extraction (KT, RB, JSC, JB, RP, TAN).
ECDL-2006-AmatoBDFRS #experience #library #multi- Using MILOS to Build a Multimedia Digital Library Application: The PhotoBook Experience (GA, PB, FD, FF, FR, PS), pp. 379–390.
ECDL-2006-ParkKKLK #personalisation- Personalized Digital E-library Service Using Users’ Profile Information (WP, WK, SK, HL, YKK), pp. 528–531.
ECDL-2006-SmithKN #replication #repository- Repository Replication Using NNTP and SMTP (JAS, MK, MLN), pp. 51–62.
ECDL-2006-SzlavikTL #retrieval #summary #xml- The Use of Summaries in XML Retrieval (ZS, AT, ML), pp. 75–86.
HT-2006-Delort #documentation #identification- Identifying commented passages of documents using implicit hyperlinks (JYD), pp. 89–98.
HT-2006-Ruddle #hypermedia #navigation #string- Using string-matching to analyze hypertext navigation (RAR), pp. 49–52.
JCDL-2006-JordanWG #algorithm #feedback #generative #query- Using controlled query generation to evaluate blind relevance feedback algorithms (CJ, CRW, QG), pp. 286–295.
JCDL-2006-KaczmarekHE #certification #evaluation #repository- Repository software evaluation using the audit checklist for certification of trusted digital repositories (JK, TGH, JE), pp. 107–108.
JCDL-2006-KulesKS #categorisation #category theory #web- Categorizing web search results into meaningful and stable categories using fast-feature techniques (BK, JK, BS), pp. 210–219.
JCDL-2006-McMartinIMWM #library- Factors motivating use of digital libraries (FPM, ERI, CM, AJW, GM), pp. 254–255.
JCDL-2006-MedelyanW #consistency- Measuring inter-indexer consistency using a thesaurus (OM, IHW), pp. 274–275.
JCDL-2006-OnELKP #approach #clique #effectiveness #library #problem- An effective approach to entity resolution problem using quasi-clique and its application to digital libraries (BWO, EE, DL, JK, JP), pp. 51–52.
JCDL-2006-ReckerP #education #library- Using resources across educational digital libraries (MR, BP), pp. 240–241.
JCDL-2006-ReichherzerB #documentation #requirements- Quantifying software requirements for supporting archived office documents using emulation (TR, GB), pp. 86–94.
PODS-2006-GoelGM #modelling #optimisation- Asking the right questions: model-driven optimization using probes (AG, SG, KM), pp. 203–212.
SIGMOD-2006-DengR #approximate #detection #streaming- Approximately detecting duplicates for streaming data using stable bloom filters (FD, DR), pp. 25–36.
SIGMOD-2006-GawlickKL #database #declarative- Using the oracle database as a declarative RSS hub (DG, MK, ZHL), p. 722.
SIGMOD-2006-GouKC #evaluation #performance #query- Query evaluation using overlapping views: completeness and efficiency (GG, MK, RC), pp. 37–48.
SIGMOD-2006-KoudasMS #case study #experience- Using SPIDER: an experience report (NK, AM, DS), p. 719.
SIGMOD-2006-LimLLWS #data type #query- Continuous query processing in data streams using duality of data and queries (HSL, JGL, MJL, KYW, IYS), pp. 313–324.
SIGMOD-2006-OnoseDPC #query #xml- Rewriting nested XML queries using nested views (NO, AD, YP, EC), pp. 443–454.
VLDB-2006-BunemanCFK #distributed #partial evaluation #query- Using Partial Evaluation in Distributed Query Evaluation (PB, GC, WF, AK), pp. 211–222.
VLDB-2006-DasGKT #query- Answering Top-k Queries Using Views (GD, DG, NK, DT), pp. 451–462.
VLDB-2006-HuangCLL #evolution #xml- XML Evolution: A Two-phase XML Processing Model Using XML Prefiltering Techniques (CHH, TRC, JJL, HML), pp. 1215–1218.
VLDB-2006-LakshmananWZ #query- Answering Tree Pattern Queries Using Views (LVSL, WHW, Z(Z), pp. 571–582.
VLDB-2006-MorfoniosI - CURE for Cubes: Cubing Using a ROLAP Engine (KM, YEI), pp. 379–390.
VLDB-2006-SubramaniamPPKG #detection #modelling #online #parametricity- Online Outlier Detection in Sensor Data Using Non-Parametric Models (SS, TP, DP, VK, DG), pp. 187–198.
VLDB-2006-ZhangZWSP #feedback #image #interactive- Using High Dimensional Indexes to Support Relevance Feedback Based Interactive Images Retrival (JZ, XZ, WW, BS, JP), pp. 1211–1214.
CSEET-2006-BurgeT #case study #challenge #education #re-engineering- Rising to the Challenge: Using Business-Oriented Case Studies in Software Engineering Education (JEB, DT), pp. 43–50.
ITiCSE-2006-AssuncaoO #dot-net #education #framework #platform #web #web service- Teaching web services using .NET platform (LA, ALO), p. 339.
ITiCSE-2006-Chamillard #education #performance #predict #student- Using student performance predictions in a computer science curriculum (ATC), pp. 260–264.
ITiCSE-2006-DaviesCT #education #ontology- Using a computing ontology for educational purposes (GD, LNC, HT), p. 334.
ITiCSE-2006-Godejord #education #social- Exploring teacher methodology: using the example of sexual abuse of children as a way of teaching social informatics (PAG), p. 340.
ITiCSE-2006-HoodH #education #project management #simulation- Teaching software project management using simulations (DJH, CSH), pp. 289–293.
ITiCSE-2006-LeidigFL #information management- The use of community-based non-profit organizations in information systems capstone projects (PML, RCF, JL), pp. 148–152.
ITiCSE-2006-ShanmugasundaramJH #visualisation- Knowledge building using visualizations (VS, PJ, CDH), pp. 23–27.
ITiCSE-2006-SpaccoHPEHP #case study #design #experience #programming #testing- Experiences with marmoset: designing and using an advanced submission and testing system for programming courses (JS, DH, WP, FE, JKH, NPP), pp. 13–17.
ITiCSE-2006-ThomasWS #automation- Using patterns in the automatic marking of ER-diagrams (PGT, KGW, NS), pp. 83–87.
ITiCSE-2006-Utting #education #java #problem #programming- Problems in the initial teaching of programming using Java: the case for replacing J2SE with J2ME (IU), pp. 193–196.
SIGITE-2006-Rutherfoord #case study- Using personality inventories to form teams for class projects: a case study (RHR), pp. 9–14.
SCAM-J-2005-ZhangBCD06 - Using source transformation to test and model check implicit-invocation systems (HZ, JSB, JRC, JD), pp. 209–227.
CSMR-2006-GraafWD #architecture #migration #model transformation- Migrating Supervisory Control Architectures Using Model Transformations (BG, SW, AvD), pp. 153–164.
CSMR-2006-IvkovicK #architecture #framework #model transformation #refactoring #semantics- A Framework for Software Architecture Refactoring using Model Transformations and Semantic Annotations (II, KK), pp. 135–144.
CSMR-2006-TonuAT #approach #architecture- Evaluating Architectural Stability Using a Metric-Based Approach (SAT, AA, LT), pp. 261–270.
CSMR-2006-WierdaDS #architecture #case study #clustering- Using Version Information in Architectural Clustering — A Case Study (AW, ED, LJS), pp. 214–228.
ICPC-2006-BermanDGG #comprehension- The Sound of Software: Using Sonification to Aid Comprehension (LIB, SD, KBG, NG), pp. 225–229.
ICPC-2006-JetleyZI #analysis #slicing- Using Abstraction-driven Slicing for Postmortem Analysis of Software (RPJ, YZ, SPI), pp. 107–116.
ICPC-2006-JinC #reverse engineering #tool support- Integrating Reverse Engineering Tools Using a Service-Sharing Methodology (DJ, JRC), pp. 94–99.
ICPC-2006-KothariSMH #clustering #evolution- Studying the Evolution of Software Systems Using Change Clusters (JK, AS, SM, AEH), pp. 46–55.
ICPC-2006-LawrieFB #assessment #information retrieval #quality- Leveraged Quality Assessment using Information Retrieval Techniques (DJL, HF, DB), pp. 149–158.
ICPC-2006-SafyallahS #dynamic analysis #execution #mining- Dynamic Analysis of Software Systems using Execution Pattern Mining (HS, KS), pp. 84–88.
ICPC-2006-StefikFA #comprehension #debugging #effectiveness #music #runtime- Layered Program Auralization: Using Music to Increase Runtime Program Comprehension and Debugging Effectiveness (AS, KF, RTA), pp. 89–93.
ICSM-2006-CanforaCP #co-evolution #identification #on the- On the Use of Line Co-change for Identifying Crosscutting Concern Code (GC, LC, MDP), pp. 213–222.
ICSM-2006-FisherCZ #comprehension #difference- Using Sex Differences to Link Spatial Cognition and Program Comprehension (MF, AC, LZ), pp. 289–298.
ICSM-2006-GoldHLM #approach #bound #concept #source code- Allowing Overlapping Boundaries in Source Code using a Search Based Approach to Concept Binding (NG, MH, ZL, KM), pp. 310–319.
ICSM-2006-Hou #constraints #design #source code- Using Structural Constraints to Specify and Check Design Intent in Source Code — Ph.D. Dissertation Synopsis (DH), pp. 343–346.
ICSM-2006-JaffriK #delivery #performance- Efficient Delivery of Software Updates Using Advanced Compression Techniques (TJ, KK), pp. 267–268.
ICSM-2006-LuciaPOZ #comprehension #named #traceability- COCONUT: COde COmprehension Nurturant Using Traceability (ADL, MDP, RO, FZ), pp. 274–275.
ICSM-2006-TonellaAS #ranking #testing- Using the Case-Based Ranking Methodology for Test Case Prioritization (PT, PA, AS), pp. 123–133.
ICSM-2006-ZhangCZ #e-commerce #process #re-engineering #user interface- Reengineering User Interfaces of E-Commerce Applications Using Business Processes (QZ, RC, YZ), pp. 428–437.
MSR-2006-GermanRS #comprehension- Using evolutionary annotations from change logs to enhance program comprehension (DMG, PCR, MADS), pp. 159–162.
MSR-2006-KakimotoMKTTM #identification- Using software birthmarks to identify similar classes and major functionalities (TK, AM, YK, HT, MT, KiM), pp. 171–172.
MSR-2006-SagerBPK #algorithm #detection #java- Detecting similar Java classes using tree algorithms (TS, AB, MP, CK), pp. 65–71.
MSR-2006-TsunodaMKKM #developer- Analyzing OSS developers’ working time using mailing lists archives (MT, AM, TK, YK, KiM), pp. 181–182.
SCAM-2006-BoogerdM #profiling- Prioritizing Software Inspection Results using Static Profiling (CB, LM), pp. 149–160.
SCAM-2006-PanKW #classification #debugging #metric #slicing- Bug Classification Using Program Slicing Metrics (KP, SK, EJWJ), pp. 31–42.
SCAM-2006-WalensteinMCL #normalisation #term rewriting- Normalizing Metamorphic Malware Using Term Rewriting (AW, RM, MRC, AL), pp. 75–84.
WCRE-2006-BeyerH #evolution #visualisation- Animated Visualization of Software History using Evolution Storyboards (DB, AEH), pp. 199–210.
WCRE-2006-Cerulo #development #on the #process- On the Use of Process Trails to Understand Software Development (LC), pp. 303–304.
WCRE-2006-CleveHH #dependence #graph #reverse engineering- Data Reverse Engineering using System Dependency Graphs (AC, JH, JLH), pp. 157–166.
WCRE-2006-KoschkeFF #clone detection #detection #syntax- Clone Detection Using Abstract Syntax Suffix Trees (RK, RF, PF), pp. 253–262.
WCRE-2006-LormansGDSS #case study #industrial #monitoring #requirements- Monitoring Requirements Coverage using Reconstructed Views: An Industrial Case Study (ML, HGG, AvD, RvS, AS), pp. 275–284.
CIAA-2006-AntoniouHIMP #automaton #finite- Finding Common Motifs with Gaps Using Finite Automata (PA, JH, CSI, BM, PP), pp. 69–77.
DLT-2006-Domaratzki - Characterizing DNA Bond Shapes Using Trajectories (MD), pp. 180–191.
ICALP-v1-2006-Radhakrishnan #lazy evaluation #random- Gap Amplification in PCPs Using Lazy Random Walks (JR), pp. 96–107.
ICALP-v2-2006-DodisR #on the #quantum- On the Impossibility of Extracting Classical Randomness Using a Quantum Computer (YD, RR), pp. 204–215.
FM-2006-Boute #formal method #independence #problem- Using Domain-Independent Problems for Introducing Formal Methods (RTB), pp. 316–331.
FM-2006-DelahayeED #security- Certifying Airport Security Regulations Using the Focal Environment (DD, JFÉ, VDG), pp. 48–63.
FM-2006-Preoteasa #logic #pointer #recursion #verification- Mechanical Verification of Recursive Procedures Manipulating Pointers Using Separation Logic (VP), pp. 508–523.
FM-2006-UmenoL #automaton #case study #protocol #proving #safety #theorem proving- Proving Safety Properties of an Aircraft Landing Protocol Using I/O Automata and the PVS Theorem Prover: A Case Study (SU, NAL), pp. 64–80.
FM-2006-ZhengWWX #approach #case study #development #formal method #object-oriented- Partially Introducing Formal Methods into Object-Oriented Development: Case Studies Using a Metrics-Driven Approach (YZ, JW, KW, JX), pp. 190–204.
RTA-2006-Bruggink #finite #higher-order #product line #proving- A Proof of Finite Family Developments for Higher-Order Rewriting Using a Prefix Property (HJSB), pp. 372–386.
RTA-2006-Bryant #infinity #verification- Formal Verification of Infinite State Systems Using Boolean Methods (REB), pp. 1–3.
SEFM-2006-RodriguesBCFG #approach- A Bag-of-Tasks Approach for State Space Exploration Using Computational Grids (CLR, PESB, JMC, JCAdF, DSG), pp. 226–235.
SEFM-2006-ZhangHW #component #declarative #modelling #performance #scheduling #uml- Declarative Performance Modeling for Component-Based System using UML Profile for Schedulability, Performance and Time (YZ, TH, JW), pp. 246–258.
SFM-2006-Harrison #float #proving #theorem proving #verification- Floating-Point Verification Using Theorem Proving (JH), pp. 211–242.
FLOPS-2006-DiscoloHMJS #data type #haskell- Lock Free Data Structures Using STM in Haskell (AD, TH, SM, SLPJ, SS), pp. 65–80.
FLOPS-2006-Tozawa #transducer #type checking #xml- XML Type Checking Using High-Level Tree Transducer (AT), pp. 81–96.
ICFP-2006-HickeyNYK #hybrid #representation- Mechanized meta-reasoning using a hybrid HOAS/de bruijn representation and reflection (JH, AN, XY, AK), pp. 172–183.
IFL-2006-TrojahnerGS #array #on the #optimisation #source code- On Optimising Shape-Generic Array Programs Using Symbolic Structural Information (KT, CG, SBS), pp. 1–18.
AIIDE-2006-JohanssonO #multi- Using Multi-Agent System Technology in Risk Bots (SJJ, FO), pp. 42–47.
AIIDE-2006-Kacmarcik #natural language- Using Natural Language to Manage NPC Dialog (GK), pp. 115–117.
AIIDE-2006-Knight #lightweight #network #simulation- Lightweight Simulation of Air Traffic Control Using Simple Temporal Networks (RK), pp. 48–53.
AIIDE-2006-McAlindenLCT - Using Environmental Annotations and Affordances to Model Culture (RM, MvL, WC, WT), pp. 145–146.
AIIDE-2006-PriceG #network #re-engineering- Plausible Environment Reconstruction Using Bayesian Networks (RGP, SDG), pp. 130–132.
AIIDE-2006-SturtevantB #abstraction #collaboration- Improving Collaborative Pathfinding Using Map Abstraction (NRS, MB), pp. 80–85.
CIG-2006-ConradieE #game studies #optimisation- Training Bao Game-Playing Agents using Coevolutionary Particle Swarm Optimization (JC, APE), pp. 67–74.
CIG-2006-GordonR #game studies #identification #set- Trappy Minimax - using Iterative Deepening to Identify and Set Traps in Two-Player Games (VSG, AR), pp. 205–210.
CIG-2006-HeinzKGBL #empirical #game studies #realtime #recognition #smarttech- Using Wearable Sensors for Real-Time Recognition Tasks in Games of Martial Arts - An Initial Experiment (EAH, KSK, MG, DB, PL), pp. 98–102.
CIG-2006-MillerMC #detection #network- Anomaly Detection in Magnetic Motion Capture using a 2-Layer SOM network (IM, SM, BC), pp. 236–242.
CIG-2006-NakashimaITN #evolution- The Effect of Using Match History on the Evolution of RoboCup Soccer Team Strategies (TN, HI, MT, MN), pp. 60–66.
CIG-2006-ReynoldsAA #algorithm #game studies #optimisation #problem- Optimization Problem Solving using Predator/Prey Games and Cultural Algorithms (RGR, MZA, RSA), pp. 119–125.
CIG-2006-RiceMSS #game studies- A Player for Tactical Air Strike Games Using Evolutionary Computation (AJR, JRM, AS, SS), pp. 83–89.
CIG-2006-WittkampB #adaptation #evolution #game studies #programming #search-based- Evolving Adaptive Play for the Game of Spoof Using Genetic Programming (MW, LB), pp. 164–172.
ICGT-2006-BaresiS #alloy #graph transformation #on the- On the Use of Alloy to Analyze Graph Transformation Systems (LB, PS), pp. 306–320.
ICGT-2006-MendizabalD #analysis #distributed #graph grammar #non-functional #probability- Non-functional Analysis of Distributed Systems in Unreliable Environments Using Stochastic Object Based Graph Grammars (OMM, FLD), pp. 275–290.
CHI-2006-BentleyMH #music- Personal vs. commercial content: the similarities between consumer use of photos and music (FB, CJM, GH), pp. 667–676.
CHI-2006-BonhardHMS #recommendation #similarity- Accounting for taste: using profile similarity to improve recommender systems (PB, CH, JDM, MAS), pp. 1057–1066.
CHI-2006-CosleyFTR #community #overview- Using intelligent task routing and contribution review to help communities build artifacts of lasting value (DC, DF, LGT, JR), pp. 1037–1046.
CHI-2006-DillonKCB #visual notation- Visual search and reading tasks using ClearType and regular displays: two experiments (AD, LK, GOC, RGB), pp. 503–511.
CHI-2006-GrossmanHBAB - Hover widgets: using the tracking state to extend the capabilities of pen-operated devices (TG, KH, PB, MA, RB), pp. 861–870.
CHI-2006-JiangOMS #interactive #pointer- Direct pointer: direct manipulation for large-display interaction using handheld cameras (HJ, EO, NM, YS), pp. 1107–1110.
CHI-2006-KramerOF #communication- Using linguistic features to measure presence in computer-mediated communication (ADIK, LMO, SRF), pp. 913–916.
CHI-2006-LukPLMLH #design #interactive #mobile #prototype- A role for haptics in mobile interaction: initial design using a handheld tactile display prototype (JL, JP, SL, KEM, VL, VH), pp. 171–180.
CHI-2006-MedynskiyDF #analysis #community #development #hybrid #network #online- Using hybrid networks for the analysis of online software development communities (YEM, ND, AF), pp. 513–516.
CHI-2006-PrabakerBC #authoring #documentation #evaluation #programming- An evaluation of using programming by demonstration and guided walkthrough techniques for authoring and utilizing documentation (MP, LDB, VC), pp. 241–250.
CHI-2006-PuVF - Increasing user decision accuracy using suggestions (PP, PV, BF), pp. 121–130.
CHI-2006-WeiszEK - Synchronous broadcast messaging: the use of ICT (JDW, TE, WAK), pp. 1293–1302.
CHI-2006-WilsonA #game studies- Text entry using a dual joystick game controller (ADW, MA), pp. 475–478.
CHI-2006-ZhaoAH #multi- Zone and polygon menus: using relative position to increase the breadth of multi-stroke marking menus (SZ, MA, KH), pp. 1077–1086.
CSCW-2006-KayanFS #difference- Cultural differences in the use of instant messaging in Asia and North America (SK, SRF, LDS), pp. 525–528.
CSCW-2006-TangLMLD #interactive- Unobtrusive but invasive: using screen recording to collect field data on computer-mediated interaction (JCT, SBL, MJM, JL, CD), pp. 479–482.
SOFTVIS-2006-AlspaughTB #social #visualisation- Using social agents to visualize software scenarios (TAA, BT, EB), pp. 87–94.
SOFTVIS-2006-Reiss #abstraction #execution #visualisation- Visualizing program execution using user abstractions (SPR), pp. 125–134.
EDOC-2006-BarrettP #automation #composition #modelling #semantics #web #web service- Semi-Automatic Distribution Pattern Modeling of Web Service Compositions using Semantics (RB, CP), pp. 417–422.
EDOC-2006-DongYZ #composition #petri net #testing #web #web service- Testing BPEL-based Web Service Composition Using High-level Petri Nets (WLD, HY, YBZ), pp. 441–444.
EDOC-2006-KunduB #xml- Secure Dissemination of XML Content Using Structure-based Routing (AK, EB), pp. 153–164.
EDOC-2006-YanZY #contract #modelling #ontology #owl #semantics- Ontology Modeling for Contract: Using OWL to Express Semantic Relations (YY, JZ, MY), pp. 409–412.
ICEIS-AIDSS-2006-AbdullahPBK #architecture #development #information management #knowledge-based #modelling #uml- Knowledge Engineering Using the UML Profile — Adopting the Model-Driven Architecture for Knowledge-Based System Development (MSA, RFP, IDB, CK), pp. 74–81.
ICEIS-AIDSS-2006-ProchazkaKK #fuzzy #information management #petri net #process- Various Process Wizard for Information Systems — Using Fuzzy Petri Nets for Process Definition (JP, JK, CK), pp. 235–242.
ICEIS-AIDSS-2006-ThuD #predict #risk management- Predicting Cardiovascular Risks — Using POSSUM, PPOSSUM and Neural Net Techniques (TNTT, DND), pp. 230–234.
ICEIS-DISI-2006-BraunerCBL - Using Gazetteers to Annotate Geographic Catalog Entries (DFB, MAC, KKB, LAPPL), pp. 215–220.
ICEIS-DISI-2006-Eessaar #database #relational #repository- Using Relational Databases in the Engineering Repository Systems (EE), pp. 30–37.
ICEIS-DISI-2006-PatroARMB #case study #database #information management #integration- Databases and Information Systems Integration Using CALOPUS: A Case Study (PKP, PA, MR, RMV, SB), pp. 200–207.
ICEIS-HCI-2006-Bakhtyari #automation #feedback #generative #ontology #student- Automatic Feedback Generation — Using Ontology in an Intelligent Tutoring System for Both Learner and Author Based on Student Model (PB), pp. 116–123.
ICEIS-HCI-2006-LiSB #correlation #hybrid #recognition #sketching #synthesis- Face Recognition from Sketches Using Advanced Correlation Filters Using Hybrid Eigenanalysis for Face Synthesis (YhL, MS, VB), pp. 11–18.
ICEIS-ISAS-2006-BokhariP #information management #petri net #validation- Validation of Information Systems Using Petri Nets (AB, WFSP), pp. 284–289.
ICEIS-ISAS-2006-ChengP #aspect-oriented #development #embedded #overview #realtime #resource management #scheduling- Using Aspect-Oriented Software Development in Real-Time Embedded Systems Software — A Review of Scheduling, Resource Allocation and Synchronization (PLC, GAP), pp. 388–393.
ICEIS-ISAS-2006-CostelloFMLD #approach #distributed #framework #modelling #named #process- iWISE: A Framework for Providing Distributed Process Visibility Using an Event-Based Process Modelling Approach (CC, WF, OM, GL, JD), pp. 224–233.
ICEIS-ISAS-2006-DasguptaSKG #hybrid #modelling #re-engineering- Hybrid Modeling Using I* and Agentspeak(L) Agents in Agent Oriented Software Engineering (AD, FS, AK, AKG), pp. 420–425.
ICEIS-ISAS-2006-ShishkovQ #modelling #process #refinement- Refinement of SDBC Business Process Models Using ISDL (BS, DACQ), pp. 61–69.
ICEIS-ISAS-2006-ZdravkovicH #flexibility #process- Flexible Realization of Business Processes Using Existing Services (JZ, MH), pp. 165–172.
ICEIS-J-2006-PourrazV #approach #architecture #evolution- Managing Service-Based EAI Architectures Evolution Using a Formal Architecture-Centric Approach (FP, HV), pp. 269–280.
ICEIS-SAIC-2006-KoutsomitropoulosMKP #information management #logic- OWL-Based Knowledge Discovery Using Description Logics Reasoners (DAK, DPM, ANK, TSP), pp. 43–50.
ICEIS-SAIC-2006-MartinelliSS - E-Procurement Adoption among Italian Firms by Using Domain Names (MM, IS, MS), pp. 124–131.
ICEIS-SAIC-2006-SchwindG #combinator #grid #resource management- Using Shadow Prices for Resource Allocation in a Combinatorial Grid with Proxy-Bidding Agents (MS, OG), pp. 11–18.
CIKM-2006-BoydellS #community #personalisation #web- Capturing community search expertise for personalized web search using snippet-indexes (OB, BS), pp. 277–286.
CIKM-2006-ChirkovaS #optimisation #query- Query optimization using restructured views (RC, FS), pp. 642–651.
CIKM-2006-HoseLS #distributed #summary- Processing relaxed skylines in PDMS using distributed data summaries (KH, CL, KUS), pp. 425–434.
CIKM-2006-LiC #detection #topic- Improving novelty detection for general topics using sentence level information patterns (XL, WBC), pp. 238–247.
CIKM-2006-MarsoloPR #query- Structure-based querying of proteins using wavelets (KM, SP, KR), pp. 24–33.
CIKM-2006-Melucci #ranking- Ranking in context using vector spaces (MM), pp. 866–867.
CIKM-2006-QamraTC #clustering #mining- Mining blog stories using community-based and temporal clustering (AQ, BLT, EYC), pp. 58–67.
CIKM-2006-RanganathanL #database #information retrieval #query #relational #semantics- Information retrieval from relational databases using semantic queries (AR, ZL), pp. 820–821.
CIKM-2006-YangJZNX #clustering #documentation #ranking #validation- Document re-ranking using cluster validation and label propagation (LY, DHJ, GZ, NY, GX), pp. 690–697.
CIKM-2006-ZhuangC #query #ranking- Re-ranking search results using query logs (ZZ, SC), pp. 860–861.
CIKM-2006-ZieglerSL #automation #proximity #semantics #taxonomy- Automatic computation of semantic proximity using taxonomic knowledge (CNZ, KS, GL), pp. 465–474.
ECIR-2006-ChenOT #image #memory management- Browsing Personal Images Using Episodic Memory (Time + Location) (CC, MPO, JT), pp. 362–372.
ECIR-2006-KarbasiB #documentation #effectiveness #normalisation #scalability- Document Length Normalization Using Effective Level of Term Frequency in Large Collections (SK, MB), pp. 72–83.
ECIR-2006-RodeH #query- Using Query Profiles for Clarification (HR, DH), pp. 205–216.
ECIR-2006-WanY #documentation #similarity- Using Proportional Transportation Distances for Measuring Document Similarity (XW, JY), pp. 25–36.
ECIR-2006-WenRB #behaviour #online #topic- The Effects on Topic Familiarity on Online Search Behaviour and Use of Relevance Criteria (LW, IR, PB), pp. 456–459.
ECIR-2006-YamoutOT #feedback- Relevance Feedback Using Weight Propagation (FY, MPO, JT), pp. 575–578.
ECIR-2006-ZhouZH #approach #concept #information retrieval #modelling- Using Concept-Based Indexing to Improve Language Modeling Approach to Genomic IR (XZ, XZ, XH), pp. 444–455.
ICML-2006-AbbeelQN #learning #modelling- Using inaccurate models in reinforcement learning (PA, MQ, AYN), pp. 1–8.
ICML-2006-BezakovaKS #graph- Graph model selection using maximum likelihood (IB, AK, RS), pp. 105–112.
ICML-2006-BowlingMJNW #learning #policy #predict- Learning predictive state representations using non-blind policies (MHB, PM, MJ, JN, DFW), pp. 129–136.
ICML-2006-DeCoste #collaboration #matrix #predict- Collaborative prediction using ensembles of Maximum Margin Matrix Factorizations (DD), pp. 249–256.
ICML-2006-LeeGW #classification- Using query-specific variance estimates to combine Bayesian classifiers (CHL, RG, SW), pp. 529–536.
ICML-2006-MaggioniM #analysis #evaluation #markov #multi #performance #policy #process- Fast direct policy evaluation using multiscale analysis of Markov diffusion processes (MM, SM), pp. 601–608.
ICML-2006-RainaNK #learning- Constructing informative priors using transfer learning (RR, AYN, DK), pp. 713–720.
ICML-2006-SilvaBBE #detection- Dealing with non-stationary environments using context detection (BCdS, EWB, ALCB, PME), pp. 217–224.
ICML-2006-TeoV #array #kernel #performance #string- Fast and space efficient string kernels using suffix arrays (CHT, SVNV), pp. 929–936.
ICML-2006-XiKSWR #classification #performance #reduction- Fast time series classification using numerosity reduction (XX, EJK, CRS, LW, CAR), pp. 1033–1040.
ICPR-v1-2006-AhmadL #image #multi #recognition #sequence- HMM-based Human Action Recognition Using Multiview Image Sequences (MA, SWL), pp. 263–266.
ICPR-v1-2006-ArandjelovicC #classification #set- Face Set Classification using Maximally Probable Mutual Modes (OA, RC), pp. 511–514.
ICPR-v1-2006-AsharafM #clustering #scalability- Scalable non-linear Support Vector Machine using hierarchical clustering (SA, MNM), pp. 908–911.
ICPR-v1-2006-BabaMA #geometry- A Unified Camera Calibration Using Geometry and Blur of Feature Points (MB, MM, NA), pp. 816–819.
ICPR-v1-2006-BartelsWM #generative- DTM Generation from LIDAR Data using Skewness Balancing (MB, HW, DCM), pp. 566–569.
ICPR-v1-2006-Bayro-CorrochanoM #algebra #fuzzy #geometry #logic- Object Manipulation using Fuzzy Logic and Geometric Algebra (EBC, RMC), pp. 1120–1123.
ICPR-v1-2006-BenjellounTM #detection- Vertebra Edge Detection Using Polar Signature (MB, HT, SM), pp. 476–479.
ICPR-v1-2006-Bernier #3d #realtime- Real-Time 3D Articulated Pose Tracking using Particle Filters Interacting through Belief Propagation (OB), pp. 90–93.
ICPR-v1-2006-BerrettiBP #3d #clustering- Partitioning of 3D Meshes using Reeb Gra (SB, ADB, PP), pp. 19–22.
ICPR-v1-2006-BhattacharyaRD #clustering #fuzzy #image #representation #retrieval #semantics- Image Representation and Retrieval Using Support Vector Machine and Fuzzy C-means Clustering Based Semantical Spaces (PB, MMR, BCD), pp. 929–935.
ICPR-v1-2006-BuenaposadaM #animation #independence #performance- Performance driven facial animation using illumination independent appearance-based tracking (JMB, EM), pp. 303–306.
ICPR-v1-2006-CaoXF #constant #self- Self-Calibration Using Constant Camera Motion (XC, JX, HF), pp. 595–598.
ICPR-v1-2006-ChangCYY #estimation #interactive #realtime- An Intelligent Bulletin Board System with Real-time Vision-based Interaction Using Head Pose Estimation (CYC, PCC, YSY, JFY), pp. 1140–1143.
ICPR-v1-2006-ChaoTTJ #detection #fault- Defect detection in low-contrast glass substrates using anisotropic diffusion (SMC, DMT, YHT, YRJ), pp. 654–657.
ICPR-v1-2006-ChenCLT #algorithm #automation #graph #image #segmentation- Automatic Segmentation of Lung Fields from Radiographic Images of SARS Patients Using a New Graph Cuts Algorithm (SC, LC, JL, XT), pp. 271–274.
ICPR-v1-2006-ChenHHH #segmentation- Segmentation of Human Body Parts Using Deformable Triangulation (CCC, JWH, YTH, CYH), pp. 355–358.
ICPR-v1-2006-ConduracheA #2d #classification #image #linear #segmentation- Vessel Segmentation in 2D-Projection Images Using a Supervised Linear Hysteresis Classifier (AC, TA), pp. 343–346.
ICPR-v1-2006-DongWH #gesture #segmentation #sequence #similarity #video- Gesture Segmentation from a Video Sequence Using Greedy Similarity Measure (QD, YW, ZH), pp. 331–334.
ICPR-v1-2006-DoYC #detection #estimation- Skin Color Detection through Estimation and Conversion of Illuminant Color using Sclera Region of Eye under Varying Illumination (HCD, JYY, SIC), pp. 327–330.
ICPR-v1-2006-DuCXL #interactive #network #process- Recognizing Interaction Activities using Dynamic Bayesian Network (YD, FC, WX, YL), pp. 618–621.
ICPR-v1-2006-FaggianPC #recognition #segmentation #video- Face Recognition From Video using Active Appearance Model Segmentation (NF, APP, TJC), pp. 287–290.
ICPR-v1-2006-FrippWCO #3d #automation #modelling #segmentation- Automatic Segmentation of the Knee Bones using 3D Active Shape Models (JF, SKW, SC, SO), pp. 167–170.
ICPR-v1-2006-FuTC #orthogonal- Specular Free Spectral Imaging Using Orthogonal Subspace Projection (ZF, RTT, TC), pp. 812–815.
ICPR-v1-2006-GaoWFZ #recognition- Face Recognition Using Most Discriminative Local and Global Features (YG, YW, XF, XZ), pp. 351–354.
ICPR-v1-2006-ItoO #detection #invariant #recognition- Detection and Recognition of Moving Objects by Using Motion Invariants (SI, NO), pp. 683–686.
ICPR-v1-2006-Katayama - Camera Calibration with a Transparent Calibration Tool Using Color Filters: Application to Stereo Camera Calibration for a Distant Object (YK), pp. 607–612.
ICPR-v1-2006-KaufholdCHR #classification #recognition #segmentation- Recognition and Segmentation of Scene Content using Region-Based Classification (JPK, RC, AH, PR), pp. 755–760.
ICPR-v1-2006-KawasakiFN #3d- 3D acquisition system using uncalibrated line-laser projec (HK, RF, YN), pp. 1071–1075.
ICPR-v1-2006-KimK #classification- Simultaneous Classification and VisualWord Selection using Entropy-based Minimum Description Length (SK, ISK), pp. 650–653.
ICPR-v1-2006-KimK06a #parametricity- Estimating Intrinsic Parameters of Cameras using Two Arbitrary Rectangles (JSK, ISK), pp. 707–710.
ICPR-v1-2006-KushalRFPH #locality #modelling #visual notation- Audio-Visual Speaker Localization Using Graphical Models (AK, MR, FFL, JP, TSH), pp. 291–294.
ICPR-v1-2006-LaggerF #multi- Using Specularities to Recover Multiple Light Sources in the Presence of Texture (PL, PF), pp. 587–590.
ICPR-v1-2006-Lhuillier #effectiveness #fault- Effective and Generic Structure from Motion using Angular Error (ML), pp. 67–70.
ICPR-v1-2006-LiangA - Fingerprint Matching Using Minutia Polygons (XL, TA), pp. 1046–1049.
ICPR-v1-2006-LiSH #image #recognition- Face Recognition using Patch-based Spin Images (YL, WAPS, ERH), pp. 408–411.
ICPR-v1-2006-LiuLYAL #coordination- Object Tracking Using Globally Coordinated Nonlinear Manifolds (CBL, RSL, MHY, NA, SEL), pp. 844–847.
ICPR-v1-2006-LladoBA #parametricity #re-engineering- Euclidean Reconstruction of Deformable Structure Using a Perspective Camera with Varying Intrinsic Parameters (XL, ADB, LdA), pp. 139–142.
ICPR-v1-2006-Lopez-FrancoB #algebra #geometry #invariant #navigation- Omnidirectional Vision and Invariant Theory for Robot Navigation Using Conformal Geometric Algebra (CLF, EBC), pp. 570–573.
ICPR-v1-2006-LublinermanOZC #linear #process #recognition #validation- Activity Recognition from Silhouettes using Linear Systems and Model (In)validation Techniques (RL, NO, DZ, OIC), pp. 347–350.
ICPR-v1-2006-MarmoAC #classification #set- Microfossils shape classification using a set of width values (RM, SA, VC), pp. 691–694.
ICPR-v1-2006-MenezesLD #3d #data fusion #gesture- Data Fusion for 3D Gestures Tracking using a Camera mounted on a Robot (PM, FL, JD), pp. 464–467.
ICPR-v1-2006-MiaoQS #composition #principle- Unsupervised Decomposition of Mixed Pixels Using the Maximum Entropy Principle (LM, HQ, HS), pp. 1067–1070.
ICPR-v1-2006-OhayonR #3d #estimation #robust- Robust 3D Head Tracking Using Camera Pose Estimation (SO, ER), pp. 1063–1066.
ICPR-v1-2006-PerrinDZ #2d #3d #assessment #parametricity #process- 2D and 3D Vegetation Resource Parameters Assessment using Marked Point Processes (GP, XD, JZ), pp. 1–4.
ICPR-v1-2006-PongC #3d #detection #modelling- Optimal Cascade Construction for Detection using 3D Models (HKP, TJC), pp. 808–811.
ICPR-v1-2006-PradeepR - Improving Shape from Focus Using Defocus Information (KSP, ANR), pp. 731–734.
ICPR-v1-2006-PrehnS #adaptation #algorithm #classification #clustering #incremental #robust- An Adaptive Classification Algorithm Using Robust Incremental Clustering (HP, GS), pp. 896–899.
ICPR-v1-2006-PupilliC #3d #modelling #realtime- Real-Time Camera Tracking Using Known 3D Models and a Particle Filter (MP, AC), pp. 199–203.
ICPR-v1-2006-QiuGDC #image #optimisation- Tone Mapping for HDR Image using Optimization A New Closed Form Solution (GQ, JG, JD, MC), pp. 996–999.
ICPR-v1-2006-RavulapalliS #video- Association of Sound to Motion in Video using Perceptual Organization (SR, SS), pp. 1216–1219.
ICPR-v1-2006-ReiterDLB #3d #analysis #canonical #correlation #re-engineering- 3D and Infrared Face Reconstruction from RGB data using Canonical Correlation Analysis (MR, RD, GL, HB), pp. 425–428.
ICPR-v1-2006-RiponTKI #algorithm #clustering #multi #search-based- Multi-Objective Evolutionary Clustering using Variable-Length Real Jumping Genes Genetic Algorithm (KSNR, CHT, SK, MKI), pp. 1200–1203.
ICPR-v1-2006-SungLK #realtime #recognition- A Real-Time Facial Expression Recognition using the STAAM (JS, SL, DK), pp. 275–278.
ICPR-v1-2006-TakeshimaIK #detection #self- Object Contour Detection Using Spatio-temporal Self-sim (HT, TI, TK), pp. 613–617.
ICPR-v1-2006-TakizawaY #3d #modelling #re-engineering- Surface Reconstruction from Stereovision Data Using a 3-D MRF of Discrete Object Models (HT, SY), pp. 27–30.
ICPR-v1-2006-TanakaHOK - Use of Viewpoint Information for Example Selection in CBIR (KT, MH, NO, EK), p. 1054.
ICPR-v1-2006-TongWZJ #multi- Facial Feature Tracking using a Multi-State Hierarchical Shape Model under Varying Face Pose and Facial Expression (YT, YW, ZZ, QJ), pp. 283–286.
ICPR-v1-2006-TrujilloO #detection #evolution #how- Using Evolution to Learn How to Perform Interest Point Detection (LT, GO), pp. 211–214.
ICPR-v1-2006-WangB #3d #automation #estimation- Automatic Estimation of 3D Transformations using Skeletons for Object Alignment (TW, AB), pp. 51–54.
ICPR-v1-2006-WeiB #data analysis #segmentation #statistics- Unsupervised Segmentation Using Gabor Wavelets and Statistical Features in LIDAR Data Analysis (HW, MB), pp. 667–670.
ICPR-v1-2006-WijewickremaPE #image #re-engineering- Reconstruction of Spheres using Occluding Contours from Stereo Images (SNRW, APP, CEE), pp. 151–154.
ICPR-v1-2006-WongC #classification #gesture #recognition- Continuous Gesture Recognition using a Sparse Bayesian Classifier (SFW, RC), pp. 1084–1087.
ICPR-v1-2006-WuW #graph- Stereo Correspondence Using Stripe Adjacency Graph (CCW, ZFW), pp. 123–126.
ICPR-v1-2006-XieL #animation #markov #modelling #speech- Speech Animation Using Coupled Hidden Markov Models (LX, ZQL), pp. 1128–1131.
ICPR-v1-2006-YingZ06a #image- Using Sphere Images for Calibrating Fisheye Cameras under the Unified Imaging Model of the Central Catadioptric and Fisheye Cameras (XY, HZ), pp. 539–542.
ICPR-v1-2006-YinWLB #3d #interactive- Analyzing Facial Expressions Using Intensity-Variant 3D Data For Human Computer Interaction (LY, XW, PL, AB), pp. 1248–1251.
ICPR-v1-2006-YouZCWT #representation- Face Representation By Using Non-tensor Product Wavelets (XY, DZ, QC, PSPW, YYT), pp. 503–506.
ICPR-v1-2006-ZengL #markov #random #segmentation- Stroke Segmentation of Chinese Characters Using Markov Random Fields (JZ, ZQL), pp. 868–871.
ICPR-v1-2006-ZhangFX #detection #image #orthogonal- Detection of moving cast shadows using image orthogonal transform (WZ, XF, YX), pp. 626–629.
ICPR-v1-2006-ZhangSL #multi #segmentation- Motion Segmentation by Multibody Trifocal Tensor Using Line Correspondence (JZ, FS, YL), pp. 599–602.
ICPR-v1-2006-ZhangT #documentation #image- RestoringWarped Document Images using Shape-from-Shading and Surface Interpolation (LZ, CLT), pp. 642–645.
ICPR-v1-2006-ZhongMH - Camera Calibration Using Circle and Right Angles (HZ, FM, YSH), pp. 646–649.
ICPR-v1-2006-ZhouW06a #verification- Face Verification Using GaborWavelets and AdaBoost (MZ, HW), pp. 404–407.
ICPR-v2-2006-AhnKB #estimation #graph #robust #segmentation- Robust Object Segmentation Using Graph Cut with Object and Background Seed Estimation (JHA, KCK, HB), pp. 361–364.
ICPR-v2-2006-AndelicSKK #hybrid #kernel #modelling #speech- A Hybrid HMM-Based Speech Recognizer Using Kernel-Based Discriminants as Acoustic Models (EA, MS, MK, SEK), pp. 1158–1161.
ICPR-v2-2006-ArivazhaganGK #classification #statistics- Texture classification using Curvelet Statistical and Co-occurrence Features (SA, LG, TGSK), pp. 938–941.
ICPR-v2-2006-BarakatB - Rule Extraction from Support Vector Machines: Measuring the Explanation Capability Using the Area under the ROC Curve (NHB, APB), pp. 812–815.
ICPR-v2-2006-BhattacharyaRD06a #clustering #fuzzy #image #representation #retrieval #semantics- Image Representation and Retrieval Using Support Vector Machine and Fuzzy C-means Clustering Based Semantical Spaces (PB, MMR, BCD), pp. 1162–1168.
ICPR-v2-2006-BhuiyanN #classification #detection #image- Anti-personnel Mine Detection and Classification Using GPR Image (AB, BN), pp. 1082–1085.
ICPR-v2-2006-ChenB #classification #invariant- Invariant Texture Classification Using Ridgelet Packets (GC, PB), pp. 464–467.
ICPR-v2-2006-ChenW #analysis #component #independence #segmentation- Texture Segmentation Using Independent Component Analysis of Gabor Features (YC, RW), pp. 147–150.
ICPR-v2-2006-ChenY #modelling #video- Exploiting High Dimensional Video Features Using Layered Gaussian Mixture Models (DC, JY), pp. 1078–1081.
ICPR-v2-2006-ChiangK #classification- Classification of Line and Character Pixels on Raster Maps Using Discrete Cosine Transformation Coefficients and Support Vector Machine (YYC, CAK), pp. 1034–1037.
ICPR-v2-2006-ChiuL #invariant- Matching Interest Points Using Affine Invariant Concentric Circles (HPC, TLP), pp. 167–170.
ICPR-v2-2006-ChoiLY #classification #feature model- Feature Extraction for Bank Note Classification Using Wavelet Transform (EC, JL, JY), pp. 934–937.
ICPR-v2-2006-CourteilleDM #problem- A Global Solution to the SFS Problem Using B-spline Surface and Simulated Annealing (FC, JDD, GM), pp. 332–335.
ICPR-v2-2006-DornaikaD #modelling #recognition- Facial Expression Recognition using Auto-regressive Models (FD, FD), pp. 520–523.
ICPR-v2-2006-DowsonBK #image- Image template matching using Mutual Information and NP-Windows (NDHD, RB, TK), pp. 1186–1191.
ICPR-v2-2006-Ekbal #classification #predict- Improvement of Prediction Accuracy Using Discretization and Voting Classifier (AE), pp. 695–698.
ICPR-v2-2006-FangC #detection #robust #statistics- Using Statistical Shape Priors in Geodesic Active Contours for Robust Object Detection (WF, KLC), pp. 304–307.
ICPR-v2-2006-FloreaBRB #image #representation- Using texture-based symbolic features for medical image representation (FF, EB, AR, AB), pp. 946–949.
ICPR-v2-2006-FuLHB #image #retrieval- Content-based Image Retrieval Using Gabor-Zernike Features (XF, YL, RWH, SB), pp. 417–420.
ICPR-v2-2006-GanD #relational- Differentiating Between Many Similar Features using Relational Information in Space and Scale (TSYG, TD), pp. 638–641.
ICPR-v2-2006-GongY #estimation #orthogonal #programming- Disparity Flow Estimation using Orthogonal Reliability-based Dynamic Programming (MG, YHY), pp. 70–73.
ICPR-v2-2006-GrimHSP #approach #modelling- A Subspace Approach to Texture Modelling by Using Gaussian Mixtures (JG, MH, PS, PP), pp. 235–238.
ICPR-v2-2006-Guo #perspective- Plane Rectification Using a Circle and Points from a Single View (FG), pp. 9–12.
ICPR-v2-2006-GuptaD #detection #multi- Texture Edge Detection using Multi-resolution Features and SOM (LG, SD), pp. 199–202.
ICPR-v2-2006-HaindlM #approach #modelling #multi #segmentation- Unsupervised Texture Segmentation Using Multispectral Modelling Approach (MH, SM), pp. 203–206.
ICPR-v2-2006-InoueNK #analysis #feature model #kernel #recognition #string- Historical Hand-Written String Recognition by Non-linear Discriminant Analysis using Kernel Feature Selection (RI, HN, NK), pp. 1094–1097.
ICPR-v2-2006-KimYL #estimation #image #interactive #modelling #parametricity #random #segmentation- New MRF Parameter Estimation Technique for Texture Image Segmentation using Hierarchical GMRF Model Based on Random Spatial Interaction and Mean Field Theory (DHK, IDY, SUL), pp. 365–368.
ICPR-v2-2006-Kita #detection- Change detection using joint intensity histogram (YK), pp. 351–356.
ICPR-v2-2006-KuijperOBG #2d #set #symmetry- Matching 2D Shapes using their Symmetry Sets (AK, OFO, PB, PJG), pp. 179–182.
ICPR-v2-2006-LeS #detection #named #robust- Ent-Boost: Boosting Using Entropy Measure for Robust Object Detection (DDL, SS), pp. 602–605.
ICPR-v2-2006-LiLL #framework #geometry #multi- A Geometric Active Contour Framework using Multi-Cue and Local Feature (ZL, QL, HL), pp. 113–116.
ICPR-v2-2006-LiLWH #detection #framework #image #novel- A Novel Framework for Urban Change Detection Using VHR Satellite Images (WL, XL, YW, ZH), pp. 312–315.
ICPR-v2-2006-LimCG #identification- Scene Identification using Discriminative Patterns (JHL, JPC, SG), pp. 642–645.
ICPR-v2-2006-Liu #classification #feature model #polynomial #recognition- High Accuracy Handwritten Chinese Character Recognition Using Quadratic Classifiers with Discriminative Feature Extraction (CLL), pp. 942–945.
ICPR-v2-2006-LiuL #classification #image- Genus-Zero Shape Classification Using Spherical Normal Image (SL, JL), pp. 126–129.
ICPR-v2-2006-LocteauRALHT #algorithm #approximate #multi #search-based- Approximation of Digital Curves using a Multi-Objective Genetic Algorithm (HL, RR, SA, YL, PH, ÉT), pp. 716–719.
ICPR-v2-2006-Mainar-RuizP #approximate #multi #nearest neighbour- Approximate Nearest Neighbor Search using a Single Space-filling Curve and Multiple Representations of the Data Points (GMR, JCPC), pp. 502–505.
ICPR-v2-2006-MakkapatiM #encoding- Contour Encoding Based on Extraction of Key Points Using Wavelet Transform (VM, PRM), pp. 1177–1180.
ICPR-v2-2006-Mancas-ThillouG - Character Segmentation-by-Recognition Using Log-Gabor Filters (CMT, BG), pp. 901–904.
ICPR-v2-2006-MaZSCG #estimation #robust- Robust Head Pose Estimation Using LGBP (BM, WZ, SS, XC, WG), pp. 512–515.
ICPR-v2-2006-MeleMS #categorisation #image #probability- Image Categorization Using Local Probabilistic Descriptors (KM, JM, DS), pp. 336–340.
ICPR-v2-2006-NedzvedAU #pseudo- Gray-scale thinning by using a pseudo-distance map (AN, SA, SU), pp. 239–242.
ICPR-v2-2006-OsawaWWY #3d- Human Tracking by Particle Filtering Using Full 3D Model of Both Target and Environment (TO, XW, KW, TY), pp. 25–28.
ICPR-v2-2006-PanBD #bottom-up #contest #functional #image #segmentation- Bottom-Up Hierarchical Image Segmentation Using Region Competition and the Mumford-Shah Functional (YP, JDB, SMD), pp. 117–121.
ICPR-v2-2006-PriorW #fault #parametricity #probability #random- Parameter Tuning using the Out-of-Bootstrap Generalisation Error Estimate for Stochastic Discrimination and Random Forests (MP, TW), pp. 498–501.
ICPR-v2-2006-QiaoY06a #bidirectional #image #multi- Recover Writing Trajectory from Multiple Stroked Image Using Bidirectional Dynamic Search (YQ, MY), pp. 970–973.
ICPR-v2-2006-RamalhoM #detection #image- Using Boosting to Improve Oil Spill Detection in SAR Images (GLBR, FNSdM), pp. 1066–1069.
ICPR-v2-2006-SenerU #analysis #component #independence #invariant #normalisation- A New Affine Invariant Curve Normalization Technique Using Independent Component Analysis (SS, MU), p. 48.
ICPR-v2-2006-ShiratoriGK #performance- An Efficient Text Capture Method for Moving Robots Using DCT Feature and Text Tracking (HS, HG, HK), pp. 1050–1053.
ICPR-v2-2006-SomolP #algorithm #feature model #keyword #multi #prototype- Multi-Subset Selection for Keyword Extraction and Other Prototype Search Tasks Using Feature Selection Algorithms (PS, PP), pp. 736–739.
ICPR-v2-2006-Strand #3d #distance #fourier #grid #image #re-engineering- Using the Hexagonal Grid for Three-Dimensional Images: Direct Fourier Method Reconstruction and Weighted Distance Transform (RS), pp. 1169–1172.
ICPR-v2-2006-Sun06a #multi #recognition- Multi-Linguistic Optical Font Recognition Using Stroke Templates (HMS), pp. 889–892.
ICPR-v2-2006-SunV #detection #linear #multi #performance- Fast Linear Feature Detection Using Multiple Directional Non-Maximum Suppression (CS, PV), pp. 288–291.
ICPR-v2-2006-TangT #analysis #linear #performance- Fast Linear Discriminant Analysis Using Binary Bases (FT, HT), pp. 52–55.
ICPR-v2-2006-TerradesTV #adaptation- Combination of shape descriptors using an adaptation of boosting (ORT, ST, EV), pp. 764–767.
ICPR-v2-2006-UsoPSG #clustering #multi- Clustering-based multispectral band selection using mutual information (AMU, FP, JMS, PGS), pp. 760–763.
ICPR-v2-2006-WangH #equation #probability- Probabilistic Relaxation using the Heat Equation (HW, ERH), pp. 666–669.
ICPR-v2-2006-WangZC #locality #performance- Efficient Topological Localization Using Orientation Adjacency Coherence Histograms (JW, HZ, RC), pp. 271–274.
ICPR-v2-2006-YangG #composition #invariant- Line-Based Affine Invariant Object Location Using Transformation Space Decomposition (RY, YG), pp. 646–649.
ICPR-v2-2006-YangQHE #adaptation #geometry #image #recognition #retrieval- Near-Duplicate Image Recognition and Content-based Image Retrieval using Adaptive Hierarchical Geometric Centroids (MY, GQ, JH, DE), pp. 958–961.
ICPR-v2-2006-YangS #detection #random- Detecting Coarticulation in Sign Language using Conditional Random Fields (RY, SS), pp. 108–112.
ICPR-v2-2006-YaslanC #classification #feature model #music- Audio Music Genre Classification Using Different Classifiers and Feature Selection Methods (YY, ZÇ), pp. 573–576.
ICPR-v2-2006-YokobayashiW #correlation #recognition- Binarization and Recognition of Degraded Characters Using a Maximum Separability Axis in Color Space and GAT Correlation (MY, TW), pp. 885–888.
ICPR-v2-2006-YuC #image #segmentation #semantics- Joint Image Segmentation and Interpretation Using Iterative Semantic Region Growing on SAR Sea Ice Imagery (QY, DAC), pp. 223–226.
ICPR-v2-2006-ZhangJHW #detection- Learning-Based License Plate Detection Using Global and Local Features (HZ, WJ, XH, QW), pp. 1102–1105.
ICPR-v2-2006-Zheng #recognition- Machine Printed Arabic Character Recognition Using S-GCM (LZ), pp. 893–896.
ICPR-v2-2006-ZhouBS #image- Extracting Lines in Noisy Image Using Directional Information (JZ, WFB, GASA), pp. 215–218.
ICPR-v3-2006-AbateNRS #3d #fourier #recognition- 3D Face Recognition using Normal Sphere and General Fourier Descriptor (AFA, MN, DR, GS), pp. 1183–1186.
ICPR-v3-2006-AbdallahHB #composition #image #performance #robust- A robust block-based image watermarking scheme using fast Hadamard transform and singular value decomposition (EEA, ABH, PB), pp. 673–676.
ICPR-v3-2006-AgrawalK #locality #realtime- Real-time Localization in Outdoor Environments using Stereo Vision and Inexpensive GPS (MA, KK), pp. 1063–1068.
ICPR-v3-2006-AlleneP #image #optimisation- Image Renaissance Using Discrete Optimization (CA, NP), pp. 631–634.
ICPR-v3-2006-ArreolaFB #classification #linear #performance- Fast Support Vector Machine Classification using linear SVMs (KZA, JF, HB), pp. 366–369.
ICPR-v3-2006-AsanoTTTANTHM - Extraction of trabecular structures of mandible excluding tooth roots on dental panoramic radiographs using mathematical morphology (AA, TT, AT, CMA, TN, KT, TH, MM), pp. 988–991.
ICPR-v3-2006-AssabieB #recognition- Ethiopic Character Recognition Using Direction Field Tensor (YA, JB), pp. 284–287.
ICPR-v3-2006-BarbuRLAHT #algorithm #classification #graph #recognition #search-based- Graph Classification Using Genetic Algorithm and Graph Probing Application to Symbol Recognition (EB, RR, HL, SA, PH, ÉT), pp. 296–299.
ICPR-v3-2006-BeleznaiFB #multi- Multiple Object Tracking Using Local PCA (CB, BF, HB), pp. 79–82.
ICPR-v3-2006-BeveridgeSR #classification #comparison #detection #naive bayes- A Comparison of Pixel, Edge andWavelet Features for Face Detection using a Semi-Naive Bayesian Classifier (JRB, JS, BR), pp. 1175–1178.
ICPR-v3-2006-BianchiniMS #locality #network #recursion- Object Localization Using Input/Output Recursive Neural Networks (MB, MM, LS), pp. 95–98.
ICPR-v3-2006-BouchaffraT #markov #recognition- Protein Fold Recognition using a Structural Hidden Markov Model (DB, JT), pp. 186–189.
ICPR-v3-2006-CaronV #evaluation #image #modelling #quality- Compressed Image Quality Evaluation using Power Law Models (YC, NV), pp. 657–660.
ICPR-v3-2006-ChairunnandaGC #distance #edit distance #sequence- Enhancing Edit Distance on Real Sequences Filters using Histogram Distance on Fixed Reference Ordering (PC, VG, LC), pp. 582–585.
ICPR-v3-2006-ChoiAB #segmentation- Face Alignment Using Segmentation and a Combined AAM in a PTZ Camera (KC, JHA, HB), pp. 1191–1194.
ICPR-v3-2006-EmmsHW #graph #quantum- Graph Matching using Interference of Coined Quantum Walks (DE, ERH, RCW), pp. 133–136.
ICPR-v3-2006-ErikssonA #image- Bijective Image Registration using Thin-Plate Splines. (APE, KÅ), pp. 798–801.
ICPR-v3-2006-GuoL #image #multi- Multi-modality Image Registration Using Mutual Information Based on Gradient Vector Flow (YG, CCL), pp. 697–700.
ICPR-v3-2006-GutmanWLCT #analysis- Hippocampal Surface Analysis Using Spherical Harmonic Function Applied to Surface Conformal Mapping (BG, YW, LML, TFC, PMT), pp. 964–967.
ICPR-v3-2006-HuangL #image- A Secret Image Sharing Method Using Integer-to-Integer Wavelet Transform (CPH, CCL), pp. 802–805.
ICPR-v3-2006-KananFE #locality #performance #recognition- An Efficient Face Recognition System Using a New Optimized Localization Method (HRK, KF, ME), pp. 564–567.
ICPR-v3-2006-KlausSK #adaptation #difference #self- Segment-Based Stereo Matching Using Belief Propagation and a Self-Adapting Dissimilarity Measure (AK, MS, KFK), pp. 15–18.
ICPR-v3-2006-KohmuraW #algorithm #search-based- Determining Optimal Filters for Binarization of Degraded Characters in Color Using Genetic Algorithms (HK, TW), pp. 661–664.
ICPR-v3-2006-KyweFM #algorithm #image #realtime #scheduling- Scheduling of Image Processing Using Anytime Algorithm for Real-time System (WWK, DF, KM), pp. 1095–1098.
ICPR-v3-2006-LakamperL #3d- Using Extended EM to Segment Planar Structures in 3D (RL, LJL), pp. 1077–1082.
ICPR-v3-2006-LamL #identification- Human Identification by Using the Motion and Static Characteristic of Gait (THWL, RSTL), pp. 996–999.
ICPR-v3-2006-LeeE06a - Simultaneous Inference of View and Body Pose using Torus Manifolds (CSL, AME), pp. 489–494.
ICPR-v3-2006-LeoputraTL #distributed- Non-overlapping Distributed Tracking using Particle Filter (WSL, TT, FLL), pp. 181–185.
ICPR-v3-2006-LernerV #classification #fuzzy #image #search-based- Image Classification for Genetic Diagnosis using Fuzzy ARTMAP (BL, BV), pp. 362–365.
ICPR-v3-2006-LiC #classification #nearest neighbour #probability- Classification Using the Local Probabilistic Centers of k-Nearest Neighbors (BYL, YWC), pp. 1220–1223.
ICPR-v3-2006-LiPKZ #multimodal- Multimodal Registration using the Discrete Wavelet Frame Transform (SL, JP, JTK, JZ), pp. 877–880.
ICPR-v3-2006-MakkapatiM06a - Vector Quantization Using Reflections of Triangular Subcodevectors (VM, PRM), pp. 701–704.
ICPR-v3-2006-NgOFGN #automation #image #information management #segmentation- Automatic Segmentation of Muscles of Mastication from Magnetic Resonance Images Using Prior Knowledge (HPN, SHO, KWCF, PSG, WLN), pp. 968–971.
ICPR-v3-2006-NguyenSQN #fuzzy #predict- Traffic Prediction Using Ying-Yang Fuzzy Cerebellar Model Articulation Controller (MNN, DS, CQ, GSN), pp. 258–261.
ICPR-v3-2006-NieuwenhuisY #image #knowledge base #network- Knowledge Based Image Enhancement Using Neural Networks (CN, MY), pp. 814–817.
ICPR-v3-2006-PalenichkaZ #image #network- Perceptual Knowledge Extraction Using Bayesian Networks of Salient Image Objects (RMP, MBZ), pp. 1216–1219.
ICPR-v3-2006-ParkJKKH #multi #named #visual notation- ViSE: Visual Search Engine Using Multiple Networked Cameras (UP, AKJ, IK, KK, NH), pp. 1204–1207.
ICPR-v3-2006-ParkLL #3d- Superimposing 3D Virtual Objects using Markerless Tracking (SCP, SWL, SWL), pp. 897–900.
ICPR-v3-2006-PetterssonKB #automation #segmentation- Automatic Hip Bone Segmentation Using Non-Rigid Registration (JP, HK, MB), pp. 946–949.
ICPR-v3-2006-PlotzFHKLMMSSS #automation #detection #modelling #music #probability- Automatic Detection of Song Changes in Music Mixes Using Stochastic Models (TP, GAF, PH, SK, KL, TM, MM, LS, MS, HS), pp. 665–668.
ICPR-v3-2006-QiuH #graph- Graph Matching using Commute Time Spanning Trees (HQ, ERH), pp. 1224–1227.
ICPR-v3-2006-QiuXT #clustering #feedback #kernel #performance- Efficient Relevance Feedback Using Semi-supervised Kernel-specified K-means Clustering (BQ, CX, QT), pp. 316–319.
ICPR-v3-2006-RendekW #consistency #set- Extraction of Consistent Subsets of Descriptors using Choquet Integral (JR, LW), pp. 208–211.
ICPR-v3-2006-SakaiA #detection #metric- Human and Object Detection in Smoke-filled Space using Millimeter-wave radar based Measurement System (MS, YA), p. 750.
ICPR-v3-2006-ScheundersB #component #image #multi- Wavelet denoising of multicomponent images, using a Gaussian Scale Mixture model (PS, SDB), pp. 754–757.
ICPR-v3-2006-SchlapbachB #identification #modelling- Off-lineWriter Identification Using Gaussian Mixture Models (AS, HB), pp. 992–995.
ICPR-v3-2006-ShinozakiUGR #image- Correction of intensity of a color image using a range intensity image (MS, KU, GG, MR), pp. 774–777.
ICPR-v3-2006-SmithKHI #recognition- Face Recognition Using Angular LDA and SVM Ensembles (RSS, JK, MH, JI), pp. 1008–1012.
ICPR-v3-2006-TianK06a #algorithm #distance #performance- An Efficient Algorithm for Point Matching Using Hilbert Scanning Distance (LT, SiK), pp. 873–876.
ICPR-v3-2006-Wang06a #analysis- Abnormal Walking Gait Analysis Using Silhouette-Masked Flow Histograms (LW0), pp. 473–476.
ICPR-v3-2006-WangGZLZ #identification- Palmprint Identification using Boosting Local Binary Pattern (XW, HG, HZ, BL, ZZ), pp. 503–506.
ICPR-v3-2006-WangWKH #probability #video- Tracking a Variable Number of Human Groups in Video Using Probability Hypothesis Density (YDW, JKW, AAK, WH), pp. 1127–1130.
ICPR-v3-2006-WongWC #classification #robust- Robust Appearance-based Tracking using a sparse Bayesian classifier (SFW, KYKW, RC), pp. 47–50.
ICPR-v3-2006-XueD #2d #3d #locality #multi- 3D+2D Face Localization Using Boosting in Multi-Modal Feature Space (FX, XD), pp. 499–502.
ICPR-v3-2006-XueLF #image- Iterative Image Restoration using a Non-Local Regularization Function and a Local Regularization Operator (FX, QSL, WF), pp. 766–769.
ICPR-v3-2006-YamazakiCX #analysis #component #image #independence #kernel- Separating Reflections from Images Using Kernel Independent Component Analysis (MY, YWC, GX), pp. 194–197.
ICPR-v3-2006-YamazoeUA #constraints #geometry #multi #optimisation- Multiple Camera Calibration with Bundled Optimization using Silhouette Geometry Constraints (HY, AU, SA), pp. 960–963.
ICPR-v3-2006-YangL06a #3d #image #learning #sequence- Reconstructing 3D Human Body Pose from Stereo Image Sequences Using Hierarchical Human Body Model Learning (HDY, SWL), pp. 1004–1007.
ICPR-v3-2006-YuL #distance #recognition- Shape Recognition using Curve Segment Hausdorff Distance (XY, MKHL), pp. 441–444.
ICPR-v3-2006-YunBK #dependence #realtime #recognition #relational #visual notation- Real-time Object Recognition using Relational Dependency based on Graphical Model (WHY, SYB, DK), pp. 28–32.
ICPR-v3-2006-ZhangY #image #multi- Multiple Regions of Interest Image Coding using Compensation Scheme and Alternating Shift (LbZ, XY), pp. 758–761.
ICPR-v3-2006-ZouariHL #comparison- Experimental Comparison of Combination Rules using Simulated Data (HZ, LH, YL), pp. 152–155.
ICPR-v4-2006-AndersenJM #estimation- Estimation of Dynamic Light Changes in Outdoor Scenes Without the use of Calibration Objects (MSA, TJ, CBM), pp. 91–94.
ICPR-v4-2006-ChenLL #video- Video Scene Extraction Using Mosaic Technique (LHC, YCL, HYML), pp. 723–726.
ICPR-v4-2006-ChikkerurPJRB #locality #representation- Fingerprint Representation Using Localized Texture Features (SC, SP, AJ, NKR, RMB), pp. 521–524.
ICPR-v4-2006-Choi #cumulative #recognition #robust #speech- A Noise Robust Front-end for Speech Recognition Using Hough Transform and Cumulative Distribution Mapping (EHCC), pp. 286–289.
ICPR-v4-2006-CuiZZS #multi #people #robust- Robust Tracking of Multiple People in Crowds Using Laser Range Scanners (JC, HZ, HZ, RS), pp. 857–860.
ICPR-v4-2006-DhandraHHM #analysis #image #segmentation- Analysis of Abnormality in Endoscopic images using Combined HSI Color Space and Watershed Segmentation (BVD, RH, MH, VSM), pp. 695–698.
ICPR-v4-2006-FengC #invariant- Fingerprint Indexing Using Ridge Invariants (JF, AC), pp. 433–436.
ICPR-v4-2006-FusseneggerOP #locality #segmentation- Object localization/segmentation using generic shape priors (MF, AO, AP), pp. 41–44.
ICPR-v4-2006-Garcia-PerezMBB #image #retrieval- Object-Based Image Retrieval Using Active Nets (DGP, AMG, SB, ADB), pp. 750–753.
ICPR-v4-2006-HafezJ #estimation #visual notation- Target Model Estimation using Particle Filters for Visual Servoing (AHAH, CVJ), pp. 651–654.
ICPR-v4-2006-HeYTWX #image #matrix #novel #retrieval #symmetry- Texture Image Retrieval Using Novel Non-separable Filter Banks Based on Centrally Symmetric Matrices (ZH, XY, YYT, PSPW, YX), pp. 161–164.
ICPR-v4-2006-JainCD - Pores and Ridges: Fingerprint Matching Using Level 3 Features (AKJ, YC, MD), pp. 477–480.
ICPR-v4-2006-KimPL #3d- Tracking 3D Human Body using Particle Filter in Moving Monocular Camera (SK, CBP, SWL), pp. 805–808.
ICPR-v4-2006-KropotovPVV #kernel #on the #principle- On Kernel Selection in Relevance Vector Machines Using Stability Principle (DK, NP, OV, DV), pp. 233–236.
ICPR-v4-2006-KryszczukD #detection- Singular point detection in fingerprints using quadrant change information (KK, AD), pp. 594–597.
ICPR-v4-2006-KwonYKL #clustering- Fingerprint Matching Method Using Minutiae Clustering and Warping (DK, IDY, DHK, SUL), pp. 525–528.
ICPR-v4-2006-KyweYM #lens- Contact Lens Extraction by Using Thermo-Vision (WWK, MY, KM), pp. 570–573.
ICPR-v4-2006-LaurendeauB #distance- Shape-Based Contour Interpolation and Extrapolation Using Distance Mapping (DL, OB), pp. 659–662.
ICPR-v4-2006-LiC06a #classification #nearest neighbour #probability- Classification Using the Local Probabilistic Centers of k-Nearest Neighbors (BYL, YWC), p. 954.
ICPR-v4-2006-LienY #performance #predict- A Fast Mode Decision Method for H.264/AVC Using the Spatial-Temporal Prediction Scheme (CCL, CPY), pp. 334–337.
ICPR-v4-2006-LiL06a #identification- Hierarchical Identification of Palmprint using Line-based Hough Transform (FL, MKHL), pp. 149–152.
ICPR-v4-2006-LiZZB #analysis #approach #automation #multi #segmentation- A New Approach to Automated Retinal Vessel Segmentation Using Multiscale Analysis (QL, LZ, DZ, PB), pp. 77–80.
ICPR-v4-2006-LuC06a #3d #analysis #metric- Practical 3-D Shape Measurement Using Optimal Intensity-Modulated Projection and Intensity-Phase Analysis Techniques (CL, GC), pp. 870–873.
ICPR-v4-2006-MacenkoCM #detection #segmentation- Lesion Detection Using Morphological Watershed Segmentation and Modelbased Inverse Filtering (MM, MC, LM), pp. 679–682.
ICPR-v4-2006-MellakhPD - Using Signal/Residual Information of Eigenfaces for PCA Face Space Dimensionality Characteristics (MAM, DPD, BD), pp. 574–577.
ICPR-v4-2006-MoncrieffVW #modelling- Unifying Background Models over Complex Audio using Entropy (SM, SV, GAWW), pp. 249–253.
ICPR-v4-2006-NagaharaMIYS #generative #video- High-resolution Video Generation Using Morphing (HN, TM, YI, MY, TS), pp. 338–341.
ICPR-v4-2006-NagarC #design #fuzzy #symmetry- Biometrics based Asymmetric Cryptosystem Design Using Modified Fuzzy Vault Scheme (AN, SC), pp. 537–540.
ICPR-v4-2006-NiuG #network- Recovering Non-overlapping Network Topology Using Far-field Vehicle Tracking Data (CN, EG), pp. 944–949.
ICPR-v4-2006-NosratighodsAE #novel #set #verification- Speaker Verification Using A Novel Set of Dynamic Features (MN, EA, JE), pp. 266–269.
ICPR-v4-2006-Onoguchi #correlation #detection- Moving Object Detection Using a Cross Correlation between a Short Accumulated Histogram and a Long Accumulated Histogram (KO), pp. 896–899.
ICPR-v4-2006-PalenichkaZ06a #image #network- Perceptual Knowledge Extraction Using Bayesian Networks of Salient Image Objects (RMP, MBZ), p. 953.
ICPR-v4-2006-QiuH06a #graph- Graph Matching using Commute Time Spanning Tr (HQ, ERH), p. 955.
ICPR-v4-2006-QuanZ - Data Hiding in MPEG Compressed Audio Using Wet Paper Codes (XQ, HZ), pp. 727–730.
ICPR-v4-2006-ReisertB #3d #data-driven #database #integration #invariant- Invariant Features for 3D-Data based on Group Integration using Directional Information and Spherical Harmonic Expansion (MR, HB), pp. 206–209.
ICPR-v4-2006-Rivera-RoveloB #algebra #framework #geometry #realtime- Non-Rigid Alignment and Real-Time Tracking Using the Geometric Algebra Framework (JRR, EBC), pp. 675–678.
ICPR-v4-2006-ShaZT #set- Minutiae-based Fingerprint Matching Using Subset Combination (LS, FZ, XT), pp. 566–569.
ICPR-v4-2006-ShibuyaU #image #mobile #self #standard- Self-Localization of a Mobile Robot Using Compressed Image Data of Average and Standard Deviation (NS, KU), pp. 614–617.
ICPR-v4-2006-SmithH - Estimating Cast Shadows using SFS and Class-based Surface Completion (WAPS, ERH), pp. 86–90.
ICPR-v4-2006-SvenssonGFSOS #composition #framework #fuzzy #image- Using a fuzzy framework for delineation and decomposition of Immunoglobulin G in cryo electron tomographic images (SS, MG, DF, US, LGO, SS), pp. 687–690.
ICPR-v4-2006-TodorovicA #3d #classification #segmentation- 3D Texture Classification Using the Belief Net of a Segmentation Tree (ST, NA), pp. 33–36.
ICPR-v4-2006-UranishiNYIMC #metric- Whole Shape Measurement System Using a Single Camera and a Cylindrical Mirror (YU, MN, YY, MI, YM, KC), pp. 866–869.
ICPR-v4-2006-VillamizarSA #detection #image #invariant #realtime- Computation of Rotation Local Invariant Features using the Integral Image for Real Time Object Detection (MV, AS, JAC), pp. 81–85.
ICPR-v4-2006-WangAC #identification #multi #recognition- Multi-lingual Phoneme Recognition and Language Identification Using Phonotactic Information (LW, EA, EHCC), pp. 245–248.
ICPR-v4-2006-WangC #detection #video- Detecting Video Texts Using Spatial-Temporal Wavelet Transform (YKW, JMC), pp. 754–757.
ICPR-v4-2006-WangK #approach #automation #estimation- Automatic Alignment of High-Resolution NMR Spectra Using a Bayesian Estimation Approach (ZW, SBK), pp. 667–670.
ICPR-v4-2006-WangWLJK #analysis #classification #component #independence- Content-Based Audio Classification Using Support Vector Machines and Independent Component Analysis (JCW, JFW, CBL, KTJ, WHK), pp. 157–160.
ICPR-v4-2006-WangXC #2d #automation #classification #pseudo #video- Automatic Sports Video Genre Classification using Pseudo-2D-HMM (JW, CX, EC), pp. 778–781.
ICPR-v4-2006-WuQ #geometry #identification- A Hierarchical Palmprint Identification Method Using Hand Geometry and Grayscale Distribution Features (JW, ZQ), pp. 409–412.
ICPR-v4-2006-YamaguchiKN #detection #estimation- Vehicle Ego-Motion Estimation and Moving Object Detection using a Monocular Camera (KY, TK, YN), pp. 610–613.
ICPR-v4-2006-YangG06a #multi #verification- Multi-SNR GMMs-Based Noise-Robust Speaker Verification Using 1/fa Noises (LY, WG), pp. 241–244.
ICPR-v4-2006-YaoLYZL06a #algorithm #recognition- Iris Recognition Algorithm Using Modified Log-Gabor Filters (PY, JL, XY, ZZ, BL), pp. 461–464.
ICPR-v4-2006-YiA - An Omnidirectional Stereo Vision System Using a Single Camera (SY, NA), pp. 861–865.
ICPR-v4-2006-YuanMZL #matrix #recognition- Ear Recognition using Improved Non-Negative Matrix Factorization (LY, ZM, YZ, KL), pp. 501–504.
ICPR-v4-2006-YuC06a #segmentation #statistics- Filament Preserving Segmentation for SAR Sea Ice Imagery Using a New Statistical Model (QY, DAC), pp. 849–852.
ICPR-v4-2006-ZaimQSIT #clustering #image #robust #segmentation- A Robust and Accurate Segmentation of Iris Images Using Optimal Partitioning (AZ, MKQ, JS, JI, RT), pp. 578–581.
ICPR-v4-2006-ZhaoCLP #recognition- Gait Recognition Using Fractal Scale and Wavelet Moments (GZ, LC, HL, MP), pp. 453–456.
ICPR-v4-2006-ZhaoG06a #automation #energy #estimation #modelling- Automated Face Pose Estimation Using Elastic Energy Models (SZ, YG), pp. 618–621.
ICPR-v4-2006-ZhaoSC #clustering- Fingerprint Registration Using Minutia Clusters and Centroid Structure 1 (DZ, FS, AC), pp. 413–416.
ICPR-v4-2006-ZhengLZ #encryption #generative- Cryptographic Key Generation from Biometric Data Using Lattice Mapping (GZ, WL, CZ), pp. 513–516.
KDD-2006-BarbaraDR #detection #statistics #testing- Detecting outliers using transduction and statistical testing (DB, CD, JPR), pp. 55–64.
KDD-2006-KeCN #approach #correlation #mining- Mining quantitative correlated patterns using an information-theoretic approach (YK, JC, WN), pp. 227–236.
KDD-2006-LiuZBX #analysis- Rule interestingness analysis using OLAP operations (BL, KZ, JB, WX), pp. 297–306.
KDD-2006-LoekitoB #diagrams #mining #performance- Fast mining of high dimensional expressive contrast patterns using zero-suppressed binary decision diagrams (EL, JB), pp. 307–316.
KDD-2006-ManiyarN #algorithm #data mining #mining #visual notation #visualisation- Visual data mining using principled projection algorithms and information visualization techniques (DMM, ITN), pp. 643–648.
KDD-2006-NathBM #approach #classification #clustering #scalability- Clustering based large margin classification: a scalable approach using SOCP formulation (JSN, CB, MNM), pp. 674–679.
KDD-2006-RattiganMJ #approximate #network #performance- Using structure indices for efficient approximation of network properties (MJR, MEM, DJ), pp. 357–366.
KDD-2006-WangP #modelling #probability- Summarizing itemset patterns using probabilistic models (CW, SP), pp. 730–735.
KDD-2006-XuWPWSF - Utility-based anonymization using local recoding (JX, WW, JP, XW, BS, AWCF), pp. 785–790.
KR-2006-BonetG #heuristic- Heuristics for Planning with Penalties and Rewards using Compiled Knowledge (BB, HG), pp. 452–462.
KR-2006-ClassenL #knowledge-based #source code- Foundations for Knowledge-Based Programs using ES (JC, GL), pp. 318–328.
SEKE-2006-HuangC #probability #rule-based #similarity- Using Conditional Probability to Measure Rule-based Knowledge Similarity (CJH, MYC), pp. 41–44.
SEKE-2006-HungL #data mining #mining #performance- Using Data Mining Schemes for Improvement on System Performance in Virtual Environments (SSH, DSML), pp. 61–66.
SEKE-2006-KuleszaLAG #aspect-oriented #generative- Customizing Aspect-Oriented Variabilities using Generative Techniques (UK, CJPdL, PSCA, AG), pp. 17–22.
SEKE-2006-MazzoleniVFMB #image #towards- Towards a contextualized access to the cultural heritage world using 360 Panoramic Images (PM, SV, SF, PM, EB), pp. 416–419.
SEKE-2006-Merz #approach #java #security- Using the Dynamic Proxy Approach to Introduce Role-Based Security to Java Data Objects (MM), pp. 404–409.
SEKE-2006-MichielsRBBD #modelling #testing- Program Testing Using High-Level Property-Driven Models (IM, CDR, JB, EGB, TD), pp. 489–494.
SEKE-2006-PilskalnsA #design #ocl #security #testing #uml- Using UML Designs to Generate OCL for Security Testing (OP, AAA), pp. 505–510.
SEKE-2006-SornilS #detection- Improving Intrusion Detection Systems Using Reference Vectors (OS, PS), pp. 398–403.
SEKE-2006-SteinmacherLH #analysis #process #simulation #workflow- Task Anticipation: A Quantitative Analysis Using Workflow Process Simulation (IS, JVdL, EHMH), pp. 601–606.
SEKE-2006-YuLSH #modelling- Modeling Complex Software Systems Using an Aspect Extension of Object-Z (HY, DL, ZS, XH), pp. 11–16.
SIGIR-2006-AlonsoG #clustering- Clustering of search results using temporal attributes (OA, MG), pp. 597–598.
SIGIR-2006-AnhM #evaluation #query- Pruned query evaluation using pre-computed impacts (VNA, AM), pp. 372–379.
SIGIR-2006-AslamPY #evaluation #statistics- A statistical method for system evaluation using incomplete judgments (JAA, VP, EY), pp. 541–548.
SIGIR-2006-DiazM #corpus #estimation #modelling #scalability- Improving the estimation of relevance models using large external corpora (FD, DM), pp. 154–161.
SIGIR-2006-FernandezVC #rank- Using historical data to enhance rank aggregation (MF, DV, PC), pp. 643–644.
SIGIR-2006-LiR #named #web- DeWild: a tool for searching the web using wild cards (HL, DR), p. 731.
SIGIR-2006-MacdonaldO06a #framework #platform- Searching for expertise using the terrier platform (CM, IO), p. 732.
SIGIR-2006-MayfieldM #documentation #retrieval- Improving QA retrieval using document priors (JM, PM), pp. 677–678.
SIGIR-2006-MinkovCN #ambiguity #email #graph- Contextual search and name disambiguation in email using graphs (EM, WWC, AYN), pp. 27–34.
SIGIR-2006-ParikhK #feedback #named #query- Unity: relevance feedback using user query logs (JP, SK), pp. 689–690.
SIGIR-2006-RadlinskiD #personalisation #web- Improving personalized web search using result diversification (FR, STD), pp. 691–692.
SIGIR-2006-RamirezWV #xml- Using small XML elements to support relevance (GR, TW, APdV), pp. 693–694.
SIGIR-2006-TreeratpitukC #automation #case study #clustering #statistics- An experimental study on automatically labeling hierarchical clusters using statistical features (PT, JPC), pp. 707–708.
SIGIR-2006-VaradarajanHL #web- Searching the web using composed pages (RV, VH, TL), pp. 713–714.
SIGIR-2006-VassilvitskiiB #distance #feedback #web- Using web-graph distance for relevance feedback in web search (SV, EB), pp. 147–153.
ECMDA-FA-2006-BraheO #modelling #process #uml- Business Process Modeling: Defining Domain Specific Modeling Languages by Use of UML Profiles (SB, KØ), pp. 241–255.
ECMDA-FA-2006-EngelPK #model merging- Using a Model Merging Language for Reconciling Model Versions (KDE, RFP, DSK), pp. 143–157.
MoDELS-2006-DuarteKU #information management- Model Extraction Using Context Information (LMD, JK, SU), pp. 380–394.
MoDELS-2006-DucasseG #execution #metalanguage #smalltalk- Using Smalltalk as a Reflective Executable Meta-language (SD, TG), pp. 604–618.
MoDELS-2006-MensSD #analysis #consistency #dependence #detection #nondeterminism- Detecting and Resolving Model Inconsistencies Using Transformation Dependency Analysis (TM, RVDS, MD), pp. 200–214.
MoDELS-2006-SchattkowskyHE #design #process #synthesis #uml- Using UML Activities for System-on-Chip Design and Synthesis (TS, JHH, GE), pp. 737–752.
SPL-BOOK-2006-Engelsma #diagrams #evolution #incremental #integration #multi #product line- Incremental Systems Integration within Multidisciplinary Product Line Engineering Using Configuration Item Evolution Diagrams (EE), pp. 523–555.
SPLC-2006-HallsteinsenSSF #adaptation #product line- Using Product Line Techniques to Build Adaptive Systems (SOH, ES, AS, JF), pp. 141–150.
SPLC-2006-SpinczykP #feature model #modelling- Using Feature Models for Product Derivation (OS, HP), p. 225.
SPLC-2006-TraskRPB #component #modelling #product line- Using Model-Driven Engineering to Complement Software Product Line Engineering in Developing Software Defined Radio Components and Applications (BT, AR, DP, VB), pp. 192–202.
MoDELS-2006-DuarteKU #information management- Model Extraction Using Context Information (LMD, JK, SU), pp. 380–394.
MoDELS-2006-DucasseG #execution #metalanguage #smalltalk- Using Smalltalk as a Reflective Executable Meta-language (SD, TG), pp. 604–618.
MoDELS-2006-MensSD #analysis #consistency #dependence #detection #nondeterminism- Detecting and Resolving Model Inconsistencies Using Transformation Dependency Analysis (TM, RVDS, MD), pp. 200–214.
MoDELS-2006-SchattkowskyHE #design #process #synthesis #uml- Using UML Activities for System-on-Chip Design and Synthesis (TS, JHH, GE), pp. 737–752.
OOPSLA-2006-CavazosO #compilation- Method-specific dynamic compilation using logistic regression (JC, MFPO), pp. 229–240.
OOPSLA-2006-FairbanksGS #design #framework- Design fragments make using frameworks easier (GF, DG, WLS), pp. 75–88.
OOPSLA-2006-Hutchins #prototype- Eliminating distinctions of class: using prototypes to model virtual classes (DH), pp. 1–20.
OOPSLA-2006-KitMB #analysis #requirements #semantics- Isolating and relating concerns in requirements using latent semantic analysis (LKK, CKM, ELAB), pp. 383–396.
QAPL-2005-BinderH06 #bytecode #cpu #metric- Using Bytecode Instruction Counting as Portable CPU Consumption Metric (WB, JH), pp. 57–77.
AdaEurope-2006-Maurer #ada- Using Mathematics to Improve Ada Compiled Code (WDM), pp. 191–202.
LOPSTR-2006-ArroyoRSV #graph #partial evaluation- Improving Offline Narrowing-Driven Partial Evaluation Using Size-Change Graphs (GA, JGR, JS, GV), pp. 60–76.
LOPSTR-2006-LeuschelCE #logic programming #online #partial evaluation #source code- Supervising Offline Partial Evaluation of Logic Programs Using Online Techniques (ML, SJC, DE), pp. 43–59.
LOPSTR-2006-Payet #detection #term rewriting- Detecting Non-termination of Term Rewriting Systems Using an Unfolding Operator (ÉP), pp. 194–209.
PADL-2006-GouraudG #functional #java #testing #virtual machine- Using CHRs to Generate Functional Test Cases for the Java Card Virtual Machine (SDG, AG), pp. 1–15.
PADL-2006-NavasBH #analysis #clique #performance #top-down- Efficient Top-Down Set-Sharing Analysis Using Cliques (JAN, FB, MVH), pp. 183–198.
PADL-2006-QuesadaRDC #problem- Using Dominators for Solving Constrained Path Problems (LQ, PVR, YD, RC), pp. 73–87.
PEPM-2006-Edwards #fixpoint #simulation- Using program specialization to speed SystemC fixed-point simulation (SAE), pp. 21–28.
PLDI-2006-LauAHC #online #optimisation #performance- Online performance auditing: using hot optimizations without getting burned (JL, MA, MH, BC), pp. 239–251.
QAPL-2006-BinderH06a #bytecode #profiling #virtual machine- Exact and Portable Profiling for the JVM Using Bytecode Instruction Counting (WB, JH), pp. 45–64.
SAS-2006-Arnold #analysis #logic #refinement- Specialized 3-Valued Logic Shape Analysis Using Structure-Based Refinement and Loose Embedding (GA), pp. 204–220.
SAS-2006-ChangHN #analysis #low level- Analysis of Low-Level Code Using Cooperating Decompilers (BYEC, MH, GCN), pp. 318–335.
SIGAda-2006-Carlisle #ada #automation #generative #object-oriented #parsing- Automatic OO parser generation using visitors for Ada 2005 (MCC), pp. 3–8.
SIGAda-2006-Klein #ada- Use of Ada in Lockheed Martin for air traffic management and beyond (JK), p. 1.
SIGAda-2006-Taft #ada #exclamation #why- Why you should be using Ada 2005 now! (STT), p. 75.
RE-2006-AlencarMACSM #aspect-oriented- Using Aspects to Simplify iModels (FMRA, AMDM, JA, JC, CTLLS, JM), pp. 328–329.
RE-2006-Gonzalez-BaixauliLL #elicitation #interactive #non-functional #requirements- Eliciting Non-Functional Requirements Interactions Using the Personal Construct Theory (BGB, JCSdPL, MAL), pp. 340–341.
RE-2006-GordijnPW #comprehension #modelling- Understanding Business Strategies of Networked Value Constellations Using Goal- and Value Modeling (JG, MP, RW), pp. 126–135.
RE-2006-KaiyaS #elicitation #ontology #requirements- Using Domain Ontology as Domain Knowledge for Requirements Elicitation (HK, MS), pp. 186–195.
ASE-2006-Antkiewicz #modelling- Round-Trip Engineering of Framework-Based Software using Framework-Specific Modeling Languages (MA), pp. 323–326.
ASE-2006-FalbRA #automation #design #interactive #specification #synthesis #user interface- Using communicative acts in interaction design specifications for automated synthesis of user interfaces (JF, TR, EA), pp. 261–264.
ASE-2006-HassanZ #certification #predict- Using Decision Trees to Predict the Certification Result of a Build (AEH, KZ), pp. 189–198.
ASE-2006-Jurjens #analysis #automation #java #proving #security #source code #theorem proving- Security Analysis of Crypto-based Java Programs using Automated Theorem Provers (JJ), pp. 167–176.
ASE-2006-LiuYR #library #model checking- Software Library Usage Pattern Extraction Using a Software Model Checker (CL, EY, DJR), pp. 301–304.
ASE-2006-RobbyDH #framework #model checking- Domain-specific Model Checking Using The Bogor Framework (R, MBD, JH), pp. 369–370.
FSE-2006-GirouxR #detection #testing- Detecting increases in feature coupling using regression tests (OG, MPR), pp. 163–174.
FSE-2006-HalfondOM #evaluation #injection #sql- Using positive tainting and syntax-aware evaluation to counter SQL injection attacks (WGJH, AO, PM), pp. 175–185.
FSE-2006-KerstenM - Using task context to improve programmer productivity (MK, GCM), pp. 1–11.
FSE-2006-StorzerRRT #classification #java #source code- Finding failure-inducing changes in java programs using change classification (MS, BGR, XR, FT), pp. 57–68.
ICSE-2006-AbeMKKH #classification #estimation- Estimation of project success using Bayesian classifier (SA, OM, TK, NK, MH), pp. 600–603.
ICSE-2006-Dolins #process- Using the balanced scorecard process to compute the value of software applications (SBD), pp. 881–884.
ICSE-2006-FrantzeskouSGK #effectiveness #identification #source code- Effective identification of source code authors using byte-level information (GF, ES, SG, SKK), pp. 893–896.
ICSE-2006-HalfondO #injection #sql- Preventing SQL injection attacks using AMNESIA (WGJH, AO), pp. 795–798.
ICSE-2006-Holmes #reuse #scalability- Unanticipated reuse of large-scale software features (RH), pp. 961–964.
ICSE-2006-JiamthubthugsinS #development- Portfolio management of software development projects using COCOMO II (WJ, DS), pp. 889–892.
ICSE-2006-KrugerMM #architecture #aspect-oriented #performance- Efficient exploration of service-oriented architectures using aspects (IHK, RM, MM), pp. 62–71.
ICSE-2006-NakamichiSSM #behaviour #detection #usability #web- Detecting low usability web pages using quantitative data of users’ behavior (NN, KS, MS, KiM), pp. 569–576.
ICSE-2006-RundleD #agile- Using return on investment to compare agile and plan-driven practices in undergraduate group projects (PJR, RGD), pp. 649–654.
ICSE-2006-Sindhgatta #information retrieval #source code- Using an information retrieval system to retrieve source code samples (RS), pp. 905–908.
ICSE-2006-YangBC #estimation #integration #off the shelf- Assessing COTS integration risk using cost estimation inputs (YY, BWB, BC), pp. 431–438.
ICSE-2006-ZouZ #automation #e-commerce #evolution #framework #generative #process- A framework for automatic generation of evolvable e-commerce workplaces using business processes (YZ, QZ), pp. 799–802.
SAC-2006-AlmeidaG #algorithm #database #incremental #nearest neighbour #network- Using Dijkstra’s algorithm to incrementally find the k-Nearest Neighbors in spatial network databases (VTdA, RHG), pp. 58–62.
SAC-2006-AltLM #linear #on the #probability #problem- On the numerical solution to linear problems using stochastic arithmetic (RA, JLL, SM), pp. 1635–1639.
SAC-2006-Bellur #consistency #object-oriented #on the #workflow- On using OO techniques to establish workflow conformance (UB), pp. 1447–1448.
SAC-2006-BernsteinK #ontology #retrieval #similarity #towards- Imprecise RDQL: towards generic retrieval in ontologies using similarity joins (AB, CK), pp. 1684–1689.
SAC-2006-BonnetEV #ad hoc #mobile #network- Quiescent consensus in mobile ad-hoc networks using eventually storage-free broadcasts (FB, PDE, EV), pp. 670–674.
SAC-2006-ChongL - An extension of dead end elimination for protein side-chain conformation using merge-decoupling (KFC, HWL), pp. 195–199.
SAC-2006-CraigL #classification #learning- Protein classification using transductive learning on phylogenetic profiles (RAC, LL), pp. 161–166.
SAC-2006-CutelloNP #algorithm #hybrid #optimisation- Real coded clonal selection algorithm for unconstrained global optimization using a hybrid inversely proportional hypermutation operator (VC, GN, MP), pp. 950–954.
SAC-2006-DinechinLM #verification- Assisted verification of elementary functions using Gappa (FdD, CQL, GM), pp. 1318–1322.
SAC-2006-GuoW #data mining #mining #on the #privacy- On the use of spectral filtering for privacy preserving data mining (SG, XW), pp. 622–626.
SAC-2006-JacquenetL #documentation- Using the structure of documents to improve the discovery of unexpected information (FJ, CL), pp. 1036–1042.
SAC-2006-KacemKJD #architecture #uml- Describing dynamic software architectures using an extended UML model (MHK, AHK, MJ, KD), pp. 1245–1249.
SAC-2006-KatsimpaPSTT #modelling #reverse engineering- Application modeling using reverse engineering techniques (TK, YP, ES, GT, AKT), pp. 1250–1255.
SAC-2006-KramerMH #case study #elicitation #mobile- Field study on methods for elicitation of preferences using a mobile digital assistant for a dynamic tour guide (RK, MM, KtH), pp. 997–1001.
SAC-2006-RuizCCP #algebra #analysis #concurrent #e-commerce #process #protocol #set- Analysis of the SET e-commerce protocol using a true concurrency process algebra (MCR, DC, FC, JJP), pp. 879–886.
SAC-2006-SauvagnatHB #question #retrieval #what #xml- XML retrieval: what about using contextual relevance? (KS, LH, MB), pp. 1114–1115.
SAC-2006-SharminAA #adaptation #middleware #resource management #self #usability- Ubicomp assistant: an omnipresent customizable service using MARKS (middleware adaptability for resource discovery, knowledge usability and self-healing) (MS, SA, SIA), pp. 1013–1017.
SAC-2006-SinghXMH #geometry #linear #locality #problem #programming- Solving the brachytherapy seed localization problem using geometric and linear programming techniques (VS, LM, JX, KRH), pp. 229–234.
SAC-2006-SoaresB #kernel #parametricity- Selecting parameters of SVM using meta-learning and kernel matrix-based meta-features (CS, PB), pp. 564–568.
SAC-2006-SzlavikTL #interactive #retrieval #summary #xml- Investigating the use of summarisation for interactive XML retrieval (ZS, AT, ML), pp. 1068–1072.
SAC-2006-WuBGRM #compilation #development- Separation of concerns in compiler development using aspect-orientation (XW, BRB, JGG, SR, MM), pp. 1585–1590.
SAC-2006-YuJV #kernel #privacy- Privacy-preserving SVM using nonlinear kernels on horizontally partitioned data (HY, XJ, JV), pp. 603–610.
SAC-2006-ZhouAL #database #image #interactive #retrieval #similarity- Dynamic interactive spatial similarity retrieval in iconic image databases using enhanced digraph (XMZ, CHA, TWL), pp. 46–51.
GPCE-2006-BromanNF #constraints #equation- Determining over- and under-constrained systems of equations using structural constraint delta (DB, KN, PF), pp. 151–160.
ASPLOS-2006-ChilimbiG #debugging #detection #identification #named- HeapMD: identifying heap-based bugs using anomaly detection (TMC, VG), pp. 219–228.
ASPLOS-2006-KgilDSBDMRF #3d #energy #multi #named #performance- PicoServer: using 3D stacking technology to enable a compact energy efficient chip multiprocessor (TK, SD, AGS, NLB, RGD, TNM, SKR, KF), pp. 117–128.
ASPLOS-2006-NarayanasamyPC #dependence #memory management- Recording shared memory dependencies using strata (SN, CP, BC), pp. 229–240.
ASPLOS-2006-TarditiPO #named #parallel- Accelerator: using data parallelism to program GPUs for general-purpose uses (DT, SP, JO), pp. 325–335.
CASE-2006-ChaoSZJM #analysis #automation #information management- Single-cell information extraction and viability analysis using automated microscopy (ShC, TJS, SZ, KAJI, DRM), pp. 33–38.
CASE-2006-GuoLX #modelling #on the #petri net- On Modeling a Soccer Robot System Using Petri Nets (BG, ZL, SX), pp. 460–465.
CASE-2006-HuSHL #modelling #probability- Vision-based Indoor Scene Cognition Using a Spatial Probabilistic Modeling Method (JSH, TMS, HCH, PCL), pp. 620–625.
CASE-2006-KwokHLF #image #multi #optimisation- Intensity-Preserving Contrast Enhancement for Gray-Level Images using Multi-objective Particle Swarm Optimization (NMK, QPH, DL, GF), pp. 21–26.
CASE-2006-KwokLWY #framework #platform #replication- Evolutionary Replication of Calligraphic Characters By A Robot Drawing Platform Using Experimentally Acquired Brush Footprint (KWK, KWL, SMW, YY), pp. 466–471.
CASE-2006-LamiriX - Operating Rooms Planning Using Lagrangian Relaxation Technique (ML, XX), pp. 176–181.
CASE-2006-LiLWC #automation #component #equation #generative #graph #linear- Automatic Generation of Component-level Dynamic Equations Using Extensible Element Linear Graph Method (YL, ZL, HW, YC), pp. 118–123.
CASE-2006-LopatinY #algorithm #approximate #polynomial- Using the forward search and the polynomial approximation algorithms in the exact algorithm for manipulator’s control in an unknown environment (PKL, ASY), pp. 206–211.
CASE-2006-RaghavanV #optimisation #parallel #product line #scheduling- Scheduling Parallel Batch Processors with Incompatible Job Families Using Ant Colony Optimization (NRSR, MV), pp. 507–512.
CASE-2006-SchiffG #automation #network- Automated Intruder Tracking using Particle Filtering and a Network of Binary Motion Sensors (JS, KG), pp. 580–587.
CASE-2006-ShaoHM #algorithm #analysis #component #linear #multi- Quantitative Analysis Using NIR by Building Principal Component- Multiple Linear Regression-BP Algorithm (YS, YH, JM), pp. 161–164.
CASE-2006-XuLT #visual notation- Visual Positioning Using Four-Point Planar Patterns (DX, YL, MT), pp. 600–605.
CASE-2006-XuWZZ #algorithm #automation #detection- An Automatic EEG Spike Detection Algorithm Using Morphological Filter (GX, JW, QZ, JZ), pp. 170–175.
CASE-2006-YoungSB #implementation #interactive- Implementing Bubblegrams: The Use of Haar-Like Features for Human-Robot Interaction (JEY, ES, JEB), pp. 298–303.
CC-2006-DiasR #assembly #declarative- Converting Intermediate Code to Assembly Code Using Declarative Machine Descriptions (JD, NR), pp. 217–231.
CC-2006-Necula #dependent type #low level #type system- Using Dependent Types to Port Type Systems to Low-Level Languages (GCN), p. 1.
CGO-2006-AgakovBCFFOTTW #machine learning #optimisation- Using Machine Learning to Focus Iterative Optimization (FVA, EVB, JC, BF, GF, MFPO, JT, MT, CKIW), pp. 295–305.
CGO-2006-NandaLLC #named #runtime- BIRD: Binary Interpretation using Runtime Disassembly (SN, WL, LCL, TcC), pp. 358–370.
DAC-2006-AksoyCFM #constraints #integer #linear #optimisation #programming #satisfiability #synthesis- Optimization of area under a delay constraint in digital filter synthesis using SAT-based integer linear programming (LA, EACdC, PFF, JM), pp. 669–674.
DAC-2006-BrahmbhattZWQ #adaptation #algorithm #encoding #hybrid #power management- Low-power bus encoding using an adaptive hybrid algorithm (ARB, JZ, QW, QQ), pp. 987–990.
DAC-2006-BrierM #architecture #c #c++ #modelling #verification- Use of C/C++ models for architecture exploration and verification of DSPs (DB, RSM), pp. 79–84.
DAC-2006-ChaoCWCW #analysis- Unknown-tolerance analysis and test-quality control for test response compaction using space compactors (MCTC, KTC, SW, STC, WW), pp. 1083–1088.
DAC-2006-FatemiNP #analysis #logic #statistics- Statistical logic cell delay analysis using a current-based model (HF, SN, MP), pp. 253–256.
DAC-2006-GoffioulVDDC #consistency #design #object-oriented- Ensuring consistency during front-end design using an object-oriented interfacing tool called NETLISP (MG, GV, JVD, BD, BC), pp. 889–892.
DAC-2006-GopalakrishnanLP #architecture #metric- Architecture-aware FPGA placement using metric embedding (PG, XL, LTP), pp. 460–465.
DAC-2006-GuthausSB #programming- Clock buffer and wire sizing using sequential programming (MRG, DS, RBB), pp. 1041–1046.
DAC-2006-SinghS #analysis #component #correlation #independence #parametricity #statistics- Statistical timing analysis with correlated non-gaussian parameters using independent component analysis (JS, SSS), pp. 155–160.
DAC-2006-TanimotoYNH #realtime- A real time budgeting method for module-level-pipelined bus based system using bus scenarios (TT, SY, AN, TH), pp. 37–42.
DAC-2006-WangGDK #design #optimisation- Design space exploration using time and resource duality with the ant colony optimization (GW, WG, BD, RK), pp. 451–454.
DAC-2006-YuhYC - Placement of digital microfluidic biochips using the t-tree formulation (PHY, CLY, YWC), pp. 931–934.
DAC-2006-ZhangMBC #detection #representation #satisfiability #scalability #simulation #symmetry- Symmetry detection for large Boolean functions using circuit representation, simulation, and satisfiability (JSZ, AM, RKB, MCJ), pp. 510–515.
DAC-2006-ZhaoPSYF #algorithm #linear #megamodelling #performance #programming- A fast on-chip decoupling capacitance budgeting algorithm using macromodeling and linear programming (MZ, RP, SS, SY, YF), pp. 217–222.
DATE-2006-AbdollahiP #analysis #diagrams #quantum #synthesis- Analysis and synthesis of quantum circuits by using quantum decision diagrams (AA, MP), pp. 317–322.
DATE-2006-AhmedM #design #performance #uml- Faster exploration of high level design alternatives using UML for better partitions (WA, DM), pp. 579–580.
DATE-2006-Al-JunaidK #modelling- HDL models of ferromagnetic core hysteresis using timeless discretisation of the magnetic slope (HAJ, TJK), pp. 644–645.
DATE-2006-AmelifardFP - Reducing the sub-threshold and gate-tunneling leakage of SRAM cells using Dual-Vt and Dual-Tox assignment (BA, FF, MP), pp. 995–1000.
DATE-2006-BanerjeeRMB #fine-grained #logic #power management #synthesis- Low power synthesis of dynamic logic circuits using fine-grained clock gating (NB, KR, HMM, SB), pp. 862–867.
DATE-2006-Beutel #framework #platform #prototype- Fast-prototyping using the BTnode platform (JB), pp. 977–982.