BibSLEIGH
BibSLEIGH corpus
BibSLEIGH tags
BibSLEIGH bundles
BibSLEIGH people
EDIT!
CC-BY
Open Knowledge
XHTML 1.0 W3C Rec
CSS 2.1 W3C CanRec
email twitter
using
Google using

Tag #using

13251 papers:

PADLPADL-2020-BrikX #pipes and filters
Diagnosing Data Pipeline Failures Using Action Languages: A Progress Report (AB, JX), pp. 73–81.
PADLPADL-2020-ChanC #distance #edit distance #flexibility #graph #programming #set
Flexible Graph Matching and Graph Edit Distance Using Answer Set Programming (SCC, JC), pp. 20–36.
PADLPADL-2020-ShakerinG #induction #mining
Whitebox Induction of Default Rules Using High-Utility Itemset Mining (FS, GG), pp. 168–176.
POPLPOPL-2020-AnSMS #relational #synthesis
Augmented example-based synthesis using relational perturbation properties (SA, RS, SM, RS), p. 24.
ASPLOSASPLOS-2020-HildebrandKTLA #automation #integer #linear #memory management #named #programming
AutoTM: Automatic Tensor Movement in Heterogeneous Memory Systems using Integer Linear Programming (MH, JK, ST, JLP, VA), pp. 875–890.
ASPLOSASPLOS-2020-LimN #hardware #optimisation #performance
Optimizing Nested Virtualization Performance Using Direct Virtual Hardware (JTL, JN), pp. 557–574.
ASPLOSASPLOS-2020-Mathur0 #linear
Atomicity Checking in Linear Time using Vector Clocks (UM, MV0), pp. 183–199.
ASPLOSASPLOS-2020-YangGLSPNBCHRKH #named #scheduling
Interstellar: Using Halide's Scheduling Language to Analyze DNN Accelerators (XY, MG, QL, JS, JP, AN, SB, KC, HH, PR, CK, MH), pp. 369–383.
CCCC-2020-FegadeW #analysis #data type #modelling #pointer #scalability #semantics
Scalable pointer analysis of data structures using semantic models (PF, CW), pp. 39–50.
CCCC-2020-PuriniBCB #analysis #image #pipes and filters #smt
Bitwidth customization in image processing pipelines using interval analysis and SMT solvers (SP, VB, ZC, UB), pp. 167–178.
CGOCGO-2020-JavanmardAKPCH #algorithm #compilation #divide and conquer #multi #parametricity #programming #recursion
Deriving parametric multi-way recursive divide-and-conquer dynamic programming algorithms using polyhedral compilers (MMJ, ZA, MK, LNP, RC, RJH), pp. 317–329.
CGOCGO-2020-ShobakiKM #approach #combinator #gpu #optimisation
Optimizing occupancy and ILP on the GPU using a combinatorial approach (GS, AK, SM), pp. 133–144.
EDMEDM-2019-ArthursSKP #modelling
Grades are not Normal: Improving Exam Score Models Using the Logit-Normal Distribution (NA, BS, SK, CP).
EDMEDM-2019-BanjadeR #logic #probability #student #tutorial
Assessing Student Response in Tutorial Dialogue Context using Probabilistic Soft Logic (RB, VR).
EDMEDM-2019-GruverMCPSP #modelling
Using Latent Variable Models to Observe Academic Pathways (NG, AM, BC, CP, MLS, AP).
EDMEDM-2019-GuoB #analysis #collaboration #detection
Collaboration Analysis Using Object Detection (ZG, RB).
EDMEDM-2019-HarrakBL #approach #categorisation #hybrid #student
Categorizing students' questions using an ensemble hybrid approach (FH, FB, VL).
EDMEDM-2019-HicksCL #analysis #process #student
Students' Use of Support Functions in DBAs: Analysis of NAEP Grade 8 Mathematics Process Data (JH, RC, M(L).
EDMEDM-2019-HowlinD #approach #behaviour #clustering #detection #fuzzy #student
Detecting Outlier Behaviors in Student Progress Trajectories Using a Repeated Fuzzy Clustering Approach (CPH, CDD).
EDMEDM-2019-HuangBS #collaboration #identification #machine learning
Identifying Collaborative Learning States Using Unsupervised Machine Learning on Eye-Tracking, Physiological and Motion Sensor Data (KH, TB, BS).
EDMEDM-2019-Ikeda #analysis #education #learning #quality
Learning Feature Analysis for Quality Improvement of Web-Based Teaching Materials Using Mouse Cursor Tracking (MI).
EDMEDM-2019-JayaramanGG #identification #machine learning #student
Supporting Minority Student Success by using Machine Learning to Identify At-Risk Students (JDJ, SG, JG).
EDMEDM-2019-JeonSBLR #online #process #student
Time-series Insights into the Process of Passing or Failing Online University Courses using Neural-Induced Interpretable Student States (BJ, ES, LB, JL, CPR).
EDMEDM-2019-MalekianBKBN #analysis #process #student
Characterising Students' Writing Processes Using Temporal Keystroke Analysis (DM, JB0, GEK, PGdB, SN).
EDMEDM-2019-NguyenWSM #component #comprehension #game studies #learning #modelling
Using Knowledge Component Modeling to Increase Domain Understanding in a Digital Learning Game (HN, YW, JCS, BMM).
EDMEDM-2019-RamirezYCRS #learning #student #towards
Toward Instrumenting Makerspaces: Using Motion Sensors to Capture Students' Affective States in Open-Ended Learning Environments (LR, WY, EC, IR, BS).
EDMEDM-2019-Reddick #algorithm #learning
Using a Glicko-based Algorithm to Measure In-Course Learning (RR).
EDMEDM-2019-Sher #learning #mobile
Anatomy of mobile learners: Using learning analytics to unveil learning in presence of mobile devices (VS).
EDMEDM-2019-Unal #composition #modelling #performance #student
Modeling Student Performance and Disengagement Using Decomposition of Response Time Data (DSU).
EDMEDM-2019-WampflerKSSG #mobile #predict #smarttech
Affective State Prediction in a Mobile Setting using Wearable Biometric Sensors and Stylus (RW, SK, BS, VRS, MG0).
EDMEDM-2019-WeitekampHMRK #learning #predict #student #towards
Toward Near Zero-Parameter Prediction Using a Computational Model of Student Learning (DWI, EH, CJM, NR, KRK).
EDMEDM-2019-YahyaMO #data mining #education #effectiveness #mining #novel #source code
A Novel Use of Educational Data Mining to Inform Effective Management of Academic Programs (AAY, FAM, AO).
EDMEDM-2019-Yeung #learning #named
Deep-IRT: Make Deep Learning Based Knowledge Tracing Explainable Using Item Response Theory (CKY).
EDMEDM-2019-ZaidiCDMBR #learning #modelling #student
Accurate Modelling of Language Learning Tasks and Students Using Representations of Grammatical Proficiency (AHZ, AC, CD, RM, PB, AR).
ICPCICPC-2019-AlrubayeM0 #detection #information retrieval #java #library #migration #on the
On the use of information retrieval to automate the detection of third-party Java library migration at the method level (HA, MWM, AO0), pp. 347–357.
ICPCICPC-2019-FontanaP #debugging #sequence #visualisation
Visualizing sequences of debugging sessions using swarm debugging (EAF, FP), pp. 139–143.
ICPCICPC-2019-FucciGNQL #comprehension #lightweight #replication
A replication study on code comprehension and expertise using lightweight biometric sensors (DF, DG, NN, LQ, FL), pp. 311–322.
ICPCICPC-2019-KuangG0M0ME #analysis #feedback #traceability
Using frugal user feedback with closeness analysis on code to improve IR-based traceability recovery (HK, HG, HH0, XM, JL0, PM, AE), pp. 369–379.
ICPCICPC-2019-MizouchiSII #adaptation #detection #named #online
PADLA: a dynamic log level adapter using online phase detection (TM, KS, TI, KI), pp. 135–138.
ICSMEICSME-2019-AungHS #interactive #traceability #visualisation
Interactive Traceability Links Visualization using Hierarchical Trace Map (TWWA, HH, YS), pp. 367–369.
ICSMEICSME-2019-PalacioMMBPS #identification #learning #network
Learning to Identify Security-Related Issues Using Convolutional Neural Networks (DNP, DM, KM, CBC, DP, CS), pp. 140–144.
ICSMEICSME-2019-ShimariI0I #debugging #execution #java
Near-Omniscient Debugging for Java Using Size-Limited Execution Trace (KS, TI, TK0, KI), pp. 398–401.
MSRMSR-2019-DamPN0GGKK #fault #lessons learnt #predict
Lessons learned from using a deep tree-based model for software defect prediction in practice (HKD, TP, SWN, TT0, JCG, AG, TK, CJK), pp. 46–57.
MSRMSR-2019-EfstathiouS #identifier #modelling #semantics #source code
Semantic source code models using identifier embeddings (VE, DS), pp. 29–33.
MSRMSR-2019-KiehnPC #classification #empirical #version control
Empirical study in using version histories for change risk classification (MK, XP, FC), pp. 58–62.
MSRMSR-2019-LiuLZFDQ #commit #generative #network
Generating commit messages from diffs using pointer-generator network (QL, ZL, HZ, HF, BD, YQ), pp. 299–309.
SANERSANER-2019-KirinukiTN #named #recommendation #testing #web
COLOR: Correct Locator Recommender for Broken Test Scripts using Various Clues in Web Application (HK, HT, KN), pp. 310–320.
SANERSANER-2019-MuscedereHAADG #analysis #detection #lightweight
Detecting Feature-Interaction Symptoms in Automotive Software using Lightweight Analysis (BJM, RH, DA, JMA, IJD, MWG), pp. 175–185.
SANERSANER-2019-SunBBS #documentation #mining #specification
Mining Specifications from Documentation using a Crowd (PS, CB, IB, KTS), pp. 275–286.
SANERSANER-2019-VerhaegheEASDDD #case study #industrial #migration #user interface
GUI Migration using MDE from GWT to Angular 6: An Industrial Case (BV, AE, NA, AS, LD, SD, MD), pp. 579–583.
SANERSANER-2019-ZhangLML #approach #effectiveness #fault #named #network
CNN-FL: An Effective Approach for Localizing Faults using Convolutional Neural Networks (ZZ0, YL, XM, PL), pp. 445–455.
SCAMSCAM-2019-HendersonPK #automation #fault #locality #markov #process
Evaluating Automatic Fault Localization Using Markov Processes (TADH, AP, YK), pp. 115–126.
SCAMSCAM-2019-MasudC #towards
Towards Constructing the SSA form using Reaching Definitions Over Dominance Frontiers (ANM, FC), pp. 23–33.
SCAMSCAM-2019-MondalRS #analysis #architecture #automation #case study #natural language
An Exploratory Study on Automatic Architectural Change Analysis Using Natural Language Processing Techniques (AKM, BR, KAS), pp. 62–73.
SCAMSCAM-2019-PerumaMDN #commit #refactoring
Contextualizing Rename Decisions using Refactorings and Commit Messages (AP, MWM, MJD, CDN), pp. 74–85.
FMFM-2019-BardBD #fault #smt
Formally Verified Roundoff Errors Using SMT-based Certificates and Subdivisions (JB, HB, ED), pp. 38–44.
FMFM-2019-GomesB19a #csp #model checking #named
Circus2CSP: A Tool for Model-Checking Circus Using FDR (AOG, AB), pp. 235–242.
FMFM-2019-SilveiraJVJ #formal method #implementation #specification
Formal Methods Applicability on Space Applications Specification and Implementation Using MORA-TSP (DS, AJ, MV, TJ), pp. 727–737.
IFM-2019-BenesBGPS #algebra #constraints #parametricity #synthesis
Accelerating Parameter Synthesis Using Semi-algebraic Constraints (NB, LB, MG, SP, DS), pp. 27–45.
IFM-2019-BruckerW #certification #ontology
Using Ontologies in Formal Developments Targeting Certification (ADB, BW), pp. 65–82.
IFM-2019-LutebergetCJ #automation #optimisation #satisfiability
Automated Drawing of Railway Schematics Using Numerical Optimization in SAT (BL, KC, CJ), pp. 341–359.
SEFMSEFM-2019-BeckertBGHLU #relational #slicing #verification
Using Relational Verification for Program Slicing (BB, TB, SG, MH, DL, MU), pp. 353–372.
SEFMSEFM-2019-FarrellBFDDYM #analysis #case study #verification
Using Threat Analysis Techniques to Guide Formal Verification: A Case Study of Cooperative Awareness Messages (MF, MB, MF0, LAD, CD, HY, CM), pp. 471–490.
ICFP-2019-HameerP #automation #case study #education #experience #functional #programming
Teaching the art of functional programming using automated grading (experience report) (AH, BP), p. 15.
AIIDEAIIDE-2019-BehroozRJ #matter #quality #word
Story Quality as a Matter of Perception: Using Word Embeddings to Estimate Cognitive Interest (MB, JR, AJ), pp. 3–9.
AIIDEAIIDE-2019-Sanghrajka #authoring #interactive #modelling
Interactive Narrative Authoring Using Cognitive Models in Narrative Planning (RS), pp. 224–226.
AIIDEAIIDE-2019-Shirvani #towards
Towards More Believable Characters Using Personality and Emotion (AS), pp. 230–232.
CHI-PLAYCHI-PLAY-2019-SchertlerKW #analysis #game studies #semantics
User Guided Movement Analysis in Games using Semantic Trajectories (RS, SK, GW), pp. 613–623.
CoGCoG-2019-Aitchison #experience
Optimal Use of Experience in First Person Shooter Environments (MA), pp. 1–4.
CoGCoG-2019-ChangAS #assurance #automation #named #quality #testing
Reveal-More: Amplifying Human Effort in Quality Assurance Testing Using Automated Exploration (KC, BA, AMS), pp. 1–8.
CoGCoG-2019-ChristiansenGW #bias #game studies
Resolving Simultaneity Bias: Using Features to Estimate Causal Effects in Competitive Games (AHC, EG, BSW), pp. 1–8.
CoGCoG-2019-Eidelberg0D #game studies #performance
Using Active Probing by a Game Management AI to Faster Classify Players (AE, CJ0, JD), pp. 1–8.
CoGCoG-2019-FendtA #education #game studies #learning #student
Using Learning Games to Teach Texas Civil War History to Public Middle School Students (MWF, EA), pp. 1–4.
CoGCoG-2019-IshiiITH #game studies #generative
A Fighting Game AI Using Highlight Cues for Generation of Entertaining Gameplay (RI, SI, RT, TH), pp. 1–6.
CoGCoG-2019-JooK #game studies #how #learning #question #visualisation
Visualization of Deep Reinforcement Learning using Grad-CAM: How AI Plays Atari Games? (HTJ, KJK), pp. 1–2.
CoGCoG-2019-JoppenSF #approximate #game studies
Ordinal Bucketing for Game Trees using Dynamic Quantile Approximation (TJ, TS, JF), pp. 1–8.
CoGCoG-2019-KatonaSHDBDW #learning #predict
Time to Die: Death Prediction in Dota 2 using Deep Learning (AK, RJS, VJH, SD, FB, AD, JAW), pp. 1–8.
CoGCoG-2019-KimLLHK #algorithm #automation #game studies #generative #graph
Automatic Generation of Game Content using a Graph-based Wave Function Collapse Algorithm (HK, SL, HL, TH, SK), pp. 1–4.
CoGCoG-2019-KusanoLPTH #game studies
Motion Gaming AI using Time Series Forecasting and Dynamic Difficulty Adjustment (TK, YL, PP, RT, TH), pp. 1–6.
CoGCoG-2019-Lanzi #complexity
Evaluating the Complexity of Players' Strategies using MCTS Iterations (PLL), pp. 1–8.
CoGCoG-2019-LipinskiSRA #generative #graph #incremental
Level Graph - Incremental Procedural Generation of Indoor Levels using Minimum Spanning Trees (BvRL, SS, JR, DA), pp. 1–7.
CoGCoG-2019-LiuR0S #heuristic #performance
Using Restart Heuristics to Improve Agent Performance in Angry Birds (TL, JR, PZ0, MS), pp. 1–8.
CoGCoG-2019-MassoudBBGP #behaviour #game studies #profiling
Eco-driving Profiling and Behavioral Shifts Using IoT Vehicular Sensors Combined with Serious Games (RM, FB, RB, ADG, SP), pp. 1–8.
CoGCoG-2019-NamI #game studies #generative #learning
Generation of Diverse Stages in Turn-Based Role-Playing Game using Reinforcement Learning (SN, KI), pp. 1–8.
CoGCoG-2019-NygrenD #case study #concept #game studies #self
Using Simple Games to Evaluate Self-Organization Concepts: a Whack-a-mole Case Study (NN, JD), pp. 1–8.
CoGCoG-2019-SarkarC #game studies
Inferring and Comparing Game Difficulty Curves using Player-vs-Level Match Data (AS, SC), pp. 1–4.
CoGCoG-2019-SpickCW #generative #learning
Procedural Generation using Spatial GANs for Region-Specific Learning of Elevation Data (RJS, PC, JAW), pp. 1–8.
FDGFDG-2019-GandhiH #generative #modelling #probability #visual notation
Guided open story generation using probabilistic graphical models (SG, BH), p. 7.
FDGFDG-2019-JemmaliKBARE #concept #design #game studies #learning #programming
Using game design mechanics as metaphors to enhance learning of introductory programming concepts (CJ, EK, SB, MVA, ER, MSEN), p. 5.
FDGFDG-2019-LiGH #game studies #generative #multi #video
End-to-end let's play commentary generation using multi-modal video representations (CL0, SG, BH), p. 7.
FDGFDG-2019-LiuLLMHSWCGLDT #automation #generative
Automatic generation of tower defense levels using PCG (SCL, CL, YL, HM, XH, YS, LW, ZC, XG, HL, YD, QT), p. 9.
FDGFDG-2019-LuoGR #network #parsing #video
Making CNNs for video parsing accessible: event extraction from DOTA2 gameplay video using transfer, zero-shot, and network pruning (ZL, MG, MR), p. 10.
FDGFDG-2019-MacCormickZ #development #game studies #named #programming #visual notation
SuBViS: the use of subjunctive visual programming environments for exploring alternatives in game development (DM, LZ), p. 11.
FDGFDG-2019-OuelletteBC #analysis #comprehension #design #education #game studies
Using applied cognitive load theory and difficulty analysis for educational game design for understanding and transference of literacy skills in adults (MO, LB, CC), p. 11.
FDGFDG-2019-SarkarC #array #rating
Using rating arrays to estimate score distributions for player-versus-level matchmaking (AS, SC), p. 8.
CoGVS-Games-2019-BakalosRDDPV #identification #network
Choreographic Pose Identification using Convolutional Neural Networks (NB, IR, ND, AD, EP, AV), pp. 1–7.
CoGVS-Games-2019-Gabriel #concept #design #game studies
We Make Games. Using Serious Game Design Concepts in Secondary School (SG), pp. 1–4.
CoGVS-Games-2019-HeinzS #design #evaluation #heuristic #simulation
Addressing Spatio-Temporal Geogame Relocation Issues Using Design Evaluation Heuristics and Agent-based Simulation (TH0, CS), pp. 1–4.
CoGVS-Games-2019-KharvariH #3d #architecture #artificial reality #game studies #visualisation
The Role of Serious Gaming using Virtual Reality Applications for 3D Architectural Visualization (FK, WH), pp. 1–2.
CoGVS-Games-2019-KicoL #comparison
Comparison of Trajectories and Quaternions of Folk Dance Movements Using Dynamic Time Warping (IK, FL), pp. 1–4.
CIKMCIKM-2019-ChristmannRASW #graph
Look before you Hop: Conversational Question Answering over Knowledge Graphs Using Judicious Context Expansion (PC, RSR, AA, JS, GW), pp. 729–738.
CIKMCIKM-2019-DuongRN #multi #sketching #streaming
Sketching Streaming Histogram Elements using Multiple Weighted Factors (QHD, HR, KN), pp. 19–28.
CIKMCIKM-2019-GongZ00XWH #community #detection #developer #learning #online
Detecting Malicious Accounts in Online Developer Communities Using Deep Learning (QG, JZ, YC0, QL0, YX, XW, PH), pp. 1251–1260.
CIKMCIKM-2019-HanMNKURNS #detection #image #learning
Learning More with Less: Conditional PGGAN-based Data Augmentation for Brain Metastases Detection Using Highly-Rough Annotation on MR Images (CH, KM, TN, YK, FU, LR, HN, SS), pp. 119–127.
CIKMCIKM-2019-IslamMR #graph #named #network #predict #social
NActSeer: Predicting User Actions in Social Network using Graph Augmented Neural Network (MRI, SM, NR), pp. 1793–1802.
CIKMCIKM-2019-JungLPP #framework #named
PRIVATA: Differentially Private Data Market Framework using Negotiation-based Pricing Mechanism (KJ, JL, KP, SP), pp. 2897–2900.
CIKMCIKM-2019-KangPKCC #modelling #recommendation #topic
Recommender System Using Sequential and Global Preference via Attention Mechanism and Topic Modeling (KK, JP, WK, HC, JC), pp. 1543–1552.
CIKMCIKM-2019-LinPLO #network #recognition
An Explainable Deep Fusion Network for Affect Recognition Using Physiological Signals (JL, SP, CSL, SLO), pp. 2069–2072.
CIKMCIKM-2019-LinWXLB #estimation #hybrid #network
Path Travel Time Estimation using Attribute-related Hybrid Trajectories Network (XL, YW, XX, ZL, SSB), pp. 1973–1982.
CIKMCIKM-2019-YangWCW #graph #network #predict
Using External Knowledge for Financial Event Prediction Based on Graph Neural Networks (YY, ZW, QC, LW), pp. 2161–2164.
CIKMCIKM-2019-YanLWLWZG #classification #image #multi #random
Imbalance Rectification in Deep Logistic Regression for Multi-Label Image Classification Using Random Noise Samples (WY, RL, JW, YL, JW, PZ, XG), pp. 1131–1140.
CIKMCIKM-2019-ZhangL
Interpretable MTL from Heterogeneous Domains using Boosted Tree (YLZ, LL), pp. 2053–2056.
ECIRECIR-p1-2019-BalikasDMAA #learning #semantics
Learning Lexical-Semantic Relations Using Intuitive Cognitive Links (GB, GD, RM, HA, MRA), pp. 3–18.
ECIRECIR-p1-2019-DavilaJSGZ #graph #image #named
Tangent-V: Math Formula Image Search Using Line-of-Sight Graphs (KD, RJ, SS, VG, RZ), pp. 681–695.
ECIRECIR-p1-2019-GlavasV #bidirectional #retrieval
Zero-Shot Language Transfer for Cross-Lingual Sentence Retrieval Using Bidirectional Attention Model (GG, IV), pp. 523–538.
ECIRECIR-p1-2019-JeawakJS #modelling
Embedding Geographic Locations for Modelling the Natural Environment Using Flickr Tags and Structured Data (SSJ, CBJ, SS), pp. 51–66.
ECIRECIR-p1-2019-NguyenV
End-to-End Neural Relation Extraction Using Deep Biaffine Attention (DQN, KV), pp. 729–738.
ECIRECIR-p1-2019-ZhongZ #similarity
Structural Similarity Search for Formulas Using Leaf-Root Paths in Operator Subtrees (WZ, RZ), pp. 116–129.
ECIRECIR-p2-2019-AkbariCBOSW #modelling #process
Modeling User Return Time Using Inhomogeneous Poisson Process (MA, AC, SB, ADO, MS, JW0), pp. 37–44.
ECIRECIR-p2-2019-Ghosh #information retrieval
Exploring Result Presentation in Conversational IR Using a Wizard-of-Oz Study (SG), pp. 327–331.
ECIRECIR-p2-2019-ImaniVMS19a #network #query #word
Deep Neural Networks for Query Expansion Using Word Embeddings (AI, AV, AM, AS), pp. 203–210.
ECIRECIR-p2-2019-PritsosRS #distance #identification #nearest neighbour #web
Open-Set Web Genre Identification Using Distributional Features and Nearest Neighbors Distance Ratio (DAP, AR0, ES), pp. 3–11.
ICMLICML-2019-ChangMG #metric #scheduling
Dynamic Measurement Scheduling for Event Forecasting using Deep RL (CHC, MM, AG), pp. 951–960.
ICMLICML-2019-DaoGERR #algorithm #learning #linear #performance
Learning Fast Algorithms for Linear Transforms Using Butterfly Factorizations (TD, AG, ME, AR, CR), pp. 1517–1527.
ICMLICML-2019-ElfekiCRE #learning #named #process
GDPP: Learning Diverse Generations using Determinantal Point Processes (ME, CC, MR, ME), pp. 1774–1783.
ICMLICML-2019-GordalizaBGL
Obtaining Fairness using Optimal Transport Theory (PG, EdB, FG, JML), pp. 2357–2365.
ICMLICML-2019-HendrycksLM #nondeterminism #robust
Using Pre-Training Can Improve Model Robustness and Uncertainty (DH, KL, MM), pp. 2712–2721.
ICMLICML-2019-HollandI #robust
Better generalization with less data using robust gradient descent (MJH, KI), pp. 2761–2770.
ICMLICML-2019-HuntBLH #policy
Composing Entropic Policies using Divergence Correction (JJH, AB, TPL, NH), pp. 2911–2920.
ICMLICML-2019-MendisRAC #estimation #named #network #performance #throughput
Ithemal: Accurate, Portable and Fast Basic Block Throughput Estimation using Deep Neural Networks (CM, AR, SPA, MC), pp. 4505–4515.
ICMLICML-2019-Ravi #modelling #performance
Efficient On-Device Models using Neural Projections (SR), pp. 5370–5379.
ICMLICML-2019-ThulasidasanBBC #learning
Combating Label Noise in Deep Learning using Abstention (ST, TB, JAB, GC, JMY), pp. 6234–6243.
ICMLICML-2019-TranKSK #named #network
DeepNose: Using artificial neural networks to represent the space of odorants (NBT, DRK, SS, AAK), pp. 6305–6314.
ICMLICML-2019-TrippeHAB #approximate #named #rank
LR-GLM: High-Dimensional Bayesian Inference Using Low-Rank Data Approximations (BLT, JHH, RA, TB), pp. 6315–6324.
ICMLICML-2019-WangDWK #learning #logic #named #reasoning #satisfiability
SATNet: Bridging deep learning and logical reasoning using a differentiable satisfiability solver (PWW, PLD, BW, JZK), pp. 6545–6554.
ICMLICML-2019-X #bound #named #policy #predict
POLITEX: Regret Bounds for Policy Iteration using Expert Prediction, pp. 3692–3702.
ICMLICML-2019-YangW #parametricity
Sample-Optimal Parametric Q-Learning Using Linearly Additive Features (LY, MW), pp. 6995–7004.
ICMLICML-2019-ZanetteB #bound #learning #problem
Tighter Problem-Dependent Regret Bounds in Reinforcement Learning without Domain Knowledge using Value Function Bounds (AZ, EB), pp. 7304–7312.
ICMLICML-2019-ZhaoHDSZ #network
Improving Neural Network Quantization without Retraining using Outlier Channel Splitting (RZ, YH, JD, CDS, ZZ), pp. 7543–7552.
KDDKDD-2019-ChenLPS #predict #twitter
Using Twitter to Predict When Vulnerabilities will be Exploited (HC0, RL, NP, VSS), pp. 3143–3152.
KDDKDD-2019-ChenSJ0Z0 #behaviour #effectiveness #performance #recommendation #reuse
Effective and Efficient Reuse of Past Travel Behavior for Route Recommendation (LC, SS, CSJ, BY0, ZZ, LS0), pp. 488–498.
KDDKDD-2019-DeshpandeS #adaptation #modelling #streaming
Streaming Adaptation of Deep Forecasting Models using Adaptive Recurrent Units (PD, SS), pp. 1560–1568.
KDDKDD-2019-GuoHJZW0 #behaviour #multi #network #predict #realtime
Buying or Browsing?: Predicting Real-time Purchasing Intent using Attention-based Deep Network with Multiple Behavior (LG, LH, RJ, BZ, XW, BC0), pp. 1984–1992.
KDDKDD-2019-KillianWSCDT #learning
Learning to Prescribe Interventions for Tuberculosis Patients Using Digital Adherence Data (JAK, BW, AS, VC, BD, MT), pp. 2430–2438.
KDDKDD-2019-KitadaIS #effectiveness #multi #network #predict
Conversion Prediction Using Multi-task Conditional Attention Networks to Support the Creation of Effective Ad Creatives (SK, HI, YS), pp. 2069–2077.
KDDKDD-2019-LeeIFSM #approach #data-driven #estimation #named
DeepRoof: A Data-driven Approach For Solar Potential Estimation Using Rooftop Imagery (SL, SI, MF, PJS, SM), pp. 2105–2113.
KDDKDD-2019-MarxV
Identifiability of Cause and Effect using Regularized Regression (AM, JV), pp. 852–861.
KDDKDD-2019-MonathZSMA #clustering
Gradient-based Hierarchical Clustering using Continuous Representations of Trees in Hyperbolic Space (NM, MZ, DS, AM, AA), pp. 714–722.
KDDKDD-2019-OhI #detection #learning
Sequential Anomaly Detection using Inverse Reinforcement Learning (MhO, GI), pp. 1480–1490.
KDDKDD-2019-PanLW00Z #learning #predict
Urban Traffic Prediction from Spatio-Temporal Data Using Deep Meta Learning (ZP, YL, WW, YY0, YZ0, JZ), pp. 1720–1730.
KDDKDD-2019-ParkKDZF #graph #network
Estimating Node Importance in Knowledge Graphs Using Graph Neural Networks (NP, AK, XLD, TZ, CF), pp. 596–606.
KDDKDD-2019-RawatLY #learning #multi
Naranjo Question Answering using End-to-End Multi-task Learning Model (BPSR, FL, HY0), pp. 2547–2555.
KDDKDD-2019-SchonD0 #fault #how #predict
The Error is the Feature: How to Forecast Lightning using a Model Prediction Error (CS, JD, RM0), pp. 2979–2988.
KDDKDD-2019-SchulzeMRLB #identification
Context by Proxy: Identifying Contextual Anomalies Using an Output Proxy (JPS, AM, ER, HAL, KB), pp. 2059–2068.
KDDKDD-2019-SheehanMTUJBLE #development #predict #wiki
Predicting Economic Development using Geolocated Wikipedia Articles (ES, CM, MT, BU, NJ, MB, DBL, SE), pp. 2698–2706.
KDDKDD-2019-ShenVAAHN #learning #monitoring #smarttech
Ambulatory Atrial Fibrillation Monitoring Using Wearable Photoplethysmography with Deep Learning (YS, MV, AA, AA, AYH, AYN), pp. 1909–1916.
KDDKDD-2019-SiciliaPG #named
DeepHoops: Evaluating Micro-Actions in Basketball Using Deep Feature Representations of Spatio-Temporal Data (AS, KP, KG), pp. 2096–2104.
KDDKDD-2019-TariqLSLJCW #detection #multi #probability
Detecting Anomalies in Space using Multivariate Convolutional LSTM with Mixtures of Probabilistic PCA (ST, SL, YS, MSL, OJ, DC, SSW), pp. 2123–2133.
KDDKDD-2019-WangZTWX #named #network
AlphaStock: A Buying-Winners-and-Selling-Losers Investment Strategy using Interpretable Deep Reinforcement Attention Networks (JW, YZ0, KT, JW, ZX), pp. 1900–1908.
KDDKDD-2019-WuYZXZPXA #graph #kernel #random #scalability
Scalable Global Alignment Graph Kernel Using Random Features: From Node Embedding to Graph Embedding (LW, IEHY, ZZ0, KX, LZ0, XP0, YX, CCA), pp. 1418–1428.
KDDKDD-2019-YabeTSSU #behaviour #predict #web
Predicting Evacuation Decisions using Representations of Individuals' Pre-Disaster Web Search Behavior (TY, KT, TS, YS, SVU), pp. 2707–2717.
KDDKDD-2019-ZhengXKWMAY #linear #predict
Glaucoma Progression Prediction Using Retinal Thickness via Latent Space Linear Regression (YZ, LX, TK, JW0, HM, RA, KY), pp. 2278–2286.
KDDKDD-2019-ZhouMGBB #comprehension #network
Understanding Consumer Journey using Attention based Recurrent Neural Networks (YZ, SM, JG, TB, NB), pp. 3102–3111.
BXBX-2019-Tullsen #encoding
ASN.1 Encoding Schemes Done Right Using CMPCT (MT), pp. 1–15.
MoDELSMoDELS-2019-BencomoP #learning #modelling #named #ram #runtime
RaM: Causally-Connected and Requirements-Aware Runtime Models using Bayesian Learning (NB, LHGP), pp. 216–226.
MoDELSMoDELS-2019-TorreSSBAG #case study #experience #modelling
Using Models to Enable Compliance Checking Against the GDPR: An Experience Report (DT, GS, MS, LCB, YA, PG), pp. 1–11.
OOPSLAOOPSLA-2019-ChenWFBD #learning #relational #verification
Relational verification using reinforcement learning (JC, JW, YF, OB, ID), p. 30.
OOPSLAOOPSLA-2019-GoelV #design #implementation #lazy evaluation #on the
On the design, implementation, and use of laziness in R (AG, JV), p. 27.
OOPSLAOOPSLA-2019-KrikavaMV #scala #scalability
Scala implicits are everywhere: a large-scale study of the use of Scala implicits in the wild (FK, HM, JV), p. 28.
PADLPADL-2019-AriasC #composition #evaluation #incremental #logic programming
Incremental Evaluation of Lattice-Based Aggregates in Logic Programming Using Modular TCLP (JA, MC), pp. 98–114.
PADLPADL-2019-KahramanE #personalisation #programming #set
Personalized Course Schedule Planning Using Answer Set Programming (MKK, EE0), pp. 37–45.
PLDIPLDI-2019-0001R #database #learning #modelling
Using active learning to synthesize models of applications that access databases (JS0, MCR), pp. 269–285.
PLDIPLDI-2019-DhulipalaBS #graph #streaming
Low-latency graph streaming using compressed purely-functional trees (LD, GEB, JS), pp. 918–934.
PLDIPLDI-2019-HeoRSN #difference #reasoning #source code
Continuously reasoning about programs using differential Bayesian inference (KH, MR, XS, MN), pp. 561–575.
PLDIPLDI-2019-LeZN #dynamic analysis #invariant #logic #named
SLING: using dynamic analysis to infer program invariants in separation logic (TCL, GZ, TN), pp. 788–801.
POPLPOPL-2019-BaeL #bound #logic #model checking
Bounded model checking of signal temporal logic properties using syntactic separation (KB, JL), p. 30.
POPLPOPL-2019-CastroHJNY #api #communication #distributed #parametricity #programming #static typing
Distributed programming using role-parametric session types in go: statically-typed endpoint APIs for dynamically-instantiated communication structures (DCP, RH, SSJ, NN, NY), p. 30.
POPLPOPL-2019-SkorstengaardDB #control flow #encapsulation #linear #named #stack
StkTokens: enforcing well-bracketed control flow and stack encapsulation using linear capabilities (LS, DD, LB), p. 28.
POPLPOPL-2019-SpathAB #analysis #automaton #data flow
Context-, flow-, and field-sensitive data-flow analysis using synchronized Pushdown systems (JS, KA0, EB), p. 29.
SASSAS-2019-DelmasM #abstract interpretation #analysis
Analysis of Software Patches Using Numerical Abstract Interpretation (DD, AM), pp. 225–246.
ASEASE-2019-Balasubramaniam #machine learning #representation #towards
Towards Comprehensible Representation of Controllers using Machine Learning (GB), pp. 1283–1285.
ASEASE-2019-ChenSHWL #behaviour #case study #experience #generative #testing
An Experience Report of Generating Load Tests Using Log-Recovered Workloads at Varying Granularities of User Behaviour (JC, WS, AEH, YW, JL), pp. 669–681.
ASEASE-2019-KimC #embedded #model checking
Model Checking Embedded Control Software using OS-in-the-Loop CEGAR (DK, YC), pp. 565–576.
ASEASE-2019-MehraSKP #artificial reality #named #towards
XRaSE: Towards Virtually Tangible Software using Augmented Reality (RM, VSS, VK, SP), pp. 1194–1197.
ASEASE-2019-NafiKRRS #api #clone detection #detection #documentation #named
CLCDSA: Cross Language Code Clone Detection using Syntactical Features and API Documentation (KWN, TSK, BR, CKR, KAS), pp. 1026–1037.
ASEASE-2019-Ramamoorthy #game studies #multi
User Preference Aware Multimedia Pricing Model using Game Theory and Prospect Theory for Wireless Communications (KMKR), pp. 1265–1267.
ASEASE-2019-Sharma #adaptation #automation #source code #synthesis
Automatically Repairing Binary Programs Using Adapter Synthesis (VS), pp. 1238–1241.
ASEASE-2019-ZhengFXS0HMLSC #automation #game studies #learning #named #online #testing
Wuji: Automatic Online Combat Game Testing Using Evolutionary Deep Reinforcement Learning (YZ, CF, XX, TS, LM0, JH, ZM, YL0, RS, YC), pp. 772–784.
ESEC-FSEESEC-FSE-2019-BarashFJRTZ #feature model #interactive #ml #requirements
Bridging the gap between ML solutions and their business requirements using feature interactions (GB, EF, IJ, OR, RTB, MZ), pp. 1048–1058.
ESEC-FSEESEC-FSE-2019-Cetin #developer #graph #identification #traceability
Identifying the most valuable developers using artifact traceability graphs (HAC), pp. 1196–1198.
ESEC-FSEESEC-FSE-2019-Correia #industrial #testing
An industrial application of test selection using test suite diagnosability (DC), pp. 1214–1216.
ESEC-FSEESEC-FSE-2019-CorreiaASN #multi #named #testing
MOTSD: a multi-objective test selection tool using test suite diagnosability (DC, RA, PS, JN), pp. 1070–1074.
ESEC-FSEESEC-FSE-2019-Denkers #case study #domain-specific language #industrial
A longitudinal field study on creation and use of domain-specific languages in industry (JD), pp. 1152–1155.
ESEC-FSEESEC-FSE-2019-FucciMM #api #documentation #identification #machine learning #on the
On using machine learning to identify knowledge in API reference documentation (DF, AM, WM), pp. 109–119.
ESEC-FSEESEC-FSE-2019-LiewCDS #constraints #float #fuzzing
Just fuzz it: solving floating-point constraints using coverage-guided fuzzing (DL, CC, AFD, JRS), pp. 521–532.
ESEC-FSEESEC-FSE-2019-NguyenSCMBL #as a service #multitenancy
Using microservices for non-intrusive customization of multi-tenant SaaS (PHN, HS, FC, RM, SB, EL), pp. 905–915.
ESEC-FSEESEC-FSE-2019-Radavelli #modelling #testing
Using software testing to repair models (MR), pp. 1253–1255.
ESEC-FSEESEC-FSE-2019-SangleM #on the #open source #python
On the use of lambda expressions in 760 open source Python projects (SS, SM), pp. 1232–1234.
ESEC-FSEESEC-FSE-2019-Sulun #graph #traceability
Suggesting reviewers of software artifacts using traceability graphs (ES), pp. 1250–1252.
ICSE-2019-FanLLWNZL #analysis #android #graph #learning
Graph embedding based familial analysis of Android malware using unsupervised learning (MF, XL, JL0, MW, CN, QZ, TL0), pp. 771–782.
ICSE-2019-HuangLKSHLW #data type
Distilling neural representations of data structure manipulation using fMRI and fNIRS (YH0, XL, RK, TS, XH, KL, WW), pp. 396–407.
ICSE-2019-KimFY #learning #testing
Guiding deep learning system testing using surprise adequacy (JK, RF, SY), pp. 1039–1049.
ICSE-2019-ZhangHMBLU #ltl #named #source code
AutoTap: synthesizing and repairing trigger-action programs using LTL properties (LZ, WH, JM, NB, SL, BU), pp. 281–291.
GPCEGPCE-2019-Dimovski #abstract domain #diagrams #static analysis
Lifted static analysis using a binary decision diagram abstract domain (ASD), pp. 102–114.
ASPLOSASPLOS-2019-KondguliH #hardware #named #performance #smt #thread
Bootstrapping: Using SMT Hardware to Improve Single-Thread Performance (SK, MH), pp. 687–700.
ASPLOSASPLOS-2019-RenZYLXQLW #co-evolution #design #framework #multi #named
ADMM-NN: An Algorithm-Hardware Co-Design Framework of DNNs Using Alternating Direction Methods of Multipliers (AR, TZ, SY, JL, WX, XQ, XL, YW), pp. 925–938.
ASPLOSASPLOS-2019-WuSCL #pointer
Protecting Page Tables from RowHammer Attacks using Monotonic Pointers in DRAM True-Cells (XCW, TS, FTC, YL), pp. 645–657.
CASECASE-2019-AndersonlPL #estimation #mobile #recursion
Mobile Robotic Radiation Surveying Using Recursive Bayesian Estimation (RBA, MP, SL), pp. 1187–1192.
CASECASE-2019-AshouriNSG #predict
Day-ahead Prediction of Building Occupancy using WiFi Signals (AA, GRN, ZS, HBG), pp. 1237–1242.
CASECASE-2019-AyoobiCVV #learning
Handling Unforeseen Failures Using Argumentation-Based Learning (HA, MC0, RV, BV), pp. 1699–1704.
CASECASE-2019-BiedigerMB #artificial reality
Investigating the survivability of drone swarms with flocking and swarming flight patterns using Virtual Reality (DB, AM, ATB), pp. 1718–1723.
CASECASE-2019-ChangLH #coordination #detection #network #realtime
Real-Time Object Coordinate Detection and Manipulator Control Using Rigidly Trained Convolutional Neural Networks (YMC, CHGL, YFH), pp. 1347–1352.
CASECASE-2019-ChengT #flexibility #tool support
Control of a mechatronics-assisted system for surgeries using flexible tools (LC, MT), pp. 1768–1773.
CASECASE-2019-ChenLVR #machine learning #process
Strip Snap Analytics in Cold Rolling Process Using Machine Learning (ZC, YL, AVM, FR), pp. 368–373.
CASECASE-2019-DasSAP #estimation #interactive #physics
Joint Torque Estimation using Base Force-Torque Sensor to Facilitate Physical Human-Robot Interaction (pHRI) (SKD, MNS, SA, DOP), pp. 1367–1372.
CASECASE-2019-DuHD #identification #physics
Model Identification and Physical Exercise Control using Nonlinear Heart Rate Model and Particle Filter (DD, ZH, YD), pp. 405–410.
CASECASE-2019-FarooquiF #learning #modelling #synthesis
Synthesis of Supervisors for Unknown Plant Models Using Active Learning (AF, MF), pp. 502–508.
CASECASE-2019-FujitaDKRKSHAFA #multi
Bin-picking Robot using a Multi-gripper Switching Strategy based on Object Sparseness (MF, YD, RK, GAGR, KK, KS, RH, RA, HF, SA, MH, AJC, AN, HO, TO), pp. 1540–1547.
CASECASE-2019-HagelskjaerSKB #constraints #estimation #industrial #performance #precise
Using spatial constraints for fast set-up of precise pose estimation in an industrial setting (FH, TRS, NK, AGB), pp. 1308–1314.
CASECASE-2019-HekmatnejadPF #scheduling #smt
Task Scheduling with Nonlinear Costs using SMT Solvers (MH, GP, GF), pp. 183–188.
CASECASE-2019-HoangPDZH #configuration management #multi
Reconfigurable Multi-UAV Formation Using Angle-Encoded PSO (VTH, MDP, THD, QZ, QPH), pp. 1670–1675.
CASECASE-2019-HongCL #learning #locality #mobile #realtime
Real-time Visual-Based Localization for Mobile Robot Using Structured-View Deep Learning (YFH, YMC, CHGL), pp. 1353–1358.
CASECASE-2019-HuML #petri net
Active Diagnosis of Petri Nets Using Q-Diagnoser (YH, ZM, ZL), pp. 203–208.
CASECASE-2019-ImamM #metric #modelling
Thermal Modeling of Indoor Spaces using Illumination Measurement as a Surrogate for Solar Heat Gain (MHTI, SM), pp. 1093–1098.
CASECASE-2019-JoshiLBB
Motion-planning Using RRTs for a Swarm of Robots Controlled by Global Inputs (PJ, JL, DB, ATB), pp. 1163–1168.
CASECASE-2019-KazmiNVRC #detection #learning #recognition
Vehicle tire (tyre) detection and text recognition using deep learning (WK, IN, GV, PR, AC), pp. 1074–1079.
CASECASE-2019-KumarAS #array #monitoring
Speed and Separation Monitoring using On-Robot Time-of-Flight Laser-ranging Sensor Arrays (SK, SA, FS), pp. 1684–1691.
CASECASE-2019-LaiL #detection #learning
Video-Based Windshield Rain Detection and Wiper Control Using Holistic-View Deep Learning (CCL, CHGL), pp. 1060–1065.
CASECASE-2019-LiGZYWSZ #detection #fault
Detection model of invisible weld defects using magneto-optical imaging induced by rotating magnetic field (YL, XG, YZ, DY, CW, YS, NZ), pp. 1–5.
CASECASE-2019-LiuZHZWW #estimation #learning #network
sEMG-Based Continuous Estimation of Knee Joint Angle Using Deep Learning with Convolutional Neural Network (GL, LZ, BH, TZ, ZW, PW), pp. 140–145.
CASECASE-2019-LuoLLWG #multi #optimisation #problem #scheduling
Green Job Shop Scheduling Problem with Machine at Different Speeds using a multi-objective grey wolf optimization algorithm* (YL, CL, XL, LW, LG0), pp. 573–578.
CASECASE-2019-MackensenKRS #automation #energy #smarttech
Energy autonomous automation of Smart Home applications using the example of a wireless Indoor Smart Gardening system (EM, JK, AR, AS), pp. 1087–1092.
CASECASE-2019-MerktIYV #towards
Towards Shared Autonomy Applications using Whole-body Control Formulations of Locomanipulation (WM, VI, YY, SV), pp. 1206–1211.
CASECASE-2019-NguyenLLGL #network #self
Visual-Guided Robot Arm Using Self-Supervised Deep Convolutional Neural Networks (VTN, CL, CHGL, SMG, JJJL), pp. 1415–1420.
CASECASE-2019-NiuLNLW #detection #fault #generative #named #network
DefectGAN: Weakly-Supervised Defect Detection using Generative Adversarial Network (SN, HL, TN, BL, XW), pp. 127–132.
CASECASE-2019-PangXHP #modelling #multi #optimisation
optimizing outpatient Department Staffing Level using Multi-Fidelity Models (BP, XX, BH, YP), pp. 715–720.
CASECASE-2019-PirehgalinTOV #analysis #automation #image #video #visual notation
Automatic Visual Leakage Inspection by Using Thermographic Video and Image Analysis (MFP, ET, MO, BVH), pp. 1282–1288.
CASECASE-2019-PitschlP #adaptation #maintenance #mobile #persistent #reasoning
Obstacle Persistent Adaptive Map Maintenance for Autonomous Mobile Robots using Spatio-temporal Reasoning (MLP, MWP), pp. 1023–1028.
CASECASE-2019-RobinsonSP #heuristic #visual notation
Bin-Picking using Model-Free Visual Heuristics and Grasp-Constrained Imaging (CR, MNS, DOP), pp. 1618–1624.
CASECASE-2019-RoselliHRFA #equivalence #on the
On the Use of Equivalence Classes for Optimal and Sub-Optimal Bin Covering (SFR, FH, SR, MF, ), pp. 1004–1009.
CASECASE-2019-RoyMN #adaptation #visual notation
Dynamic Eye-in-Hand Visual Servoing using Adaptive Backstepping with a Supervisory Feature Jacobian (PLGR, CJBM, JN), pp. 1131–1137.
CASECASE-2019-SchulerS #analysis #automation #modelling #process #towards
Spray pattern analysis using wet-mix concrete for model based process control towards automated construction (BS, OS), pp. 661–666.
CASECASE-2019-SharabianiBGND #algorithm #kernel #polynomial
A Computer-Aided System for Determining the Application Range of a Warfarin Clinical Dosing Algorithm Using Support Vector Machines with a Polynomial Kernel Function (AS, AB, WLG, RN, HD), pp. 418–423.
CASECASE-2019-SunLY #detection #network
Railway Joint Detection Using Deep Convolutional Neural Networks (YS, YL, CY), pp. 235–240.
CASECASE-2019-ThonnessenSFCK #quickcheck #safety #testing
Testing Safety PLCs Using QuickCheck (DT, NS, MF, KC, SK), pp. 1–6.
CASECASE-2019-WangJRH #image #realtime #scalability
Real-time control for large scale additive manufacturing using thermal images (FW, FJ, KR, NH), pp. 36–41.
CASECASE-2019-WannerS #flexibility #polynomial #programming
Tool-center-point control of a flexible link concrete pump with hydraulic limitations using quadratic programming (JW, OS), pp. 561–566.
CASECASE-2019-WarsewaBRST #design #distributed #scalability
Decentralized and Distributed Observer Design for Large-Scale Structures using Dynamic Condensation (AW, MB, PR, OS, CT), pp. 1256–1262.
CASECASE-2019-XiaoH0HZ #detection #fault
Surface Defect Detection using Hierarchical Features (LX, TH, BW0, YH, JZ), pp. 1592–1596.
CASECASE-2019-ZhangLWGG #fault #learning #network
Fault Diagnosis Using Unsupervised Transfer Learning Based on Adversarial Network (ZZ, XL, LW, LG0, YG), pp. 305–310.
CGOCGO-2019-KimK #generative #hardware
Translating CUDA to OpenCL for Hardware Generation using Neural Machine Translation (YK, HK), pp. 285–286.
CGOCGO-2019-KruppeOS0 #lightweight
Extending LLVM for Lightweight SPMD Vectorization: Using SIMD and Vector Instructions Easily from Any Language (RK, JO, LS, AK0), pp. 278–279.
CGOCGO-2019-SunBSB #graph #reasoning
Reasoning about the Node.js Event Loop using Async Graphs (HS, DB, FS, WB), pp. 61–72.
CAVCAV-2019-DavisHK #fault #formal method #multi #protocol #proving
When Human Intuition Fails: Using Formal Methods to Find an Error in the “Proof” of a Multi-agent Protocol (JAD, LRH, DBK), pp. 366–375.
CAVCAV-2019-ElfarWP #game studies #synthesis
Security-Aware Synthesis Using Delayed-Action Games (ME, YW0, MP), pp. 180–199.
CAVCAV-2019-LiuWL #source code #verification
Verifying Asynchronous Event-Driven Programs Using Partial Abstract Transformers (PL, TW, AL), pp. 386–404.
CAVCAV-2019-LiuZWYLLYZ #algorithm #hoare #logic #quantum #verification
Formal Verification of Quantum Algorithms Using Quantum Hoare Logic (JL, BZ, SW, SY, TL, YL, MY, NZ), pp. 187–207.
ICSTICST-2019-CoppikSS #fuzzing #memory management #named
MemFuzz: Using Memory Accesses to Guide Fuzzing (NC, OS, NS), pp. 48–58.
ICSTICST-2019-HellhakeSW #black box #data flow #distributed #integration #test coverage #testing
Using Data Flow-Based Coverage Criteria for Black-Box Integration Testing of Distributed Software Systems (DH, TS, SW0), pp. 420–429.
ICSTICST-2019-LeeHYKKY #integration #network #static analysis
Classifying False Positive Static Checker Alarms in Continuous Integration Using Convolutional Neural Networks (SL, SH, JY, TK, CJK, SY), pp. 391–401.
ICSTICST-2019-PatersonCAKFM #empirical #fault #predict #testing
An Empirical Study on the Use of Defect Prediction for Test Case Prioritization (DP, JC, RA, GMK, GF, PM), pp. 346–357.
ICSTICST-2019-Radavelli #modelling #testing
Using Testing to Repair Models (MR), pp. 489–491.
ICTSSICTSS-2019-BombardaBGRDL #consistency #generative #protocol #refinement #state machine #testing
Combining Model Refinement and Test Generation for Conformance Testing of the IEEE PHD Protocol Using Abstract State Machines (AB, SB, AG, MR, FD, YL), pp. 67–85.
ICTSSICTSS-2019-BozicW #testing
Testing Chatbots Using Metamorphic Relations (JB, FW), pp. 41–55.
ICTSSICTSS-2019-Huerta-GuevaraA19a #adaptation #named #performance #testing
DYNAMOJM: A JMeter Tool for Performance Testing Using Dynamic Workload Adaptation (OHG, VAR, LM0, AOPD), pp. 234–241.
TAPTAP-2019-CavalcantiBHL #csp #testing
Testing Robots Using CSP (AC, JB, RMH, RL), pp. 21–38.
VMCAIVMCAI-2019-AndreFMS #abstraction #algorithm #industrial #model checking #parametricity #verification
Verification of an Industrial Asynchronous Leader Election Algorithm Using Abstractions and Parametric Model Checking (ÉA, LF, JMM, RS), pp. 409–424.
VMCAIVMCAI-2019-BallabrigaFGLR #memory management #static analysis
Static Analysis of Binary Code with Memory Indirections Using Polyhedra (CB, JF, LG, GL, JR), pp. 114–135.
VMCAIVMCAI-2019-DeckerP #ltl #model checking #quantifier
Flat Model Checking for Counting LTL Using Quantifier-Free Presburger Arithmetic (ND, AP), pp. 513–534.
VMCAIVMCAI-2019-NguyenTC #automation #program repair #verification
Automatic Program Repair Using Formal Verification and Expression Templates (TTN, QTT, WNC), pp. 70–91.
ECSAECSA-2018-ChangS #as a service #mobile
Providing Context as a Service Using Service-Oriented Mobile Indie Fog and Opportunistic Computing (CC, SNS), pp. 219–235.
ECSAECSA-2018-SchneiderBK #information management #quality #trade-off
Using Informal Knowledge for Improving Software Quality Trade-Off Decisions (YS, AB, AK), pp. 265–283.
ICSAICSA-2018-Yasaweerasinghelage #architecture #data analysis #modelling #performance #predict #privacy #simulation
Predicting the Performance of Privacy-Preserving Data Analytics Using Architecture Modelling and Simulation (RY, MS, IW, HYP), pp. 166–175.
JCDLJCDL-2018-AlonsoKT #evolution #how #social
How it Happened: Discovering and Archiving the Evolution of a Story Using Social Signals (OA, VK, SET), pp. 193–202.
JCDLJCDL-2018-KobayashiS0 #distributed #recommendation #representation
Citation Recommendation Using Distributed Representation of Discourse Facets in Scientific Articles (YK, MS, YM0), pp. 243–251.
JCDLJCDL-2018-MaiGS #learning #performance #semantics
Using Deep Learning for Title-Based Semantic Subject Indexing to Reach Competitive Performance to Full-Text (FM, LG, AS), pp. 169–178.
JCDLJCDL-2018-PoziMBJK #editing
Preserving Author Editing History Using Blockchain Technology (MSMP, GM, AAB, AJ, YK), pp. 165–168.
EDMEDM-2018-BotelhoBOH #detection
Studying Affect Dynamics and Chronometry Using Sensor-Free Detectors (AFB, RSB, JO, NTH).
EDMEDM-2018-CookOKD #approach #authentication #education
An Open Vocabulary Approach for Estimating Teacher Use of Authentic Questions in Classroom Discourse (CC, AO, SK, SD).
EDMEDM-2018-EstebanGR #algorithm #approach #hybrid #multi #recommendation #search-based #student
A Hybrid Multi-Criteria approach using a Genetic Algorithm for Recommending Courses to University Students (AE, AZG, CR).
EDMEDM-2018-HalpernTWGPDG
Knowledge Tracing Using the Brain (DH, ST, HYW, CG, POP, LD, TMG).
EDMEDM-2018-HoernleGGPR #interactive #markov #modelling #simulation #student
Modeling the Effects of Students' Interactions with Immersive Simulations using Markov Switching Systems (NH, YG, BJG, PP, AR).
EDMEDM-2018-MittalNSDDK #knowledge base #multi
Using a Common Sense Knowledge Base to Auto Generate Multi-Dimensional Vocabulary Assessments (RSM, SN, MS, UD, PD, RK).
EDMEDM-2018-NandaHWDG #comprehension #modelling #online #topic
Understanding Learners' Opinion about Participation Certificates in Online Courses using Topic Modeling (GN, NMH, DRW, KAD, DG).
EDMEDM-2018-NguyenL #modelling #student
Using Student Logs to Build Bayesian Models of Student Knowledge and Skills (HN, CWL).
EDMEDM-2018-ReillyRS #collaboration #learning #multi
Exploring Collaboration Using Motion Sensors and Multi-Modal Learning Analytics (JMR, MR, BS).
EDMEDM-2018-SalesBPH #big data #testing
Using Big Data to Sharpen Design-Based Inference in A/B Tests (AS, AB, TP, NTH).
ICPCICPC-2018-OttAHBAFL #learning #network #programming language
Learning lexical features of programming languages from imagery using convolutional neural networks (JO, AA, PH, NB, HA, CF, EL), pp. 336–339.
ICPCICPC-2018-TakahashiSHS #case study #debugging #locality #smell
A preliminary study on using code smells to improve bug localization (AT, NSL, SH, MS), pp. 324–327.
ICSMEICSME-2018-Alsolai #maintenance #object-oriented #predict
Predicting Software Maintainability in Object-Oriented Systems Using Ensemble Techniques (HA), pp. 716–721.
ICSMEICSME-2018-FrickG0P #difference #generative
Generating Accurate and Compact Edit Scripts Using Tree Differencing (VF, TG, FB0, MP0), pp. 264–274.
ICSMEICSME-2018-IshioMSI #detection #distance #normalisation
Cloned Buggy Code Detection in Practice Using Normalized Compression Distance (TI, NM, KS, KI), pp. 591–594.
ICSMEICSME-2018-PalombaZL #automation #detection #information retrieval #smell
Automatic Test Smell Detection Using Information Retrieval Techniques (FP, AZ, ADL), pp. 311–322.
ICSMEICSME-2018-RahmanR #code search #crowdsourcing #data analysis #effectiveness #query
Effective Reformulation of Query for Code Search Using Crowdsourced Knowledge and Extra-Large Data Analytics (MMR0, CKR), pp. 473–484.
ICSMEICSME-2018-RahmanR18a #api #code search #crowdsourcing #data analysis #named #query
NLP2API: Query Reformulation for Code Search Using Crowdsourced Knowledge and Extra-Large Data Analytics (MMR0, CKR), p. 714.
ICSMEICSME-2018-SchlieSS #analysis #matlab #matrix #modelling #multi
Comparing Multiple MATLAB/Simulink Models Using Static Connectivity Matrix Analysis (AS, SS, IS), pp. 160–171.
MSRMSR-2018-AfzalG #case study #debugging #ide
A study on the use of IDE features for debugging (AA, CLG), pp. 114–117.
MSRMSR-2018-CiborowskaKD #behaviour #detection #developer #reuse #web
Detecting and characterizing developer behavior following opportunistic reuse of code snippets from the web (AC, NAK, KD), pp. 94–97.
MSRMSR-2018-LamotheS08 #android #api #automation #case study #experience #migration
Exploring the use of automated API migrating techniques in practice: an experience report on Android (ML, WS), pp. 503–514.
MSRMSR-2018-MoslehiAR #feature model
Feature location using crowd-based screencasts (PM, BA, JR), pp. 192–202.
MSRMSR-2018-RabbaniHSGM #fault #ide #interactive #replication #visual notation
Revisiting “programmers' build errors” in the visual studio context: a replication study using IDE interaction traces (NR, MSH, SS, KG, SM), pp. 98–101.
MSRMSR-2018-WilkieHKLNRPK #developer #ide #identification
Who's this?: developer identification using IDE event data (JW, ZAH, AK, JL, GN, CR, MP, JK), pp. 90–93.
SANERSANER-2018-KatzRS #decompiler #network
Using recurrent neural networks for decompilation (DSK, JR, ES), pp. 346–356.
SANERSANER-2018-LeemansAB18a #analysis #mining #process #scalability #statechart
The Statechart Workbench: Enabling scalable software event log analysis using process mining (ML, WMPvdA, MGJvdB), pp. 502–506.
SANERSANER-2018-NucciPTSL #detection #machine learning #question #smell
Detecting code smells using machine learning techniques: Are we there yet? (DDN, FP, DAT, AS, ADL), pp. 612–621.
SANERSANER-2018-SantosCPHA #detection #fault #modelling #syntax
Syntax and sensibility: Using language models to detect and correct syntax errors (EAS, JCC, DP, AH, JNA), pp. 311–322.
SANERSANER-2018-SotoG #debugging #predict #probability
Using a probabilistic model to predict bug fixes (MS, CLG), pp. 221–231.
SCAMSCAM-2018-IslamIMRRS #detection #research #transitive
[Research Paper] Detecting Evolutionary Coupling Using Transitive Association Rules (MAI, MMI, MM, BR, CKR, KAS), pp. 113–122.
SCAMSCAM-2018-JiangCZPP0 #code search #research #semantics
[Research Paper] Semantics-Based Code Search Using Input/Output Examples (RJ, ZC, ZZ, YP0, MP, TZ0), pp. 92–102.
SCAMSCAM-2018-MostaeenSRRS #automation #design #machine learning #research #tool support #towards #validation
[Research Paper] On the Use of Machine Learning Techniques Towards the Design of Cloud Based Automatic Code Clone Validation Tools (GM, JS, BR, CKR, KAS), pp. 155–164.
SCAMSCAM-2018-MuylaertR #commit #research #slicing
[Research Paper] Untangling Composite Commits Using Program Slicing (WM, CDR), pp. 193–202.
SCAMSCAM-2018-NafiRRS #api #detection #documentation #research #similarity
[Research Paper] CroLSim: Cross Language Software Similarity Detector Using API Documentation (KWN, BR, CKR, KAS), pp. 139–148.
SCAMSCAM-2018-PaceTG #architecture #predict #research #smell #towards
[Research Paper] Towards Anticipation of Architectural Smells Using Link Prediction Techniques (JADP, AT, DG), pp. 62–71.
CIAACIAA-2018-NozakiHYS #automaton #finite
Enumeration of Cryptarithms Using Deterministic Finite Automata (YN, DH, RY, AS), pp. 286–298.
FMFM-2018-0001BFLMR #automaton #energy #nondeterminism #robust #synthesis
Optimal and Robust Controller Synthesis - Using Energy Timed Automata with Uncertainty (GB0, PB, UF, KGL, NM, PAR), pp. 203–221.
FMFM-2018-AkazakiLYDH #cyber-physical #learning
Falsification of Cyber-Physical Systems Using Deep Reinforcement Learning (TA, SL, YY, YD, JH), pp. 456–465.
FMFM-2018-Boralv #automation #design #proving
Interlocking Design Automation Using Prover Trident (AB), pp. 653–656.
FMFM-2018-GeislerH #development #distributed #model checking
Stepwise Development and Model Checking of a Distributed Interlocking System - Using RAISE (SG, AEH), pp. 277–293.
IFM-2018-DoughertyGR #analysis #protocol #security #smt
Security Protocol Analysis in Context: Computing Minimal Executions Using SMT and CPSA (DJD, JDG, JDR), pp. 130–150.
IFM-2018-GlabbeekHW
Analysing AWN-Specifications Using mCRL2 (Extended Abstract) (RJvG, PH, DvdW), pp. 398–418.
IFM-2018-KangMH #constraints #probability #verification
Probabilistic Verification of Timing Constraints in Automotive Systems Using UPPAAL-SMC (EYK0, DM, LH), pp. 236–254.
IFM-2018-KornerLM #model checking #state of the art
State-of-the-Art Model Checking for B and Event-B Using ProB and LTSmin (PK, ML, JM), pp. 275–295.
IFM-2018-SchmidtKL #formal method #generative #modelling #synthesis
Repair and Generation of Formal Models Using Synthesis (JS, SK, ML), pp. 346–366.
SEFMSEFM-2018-BabaeeGF #framework #learning #predict #runtime #statistics #verification
Prevent : A Predictive Run-Time Verification Framework Using Statistical Learning (RB, AG, SF), pp. 205–220.
SEFMSEFM-2018-DinSC #exception #verification
Program Verification for Exception Handling on Active Objects Using Futures (CCD, RS, TCC), pp. 73–88.
SEFMSEFM-2018-DuboisGPC #interactive #protocol #proving #theorem proving
Exploring Properties of a Telecommunication Protocol with Message Delay Using Interactive Theorem Prover (CD, OG, JP, MC), pp. 239–253.
SEFMSEFM-2018-GolraDSSG #requirements #specification
Bridging the Gap Between Informal Requirements and Formal Specifications Using Model Federation (FRG, FD, JS, IS, SG), pp. 54–69.
ICFP-2018-AlmeidaCM0P #assessment #automation #case study #education #experience #functional #game studies #how
Teaching how to program using automated assessment and functional glossy games (experience report) (JBA, AC, NM, HP0, JP), p. 17.
ICFP-2018-StampoulisC #functional #higher-order #learning #logic programming #prolog #prototype
Prototyping a functional language using higher-order logic programming: a functional pearl on learning the ways of λProlog/Makam (AS, AC), p. 30.
AIIDEAIIDE-2018-MathewsonM #game studies #named
Improbotics: Exploring the Imitation Game Using Machine Intelligence in Improvised Theatre (KWM, PM), pp. 59–66.
CHI-PLAYCHI-PLAY-2018-ByrneMM #case study #experience #game studies
AR Fighter: Using HMDs to create Vertigo Play Experiences (RB, JM, F'M), pp. 45–57.
CHI-PLAYCHI-PLAY-2018-FrommelFR0 #self
Emotion-based Dynamic Difficulty Adjustment Using Parameterized Difficulty and Self-Reports of Emotion (JF, FF, KR, MW0), pp. 163–171.
CHI-PLAYCHI-PLAY-2018-VellaPKPMJ #case study #game studies
Using Applied Games to Engage mHealth Users: A Case Study of MindMax (KV, NP, MK, BP, JM, DJ0), pp. 511–522.
CoGCIG-2018-GlavinM #experience #learning
Skilled Experience Catalogue: A Skill-Balancing Mechanism for Non-Player Characters using Reinforcement Learning (FGG, MGM), pp. 1–8.
CoGCIG-2018-Guerrero-Romero #algorithm #design #game studies #testing
Using a Team of General AI Algorithms to Assist Game Design and Testing (CGR, SML, DPL), pp. 1–8.
CoGCIG-2018-KaravolosLY #automation #design
Using a Surrogate Model of Gameplay for Automated Level Design (DK, AL, GNY), pp. 1–8.
CoGCIG-2018-KosmidesDAKOL #game studies #named
InLife: Combining Real Life with Serious Games using IoT (PK, KPD, EFA, NK, YO, VDL), pp. 1–7.
CoGCIG-2018-StreckW #animation #markov
Using Discrete Time Markov Chains for Control of Idle Character Animation (AS, TW), pp. 1–4.
CoGCIG-2018-TziortziotiMMVC #education #game studies #internet #process
Scenarios for Educational and Game Activities using Internet of Things Data (CT, IM, GM, AV, IC), pp. 1–8.
FDGFDG-2018-PlumbKS #clustering #game studies #hybrid #multi #network #online
Hybrid network clusters using common gameplay for massively multiplayer online games (JNP, SKK, RS), p. 10.
FDGFDG-2018-SiljebratAP #towards
Towards human-like artificial intelligence using StarCraft 2 (HS, CA, AP), p. 4.
FDGFDG-2018-SmithPV #generative #graph #programming #set
Graph-based generation of action-adventure dungeon levels using answer set programming (TS0, JAP, AV), p. 10.
CoGVS-Games-2018-BardisKSVD #evolution #image
Image Warping Using WebGL for a Smart Avatar Animating Body Weight Evolution (GB, YK, NS, AV, ND), pp. 1–4.
CoGVS-Games-2018-LewisAMCKBDM #game studies #mobile
Balance Trucks: Using Crowd-Sourced Data to Procedurally-Generate Gameplay within Mobile Games (MRL, SA, LM, SC, LCK, AB, SD, AM), pp. 1–4.
CoGVS-Games-2018-Lim #case study #protocol
Using Think-Aloud Protocol in Looking at the Framing of One's Character with a Case Study on Terraria (JSL), pp. 1–4.
CoGVS-Games-2018-MunozVCMH #artificial reality #coordination #diagrams
Dynamic Systems Theory in Human Movement Exploring Coordination Patterns by Angle-Angle Diagrams Using Kinect (JEMC, JFV, SC, MFM, ÓAH), pp. 1–4.
CoGVS-Games-2018-OberdorferL #game studies
Effectivity of Affine Transformation Knowledge Training Using Game Mechanics (SO, MEL), pp. 1–8.
CoGVS-Games-2018-OberdorferL18a #encoding #game studies
Gamified Knowledge Encoding: Knowledge Training Using Game Mechanics (SO, MEL), pp. 1–2.
CoGVS-Games-2018-OberdorferL18b #effectiveness #game studies
Effective Orbital Mechanics Knowledge Training Using Game Mechanics (SO, MEL), pp. 1–8.
CoGVS-Games-2018-OhmotoTN #comprehension
Improving Context Understanding Using Avatar's Affective Expressions Reflecting Operator's Mental States (YO, ST, TN), pp. 1–4.
CoGVS-Games-2018-RallisLGVDD #analysis #artificial reality #game studies #learning #visualisation
An Embodied Learning Game Using Kinect and Labanotation for Analysis and Visualization of Dance Kinesiology (IR, AL, IG, AV, ND, AD), pp. 1–8.
CoGVS-Games-2018-Ramic-Brkic #education #game studies
Enhancing Progressive Education through the Use of Serious Games (BRB), pp. 1–4.
CoGVS-Games-2018-WuGHL #3d #data fusion #multi #robust #towards
Towards Robust 3D Skeleton Tracking Using Data Fusion from Multiple Depth Sensors (YW, LG, SH, RWL), pp. 1–4.
CIKMCIKM-2018-AdigaCKMRRS #modelling #network #probability #query
Inferring Probabilistic Contagion Models Over Networks Using Active Queries (AA, VCM, CJK, MVM, SSR, DJR, RES), pp. 377–386.
CIKMCIKM-2018-ANR #algorithm #generative #higher-order #scalability
A Scalable Algorithm for Higher-order Features Generation using MinHash (PA, NN, RR), pp. 1213–1222.
CIKMCIKM-2018-CirsteaMMG0 #correlation #multi #network
Correlated Time Series Forecasting using Multi-Task Deep Neural Networks (RGC, DVM, GMM, CG, BY0), pp. 1527–1530.
CIKMCIKM-2018-DeutchGM #detection #privacy
Preserving Privacy of Fraud Detection Rule Sharing Using Intel's SGX (DD, YG, TM), pp. 1935–1938.
CIKMCIKM-2018-GeDJNW #personalisation
Personalizing Search Results Using Hierarchical RNN with Query-aware Attention (SG, ZD, ZJ, JYN, JRW), pp. 347–356.
CIKMCIKM-2018-GeZZCLYHLSLYHZZ #behaviour #image #matter #modelling #visual notation
Image Matters: Visually Modeling User Behaviors Using Advanced Model Server (TG, LZ, GZ, KC, SL, HY, ZH, BL, PS, HL, PY, SH, ZZ, XZ, YZ, KG), pp. 2087–2095.
CIKMCIKM-2018-HashemiWKZC #query #user satisfaction
Measuring User Satisfaction on Smart Speaker Intelligent Assistants Using Intent Sensitive Query Embeddings (SHH, KW, AEK, IZ, PAC), pp. 1183–1192.
CIKMCIKM-2018-Kieu0GJ
Distinguishing Trajectories from Different Drivers using Incompletely Labeled Trajectories (TK, BY0, CG, CSJ), pp. 863–872.
CIKMCIKM-2018-KweeCPL #lifecycle #mining #named #visualisation
Traffic-Cascade: Mining and Visualizing Lifecycles of Traffic Congestion Events Using Public Bus Trajectories (ATK, MFC, PKP, EPL), pp. 1955–1958.
CIKMCIKM-2018-LinmansVK #detection #robust #scalability #semantics #web
Improved and Robust Controversy Detection in General Web Pages Using Semantic Approaches under Large Scale Conditions (JL, BvdV, EK), pp. 1647–1650.
CIKMCIKM-2018-PandeyKS #learning #recommendation
Recommending Serendipitous Items using Transfer Learning (GP0, DK, AS), pp. 1771–1774.
CIKMCIKM-2018-PatidarAVS #automation #modelling
Automatic Conversational Helpdesk Solution using Seq2Seq and Slot-filling Models (MP, PA, LV, GMS), pp. 1967–1975.
CIKMCIKM-2018-PrasojoKN #fine-grained #information management #named #semantics
StuffIE: Semantic Tagging of Unlabeled Facets Using Fine-Grained Information Extraction (REP, MK, WN), pp. 467–476.
CIKMCIKM-2018-RoleMN #algorithm #clustering #evaluation #word
Unsupervised Evaluation of Text Co-clustering Algorithms Using Neural Word Embeddings (FR, SM, MN), pp. 1827–1830.
CIKMCIKM-2018-RoyGBBM #how #information retrieval #normalisation #performance #word
Using Word Embeddings for Information Retrieval: How Collection and Term Normalization Choices Affect Performance (DR, DG, SB, SB, MM), pp. 1835–1838.
CIKMCIKM-2018-ShangSSLGKLY0
Investigating Rumor News Using Agreement-Aware Search (JS, JS, TS, XL, AG, FK, ÁDL, CY0, JH0), pp. 2117–2125.
CIKMCIKM-2018-ShenYZPZ #parallel
Parallel Hashing Using Representative Points in Hyperoctants (CS, MY, CZ, YP, GZ), pp. 813–822.
CIKMCIKM-2018-SyedRN #named #rdf #validation
FactCheck: Validating RDF Triples Using Textual Evidence (ZHS, MR, ACNN), pp. 1599–1602.
CIKMCIKM-2018-Voorhees #on the #reuse
On Building Fair and Reusable Test Collections using Bandit Techniques (EMV), pp. 407–416.
CIKMCIKM-2018-ZhangNCC #database #parallel #probability #scalability
Scalable Entity Resolution Using Probabilistic Signatures on Parallel Databases (YZ, KSN, TC, PC), pp. 2213–2221.
ECIRECIR-2018-BalikasLRA #distance #documentation #retrieval
Cross-Lingual Document Retrieval Using Regularized Wasserstein Distance (GB, CL, IR, MRA), pp. 398–410.
ECIRECIR-2018-DeySK #detection #topic #twitter
Topical Stance Detection for Twitter: A Two-Phase LSTM Model Using Attention (KD, RS, SK), pp. 529–536.
ECIRECIR-2018-Jalan0V #classification #learning
Medical Forum Question Classification Using Deep Learning (RSJ, MG0, VV), pp. 45–58.
ECIRECIR-2018-McDonaldMO18a #overview #predict #towards
Towards Maximising Openness in Digital Sensitivity Review Using Reviewing Time Predictions (GM, CM, IO), pp. 699–706.
ECIRECIR-2018-SinghM #recommendation #symmetry
Benefits of Using Symmetric Loss in Recommender Systems (GS, SM), pp. 345–356.
ECIRECIR-2018-Zhang0LZ #analysis #matrix #representation #sentiment #twitter
Unsupervised Sentiment Analysis of Twitter Posts Using Density Matrix Representation (YZ, DS0, XL, PZ0), pp. 316–329.
ICMLICML-2018-0001JCCJ #robust
Reinforcing Adversarial Robustness using Model Confidence Induced by Adversarial Training (XW0, UJ, JC, LC, SJ), pp. 5330–5338.
ICMLICML-2018-AghazadehSLDSB #feature model #named #scalability #sketching
MISSION: Ultra Large-Scale Feature Selection using Count-Sketches (AA, RS, DL, GD, AS, RGB), pp. 80–88.
ICMLICML-2018-ArenzZN #performance #policy
Efficient Gradient-Free Variational Inference using Policy Search (OA, MZ, GN), pp. 234–243.
ICMLICML-2018-BajajGHHL #clustering #named
SMAC: Simultaneous Mapping and Clustering Using Spectral Decompositions (CB, TG, ZH, QH, ZL), pp. 334–343.
ICMLICML-2018-BangS #generative #network
Improved Training of Generative Adversarial Networks using Representative Features (DB, HS), pp. 442–451.
ICMLICML-2018-BansalAB #agile #design
Using Inherent Structures to design Lean 2-layer RBMs (AB, AA, CB), pp. 452–460.
ICMLICML-2018-BarretoBQSSHMZM #learning #policy
Transfer in Deep Reinforcement Learning Using Successor Features and Generalised Policy Improvement (AB, DB, JQ, TS, DS, MH, DJM, AZ, RM), pp. 510–519.
ICMLICML-2018-ChenLW #learning #scalability
Scalable Bilinear Learning Using State and Action Features (YC, LL0, MW), pp. 833–842.
ICMLICML-2018-DaiZGW #network
Compressing Neural Networks using the Variational Information Bottleneck (BD, CZ, BG, DPW), pp. 1143–1152.
ICMLICML-2018-DharGE #generative #modelling
Modeling Sparse Deviations for Compressed Sensing using Generative Models (MD, AG, SE), pp. 1222–1231.
ICMLICML-2018-FengWCS #learning #multi #network #parametricity
Nonparametric variable importance using an augmented neural network with multi-task learning (JF, BDW, MC, NS), pp. 1495–1504.
ICMLICML-2018-GaninKBEV #image #learning #source code
Synthesizing Programs for Images using Reinforced Adversarial Learning (YG, TK, IB, SMAE, OV), pp. 1652–1661.
ICMLICML-2018-HuangA0S #learning
Learning Deep ResNet Blocks Sequentially using Boosting Theory (FH, JTA, JL0, RES), pp. 2063–2072.
ICMLICML-2018-HuWL #analysis #probability #reduction #source code
Dissipativity Theory for Accelerating Stochastic Variance Reduction: A Unified Analysis of SVRG and Katyusha Using Semidefinite Programs (BH, SW, LL), pp. 2043–2052.
ICMLICML-2018-IcarteKVM #composition #learning #specification
Using Reward Machines for High-Level Task Specification and Decomposition in Reinforcement Learning (RTI, TQK, RAV, SAM), pp. 2112–2121.
ICMLICML-2018-JohnH #fourier #process #scalability
Large-Scale Cox Process Inference using Variational Fourier Features (STJ, JH), pp. 2367–2375.
ICMLICML-2018-KaiserBRVPUS #modelling #performance #sequence
Fast Decoding in Sequence Models Using Discrete Latent Variables (LK, SB, AR, AV, NP, JU, NS), pp. 2395–2404.
ICMLICML-2018-KalimerisSSW #learning
Learning Diffusion using Hyperparameters (DK, YS, KS, UW), pp. 2425–2433.
ICMLICML-2018-KeivaniS #nearest neighbour
Improved nearest neighbor search using auxiliary information and priority functions (OK, KS), pp. 2578–2586.
ICMLICML-2018-KuleshovFE #learning #nondeterminism
Accurate Uncertainties for Deep Learning Using Calibrated Regression (VK, NF, SE), pp. 2801–2809.
ICMLICML-2018-RaileanuDSF #learning #modelling #multi
Modeling Others using Oneself in Multi-Agent Reinforcement Learning (RR, ED, AS, RF), pp. 4254–4263.
ICMLICML-2018-SharmaNK #clique #problem #random
Solving Partial Assignment Problems using Random Clique Complexes (CS, DN, MK), pp. 4593–4602.
ICMLICML-2018-Sinha #clustering #matrix #random
K-means clustering using random matrix sparsification (KS), pp. 4691–4699.
ICMLICML-2018-WeissGY #automaton #network #query
Extracting Automata from Recurrent Neural Networks Using Queries and Counterexamples (GW, YG, EY), pp. 5244–5253.
ICMLICML-2018-YoonJS #generative #named
GAIN: Missing Data Imputation using Generative Adversarial Nets (JY, JJ, MvdS), pp. 5675–5684.
ICMLICML-2018-YoonJS18a #dataset #generative #modelling #multi #named #network #predict
RadialGAN: Leveraging multiple datasets to improve target-specific predictive models using Generative Adversarial Networks (JY, JJ, MvdS), pp. 5685–5693.
ICPRICPR-2018-AbdeldayemB #automation #detection
Automatically Detecting Arrhythmia-related Irregular Patterns using the Temporal and Spectro-Temporal Textures of ECG Signals (SSA, TB), pp. 2301–2307.
ICPRICPR-2018-AfonsoPSP #classification #learning
Improving Optimum- Path Forest Classification Using Unsupervised Manifold Learning (LCSA, DCGP, ANdS, JPP), pp. 560–565.
ICPRICPR-2018-AkdemirBS #locality #realtime
Real-time Vehicle Localization and Tracking Using Monocular Panomorph Panoramic Vision (BA, ANB, LMS), pp. 2350–2355.
ICPRICPR-2018-AzzopardiFGSV #gender #image #recognition
Gender recognition from face images using trainable shape and color features (GA, PF, AG, AS, MV), pp. 1983–1988.
ICPRICPR-2018-BeheraDDR #recognition
Air Signature Recognition Using Deep Convolutional Neural Network-Based Sequential Model (SKB, AKD, DPD, PPR0), pp. 3525–3530.
ICPRICPR-2018-BhuniaBBKB0P #network
Handwriting Trajectory Recovery using End-to-End Deep Encoder-Decoder Network (AKB, AB, AKB, AK, PB, PPR0, UP0), pp. 3639–3644.
ICPRICPR-2018-BhuniaBBKB0P18a #generative #image #network #word
Word Level Font-to-Font Image Translation using Convolutional Recurrent Generative Adversarial Networks (AKB, AKB, PB, AK, AB, PPR0, UP0), pp. 3645–3650.
ICPRICPR-2018-BicegoLDGA #mining #modelling #topic
Mining NMR Spectroscopy Using Topic Models (MB, PL, MD, FG, MA), pp. 3784–3789.
ICPRICPR-2018-CombinidoMA #approach #image #network
A Convolutional Neural Network Approach for Estimating Tropical Cyclone Intensity Using Satellite-based Infrared Images (JSC, JRM, JA), pp. 1474–1480.
ICPRICPR-2018-CuiZZH #learning #multi #network #recognition
Multi-source Learning for Skeleton -based Action Recognition Using Deep LSTM Networks (RC, AZ, SZ, GH0), pp. 547–552.
ICPRICPR-2018-CzovnyBSC #3d
Minutia Matching using 3D Pore Clouds (RKC, ORPB, LS, HSGC), pp. 3138–3143.
ICPRICPR-2018-DehzangiBI #detection #multi #process
Activity Detection using Fusion of Multi-Pressure Sensors in Insoles (OD, BAB, OI), pp. 3315–3321.
ICPRICPR-2018-DehzangiM #behaviour #predict
Unobtrusive Driver Drowsiness Prediction Using Driving Behavior from Vehicular Sensors (OD, SM), pp. 3598–3603.
ICPRICPR-2018-DehzangiS #analysis #process #recognition #reduction #robust
IMU-Based Robust Human Activity Recognition using Feature Analysis, Extraction, and Reduction (OD, VS), pp. 1402–1407.
ICPRICPR-2018-DehzangiT #detection #network #representation
Driver Distraction Detection using MEL Cepstrum Representation of Galvanic Skin Responses and Convolutional Neural Networks (OD, MT), pp. 1481–1486.
ICPRICPR-2018-Dey0GVLP #image #learning #multi #retrieval #sketching
Learning Cross-Modal Deep Embeddings for Multi-Object Image Retrieval using Text and Sketch (SD, AD0, SKG, EV, JL0, UP0), pp. 916–921.
ICPRICPR-2018-DongTC #automation #image
Automatic Inspection of Aerospace Welds Using X-Ray Images (XD, CJT, TFC), pp. 2002–2007.
ICPRICPR-2018-DuanMKY #classification #image
A New Single Image Super-resolution Method Using SIMK-based Classification and ISRM Technique (PD, AM, XK, CY), pp. 3043–3048.
ICPRICPR-2018-El-GamalEAGBHKE #framework
Significant Region-Based Framework for Early Diagnosis of Alzheimer's Disease Using 11C PiB-PET Scans (FEZAEG, MME, AA, MG, GNB, HH, RK, ASEB), pp. 2989–2994.
ICPRICPR-2018-EskenaziGO #component #image
Watercolor, Segmenting Images Using Connected Color Components (SE, PGK, JMO), pp. 3633–3638.
ICPRICPR-2018-GarciaLSH #classification #complexity #metric #recommendation
Classifier Recommendation Using Data Complexity Measures (LPFG, ACL, MCPdS, TKH), pp. 874–879.
ICPRICPR-2018-GarrettR #3d #network #performance
Fast Descriptor Extraction for Contextless 3D Registration Using a Fully Convolutional Network (TG, RR), pp. 1211–1216.
ICPRICPR-2018-HeYLXLHS #estimation #physics
Variational Mode Decomposition-Based Heart Rate Estimation Using Wrist-Type Photoplethysmography During Physical Exercise (WH, YY, YL, HX, LL0, WH, MS), pp. 3766–3771.
ICPRICPR-2018-HibrajVSP #clustering #set
Speaker Clustering Using Dominant Sets (FH, SV, TS, MP), pp. 3549–3554.
ICPRICPR-2018-JaberiPF #clustering #probability
Probabilistic Sparse Subspace Clustering Using Delayed Association (MJ, MP, HF), pp. 2087–2092.
ICPRICPR-2018-JiQYKZ #automation #image #network #segmentation
Automatic Prostate Segmentation on MR Images Using Enhanced Holistically-Nested Networks (DJ, JQ, JY, TK, SZ), pp. 3820–3825.
ICPRICPR-2018-JohnKGKM #estimation
Free Space, Visible and Missing Lane Marker Estimation using the PsiNet and Extra Trees Regression (VJ, NMK, CG, KK, SM), pp. 189–194.
ICPRICPR-2018-JyotiD #automation #estimation #geometry #network
Automatic Eye Gaze Estimation using Geometric & Texture-based Networks (SJ, AD), pp. 2474–2479.
ICPRICPR-2018-KateFG #visual notation
Visual Tracking with Breeding Fireflies using Brightness from Background-Foreground Information (PK, MF, PG), pp. 2570–2575.
ICPRICPR-2018-KawanishiMXTY #estimation
Which Content in a Booklet is he/she Reading? Reading Content Estimation using an Indoor Surveillance Camera (YK, HM, JX, KT, HY), pp. 1731–1736.
ICPRICPR-2018-KilKC
Scene text rectification using glyph and character alignment properties (THK, HIK, NIC), pp. 3663–3668.
ICPRICPR-2018-KimuraSDNKBI #3d #representation
Representing a Partially Observed Non-Rigid 3D Human Using Eigen-Texture and Eigen-Deformation (RK, AS, FLD, YN, HK, AB, KI), pp. 1043–1048.
ICPRICPR-2018-KokakiTKHO #modelling
Sequential Fish Catch Forecasting Using Bayesian State Space Models (YK, NT, TK, KH, TO), pp. 776–781.
ICPRICPR-2018-KonwerBBBB0P #generative #network
Staff line Removal using Generative Adversarial Networks (AK, AKB, AB, AKB, PB, PPR0, UP0), pp. 1103–1108.
ICPRICPR-2018-KurzendorferBSB #analysis #classification #random #segmentation
Myocardial Scar Segmentation in LGE-MRI using Fractal Analysis and Random Forest Classification (TK, KB, SS, AB, CF, AKM), pp. 3168–3173.
ICPRICPR-2018-LeeLC
Cancelable Biometrics Using Noise Embedding (DHL, SHL, NIC), pp. 3390–3395.
ICPRICPR-2018-LiangYLH #classification
A Segmented Local Offset Method for Imbalanced Data Classification Using Quasi-Linear Support Vector Machine (PL, XY, WL, JH), pp. 746–751.
ICPRICPR-2018-LiaoCQ #image #visualisation
Visualization of Hyperspectral Images Using Moving Least Squares (DL, SC, YQ), pp. 2851–2856.
ICPRICPR-2018-LiCGJH #gesture #multimodal #recognition
Multimodal Gesture Recognition Using Densely Connected Convolution and BLSTM (DL, YC, MkG, SJ, CH), pp. 3365–3370.
ICPRICPR-2018-LiciottiPPFZ #network #segmentation #semantics
Convolutional Networks for Semantic Heads Segmentation using Top-View Depth Data in Crowded Environment (DL, MP, RP, EF, PZ), pp. 1384–1389.
ICPRICPR-2018-LiH #algorithm #estimation #performance #robust
Fast and Robust Pose Estimation Algorithm for Bin Picking Using Point Pair Feature (ML, KH), pp. 1604–1609.
ICPRICPR-2018-Liu0H #integration
High-Quality and Memory-Efficient Volumetric Integration of Depth Maps Using Plane Priors (YL, WG0, ZH), pp. 1749–1754.
ICPRICPR-2018-LiuH0 #online #optimisation
Online Temporal Calibration of Camera and IMU using Nonlinear Optimization (JL, ZH, WG0), pp. 1761–1766.
ICPRICPR-2018-LiW18a #detection #semantics #visual notation
Visual Relationship Detection Using Joint Visual-Semantic Embedding (BL, YW0), pp. 3291–3296.
ICPRICPR-2018-LiWK18a #framework #image #learning
Infrared and Visible Image Fusion using a Deep Learning Framework (HL0, XJW, JK), pp. 2705–2710.
ICPRICPR-2018-LocBO #documentation #image #network #security
Document Images Watermarking for Security Issue using Fully Convolutional Networks (CVL, JCB, JMO), pp. 1091–1096.
ICPRICPR-2018-LuoCCTTKH
Oil Price Forecasting Using Supervised GANs with Continuous Wavelet Transform Features (ZL, JC, XJC, KT, TT, TK, SH), pp. 830–835.
ICPRICPR-2018-MaH #generative #network
Perceptual Face Completion using a Local-Global Generative Adversarial Network (RM, HH0), pp. 1670–1675.
ICPRICPR-2018-MaierSSWSCF #learning #network #precise #towards
Precision Learning: Towards Use of Known Operators in Neural Networks (AKM, FS, CS, TW, SS, JHC, RF), pp. 183–188.
ICPRICPR-2018-MaLHY #estimation #hybrid #network
Image-based Air Pollution Estimation Using Hybrid Convolutional Neural Network (JM, KL, YH, JY), pp. 471–476.
ICPRICPR-2018-MerchantSKM #dataset #image
Appearance-based data augmentation for image datasets using contrast preserving sampling (AKM, TQS, BK, RM), pp. 1235–1240.
ICPRICPR-2018-MohantyDG #detection #performance
An Efficient System for Hazy Scene Text Detection using a Deep CNN and Patch-NMS (SM, TD, HPG), pp. 2588–2593.
ICPRICPR-2018-MustaniemiKSMH #detection #metric #performance
Fast Motion Deblurring for Feature Detection and Matching Using Inertial Measurements (JM, JK, SS, JM, JH), pp. 3068–3073.
ICPRICPR-2018-NadeemHS #algorithm #automation #detection #image #segmentation
An automated airway segmentation algorithm for CT images using topological leakage detection and volume freezing (SAN, EAH, PKS), pp. 1181–1186.
ICPRICPR-2018-NguyenTL #data-driven #learning
Are French Really That Different? Recognizing Europeans from Faces Using Data-Driven Learning (VDN, MT, JL), pp. 2729–2734.
ICPRICPR-2018-PassalisT #information management #network #similarity
Neural Network Knowledge Transfer using Unsupervised Similarity Matching (NP, AT), pp. 716–721.
ICPRICPR-2018-PengSCCXJ #architecture #detection #multi
Detecting Heads using Feature Refine Net and Cascaded Multi-scale Architecture (DP, ZS, ZC, ZC, LX, LJ), pp. 2528–2533.
ICPRICPR-2018-PereraAP #generative #multi #named #network
In2I: Unsupervised Multi-Image-to-Image Translation Using Generative Adversarial Networks (PP, MA, VMP), pp. 140–146.
ICPRICPR-2018-RhifWF #3d #network #recognition #sequence
Action Recognition from 3D Skeleton Sequences using Deep Networks on Lie Group Features (MR, HW, IRF), pp. 3427–3432.
ICPRICPR-2018-RoyT #higher-order #learning
Learning to Learn Second-Order Back-Propagation for CNNs Using LSTMs (AR, ST), pp. 97–102.
ICPRICPR-2018-SadafiKHPMS #multi
Multiple Mice Tracking: Occlusions Disentanglement using a Gaussian Mixture Model (AS, VMK, HH, FP, VM, DS), pp. 2433–2437.
ICPRICPR-2018-Savchenko #performance #recognition #statistics
Efficient Statistical Face Recognition Using Trigonometric Series and CNN Features (AVS), pp. 3262–3267.
ICPRICPR-2018-ShibataIHM #image #set
Restoration of Sea Surface Temperature Satellite Images Using a Partially Occluded Training Set (SS, MI, AH, MM), pp. 2771–2776.
ICPRICPR-2018-SuHK #analysis #classification #component #multi #performance
Efficient Text Classification Using Tree-structured Multi-linear Principal Component Analysis (YS, YH, CCJK), pp. 585–590.
ICPRICPR-2018-SuJ #analysis #image #multi
Multi-Spectral Fusion and Denoising of RGB and NIR Images Using Multi-Scale Wavelet Analysis (HS, CJ), pp. 1779–1784.
ICPRICPR-2018-TayanovKS #classification #learning #predict
Prediction-based classification using learning on Riemannian manifolds (VT, AK, CYS), pp. 591–596.
ICPRICPR-2018-UekiHKK #fine-grained #query #retrieval #video
Fine-grained Video Retrieval using Query Phrases - Waseda_Meisei TRECVID 2017 AVS System - (KU, KH, KK, TK), pp. 3322–3327.
ICPRICPR-2018-VinayavekhinCMA #comprehension #learning #what
Focusing on What is Relevant: Time-Series Learning and Understanding using Attention (PV, SC, AM, DJA, GDM, DK, RT), pp. 2624–2629.
ICPRICPR-2018-WangF #detection
Saliency Detection using Iterative Dynamic Guided Filtering (CW, YF), pp. 3396–3401.
ICPRICPR-2018-WangHJ #learning
Focus on Scene Text Using Deep Reinforcement Learning (HW, SH, LJ), pp. 3759–3765.
ICPRICPR-2018-WangSH #algorithm #black box #generative
Universal Perturbation Generation for Black-box Attack Using Evolutionary Algorithms (SW, YS, YH), pp. 1277–1282.
ICPRICPR-2018-WangZGW #detection #image #multi #network #parametricity
Fully convolutional neural networks for prostate cancer detection using multi-parametric magnetic resonance images: an initial investigation (YW, BZ, DG, JW), pp. 3814–3819.
ICPRICPR-2018-WeiCYLL #black box #classification #image
Explain Black-box Image Classifications Using Superpixel-based Interpretation (YW, MCC, YY, SNL, SL), pp. 1640–1645.
ICPRICPR-2018-Windeatt #analysis #classification #optimisation
Optimising Ensemble of Two-Class classifiers using Spectral Analysis (TW), pp. 710–715.
ICPRICPR-2018-WitmerB #classification #image #learning #multi
Multi-label Classification of Stem Cell Microscopy Images Using Deep Learning (AW, BB), pp. 1408–1413.
ICPRICPR-2018-WuW #gesture #recognition
Applying hand gesture recognition and joint tracking to a TV controller using CNN and Convolutional Pose Machine (YW, CMW), pp. 3086–3091.
ICPRICPR-2018-WuY0Y #robust
Robust ECG Biometrics Using Two-Stage Model (BW, GY, LY0, YY), pp. 1062–1067.
ICPRICPR-2018-XinCCZYW #locality #recognition #visual notation
Visual Localization in Changing Environments using Place Recognition Techniques (ZX, YC, SC, JZ0, YY, YW), pp. 1785–1790.
ICPRICPR-2018-XiongJXXLW #documentation #energy #estimation #image
Historical document image binarization using background estimation and energy minimization (WX0, XJ, JX, ZX, ML, JW), pp. 3716–3721.
ICPRICPR-2018-XuCG #learning #modelling #multi #random
Common Random Subgraph Modeling Using Multiple Instance Learning (TX, DKYC, IG), pp. 1205–1210.
ICPRICPR-2018-XuD #detection #modelling
Human Routine Change Detection using Bayesian Modelling (YX, DD), pp. 1833–1838.
ICPRICPR-2018-XuDMB #recognition
Video-based Emotion Recognition using Aggregated Features and Spatio-temporal Information (JX, YD, LM, HB), pp. 2833–2838.
ICPRICPR-2018-XuZZ #image #network #recognition
Screen-rendered text images recognition using a deep residual network based segmentation-free method (XX0, JZ, HZ), pp. 2741–2746.
ICPRICPR-2018-YamadaIYK #network #segmentation
Texture Segmentation using Siamese Network and Hierarchical Region Merging (RY, HI, NY, TK), pp. 2735–2740.
ICPRICPR-2018-Yang0CF #analysis #canonical #correlation #detection #image
Heterogeneous image change detection using Deep Canonical Correlation Analysis (JY, YZ0, YC, LF), pp. 2917–2922.
ICPRICPR-2018-YangZT
Reducing Tongue Shape Dimensionality from Hundreds of Available Resources Using Autoencoder (MY, DZ, JT), pp. 2875–2880.
ICPRICPR-2018-YanWSLZ #image #learning #network
Image Captioning using Adversarial Networks and Reinforcement Learning (SY, FW, JSS, WL, BZ), pp. 248–253.
ICPRICPR-2018-YlimakiHK #3d #re-engineering #refinement
Accurate 3-D Reconstruction with RGB-D Cameras using Depth Map Fusion and Pose Refinement (MY, JH, JK), pp. 1977–1982.
ICPRICPR-2018-YuanTLDZ #automation #learning #multi #segmentation
Fully Automatic Segmentation of the Left Ventricle Using Multi-Scale Fusion Learning (TY, QT, XL, XD, JZ), pp. 3838–3843.
ICPRICPR-2018-ZhangSOS #identification #network
Person Re-identification Using Two-Stage Convolutional Neural Network (YZ, JS, DO, HTS), pp. 3341–3346.
ICPRICPR-2018-ZhanLL #network #recognition #string
Handwritten Digit String Recognition using Convolutional Neural Network (HZ, SL, YL), pp. 3729–3734.
ICPRICPR-2018-ZhaoLZTNM #analysis #automation #component #image #multi #robust #segmentation
Automatic Multi-Atlas Segmentation for Abdominal Images Using Template Construction and Robust Principal Component Analysis (YZ0, HL0, RZ, GT, MN, BHM), pp. 3880–3885.
ICPRICPR-2018-ZhaoPL0DWQ #learning #locality #semantics #topic
Learning Topics Using Semantic Locality (ZZ, KP, SL, ZL0, CD, YW, QQ), pp. 3710–3715.
ICPRICPR-2018-ZhaoSJ #integer #linear #locality #programming
Temporal Pattern Localization using Mixed Integer Linear Programming (RZ, GS, QJ), pp. 1361–1365.
ICPRICPR-2018-ZhaoYT #network #order #predict
Pen Tip Motion Prediction for Handwriting Drawing Order Recovery using Deep Neural Network (BZ, MY, JT), pp. 704–709.
KDDKDD-2018-DaltayanniDA #automation #segmentation
Automated Audience Segmentation Using Reputation Signals (MD, AD, LdA), pp. 186–195.
KDDKDD-2018-DasSCHLCKC #learning #named #performance
SHIELD: Fast, Practical Defense and Vaccination for Deep Learning using JPEG Compression (ND, MS, STC, FH, SL, LC, MEK, DHC), pp. 196–204.
KDDKDD-2018-GittensRWMGPKRM #data analysis #library #scalability
Accelerating Large-Scale Data Analysis by Offloading to High-Performance Computing Libraries using Alchemist (AG, KR, SW, MWM, LG, P, JK, MFR, KJM), pp. 293–301.
KDDKDD-2018-GohSVH #learning #predict #rule-based
Using Rule-Based Labels for Weak Supervised Learning: A ChemNet for Transferable Chemical Property Prediction (GBG, CS, AV, NOH), pp. 302–310.
KDDKDD-2018-GrbovicC #personalisation #ranking #realtime
Real-time Personalization using Embeddings for Search Ranking at Airbnb (MG, HC), pp. 311–320.
KDDKDD-2018-HarelR #network #prototype
Accelerating Prototype-Based Drug Discovery using Conditional Diversity Networks (SH, KR), pp. 331–339.
KDDKDD-2018-He0LRLTZ #detection
Detecting Vehicle Illegal Parking Events using Sharing Bikes' Trajectories (TH, JB0, RL, SR, YL, CT, YZ0), pp. 340–349.
KDDKDD-2018-HundmanCLCS #detection #parametricity
Detecting Spacecraft Anomalies Using LSTMs and Nonparametric Dynamic Thresholding (KH, VC, CL, IC, TS), pp. 387–395.
KDDKDD-2018-Janakiraman #learning #multi #safety
Explaining Aviation Safety Incidents Using Deep Temporal Multiple Instance Learning (VMJ), pp. 406–415.
KDDKDD-2018-JauvionGSGG #optimisation
Optimization of a SSP's Header Bidding Strategy using Thompson Sampling (GJ, NG, PDS, AG, SG), pp. 425–432.
KDDKDD-2018-KhuranaASV
Resolving Abstract Anaphora Implicitly in Conversational Assistants using a Hierarchically stacked RNN (PK, PA, GMS, LV), pp. 433–442.
KDDKDD-2018-KumarRBVWKEFMZG #machine learning
Using Machine Learning to Assess the Risk of and Prevent Water Main Breaks (AK, SAAR, BB, RAV, KHW, CK, SE, AF, AM, JZ, RG), pp. 472–480.
KDDKDD-2018-LeeRK #classification #graph
Graph Classification using Structural Attention (JBL, RAR, XK), pp. 1666–1674.
KDDKDD-2018-OshriHACDWBLE #assessment #framework #learning #quality
Infrastructure Quality Assessment in Africa using Satellite Imagery and Deep Learning (BO, AH, PA, XC, PD, JW, MB, DBL, SE), pp. 616–625.
KDDKDD-2018-RouxPMVF #approach #detection #machine learning
Tax Fraud Detection for Under-Reporting Declarations Using an Unsupervised Machine Learning Approach (DdR, BP, AM, MDPV, CF), pp. 215–222.
KDDKDD-2018-Ruhrlander0U #modelling #predict
Improving Box Office Result Predictions for Movies Using Consumer-Centric Models (RPR, MB0, MU), pp. 655–664.
KDDKDD-2018-ShashikumarSCN #bidirectional #detection #network
Detection of Paroxysmal Atrial Fibrillation using Attention-based Bidirectional Recurrent Neural Networks (SPS, AJS, GDC, SN), pp. 715–723.
KDDKDD-2018-Ting #bound #empirical #estimation #fault #named
Count-Min: Optimal Estimation and Tight Error Bounds using Empirical Error Distributions (DT), pp. 2319–2328.
KDDKDD-2018-WuCYXXA #clustering #random #scalability
Scalable Spectral Clustering Using Random Binning Features (LW, PYC, IEHY, FX, YX, CCA), pp. 2506–2515.
KDDKDD-2018-WuZW #graph #on the
On Discrimination Discovery and Removal in Ranked Data using Causal Graph (YW, LZ0, XW), pp. 2536–2544.
KDDKDD-2018-XuLDH #learning #metric #robust
New Robust Metric Learning Model Using Maximum Correntropy Criterion (JX0, LL, CD, HH), pp. 2555–2564.
KDDKDD-2018-ZhaoAS0 #classification #dependence #performance #predict
Prediction-time Efficient Classification Using Feature Computational Dependencies (LZ0, AAF, MS, KZ0), pp. 2787–2796.
ECMFAECMFA-2018-RutleIKD #automation #co-evolution #graph transformation #modelling #traceability
Automatic Transformation Co-evolution Using Traceability Models and Graph Transformation (AR, LI, HK, ZD), pp. 80–96.
ICMTICMT-2018-Voelter #design #evolution #functional #kernel
The Design, Evolution, and Use of KernelF — An Extensible and Embeddable Functional Language (MV), pp. 3–55.
MoDELSMoDELS-2018-MarussySV #incremental #modelling
Incremental View Model Synchronization Using Partial Models (KM, OS, DV), pp. 323–333.
MoDELSMoDELS-2018-PouraliA #challenge #empirical #modelling #tool support
An Empirical Investigation to Understand the Difficulties and Challenges of Software Modellers When Using Modelling Tools (PP, JMA), pp. 224–234.
ECOOPECOOP-2018-QunaibitBNVF #dynamic typing #optimisation #platform
Accelerating Dynamically-Typed Languages on Heterogeneous Platforms Using Guards Optimization (MQ, SB, YN, SV, MF), p. 29.
OOPSLAOOPSLA-2018-AlpernasFFRSSW #data flow #information management
Secure serverless computing using dynamic information flow control (KA, CF, SF, LR, MS, TS, KW), p. 26.
OOPSLAOOPSLA-2018-WilliamsMW #contract
The root cause of blame: contracts for intersection and union types (JW, JGM, PW), p. 29.
AdaEuropeAdaEurope-2018-JaradatP #contract #design #runtime #safety #verification
Using Safety Contracts to Verify Design Assumptions During Runtime (OJ, SP), pp. 3–18.
LOPSTRLOPSTR-2018-PapapanagiotouF #approach #composition #linear #logic #process #scalability
A Pragmatic, Scalable Approach to Correct-by-Construction Process Composition Using Classical Linear Logic Inference (PP, JDF), pp. 77–93.
PADLPADL-2018-AnandCN #automation #consistency #detection #logic #nondeterminism
An Automated Detection of Inconsistencies in SBVR-based Business Rules Using Many-sorted Logic (KA, PKC, RN), pp. 80–96.
PADLPADL-2018-Crary #code generation #source code
Hygienic Source-Code Generation Using Functors - (Extended Abstract) (KC), pp. 53–60.
PLDIPLDI-2018-DuckY #c #c++ #detection #effectiveness #fault #memory management #named
EffectiveSan: type and memory error detection using dynamically typed C/C++ (GJD, RHCY), pp. 181–195.
PLDIPLDI-2018-FengMBD #learning #synthesis
Program synthesis using conflict-driven learning (YF, RM, OB, ID), pp. 420–435.
PLDIPLDI-2018-HongSKRKPRS #analysis #gpu #kernel #optimisation
GPU code optimization using abstract kernel emulation and sensitivity analysis (CH, ASR, JK, PSR, SK, LNP, FR, PS), pp. 736–751.
PLDIPLDI-2018-LeeHAN #modelling #probability #search-based #synthesis
Accelerating search-based program synthesis using learned probabilistic models (WL, KH, RA, MN), pp. 436–449.
PLDIPLDI-2018-RaghothamanKHN #reasoning
User-guided program reasoning using Bayesian inference (MR, SK, KH, MN), pp. 722–735.
POPLPOPL-2018-Danielsson
Up-to techniques using sized types (NAD), p. 28.
POPLPOPL-2018-InalaS #named #spreadsheet #web
WebRelate: integrating web data with spreadsheets using examples (JPI, RS), p. 28.
POPLPOPL-2018-WangDS #abstraction #refinement #synthesis
Program synthesis using abstraction refinement (XW0, ID, RS), p. 30.
PPDPPPDP-2018-NogatzKS #definite clause grammar #prolog #visualisation
Web-based Visualisation for Definite Clause Grammars Using Prolog Meta-Interpreters: System Description (FN, JK, DS), p. 10.
SASSAS-2018-RothenbergDH #abstraction #incremental #verification
Incremental Verification Using Trace Abstraction (BCR, DD, MH), pp. 364–382.
SASSAS-2018-Shoham #decidability #distributed #interactive #logic #protocol #verification
Interactive Verification of Distributed Protocols Using Decidable Logic (SS), pp. 77–85.
ASEASE-2018-AbdessalemPNBS #feature model #interactive #testing
Testing autonomous cars for feature interaction failures using many-objective search (RBA, AP, SN, LCB, TS), pp. 143–154.
ASEASE-2018-HabibP #documentation #graph #learning #thread
Is this class thread-safe? inferring documentation using graph-based learning (AH, MP), pp. 41–52.
ASEASE-2018-PatwardhanSSKG #ambiguity #automation #towards
Towards automating disambiguation of regulations: using the wisdom of crowds (MP, AS, RS, SK, SG), pp. 850–855.
ASEASE-2018-QuLCJCHZ #2d #fault #named #network #predict
node2defect: using network embedding to improve software defect prediction (YQ, TL0, JC, YJ, DC, AH, QZ), pp. 844–849.
ESEC-FSEESEC-FSE-2018-AmarBB0M #difference #finite #modelling
Using finite-state models for log differencing (HA, LB, NB, DL0, SM), pp. 49–59.
ESEC-FSEESEC-FSE-2018-DashAB #named
RefiNym: using names to refine types (SKD, MA, ETB), pp. 107–117.
ESEC-FSEESEC-FSE-2018-HuaZWK #approach #automation #generative #lazy evaluation #named #program repair #sketching
SketchFix: a tool for automated program repair approach using lazy candidate generation (JH, MZ, KW, SK), pp. 888–891.
ESEC-FSEESEC-FSE-2018-HuZY #machine learning #named #reuse #robust #testing #user interface
AppFlow: using machine learning to synthesize robust, reusable UI tests (GH, LZ, JY), pp. 269–282.
ESEC-FSEESEC-FSE-2018-KimC0 #fault
Which generated test failures are fault revealing? prioritizing failures based on inferred precondition violations using PAF (MK, SCC, SK0), pp. 679–690.
ESEC-FSEESEC-FSE-2018-LeB0 #mining #named #network #specification
DSM: a specification mining tool using recurrent neural network based language model (TDBL, LB, DL0), pp. 896–899.
ESEC-FSEESEC-FSE-2018-StoccoYM18a #named #web
Vista: web test repair using computer vision (AS0, RY, AM0), pp. 876–879.
ESEC-FSEESEC-FSE-2018-TuZZZ #empirical #issue tracking
Be careful of when: an empirical study on time-related misuse of issue tracking data (FT, JZ, QZ, MZ), pp. 307–318.
ICSE-2018-AbdessalemNBS #algorithm #testing
Testing vision-based control systems using learnable evolutionary algorithms (RBA, SN, LCB, TS), pp. 1016–1026.
ICSE-2018-DamevskiCSKP #behaviour #developer #ide #modelling #predict #topic
Predicting future developer behavior in the IDE using topic models (KD, HC, DCS, NAK, LLP), p. 932.
ICSE-2018-HabayebMMB #debugging #markov #on the #predict
On the use of hidden Markov model to predict the time to fix bugs (MH, SSM, AVM, ABB), p. 700.
ICSE-2018-KimCK #c #precise #source code #testing
Precise concolic unit testing of C programs using extended units and symbolic alarm filtering (YK, YC, MK), pp. 315–326.
ICSE-2018-LangeNTY #behaviour #framework #message passing #verification
A static verification framework for message passing in Go using behavioural types (JL, NN, BT, NY), pp. 1137–1148.
ICSE-2018-MechtaevNNGR #implementation #program repair #semantics
Semantic program repair using a reference implementation (SM, MDN, YN, LG, AR), pp. 129–139.
SLESLE-2018-MeySHSKFOA #attribute grammar #validation
Continuous model validation using reference attribute grammars (JM, RS, GH, ES, TK0, NF, , UA), pp. 70–82.
ASPLOSASPLOS-2018-DickensGFH #encryption #named #performance
StrongBox: Confidentiality, Integrity, and Performance using Stream Ciphers for Full Drive Encryption (BDI, HSG, AJF, HH), pp. 708–721.
CASECASE-2018-AshouriHNS #approximate #detection #energy #performance
Energy Performance Based Anomaly Detection in Non-Residential Buildings Using Symbolic Aggregate Approximation (AA, YH, GRN, WS0), pp. 1400–1405.
CASECASE-2018-BarretoC #multi #simulation
Matching the Free-Vibration Response of a Delta Robot with Pick-and-Place Tasks Using Multi-Body Simulation (JPB, BC), pp. 1487–1492.
CASECASE-2018-CheonKKKC #design #fuzzy #optimisation
Systematic Design Method of Controller using Discrete Fuzzy PI Control and Particle Swarm Optimization (JC, JK, HK, SK, YC), pp. 1581–1586.
CASECASE-2018-ChuBIICS #learning #multi #online #power management
Plug-and-Play Power Management Control of All-Electric Vehicles Using Multi-Agent System and On-line Gaussian Learning (KCC, GB, MI, AI, CC, KS), pp. 1599–1604.
CASECASE-2018-DasWSP #adaptation #detection #interactive
Whole Body Human-Robot Collision Detection Using Base-sensor Neuroadaptive Interaction (SKD, IW, MNS, DOP), pp. 278–283.
CASECASE-2018-DingLWL #automation #testing
6-DOF Automated Flight Testing Using a Humanoid Robot Arm (CD, LL0, CW0, JL), pp. 217–222.
CASECASE-2018-FrancoAGABB #approach #deployment #optimisation #probability
Strategic territorial deployment of hospital pharmacy robots using a stochastic p-robust optimization approach (CF, VA, TG, EAL, MB, HB), pp. 390–395.
CASECASE-2018-GaoXDCSG #detection
Detection of Weld Cracks Using Magneto-optical Imaging (XG, YX, LD, ZC, YS, PPG), pp. 559–564.
CASECASE-2018-HaghighiRATMC #detection
Depth-based Object Detection using Hierarchical Fragment Matching Method (RH, MR, SMA, KPT, AAM0, CMC), pp. 780–785.
CASECASE-2018-InuiEMZ #geometry #gpu #process #simulation
Geometric Simulation of Infeed Grinding Process of Silicon Wafer Using GPU (MI, YE, TM, LZ), pp. 1519–1524.
CASECASE-2018-JulienN #coordination #exponential
Dynamics and Control of Tree-Type Manipulator Systems using Exponential Coordinates (AJ, KN), pp. 136–143.
CASECASE-2018-KacarMU #problem #reduction
Problem Reduction Approaches for Production Planning Using Clearing Functions (NBK, LM, RU), pp. 931–938.
CASECASE-2018-KangYJ #analysis #performance #realtime
Real-time Production Performance Analysis Using Machine Degradation Signals: a Two-Machine Case (YK, HY, FJ), pp. 1501–1506.
CASECASE-2018-KuoC #algorithm #capacity #industrial #scheduling #search-based
Using Auxiliary Capacity Planning Strategy Genetic Algorithm for TFT-LCD photolithography scheduling to empower Industry 3.5 (HAK, CFC0), pp. 920–925.
CASECASE-2018-LowO #hybrid #implementation #predict #realtime
Real-time Implementation of Nonlinear Model Predictive Control for Mechatronic Systems Using a Hybrid Model (SL, DO), pp. 164–167.
CASECASE-2018-RibeiroRPS #approach #architecture #design
An Approach for Architectural Design of Automotive Systems using MARTE and SysML (FGCR, AR, CEP, MSS), pp. 1574–1580.
CASECASE-2018-ShimasakiOJTIY #image #pattern matching #pattern recognition #recognition
HFR-video-based Image Pattern Recognition Using Pixel-level Temporal Frequency Response Matching (KS, TO, MJ, TT, II, KY), pp. 451–456.
CASECASE-2018-SpenrathP #heuristic #network #random
Using Neural Networks for Heuristic Grasp Planning in Random Bin Picking (FS, AP), pp. 258–263.
CASECASE-2018-StarkGDBG #integration
Cloud-based integration of robot engineering data using AutomationML (KS, TG, JD, PB, DG), pp. 645–648.
CASECASE-2018-TerzimehicVW #deployment #design
Using Design Space Exploration to Calculate Deployment Configurations of IEC 61499-based Systems (TT, SV, MW), pp. 881–886.
CASECASE-2018-ToriiH #3d #approximate #estimation #parametricity
Model-less Estimation Method for Robot Grasping Parameters Using 3D Shape Primitive Approximation (TT, MH), pp. 580–585.
CASECASE-2018-WijayasingheSPP #adaptation #algorithm #interface #search-based
Adaptive Interface for Robot Teleoperation using a Genetic Algorithm (IBW, MNS, SP, DOP, SC), pp. 50–56.
CASECASE-2018-XuLS0L #realtime #recognition #self
Real-time Shape Recognition of a Deformable Link by Using Self-Organizing Map (SX, GL, DS, LS0, JL), pp. 586–591.
CASECASE-2018-ZhangLFL #integer #linear #programming #sequence
Shortest Legal Firing Sequence of Net Condition/Event Systems Using Integer Linear Programming (JZ, HL, GF, ZL), pp. 1556–1561.
CGOCGO-2018-0001LQDL #android #detection #distributed #logic
Resilient decentralized Android application repackaging detection using logic bombs (QZ0, LL, ZQ, XD, ZL), pp. 50–61.
ESOPESOP-2018-Matsuda0 #combinator #lens #named #programming
HOBiT: Programming Lenses Without Using Lens Combinators (KM, MW0), pp. 31–59.
FASEFASE-2018-Dimovski #model checking
Abstract Family-Based Model Checking Using Modal Featured Transition Systems: Preservation of CTL* (ASD), pp. 301–318.
FASEFASE-2018-KatirtzisDS #api #clustering
Summarizing Software API Usage Examples Using Clustering Techniques (NK, TD, CAS), pp. 189–206.
FASEFASE-2018-LandsbergSK #fault #locality #optimisation #source code #specification
Optimising Spectrum Based Fault Localisation for Single Fault Programs Using Specifications (DL, YS, DK), pp. 246–263.
FASEFASE-2018-ParkSR #analysis #framework #web
EventHandler-Based Analysis Framework for Web Apps Using Dynamically Collected States (JP, KS, SR), pp. 129–145.
CAVCAV-2018-KongBH #approximate #set
Reachable Set Over-Approximation for Nonlinear Systems Using Piecewise Barrier Tubes (HK, EB, TAH), pp. 449–467.
CAVCAV-2018-BouajjaniEMT #abstraction #reasoning #reduction #source code
Reasoning About TSO Programs Using Reduction and Abstraction (AB, CE, SOM, ST), pp. 336–353.
CAVCAV-2018-NiemetzPRBT #quantifier
Solving Quantified Bit-Vectors Using Invertibility Conditions (AN, MP, AR, CWB, CT), pp. 236–255.
ICSTICST-2018-MahajanAMH #automation #clustering #search-based #similarity #web
Automated Repair of Internationalization Presentation Failures in Web Pages Using Style Similarity Clustering and Search-Based Techniques (SM, AA, PM, WGJH), pp. 215–226.
ICSTICST-2018-PradhanW00L #mining #multi #named #testing
REMAP: Using Rule Mining and Multi-objective Search for Dynamic Test Case Prioritization (DP, SW0, SA0, TY0, ML), pp. 46–57.
ICSTICST-2018-Rajaram #fault #taxonomy #testing
Taxonomy Based Testing Using SW91, a Medical Device Software Defect Taxonomy (HKR), pp. 422–423.
IJCARIJCAR-2018-KazakovS
Enumerating Justifications Using Resolution (YK, PS), pp. 609–626.
IJCARIJCAR-2018-ZeljicBWR #approximate #float
Exploring Approximations for Floating-Point Arithmetic Using UppSAT (AZ, PB, CMW, PR), pp. 246–262.
TAPTAP-2018-HerdaTB #data flow #dependence #graph #testing #verification
Using Dependence Graphs to Assist Verification and Testing of Information-Flow Properties (MH, SST, BB), pp. 83–102.
TAPTAP-2018-VorobyovKS #c #case study #detection #experience #runtime #security #verification
Detection of Security Vulnerabilities in C Code Using Runtime Verification: An Experience Report (KV, NK, JS), pp. 139–156.
VMCAIVMCAI-2018-KranzS #analysis #bytecode #composition #on-demand
Modular Analysis of Executables Using On-Demand Heyting Completion (JK, AS), pp. 291–312.
ECSAECSA-2017-FilhoRAB #architecture #consistency #design #exception
Preventing Erosion in Exception Handling Design Using Static-Architecture Conformance Checking (JLMF, LSR, RMCA, RB), pp. 67–83.
ICSAICSA-2017-GesvindrBG #as a service #design #evaluation #prototype #quality
Quality Evaluation of PaaS Cloud Application Design Using Generated Prototypes (DG, BB, OG), pp. 31–40.
ICSAICSA-2017-Yasaweerasinghelage #architecture #latency #modelling #predict #simulation
Predicting Latency of Blockchain-Based Systems Using Architectural Modelling and Simulation (RY, MS, IW), pp. 253–256.
JCDLJCDL-2017-AlamKWN #re-engineering
Client-Side Reconstruction of Composite Mementos Using ServiceWorker (SA, MK, MCW, MLN), pp. 237–240.
JCDLJCDL-2017-CastroCWPF #framework #platform #semistructured data
Classifying Short Unstructured Data Using the Apache Spark Platform (EPSC, SC, EW, DAP, EAF), pp. 129–138.
JCDLJCDL-2017-ChironDCVM #fault #library #towards
Impact of OCR Errors on the Use of Digital Libraries: Towards a Better Access to Information (GC, AD, MC, MV, JPM), pp. 249–252.
JCDLJCDL-2017-GippBMB #feedback #named #overview
CryptSubmit: Introducing Securely Timestamped Manuscript Submission and Peer Review Feedback Using the Blockchain (BG, CB, NM, JB), pp. 273–276.
JCDLJCDL-2017-HassanAH #identification #information management
Identifying Important Citations Using Contextual Information from Full Text (SUH, AA, PH), pp. 41–48.
JCDLJCDL-2017-KleinS
Discovering Scholarly Orphans Using ORCID (MK, HVdS), pp. 189–198.
JCDLJCDL-2017-KocherS #clustering
Author Clustering Using SPATIUM (MK, JS), pp. 265–268.
JCDLJCDL-2017-YangHHOZKG #identification #learning #library
Smart Library: Identifying Books on Library Shelves Using Supervised Deep Learning for Scene Text Reading (XY, DH, WH, AO, ZZ, DK, CLG), pp. 245–248.
CSEETCSEET-2017-IacobF #education #requirements
Using Extreme Characters to Teach Requirements Engineering (CI, SF), pp. 107–111.
CSEETCSEET-2017-PintoFSG #open source #perspective
Training Software Engineers Using Open-Source Software: The Professors' Perspective (GHLP, FFF, IS, MAG), pp. 117–121.
CSEETCSEET-2017-PortelaVOS #case study #experience #industrial #re-engineering
The Use of Industry Training Strategies in a Software Engineering Course: An Experience Report (CSP, AV, SRBO, MRdAS), pp. 29–36.
EDMEDM-2017-AndresBSGSC #framework #replication #scalability
Studying MOOC Completion at Scale Using the MOOC Replication Framework (JMLA, RSB, GS, DG, CAS, SAC).
EDMEDM-2017-GrawemeyerWSHMP #graph #learning #modelling #student
Using Graph-based Modelling to explore changes in students' affective states during exploratory learning tasks (BG, AW, SGS, WH, MM, AP).
EDMEDM-2017-HongB #learning #predict
A Prediction and Early Alert Model Using Learning Management System Data and Grounded in Learning Science Theory (WJH, MLB).
EDMEDM-2017-LiuL #student
Exploring the Relationship Between Student Pre-knowledge and Engagement in MOOC Class Using Polytomous IRT (JL, HL).
EDMEDM-2017-MadaioLCO #mining #predict
Using Temporal Association Rule Mining to Predict Dyadic Rapport in Peer Tutoring (MAM, RL, JC, AO).
EDMEDM-2017-McBride #simulation #student
Student Use of Inquiry Simulations in Middle School Science (EM).
EDMEDM-2017-McBrideVL #simulation #student
Student Use of Scaffolded Inquiry Simulations in Middle School Science (EM, JMV, MCL).
EDMEDM-2017-MichalenkoLB #feedback #memory management #network #personalisation
Personalized Feedback for Open-Response Mathematical Questions using Long Short-Term Memory Networks (JJM, ASL, RGB).
EDMEDM-2017-MiF #adaptation #recommendation
Adaptive Sequential Recommendation for Discussion Forums on MOOCs using Context Trees (FM, BF).
EDMEDM-2017-ParedesHH #behaviour #comprehension #programming #student
Understanding Student's Reviewing and Reflection Behaviors Using Web-based Programming Grading Assistant (YVMP, PKH, SIHH).
EDMEDM-2017-PatikornSHBZ #detection #multi
Using a Single Model Trained across Multiple Experiments to Improve the Detection of Treatment Effects (TP, DS, NTH, JB, JZ).
EDMEDM-2017-PokrajacSYH #markov #modelling
Modeling Dormitory Occupancy Using Markov Chains (DDP, KS, DY, TH).
EDMEDM-2017-RihakP #education #performance #similarity
Measuring Similarity of Educational Items Using Data on Learners' Performance (JR, RP).
EDMEDM-2017-ShenC #clustering #student
Clustering Student Sequential Trajectories Using Dynamic Time Wrapping (SS, MC).
EDMEDM-2017-ShiPG #analysis #learning #performance
Using an Additive Factor Model and Performance Factor Analysis to Assess Learning Gains in a Tutoring System to Help Adults with Reading Difficulties (GS, PIPJ, ACG).
EDMEDM-2017-WanDGP #predict
Dropout Prediction in MOOCs using Learners' Study Habits Features (HW, JD, XG, DP).
EDMEDM-2017-WangSLP #learning #programming #student
Learning to Represent Student Knowledge on Programming Exercises Using Deep Learning (LW, AS, LL, CP).
EDMEDM-2017-YasudaNKKH #automation #network
Automatic Scoring Method for Descriptive Test Using Recurrent Neural Network (KY, IN, HK, HK, MH).
ICPCICPC-2017-AlexandruPG #behaviour #parsing
Replicating parser behavior using neural machine translation (CVA, SP, HCG), pp. 316–319.
ICPCICPC-2017-HatanoM #compilation #industrial
Removing code clones from industrial systems using compiler directives (TH, AM), pp. 336–345.
ICSMEICSME-2017-ChaparroFM #behaviour #debugging #locality #query
Using Observed Behavior to Reformulate Queries during Text Retrieval-based Bug Localization (OC, JMF, AM), pp. 376–387.
ICSMEICSME-2017-DeshmukhMPSD #debugging #learning #retrieval #towards
Towards Accurate Duplicate Bug Retrieval Using Deep Learning Techniques (JD, KMA, SP, SS, ND), pp. 115–124.
ICSMEICSME-2017-Gupta #maintenance #mining #predict #process
Improving Software Maintenance Using Process Mining and Predictive Analytics (MG0), pp. 681–686.
ICSMEICSME-2017-HanLXLF #learning #predict
Learning to Predict Severity of Software Vulnerability Using Only Vulnerability Description (ZH, XL0, ZX, HL, ZF0), pp. 125–136.
ICSMEICSME-2017-TerdchanakulHPM #classification #debugging #n-gram
Bug or Not? Bug Report Classification Using N-Gram IDF (PT, HH, PP, KM), pp. 534–538.
MSRMSR-2017-CartaxoPRKSSS
Using Q&A websites as a method for assessing systematic reviews (BC, GP0, DMR, FK, RESS, FQBdS, SS), pp. 238–242.
MSRMSR-2017-NiL #classification #effectiveness #predict
Cost-effective build outcome prediction using cascaded classifiers (AN, ML0), pp. 455–458.
MSRMSR-2017-RahmanRK #code review #developer #experience #overview #predict
Predicting usefulness of code review comments using textual features and developer experience (MMR0, CKR, RGK), pp. 215–226.
MSRMSR-2017-RajbahadurWKH #classification #fault #modelling
The impact of using regression models to build defect classifiers (GKR, SW0, YK, AEH), pp. 135–145.
SANERSANER-2017-DurieuxCSM #exception #generative #metaprogramming #null #pointer
Dynamic patch generation for null pointer exceptions using metaprogramming (TD, BC, LS, MM), pp. 349–358.
SANERSANER-2017-LaverdiereM #modelling #security
Computing counter-examples for privilege protection losses using security models (MAL, EM), pp. 240–249.
SANERSANER-2017-LiuLNB #fault #locality #modelling #predict #search-based #testing
Improving fault localization for Simulink models using search-based testing and prediction models (BL, L, SN, LCB), pp. 359–370.
SANERSANER-2017-TangL #approach #mining #named #novel #probability
StiCProb: A novel feature mining approach using conditional probability (YT, HL), pp. 45–55.
SCAMSCAM-2017-0008SMOBL #analysis #consistency #identifier
Investigating the Use of Code Analysis and NLP to Promote a Consistent Usage of Identifiers (BL0, SS, AM, RO, GB, ML), pp. 81–90.
IFM-2017-AronisFS #model checking #testing #verification
Testing and Verifying Chain Repair Methods for Corfu Using Stateless Model Checking (SA, SLF, KS), pp. 227–242.
IFM-2017-FerreiraJMB #authentication #case study #coq #linux #quality
Certified Password Quality - A Case Study Using Coq and Linux Pluggable Authentication Modules (JFF, SAJ, AM, PJB), pp. 407–421.
IFM-2017-KovalovLGL #network #smt
Task-Node Mapping in an Arbitrary Computer Network Using SMT Solver (AK, EL, AG, DL), pp. 177–191.
SEFMSEFM-2017-TomascoN0TP #abstraction #design #memory management #modelling
Using Shared Memory Abstractions to Design Eager Sequentializations for Weak Memory Models (ET, TLN, BF0, SLT, GP), pp. 185–202.
HaskellHaskell-2017-WiegleyD #coq #haskell #performance
Using Coq to write fast and correct Haskell (JW, BD), pp. 52–62.
ICFP-2017-AuerbachHMSS #case study #compilation #coq #experience #prototype #query
Prototyping a query compiler using Coq (experience report) (JSA, MH, LM, AS, JS), p. 15.
AIIDEAIIDE-2017-BunianCCE #behaviour #difference #game studies #modelling
Modeling Individual Differences in Game Behavior Using HMM (SB, AC, RCC, MSEN), pp. 158–164.
AIIDEAIIDE-2017-FarrellW #interactive
Influencing User Choices in Interactive Narratives Using Indexter's Pairwise Event Salience Hypothesis (RF, SGW), pp. 37–42.
AIIDEAIIDE-2017-FarrellW17a #semantics
Causal Link Semantics for Narrative Planning Using Numeric Fluents (RF, SGW), pp. 193–199.
AIIDEAIIDE-2017-ViljanenAHP
A/B-Test of Retention and Monetization Using the Cox Model (MV, AA, JH, TP), pp. 248–254.
CHI-PLAYCHI-PLAY-2017-BoweyM #game studies #prototype
Those are not the Stories you are Looking For: Using Text Prototypes to Evaluate Game Narratives Early (JTB, RLM), pp. 265–276.
CHI-PLAYCHI-PLAY-2017-Peddycord-LiuCK #game studies #question #student #what
Using Serious Game Analytics to Inform Digital Curricular Sequencing: What Math Objective Should Students Play Next? (ZPL, CC, SK, TB, CFL, TR), pp. 195–204.
CoGCIG-2017-ApeldoornV #game studies #knowledge base
Measuring strategic depth in games using hierarchical knowledge bases (DA, VV), pp. 9–16.
CoGCIG-2017-BaldwinDFH #design pattern #game studies #generative
Mixed-initiative procedural generation of dungeons using game design patterns (AB0, SD, JMF, JH), pp. 25–32.
CoGCIG-2017-BrownA #game studies #multi
Using multiple worlds for multiple agent roles in games (JAB, DA), pp. 37–44.
CoGCIG-2017-BurnsT #detection #game studies
Detecting flow in games using facial expressions (AB, JRT), pp. 45–52.
CoGCIG-2017-JiangHT #generative
Procedural generation of angry birds fun levels using pattern-struct and preset-model (YJ0, TH, RT), pp. 154–161.
CoGCIG-2017-JustesenR #learning
Learning macromanagement in starcraft from replays using deep learning (NJ, SR), pp. 162–169.
CoGCIG-2017-MinK #game studies #learning #visual notation
Learning to play visual doom using model-free episodic control (BJM, KJK), pp. 223–225.
CoGCIG-2017-OonishiI #game studies #learning
Improving generalization ability in a puzzle game using reinforcement learning (HO, HI), pp. 232–239.
CoGCIG-2017-PhucNK #behaviour #learning #statistics
Learning human-like behaviors using neuroevolution with statistical penalties (LHP, KN, KI), pp. 207–214.
CoGCIG-2017-SilvaVT #game studies #monte carlo
Using Monte Carlo tree search and google maps to improve game balancing in location-based games (LFMS, WV, FT), pp. 215–222.
CoGCIG-2017-SnodgrassO #generative #multi
Procedural level generation using multi-layer level representations with MdMCs (SS, SO), pp. 280–287.
FDGFDG-2017-Abuzuraiq #clustering #constraints #generative #graph #morphism #on the
On using graph partitioning with isomorphism constraint in procedural content generation (AMA), p. 10.
FDGFDG-2017-AllartLPGN #analysis #game studies #motivation #video
Difficulty influence on motivation over time in video games using survival analysis (TA, GL, MP, AG, SN), p. 6.
FDGFDG-2017-CampbellV
Exploration in NetHack using occupancy maps (JC, CV), p. 4.
FDGFDG-2017-CleghernLOR #modelling #predict
Predicting future states in DotA 2 using value-split models of time series attribute data (ZC, SL, OYÖ, DLR), p. 10.
FDGFDG-2017-Mawhorter #case study #generative #performance #product line #representation
Efficiency, realism, and representation in generated content: a case study using family tree generation (PAM), p. 4.
FDGFDG-2017-MelcerI17a #challenge #collaboration #education #game studies #programming
Embodiment, collaboration, and challenge in educational programming games: exploring use of tangibles and mouse (EFM, KI), p. 6.
FDGFDG-2017-MurrayMW #graph #interactive
Proposal for analyzing player emotions in an interactive narrative using story intention graphs (JTM, MM, NWF), p. 4.
FDGFDG-2017-SeguraIBW #design
Design, appropriation, and use of technology in larps (EMS, KI, JB, AW), p. 4.
CoGVS-Games-2017-FerkovaZUM #database #image #re-engineering
Single image reconstruction of human faces using database of depth images (ZF, MZ, PU, PM), pp. 109–116.
CoGVS-Games-2017-KontadakisCPM #3d #low cost
Gamified 3D orthopaedic rehabilitation using low cost and portable inertial sensors (GK, DC, DP, KM), pp. 165–168.
CIKMCIKM-2017-BouadjenekVZ #biology #learning #sequence
Learning Biological Sequence Types Using the Literature (MRB, KV, JZ), pp. 1991–1994.
CIKMCIKM-2017-BrayteeLCK #correlation #feature model #multi
Multi-Label Feature Selection using Correlation Information (AB, WL0, DRC, PJK), pp. 1649–1656.
CIKMCIKM-2017-ChavaryEL #mining #network
Summarizing Significant Changes in Network Traffic Using Contrast Pattern Mining (EAC, SME, CL), pp. 2015–2018.
CIKMCIKM-2017-DasMBS #word
Estimating Event Focus Time Using Neural Word Embeddings (SD, AM, KB, VS), pp. 2039–2042.
CIKMCIKM-2017-DhakadDBDKM #named #process
SOPER: Discovering the Influence of Fashion and the Many Faces of User from Session Logs using Stick Breaking Process (LD, MKD, CB, SD, MK, VM), pp. 1609–1618.
CIKMCIKM-2017-DingLHM #fault tolerance #performance #recommendation
Efficient Fault-Tolerant Group Recommendation Using alpha-beta-core (DD, HL, ZH0, NM), pp. 2047–2050.
CIKMCIKM-2017-GarciaM #energy #network
Inferring Appliance Energy Usage from Smart Meters using Fully Convolutional Encoder Decoder Networks (FCCG, EQBM), pp. 2075–2078.
CIKMCIKM-2017-GaurBB #graph #query
Tracking the Impact of Fact Deletions on Knowledge Graph Queries using Provenance Polynomials (GG, SJB, AB0), pp. 2079–2082.
CIKMCIKM-2017-GuptaLHA #induction #sequence #taxonomy
Taxonomy Induction Using Hypernym Subsequences (AG, RL, HH, KA), pp. 1329–1338.
CIKMCIKM-2017-HalderKS #concurrent #health #recommendation #thread #topic
Health Forum Thread Recommendation Using an Interest Aware Topic Model (KH, MYK, KS), pp. 1589–1598.
CIKMCIKM-2017-KhandpurJJ0LR #crowdsourcing #detection #social #social media
Crowdsourcing Cybersecurity: Cyber Attack Detection using Social Media (RPK, TJ, STKJ, GW0, CTL, NR), pp. 1049–1057.
CIKMCIKM-2017-KhoaAW #analysis #framework #incremental #maintenance
Smart Infrastructure Maintenance Using Incremental Tensor Analysis: Extended Abstract (NLDK, AA, YW), pp. 959–967.
CIKMCIKM-2017-KimJY #multi #online
Construction of a National Scale ENF Map using Online Multimedia Data (HK, YBJ, JWY), pp. 19–28.
CIKMCIKM-2017-KwonKS #recognition #robust
A Robust Named-Entity Recognition System Using Syllable Bigram Embedding with Eojeol Prefix Information (SK, YK, JS), pp. 2139–2142.
CIKMCIKM-2017-MehrotraY #learning #query
Task Embeddings: Learning Query Embeddings using Task Context (RM, EY), pp. 2199–2202.
CIKMCIKM-2017-Ni0ZYM #fine-grained #learning #metric #similarity
Fine-grained Patient Similarity Measuring using Deep Metric Learning (JN, JL0, CZ, DY, ZM), pp. 1189–1198.
CIKMCIKM-2017-ParmarBBK #online #process
Forecasting Ad-Impressions on Online Retail Websites using Non-homogeneous Hawkes Processes (KP, SB, SB, SK), pp. 1089–1098.
CIKMCIKM-2017-ProskurniaM0AC #detection #documentation #performance #topic
Efficient Document Filtering Using Vector Space Topic Expansion and Pattern-Mining: The Case of Event Detection in Microposts (JP, RM, CC0, KA, PCM), pp. 457–466.
CIKMCIKM-2017-TengLW #detection #learning #multi #network
Anomaly Detection in Dynamic Networks using Multi-view Time-Series Hypersphere Learning (XT, YRL, XW), pp. 827–836.
CIKMCIKM-2017-VellosoD #approach #web
Extracting Records from the Web Using a Signal Processing Approach (RPV, CFD), pp. 197–206.
CIKMCIKM-2017-WangCL #graph #twitter
Using Knowledge Graphs to Explain Entity Co-occurrence in Twitter (YW, MJC, YFL), pp. 2351–2354.
CIKMCIKM-2017-YeHHCLQS #classification
Nationality Classification Using Name Embeddings (JY, SH, YH, BC, ML, HQ, SS), pp. 1897–1906.
CIKMCIKM-2017-ZhangH #ambiguity #graph #network
Name Disambiguation in Anonymized Graphs using Network Embedding (BZ, MAH), pp. 1239–1248.
CIKMCIKM-2017-ZhangJT #retrieval
Temporal Analog Retrieval using Transformation over Dual Hierarchical Structures (YZ, AJ, KT), pp. 717–726.
CIKMCIKM-2017-ZhiSLZ0 #database #named #realtime #verification #web
ClaimVerif: A Real-time Claim Verification System Using the Web and Fact Databases (SZ, YS, JL, CZ0, JH0), pp. 2555–2558.
ECIRECIR-2017-AletrasM #image #network #topic
Labeling Topics with Images Using a Neural Network (NA, AM), pp. 500–505.
ECIRECIR-2017-ArguelloA0 #performance #predict #query
Using Query Performance Predictors to Reduce Spoken Queries (JA, SA, FD0), pp. 27–39.
ECIRECIR-2017-AyadiKHDJ #image #learning
Learning to Re-rank Medical Images Using a Bayesian Network-Based Thesaurus (HA, MTK, JXH, MD, MBJ), pp. 160–172.
ECIRECIR-2017-BaruaP #classification #query
Named Entity Classification Using Search Engine's Query Suggestions (JB, DP), pp. 612–618.
ECIRECIR-2017-J0V #twitter
Improving Tweet Representations Using Temporal and User Context (GJ, MG0, VV), pp. 575–581.
ECIRECIR-2017-McDonaldMO #classification #semantics #word
Enhancing Sensitivity Classification with Semantic Features Using Word Embeddings (GM, CM, IO), pp. 450–463.
ECIRECIR-2017-ParamitaCG #similarity #wiki
Using Section Headings to Compute Cross-Lingual Similarity of Wikipedia Articles (MLP, PDC, RJG), pp. 633–639.
ICMLICML-2017-BernsteinMSSHM #learning #modelling #visual notation
Differentially Private Learning of Undirected Graphical Models Using Collective Graphical Models (GB, RM, TS, DS, MH, GM), pp. 478–487.
ICMLICML-2017-BoraJPD #generative #modelling
Compressed Sensing using Generative Models (AB, AJ, EP, AGD), pp. 537–546.
ICMLICML-2017-ChenKB #equation #identification #linear #modelling #testing
Identification and Model Testing in Linear Structural Equation Models using Auxiliary Variables (BC, DK, EB), pp. 757–766.
ICMLICML-2017-ChouMS #learning #policy #probability
Improving Stochastic Policy Gradients in Continuous Control with Deep Reinforcement Learning using the Beta Distribution (PWC, DM, SAS), pp. 834–843.
ICMLICML-2017-EcksteinGK #generative
Rule-Enhanced Penalized Regression by Column Generation using Rectangular Maximum Agreement (JE, NG, AK), pp. 1059–1067.
ICMLICML-2017-JaderbergCOVGSK #interface
Decoupled Neural Interfaces using Synthetic Gradients (MJ, WMC, SO, OV, AG, DS, KK), pp. 1627–1635.
ICMLICML-2017-Kallus #clustering #personalisation #recursion
Recursive Partitioning for Personalization using Observational Data (NK), pp. 1789–1798.
ICMLICML-2017-MhammediHRB #network #orthogonal #performance
Efficient Orthogonal Parametrisation of Recurrent Neural Networks Using Householder Reflections (ZM, ADH, AR, JB0), pp. 2401–2409.
ICMLICML-2017-MollaysaSK #modelling
Regularising Non-linear Models Using Feature Side-information (AM, PS, AK), pp. 2508–2517.
ICMLICML-2017-NguyenLST #machine learning #named #novel #probability #problem #recursion
SARAH: A Novel Method for Machine Learning Problems Using Stochastic Recursive Gradient (LMN, JL, KS, MT), pp. 2613–2621.
ICMLICML-2017-SchlegelPCW #adaptation #kernel #online
Adapting Kernel Representations Online Using Submodular Maximization (MS, YP, JC, MW), pp. 3037–3046.
ICMLICML-2017-Villacampa-Calvo #classification #multi #process #scalability
Scalable Multi-Class Gaussian Process Classification using Expectation Propagation (CVC, DHL), pp. 3550–3559.
ICMLICML-2017-YangHSB #modelling
Improved Variational Autoencoders for Text Modeling using Dilated Convolutions (ZY, ZH, RS, TBK), pp. 3881–3890.
KDDKDD-2017-AgarwalBSJ #effectiveness #evaluation #feedback #multi
Effective Evaluation Using Logged Bandit Feedback from Multiple Loggers (AA, SB0, TS, TJ), pp. 687–696.
KDDKDD-2017-AlbertKG #identification #network #scalability
Using Convolutional Networks and Satellite Imagery to Identify Patterns in Urban Environments at a Large Scale (AA, JK, MCG), pp. 1357–1366.
KDDKDD-2017-ChamberlainCLPD #predict
Customer Lifetime Value Prediction Using Embeddings (BPC, ÂC, CHBL, RP, MPD), pp. 1753–1762.
KDDKDD-2017-EmraniMX #learning #multi
Prognosis and Diagnosis of Parkinson's Disease Using Multi-Task Learning (SE, AM, WX), pp. 1457–1466.
KDDKDD-2017-FoxAJPW
Contextual Motifs: Increasing the Utility of Motifs using Contextual Data (IF, LA, MJ, RPB, JW), pp. 155–164.
KDDKDD-2017-LiHG #concept #enterprise #spreadsheet
Discovering Enterprise Concepts Using Spreadsheet Tables (KL, YH, KG), pp. 1873–1882.
KDDKDD-2017-MaurusP #detection
Let's See Your Digits: Anomalous-State Detection using Benford's Law (SM, CP), pp. 977–986.
KDDKDD-2017-MottiniA #network #pointer #predict
Deep Choice Model Using Pointer Networks for Airline Itinerary Prediction (AM, RAA), pp. 1575–1583.
KDDKDD-2017-WoodsAMM #feedback #modelling #predict
Formative Essay Feedback Using Predictive Scoring Models (BW, DA, SM, EM), pp. 2071–2080.
ICMTICMT-2017-BurguenoHVG #modelling #testing
Testing Transformation Models Using Classifying Terms (LB, FH, AV, MG), pp. 69–85.
ICMTICMT-2017-GerkingSB #imperative
Reducing the Verbosity of Imperative Model Refinements by Using General-Purpose Language Facilities (CG, DS, IB), pp. 19–34.
OOPSLAOOPSLA-2017-MazinanianKTD #comprehension #java
Understanding the use of lambda expressions in Java (DM, AK, NT, DD), p. 31.
OOPSLAOOPSLA-2017-WangDS #automaton #finite #synthesis
Synthesis of data completion scripts using finite tree automata (XW0, ID, RS), p. 26.
AdaEuropeAdaEurope-2017-JeongYB #transaction
Lock Elision for Protected Objects Using Intel Transactional Synchronization Extensions (SJ, SY, BB), pp. 121–136.
PADLPADL-2017-MantadelisR #logic #probability
Using Iterative Deepening for Probabilistic Logic Inference (TM, RR0), pp. 198–213.
PEPMPEPM-2017-HengleinR #dynamic analysis #parsing expression grammar
PEG parsing in less space using progressive tabling and dynamic analysis (FH, UTR), pp. 35–46.
PEPMPEPM-2017-WolffH #typescript
Refining types using type guards in TypeScript (IGdW, JH), pp. 111–122.
PLDIPLDI-2017-HuD #automation #transducer
Automatic program inversion using symbolic transducers (QH, LD), pp. 376–389.
PLDIPLDI-2017-PetrashkoLO #compilation #composition #named #performance #program transformation
Miniphases: compilation using modular and efficient tree transformations (DP, OL, MO), pp. 201–216.
POPLPOPL-2017-SrikanthSH #complexity #theorem #verification
Complexity verification using guided theorem enumeration (AS, BS, WRH), pp. 639–652.
QAPLQAPL-2017-LidmanS #fuzzy #logic #program analysis
Bridging Static and Dynamic Program Analysis using Fuzzy Logic (JL, JS), pp. 111–126.
SASSAS-2017-OuadjaoutM #communication #markov #protocol #static analysis
Quantitative Static Analysis of Communication Protocols Using Abstract Markov Chains (AO, AM), pp. 277–298.
ASEASE-2017-Abdelrasoul #order #random #scheduling
Promoting secondary orders of event pairs in randomized scheduling using a randomized stride (MA), pp. 741–752.
ASEASE-2017-JiangAM #automation #commit #generative
Automatically generating commit messages from diffs using neural machine translation (SJ, AA, CM), pp. 135–146.
ASEASE-2017-KrugerNRAMBGGWD #developer #encryption #named
CogniCrypt: supporting developers in using cryptography (SK, SN, MR, KA0, MM, EB, FG, FG0, CW, DD, RK), pp. 931–936.
ASEASE-2017-LinZZX #concept #retrieval #source code
Improving software text retrieval using conceptual knowledge in source code (ZL, YZ, JZ, BX), pp. 123–134.
ASEASE-2017-NguyenDV #invariant #named
SymInfer: inferring program invariants using symbolic states (TN, MBD, WV), pp. 804–814.
ASEASE-2017-RahmanR #concept #documentation #query
Improved query reformulation for concept location using CodeRank and document structures (MMR, CKR), pp. 428–439.
ASEASE-2017-Sultana #metric #predict #towards
Towards a software vulnerability prediction model using traceable code patterns and software metrics (KZS), pp. 1022–1025.
ASEASE-2017-SunCWB
Improving missing issue-commit link recovery using positive and unlabeled data (YS, CC, QW0, BWB), pp. 147–152.
ESEC-FSEESEC-FSE-2017-Abdalkareem #developer #perspective
Reasons and drawbacks of using trivial npm packages: the developers' perspective (RA), pp. 1062–1064.
ESEC-FSEESEC-FSE-2017-LabuschagneIH #case study #cost analysis #integration #java #testing
Measuring the cost of regression testing in practice: a study of Java projects using continuous integration (AL, LI, RH), pp. 821–830.
ESEC-FSEESEC-FSE-2017-MaggioPFH #automation #multi
Automated control of multiple software goals using multiple actuators (MM, AVP, AF, HH), pp. 373–384.
ESEC-FSEESEC-FSE-2017-NairMSA
Using bad learners to find good configurations (VN, TM, NS, SA), pp. 257–267.
ESEC-FSEESEC-FSE-2017-Oliveira #architecture #co-evolution #dependence #fine-grained #named #refactoring
DRACO: discovering refactorings that improve architecture using fine-grained co-change dependencies (MCdO0), pp. 1018–1021.
ESEC-FSEESEC-FSE-2017-Schramm #automation #heuristic #performance #program repair
Improving performance of automatic program repair using learned heuristics (LS), pp. 1071–1073.
ESEC-FSEESEC-FSE-2017-Wang #adaptation #nondeterminism #re-engineering #search-based #self
Using search-based software engineering to handle the changes with uncertainties for self-adaptive systems (LW), pp. 1014–1017.
ESEC-FSEESEC-FSE-2017-YiAKTR #automation #program repair #programming
A feasibility study of using automated program repair for introductory programming assignments (JY, UZA, AK, SHT, AR), pp. 740–751.
ICSE-2017-0004CC #learning #semantics #traceability
Semantically enhanced software traceability using deep learning techniques (JG0, JC, JCH), pp. 3–14.
GPCEGPCE-2017-GrebeYG #compilation #domain-specific language #haskell
Rewriting a shallow DSL using a GHC compiler extension (MG, DY, AG), pp. 246–258.
SLESLE-2017-BrambillaCIM #crowdsourcing #domain-specific language
Better call the crowd: using crowdsourcing to shape the notation of domain-specific languages (MB, JC, JLCI, AM), pp. 129–138.
ASPLOSASPLOS-2017-GeCJ #control flow #named
GRIFFIN: Guarding Control Flows Using Intel Processor Trace (XG, WC, TJ), pp. 585–598.
ASPLOSASPLOS-2017-RenLDQWLQY #named #network #probability
SC-DCNN: Highly-Scalable Deep Convolutional Neural Network using Stochastic Computing (AR, ZL0, CD, QQ, YW, JL0, XQ, BY0), pp. 405–418.
CASECASE-2017-0013YG #graph #image #optimisation
Accurate image mosaicing for bridge deck using graph optimization with GPS data (FL0, JY, NG), pp. 1090–1095.
CASECASE-2017-CarliD #distributed #grid #monitoring #multi #smarttech
Using the distributed proximal alternating direction method of multipliers for smart grid monitoring (RC, MD), pp. 418–423.
CASECASE-2017-CarliD17a #distributed #energy #programming #scalability
A decentralized control strategy for energy retrofit planning of large-scale street lighting systems using dynamic programming (RC, MD), pp. 1196–1200.
CASECASE-2017-ChenZ #automation #detection #multi
An automatic seizure detection method using multi-channel EEG signals (SC, XZ0), pp. 94–95.
CASECASE-2017-DuHZL #automation #petri net #robust
Robust control of automated manufacturing systems with complex structures using Petri Nets (ND, HH, YZ0, YL0), pp. 364–369.
CASECASE-2017-HuangMY #algorithm #difference #evolution #performance #throughput
Forecasting of throughput performance using an ARMA model with improved differential evolution algorithm (JTH, YM, YY), pp. 376–381.
CASECASE-2017-InuiKU #gpu #parallel #performance
Fast extraction of cutter engagement features by using the parallel processing function of a GPU (MI, MK, NU), pp. 668–673.
CASECASE-2017-KeL #mobile #predict #robust #visual notation
Visual servoing of constrained differential-drive mobile robots using robust tube-based predictive control (FK, ZL0), pp. 1073–1078.
CASECASE-2017-KongN #approach #fault #predict
A practical yield prediction approach using inline defect metrology data for system-on-chip integrated circuits (YK, DN), pp. 744–749.
CASECASE-2017-LeeJFBGBL #analysis #modelling #process #simulation
Modeling and analysis of postoperative intervention process for total joint replacement patients using simulations (HKL, RJ, YF, PAB, JG, CB, JL), pp. 568–573.
CASECASE-2017-LiangMLLG #automation #industrial #learning
Using dVRK teleoperation to facilitate deep learning of automation tasks for an industrial robot (JL, JM, ML, PL, KG), pp. 1–8.
CASECASE-2017-LiLHTCLW #analysis
The mechanism analysis of bipolar vessel sealing in vitro using EDM model (LL, LL, ZH, MT, RC, HL, JW), pp. 813–818.
CASECASE-2017-OhKKSC
Calibration of 6 axis force/torque sensor by using deep-learning method (HSO, GK, UK, JKS, HRC), pp. 1316–1317.
CASECASE-2017-QinLG #data analysis #energy #internet
Data analytics for energy consumption of digital manufacturing systems using Internet of Things method (JQ, YL, RIG), pp. 482–487.
CASECASE-2017-SugimotoMMM #3d #modelling
A 3D block printer using toy bricks for various models (CS, YM, TM, SM), pp. 958–963.
CASECASE-2017-SunLYLL #simulation #smarttech
Muscle control of fore-aft and vertical body center of mass accelerations of human slip recovery gait: A simulation study using wearable sensor shoes (WS, GL, JY, QL, TL0), pp. 1408–1413.
CASECASE-2017-SunLZJ #framework #functional #learning
Exploring functional variant using a deep learning framework (TS, ZL, XMZ, RJ), pp. 98–99.
CASECASE-2017-ToneS
A ferrofluid-based robotic sheet for liquid manipulation by using vibration control (TT, KS), pp. 776–781.
CASECASE-2017-WangOLC #big data #problem #self
Capacitated competitive facility location problem of self-collection lockers by using public big data (YW0, TO, LHL, EPC), p. 1344.
CASECASE-2017-WangW #approach #constraints #higher-order #programming
Resolve reactive robot control with perturbed constraints using a second order cone programming approach (YW, LW), pp. 124–129.
CASECASE-2017-WangZLHSMGY #online
Smart control of indoor thermal environment based on online learned thermal comfort model using infrared thermal imaging (FW, BZ, RL, DH, ZS, SM, ZG, WY), pp. 924–925.
CASECASE-2017-Xiao #constraints
Selecting the best system using transient means with sequential sampling constraints (HX), p. 1052.
CASECASE-2017-ZhangJ17a #estimation
An occupancy distribution estimation method using the surveillance cameras in buildings (CZ, QSJ), pp. 894–899.
CCCC-2017-ShirakoHS #gpu #parallel
Optimized two-level parallelization for GPU accelerators using the polyhedral model (JS, AH, VS), pp. 22–33.
CGOCGO-2017-SenguptaCBK #bound #hardware #memory management #named #transaction
Legato: end-to-end bounded region serializability using commodity hardware transactional memory (AS, MC, MDB, MK0), pp. 1–13.
ESOPESOP-2017-0001P #source code #syntax
Programs Using Syntax with First-Class Binders (FF0, BP), pp. 504–529.
ESOPESOP-2017-KhyzhaDGP #partial order #proving
Proving Linearizability Using Partial Orders (AK, MD, AG, MJP), pp. 639–667.
ESOPESOP-2017-KopS #complexity #higher-order #nondeterminism #power of #programming
The Power of Non-determinism in Higher-Order Implicit Complexity - Characterising Complexity Classes Using Non-deterministic Cons-Free Programming (CK, JGS), pp. 668–695.
FASEFASE-2017-LeblebiciAS #consistency #graph grammar #linear #optimisation
Inter-model Consistency Checking Using Triple Graph Grammars and Linear Optimization Techniques (EL, AA, AS), pp. 191–207.
CAVCAV-2017-Vafeiadis #consistency #logic #memory management #verification
Program Verification Under Weak Memory Consistency Using Separation Logic (VV), pp. 30–46.
CAVCAV-2017-BouajjaniEEM #proving #simulation
Proving Linearizability Using Forward Simulations (AB, ME, CE, SOM), pp. 542–563.
CAVCAV-2017-ReynoldsWBBLT #scalability #string
Scaling Up DPLL(T) String Solvers Using Context-Dependent Simplification (AR, MW, CWB, DB, TL, CT), pp. 453–474.
ICSTICST-2017-ChanWSPS #analysis #concurrent #fault #invariant #multi #named #source code #thread
IPA: Error Propagation Analysis of Multi-Threaded Programs Using Likely Invariants (AC, SW0, HS, KP, NS), pp. 184–195.
ICSTICST-2017-ConverseOK #execution #generative #semantics #symbolic computation #testing
Non-Semantics-Preserving Transformations for Higher-Coverage Test Generation Using Symbolic Execution (HC, OO, SK), pp. 241–252.
ICSTICST-2017-DarkeCCV #abstraction #bound #model checking #performance #proving #safety
Efficient Safety Proofs for Industry-Scale Code Using Abstractions and Bounded Model Checking (PD, BC, AC, RV), pp. 468–475.
ICSTICST-2017-DiasFFLSSV #concurrent #contract #source code #verification
Verifying Concurrent Programs Using Contracts (RJD, CF0, JF, JML, AS, DGS, TV), pp. 196–206.
ICSTICST-2017-LinWC #semantics #similarity #testing #web
Using Semantic Similarity in Crawling-Based Web Application Testing (JWL, FW, PC), pp. 138–148.
ICSTICST-2017-LuckowKP #analysis #complexity
Symbolic Complexity Analysis Using Context-Preserving Histories (KSL, RK, CSP), pp. 58–68.
ICSTICST-2017-SunRJB #android #named #runtime #verification #weaving
ADRENALIN-RV: Android Runtime Verification Using Load-Time Weaving (HS, AR, OJ, WB), pp. 532–539.
ICSTICST-2017-XuLC #concurrent #data type #debugging #testing
Using Delta Debugging to Minimize Stress Tests for Concurrent Data Structures (JX, YL, RHC), pp. 35–46.
ICTSSICTSS-2017-HusterSRKR #robust #testing #verification
Using Robustness Testing to Handle Incomplete Verification Results When Combining Verification and Testing Techniques (SH, JS, JR, TK, WR), pp. 54–70.
ICTSSICTSS-2017-SalvaR #integration #security #testing
Using Data Integration for Security Testing (SS, LR), pp. 178–194.
ICTSSICTSS-2017-SimosBDGKLW #combinator #execution #framework #testing
Testing TLS Using Combinatorial Methods and Execution Framework (DES, JB, FD, BG, KK, YL, FW), pp. 162–177.
VMCAIVMCAI-2017-BotbolCG #communication #process #static analysis #transducer
Static Analysis of Communicating Processes Using Symbolic Transducers (VB, EC, TLG), pp. 73–90.
VMCAIVMCAI-2017-FerraraT0K #abstract interpretation #fault
Using Abstract Interpretation to Correct Synchronization Faults (PF, OT, PL0, EK), pp. 187–208.
VMCAIVMCAI-2017-GuW #analysis #float #source code
Stabilizing Floating-Point Programs Using Provenance Analysis (YG, TW), pp. 228–245.
VMCAIVMCAI-2017-MonatM #abstract interpretation #abstraction #concurrent #precise #relational #source code #thread
Precise Thread-Modular Abstract Interpretation of Concurrent Programs Using Relational Interference Abstractions (RM, AM), pp. 386–404.
VMCAIVMCAI-2017-OzeriPRS #abstract interpretation
Conjunctive Abstract Interpretation Using Paramodulation (OO, OP, NR, MS), pp. 442–461.
CBSECBSE-2016-CrnkovicMMS #architecture #component #cyber-physical #on the
On the Use of Component-Based Principles and Practices for Architecting Cyber-Physical Systems (IC, IM, HM, MS), pp. 23–32.
CBSECBSE-2016-StevaneticZ #architecture #component #experience #metric #modelling
Exploring the Understandability of Components in Architectural Component Models Using Component Level Metrics and Participants' Experience (SS, UZ), pp. 1–6.
ECSAECSA-2016-ErsoyKAS #architecture #clustering #re-engineering
Using Hypergraph Clustering for Software Architecture Reconstruction of Data-Tier Software (EE, KK, MA, HS), pp. 326–333.
QoSAQoSA-2016-LehrigB #as a service #case study #modelling #performance
Using Performance Models for Planning the Redeployment to Infrastructure-as-a-Service Environments: A Case Study (SL, SB0), pp. 11–20.
WICSAWICSA-2016-KazmanCHH #architecture #design #summary #tutorial
Tutorial Summary for Designing Software Architectures Using ADD 3.0 (RK, HC, SH, OH), p. 253.
WICSAWICSA-2016-SobernigZ #architecture #design
Distilling Architectural Design Decisions and Their Relationships Using Frequent Item-Sets (SS, UZ), pp. 61–70.
JCDLJCDL-2016-BornandBS #classification
Routing Memento Requests Using Binary Classifiers (NJB, LB, HVdS), pp. 63–72.
JCDLJCDL-2016-Frick #framework #library #platform #research
The State of Practice and Use of Digital Collections: The Digital Public Library of America as a platform for research (RF), p. 3.
JCDLJCDL-2016-JettNCPD #comparative #library #metadata #ontology #overview
Enhancing Scholarly Use of Digital Libraries: A Comparative Survey and Review of Bibliographic Metadata Ontologies (JJ, TNF, TWC, KRP, JSD), pp. 35–44.
CSEETCSEET-2016-FreitasSM #learning #student
Using an Active Learning Environment to Increase Students' Engagement (SAAdF, WCMPS, GM), pp. 232–236.
CSEETCSEET-2016-GeorgasPM #architecture #learning #runtime #visualisation
Supporting Software Architecture Learning Using Runtime Visualization (JCG, JDP, MJM), pp. 101–110.
CSEETCSEET-2016-LiebelHS #education #industrial #modelling #tool support
Impact of the Use of Industrial Modelling Tools on Modelling Education (GL, RH, JPS), pp. 18–27.
CSEETCSEET-2016-SrinivasanLY #comprehension #diagrams #object-oriented #programming #sequence chart
Enhancing Object-Oriented Programming Comprehension Using Optimized Sequence Diagram (MS, YL, JY), pp. 81–85.
EDMEDM-2016-ChenDP #diagrams #problem
Examining the necessity of problem diagrams using MOOC AB experiments (ZC, ND, DEP), pp. 579–580.
EDMEDM-2016-FouhFHKS #data analysis #data type #topic
Investigating Difficult Topics in a Data Structures Course Using Item Response Theory and Logged Data Analysis (EF, MFF, SH, KHK, CAS), pp. 370–375.
EDMEDM-2016-Kyrilov #automation #feedback #programming #reasoning
Using Case-Based Reasoning to Automatically Generate High-Quality Feedback for Programming Exercises (AK), pp. 669–671.
EDMEDM-2016-LiuDS #data type #data-driven #multi #towards
Beyond Log Files: Using Multi-Modal Data Streams Towards Data-Driven KC Model Improvement (RL0, JLD, JCS), pp. 436–441.
EDMEDM-2016-Mojarad #performance #student
Studying Assignment Size and Student Performance Using Propensity Score Matching (SM), pp. 701–702.
EDMEDM-2016-NgHLK #learning #modelling #sequence
Modelling the way: Using action sequence archetypes to differentiate learning pathways from learning outcomes (KHRN, KH, KL, AWHK), pp. 167–174.
EDMEDM-2016-NogaitoYK #automation #case study #similarity #testing
Study on Automatic Scoring of Descriptive Type Tests using Text Similarity Calculations (IN, KY, HK), pp. 616–617.
EDMEDM-2016-Penteado #assessment #data mining #estimation #mining #scalability #semantics
Estimation of prerequisite skills model from large scale assessment data using semantic data mining (BEP), pp. 675–677.
EDMEDM-2016-RaffertyJG #feedback #personalisation
Using Inverse Planning for Personalized Feedback (ANR, RJ, TLG), pp. 472–477.
EDMEDM-2016-RenRJ #modelling #multi #performance #predict
Predicting Performance on MOOC Assessments using Multi-Regression Models (ZR, HR, AJ), pp. 484–489.
EDMEDM-2016-Yee-KingGd #collaboration #learning #metric #online #predict #social #student
Predicting student grades from online, collaborative social learning metrics using K-NN (MYK, AGR, Md), pp. 654–655.
EDMEDM-2016-ZhengKTG #clustering #concept #physics
Soft Clustering of Physics Misconceptions Using a Mixed Membership Model (GZ, SK, YT, AG), pp. 658–659.
ICPCICPC-2016-MetcalfFYF #interactive #parametricity #static analysis
Extracting configuration parameter interactions using static analysis (CAM, FF, TY, JF), pp. 1–4.
ICSMEICSME-2016-AndersonDS #testing
Customized Regression Testing Using Telemetry Usage Patterns (JA, HD, SS), pp. 572–581.
ICSMEICSME-2016-GopinathWHK #fault #machine learning
Repairing Intricate Faults in Code Using Machine Learning and Path Exploration (DG, KW, JH, SK), pp. 453–457.
ICSMEICSME-2016-KargenS #towards
Towards Accurate Binary Correspondence Using Runtime-Observed Values (UK, NS), pp. 438–442.
ICSMEICSME-2016-KhourySH #comprehension #principle
Key Elements Extraction and Traces Comprehension Using Gestalt Theory and the Helmholtz Principle (RK, LS, AHL), pp. 478–482.
ICSMEICSME-2016-LevinY #developer #maintenance #predict #process #semantics
Using Temporal and Semantic Developer-Level Information to Predict Maintenance Activity Profiles (SL, AY), pp. 463–467.
ICSMEICSME-2016-NguyenNN #fine-grained #source code #topic
Using Topic Model to Suggest Fine-Grained Source Code Changes (HAN, ATN0, TNN), pp. 200–210.
ICSMEICSME-2016-PalombaZFLO #debugging #performance #predict #smell
Smells Like Teen Spirit: Improving Bug Prediction Performance Using the Intensity of Code Smells (FP, MZ, FAF, ADL, RO), pp. 244–255.
ICSMEICSME-2016-XiaBLL #automation #case study #debugging #fault #harmful #locality #scalability #user study
“Automated Debugging Considered Harmful” Considered Harmful: A User Study Revisiting the Usefulness of Spectra-Based Fault Localization Techniques with Professionals Using Real Bugs from Large Systems (XX0, LB, DL0, SL), pp. 267–278.
MSRMSR-2016-DamevskiCSP #developer #interactive #markov
Interactive exploration of developer interaction traces using a hidden markov model (KD, HC0, DCS, LLP), pp. 126–136.
MSRMSR-2016-KikasDP #git #predict
Using dynamic and contextual features to predict issue lifetime in GitHub projects (RK, MD, DP), pp. 291–302.
MSRMSR-2016-RolfsnesMABB #recommendation
Improving change recommendation using aggregated association rules (TR, LM, SDA, RB, DWB), pp. 73–84.
SANERSANER-2016-0029BKT #android #library
An Investigation into the Use of Common Libraries in Android Apps (LL0, TFB, JK, YLT), pp. 403–414.
SANERSANER-2016-BorckBSHHJSS #named #source code
Frankencode: Creating Diverse Programs Using Code Clones (HB, MSB, IJDS, SAH, KH, SJ, AS, MS), pp. 604–608.
SANERSANER-2016-MazinanianT #css #empirical #preprocessor
An Empirical Study on the Use of CSS Preprocessors (DM, NT), pp. 168–178.
SANERSANER-2016-MendesVHS #identification #random
Identifying Utility Functions Using Random Forests (TM, MTV, ACH, AS), pp. 614–618.
SANERSANER-2016-NishimuraM #fine-grained
Supporting Merge Conflict Resolution by Using Fine-Grained Code Change History (YN, KM), pp. 661–664.
SANERSANER-2016-PanichellaDOPPL #algorithm #search-based
Parameterizing and Assembling IR-Based Solutions for SE Tasks Using Genetic Algorithms (AP, BD, RO, MDP, DP, ADL), pp. 314–325.
SANERSANER-2016-RahmanRL #api #automation #crowdsourcing #named #recommendation
RACK: Automatic API Recommendation Using Crowdsourced Knowledge (MMR0, CKR, DL0), pp. 349–359.
SANERSANER-2016-ZhengRSLSJBCQB #analysis #hybrid #named
AutoBench: Finding Workloads That You Need Using Pluggable Hybrid Analyses (YZ, AR, LS, YL0, HS, OJ, LB, LYC, ZQ, WB), pp. 639–643.
CIAACIAA-2016-StasioMPV #algorithm #game studies
Solving Parity Games Using an Automata-Based Algorithm (ADS, AM, GP, MYV), pp. 64–76.
CIAACIAA-2016-WeidemanMBW #ambiguity #automaton #backtracking #behaviour #nondeterminism #regular expression
Analyzing Matching Time Behavior of Backtracking Regular Expression Matchers by Using Ambiguity of NFA (NW, BvdM, MB, BWW), pp. 322–334.
DLTDLT-2016-Basten #ambiguity #automaton #detection #multi
Context-Free Ambiguity Detection Using Multi-stack Pushdown Automata (HJSB), pp. 1–12.
FMFM-2016-CavadaCCRT #design #embedded #energy #modelling
Model-Based Design of an Energy-System Embedded Controller Using Taste (RC, AC, LC, MR, ST), pp. 741–747.
FMFM-2016-StoenescuSPI #analysis #execution #framework #named #symbolic computation
RIVER: A Binary Analysis Framework Using Symbolic Execution and Reversible x86 Instructions (TS, AS, SP, FI), pp. 779–785.
FMFM-2016-VakiliD #finite #logic #similarity
Finite Model Finding Using the Logic of Equality with Uninterpreted Functions (AV, NAD), pp. 677–693.
IFM-2016-AntoninoGR #analysis #performance #satisfiability
Efficient Deadlock-Freedom Checking Using Local Analysis and SAT Solving (PA, TGR, AWR), pp. 345–360.
IFM-2016-KumarBLDUB #verification
CloudSDV Enabling Static Driver Verifier Using Microsoft Azure (RK, TB, JL, ND, AU, CB), pp. 523–536.
IFM-2016-Preoteasa #invariant #logic #pointer #programming #source code #verification
Verifying Pointer Programs Using Separation Logic and Invariant Based Programming in Isabelle (VP), pp. 457–473.
IFM-2016-SchutsHV #case study #equivalence #experience #industrial #learning #legacy #refactoring
Refactoring of Legacy Software Using Model Learning and Equivalence Checking: An Industrial Experience Report (MS, JH, FWV), pp. 311–325.
SEFMSEFM-2016-FeistMP #control flow #execution #symbolic computation
Guided Dynamic Symbolic Execution Using Subgraph Control-Flow Information (JF, LM, MLP), pp. 76–81.
SEFMSEFM-2016-HusienS #generative #model checking
Program Generation Using Simulated Annealing and Model Checking (IH, SS), pp. 155–171.
HaskellHaskell-2016-WangNF #algorithm #named #search-based #strict
Autobahn: using genetic algorithms to infer strictness annotations (YRW, DN, KF), pp. 114–126.
ICFP-2016-CastroHS #morphism #parallel #pipes and filters #process #reasoning
Farms, pipes, streams and reforestation: reasoning about structured parallel processes using types and hylomorphisms (DC, KH, SS), pp. 4–17.
AIIDEAIIDE-2016-DebkowskiMYYYFK #behaviour #collaboration #game studies #multi #named #online
Contained: Using Multiplayer Online Games to Quantify Success of Collaborative Group Behavior (DD, AM, NY, LY, YY, SF, MK), pp. 149–154.
AIIDEAIIDE-2016-GeibWMKCP #recognition
Building Helpful Virtual Agents Using Plan Recognition and Planning (CWG, JW, SM, PK, BGWC, RPAP), pp. 162–168.
AIIDEAIIDE-2016-GunesSAES #approach #modelling
A Generic Approach for Player Modeling Using Event-Trait Mapping and Feature Weighting (MAG, GS, UA, OE, SS), pp. 169–175.
AIIDEAIIDE-2016-HarrisonR #crowdsourcing #learning
Learning From Stories: Using Crowdsourced Narratives to Train Virtual Agents (BH, MOR), pp. 183–189.
AIIDEAIIDE-2016-SinghDHJPM #network
Recognizing Actions in Motion Trajectories Using Deep Neural Networks (KYS, NMD, CPH, MJ, KP, BM), pp. 211–217.
AIIDEAIIDE-2016-SooLC #monte carlo
Generate Believable Causal Plots with User Preferences Using Constrained Monte Carlo Tree Search (VWS, CML, THC), pp. 218–224.
CHI-PLAYCHI-PLAY-2016-ReinschluesselM #game studies #self
Using Positive or Negative Reinforcement in Neurofeedback Games for Training Self-Regulation (AVR, RLM), pp. 186–198.
CHI-PLAYCHI-PLAY-2016-SavardBW #challenge #collaboration #game studies
Collaborative Solving in a Human Computing Game Using a Market, Skills and Challenges (OTS, AB, JW), pp. 130–141.
CHI-PLAYCHI-PLAY-2016-SharmaTDKJ #artificial reality #game studies
Evaluating Display Modalities Using a Mixed Reality Game (HNS, ZOT, ID, AK, AJ), pp. 65–77.
CHI-PLAYCHI-PLAY-2016-ZayerTF #mobile #named
PAWdio: Hand Input for Mobile VR using Acoustic Sensing (MAZ, ST, EF), pp. 154–158.
CoGCIG-2016-Bursztein #learning #statistics
I am a legend: Hacking hearthstone using statistical learning methods (EB), pp. 1–8.
CoGCIG-2016-CazenaveLTT #game studies #learning #random
Learning opening books in partially observable games: Using random seeds in Phantom Go (TC, JL0, FT, OT), pp. 1–7.
CoGCIG-2016-KiourtK #modelling #social
Using opponent models to train inexperienced synthetic agents in social environments (CK, DK), pp. 1–4.
CoGCIG-2016-ParkK #visual notation
Deep Q-learning using redundant outputs in visual doom (HSP, KJK), pp. 1–2.
CoGCIG-2016-SephtonCDHS #android #mining #predict
Using association rule mining to predict opponent deck content in android: Netrunner (NS, PIC, SD, VJH, NHS), pp. 1–8.
CoGCIG-2016-StanescuBHB #game studies #network #realtime
Evaluating real-time strategy game states using convolutional neural networks (MS, NAB, AH, MB), pp. 1–7.
CoGCIG-2016-YooK #algorithm #game studies #video
Changing video game graphic styles using neural algorithms (BY, KJK), pp. 1–2.
DiGRADiGRA-FDG-2016-GoddardM #assembly #design #game studies
Designing Unconventional Use of Conventional Displays in Games: Some Assembly Required (WG, AM).
DiGRADiGRA-FDG-2016-LimLH #approach #bottom-up #category theory #clustering #image #social
Discovering Social and Aesthetic Categories of Avatars: A Bottom-Up Artificial Intelligence Approach Using Image Clustering (CUL, AL, DFH).
DiGRADiGRA-FDG-2016-ZhuKCL #education #game studies #interactive #social
Using Interactive Social Story Games to Teach Social Skills to Children with Autism (JZ, CK, JC, NL).
CoGVS-Games-2016-AyedGJAVM #game studies #people
Fall Prevention Serious Games for Elderly People Using RGBD Devices (IA, AG, AJiC, BMA, JV, PMB), pp. 1–3.
CoGVS-Games-2016-LopeM #education #game studies #uml
Using UML to Model Educational Games (RPdL, NMM), pp. 1–4.
CoGVS-Games-2016-NicolaouLL #artificial reality
Stroke Event Simulator Using Virtual Reality (PN, ML, FL), pp. 1–2.
CoGVS-Games-2016-PaliokasS #game studies
The Use of Serious Games in Museum Visits and Exhibitions: A Systematic Mapping Study (IP, SS), pp. 1–8.
CoGVS-Games-2016-Piedra-Fernandez #artificial reality #communication #people
Sign Communication for People with Disabilities Using Kinect Technology at Home (JAPF, JJOC, CBB, LIM), pp. 1–2.
CoGVS-Games-2016-VosinakisKMS #approach #artificial reality
A Kinesthetic Approach to Digital Heritage Using Leap Motion: The Cycladic Sculpture Application (SV, PK, DM, ES), pp. 1–8.
CIKMCIKM-2016-0001H #adaptation #interactive #learning #multi #named
aptMTVL: Nailing Interactions in Multi-Task Multi-View Multi-Label Learning using Adaptive-basis Multilinear Factor Analyzers (XL0, JH), pp. 1171–1180.
CIKMCIKM-2016-AgrawalC #data mining #mining #predict
A Fatigue Strength Predictor for Steels Using Ensemble Data Mining: Steel Fatigue Strength Predictor (AA, ANC), pp. 2497–2500.
CIKMCIKM-2016-Balaneshinkordan #concept #graph #query
Sequential Query Expansion using Concept Graph (SB, AK), pp. 155–164.
CIKMCIKM-2016-CheemaKALWCR #analysis #health #monitoring #on the
On Structural Health Monitoring Using Tensor Analysis and Support Vector Machine with Artificial Negative Data (PC, NLDK, MMA, WL0, YW0, FC0, PR), pp. 1813–1822.
CIKMCIKM-2016-ChenWPT #community #network #performance
Efficient Computation of Importance Based Communities in Web-Scale Networks Using a Single Machine (SC, RW, DP, AT), pp. 1553–1562.
CIKMCIKM-2016-HanadaPCL #effectiveness #fault #type system
Effective Spelling Correction for Eye-based Typing using domain-specific Information about Error Distribution (RH, MdGCP, MC, FAL), pp. 1723–1732.
CIKMCIKM-2016-HansenLM #predict #query #web
Ensemble Learned Vaccination Uptake Prediction using Web Search Queries (NDH, CL, KM), pp. 1953–1956.
CIKMCIKM-2016-JatowtKT #predict #wiki
Predicting Importance of Historical Persons using Wikipedia (AJ, DK, KT), pp. 1909–1912.
CIKMCIKM-2016-KuziSK #query #word
Query Expansion Using Word Embeddings (SK, AS, OK), pp. 1929–1932.
CIKMCIKM-2016-LiCL #approximate #graph #query
Approximating Graph Pattern Queries Using Views (JL, YC0, XL), pp. 449–458.
CIKMCIKM-2016-LiuKL #predict #social #social media
Collective Traffic Prediction with Partially Observed Traffic History using Location-Based Social Media (XL, XK, YL), pp. 2179–2184.
CIKMCIKM-2016-ManotumruksaMO #modelling #recommendation
Regularising Factorised Models for Venue Recommendation using Friends and their Comments (JM, CM, IO), pp. 1981–1984.
CIKMCIKM-2016-MartinoBR0M #community #learning
Learning to Re-Rank Questions in Community Question Answering Using Advanced Features (GDSM, ABC, SR, AU0, AM), pp. 1997–2000.
CIKMCIKM-2016-Najork #email #experience #machine learning
Using Machine Learning to Improve the Email Experience (MN), p. 891.
CIKMCIKM-2016-RoyGMJ #composition #estimation #feedback #kernel #word
Word Vector Compositionality based Relevance Feedback using Kernel Density Estimation (DR, DG, MM, GJFJ), pp. 1281–1290.
CIKMCIKM-2016-RuanSXTFLZ #network
Forecasting Seasonal Time Series Using Weighted Gradient RBF Network based Autoregressive Model (WR, QZS, PX, NKT0, NJGF, XL0, WEZ), pp. 2021–2024.
CIKMCIKM-2016-SinghC #aspect-oriented #query
Iterative Search using Query Aspects (MS, WBC), pp. 2037–2040.
CIKMCIKM-2016-TongKIKSV
Deep Match between Geology Reports and Well Logs Using Spatial Information (BT, MK, MI, YK, AS, RV), pp. 1833–1842.
CIKMCIKM-2016-TutekGSMB #concept #detection #knowledge base #ranking
Detecting and Ranking Conceptual Links between Texts Using a Knowledge Base (MT, GG, JS, NMF, BDB), pp. 2077–2080.
CIKMCIKM-2016-WangJYJM #learning
Learning to Extract Conditional Knowledge for Question Answering using Dialogue (PW, LJ, JY0, LJ, WYM), pp. 277–286.
CIKMCIKM-2016-WangOWWLPG #concept
Using Prerequisites to Extract Concept Maps fromTextbooks (SW, AO, ZW0, KW, CL0, BP, CLG), pp. 317–326.
CIKMCIKM-2016-WangWZ #distributed #graph #partial evaluation #performance #query #rdf
Efficient Distributed Regular Path Queries on RDF Graphs Using Partial Evaluation (XW0, JW, XZ), pp. 1933–1936.
CIKMCIKM-2016-Wu0XTL #named #recommendation #word
Tag2Word: Using Tags to Generate Words for Content Based Tag Recommendation (YW, YY0, FX0, HT, JL0), pp. 2287–2292.
CIKMCIKM-2016-XuCLMM #personalisation #recommendation #semantics #similarity
Tag-Aware Personalized Recommendation Using a Deep-Semantic Similarity Model with Negative Sampling (ZX, CC0, TL, YM, XM), pp. 1921–1924.
CIKMCIKM-2016-YuanGJCYZ #learning #named #ranking
LambdaFM: Learning Optimal Ranking with Factorization Machines Using Lambda Surrogates (FY, GG, JMJ, LC0, HY, WZ0), pp. 227–236.
CIKMCIKM-2016-ZhangDH #ambiguity #case study #classification #online
Bayesian Non-Exhaustive Classification A Case Study: Online Name Disambiguation using Temporal Record Streams (BZ, MD, MAH), pp. 1341–1350.
CIKMCIKM-2016-ZhangLDCKS #big data #locality #privacy #scalability
Scalable Local-Recoding Anonymization using Locality Sensitive Hashing for Big Data Privacy Preservation (XZ, CL, WD, JC, KR, ZS), pp. 1793–1802.
CIKMCIKM-2016-ZhengWPYFX #big data #predict
Urban Traffic Prediction through the Second Use of Inexpensive Big Data from Buildings (ZZ, DW0, JP, YY, CF, LFX), pp. 1363–1372.
ECIRECIR-2016-0002B #information retrieval
Diversifying Search Results Using Time - An Information Retrieval Method for Historians (DG0, KB), pp. 789–795.
ECIRECIR-2016-ArguelloAD #performance #predict #query
Using Query Performance Predictors to Improve Spoken Queries (JA, SA, FD0), pp. 309–321.
ECIRECIR-2016-BalikasA #classification #multi
Multi-label, Multi-class Classification Using Polylingual Embeddings (GB, MRA), pp. 723–728.
ECIRECIR-2016-WangME #category theory #fine-grained #image #visual notation
Harvesting Training Images for Fine-Grained Object Categories Using Visual Descriptions (JW, KM, ME), pp. 549–560.
ICMLICML-2016-AroraMM #learning #multi #optimisation #probability #representation
Stochastic Optimization for Multiview Representation Learning using Partial Least Squares (RA, PM, TVM), pp. 1786–1794.
ICMLICML-2016-BuiHHLT #approximate #process
Deep Gaussian Processes for Regression using Approximate Expectation Propagation (TDB, DHL, JMHL, YL, RET), pp. 1472–1481.
ICMLICML-2016-GonenOS #sketching
Solving Ridge Regression using Sketched Preconditioned SVRG (AG, FO, SSS), pp. 1397–1405.
ICMLICML-2016-GuanRW #learning #markov #multi #performance #process #recognition
Efficient Multi-Instance Learning for Activity Recognition from Time Series Data Using an Auto-Regressive Hidden Markov Model (XG, RR, WKW), pp. 2330–2339.
ICMLICML-2016-JasinskaDBPKH #probability
Extreme F-measure Maximization using Sparse Probability Estimates (KJ, KD, RBF, KP, TK, EH), pp. 1435–1444.
ICMLICML-2016-JohnsonZ #categorisation
Supervised and Semi-Supervised Text Categorization using LSTM for Region Embeddings (RJ, TZ0), pp. 526–534.
ICMLICML-2016-JunN #multi
Anytime Exploration for Multi-armed Bandits using Confidence Information (KSJ, RDN), pp. 974–982.
ICMLICML-2016-LarsenSLW #encoding #metric #similarity
Autoencoding beyond pixels using a learned similarity metric (ABLL, SKS, HL, OW), pp. 1558–1566.
ICMLICML-2016-NiuRFH #parametricity #performance
Fast Parameter Inference in Nonlinear Dynamical Systems using Iterative Gradient Matching (MN, SR, MF, DH), pp. 1699–1707.
ICMLICML-2016-RoychowdhuryKP #monte carlo #robust
Robust Monte Carlo Sampling using Riemannian Nosé-Poincaré Hamiltonian Dynamics (AR, BK, SP0), pp. 2673–2681.
ICMLICML-2016-SangnierGR #detection #proximity #reliability #representation
Early and Reliable Event Detection Using Proximity Space Representation (MS, JG, AR), pp. 2310–2319.
ICMLICML-2016-SiHD #approximate #performance
Computationally Efficient Nyström Approximation using Fast Transforms (SS, CJH, ISD), pp. 2655–2663.
ICMLICML-2016-ZhuQRY #coordination #performance
Even Faster Accelerated Coordinate Descent Using Non-Uniform Sampling (ZAZ, ZQ, PR, YY), pp. 1110–1119.
ICPRICPR-2016-AhmedCSNN #image #smarttech
Using fusion of iris code and periocular biometric for matching visible spectrum iris images captured by smart phone cameras (NUA, SC, EHS, AN, IN), pp. 176–180.
ICPRICPR-2016-Al-DulaimiBTC #automation #geometry #image #segmentation #set
Automatic segmentation of HEp-2 cell Fluorescence microscope images using level set method via geometric active contours (KAD, JB, ITR, VC), pp. 81–83.
ICPRICPR-2016-Alonso-Fernandez #multi #recognition
Compact multi-scale periocular recognition using SAFE features (FAF, AM, JB), pp. 1455–1460.
ICPRICPR-2016-AntonyMOM #network
Quantifying radiographic knee osteoarthritis severity using deep convolutional neural networks (JA, KM, NEO, KM), pp. 1195–1200.
ICPRICPR-2016-AydinKAA #automation #predict #random
Automatic personality prediction from audiovisual data using random forest regression (BA, AAK, OA, LA), pp. 37–42.
ICPRICPR-2016-BachaAB #probability #recognition #visual notation
Event recognition in photo albums using probabilistic graphical model and feature relevance (SB, MSA, NB), pp. 2819–2823.
ICPRICPR-2016-BartoliLSB #estimation #profiling
User interest profiling using tracking-free coarse gaze estimation (FB, GL, LS, ADB), pp. 1839–1844.
ICPRICPR-2016-BertoliniOS #difference #identification #multi
Multi-script writer identification using dissimilarity (DB, LSO, RS), pp. 3025–3030.
ICPRICPR-2016-BhagavatulaAS #estimation
Pose estimation using Spectral and Singular Value recomposition (CB, RA, MS), pp. 4095–4100.
ICPRICPR-2016-Brandtberg #analysis #classification #fourier #fuzzy #multi #order #rank
Virtual hexagonal and multi-scale operator for fuzzy rank order texture classification using one-dimensional generalised Fourier analysis (TB), pp. 2018–2024.
ICPRICPR-2016-BrownF #detection #smarttech
Enhanced face detection using body part detections for wearable cameras (LMB, QF), pp. 715–720.
ICPRICPR-2016-BSSH #approach #classification #network
HEp-2 cell classification using artificial neural network approach (DB, KS, NH), pp. 84–89.
ICPRICPR-2016-BullingerBWA #bound #generative #re-engineering #video
Moving object reconstruction in monocular video data using boundary generation (SB, CB, SW, MA), pp. 240–246.
ICPRICPR-2016-CamgozHKB #3d #gesture #independence #network #recognition
Using Convolutional 3D Neural Networks for User-independent continuous gesture recognition (NCC, SH, OK, RB), pp. 49–54.
ICPRICPR-2016-CarbonneauGG #identification #learning #multi #random
Witness identification in multiple instance learning using random subspaces (MAC, EG, GG), pp. 3639–3644.
ICPRICPR-2016-ChakrabortyPK #information management #recognition #speech
Spontaneous speech emotion recognition using prior knowledge (RC, MP, SKK), pp. 2866–2871.
ICPRICPR-2016-ChowdhuryBMKS #image #network #performance #retrieval
An efficient radiographic Image Retrieval system using Convolutional Neural Network (MC, SRB, RM, MKK, ÖS), pp. 3134–3139.
ICPRICPR-2016-Chun #adaptation #authentication
Small scale single pulse ECG-based authentication using GLRT that considers T wave shift and adaptive template update with prior information (SYC), pp. 3043–3048.
ICPRICPR-2016-DaiDCLY #multi #rank #representation #segmentation
Object segmentation using low-rank representation with multiple block-diagonal priors (LD, JD, JC, JL0, JY0), pp. 1959–1964.
ICPRICPR-2016-DaoodRB #classification #multi #recognition
Pollen recognition using a multi-layer hierarchical classifier (AD, ER, MB), pp. 3091–3096.
ICPRICPR-2016-DutaNAIS #recognition
Boosting VLAD with double assignment using deep features for action recognition in videos (ICD, TAN0, KA, BI, NS), pp. 2210–2215.
ICPRICPR-2016-EichhardtH
Improvement of camera calibration using surface normals (IE, LH), pp. 3745–3750.
ICPRICPR-2016-ElTantawyS #matrix #novel #physics
A novel method for segmenting moving objects in aerial imagery using matrix recovery and physical spring model (AE, MSS), pp. 3898–3903.
ICPRICPR-2016-EumD #evaluation #multi
Content selection using frontalness evaluation of multiple frames (SE, DSD), pp. 3404–3409.
ICPRICPR-2016-FariaCLI #dependence #recognition
Information fusion for cocaine dependence recognition using fMRI (FAF, FAMC, CsRL, JSI), pp. 1107–1112.
ICPRICPR-2016-FengLL #effectiveness #learning
Learning effective Gait features using LSTM (YF0, YL, JL), pp. 325–330.
ICPRICPR-2016-FoareLT16a #calculus #functional #image #segmentation
Image restoration and segmentation using the Ambrosio-Tortorelli functional and Discrete Calculus (MF, JOL, HT), pp. 1418–1423.
ICPRICPR-2016-GaoCZFZ #image #segmentation
Texture image segmentation using fused features and active contour (MG, HC, SZ, BF0, LZ), pp. 2036–2041.
ICPRICPR-2016-GaoYGC #approach #constraints #network
Bayesian approach to learn Bayesian networks using data and constraints (XGG, YY, ZgG, DQC0), pp. 3667–3672.
ICPRICPR-2016-GhoraiMC #image #kernel #statistics
Patch sparsity based image inpainting using local patch statistics and steering kernel descriptor (MG, SM, BC), pp. 781–786.
ICPRICPR-2016-GiraudTP #linear #named
SCALP: Superpixels with Contour Adherence using Linear Path (RG, VTT, NP), pp. 2374–2379.
ICPRICPR-2016-GrimmMBS #classification
Sleep position classification from a depth camera using Bed Aligned Maps (TG, MM, AB, RS), pp. 319–324.
ICPRICPR-2016-GuoDFS #detection #robust
A robust UAV landing site detection system using mid-level discriminative patches (XG, SD, CF, SS), pp. 1659–1664.
ICPRICPR-2016-HafemannSO #verification
Analyzing features learned for Offline Signature Verification using Deep CNNs (LGH, RS, LSO), pp. 2989–2994.
ICPRICPR-2016-HajduHBLEHT #algorithm #approximate #grid #network
Measuring regularity of network patterns by grid approximations using the LLL algorithm (AH, BH, RB, IL, GE, LH, RT), pp. 1524–1529.
ICPRICPR-2016-HasegawaH #classification #image #named #network
PLSNet: A simple network using Partial Least Squares regression for image classification (RH, KH), pp. 1601–1606.
ICPRICPR-2016-HsuCH #representation #verification
Object verification in two views using Sparse representation (SCH, ICC, CLH), pp. 504–509.
ICPRICPR-2016-HuangY #3d #network
Point cloud labeling using 3D Convolutional Neural Network (JH0, SY), pp. 2670–2675.
ICPRICPR-2016-ItoA #authentication
A score calculation method using positional information of feature points for biometric authentication (KI, TA), pp. 3049–3054.
ICPRICPR-2016-JafariKNSSWN #image #learning #segmentation
Skin lesion segmentation in clinical images using deep learning (MHJ, NK, ENE, SS, SMRS, KRW, KN), pp. 337–342.
ICPRICPR-2016-JhuangLT #3d #network #verification
Face verification with three-dimensional point cloud by using deep belief networks (DHJ, DTL, CHT), pp. 1430–1435.
ICPRICPR-2016-JiaoZ #learning #multi #taxonomy
Multiple Instance Dictionary Learning using Functions of Multiple Instances (CJ, AZ), pp. 2688–2693.
ICPRICPR-2016-JohnKGNMI #learning #modelling #performance #segmentation
Fast road scene segmentation using deep learning and scene-based models (VJ, KK, CG, HTN, SM, KI), pp. 3763–3768.
ICPRICPR-2016-JoyR0V #big data #optimisation
Hyperparameter tuning for big data using Bayesian optimisation (TTJ, SR, SG0, SV), pp. 2574–2579.
ICPRICPR-2016-KalraSRT #learning #network
Learning opposites using neural networks (SK, AS, SR, HRT), pp. 1213–1218.
ICPRICPR-2016-Kamkar0LPV #graph #predict
Stable clinical prediction using graph support vector machines (IK, SG0, CL0, DQP, SV), pp. 3332–3337.
ICPRICPR-2016-KhanH #adaptation #learning #polynomial
Adapting instance weights for unsupervised domain adaptation using quadratic mutual information and subspace learning (MNAK, DRH), pp. 1560–1565.
ICPRICPR-2016-KilicarslanZ #video
Bridge motion to collision alarming using driving video (MK, JYZ), pp. 1870–1875.
ICPRICPR-2016-KimP #approach #detection #network
A shape preserving approach for salient object detection using convolutional neural networks (JK, VP), pp. 609–614.
ICPRICPR-2016-KimP16a #network
Discovering characteristic landmarks on ancient coins using convolutional networks (JK, VP), pp. 1595–1600.
ICPRICPR-2016-KimV #classification #semantics
Deep Action Unit classification using a binned intensity loss and semantic context model (EK, SV), pp. 4136–4141.
ICPRICPR-2016-KondratevS #automation #constraints #detection #geometry #image
Automatic detection of laser-induced structures in live cell fluorescent microscopy images using snakes with geometric constraints (AYK, DVS), pp. 331–336.
ICPRICPR-2016-LeiT #modelling
Modeling human-skeleton motion patterns using conditional deep Boltzmann machine (PL, ST), pp. 1845–1850.
ICPRICPR-2016-Lezoray #image
High dynamic range image processing using manifold-based ordering (OL), pp. 289–294.
ICPRICPR-2016-LiaoLL #classification #multi #network #robust
Skin disease classification versus skin lesion characterization: Achieving robust diagnosis using multi-label deep neural networks (HL, YL, JL), pp. 355–360.
ICPRICPR-2016-LiuHWLL #image #performance #retrieval #segmentation
Efficient segmentation for Region-based Image Retrieval using Edge Integrated Minimum Spanning Tree (YL0, LH0, SW, XL, BL), pp. 1929–1934.
ICPRICPR-2016-LuoGPWY #locality #mobile #multi
Accurate localization for mobile device using a multi-planar city model (YL, TG, HP, YW, JY), pp. 3733–3738.
ICPRICPR-2016-MarronePFPSS #fuzzy #segmentation
Breast segmentation using Fuzzy C-Means and anatomical priors in DCE-MRI (SM0, GP, RF, AP, MS, CS), pp. 1472–1477.
ICPRICPR-2016-Martinez-DiazCH #encoding #performance #recognition #video
Efficient video face recognition by using Fisher Vector encoding of binary features (YMD, LC, NH, HMV, LES), pp. 1436–1441.
ICPRICPR-2016-MatsukawaS #identification
Person re-identification using CNN features learned from combination of attributes (TM, ES), pp. 2428–2433.
ICPRICPR-2016-MatsuzakiUSS #2d #3d #constraints #geometry #retrieval #verification
Geometric verification using semi-2D constraints for 3D object retrieval (KM, YU, SS, SS), pp. 2338–2343.
ICPRICPR-2016-MohagheghKSSN #estimation #image
Single image depth estimation using joint local-global features (HM, NK, SMRS, SS, KN), pp. 727–732.
ICPRICPR-2016-MollerNN16a #clustering #detection #image
Change detection in marine observatory image streams using Bi-Domain Feature Clustering (TM, IN, TWN), pp. 793–798.
ICPRICPR-2016-MontenegroA #artificial reality #estimation #human-computer
Gaze estimation using EEG signals for HCI in augmented and virtual reality headsets (JMFM, VA), pp. 1159–1164.
ICPRICPR-2016-NahaW16a #learning #segmentation
Object figure-ground segmentation using zero-shot learning (SN, YW0), pp. 2842–2847.
ICPRICPR-2016-NairKNG #documentation #network #segmentation
Segmentation of highly unstructured handwritten documents using a neural network technique (RRN, BUK, IN, VG), pp. 1291–1296.
ICPRICPR-2016-Nakazawa #image #random
Noise stable image registration using RANdom RESAmple Consensus (AN), pp. 853–858.
ICPRICPR-2016-NaminAP #2d #3d #higher-order #segmentation #semantics
2D-3D semantic segmentation using cardinality as higher-order loss (SRN, JMA, LP), pp. 3775–3780.
ICPRICPR-2016-Nguyen #automation #generative #image
Automatic generation of a realistic looking single image stereogram using stereo vision (MN), pp. 3826–3831.
ICPRICPR-2016-NishiyamaNYYIS #identification #physics
Person re-identification using co-occurrence attributes of physical and adhered human characteristics (MN, SN, TY, HY, YI, KS), pp. 2085–2090.
ICPRICPR-2016-OnZEB #multi #pattern matching #pattern recognition #recognition
Spatio-temporal pattern recognition of dendritic spines and protein dynamics using live multichannel fluorescence microscopy (VO, AZ, IE, BB), pp. 2042–2047.
ICPRICPR-2016-OrriteRM #distance #learning #process #sequence
One-shot learning of temporal sequences using a distance dependent Chinese Restaurant Process (CO, MR, CM), pp. 2694–2699.
ICPRICPR-2016-OrueG #graph #process #recognition
Face recognition using activities of directed graphs in spatial pyramid (JPMO, WNG), pp. 3162–3167.
ICPRICPR-2016-Oskarsson
Characterizing the structure tensor using gamma distributions (MO), pp. 763–768.
ICPRICPR-2016-PalaniappanPAVF #detection
Moving object detection for vehicle tracking in Wide Area Motion Imagery using 4D filtering (KP, MP, HA, RV, JF, FB, AB, SS, EB, RMR, GS), pp. 2830–2835.
ICPRICPR-2016-PalCGCC #learning #multi
Severity grading of psoriatic plaques using deep CNN based multi-task learning (AP, AC, UG, AC, RC), pp. 1478–1483.
ICPRICPR-2016-PengRP #learning #network #recognition
Learning face recognition from limited training data using deep neural networks (XP, NKR, SP), pp. 1442–1447.
ICPRICPR-2016-Ponce-Hinestroza #adaptation
Using a MRF-BP model with color adaptive training for underwater color restoration (ANPH, LATM, PDJ), pp. 787–792.
ICPRICPR-2016-PrasathKOGHSP #classification #random #segmentation
HEp-2 cell classification and segmentation using motif texture patterns and spatial features with random forests (VBSP, YMK, ZAO, JBG, AH, GS, KP), pp. 90–95.
ICPRICPR-2016-QinJYW #image #recognition
Building facade recognition from aerial images using Delaunay Triangulation induced feature perceptual grouping (XQ, MJ, XY, JW0), pp. 3368–3373.
ICPRICPR-2016-QuachtranHS #detection #learning
Detection of Intracranial Hypertension using Deep Learning (BQ, RBH, FS), pp. 2491–2496.
ICPRICPR-2016-QuWL #recognition #representation
In-air handwritten Chinese character recognition using discriminative projection based on locality-sensitive sparse representation (XQ, WW, KL), pp. 1137–1140.
ICPRICPR-2016-RaiNCD #clustering #graph #multi
Partial Multi-View Clustering using Graph Regularized NMF (NR, SN, SC, OD), pp. 2192–2197.
ICPRICPR-2016-RaytchevKTK #kernel #recognition #representation
Higher-level representation of local spatio-temporal features for human action recognition using Subspace Matching Kernels (BR, HK, TT, KK), pp. 3862–3867.
ICPRICPR-2016-Robles-KellyW #graph #image
Semi-supervised image labelling using barycentric graph embeddings (ARK, RW), pp. 1518–1523.
ICPRICPR-2016-Rowekamp #performance
Fast thresholding of high dimensional Euclidean distances using binary squaring (JHR), pp. 3103–3108.
ICPRICPR-2016-SagawaSHOKF #automation #feature model #robust
Automatic feature extraction using CNN for robust active one-shot scanning (RS, YS, TH, SO, HK, RF), pp. 234–239.
ICPRICPR-2016-SahooA0 #approach #automation #clustering #generative #multi
Automatic generation of biclusters from gene expression data using multi-objective simulated annealing approach (PS, SA, SS0), pp. 2174–2179.
ICPRICPR-2016-SaikiaSSKG #analysis #kernel #learning #multi
Multiple kernel learning using data envelopment analysis and feature vector selection and projection (GS, SS, VVS, RDK, PG), pp. 520–524.
ICPRICPR-2016-SerinoB #3d
Using local convexities as anchor points for 3D curve skeletonization (LS, GSdB), pp. 2854–2859.
ICPRICPR-2016-ShigetaMKSTMI #segmentation
A bone marrow cavity segmentation method using wavelet-based texture feature (HS, TM, JK, SS, HT, HM, MI), pp. 2133–2138.
ICPRICPR-2016-ShiWXW #adaptation #image
OTSU guided adaptive binarization of CAPTCHA image using gamma correction (CS, YW, BX, CW), pp. 3962–3967.
ICPRICPR-2016-SidibeRM #detection #multi #on the
On spatio-temporal saliency detection in videos using multilinear PCA (DS, MR, FM), pp. 1876–1880.
ICPRICPR-2016-SuCHH #detection #image #modelling #recognition #symmetry
Moment-based symmetry detection for scene modeling and recognition using RGB-D images (JYS, SCC, JWH, THH), pp. 3621–3626.
ICPRICPR-2016-SunBTTH #detection #learning #locality
Tattoo detection and localization using region-based deep learning (ZS, JB, PT, MT, AH), pp. 3055–3060.
ICPRICPR-2016-SunHL #detection #image
Context based face spoofing detection using active near-infrared images (XS0, LH0, CL), pp. 4262–4267.
ICPRICPR-2016-TakabeTKSMNY #consistency #detection
Moving object detection from a point cloud using photometric and depth consistencies (AT, HT, NK, TS, TM, SN, NY), pp. 561–566.
ICPRICPR-2016-TakadaHJ
Human tracking in crowded scenes using target information at previous frames (HT, KH, PJ), pp. 1809–1814.
ICPRICPR-2016-TakahashiIKOM #multi #robust
Robust volleyball tracking system using multi-view cameras (MT, KI, MK, HO, TM), pp. 2740–2745.
ICPRICPR-2016-TakezawaHT #detection #documentation #image
Camera-captured document image perspective distortion correction using vanishing point detection based on Radon transform (YT, MH, ST), pp. 3968–3974.
ICPRICPR-2016-TianMO #detection #embedded #low cost #recognition
Spoofing detection for embedded face recognition system using a low cost stereo camera (GT, TM, YO), pp. 1017–1022.
ICPRICPR-2016-TizhooshMZD #image #retrieval
Barcodes for medical image retrieval using autoencoded Radon transform (HRT, CM, SZ, SD), pp. 3150–3155.
ICPRICPR-2016-ToyamaMS #clustering #performance
Fast template matching using Brick Partitioning and initial threshold (FT, HM, KS), pp. 687–691.
ICPRICPR-2016-VinhEPBLR #modelling #random #robust
Training robust models using Random Projection (XVN, SME, SP, JB0, CL, KR), pp. 531–536.
ICPRICPR-2016-WangLLGTO #gesture #network #recognition #scalability
Large-scale Isolated Gesture Recognition using Convolutional Neural Networks (PW, WL, SL, ZG, CT, PO), pp. 7–12.
ICPRICPR-2016-WangLLZGO #gesture #network #recognition #scalability
Large-scale Continuous Gesture Recognition Using Convolutional Neural Networks (PW, WL, SL, YZ, ZG, PO), pp. 13–18.
ICPRICPR-2016-WangWH #analysis #network
Network entropy analysis using the Maxwell-Boltzmann partition function (JW, RCW0, ERH), pp. 1321–1326.
ICPRICPR-2016-WarisIG
Object proposals using CNN-based edge filtering (MAW, AI, MG), pp. 627–632.
ICPRICPR-2016-Williams #classification #network
Underwater target classification in synthetic aperture sonar imagery using deep convolutional neural networks (DPW), pp. 2497–2502.
ICPRICPR-2016-WuLZN #modelling #re-engineering
Model-based face reconstruction using SIFT flow registration and spherical harmonics (FW, SL, TZ, KNN), pp. 1774–1779.
ICPRICPR-2016-XuLHWLWHC #3d #image #multi #retrieval #word
Bag of temporal co-occurrence words for retrieval of focal liver lesions using 3D multiphase contrast-enhanced CT images (YX, LL, HH, DW, YL, JW0, XHH, YWC), pp. 2282–2287.
ICPRICPR-2016-YamashitaFYF #detection #multi #network
Pedestrian and part position detection using a regression-based multiple task deep convolutional neural network (TY, HF, YY, HF), pp. 3500–3505.
ICPRICPR-2016-YangJNL #network #normalisation #online #recognition
Rotation-free online handwritten character recognition using dyadic path signature features, hanging normalization, and deep neural network (WY, LJ, HN, TL), pp. 4083–4088.
ICPRICPR-2016-YangL #learning #nondeterminism
Active learning using uncertainty information (YY, ML), pp. 2646–2651.
ICPRICPR-2016-YB #3d #optimisation #video
Rate distortion optimization using SSIM for 3D video coding (HY, PKB), pp. 1261–1266.
ICPRICPR-2016-YeWH #generative #graph
Analyzing graph time series using a generative model (CY, RCW0, ERH), pp. 3338–3343.
ICPRICPR-2016-YildizU #classification #incremental #order
Incremental construction of rule ensembles using classifiers produced by different class orderings (OTY, AU), pp. 492–497.
ICPRICPR-2016-YodaNTKYK #image #multi
Dynamic photometric stereo method using multi-tap CMOS image sensor (TY, HN, RiT, KK, KY, SK), pp. 2356–2361.
ICPRICPR-2016-YuLC #multi
Recognizing text in historical maps using maps from multiple time periods (RY, ZL, YYC), pp. 3993–3998.
ICPRICPR-2016-YuWSH #invariant #recognition
View invariant gait recognition using only one uniform model (SY, QW, LS, YH), pp. 889–894.
ICPRICPR-2016-ZemeneTPP #clustering #detection #set
Simultaneous clustering and outlier detection using dominant sets (EZ, YTT, AP0, MP), pp. 2325–2330.
ICPRICPR-2016-ZhangGSSL #robust
Robust tensor factorization using maximum correntropy criterion (MZ, YG, CS, JLS, JL), pp. 4184–4189.
ICPRICPR-2016-ZhangLQ #network
Wake-up-word spotting using end-to-end deep neural network system (SZ, WL, YQ0), pp. 2878–2883.
ICPRICPR-2016-ZhangWY #correlation #image
Theoretical criterion for image matching using GPT correlation (SZ, TW, YY), pp. 555–560.
ICPRICPR-2016-ZhaoIBJ #fault #predict
Wind turbine fault prediction using soft label SVM (RZ, MRAI, KPB, QJ), pp. 3192–3197.
ICPRICPR-2016-ZhaoMFQH #performance #predict
Fast motion deblurring using gyroscopes and strong edge prediction (JZ, JM, BF, SQ, FH), pp. 739–744.
ICPRICPR-2016-ZhengCZZL #independence #network
Text-independent voice conversion using deep neural network based phonetic level features (HZ, WC, TZ, SZ, ML0), pp. 2872–2877.
ICPRICPR-2016-ZhengLZW #image #multi
Multi-focus image fusion using quaternion wavelet transform (XNZ, XL, ZZ, XJW), pp. 883–888.
ICPRICPR-2016-ZhugeHNY #clustering #feature model #graph
Unsupervised feature extraction using a learned graph with clustering structure (WZ, CH, FN, DY), pp. 3597–3602.
ICPRICPR-2016-ZhuZMSSS #3d #gesture #network #recognition #scalability
Large-scale Isolated Gesture Recognition using pyramidal 3D convolutional networks (GZ, LZ0, LM, JS, JS, PS), pp. 19–24.
KDDKDD-2016-AgostaGHIKZ #clustering #data analysis #scalability
Scalable Data Analytics Using R: Single Machines to Hadoop Spark Clusters (JMA, DG, RH, MI, SK, MZ), p. 2115.
KDDKDD-2016-BrooksKG #data-driven #predict #ranking
Developing a Data-Driven Player Ranking in Soccer Using Predictive Model Weights (JB, MK, JVG), pp. 49–55.
KDDKDD-2016-ChakrabortyVJS #predict
Predicting Socio-Economic Indicators using News Events (SC, AV, SJ, LS), pp. 1455–1464.
KDDKDD-2016-ChenLHYGG
City-Scale Map Creation and Updating using GPS Collections (CC0, CL, QH, QY0, DG, LJG), pp. 1465–1474.
KDDKDD-2016-HaarenSDF #machine learning
Analyzing Volleyball Match Data from the 2014 World Championships Using Machine Learning Techniques (JVH, HBS, JD, PF), pp. 627–634.
KDDKDD-2016-HaPK #categorisation #e-commerce #multi #network #scalability
Large-Scale Item Categorization in e-Commerce Using Multiple Recurrent Neural Networks (JH, HP, JK), pp. 107–115.
KDDKDD-2016-HuoNH #effectiveness #learning #metric #robust
Robust and Effective Metric Learning Using Capped Trace Norm: Metric Learning via Capped Trace Norm (ZH, FN, HH), pp. 1605–1614.
KDDKDD-2016-KuangTCPSP #self
Computational Drug Repositioning Using Continuous Self-Controlled Case Series (ZK, JAT, MC, PLP, RMS, DP), pp. 491–500.
KDDKDD-2016-NandiMADB #control flow #detection #execution #graph #mining
Anomaly Detection Using Program Control Flow Graph Mining From Execution Logs (AN, AM, SA, GBD, SB), pp. 215–224.
KDDKDD-2016-ReisFMB #detection #incremental #online #performance
Fast Unsupervised Online Drift Detection Using Incremental Kolmogorov-Smirnov Test (DMdR, PAF, SM, GEAPAB), pp. 1545–1554.
KDDKDD-2016-SinghSA #independence #machine learning
Question Independent Grading using Machine Learning: The Case of Computer Program Grading (GS, SS, VA), pp. 263–272.
KDDKDD-2016-TaghaviLK #machine learning #memory management #recommendation
Compute Job Memory Recommender System Using Machine Learning (TT, ML, YK), pp. 609–616.
KDDKDD-2016-TingZCZZ #difference
Overcoming Key Weaknesses of Distance-based Neighbourhood Methods using a Data Dependent Dissimilarity Measure (KMT, YZ, MJC, YZ, ZHZ), pp. 1205–1214.
KDDKDD-2016-YinW #algorithm #clustering #online
A Text Clustering Algorithm Using an Online Clustering Scheme for Initialization (JY, JW), pp. 1995–2004.
KDDKDD-2016-ZhangZYZHH #modelling #named #social #social media
GMove: Group-Level Mobility Modeling Using Geo-Tagged Social Media (CZ0, KZ, QY0, LZ, TH, JH0), pp. 1305–1314.
KDDKDD-2016-ZhaoATBDBKD #approach #detection #parametricity #strict
A Non-parametric Approach to Detect Epileptogenic Lesions using Restricted Boltzmann Machines (YZ, BA, TT, KEB, JGD, CEB, RK, OD), pp. 373–382.
BXBX-2016-SemerathDHV #co-evolution #logic #modelling #satisfiability #synthesis
Change Propagation of View Models by Logic Synthesis using SAT solvers (OS, CD, ÁH0, DV), pp. 40–44.
ECMFAECMFA-2016-HeimNRW #composition #static typing #type safety
Compositional Language Engineering Using Generated, Extensible, Static Type-Safe Visitors (RH, PMSN, BR, AW), pp. 67–82.
ECMFAECMFA-2016-KessentiniSW #approach #automation #co-evolution #metamodelling #multi #optimisation
Automated Metamodel/Model Co-evolution Using a Multi-objective Optimization Approach (WK, HAS, MW), pp. 138–155.
ICMTICMT-2016-MooijJEJR #industrial #open source #parsing
Industrial Software Rejuvenation Using Open-Source Parsers (AJM, MMJ, GE, PJ, AR), pp. 157–172.
ICMTICMT-2016-RoccoRPCLG #atl #collaboration #framework #modelling #platform
Using ATL Transformation Services in the MDEForge Collaborative Modeling Platform (JDR, DDR, AP, JSC, JdL, EG), pp. 70–78.
ICMTICMT-2016-SalayZC #reuse
Correct Reuse of Transformations is Hard to Guarantee (RS, SZ, MC), pp. 107–122.
MoDELSMoDELS-2016-BergmannDRV #bidirectional #collaboration #data access #modelling
Query-based access control for secure collaborative modeling using bidirectional transformations (GB, CD, IR, DV), pp. 351–361.
MoDELSMoDELS-2016-Blache #bound #c #development #embedded #modelling #safety
Handling index-out-of-bounds in safety-critical embedded C code using model-based development (GB), pp. 143–149.
MoDELSMoDELS-2016-GolraBDGG #agile #modelling
Using free modeling as an agile method for developing domain specific modeling languages (FRG, AB, FD, SG, CG), pp. 24–34.
MoDELSMoDELS-2016-KalenkovaALR #mining #modelling #process
Process mining using BPMN: relating event logs and process models (AAK, WMPvdA, IAL, VAR), p. 123.
MoDELSMoDELS-2016-SzvetitsZ #comprehension #design #empirical #modelling #runtime
Controlled experiment on the comprehension of runtime phenomena using models created at design time (MS, UZ), pp. 151–161.
OnwardOnward-2016-MarterBLH #identifier #lightweight #programming #readability #similarity #source code
Lightweight programming experiments without programmers and programs: an example study on the effect of similarity and number of object identifiers on the readability of source code using natural texts (TM, PB, PL, SH), pp. 1–14.
OOPSLAOOPSLA-2016-GollamudiC #automation #policy #security
Automatic enforcement of expressive security policies using enclaves (AG, SC), pp. 494–513.
OOPSLAOOPSLA-2016-Itzhaky0SYLLC #algorithm #divide and conquer #programming
Deriving divide-and-conquer dynamic programming algorithms using solver-aided transformations (SI, RS0, ASL, KY, YL, CEL, RAC), pp. 145–164.
OOPSLAOOPSLA-2016-SteimannHU #attribute grammar #constraints #source code
Computing repair alternatives for malformed programs using constraint attribute grammars (FS, JH, BU), pp. 711–730.
OOPSLAOOPSLA-2016-WangGS #named #spreadsheet
FIDEX: filtering spreadsheet data using examples (XW0, SG, RS), pp. 195–213.
AdaEuropeAdaEurope-2016-LaaliLHSS #detection #fault #online #testing
Test Case Prioritization Using Online Fault Detection Information (ML, HL, MH, MS, HWS), pp. 78–93.
AdaEuropeAdaEurope-2016-MohaqeqiAY #analysis #data flow #graph #modelling #realtime
Modeling and Analysis of Data Flow Graphs Using the Digraph Real-Time Task Model (MM, JA, WY0), pp. 15–29.
AdaEuropeAdaEurope-2016-Wittiger #csp
Eliminating Data Race Warnings Using CSP (MW), pp. 30–43.
LOPSTRLOPSTR-2016-AngelisFMPP #horn clause #process #verification
Verification of Time-Aware Business Processes Using Constrained Horn Clauses (EDA, FF, MCM, AP, MP), pp. 38–55.
PADLPADL-2016-CaretteS #algebra #probability #source code
Simplifying Probabilistic Programs Using Computer Algebra (JC, CcS), pp. 135–152.
PADLPADL-2016-JelinekB #array #constraints #logic programming
Using Constraint Logic Programming to Schedule Solar Array Operations on the International Space Station (JJ, RB), pp. 3–12.
PLDIPLDI-2016-KimJJKL #distributed #framework #replication
A distributed OpenCL framework using redundant computation and data replication (JK, GJ, JJ, JK, JL), pp. 553–569.
PLDIPLDI-2016-LaurenzanoHSMMT #approximate #latency
Input responsiveness: using canary inputs to dynamically steer approximation (MAL, PH, MS, SAM, JM, LT), pp. 161–176.
POPLPOPL-2016-0001NMR #invariant #learning
Learning invariants using decision trees and implication counterexamples (PG0, DN, PM, DR), pp. 499–512.
POPLPOPL-2016-AltenkirchK #induction #type system
Type theory in type theory using quotient inductive types (TA, AK), pp. 18–29.
POPLPOPL-2016-KatzEY #modelling #predict
Estimating types in binaries using predictive modeling (OK, REY, EY), pp. 313–326.
POPLPOPL-2016-PlotkinBLRV #network #scalability #symmetry #verification
Scaling network verification using symmetry and surgery (GDP, NB, NPL, AR, GV), pp. 69–83.
POPLPOPL-2016-SinghG #data type #spreadsheet
Transforming spreadsheet data types using examples (RS, SG), pp. 343–356.
PPDPPPDP-2016-AlbertAG #concurrent #imperative #testing
Testing of concurrent and imperative software using CLP (EA, PA, MGZ), pp. 1–8.
SASSAS-2016-GharatKM #analysis #graph #points-to
Flow- and Context-Sensitive Points-To Analysis Using Generalized Points-To Graphs (PMG, UPK, AM), pp. 212–236.
ASEASE-2016-AbdessalemNBS #multi #network #testing
Testing advanced driver assistance systems using multi-objective search and neural networks (RBA, SN, LCB, TS), pp. 63–74.
ASEASE-2016-AlmhanaMK0 #debugging #multi #recommendation
Recommending relevant classes for bug reports using multi-objective search (RA, WM, MK, AO), pp. 286–295.
ASEASE-2016-AlshanqitiHK #contract #dynamic analysis #reverse engineering #visual notation
Visual contract extractor: a tool for reverse engineering visual contracts using dynamic analysis (AMA, RH, TK), pp. 816–821.
ASEASE-2016-BaekB #android #automation #comparison #modelling #multi #testing #user interface
Automated model-based Android GUI testing using multi-level GUI comparison criteria (YMB, DHB), pp. 238–249.
ASEASE-2016-FengJCF #comprehension #image #multi
Multi-objective test report prioritization using image understanding (YF, JAJ, ZC, CF), pp. 202–213.
ASEASE-2016-MoonenABR #guidelines #mining #recommendation
Practical guidelines for change recommendation using association rule mining (LM, SDA, DB, TR), pp. 732–743.
ASEASE-2016-Mougouei #dependence #graph #integer #programming #requirements
Factoring requirement dependencies in software requirement selection using graphs and integer programming (DM), pp. 884–887.
ASEASE-2016-Nishi #bound #model checking #programming #towards
Towards bounded model checking using nonlinear programming solver (MN), pp. 560–565.
ASEASE-2016-PatrickCSG #automation #generative #image
Automatic test image generation using procedural noise (MP, MDC, ROJHS, CAG), pp. 654–659.
ASEASE-2016-PeldszusKLS #design #detection #evolution #incremental #multi #object-oriented #pattern matching #source code
Continuous detection of design flaws in evolving object-oriented programs using incremental multi-pattern matching (SP, GK, ML, SS), pp. 578–589.
ASEASE-2016-RahmanR #automation #concept #crowdsourcing #named #query
QUICKAR: automatic query reformulation for concept location using crowdsourced knowledge (MMR, CKR), pp. 220–225.
ASEASE-2016-YamadaBAKC #combinator #generative #satisfiability #testing
Greedy combinatorial test case generation using unsatisfiable cores (AY, AB, CA, TK, EHC), pp. 614–624.
FSEFSE-2016-Alexandru #network #synthesis
Guided code synthesis using deep neural networks (CVA), pp. 1068–1070.
FSEFSE-2016-Hammoudi #testing #tool support #web
Regression testing of web applications using Record/Replay tools (MH), pp. 1079–1081.
FSEFSE-2016-Luo16a #automation #performance #profiling #testing
Automatic performance testing using input-sensitive profiling (QL), pp. 1139–1141.
FSEFSE-2016-NguyenHCNMRND #api #fine-grained #learning #recommendation #statistics
API code recommendation using statistical learning from fine-grained changes (ATN0, MH, MC, HAN, LM, ER, TNN, DD), pp. 511–522.
FSEFSE-2016-NiuWG #requirements #traceability
Gray links in the use of requirements traceability (NN, WW0, AG), pp. 384–395.
FSEFSE-2016-Rolim #automation
Automating repetitive code changes using examples (RR), pp. 1063–1065.
ICSE-2016-BersaniBGKP #performance #pipes and filters #scalability
Efficient large-scale trace checking using mapreduce (MMB, DB, CG, SK, PSP), pp. 888–898.
ICSE-2016-CheungCLX #automation #clustering #detection #named #smell #spreadsheet
CUSTODES: automatic spreadsheet cell clustering and smell detection using strong and weak features (SCC, WC, YL, CX0), pp. 464–475.
ICSE-2016-DesaiGHJKMRR #natural language #synthesis
Program synthesis using natural language (AD, SG, VH, NJ, AK, MM, SR, SR), pp. 345–356.
ICSE-2016-MullerF #metric #online #predict #quality
Using (bio)metrics to predict code quality online (SCM, TF0), pp. 452–463.
ICSE-2016-NearJ #data access #debugging #security #web
Finding security bugs in web applications using a catalog of access control patterns (JPN, DJ0), pp. 947–958.
ICSE-2016-Rubio-Gonzalez0 #analysis #float #precise
Floating-point precision tuning using blame analysis (CRG, CN0, BM, KS, JD, WK, CI, WL, DHB, DH), pp. 1074–1085.
ICSE-2016-SuRT #evaluation #model checking #parametricity #reliability #runtime
Reliability of Run-Time Quality-of-Service evaluation using parametric model checking (GS, DSR, GT), pp. 73–84.
ICSE-2016-ZhangZZH #classification #fault #predict
Cross-project defect prediction using a connectivity-based unsupervised classifier (FZ0, QZ, YZ0, AEH), pp. 309–320.
GPCEGPCE-2016-Al-HajjajiKTLS #incremental #named #performance #product line #testing
IncLing: efficient product-line testing using incremental pairwise sampling (MAH, SK, TT, ML, GS), pp. 144–155.
SLESLE-2016-AmorimEWV #code completion
Principled syntactic code completion using placeholders (LEdSA, SE, GW, EV), pp. 163–175.
SLESLE-2016-VoelterSLKEB #consistency #development #editing #performance #projectional
Efficient development of consistent projectional editors using grammar cells (MV, TS, SL, BK, SE, TB), pp. 28–40.
ASPLOSASPLOS-2016-BrownNE #how #order #static analysis
How to Build Static Checking Systems Using Orders of Magnitude Less Code (FB, AN, DRE), pp. 143–157.
ASPLOSASPLOS-2016-GuoSCM #approximate #image #memory management
High-Density Image Storage Using Approximate Memory Cells (QG, KS, LC, HSM), pp. 413–426.
ASPLOSASPLOS-2016-ZhangLJ #concurrent #detection #hardware #memory management #named #performance #transaction
TxRace: Efficient Data Race Detection Using Commodity Hardware Transactional Memory (TZ, DL, CJ), pp. 159–173.
CASECASE-2016-AndreJT #assembly #modelling #reliability
Reliable robot assembly using haptic rendering models in combination with particle filters (RA, MJ, UT), pp. 1134–1139.
CASECASE-2016-ChengZWCJL #case study #data mining #energy #fault #mining
Case studies of fault diagnosis and energy saving in buildings using data mining techniques (ZC, QZ, FW, ZC, YJ, YL), pp. 646–651.
CASECASE-2016-DuH #petri net #robust
Robust control of Backward Conflict Free Systems with Resources using Petri nets (ND, HH), pp. 1034–1041.
CASECASE-2016-GargSKJMMG #adaptation #automation #locality #process
Tumor localization using automated palpation with Gaussian Process Adaptive Sampling (AG, SS, RK, YJ, SM, LM, KG), pp. 194–200.
CASECASE-2016-HsuYL #analysis #process
Effect analysis and optimal combination of cutting conditions on the cutting torque of tapping processes using Taguchi methods (CCH, SSY, JIL), pp. 1215–1218.
CASECASE-2016-IrieST #dependence
Target-less camera-LiDAR extrinsic calibration using a bagged dependence estimator (KI, MS, MT), pp. 1340–1347.
CASECASE-2016-LaskeyLCGHPDG #learning
Robot grasping in clutter: Using a hierarchy of supervisors for learning from demonstrations (ML, JL, CC, DVG, WYSH, FTP, ADD, KG), pp. 827–834.
CASECASE-2016-LiSXSL #framework #hybrid #low cost
A hybrid model and kinematic-free control framework for a low-cost deformable manipulator using in home service (GL, LS0, SX, DS, JL), pp. 1002–1007.
CASECASE-2016-LiuT #distributed #hybrid #multi #network
Distributed vision network for multiple target tracking using a dynamic hybrid consensus filter (GL, GT), pp. 805–808.
CASECASE-2016-MahadevKRFB #grid
Collecting a swarm in a grid environment using shared, global inputs (AVM, DK, JMR, SPF, ATB), pp. 1231–1236.
CASECASE-2016-ShahrokhiB
Object manipulation and position control using a swarm with global inputs (SS, ATB), pp. 561–566.
CASECASE-2016-SrinivasanC #approach #approximate #orthogonal
Path planning with user route preference - A reward surface approximation approach using orthogonal Legendre polynomials (ARS, SC), pp. 1100–1105.
CASECASE-2016-TanCPT #automation #design #diagrams #evaluation #layout
Automated design evaluation on layout of Piping and Instrumentation Diagram using Histogram of Connectivity (WCT, IMC, SJP, HKT), pp. 1295–1300.
CASECASE-2016-TsaiWPXLFZ #behaviour #predict #process #smarttech
Context-aware activity prediction using human behavior pattern in real smart home environments (MJT, CLW, SKP, YX, TYL, LCF, YCZ), pp. 168–173.
CASECASE-2016-WiebeRRV #approach #automation #composition #delivery #fault #generative #injection #simulation #testing
Automated test suite generation to test modular designed packaging machines using Fault Injection and a simulink-based simulation approach (FW, SR, SR, BVH), pp. 758–765.
CASECASE-2016-YangH #distributed #petri net
Mono-T-semiflow systems with resources and their distributed control using Petri nets (YY, HH), pp. 1042–1048.
CASECASE-2016-ZouFP #estimation #metric #network
Psychoacoustic impacts estimation in manufacturing based on accelerometer measurement using artificial neural networks (MZ, LF, JP), pp. 1203–1208.
CAVCAV-2016-KafleGM #abstract interpretation #automaton #finite #horn clause #named #verification
Rahft: A Tool for Verifying Horn Clauses Using Abstract Interpretation and Finite Tree Automata (BK, JPG, JFM), pp. 261–268.
CAVCAV-2016-MuellerSS #automation #execution #symbolic computation #verification
Automatic Verification of Iterated Separating Conjunctions Using Symbolic Execution (PM, MS, AJS), pp. 405–425.
CAVCAV-2016-PernsteinerLTTW #modelling #safety
Investigating Safety of a Radiotherapy Machine Using System Models with Pluggable Checkers (SP, CL, ET, ZT, XW0, MDE, JJ), pp. 23–41.
ICSTICST-2016-HuoC
Interpreting Coverage Information Using Direct and Indirect Coverage (CH, JC), pp. 234–243.
ICSTICST-2016-MahajanLBH #debugging #visual notation #web
Using Visual Symptoms for Debugging Presentation Failures in Web Applications (SM, BL, PB, WGJH), pp. 191–201.
ICSTICST-2016-MarculescuFT #evaluation #search-based #testing
Using Exploration Focused Techniques to Augment Search-Based Software Testing: An Experimental Evaluation (BM, RF, RT), pp. 69–79.
ICTSSICTSS-2016-EnoiuSCFP #embedded #generative #model checking #testing
Mutation-Based Test Generation for PLC Embedded Software Using Model Checking (EPE, DS, AC, RF, PP), pp. 155–171.
ICTSSICTSS-2016-PradhanWAYL #industrial #multi #named #testing
STIPI: Using Search to Prioritize Test Cases Based on Multi-objectives Derived from Industrial Practice (DP, SW0, SA0, TY0, ML), pp. 172–190.
ICTSSICTSS-2016-ReichstallerEKR #learning #testing
Risk-Based Interoperability Testing Using Reinforcement Learning (AR, BE, AK, WR, MG), pp. 52–69.
IJCARIJCAR-2016-AthanasiouLW #bound #equation #thread #verification
Unbounded-Thread Program Verification using Thread-State Equations (KA, PL, TW), pp. 516–531.
IJCARIJCAR-2016-DawsonBG #calculus #logic #theorem
Machine-Checked Interpolation Theorems for Substructural Logics Using Display Calculi (JED, JB, RG), pp. 452–468.
TAPTAP-2016-ReichlFT #formal method #validation #verification
Using Formal Methods for Verification and Validation in Railway (KR, TF, PT), pp. 3–13.
VMCAIVMCAI-2016-MarechalFKMP #approximate #multi #theorem
Polyhedral Approximation of Multivariate Polynomials Using Handelman's Theorem (AM, AF, TK0, DM, MP), pp. 166–184.
CBSECBSE-2015-MouelhiACM #behaviour #component #contract #design #object-oriented
Object-Oriented Component-Based Design using Behavioral Contracts: Application to Railway Systems (SM, KA, SC, HM), pp. 49–58.
ECSAECSA-2015-AgrawalP #adaptation #framework #towards #web
Towards a Framework for Building Adaptive App-Based Web Applications Using Dynamic Appification (AA, TVP), pp. 37–44.
ECSAECSA-2015-GalsterA #agile #architecture #comprehension #development
Understanding the Use of Reference Architectures in Agile Software Development Projects (MG, SA), pp. 268–276.
ECSAECSA-2015-HansenM #automation #community #composition #detection
(Automated) Software Modularization Using Community Detection (KMH, KM), pp. 95–102.
ECSAECSA-2015-TahriDP #architecture #deployment #distributed #feature model #modelling #smarttech
Using Feature Models for Distributed Deployment in Extended Smart Home Architecture (AT, LD, JP), pp. 285–293.
QoSAQoSA-2015-HofigZS #automation #dependence
Automated Failure Propagation using Inner Port Dependency Traces (KH, MZ, KS), pp. 123–128.
DocEngDocEng-2015-FerreiraLCFSR #automation #classification #documentation #summary
Automatic Document Classification using Summarization Strategies (RF, RDL, LdSC, FF, SJS, MR), pp. 69–72.
DocEngDocEng-2015-LesnikovaDE #rdf
Interlinking English and Chinese RDF Data Using BabelNet (TL, JD, JE), pp. 39–42.
DRRDRR-2015-BideaultMCP #architecture #regular expression #word
Spotting handwritten words and REGEX using a two stage BLSTM-HMM architecture (GB, LM, CC, TP).
DRRDRR-2015-MehriSHGAM #documentation #image #segmentation
Use of SLIC superpixels for ancient document image enhancement and segmentation (MM, NS, PH, PGK, NEBA, RM), p. 940205.
DRRDRR-2015-PengCN #approach
Boost OCR accuracy using iVector based system combination approach (XP, HC, PN).
DRRDRR-2015-RabaevCEK #documentation #programming
Aligning transcript of historical documents using dynamic programming (IR, RC, JES, KK).
DRRDRR-2015-SitaramHPSK #recognition #word
Offline handwritten word recognition using MQDF-HMMs (RS, MH, AP, DS, SK).
DRRDRR-2015-StalnakerZ #retrieval
Math expression retrieval using an inverted index over symbol pairs (DS, RZ), p. 940207.
HTHT-2015-Bayomi #adaptation #corpus #framework #reuse
A Framework to Provide Customized Reuse of Open Corpus Content for Adaptive Systems (MB), pp. 315–318.
HTHT-2015-BlountMW #logic #social #web
An Investigation into the Use of Logical and Rhetorical Tactics within Eristic Argumentation on the Social Web (TB, DEM, MJW), pp. 195–199.
JCDLJCDL-2015-CuongCKL #documentation #higher-order #information management #performance
Scholarly Document Information Extraction using Extensible Features for Efficient Higher Order Semi-CRFs (NVC, MKC, MYK, WSL), pp. 61–64.
PODSPODS-2015-CateCST #ontology
High-Level Why-Not Explanations using Ontologies (BtC, CC, ES, WCT), pp. 31–43.
SIGMODSIGMOD-2015-BarthelsLAK #in memory
Rack-Scale In-Memory Join Processing using RDMA (CB, SL, GA, DK), pp. 1463–1475.
SIGMODSIGMOD-2015-HuLWTGY #automation #documentation #named #social #social media
DocRicher: An Automatic Annotation System for Text Documents Using Social Media (QH, QL, XW, AKHT, SG, JY), pp. 901–906.
SIGMODSIGMOD-2015-NothaftMDZLYKAH #data-driven #scalability
Rethinking Data-Intensive Science Using Scalable Analytics Systems (FAN, MM, TD, ZZ, UL, CY, JK, AA, JH, ML, MJF, ADJ, DAP), pp. 631–646.
SIGMODSIGMOD-2015-TuR #named #query
DunceCap: Query Plans Using Generalized Hypertree Decompositions (ST, CR), pp. 2077–2078.
SIGMODSIGMOD-2015-WongHFXL #approach #as a service #database #named #parallel
Thrifty: Offering Parallel Database as a Service using the Shared-Process Approach (PW, ZH, ZF, WX, EL), pp. 1063–1068.
SIGMODSIGMOD-2015-XiaoBME #metadata #summary
Even Metadata is Getting Big: Annotation Summarization using InsightNotes (DX, AB, TM, MYE), pp. 1409–1414.
SIGMODSIGMOD-2015-YanZHSMZM #detection #distributed
Distributed Outlier Detection using Compressive Sensing (YY, JZ, BH, XS, JM, ZZ, TM), pp. 3–16.
SIGMODSIGMOD-2015-ZhangCPSX #graph #statistics
Private Release of Graph Statistics using Ladder Functions (JZ, GC, CMP, DS, XX), pp. 731–745.
VLDBVLDB-2015-DeutchGM #datalog #query #source code
Selective Provenance for Datalog Programs Using Top-K Queries (DD, AG, YM), pp. 1394–1405.
VLDBVLDB-2015-HeCMPS #named #synthesis
DPT: Differentially Private Trajectory Synthesis Using Hierarchical Reference Systems (XH, GC, AM, CMP, DS), pp. 1154–1165.
VLDBVLDB-2015-HeGC #corpus #named #semantics
SEMA-JOIN: Joining Semantically-Related Tables Using Big Table Corpora (YH, KG, XC), pp. 1358–1369.
VLDBVLDB-2015-LazersonSKSGS #distributed #monitoring
Monitoring Distributed Streams using Convex Decompositions (AL, IS, DK, AS, MNG, VS), pp. 545–556.
VLDBVLDB-2015-ParkMS #pipes and filters #probability #query
Processing of Probabilistic Skyline Queries Using MapReduce (YP, JKM, KS), pp. 1406–1417.
VLDBVLDB-2015-ShinWWSZR #incremental #knowledge base
Incremental Knowledge Base Construction Using DeepDive (JS, SW, FW, CDS, CZ, CR), pp. 1310–1321.
CSEETCSEET-2015-SedanoP #experience #student
Enhancing Student Experience in Team-Based Project Courses Using Essence Reflection Meetings (TS, CP), pp. 10–12.
EDMEDM-2015-AlHarbiH #automation #modelling #segmentation #topic
Using Topic Segmentation Models for the Automatic Organisation of MOOCs resources (GA, TH), pp. 524–527.
EDMEDM-2015-AnayaGLH #analysis #approach #collaboration #diagrams #network #social
An Approach of Collaboration Analytics in MOOCs Using Social Network Analysis and Influence Diagram (ARA, JGB, EL, FHdO), pp. 492–495.
EDMEDM-2015-BorjiginMSZ #assessment #behaviour
Skill Assessment Using Behavior Data in Virtual World (AB, CM, ZS, ZZ), pp. 570–571.
EDMEDM-2015-BotelhoAWH #performance #predict #student
Predicting Student Aptitude Using Performance History (AFB, SAA, HW, NTH), pp. 622–623.
EDMEDM-2015-EmondB #classification #process #sequence #student
Analyzing Student Inquiry Data Using Process Discovery and Sequence Classification (BE, SB), pp. 412–415.
EDMEDM-2015-Fancsali #algebra #behaviour #learning #modelling #visual notation
Confounding Carelessness? Exploring Causal Relationships Between Carelessness, Affect, Behavior, and Learning in Cognitive Tutor Algebra Using Graphical Causal Models (SF), pp. 508–511.
EDMEDM-2015-Feild #performance #student
Improving Student Performance Using Nudge Analytics (JLF), pp. 464–467.
EDMEDM-2015-GandhiBD #education #topic #visual notation #word
Topic Transition in Educational Videos Using Visually Salient Words (AG, AB, OD), pp. 289–296.
EDMEDM-2015-Geryk #comprehension #visual notation
Using Visual Analytics Tool for Improving Data Comprehension (JG), pp. 327–334.
EDMEDM-2015-InwegenAWH
Using Partial Credit and Response History to Model User Knowledge (EVI, SA, YW0, NTH), pp. 313–319.
EDMEDM-2015-LuoSMG #predict #student #word
Predicting Student Grade based on Free-style Comments using Word2Vec and ANN by Considering Prediction Results Obtained in Consecutive Lessons (JL, SES, TM, KG), pp. 396–399.
EDMEDM-2015-MacHardyP #big data #education
Evaluating Educational Videos using Bayesian Knowledge Tracing and Big Data (ZM, ZAP), pp. 424–427.
EDMEDM-2015-NicolajsenP #adaptation #collaboration #component
Using Knowledge Components for Collaborative Filtering in Adaptive Tutoring Systems (PHN, BP), pp. 536–539.
EDMEDM-2015-Rihak #adaptation #modelling
Use of Time Information in Models behind Adaptive Practice System for Building Fluency in Mathematics (JR), pp. 642–644.
ITiCSEITiCSE-2015-Dickson #development #education #game studies
Using Unity to Teach Game Development: When You’ve Never Written a Game (PED), pp. 75–80.
ITiCSEITiCSE-2015-Harms15a #java
Using Personal Robots and Myro/Java in the First Computer Science Course (DEH), p. 332.
ITiCSEITiCSE-2015-KirkpatrickP #assurance #operating system #process
Using the Readiness Assurance Process and Metacognition in an Operating Systems Course (MSK, SP), pp. 183–188.
ITiCSEITiCSE-2015-Rubio #analysis #automation #categorisation #clustering #programming #student
Automatic Categorization of Introductory Programming Students using Cluster Analysis (MAR), p. 340.
ITiCSEITiCSE-2015-TarmazdiVSFF #learning #visualisation
Using Learning Analytics to Visualise Computer Science Teamwork (HT, RV, CS, KEF, NJGF), pp. 165–170.
ITiCSEITiCSE-2015-WangMSLCW #data access #education #named #visualisation
RBACvisual: A Visualization Tool for Teaching Access Control using Role-based Access Control (MW, JM, CKS, TL, SC, CW), pp. 141–146.
SIGITESIGITE-2015-ZhouCKNCUG #collaboration #feedback #scalability #student
M-CAFE 1.0: Motivating and Prioritizing Ongoing Student Feedback During MOOCs and Large on-Campus Courses using Collaborative Filtering (MZ, AC, SK, BN, CC, KU, KG), pp. 153–158.
ICPCICPC-2015-CosmaM #component #comprehension #visual notation #web
Understanding web applications using component based visual patterns (DCC, PFM), pp. 281–284.
ICPCICPC-2015-Escobar-AvilaVH #bytecode #categorisation
Unsupervised software categorization using bytecode (JEA, MLV, SH), pp. 229–239.
ICPCICPC-2015-HillSP #evaluation #feature model
Exploring the use of concern element role information in feature location evaluation (EH, DCS, LLP), pp. 140–150.
ICPCICPC-2015-JbaraF #empirical #eye tracking #how
How programmers read regular code: a controlled experiment using eye tracking (AJ, DGF), pp. 244–254.
ICPCICPC-2015-LafetaMR #dynamic analysis #framework
Framework instantiation using cookbooks constructed with static and dynamic analysis (RFL, MdAM, DR), pp. 125–128.
ICPCICPC-2015-MacLeodSB #developer #documentation #how
Code, camera, action: how software developers document and share program knowledge using YouTube (LM, MAS, AB), pp. 104–114.
ICPCICPC-2015-SaiedABS #api #library #question #source code
Could we infer unordered API usage patterns only using the library source code? (MAS, HA, OB, HAS), pp. 71–81.
ICSMEICSME-2015-AbidDCM #automation #c++ #generative #natural language #summary
Using stereotypes in the automatic generation of natural language summaries for C++ methods (NJA, ND, MLC, JIM), pp. 561–565.
ICSMEICSME-2015-CorleyDK #feature model #learning
Exploring the use of deep learning for feature location (CSC, KD, NAK), pp. 556–560.
ICSMEICSME-2015-DongAS #fault #static analysis
Practical and accurate pinpointing of configuration errors using static analysis (ZD, AA, KS), pp. 171–180.
ICSMEICSME-2015-DorningerPK #industrial #static analysis #user interface
Using static analysis for knowledge extraction from industrial User Interfaces (BD, JP, AK), pp. 497–500.
ICSMEICSME-2015-HardtM #empirical #evaluation #maintenance
An empirical evaluation of ant build maintenance using Formiga (RH, EVM), pp. 201–210.
ICSMEICSME-2015-MedicherlaKN #specification #verification
Program specialization and verification using file format specifications (RKM, RK, SN), pp. 191–200.
ICSMEICSME-2015-ValeM #architecture #dynamic analysis #mining #named
Keecle: Mining key architecturally relevant classes using dynamic analysis (LdNV, MdAM), pp. 566–570.
MSRMSR-2015-BlincoeHD #ecosystem #git #identification
Ecosystems in GitHub and a Method for Ecosystem Identification Using Reference Coupling (KB, FH, DD), pp. 202–211.
MSRMSR-2015-DonadelliZR #case study #fault #replication
Organizational Volatility and Post-release Defects: A Replication Case Study Using Data from Google Chrome (SMD, YCZ, PCR), pp. 391–395.
MSRMSR-2015-WangPWG #comprehension #git #what
What Is the Gist? Understanding the Use of Public Gists on GitHub (WW, GPC, EW, DMG), pp. 314–323.
MSRMSR-2015-ZanjaniKB #developer
Using Developer-Interaction Trails to Triage Change Requests (MBZ, HHK, CB), pp. 88–98.
MSRMSR-2015-ZouXGYYZ #analysis #developer #empirical #non-functional #requirements #stack overflow #topic
Which Non-functional Requirements Do Developers Focus On? An Empirical Study on Stack Overflow Using Topic Analysis (JZ, LX, WG, MY, DY, XZ), pp. 446–449.
SANERSANER-2015-BezemerPG #comprehension #difference #graph #performance
Understanding software performance regressions using differential flame graphs (CPB, JP, BG), pp. 535–539.
SANERSANER-2015-CabotICR #open source
Exploring the use of labels to categorize issues in Open-Source Software projects (JC, JLCI, VC, BR), pp. 550–554.
SANERSANER-2015-HuSLL #development #evolution #modelling #topic
Modeling the evolution of development topics using Dynamic Topic Models (JH, XS, DL, BL), pp. 3–12.
SANERSANER-2015-LaverdiereBM #analysis #composition #graph
Taint analysis of manual service compositions using Cross-Application Call Graphs (MAL, BJB, EM), pp. 585–589.
SANERSANER-2015-NayrollesHTL #approach #debugging #model checking #named
JCHARMING: A bug reproduction approach using crash traces and directed model checking (MN, AHL, ST, AL), pp. 101–110.
SANERSANER-2015-QiuSM #graph #identification #library #morphism
Library functions identification in binary code by using graph isomorphism testings (JQ, XS, PM), pp. 261–270.
SCAMSCAM-2015-BonifacioCRKC #c++ #exception
The use of C++ exception handling constructs: A comprehensive study (RB, FC, GNR, UK, RC), pp. 21–30.
SCAMSCAM-2015-ChochlovEB #data flow #feature model
Using changeset descriptions as a data source to assist feature location (MC, ME, JB), pp. 51–60.
SCAMSCAM-2015-LemosPSL #code search #query #question #scalability
Can the use of types and query expansion help improve large-scale code search? (OALL, ACdP, HS, CVL), pp. 41–50.
SCAMSCAM-2015-PanditaJSW #api #mining
Discovering likely mappings between APIs using text mining (RP, RPJ, SDS, LAW), pp. 231–240.
SCAMSCAM-2015-RahmanRK #crowdsourcing #recommendation #source code
Recommending insightful comments for source code using crowdsourced knowledge (MMR, CKR, IK), pp. 81–90.
SCAMSCAM-2015-RenatusBE #modelling #security
Improving prioritization of software weaknesses using security models with AVUS (SR, CB, JE), pp. 259–264.
SCAMSCAM-2015-UddinGGR #comprehension #eye tracking #on the #visualisation
On the comprehension of code clone visualizations: A controlled study using eye tracking (MSU, VG, CG, CKR), pp. 161–170.
ICALPICALP-v1-2015-KhotS #approximate
Approximating CSPs Using LP Relaxation (SK, RS), pp. 822–833.
FMFM-2015-0001K #bound #model checking
Property-Driven Fence Insertion Using Reorder Bounded Model Checking (SJ, DK), pp. 291–307.
FMFM-2015-AlTurkiA #distributed #framework #towards #verification #𝕂
Towards Formal Verification of Orchestration Computations Using the 𝕂 Framework (MAA, OA), pp. 40–56.
FMFM-2015-ChimdyalwarDCVC #abstraction #bound #model checking #static analysis
Eliminating Static Analysis False Positives Using Loop Abstraction and Bounded Model Checking (BC, PD, AC, SV, AC), pp. 573–576.
FMFM-2015-MirandaMR #automation #design #generative #testing #verification
Using Simulink Design Verifier for Automatic Generation of Requirements-Based Tests (BM, HM, RR), pp. 601–604.
FMFM-2015-Nakajima #behaviour #energy #maude #realtime
Using Real-Time Maude to Model Check Energy Consumption Behavior (SN), pp. 378–394.
RTARTA-2015-AvanziniST #certification #complexity #proving
Certification of Complexity Proofs using CeTA (MA, CS, RT), pp. 23–39.
SEFMSEFM-2015-JonesY #abstraction #reasoning
Reasoning about Separation Using Abstraction and Reification (CBJ, NY), pp. 3–19.
SEFMSEFM-2015-RochaBC #bound #c #generative #memory management #model checking #source code #testing
Memory Management Test-Case Generation of C Programs Using Bounded Model Checking (HR, RSB, LCC), pp. 251–267.
SEFMSEFM-2015-SavaryFLL #modelling #robust #testing
Model-Based Robustness Testing in Event-B Using Mutation (AS, MF, ML, JLL), pp. 132–147.
ICFPICFP-2015-SteuwerFLD #functional #generative #performance
Generating performance portable code using rewrite rules: from high-level functional expressions to high-performance OpenCL code (MS, CF, SL, CD), pp. 205–217.
AIIDEAIIDE-2015-StanescuBB #predict
Using Lanchester Attrition Laws for Combat Prediction in StarCraft (MAS, NAB, MB), pp. 86–92.
CHI-PLAYCHI-PLAY-2015-CollinsELG #2d #artificial reality #game studies #platform
Alaska Steve: Using Virtual Reality to Enhance a 2D Platforming Game (LC, SE, JL, TCNG), pp. 767–770.
CHI-PLAYCHI-PLAY-2015-HarpsteadA #analysis #design #education #empirical #game studies #learning
Using Empirical Learning Curve Analysis to Inform Design in an Educational Game (EH, VA), pp. 197–207.
CHI-PLAYCHI-PLAY-2015-HicksG #game studies
Exploring Casual Exergames with Kids Using Wheelchairs (KH, KG), pp. 541–546.
CHI-PLAYCHI-PLAY-2015-KeumRMCLBC #composition #development #game studies
Exergame Development Using Body Composition Data for Obesity Care (JK, JHR, YJM, HC, NL, BCB, JDC), pp. 577–582.
CHI-PLAYCHI-PLAY-2015-Schwind0HK #generative
Determining the Characteristics of Preferred Virtual Faces Using an Avatar Generator (VS, KW0, NH, OK), pp. 221–230.
CoGCIG-2015-Garcia-SanchezT #automation #generative #programming #search-based #towards
Towards automatic StarCraft strategy generation using genetic programming (PGS, APT, AMM, GS, JJMG), pp. 284–291.
CoGCIG-2015-OliveiraM #game studies #performance #realtime
Creating efficient walls using potential fields in real-time strategy games (CFdO, CAGM), pp. 138–145.
CoGCIG-2015-RunarssonL #approximate #evaluation #game studies #on the
On imitating Connect-4 game trajectories using an approximate n-tuple evaluation function (TPR, SML), pp. 208–213.
CoGCIG-2015-SatoIW #estimation #monte carlo #multi
Estimation of player's preference for cooperative RPGs using multi-strategy Monte-Carlo method (NS, KI, TW), pp. 51–59.
DiGRADiGRA-2015-BartonSQMKK #bias #design #game studies #reduction
The Use of Theory in Designing a Serious Game for the Reduction of Cognitive Biases (MB, CS, MMQ, CKM, KSK, JK).
DiGRADiGRA-2015-MarczakSH #comprehension #experience #matrix #similarity
Understanding Player Experience Through the Use of Similarity Matrix (RM, GS, PH).
DiGRADiGRA-2015-Warpefelt #visual notation
Cues and insinuations: Indicating affordances of non-player character using visual indicators (HW).
FDGFDG-2015-IsaksenGN #analysis #game studies
Exploring Game Space Using Survival Analysis (AI, DG, AN).
FDGFDG-2015-KaoH15b #game studies #learning
Exploring the Construction, Play, Use of Virtual Identities in a STEM Learning Game (DK, DFH).
FDGFDG-2015-Martens #game studies #proving
Using Proof Theory to Study Game Mechanics (CM).
FDGFDG-2015-ReuterGS #automation #detection #game studies #multi #petri net
Detecting structural deadlocks in Multiplayer Games using automatically generated Petri Nets (CR0, SG0, RS).
FDGFDG-2015-RyanKMW15a #analysis #game studies #semantics #tool support
Tools for Game Discovery Built Using Latent Semantic Analysis (JOR, EK, MM, NWF).
CoGVS-Games-2015-BrichRFWBMDRS0 #game studies #named #research
LiverDefense: Using a Tower Defense Game as a Customisable Research Tool (JB, KR, JF, MW, AB, SM, TD, VR, CS, MW0), pp. 1–8.
CoGVS-Games-2015-Cejka #detection
Continuous Collision Detection Using Tetrahedral Structures (JC), pp. 1–4.
CoGVS-Games-2015-DiazDHS #development #game studies #learning #multi #online #video
Explicit Fun, Implicit Learning in Multiplayer Online Battle Arenas: Methodological Proposal for Studying the Development of Cognitive Skills Using Commercial Video Games (CMCD, BD, HH, JWS), pp. 1–3.
CoGVS-Games-2015-DiazWLT #game studies #visitor
Your Answer Will Make an Impression. Using Quiz Game Mechanics for the Collection of Visitor Data at an Exhibition (MGAD, UW, ML, MT), pp. 1–4.
CoGVS-Games-2015-RobbWW #design #development #game studies
The Development of TASTER, a Cognitive Training Game Using Human-Centered Design, Tailored for Children with Global and Specific Cognitive Impairments (NR, AW, KW), pp. 1–2.
CoGVS-Games-2015-WilhelmssonEBO #design #game studies #visual notation
Accessible Game Culture Using Inclusive Game Design - Participating in a Visual Culture That You Cannot See (UW, HE, JB, PAÖ), pp. 1–8.
GCMGCM-2015-BottoniNP #constraints #contract #modelling #policy
Conditions, Constraints and Contracts: On the Use of Annotations for Policy Modeling (PB, RN, FPP), pp. 18–33.
ICGTICGT-2015-Bruggink0NZ #graph #graph transformation #proving #termination
Proving Termination of Graph Transformation Systems Using Weighted Type Graphs over Semirings (HJSB, BK, DN, HZ), pp. 52–68.
ICGTICGT-2015-Stuckrath #analysis #graph transformation #named #verification
Uncover: Using Coverability Analysis for Verifying Graph Transformation Systems (JS), pp. 266–274.
ICGTICGT-2015-WeberDP #formal method #graph transformation #monitoring
Using Graph Transformations for Formalizing Prescriptions and Monitoring Adherence (JHW, SD, MP), pp. 205–220.
CHICHI-2015-AsenieroWLRTC #named #release planning #visualisation
STRATOS: Using Visualization to Support Decisions in Strategic Software Release Planning (BAA, TW, DL, GR, AT, SC), pp. 1479–1488.
CHICHI-2015-BachynskyiPOSW #case study #comparative #performance #simulation
Performance and Ergonomics of Touch Surfaces: A Comparative Study using Biomechanical Simulation (MB, GP, AO, JS, TW), pp. 1817–1826.
CHICHI-2015-BellottiATGDC #modelling #motivation #peer-to-peer
A Muddle of Models of Motivation for Using Peer-to-Peer Economy Systems (VB, AA, DT, CG, KD, JMC), pp. 1085–1094.
CHICHI-2015-BentleyC #composition #mobile
The Composition and Use of Modern Mobile Phonebooks (FRB, YYC), pp. 2749–2758.
CHICHI-2015-DaltonCM
Display Blindness?: Looking Again at the Visibility of Situated Displays using Eye-tracking (NSD, EC, PM), pp. 3889–3898.
CHICHI-2015-DamianTBSLA #behaviour #feedback #interactive #realtime #social
Augmenting Social Interactions: Realtime Behavioural Feedback using Social Signal Processing Techniques (ID, CSST, TB, JS, KL, EA), pp. 565–574.
CHICHI-2015-FleckCR #bound #multi
Balancing Boundaries: Using Multiple Devices to Manage Work-Life Balance (RF, ALC, RAVR), pp. 3985–3988.
CHICHI-2015-GerlingML #game studies #video
Long-Term Use of Motion-Based Video Games in Care Home Settings (KMG, RLM, CL), pp. 1573–1582.
CHICHI-2015-GoelZVP #detection #flexibility #gesture #named
Tongue-in-Cheek: Using Wireless Signals to Enable Non-Intrusive and Flexible Facial Gestures Detection (MG, CZ, RV, SNP), pp. 255–258.
CHICHI-2015-GrevetG #prototype #scalability #social
Piggyback Prototyping: Using Existing, Large-Scale Social Computing Systems to Prototype New Ones (CG, EG), pp. 4047–4056.
CHICHI-2015-GunaratneN #behaviour #performance #user interface
Informing and Improving Retirement Saving Performance using Behavioral Economics Theory-driven User Interfaces (JG, ON), pp. 917–920.
CHICHI-2015-HaqueNV #named
Myopoint: Pointing and Clicking Using Forearm Mounted Electromyography and Inertial Motion Sensors (FH, MN, DV), pp. 3653–3656.
CHICHI-2015-HiguchiCCZL #experience #named
ImmerseBoard: Immersive Telepresence Experience using a Digital Whiteboard (KH, YC, PAC, ZZ, ZL), pp. 2383–2392.
CHICHI-2015-HolzBK #identification #mobile #named
Bodyprint: Biometric User Identification on Mobile Devices Using the Capacitive Touchscreen to Scan Body Parts (CH, SB, MK), pp. 3011–3014.
CHICHI-2015-HourcadeMWP #analysis #exclamation
Look, My Baby Is Using an iPad! An Analysis of YouTube Videos of Infants and Toddlers Using Tablets (JPH, SLM, DW, LP), pp. 1915–1924.
CHICHI-2015-HydeCKH #interactive #persuasion
Using an Interactive Avatar’s Facial Expressiveness to Increase Persuasiveness and Socialness (JH, EJC, SBK, JKH), pp. 1719–1728.
CHICHI-2015-JonesCDTPDH #delphi #information management
“For Telling” the Present: Using the Delphi Method to Understand Personal Information Management Practices (WJ, RC, AD, JT, MAPQ, JDD, BMH), pp. 3513–3522.
CHICHI-2015-KatanGF #development #interactive #interface #machine learning #people
Using Interactive Machine Learning to Support Interface Development Through Workshops with Disabled People (SK, MG, RF), pp. 251–254.
CHICHI-2015-KosmallaDK #automation #metric #named #recognition
ClimbSense: Automatic Climbing Route Recognition using Wrist-worn Inertia Measurement Units (FK, FD, AK), pp. 2033–2042.
CHICHI-2015-LeeLCWSK #education #interactive #online #social
Using Time-Anchored Peer Comments to Enhance Social Interaction in Online Educational Videos (YCL, WCL, FYC, HCW, CYS, JTK), pp. 689–698.
CHICHI-2015-LugerURG #design #game studies #process
Playing the Legal Card: Using Ideation Cards to Raise Data Protection Issues within the Design Process (EL, LU, TR, MG), pp. 457–466.
CHICHI-2015-MaiorPSW #human-computer #reliability
Examining the Reliability of Using fNIRS in Realistic HCI Settings for Spatial and Verbal Tasks (HAM, MP, SCS, MLW), pp. 3039–3042.
CHICHI-2015-MariakakisGAPW #mobile #named
SwitchBack: Using Focus and Saccade Tracking to Guide Users’ Attention for Mobile Task Resumption (AM, MG, MTIA, SNP, JOW), pp. 2953–2962.
CHICHI-2015-ParkPN
The Trial of Bendi in a Coffeehouse: Use of a Shape-Changing Device for a Tactile-Visual Phone Conversation (YP, JP, TJN), pp. 2181–2190.
CHICHI-2015-PatelO
Contextual Influences on the Use and Non-Use of Digital Technology While Exercising at the Gym (MP, AAO), pp. 2923–2932.
CHICHI-2015-PfeifferDSAR
Cruise Control for Pedestrians: Controlling Walking Direction using Electrical Muscle Stimulation (MP, TD, SS, FA, MR), pp. 2505–2514.
CHICHI-2015-PreistJ #education #game studies #motivation
The Use of Games as Extrinisic Motivation in Education (CP, RJ), pp. 3735–3738.
CHICHI-2015-SimeoneVG #artificial reality #case study #design #experience #physics
Substitutional Reality: Using the Physical Environment to Design Virtual Reality Experiences (ALS, EV, HG), pp. 3307–3316.
CHICHI-2015-SlegersRVD #elicitation #game studies #research #user interface
Using Game Principles in UX Research: A Board Game for Eliciting Future User Needs (KS, SR, JV, PD), pp. 1225–1228.
CHICHI-2015-TholanderN #experience #performance
Snot, Sweat, Pain, Mud, and Snow: Performance and Experience in the Use of Sports Watches (JT, SN), pp. 2913–2922.
CHICHI-2015-VertanenMERK #mobile #named #performance
VelociTap: Investigating Fast Mobile Text Entry using Sentence-Based Decoding of Touchscreen Keyboard Input (KV, HM, JE, SR, POK), pp. 659–668.
CHICHI-2015-WangGXZYB #interactive #named #privacy #visualisation
VeilMe: An Interactive Visualization Tool for Privacy Configuration of Using Personality Traits (YW, LG, AX, MXZ, HY, HB), pp. 817–826.
CHICHI-2015-ZugerF #developer #predict
Interruptibility of Software Developers and its Prediction Using Psycho-Physiological Sensors (MZ, TF), pp. 2981–2990.
CSCWCSCW-2015-ChangHT #recommendation
Using Groups of Items to Bootstrap New Users in Recommender Systems (SC, FMH, LGT), pp. 1258–1269.
CSCWCSCW-2015-FreitasD15a #detection #multi
Using Multiple Contexts to Detect and Form Opportunistic Groups (AAdF, AKD), pp. 1612–1621.
CSCWCSCW-2015-KaziunasBJCHA #health
Transition and Reflection in the Use of Health Information: The Case of Pediatric Bone Marrow Transplant Caregivers (EK, AGB, JJ, SWC, DAH, MSA), pp. 1763–1774.
CSCWCSCW-2015-MaddockSASOM #behaviour #multi #online
Characterizing Online Rumoring Behavior Using Multi-Dimensional Signatures (JM, KS, HJAH, DES, MO, RMM), pp. 228–241.
CSCWCSCW-2015-ProstMT #design #energy #towards
From Awareness to Empowerment: Using Design Fiction to Explore Paths towards a Sustainable Energy Future (SP, EEM, MT), pp. 1649–1658.
CSCWCSCW-2015-XuRDB #design #feedback #process
A Classroom Study of Using Crowd Feedback in the Iterative Design Process (AX, HR, SPD, BPB), pp. 1637–1648.
HCIDHM-EH-2015-BoZDYWF #hybrid #kernel #performance #recognition
Hybrid BFO-PSO and Kernel FCM for the Recognition of Pilot Performance Influenced by Simulator Movement Using Diffusion Maps (JB, YBZ, LD, BTY, QW, SF), pp. 239–247.
HCIDHM-EH-2015-GieserBM #artificial reality #gesture #realtime #recognition
Real-Time Static Gesture Recognition for Upper Extremity Rehabilitation Using the Leap Motion (SNG, AB, FM), pp. 144–154.
HCIDHM-EH-2015-KollingKHC #design #evaluation #feedback #interactive #process
Estimating Ergonomic Comfort During the Process of Mechanism Design by Interaction with a Haptic Feedback-System — Evaluation of Simulated and Kinesthetically Displayed Mechanisms Using the Haptic Feedback System RePlaLink (TK, MK, MH, BC), pp. 62–73.
HCIDHM-EH-2015-MeryS #modelling #requirements
Analyzing Requirements Using Environment Modelling (DM, NKS), pp. 345–357.
HCIDHM-EH-2015-NakamuraKKMK #development #self #student
Development of a Self-learning System for Chest Auscultation Skills Using an RFID Reader for Nursing Students (MN, KK, YK, JM, MKP), pp. 474–481.
HCIDHM-EH-2015-UchidaHKEMOUG #analysis #process
Process Analysis of the Hand Lay-Up Method Using CFRP Prepreg Sheets (TU, HH, KK, AE, MM, JO, TU, AG), pp. 227–236.
HCIDHM-EH-2015-ZhengBISEL #behaviour #monitoring
Driving-Behavior Monitoring Using an Unmanned Aircraft System (UAS) (CZ, AB, WI, IS, EE, KL), pp. 305–312.
HCIDHM-HM-2015-FurukawaTKG #evaluation #image
Evaluation of Kimono Clothes in Kyo-Yuzen-Zome using Image (TF, YT, NK, AG), pp. 277–288.
HCIDUXU-DD-2015-AsthanaS #modelling #named #testing #usability #xml
Maareech: Usability Testing Tool for Voice Response System Using XML Based User Models (SA, PS), pp. 101–112.
HCIDUXU-IXD-2015-AkerO #effectiveness #interactive #social #social media
Social Media Interactions and the Use of Third-Party Management Applications on Effectiveness and Perception of Information (ÇA, ÖÖ), pp. 3–12.
HCIDUXU-IXD-2015-DasBRD #co-evolution #design #generative
The Use of Generative Techniques in Co-design of mHealth Technology and Healthcare Services for COPD Patients (AD, SB, JR, YD), pp. 587–595.
HCIDUXU-IXD-2015-HalbeyKZ
Going on a Road-Trip with My Electric Car: Acceptance Criteria for Long-Distance-Use of Electric Vehicles (JH, SK, MZ), pp. 473–484.
HCIDUXU-IXD-2015-IwamotoKM #analysis #case study
A Study of Conversation Support System Between the Elderly Person and Young Adults by Using Facial Expression Analysis (MI, NK, KM), pp. 616–627.
HCIDUXU-UI-2015-AyanogluBTD #artificial reality #case study
Effects of Packages’ Color as a Cue for Hazard-Related Perceptions: A Study Using Virtual Reality (HA, RB, JT, ED), pp. 3–13.
HCIDUXU-UI-2015-DuWDXJ #case study #metric
Study on Operating Clearance Measurement of Some Connectors by Using Motion Capture (HD, LW, LD, YX, CJ), pp. 45–53.
HCIDUXU-UI-2015-LiHF #quality #requirements #scalability #user interface
Scaling Preferences of Different Stakeholders — Using the Example of Prioritizing Quality Requirements on User Interface Texts (YL, TH, PF), pp. 75–86.
HCIHCI-DE-2015-Hensely-Schinkinger #design
The Definition and Use of Personas in the Design of Technologies for Informal Caregivers (SHS, AFPdC, MG, HT), pp. 202–213.
HCIHCI-DE-2015-SantosFD #case study #evaluation #heuristic #set #visualisation
Heuristic Evaluation in Information Visualization Using Three Sets of Heuristics: An Exploratory Study (BSS, BQF, PD), pp. 259–270.
HCIHCI-DE-2015-SantosST #interactive #open source #visualisation
Interactive Clinical Pedigree Visualization Using an Open Source Pedigree Drawing Engine (JMS, BSS, LT), pp. 405–414.
HCIHCI-DE-2015-SchutzSO
Using Diary Studies to Evaluate Railway Dispatching Software (IS, AS, AO), pp. 248–258.
HCIHCI-DE-2015-SugiuraSO #implementation #metric #security
Improving IT Security Through Security Measures: Using Our Game-Theory-Based Model of IT Security Implementation (MS, HS, TO), pp. 82–95.
HCIHCI-DE-2015-WatsonS #assessment
Using Readers’ and Organizations’ Goals to Guide Assessment of Success in Information Websites (RBW, JHS), pp. 283–294.
HCIHCI-IT-2015-BandeiraCXK #gesture #interface
Using Gesture-Based Interfaces to Control Robots (GMB, MC, BHX, JK), pp. 3–12.
HCIHCI-IT-2015-FukumotoTE #detection
Improvement of Accuracy in Remote Gaze Detection for User Wearing Eyeglasses Using Relative Position Between Centers of Pupil and Corneal Sphere (KF, TT, YE), pp. 13–23.
HCIHCI-IT-2015-GuXCZ
To Write not Select, a New Text Entry Method Using Joystick (ZG, XX, CC, YZ), pp. 35–43.
HCIHCI-IT-2015-HakodaKSST #bound #gesture #mobile #named
AirFlip: A Double Crossing In-Air Gesture Using Boundary Surfaces of Hover Zone for Mobile Devices (HH, TK, KS, BS, JT), pp. 44–53.
HCIHCI-IT-2015-KondoTT #communication #smarttech
Information Select and Transfer Between Touch Panel and Wearable Devices Using Human Body Communication (YK, ST, JT), pp. 208–216.
HCIHCI-IT-2015-KuribaraST
Mouse Augmentation Using a Malleable Mouse Pad (TK, BS, JT), pp. 217–226.
HCIHCI-IT-2015-MullerLBSKSW #data-driven #network #overview #predict
Using Neural Networks for Data-Driven Backchannel Prediction: A Survey on Input Features and Training Techniques (MM, DL, LB, MS, KK, SS, AW), pp. 329–340.
HCIHCI-IT-2015-MurataM #analysis #eye tracking
Nonlinear Dynamical Analysis of Eye Movement Characteristics Using Attractor Plot and First Lyapunov Exponent (AM, TM), pp. 78–85.
HCIHCI-IT-2015-Nagaraju #framework #gesture
Swift Gestures: Seamless Bend Gestures Using Graphics Framework Capabilities (SN), pp. 118–129.
HCIHCI-UC-2015-AzhariF #approach #experience #social #social media #user interface
Using a Lexical Approach to Investigate User Experience of Social Media Applications (AA, XF), pp. 15–24.
HCIHCI-UC-2015-ClarkeBK #experience #question #what
What Learnability Issues Do Primary Care Physicians Experience When Using CPOE? (MAC, JLB, MSK), pp. 373–383.
HCIHCI-UC-2015-OhJK #approach #human-computer #simulation
Simulation of an Affordance-Based Human-Machine Cooperative Control Model Using an Agent-Based Simulation Approach (YgO, IJ, NK), pp. 226–237.
HCIHCI-UC-2015-Ujita #analysis #reliability
Accident Analysis by Using Methodology of Resilience Engineering, High Reliability Organization, and Risk Literacy (HU), pp. 358–369.
HCIHIMI-IKC-2015-FilhoHTJM #smarttech
Using Wearable and Contextual Computing to Optimize Field Engineering Work Practices (RSSF, CLH, AT, JJ, PM), pp. 522–533.
HCIHIMI-IKC-2015-HamaguchiMTKN #design #generative #matrix
A Method for Generation and Check of Alarm Configurations Using Cause-Effect Matrices for Plant Alarm System Design (TH, BM, KT, NK, MN), pp. 549–556.
HCIHIMI-IKC-2015-ItaiM #development #interactive
Study About Creation of “Maai” Involving Intention Using Rhythm Controller — Development of Maai Creating Agent and Interaction Experiments Between Human and Agent (SI, YM), pp. 599–609.
HCIHIMI-IKC-2015-KajitaTMI #3d #design
Designing the Embodied Shadow Media Using Virtual Three-Dimensional Space (YK, TT, YM, SI), pp. 610–621.
HCIHIMI-IKC-2015-MatsudaOHT #analysis #automation #generative #multi #problem #testing
Analysis of Multiple-Choice Tests Through Erroneous Choices Using a Technique of Automatic Problem Generation (NM, HO, TH, HT), pp. 362–369.
HCIHIMI-IKC-2015-MayerBPGV #automation #generative #process #visualisation
Automatic Generation of Integrated Process Data Visualizations Using Human Knowledge (FM, UB, DP, DG, BVH), pp. 488–498.
HCIHIMI-IKC-2015-OliveiraCBA #artificial reality #gamification #interface #motivation
A Head-up Display with Augmented Reality and Gamification for an E-Maintenance System: Using Interfaces and Gamification to Motivate Workers in Procedural Tasks (AO, NC, LCB, RBdA), pp. 499–510.
HCIHIMI-IKC-2015-SturreCVS #assessment #eye tracking
Using Eye Movements to Test Assumptions of the Situation Present Assessment Method (LS, DC, KPLV, TZS), pp. 45–52.
HCIHIMI-IKC-2015-TogawaK #collaboration #framework
Disaster Recovery Framework for e-Learning Environment Using Private Cloud Collaboration and Emergency Alerts (ST, KK), pp. 588–596.
HCIHIMI-IKC-2015-UeokaK #interactive
Fortune Air: An Interactive Fortune Telling System Using Vortex Air Cannon (RU, NK), pp. 646–656.
HCIHIMI-IKC-2015-UjitokoH #interface
Application of the Locomotion Interface Using Anthropomorphic Finger Motion (YU, KH), pp. 666–674.
HCIHIMI-IKD-2015-AraiOM #web
A Filtering System of Web History Using the Browsing Characteristic (KA, MO, HM), pp. 273–279.
HCIHIMI-IKD-2015-ChouSW #case study #quality
Improving Service Quality by Prioritizing Service Attributes Using SERVQUAL and Kano Model — A Case Study of Nursing Home in Taiwan (CMC, CS, SKW), pp. 513–525.
HCIHIMI-IKD-2015-ItouNM #information management #twitter
Travel-Information Sharing System Using Tweets with Location Information (JI, KN, JM), pp. 526–534.
HCIHIMI-IKD-2015-IwamotoH #induction
Induction of a Relaxed State Using a Vibration Stimulus Based on the Respiratory Cycle (NI, HH), pp. 386–395.
HCIHIMI-IKD-2015-KalkattawiN #ubiquitous
Ubiquitous Healthcare Systems: Improving the Adherence Level within Diabetic Medication Using Cloud-Based Reminder System (MK, TN), pp. 535–546.
HCIHIMI-IKD-2015-KastratiIY #classification #documentation #framework
A General Framework for Text Document Classification Using SEMCON and ACVSR (ZK, ASI, SYY), pp. 310–319.
HCIHIMI-IKD-2015-KotaniIAS #interface #variability
Changes in Heart Rate Variability by Using Tactile Thermal Interface Device (KK, SI, TA, SS), pp. 405–411.
HCIHIMI-IKD-2015-MatsunoAIMM
Computer Input System Using Eye Glances (SM, KA, NI, TM, KM), pp. 425–432.
HCIHIMI-IKD-2015-MorizumiA #analysis
Analysis Using Purchasing Data in Japan (RM, YA), pp. 640–647.
HCIHIMI-IKD-2015-SasajimaOOS #communication #twitter #visualisation
Proposal of a Visualization Method to Support Informal Communication Using Twitter Attributes (RS, KO, MO, AS), pp. 107–114.
HCIHIMI-IKD-2015-SuzukiNSTH #artificial reality #behaviour
Changing Drinking Behavior and Beverage Consumption Using Augmented Reality (ES, TN, SS, TT, MH), pp. 648–660.
HCIHIMI-IKD-2015-YoshinoO
Proposal of a Data Presentation Technique Using Four-Frame Cartoon Expression for a LifeLog System (TY, IO), pp. 235–246.
HCILCT-2015-BoonbrahmKB #artificial reality #learning #student
Using Augmented Reality Technology in Assisting English Learning for Primary School Students (SB, CK, PB), pp. 24–32.
HCILCT-2015-DalipiYK #analysis #performance #semantics
Enhancing the Learner’s Performance Analysis Using SMEUS Semantic E-learning System and Business Intelligence Technologies (FD, SYY, ZK), pp. 208–217.
HCILCT-2015-HiramatsuIISS #case study #communication #mobile
A Study to Activate Communication by Using SNS on Mobile Phone — An Essay Lesson at the Elementary School (YH, AI, KI, FS, FS), pp. 492–502.
HCILCT-2015-IbanezN #design #implementation #multi
Contextualization of Archaeological Findings Using Virtual Worlds. Issues on Design and Implementation of a Multiuser Enabled Virtual Museum (LAHI, VBN), pp. 384–393.
HCILCT-2015-PyperLWJ #mobile #personalisation
The Potential Use of the Flexilevel Test in Providing Personalised Mobile E-Assessments (AP, ML, PW, AJ), pp. 271–278.
HCILCT-2015-SalazarOD #adaptation #education #mobile #multi #personalisation #ubiquitous
Adaptive and Personalized Educational Ubiquitous Multi-Agent System Using Context-Awareness Services and Mobile Devices (OMS, DAO, NDD), pp. 301–312.
HCILCT-2015-SebilloTVPG #artificial reality #interface
The Use of Augmented Reality Interfaces for On-site Crisis Preparedness (MS, GT, GV, LP, AG), pp. 136–147.
HCILCT-2015-Sein-EchaluceBG #education #information management #social
A Knowledge Management System to Classify Social Educational Resources Within a Subject Using Teamwork Techniques (MLSE, ÁFB, FJGP, MÁCG), pp. 510–519.
HCISCSM-2015-KastratiIYD #analysis #network #online #social
Analysis of Online Social Networks Posts to Investigate Suspects Using SEMCON (ZK, ASI, SYY, FD), pp. 148–157.
HCISCSM-2015-ManssourSSFS #image #network #social #visualisation
Using Information Visualization Techniques to Improve the Perception of the Organizations’ Image on Social Networks (IHM, MSS, CQS, AJF, FTS), pp. 55–66.
CAiSECAiSE-2015-Francescomarino #workflow
Completing Workflow Traces Using Action Languages (CDF, CG, ST, IVS), pp. 314–330.
CAiSECAiSE-2015-TsuchiyaWFOM #configuration management #feedback #interactive #requirements #traceability
Interactive Recovery of Requirements Traceability Links Using User Feedback and Configuration Management Logs (RT, HW, YF, KO, RM), pp. 247–262.
ICEISICEIS-v1-2015-BorgesDRAS #approach #generative
An Economic Approach for Generation of Train Driving Plans using Continuous Case-based Planning (APB, OBD, RR, BCÁ, EES), pp. 440–451.
ICEISICEIS-v1-2015-BouakkazLO #distance #named #similarity
GOTA — Using the Google Similarity Distance for OLAP Textual Aggregation (MB, SL, YO), pp. 121–127.
ICEISICEIS-v1-2015-Castanon-PugaSG #algorithm #data mining #fuzzy #logic #mining #mobile
Hybrid-Intelligent Mobile Indoor Location Using Wi-Fi Signals — Location Method Using Data Mining Algorithms and Type-2 Fuzzy Logic Systems (MCP, ASC, CGP, GLS, MFP, EAT), pp. 609–615.
ICEISICEIS-v1-2015-Marques-LucenaA #framework #information management
Knowledge Management Framework using Wiki-based Front-end Modules (CML, CA, SK, JS), pp. 79–86.
ICEISICEIS-v1-2015-MpindaMSR #database #graph #simulation
Graph Database Application using Neo4j — Railroad Planner Simulation (SATM, LGM, MTPS, MXR), pp. 399–403.
ICEISICEIS-v1-2015-RezendeJ #concurrent #process #workflow
Deadlock Avoidance in Interorganizational Business Processes using a Possibilistic WorkFlow Net (LPdR, SJ), pp. 429–439.
ICEISICEIS-v1-2015-Roos-FrantzBFSF #concept #integration #modelling #petri net #simulation
Using Petri Nets to Enable the Simulation of Application Integration Solutions Conceptual Models (FRF, MB, RZF, SS, VBF), pp. 87–96.
ICEISICEIS-v1-2015-SarmentoCG #network #streaming
Streaming Networks Sampling using top-K Networks (RS, MC, JG), pp. 228–234.
ICEISICEIS-v1-2015-VaroneA #multi
Multi-modal Transportation with Public Transport and Ride-sharing — Multi-modal Transportation using a Path-based Method (SV, KA), pp. 479–486.
ICEISICEIS-v2-2015-AizebojeP #approach #pointer
An Approach to using a Laser Pointer as a Mouse (JA, TP), pp. 543–552.
ICEISICEIS-v2-2015-AlahmadiLN #detection #internet #process #profiling
Using Internet Activity Profiling for Insider-threat Detection (BAA, PAL, JRCN), pp. 709–720.
ICEISICEIS-v2-2015-Brant-RibeiroAM #approach #interactive #modelling #petri net #web
A User-centered Approach for Modeling Web Interactions Using Colored Petri Nets (TBR, RDA, IM, MSS, RGC), pp. 37–48.
ICEISICEIS-v2-2015-FrantzSRYE #ecosystem #integration #markov #on the #process
On using Markov Decision Processes to Model Integration Solutions for Disparate Resources in Software Ecosystems (RZF, SS, FRF, IY, MTME), pp. 260–267.
ICEISICEIS-v2-2015-JaouachiKHHJ #image #ontology #rdf #semantics #web
Semantic Annotation of Images Extracted from the Web using RDF Patterns and a Domain Ontology (RTJ, MTK, NH, OH, MBJ), pp. 137–144.
ICEISICEIS-v2-2015-KamalKVB #delivery #performance
Efficient Use of Voice as a Channel for Delivering Public Services (KKK, MK, BV, KB), pp. 626–631.
ICEISICEIS-v2-2015-MagnavitaNM #evolution
Using EVOWAVE to Analyze Software Evolution (RCM, RLN, MGM), pp. 126–136.
ICEISICEIS-v2-2015-Martin-Fernandez #alias #encryption #performance
Efficient Management of Revoked Pseudonyms in VANETs using ID-Based Cryptography (FMF, PCG, CCG), pp. 701–708.
ICEISICEIS-v2-2015-MendesAASNM #evolution #monitoring #named #open source #technical debt #visualisation
VisMinerTD — An Open Source Tool to Support the Monitoring of the Technical Debt Evolution using Software Visualization (TSM, DAA, NSRA, ROS, RLN, MGM), pp. 457–462.
ICEISICEIS-v2-2015-PereiraD #formal method #logic #semantics #uml
Systematic Mapping — Formalization of UML Semantics using Temporal Logic (VP, MED), pp. 486–493.
ICEISICEIS-v2-2015-SariK #analysis #debugging #monitoring #predict
Bug Prediction for an ATM Monitoring Software — Use of Logistic Regression Analysis for Bug Prediction (ÖS, OK), pp. 382–387.
ICEISICEIS-v2-2015-ThommazoCHGPBF #complexity #dependence #requirements #testing
Using the Dependence Level Among Requirements to Priorize the Regression Testing Set and Characterize the Complexity of Requirements Change (ADT, KC, EMH, GG, JP, AB, SF), pp. 231–241.
ICEISICEIS-v2-2015-TrujilloOP #authoring #framework #re-engineering #validation
Using Technical-Action-Research to Validate a Framework for Authoring Software Engineering Methods (MMT, HO, MP), pp. 15–27.
ICEISICEIS-v3-2015-NyameB #information management
The Adoption and Use of Human Resource Information System (HRIS) in Ghana (PKON, RB), pp. 130–138.
ICEISICEIS-v3-2015-RiveroC #case study #evaluation #experience #user interface
Using a Study to Assess User eXperience Evaluation Methods from the Point of View of Users (LR, TC), pp. 88–95.
ICEISICEIS-v3-2015-SaidCAB #adaptation #modelling #named #process
BPMN4V — An Extension of BPMN for Modelling Adaptive Processes using Versions (IBS, MAC, EA, RB), pp. 258–267.
ICEISICEIS-v3-2015-SilvaMLFNS #architecture #experience #health #information management #modelling
An Experience of using SoaML for Modeling a Service-Oriented Architecture for Health Information Systems (FGS, JSSdM, JdSL, JMSF, RPCdN, MSS), pp. 322–327.
CIKMCIKM-2015-BagdouriO #microblog #set
Profession-Based Person Search in Microblogs: Using Seed Sets to Find Journalists (MB, DWO), pp. 593–602.
CIKMCIKM-2015-BuchA #approximate #learning #string
Approximate String Matching by End-Users using Active Learning (LB, AA0), pp. 93–102.
CIKMCIKM-2015-JeongKL #on the fly
A Flash-aware Buffering Scheme using On-the-fly Redo (KSJ, SWK, SL), pp. 1683–1686.
CIKMCIKM-2015-MaGWLW #detection #information management #microblog #social
Detect Rumors Using Time Series of Social Context Information on Microblogging Websites (JM, WG0, ZW, YL, KFW), pp. 1751–1754.
CIKMCIKM-2015-MishraH #clustering #learning #multi
Learning Task Grouping using Supervised Task Space Partitioning in Lifelong Multitask Learning (MM, JH), pp. 1091–1100.
CIKMCIKM-2015-ParkHL #nearest neighbour #performance
A Fast k-Nearest Neighbor Search Using Query-Specific Signature Selection (YP, HH, SgL), pp. 1883–1886.
CIKMCIKM-2015-RoychoudhuryKB #documentation #ontology #process
Analyzing Document Intensive Business Processes using Ontology (SR, VK, NB), pp. 1899–1902.
CIKMCIKM-2015-SiersdorferKAZ #how #network #scalability #social
Who With Whom And How?: Extracting Large Social Networks Using Search Engines (SS, PK, HA, SZ), pp. 1491–1500.
CIKMCIKM-2015-Teevan #information retrieval
Slow Search: Improving Information Retrieval Using Human Assistance (JT), p. 1.
CIKMCIKM-2015-TuarobTSR #modelling #network #social
Modeling Individual-Level Infection Dynamics Using Social Network Information (ST, CST, MS, NR), pp. 1501–1510.
CIKMCIKM-2015-WangSL #distance #learning #summary
Update Summarization using Semi-Supervised Learning Based on Hellinger Distance (DW0, SS, TL0), pp. 1907–1910.
CIKMCIKM-2015-ZhangSWFW #crowdsourcing #quality
Improving Label Quality in Crowdsourcing Using Noise Correction (JZ0, VSS, JW0, XF, XW0), pp. 1931–1934.
ECIRECIR-2015-BiyaniBCM #analysis #concurrent #online #retrieval #thread
Using Subjectivity Analysis to Improve Thread Retrieval in Online Forums (PB, SB, CC, PM), pp. 495–500.
ECIRECIR-2015-ChongDL #modelling #predict #topic
Prediction of Venues in Foursquare Using Flipped Topic Models (WHC, BTD, EPL), pp. 623–634.
ECIRECIR-2015-Dutta #approximate #mining #named #statistics #string
MIST: Top-k Approximate Sub-string Mining Using Triplet Statistical Significance (SD), pp. 284–290.
ECIRECIR-2015-GogMP #identification #on the #statistics
On Identifying Phrases Using Collection Statistics (SG, AM, MP), pp. 278–283.
ECIRECIR-2015-HagenPBS #classification #detection #sentiment #twitter
Twitter Sentiment Detection via Ensemble Classification Using Averaged Confidence Scores (MH, MP, MB, BS), pp. 741–754.
ECIRECIR-2015-JameelLB #modelling #parametricity #topic
Nonparametric Topic Modeling Using Chinese Restaurant Franchise with Buddy Customers (SJ, WL, LB), pp. 648–659.
ECIRECIR-2015-LiC #effectiveness
Effective Healthcare Advertising Using Latent Dirichlet Allocation and Inference Engine (YCL, CCC), pp. 672–677.
ECIRECIR-2015-LimCLK #community #constraints #detection
Detecting Location-Centric Communities Using Social-Spatial Links with Temporal Constraints (KHL, JC, CL, SK), pp. 489–494.
ECIRECIR-2015-LuoZDY #design
Designing States, Actions, and Rewards for Using POMDP in Session Search (JL, SZ, XD, HY), pp. 526–537.
ECIRECIR-2015-MaddalenaMST #estimation
Judging Relevance Using Magnitude Estimation (EM, SM, FS, AT), pp. 215–220.
ICMLICML-2015-AvronH #community #detection #personalisation #rank
Community Detection Using Time-Dependent Personalized PageRank (HA, LH), pp. 1795–1803.
ICMLICML-2015-ChangYXY #detection #semantics
Complex Event Detection using Semantic Saliency and Nearly-Isotonic SVM (XC, YY, EPX, YY), pp. 1348–1357.
ICMLICML-2015-LeC #learning #metric
Unsupervised Riemannian Metric Learning for Histograms Using Aitchison Transformations (TL, MC), pp. 2002–2011.
ICMLICML-2015-SnoekRSKSSPPA #network #optimisation #scalability
Scalable Bayesian Optimization Using Deep Neural Networks (JS, OR, KS, RK, NS, NS, MMAP, P, RPA), pp. 2171–2180.
ICMLICML-2015-Sohl-DicksteinW #learning
Deep Unsupervised Learning using Nonequilibrium Thermodynamics (JSD, EAW, NM, SG), pp. 2256–2265.
ICMLICML-2015-SrivastavaMS #learning #video
Unsupervised Learning of Video Representations using LSTMs (NS, EM, RS), pp. 843–852.
ICMLICML-2015-SunQW #optimisation #taxonomy
Complete Dictionary Recovery Using Nonconvex Optimization (JS, QQ, JW), pp. 2351–2360.
ICMLICML-2015-UbaruMS #approximate #fault #matrix #rank
Low Rank Approximation using Error Correcting Coding Matrices (SU, AM, YS), pp. 702–710.
ICMLICML-2015-ZhuE #approach #hybrid #probability #random
A Hybrid Approach for Probabilistic Inference using Random Projections (MZ, SE), pp. 2039–2047.
KDDKDD-2015-AhnKLRW #distributed #matrix #probability #scalability
Large-Scale Distributed Bayesian Matrix Factorization using Stochastic Gradient MCMC (SA, AK, NL, SR, MW), pp. 9–18.
KDDKDD-2015-GleichM #algorithm #graph #learning
Using Local Spectral Methods to Robustify Graph-Based Learning Algorithms (DFG, MWM), pp. 359–368.
KDDKDD-2015-IkonomovskaJD #predict #realtime
Real-Time Bid Prediction using Thompson Sampling-Based Expert Selection (EI, SJ, AD), pp. 1869–1878.
KDDKDD-2015-JohanssonD #geometry #graph #learning #similarity
Learning with Similarity Functions on Graphs using Matchings of Geometric Embeddings (FDJ, DPD), pp. 467–476.
KDDKDD-2015-KotziasDFS
From Group to Individual Labels Using Deep Features (DK, MD, NdF, PS), pp. 597–606.
KDDKDD-2015-MayaMMAY #clustering
Discovery of Glaucoma Progressive Patterns Using Hierarchical MDL-Based Clustering (SM, KM, HM, RA, KY), pp. 1979–1988.
KDDKDD-2015-MomtazpourZRSR #cyber-physical #invariant
Analyzing Invariants in Cyber-Physical Systems using Latent Factor Regression (MM, JZ, SR, RKS, NR), pp. 2009–2018.
KDDKDD-2015-Ojjeh #open source #realtime
Powering Real-time Decision Engines in Finance and Healthcare using Open Source Software (BO), p. 1633.
KDDKDD-2015-PengKLC #approximate #clustering #rank
Subspace Clustering Using Log-determinant Rank Approximation (CP, ZK, HL, QC), pp. 925–934.
KDDKDD-2015-SethiYRVR #classification #machine learning #scalability
Scalable Machine Learning Approaches for Neighborhood Classification Using Very High Resolution Remote Sensing Imagery (MS, YY, AR, RRV, SR), pp. 2069–2078.
KDDKDD-2015-ShanahanD #distributed #scalability
Large Scale Distributed Data Science using Apache Spark (JGS, LD), pp. 2323–2324.
KDDKDD-2015-SomanchiALEG #predict
Early Prediction of Cardiac Arrest (Code Blue) using Electronic Medical Records (SS, SA, AL, EE, RG), pp. 2119–2126.
KDDKDD-2015-WangYLXXCR #predict
Regularity and Conformity: Location Prediction Using Heterogeneous Mobility Data (YW, NJY, DL, LX, XX, EC, YR), pp. 1275–1284.
KDDKDD-2015-WeiLMCRS #predict
Predicting Serves in Tennis using Style Priors (XW, PL, SM, PC, MR, SS), pp. 2207–2215.
KDDKDD-2015-YuanBM #process #re-engineering
Gas Concentration Reconstruction for Coal-Fired Boilers Using Gaussian Process (CY, MB, BM), pp. 2247–2256.
KDDKDD-2015-ZhengYX #composition #linear #modelling #topic
Linear Time Samplers for Supervised Topic Models using Compositional Proposals (XZ, YY, EPX), pp. 1523–1532.
MLDMMLDM-2015-Babu #classification #identification
Offline Writer Identification in Tamil Using Bagged Classification Trees (SB), pp. 342–354.
MLDMMLDM-2015-CostaFK #multi
Classifying Grasslands and Cultivated Pastures in the Brazilian Cerrado Using Support Vector Machines, Multilayer Perceptrons and Autoencoders (WC, LMGF, TSK), pp. 187–198.
MLDMMLDM-2015-GovadaJMS #approach #hybrid #induction #learning
Hybrid Approach for Inductive Semi Supervised Learning Using Label Propagation and Support Vector Machine (AG, PJ, SM, SKS), pp. 199–213.
MLDMMLDM-2015-MojahedBWI #analysis #clustering #matrix #semistructured data #similarity
Applying Clustering Analysis to Heterogeneous Data Using Similarity Matrix Fusion (SMF) (AM, JHBS, WW, BdlI), pp. 251–265.
MLDMMLDM-2015-MoldovanM #data mining #learning #mining #performance
Learning the Relationship Between Corporate Governance and Company Performance Using Data Mining (DM, SM), pp. 368–381.
MLDMMLDM-2015-PatchalaBG #email
Author Attribution of Email Messages Using Parse-Tree Features (JP, RB, SG), pp. 313–327.
MLDMMLDM-2015-TreechalongRW #clustering
Semi-Supervised Stream Clustering Using Labeled Data Points (KT, TR, KW), pp. 281–295.
RecSysRecSys-2015-AghdamHMB #adaptation #markov #modelling #recommendation
Adapting Recommendations to Contextual Changes Using Hierarchical Hidden Markov Models (MHA, NH, BM, RDB), pp. 241–244.
RecSysRecSys-2015-BanksRS #game studies #recommendation
The Recommendation Game: Using a Game-with-a-Purpose to Generate Recommendation Data (SB, RR, BS), pp. 305–308.
RecSysRecSys-2015-ChaneyBE #network #personalisation #probability #recommendation #social
A Probabilistic Model for Using Social Networks in Personalized Item Recommendation (AJBC, DMB, TER), pp. 43–50.
RecSysRecSys-2015-MagnusonDM #process #recommendation #twitter
Event Recommendation using Twitter Activity (AM, VD, DM), pp. 331–332.
SEKESEKE-2015-CaoHH #design #evaluation #quality
Experimental Frame Design Using E-DEVSML for Software Quality Evaluation (BC, LH, JH), pp. 310–313.
SEKESEKE-2015-ChavezM #information retrieval #ontology #query
An Information Retrieval Model using Query Expansion based on Ontologies in the Computer Science Domain (BGCC, AM), pp. 652–655.
SEKESEKE-2015-DingZ #modelling #petri net
Modeling and Analyzing Publish Subscribe Architcture using Petri Nets (JD, DZ), pp. 589–594.
SEKESEKE-2015-GoswamiWS #learning #performance
Using Learning Styles of Software Professionals to Improve their Inspection Team Performance (AG, GSW, AS), pp. 680–685.
SEKESEKE-2015-ManiPW #co-evolution #modelling #performance
Exploring SOA Pattern Performance using Coupled Transformations and Performance Models (NM, DCP, CMW), pp. 552–557.
SEKESEKE-2015-Murillo-MoreraJ #algorithm #approach #framework #learning #predict #search-based
A Software Defect-Proneness Prediction Framework: A new approach using genetic algorithms to generate learning schemes (JMM, MJ), pp. 445–450.
SEKESEKE-2015-NetoSZD #network
Using implications from FCA to represent a two mode network data (SMN, MAJS, LEZ, SMD), pp. 256–259.
SEKESEKE-2015-SunSWZ #analysis #data flow #detection #fault #integer
Improving the Accuracy of Integer Signedness Error Detection Using Data Flow Analysis (HS, CS, YW, QZ), pp. 601–606.
SEKESEKE-2015-TakahashiNT #automation #elicitation #feedback #requirements #topic #towards
Towards Automatic Requirements Elicitation from Feedback Comments: Extracting Requirements Topics Using LDA (HT, HN, TT), pp. 489–494.
SEKESEKE-2015-Tasse #analysis #identification #metric
Using peak analysis for identifying lagged effects between software metrics (JT), pp. 512–515.
SEKESEKE-2015-TrinkenreichSCS #metric #process #towards
Toward using Business Process Intelligence to Support Incident Management Metrics Selection and Service Improvement (BT, GS, VTFC, FMS), pp. 522–527.
SEKESEKE-2015-TunnellA #fault #modelling #predict #release planning
Using Time Series Models for Defect Prediction in Software Release Planning (JT, JA), pp. 451–454.
SEKESEKE-2015-XuB #multi #reliability
A Reliable and Secure Cloud Storage Schema Using Multiple Service Providers (HX, DB), pp. 116–121.
SIGIRSIGIR-2015-AlbakourMO #data type #identification #metadata #topic
Using Sensor Metadata Streams to Identify Topics of Local Events in the City (MDA, CM, IO), pp. 711–714.
SIGIRSIGIR-2015-AzzopardiZ #modelling #retrieval #tutorial
Building and Using Models of Information Seeking, Search and Retrieval: Full Day Tutorial (LA, GZ), pp. 1107–1110.
SIGIRSIGIR-2015-CapraACV #complexity #difference
Differences in the Use of Search Assistance for Tasks of Varying Complexity (RC, JA, AC, EV), pp. 23–32.
SIGIRSIGIR-2015-HaraSKF #recommendation
Reducing Hubness: A Cause of Vulnerability in Recommender Systems (KH, IS, KK, KF), pp. 815–818.
SIGIRSIGIR-2015-Kiseleva #behaviour #information management
Using Contextual Information to Understand Searching and Browsing Behavior (JK), p. 1059.
SIGIRSIGIR-2015-LiLZS #matrix #modelling #multi #retrieval
Modeling Multi-query Retrieval Tasks Using Density Matrix Transformation (QL, JL, PZ, DS), pp. 871–874.
SIGIRSIGIR-2015-LiuAH #information retrieval #probability
Using Term Location Information to Enhance Probabilistic Information Retrieval (BL, XA, JXH), pp. 883–886.
SIGIRSIGIR-2015-Lu #statistics
Improving Search using Proximity-Based Statistics (XL), p. 1065.
SIGIRSIGIR-2015-MehrotraY #learning #query #rank
Representative & Informative Query Selection for Learning to Rank using Submodular Functions (RM, EY), pp. 545–554.
SIGIRSIGIR-2015-Mitra #distributed #query
Exploring Session Context using Distributed Representations of Queries and Reformulations (BM), pp. 3–12.
SIGIRSIGIR-2015-NovakBZ #image #retrieval #scalability
Large-scale Image Retrieval using Neural Net Descriptors (DN, MB, PZ), pp. 1039–1040.
SIGIRSIGIR-2015-ParkC #concept #retrieval
Using Key Concepts in a Translation Model for Retrieval (JHP, WBC), pp. 927–930.
SIGIRSIGIR-2015-WeiG #summary #twitter
Gibberish, Assistant, or Master?: Using Tweets Linking to News for Extractive Single-Document Summarization (ZW, WG), pp. 1003–1006.
SIGIRSIGIR-2015-YaoSQWSH #recommendation #social
Context-aware Point-of-Interest Recommendation Using Tensor Factorization with Social Regularization (LY, QZS, YQ, XW, AS, QH), pp. 1007–1010.
SKYSKY-2015-Oliveira #learning
Learning the Meaning of Language and using It Creatively (HGO), p. 3.
ECMFAECMFA-J-2012-PuissantSM15 #automation #consistency #nondeterminism
Resolving model inconsistencies using automated regression planning (JPP, RVDS, TM), pp. 461–481.
AMTAMT-2015-HilkenBGV #development #modelling
Iterative Development of Transformation Models by Using Classifying Terms (FH, LB, MG, AV), pp. 1–6.
ICMTICMT-2015-CriadoMIC #model transformation #reuse
Enabling the Reuse of Stored Model Transformations Through Annotations (JC, SMP, LI, JC), pp. 43–58.
ICMTICMT-2015-MooijEHW #effectiveness #industrial #modelling
Cost-Effective Industrial Software Rejuvenation Using Domain-Specific Models (AJM, GE, JH, HvW), pp. 66–81.
MoDELSMoDELS-2015-Fernandez-SaezC #documentation #industrial #maintenance #on the #overview #uml
On the use of UML documentation in software maintenance: Results from a survey in industry (AMFS, DC, MG, MRVC), pp. 292–301.
MoDELSMoDELS-2015-LuddeckeSSS #modelling #network
Modeling user intentions for in-car infotainment systems using Bayesian networks (DL, CS, JS, IS), pp. 378–385.
MoDELSMoDELS-2015-SchottleK #api #modelling #reuse
Concern-oriented interfaces for model-based reuse of APIs (MS, JK), pp. 286–291.
MoDELSMoDELS-2015-StephanC #clone detection #detection #identification
Identification of Simulink model antipattern instances using model clone detection (MS, JRC), pp. 276–285.
SPLCSPLC-2015-BeekFGM #analysis #product line
Using FMC for family-based analysis of software product lines (MHtB, AF, SG, FM), pp. 432–439.
SPLCSPLC-2015-BeucheH #lifecycle #product line
Using pure: : variants across the product line lifecycle (DB, RH), pp. 352–354.
SPLCSPLC-2015-ChavarriagaRNCJ #case study #configuration management #experience #feature model #modelling #multi
Using multiple feature models to specify configuration options for electrical transformers: an experience report (JC, CR, CN, RC, VJ), pp. 216–224.
SPLCSPLC-2015-DimovskiABW #model checking #off the shelf
Family-based model checking using off-the-shelf model checkers: extended abstract (ASD, ASAS, CB, AW), p. 397.
SPLCSPLC-2015-DomisAB #analysis #modelling #safety #tool support #uml #variability
Integrating variability and safety analysis models using commercial UML-based tools (DD, RA, MB), pp. 225–234.
SPLCSPLC-2015-DudderRH #composition #design #staged #type safety
Synthesizing type-safe compositions in feature oriented software designs using staged composition (BD, JR, GTH), pp. 398–401.
SPLCSPLC-2015-PatelS #as a service #automation #testing #variability
Automated testing of software-as-a-service configurations using a variability language (SP, VS), pp. 253–262.
OnwardOnward-2015-CitoLGDKR #developer #feedback #metric #runtime
Runtime metric meets developer: building better cloud applications using feedback (JC, PL, HCG, AD, AK, AR), pp. 14–27.
OOPSLAOOPSLA-2015-VoelterDKE #c #case study #embedded
Using C language extensions for developing embedded software: a case study (MV, AvD, BK, SE), pp. 655–674.
PLATEAUPLATEAU-2015-KristenssonL #lightweight #visualisation
Aiding programmers using lightweight integrated code visualization (POK, CLL), pp. 17–24.
AdaEuropeAdaEurope-2015-JaradatBP #analysis #maintenance #safety
Using Sensitivity Analysis to Facilitate the Maintenance of Safety Cases (OJ, IB, SP), pp. 162–176.
LOPSTRLOPSTR-2015-CaballeroMKH #automation #generative #java #testing
Checking Java Assertions Using Automated Test-Case Generation (RC0, MM, HK, VvH), pp. 221–226.
LOPSTRLOPSTR-2015-MantelMPW #analysis #automaton #composition #data flow #network
Using Dynamic Pushdown Networks to Automate a Modular Information-Flow Analysis (HM, MMO, MP, AW), pp. 201–217.
PADLPADL-2015-BassedaK #logic #transaction
State Space Planning Using Transaction Logic (RB, MK), pp. 17–33.
PLDIPLDI-2015-BarowyGHZ #named #relational #spreadsheet
FlashRelate: extracting relational data from semi-structured spreadsheets using examples (DWB, SG, TH, BGZ), pp. 218–228.
PLDIPLDI-2015-CraryS #peer-to-peer
Peer-to-peer affine commitment using bitcoin (KC, MJS), pp. 479–488.
PLDIPLDI-2015-GonnordMR #ranking #synthesis
Synthesis of ranking functions using extremal counterexamples (LG, DM, GR), pp. 608–618.
POPLPOPL-2015-BastaniAA #context-free grammar #reachability #specification
Specification Inference Using Context-Free Language Reachability (OB, SA, AA), pp. 553–566.
PPDPPPDP-2015-RondogiannisT #logic programming
Expressing preferences in logic programming using an infinite-valued logic (PR, AT), pp. 208–219.
SASSAS-2015-AdjeGM #generative #invariant #optimisation #polynomial
Property-based Polynomial Invariant Generation Using Sums-of-Squares Optimization (AA, PLG, VM), pp. 235–251.
ASEASE-2015-CarinoA #optimisation #testing #user interface
Dynamically Testing GUIs Using Ant Colony Optimization (T) (SC, JHA), pp. 138–148.
ASEASE-2015-ChoetkiertikulD #classification #predict
Predicting Delays in Software Projects Using Networked Classification (T) (MC, HKD, TT, AG), pp. 353–364.
ASEASE-2015-DeweyRH #fuzzing #rust
Fuzzing the Rust Typechecker Using CLP (T) (KD, JR, BH), pp. 482–493.
ASEASE-2015-KhatchadourianR #detection
Detecting Broken Pointcuts Using Structural Commonality and Degree of Interest (N) (RK, AR, HM, TW), pp. 641–646.
ASEASE-2015-LemieuxB #behaviour #ltl #mining #specification
Investigating Program Behavior Using the Texada LTL Specifications Miner (CL, IB), pp. 870–875.
ASEASE-2015-MaAZSGR15a #automation #generative #named #program analysis
GRT: An Automated Test Generator Using Orchestrated Program Analysis (LM, CA, CZ, HS, JG, RR), pp. 842–847.
ASEASE-2015-MercerAVS #model checking #parallel #source code
Model Checking Task Parallel Programs Using Gradual Permissions (N) (EGM, PA, NV, VS), pp. 535–540.
ASEASE-2015-NardoPAB #modelling #robust #testing
Evolutionary Robustness Testing of Data Processing Systems Using Models and Data Mutation (T) (DDN, FP, AA, LCB), pp. 126–137.
ASEASE-2015-OdaFNHSTN #learning #pseudo #source code #statistics
Learning to Generate Pseudo-Code from Source Code Using Statistical Machine Translation (T) (YO, HF, GN, HH, SS, TT, SN), pp. 574–584.
ASEASE-2015-SohanAM #api #automation #documentation #named #rest
SpyREST: Automated RESTful API Documentation Using an HTTP Proxy Server (N) (SMS, CA, FM), pp. 271–276.
ASEASE-2015-Vargas-Baldrich #automation #bytecode #dependence
Automated Tagging of Software Projects Using Bytecode and Dependencies (N) (SVB, MLV, DP), pp. 289–294.
ASEASE-2015-WangD #architecture #behaviour #message passing
A Message-Passing Architecture without Public Ids Using Send-to-Behavior (ESSW, ZD), pp. 902–905.
ESEC-FSEESEC-FSE-2015-HammoudiBBR #debugging #on the #web
On the use of delta debugging to reduce recordings and facilitate debugging of web applications (MH, BB, GB, GR), pp. 333–344.
ESEC-FSEESEC-FSE-2015-KargenS #slicing #source code
Turning programs against each other: high coverage fuzz-testing using binary-code mutation and dynamic slicing (UK, NS), pp. 782–792.
ESEC-FSEESEC-FSE-2015-NorthBSC #developer #named
GitSonifier: using sound to portray developer conflict history (KJN, SB, AS, MBC), pp. 886–889.
ESEC-FSEESEC-FSE-2015-SenNGC #execution #multi #named #summary #symbolic computation
MultiSE: multi-path symbolic execution using value summaries (KS, GCN, LG, WC), pp. 842–853.
ESEC-FSEESEC-FSE-2015-White #generative #parametricity #performance #search-based #testing
Increasing the efficiency of search-based unit test generation using parameter control (TW), pp. 1042–1044.
ESEC-FSEESEC-FSE-2015-XuKB #ubiquitous
Using software theater for the demonstration of innovative ubiquitous applications (HX, SK, BB), pp. 894–897.
ICSEICSE-v1-2015-Ben-DavidSAB #model checking #product line #requirements #satisfiability
Symbolic Model Checking of Product-Line Requirements Using SAT-Based Methods (SBD, BS, JMA, SB), pp. 189–199.
ICSEICSE-v1-2015-JiaCHP #combinator #generative #interactive #learning #testing
Learning Combinatorial Interaction Test Generation Strategies Using Hyperheuristic Search (YJ, MBC, MH, JP), pp. 540–550.
ICSEICSE-v1-2015-KalliamvakouDBS #collaboration #development #git #open source
Open Source-Style Collaborative Development Practices in Commercial Projects Using GitHub (EK, DED, KB, LS, DMG), pp. 574–585.
ICSEICSE-v1-2015-PetrosyanRM #api #classification #information management
Discovering Information Explaining API Types Using Text Classification (GP, MPR, RDM), pp. 869–879.
ICSEICSE-v1-2015-YangXALXE #behaviour #mobile #named
AppContext: Differentiating Malicious and Benign Mobile App Behaviors Using Context (WY, XX, BA, SL, TX, WE), pp. 303–313.
ICSEICSE-v1-2015-YuanWWLYHFLCG #concurrent #debugging #named
ReCBuLC: Reproducing Concurrency Bugs Using Local Clocks (XY, CW, ZW, JL, PCY, JH, XF, YL, YC, YG), pp. 824–834.
ICSEICSE-v2-2015-ArnaoudovaHMA #natural language #re-engineering #retrieval
The Use of Text Retrieval and Natural Language Processing in Software Engineering (VA, SH, AM, GA), pp. 949–950.
ICSEICSE-v2-2015-BaoLXWZ #behaviour #developer #interactive #modelling #named #video
scvRipper: Video Scraping Tool for Modeling Developers’ Behavior Using Interaction Data (LB, JL, ZX, XW, BZ), pp. 673–676.
ICSEICSE-v2-2015-CamilloniVA #evaluation #re-engineering
Using GSwE2009 for the Evaluation of a Master Degree in Software Engineering in the Universidad de la República (LC, DV, MAA), pp. 323–332.
ICSEICSE-v2-2015-Cornu #debugging #named #null
Casper: Using Ghosts to Debug Null Deferences with Dynamic Causality Traces (BC), pp. 790–791.
ICSEICSE-v2-2015-Escobar-Avila #automation #bytecode #categorisation #library
Automatic Categorization of Software Libraries Using Bytecode (JEA), pp. 784–786.
ICSEICSE-v2-2015-GveroK #interactive #query #synthesis
Interactive Synthesis Using Free-Form Queries (TG, VK), pp. 689–692.
ICSEICSE-v2-2015-HerzigN #detection #empirical
Empirically Detecting False Test Alarms Using Association Rules (KH, NN), pp. 39–48.
ICSEICSE-v2-2015-LutellierCGTRMK #architecture #dependence
Comparing Software Architecture Recovery Techniques Using Accurate Dependencies (TL, DC, JG, LT, DR, NM, RK), pp. 69–78.
ICSEICSE-v2-2015-MaleticC #analysis #semiparsing #source code
Exploration, Analysis, and Manipulation of Source Code Using srcML (JIM, MLC), pp. 951–952.
ICSEICSE-v2-2015-MaplesdenRTHG #analysis #case study #industrial #performance
Performance Analysis Using Subsuming Methods: An Industrial Case Study (DM, KvR, EDT, JGH, JCG), pp. 149–158.
ICSEICSE-v2-2015-PaasivaaraBLDSH #agile #learning #re-engineering
Learning Global Agile Software Engineering Using Same-Site and Cross-Site Teams (MP, KB, CL, DED, JS, FH, PC, AY, VI), pp. 285–294.
ICSEICSE-v2-2015-SadeghiBM #analysis #android #security
Analysis of Android Inter-App Security Vulnerabilities Using COVERT (AS, HB, SM), pp. 725–728.
SACSAC-2015-BarrosCMP #education #learning #repository #reuse
Integrating educational repositories to improve the reuse of learning objects (HB, EC, JM, RP), pp. 270–272.
SACSAC-2015-BolockA #automation #constraints #generative #towards
Towards automatic poetry generation using constraint handling rules (AEB, SA), pp. 1868–1873.
SACSAC-2015-BorgesDSEAS #approach #performance #reasoning #reuse
Efficient approach for reusing and sharing train driving plans using case-based reasoning (APB, OBD, DMVS, FE, BCÁ, EES), pp. 505–508.
SACSAC-2015-ByunC #automation #constraints #operating system #safety #testing
Automated system-level safety testing using constraint patterns for automotive operating systems (TB, YC), pp. 1815–1822.
SACSAC-2015-CamaraHJJ #graph #modelling #persuasion #recommendation #social
Using graph-based models in a persuasive social recommendation system (JPC, SH, JJ, VJ), pp. 189–194.
SACSAC-2015-ChaudhuriMG #network #predict
QoS prediction for network data traffic using hierarchical modified regularized least squares rough support vector regression (AC, SM, SKG), pp. 659–661.
SACSAC-2015-CorcoglionitiRM #rdf #sorting #streaming
Processing billions of RDF triples on a single machine using streaming and sorting (FC, MR, MM, MA), pp. 368–375.
SACSAC-2015-CruzPQSSOBO #algorithm #game studies #named #probability
Amê: an environment to learn and analyze adversarial search algorithms using stochastic card games (ABC, LP, JQ, US, SS, AO, EB, ESO), pp. 208–213.
SACSAC-2015-DabainMT #design pattern #detection
Design pattern detection using FINDER (HD, AM, VT), pp. 1586–1593.
SACSAC-2015-DarabiG #personalisation #summary #video
Personalized video summarization using sift (KD, GG), pp. 1252–1256.
SACSAC-2015-DasK
Dynamic associativity management using utility based way-sharing (SD, HKK), pp. 1919–1924.
SACSAC-2015-DionisisCP #adaptation #execution #feedback #framework #hybrid #monitoring
A hybrid framework for WS-BPEL scenario execution adaptation, using monitoring and feedback data (MD, VC, GP), pp. 1672–1679.
SACSAC-2015-GouthamLY #authentication #protocol #smarttech
An anonymous ID-based remote mutual authentication with key agreement protocol on ECC using smart cards (RAG, GJL, KYY), pp. 169–174.
SACSAC-2015-HamataniUH #smarttech
Estimating core body temperature based on human thermal model using wearable sensors (TH, AU, TH), pp. 521–526.
SACSAC-2015-HozanoFSFC #detection #developer #feedback #smell
Using developers’ feedback to improve code smell detection (MH, HF, ICLS, BF, EC), pp. 1661–1663.
SACSAC-2015-HublerRFS #data flow #named
P-SaMI: a data-flow pattern to perform massively-parallel molecular docking experiments using a fully-flexible receptor model (PH, DDAR, JEF, ONdS), pp. 54–57.
SACSAC-2015-JeongYAYP #algorithm #interactive #network #search-based
Inference of disease-specific gene interaction network using a Bayesian network learned by genetic algorithm (DJ, YY, JA, YY, SP), pp. 47–53.
SACSAC-2015-Jo #algorithm #image #interactive #search-based
Color image quantization using interactive genetic algorithm (SJ), pp. 139–140.
SACSAC-2015-KimK #scalability
Dual region write buffering: making large-scale nonvolatile buffer using small capacitor in SSD (DK, SK), pp. 2039–2046.
SACSAC-2015-KimL #diagrams #qvt #sequence chart
Pattern-based transformation of sequence diagrams using QVT (DKK, BL), pp. 1492–1497.
SACSAC-2015-KrutzMS #analysis #detection #effectiveness
Examining the effectiveness of using concolic analysis to detect code clones (DEK, SAM, ES), pp. 1610–1615.
SACSAC-2015-LeTN #requirements #verification
Verifying eventuality properties of imprecise system requirements using event-B (HAL, NTT, SN), pp. 1651–1653.
SACSAC-2015-LiuI #clustering #framework #optimisation #parallel
An ETL optimization framework using partitioning and parallelization (XL, NI), pp. 1015–1022.
SACSAC-2015-MainiS #communication #distributed #multi
Distributed task servicing using multiple robots with human-in-the-loop under limited communication range (PM, PBS), pp. 301–306.
SACSAC-2015-OliveiraQMM #community #complexity #detection
Community detection, with lower time complexity, using coupled Kuramoto oscillators (JEMdO, MGQ, MDNM, EENM), pp. 1160–1166.
SACSAC-2015-PintoMCS #process
Using event logs and the Ψ-theory to analyse business processes (PLP, CM, AC, MMdS), pp. 1195–1202.
SACSAC-2015-Rekha #big data #detection #performance
A fast support vector data description system for anomaly detection using big data (AGR), pp. 931–932.
SACSAC-2015-RochaRCOMVADGF #algorithm #classification #dataset #documentation #named #performance
G-KNN: an efficient document classification algorithm for sparse datasets on GPUs using KNN (LCdR, GSR, RC, RSO, DM, FV, GA, SD, MAG, RF), pp. 1335–1338.
SACSAC-2015-RodriguesBM #approach #behaviour #clustering #correlation #energy
Using fractal clustering to explore behavioral correlation: a new approach to reduce energy consumption in WSN (FR, AB, JEBM), pp. 589–591.
SACSAC-2015-RodriguesJD #recommendation
Accelerating recommender systems using GPUs (AVR, AJ, ID), pp. 879–884.
SACSAC-2015-SilvaBAR #clustering #multi #prototype
Semi-supervised clustering using multi-assistant-prototypes to represent each cluster (WJS, MCNB, SdA, HLR), pp. 831–836.
SACSAC-2015-SilvaMR #algorithm #approach #problem
An approach to the MOGAS initialization problem using an algorithm based on path relinking (TGNdS, JEBM, LSR), pp. 118–124.
SACSAC-2015-SilvaSBVS #assessment #framework #process
Using ArchiMate to model a process assessment framework (NS, MMdS, BB, MV, PS), pp. 1189–1194.
SACSAC-2015-StracciaM #concept #estimation #fuzzy #learning #named #owl #probability
pFOIL-DL: learning (fuzzy) EL concept descriptions from crisp OWL data using a probabilistic ensemble estimation (US, MM), pp. 345–352.
SACSAC-2015-TizzeiABC #architecture #case study #product line #tool support
Architecting cloud tools using software product line techniques: an exploratory study (LPT, LGA, MdB, RFGC), pp. 1441–1448.
SACSAC-2015-XuanLXT #empirical #fault #metric #predict #set
Evaluating defect prediction approaches using a massive set of metrics: an empirical study (XX, DL, XX, YT), pp. 1644–1647.
SACSAC-2015-XuYYHHK #multi #predict
Solar irradiance forecasting using multi-layer cloud tracking and numerical weather prediction (JX, SY, DY, DH, JH, PK), pp. 2225–2230.
GPCEGPCE-2015-InostrozaS #algebra #composition
Modular interpreters for the masses: implicit context propagation using object algebras (PI, TvdS), pp. 171–180.
GPCEGPCE-2015-SeidlSS #design pattern #development #generative #product line #variability
Generative software product line development using variability-aware design patterns (CS, SS, IS), pp. 151–160.
SLESLE-2015-GammaitoniKG #design
Designing languages using lightning (LG, PK, CG), pp. 77–82.
SLESLE-2015-OchoaRT #feature model #modelling
Using decision rules for solving conflicts in extended feature models (LO, OGR, TT), pp. 149–160.
ASPLOSASPLOS-2015-OrrCYBHW
Synchronization Using Remote-Scope Promotion (MSO, SC, AY, BMB, MDH, DAW), pp. 73–86.
ASPLOSASPLOS-2015-Sidiroglou-Douskos #automation #branch #integer
Targeted Automatic Integer Overflow Discovery Using Goal-Directed Conditional Branch Enforcement (SSD, EL, NR, PP, FL, DK, MCR), pp. 473–486.
ASPLOSASPLOS-2015-TanQCAP #named #network
DIABLO: A Warehouse-Scale Computer Network Simulator using FPGAs (ZT, ZQ, XC, KA, DAP), pp. 207–221.
CASECASE-2015-AmriBARF #multi #robust
Robust indoor location tracking of multiple inhabitants using only binary sensors (MHA, YB, DA, NR, MF), pp. 194–199.
CASECASE-2015-ArdakaniORJ #generative #predict #realtime
Real-time trajectory generation using model predictive control (MMGA, BO, AR, RJ), pp. 942–948.
CASECASE-2015-BergagardF #automation #on the
On restart of automated manufacturing systems using restart states (PB, MF), pp. 166–167.
CASECASE-2015-CarliDEAV #automation #evaluation
Automated evaluation of urban traffic congestion using bus as a probe (RC, MD, NE, BA, AV), pp. 967–972.
CASECASE-2015-CarliDPR #energy #multi #optimisation #performance
Using multi-objective optimization for the integrated energy efficiency improvement of a smart city public buildings’ portfolio (RC, MD, RP, LR), pp. 21–26.
CASECASE-2015-CarmenateRLBM #analysis #approach #behaviour #energy #modelling
Modeling and analyzing occupant behaviors in building energy analysis using an information space approach (TC, MMR, DL, LB, AM), pp. 425–431.
CASECASE-2015-ChengHL #automation #petri net #robust #synthesis
Robust supervisor synthesis for automated manufacturing systems using Petri nets (YC, HH, YL), pp. 1029–1035.
CASECASE-2015-ChenH #assembly #automation #distributed #petri net
Maximally permissive distributed control of automated manufacturing systems with assembly operations using Petri nets (CC, HH), pp. 532–538.
CASECASE-2015-DobslawGZ #challenge #industrial #network
Challenges for the use of data aggregation in industrial Wireless Sensor Networks (FD, MG, TZ), pp. 138–144.
CASECASE-2015-FarhanPWL #algorithm #machine learning #predict
Predicting individual thermal comfort using machine learning algorithms (AAF, KRP, BW, PBL), pp. 708–713.
CASECASE-2015-FeiAR #bound #clustering #resource management #symbolic computation
Symbolic computation of boundary unsafe states in complex resource allocation systems using partitioning techniques (ZF, , SAR), pp. 799–806.
CASECASE-2015-FeldmannHKWKQLK #case study #comparison #consistency #design #nondeterminism
A comparison of inconsistency management approaches using a mechatronic manufacturing system design case study (SF, SJIH, KK, TW, DK, AQ, UL, HK, CJJP, BVH), pp. 158–165.
CASECASE-2015-FerreiraBGV #framework
Consolidation of the control system of a chemical polishing machine for superconducting RF cavities using the UNICOS-CPC framework (RF, SB, PG, HV), pp. 1471–1476.
CASECASE-2015-ForstnerM #optimisation #safety
Using simulation-based optimization to determine production strategies and safety stock levels in semiconductor supply chains (LF, LM), pp. 655–656.
CASECASE-2015-GiulianiC #optimisation #problem
Derivative-free optimization with use of problem structure: Applications to oil production (CMG, EC), pp. 764–768.
CASECASE-2015-JiaJCS #locality #named
SoundLoc: Accurate room-level indoor localization using acoustic signatures (RJ, MJ, ZC, CJS), pp. 186–193.
CASECASE-2015-KaipaTSKLG #automation
Resolving automated perception system failures in bin-picking tasks using assistance from remote human operators (KNK, SSTK, SS, AMK, JDL, SKG), pp. 1453–1458.
CASECASE-2015-KeroglouH #communication #constraints #distributed
Distributed diagnosis using predetermined synchronization strategies in the presence of communication constraints (CK, CNH), pp. 831–836.
CASECASE-2015-KimCLJ #design #estimation
Design of pitch controller for wind turbines using time-delay estimation (JK, JC, JL, MJ), pp. 1131–1136.
CASECASE-2015-KreutzerRREL #automation #detection #metric
Automatically detecting fluid intake using conductivity measurements of beverages in a cup (JFK, SR, SMFR, KE, TCL), pp. 1546–1551.
CASECASE-2015-LeeKK #online #parametricity
Control of an aerial manipulator using on-line parameter estimator for an unknown payload (HL, SK, HJK), pp. 316–321.
CASECASE-2015-LiangSQLY #agile #assessment #development
Criteria for lean practice selection: Development an assessment tool using the rooted arborescence (YL, SS, LQ, YL, GY), pp. 237–242.
CASECASE-2015-LinZW #predict #realtime
Using real-time sensing data for predicting future state of building fires (CCL, GZ, LLW), pp. 1313–1318.
CASECASE-2015-LiuC #algorithm #evaluation #performance #quality
A fast algorithm for grasp quality evaluation using the object wrench space (SL, SC), pp. 558–563.
CASECASE-2015-MeddouriDF #analysis #generative #induction #performance #predict
Performance analysis of an autonomous induction generator under different operating conditions using predictive control (SM, LAD, LF), pp. 1118–1124.
CASECASE-2015-MillerM #locality
Optimal planning for target localization and coverage using range sensing (LMM, TDM), pp. 501–508.
CASECASE-2015-ParisACAR #behaviour #learning #markov #smarttech
Using Hidden Semi-Markov Model for learning behavior in smarthomes (AP, SA, NC, AEA, NR), pp. 752–757.
CASECASE-2015-ProdelAXJL #database #integer #linear #mining #process #programming
Discovery of patient pathways from a national hospital database using process mining and integer linear programming (MP, VA, XX, BJ, LL), pp. 1409–1414.
CASECASE-2015-QuangTH #adaptation
FPGA-based sensorless PMSM speed control using adaptive extended Kalman filter (NKQ, DDT, QPH), pp. 1650–1655.
CASECASE-2015-RoyelYLLH #identification #optimisation #parametricity
A hysteresis model and parameter identification for MR pin joints using immune particle swarm optimization (SR, YY, YL, JL, QPH), pp. 1319–1324.
CASECASE-2015-SaksenaNKK #2d #assembly #automation #parametricity
Automatic tuning of impedance parameter using configuration space for two dimensional assembly system (AS, TN, JK, KK), pp. 1110–1117.
CASECASE-2015-Schwung #automaton #cyber-physical #hybrid #modelling
Cyber-physical modeling of compression systems using hybrid automata (AS), pp. 1125–1130.
CASECASE-2015-SrinivasanBSSR #automation #machine learning #modelling #network
Modelling time-varying delays in networked automation systems with heterogeneous networks using machine learning techniques (SS, FB, GS, BS, SR), pp. 362–368.
CASECASE-2015-TorresP #multi
Cooperative control of multiple untethered magnetic microrobots using a single magnetic field source (NAT, DOP), pp. 1608–1613.
CASECASE-2015-WahrburgMCMD #estimation
Cartesian contact force estimation for robotic manipulators using Kalman filters and the generalized momentum (AW, EM, GC, BM, HD), pp. 1230–1235.
CASECASE-2015-WareS #synthesis
Synthesis time optimal accepting traces using language projection and pruning (SW, RS), pp. 1363–1368.
CASECASE-2015-Yen #realtime
Optimize the flight path for airlines using real-time information (JRY), p. 1649.
CASECASE-2015-ZafarKSMJA #health #monitoring #process
Tool health monitoring for wood milling process using airborne acoustic emission (TZ, KK, ZS, SM, AJ, UA), pp. 1521–1526.
CASECASE-2015-ZhangTYL #assessment #markov #reliability
CAN node reliability assessment using segmented discrete time Markov chains (LZ, LT, FY, YL), pp. 231–236.
CASECASE-2015-ZhuCS #energy #linear #process #recognition
Using unlabeled acoustic data with locality-constrained linear coding for energy-related activity recognition in buildings (QZ, ZC, YCS), pp. 174–179.
CASECASE-2015-ZonEHJVSB #delivery #detection #multi #realtime
Real-time collision detection for multiple packaging robots using monotonicity of configuration subspaces (RvZ, DE, DH, IJ, RV, RIS, KB), pp. 1638–1643.
CGOCGO-2015-NagarajG #analysis #approximate #mining #pointer
Approximating flow-sensitive pointer analysis using frequent itemset mining (VN, RG), pp. 225–234.
DACDAC-2015-AsadJ #programming #verification
Verifying inevitability of phase-locking in a charge pump phase lock loop using sum of squares programming (HuA, KDJ), p. 6.
DACDAC-2015-CampbellLMC #debugging #detection #fault #hybrid #synthesis #validation
Hybrid quick error detection (H-QED): accelerator validation and debug using high-level synthesis principles (KAC, DL, SM, DC), p. 6.
DACDAC-2015-Engblom #integration #platform
Virtual to the (near) end: using virtual platforms for continuous integration (JE), p. 6.
DACDAC-2015-HanKL #design #evaluation
Evaluation of BEOL design rule impacts using an optimal ILP-based detailed router (KH, ABK, HL), p. 6.
DACDAC-2015-HelalBH #parallel #simulation
Parallel circuit simulation using the direct method on a heterogeneous cloud (AEH, AMB, YYH), p. 6.
DACDAC-2015-HerdtLD #simulation #verification
Verifying SystemC using stateful symbolic simulation (VH, HML, RD), p. 6.
DACDAC-2015-LahiouelZT #smt #towards
Towards enhancing analog circuits sizing using SMT-based techniques (OL, MHZ, ST), p. 6.
DACDAC-2015-MundhenkSLFC #analysis #architecture #model checking #probability #security
Security analysis of automotive architectures using probabilistic model checking (PM, SS, ML, SAF, SC), p. 6.
DACDAC-2015-PapamichaelMH #algorithm #automation #design #named #performance #search-based
Nautilus: fast automated IP design space search using guided genetic algorithms (MKP, PM, JCH), p. 6.
DACDAC-2015-SonghoriHSK #logic #nearest neighbour #privacy #synthesis
Compacting privacy-preserving k-nearest neighbor search using logic synthesis (EMS, SUH, ARS, FK), p. 6.
DACDAC-2015-TashjianD #identification #on the
On using control signals for word-level identification in a gate-level netlist (ET, AD), p. 6.
DACDAC-2015-TsaiYPLTCC #design #energy #in memory #memory management
Energy-efficient non-volatile TCAM search engine design using priority-decision in memory technology for DPI (HJT, KHY, YCP, CCL, YHT, MFC, TFC), p. 6.
DACDAC-2015-XuLP #adaptation #modelling #physics #statistics
Adaptive characterization and emulation of delay-based physical unclonable functions using statistical models (TX, DL, MP), p. 6.
DACDAC-2015-YoonSMC #behaviour #detection #embedded #heatmap #memory management #realtime
Memory heat map: anomaly detection in real-time embedded systems using memory behavior (MKY, LS, SM, JC), p. 6.
DACDAC-2015-ZhouAZYUGUJ #detection #embedded #hardware
Detecting hardware trojans using backside optical imaging of embedded watermarks (BZ, RA, MZ, TY, AU, BBG, MSÜ, AJ), p. 6.
DACDAC-2015-ZhuangYKWC #algorithm #exponential #framework #performance #scalability #simulation
An algorithmic framework for efficient large-scale circuit simulation using exponential integrators (HZ, WY, IK, XW, CKC), p. 6.
DATEDATE-2015-AhsanK #architecture #optimisation #quantum
Optimization of quantum computer architecture using a resource-performance simulator (MA, JK), pp. 1108–1113.
DATEDATE-2015-BalboniFB #configuration management #distributed #latency #multi #network #scalability
Synergistic use of multiple on-chip networks for ultra-low latency and scalable distributed routing reconfiguration (MB, JF, DB), pp. 806–811.
DATEDATE-2015-BaldwinBRPB #analysis #array #predict
Gait analysis for fall prediction using hierarchical textile-based capacitive sensor arrays (RB, SB, RR, CP, NB), pp. 1293–1298.
DATEDATE-2015-BarraganL #case study #feature model
Feature selection for alternate test using wrappers: application to an RF LNA case study (MJB, GL), pp. 1229–1232.
DATEDATE-2015-BillointSRVBFRC #2d #3d #design
A comprehensive study of monolithic 3D cell on cell design using commercial 2D tool (OB, HS, IR, MV, PB, CFB, OR, GC, FD, AF, JM, OF, OT, JFC, ST, FC), pp. 1192–1196.
DATEDATE-2015-CakirM #clustering #correlation #detection #hardware
Hardware Trojan detection for gate-level ICs using signal correlation based clustering (, SM), pp. 471–476.
DATEDATE-2015-ChangD #analysis #model checking #modelling
May-happen-in-parallel analysis of ESL models using UPPAAL model checking (CWC, RD), pp. 1567–1570.
DATEDATE-2015-ChenYQFM #evaluation #model checking #scheduling #statistics
Variation-aware evaluation of MPSoC task allocation and scheduling strategies using statistical model checking (MC, DY, XQ, XF, PM), pp. 199–204.
DATEDATE-2015-CuiZSW #towards
Towards trustable storage using SSDs with proprietary FTL (XC, MZ, LS, KW), pp. 1213–1216.
DATEDATE-2015-DarkeCVSM #approximate #bound #model checking
Over-approximating loops to prove properties using bounded model checking (PD, BC, RV, US, RM), pp. 1407–1412.
DATEDATE-2015-ErolOSPB #metric
On-chip measurement of bandgap reference voltage using a small form factor VCO based zoom-in ADC (OEE, SO, CKHS, RAP, LB), pp. 1559–1562.
DATEDATE-2015-FernandoWNKC #agile #algorithm #design #synthesis
(AS)2: accelerator synthesis using algorithmic skeletons for rapid design space exploration (SF, MW, CN, AK, HC), pp. 305–308.
DATEDATE-2015-HashemianSWWCP #array #authentication #robust
A robust authentication methodology using physically unclonable functions in DRAM arrays (MSH, BPS, FGW, DJW, SC, CAP), pp. 647–652.
DATEDATE-2015-HerberRWH #realtime #scheduling
Real-time capable CAN to AVB ethernet gateway using frame aggregation and scheduling (CH, AR, TW, AH), pp. 61–66.
DATEDATE-2015-JiRML #hardware #implementation #logic #network #probability
A hardware implementation of a radial basis function neural network using stochastic logic (YJ, FR, CM, DJL), pp. 880–883.
DATEDATE-2015-KauerNLSC #geometry #optimisation #programming
Inductor optimization for active cell balancing using geometric programming (MK, SN, ML, SS, SC), pp. 281–284.
DATEDATE-2015-LiaperdosSATAL #deployment #performance
Fast deployment of alternate analog test using Bayesian model fusion (JL, HGDS, LA, YT, AA, XL), pp. 1030–1035.
DATEDATE-2015-LiJHWCGLKW #design #optimisation
Variation-aware, reliability-emphasized design and optimization of RRAM using SPICE model (HL, ZJ, PH, YW, HYC, BG, XYL, JFK, HSPW), pp. 1425–1430.
DATEDATE-2015-LiXWNP #fine-grained #multi #power management #reduction
Leakage power reduction for deeply-scaled FinFET circuits operating in multiple voltage regimes using fine-grained gate-length biasing technique (JL, QX, YW, SN, MP), pp. 1579–1582.
DATEDATE-2015-LourencoMH
Layout-aware sizing of analog ICs using floorplan & routing estimates for parasitic extraction (NCL, RM, NH), pp. 1156–1161.
DATEDATE-2015-MadhukarSWKM #abstraction #lazy evaluation #verification
Verifying synchronous reactive systems using lazy abstraction (KM, MS, BW, DK, RM), pp. 1571–1574.
DATEDATE-2015-MunchPHH #embedded #manycore #named #realtime #scalability
MPIOV: scaling hardware-based I/O virtualization for mixed-criticality embedded real-time systems using non transparent bridges to (multi-core) multi-processor systems (DM, MP, OH, AH), pp. 579–584.
DATEDATE-2015-PaulinoFBC #configuration management #execution #hardware
Transparent acceleration of program execution using reconfigurable hardware (NMCP, JCF, JB, JMPC), pp. 1066–1071.
DATEDATE-2015-RanjanRVPRR #configuration management #memory management #named
DyReCTape: a dynamically reconfigurable cache using domain wall memory tapes (AR, SGR, RV, VSP, KR, AR), pp. 181–186.
DATEDATE-2015-SaifhashemiHBB #equivalence #logic #tool support
Logical equivalence checking of asynchronous circuits using commercial tools (AS, HHH, PB, PAB), pp. 1563–1566.
DATEDATE-2015-SalfelderH #adaptation #evaluation #simulation
Ageing simulation of analogue circuits and systems using adaptive transient evaluation (FS, LH), pp. 1261–1264.
DATEDATE-2015-ShutoYS #architecture #case study #comparative
Comparative study of power-gating architectures for nonvolatile FinFET-SRAM using spintronics-based retention technology (YS, SY, SS), pp. 866–871.
DATEDATE-2015-StrobelBOSP #named
Scandalee: a side-channel-based disassembler using local electromagnetic emanations (DS, FB, DO, FS, CP), pp. 139–144.
DATEDATE-2015-SunKPE #algebra #geometry #verification
Formal verification of sequential Galois field arithmetic circuits using algebraic geometry (XS, PK, TP, FE), pp. 1623–1628.
DATEDATE-2015-TanLF #memory management #reliability
Soft-error reliability and power co-optimization for GPGPUS register file using resistive memory (JT, ZL, XF), pp. 369–374.
DATEDATE-2015-TeysseyreNOCCG #performance #set #simulation
Fast optical simulation from a reduced set of impulse responses using SystemC-AMS (FT, DN, IO, FC, FC, OG), pp. 405–409.
DATEDATE-2015-VenkataramanKSE #design #heuristic
Designing inexact systems efficiently using elimination heuristics (SV, AK, JS, CCE), pp. 758–763.
DATEDATE-2015-WengCCHW
Using structural relations for checking combinationality of cyclic circuits (WCW, YCC, JHC, CYH, CYW), pp. 325–328.
DATEDATE-2015-YuSHEAB #library #multi #statistics
Statistical library characterization using belief propagation across multiple technology nodes (LY, SS, CH, IME, DAA, DSB), pp. 1383–1388.
DATEDATE-2015-ZhuM #linear #machine learning #optimisation #programming
Optimizing dynamic trace signal selection using machine learning and linear programming (CSZ, SM), pp. 1289–1292.
HPCAHPCA-2015-HungerKRDVT #comprehension
Understanding contention-based channels and using them for defense (CH, MK, ASR, AGD, SV, MT), pp. 639–650.
HPCAHPCA-2015-LoCIS #monitoring #runtime
Run-time monitoring with adjustable overhead using dataflow-guided filtering (DL, TC, MI, GES), pp. 662–674.
HPCAHPCA-2015-WuGLJC #estimation #machine learning #performance
GPGPU performance and power estimation using machine learning (GYW, JLG, AL, NJ, DC), pp. 564–576.
HPDCHPDC-2015-HeSSI #cost analysis #online
Cutting the Cost of Hosting Online Services Using Cloud Spot Markets (XH, PJS, RKS, DEI), pp. 207–218.
ISMMISMM-2015-OsterlundL #concurrent #protocol
Concurrent compaction using a field pinning protocol (, WL), pp. 56–69.
LCTESLCTES-2015-BardizbanyanSWL #data access #performance
Improving Data Access Efficiency by Using Context-Aware Loads and Stores (AB, MS, DBW, PLE), p. 10.
PDPPDP-2015-El-KazzazE #detection #framework #scalability #ubiquitous
A Hadoop-Based Framework for Large-Scale Landmine Detection Using Ubiquitous Big Satellite Imaging Data (SEK, AEM), pp. 274–278.
PDPPDP-2015-GianariaG #image #realtime #simulation
Real-Time Simulation of Radiological Images Using CUDA Technology (EG, EG), pp. 669–673.
PDPPDP-2015-HernandezCBTA #case study #experience #simulation
Experiences of Using Cassandra for Molecular Dynamics Simulations (RH, CC, YB, JT, EA), pp. 288–295.
PDPPDP-2015-MiwaN #thread
Progression of MPI Non-blocking Collective Operations Using Hyper-Threading (MM, KN), pp. 163–171.
PDPPDP-2015-SimonetCFF
Using Active Data to Provide Smart Data Surveillance to E-Science Users (AS, KC, GF, ITF), pp. 269–273.
PDPPDP-2015-TrahayBBL
Selecting Points of Interest in Traces Using Patterns of Events (FT, EB, MMB, JL), pp. 70–77.
PPoPPPPoPP-2015-RamachandranM #concurrent #named #performance
CASTLE: fast concurrent internal binary search tree using edge-based locking (AR, NM), pp. 281–282.
SOSPSOSP-2015-ChenZCCKZ #file system #hoare #logic
Using Crash Hoare logic for certifying the FSCQ file system (HC, DZ, TC, AC, MFK, NZ), pp. 18–37.
SOSPSOSP-2015-RaychevMM #execution #symbolic computation
Parallelizing user-defined aggregations using symbolic execution (VR, MM, TM), pp. 153–167.
SOSPSOSP-2015-WeiSCCC #in memory #performance #transaction
Fast in-memory transaction processing using RDMA and HTM (XW, JS, YC, RC, HC), pp. 87–104.
FASEFASE-2015-AndriescuMI #automaton #data type
Composing Message Translators and Inferring Their Data Types Using Tree Automata (EA, TM, VI), pp. 35–50.
STOCSTOC-2015-AggarwalDRS #problem
Solving the Shortest Vector Problem in 2n Time Using Discrete Gaussian Sampling: Extended Abstract (DA, DD, OR, NSD), pp. 733–742.
STOCSTOC-2015-Czumaj #network #permutation #random
Random Permutations using Switching Networks (AC), pp. 703–712.
TACASTACAS-2015-BransenBCD #attribute grammar #order #scheduling
Linearly Ordered Attribute Grammar Scheduling Using SAT-Solving (JB, LTvB, KC, AD), pp. 289–303.
TACASTACAS-2015-HolikHLRSV #analysis #automaton #contest #named
Forester: Shape Analysis Using Tree Automata — (Competition Contribution) (LH, MH, OL, AR, JS, TV), pp. 432–435.
TACASTACAS-2015-KriouileS #formal method #verification
Using a Formal Model to Improve Verification of a Cache-Coherent System-on-Chip (AK, WS), pp. 708–722.
TACASTACAS-2015-Thierry-Mieg #model checking
Symbolic Model-Checking Using ITS-Tools (YTM), pp. 231–237.
CADECADE-2015-GransdenWR #automaton #named #proving
SEPIA: Search for Proofs Using Inferred Automata (TG, NW, RR), pp. 246–255.
CADECADE-2015-MaricJM #correctness #higher-order #proving
Proving Correctness of a KRK Chess Endgame Strategy by Using Isabelle/HOL and Z3 (FM, PJ, MM), pp. 256–271.
CADECADE-2015-Paulson #automaton #finite #formal method #set
A Formalisation of Finite Automata Using Hereditarily Finite Sets (LCP), pp. 231–245.
CADECADE-2015-TiwariGD #synthesis
Program Synthesis Using Dual Interpretation (AT, AG, BD), pp. 482–497.
CAVCAV-2015-BacchusK #satisfiability #set
Using Minimal Correction Sets to More Efficiently Compute Minimal Unsatisfiable Sets (FB, GK), pp. 70–86.
CAVCAV-2015-CernyCHRRST #scheduling #synthesis
From Non-preemptive to Preemptive Scheduling Using Synchronization Synthesis (PC, EMC, TAH, AR, LR, RS, TT), pp. 180–197.
CAVCAV-2015-DeshmukhMP #consistency #metric
Quantifying Conformance Using the Skorokhod Metric (JVD, RM, VSP), pp. 234–250.
CAVCAV-2015-ErezN #automation #bound #graph #smt
Finding Bounded Path in Graph Using SMT for Automatic Clock Routing (AE, AN), pp. 20–36.
ICLPICLP-2015-Charwat #diagrams #programming #research #summary
Dynamic Programming on Tree Decompositions using Binary Decision Diagrams: Research Summary (GC), pp. 301–310.
ICLPICLP-2015-LeeWZ #automation #programming #reasoning #set
Automated Reasoning about XACML 3.0 Delegation Using Answer Set Programming (JL, YW, YZ), pp. 247–259.
ICLPICLP-2015-LiVPSB #debugging
Debugging ASP using ILP (TL, MDV, JP, KS, TB), pp. 100–113.
ICLPICLP-J-2015-BogaertsB #approximate #compilation #fixpoint #logic programming #source code
Knowledge compilation of logic programs using approximation fixpoint theory (BB, GVdB), pp. 464–480.
ICLPICLP-J-2015-KoponenOJS #optimisation #programming #set
Optimizing phylogenetic supertrees using answer set programming (LK, EO, TJ, LS), pp. 604–619.
ICSTICST-2015-0001YPGS #analysis #generative #testing
Generating Succinct Test Cases Using Don’t Care Analysis (CN, HY, MRP, IG, KS), pp. 1–10.
ICSTICST-2015-BaiSP #fault #named
NUMFL: Localizing Faults in Numerical Software Using a Value-Based Causal Model (ZB, GS, AP), pp. 1–10.
ICSTICST-2015-Felbinger #assessment #model inference #quality #testing
Test Suite Quality Assessment Using Model Inference Techniques (HF), pp. 1–2.
ICSTICST-2015-LeottaSRT #multi #robust #testing #web
Using Multi-Locators to Increase the Robustness of Web Test Cases (ML, AS, FR, PT), pp. 1–10.
ICSTICST-2015-MahajanH #detection #html #locality
Detection and Localization of HTML Presentation Failures Using Computer Vision-Based Techniques (SM, WGJH), pp. 1–10.
ICSTICST-2015-NoguchiWFSO #black box #optimisation #testing
History-Based Test Case Prioritization for Black Box Testing Using Ant Colony Optimization (TN, HW, YF, AS, KO), pp. 1–2.
ICSTICST-2015-RaposD #execution #fuzzy #logic #symbolic computation #testing #uml
Using Fuzzy Logic and Symbolic Execution to Prioritize UML-RT Test Cases (EJR, JD), pp. 1–10.
ICSTICST-2015-SantosC #agile #challenge #industrial #mobile #testing
Mobile Testing in Software Industry Using Agile: Challenges and Opportunities (AS, IC), pp. 1–2.
ICTSSICTSS-2015-GrozSPO #finite #identification #sequence #state machine
Inferring Finite State Machines Without Reset Using State Identification Sequences (RG, AdSS, AP, CO), pp. 161–177.
ICTSSICTSS-2015-GunicenJY #adaptation #generative #multi #sequence
Using Multiple Adaptive Distinguishing Sequences for Checking Sequence Generation (CG, GVJ, HY), pp. 19–34.
ICTSSICTSS-2015-HentzVM #cost analysis #grammarware #testing
Reducing the Cost of Grammar-Based Testing Using Pattern Coverage (CH, JJV, AMM), pp. 71–85.
ISSTAISSTA-2015-JiaGY #constraints #execution #reuse #symbolic computation
Enhancing reuse of constraint solutions to improve symbolic execution (XJ, CG, SY), pp. 177–187.
ISSTAISSTA-2015-ShenLPG #automation #detection #performance #profiling #search-based
Automating performance bottleneck detection using search-based application profiling (DS, QL, DP, MG), pp. 270–281.
ICSTSAT-2015-AnsoteguiGLS #community #detection
Using Community Structure to Detect Relevant Learnt Clauses (CA, JGC, JL, LS), pp. 238–254.
TAPTAP-2015-AthanasiouLS #concurrent #generative #testing
Test Case Generation for Concurrent Systems Using Event Structures (KA, HPdL, SS), pp. 19–37.
TAPTAP-2015-MoreiraHDMNM #case study #code generation #testing #tool support #verification
Verifying Code Generation Tools for the B-Method Using Tests: A Case Study (AMM, CH, DD, ECBdM, JBSN, VdMJ), pp. 76–91.
VMCAIVMCAI-2015-ChristakisG #composition #image #memory management #parsing #proving #safety #testing
Proving Memory Safety of the ANI Windows Image Parser Using Compositional Exhaustive Testing (MC, PG), pp. 373–392.
VMCAIVMCAI-2015-NagarS #analysis
Path Sensitive Cache Analysis Using Cache Miss Paths (KN, YNS), pp. 43–60.
CBSECBSE-2014-BenedittoW #configuration management #runtime
Using a model to generate reconfiguration plans at runtime (MEMDB, CMLW), pp. 65–74.
CBSECBSE-2014-MateescuSY #model checking #parallel #process
Quantifying the parallelism in BPMN processes using model checking (RM, GS, LY), pp. 159–168.
ECSAECSA-2014-FreudenreichAFB #architecture #complexity #policy
Using Policies for Handling Complexity of Event-Driven Architectures (TF, SA, SF, APB), pp. 114–129.
QoSAQoSA-2014-BrunnertWK #architecture #enterprise #modelling #performance
Using architecture-level performance models as resource profiles for enterprise applications (AB, KW, HK), pp. 53–62.
QoSAQoSA-2014-FouquetNDBBPM #architecture #design #distributed #evolution
Designing and evolving distributed architecture using kevoree (FF, GN, ED, JB, OB, NP, BM), pp. 147–148.
DocEngDocEng-2014-Fan0N
Paper stitching using maximum tolerant seam under local distortions (WF, JS, SN), pp. 35–44.
DocEngDocEng-2014-KolbergFRF #analysis #documentation #performance #throughput
JAR tool: using document analysis for improving the throughput of high performance printing environments (MLK, LGF, MR, CF), pp. 175–178.
DocEngDocEng-2014-NourashrafeddinMA #approach #clustering #concept #documentation #wiki
An ensemble approach for text document clustering using Wikipedia concepts (SN, EEM, DVA), pp. 107–116.
DocEngDocEng-2014-SouzaMH #metadata #named
ARCTIC: metadata extraction from scientific papers in pdf using two-layer CRF (AS, VPM, CAH), pp. 121–130.
DRRDRR-2014-BanerjeeC #locality #video
Video text localization using wavelet and shearlet transforms (PB, BBC), p. ?–10.
DRRDRR-2014-JainOD #documentation #image #retrieval #scalability
Scalable ranked retrieval using document images (RJ, DWO, DSD), p. ?–15.
DRRDRR-2014-KleberDS #classification #retrieval #word
Form classification and retrieval using bag of words with shape features of line structures (FK, MD, RS), pp. 902107–9.
DRRDRR-2014-LemaitreCC #image #segmentation
Handwritten text segmentation using blurred image (AL, JC, BC), p. ?–12.
DRRDRR-2014-ParkerFF #documentation #heuristic #image #robust
Robust binarization of degraded document images using heuristics (JP, OF, GF), p. ?–12.
DRRDRR-2014-TaoTX #documentation #learning #random
Document page structure learning for fixed-layout e-books using conditional random fields (XT, ZT, CX), p. ?–9.
HTHT-2014-AbbasiTL #learning #scalability
Scalable learning of users’ preferences using networked data (MAA, JT, HL), pp. 4–12.
HTHT-2014-NoorianMV #adaptation #feedback #self
Self-adaptive filtering using pid feedback controller in electronic commerce (ZN, MM, JV), pp. 267–272.
JCDLJCDL-2014-BatjargalKKM #database #identification #image #multi
Identifying the same records across multiple Ukiyo-e image databases using textual data in different languages (BB, TK, FK, AM), pp. 193–196.
JCDLJCDL-2014-ChenF #education #metadata
Using ACM DL paper metadata as an auxiliary source for building educational collections (YC, EAF), pp. 137–140.
JCDLJCDL-2014-ChoiLD #automation #classification #what
What is this song about anyway?: Automatic classification of subject using user interpretations and lyrics (KC, JHL, JSD), pp. 453–454.
JCDLJCDL-2014-DibieMS #approach #behaviour #comprehension #education #online #predict
A computational approach to understanding and predicting the behavior of educators using an online curriculum planning tool (OD, KEM, TS), pp. 487–488.
JCDLJCDL-2014-GuoGL #education
Using affective embodied agents in information literacy education (YG, DHLG, BL), pp. 389–398.
JCDLJCDL-2014-KellyNW14a #experience #named #web
Mink: Integrating the live and archived web viewing experience using web browsers and memento (MK, MLN, MCW), pp. 469–470.
JCDLJCDL-2014-MeuschkeG #detection #retrieval
Reducing computational effort for plagiarism detection by using citation characteristics to limit retrieval space (NM, BG), pp. 197–200.
JCDLJCDL-2014-PereiraSE
Disambiguating publication venue titles using association rules (DAP, EEBdS, AAAE), pp. 77–86.
SIGMODSIGMOD-2014-DyresonBG #query
Querying virtual hierarchies using virtual prefix-based numbers (CED, SSB, RG), pp. 791–802.
SIGMODSIGMOD-2014-ElmeleegyOR #distributed #memory management #named #pipes and filters
SpongeFiles: mitigating data skew in mapreduce using distributed memory (KE, CO, BR), pp. 551–562.
SIGMODSIGMOD-2014-HeMD #policy #privacy #trade-off
Blowfish privacy: tuning privacy-utility trade-offs using policies (XH, AM, BD), pp. 1447–1458.
SIGMODSIGMOD-2014-KalininCZ #data analysis #interactive #semantics
Interactive data exploration using semantic windows (AK, , SBZ), pp. 505–516.
SIGMODSIGMOD-2014-LevinK #network #pipes and filters #social
Stratified-sampling over social networks using mapreduce (RL, YK), pp. 863–874.
SIGMODSIGMOD-2014-SatishSPSPHSYD #dataset #framework #graph #navigation
Navigating the maze of graph analytics frameworks using massive graph datasets (NS, NS, MMAP, JS, JP, MAH, SS, ZY, PD), pp. 979–990.
VLDBVLDB-2014-FuOPZ #component #declarative #javascript #named
FORWARD: Data-Centric UIs using Declarative Templates that Efficiently Wrap Third-Party JavaScript Components (YF, KWO, YP, EZ), pp. 1649–1652.
VLDBVLDB-2014-SarmaHC #clustering #framework #named #similarity
ClusterJoin: A Similarity Joins Framework using Map-Reduce (ADS, YH, SC), pp. 1059–1070.
VLDBVLDB-2014-SunRYD #classification #crowdsourcing #machine learning #named #scalability
Chimera: Large-Scale Classification using Machine Learning, Rules, and Crowdsourcing (CS, NR, FY, AD), pp. 1529–1540.
VLDBVLDB-2014-YangDCC #keyword #knowledge base
Finding Patterns in a Knowledge Base using Keywords to Compose Table Answers (MY, BD, SC, KC), pp. 1809–1820.
VLDBVLDB-2014-YuMS #random
Reverse Top-k Search using Random Walk with Restart (AWY, NM, HS), pp. 401–412.
VLDBVLDB-2014-ZhangJSR #big data #recommendation
Getting Your Big Data Priorities Straight: A Demonstration of Priority-based QoS using Social-network-driven Stock Recommendation (RZ, RJ, PS, LR), pp. 1665–1668.
VLDBVLDB-2015-Li0QYZ014 #query #set
Processing Moving kNN Queries Using Influential Neighbor Sets (CL, YG, JQ, GY, RZ, WY), pp. 113–124.
VLDBVLDB-2015-WangZZLW14 #correlation #estimation #streaming
Selectivity Estimation on Streaming Spatio-Textual Data Using Local Correlations (XW, YZ, WZ, XL, WW), pp. 101–112.
VLDBVLDB-2015-ZhouGSY14 #distributed #graph #named #online #scalability
MOCgraph: Scalable Distributed Graph Processing Using Message Online Computing (CZ, JG, BS, JXY), pp. 377–388.
CSEETCSEET-2014-AkpolatS #gamification #programming #re-engineering #student
Enhancing software engineering student team engagement in a high-intensity extreme programming course using gamification (BSA, WS), pp. 149–153.
CSEETCSEET-2014-Lethbridge #development #education #effectiveness #modelling
Teaching modeling using Umple: Principles for the development of an effective tool (TCL), pp. 23–28.
CSEETCSEET-2014-SedelmaierL #modelling #process #requirements
Using business process models to foster competencies in requirements engineering (YS, DL), pp. 13–22.
CSEETCSEET-2014-ShankararamanD #challenge #delivery #design #education #re-engineering
Opportunities and challenges in using competencies during design and delivery of software engineering curriculum (VS, JD), pp. 179–182.
CSEETCSEET-2014-Steppe #analysis #dependence #design #education #graph
Teaching analysis of software designs using dependency graphs (KS), pp. 65–73.
EDMEDM-2014-EaglePMB #logic #student
Exploration of Student's Use of Rule Application References in a Propositional Logic Tutor (ME, VP, BM, TB), pp. 249–252.
EDMEDM-2014-FuentesRGV #data mining #mining #self #student
Accepting or Rejecting Students_ Self-grading in their Final Marks by using Data Mining (JF, CR, CGM, SV), pp. 327–328.
EDMEDM-2014-GerykP #analysis #student #visual notation
Analysis of Student Retention and Drop-out using Visual Analytics (JG, LP), pp. 331–332.
EDMEDM-2014-KimPSJ #comparison #learning #linear #online #predict #student
Predicting students' learning achievement by using online learning patterns in blended learning environments: Comparison of two cases on linear and non-linear model (JK, YP, JS, IHJ), pp. 407–408.
EDMEDM-2014-Lang #predict #student
The Use of Student Confidence for Prediction & Resolving Individual Student Knowledge Structure (CL), pp. 438–440.
EDMEDM-2014-NiznanPR #detection #problem
Using Problem Solving Times and Expert Opinion to Detect Skills (JN, RP, JR), pp. 433–434.
EDMEDM-2014-PeddycordHB #generative #problem #programming
Generating Hints for Programming Problems Using Intermediate Output (BWPI, AH, TB), pp. 92–98.
EDMEDM-2014-RayBR #data mining #mining
Using Data Mining to Automate ADDIE (FR, KWB, RR), pp. 429–430.
EDMEDM-2014-SaarelaK #education
Discovering Gender-Specific Knowledge from Finnish Basic Education using PISA Scale Indices (MS, TK), pp. 60–67.
EDMEDM-2014-SchneiderB #gesture #interactive #interface #recognition #student
Unraveling Students' Interaction Around a Tangible Interface Using Gesture Recognition (BS, PB), pp. 320–323.
EDMEDM-2014-ToussaintLT #automation #behaviour #detection #similarity #towards
Towards Using Similarity Measure for Automatic Detection of Significant Behaviors from Continuous Data (BMT, VL, JT), pp. 427–428.
EDMEDM-2014-WorsleyB #learning #multimodal
Using Multimodal Learning Analytics to Study Learning Mechanisms (MW, PB), pp. 431–432.
EDMEDM-2014-XuCYM
Using EEG in Knowledge Tracing (YX, KmC, YY, JM), pp. 361–362.
EDMEDM-2014-ZhengP #algorithm #learning
Dynamic Re-Composition of Learning Groups Using PSO-Based Algorithms (ZZ, NP), pp. 357–358.
ITiCSEITiCSE-2014-BenottiMS #student
Engaging high school students using chatbots (LB, MCM, FS), pp. 63–68.
ITiCSEITiCSE-2014-FerreiraM #algorithm #analysis #design #education
The magic of algorithm design and analysis: teaching algorithmic skills using magic card tricks (JFF, AM), pp. 75–80.
ITiCSEITiCSE-2014-GibsonM #collaboration #tool support
A small scale project to investigate the current and potential use of collaborative tools at sheffield hallam university (TMG, CM), p. 342.
ITiCSEITiCSE-2014-Kann
Using reflections in a program integrating course (VK), p. 350.
ITiCSEITiCSE-2014-MedinaSGG #learning #student
Learning outcomes using objectives with computer science students (JAM, JJS, EGL, AGC), p. 339.
ITiCSEITiCSE-2014-MI14a #principle #problem
Problem-solving using the extremality principle (JM, SI), pp. 87–92.
ITiCSEITiCSE-2014-StrieweG14a #runtime
Code reading exercises using run time traces (MS, MG), p. 346.
ITiCSEITiCSE-2014-WangCMSW #data access #education #multi #named #security #visualisation
MLSvisual: a visualization tool for teaching access control using multi-level security (MW, SC, JM, CKS, CW), pp. 93–98.
SIGITESIGITE-2014-DekhaneJ #mobile #programming #student
Using mobile apps to support novice programming students (SD, CJ), pp. 133–134.
SIGITESIGITE-2014-Halper #android #education #framework #platform #programming
Using android as a platform for programming in the IT curriculum (MH), pp. 127–132.
SIGITESIGITE-2014-Trabelsi #approach #comprehension #education #network #security
Enhancing the comprehension of network sniffing attack in information security education using a hands-on lab approach (ZT), pp. 39–44.
SANERCSMR-WCRE-2014-Grosjean #biology #maintenance #question
Using biology and ecology as inspiration for software maintenance? (PG), p. 1.
SANERCSMR-WCRE-2014-KashiwabaraOIHYI #mining #recommendation
Recommending verbs for rename method using association rule mining (YK, YO, TI, YH, TY, KI), pp. 323–327.
SANERCSMR-WCRE-2014-RooverS #development #library #metaprogramming #tool support
Building development tools interactively using the EKEKO meta-programming library (CDR, RS), pp. 429–433.
SANERCSMR-WCRE-2014-SantosVA #analysis #clustering #semantics
Remodularization analysis using semantic clustering (GS, MTV, NA), pp. 224–233.
ICPCICPC-2014-KulkarniM #framework #obfuscation
A code obfuscation framework using code clones (AK, RM), pp. 295–299.
ICPCICPC-2014-SuzukiSIH #approach #modelling #n-gram
An approach for evaluating and suggesting method names using n-gram models (TS, KS, FI, SH), pp. 271–274.
ICPCICPC-2014-ThungLOC #classification #design #diagrams #metric #network
Condensing class diagrams by analyzing design and network metrics using optimistic classification (FT, DL, MHO, MRVC), pp. 110–121.
ICSMEICSME-2014-EddyK #code search #query #source code
Using Structured Queries for Source Code Search (BPE, NAK), pp. 431–435.
ICSMEICSME-2014-MorenoTMS #debugging #locality #on the #stack
On the Use of Stack Traces to Improve Text Retrieval-Based Bug Localization (LM, JJT, AM, WS), pp. 151–160.
ICSMEICSME-2014-Reiss #code search #testing #towards
Towards Creating Test Cases Using Code Search (SPR), pp. 436–440.
ICSMEICSME-2014-RomanoRP #algorithm #interface #refactoring #search-based
Refactoring Fat Interfaces Using a Genetic Algorithm (DR, SR, MP), pp. 351–360.
ICSMEICSME-2014-ShangNHJ #comprehension #development
Understanding Log Lines Using Development Knowledge (WS, MN, AEH, ZMJ), pp. 21–30.
ICSMEICSME-2014-Stephan #analysis #clone detection #detection #evaluation #mutation testing
Model Clone Detector Evaluation Using Mutation Analysis (MS), pp. 633–638.
ICSMEICSME-2014-StevensR #query
Querying the History of Software Projects Using QWALKEKO (RS, CDR), pp. 585–588.
ICSMEICSME-2014-VieiraFC #embedded #maintenance #metric #performance
Using Software Metrics to Estimate the Impact of Maintenance in the Performance of Embedded Software (AV, PF, ÉFC), pp. 521–525.
ICSMEICSME-2014-WangG #design #recommendation #refactoring
Recommending Clones for Refactoring Using Design, Context, and History (WW, MWG), pp. 331–340.
ICSMEICSME-2014-YeasminRS #debugging #evolution #interactive #summary #topic #visualisation
Interactive Visualization of Bug Reports Using Topic Evolution and Extractive Summaries (SY, CKR, KAS), pp. 421–425.
MSRMSR-2014-FukushimaKMYU #empirical #fault #modelling #predict
An empirical study of just-in-time defect prediction using cross-project models (TF, YK, SM, KY, NU), pp. 172–181.
MSRMSR-2014-LazarRS #debugging #detection #metric #similarity
Improving the accuracy of duplicate bug report detection using textual similarity measures (AL, SR, BS), pp. 308–311.
SCAMSCAM-2014-Abi-AntounCVG #abstract interpretation #graph #question
Are Object Graphs Extracted Using Abstract Interpretation Significantly Different from the Code? (MAA, SC, RV, AG), pp. 245–254.
SCAMSCAM-2014-KallenHH #object-oriented #refactoring
Impact of Code Refactoring Using Object-Oriented Methodology on a Scientific Computing Application (MK, SH, EÞH), pp. 125–134.
SCAMSCAM-2014-KawamitsuIKKRI #identification #repository #reuse #similarity #source code
Identifying Source Code Reuse across Repositories Using LCS-Based Source Code Similarity (NK, TI, TK, RGK, CDR, KI), pp. 305–314.
SCAMSCAM-2014-RahmanR14a #exception #on the #recommendation
On the Use of Context in Recommending Exception Handling Code Examples (MMR, CKR), pp. 285–294.
CIAACIAA-2014-AmorimMR #canonical #finite #linear #transducer
Counting Equivalent Linear Finite Transducers Using a Canonical Form (IA, AM, RR), pp. 70–83.
ICALPICALP-v1-2014-Lampis #approximate #graph
Parameterized Approximation Schemes Using Graph Widths (ML), pp. 775–786.
ICALPICALP-v1-2014-PrabhakaranSW
Secure Computation Using Leaky Tokens (MP, AS, AW), pp. 907–918.
FMFM-2014-LakshmiAK #analysis #liveness #reachability
Checking Liveness Properties of Presburger Counter Systems Using Reachability Analysis (KVL, AA, RK), pp. 335–350.
FMFM-2014-SanatiMM #decidability #guidelines #logic #metric
Analyzing Clinical Practice Guidelines Using a Decidable Metric Interval-Based Temporal Logic (MYS, WM, TSEM), pp. 611–626.
FMFM-2014-ShanWFZZWQC #verification
Formal Verification of Lunar Rover Control Software Using UPPAAL (LS, YW, NF, XZ, LZ, LW, LQ, JC), pp. 718–732.
HOFMHOFM-2014-BagheriSH #development #maintenance #modelling
Using Z in the Development and Maintenance of Computational Models of Real-World Systems (SMB, GS, JH), pp. 36–53.
HOFMHOFM-2014-BeckertGB #evaluation #interactive #proving #theorem proving #usability
A Usability Evaluation of Interactive Theorem Provers Using Focus Groups (BB, SG, FB), pp. 3–19.
IFMIFM-2014-BrideKP #constraints #specification #theorem proving #verification #workflow
Verifying Modal Workflow Specifications Using Constraint Solving (HB, OK, FP), pp. 171–186.
SEFMSEFM-2014-BianculliGK #logic #metric #pipes and filters
Trace Checking of Metric Temporal Logic with Aggregating Modalities Using MapReduce (DB, CG, SK), pp. 144–158.
SEFMSEFM-2014-DobrikovL #model checking #optimisation #partial order #reduction
Optimising the ProB Model Checker for B Using Partial Order Reduction (ID, ML), pp. 220–234.
SEFMSEFM-2014-DuboisR #functional
Verified Functional Iterators Using the FoCaLiZe Environment (CD, RR), pp. 317–331.
SEFMSEFM-2014-HajisheykhiEK #fault #modelling
Evaluating the Effect of Faults in SystemC TLM Models Using UPPAAL (RH, AE, SSK), pp. 175–189.
SEFMSEFM-2014-ReicherdtG #matlab #modelling #verification
Formal Verification of Discrete-Time MATLAB/Simulink Models Using Boogie (RR, SG), pp. 190–204.
FLOPSFLOPS-2014-Bahr #compilation #correctness #graph #proving
Proving Correctness of Compilers Using Structured Graphs (PB), pp. 221–237.
FLOPSFLOPS-2014-Riesco #debugging #declarative #maude #semantics
Using Big-Step and Small-Step Semantics in Maude to Perform Declarative Debugging (AR), pp. 52–68.
ICFPICFP-2014-Fisher #formal method
Using formal methods to enable more secure vehicles: DARPA’s HACMS program (KF), p. 1.
AIIDEAIIDE-2014-Abou-ZleikhaS #authoring #design #matrix #named
PaTux: An Authoring Tool for Level Design through Pattern Customisation Using Non-Negative Matrix Factorization (MAZ, NS).
AIIDEAIIDE-2014-CernyBBA #constraints #exclamation #simulation
Spice It Up! Enriching Open World NPC Simulation Using Constraint Satisfaction (MC0, CB, RB, MA).
AIIDEAIIDE-2014-SnodgrassO #approach #generative #markov
A Hierarchical Approach to Generating Maps Using Markov Chains (SS, SO).
AIIDEAIIDE-2014-ZhaoS #behaviour #game studies #scheduling
Using Cyclic Scheduling to Generate Believable Behavior in Games (RZ, DS).
CHI-PLAYCHI-PLAY-2014-BahamonLWGLY #game studies #generative
IC-CRIME snapshots: training crime scene photographers using procedural content generation in games (JCB, ML, PW, RG, KL, RMY), pp. 403–404.
CHI-PLAYCHI-PLAY-2014-GaoGMS #behaviour #game studies
Decreasing sedentary behaviours in pre-adolescents using casual exergames at school (YG, KMG, RLM, KGS), pp. 97–106.
CHI-PLAYCHI-PLAY-2014-GerlingB #game studies
Last tank rolling: exploring shared motion-based play to empower persons using wheelchairs (KMG, LB), pp. 415–416.
CHI-PLAYCHI-PLAY-2014-GoldmanLZ #comprehension #game studies #video
Using video games to facilitate understanding of attention deficit hyperactivity disorder: a feasibility study (TAG, FJL, JZ), pp. 115–120.
CHI-PLAYCHI-PLAY-2014-MoranMG #game studies
IRC quest: using the commons dilemma to support a single-screen game for hundreds of players (DJM, CM, TCNG), pp. 359–362.
CHI-PLAYCHI-PLAY-2014-Richards #game studies
Using an invisible coach to help players achieve fitness goals in exergames while retaining immersion (CR), pp. 299–302.
CHI-PLAYCHI-PLAY-2014-SajjadiGTT #artificial reality #collaboration #game studies
Maze commander: a collaborative asynchronous game using the oculus rift & the sifteo cubes (PS, EOCG, ST, ODT), pp. 227–236.
CHI-PLAYCHI-PLAY-2014-SheininG #contest #game studies
Jelly polo: increasing richness and competition in sports games using small-scale exertion (MS, CG), pp. 367–370.
CHI-PLAYCHI-PLAY-2014-SmithJ #game studies #quote
“Toru”: a game that reverses the wisdom of age using mosquito sound (JS, KJ), pp. 375–378.
CHI-PLAYCHI-PLAY-2014-Wood #game studies #lens #physics
Using play as a lens to bridge the physical with the digital (GW), pp. 307–310.
CoGCIG-2014-BauckhageSDTH #behaviour #clustering #game studies #heatmap
Beyond heatmaps: Spatio-temporal clustering using behavior-based partitioning of game levels (CB, RS, AD, CT, FH), pp. 1–8.
CoGCIG-2014-KimYK #geometry #graph #monte carlo #representation
Solving Geometry Friends using Monte-Carlo Tree Search with directed graph representation (HTK, DMY, KJK), pp. 1–2.
CoGCIG-2014-LabrancheSCB #automation #game studies #simulation
Using partial satisfaction planning to automatically select NPCs' goals and generate plans in a simulation game (SL, NS, SC, EB), pp. 1–8.
CoGCIG-2014-LanctotWPS #heuristic #monte carlo
Monte Carlo Tree Search with heuristic evaluations using implicit minimax backups (ML, MHMW, TP, NRS), pp. 1–8.
CoGCIG-2014-LeeceJ #game studies #markov #modelling #random
Opponent state modeling in RTS games with limited information using Markov random fields (MAL, AJ), pp. 1–7.
CoGCIG-2014-LimH #approach #automation #evaluation #game studies #generative
An approach to general videogame evaluation and automatic generation using a description language (CUL, DFH), pp. 1–8.
CoGCIG-2014-ParkK #game studies #learning
Learning to play fighting game using massive play data (HSP, KJK), pp. 1–2.
CoGCIG-2014-PenaVMLP #3d
Designer-driven 3D buildings generated using Variable Neighborhood Search (JMPS, JV, SM, AL, LP), pp. 1–8.
CoGCIG-2014-SanseloneSSPD #game studies #monte carlo
Constrained control of non-playing characters using Monte Carlo Tree Search (MS, SS, CS, DP, YD), pp. 1–8.
CoGCIG-2014-YamamotoMCT #algorithm #deduction #game studies #nearest neighbour
Deduction of fighting-game countermeasures using the k-nearest neighbor algorithm and a game simulator (KY, SM, CYC, RT), pp. 1–5.
DiGRADiGRA-2014-SchottMN #experience #game studies #what
Exploring the Cause of Game (Derived) Arousal: What biometric accounts of player experience revealed (GS, RM, LN).
FDGFDG-2014-BroeckhovenT #aspect-oriented #game studies #learning #specification
Specifying the pedagogical aspects of narrative-based digital learning games using annotations (FVB, ODT).
FDGFDG-2014-CanossaBN #design pattern #game studies #named
X-COM: UFO Defense vs. XCOM: Enemy Unknown - Using gameplay design patterns to understand game remakes (AC, SB, MJN).
FDGFDG-2014-GeishauserCN #prototype #simulation #social
A prototype using territories and an affordance tree for social simulation gameplay (TG, YGC, MJN).
FDGFDG-2014-SchutterA #design #game studies
Gradequest - Evaluating the impact of using game design techniques in an undergraduate course (BDS, VVA).
FDGFDG-2014-SnodgrassO #generative #markov
Experiments in map generation using Markov chains (SS, SO).
FDGFDG-2014-TomaiF #adaptation #behaviour #learning
Adapting in-game agent behavior by observation of players using learning behavior trees (ET, RF).
FDGFDG-2014-ZhaoS #architecture #behaviour #scheduling
Virtual character behavior architecture using cyclic scheduling (RZ, DS).
CoGVS-Games-2014-BugejaDSC #distributed
High-Fidelity Graphics for Dynamically Generated Environments Using Distributed Computing (KB, KD, SS, AC), pp. 1–8.
CoGVS-Games-2014-CassolaPFMACCM #artificial reality #multi #named
Online-Gym: Multiuser Virtual Gymnasium Using RINIONS and Multiple Kinect Devices (FC, HP, BF, PM0, SA, FC, FdC, LM), pp. 1–4.
CoGVS-Games-2014-NinausKFNW #learning
The Potential Use of Neurophysiological Signals for Learning Analytics (MN, SEK, EVCF, CN, GW), pp. 1–5.
GT-VMTGT-VMT-2014-WangBL #alloy #graph #model transformation #verification
Verification of Graph-based Model Transformations Using Alloy (XW, FB, YL).
CHICHI-2014-AferganPSJHBCJ #metric
Dynamic difficulty using brain metrics of workload (DA, EMP, ETS, AJ, SWH, ETB, RC, RJKJ), pp. 3797–3806.
CHICHI-2014-BalataCM #2d #on the
On the selection of 2D objects using external labeling (JB, LC, ZM), pp. 2255–2258.
CHICHI-2014-DancuFF #navigation
Smart flashlight: map navigation using a bike-mounted projector (AD, ZF, MF), pp. 3627–3630.
CHICHI-2014-FeinbergCB #database #design #interactive
Always somewhere, never there: using critical design to understand database interactions (MF, DC, JB), pp. 1941–1950.
CHICHI-2014-FritzHMZ #case study #persuasion #process
Persuasive technology in the real world: a study of long-term use of activity sensing devices for fitness (TF, EMH, GCM, TZ), pp. 487–496.
CHICHI-2014-GerlingMBMO #game studies #people #persuasion #towards
The effects of embodied persuasive games on player attitudes toward people using wheelchairs (KMG, RLM, MVB, MM, RO), pp. 3413–3422.
CHICHI-2014-GoelLAPBHB #interactive #multi #named
SurfaceLink: using inertial and acoustic sensing to enable multi-device interaction on a surface (MG, BL, MTIA, SP, GB, SH, BB), pp. 1387–1396.
CHICHI-2014-HachisuF #feedback #interactive #interface #named
VacuumTouch: attractive force feedback interface for haptic interactive surface using air suction (TH, MF), pp. 411–420.
CHICHI-2014-HarbachHWS #communication #privacy #security
Using personal examples to improve risk communication for security & privacy decisions (MH, MH, SW, MS), pp. 2647–2656.
CHICHI-2014-HarpsteadMAM #design #education #game studies
Using extracted features to inform alignment-driven design ideas in an educational game (EH, CJM, VA, BAM), pp. 3329–3338.
CHICHI-2014-HayashiMH #gesture #identification
Wave to me: user identification using body lengths and natural gestures (EH, MM, JIH), pp. 3453–3462.
CHICHI-2014-HeoGL
Expanding touch input vocabulary by using consecutive distant taps (SH, JG, GL), pp. 2597–2606.
CHICHI-2014-HongA #modelling #performance #predict #recommendation #user interface
Novice use of a predictive human performance modeling tool to produce UI recommendations (KWH, RSA), pp. 2251–2254.
CHICHI-2014-HuangTTTYCHC #named
TouchSense: expanding touchscreen input vocabulary using different areas of users’ finger pads (DYH, MCT, YCT, MLT, YTY, LWC, YPH, MYC), pp. 189–192.
CHICHI-2014-HuangYWZLMLZS #named
FOCUS: enhancing children’s engagement in reading by using contextual BCI training sessions (JH, CY, YW, YZ, SL, CM, JL, LZ, YS), pp. 1905–1908.
CHICHI-2014-KihmGKM #interactive #power management #symmetry
Using asymmetric cores to reduce power consumption for interactive devices with bi-stable displays (JK, FG, JK, RM), pp. 1059–1062.
CHICHI-2014-LaseckiWFB #dependence
Finding dependencies between actions using the crowd (WSL, LW, GF, JPB), pp. 3095–3098.
CHICHI-2014-LiR #online
Using annotations in online group chats (NL, MBR), pp. 863–866.
CHICHI-2014-LuFL #gesture
Gesture script: recognizing gestures and their structure using rendering scripts and interactively trained parts (HL, JF, YL), pp. 1685–1694.
CHICHI-2014-MarananASPSB #design #modelling
Designing for movement: evaluating computational models using LMA effort qualities (DSM, SFA, TS, PP, PS, LB), pp. 991–1000.
CHICHI-2014-MorrisSGK #named #smarttech
RecoFit: using a wearable sensor to find, recognize, and count repetitive exercises (DM, TSS, AG, IK), pp. 3225–3234.
CHICHI-2014-MottW #lens
Beating the bubble: using kinematic triggering in the bubble lens for acquiring small, dense targets (MEM, JOW), pp. 733–742.
CHICHI-2014-NielsenH #case study
Personas is applicable: a study on the use of personas in Denmark (LN, KSH), pp. 1665–1674.
CHICHI-2014-PasqualW #predict
Mouse pointing endpoint prediction using kinematic template matching (PTP, JOW), pp. 743–752.
CHICHI-2014-PedersenSH #scalability
Is my phone alive?: a large-scale study of shape change in handheld devices using videos (EWP, SS, KH), pp. 2579–2588.
CHICHI-2014-PikeMPSW #protocol
Measuring the effect of think aloud protocols on workload using fNIRS (MFP, HAM, MP, SCS, MLW), pp. 3807–3816.
CHICHI-2014-ProcykNPTJ #chat #distance #mobile #streaming #video
Exploring video streaming in public settings: shared geocaching over distance using mobile video chat (JP, CN, CP, AT, TKJ), pp. 2163–2172.
CHICHI-2014-PuciharCA #visual notation
The use of surrounding visual context in handheld AR: device vs. user perspective rendering (KCP, PC, JA), pp. 197–206.
CHICHI-2014-SchildLM #3d #behaviour #design #game studies #video
Altering gameplay behavior using stereoscopic 3D vision-based video game design (JS, JJLJ, MM), pp. 207–216.
CHICHI-2014-SchwarzXMHH #classification #probability
Probabilistic palm rejection using spatiotemporal touch features and iterative classification (JS, RX, JM, SEH, CH), pp. 2009–2012.
CHICHI-2014-SerranoEI
Exploring the use of hand-to-face input for interacting with head-worn displays (MS, BME, PPI), pp. 3181–3190.
CHICHI-2014-Smith-ClarkeMC #communication #mobile #network
Poverty on the cheap: estimating poverty maps using aggregated mobile communication networks (CSC, AJM, LC), pp. 511–520.
CHICHI-2014-SoloveyZPRM #performance
Classifying driver workload using physiological and driving performance data: two field studies (ETS, MZ, EAGP, BR, BM), pp. 4057–4066.
CHICHI-2014-SuhPHK #design #evaluation #twitter
@BabySteps: design and evaluation of a system for using twitter for tracking children’s developmental milestones (HS, JRP, AH, JAK), pp. 2279–2288.
CHICHI-2014-SunDLLG #case study
Being senior and ICT: a study of seniors using ICT in China (YS, XD, SL, TL, NG), pp. 3933–3942.
CHICHI-2014-TanSLC #collaboration #visual notation
Investigating the effects of using biofeedback as visual stress indicator during video-mediated collaboration (CSST, JS, KL, KC), pp. 71–80.
CHICHI-2014-UzorB #game studies
Investigating the long-term use of exergames in the home with elderly fallers (SU, LB), pp. 2813–2822.
CHICHI-2014-WangL #communication #gesture #similarity
Kinect-taped communication: using motion sensing to study gesture use and similarity in face-to-face and computer-mediated brainstorming (HCW, CTL), pp. 3205–3214.
CHICHI-2014-WeiMZ #social
Food messaging: using edible medium for social messaging (JW, XM, SZ), pp. 2873–2882.
CSCWCSCW-2014-CastilloEPS #lifecycle #online #social #social media
Characterizing the life cycle of online news stories using social media reactions (CC, MEH, JP, MS), pp. 211–223.
CSCWCSCW-2014-LiuJPP #feedback #visual notation
Supporting task resumption using visual feedback (YL, YJ, WP, MSP), pp. 767–777.
CSCWCSCW-2014-NakazatoYSNTH #realtime #video
Smart Face: enhancing creativity during video conferences using real-time facial deformation (NN, SY, SS, TN, TT, MH), pp. 75–83.
CSCWCSCW-2014-XuHB #design #feedback #generative #named #visual notation
Voyant: generating structured feedback on visual designs using a crowd of non-experts (AX, SWH, BPB), pp. 1433–1444.
CSCWCSCW-2014-YueHH #collaboration #modelling #process #web
Modeling search processes using hidden states in collaborative exploratory web search (ZY, SH, DH), pp. 820–830.
HCIDHM-2014-DuWZHM #evolution #image
Human Skeleton Extraction of Depth Images Using the Polygon Evolution (HD, JW, XxZ, YH, LM), pp. 15–23.
HCIDHM-2014-Kull
Using the Critical Path Method in Analyzing the Interdependencies of Critical Services — Feasibility Study (AK), pp. 620–629.
HCIDHM-2014-Luo #artificial reality #case study #metric #re-engineering
Study on Three Dimensions Body Reconstruction and Measurement by Using Kinect (QL), pp. 35–42.
HCIDHM-2014-MamessierDO #artificial reality #assessment #online
Calibration of Online Situation Awareness Assessment Systems Using Virtual Reality (SM, DD, MO), pp. 124–135.
HCIDHM-2014-RasoolSPK #image
Virtual Knee Arthroscopy Using Haptic Devices and Real Surgical Images (SR, AS, VP, FK), pp. 436–447.
HCIDHM-2014-SantosST #information management #ontology #semantics #web
Using Ontologies and Semantic Web Technology on a Clinical Pedigree Information System (JMS, BSS, LT), pp. 448–459.
HCIDHM-2014-YoganathanK
ENT Disease Diagnosis Using an Expert System (DY, SK), pp. 472–483.
HCIDUXU-DI-2014-BarrosSF
Use of Immersive Reality and Haptic Devices in Rehabilitation after Cerebral Vascular Accident: Clinical Perspectives and Neuro-Image Evidence (HOB, MMS, ELRF), pp. 501–508.
HCIDUXU-DI-2014-EschrichKKHG #mobile
Controlling Light Environments Using Segmented Light Sources and Mobile Devices (BE, DK, KK, JH, RG), pp. 533–540.
HCIDUXU-DI-2014-SchusterHBRJ #experience #how
Diving in? How Users Experience Virtual Environments Using the Virtual Theatre (KS, MH, UB, AR, SJ), pp. 636–646.
HCIDUXU-DP-2014-BarrosSF14a #analysis #artificial reality #evaluation
Ergonomic Evaluation of Manual Force Levels of the Elderly in the Handling of Products: An Analysis Using Virtual Reality (RQB, MMS, MGF), pp. 124–132.
HCIDUXU-DP-2014-ItoHN #design #interface #social
Throwing a Smile: Using Smile Icons to Design Social Interfaces (KI, SH, SN), pp. 297–307.
HCIDUXU-DP-2014-SilvaPS #analysis #concept
Brands Analysis Using Informational Ergonomics Concepts: A Proposal (JCRPdS, LCP, JCPdS), pp. 90–101.
HCIDUXU-ELAS-2014-Chunpir0B #comprehension
Using Soft Systems Methodology (SSM) in Understanding Current User-Support Scenario in the Climate Science Domain of Cyber-Infrastructures (HIC, TL, AAB), pp. 495–506.
HCIDUXU-ELAS-2014-GeabelJHABA #identification
Pilgrim Smart Identification Using RFID Technology (PSI) (AG, KJ, RAH, RA, MB, MA), pp. 273–280.
HCIDUXU-ELAS-2014-KamiyaKASNMF #design
Timeaxis Design of a Service System Growing Values of Mobility Using the M-V Model (KK, AK, JA, KS, HN, YM, SF), pp. 281–292.
HCIDUXU-ELAS-2014-MontAlvao #health #overview
Health Care Professionals vs Other Professionals: Do They Have Different Perceptions about Health Care Waste and Dangerous Products Pictograms? Some Findings Using a Digital Device in Field Survey (CRM), pp. 83–90.
HCIDUXU-ELAS-2014-VilarDRNV #artificial reality #case study
A Pilot Study Using Virtual Reality to Investigate the Effects of Emergency Egress Signs Competing with Environmental Variables on Route Choices (EV, ED, FR, PN, EV), pp. 369–377.
HCIDUXU-TMT-2014-HeimgartnerS #agile #design #human-computer
Using Agile Methods in Intercultural HCI Design Projects (RH, AS), pp. 123–129.
HCIDUXU-TMT-2014-HeimgartnerSH #agile #usability
Enhancing Usability Engineering in Rural Areas Using Agile Methods (RH, AS, BH), pp. 445–452.
HCIDUXU-TMT-2014-WetzlingerAD #effectiveness #experience #performance #usability #user interface
Comparing Effectiveness, Efficiency, Ease of Use, Usability and User Experience When Using Tablets and Laptops (WW, AA, MD), pp. 402–412.
HCIHCI-AIMT-2014-BoulabiarCP14a #3d #artificial reality #gesture #recognition
The Issues of 3D Hand Gesture and Posture Recognition Using the Kinect (MIB, GC, FP), pp. 205–214.
HCIHCI-AIMT-2014-ChakravartyC #artificial reality #identification
Frontal-Standing Pose Based Person Identification Using Kinect (KC, TC), pp. 215–223.
HCIHCI-AIMT-2014-KuribaraMOST #named
HandyScope: A Remote Control Technique Using Circular Widget on Tabletops (TK, YM, KO, BS, JT), pp. 69–80.
HCIHCI-AIMT-2014-Man #hardware #video
Analysing Emotional Video Using Consumer EEG Hardware (JdM), pp. 729–738.
HCIHCI-AIMT-2014-NiLF #interactive
Hand-Object Interaction: From Grasping to Using (LN, YL, XF), pp. 113–120.
HCIHCI-AIMT-2014-ReddyC #artificial reality #process #recognition
Human Activity Recognition from Kinect Captured Data Using Stick Model (VRR, TC), pp. 305–315.
HCIHCI-AIMT-2014-RoyC #artificial reality #detection #invariant #markov
View-Invariant Human Detection from RGB-D Data of Kinect Using Continuous Hidden Markov Model (SR, TC), pp. 325–336.
HCIHCI-AIMT-2014-TsurudaHYI #mobile
Emotion Transmission System Using a Cellular Phone-Type Teleoperated Robot with a Mobile Projector (YT, MH, HY, YI), pp. 707–714.
HCIHCI-AIMT-2014-VaidyanathanR #case study #comparative #gesture #interactive
“Will Use It, Because I Want to Look Cool” A Comparative Study of Simple Computer Interactions Using Touchscreen and In-Air Hand Gestures (VV, DR), pp. 170–181.
HCIHCI-AS-2014-DiasDH #fuzzy #interactive #modelling #quality
Exploring B-Learning Scenarios Using Fuzzy Logic-Based Modeling of Users’ LMS Quality of Interaction in Ergonomics and Psychomotor Rehabilitation Academic Courses (SBD, JAD, LJH), pp. 233–243.
HCIHCI-AS-2014-DotencoGG #smarttech
Smartphone Input Using Its Integrated Projector and Built-In Camera (SD, TG, FG), pp. 124–133.
HCIHCI-AS-2014-KadomuraITRS #named #visualisation
AwareCycle: Application for Sports Visualization Using an Afterimage Display Attached to the Wheel of a Bicycle (AK, YI, KT, JR, IS), pp. 256–264.
HCIHCI-AS-2014-LeeYJ #predict
Data Preloading Technique using Intention Prediction (SL, JY, DYJ), pp. 32–41.
HCIHCI-AS-2014-OgataII #smarttech
Sweat Sensing Technique for Wearable Device Using Infrared Transparency (MO, MI, MI), pp. 323–331.
HCIHCI-TMT-2014-BrownTBKLMCEGA #design
Using Cultural Probes to Inform the Design of Assistive Technologies (MAB, AT, SB, TK, GL, JLM, TC, ME, SG, UA), pp. 35–46.
HCIHCI-TMT-2014-ColetiMN #evaluation #named #recognition #speech #usability
ErgoSV: An Environment to Support Usability Evaluation Using Face and Speech Recognition (TAC, MM, FdLdSN), pp. 554–564.
HCIHCI-TMT-2014-HankiewiczB #performance #quality #source code #word
Efficiency in Performing Basic Tasks Using Word Processing Programs by the Elderly as a Measure of the Ergonomic Quality of Software (KH, MB), pp. 481–488.
HCIHCI-TMT-2014-HenschenLSZL #design #documentation #mvc #user interface
Intelligent Document User Interface Design Using MVC and UIML (LJH, NL, YS, YZ, JCL), pp. 423–432.
HCIHCI-TMT-2014-OrtegaLHBRA #formal method #modelling #multi #named #petri net
PeNTa: Formal Modeling for Multi-touch Systems Using Petri Net (FRO, SL, FH, AB, NR, MA), pp. 361–372.
HCIHCI-TMT-2014-TiefenbacherBR #architecture #composition #evaluation #industrial #interface
Evaluation of Industrial Touch Interfaces Using a Modular Software Architecture (PT, FB, GR), pp. 589–600.
HCIHIMI-AS-2014-AlkhateebHH #comprehension
The Effects of Using Kit-Build Method to Support Reading Comprehension of EFL (MA, YH, TH), pp. 3–11.
HCIHIMI-AS-2014-IizukaG #mobile
Basic Study on Personal Space while Using Mobile Devices in Public (SI, KG), pp. 404–412.
HCIHIMI-AS-2014-MakiY #3d #image #multi
3D CG Integral Photography Artwork Using Glittering Effects in the Post-processing of Multi-viewpoint Rendered Images (NM, KY), pp. 546–554.
HCIHIMI-AS-2014-TanakaTH #development #education
Development of Teaching Material Volume Calculations Using a Wooden Puzzle (TT, MT, IH), pp. 109–117.
HCIHIMI-AS-2014-TogawaK #collaboration #framework #smarttech
Private Cloud Collaboration Framework for e-Learning Environment for Disaster Recovery Using Smartphone Alert Notification (ST, KK), pp. 118–126.
HCIHIMI-DE-2014-AlghamdiT #image #mining #multimodal #retrieval #semantics #towards
Towards Semantic Image Retrieval Using Multimodal Fusion with Association Rules Mining (RAA, MT), pp. 407–418.
HCIHIMI-DE-2014-HottaOM #user interface
Liquid Tangible User Interface: Using Liquid in TUI (MH, MO, HM), pp. 167–176.
HCIHIMI-DE-2014-JungAK #interface #web
A Map-Based Web Search Interface Using Point of Interest Aggregation (KJ, SCA, HK), pp. 342–351.
HCIHIMI-DE-2014-KatoM #deployment #modelling #quality
Quality Function Deployment Using Improved Interpretive Structural Modeling (TK, YM), pp. 352–363.
HCIHIMI-DE-2014-KhodaskarL #image #retrieval #semantics
Content Based Image Retrieval Using Quantitative Semantic Features (AK, SL), pp. 439–448.
HCIHIMI-DE-2014-SakaguchiIH #development #performance
Development of High-Speed Thermal Display Using Water Flow (MS, KI, KH), pp. 233–240.
HCIHIMI-DE-2014-SakuraiKNTH #pseudo
Evoking Emotions in a Story Using Tactile Sensations as Pseudo-body Responses with Contextual Cues (SS, TK, TN, TT, MH), pp. 241–250.
HCIHIMI-DE-2014-SugayaNT #clustering #recognition
Enhancement of Accuracy of Hand Shape Recognition Using Color Calibration by Clustering Scheme and Majority Voting Method (TS, HN, HT), pp. 251–260.
HCIHIMI-DE-2014-TakahashiA #comparison #comprehension #difference #mining
User Needs Search Using the Text Mining — From Commodity Comparison, Understanding the Difference of Users Awareness (YT, YA), pp. 461–467.
HCIHIMI-DE-2014-TeixeiraSFSS #prototype #requirements #tool support
Requirements Engineering Using Mockups and Prototyping Tools: Developing a Healthcare Web-Application (LT, VS, CF, JS, BSS), pp. 652–663.
HCILCT-NLE-2014-NicolaouC
Blogging Revisited: The Use of Blogs in ESAP Courses (AN, EKC), pp. 95–106.
HCILCT-NLE-2014-OrehovackiBJ #education #quality #web
Exploring the Validity of an Instrument to Measure the Perceived Quality in Use of Web 2.0 Applications with Educational Potential (TO, SB, MJ), pp. 192–203.
HCILCT-TRE-2014-HafnerHO #artificial reality #physics
Experiencing Physical and Technical Phenomena in Schools Using Virtual Reality Driving Simulator (PH, VH, JO), pp. 50–61.
HCILCT-TRE-2014-HiramatsuIFS #development #learning
Development of the Learning System for Outdoor Study Using Zeigarnik Effect (YH, AI, MF, FS), pp. 127–137.
HCILCT-TRE-2014-SofticVMWE #research
Finding and Exploring Commonalities between Researchers Using the ResXplorer (SS, LDV, EM, RVdW, ME), pp. 486–494.
HCILCT-TRE-2014-TzanavariMCP #experience #performance #user interface
User Experience Observations on Factors That Affect Performance in a Road-Crossing Training Application for Children Using the CAVE (AT, SM, CGC, CP), pp. 91–101.
HCISCSM-2014-Abascal-MenaLZGLM #crowdsourcing #named
Worker-Community: Using Crowdsourcing to Link Informal Workers with Potential Clients (RAM, ÉLO, JSZH, BEGT, GLM, HMF), pp. 287–297.
HCISCSM-2014-AbdallaY #network #online #overview #process #social
A Review of Using Online Social Networks for Investigative Activities (AA, SYY), pp. 3–12.
HCISCSM-2014-Ahangama #detection #realtime #social #social media #twitter
Use of Twitter Stream Data for Trend Detection of Various Social Media Sites in Real Time (SA), pp. 151–159.
HCISCSM-2014-HuangG #empirical #health #network #social
Exploring Health Care Professionals’ Attitudes of Using Social Networking Sites for Health Care: An Empirical Study (ZH, NG), pp. 365–372.
HCISCSM-2014-MendesFFC #analysis #classification #how #social
How Do Users Express Their Emotions Regarding the Social System in Use? A Classification of Their Postings by Using the Emotional Analysis of Norman (MSM, EF, VF, MFdC), pp. 229–241.
HCISCSM-2014-OtakeSOSUS #gamification #motivation
A Proposal of a Support System for Motivation Improvement Using Gamification (KO, RS, MO, YS, TU, AS), pp. 571–580.
HCISCSM-2014-PensasVGKKCV #communication #network #social
Using Ambient Communication and Social Networking Technologies to Reduce Loneliness of Elders (HP, AMV, MG, TK, SK, SC, JV), pp. 91–102.
HCISCSM-2014-RayaRRP #adaptation #game studies
Using Serious Games to Train Adaptive Emotional Regulation Strategies (MAR, ARO, BR, EP), pp. 541–549.
HCISCSM-2014-SchaarVZELJ #motivation #network #social
Reasons for Using Social Networks Professionally — The Influence of User Diversity on Usage Motivation (AKS, ACV, MZ, DE, AKL, EMJ), pp. 385–396.
VISSOFTVISSOFT-2014-SchotsW #framework #visualisation
Using a Task-Oriented Framework to Characterize Visualization Approaches (MS, CMLW), pp. 70–74.
CAiSECAiSE-2014-CarvalhoAG #domain-specific language #ontology #semantics
Using Reference Domain Ontologies to Define the Real-World Semantics of Domain-Specific Languages (VAdC, JPAA, GG), pp. 488–502.
CAiSECAiSE-2014-PikaWFHLA #behaviour #framework
An Extensible Framework for Analysing Resource Behaviour Using Event Logs (AP, MTW, CJF, AHMtH, ML, WMPvdA), pp. 564–579.
CAiSECAiSE-2014-PolyvyanyyRH #modelling #performance #process #retrieval
Indexing and Efficient Instance-Based Retrieval of Process Models Using Untanglings (AP, MLR, AHMtH), pp. 439–456.
CAiSECAiSE-2014-Reinhartz-BergerIW #ontology #product line #semantics #variability
Analyzing Variability of Software Product Lines Using Semantic and Ontological Considerations (IRB, NI, YW), pp. 150–164.
CAiSECAiSE-2014-VergneS #community #markov #network #open source
Expert Finding Using Markov Networks in Open Source Communities (MV, AS), pp. 196–210.
ICEISICEIS-v1-2014-CoelhoAABB #network
Router Nodes Positioning for Wireless Networks Using Artificial Immune Systems (PHGC, JLMdA, JFMdA, LFdAB, AVdB), pp. 415–421.
ICEISICEIS-v1-2014-DominguezAERLE #data mining #fuzzy #logic #mining #roadmap
Advances in the Decision Making for Treatments of Chronic Patients Using Fuzzy Logic and Data Mining Techniques (MD, JA, JGE, IMR, JMLS, MJE), pp. 325–330.
ICEISICEIS-v1-2014-KleinSRF #formal method #integration #on the
On the Formalisation of an Application Integration Language Using Z Notation (MJK, SS, FRF, RZF), pp. 314–319.
ICEISICEIS-v1-2014-Malgorzata #algorithm #mobile #search-based
The Use of Genetic Algorithms in Mobile Applications (MPW), pp. 520–525.
ICEISICEIS-v1-2014-MamcenkoG #mobile #predict
Customer Churn Prediction in Mobile Operator Using Combined Model (JM, JG), pp. 233–240.
ICEISICEIS-v1-2014-PenaAMFF #algorithm #gpu #parallel
An Improved Parallel Algorithm Using GPU for Siting Observers on Terrain (GCP, MVAA, SVGM, WRF, CRF), pp. 367–375.
ICEISICEIS-v1-2014-Rios-AguilarLP #behaviour #information management #mobile #monitoring
Business Information System for the Control of Workforce Through Behaviour Monitoring Using Reactive and Terminal-based Mobile Location Technologies (SRA, FJLM, APS), pp. 30–38.
ICEISICEIS-v1-2014-SilvaNMFMM #algorithm #detection #distributed #performance #pipes and filters
Efficient and Distributed DBScan Algorithm Using MapReduce to Detect Density Areas on Traffic Data (TLCdS, ACAN, RPM, VAEdF, JAFdM, JCM), pp. 52–59.
ICEISICEIS-v2-2014-BarretoFSJ #formal method #petri net
A Straightforward Introduction to Formal Methods Using Coloured Petri Nets (FMB, JCJdF, MSS, SJ), pp. 145–152.
ICEISICEIS-v2-2014-BorattoC #clustering #collaboration #recommendation
Using Collaborative Filtering to Overcome the Curse of Dimensionality when Clustering Users in a Group Recommender System (LB, SC), pp. 564–572.
ICEISICEIS-v2-2014-FonsecaC #concept #reuse
Reuse of Service Concepts Based on Service Patterns (WRF, PLPC), pp. 290–297.
ICEISICEIS-v2-2014-GippMBPN #detection #semantics #similarity #visualisation
Web-based Demonstration of Semantic Similarity Detection Using Citation Pattern Visualization for a Cross Language Plagiarism Case (BG, NM, CB, JP, AN), pp. 677–683.
ICEISICEIS-v2-2014-HernandesTTF #analysis #mining #visualisation
Using Visualization and Text Mining to Improve Qualitative Analysis (EMH, ET, ADT, SCPFF), pp. 201–208.
ICEISICEIS-v2-2014-JulianoTS #detection #metric #object-oriented
Detection of Software Anomalies Using Object-oriented Metrics (RCJ, BANT, MSS), pp. 241–248.
ICEISICEIS-v2-2014-KaramtiTG #image #network #process #retrieval
Vectorization of Content-based Image Retrieval Process Using Neural Network (HK, MT, FG), pp. 435–439.
ICEISICEIS-v2-2014-MeloS #design #modelling #uml
Model-driven Structural Design of Software-intensive Systems Using SysML Blocks and UML Classes (MdSM, MSS), pp. 193–200.
ICEISICEIS-v2-2014-OtonBGGB #learning #metadata
Description of Accessible Learning Resources by Using Metadata (SO, CB, EG, AGC, RB), pp. 620–626.
ICEISICEIS-v2-2014-ThommazoRROHWF #traceability
Using Artificial Intelligence Techniques to Enhance Traceability Links (ADT, RR, TRdO, GO, EMH, VW, SCPFF), pp. 26–38.
ICEISICEIS-v2-2014-ZhengJL #hybrid #learning #taxonomy
Cross-Sensor Iris Matching using Patch-based Hybrid Dictionary Learning (BRZ, DYJ, YHL), pp. 169–174.
ICEISICEIS-v3-2014-GoncalvesSC #case study #diagrams #metric #process
Using Activity Diagrams and DEMO to Capture Relevant Measures in an Organizational Control — A Case Study on Remote Assistance Service (AG, PS, AC), pp. 303–310.
ICEISICEIS-v3-2014-NunoG #in the cloud #outsourcing
Methodology for Developing and Application Outsourcing in the Cloud Using SOA (AGN, CMG), pp. 419–426.
ICEISICEIS-v3-2014-RavasanRH #approach #framework #fuzzy #process
A Practical Framework for Business Process Management Suites Selection Using Fuzzy TOPSIS Approach (AZR, SR, HH), pp. 295–302.
ICEISICEIS-v3-2014-RibeiroS #case study #evaluation #usability
A Study on the Use of Personas as a Usability Evaluation Method (TR, PdS), pp. 168–175.
ICEISICEIS-v3-2014-ZacepinsBA
Administration of Government Subsidies Using Contactless Bank Cards (AZ, NB, IA), pp. 128–132.
CIKMCIKM-2014-AgrawalGKK #concept #graph #similarity
Similarity Search using Concept Graphs (RA, SG, AK, KK), pp. 719–728.
CIKMCIKM-2014-CarmelMPS #analysis #community
Improving Term Weighting for Community Question Answering Search Using Syntactic Analysis (DC, AM, YP, IS), pp. 351–360.
CIKMCIKM-2014-DavletovAC #predict
High Impact Academic Paper Prediction Using Temporal and Topological Features (FD, ASA, AC), pp. 491–498.
CIKMCIKM-2014-FangQHZ #composition #overview #ranking #sentiment #summary
Ranking Sentiment Explanations for Review Summarization Using Dual Decomposition (LF, QQ, MH, XZ), pp. 1931–1934.
CIKMCIKM-2014-HanWP #classification
Within-Network Classification Using Radius-Constrained Neighborhood Patterns (JH, JRW, JP), pp. 1539–1548.
CIKMCIKM-2014-HustonC #comparison #dependence #modelling #retrieval
A Comparison of Retrieval Models using Term Dependencies (SH, WBC), pp. 111–120.
CIKMCIKM-2014-LiuLK #classification #information management #performance
Using Local Information to Significantly Improve Classification Performance (WL, DL, RK), pp. 1947–1950.
CIKMCIKM-2014-NguyenTT #crowdsourcing #similarity
Using Crowdsourcing to Investigate Perception of Narrative Similarity (DN, DT, MT), pp. 321–330.
CIKMCIKM-2014-PfeifferNB #learning #network #probability
Active Exploration in Networks: Using Probabilistic Relationships for Learning and Inference (JJPI, JN, PNB), pp. 639–648.
CIKMCIKM-2014-RahmanH #network #strict
Sampling Triples from Restricted Networks using MCMC Strategy (MR, MAH), pp. 1519–1528.
CIKMCIKM-2014-UysalBSS #approximate #database #distance #multi #performance #scalability
Efficient Filter Approximation Using the Earth Mover’s Distance in Very Large Multimedia Databases with Feature Signatures (MSU, CB, JS, TS), pp. 979–988.
CIKMCIKM-2014-YangLLLH #automation #clustering #detection #multi #social
Automatic Social Circle Detection Using Multi-View Clustering (YY, CL, XL, BL, JH), pp. 1019–1028.
CIKMCIKM-2014-ZhuMHZC #social #social media #topic
Customized Organization of Social Media Contents using Focused Topic Hierarchy (XZ, ZM, YH, XZ, TSC), pp. 1509–1518.
ECIRECIR-2014-Aly #normalisation #parametricity
Score Normalization Using Logistic Regression with Expected Parameters (RA), pp. 579–584.
ECIRECIR-2014-GaoWO #comparison
Reducing Reliance on Relevance Judgments for System Comparison by Using Expectation-Maximization (NG, WW, DWO), pp. 1–12.
ECIRECIR-2014-KabaryS #gesture #query #retrieval #sketching #specification #video
Using Hand Gestures for Specifying Motion Queries in Sketch-Based Video Retrieval (IAK, HS), pp. 733–736.
ECIRECIR-2014-KapteinKVB #semantics #web
Needle Custom Search — Recall-Oriented Search on the Web Using Semantic Annotations (RK, GK, MAAHi'V, ELvdB), pp. 750–753.
ECIRECIR-2014-LefortierSRR #case study #video #web
Blending Vertical and Web Results — A Case Study Using Video Intent (DL, PS, FR, MdR), pp. 184–196.
ECIRECIR-2014-Lommatzsch #realtime #recommendation
Real-Time News Recommendation Using Context-Aware Ensembles (AL), pp. 51–62.
ECIRECIR-2014-PanemBGV #detection #realtime #topic #twitter
Entity Tracking in Real-Time Using Sub-topic Detection on Twitter (SP, RB, MG, VV), pp. 528–533.
ECIRECIR-2014-SchuthSWR #case study #optimisation
Optimizing Base Rankers Using Clicks — A Case Study Using BM25 (AS, FS, SW, MdR), pp. 75–87.
ECIRECIR-2014-YangPSS #case study #e-commerce #query #scalability
A Study of Query Term Deletion Using Large-Scale E-commerce Search Logs (BY, NP, GS, NS), pp. 235–246.
ICMLICML-c1-2014-LiuJL #approximate #kernel #performance
Efficient Approximation of Cross-Validation for Kernel Methods using Bouligand Influence Function (YL, SJ, SL), pp. 324–332.
ICMLICML-c2-2014-Busa-FeketeHS #elicitation #modelling #rank #statistics
Preference-Based Rank Elicitation using Statistical Models: The Case of Mallows (RBF, EH, BS), pp. 1071–1079.
ICMLICML-c2-2014-ChagantyL #modelling #visual notation
Estimating Latent-Variable Graphical Models using Moments and Likelihoods (ATC, PL), pp. 1872–1880.
ICMLICML-c2-2014-Chen0 #big data #learning #modelling #topic
Topic Modeling using Topics from Many Domains, Lifelong Learning and Big Data (ZC, BL), pp. 703–711.
ICMLICML-c2-2014-Cherian #nearest neighbour
Nearest Neighbors Using Compact Sparse Codes (AC), pp. 1053–1061.
ICMLICML-c2-2014-GalG #parallel #process
Pitfalls in the use of Parallel Inference for the Dirichlet Process (YG, ZG), pp. 208–216.
ICMLICML-c2-2014-JohanssonJDB #geometry #graph #kernel
Global graph kernels using geometric embeddings (FJ, VJ, DPD, CB), pp. 694–702.
ICMLICML-c2-2014-KnowlesGP #infinity #metric #normalisation #random
A reversible infinite HMM using normalised random measures (DAK, ZG, KP), pp. 1998–2006.
ICMLICML-c2-2014-SatoN #analysis #approximate #equation #probability #process
Approximation Analysis of Stochastic Gradient Langevin Dynamics by using Fokker-Planck Equation and Ito Process (IS, HN), pp. 982–990.
ICMLICML-c2-2014-SchwingHPU #algorithm #convergence #parallel
Globally Convergent Parallel MAP LP Relaxation Solver using the Frank-Wolfe Algorithm (AGS, TH, MP, RU), pp. 487–495.
ICMLICML-c2-2014-ShamirS0 #approximate #distributed #optimisation
Communication-Efficient Distributed Optimization using an Approximate Newton-type Method (OS, NS, TZ), pp. 1000–1008.
ICMLICML-c2-2014-TamarMX #approximate #robust #scalability
Scaling Up Robust MDPs using Function Approximation (AT, SM, HX), pp. 181–189.
ICPRICPR-2014-AlathariNB #segmentation
Femur Bone Segmentation Using a Pressure Analogy (TSA, MSN, MTB), pp. 972–977.
ICPRICPR-2014-AlemdarKNME #behaviour #modelling
A Unified Model for Human Behavior Modeling Using a Hierarchy with a Variable Number of States (HÖA, TvK, MEN, AM, CE), pp. 3804–3809.
ICPRICPR-2014-AlmogahedK #game studies #named
NEATER: Filtering of Over-sampled Data Using Non-cooperative Game Theory (BAA, IAK), pp. 1371–1376.
ICPRICPR-2014-AzizWH #graph #kernel
Graph Characterization Using Wave Kernel Trace (FA, RCW, ERH), pp. 3822–3827.
ICPRICPR-2014-BashbaghiGSB #multi
Watch-List Screening Using Ensembles Based on Multiple Face Representations (SB, EG, RS, GAB), pp. 4489–4494.
ICPRICPR-2014-BayramogluKEANKH #approach #detection #image #machine learning
Detection of Tumor Cell Spheroids from Co-cultures Using Phase Contrast Images and Machine Learning Approach (NB, MK, LE, MA, MN, JK, JH), pp. 3345–3350.
ICPRICPR-2014-BekhetA #video
Compact Signature-Based Compressed Video Matching Using Dominant Color Profiles (DCP) (SB, AA), pp. 3933–3938.
ICPRICPR-2014-BeraM #multi #realtime
Realtime Multilevel Crowd Tracking Using Reciprocal Velocity Obstacles (AB, DM), pp. 4164–4169.
ICPRICPR-2014-BicegoRFRG #behaviour
Behavioural Biometrics Using Electricity Load Profiles (MB, FR, AF, SDR, EG), pp. 1764–1769.
ICPRICPR-2014-BiswasZLMV #analysis #detection #image
Lesion Detection in Breast Ultrasound Images Using Tissue Transition Analysis (SB, FZ, XL, RM, VV), pp. 1185–1188.
ICPRICPR-2014-BogunKCR #interactive #recognition
Interaction Recognition Using Sparse Portraits (IB, HK, JC, ER), pp. 2531–2536.
ICPRICPR-2014-BorgiLEA14a #multi #recognition
Sparse Multi-regularized Shearlet-Network Using Convex Relaxation for Face Recognition (MAB, DL, ME, CBA), pp. 4636–4641.
ICPRICPR-2014-BrownFP #detection #self
Temporal Non-maximum Suppression for Pedestrian Detection Using Self-Calibration (LMGB, RSF, SP), pp. 2239–2244.
ICPRICPR-2014-BuiNK #graph #music
Staff Line Removal Using Line Adjacency Graph and Staff Line Skeleton for Camera-Based Printed Music Scores (HNB, ISN, SHK), pp. 2787–2789.
ICPRICPR-2014-BuiNLYK #detection #order #statistics
Boosted Stable Path for Staff-Line Detection Using Order Statistic Downscaling and Coarse-to-Fine Technique (HNB, ISN, GL, HJY, SHK), pp. 522–526.
ICPRICPR-2014-ByeonLB #2d #classification #network
Texture Classification Using 2D LSTM Networks (WB, ML, TMB), pp. 1144–1149.
ICPRICPR-2014-CaliskanA
Atmospheric Turbulence Mitigation Using Optical Flow (TC, NA), pp. 883–888.
ICPRICPR-2014-ChanK #geometry #identification #image
Using Leg Geometry to Align Androgenic Hair Patterns in Low Resolution Images for Criminal and Victim Identification (FKSC, AWKK), pp. 495–500.
ICPRICPR-2014-ChaudhariM #clustering #matrix #semistructured data #symmetry
Average Overlap for Clustering Incomplete Data Using Symmetric Non-negative Matrix Factorization (SC, MNM), pp. 1431–1436.
ICPRICPR-2014-ChenK #gesture #recognition
Using Appearance-Based Hand Features for Dynamic RGB-D Gesture Recognition (XC, MK), pp. 411–416.
ICPRICPR-2014-ChenLHLLH #detection
Vision-Based Road Bump Detection Using a Front-Mounted Car Camcorder (HTC, CYL, CCH, SYL, BSPL, CPH), pp. 4537–4542.
ICPRICPR-2014-ChenWLHI #image #robust #segmentation
Robust Text Line Segmentation for Historical Manuscript Images Using Color and Texture (KC, HW, ML, JH, RI), pp. 2978–2983.
ICPRICPR-2014-ChevallierCA #estimation #image #metric #orthogonal
Computing Histogram of Tensor Images Using Orthogonal Series Density Estimation and Riemannian Metrics (EC, AC, JA), pp. 900–905.
ICPRICPR-2014-ChironGM #behaviour #parametricity
Discovering Emergent Behaviors from Tracks Using Hierarchical Non-parametric Bayesian Methods (GC, PGK, MM), pp. 2185–2190.
ICPRICPR-2014-Climent-PerezMR #detection #multi
Multi-view Event Detection in Crowded Scenes Using Tracklet Plots (PCP, DNM, PR), pp. 4370–4375.
ICPRICPR-2014-DahlCB #image #multi #segmentation
Multiphase Image Segmentation Using the Deformable Simplicial Complex Method (VAD, ANC, JAB), pp. 1002–1007.
ICPRICPR-2014-DominguesMMSR #information management #recommendation #topic
Using Contextual Information from Topic Hierarchies to Improve Context-Aware Recommender Systems (MAD, MGM, RMM, CVS, SOR), pp. 3606–3611.
ICPRICPR-2014-DongPHLDJ #classification #network
Vehicle Type Classification Using Unsupervised Convolutional Neural Network (ZD, MP, YH, TL, YD, YJ), pp. 172–177.
ICPRICPR-2014-DuanHZCZ #image #segmentation
A Two-Stage Image Segmentation Method Using Euler’s Elastica Regularized Mumford-Shah Model (YD, WH, JZ, HC, TZ), pp. 118–123.
ICPRICPR-2014-DuCZ #aspect-oriented #identification
A Product Aspects Identification Method by Using Translation-Based Language Model (JD, WC, XZ), pp. 2790–2795.
ICPRICPR-2014-DuDA #modelling #topic
Signature Matching Using Supervised Topic Models (XD, DSD, WAA), pp. 327–332.
ICPRICPR-2014-DuHZWD #case study #classification #design #network #online #recognition
A Study of Designing Compact Classifiers Using Deep Neural Networks for Online Handwritten Chinese Character Recognition (JD, JSH, BZ, SW, LRD), pp. 2950–2955.
ICPRICPR-2014-ElmikatyS #detection #image #multi
Car Detection in High-Resolution Urban Scenes Using Multiple Image Descriptors (ME, TS), pp. 4299–4304.
ICPRICPR-2014-EvangelidisSH #recognition
Skeletal Quads: Human Action Recognition Using Joint Quadruples (GE, GS, RH), pp. 4513–4518.
ICPRICPR-2014-FahadTR #classification #clustering #process #recognition #smarttech
Activity Recognition in Smart Homes Using Clustering Based Classification (LGF, SFT, MR), pp. 1348–1353.
ICPRICPR-2014-GavriilidisT #classification #kernel #random
Random Walk Kernel Applications to Classification Using Support Vector Machines (VG, AT), pp. 3898–3903.
ICPRICPR-2014-GeXYS #image #synthesis
Image Completion Using Global Patch Matching and Optimal Seam Synthesis (SG, KX, RY, ZS), pp. 871–876.
ICPRICPR-2014-GhoraiC #algorithm #composition #higher-order #image
An Image Inpainting Algorithm Using Higher Order Singular Value Decomposition (MG, BC), pp. 2867–2872.
ICPRICPR-2014-GiordanoPS #estimation #kernel #modelling
Kernel Density Estimation Using Joint Spatial-Color-Depth Data for Background Modeling (DG, SP, CS), pp. 4388–4393.
ICPRICPR-2014-GognaSM #matrix
Matrix Recovery Using Split Bregman (AG, AS, AM), pp. 1031–1036.
ICPRICPR-2014-Gonzalez-CastroDC #adaptation #classification
Pixel Classification Using General Adaptive Neighborhood-Based Features (VGC, JD, VC), pp. 3750–3755.
ICPRICPR-2014-Gonzalez-SosaVFO #comparison #image #recognition
Comparison of Body Shape Descriptors for Biometric Recognition Using MMW Images (EGS, RVR, JF, JOG), pp. 124–129.
ICPRICPR-2014-GuptaBVS #on the
On Iris Spoofing Using Print Attack (PG, SB, MV, RS), pp. 1681–1686.
ICPRICPR-2014-HafemannOC #network #recognition
Forest Species Recognition Using Deep Convolutional Neural Networks (LGH, LSO, PRC), pp. 1103–1107.
ICPRICPR-2014-HaoXPSK #automation #semantics #topic
Automated Chinese Essay Scoring from Topic Perspective Using Regularized Latent Semantic Indexing (SH, YX, HP, KS, DK), pp. 3092–3097.
ICPRICPR-2014-HaqBBA #modelling #segmentation
Using Shape-Aware Models for Lumbar Spine Intervertebral Disc Segmentation (RH, DAB, RCB, MAA), pp. 3191–3196.
ICPRICPR-2014-HasnatAT #clustering #image
Unsupervised Clustering of Depth Images Using Watson Mixture Model (MAH, OA, AT), pp. 214–219.
ICPRICPR-2014-HeDY0PJ #multi #random #visual notation
Visual Tracking Using Multi-stage Random Simple Features (YH, ZD, MY, LC, MP, YJ), pp. 4104–4109.
ICPRICPR-2014-HuangZPZ #canonical #correlation #recognition #robust
Robust Facial Expression Recognition Using Revised Canonical Correlation (XH, GZ, MP, WZ), pp. 1734–1739.
ICPRICPR-2014-HusainDT #random
Recognizing Point Clouds Using Conditional Random Fields (FH, BD, CT), pp. 4257–4262.
ICPRICPR-2014-HuWSC #detection #framework #robust
Robust Head-Shoulder Detection Using a Two-Stage Cascade Framework (RH, RW, SS, XC), pp. 2796–2801.
ICPRICPR-2014-HuynhCM #3d #constraints #geometry #video
Aerial Implicit 3D Video Stabilization Using Epipolar Geometry Constraint (LH, JC, GGM), pp. 3487–3492.
ICPRICPR-2014-IoannidisCL #clustering #modelling #multi
Key-Frame Extraction Using Weighted Multi-view Convex Mixture Models and Spectral Clustering (AI, VC, AL), pp. 3463–3468.
ICPRICPR-2014-ItohIS #2d #image #linear
Two-Dimensional Global Image Registration Using Local Linear Property of Image Manifold (HI, AI, TS), pp. 3862–3867.
ICPRICPR-2014-JangLSK #automation #classification #multi #video
Automatic Video Genre Classification Using Multiple SVM Votes (WDJ, CL, JYS, CSK), pp. 2655–2660.
ICPRICPR-2014-JinIHS #approach
A New Approach of Arc Skeletonization for Tree-like Objects Using Minimum Cost Path (DJ, KSI, EAH, PKS), pp. 942–947.
ICPRICPR-2014-JoshiGG #automation #predict #visual notation
Automatic Prediction of Perceived Traits Using Visual Cues under Varied Situational Context (JJ, HG, RG), pp. 2855–2860.
ICPRICPR-2014-JudV
Using Object Probabilities in Deformable Model Fitting (CJ, TV), pp. 3310–3314.
ICPRICPR-2014-KacheleZMS #feature model #quality #recognition
Prosodic, Spectral and Voice Quality Feature Selection Using a Long-Term Stopping Criterion for Audio-Based Emotion Recognition (MK, DZ, SM, FS), pp. 803–808.
ICPRICPR-2014-KapsourasN #approach #recognition
Action Recognition in Motion Capture Data Using a Bag of Postures Approach (IK, NN), pp. 2649–2654.
ICPRICPR-2014-KarM #fuzzy
Extraction of Retinal Blood Vessel Using Curvelet Transform and Fuzzy C-Means (SSK, SPM), pp. 3392–3397.
ICPRICPR-2014-KeceliC #approach #multimodal
A Multimodal Approach for Recognizing Human Actions Using Depth Information (ASK, ABC), pp. 421–426.
ICPRICPR-2014-KimP14a #3d #interactive #physics
Sensor-Display Registration for 3D Physical User Interaction Using a Flat-Panel Display (JSK, JMP), pp. 1675–1680.
ICPRICPR-2014-KramarevZWL #categorisation #composition #image #representation
Object Categorization from Range Images Using a Hierarchical Compositional Representation (VK, SZ, JLW, AL), pp. 586–591.
ICPRICPR-2014-KuangOA #estimation
Revisiting Trifocal Tensor Estimation Using Lines (YK, MO, ), pp. 2419–2423.
ICPRICPR-2014-KumarA2 #stack
Non-frontal Camera Calibration Using Focal Stack Imagery (AK, NA), pp. 202–207.
ICPRICPR-2014-KumarK #adaptation #multimodal #recognition #security #set
Adaptive Security for Human Surveillance Using Multimodal Open Set Biometric Recognition (AK, AK), pp. 405–410.
ICPRICPR-2014-KurtekS #analysis #segmentation
Handwritten Text Segmentation Using Elastic Shape Analysis (SK, AS), pp. 2501–2506.
ICPRICPR-2014-LaiSTH #3d
3-D Gaze Tracking Using Pupil Contour Features (CCL, SWS, HRT, YPH), pp. 1162–1166.
ICPRICPR-2014-LandgrenOH #image #segmentation
A Measure of Septum Shape Using Shortest Path Segmentation in Echocardiographic Images of LVAD Patients (ML, NCO, AH), pp. 3398–3403.
ICPRICPR-2014-LeeSL #3d #invariant #recognition #self
View-Invariant 3D Action Recognition Using Spatiotemporal Self-Similarities from Depth Camera (ARL, HIS, SWL), pp. 501–505.
ICPRICPR-2014-LeNVOT #documentation #retrieval
Document Retrieval Based on Logo Spotting Using Key-Point Matching (VPL, NN, MV, JMO, CDT), pp. 3056–3061.
ICPRICPR-2014-LiCGW #hybrid #interactive #recognition
A Hybrid Method for Human Interaction Recognition Using Spatio-temporal Interest Points (NL, XC, HG, ZW), pp. 2513–2518.
ICPRICPR-2014-LinH #analysis
Crossroad Traffic Surveillance Using Superpixel Tracking and Vehicle Trajectory Analysis (DTL, CHH), pp. 2251–2256.
ICPRICPR-2014-LiRPV #modelling #topic
Regularizing Topic Discovery in EMRs with Side Information by Using Hierarchical Bayesian Models (CL, SR, DQP, SV), pp. 1307–1312.
ICPRICPR-2014-LuoZW #image #segmentation
Image Fusion Using Region Segmentation and Sigmoid Function (XL, ZZ, XW), pp. 1049–1054.
ICPRICPR-2014-LuYXYWP #recognition
Finger Vein Recognition Using Histogram of Competitive Gabor Responses (YL, SY, SJX, JCY, ZW, DSP), pp. 1758–1763.
ICPRICPR-2014-MaHXP #3d #approach #robust
A Lighting Robust Fitting Approach of 3D Morphable Model Using Spherical Harmonic Illumination (MM, XH, YX, SP), pp. 2101–2106.
ICPRICPR-2014-MatsuoSY #detection #image
Vehicle Driver Face Detection in Various Sunlight Environments Using Composed Face Images (HM, TS, NY), pp. 1687–1691.
ICPRICPR-2014-MittalKKK #recognition
Small Object Discovery and Recognition Using Actively Guided Robot (SM, MSK, SK, KMK), pp. 4334–4339.
ICPRICPR-2014-MiyanS #consistency #image
Finding Corresponding Patches in Texture Images Using Tensor Consistency Check (SBM, JS), pp. 4021–4026.
ICPRICPR-2014-MoeiniMF14b #2d #3d #image #invariant #re-engineering #recognition
Expression-Invariant Face Recognition via 3D Face Reconstruction Using Gabor Filter Bank from a 2D Single Image (AM, HM, KF), pp. 4708–4713.
ICPRICPR-2014-MoilanenZP #agile #analysis #difference
Spotting Rapid Facial Movements from Videos Using Appearance-Based Feature Difference Analysis (AM, GZ, MP), pp. 1722–1727.
ICPRICPR-2014-MolderCCH #automation #detection #reduction
Automatic Detection of Embryo Location in Medical Imaging Using Trigonometric Rotation for Noise Reduction (ALM, SC, NC, GH), pp. 3239–3244.
ICPRICPR-2014-MollerPB #analysis #quantifier
Quantification of Actin Structures Using Unsupervised Pattern Analysis Techniques (BM, EP, NB), pp. 3251–3256.
ICPRICPR-2014-MoriKNK #detection #video
Video Content Detection with Single Frame Level Accuracy Using Dynamic Thresholding Technique (MM, TK, HN, KK), pp. 2560–2565.
ICPRICPR-2014-MoyouIP #3d #estimation #performance #retrieval
LBO-Shape Densities: Efficient 3D Shape Retrieval Using Wavelet Density Estimation (MM, KEI, AMP), pp. 52–57.
ICPRICPR-2014-MuddamsettySTM #detection
Spatio-temporal Saliency Detection in Dynamic Scenes Using Local Binary Patterns (SMM, DS, AT, FM), pp. 2353–2358.
ICPRICPR-2014-NakashikaHTA #3d #recognition
3D-Object Recognition Based on LLC Using Depth Spatial Pyramid (TN, TH, TT, YA), pp. 4224–4228.
ICPRICPR-2014-NegrelPG #image #learning #metric #performance #reduction #retrieval
Efficient Metric Learning Based Dimension Reduction Using Sparse Projectors for Image Near Duplicate Retrieval (RN, DP, PHG), pp. 738–743.
ICPRICPR-2014-NguyenGVP #framework #parametricity #process #recognition
A Bayesian Nonparametric Framework for Activity Recognition Using Accelerometer Data (TN, SKG, SV, DQP), pp. 2017–2022.
ICPRICPR-2014-NguyenP #linear #multi
Tracking Using Multiple Linear Searches and Motion Direction Sampling (TN, TPP), pp. 2191–2196.
ICPRICPR-2014-NieJ #learning #linear
Feature Learning Using Bayesian Linear Regression Model (SN, QJ), pp. 1502–1507.
ICPRICPR-2014-NieKZ #learning #recognition
Periocular Recognition Using Unsupervised Convolutional RBM Feature Learning (LN, AK, SZ), pp. 399–404.
ICPRICPR-2014-Nilsson #polynomial
Elastic Net Regularized Logistic Regression Using Cubic Majorization (MN), pp. 3446–3451.
ICPRICPR-2014-NilssonAGF #detection
Pedestrian Detection Using Augmented Training Data (JN, PA, IYHG, JF), pp. 4548–4553.
ICPRICPR-2014-NishimuraOAN #image #modelling #speech #web
Selection of Unknown Objects Specified by Speech Using Models Constructed from Web Images (HN, YO, YA, MN), pp. 477–482.
ICPRICPR-2014-OhyamaYWK #recognition
Improving Accuracy of Printed Character Recognition Using Hexagonal Zoning of Directional Histogram Feature (WO, AY, TW, FK), pp. 2697–2702.
ICPRICPR-2014-OtteSZ #algorithm #named
ANTSAC: A Generic RANSAC Variant Using Principles of Ant Colony Algorithms (SO, US, AZ), pp. 3558–3563.
ICPRICPR-2014-PandaKC #graph #random #scalability #summary #video
Scalable Video Summarization Using Skeleton Graph and Random Walk (RP, SKK, ASC), pp. 3481–3486.
ICPRICPR-2014-PaudelDHV #2d #3d #locality
Localization of 2D Cameras in a Known Environment Using Direct 2D-3D Registration (DPP, CD, AH, PV), pp. 196–201.
ICPRICPR-2014-PerinaKB #array #classification #kernel
Expression Microarray Data Classification Using Counting Grids and Fisher Kernel (AP, MK, MB), pp. 1770–1775.
ICPRICPR-2014-QureshiHA #probability
A Probabilistic Model for the Optimal Configuration of Retinal Junctions Using Theoretically Proven Features (TAQ, AH, BAD), pp. 3304–3309.
ICPRICPR-2014-RaghavendraRYB #assessment #automation #empirical #matrix #quality #video
Automatic Face Quality Assessment from Video Using Gray Level Co-occurrence Matrix: An Empirical Study on Automatic Border Control System (RR, KBR, BY, CB), pp. 438–443.
ICPRICPR-2014-RavalTJ #classification #encoding #evaluation #fault #performance
Efficient Evaluation of SVM Classifiers Using Error Space Encoding (NR, RVT, CVJ), pp. 4411–4416.
ICPRICPR-2014-RazavianASC #smarttech
Estimating Attention in Exhibitions Using Wearable Cameras (ASR, OA, JS, SC), pp. 2691–2696.
ICPRICPR-2014-RenL #gender #recognition
Gender Recognition Using Complexity-Aware Local Features (HR, ZNL), pp. 2389–2394.
ICPRICPR-2014-RingLRE #assessment
A Two-Stage Regression Using Bioimpedance and Temperature for Hydration Assessment During Sports (MR, CL, MR, BE), pp. 4519–4524.
ICPRICPR-2014-RosaCJPFT #clustering #network #on the
On the Training of Artificial Neural Networks with Radial Basis Function Using Optimum-Path Forest Clustering (GHR, KAPC, LAPJ, JPP, AXF, JMRST), pp. 1472–1477.
ICPRICPR-2014-SaitoAFRSGC #learning
Active Semi-supervised Learning Using Optimum-Path Forest (PTMS, WPA, AXF, PJdR, CTNS, JFG, MHdC), pp. 3798–3803.
ICPRICPR-2014-SamantaC #classification
Indian Classical Dance Classification on Manifold Using Jensen-Bregman LogDet Divergence (SS, BC), pp. 4507–4512.
ICPRICPR-2014-SariE #analysis #detection #fault #independence
Texture Defect Detection Using Independent Vector Analysis in Wavelet Domain (LS, AE), pp. 1639–1644.
ICPRICPR-2014-SavakisRP #difference #gesture #learning
Gesture Control Using Active Difference Signatures and Sparse Learning (AES, RR, RWP), pp. 3969–3974.
ICPRICPR-2014-SaygiliMH #metric #similarity
Stereo Similarity Metric Fusion Using Stereo Confidence (GS, LvdM, EAH), pp. 2161–2166.
ICPRICPR-2014-SeckDT #3d #analysis #geometry
3D Facial Skin Texture Analysis Using Geometric Descriptors (AS, HD, BT), pp. 1126–1131.
ICPRICPR-2014-Shirakawa #multi #performance #similarity
Fast Similarity Search Using Multiple Binary Codes (SS), pp. 3714–3719.
ICPRICPR-2014-SlitiHBA #analysis #robust
A More Robust Mean Shift Tracker Using Joint Monogenic Signal Analysis and Color Histogram (OS, HH, FB, HA), pp. 2453–2458.
ICPRICPR-2014-SongLZC #adaptation #performance
Scale Adaptive Tracking Using Mean Shift and Efficient Feature Matching (YS, SL, JZ, HC), pp. 2233–2238.
ICPRICPR-2014-SuLTLT #recognition
Character Recognition in Natural Scenes Using Convolutional Co-occurrence HOG (BS, SL, ST, JHL, CLT), pp. 2926–2931.
ICPRICPR-2014-SunTL #online
Sparse Online Co-regularization Using Conjugate Functions (BS, MT, GL), pp. 3666–3671.
ICPRICPR-2014-TabiaV #3d #classification
3D Shape Classification Using Information Fusion (HT, NSV), pp. 297–302.
ICPRICPR-2014-TaniH #detection #robust
Robust Human Detection to Pose and Occlusion Using Bag-of-Words (YT, KH), pp. 4376–4381.
ICPRICPR-2014-TegenWHOJMNA #image #segmentation #semantics
Image Segmentation and Labeling Using Free-Form Semantic Annotation (AT, RW, LH, MO, FJ, DM, PN, ), pp. 2281–2286.
ICPRICPR-2014-TerissiPG #classification #random
Lip Reading Using Wavelet-Based Features and Random Forests Classification (LDT, MP, JCG), pp. 791–796.
ICPRICPR-2014-VuEIYY #image
Segmenting Reddish Lesions in Capsule Endoscopy Images Using a Gastrointestinal Color Space (HV, TE, YI, YY, YY), pp. 3263–3268.
ICPRICPR-2014-WangCH #hybrid #markov #multi #random #video
Wide Baseline Multi-view Video Matting Using a Hybrid Markov Random Field (TW, JPC, AH), pp. 136–141.
ICPRICPR-2014-WangGJ #learning
Learning with Hidden Information Using a Max-Margin Latent Variable Model (ZW, TG, QJ), pp. 1389–1394.
ICPRICPR-2014-WangS #automation #dataset #multi #segmentation
Automatic Multi-organ Segmentation in Non-enhanced CT Datasets Using Hierarchical Shape Priors (CW, ÖS), pp. 3327–3332.
ICPRICPR-2014-WangWJ14a #markov #modelling #recognition
Early Facial Expression Recognition Using Hidden Markov Models (JW, SW, QJ), pp. 4594–4599.
ICPRICPR-2014-WangYLZF #independence #recognition
Micro-expression Recognition Using Dynamic Textures on Tensor Independent Color Space (SW, WJY, XL, GZ, XF), pp. 4678–4683.
ICPRICPR-2014-WuMCXC #gesture #invariant #parametricity #recognition
View-Invariant Gesture Recognition Using Nonparametric Shape Descriptor (XW, XM, LC, YLX, AC), pp. 544–549.
ICPRICPR-2014-XiaoCJF #recognition
Position-Based Action Recognition Using High Dimension Index Tree (QX, JC, JJ, WF), pp. 4400–4405.
ICPRICPR-2014-XuS #learning #network
Bayesian Network Structure Learning Using Causality (ZX, SNS), pp. 3546–3551.
ICPRICPR-2014-YamadaM #approach #behaviour
Estimating Driver Awareness of Crossing Pedestrians While Turning Left Based on Vehicle Behavior Using Bayesian Approach (KY, TM), pp. 1898–1903.
ICPRICPR-2014-YamashitaW #classification
k-NN Classification of Handwritten Characters Using a New Distortion-Tolerant Matching Measure (YY, TW), pp. 262–267.
ICPRICPR-2014-YangD #identification #novel
Novel HHT-Based Features for Biometric Identification Using EEG Signals (SY, FD), pp. 1922–1927.
ICPRICPR-2014-YangTL #energy #image #recognition
Gait Recognition Using Flow Histogram Energy Image (YY, DT, GL), pp. 444–449.
ICPRICPR-2014-YingWMYZ #problem
The Perspective-3-Point Problem When Using a Planar Mirror (XY, GW, XM, SY, HZ), pp. 4033–4037.
ICPRICPR-2014-YuCK #distance #recognition #set
Pill Recognition Using Imprint Information by Two-Step Sampling Distance Sets (JY, ZC, SiK), pp. 3156–3161.
ICPRICPR-2014-YuGZ #3d #recognition
Face Recognition Using 3D Directional Corner Points (XY, YG, JZ), pp. 2802–2807.
ICPRICPR-2014-YuncuHB #automation #modelling #recognition #speech
Automatic Speech Emotion Recognition Using Auditory Models with Binary Decision Tree and SVM (EY, HH, CB), pp. 773–778.
ICPRICPR-2014-ZhangLWZ #image #modelling #multi #statistics
Statistical Modeling of Multi-modal Medical Image Fusion Method Using C-CHMM and M-PCNN (HZ, XL, XW, ZZ), pp. 1067–1072.
ICPRICPR-2014-ZhangT #recognition #word
Unconstrained Handwritten Word Recognition Based on Trigrams Using BLSTM (XZ, CLT), pp. 2914–2919.
ICPRICPR-2014-ZhangWGZZ #analysis #verification
Low Computation Face Verification Using Class Center Analysis (XZ, JW, YG, SZ, SZ), pp. 4543–4547.
ICPRICPR-2014-ZhangWL #video
Video Text Extraction Using the Fusion of Color Gradient and Log-Gabor Filter (ZZ, WW, KL), pp. 2938–2943.
KDDKDD-2014-GaddeAO #graph #learning
Active semi-supervised learning using sampling theory for graph signals (AG, AA, AO), pp. 492–501.
KDDKDD-2014-JinKSDGCPR #community #geometry #modelling #network #social
Modeling mass protest adoption in social network communities using geometric brownian motion (FJ, RPK, NS, ERD, SG, FC, BAP, NR), pp. 1660–1669.
KDDKDD-2014-QianHJPZ #approach #distance #learning #metric
Distance metric learning using dropout: a structured regularization approach (QQ, JH, RJ, JP, SZ), pp. 323–332.
KDDKDD-2014-RamakrishnanBMSKSWCVKKMZHCLHSTGKDAZFSFAGM #open source
“Beating the news” with EMBERS: forecasting civil unrest using open source indicators (NR, PB, SM, NS, RPK, PS, WW, JC, AV, GK, CJK, AM, LZ, TH, FC, CTL, BH, AS, KT, LG, GK, AD, CA, IZ, JF, KMS, YF, JA, DG, DM), pp. 1799–1808.
KDDKDD-2014-SintosT #network #social
Using strong triadic closure to characterize ties in social networks (SS, PT), pp. 1466–1475.
KDDKDD-2014-SrikantA #machine learning #programming
A system to grade computer programming skills using machine learning (SS, VA), pp. 1887–1896.
KDDKDD-2014-TayebiEGB #embedded #learning #predict
Spatially embedded co-offence prediction using supervised learning (MAT, ME, UG, PLB), pp. 1789–1798.
KDDKDD-2014-WangZQZ
Improving the modified nyström method using spectral shifting (SW, CZ, HQ, ZZ), pp. 611–620.
KDDKDD-2014-WangZX #estimation
Travel time estimation of a path using sparse trajectories (YW, YZ, YX), pp. 25–34.
KDDKDD-2014-WuZTH0 #crowdsourcing #modelling #personalisation #topic #video
Crowdsourced time-sync video tagging using temporal and personalized topic modeling (BW, EZ, BT, AH, QY), pp. 721–730.
KDDKDD-2014-Yoshida #adaptation #algorithm #linear #sketching
Almost linear-time algorithms for adaptive betweenness centrality using hypergraph sketches (YY), pp. 1416–1425.
KDIRKDIR-2014-AbdallahI #classification #modelling #n-gram #web
URL-based Web Page Classification — A New Method for URL-based Web Page Classification Using n-Gram Language Models (TAA, BdlI), pp. 14–21.
KDIRKDIR-2014-AlahmadiJM #classification #concept #representation
Arabic Text Classification using Bag-of-Concepts Representation (AA, AJ, AEM), pp. 374–380.
KDIRKDIR-2014-BarcanteJDCCS #identification #mining
Identifying Drug Repositioning Targets using Text Mining (EB, MJ, FD, EC, OGC, FS), pp. 348–353.
KDIRKDIR-2014-BatistaCRF #ambiguity #wiki
Context-based Disambiguation using Wikipedia (HB, DC, RR, JF), pp. 549–553.
KDIRKDIR-2014-Bleiweiss #execution #machine learning
SoC Processor Discovery for Program Execution Matching Using Unsupervised Machine Learning (AB), pp. 192–201.
KDIRKDIR-2014-KudamaL #random #semantics
Semantic Annotation of UMLS using Conditional Random Fields (SK, RBL), pp. 335–341.
KDIRKDIR-2014-MorenoGV #data mining #mining #recognition #word
Violence Recognition in Spanish Words using Data Mining (AFM, SBGB, JGVR), pp. 210–216.
KDIRKDIR-2014-NagwanshiM #detection #semantics #sentiment
Sarcasm Detection using Sentiment and Semantic Features (PN, CEVM), pp. 418–424.
KDIRKDIR-2014-SatoNS #classification #kernel
A Simple Classification Method for Class Imbalanced Data using the Kernel Mean (YS, KN, AS), pp. 327–334.
KEODKEOD-2014-DogduKG #information management #ontology
Waste Management Information System — An Expert System Using Ontologies (ED, BK, UG), pp. 312–318.
KEODKEOD-2014-OlszewskaSM #design #ontology #owl #uml
Dynamic OWL Ontology Design Using UML and BPMN (JIO, RMS, TLM), pp. 436–444.
KEODKEOD-2014-TarakciC #recommendation
Using Hypergraph-based User Profile in a Recommendation System (HT, NKC), pp. 27–35.
KMISKMIS-2014-FrancoisMA #communication #design #email #problem #traceability
Discovering Problem-Solving Knowledge in Business Emails — Traceability in Software Design Using Computer Mediated Communication (RF, NM, HA), pp. 186–193.
KMISKMIS-2014-Grim-Yefsah #case study #information management #process #requirements
A First Step in Improving the Requirements Engineering Process by Using the Knowledge Management Perspective — Case Study from French Public Institute (MGY), pp. 280–288.
KRKR-2014-ClercqBSCN #game studies #programming #set
Using Answer Set Programming for Solving Boolean Games (SDC, KB, SS, MDC, AN).
KRKR-2014-Dyrkolbotn #how #set
How to Argue for Anything: Enforcing Arbitrary Sets of Labellings using AFs (SKD).
MLDMMLDM-2014-AbdullahiCM #approach #identification #novel
A Novel Approach for Identifying Banded Patterns in Zero-One Data Using Column and Row Banding Scores (FBA, FC, RM), pp. 58–72.
MLDMMLDM-2014-BugaychenkoZ #diagrams #learning #multi #pattern matching #pattern recognition #performance #recognition
Fast Pattern Recognition and Deep Learning Using Multi-Rooted Binary Decision Diagrams (DB, DZ), pp. 73–77.
MLDMMLDM-2014-JavedA #classification #dataset #network #social
Creation of Bi-lingual Social Network Dataset Using Classifiers (IJ, HA), pp. 523–533.
MLDMMLDM-2014-KhasnabishSDS #detection #learning #programming language #source code
Detecting Programming Language from Source Code Using Bayesian Learning Techniques (JNK, MS, JD, GS), pp. 513–522.
MLDMMLDM-2014-LarinSKKHC #classification #parametricity #representation
Parametric Representation of Objects in Color Space Using One-Class Classifiers (AL, OS, AK, SYK, SCH, BHC), pp. 300–314.
MLDMMLDM-2014-SandovalH #learning #network
Learning of Natural Trading Strategies on Foreign Exchange High-Frequency Market Data Using Dynamic Bayesian Networks (JS, GH), pp. 408–421.
MLDMMLDM-2014-SchraagenK #consistency #graph
Record Linkage Using Graph Consistency (MS, WAK), pp. 471–483.
RecSysRecSys-2014-BachrachFGKKNP #recommendation
Speeding up the Xbox recommender system using a euclidean transformation for inner-product spaces (YB, YF, RGB, LK, NK, NN, UP), pp. 257–264.
RecSysRecSys-2014-BhagatWIT #learning #matrix #recommendation
Recommending with an agenda: active learning of private attributes using matrix factorization (SB, UW, SI, NT), pp. 65–72.
RecSysRecSys-2014-LercheJ #feedback #personalisation #ranking
Using graded implicit feedback for bayesian personalized ranking (LL, DJ), pp. 353–356.
RecSysRecSys-2014-LiuGWB #power of
Improving the discriminative power of inferred content information using segmented virtual profile (HL, AG, TW, AB), pp. 97–104.
SEKESEKE-2014-ChenHQJ #performance #static analysis
Improving Static Analysis Performance Using Rule-Filtering Technique (DC, RH, BQ, SJ), pp. 19–24.
SEKESEKE-2014-GayedLB #case study #forensics #lightweight #ontology #process
Creating Proprietary Terms Using Lightweight Ontology: A Case Study on Acquisition Phase in a Cyber Forensic Process (TFG, HL, MB), pp. 76–81.
SEKESEKE-2014-GuimaraesSALC #alloy #consistency #verification
A Method for Verifying the Consistency of Business Rules Using Alloy (DG, EAS, AJA, PL, ALC), pp. 381–386.
SEKESEKE-2014-GuptaAWD #empirical #modelling #verification
Evaluating the Use of Model-Based Requirement Verification Method: An Empirical Study (MG, DA, GSW, HD), pp. 397–401.
SEKESEKE-2014-HartmannFNMKT #approach #modelling #reasoning #runtime
Reasoning at Runtime using time-distorted Contexts: A Models@run.time based Approach (TH, FF, GN, BM, JK, YLT), pp. 586–591.
SEKESEKE-2014-JiangCKZD #model transformation #source code #testing
Testing Model Transformation Programs using Metamorphic Testing (MJ, TYC, FCK, ZZ, ZD), pp. 94–99.
SEKESEKE-2014-KaurKF #low cost #mining #web
Using Web Mining to Support Low Cost Historical Vehicle Traffic Analytics (CK, DK, BHF), pp. 365–370.
SEKESEKE-2014-NetoASFM #architecture #behaviour #data transformation #framework #modelling #named
CoMoVi: a Framework for Data Transformation in Credit Behavioral Scoring Applications Using Model Driven Architecture (RFON, PJLA, ACS, DRdCF, GRM), pp. 286–291.
SEKESEKE-2014-ParkSHSHB #algorithm #resource management #search-based
Practical Human Resource Allocation in Software Projects Using Genetic Algorithm (JP, DS, GH, DS, JH, DHB), pp. 688–694.
SEKESEKE-2014-SalmanSD14a #concept analysis #impact analysis
Feature-Level Change Impact Analysis Using Formal Concept Analysis (HES, AS, CD), pp. 447–452.
SEKESEKE-2014-SatapathyPR #agile #approach #estimation #kernel
Story Point Approach based Agile Software Effort Estimation using Various SVR Kernel Methods (SMS, AP, SKR), pp. 304–307.
SEKESEKE-2014-SinghS #machine learning #requirements
Software Requirement Prioritization using Machine Learning (DS, AS), pp. 701–704.
SEKESEKE-2014-SouzaRS #empirical #predict
A Proposal for the Improvement of Project’s Cost Predictability using Earned Value Management and Historical Data of Cost — An Empirical Study (ADdS, ARR, DCSdS), pp. 729–734.
SEKESEKE-2014-TianWHZG #feedback #recommendation #web #web service
Cold-Start Web Service Recommendation Using Implicit Feedback (GT, JW, KH, WZ, PG), pp. 371–376.
SEKESEKE-2014-Wang #composition #web #web service
QoS-Based Web Service Composition by GA Using Consumer Decision-Making Function (GW), pp. 361–364.
SEKESEKE-2014-WangGZ #network #predict
Artificial neural networks for infectious diarrhea prediction using meteorological factors in Shanghai (YW, JG, ZZ), pp. 501–506.
SEKESEKE-2014-XuL #approach #architecture #automation #synthesis
Automated Software Architectural Synthesis using Patterns: A Cooperative Coevolution Approach (YX, PL), pp. 174–180.
SEKESEKE-2014-XuL14a #ontology #reasoning #semantics
Two-Level Smart Search Engine Using Ontology-Based Semantic Reasoning (HX, AL), pp. 648–652.
SIGIRSIGIR-2014-AnilSS #evolution #kernel #modelling #network #social
Modeling evolution of a social network using temporalgraph kernels (AA, NS, SRS), pp. 1051–1054.
SIGIRSIGIR-2014-CeroniTKN
Bridging temporal context gaps using time-aware re-contextualization (AC, NKT, NK, CN), pp. 1127–1130.
SIGIRSIGIR-2014-DaltonDA #knowledge base #query
Entity query feature expansion using knowledge base links (JD, LD, JA), pp. 365–374.
SIGIRSIGIR-2014-GrausDTWR #communication #email #enterprise #graph #recommendation
Recipient recommendation in enterprises using communication graphs and email content (DG, DvD, MT, WW, MdR), pp. 1079–1082.
SIGIRSIGIR-2014-Ifada #modelling #personalisation #recommendation #topic
A tag-based personalized item recommendation system using tensor modeling and topic model approaches (NI), p. 1280.
SIGIRSIGIR-2014-KeikhaPC #metric #summary
Evaluating answer passages using summarization measures (MK, JHP, WBC), pp. 963–966.
SIGIRSIGIR-2014-KharazmiSSV #difference
Using score differences for search result diversification (SK, MS, FS, DV), pp. 1143–1146.
SIGIRSIGIR-2014-KumarJF #detection #twitter
Where not to go?: detecting road hazards using twitter (AK, MJ, YF), pp. 1223–1226.
SIGIRSIGIR-2014-LivneGTDA #difference #named #recommendation
CiteSight: supporting contextual citation recommendation using differential search (AL, VG, JT, STD, EA), pp. 807–816.
SIGIRSIGIR-2014-RoitmanHK
Using the cross-entropy method to re-rank search results (HR, SH, OK), pp. 839–842.
SIGIRSIGIR-2014-RoyVGC #query #segmentation #sequence
Improving unsupervised query segmentation using parts-of-speech sequence information (RSR, YV, NG, MC), pp. 935–938.
SIGIRSIGIR-2014-Sebastian #clustering #predict #semantics
Cluster links prediction for literature based discovery using latent structure and semantic features (YS), p. 1275.
SIGIRSIGIR-2014-WuKS #behaviour #online
Using information scent and need for cognition to understand online search behavior (WCW, DK, AS), pp. 557–566.
SKYSKY-2014-Ben-Av #algebra #generative #multi #ontology
Ontology Hierarchy Self Generation using Algebraic Multi-Grid (AMG) (RBA), pp. 79–85.
SKYSKY-2014-OsetinskyY #abstraction #case study #effectiveness #legacy
Working More Effectively with Legacy Code Using Domain Knowledge and Abstractions: A Case Study (IO, RY), pp. 63–70.
AMTAMT-2014-RichaBPBR #algebra #graph transformation #model transformation #testing #towards
Towards Testing Model Transformation Chains Using Precondition Construction in Algebraic Graph Transformation (ER, EB, LP, MB, JFR), pp. 34–43.
MODELSMoDELS-2014-OgunyomiRK #incremental #model-to-text #on the
On the Use of Signatures for Source Incremental Model-to-text Transformation (BO, LMR, DSK), pp. 84–98.
MODELSMoDELS-2014-SoltanaFASB #approach #case study #modelling #uml
Using UML for Modeling Procedural Legal Rules: Approach and a Study of Luxembourg’s Tax Law (GS, EF, MA, MS, LCB), pp. 450–466.
SPLCSPLC-2014-KnappRS #development #modelling #on the #product line #testing
On the use of test cases in model-based software product line development (AK, MR, BHS), pp. 247–251.
SPLCSPLC-2014-Lantz #agile #case study #development #modelling
Using models to scale agile mechatronics development in cars: case studies at Volvo car group (JL), p. 20.
ECOOPECOOP-2014-LavoieDF #javascript #monitoring #performance #runtime #virtual machine
Portable and Efficient Run-time Monitoring of JavaScript Applications Using Virtual Machine Layering (EL, BD, MF), pp. 541–566.
OOPSLAOOPSLA-2014-Desai0M #proving #reduction #source code
Natural proofs for asynchronous programs using almost-synchronous reductions (AD, PG, PM), pp. 709–725.
OOPSLAOOPSLA-2014-GligoricSPVNL #automation #dynamic analysis #migration #refactoring #search-based
Automated migration of build scripts using dynamic analysis and search-based refactoring (MG, WS, CP, DvV, IN, BL), pp. 599–616.
OOPSLAOOPSLA-2014-HsiaoCN #corpus #program analysis #statistics #web
Using web corpus statistics for program analysis (CHH, MJC, SN), pp. 49–65.
OOPSLAOOPSLA-2014-VoraKG #algorithm #consistency #named #parallel
ASPIRE: exploiting asynchronous parallelism in iterative algorithms using a relaxed consistency based DSM (KV, SCK, RG), pp. 861–878.
PEPMPEPM-J-2013-Simon14 #type inference
Deriving a complete type inference for Hindley-Milner and vector sizes using expansion (AS), pp. 254–271.
PADLPADL-2014-CampeottoPDFP #constraints #theorem proving
Exploring the Use of GPUs in Constraint Solving (FC, ADP, AD, FF, EP), pp. 152–167.
PADLPADL-2014-LakinP #compilation #functional #programming language
Compiling DNA Strand Displacement Reactions Using a Functional Programming Language (MRL, AP), pp. 81–86.
PLDIPLDI-2014-DeVitoRFAH #generative #runtime
First-class runtime generation of high-performance types using exotypes (ZD, DR, MF, AA, PH), p. 11.
PLDIPLDI-2014-PekQM #c #data type #logic #proving
Natural proofs for data structure manipulation in C using separation logic (EP, XQ, PM), p. 46.
POPLPOPL-2014-ChaudhuriCS #proving #synthesis
Bridging boolean and quantitative synthesis using smoothed proof search (SC, MC, ASL), pp. 207–220.
PPDPPPDP-2014-Schopp #low level #source code
Organising Low-Level Programs using Higher Types (US), pp. 199–210.
QAPLQAPL-2014-Feng #distributed #hybrid #modelling #probability
Patch-based Hybrid Modelling of Spatially Distributed Systems by Using Stochastic HYPE — ZebraNet as an Example (CF0), pp. 64–77.
SASSAS-2014-ChenHTWW #recursion #source code #verification
Verifying Recursive Programs Using Intraprocedural Analyzers (YFC, CH, MHT, BYW, FW), pp. 118–133.
RERE-2014-AntonelliRLO
Language Extended Lexicon points: Estimating the size of an application using its language (LA, GR, JCSdPL, AO), pp. 263–272.
RERE-2014-MartinsO #analysis #case study #fault #functional #protocol #requirements #safety
A case study using a protocol to derive safety functional requirements from Fault Tree Analysis (LEGM, TdO), pp. 412–419.
RERE-2014-PorterLS #case study #experience #feedback #framework #requirements
Building a National E-Service using Sentire experience report on the use of Sentire: A volere-based requirements framework driven by calibrated personas and simulated user feedback (CP, EL, MAS), pp. 374–383.
RERE-2014-SlavinLNB #diagrams #feature model #requirements #security
Managing security requirements patterns using feature diagram hierarchies (RS, JML, JN, TDB), pp. 193–202.
REFSQREFSQ-2014-OjameruayeB #requirements
Systematic Elaboration of Compliance Requirements Using Compliance Debt and Portfolio Theory (BO, RB), pp. 152–167.
ASEASE-2014-Borg #debugging #re-engineering
Embrace your issues: compassing the software engineering landscape using bug reports (MB), pp. 891–894.
ASEASE-2014-CaiS #dependence #impact analysis #named #precise
Diver: precise dynamic impact analysis using dependence-based trace pruning (HC, RAS), pp. 343–348.
ASEASE-2014-DeweyRH #constraints #fuzzing #logic programming
Language fuzzing using constraint logic programming (KD, JR, BH), pp. 725–730.
ASEASE-2014-DingesA #execution #generative
Targeted test input generation using symbolic-concrete backward execution (PD, GAA), pp. 31–36.
ASEASE-2014-HamidiAL #adaptation
Constructing adaptive configuration dialogs using crowd data (SH, PA, SL), pp. 485–490.
ASEASE-2014-LutzD #comparison #data flow #difference #interactive #programming #visual notation
Using visual dataflow programming for interactive model comparison (RL, SD), pp. 653–664.
ASEASE-2014-MaezawaNWH #ajax #validation
Validating ajax applications using a delay-based mutation technique (YM, KN, HW, SH), pp. 491–502.
ASEASE-2014-MahajanH #comparison #html #image
Finding HTML presentation failures using image comparison techniques (SM, WGJH), pp. 91–96.
ASEASE-2014-MatinnejadNBB #configuration management #modelling #scalability #testing
MiL testing of highly configurable continuous controllers: scalable search using surrogate models (RM, SN, LCB, TB), pp. 163–174.
ASEASE-2014-MkaouerKBDC #interactive #optimisation #recommendation #refactoring
Recommendation system for software refactoring using innovization and interactive dynamic optimization (MWM, MK, SB, KD, MÓC), pp. 331–336.
ASEASE-2014-OsterlundL #component #concurrent
Concurrent transformation components using contention context sensors (, WL), pp. 223–234.
ASEASE-2014-RajanSSK #execution
Accelerated test execution using GPUs (AR, SS, PS, DK), pp. 97–102.
ASEASE-2014-RanganathVG #comparison #testing
Compatibility testing using patterns-based trace comparison (VPR, PV, PG), pp. 469–478.
ASEASE-2014-WangWWYSYLFG #concurrent #debugging #locality #memory management
Localization of concurrency bugs using shared memory access pairs (WW, ZW, CW, PCY, XS, XY, JL, XF, YG), pp. 611–622.
FSEFSE-2014-LalQ #verification
Powering the static driver verifier using corral (AL, SQ), pp. 202–212.
FSEFSE-2014-VakiliD #infinity #modelling #smt #verification
Verifying CTL-live properties of infinite state models using an SMT solver (AV, NAD), pp. 213–223.
FSEFSE-2014-YeBL #debugging #learning #rank
Learning to rank relevant files for bug reports using domain knowledge (XY, RCB, CL), pp. 689–699.
ICSEICSE-2014-ChenSJHNF #anti #detection #performance
Detecting performance anti-patterns for applications developed using object-relational mapping (THC, WS, ZMJ, AEH, MNN, PF), pp. 1001–1012.
ICSEICSE-2014-FritzBMYZ #development #metric
Using psycho-physiological measures to assess task difficulty in software development (TF, AB, SCM, SYE, MZ), pp. 402–413.
ICSEICSE-2014-LeeJP #behaviour #detection #machine learning #memory management #modelling
Detecting memory leaks through introspective dynamic behavior modelling using machine learning (SL, CJ, SP), pp. 814–824.
ICSEICSE-2014-MinkuY #estimation #how #question
How to make best use of cross-company data in software effort estimation? (LLM, XY), pp. 446–456.
ICSEICSE-2014-MiyashitaTA #modelling #spreadsheet
Controlled modeling environment using flexibly-formatted spreadsheets (HM, HT, SA), pp. 978–988.
ICSEICSE-2014-NguyenKWF #dynamic analysis #invariant
Using dynamic analysis to generate disjunctive invariants (TN, DK, WW, SF), pp. 608–619.
ICSEICSE-2014-SingerFS #developer #how #re-engineering #twitter
Software engineering at the speed of light: how developers stay current using twitter (LS, FMFF, MADS), pp. 211–221.
ICSEICSE-2014-YaoHJ #analysis #case study #equivalence
A study of equivalent and stubborn mutation operators using human analysis of equivalence (XY, MH, YJ), pp. 919–930.
ICSEICSE-2014-ZayanAC #comprehension #empirical
Effects of using examples on structural model comprehension: a controlled experiment (DZ, MA, KC), pp. 955–966.
SACSAC-2014-AdibuzzamanAL #monitoring #personalisation #smarttech
A personalized model for monitoring vital signs using camera of the smart phone (MA, SIA, RL), pp. 444–449.
SACSAC-2014-Al-RefaiCF #modelling #runtime
Using models to dynamically refactor runtime code (MAR, WC, RBF), pp. 1108–1113.
SACSAC-2014-AnderssonDA #artificial reality #identification
Anthropometric and human gait identification using skeleton data from Kinect sensor (VOA, RD, RMdA), pp. 60–61.
SACSAC-2014-BergamascoN #3d #approach #feature model #retrieval
A new local feature extraction approach for content-based 3D medical model retrieval using shape descriptor (LCCB, FLSN), pp. 902–907.
SACSAC-2014-BernardiCL #aspect-oriented #declarative #design pattern #development #programming
Declarative design pattern-based development using aspect oriented programming (MLB, MC, GADL), pp. 1625–1630.
SACSAC-2014-BoghratiHK #framework #process
Activities performed by programmers while using framework examples as a guide (RB, AH, MK), pp. 1146–1151.
SACSAC-2014-ChangHL #adaptation #clustering #optimisation
Optimizing FTL mapping cache for random-write workloads using adaptive block partitioning (LPC, SMH, WPL), pp. 1504–1510.
SACSAC-2014-ChoiKK #modelling #ontology
Modeling for context-aware healthcare service using ontology (JC, JK, PK), pp. 1729–1730.
SACSAC-2014-Daniel #communication #protocol
Vehicle to vehicle communication using Zigbee protocol (AD), pp. 715–716.
SACSAC-2014-EngielCL #approach #concept #elicitation
Eliciting concepts from the Brazilian access law using a combined approach (PE, CC, JCSdPL), pp. 1001–1006.
SACSAC-2014-GomesACHS #agile #development #framework #game studies #platform
Rapid development of first person serious games using the APEX platform: the asthma game (TG, TA, JCC, MDH, JLS), pp. 169–174.
SACSAC-2014-HoritaHSNTO #approach #modelling #refinement
Transformation approach from KAOS goal models to BPMN models using refinement patterns (HH, KH, YS, HN, YT, AO), pp. 1023–1024.
SACSAC-2014-HuergoPD #approach #identification #modelling
A method to identify services using master data and artifact-centric modeling approach (RSH, PFP, FCD), pp. 1225–1230.
SACSAC-2014-JunAK #detection
DDoS attack detection by using packet sampling and flow features (JHJ, CWA, SHK), pp. 711–712.
SACSAC-2014-KawsarAL #detection #multimodal #process #smarttech
Smartphone based multimodal activity detection system using plantar pressure sensors (FAK, SIA, RL), pp. 468–469.
SACSAC-2014-KrikavaCF14a #domain-specific language #modelling
Manipulating models using internal domain-specific languages (FK, PC, RBF), pp. 1612–1614.
SACSAC-2014-LiMZ #visualisation
Visualization of oceanographic applications using a common data model (JL, ZPM, KZ), pp. 933–938.
SACSAC-2014-ManhaesCZ #architecture #named #predict
WAVE: an architecture for predicting dropout in undergraduate courses using EDM (LMBM, SMSdC, GZ), pp. 243–247.
SACSAC-2014-OmatuY #classification #smell
Smell classification using weakly responding data (SO, MY), pp. 213–214.
SACSAC-2014-PalVCS #detection #smarttech
Improved heart rate detection using smart phone (AP, AV, ADC, AS), pp. 8–13.
SACSAC-2014-ParkKC #framework #kernel #memory management #online #platform
Cooperative kernel: online memory test platform using inter-kernel context switch and memory isolation (HP, DK, JC), pp. 1517–1522.
SACSAC-2014-PedrosaP
Text entry using a foot for severely motor-impaired individuals (DdCP, MdGCP), pp. 957–963.
SACSAC-2014-PengYYHKH #3d #detection #multi
3D cloud detection and tracking for solar forecast using multiple sky imagers (ZP, SY, DY, DH, PK, JH), pp. 512–517.
SACSAC-2014-RossiLR #algorithm #classification #network
A parameter-free label propagation algorithm using bipartite heterogeneous networks for text classification (RGR, AAL, SOR), pp. 79–84.
SACSAC-2014-ShahriarH #assessment #fuzzy #injection #risk management
Risk assessment of code injection vulnerabilities using fuzzy logic-based system (HS, HH), pp. 1164–1170.
SACSAC-2014-SypeS #case study #online #requirements #social
Case study: legal requirements for the use of social login features for online reputation updates (YSVDS, JMS), pp. 1698–1705.
SACSAC-2014-TragatschnigTZ #impact analysis
Impact analysis for event-based systems using change patterns (ST, HT, UZ), pp. 763–768.
SACSAC-2014-WijenayakeP #estimation #visual notation
Respiratory motion estimation using visual coded markers for radiotherapy (UW, SYP), pp. 1751–1752.
SACSAC-2014-YokoyamaKM
Secure positioning in a UAV swarm using on-board stereo cameras (RSY, BYLK, EdSM), pp. 769–774.
SACSAC-2014-YoonY #authentication #network
A biometric-based authenticated key agreement scheme using ECC for wireless sensor networks (EJY, KYY), pp. 699–705.
SACSAC-2014-ZardariBE
Cloud adoption: prioritizing obstacles and obstacles resolution tactics using AHP (SZ, RB, AE), pp. 1013–1020.
SACSAC-2014-Zheng #matrix
Semi-supervised context-aware matrix factorization: using contexts in a way of “latent” factors (YZ), pp. 292–293.
SLESLE-J-2012-GuizzardiZ #concept #modelling #ontology
Using a trope-based foundational ontology for bridging different areas of concern in ontology-driven conceptual modeling (GG, VZ), pp. 417–443.
GPCEGPCE-2014-Asai #compilation
Compiling a reflective language using MetaOCaml (KA), pp. 113–122.
SLESLE-2014-Ridge #combinator #context-free grammar #parsing #performance
Simple, Efficient, Sound and Complete Combinator Parsing for All Context-Free Grammars, Using an Oracle (TR), pp. 261–281.
ASPLOSASPLOS-2014-RuanVLS #case study #experience #legacy #transaction
Transactionalizing legacy code: an experience report using GCC and Memcached (WR, TV, YL, MFS), pp. 399–412.
ASPLOSASPLOS-2014-SantosRSW #mobile #runtime
Using ARM trustzone to build a trusted language runtime for mobile applications (NS, HR, SS, AW), pp. 67–80.
CASECASE-2014-ChenLL #adaptation #design #predict
Design of lane keeping system using adaptive model predictive control (BCC, BCL, KL), pp. 922–926.
CASECASE-2014-ChenS #approach #markov #modelling #novel
Modeling building occupancy using a novel inhomogeneous Markov chain approach (ZC, YCS), pp. 1079–1084.
CASECASE-2014-ChuLSO #analysis #contract #flexibility #linear #parametricity #programming
Flexibility analysis on a supply chain contract using a parametric Linear Programming model (CC, EEL, XS, DO), pp. 704–709.
CASECASE-2014-FeyzabadiC #markov #process
Risk-aware path planning using hirerachical constrained Markov Decision Processes (SF, SC), pp. 297–303.
CASECASE-2014-GaoLWA #monitoring #petri net #problem #sequence
A monitor solution to enforce legal transition firing sequences problems by using Petri nets (XG, ZL, AW, AMAA), pp. 419–424.
CASECASE-2014-GlorieuxDSL #approach #optimisation
Optimisation of interacting production stations using a Constructive Cooperative Coevolutionary approach (EG, FD, BS, BL), pp. 322–327.
CASECASE-2014-HsiehHP #generative #predict
Improving the stability and fuel economy for Belt-Starter Generator Mild HEV at idle speed using model predict control (FCH, YDH, YWP), pp. 916–921.
CASECASE-2014-HuCLY #approach #automation #comparative #petri net
A comparative approach to supervisor simplification in automated manufacturing systems using Petri nets (HH, CC, YL, YY), pp. 619–625.
CASECASE-2014-JiangCWWS #3d #analysis #fault #re-engineering
Error analysis and experiments of 3D reconstruction using a RGB-D sensor (SYJ, NYCC, CCW, CHW, KTS), pp. 1020–1025.
CASECASE-2014-KernWGBM #estimation #machine learning
COD and NH4-N estimation in the inflow of Wastewater Treatment Plants using Machine Learning Techniques (PK, CW, DG, MB, SFM), pp. 812–817.
CASECASE-2014-LeePP #locality
Coarse-to-fine robot localization method using radio fingerprint and Particle Filter (YCL, BP, SP), pp. 290–296.
CASECASE-2014-LinHC #gesture #network #recognition
Human hand gesture recognition using a convolution neural network (HIL, MHH, WKC), pp. 1038–1043.
CASECASE-2014-LinWF
Grasping unknown objects using depth gradient feature with eye-in-hand RGB-D sensor (YCL, STW, LCF), pp. 1258–1263.
CASECASE-2014-LiWC
Pedestrian tracking system by using human shape prior model (KCL, HCW, JMC), pp. 1139–1143.
CASECASE-2014-MahlerKLSMKPWFAG #learning #process
Learning accurate kinematic control of cable-driven surgical robots using data cleaning and Gaussian Process Regression (JM, SK, ML, SS, AM, BK, SP, JW, MF, PA, KYG), pp. 532–539.
CASECASE-2014-NagataO #approach #multi
Electric power interchange between micro-grids by using multi-agent approach (TN, KO), pp. 50–55.
CASECASE-2014-ParkLH #generative #performance
Trajectory generation method using Bézier spiral curves for high-speed on-road autonomous vehicles (BP, YCL, WYH), pp. 927–932.
CASECASE-2014-WahrburgZMD #assembly #estimation
Contact force estimation for robotic assembly using motor torques (AW, SZ, BM, HD), pp. 1252–1257.
CCCC-2014-Dinechin #code generation
Using the SSA-Form in a Code Generator (BDdD), pp. 1–17.
CCCC-2014-SurendranBZS #array
Inter-iteration Scalar Replacement Using Array SSA Form (RS, RB, JZ, VS), pp. 40–60.
DACDAC-2014-AdirGGS #generative #network #testing
Using a High-Level Test Generation Expert System for Testing In-Car Networks (AA, AG, LG, TS), p. 6.
DACDAC-2014-AthavaleMHV #analysis #source code #test coverage
Code Coverage of Assertions Using RTL Source Code Analysis (VA, SM, SH, SV), p. 6.
DACDAC-2014-ChangJC #configuration management #functional
Functional ECO Using Metal-Configurable Gate-Array Spare Cells (HYC, IHRJ, YWC), p. 6.
DACDAC-2014-GebalaMMRT #on the
On Using Implied Values in EDT-based Test Compression (MG, GM, NM, JR, JT), p. 6.
DACDAC-2014-KhosraviRGT #multi #optimisation #reliability
Multi-Objective Local-Search Optimization using Reliability Importance Measuring (FK, FR, MG, JT), p. 6.
DACDAC-2014-LiuCTKD #component #realtime
Computation Offloading by Using Timing Unreliable Components in Real-Time Systems (WL, JJC, AT, TWK, QD), p. 6.
DACDAC-2014-LiuFC #process #self
Overlay-Aware Detailed Routing for Self-Aligned Double Patterning Lithography Using the Cut Process (IJL, SYF, YWC), p. 6.
DACDAC-2014-LuCCSHTC #named
ePlace: Electrostatics Based Placement Using Nesterov’s Method (JL, PC, CCC, LS, DJHH, CCT, CKC), p. 6.
DACDAC-2014-MaoWZCL #architecture #memory management
Exploration of GPGPU Register File Architecture Using Domain-wall-shift-write based Racetrack Memory (MM, WW, YZ, YC, HHL), p. 6.
DACDAC-2014-OetjensBBBBCCDEGKKLM0MPPRRRSSTV #challenge #evaluation #prototype #research #safety #state of the art
Safety Evaluation of Automotive Electronics Using Virtual Prototypes: State of the Art and Research Challenges (JHO, NB, MB, OB, AB, MC, SC, RD, WE, KG, TK, CK, HML, MM, WM, DMG, FP, HP, SR, WR, SR, US, AvS, BAT, AV), p. 6.
DACDAC-2014-PrussKE #abstraction #equivalence #scalability #verification
Equivalence Verification of Large Galois Field Arithmetic Circuits using Word-Level Abstraction via Gröbner Bases (TP, PK, FE), p. 6.
DACDAC-2014-RaoEST #multi
Protecting SRAM-based FPGAs Against Multiple Bit Upsets Using Erasure Codes (PMBR, ME, RS, MBT), p. 6.
DACDAC-2014-RenMRZ #fault tolerance #network
Fault-tolerant Routing for On-chip Network Without Using Virtual Channels (PR, QM, XR, NZ), p. 6.
DACDAC-2014-RoyKCBC #streaming
Demand-Driven Mixture Preparation and Droplet Streaming using Digital Microfluidic Biochips (SR, SK, PPC, BBB, KC), p. 6.
DACDAC-2014-StoermerT #functional #interface #mockup #standard
Powertrain Co-Simulation using AUTOSAR and the Functional Mockup Interface standard (CS, GT), p. 1.
DACDAC-2014-TsaiCYYHCCC #energy
Leveraging Data Lifetime for Energy-Aware Last Level Non-Volatile SRAM Caches using Redundant Store Elimination (HJT, CCC, KHY, TCY, LYH, CHC, MFC, TFC), p. 6.
DACDAC-2014-VaidyanathanDP #detection #reliability #stack
Detecting Reliability Attacks during Split Fabrication using Test-only BEOL Stack (KV, BPD, LP), p. 6.
DACDAC-2014-WeiWNP #physics #reverse engineering
Reverse Engineering and Prevention Techniques for Physical Unclonable Functions Using Side Channels (SW, JBW, AN, MP), p. 6.
DACDAC-2014-YuSHEAB #metric #parametricity
Remembrance of Transistors Past: Compact Model Parameter Extraction Using Bayesian Inference and Incomplete New Measurements (LY, SS, CH, IAME, DAA, DSB), p. 6.
DATEDATE-2014-AhariAKT #architecture #configuration management #power management
A power-efficient reconfigurable architecture using PCM configuration technology (AA, HA, BK, MBT), pp. 1–6.
DATEDATE-2014-AlaghiH #performance #probability
Fast and accurate computation using stochastic circuits (AA, JPH), pp. 1–4.
DATEDATE-2014-BalckGP #generative #modelling #protocol #testing
Model-based protocol log generation for testing a telecommunication test harness using CLP (KB, OG, JP), pp. 1–4.
DATEDATE-2014-Braak #adaptation #embedded #scalability
Using guided local search for adaptive resource reservation in large-scale embedded systems (TDtB), pp. 1–4.
DATEDATE-2014-CannellaBS #approach #realtime #scheduling #streaming
System-level scheduling of real-time streaming applications using a semi-partitioned approach (EC, MB, TS), pp. 1–6.
DATEDATE-2014-CasparLH #automation #strict #testing
Automated system testing using dynamic and resource restricted clients (MC, ML, WH), pp. 1–4.
DATEDATE-2014-ConosMDP #coordination #energy #power management
Provably minimal energy using coordinated DVS and power gating (NAC, SM, FD, MP), pp. 1–6.
DATEDATE-2014-DoanJP #flexibility #implementation #multi #scalability
Flexible and scalable implementation of H.264/AVC encoder for multiple resolutions using ASIPs (HCD, HJ, SP), pp. 1–6.
DATEDATE-2014-FerentD #comparison #mining #novel #synthesis
Novel circuit topology synthesis method using circuit feature mining and symbolic comparison (CF, AD), pp. 1–4.
DATEDATE-2014-FriedlerKMNS #effectiveness #locality #slicing
Effective post-silicon failure localization using dynamic program slicing (OF, WK, AM, AN, VS), pp. 1–6.
DATEDATE-2014-KamalGAP #approximate #performance
Improving efficiency of extensible processors by using approximate custom instructions (MK, AG, AAK, MP), pp. 1–4.
DATEDATE-2014-LagraaTP #data mining #mining #scalability #simulation
Scalability bottlenecks discovery in MPSoC platforms using data mining on simulation traces (SL, AT, FP), pp. 1–6.
DATEDATE-2014-LeeA #architecture #hybrid #novel #power management
A novel low power 11-bit hybrid ADC using flash and delay line architectures (HCL, JAA), pp. 1–4.
DATEDATE-2014-MahmoodPM #performance #reduction
Cache aging reduction with improved performance using dynamically re-sizable cache (HM, MP, EM), pp. 1–6.
DATEDATE-2014-MarianiPZS #design #named #predict #scheduling #simulation
DeSpErate: Speeding-up design space exploration by using predictive simulation scheduling (GM, GP, VZ, CS), pp. 1–4.
DATEDATE-2014-MoralesHBHV #energy #implementation
Energy-efficient FPGA implementation for binomial option pricing using OpenCL (VMM, PHH, AB, EH, SV), pp. 1–6.
DATEDATE-2014-NarayananDCCLW #video
Video analytics using beyond CMOS devices (VN, SD, GC, DMC, SPL, PW), pp. 1–5.
DATEDATE-2014-ReimerSSB
Using MaxBMC for Pareto-optimal circuit initialization (SR, MS, TS, BB), pp. 1–6.
DATEDATE-2014-Sadri0WWB #3d #energy #optimisation
Energy optimization in 3D MPSoCs with Wide-I/O DRAM using temperature variation aware bank-wise refresh (MS, MJ, CW, NW, LB), pp. 1–4.
DATEDATE-2014-SarafBLR #probability
IIR filters using stochastic arithmetic (NS, KB, DJL, MDR), pp. 1–6.
DATEDATE-2014-ShinPM #architecture #hybrid
Thermal management of batteries using a hybrid supercapacitor architecture (DS, MP, EM), pp. 1–6.
DATEDATE-2014-TurkyilmazCRBC #3d #integration
3D FPGA using high-density interconnect Monolithic Integration (OT, GC, OR, PB, FC), pp. 1–4.
DATEDATE-2014-VartziotisKCPJ #multi #optimisation
Multi-site test optimization for multi-Vdd SoCs using space- and time- division multiplexing (FV, XK, KC, RAP, AJ), pp. 1–6.
DATEDATE-2014-VijaykumarV #analysis #canonical #statistics
Statistical static timing analysis using a skew-normal canonical delay model (MV, VV), pp. 1–6.
DATEDATE-2014-YangMPOP #logic
Complementary resistive switch based stateful logic operations using material implication (YY, JM, DKP, MO, SP), pp. 1–4.
DATEDATE-2014-ZangenehJ #design #feedback #logic
Sub-threshold logic circuit design using feedback equalization (MZ, AJ), pp. 1–6.
HPCAHPCA-2014-KhanAWMJ #clustering #performance
Improving cache performance using read-write partitioning (SMK, ARA, CW, OM, DAJ), pp. 452–463.
HPCAHPCA-2014-KimLJK #architecture #gpu #memory management #named
GPUdmm: A high-performance and memory-oblivious GPU architecture using dynamic memory management (YK, JL, JEJ, JK), pp. 546–557.
HPDCHPDC-2014-XiangMA #matrix #pipes and filters #scalability
Scalable matrix inversion using MapReduce (JX, HM, AA), pp. 177–190.
ISMMISMM-2014-LiDL #liveness #modelling
Modeling heap data growth using average liveness (PL, CD, HL), pp. 71–82.
ISMMISMM-2014-Printezis #perspective #twitter #virtual machine
Use of the JVM at twitter: a bird’s eye view (TP), p. 1.
LCTESLCTES-2014-MartinsNDMC #clustering #compilation #optimisation #sequence
Exploration of compiler optimization sequences using clustering-based selection (LGAM, RN, ACBD, EM, JMPC), pp. 63–72.
PDPPDP-2014-AshrafP #multi #web
Using Ant Colony System to Consolidate Multiple Web Applications in a Cloud Environment (AA, IP), pp. 482–489.
PDPPDP-2014-BrownJHSIG #parallel #performance #refactoring #tool support
Agricultural Reform: More Efficient Farming Using Advanced Parallel Refactoring Tools (CB, VJ, KH, HS, KI, CWG), pp. 36–43.
PDPPDP-2014-BuiFVHHLPH #parallel #scalability
Scalable Parallel I/O on a Blue Gene/Q Supercomputer Using Compression, Topology-Aware Data Aggregation, and Subfiling (HB, HF, VV, SH, KH, JL, MEP, KH), pp. 107–111.
PDPPDP-2014-BuonoMMV #architecture #hardware #manycore #message passing #optimisation #thread
Optimizing Message-Passing on Multicore Architectures Using Hardware Multi-threading (DB, TDM, GM, MV), pp. 262–270.
PDPPDP-2014-ChervenakSGSH #adaptation #performance #resource management #staging
Efficient Data Staging Using Performance-Based Adaptation and Policy-Based Resource Allocation (ALC, AS, JG, RS, NH), pp. 244–247.
PDPPDP-2014-DalKT #graph #performance #scalability
Fast Diameter Computation of Large Sparse Graphs Using GPUs (GHD, WAK, FWT), pp. 632–639.
PDPPDP-2014-DavtyanPGS #coordination
Coordinated Cooperative Work Using Undependable Processors with Unreliable Broadcast (SD, RDP, CG, AAS), pp. 17–26.
PDPPDP-2014-FarahnakianLP #energy #learning #virtual machine
Energy-Efficient Virtual Machines Consolidation in Cloud Data Centers Using Reinforcement Learning (FF, PL, JP), pp. 500–507.
PDPPDP-2014-ItoF #analysis #hardware #problem #resource management
An Experimental Analysis for Hardware Resource Management Using a New Strip Packing Problem (RI, NF), pp. 360–364.
PDPPDP-2014-KerteszMD #distributed #logic #multi
Multi-job Meta-brokering in Distributed Computing Infrastructures Using Pliant Logic (AK, GM, JDD), pp. 138–145.
PDPPDP-2014-Kwedlo #algorithm #modelling #parallel
A Parallel EM Algorithm for Gaussian Mixture Models Implemented on a NUMA System Using OpenMP (WK), pp. 292–298.
PDPPDP-2014-NaughtonEVB #development #message passing #simulation
Supporting the Development of Resilient Message Passing Applications Using Simulation (TN, CE, GV, SB), pp. 271–278.
PDPPDP-2014-ONeillMMK #named #platform #scheduling
SHEPARD: Scheduling on Heterogeneous Platforms Using Application Resource Demands (EO, JM, PM, PK), pp. 213–217.
PPoPPPPoPP-2014-ThomsonDB #bound #concurrent #empirical #testing
Concurrency testing using schedule bounding: an empirical study (PT, AFD, AB), pp. 15–28.
PPoPPPPoPP-2014-WangWYYWL0 #concurrent #debugging #locality #memory management
Concurrency bug localization using shared memory access pairs (WW, CW, PCY, XY, ZW, JL, XF), pp. 375–376.
ESOPESOP-2014-MatosGR #fault #named
REAP: Reporting Errors Using Alternative Paths (JM, JG, PR), pp. 453–472.
ESOPESOP-2014-PercontiA #compilation #multi #semantics #verification
Verifying an Open Compiler Using Multi-language Semantics (JTP, AA), pp. 128–148.
FASEFASE-2014-AnjorinSLS #graph grammar #refinement
Modularizing Triple Graph Grammars Using Rule Refinement (AA, KS, ML, AS), pp. 340–354.
FASEFASE-2014-MasciZJCT #user interface #verification
Formal Verification of Medical Device User Interfaces Using PVS (PM, YZ, PLJ, PC, HWT), pp. 200–214.
FASEFASE-2014-MudduluruR #abstraction #incremental #performance #static analysis
Efficient Incremental Static Analysis Using Path Abstraction (RM, MKR), pp. 125–139.
FASEFASE-2014-StruberRTC #crawling #information retrieval #modelling
Splitting Models Using Information Retrieval and Model Crawling Techniques (DS, JR, GT, MC), pp. 47–62.
STOCSTOC-2014-MillerS #protocol #quantum #robust
Robust protocols for securely expanding randomness and distributing keys using untrusted quantum devices (CAM, YS), pp. 417–426.
TACASTACAS-2014-BozzanoCGT #component #design #detection #fault #identification #logic
Formal Design of Fault Detection and Identification Components Using Temporal Epistemic Logic (MB, AC, MG, ST), pp. 326–340.
TACASTACAS-2014-SalemDKT #automaton #invariant #model checking #testing
Symbolic Model Checking of Stutter-Invariant Properties Using Generalized Testing Automata (AEBS, ADL, FK, YTM), pp. 440–454.
TACASTACAS-2014-WijsB #manycore #named #on the fly
GPUexplore: Many-Core On-the-Fly State Space Exploration Using GPUs (AW, DB), pp. 233–247.
WRLAWRLA-2014-BaeM #infinity #model checking
Infinite-State Model Checking of LTLR Formulas Using Narrowing (KB, JM), pp. 113–129.
WRLAWRLA-2014-Genet #automaton #functional #source code #static analysis #towards
Towards Static Analysis of Functional Programs Using Tree Automata Completion (TG), pp. 147–161.
CAVCAV-2014-0001A #invariant #random
From Invariant Checking to Invariant Inference Using Randomized Search (RS, AA), pp. 88–105.
CAVCAV-2014-BinghamL #bound #fault #simulation #verification
Verifying Relative Error Bounds Using Symbolic Simulation (JB, JLH), pp. 277–292.
CAVCAV-2014-Hagemann #analysis #hybrid #orthogonal #reachability
Reachability Analysis of Hybrid Systems Using Symbolic Orthogonal Projections (WH), pp. 407–423.
CAVCAV-2014-LarrazNORR #proving
Proving Non-termination Using Max-SMT (DL, KN, AO, ERC, AR), pp. 779–796.
ICLPICLP-J-2014-BartakZ #logic programming #problem
Using Tabled Logic Programming to Solve the Petrobras Planning Problem (RB, NFZ), pp. 697–710.
ICLPICLP-J-2014-BogaertsJBCVD #calculus #linear #simulation
Simulating Dynamic Systems Using Linear Time Calculus Theories (BB, JJ, MB, BdC, JV, MD), pp. 477–492.
ICLPICLP-J-2014-CominiTV #linear #logic
Abstract Diagnosis for tccp using a Linear Temporal Logic (MC, LT, AV), pp. 787–801.
ICLPICLP-J-2014-SerranoLH #abstract interpretation #analysis #logic programming #resource management #source code
Resource Usage Analysis of Logic Programs via Abstract Interpretation Using Sized Types (AS, PLG, MVH), pp. 739–754.
ICTSSICTSS-2014-MossigeGM #case study #constraints #industrial #programming #testing
Testing Robotized Paint System Using Constraint Programming: An Industrial Case Study (MM, AG, HM), pp. 145–160.
IJCARIJCAR-2014-GoreOT #calculus #implementation
Implementing Tableau Calculi Using BDDs: BDDTab System Description (RG, KO, JT), pp. 337–343.
IJCARIJCAR-2014-GoreTW #logic #proving #theorem proving
A History-Based Theorem Prover for Intuitionistic Propositional Logic Using Global Caching: IntHistGC System Description (RG, JT, JW), pp. 262–268.
ISSTAISSTA-2014-LinK #automation #concurrent #multi #satisfiability #source code #thread
Automatic repair for multi-threaded programs with Deadlock/Livelock using maximum satisfiability (YL, SSK), pp. 237–247.
ISSTAISSTA-2014-NejatiB #constraints #cpu #identification #trade-off
Identifying optimal trade-offs between CPU time usage and temporal constraints using search (SN, LCB), pp. 351–361.
ISSTAISSTA-2014-YandrapallyTSC #automation #robust #testing
Robust test automation using contextual clues (RY, ST, SS, SC), pp. 304–314.
ISSTAISSTA-2014-ZhangGA #execution #reduction #symbolic computation #testing
Using test case reduction and prioritization to improve symbolic execution (CZ, AG, MAA), pp. 160–170.
ICSTSAT-2014-BelovHM #proving
MUS Extraction Using Clausal Proofs (AB, MH, JMS), pp. 48–57.
ICSTSAT-2014-HeymanSMLA
Dominant Controllability Check Using QBF-Solver and Netlist Optimizer (TH, DS, YM, LL, HAH), pp. 227–242.
ICSTSAT-2014-WetzlerHH #named #performance #proving
DRAT-trim: Efficient Checking and Trimming Using Expressive Clausal Proofs (NW, MH, WAHJ), pp. 422–429.
TAPTAP-2014-KurthSW #constraints #generative #interface #process #testing #theorem proving #uml
Generating Test Data from a UML Activity Using the AMPL Interface for Constraint Solvers (FK, SS, SW), pp. 169–186.
VMCAIVMCAI-2014-GustavssonGL #analysis #execution #parallel
Timing Analysis of Parallel Software Using Abstract Execution (AG, JG, BL), pp. 59–77.
VMCAIVMCAI-2014-SinghSXKS #composition #modelling #sketching #synthesis
Modular Synthesis of Sketches Using Models (RS, RS, ZX, RK, ASL), pp. 395–414.
CBSECBSE-2013-BurtonS #correctness #data type #mixin
Correctness of intrusive data structures using mixins (EB, ES), pp. 53–58.
CBSECBSE-2013-GortonLLED #case study #component #delivery #experience #platform
Build less code deliver more science: an experience report on composing scientific environments using component-based and commodity software platforms (IG, YL, CL, TE, KKvD), pp. 159–168.
QoSAQoSA-2013-DurdikR #design pattern #documentation #on the
On the appropriate rationale for using design patterns and pattern documentation (ZD, RHR), pp. 107–116.
DocEngDocEng-2013-DoTT #documentation #taxonomy
Document noise removal using sparse representations over learned dictionary (THD, ST, ORT), pp. 161–168.
DocEngDocEng-2013-NourashrafeddinMA #clustering #documentation #interactive
Interactive text document clustering using feature labeling (SN, EEM, DVA), pp. 61–70.
DocEngDocEng-2013-SatkhozhinaAA #random #recognition
Optical font recognition using conditional random field (AS, IA, JPA), pp. 119–122.
DocEngDocEng-2013-TorabiDT
Early modern OCR project (eMOP) at Texas A&M University: using Aletheia to train Tesseract (KT, JD, BT), pp. 23–26.
DocEngDocEng-2013-Vion-Dury #documentation #integration #owl #semantics
Using RDFS/OWL to ease semantic integration of structured documents (JYVD), pp. 189–192.
DRRDRR-2013-AriesON #algorithm #automation #classification #clustering #summary
Using clustering and a modified classification algorithm for automatic text summarization (AA, HO, ON).
DRRDRR-2013-KumarPR13a #composition #documentation #evaluation
Evaluation of document binarization using eigen value decomposition (DK, MNAP, AGR).
DRRDRR-2013-KumarWGS #framework #keyword
Segmentation-free keyword spotting framework using dynamic background model (GK, SW, VG, RS).
DRRDRR-2013-MedjkouneMPV #approach #online #recognition
Using online handwriting and audio streams for mathematical expressions recognition: a bimodal approach (SM, HM, SP, CVG).
DRRDRR-2013-MehriGHM #analysis #documentation #image #multi #segmentation
Old document image segmentation using the autocorrelation function and multiresolution analysis (MM, PGK, PH, RM).
DRRDRR-2013-SrihariKTB #verification
Combining evidence using likelihood ratios in writer verification (SNS, DK, YT, GRB).
DRRDRR-2013-ZhuHZ #image #recognition #retrieval
Rotation-robust math symbol recognition and retrieval using outer contours and image subsampling (SZ, LH, RZ).
HTHT-2013-WolffMC #data flow #named
Storyscope: using theme and setting to guide story enrichment from external data sources (AW, PM, TDC), pp. 79–88.
HTHT-2013-WuCH #recommendation
Using personality to adjust diversity in recommender systems (WW, LC, LH), pp. 225–229.
ICDARICDAR-2013-AhmedKILD #automation #documentation #generative #image #retrieval
Automatic Ground Truth Generation of Camera Captured Documents Using Document Image Retrieval (SA, KK, MI, ML, AD), pp. 528–532.
ICDARICDAR-2013-AhmedSLD #segmentation
A Generic Method for Stamp Segmentation Using Part-Based Features (SA, FS, ML, AD), pp. 708–712.
ICDARICDAR-2013-AlaeiDG #detection #probability #representation
Logo Detection Using Painting Based Representation and Probability Features (AA, MD, NG), pp. 1235–1239.
ICDARICDAR-2013-BaechlerLI #classification
Text Line Extraction Using DMLP Classifiers for Historical Manuscripts (MB, ML, RI), pp. 1029–1033.
ICDARICDAR-2013-BaiYL #correlation #locality
Scene Text Localization Using Gradient Local Correlation (BB, FY, CLL), pp. 1380–1384.
ICDARICDAR-2013-BaroniaN #reduction
Ink-Bleed Reduction Using Layer Separation (SB, AMN), pp. 215–219.
ICDARICDAR-2013-BouillonLAR #gesture #learning
Using Confusion Reject to Improve (User and) System (Cross) Learning of Gesture Commands (MB, PL, ÉA, GR), pp. 1017–1021.
ICDARICDAR-2013-BreuelUAS #network
High-Performance OCR for Printed English and Fraktur Using LSTM Networks (TMB, AUH, MIAAA, FS), pp. 683–687.
ICDARICDAR-2013-ChengSAT #classification #data fusion #image #visual notation
Graphical Figure Classification Using Data Fusion for Integrating Text and Image Features (BC, RJS, SA, GRT), pp. 693–697.
ICDARICDAR-2013-ChowdhuryBP #distance #metric #online #recognition
Online Handwriting Recognition Using Levenshtein Distance Metric (SDC, UB, SKP), pp. 79–83.
ICDARICDAR-2013-DuAD #multi #scalability
Large-Scale Signature Matching Using Multi-stage Hashing (XD, WAA, DSD), pp. 976–980.
ICDARICDAR-2013-FeildLS #probability #recognition
Using a Probabilistic Syllable Model to Improve Scene Text Recognition (JLF, EGLM, DAS), pp. 897–901.
ICDARICDAR-2013-FielS #identification #retrieval #visual notation
Writer Identification and Writer Retrieval Using the Fisher Vector on Visual Vocabularies (SF, RS), pp. 545–549.
ICDARICDAR-2013-Furukawa #composition
A New Method for Discriminating Printers Based on Contours Qualities of Printed Characters Using Wavelet Decomposition (TF), pp. 1115–1119.
ICDARICDAR-2013-GebhardtGSD #authentication #detection #documentation
Document Authentication Using Printing Technique Features and Unsupervised Anomaly Detection (JG, MG, FS, AD), pp. 479–483.
ICDARICDAR-2013-GotoIFU #graph #scalability #set
Analyzing the Distribution of a Large-Scale Character Pattern Set Using Relative Neighborhood Graph (MG, RI, YF, SU), pp. 3–7.
ICDARICDAR-2013-HamdaniMN #composition #recognition
Open Vocabulary Arabic Handwriting Recognition Using Morphological Decomposition (MH, AEDM, HN), pp. 280–284.
ICDARICDAR-2013-HerzogSN #graph #retrieval
Using Harris Corners for the Retrieval of Graphs in Historical Manuscripts (RH, AS, BN), pp. 1295–1299.
ICDARICDAR-2013-HuC #classification #pseudo #verification
Offline Signature Verification Using Real Adaboost Classifier Combination of Pseudo-dynamic Features (JH, YC), pp. 1345–1349.
ICDARICDAR-2013-HuZ #multi
Segmenting Handwritten Math Symbols Using AdaBoost and Multi-scale Shape Context Features (LH, RZ), pp. 1180–1184.
ICDARICDAR-2013-ItaniHI
Text Line Extraction Method Using Domain-Based Active Contour Model (YI, TH, JI), pp. 1230–1234.
ICDARICDAR-2013-JainD13a #identification
Writer Identification Using an Alphabet of Contour Gradient Descriptors (RJ, DSD), pp. 550–554.
ICDARICDAR-2013-KasarBACP #detection #documentation #image #learning
Learning to Detect Tables in Scanned Document Images Using Line Information (TK, PB, SA, CC, TP), pp. 1185–1189.
ICDARICDAR-2013-KieuJVMD #3d #documentation #generative #image
Semi-synthetic Document Image Generation Using Texture Mapping on Scanned 3D Document Shapes (VCK, NJ, MV, RM, JPD), pp. 489–493.
ICDARICDAR-2013-KimLT #classification #heuristic #identification
Identification of Investigator Name Zones Using SVM Classifiers and Heuristic Rules (JK, DXL, GRT), pp. 140–144.
ICDARICDAR-2013-KirbyH #analysis
Analysis of Topographic Maps for Recreational Purposes Using Decision Trees (RK, TCH), pp. 1105–1109.
ICDARICDAR-2013-KrayemSEO #recognition #word
Holistic Arabic Whole Word Recognition Using HMM and Block-Based DCT (AK, NS, LJE, TO), pp. 1120–1124.
ICDARICDAR-2013-KunzeKYK #documentation #eye tracking #image #mobile #retrieval #word
The Wordometer — Estimating the Number of Words Read Using Document Image Retrieval and Mobile Eye Tracking (KK, HK, KY, KK), pp. 25–29.
ICDARICDAR-2013-KunzeSIK #detection #documentation #off the shelf #process #recognition
Reading Activity Recognition Using an Off-the-Shelf EEG — Detecting Reading Activities and Distinguishing Genres of Documents (KK, YS, SI, KK), pp. 96–100.
ICDARICDAR-2013-LuoOWK #approach #automation #classification
Automatic Chinese Text Classification Using Character-Based and Word-Based Approach (XL, WO, TW, FK), pp. 329–333.
ICDARICDAR-2013-MalikRPK #documentation #retrieval
Handwritten Musical Document Retrieval Using Music-Score Spotting (RM, PPR, UP, FK), pp. 832–836.
ICDARICDAR-2013-Martin-AlboRV #feedback #interactive #online
Interactive Off-Line Handwritten Text Transcription Using On-Line Handwritten Text as Feedback (DMA, VR, EV), pp. 1280–1284.
ICDARICDAR-2013-MiyoshiNS #image
Moment-Based Character-Normalization Methods Using a Contour Image Combined with an Original Image (TM, TN, HS), pp. 1066–1070.
ICDARICDAR-2013-OpreanLPM #recognition #web #word
Using the Web to Create Dynamic Dictionaries in Handwritten Out-of-Vocabulary Word Recognition (CO, LLS, AP, CM), pp. 989–993.
ICDARICDAR-2013-ParvezM #recognition #reduction
Lexicon Reduction Using Segment Descriptors for Arabic Handwriting Recognition (MTP, SAM), pp. 1265–1269.
ICDARICDAR-2013-PrumVFO #approach #modelling #online #recognition
A Discriminative Approach to On-Line Handwriting Recognition Using Bi-character Models (SP, MV, AF, JMO), pp. 364–368.
ICDARICDAR-2013-RayCC #random #recognition
Character Recognition Using Conditional Random Field Based Recognition Engine (AR, AC, SC), pp. 18–22.
ICDARICDAR-2013-RazaSDE #detection #multi
Multilingual Artificial Text Detection Using a Cascade of Transforms (AR, IS, CD, AE), pp. 309–313.
ICDARICDAR-2013-RoeM #documentation #image
Binarization of Color Historical Document Images Using Local Image Equalization and XDoG (ER, CABM), pp. 205–209.
ICDARICDAR-2013-RoySSJ #documentation #n-gram #segmentation
Character N-Gram Spotting on Handwritten Documents Using Weakly-Supervised Segmentation (UR, NS, KPS, CVJ), pp. 577–581.
ICDARICDAR-2013-Saabni #distance #embedded #image #performance #retrieval #word
Efficient Word Image Retrieval Using Earth Movers Distance Embedded to Wavelets Coefficients Domain (RS), pp. 314–318.
ICDARICDAR-2013-SunBOK #detection
Specific Comic Character Detection Using Local Feature Matching (WS, JCB, JMO, KK), pp. 275–279.
ICDARICDAR-2013-TatawRK #clustering
Clustering of Symbols Using Minimal Description Length (OMT, TR, EJK), pp. 180–184.
ICDARICDAR-2013-TianLST #recognition
Scene Text Recognition Using Co-occurrence of Histogram of Oriented Gradients (ST, SL, BS, CLT), pp. 912–916.
ICDARICDAR-2013-TuarobBMG #automation #detection #documentation #machine learning #pseudo
Automatic Detection of Pseudocodes in Scholarly Documents Using Machine Learning (ST, SB, PM, CLG), pp. 738–742.
ICDARICDAR-2013-WemhoenerYM #multi
Creating an Improved Version Using Noisy OCR from Multiple Editions (DW, IZY, RM), pp. 160–164.
ICDARICDAR-2013-YadavCK
Most Discriminative Primitive Selection for Identity Determination Using Handwritten Devanagari Script (NY, SC, PKK), pp. 1390–1394.
ICDARICDAR-2013-ZagorisP #detection #image #modelling
Text Detection in Natural Images Using Bio-inspired Models (KZ, IP), pp. 1370–1374.
ICDARICDAR-2013-ZhouTLW #markov #random #recognition
Minimum Risk Training for Handwritten Chinese/Japanese Text Recognition Using Semi-Markov Conditional Random Fields (XDZ, FT, CLL, HW), pp. 940–944.
ICDARICDAR-2013-ZhuSSGN #2d #online #recognition #word
Online Handwritten Cursive Word Recognition Using Segmentation-Free MRF in Combination with P2DBMN-MQDF (BZ, AS, SS, VG, MN), pp. 349–353.
ICDARICDAR-2013-ZhuZ #detection #image #recognition
Label Detection and Recognition for USPTO Images Using Convolutional K-Means Feature Quantization and Ada-Boost (SZ, RZ), pp. 633–637.
ICDARICDAR-2013-ZirariENM #analysis #component #documentation #image #segmentation
A Document Image Segmentation System Using Analysis of Connected Components (FZ, AE, SN, DM), pp. 753–757.
JCDLJCDL-2013-BeckerD #benchmark #corpus #metric #modelling #set
Free benchmark corpora for preservation experiments: using model-driven engineering to generate data sets (CB, KD), pp. 349–358.
JCDLJCDL-2013-GollapalliMG #graph #ranking #topic
Ranking experts using author-document-topic graphs (SDG, PM, CLG), pp. 87–96.
JCDLJCDL-2013-HeMNS #identification
Identification of works of manga using LOD resources: an experimental FRBRization of bibliographic data of comic books (WH, TM, MN, SS), pp. 253–256.
JCDLJCDL-2013-SchererLS #multi #query #repository #research
Visual-interactive querying for multivariate research data repositories using bag-of-words (MS, TvL, TS), pp. 285–294.
JCDLJCDL-2013-TuarobPG #automation #metadata #modelling #probability #recommendation #topic
Automatic tag recommendation for metadata annotation using probabilistic topic modeling (ST, LCP, CLG), pp. 239–248.
SIGMODSIGMOD-2013-AbiteboulAMST #development #rule-based
Rule-based application development using Webdamlog (SA, ÉA, GM, JS, JT), pp. 965–968.
SIGMODSIGMOD-2013-CaiVPAHJ #markov #simulation
Simulation of database-valued markov chains using SimSQL (ZC, ZV, LLP, SA, PJH, CMJ), pp. 637–648.
SIGMODSIGMOD-2013-Cohen #distance #edit distance
Indexing for subtree similarity-search using edit distance (SC), pp. 49–60.
SIGMODSIGMOD-2013-DeshpandeLTDSRHD #knowledge base #maintenance
Building, maintaining, and using knowledge bases: a report from the trenches (OD, DSL, MT, SD, SS, AR, VH, AD), pp. 1209–1220.
SIGMODSIGMOD-2013-FernandezMKP #fault tolerance
Integrating scale out and fault tolerance in stream processing using operator state management (RCF, MM, EK, PP), pp. 725–736.
SIGMODSIGMOD-2013-GiannikisMAK #optimisation
Workload optimization using SharedDB (GG, DM, GA, DK), pp. 1045–1048.
SIGMODSIGMOD-2013-WhangYYSKK #approach #named #parallel
ODYS: an approach to building a massively-parallel search engine using a DB-IR tightly-integrated parallel DBMS for higher-level functionality (KYW, TSY, YMY, IYS, HYK, IJK), pp. 313–324.
SIGMODSIGMOD-2013-YangWQWL #string
Improving regular-expression matching on strings using negative factors (XY, BW, TQ, YW, CL), pp. 361–372.
SIGMODSIGMOD-2013-ZhangGBFRP #named #statistics
GeoDeepDive: statistical inference using familiar data-processing languages (CZ, VG, JB, TF, CR, SP), pp. 993–996.
SIGMODSIGMOD-2013-ZhangXYZW #algorithm #named #search-based
PrivGene: differentially private model fitting using genetic algorithms (JZ, XX, YY, ZZ, MW), pp. 665–676.
TPDLTPDL-2013-CauteruccioI
A Domain Meta-wrapper Using Seeds for Intelligent Author List Extraction in the Domain of Scholarly Articles (FC, GI), pp. 309–314.
TPDLTPDL-2013-FedoryszakTB #scalability
Large Scale Citation Matching Using Apache Hadoop (MF, DT, LB), pp. 362–365.
TPDLTPDL-2013-HallC #library #scalability #visualisation
Exploring Large Digital Library Collections Using a Map-Based Visualisation (MMH, PDC), pp. 216–227.
TPDLTPDL-2013-KemmanKM #eye tracking #interface
Eye Tracking the Use of a Collapsible Facets Panel in a Search Interface (MK, MK, JM), pp. 405–408.
TPDLTPDL-2013-KohnckeB #library #ranking
Context-Sensitive Ranking Using Cross-Domain Knowledge for Chemical Digital Libraries (BK, WTB), pp. 285–296.
TPDLTPDL-2013-MenesesBSFS #documentation #semantics
Restoring Semantically Incomplete Document Collections Using Lexical Signatures (LM, HB, SS, RF, FS), pp. 321–332.
TPDLTPDL-2013-SalahEldeenN #social #web
Resurrecting My Revolution — Using Social Link Neighborhood in Bringing Context to the Disappearing Web (HS, MLN), pp. 333–345.
VLDBVLDB-2013-0002GJ #correlation #markov #modelling
Travel Cost Inference from Sparse, Spatio-Temporally Correlated Time Series Using Markov Models (BY, CG, CSJ), pp. 769–780.
VLDBVLDB-2013-DengJLLY #concept #knowledge base #scalability #web
Scalable Column Concept Determination for Web Tables Using Large Knowledge Bases (DD, YJ, GL, JL, CY), pp. 1606–1617.
VLDBVLDB-2013-KondaKRS #data analysis #enterprise #feature model
Feature Selection in Enterprise Analytics: A Demonstration using an R-based Data Analytics System (PK, AK, CR, VS), pp. 1306–1309.
VLDBVLDB-2013-KotsakosSKG #health #monitoring #named #smarttech
SmartMonitor: Using Smart Devices to Perform Structural Health Monitoring (DK, PS, VK, DG), pp. 1282–1285.
VLDBVLDB-2013-MahmoudNPAA #commit #database #multi
Low-Latency Multi-Datacenter Databases using Replicated Commit (HAM, FN, AP, DA, AEA), pp. 661–672.
VLDBVLDB-2013-OgdenTP #automaton #parallel #query #scalability #transducer #xml
Scalable XML Query Processing using Parallel Pushdown Transducers (PO, DBT, PP), pp. 1738–1749.
VLDBVLDB-2013-ParkMS #parallel #pipes and filters #query
Parallel Computation of Skyline and Reverse Skyline Queries Using MapReduce (YP, JKM, KS), pp. 2002–2013.
VLDBVLDB-2013-SimoesGG #algorithm #approximate #information management #performance
When Speed Has a Price: Fast Information Extraction Using Approximate Algorithms (GS, HG, LG), pp. 1462–1473.
VLDBVLDB-2013-StoicaA #performance
Improving Flash Write Performance by Using Update Frequency (RS, AA), pp. 733–744.
VLDBVLDB-2013-SundaramTSMIMD #parallel #similarity #streaming #twitter
Streaming Similarity Search over one Billion Tweets using Parallel Locality-Sensitive Hashing (NS, AT, NS, TM, PI, SM, PD), pp. 1930–1941.
VLDBVLDB-2013-YuanL013a
Making Updates Disk-I/O Friendly Using SSDs (MS, KAR, MC, BB), pp. 997–1008.
CSEETCSEET-2013-ArdisBCVI #education #re-engineering #source code
Using GSwE2009 in the creation and modification of graduate software engineering programs and related curricula (MAA, SB, LC, DV, SI), pp. 109–118.
CSEETCSEET-2013-CookDSSCH #ide #reasoning #specification #web
Specification and reasoning in SE projects using a Web IDE (CTC, SDS, YSS, MS, JCC, JEH), pp. 229–238.
CSEETCSEET-2013-FortalezaVJPC #collaboration #communication #development #distributed
Using Distributed Software Development in the improvement of communication and collaboration skills in SE courses: An observational study (LLF, SRCV, OOMJ, RP, TC), pp. 139–148.
ITiCSEITiCSE-2013-Alabdulqader #visualisation
Visualizing computer ethics using infographics (EA), p. 355.
ITiCSEITiCSE-2013-Baumgartner #approach #case study #delivery #design #education #information management
Using case studies to design and deliver technology-centered computing education courses: an innovative approach from an undergraduate information systems program in singapore (IB), pp. 189–194.
ITiCSEITiCSE-2013-BeltranGP #architecture #concept #in the cloud
Using CloudSim to learn cloud computing architecture/system concepts in a graduate course (MB, AG, MP), pp. 82–87.
ITiCSEITiCSE-2013-BuckD #authentication #education #modelling
Authentic object modeling in the early computer science curriculum using objektgraph (DB, ID), p. 363.
ITiCSEITiCSE-2013-EllisHD
Developing HFOSS projects using integrated teams across levels and institutions (HJCE, GWH, JD), p. 349.
ITiCSEITiCSE-2013-Law #interactive
Interactive lectures using quick response codes (RL), p. 317.
ITiCSEITiCSE-2013-Law13a #feedback #game studies #programming #student
Using screencasts to enhance coursework feedback for game programming students (RL), p. 329.
ITiCSEITiCSE-2013-MedinaPGR #data mining #education #learning #mining #programming
Assistance in computer programming learning using educational data mining and learning analytics (CFM, JRPP, VMÁG, MdPPR), pp. 237–242.
ITiCSEITiCSE-2013-MellodgeR #arduino #case study #experience #framework #learning #platform #student
Using the arduino platform to enhance student learning experiences (PM, IR), p. 338.
ITiCSEITiCSE-2013-RowanD #learning #mobile #overview
A systematic literature review on using mobile computing as a learning intervention (MR, JD), p. 339.
ITiCSEITiCSE-2013-TrabelsiA #education #generative #network
Using network packet generators and snort rules for teaching denial of service attacks (ZT, LA), pp. 285–290.
ITiCSEITiCSE-2013-VihavainenVLP #learning #student
Scaffolding students’ learning using test my code (AV, TV, ML, MP), pp. 117–122.
SIGITESIGITE-2013-BrannockN #android #development
An early introduction to android app development for CS1 using sofia (EB, NPN), pp. 135–136.
SIGITESIGITE-2013-Cold #case study #experience
Partially flipped: experiences using POGIL (SJC), pp. 133–134.
SIGITESIGITE-2013-EllisJBHD
Developing HFOSS projects using integrated teams across levels and institutions (HJCE, SJ, DB, GWH, JD), pp. 139–140.
SIGITESIGITE-2013-GasparLBT #overview #programming #student #testing
A preliminary review of undergraduate programming students’ perspectives on writing tests, working with others, & using peer testing (AG, SL, NRB, RT), pp. 109–114.
SIGITESIGITE-2013-HeinonenHLV #agile #learning #re-engineering
Learning agile software engineering practices using coding dojo (KH, KH, ML, AV), pp. 97–102.
SIGITESIGITE-2013-HillC #development #education #framework #hardware #low cost #open source #platform #programming #student
Using a low-cost open source hardware development platform in teaching young students programming skills (LWH, SC), pp. 63–68.
SIGITESIGITE-2013-KawashD #assembly #development #game studies #programming #student #video
Using video game development to engage undergraduate students of assembly language programming (JK, RDC), pp. 71–76.
SIGITESIGITE-2013-LiG #communication #empirical #social #social media #student
Can you hear me now?: an empirical study on using social media to improve student-instructor communication (LL, RG), pp. 147–148.
SIGITESIGITE-2013-Lutz #3d #education
Enhancing information technology education (ITE) with the use of 3D printer technology (RL), pp. 157–158.
SIGITESIGITE-2013-PackR #student
Training cyber-defense and securing information assets using student blue teams (SJP, DCR), pp. 3–6.
SIGITESIGITE-2013-StokerAM #learning #virtual machine
Using virtual machines to improve learning and save resources in an introductory IT course (GS, TA, PM), pp. 91–96.
CSMRCSMR-2013-AsgharMSS #metric #requirements #traceability
Maintainability-Based Requirements Prioritization by Using Artifacts Traceability and Code Metrics (MWA, AM, AS, GS), pp. 417–420.
CSMRCSMR-2013-NerellaMW #approach #optimisation #query
An Approach for Optimization of Object Queries on Collections Using Annotations (VKSN, SKM, TW), pp. 273–282.
CSMRCSMR-2013-OuniKS #refactoring #search-based
Search-Based Refactoring Using Recorded Code Changes (AO, MK, HAS), pp. 221–230.
CSMRCSMR-2013-PanichellaMMPOPL #how #traceability
When and How Using Structural Information to Improve IR-Based Traceability Recovery (AP, CM, EM, DP, RO, DP, ADL), pp. 199–208.
CSMRCSMR-2013-ScannielloECG #gpu
Using the GPU to Green an Intensive and Massive Computation System (GS, UE, GC, CG), pp. 384–387.
CSMRCSMR-2013-SnajberkHB #component #visualisation
Visualization of Component-Based Applications Structure Using AIVA (JS, LH, PB), pp. 409–412.
CSMRCSMR-2013-TothNFS #source code #version control
Using Version Control History to Follow the Changes of Source Code Elements (ZT, GN, RF, IS), pp. 319–322.
ICPCICPC-2013-DiazBMOTL #traceability
Using code ownership to improve IR-based Traceability Link Recovery (DD, GB, AM, RO, ST, ADL), pp. 123–132.
ICSMEICSM-2013-CruzIP #development #empirical #validation
An Empirical Illustration to Validate a FLOSS Development Model Using S-Shaped Curves (AECC, HI, NP), pp. 468–471.
ICSMEICSM-2013-DitMVP #component #library #maintenance #research
Supporting and Accelerating Reproducible Research in Software Maintenance Using TraceLab Component Library (BD, EM, MLV, DP), pp. 330–339.
ICSMEICSM-2013-KhanBEL #evolution #named
eCITY: A Tool to Track Software Structural Changes Using an Evolving City (TK, HB, AE, PL), pp. 492–495.
ICSMEICSM-2013-NordOSDGK #architecture
Variations on Using Propagation Cost to Measure Architecture Modifiability Properties (RLN, IO, RSS, JD, MAG, PK), pp. 400–403.
ICSMEICSM-2013-SorOTS #approach #detection #machine learning #memory management #statistics
Improving Statistical Approach for Memory Leak Detection Using Machine Learning (VS, PO, TT, SNS), pp. 544–547.
ICSMEICSM-2013-TabaKZHN #debugging #predict
Predicting Bugs Using Antipatterns (SEST, FK, YZ, AEH, MN), pp. 270–279.
ICSMEICSM-2013-WrightJKCW #automation #refactoring #scalability
Large-Scale Automated Refactoring Using ClangMR (HKW, DJ, MK, CC, ZW), pp. 548–551.
MSRMSR-2013-AlaliBNM #detection #distance #metric
A preliminary investigation of using age and distance measures in the detection of evolutionary couplings (AA, BB, CDN, JIM), pp. 169–172.
MSRMSR-2013-AllamanisS13a #mining #modelling #repository #source code
Mining source code repositories at massive scale using language modeling (MA, CAS), pp. 207–216.
MSRMSR-2013-CampbellZXHM #analysis #detection #documentation #topic
Deficient documentation detection: a methodology to locate deficient project documentation using topic analysis (JCC, CZ, ZX, AH, JM), pp. 57–60.
MSRMSR-2013-HuW #fault #predict
Using citation influence to predict software defects (WH, KW), pp. 419–428.
MSRMSR-2013-NaguibNBH #debugging #process #recommendation
Bug report assignee recommendation using activity profiles (HN, NN, BB, DH), pp. 22–30.
MSRMSR-2013-RobbesR #developer #interactive #metric
Using developer interaction data to compare expertise metrics (RR, DR), pp. 297–300.
MSRMSR-2013-VasquezDP #analysis #development #mobile #stack overflow
An exploratory analysis of mobile development issues using stack overflow (MLV, BD, DP), pp. 93–96.
MSRMSR-2013-WangKZ #correlation #debugging #locality
Improving bug localization using correlations in crash reports (SW, FK, YZ), pp. 247–256.
SCAMSCAM-2013-NicolayNRM #javascript #type inference
Determining dynamic coupling in JavaScript using object type inference (JN, CN, CDR, WDM), pp. 126–135.
SCAMSCAM-2013-PapadakisDT #analysis #fault #mutation testing #named
Proteum/FL: A tool for localizing faults using mutation analysis (MP, MED, YLT), pp. 94–99.
WCREWCRE-2013-KomondoorBDK #domain model #modelling
Using relationships for matching textual domain models with existing code (RK, IB, DD, SK), pp. 371–380.
WCREWCRE-2013-SalesTMV #dependence #recommendation #refactoring #set
Recommending Move Method refactorings using dependency sets (VS, RT, LFM, MTV), pp. 232–241.
CIAACIAA-2013-BelliB #testing
Using Regular Grammars for Event-Based Testing (FB, MB), pp. 48–59.
ICALPICALP-v2-2013-BachrachP #big data #performance #pseudo #recommendation #sketching
Sketching for Big Data Recommender Systems Using Fast Pseudo-random Fingerprints (YB, EP), pp. 459–471.
IFMIFM-2013-MorgensternGS #game studies #incremental #induction
Solving Games Using Incremental Induction (AM, MG, KS), pp. 177–191.
IFMIFM-2013-SavaryFL #bytecode #detection #modelling #testing #verification
Detecting Vulnerabilities in Java-Card Bytecode Verifiers Using Model-Based Testing (AS, MF, JLL), pp. 223–237.
IFMIFM-2013-VekrisLDM #specification #verification
Verification of EB3 Specifications Using CADP (DV, FL, CD, RM), pp. 61–76.
RTARTA-2013-BaeEM #infinity #logic #model checking
Abstract Logical Model Checking of Infinite-State Systems Using Narrowing (KB, SE, JM), pp. 81–96.
SEFMSEFM-2013-KeshishzadehMM #automation #debugging #detection #domain-specific language #fault #smt
Early Fault Detection in DSLs Using SMT Solving and Automated Debugging (SK, AJM, MRM), pp. 182–196.
SEFMSEFM-2013-SalehKBW #detection #fault #implementation #specification #static analysis
Static Detection of Implementation Errors Using Formal Code Specification (IS, GK, MBB, YW), pp. 197–211.
SEFMSEFM-2013-SuryadevaraSMP #behaviour #verification
Verifying MARTE/CCSL Mode Behaviors Using UPPAAL (JS, CCS, FM, PP), pp. 1–15.
TLCATLCA-2013-SalvatiW #modelling #recursion
Using Models to Model-Check Recursive Schemes (SS, IW), pp. 189–204.
HaskellHaskell-2013-ClaessenP #encryption #generative #pseudo
Splittable pseudorandom number generators using cryptographic hashing (KC, MHP), pp. 47–58.
ICFPICFP-2013-AxelssonC #functional #higher-order #source code #syntax
Using circular programs for higher-order syntax: functional pearl (EA, KC), pp. 257–262.
ICFPICFP-2013-Dolan #algebra #functional #linear
Fun with semirings: a functional pearl on the abuse of linear algebra (SD), pp. 101–110.
AIIDEAIIDE-2013-ComanM #automation #generative #nondeterminism
Automated Generation of Diverse NPC-Controlling FSMs Using Nondeterministic Planning Techniques (AC, HMA).
AIIDEAIIDE-2013-DragertKV #composition #game studies #reuse
Scythe AI: A Tool for Modular Reuse of Game AI (CD, JK, CV).
AIIDEAIIDE-2013-SchenkLCGDMDZSCS #framework #independence #platform
ScriptEase II: Platform Independent Story Creation Using High-Level Patterns (KS, AL, MC, EG0, JD, RM, ND, RZ, DS, MC, JS).
CoGCIG-2013-AdrianL #approach #design #generative
An approach to level design using procedural content generation and difficulty curves (DFHA, ALSGC), pp. 1–8.
CoGCIG-2013-AlayedFN #behaviour #detection #machine learning #online
Behavioral-based cheating detection in online first person shooters using machine learning techniques (HA, FF, CN), pp. 1–8.
CoGCIG-2013-AlhejaliL #heuristic #monte carlo #programming #search-based
Using genetic programming to evolve heuristics for a Monte Carlo Tree Search Ms Pac-Man agent (AMA, SML), pp. 1–8.
CoGCIG-2013-BallingerL #injection #robust
Finding robust strategies to defeat specific opponents using case-injected coevolution (CAB, SJL), pp. 1–8.
CoGCIG-2013-EfthymiadisK
Using plan-based reward shaping to learn strategies in StarCraft: Broodwar (KE, DK), pp. 1–8.
CoGCIG-2013-Harrell #case study #modelling #network #social
Modeling player preferences in avatar customization using social network data: A case-study using virtual items in Team Fortress 2 (CUL, DFH), pp. 1–8.
CoGCIG-2013-LiuLN #behaviour #effectiveness #game studies
Using CIGAR for finding effective group behaviors in RTS game (SL0, SJL, MNN), pp. 1–8.
CoGCIG-2013-MaycockT #navigation
Enhancing touch-driven navigation using informed search in Ms. Pac-Man (SM, TT), pp. 1–2.
CoGCIG-2013-Polceanu #behaviour #named
MirrorBot: Using human-inspired mirroring behavior to pass a turing test (MP), pp. 1–8.
DiGRADiGRA-2013-SiG #interactive #social
Embodied Interactive Characters using Social Robots (MS, MGB).
DiGRADiGRA-2013-WarpefeltJV #behaviour #game studies #matrix
Analyzing the believability of game character behavior using the Game Agent Matrix (HW, MJ, HV).
FDGFDG-2013-PapahristouR #game studies #named
AnyGammon: Playing backgammon variants using any board size (NP, IR), pp. 410–412.
FDGFDG-2013-RyanSVC #education #game studies #network #security
Network Nightmares: Using games to teach networks and security (WR, JS, DV, JC), pp. 413–416.
CoGVS-Games-2013-ParaskevopoulosT #artificial reality #framework #game studies
Use of Gaming Sensors and Customised Exergames for Parkinson's Disease Rehabilitation: A Proposed Virtual Reality Framework (IP, ET), pp. 1–5.
CoGVS-Games-2013-Pignot #design #game studies #logic
Is Serious Games Design Political? The Competing Logics When Using a Game Engine (EP), pp. 1–2.
GT-VMTGT-VMT-2013-RungeKH #contract #generative #testing #visual notation
Test Case Generation Using Visual Contracts (OR, TAK, RH).
CHICHI-2013-BanNFSITH #artificial reality
Augmented endurance: controlling fatigue while handling objects by affecting weight perception using augmented reality (YB, TN, TF, SS, JI, TT, MH), pp. 69–78.
CHICHI-2013-BirnbaumBFDK #behaviour #identification
Using behavioral data to identify interviewer fabrication in surveys (BEB, GB, ADF, BD, ARK), pp. 2911–2920.
CHICHI-2013-BranzelHHSKLM0B13a #named #smarttech
GravitySpace: tracking users and their poses in a smart room using a pressure-sensing floor (AB, CH, DH, DS, MK, PL, RM, SR, PB), pp. 725–734.
CHICHI-2013-CassidyAR #game studies #mobile
Using an open card sort with children to categorize games in a mobile phone application store (BC, DSA, JCR), pp. 2287–2290.
CHICHI-2013-ChenGS #multi #student
Graduate student use of a multi-slate reading system (NC, FG, AS), pp. 1799–1808.
CHICHI-2013-CoughlanPM #collaboration #education #reuse
Building open bridges: collaborative remixing and reuse of open educational resources across organisations (TC, RP, PM), pp. 991–1000.
CHICHI-2013-DoornSG #design #experience #research #user interface
Design research by proxy: using children as researchers to gain contextual knowledge about user experience (FvD, PJS, MG), pp. 2883–2892.
CHICHI-2013-DowGW #case study
A pilot study of using crowds in the classroom (SD, EG, AW), pp. 227–236.
CHICHI-2013-GoelJMPW #mobile #named
ContextType: using hand posture information to improve mobile touch screen text entry (MG, AJ, TM, SNP, JOW), pp. 2795–2798.
CHICHI-2013-GuHHKL #named
LongPad: a touchpad using the entire area below the keyboard of a laptop computer (JG, SH, JH, SK, GL), pp. 1421–1430.
CHICHI-2013-HeklerKFB #behaviour #human-computer #research
Mind the theoretical gap: interpreting, using, and developing behavioral theory in HCI research (EBH, PVK, JF, MPB), pp. 3307–3316.
CHICHI-2013-HongYKAA #independence #network #social
Investigating the use of circles in social networks to support independence of individuals with autism (HH, SY, JGK, GDA, RIA), pp. 3207–3216.
CHICHI-2013-HuFM #community #social #social media
Whoo.ly: facilitating information seeking for hyperlocal communities using social media (YH, SDF, AMH), pp. 3481–3490.
CHICHI-2013-LomasPFK #challenge #design #education #game studies #optimisation #scalability
Optimizing challenge in an educational game using large-scale design experiments (DL, KP, JF, KRK), pp. 89–98.
CHICHI-2013-LucaZPH
Using fake cursors to secure on-screen password entry (ADL, EvZ, LP, HH), pp. 2399–2402.
CHICHI-2013-MankoffRF #research
Looking past yesterday’s tomorrow: using futures studies methods to extend the research horizon (JM, JAR, HF), pp. 1629–1638.
CHICHI-2013-MassungCCJP #community #crowdsourcing
Using crowdsourcing to support pro-environmental community activism (EM, DC, KFC, MJ, CP), pp. 371–380.
CHICHI-2013-MollersDLB #scalability
Improving touch accuracy on large tabletops using predecessor and successor (MM, ND, SL, JOB), pp. 755–758.
CHICHI-2013-NancelCPYIB #scalability
High-precision pointing on large wall displays using small handheld devices (MN, OC, EP, XDY, PPI, MBL), pp. 831–840.
CHICHI-2013-OneyHOW #named
ZoomBoard: a diminutive qwerty soft keyboard using iterative zooming for ultra-small devices (SO, CH, AO, JW), pp. 2799–2802.
CHICHI-2013-Ortega #3d #automation
3D object position using automatic viewpoint transitions (MO), pp. 193–196.
CHICHI-2013-ParkBN
The roles of touch during phone conversations: long-distance couples’ use of POKE in their homes (YP, KMB, TJN), pp. 1679–1688.
CHICHI-2013-PeckYOJC #interface #visualisation
Using fNIRS brain sensing to evaluate information visualization interfaces (EMP, BFY, AO, RJKJ, RC), pp. 473–482.
CHICHI-2013-PriorWBK #agile #development
Use of an agile bridge in the development of assistive technology (SP, AW, RB, TK), pp. 1579–1588.
CHICHI-2013-RoudautRSPLB #feedback #gesture
Gesture output: eyes-free output using a force feedback touch surface (AR, AR, CS, MP, PL, PB), pp. 2547–2556.
CHICHI-2013-ShiXC #bound #network #social
Using contextual integrity to examine interpersonal information boundary on social network sites (PS, HX, YC), pp. 35–38.
CHICHI-2013-SpauldingF #design #prototype
Design-driven narrative: using stories to prototype and build immersive design worlds (ES, HF), pp. 2843–2852.
CHICHI-2013-SutcliffeIFPSG
Improving digital handoff using the space above the table (SWTS, ZI, DRF, AP, IS, CG), pp. 735–744.
CHICHI-2013-TausczikP #feedback #realtime
Improving teamwork using real-time language feedback (YRT, JWP), pp. 459–468.
CHICHI-2013-WisemanCBGO #detection #fault
Using redundancy to detect human error (SW, ALC, DPB, SG, SO), pp. 2403–2406.
CSCWCSCW-2013-Barlow #chat
Emergent roles in decision-making tasks using group chat (JBB), pp. 1505–1514.
CSCWCSCW-2013-BatemanGM #navigation #social
Social navigation for loosely-coupled information seeking in tightly-knit groups using webwear (SB, CG, GIM), pp. 955–966.
CSCWCSCW-2013-BurkeK #difference #facebook
Using facebook after losing a job: differential benefits of strong and weak ties (MB, RK), pp. 1419–1430.
CSCWCSCW-2013-ChoiHHLS #communication #mining #social
Mining social relationship types in an organization using communication patterns (JC, SH, JH, GL, JS), pp. 295–302.
CSCWCSCW-2013-GeigerH #wiki
Using edit sessions to measure participation in wikipedia (RSG, AH), pp. 861–870.
CSCWCSCW-2013-HuangF #consistency #evaluation #reliability
Enhancing reliability using peer consistency evaluation in human computation (SWH, WTF), pp. 639–648.
CSCWCSCW-2013-JungLDAHB
Engaging robots: easing complex human-robot teamwork using backchanneling (MFJ, JJL, ND, SOA, PJH, CB), pp. 1555–1566.
CSCWCSCW-2013-RobsonHKP #network #social
Comparing the use of social networking and traditional media channels for promoting citizen science (CR, MAH, CK, JSP), pp. 1463–1468.
CSCWCSCW-2013-SmithQC #analysis #identification
Finger on the pulse: identifying deprivation using transit flow analysis (CSC, DQ, LC), pp. 683–692.
CSCWCSCW-2013-ThayerSL
Recalibrating the ratio: enacting accountability in intimate relationships using shared calendars (AT, BS, CPL), pp. 203–214.
CSCWCSCW-2013-YaroshTMA #communication #quote
“Almost touching”: parent-child remote communication using the sharetable system (SY, AT, SM, GDA), pp. 181–192.
HCIDHM-HB-2013-CaoJHK #assessment #modelling
Ergonomic Assessment of Patient Barrow Lifting Technique Using Digital Human Modeling (WC, MJ, YH, MTK), pp. 20–29.
HCIDHM-HB-2013-HuhK #estimation #image
Human Pose Estimation from Depth Image Using Visibility Estimation and Key Points (SH, GK), pp. 333–342.
HCIDHM-HB-2013-KeyvaniLBO #database #metric
Using Methods-Time Measurement to Connect Digital Humans and Motion Databases (AK, DL, GB, ), pp. 343–352.
HCIDHM-HB-2013-KuzMMS #human-computer #industrial #interactive #morphism
Using Anthropomorphism to Improve the Human-Machine Interaction in Industrial Environments (Part I) (SK, MPM, SM, CMS), pp. 76–85.
HCIDHM-HB-2013-MayerKS #human-computer #industrial #interactive #morphism
Using Anthropomorphism to Improve the Human-Machine Interaction in Industrial Environments (Part II) (MPM, SK, CMS), pp. 93–100.
HCIDHM-HB-2013-NakamuraKOOHNAKMK #artificial reality #learning #self #student #towards
The Relationship between Nursing Students’ Attitudes towards Learning and Effects of Self-learning System Using Kinect (MN, YK, JO, TO, ZH, AN, KA, NK, JM, MKP), pp. 111–116.
HCIDHM-SET-2013-BaptistaSVQCD #interactive
Using Digital Interactive Television to Promote Healthcare and Wellness Inclusive Services (AB, ÁDS, IV, CQ, MC, MJD), pp. 150–156.
HCIDHM-SET-2013-BrooksB #game studies #video
Facilitators’ Intervention Variance and Outcome Influence When Using Video Games with Fibromyalgia Patients (ALB, EPB), pp. 163–172.
HCIDHM-SET-2013-KosugeIM #case study #multi
A Study for Conducting Waves by Using the Multi-channel Surface EMG (TK, NI, KM), pp. 223–231.
HCIDHM-SET-2013-MurataKEH #behaviour #metric #predict
Prediction of Drowsy Driving Using Behavioral Measures of Drivers — Change of Neck Bending Angle and Sitting Pressure Distribution (AM, TK, TE, TH), pp. 78–87.
HCIDHM-SET-2013-MurataKMH
Proposal of Automotive 8-directional Warning System That Makes Use of Tactile Apparent Movement (AM, SK, MM, TH), pp. 98–107.
HCIDHM-SET-2013-PuchWFP #evaluation #interactive #simulation
Evaluation of Drivers Interaction with Assistant Systems Using Criticality Driven Guided Simulation (SP, BW, MF, TP), pp. 108–117.
HCIDHM-SET-2013-YangYF #safety
Predicating the Safety of Airport Approaches Using a Cognitive Pilot Model (CY, TY, SF), pp. 126–133.
HCIDUXU-CXC-2013-BamasakBAAAA #artificial reality #social
Improving Autistic Children’s Social Skills Using Virtual Reality (OB, RB, HAT, SAH, GAS, MAH), pp. 342–351.
HCIDUXU-CXC-2013-LawrenceMPFSB #interactive #visualisation
Investigation of Interaction Modalities Designed for Immersive Visualizations Using Commodity Devices in the Classroom (KL, AM, NP, TF, JS, AUB), pp. 209–218.
HCIDUXU-CXC-2013-PlogmannJJR #development #evaluation #knowledge-based #risk management
Development and Evaluation of a Knowledge-Based Method for the Treatment of Use-Oriented and Technical Risks Using the Example of Medical Devices (SP, AJ, AJT, KR), pp. 452–461.
HCIDUXU-CXC-2013-Said #network #social
Young Egyptians Use of Social Networks and the January 2011 Revolution (GRES), pp. 38–43.
HCIDUXU-NTE-2013-AyanogluRDNT #artificial reality #design
Using Virtual Reality to Examine Hazard Perception in Package Design (HA, FR, ED, PN, LT), pp. 30–39.
HCIDUXU-NTE-2013-DinisDNTVR #artificial reality #case study #design
Evaluating Emotional Responses to the Interior Design of a Hospital Room: A Study Using Virtual Reality (SD, ED, PN, LT, EV, FR), pp. 475–483.
HCIDUXU-NTE-2013-FeijsKSL #design
Design for Relaxation during Milk Expression Using Biofeedback (LMGF, JK, NHvS, MvL), pp. 494–503.
HCIDUXU-NTE-2013-KakaraNM #behaviour #database #design #geometry #interactive
Interaction Design Using a Child Behavior-Geometry Database (HK, YN, HM), pp. 95–104.
HCIDUXU-NTE-2013-KulkarniW #energy
Classifying Energy-Related Events Using Electromagnetic Field Signatures (ASK, KCW), pp. 105–111.
HCIDUXU-NTE-2013-Lam #interactive
Creating Instantly Disappearing Prints Using Thermochromic Paint and Thermal Printer in an Interactive Art Installation (MLL), pp. 290–295.
HCIDUXU-NTE-2013-ReisDR #usability
Main Usability Issues in Using Virtual Environments for Older Population Warning Studies (LR, ED, FR), pp. 189–198.
HCIDUXU-NTE-2013-Shieh #design #segmentation
Designing a Product Satisfaction Model Using Customer Segmentation and Information Consolidation (MDS), pp. 568–577.
HCIDUXU-PMT-2013-BuchdidPB #design
Designing iDTV Applications from Participatory Use of Patterns (SBB, RP, MCCB), pp. 459–468.
HCIDUXU-PMT-2013-ChynalSS #data analysis #evaluation #eye tracking #usability
Remote Usability Evaluation Using Eye Tracking Enhanced with Intelligent Data Analysis (PC, JS, JMS), pp. 212–221.
HCIDUXU-PMT-2013-JiangL #adaptation #effectiveness #matrix
Understand System’s Relative Effectiveness Using Adapted Confusion Matrix (NJ, HL), pp. 294–302.
HCIDUXU-PMT-2013-KitamuraKNSYM #community
Community Participation Support Using an ICF-Based Community Map (SK, KK, YN, KIS, JY, HM), pp. 516–524.
HCIDUXU-PMT-2013-PrisacariH #design
Using Eye-Tracking to Test and Improve Website Design (AP, TH), pp. 389–398.
HCIDUXU-WM-2013-GencerBZV #framework #machine learning #mobile
A New Framework for Increasing User Engagement in Mobile Applications Using Machine Learning Techniques (MG, GB, ÖZ, TV), pp. 651–659.
HCIDUXU-WM-2013-Iitaka
ARS Module of Contents Management System Using Cell Phones (TI), pp. 682–690.
HCIDUXU-WM-2013-KondoK #development #evaluation #image #interactive #prototype #visual notation
Trial of Diagnostic to Find Preferable Job Using the Visual Image Information Interaction: Prototype Development and Evaluation in Global Human Resources Matching Site (AK, NK), pp. 525–532.
HCIDUXU-WM-2013-MinJ #functional #named
TRIGGER: Maximizing Functional Effect of Using Products (KBM, ECJ), pp. 385–391.
HCIHCI-AMTE-2013-AkiyoshiT #estimation #eye tracking #framework #interface #learning
An Estimation Framework of a User Learning Curve on Web-Based Interface Using Eye Tracking Equipment (MA, HT), pp. 159–165.
HCIHCI-AMTE-2013-Bevan #documentation #industrial
Using the Common Industry Format to Document the Context of Use (NB), pp. 281–289.
HCIHCI-AMTE-2013-GuWYL #design #interactive
A Color Schemer for Webpage Design Using Interactive Mood Board (ZG, ZW, JY, JL), pp. 555–564.
HCIHCI-AMTE-2013-HirataY #design pattern #logic #user interface
A Logical Design Method for User Interface Using GUI Design Patterns (IH, TY), pp. 361–370.
HCIHCI-AMTE-2013-HumayounEE #case study #framework #mobile #platform
Developing Mobile Apps Using Cross-Platform Frameworks: A Case Study (SRH, SE, AE), pp. 371–380.
HCIHCI-AS-2013-BergmansS #behaviour #mobile #persuasion
Reducing Speeding Behavior in Young Drivers Using a Persuasive Mobile Application (AB, SS), pp. 541–550.
HCIHCI-AS-2013-CharoenpitO #biology
A New E-learning System Focusing on Emotional Aspect Using Biological Signals (SC, MO), pp. 343–350.
HCIHCI-AS-2013-DePaloPS #documentation #summary
Healthcare Interoperability: CDA Documents Consolidation Using Transport Record Summary (TRS) Construction (PD, KEP, YTS), pp. 56–65.
HCIHCI-AS-2013-HarunBON #learning
Refining Rules Learning Using Evolutionary PD (AFH, SB, CO, NLMN), pp. 376–385.
HCIHCI-AS-2013-HuseyinovT #algebra #evaluation #fuzzy
Evaluation of Computer Algebra Systems Using Fuzzy AHP at the Universities of Cyprus (IH, FST), pp. 391–397.
HCIHCI-AS-2013-KrauseB #information management #process
Subjective Ratings in an Ergonomic Engineering Process Using the Example of an In-Vehicle Information System (MK, KB), pp. 596–605.
HCIHCI-AS-2013-KroesS #mobile #persuasion
Empowering Young Adolescents to Choose the Healthy Lifestyle: A Persuasive Intervention Using Mobile Phones (LK, SS), pp. 117–126.
HCIHCI-AS-2013-LimaRSBSO #learning
Innovation in Learning — The Use of Avatar for Sign Language (TL, MSR, TAS, AB, ES, HSdO), pp. 428–433.
HCIHCI-AS-2013-MatsumotoAK #development #email #learning #word
Development of Push-Based English Words Learning System by Using E-Mail Service (SM, MA, TK), pp. 444–453.
HCIHCI-AS-2013-Rauch #enterprise #gamification
Best Practices for Using Enterprise Gamification to Engage Employees and Customers (MR), pp. 276–283.
HCIHCI-AS-2013-TakahashiISUSHO #biology #eye tracking
Proposal for Driver Distraction Indexes Using Biological Signals Including Eye Tracking (NT, SI, HS, SU, YS, KH, MO), pp. 647–653.
HCIHCI-AS-2013-TsumoriN #design #evaluation
Design and Evaluation of Training System for Numerical Calculation Using Questions in SPI2 (ST, KN), pp. 511–520.
HCIHCI-AS-2013-YajimaG
The Proposal of the Remote Consultation Service System Using the Outline Function for Consultation (HY, TG), pp. 216–225.
HCIHCI-III-2013-AnKK #development #interface #usability
Development of a Virtual Keyboard System Using a Bio-signal Interface and Preliminary Usability Test (KOA, DHK, JK), pp. 3–9.
HCIHCI-III-2013-HeLWG #image #segmentation
Semi-supervised Remote Sensing Image Segmentation Using Dynamic Region Merging (NH, KL, YW, YG), pp. 153–162.
HCIHCI-III-2013-IteyaMK #analysis #visual notation
Responses Analysis of Visual and Linguistic Information on Digital Signage Using fNIRS (SI, AM, TK), pp. 411–420.
HCIHCI-III-2013-MiwaWS #feedback #recognition #reliability #robust
Robust Face Recognition System Using a Reliability Feedback (SM, SW, MS), pp. 178–185.
HCIHCI-III-2013-SakamotoSYO #3d #metric
Evaluating Emotional State during 3DTV Viewing Using Psychophysiological Measurements (KS, SS, KY, AO), pp. 353–361.
HCIHCI-III-2013-ShinKS #image #probability #retrieval
Affect-Based Retrieval of Landscape Images Using Probabilistic Affective Model (YS, EYK, TES), pp. 362–371.
HCIHCI-III-2013-TsurudaHYI #generative #mobile
Generation of Facial Expression Emphasized with Cartoon Techniques Using a Cellular-Phone-Type Teleoperated Robot with a Mobile Projector (YT, MH, HY, YI), pp. 391–400.
HCIHCI-III-2013-Yang-MaoLLZW #evaluation #image
Evaluation of Mono/Binocular Depth Perception Using Virtual Image Display (SFYM, YTL, MHL, WJZ, YlW), pp. 483–490.
HCIHCI-III-2013-YangZZJXW #detection #multi #realtime
Depth Camera Based Real-Time Fingertip Detection Using Multi-view Projection (WY, ZZ, XZ, LJ, CX, PW), pp. 254–261.
HCIHCI-III-2013-ZhanZSY #image #multi #re-engineering #visual notation
Visual Image Reconstruction from fMRI Activation Using Multi-scale Support Vector Machine Decoders (YZ, JZ, SS, LY), pp. 491–497.
HCIHCI-IMT-2013-EbisawaF #detection #video
Head-Free, Remote Gaze Detection System Based on Pupil-Corneal Reflection Method with Using Two Video Cameras — One-Point and Nonlinear Calibrations (YE, KF), pp. 205–214.
HCIHCI-IMT-2013-HammerB #realtime #robust
Robust Hand Tracking in Realtime Using a Single Head-Mounted RGB Camera (JHH, JB), pp. 252–261.
HCIHCI-IMT-2013-LeeBN #visual notation
Use of Reference Frame in Haptic Virtual Environments: Implications for Users with Visual Impairments (JYL, SB, CSN), pp. 610–617.
HCIHCI-IMT-2013-LeeT #gesture #interactive
Finger Controller: Natural User Interaction Using Finger Gestures (UL, JT), pp. 281–290.
HCIHCI-IMT-2013-MurataHMH #case study #interface
Study on Character Input Methods Using Eye-gaze Input Interface (AM, KH, MM, TH), pp. 320–329.
HCIHCI-IMT-2013-PinoTIK #2d #3d #artificial reality #evaluation #performance
Using Kinect for 2D and 3D Pointing Tasks: Performance Evaluation (AP, ET, NI, GK), pp. 358–367.
HCIHCI-IMT-2013-SakairiTKG #editing #multi #visual notation
Multi-layer Control and Graphical Feature Editing Using Server-Side Rendering on Ajax-GIS (TS, TT, KK, YG), pp. 722–729.
HCIHCI-IMT-2013-SakamotoTT #music
A Method for Discussing Musical Expression between Music Ensemble Players Using a Web-Based System (TS, ST, JT), pp. 730–739.
HCIHCI-IMT-2013-ShimizuNS #algorithm #generative #search-based
System of Generating Japanese Sound Symbolic Expressions Using Genetic Algorithm (YS, TN, MS), pp. 126–134.
HCIHCI-IMT-2013-SrivastavaT #analysis #realtime
Real Time Mono-vision Based Customizable Virtual Keyboard Using Finger Tip Speed Analysis (SS, RCT), pp. 497–505.
HCIHCI-IMT-2013-TungGKM #human-computer #interactive #multimodal
Multi-party Human-Machine Interaction Using a Smart Multimodal Digital Signage (TT, RG, TK, TM), pp. 408–415.
HCIHCI-IMT-2013-WangGHL #collaboration #communication #elicitation #nondeterminism #speech
A Knowledge Elicitation Study for Collaborative Dialogue Strategies Used to Handle Uncertainties in Speech Communication While Using GIS (HW, AG, DH, RL), pp. 135–144.
HCIHCI-IMT-2013-YoshikawaMKST
A Remote Pointing Technique Using Pull-out (TY, YM, TK, BS, JT), pp. 416–426.
HCIHCI-UC-2013-ItouTM #communication #development #interface
Development of Communication Support System at Mealtimes Using Tabletop Interface (JI, ST, JM), pp. 174–182.
HCIHCI-UC-2013-KuramochiOTHN #analysis #community #graph #network #semantics #twitter
Applying to Twitter Networks of a Community Extraction Method Using Intersection Graph and Semantic Analysis (TK, NO, KT, YH, SN), pp. 314–323.
HCIHCI-UC-2013-LinHW #learning #visual notation
Establishing a Cognitive Map of Public Place for Blind and Visual Impaired by Using IVEO Hands-On Learning System (QWL, SLH, JLW), pp. 193–198.
HCIHCI-UC-2013-OkiTS #named
AugmentedBacklight: Expansion of LCD Backlights Using Lighting Methods in the Real World (MO, KT, IS), pp. 209–216.
HCIHCI-UC-2013-TsaiHCL #communication #named #network #online #product line #social
Memotree: Using Online Social Networking to Strengthen Family Communication (THT, YLH, HTC, YWL), pp. 359–367.
HCIHIMI-D-2013-AsaoSK #estimation
Estimation of Driver’s Steering Intention by Using Mechanical Impedance (TA, SS, KK), pp. 3–11.
HCIHIMI-D-2013-EnokidaKSAII #information management #metric
Assessing Mental Workload of In-Vehicle Information Systems by Using Physiological Metrics (SE, KK, SS, TA, TI, KI), pp. 584–593.
HCIHIMI-D-2013-IizukaNG #case study #interactive #scalability
A Study for Personal Use of the Interactive Large Public Display (SI, WN, KG), pp. 55–61.
HCIHIMI-D-2013-KotaniKSA #analysis #development #memory management
Analysis of Spatiotemporal Memory Using Air-Jets as Tactile Stimuli for Development of Noncontact Tactile Displays (KK, NK, SS, TA), pp. 620–627.
HCIHIMI-D-2013-ManiwaKSA
Changes in Posture of the Upper Extremity Through the Use of Various Sizes of Tablets and Characters (HM, KK, SS, TA), pp. 89–96.
HCIHIMI-D-2013-MorodomeSAK #biology #metric
Non-contact Measurement of Biological Signals Using Microwave Radar (HM, SS, TA, KK), pp. 117–125.
HCIHIMI-D-2013-NakanoOM #3d #artificial reality
Leaning Origami Using 3D Mixed Reality Technique (AN, MO, HM), pp. 126–132.
HCIHIMI-D-2013-ShengLD #comprehension #eye tracking
Eyes Don’t Lie: Understanding Users’ First Impressions on Websites Using Eye Tracking (HS, NSL, SD), pp. 635–641.
HCIHIMI-D-2013-SugayaSNT #recognition
Basic Investigation into Hand Shape Recognition Using Colored Gloves Taking Account of the Peripheral Environment (TS, TS, HN, HT), pp. 133–142.
HCIHIMI-D-2013-UedaA #people #predict
Prediction of the Concern of People Using CGM (YU, YA), pp. 284–292.
HCIHIMI-D-2013-YanagimotoSY #classification #estimation #network #sentiment #word
Word Classification for Sentiment Polarity Estimation Using Neural Network (HY, MS, AY), pp. 669–677.
HCIHIMI-HSM-2013-Campbell #safety #simulation
Safety Culture: An Examination of the Relationship between a Safety Management System and Pilot Judgment Using Simulation in Aeronautics (SAC), pp. 453–459.
HCIHIMI-HSM-2013-ChunJHJSLCJ #natural language
Pathway Construction and Extension Using Natural Language Processing (HWC, SJJ, MNH, CHJ, SKS, SL, SPC, HJ), pp. 32–38.
HCIHIMI-HSM-2013-DamrongratKI #multi #ontology #representation #simulation
Increasing Situational Awareness of Indoor Emergency Simulation Using Multilayered Ontology-Based Floor Plan Representation (CD, HK, MI), pp. 39–45.
HCIHIMI-HSM-2013-KimuraHTN #evaluation #performance
Determination of Alarm Setpoint for Alarm System Rationalization Using Performance Evaluation (NK, TH, KT, MN), pp. 507–514.
HCIHIMI-HSM-2013-LeeJ #analysis #simulation
Task Analysis of Soft Control Operations Using Simulation Data in Nuclear Power Plants (SJL, WJ), pp. 524–529.
HCIHIMI-HSM-2013-MiyataWI #development
Development of a Chest X-ray Examination Support System for Foreigners Using a Personal Digital Assistant (MM, CW, MI), pp. 285–290.
HCIHIMI-HSM-2013-SaitohI #detection #learning #visualisation
Visualization of Anomaly Data Using Peculiarity Detection on Learning Vector Quantization (FS, SI), pp. 181–188.
HCIHIMI-HSM-2013-SakuradaH #interface #physics
A New Presence Display System Using Physical Interface Running on IP-Phones (TS, YH), pp. 411–420.
HCIHIMI-HSM-2013-SasakiHAI #simulation
Train Ride Simulation Using Assist Strap Device (TS, KH, TA, YI), pp. 189–197.
HCIHIMI-HSM-2013-Wesugi #approach #design #experience #novel #simulation
Design Approach of Simulation Exercise with Use of Device and Its Significance — Design of Novel Device for Realistic Experience of Being a Hemiplegia Patient (SW), pp. 315–324.
HCIHIMI-LCCB-2013-AntolosLLV #analysis
Burglary Crime Analysis Using Logistic Regression (DA, DL, AL, DAV), pp. 549–558.
HCIHIMI-LCCB-2013-BrynielssonJL #communication #design #process #prototype #social #social media #video
Using Video Prototyping as a Means to Involve Crisis Communication Personnel in the Design Process: Innovating Crisis Management by Creating a Social Media Awareness Tool (JB, FJ, SL), pp. 559–568.
HCIHIMI-LCCB-2013-ItaiEM #design
Design of Space for Expression Media with the Use of Fog (SI, YE, YM), pp. 210–218.
HCIHIMI-LCCB-2013-KometaniTFA #education #feedback #student #video
Video Feedback System for Teaching Improvement Using Students’ Sequential and Overall Teaching Evaluations (YK, TT, TF, TA), pp. 79–88.
HCIHIMI-LCCB-2013-NahTRV #education #game studies #gamification
Gamification of Education Using Computer Games (FFHN, VRT, SR, PRV), pp. 99–107.
HCIHIMI-LCCB-2013-NakaI #3d #communication #gesture #web
Consideration of the Effect of Gesture Exaggeration in Web3D Communication Using 3DAgent (TN, TI), pp. 511–520.
HCIHIMI-LCCB-2013-TakahashiA #mining
User Needs Search Using Text Mining (YT, YA), pp. 607–615.
HCIHIMI-LCCB-2013-YoshidaOSNSH #assessment #comprehension #concept
Instantaneous Assessment of Learners’ Comprehension for Lecture by Using Kit-Build Concept Map System (KY, TO, KS, YN, MS, TH), pp. 175–181.
HCIOCSC-2013-BourimiK #case study #collaboration #community #experience #online
Experiences by Using AFFINE for Building Collaborative Applications for Online Communities (MB, DK), pp. 345–354.
HCIOCSC-2013-FardounZC #collaboration #education #facebook #process
Using Facebook for Collaborative Academic Activities in Education (HMF, BZ, APC), pp. 137–146.
HCIOCSC-2013-KashimaMM #content management
Effects of Sharing Farmers’ Information Using Content Management System (TK, SM, TM), pp. 296–303.
HCIOCSC-2013-WangA #network #social
Adult Learners and Their Use of Social Networking Sites (Y(W, JA), pp. 222–229.
HCIOCSC-2013-YuanOXS #classification #overview #sentiment #web
Sentiment Classification of Web Review Using Association Rules (MY, YO, ZX, HS), pp. 442–450.
VISSOFTVISSOFT-2013-GouveiaCA #fault #html #locality #visualisation
Using HTML5 visualizations in software fault localization (CG, JC, RA), pp. 1–10.
VISSOFTVISSOFT-2013-Wehrwein #lightweight #matrix #reverse engineering #visualisation
Lightweight software reverse engineering using augmented matrix visualizations (BW), pp. 1–4.
CAiSECAiSE-2013-FahlandG #design #enterprise #integration #middleware #petri net
Analyzing and Completing Middleware Designs for Enterprise Integration Using Coloured Petri Nets (DF, CG), pp. 400–416.
EDOCEDOC-2013-GallegeGHR #contract #monitoring #trust
Trustworthy Service Selection Using Long-Term Monitoring of Trust Contracts (LSG, DG, JHH, RRR), pp. 195–200.
EDOCEDOC-2013-PlataniotisKP #architecture #design #enterprise #graph
Relating Decisions in Enterprise Architecture Using Decision Design Graphs (GP, SdK, HAP), pp. 139–146.
EDOCEDOC-2013-SelwayGMS #approach #formal method #natural language #specification
Formalising Natural Language Specifications Using a Cognitive Linguistics/Configuration Based Approach (MS, GG, WM, MS), pp. 59–68.
EDOCEDOC-2013-SousaMGM #approach #architecture #data type #enterprise #risk management
Assessing Risks and Opportunities in Enterprise Architecture Using an Extended ADT Approach (SS, DM, KG, NM), pp. 81–90.
ICEISICEIS-J-2013-KalsingITN13a #incremental #legacy #mining #modelling #process
Re-learning of Business Process Models from Legacy System Using Incremental Process Mining (ACK, CI, LHT, GSdN), pp. 314–330.
ICEISICEIS-v1-2013-DombiD #modelling
Modelling Complex Systems using the Pliant Cognitive Map (JDD, JD), pp. 506–512.
ICEISICEIS-v1-2013-IsmailHQDE #clustering #evaluation #query #simulation
Clustering using Hypergraph for P2P Query Routing — Simulation and Evaluation (AI, MH, MQ, ND, MES), pp. 247–254.
ICEISICEIS-v1-2013-MaghrabyFRA #grid #image #retrieval
A Grid based Medical Image Retrieval System using Alchemi (FM, HMF, MR, MA), pp. 224–230.
ICEISICEIS-v1-2013-MoritaN #classification
Classification Model using Contrast Patterns (HM, MN), pp. 334–339.
ICEISICEIS-v1-2013-QasimR #analysis #classification #evaluation #linear
Classification of Hepatitis Patients and Fibrosis Evaluation using Decision Trees and Linear Discriminant Analysis (RQ, RMR), pp. 239–246.
ICEISICEIS-v1-2013-SimrinAD #heuristic #problem
A Lagrangian Relaxation based Heuristic for the Static Berth Allocation Problem using the Cutting Plane Method (ASS, NNA, AHD), pp. 565–569.
ICEISICEIS-v2-2013-KalsingITN #incremental #learning #legacy #mining #modelling #process
Evolutionary Learning of Business Process Models from Legacy Systems using Incremental Process Mining (ACK, CI, LHT, GSdN), pp. 58–69.
ICEISICEIS-v2-2013-LiL #agile #network #object-oriented #predict #process
Predicting Fault-proneness of Object-Oriented System Developed with Agile Process using Learned Bayesian Network (LL, HL), pp. 5–16.
ICEISICEIS-v2-2013-Milosz #case study #enterprise #legacy #performance #testing
Performance Testing of New Enterprise Applications using Legacy Load Data — A HIS Case Study (MM), pp. 151–156.
ICEISICEIS-v2-2013-OliveiraS #aspect-oriented #modelling #requirements
Modeling Aspects in Requirements using SysML Extensions (KSdO, MdSS), pp. 126–133.
ICEISICEIS-v2-2013-PradoB #evolution
Perspectives on using Actor-Network Theory and Organizational Semiotics to Address Organizational Evolution (ABP, MCCB), pp. 173–181.
ICEISICEIS-v2-2013-SantaN #framework #learning #modelling
Modeling the Creation of a Learning Organization by using the Learning Organization Atlas Framework (MS, SN), pp. 278–285.
ICEISICEIS-v2-2013-TomasSGGA #api #approach #architecture #framework
Synaptic City — An Architectural Approach using an OSGI Infrastructure and GMaps API to Build a City Simulator (GHRPT, WMdS, KG, VCG, ), pp. 427–434.
ICEISICEIS-v2-2013-TounsiHKKD #design pattern #modelling #specification
Using SoaML Models and Event-B Specifications for Modeling SOA Design Patterns (IT, ZH, MHK, AHK, KD), pp. 294–301.
ICEISICEIS-v3-2013-ChinoRAOGTT #collaboration #framework #gesture #information management #interactive
The NInA Framework — Using Gesture to Improve Interaction and Collaboration in Geographical Information Systems (DYTC, LASR, LPSA, WDO, RRdVG, CTJ, AJMT), pp. 58–66.
ICEISICEIS-v3-2013-DiefenthalerB #analysis #architecture #enterprise #semantics #web
Gap Analysis in Enterprise Architecture using Semantic Web Technologies (PD, BB), pp. 211–220.
ICEISICEIS-v3-2013-LangermeierBB #approach #architecture #distributed #enterprise #framework #modelling
A Model Driven Approach for Open Distributed Systems using an Enterprise Architecture Framework (ML, AJB, BB), pp. 284–291.
ICEISICEIS-v3-2013-Plechawska-WojcikLW #assessment #case study #experience #user interface #web
Assessment of User Experience with Responsive Web Applications using Expert Method and Cognitive Walkthrough — A Case Study (MPW, SLM, LW), pp. 111–118.
CIKMCIKM-2013-AyadiTDJH #correlation #image #modelling #query #retrieval
Correlating medical-dependent query features with image retrieval models using association rules (HA, MT, MD, MBJ, JXH), pp. 299–308.
CIKMCIKM-2013-ChanLKLBR #graph #matrix
Discovering latent blockmodels in sparse and noisy graphs using non-negative matrix factorisation (JC, WL, AK, CL, JB, KR), pp. 811–816.
CIKMCIKM-2013-ChenMLHCG #topic
Discovering coherent topics using general knowledge (ZC, AM, BL, MH, MC, RG), pp. 209–218.
CIKMCIKM-2013-ChuklinSHSR
Evaluating aggregated search using interleaving (AC, AS, KH, PS, MdR), pp. 669–678.
CIKMCIKM-2013-HermanssonKJJD #ambiguity #graph #kernel
Entity disambiguation in anonymized graphs using graph kernels (LH, TK, FJ, VJ, DPD), pp. 1037–1046.
CIKMCIKM-2013-KharitonovMSO
Using historical click data to increase interleaving sensitivity (EK, CM, PS, IO), pp. 679–688.
CIKMCIKM-2013-NguyenLT #code review #performance #set
Using micro-reviews to select an efficient set of reviews (TSN, HWL, PT), pp. 1067–1076.
CIKMCIKM-2013-ShirakawaNHN #metric #probability #semantics #similarity #wiki
Probabilistic semantic similarity measurements for noisy short texts using Wikipedia entities (MS, KN, TH, SN), pp. 903–908.
CIKMCIKM-2013-SordoniHN #information retrieval #interactive #modelling #quantum #topic
Modeling latent topic interactions using quantum interference for information retrieval (AS, JH, JYN), pp. 1197–1200.
CIKMCIKM-2013-VanderbauwhedeFACM #throughput
High throughput filtering using FPGA-acceleration (WV, AF, LA, SRC, MM), pp. 1245–1248.
CIKMCIKM-2013-WijayaTM #named #ontology #web
PIDGIN: ontology alignment using web text as interlingua (DTW, PPT, TMM), pp. 589–598.
ECIRECIR-2013-AlhindiKF #case study #interactive #summary
A Pilot Study on Using Profile-Based Summarisation for Interactive Search Assistance (AA, UK, CF), pp. 672–675.
ECIRECIR-2013-AnderssonMHR #retrieval
Exploring Patent Passage Retrieval Using Nouns Phrases (LA, PM, AH, AR), pp. 676–679.
ECIRECIR-2013-ChenC #analysis #multi #network #topic
A Topic Person Multi-polarization Method Using Friendship Network Analysis (ZYC, CCC), pp. 688–692.
ECIRECIR-2013-ChuklinSR #behaviour
Using Intent Information to Model User Behavior in Diversified Search (AC, PS, MdR), pp. 1–13.
ECIRECIR-2013-Franco-SalvadorGR #detection #multi #network #semantics
Cross-Language Plagiarism Detection Using a Multilingual Semantic Network (MFS, PG, PR), pp. 710–713.
ECIRECIR-2013-JeongM #classification #dependence #recognition
Using WordNet Hypernyms and Dependency Features for Phrasal-Level Event Recognition and Type Classification (YJ, SHM), pp. 267–278.
ECIRECIR-2013-LagnierDGG #information management #network #predict #social
Predicting Information Diffusion in Social Networks Using Content and User’s Profiles (CL, LD, ÉG, PG), pp. 74–85.
ECIRECIR-2013-MorenoD #clustering #image #interface #mobile #web
Using Text-Based Web Image Search Results Clustering to Minimize Mobile Devices Wasted Space-Interface (JGM, GD), pp. 532–544.
ECIRECIR-2013-NguyenTT #classification #learning #rank
Folktale Classification Using Learning to Rank (DN, DT, MT), pp. 195–206.
ECIRECIR-2013-RaiberK #effectiveness #metric #predict
Using Document-Quality Measures to Predict Web-Search Effectiveness (FR, OK), pp. 134–145.
ICMLICML-c1-2013-ChenLYY #functional #matrix
General Functional Matrix Factorization Using Gradient Boosting (TC, HL, QY, YY), pp. 436–444.
ICMLICML-c1-2013-GilboaSCG #approximate #multi #process #scalability
Scaling Multidimensional Gaussian Processes using Projected Additive Approximations (EG, YS, JPC, EG), pp. 454–461.
ICMLICML-c1-2013-LiLSHD #generative #learning
Learning Hash Functions Using Column Generation (XL, GL, CS, AvdH, ARD), pp. 142–150.
ICMLICML-c1-2013-WulsinFL #correlation #markov #parsing #process
Parsing epileptic events using a Markov switching process model for correlated time series (DW, EBF, BL), pp. 356–364.
ICMLICML-c3-2013-HockingRVB #detection #learning
Learning Sparse Penalties for Change-point Detection using Max Margin Interval Regression (TH, GR, JPV, FRB), pp. 172–180.
ICMLICML-c3-2013-IshtevaPS #order
Unfolding Latent Tree Structures using 4th Order Tensors (MI, HP, LS), pp. 316–324.
ICMLICML-c3-2013-WanZZLF #network
Regularization of Neural Networks using DropConnect (LW, MDZ, SZ, YL, RF), pp. 1058–1066.
KDDKDD-2013-AltinigneliPB #parallel
Massively parallel expectation maximization using graphics processing units (MCA, CP, CB), pp. 838–846.
KDDKDD-2013-JhaSP #algorithm #performance #streaming
A space efficient streaming algorithm for triangle counting using the birthday paradox (MJ, CS, AP), pp. 589–597.
KDDKDD-2013-JinSSBWR #modelling #named
Forex-foreteller: currency trend modeling using news articles (FJ, NS, PS, PB, WW, NR), pp. 1470–1473.
KDDKDD-2013-KuoYHKL #network #predict #social #statistics
Unsupervised link prediction using aggregative statistics on heterogeneous social networks (TTK, RY, YYH, PHK, SDL), pp. 775–783.
KDDKDD-2013-LeeAC #realtime #twitter
Real-time disease surveillance using Twitter data: demonstration on flu and cancer (KL, AA, ANC), pp. 1474–1477.
KDDKDD-2013-LiuYK #adaptation #modelling #process
Adaptive collective routing using gaussian process dynamic congestion models (SL, YY, RK), pp. 704–712.
KDDKDD-2013-LuceyOCRM
Assessing team strategy using spatiotemporal data (PL, DO, GPKC, JR, IM), pp. 1366–1374.
KDDKDD-2013-MukherjeeKLWHCG #behaviour
Spotting opinion spammers using behavioral footprints (AM, AK, BL, JW, MH, MC, RG), pp. 632–640.
KDDKDD-2013-Neumann #big data #problem
Using “big data” to solve “small data” problems (CN), p. 1140.
KDDKDD-2013-RaederPDSP #clustering #reduction #scalability
Scalable supervised dimensionality reduction using clustering (TR, CP, BD, OS, FJP), pp. 1213–1221.
KDDKDD-2013-StitelmanPDHRP #detection #network #online #scalability
Using co-visitation networks for detecting large scale online display advertising exchange fraud (OS, CP, BD, RH, TR, FJP), pp. 1240–1248.
KDDKDD-2013-Vatsavai #approach #learning #multi
Gaussian multiple instance learning approach for mapping the slums of the world using very high resolution imagery (RRV), pp. 1419–1426.
KDDKDD-2013-WangS #classification #multi #relational #social
Multi-label relational neighbor classification using social context features (XW, GS), pp. 464–472.
KDIRKDIR-KMIS-2013-BaliBBG #information management #tool support
Using Knowledge Management Tools and Techniques to Increase the Rate of Attendance at Breast Screening (RKB, JB, VB, MCG), pp. 344–350.
KDIRKDIR-KMIS-2013-CheetiSC #adaptation #approach #classification #naive bayes #sentiment #syntax
Cross-domain Sentiment Classification using an Adapted Naïve Bayes Approach and Features Derived from Syntax Trees (SC, AS, DC), pp. 169–176.
KDIRKDIR-KMIS-2013-CostaS #assessment #concept #enterprise #security
Enterprise to Cloud Security Assessment — A Method using OSSTMM 3.0 Concepts (RC, CS), pp. 571–578.
KDIRKDIR-KMIS-2013-DuarteFD #clustering #constraints #validation
Data Clustering Validation using Constraints (JMMD, ALNF, FJFD), pp. 17–27.
KDIRKDIR-KMIS-2013-Ibarra-SanchezPO #analysis #case study #risk management
Hospital Risk Management using Healthcare Failure Mode and Effects Analysis — A Case Study on Ventilators Whithin an Intensive Care Unit (MAIS, ABPA, MROP), pp. 328–335.
KDIRKDIR-KMIS-2013-ItalaH #behaviour #diagrams #process
Using Stocks and Flows Diagrams to Understand Business Process Behavior (TI, MH), pp. 552–558.
KDIRKDIR-KMIS-2013-Lindner #constraints #parsing #random
Using Conditional Random Fields with Constraints to Train Support Vector Machines — Locating and Parsing Bibliographic References (SL), pp. 28–36.
KDIRKDIR-KMIS-2013-NartTF #automation #personalisation #recommendation
Personalized Recommendation and Explanation by using Keyphrases Automatically extracted from Scientific Literature (DDN, CT, FF), pp. 96–103.
KDIRKDIR-KMIS-2013-RauchS #case study #mining
Using Domain Knowledge in Association Rules Mining — Case Study (JR, MS), pp. 104–111.
KDIRKDIR-KMIS-2013-SaidiDZC #process #requirements #semantics #towards #unification
Towards Unification of Requirements Engineering Approaches using Semantics-based Process (IES, TD, NZ, PJC), pp. 443–450.
KDIRKDIR-KMIS-2013-SousaM #tool support #web
Diagnosis of the Use of Web 2.0 Tools in the Portuguese Financial Institutions (CS, PM), pp. 368–372.
KDIRKDIR-KMIS-2013-SucaS #approach #documentation #ontology
An Ontology for Portability and Interoperability Digital Documents — An Approach in Document Engineering using Ontologies (EGS, FSCdS), pp. 373–380.
KEODKEOD-2013-AlirezaieL #abduction #automation #data type #reasoning
Automatic Annotation of Sensor Data Streams using Abductive Reasoning (MA, AL), pp. 345–354.
KEODKEOD-2013-CostaFML #approach #classification #information management #ontology
Classification of Knowledge Representations using an Ontology-based Approach (RC, PF, PMNM, CL), pp. 184–191.
KEODKEOD-2013-DaramolaAAO #information management #ontology
Using Ontology-based Information Extraction for Subject-based Auto-grading (JOD, IA, IA, OOO), pp. 373–378.
KEODKEOD-2013-TimonenPT #fuzzy #modelling #ontology #safety
Using Associations and Fuzzy Ontologies for Modeling Chemical Safety Information (MT, AP, TT), pp. 26–37.
KEODKEOD-2013-ZouhaierDA #automation #generative #reasoning
Automatic Generation of UIs for Disabled Users using Context-aware Techniques and Reasoning (LZ, YBH, LJBA), pp. 413–418.
MLDMMLDM-2013-AmalamanER #detection
Using Turning Point Detection to Obtain Better Regression Trees (PKA, CFE, NJR), pp. 325–339.
MLDMMLDM-2013-CastroSAE #automation #classification #database #web
Automatic Classification of Web Databases Using Domain-Dictionaries (HMMC, VJSS, ILA, HJEB), pp. 340–351.
MLDMMLDM-2013-DincA #classification #evaluation #image #random
Evaluation of Hyperspectral Image Classification Using Random Forest and Fukunaga-Koontz Transform (SD, RSA), pp. 234–245.
MLDMMLDM-2013-GaoD #data mining #distributed #mining #performance
Improving the Efficiency of Distributed Data Mining Using an Adjustment Work Flow (JG, JD), pp. 69–83.
MLDMMLDM-2013-LeeBZ #fuzzy #logic #multi #summary #topic
Multi-document Text Summarization Using Topic Model and Fuzzy Logic (SL, SB, YZ), pp. 159–168.
MLDMMLDM-2013-ParraL #clustering #dataset
Unsupervised Tagging of Spanish Lyrics Dataset Using Clustering (FLP, EL), pp. 130–143.
MLDMMLDM-2013-PohlZ #automation #n-gram #recognition #speech
Using Part of Speech N-Grams for Improving Automatic Speech Recognition of Polish (AP, BZ), pp. 492–504.
MLDMMLDM-2013-PrieditisL #bound #classification #performance #problem
When Classification becomes a Problem: Using Branch-and-Bound to Improve Classification Efficiency (AP, ML), pp. 466–480.
RecSysRecSys-2013-AdamopoulosT #collaboration #predict #recommendation
Recommendation opportunities: improving item prediction using weighted percentile methods in collaborative filtering systems (PA, AT), pp. 351–354.
RecSysRecSys-2013-AlanaziB #markov #modelling #recommendation
A people-to-people content-based reciprocal recommender using hidden markov models (AA, MB), pp. 303–306.
RecSysRecSys-2013-HammarKN #e-commerce #recommendation
Using maximum coverage to optimize recommendation systems in e-commerce (MH, RK, BJN), pp. 265–272.
RecSysRecSys-2013-KaminskasRS #hybrid #music #recommendation
Location-aware music recommendation using auto-tagging and hybrid matching (MK, FR, MS), pp. 17–24.
RecSysRecSys-2013-KhroufT #hybrid #linked data #open data #recommendation
Hybrid event recommendation using linked data and user diversity (HK, RT), pp. 185–192.
RecSysRecSys-2013-LiuAYB #generative
Generating supplemental content information using virtual profiles (HL, MSA, BY, AB), pp. 295–302.
RecSysRecSys-2013-OstrikovRS #collaboration #metadata
Using geospatial metadata to boost collaborative filtering (AO, LR, BS), pp. 423–426.
RecSysRecSys-2013-SchelterBSAM #distributed #matrix #pipes and filters
Distributed matrix factorization with mapreduce using a series of broadcast-joins (SS, CB, MS, AA, VM), pp. 281–284.
RecSysRecSys-2013-TianJ #graph #recommendation
Recommending scientific articles using bi-relational graph-based iterative RWR (GT, LJ), pp. 399–402.
RecSysRecSys-2013-ZhangSKH #artificial reality #recommendation
Improving augmented reality using recommender systems (ZZ, SS, SRK, PH), pp. 173–176.
SEKESEKE-2013-Al-JamimiA #design pattern #detection #prolog
Using Prolog Rules to Detect Software Design Patterns: Strengths and Weaknesses (HAAJ, MAA), pp. 727–730.
SEKESEKE-2013-Al-MsiedeenSHUVS #concept analysis #mining #object-oriented #semantics #source code
Mining Features from the Object-Oriented Source Code of a Collection of Software Variants Using Formal Concept Analysis and Latent Semantic Indexing (RAM, ADS, MH, CU, SV, HES), pp. 244–249.
SEKESEKE-2013-AlviD #classification #fuzzy #image
Image Steganography Using Fuzzy Domain Transformation and Pixel Classification (AKA, RD), pp. 277–282.
SEKESEKE-2013-AnchietaSM #case study #diagrams #identification #prototype #uml #user interface
Using NLP Techniques for Identifying GUI Prototypes and UML Diagrams From Use Cases (RTA, RFdS, RSM), pp. 48–53.
SEKESEKE-2013-AsuncionSPPDM #information management
Using Change Entries to Collect Software Project Information (HUA, MS, RP, KP, ND, WJMJ), pp. 184–189.
SEKESEKE-2013-CorralSS #mobile #quality
Using a Partially Instantiated GQM to Measure the Quality of Mobile Applications (LC, AS, GS), pp. 520–524.
SEKESEKE-2013-DelfimG #coordination #mining #multi #slicing
Multiple Coordinated Views to Support Aspect Mining Using Program Slicing (FMD, REG), pp. 531–536.
SEKESEKE-2013-DengWH #algorithm #combinator #identification #multi
Combining multiple stress identification algorithms using combinatorial fusion (YD, ZW, DFH), pp. 421–428.
SEKESEKE-2013-Lou0 #artificial reality #gesture #interactive #personalisation #realtime
A Real-time Personalized Gesture Interaction System Using Wii Remote and Kinect for Tiled-Display Environment (YL, WW), pp. 131–136.
SEKESEKE-2013-MaffortVBHAM #design pattern #mining
Mining Architectural Patterns Using Association Rules (CAM, MTV, RdSB, AH, NA, JM), pp. 375–380.
SEKESEKE-2013-MarcalGCJ #identification #mining #repository
Mining Software Repository to Identify Crosscutting Concerns Using Combined Techniques (IM, REG, RCMC, COJ), pp. 338–343.
SEKESEKE-2013-MoshirpourEF #approach #automation #ontology
Automated Construction of System Domain Knowledge Using an Ontology-Based Approach (MM, AE, BHF), pp. 63–66.
SEKESEKE-2013-ShahinLL #architecture #concept #documentation
Recovering Software Architectural Knowledge from Documentation using Conceptual Model (MS, PL, ZL), pp. 556–561.
SEKESEKE-2013-ShamsHK #estimation #network
Software Effort Estimation using Regularized Radial Basis Function Neural Networks (KMS, HSH, AK), pp. 473–478.
SEKESEKE-2013-SouzaSPFF #case study #generative
Generation of Thematic Maps using WPS-Cartographer: An experimental study (FCMS, ACCdS, VP, EF, VRTF), pp. 500–503.
SEKESEKE-2013-SunSJ #architecture #maintenance
Using Architecture to Support the Collaborations in Software Maintenance (YS, HS, WJ), pp. 362–357.
SEKESEKE-2013-TaoLG #approach #architecture #component #configuration management #incremental #testing
Testing Configurable Architectures For Component-Based Software Using an Incremental Approach (CT, BL, JG), pp. 356–361.
SEKESEKE-2013-ZhangLK #debugging #on the #statistics
On the Use of Bug and Predicate Signatures for Statistical Debugging (YZ, EL, BK), pp. 249–299.
SIGIRSIGIR-2013-AgeevLA #behaviour #summary
Improving search result summaries by using searcher behavior data (MA, DL, EA), pp. 13–22.
SIGIRSIGIR-2013-AlyHD #named
Taily: shard selection using the tail of score distributions (RA, DH, TD), pp. 673–682.
SIGIRSIGIR-2013-BouadjenekHBV #documentation #personalisation #representation #social
Using social annotations to enhance document representation for personalized search (MRB, HH, MB, AV), pp. 1049–1052.
SIGIRSIGIR-2013-GaoXX #query #random
Query expansion using path-constrained random walks (JG, GX, JX), pp. 563–572.
SIGIRSIGIR-2013-HassanWW #query #self #towards
Toward self-correcting search engines: using underperforming queries to improve search (AHA, RWW, YMW), pp. 263–272.
SIGIRSIGIR-2013-LeeC #social #social media #web
Building a web test collection using social media (CJL, WBC), pp. 757–760.
SIGIRSIGIR-2013-MahdabiGHC #ambiguity #concept #proximity #query #retrieval
Leveraging conceptual lexicon: query disambiguation using proximity information for patent retrieval (PM, SG, JXH, FC), pp. 113–122.
SIGIRSIGIR-2013-MaxwellC #query #topic
Compact query term selection using topically related text (KTM, WBC), pp. 583–592.
SIGIRSIGIR-2013-MoshfeghiJ #behaviour #effectiveness #feedback
An effective implicit relevance feedback technique using affective, physiological and behavioural features (YM, JMJ), pp. 133–142.
SIGIRSIGIR-2013-RaiberK #clustering #documentation #markov #random #ranking
Ranking document clusters using markov random fields (FR, OK), pp. 333–342.
SIGIRSIGIR-2013-Rodriguez-VaamondeTF #documentation #image #web #what
What can pictures tell us about web pages?: improving document search using images (SRV, LT, AWF), pp. 849–852.
SIGIRSIGIR-2013-RossiMCS #performance #query
Fast document-at-a-time query processing using two-tier indexes (CR, ESdM, ALC, ASdS), pp. 183–192.
SIGIRSIGIR-2013-SappelliVK #personalisation #recommendation
Recommending personalized touristic sights using google places (MS, SV, WK), pp. 781–784.
SIGIRSIGIR-2013-SekiM #feedback #social
Finding impressive social content creators: searching for SNS illustrators using feedback on motifs and impressions (YS, KM), pp. 1041–1044.
SIGIRSIGIR-2013-WangZS #modelling #semantics #topic
Semantic hashing using tags and topic modeling (QW, DZ, LS), pp. 213–222.
SIGIRSIGIR-2013-Wu #behaviour #how #online #predict
How far will you go?: characterizing and predicting online search stopping behavior using information scent and need for cognition (WCW), p. 1149.
SIGIRSIGIR-2013-Yeniterzi #effectiveness #social #social media
Effective approaches to retrieving and using expertise in social media (RY), p. 1150.
SKYSKY-2013-Gomes #how #ontology #recommendation #representation
Representing Knowledge using Ontologies: How Search, Browse and Recommendation Can Be Performed (PG), pp. 1–3.
SKYSKY-2013-RineF #complexity #information management #metric #quality #representation #requirements
Requirements Quality Knowledge Representation using Chunking Complexity Measurement: Prior to Formal Inspections (DCR, AF), pp. 3–13.
SKYSKY-2013-SuarezMFM #automation #generative #natural language #semantics
Automatic Generation of Semantic Patterns using Techniques of Natural Language Processing (PS, VM, AF, JLM), pp. 34–44.
AMTAMT-2013-FinotMSD #metamodelling #testing
Using Meta-model Coverage to Qualify Test Oracles (OF, JMM, GS, TD), pp. 12–21.
ECMFAECMFA-2013-SunCDF
Using Model Types to Support Contract-Aware Model Substitutability (WS, BC, SD, RBF), pp. 118–133.
ICMTICMT-2013-HermannGNBMPE #automation #graph grammar #on the
On an Automated Translation of Satellite Procedures Using Triple Graph Grammars (FH, SG, NN, BB, GM, AP, TE), pp. 50–51.
MODELSMoDELS-2013-CazzolaRAF #evolution #fine-grained #modelling #process #uml
Fine-Grained Software Evolution Using UML Activity and Class Models (WC, NAR, MAR, RBF), pp. 271–286.
MODELSMoDELS-2013-NoyritGT #analysis #domain-specific language #integration #modelling
Computer Assisted Integration of Domain-Specific Modeling Languages Using Text Analysis Techniques (FN, SG, FT), pp. 505–521.
MODELSMoDELS-2013-SongBCC #adaptation #constraints #modelling #runtime #self #theorem proving
Self-adaptation with End-User Preferences: Using Run-Time Models and Constraint Solving (HS, SB, AC, SC), pp. 555–571.
MODELSMoDELS-2013-SunkleKR #architecture #enterprise #modelling #ontology
Analyzing Enterprise Models Using Enterprise Architecture-Based Ontology (SS, VK, SR), pp. 622–638.
MODELSMoDELS-2013-WangGAL #automation #case study #feature model #industrial #testing
Automated Test Case Selection Using Feature Model: An Industrial Case Study (SW, AG, SA, ML), pp. 237–253.
MODELSMoDELS-2013-ZurowskaD #composition #lazy evaluation #model checking #modelling #uml
Model Checking of UML-RT Models Using Lazy Composition (KZ, JD), pp. 304–319.
OOPSLAOOPSLA-2013-ShiBH #optimisation
Code optimizations using formally verified properties (YS, BB, GH), pp. 427–442.
AdaEuropeAdaEurope-2013-BicchieraiBNV #development #functional #integration #ontology #process #safety
Using Ontologies in the Integration of Structural, Functional, and Process Perspectives in the Development of Safety Critical Systems (IB, GB, CN, EV), pp. 95–108.
HILTHILT-2013-CourtieuACZRBHG #coq #formal method #runtime #semantics #towards
Towards the formalization of SPARK 2014 semantics with explicit run-time checks using coq (PC, MVA, TC, ZZ, R, JB, JH, JG, TJ), pp. 21–22.
HILTHILT-2013-LarsonHFD #fault #modelling #safety
Illustrating the AADL error modeling annex (v.2) using a simple safety-critical medical device (BRL, JH, KF, JD), pp. 65–84.
HILTHILT-2013-Whalen #analysis #architecture #development #formal method #modelling #scalability
Up and out: scaling formal analysis using model-based development and architecture modeling (MWW), pp. 41–42.
PADLPADL-2013-MachadoAD #declarative #parallel #performance #programming
Parallel Performance of Declarative Programming Using a PGAS Model (RM, SA, DD), pp. 244–260.
PADLPADL-2013-RodriguesASF #abstraction #analysis #composition #declarative #multi
A Declarative Compositional Timing Analysis for Multicores Using the Latency-Rate Abstraction (VR, BA, SMdS, MF), pp. 43–59.
PEPMPEPM-2013-AlpuenteFV #automation #logic #specification
Automatic inference of specifications using matching logic (MA, MAF, AV), pp. 127–136.
PEPMPEPM-2013-Simon #type inference
Deriving a complete type inference for hindley-milner and vector sizes using expansion (AS), pp. 13–22.
PLDIPLDI-2013-GaoSBMBL #runtime #smarttech
Using managed runtime systems to tolerate holes in wearable memories (TG, KS, SMB, KSM, DB, JRL), pp. 297–308.
PLDIPLDI-2013-GveroKKP
Complete completion using types and weights (TG, VK, IK, RP), pp. 27–38.
POPLPOPL-2013-UpadrastaC #scheduling
Sub-polyhedral scheduling using (unit-)two-variable-per-inequality polyhedra (RU, AC), pp. 483–496.
PPDPPPDP-2013-MontenegroPS #analysis #functional #regular expression
Shape analysis in a functional language by using regular languages (MM, RP, CS), pp. 251–262.
SASSAS-2013-WhiteM #algebra #analysis #memory management #optimisation
Concise Analysis Using Implication Algebras for Task-Local Memory Optimisation (LW, AM), pp. 433–453.
RERE-2013-Cleland-HuangCH #design #empirical #requirements
Using tracelab to design, execute, and baseline empirical requirements engineering experiments (JCH, AC, JHH), pp. 338–339.
RERE-2013-FeldererB #fault #industrial #requirements #taxonomy #validation
Using defect taxonomies for requirements validation in industrial projects (MF, AB), pp. 296–301.
REFSQREFSQ-2013-BreauxG #analysis #requirements #specification #traceability
Regulatory Requirements Traceability and Analysis Using Semi-formal Specifications (TDB, DGG), pp. 141–157.
REFSQREFSQ-2013-FerrariGT #clustering #documentation #natural language #requirements
Using Clustering to Improve the Structure of Natural Language Requirements Documents (AF, SG, GT), pp. 34–49.
ASEASE-2013-AvazpourGG #automation #model transformation #specification #tool support #visualisation
Tool support for automatic model transformation specification using concrete visualisations (IA, JG, LG), pp. 718–721.
ASEASE-2013-Fard #behaviour #detection #distributed #independence
Detecting and fixing emergent behaviors in Distributed Software Systems using a message content independent method (FHF), pp. 746–749.
ASEASE-2013-HuangMM #proving #smt
Proving MCAPI executions are correct using SMT (YH, EM, JM), pp. 26–36.
ASEASE-2013-KimKKLJK #automation #embedded #industrial #scalability #testing
Automated unit testing of large industrial embedded software using concolic testing (YK, YK, TK, GL, YJ, MK), pp. 519–528.
ASEASE-2013-KukrejaHT #game studies #testing
Randomizing regression tests using game theory (NK, WGJH, MT), pp. 616–621.
ASEASE-2013-PalombaBPOLP #detection #smell #source code
Detecting bad smells in source code using change history information (FP, GB, MDP, RO, ADL, DP), pp. 268–278.
ASEASE-2013-SaadaHNS #model transformation #multi #optimisation
Recovering model transformation traces using multi-objective optimization (HS, MH, CN, HAS), pp. 688–693.
ASEASE-2013-SagdeoEPV #automation #debugging #invariant #locality #testing
Using automatically generated invariants for regression testing and bug localization (PS, NE, DP, SV), pp. 634–639.
ASEASE-2013-SahaLKP #debugging #information retrieval #locality
Improving bug localization using structured information retrieval (RKS, ML, SK, DEP), pp. 345–355.
ASEASE-2013-ScannielloGMM #clustering #fault #predict
Class level fault prediction using software clustering (GS, CG, AM, TM), pp. 640–645.
ASEASE-2013-Servant #analysis #debugging
Supporting bug investigation using history analysis (FS), pp. 754–757.
ASEASE-2013-VanciuA #architecture #constraints
Finding architectural flaws using constraints (RV, MAA), pp. 334–344.
ASEASE-2013-Wu0LD #analysis #automation #component #dependence
Automatically partition software into least privilege components using dynamic data dependency analysis (YW, JS, YL, JSD), pp. 323–333.
ESEC-FSEESEC-FSE-2013-ClaretRNGB #analysis #data flow
Bayesian inference using data flow analysis (GC, SKR, AVN, ADG, JB), pp. 92–102.
ESEC-FSEESEC-FSE-2013-InozemtsevaHH #fault #reduction
Using fault history to improve mutation reduction (LI, HH, RH), pp. 639–642.
ESEC-FSEESEC-FSE-2013-JiangLZDSGS #design #embedded #multi #optimisation
Design and optimization of multi-clocked embedded systems using formal technique (YJ, ZL, HZ, YD, XS, MG, JS), pp. 703–706.
ESEC-FSEESEC-FSE-2013-Lopez #ecosystem #evolution #modelling #topic
Using topic models to understand the evolution of a software ecosystem (NL), pp. 723–726.
ICSEICSE-2013-AlmorsyGI #analysis #architecture #automation #security
Automated software architecture security risk analysis using formalized signatures (MA, JG, ASI), pp. 662–671.
ICSEICSE-2013-Balachandran #automation #code review #quality #recommendation #static analysis
Reducing human effort and improving quality in peer code reviews using automatic static analysis and reviewer recommendation (VB), pp. 931–940.
ICSEICSE-2013-GargIBMG #c #c++ #execution #generative #testing
Feedback-directed unit test generation for C/C++ using concolic execution (PG, FI, GB, NM, AG), pp. 132–141.
ICSEICSE-2013-HaoLHG #energy #mobile #program analysis
Estimating mobile application energy consumption using program analysis (SH, DL, WGJH, RG), pp. 92–101.
ICSEICSE-2013-Jonsson #machine learning #performance #scalability
Increasing anomaly handling efficiency in large organizations using applied machine learning (LJ), pp. 1361–1364.
ICSEICSE-2013-PaasivaaraLDRS #agile #distributed #education #re-engineering #student
Teaching students global software engineering skills using distributed scrum (MP, CL, DD, PR, AS), pp. 1128–1137.
ICSEICSE-2013-Rimba #assurance #platform #security
Building high assurance secure applications using security patterns for capability-based platforms (PR), pp. 1401–1404.
ICSEICSE-2013-SharTB #hybrid #injection #mining #program analysis #sql
Mining SQL injection and cross site scripting vulnerabilities using hybrid program analysis (LKS, HBKT, LCB), pp. 642–651.
ICSEICSE-2013-Souza #predict
A proposal for the improvement of project’s cost predictability using EVM and historical data of cost (ADdS), pp. 1447–1449.
ICSEICSE-2013-StephanASC #analysis #clone detection #comparison #detection #framework #mutation testing
Using mutation analysis for a model-clone detector comparison framework (MS, MHA, AS, JRC), pp. 1261–1264.
SACSAC-2013-AlnusairZY #automation #design #recognition #semantics
Automatic recognition of design motifs using semantic conditions (AA, TZ, GY), pp. 1062–1067.
SACSAC-2013-AraujoGA #artificial reality #identification #towards
Towards skeleton biometric identification using the microsoft kinect sensor (RMA, GG, VA), pp. 21–26.
SACSAC-2013-BanerjeeSS #detection #monitoring
Participatory sensing based traffic condition monitoring using horn detection (RB, AS, AS), pp. 567–569.
SACSAC-2013-BlondelSU #classification #constraints #learning
Learning non-linear classifiers with a sparsity constraint using L1 regularization (MB, KS, KU), pp. 167–169.
SACSAC-2013-CamposFHV #personalisation #query #ranking #xml
XML search personalization strategies using query expansion, reranking and a search engine modification (LMdC, JMFL, JFH, EVL), pp. 872–877.
SACSAC-2013-CapelleHHF #recommendation #semantics
Semantic news recommendation using wordnet and bing similarities (MC, FH, AH, FF), pp. 296–302.
SACSAC-2013-ChanHN #layout #semantics #wiki #word
Computing semantic relatedness using word frequency and layout information of Wikipedia (PC, YH, SN), pp. 282–287.
SACSAC-2013-ChocklerIMRS #satisfiability
Using cross-entropy for satisfiability (HC, AI, AM, SFR, NS), pp. 1196–1203.
SACSAC-2013-CohenA #composition #refactoring
Practical use of static composition of refactoring operations (JC, AA), pp. 1700–1705.
SACSAC-2013-DermevalCSPBBETS #architecture #design #metamodelling #on the #requirements
On the use of metamodeling for relating requirements and architectural design decisions (DD, JC, CTLLS, JP, IIB, PHdSB, EE, TT, APdS), pp. 1278–1283.
SACSAC-2013-HeckelerSK #component #execution #robust #testing
Accelerated robustness testing of state-based components using reverse execution (PH, BS, TK), pp. 1188–1195.
SACSAC-2013-InzingerHSLD #identification #implementation
Identifying incompatible service implementations using pooled decision trees (CI, WH, BS, PL, SD), pp. 485–492.
SACSAC-2013-Jean-BaptisteMJA #adaptation #feature model #modelling
Modeling dynamic adaptations using augmented feature models (JBL, MTS, JMG, AB), pp. 1734–1741.
SACSAC-2013-JungWKO #architecture #automation #interactive
Heterogeneous device interaction using an IPv6 enabled service-oriented architecture for building automation systems (MJ, JW, WK, AO), pp. 1939–1941.
SACSAC-2013-KalyanC #analysis #navigation
A feasibility analysis on using bathymetry for navigation of autonomous underwater vehicles (BK, MC), pp. 229–231.
SACSAC-2013-KannanMDS #navigation #predict
Predictive indoor navigation using commercial smart-phones (BK, FM, MBD, KPS), pp. 519–525.
SACSAC-2013-KimHCYWNPC #similarity
Measuring similarity of windows applications using static and dynamic birthmarks (DJK, YH, SC, HY, JW, YN, MP, LC), pp. 1628–1633.
SACSAC-2013-KimM #algorithm #detection #hybrid #search-based
Disguised malware script detection system using hybrid genetic algorithm (JK, BRM), pp. 182–187.
SACSAC-2013-LeitaoC #adaptation #detection #optimisation #performance #xml
Efficient XML duplicate detection using an adaptive two-level optimization (LL, PC), pp. 832–837.
SACSAC-2013-LeoniA #mining #process
Data-aware process mining: discovering decisions in processes using alignments (MdL, WMPvdA), pp. 1454–1461.
SACSAC-2013-MadeoLP #gesture #rest #segmentation
Gesture unit segmentation using support vector machines: segmenting gestures from rest positions (RCBM, CAML, SMP), pp. 46–52.
SACSAC-2013-MartinaP #induction #multi #protocol #security #verification
Verifying multicast-based security protocols using the inductive method (JEM, LCP), pp. 1824–1829.
SACSAC-2013-MehtaRCN #approach #dependence
Selecting among alternatives using dependencies: an NFR approach (RM, TRL, LC, MN), pp. 1292–1297.
SACSAC-2013-MeilingSSW #communication #framework #grid #multi #network #scalability #smarttech
A scalable communication infrastructure for smart grid applications using multicast over public networks (SM, TS, TCS, MW), pp. 690–694.
SACSAC-2013-MendesW #navigation #realtime
Real time autonomous navigation and obstacle avoidance using a semi-global stereo method (CCTM, DFW), pp. 235–236.
SACSAC-2013-PapadakisT #classification #mutation testing #testing
Mutation testing strategies using mutant classification (MP, YLT), pp. 1223–1229.
SACSAC-2013-ProvensiEVR #adaptation #fuzzy #policy #streaming #video
Improving context interpretation by using fuzzy policies: the case of adaptive video streaming (LP, FE, RV, RR), pp. 415–422.
SACSAC-2013-RabanalR #metaheuristic #polynomial #problem #reduction
Using polynomial reductions to test the suitability of metaheuristics for solving NP-complete problems (PR, IR), pp. 194–199.
SACSAC-2013-Sobieski0 #maude #sql #term rewriting
Using maude rewriting system to modularize and extend SQL (SS, BZ), pp. 853–858.
SACSAC-2013-SrivastavaSM #clustering #graph
Text clustering using one-mode projection of document-word bipartite graphs (AS, AJS, EEM), pp. 927–932.
SACSAC-2013-TeixeiraRG #detection #locality #parallel
Indoor localization using SLAM in parallel with a natural marker detector (LT, ABR, MG), pp. 27–33.
SACSAC-2013-TragatschnigZ #enterprise #integration
Enterprise integration using event actor based event transformations (ST, UZ), pp. 1434–1440.
GPCEGPCE-2013-GerakiosBS #java #parametricity
Reified type parameters using Java annotations (PG, AB, YS), pp. 61–64.
GPCEGPCE-2013-KramerOKC #product line #user interface
Using document-oriented GUIs in dynamic software product lines (DK, SO, PK, TC), pp. 85–94.
SLESLE-2013-DialloCL #approach #formal method #modelling
A Model-Driven Approach to Enhance Tool Interoperability Using the Theory of Models of Computation (PID, JC, LL), pp. 218–237.
ASPLOSASPLOS-2013-AhnDT #alias #named
DeAliaser: alias speculation using atomic region support (WA, YD, JT), pp. 167–180.
ASPLOSASPLOS-2013-CuiHWY #execution #symbolic computation #verification
Verifying systems rules using rule-directed symbolic execution (HC, GH, JW, JY), pp. 329–342.
ASPLOSASPLOS-2013-KadavRS #fault tolerance #fine-grained
Fine-grained fault tolerance using device checkpoints (AK, MJR, MMS), pp. 473–484.
ASPLOSASPLOS-2013-SahooCGA #automation #fault #invariant #locality
Using likely invariants for automated software fault localization (SKS, JC, CG, VSA), pp. 139–152.
CASECASE-2013-BagchiBNVSS
Incentive compatible green procurement using scoring rules (DB, SB, YN, NV, PS, SVS), pp. 504–509.
CASECASE-2013-BengtssonL #algorithm #behaviour #identification #modelling #visualisation
Operation behavior modeling using relation identification and visualization algorithms (KB, BL), pp. 368–373.
CASECASE-2013-BjorkenstamGBCL #energy #industrial #performance
Energy efficient and collision free motion of industrial robots using optimal control (SB, DG, RB, JSC, BL), pp. 510–515.
CASECASE-2013-ChenZS #metric
A severity measurement system for obstructive sleep apnea discrimination using a single ECG signal (LC, XZ, CS), pp. 1–6.
CASECASE-2013-FerreiraL #generative #multi #tool support
A method for generating tool paths for milling pockets in prismatic parts using multiple tools (JCEF, RAL), pp. 528–533.
CASECASE-2013-FerreiraR #comparison #design #layout #performance #simulation
Performance comparison of the virtual cell layout with cellular and job shop configurations using simulation and design of experiments (JCEF, PAR), pp. 795–800.
CASECASE-2013-Fries #agile #automation #fault #fuzzy #multi
Automation of rapid fault diagnosis in manufacturing systems using multiple fuzzy agents (TPF), pp. 65–70.
CASECASE-2013-Geldmann #image #monte carlo #simulation
Fine registration of SEM and AFM images using Monte Carlo simulations (CG), pp. 813–818.
CASECASE-2013-GrosbardKTR #composition #network
A queuing network model for wafer fabrication using decomposition without aggregation (DG, AK, IT, GR), pp. 717–722.
CASECASE-2013-HuZL #automation #performance #petri net #synthesis
Supervisor synthesis and performance improvement for automated manufacturing systems by using Petri nets (HH, MZ, YL), pp. 1139–1144.
CASECASE-2013-IsmailH #3d #anti #higher-order
Trajectory tracking and anti-sway control of three-dimensional offshore boom cranes using second-order sliding modes (RMTRI, QPH), pp. 996–1001.
CASECASE-2013-JeongMS #approximate #assessment #design #lifecycle #reasoning
Approximate life cycle assessment using case-based reasoning for the eco design of products (MGJ, JRM, HWS), pp. 486–491.
CASECASE-2013-LanzaKPSS #analysis #automation #detection #fault
Automated optical detection of particles and defects on a Li-Ion-cell surface using a single-point analysis (GL, AK, SP, AS, SS), pp. 675–680.
CASECASE-2013-LingoR #design
A sustainable building design using geosolar exergy storage technology (GEST) (LEL, UR), pp. 219–224.
CASECASE-2013-LuSXPO #automation #graph #multi
Automatic building exterior mapping using multilayer feature graphs (YL, DS, YX, AGAP, SO), pp. 162–167.
CASECASE-2013-MarturiDP #image #performance
Fast image drift compensation in scanning electron microscope using image registration (NM, SD, NP), pp. 807–812.
CASECASE-2013-MohajeraniMF #automaton #composition #finite #verification
Compositional nonblocking verification for extended finite-state automata using partial unfolding (SM, RM, MF), pp. 930–935.
CASECASE-2013-NammotoKH #assembly #modelling
Model-based compliant motion control scheme for assembly tasks using vision and force information (TN, KK, KH), pp. 948–953.
CASECASE-2013-PanHJ #concurrent #flexibility #petri net #policy
One computationally improved deadlock prevention policy for flexible manufacturing systems using Petri nets (YLP, HH, MJ), pp. 924–929.
CASECASE-2013-RoyerBTT #assessment #behaviour #energy #modelling #multi #simulation
Modelling of a multi-zone building and assessment of its thermal behaviour using an energy simulation software (SR, MB, ST, TT), pp. 735–740.
CASECASE-2013-ShisheieJBC #design #string
Design and fabrication of an assistive device for arm rehabilitation using twisted string system (RS, LJ, LEB, MHMC), pp. 255–260.
CASECASE-2013-SoviziK #matrix #nondeterminism #parallel #random
Uncertainty characterization in serial and parallel manipulators using random matrix theory (JS, VNK), pp. 312–317.
CASECASE-2013-WangBR #modelling #monitoring
Model based unbalance monitoring using augmented observer in rotor systems under the consideration of gyroscopic effect (ZW, MB, SR), pp. 59–64.
CASECASE-2013-XuJLYL #energy #optimisation
Optimal building energy management using intelligent optimization (YX, KJ, YL, YY, WL), pp. 95–99.
CASECASE-2013-YueH #concurrent #robust
Robust deadlock control using shared-resources for production systems with unreliable workstations (HY, HH), pp. 1095–1100.
CASECASE-2013-ZhangPJST #energy #interface #monitoring #scalability
A secure and scalable telemonitoring system using ultra-low-energy wireless sensor interface for long-term monitoring in life science applications (WZ, PP, EJ, RS, KT), pp. 617–622.
CASECASE-2013-ZhangYZH #design
Longitudinal attitude controller design for aircraft landing with disturbance using ADRC/LQR (GZ, LY, JZ, CH), pp. 330–335.
CCCC-2013-MooreC #automation #generative #machine learning #policy
Automatic Generation of Program Affinity Policies Using Machine Learning (RWM, BRC), pp. 184–203.
CGOCGO-2013-BardizbanyanGWSLMS #data access #performance
Improving data access efficiency by using a tagless access buffer (TAB) (AB, PG, DBW, MS, PLE, SAM, PS), p. 11.
CGOCGO-2013-HuangJBJA #automation #parallel #runtime
Automatically exploiting cross-invocation parallelism using runtime information (JH, TBJ, SRB, NPJ, DIA), p. 11.
CGOCGO-2013-KulkarniCWS #automation #heuristic #machine learning
Automatic construction of inlining heuristics using machine learning (SK, JC, CW, DS), p. 12.
DACDAC-2013-DevWR #3d #integration #testing
High-throughput TSV testing and characterization for 3D integration using thermal mapping (KD, GW, SR), p. 6.
DACDAC-2013-GaillardonMABSLM #towards
Towards structured ASICs using polarity-tunable Si nanowire transistors (PEG, MDM, LGA, SB, DS, YL, GDM), p. 4.
DACDAC-2013-KarthikR #approximate #linear #modelling #named
ABCD-L: approximating continuous linear systems using boolean models (KVA, JSR), p. 9.
DACDAC-2013-LeGHD #simulation #verification
Verifying SystemC using an intermediate verification language and symbolic simulation (HML, DG, VH, RD), p. 6.
DACDAC-2013-LiuYLC #named
DuraCache: a durable SSD cache using MLC NAND flash (RSL, CLY, CHL, GYC), p. 6.
DACDAC-2013-MillerVG #modelling #physics #statistics
Exploration with upgradeable models using statistical methods for physical model emulation (BM, FV, TG), p. 6.
DACDAC-2013-SchurmansZALACW #architecture #automation #communication #modelling
Creation of ESL power models for communication architectures using automatic calibration (SS, DZ, DA, RL, GA, XC, LW), p. 58.
DACDAC-2013-SekitaniYTSS
Electrical artificial skin using ultraflexible organic transistor (TS, TY, MT, TS, TS), p. 3.
DACDAC-2013-StratigopoulosFCM #estimation #metric #multi #statistics
Multidimensional analog test metrics estimation using extreme value theory and statistical blockade (HGDS, PF, YC, FM), p. 7.
DACDAC-2013-WangK #control flow #detection #hardware #kernel #named #performance
NumChecker: detecting kernel control-flow modifying rootkits by using hardware performance counters (XW, RK), p. 7.
DACDAC-2013-YuLJC #classification #detection #feature model
Machine-learning-based hotspot detection using topological classification and critical feature extraction (YTY, GHL, IHRJ, CC), p. 6.
DATEDATE-2013-AhmadyanKV #algorithm #incremental #runtime #verification
Runtime verification of nonlinear analog circuits using incremental time-augmented RRT algorithm (SNA, JAK, SV), pp. 21–26.
DATEDATE-2013-AnanthanarayananGP #detection #fault #low cost #set
Low cost permanent fault detection using ultra-reduced instruction set co-processors (SA, SG, HDP), pp. 933–938.
DATEDATE-2013-BackesR #reachability
Using cubes of non-state variables with property directed reachability (JDB, MDR), pp. 807–810.
DATEDATE-2013-BakshiH #reduction #smt
LFSR seed computation and reduction using SMT-based fault-chaining (DB, MSH), pp. 1071–1076.
DATEDATE-2013-BernasconiCTV
Minimization of P-circuits using Boolean relations (AB, VC, GT, TV), pp. 996–1001.
DATEDATE-2013-BertaccoCBFVKP #on the
On the use of GP-GPUs for accelerating compute-intensive EDA applications (VB, DC, NB, FF, SV, AMK, HDP), pp. 1357–1366.
DATEDATE-2013-BrandonW
Support for dynamic issue width in VLIW processors using generic binaries (AB, SW), pp. 827–832.
DATEDATE-2013-BraojosAA #classification #embedded #random
A methodology for embedded classification of heartbeats using random projections (RB, GA, DA), pp. 899–904.
DATEDATE-2013-ChenD #parallel #predict #simulation
Optimized out-of-order parallel discrete event simulation using predictions (WC, RD), pp. 3–8.
DATEDATE-2013-ChiangTWHCDN #array #configuration management #on the #order #synthesis
On reconfigurable single-electron transistor arrays synthesis using reordering techniques (CEC, LFT, CYW, CYH, YCC, SD, VN), pp. 1807–1812.
DATEDATE-2013-DeutschC #multi
Non-invasive pre-bond TSV test using ring oscillators and multiple voltage levels (SD, KC), pp. 1065–1070.
DATEDATE-2013-EbrahimiDP #3d #algorithm #fault tolerance
Fault-tolerant routing algorithm for 3D NoC using Hamiltonian path strategy (ME, MD, JP), pp. 1601–1604.
DATEDATE-2013-FakihGFR #analysis #architecture #model checking #performance #towards
Towards performance analysis of SDFGs mapped to shared-bus architectures using model-checking (MF, KG, MF, AR), pp. 1167–1172.
DATEDATE-2013-GaoGB #fault tolerance #scheduling
Using explicit output comparisons for fault tolerant scheduling (FTS) on modern high-performance processors (YG, SKG, MAB), pp. 927–932.
DATEDATE-2013-Gomez-PradoCT #latency #optimisation
FPGA latency optimization using system-level transformations and DFG restructuring (DGP, MJC, RT), pp. 1553–1558.
DATEDATE-2013-HasanA #analysis #fault #feedback #formal method
Formal analysis of steady state errors in feedback control systems using HOL-light (OH, MA), pp. 1423–1426.
DATEDATE-2013-HelmstetterCGMV #performance #simulation
Fast and accurate TLM simulations using temporal decoupling for FIFO-based communications (CH, JC, BG, MM, PV), pp. 1185–1188.
DATEDATE-2013-HuNRK #detection #hardware #multimodal
High-sensitivity hardware trojan detection using multimodal characterization (KH, ANN, SR, FK), pp. 1271–1276.
DATEDATE-2013-JooyaB #power management
Using synchronization stalls in power-aware accelerators (AJ, AB), pp. 400–403.
DATEDATE-2013-LotfianJ #architecture #hardware #power management #smarttech
An ultra-low power hardware accelerator architecture for wearable computers using dynamic time warping (RL, RJ), pp. 913–916.
DATEDATE-2013-LukasiewyczSC #programming
Priority assignment for event-triggered systems using mathematical programming (ML, SS, SC), pp. 982–987.
DATEDATE-2013-MaricAV #architecture #hybrid #performance #reliability
Efficient cache architectures for reliable hybrid voltage operation using EDC codes (BM, JA, MV), pp. 917–920.
DATEDATE-2013-PaternaR #problem
Mitigating dark-silicon problems using superlattice-based thermoelectric coolers (FP, SR), pp. 1391–1394.
DATEDATE-2013-PontarelliOEW #detection #fault
Error detection in ternary CAMs using bloom filters (SP, MO, AE, SJW), pp. 1474–1479.
DATEDATE-2013-QianJBTMM #analysis #named #performance
SVR-NoC: a performance analysis tool for network-on-chips using learning-based support vector regression model (ZQ, DCJ, PB, CYT, DM, RM), pp. 354–357.
DATEDATE-2013-RaminiGBB #3d #analysis #manycore #power management
Contrasting wavelength-routed optical NoC topologies for power-efficient 3D-stacked multicore processors using physical-layer analysis (LR, PG, SB, DB), pp. 1589–1594.
DATEDATE-2013-Rodriguez-RodriguezCCPT #memory management #performance #policy
Reducing writes in phase-change memory environments by using efficient cache replacement policies (RRR, FC, DC, LP, FT), pp. 93–96.
DATEDATE-2013-RustLP #architecture #complexity
Low complexity QR-decomposition architecture using the logarithmic number system (JR, FL, SP), pp. 97–102.
DATEDATE-2013-ShreejithVFL #approach #configuration management #network
An approach for redundancy in FlexRay networks using FPGA partial reconfiguration (SS, KV, SAF, ML), pp. 721–724.
DATEDATE-2013-SubramanyanTPRSM #analysis #functional #reverse engineering
Reverse engineering digital circuits using functional analysis (PS, NT, KP, DR, AS, SM), pp. 1277–1280.
DATEDATE-2013-TzouBHC #bound #composition
Periodic jitter and bounded uncorrelated jitter decomposition using incoherent undersampling (NT, DB, SWH, AC), pp. 1667–1672.
DATEDATE-2013-UnutulmazDF #optimisation
Area optimization on fixed analog floorplans using convex area functions (AU, GD, FVF), pp. 1843–1848.
DATEDATE-2013-VenkatesanSRR #energy #named #performance
DWM-TAPESTRI — an energy efficient all-spin cache using domain wall shift based writes (RV, MS, KR, AR), pp. 1825–1830.
DATEDATE-2013-WangXZWYWNW
Active power-gating-induced power/ground noise alleviation using parasitic capacitance of on-chip memories (XW, JX, WZ, XW, YY, ZW, MN, ZW), pp. 1221–1224.
DATEDATE-2013-YalcinUC #detection #fault #hardware #memory management #named #transaction
FaulTM: error detection and recovery using hardware transactional memory (GY, OSÜ, AC), pp. 220–225.
DATEDATE-2013-ZakharenkoAM #cpu #gpu #performance
Characterizing the performance benefits of fused CPU/GPU systems using FusionSim (VZ, TMA, AM), pp. 685–688.
DATEDATE-2013-ZhouZY #design #energy #memory management #network
The design of sustainable wireless sensor network node using solar energy and phase change memory (PZ, YZ, JY), pp. 869–872.
HPCAHPCA-2013-ArdestaniR #manycore #named #performance
ESESC: A fast multicore simulator using Time-Based Sampling (EKA, JR), pp. 448–459.
HPCAHPCA-2013-GoswamiCL #architecture #memory management #throughput
Power-performance co-optimization of throughput core architecture using resistive memory (NG, BC, TL), pp. 342–353.
HPCAHPCA-2013-KhanAWKJ #architecture #manycore #performance
Improving multi-core performance using mixed-cell cache architecture (SMK, ARA, CW, JK, DAJ), pp. 119–130.
HPCAHPCA-2013-KrishnaCKP #latency
Breaking the on-chip latency barrier using SMART (TK, CHOC, WCK, LSP), pp. 378–389.
HPCAHPCA-2013-SudanBLXMLB #architecture #lightweight #novel #web
A novel system architecture for web scale applications using lightweight CPUs and virtualized I/O (KS, SB, SL, MX, DM, GL, RB), pp. 167–178.
HPDCHPDC-2013-SuAWMWA #dataset #distributed
Taming massive distributed datasets: data sampling using bitmap indices (YS, GA, JW, KM, JW, JPA), pp. 13–24.
HPDCHPDC-2013-YinLBGN #dataset #order #performance #pipes and filters
Efficient analytics on ordered datasets using MapReduce (JY, YL, MB, LG, AN), pp. 125–126.
LCTESLCTES-2013-HuberPP #analysis #control flow #graph
Combined WCET analysis of bitcode and machine code using control-flow relation graphs (BH, DP, PPP), pp. 163–172.
LCTESLCTES-2013-KhudiaM #control flow #low cost
Low cost control flow protection using abstract control signatures (DSK, SAM), pp. 3–12.
LCTESLCTES-2013-WangCSCH #api #embedded #manycore
Portable mapping of openMP to multicore embedded systems using MCA APIs (CW, SC, PS, BMC, JH), pp. 153–162.
PDPPDP-2013-ColmenaresODFR #equation
Solving the Linearized Poisson-Boltzmann Equation on GPUs Using CUDA (JC, JO, SD, AF, WR), pp. 420–426.
PDPPDP-2013-DemirizBA #architecture #constraints #design #named #programming
CPNoC: On Using Constraint Programming in Design of Network-on-Chip Architecture (AD, NB, AA), pp. 486–493.
PDPPDP-2013-EskandariKBJ #algorithm #constraints #optimisation #quality
Quality of Service Optimization for Network-on-Chip Using Bandwidth-Constraint Mapping Algorithm (AE, AK, NB, MJ), pp. 504–508.
PDPPDP-2013-GuptaGV #3d #gpu #linear #simulation
3D Bubbly Flow Simulation on the GPU — Iterative Solution of a Linear System Using Sub-domain and Level-Set Deflation (RG, MBvG, CV), pp. 359–366.
PDPPDP-2013-LavilleMLPM #gpu #multi #simulation
Using GPU for Multi-Agent Soil Simulation (GL, KM, CL, LP, NM), pp. 392–399.
PDPPDP-2013-MoosaviRLPT #3d #communication #multi #network #performance #protocol
Enhancing Performance of 3D Interconnection Networks using Efficient Multicast Communication Protocol (SRM, AMR, PL, JP, HT), pp. 294–301.
PPoPPPPoPP-2013-DiceLLLM #algorithm #hardware #memory management #transaction
Using hardware transactional memory to correct and simplify and readers-writer lock algorithm (DD, YL, YL, VL, MM), pp. 261–270.
PPoPPPPoPP-2013-EdmondsWL #algorithm #graph
Expressing graph algorithms using generalized active messages (NE, JW, AL), pp. 289–290.
SOSPSOSP-2013-RoyMZ #graph #named #streaming
X-Stream: edge-centric graph processing using streaming partitions (AR, IM, WZ), pp. 472–488.
FASEFASE-2013-BouchouchaSL #behaviour #comprehension #modelling #probability #towards
Towards Understanding the Behavior of Classes Using Probabilistic Models of Program Inputs (AB, HAS, PL), pp. 99–113.
FASEFASE-2013-MacedoC #alloy #bidirectional #implementation #model transformation #qvt
Implementing QVT-R Bidirectional Model Transformations Using Alloy (NM, AC), pp. 297–311.
STOCSTOC-2013-JainNS #matrix #rank
Low-rank matrix completion using alternating minimization (PJ, PN, SS), pp. 665–674.
STOCSTOC-2013-LeeRS #approach
A new approach to computing maximum flows using electrical flows (YTL, SR, NS), pp. 755–764.
STOCSTOC-2013-LenzenP #performance
Fast routing table construction using small messages: extended abstract (CL, BPS), pp. 381–390.
STOCSTOC-2013-Miller #graph #optimisation #problem #scalability
Solving large optimization problems using spectral graph theory (GLM), p. 981.
STOCSTOC-2013-Sherstov #bound #communication
Communication lower bounds using directional derivatives (AAS), pp. 921–930.
TACASTACAS-2013-FalkeMS #bound #c #contest #model checking #named #source code
LLBMC: Improved Bounded Model Checking of C Programs Using LLVM — (Competition Contribution) (SF, FM, CS), pp. 623–626.
TACASTACAS-2013-VizelGS #analysis #reachability
Intertwined Forward-Backward Reachability Analysis Using Interpolants (YV, OG, SS), pp. 308–323.
CADECADE-2013-ClaessenJRS #automation #induction #proving
Automating Inductive Proofs Using Theory Exploration (KC, MJ, DR, NS), pp. 392–406.
CADECADE-2013-HawblitzelKLR #automation #proving #source code #theorem proving #towards
Towards Modularly Comparing Programs Using Automated Theorem Provers (CH, MK, SKL, HR), pp. 282–299.
CAVCAV-2013-BrimCDS #model checking #parametricity #probability
Exploring Parameter Space of Stochastic Biochemical Systems Using Quantitative Model Checking (LB, MC, SD, DS), pp. 107–123.
CAVCAV-2013-ChagantyLNR #learning #relational #smt
Combining Relational Learning with SMT Solvers Using CEGAR (ATC, AL, AVN, SKR), pp. 447–462.
CAVCAV-2013-ColangeBKT #diagrams #distributed #model checking #towards
Towards Distributed Software Model-Checking Using Decision Diagrams (MC, SB, FK, YTM), pp. 830–845.
CAVCAV-2013-LaarmanODLP #abstraction #automaton #manycore
Multi-core Emptiness Checking of Timed Büchi Automata Using Inclusion Abstraction (AL, MCO, AED, KGL, JvdP), pp. 968–983.
CAVCAV-2013-PiskacWZ #automation #logic #smt
Automating Separation Logic Using SMT (RP, TW, DZ), pp. 773–789.
CAVCAV-2013-SosnovichGN #network #protocol #security
Finding Security Vulnerabilities in a Network Protocol Using Parameterized Systems (AS, OG, GN), pp. 724–739.
CSLCSL-2013-Rieg
Extracting Herbrand trees in classical realizability using forcing (LR), pp. 597–614.
ICLPICLP-J-2013-ArbelaezTC #parallel #predict #runtime #satisfiability
Using sequential runtime distributions for the parallel speedup prediction of SAT local search (AA, CT, PC), pp. 625–639.
ICSTICST-2013-AfshanMS #evolution #natural language #string #testing
Evolving Readable String Test Inputs Using a Natural Language Model to Reduce Human Oracle Cost (SA, PM, MS), pp. 352–361.
ICSTICST-2013-ArafeenD #clustering #testing
Test Case Prioritization Using Requirements-Based Clustering (MJA, HD), pp. 312–321.
ICSTICST-2013-LinD #concurrent #java
CHECK-THEN-ACT Misuse of Java Concurrent Collections (YL, DD), pp. 164–173.
ICSTICST-2013-MossigeGM #constraints #generative #integration #programming #testing
Test Generation for Robotized Paint Systems Using Constraint Programming in a Continuous Integration Environment (MM, AG, HM), pp. 489–490.
ICSTICST-2013-TangHYW #metric #quality
Test Quality Measurement Using TBPP-R (JT, RH, JY, SW), pp. 48–55.
ICSTICST-2013-Torsel #domain-specific language #model checking #modelling #testing #web
A Testing Tool for Web Applications Using a Domain-Specific Modelling Language and the NuSMV Model Checker (AMT), pp. 383–390.
ICSTICST-2013-YeolekarUAKV #generative #model checking #scalability #testing
Scaling Model Checking for Test Generation Using Dynamic Inference (AY, DU, VA, SK, RV), pp. 184–191.
ICTSSICTSS-2013-EnoiuSP #diagrams #logic #testing
Using Logic Coverage to Improve Testing Function Block Diagrams (EPE, DS, PP), pp. 1–16.
ICTSSICTSS-2013-MauserKH #programming #towards #user interface
Towards a GUI Test Model Using State Charts and Programming Code (DM, AK, KH), pp. 271–276.
ICTSSICTSS-2013-SapraMCGC #execution #fault #python #source code #symbolic computation
Finding Errors in Python Programs Using Dynamic Symbolic Execution (SS, MM, SC, AG, EMC), pp. 283–289.
ICTSSICTSS-2013-StepienP #challenge #testing
Challenges of Testing Periodic Messages in Avionics Systems Using TTCN-3 (BS, LP), pp. 207–222.
ISSTAISSTA-2013-Buda #database #generative #testing
Generation of test databases using sampling methods (TSB), pp. 366–369.
ISSTAISSTA-2013-GligoricGZSAM #test coverage #testing
Comparing non-adequate test suites using coverage criteria (MG, AG, CZ, RS, MAA, DM), pp. 302–313.
ISSTAISSTA-2013-QiMLW #automation #effectiveness #fault #locality #program repair
Using automated program repair for evaluating the effectiveness of fault localization techniques (YQ, XM, YL, CW), pp. 191–201.
LICSLICS-2013-Colcombet #logic #monad #set #word
Magnitude Monadic Logic over Words and the Use of Relative Internal Set Theory (TC), p. 123.
LICSLICS-2013-Halpern #first-order #logic #proving #security
From Qualitative to Quantitative Proofs of Security Properties Using First-Order Conditional Logic (JYH), pp. 2–3.
ICSTSAT-2013-FingerLGS #constraints #probability #satisfiability
Solutions for Hard and Soft Constraints Using Optimized Probabilistic Satisfiability (MF, RL, CPG, BS), pp. 233–249.
TAPTAP-2013-InsaSR #algorithm #debugging #execution
Speeding Up Algorithmic Debugging Using Balanced Execution Trees (DI, JS, AR), pp. 133–151.
VMCAIVMCAI-2013-SeladjiB #abstract domain #analysis #fixpoint #tool support
Fixpoint Computation in the Polyhedra Abstract Domain Using Convex and Numerical Analysis Tools (YS, OB), pp. 149–168.
VMCAIVMCAI-2013-ZhengS0LD0 #network #partial order #reduction
State Space Reduction for Sensor Networks Using Two-Level Partial Order Reduction (MZ, DS, JS, YL, JSD, YG), pp. 515–535.
QoSAQoSA-2012-EklundB #architecture #ecosystem #framework #multi #platform
Using architecture for multiple levels of access to an ecosystem platform (UE, JB), pp. 143–148.
WICSA-ECSAWICSA-ECSA-2012-ElorantaHVK #architecture #documentation #generative #knowledge base #named #topic
TopDocs: Using Software Architecture Knowledge Base for Generating Topical Documents (VPE, OH, TV, KK), pp. 191–195.
WICSA-ECSAWICSA-ECSA-2012-HilliardMMP #architecture #composition #framework #on the #reuse
On the Composition and Reuse of Viewpoints across Architecture Frameworks (RH, IM, HM, PP), pp. 131–140.
WICSA-ECSAWICSA-ECSA-2012-MiesbauerW #architecture #information management #maintenance
Capturing and Maintaining Architectural Knowledge Using Context Information (CM, RW), pp. 206–210.
WICSA-ECSAWICSA-ECSA-2012-RathfelderBKR #email #monitoring #performance #predict #scalability
Workload-aware System Monitoring Using Performance Predictions Applied to a Large-scale E-Mail System (CR, SB, KK, RHR), pp. 31–40.
WICSA-ECSAWICSA-ECSA-2012-ThatSO #design pattern
Using Architectural Patterns to Define Architectural Decisions (MTTT, SS, FO), pp. 196–200.
WICSA-ECSAWICSA-ECSA-2012-WoodsB #architecture #case study #experience #industrial #information management #scalability
Using an Architecture Description Language to Model a Large-Scale Information System — An Industrial Experience Report (EW, RB), pp. 239–243.
DocEngDocEng-2012-MahlowGHS #framework #retrieval #xquery
A framework for retrieval and annotation in digital humanities using XQuery full text and update in BaseX (CM, CG, AH, MHS), pp. 195–204.
DocEngDocEng-2012-PeroniSV #documentation #lens #semantics
Faceted documents: describing document characteristics using semantic lenses (SP, DS, FV), pp. 191–194.
DRRDRR-2012-ChandaFP #clustering #documentation
Clustering document fragments using background color and texture information (SC, KF, UP).
DRRDRR-2012-FengY #component #composition #detection #documentation
Using connected component decomposition to detect straight line segments in documents (XF, AY).
DRRDRR-2012-LinGTHL #documentation #embedded #identification
Identification of embedded mathematical formulas in PDF documents using SVM (XL, LG, ZT, XH, XL).
DRRDRR-2012-RashwanRAAK #2d #pseudo #robust
A robust omnifont open-vocabulary arabic OCR system using pseudo-2D-HMM (AMR, MR, AAH, SA, AHK).
DRRDRR-2012-Silva #algorithm #detection #evaluation
Using specific evaluation for comparing and combining competing algorithms: applying it to table column detection (ACeS).
DRRDRR-2012-TangSS #distance
Handwriting individualization using distance and rarity (YT, SNS, HS).
HTHT-2012-CravinoDF #clustering #community #network
Using the overlapping community structure of a network of tags to improve text clustering (NC, JLD, ÁF), pp. 239–244.
HTHT-2012-LevacherLW #adaptation #hypermedia #named #reuse
Slicepedia: providing customized reuse of open-web resources for adaptive hypermedia (KL, SL, VW), pp. 23–32.
HTHT-2012-SofeanS #architecture #design #detection #evaluation #implementation #network #realtime #social
A real-time architecture for detection of diseases using social networks: design, implementation and evaluation (MS, MS), pp. 309–310.
HTHT-2012-WeningerZH #web
Building enriched web page representations using link paths (TW, CZ, JH), pp. 53–62.
JCDLJCDL-2012-LeeH #classification #generative #music
Generating ground truth for music mood classification using mechanical turk (JHL, XH), pp. 129–138.
JCDLJCDL-2012-OhLMY #ranking
Evaluating and ranking patents using weighted citations (SO, ZL, PM, JY), pp. 281–284.
JCDLJCDL-2012-TuarobMG #algorithm #network
Improving algorithm search using the algorithm co-citation network (ST, PM, CLG), pp. 277–280.
SIGMODSIGMOD-2012-El-HelwFI #information management
Just-in-time information extraction using extraction views (AEH, MHF, IFI), pp. 613–616.
SIGMODSIGMOD-2012-EngleLXZFSS #data analysis #distributed #memory management #named #performance
Shark: fast data analysis using coarse-grained distributed memory (CE, AL, RX, MZ, MJF, SS, IS), pp. 689–692.
TPDLTPDL-2012-DamnjanovicH #content management #generative #interactive #library
Generating Content for Digital Libraries Using an Interactive Content Management System (UD, SH), pp. 474–479.
TPDLTPDL-2012-GeelNN #approach #named
PubLight: Managing Publications Using a Task-Oriented Approach (MG, MN, MCN), pp. 363–369.
TPDLTPDL-2012-HallCS #automation #clustering #library
Evaluating the Use of Clustering for Automatically Organising Digital Library Collections (MMH, PDC, MS), pp. 323–334.
TPDLTPDL-2012-KapidakisMP #query
Query Expansion of Zero-Hit Subject Searches: Using a Thesaurus in Conjunction with NLP Techniques (SK, AM, MP), pp. 433–438.
TPDLTPDL-2012-LlewellynGOH #analysis #tool support
Enhancing the Curation of Botanical Data Using Text Analysis Tools (CL, CG, JO, EH), pp. 480–485.
TPDLTPDL-2012-LoizidesVIZ #interactive #repository
Collaboratively Creating a Thematic Repository Using Interactive Table-Top Technology (FL, CV, AI, PZ), pp. 512–516.
TPDLTPDL-2012-TryfouT #image #semantics #visual notation #web
Using Visual Cues for the Extraction of Web Image Semantic Information (GT, NT), pp. 396–401.
TPDLTPDL-2012-ZhangKB #metadata #tool support
The CMDI MI Search Engine: Access to Language Resources and Tools Using Heterogeneous Metadata Schemas (JZ, MKS, HB), pp. 492–495.
TPDLTPDL-2012-ZhouLW #personalisation #social #web
Web Search Personalization Using Social Data (DZ, SL, VW), pp. 298–310.
VLDBVLDB-2012-CandanRSW #constraints #named
sDTW: Computing DTW Distances using Locally Relevant Constraints based on Salient Feature Alignments (KSC, RR, MLS, XW), pp. 1519–1530.
VLDBVLDB-2012-CautisK #complexity #probability #query #xml
Answering Queries using Views over Probabilistic XML: Complexity and Tractability (BC, EK), pp. 1148–1159.
VLDBVLDB-2012-IseleB #learning #programming #search-based
Learning Expressive Linkage Rules using Genetic Programming (RI, CB), pp. 1638–1649.
VLDBVLDB-2012-KanagalAPJYP #behaviour #learning #recommendation #taxonomy
Supercharging Recommender Systems using Taxonomies for Learning User Purchase Behavior (BK, AA, SP, VJ, JY, LGP), pp. 956–967.
VLDBVLDB-2012-LiKNC #estimation #query #robust #sql #statistics
Robust Estimation of Resource Consumption for SQL Queries using Statistical Techniques (JL, ACK, VRN, SC), pp. 1555–1566.
VLDBVLDB-2012-LuSCO #nearest neighbour #performance #pipes and filters
Efficient Processing of k Nearest Neighbor Joins using MapReduce (WL, YS, SC, BCO), pp. 1016–1027.
VLDBVLDB-2012-PimplikarS #keyword #query #web
Answering Table Queries on the Web using Column Keywords (RP, SS), pp. 908–919.
VLDBVLDB-2012-SachanB #mining #statistics #string
Mining Statistically Significant Substrings using the Chi-Square Statistic (MS, AB), pp. 1052–1063.
VLDBVLDB-2012-ZhangCW #multi #performance #pipes and filters
Efficient Multi-way Theta-Join Processing Using MapReduce (XZ, LC, MW), pp. 1184–1195.
CSEETCSEET-2012-BollinHS #concept #education #experience #project management #simulation
Teaching Software Project Management using Simulations — The AMEISE Environment: from Concepts to Class Room Experience (AB, EH, LS), pp. 85–86.
CSEETCSEET-2012-TillmannMHFX #education #mobile #student
Engage Your Students by Teaching Computer Science Using Only Mobile Devices with TouchDevelop (NT, MM, JdH, MF, TX), pp. 87–89.
ITiCSEITiCSE-2012-CooperNS
Initial results of using an intelligent tutoring system with Alice (SC, YJN, LS), pp. 138–143.
ITiCSEITiCSE-2012-GoldweberDJ #hardware #operating system
Supporting operating systems projects using the μMPS2 hardware simulator (MG, RD, TJ), pp. 63–68.
ITiCSEITiCSE-2012-Impagliazzo
Using professional and ethical themes (JI), p. 374.
ITiCSEITiCSE-2012-Law #interactive #student
Using quick response codes for student interaction during lectures (RL), p. 401.
ITiCSEITiCSE-2012-Santos12a #education #java
Developing contexts for teaching Java using AGUIA/J (ALS), p. 378.
SIGITESIGITE-2012-AhmadzadehM #algorithm #clustering #education #programming #research
A feasibility study on using clustering algorithms in programming education research (MA, EM), pp. 145–150.
SIGITESIGITE-2012-AndersonG #case study #experience #programming #student
Engaging undergraduate programming students: experiences using lego mindstorms NXT (MA, CG), pp. 139–144.
SIGITESIGITE-2012-BrannockN #development #testing
Real-world testing: using FOSS for software development courses (EB, NPN), pp. 87–88.
SIGITESIGITE-2012-GirtonGMY #development #overview #perspective #student
Using student professional development planning to inform program review (AG, SG, JRM, DWY), pp. 71–74.
SIGITESIGITE-2012-KercherR #risk management #student
Risks, rewards and raising awareness: training a cyber workforce using student red teams (KEK, DCR), pp. 75–80.
SIGITESIGITE-2012-SeolSK #learning #mobile #student #towards
Use of a mobile application to promote scientific discovery learning: students’ perceptions towards and practical adoption of a mobile application (SS, AS, PK), pp. 121–126.
TFPIETFPIE-2012-ODonnell #education #functional #hardware
Connecting the Dots: Computer Systems Education using a Functional Hardware Description Language (JTO), pp. 20–39.
CSMRCSMR-2012-BettenburgTH #code search #fuzzy #source code
Using Fuzzy Code Search to Link Code Fragments in Discussions to Source Code (NB, SWT, AEH), pp. 319–328.
CSMRCSMR-2012-GoulaoFWA #analysis #case study #comparative #evolution #predict
Software Evolution Prediction Using Seasonal Time Analysis: A Comparative Study (MG, NF, MW, FBeA), pp. 213–222.
CSMRCSMR-2012-GrantCS #maintenance #modelling #topic
Using Topic Models to Support Software Maintenance (SG, JRC, DBS), pp. 403–408.
CSMRCSMR-2012-HosseiniNG #debugging #predict
A Market-Based Bug Allocation Mechanism Using Predictive Bug Lifetimes (HH, RN, MWG), pp. 149–158.
CSMRCSMR-2012-JaszSBOG #impact analysis
Impact Analysis Using Static Execute After in WebKit (JJ, LS, ÁB, CO, TG), pp. 95–104.
CSMRCSMR-2012-Koschke #clone detection #detection #scalability
Large-Scale Inter-System Clone Detection Using Suffix Trees (RK), pp. 309–318.
CSMRCSMR-2012-MoghadamC #automation #design #difference #refactoring
Automated Refactoring Using Design Differencing (IHM, MÓC), pp. 43–52.
CSMRCSMR-2012-PetersZ #mining #repository #smell
Evaluating the Lifespan of Code Smells using Software Repository Mining (RP, AZ), pp. 411–416.
ICPCICPC-2012-LuciaPOPP #information retrieval #question #source code
Using IR methods for labeling source code artifacts: Is it worthwhile? (ADL, MDP, RO, AP, SP), pp. 193–202.
ICPCICPC-2012-SajnaniOL #clone detection #detection #parallel #pipes and filters
Parallel code clone detection using MapReduce (HS, JO, CVL), pp. 261–262.
ICSMEICSM-2012-AliSGA #empirical #requirements #traceability
An empirical study on requirements traceability using eye-tracking (NA, ZS, YGG, GA), pp. 191–200.
ICSMEICSM-2012-KobayashiKKYM #clustering #composition #dependence
Feature-gathering dependency-based software clustering using Dedication and Modularity (KK, MK, KK, KY, AM), pp. 462–471.
ICSMEICSM-2012-KoutersVSB #gnome #repository
Who’s who in Gnome: Using LSA to merge software repository identities (EK, BV, AS, MvdB), pp. 592–595.
ICSMEICSM-2012-QiML #automation #performance #scalability #source code
Making automatic repair for large-scale programs more efficient using weak recompilation (YQ, XM, YL), pp. 254–263.
ICSMEICSM-2012-QuAR #impact analysis #testing
Configuration selection using code change impact analysis for regression testing (XQ, MA, BR), pp. 129–138.
ICSMEICSM-2012-RupakhetiH #constraints #fault #modelling #similarity #theorem proving
Finding errors from reverse-engineered equality models using a constraint solver (CRR, DH), pp. 77–86.
MSRMSR-2012-ChenTNH #fault #modelling #topic
Explaining software defects using topic models (THC, SWT, MN, AEH), pp. 189–198.
SCAMSCAM-2012-AftandilianSPK #compilation #java #program analysis #tool support
Building Useful Program Analysis Tools Using an Extensible Java Compiler (EA, RS, SP, SK), pp. 14–23.
SCAMSCAM-2012-AliSGA #debugging
Improving Bug Location Using Binary Class Relationships (NA, AS, YGG, GA), pp. 174–183.
SCAMSCAM-2012-HillRK #debugging #java #locality #on the
On the Use of Stemming for Concern Location and Bug Localization in Java (EH, SR, ACK), pp. 184–193.
SCAMSCAM-2012-SchrettnerJGBG #clustering #dependence #impact analysis
Impact Analysis in the Presence of Dependence Clusters Using Static Execute after in WebKit (LS, JJ, TG, ÁB, TG), pp. 24–33.
WCREWCRE-2012-DaviesRW #debugging #locality #similarity
Using Bug Report Similarity to Enhance Bug Localisation (SD, MR, MW), pp. 125–134.
WCREWCRE-2012-HemelK #case study #clone detection #detection #linux #reverse engineering #source code #variability
Reverse Engineering Variability in Source Code Using Clone Detection: A Case Study for Linux Variants of Consumer Electronic Devices (AH, RK), pp. 357–366.
WCREWCRE-2012-JanaN #detection #dynamic analysis #precise
Precise Detection of Uninitialized Variables Using Dynamic Analysis — Extending to Aggregate and Vector Types (AJ, RN), pp. 197–201.
WCREWCRE-2012-LavoieKMZ #clone detection #detection #nearest neighbour #repository
Inferring Repository File Structure Modifications Using Nearest-Neighbor Clone Detection (TL, FK, EM, YZ), pp. 325–334.
WCREWCRE-2012-RomanoRPK #fine-grained #source code
Analyzing the Impact of Antipatterns on Change-Proneness Using Fine-Grained Source Code Changes (DR, PR, MP, FK), pp. 437–446.
WCREWCRE-2012-SteidlHJ #analysis #network #recommendation
Using Network Analysis for Recommendation of Central Software Classes (DS, BH, EJ), pp. 93–102.
WCREWCRE-2012-ZiftciK #data mining #feature model #mining
Feature Location Using Data Mining on Existing Test-Cases (CZ, IK), pp. 155–164.
ICALPICALP-v1-2012-JefferyKM #complexity #graph #matrix #multi #quantum #query
Improving Quantum Query Complexity of Boolean Matrix Multiplication Using Graph Collision (SJ, RK, FM), pp. 522–532.
ICALPICALP-v1-2012-KrauthgamerZ
Preserving Terminal Distances Using Minors (RK, TZ), pp. 594–605.
FMFM-2012-BenkiraneNSS #algebra #process
Measles Epidemics and PEPA: An Exploration of Historic Disease Dynamics Using Process Algebra (SB, RN, ES, CS), pp. 101–115.
FMFM-2012-HieronsMN #distributed #order #testing
Using Time to Add Order to Distributed Testing (RMH, MGM, MN), pp. 232–246.
FMFM-2012-OsaiweranFGR #case study #component #design #experience #formal method
Experience Report on Designing and Developing Control Components Using Formal Methods (AO, TF, JFG, BJvR), pp. 341–355.
FMFM-2012-PlaggeL #validation
Validating B, Z and TLA + Using ProB and Kodkod (DP, ML), pp. 372–386.
FMFM-2012-SongT #detection #model checking #performance
Efficient Malware Detection Using Model-Checking (FS, TT), pp. 418–433.
FMFM-2012-YangKK #formal method #lightweight
Specification-Based Test Repair Using a Lightweight Formal Method (GY, SK, MK), pp. 455–470.
IFMIFM-2012-HoomanMW #abstraction #detection #fault #industrial #modelling
Early Fault Detection in Industry Using Models at Various Abstraction Levels (JH, AJM, HvW), pp. 268–282.
IFMIFM-2012-RochaBCN #bound #comprehension #debugging #model checking #programming
Understanding Programming Bugs in ANSI-C Software Using Bounded Model Checking Counter-Examples (HR, RSB, LCC, ADN), pp. 128–142.
SEFMSEFM-2012-BicknellRBCS #approach #verification
A Practical Approach for Closed Systems Formal Verification Using Event-B (BB, JR, MJB, JC, CFS), pp. 323–332.
SEFMSEFM-2012-LefticaruI #algorithm #approach #finite #generative #search-based #state machine #testing
An Improved Test Generation Approach from Extended Finite State Machines Using Genetic Algorithms (RL, FI), pp. 293–307.
SEFMSEFM-2012-MatichukM #automation #proving #specification
Extensible Specifications for Automatic Re-use of Specifications and Proofs (DM, TCM), pp. 333–341.
HaskellHaskell-2012-AdamsD #haskell #performance #programming
Template your boilerplate: using template haskell for efficient generic programming (MDA0, TD), pp. 13–24.
ICFPICFP-2012-Danielsson #monad #semantics
Operational semantics using the partiality monad (NAD), pp. 127–138.
AIIDEAIIDE-2012-DesaiS #behaviour
Enhancing the Believability of Character Behaviors Using Non-Verbal Cues (ND, DS).
AIIDEAIIDE-2012-MullerHBS #game studies
Glengarry Glen Ross: Using BDI for Sales Game Dialogues (TJM, AH, KvdB, IS).
AIIDEAIIDE-2012-ShakerYTNO #evolution #personalisation
Evolving Personalized Content for Super Mario Bros Using Grammatical Evolution (NS, GNY, JT, MN, MO0).
CoGCIG-2012-BenbassatS #evolution #programming #search-based
Evolving both search and strategy for Reversi players using genetic programming (AB, MS), pp. 47–54.
CoGCIG-2012-BrandstetterA #information retrieval #programming #search-based
Reactive control of Ms. Pac Man using information retrieval based on Genetic Programming (MFB, SA), pp. 250–256.
CoGCIG-2012-ShakerNYTO #evolution
Evolving levels for Super Mario Bros using grammatical evolution (NS, MN, GNY, JT, MO0), pp. 304–311.
FDGFDG-2012-IsbisterKF #exclamation
Scoop!: using movement to reduce math anxiety and affect confidence (KI, MK, JF), pp. 228–230.
FDGFDG-2012-ScerboB #design #game studies
Design issues when using commodity gaming devices for virtual object manipulation (SS, DAB), pp. 294–295.
FDGFDG-2012-SimmonsDG #development #game studies #programming
Using game development to reveal programming competency (SS, BJD, MG), pp. 89–96.
FDGFDG-2012-YinRB #interactive #novel #visual notation
Using an interactive visual novel to promote patient empowerment through engagement (LY, LR, TWB), pp. 41–48.
CoGVS-Games-2012-AsteriadisKSY #behaviour #clustering #detection #towards #visual notation
Towards Detecting Clusters of Players using Visual and Gameplay Behavioral Cues (SA, KK, NS, GNY), pp. 140–147.
CoGVS-Games-2012-HaugePR #education #game studies
Workshop on the Use of Serious Games in the Education of Engineers (JBH, BP, JckhR), pp. 341–342.
CoGVS-Games-2012-OostendorpK #3d #navigation
Using a Cognitive Model of Web-Navigation to Generate Support for 3D Virtual Navigation (HvO, SK), pp. 283–284.
ICGTICGT-2012-Ong #graph transformation #multi #programming language #rule-based
Multi-scale Rule-Based Graph Transformation Using the Programming Language XL (YO), pp. 417–419.
CHICHI-2012-AndrewsBEK #branch #interactive
Creating and using interactive narratives: reading and writing branching comics (DA, CB, SE, MK), pp. 1703–1712.
CHICHI-2012-Barkhuus #human-computer #privacy
The mismeasurement of privacy: using contextual integrity to reconsider privacy in HCI (LB), pp. 367–376.
CHICHI-2012-BullingAS #security #visual notation
Increasing the security of gaze-based cued-recall graphical passwords using saliency masks (AB, FA, AS), pp. 3011–3020.
CHICHI-2012-CohnMPT #interactive #named #realtime
Humantenna: using the body as an antenna for real-time whole-body interaction (GC, DM, SP, DST), pp. 1901–1910.
CHICHI-2012-DearmanGT #mobile
Determining the orientation of proximate mobile devices using their back facing camera (DD, RTG, KNT), pp. 2231–2234.
CHICHI-2012-DearmanT
Evaluating the implicit acquisition of second language vocabulary using a live wallpaper (DD, KNT), pp. 1391–1400.
CHICHI-2012-DixonFW #analysis #interface #visual notation
A general-purpose target-aware pointing enhancement using pixel-level analysis of graphical interfaces (MD, JF, JOW), pp. 3167–3176.
CHICHI-2012-FallahABF #navigation #visual notation
The user as a sensor: navigating users with visual impairments in indoor spaces using tactile landmarks (NF, IA, KEB, EF), pp. 425–432.
CHICHI-2012-GhomiFHCB
Using rhythmic patterns as an input method (EG, GF, SH, OC, MBL), pp. 1253–1262.
CHICHI-2012-GoelFW #mobile #named
WalkType: using accelerometer data to accomodate situational impairments in mobile touch screen text entry (MG, LF, JOW), pp. 2687–2696.
CHICHI-2012-GuptaMPT #gesture #named
SoundWave: using the doppler effect to sense gestures (SG, DM, SP, DST), pp. 1911–1914.
CHICHI-2012-HarrisonH #2d #interactive
Using shear as a supplemental two-dimensional input channel for rich touchscreen interaction (CH, SEH), pp. 3149–3152.
CHICHI-2012-HayashiPOH #named
WebTicket: account management using printable tokens (EH, BAP, FO, JIH), pp. 997–1006.
CHICHI-2012-HenzeRB #behaviour #mobile #type system
Observational and experimental investigation of typing behaviour using virtual keyboards for mobile devices (NH, ER, SB), pp. 2659–2668.
CHICHI-2012-HietanenSAL #image
: helping the legal use of creative commons images (HH, AS, KA, YL), pp. 599–608.
CHICHI-2012-HuhnKLK #evaluation #on the
On the use of virtual environments for the evaluation of location-based applications (AEH, VJK, AL, PK), pp. 2569–2578.
CHICHI-2012-KjeldskovSPP #case study #mobile
Using mobile phones to support sustainability: a field study of residential electricity consumption (JK, MBS, JP, RP), pp. 2347–2356.
CHICHI-2012-KlempererLMSUBCGR #data access #exclamation
Tag, you can see it!: using tags for access control in photo sharing (PFK, YL, MLM, MS, BU, LB, LFC, NG, MKR), pp. 377–386.
CHICHI-2012-KumarRTAK #game studies #mobile #speech
Improving literacy in developing countries using speech recognition-supported games on mobile devices (AK, PR, AT, RA, MK), pp. 1149–1158.
CHICHI-2012-LicoppeI #case study #mobile #quote
“Timid encounters”: a case study in the use of proximity-based mobile technologies (CL, YI), pp. 2759–2768.
CHICHI-2012-LindsayJSO #design #people
Engaging older people using participatory design (SL, DJ, GS, PO), pp. 1199–1208.
CHICHI-2012-NicolauJ #comprehension #type system
Touch typing using thumbs: understanding the effect of mobility and hand posture (HN, JAJ), pp. 2683–2686.
CHICHI-2012-QiB #memory management
Animating paper using shape memory alloys (JQ, LB), pp. 749–752.
CHICHI-2012-SchwarzKHDW #ad hoc #mobile #scalability
Phone as a pixel: enabling ad-hoc, large-scale displays using mobile devices (JS, DK, CH, PD, AW), pp. 2235–2238.
CHICHI-2012-TangMHRIZC #interactive #lightweight #video
Time travel proxy: using lightweight video recordings to create asynchronous, interactive meetings (JCT, JM, AH, AR, KI, CZ, XC), pp. 3111–3120.
CHICHI-2012-VardoulakisKMSGT #mobile
Using mobile phones to present medical information to hospital patients (LPV, AKK, DM, GS, JG, DST), pp. 1411–1420.
CHICHI-2012-YataniBT #feedback #named #people #representation #visual notation
SpaceSense: representing geographical information to visually impaired people using spatial tactile feedback (KY, NB, KNT), pp. 415–424.
CHICHI-2012-YemKYSYY
Assisting hand skill transfer of tracheal intubation using outer-covering haptic display (VY, HK, NY, RS, HY, JY), pp. 3177–3180.
CSCWCSCW-2012-BoltonKV #comparison #performance
A comparison of competitive and cooperative task performance using spherical and flat displays (JB, KK, RV), pp. 529–538.
CSCWCSCW-2012-FollmerBRSI #interactive #people
People in books: using a FlashCam to become part of an interactive book for connected reading (SF, RB, HR, MS, HI), pp. 685–694.
CSCWCSCW-2012-JuAL #game studies #low cost
Using low cost game controllers to capture data for 6th grade science labs (WJ, UA, SL), pp. 1115–1124.
CSCWCSCW-2012-NagpalHJL #personalisation #social #web
Friends, romans, countrymen: lend me your URLs. using social chatter to personalize web search (AN, SH, RRJ, MSL), pp. 461–470.
CSCWCSCW-2012-RobinsonJVM #authoring #collaboration #named
PicoTales: collaborative authoring of animated stories using handheld projectors (SR, MJ, EV, GM), pp. 671–680.
CAiSECAiSE-2012-SchalerLRS #database #information management
Building Information System Variants with Tailored Database Schemas Using Features (MS, TL, MR, GS), pp. 597–612.
CAiSECAiSE-2012-ZawawyKMM #analysis #logic #markov #network
Requirements-Driven Root Cause Analysis Using Markov Logic Networks (HZ, KK, JM, SM), pp. 350–365.
ICEISICEIS-J-2012-FabbriHTBZS12a #mining #visualisation
Using Information Visualization and Text Mining to Facilitate the Conduction of Systematic Literature Reviews (SF, EMH, ADT, AB, AZ, CS), pp. 243–256.
ICEISICEIS-J-2012-GottardiPC12a #approach #framework #modelling #reuse
Accelerating Crosscutting Framework Reuse Using a Model-Based Approach (TG, OPL, VVdC), pp. 257–273.
ICEISICEIS-v1-2012-AmarGMHLN #concept analysis
Using Formal Concept Analysis to Extract a Greatest Common Model (BA, AOG, AM, MH, TL, CN), pp. 27–37.
ICEISICEIS-v1-2012-AyresS #fuzzy #mining #ontology #similarity
Mining Generalized Association Rules using Fuzzy Ontologies with Context-based Similarity (RMJA, MTPS), pp. 74–83.
ICEISICEIS-v1-2012-KosorusBK #query #semantics #similarity #taxonomy
Semantic Similarity between Queries in QA System using a Domain-specific Taxonomy (HK, AB, JK), pp. 241–246.
ICEISICEIS-v1-2012-TertiltBK #algorithm #enterprise #modelling #performance #scalability
Modeling the Performance and Scalability of a SAP ERP System using an Evolutionary Algorithm (DT, AB, HK), pp. 112–118.
ICEISICEIS-v2-2012-AleixoKFCN #case study #comparative #modelling #process
Modularizing Software Process Lines using Model-driven Approaches — A Comparative Study (FAA, UK, MAF, DAdC, ECN), pp. 120–125.
ICEISICEIS-v2-2012-AokiOOM #model checking #quality #requirements #specification
Quality Improvement of Requirements Specification using Model Checking Technique (YA, SO, HO, SM), pp. 401–406.
ICEISICEIS-v2-2012-FonteBCGH #evaluation #program analysis
Program Analysis and Evaluation using Quimera (DF, IVB, DCdC, ALG, PRH), pp. 209–219.
ICEISICEIS-v2-2012-FrancaS #aspect-oriented #evaluation #metric #overview #programming
A Systematic Review on Evaluation of Aspect Oriented Programming using Software Metrics (JMSF, MdSS), pp. 77–83.
ICEISICEIS-v2-2012-LukaszewskiJL #data mining #mining #ontology #semantics
Attribute Value Ontology — Using Semantics in Data Mining (TL, JJ, AL), pp. 329–334.
ICEISICEIS-v2-2012-PantojaC #approach #development
A MDA Approach for Agent-oriented Development using FAML (CEP, RC), pp. 415–420.
ICEISICEIS-v2-2012-ReichelR #process #requirements
Prioritization of Product Requirements using the Analytic Hierarchy Process (TR, GR), pp. 70–76.
ICEISICEIS-v2-2012-YiasemisA #automation #fault #locality #mutation testing #testing
Dynamic Localisation and Automatic Correction of Software Faults using Evolutionary Mutation Testing (PSY, ASA), pp. 15–26.
ICEISICEIS-v3-2012-AkikiBY #adaptation #enterprise #modelling #runtime #user interface
Using Interpreted Runtime Models for Devising Adaptive User Interfaces of Enterprise Applications (PAA, AKB, YY), pp. 72–77.
ICEISICEIS-v3-2012-CansadoVS #analysis #architecture #enterprise #multi
Using Multi-criteria Analysis to Evaluate Enterprise Architecture Scenarios (FC, AV, GS), pp. 232–237.
ICEISICEIS-v3-2012-HamadaASO #classification #documentation #taxonomy
A Classification Method of Open-ended Questionnaires using Category-based Dictionary from Sampled Documents (KH, MA, MS, HO), pp. 193–198.
CIKMCIKM-2012-AgarwalCW #multi #ranking
Multi-faceted ranking of news articles using post-read actions (DA, BCC, XW), pp. 694–703.
CIKMCIKM-2012-BaeJKL #detection
Outlier detection using centrality and center-proximity (DHB, SJ, SWK, ML), pp. 2251–2254.
CIKMCIKM-2012-BambaSGBF #concept #recommendation #scalability
The twitaholic next door.: scalable friend recommender system using a concept-sensitive hash function (PB, JS, CG, NB, JF), pp. 2275–2278.
CIKMCIKM-2012-BannourH #image #semantics
Hierarchical image annotation using semantic hierarchies (HB, CH), pp. 2431–2434.
CIKMCIKM-2012-CheungSM #recommendation #social #synthesis
Using program synthesis for social recommendations (AC, ASL, SM), pp. 1732–1736.
CIKMCIKM-2012-ChiangWD #clustering #network #normalisation #scalability
Scalable clustering of signed networks using balance normalized cut (KYC, JJW, ISD), pp. 615–624.
CIKMCIKM-2012-ChongCZSQZ #pattern matching #rdf
RDF pattern matching using sortable views (ZC, HC, ZZ, HS, GQ, AZ), pp. 315–324.
CIKMCIKM-2012-Chung
Finding food entity relationships using user-generated data in recipe service (YjC), pp. 2611–2614.
CIKMCIKM-2012-CosciaR #how #web
Knowing where and how criminal organizations operate using web content (MC, VR), pp. 1412–1421.
CIKMCIKM-2012-GopalakrishnanIMRS
Matching product titles using web-based enrichment (VG, SPI, AM, RR, SHS), pp. 605–614.
CIKMCIKM-2012-HuangCLL #predict #probability #process #social
Predicting aggregate social activities using continuous-time stochastic process (SH, MC, BL, DL), pp. 982–991.
CIKMCIKM-2012-HwangLKL #on the #performance #recommendation
On using category experts for improving the performance and accuracy in recommender systems (WSH, HJL, SWK, ML), pp. 2355–2358.
CIKMCIKM-2012-KhabsaTG
Entity resolution using search engine results (MK, PT, CLG), pp. 2363–2366.
CIKMCIKM-2012-KimYK #equation #query #retrieval #word
Mathematical equation retrieval using plain words as a query (SK, SY, YK), pp. 2407–2410.
CIKMCIKM-2012-LinDH0S #automation #image #random #visual notation
Automatic image annotation using tag-related random search over visual neighbors (ZL, GD, MH, JW, JS), pp. 1784–1788.
CIKMCIKM-2012-LinTCXS #effectiveness #performance #sentiment
Effective and efficient?: bilingual sentiment lexicon extraction using collocation alignment (ZL, ST, XC, XX, WS), pp. 1542–1546.
CIKMCIKM-2012-LongCZZ #classification #named
TCSST: transfer classification of short & sparse text using external data (GL, LC, XZ, CZ), pp. 764–772.
CIKMCIKM-2012-LongGXK #approach #design
A simple approach to the design of site-level extractors using domain-centric principles (CL, XG, CX, SK), pp. 1517–1521.
CIKMCIKM-2012-McCreadieMOGJ #crowdsourcing #web
An examination of content farms in web search using crowdsourcing (RM, CM, IO, JG, FJ), pp. 2551–2554.
CIKMCIKM-2012-MendesMZB #graph #similarity
Measuring website similarity using an entity-aware click graph (PNM, PM, HZ, RB), pp. 1697–1701.
CIKMCIKM-2012-NegahbanRG #learning #multi #performance #scalability #statistics
Scaling multiple-source entity resolution using statistically efficient transfer learning (SN, BIPR, JG), pp. 2224–2228.
CIKMCIKM-2012-NoroziAV #documentation #wiki
Contextualization using hyperlinks and internal hierarchical structure of Wikipedia documents (MAN, PA, APdV), pp. 734–743.
CIKMCIKM-2012-QureshiOP #n-gram #wiki
Short-text domain specific key terms/phrases extraction using an n-gram model with wikipedia (MAQ, CO, GP), pp. 2515–2518.
CIKMCIKM-2012-RaiberKT #estimation #web
Content-based relevance estimation on the web using inter-document similarities (FR, OK, MT), pp. 1769–1773.
CIKMCIKM-2012-SiposSSJ #corpus #summary #word
Temporal corpus summarization using submodular word coverage (RS, AS, PS, TJ), pp. 754–763.
CIKMCIKM-2012-SrinivasanBC #modelling
Segmenting web-domains and hashtags using length specific models (SS, SB, RC), pp. 1113–1122.
CIKMCIKM-2012-TsatsaronisVN #documentation #named #semantics
SemaFor: semantic document indexing using semantic forests (GT, IV, KN), pp. 1692–1696.
CIKMCIKM-2012-WangQD #automation #clustering #documentation
Improving document clustering using automated machine translation (XW, BQ, ID), pp. 645–653.
CIKMCIKM-2012-WangWLL #graph #keyword #ranking #wiki
Exploring simultaneous keyword and key sentence extraction: improve graph-based ranking using wikipedia (XW, LW, JL, SL), pp. 2619–2622.
CIKMCIKM-2012-WangZCM #network #retrieval
Top-k retrieval using conditional preference networks (HW, XZ, WC, PM), pp. 2075–2079.
CIKMCIKM-2012-WeiFLC #canonical #dependence
Model the complex dependence structures of financial variables by using canonical vine (WW, XF, JL, LC), pp. 1382–1391.
CIKMCIKM-2012-WongCTP #web
Mixed-initiative conversational system using question-answer pairs mined from the web (WW, LC, JT, LP), pp. 2707–2709.
CIKMCIKM-2012-YanGLCW #clustering #matrix
Clustering short text using Ncut-weighted non-negative matrix factorization (XY, JG, SL, XC, YW), pp. 2259–2262.
CIKMCIKM-2012-YangZW #collaboration #incremental #predict #scalability
Scalable collaborative filtering using incremental update and local link prediction (XY, ZZ, KW), pp. 2371–2374.
CIKMCIKM-2012-YuSNMH #network #similarity
User guided entity similarity search using meta-path selection in heterogeneous information networks (XY, YS, BN, TM, JH), pp. 2025–2029.
ECIRECIR-2012-BoudinND #predict #query
Using a Medical Thesaurus to Predict Query Difficulty (FB, JYN, MD), pp. 480–484.
ECIRECIR-2012-MantrachR12a #multi #query
A Mailbox Search Engine Using Query Multi-modal Expansion and Community-Based Smoothing (AM, JMR), pp. 576–577.
ECIRECIR-2012-NawabSC #documentation #query
Retrieving Candidate Plagiarised Documents Using Query Expansion (RMAN, MS, PDC), pp. 207–218.
ECIRECIR-2012-OghinaBTR #predict #social #social media
Predicting IMDB Movie Ratings Using Social Media (AO, MB, MT, MdR), pp. 503–507.
ECIRECIR-2012-TholpadiDBS #clustering #corpus #multi
Cluster Labeling for Multilingual Scatter/Gather Using Comparable Corpora (GT, MKD, CB, SKS), pp. 388–400.
ECIRECIR-2012-ZucconAZW #analysis #retrieval
Top-k Retrieval Using Facility Location Analysis (GZ, LA, DZ, JW), pp. 305–316.
ICMLICML-2012-Araya-LopezBT
Near-Optimal BRL using Optimistic Local Transitions (MAL, OB, VT), p. 70.
ICMLICML-2012-Ben-DavidLSS #classification #fault
Minimizing The Misclassification Error Rate Using a Surrogate Convex Loss (SBD, DL, NS, KS), p. 16.
ICMLICML-2012-BoukouvalasBC #process
Gaussian Process Quantile Regression using Expectation Propagation (AB, RB, DC), p. 123.
ICMLICML-2012-Busa-FeketeBK #classification #graph #performance
Fast classification using sparse decision DAGs (RBF, DB, BK), p. 99.
ICMLICML-2012-DhillonRFU #modelling #word
Using CCA to improve CCA: A new spectral method for estimating vector models of words (PSD, JR, DPF, LHU), p. 13.
ICMLICML-2012-HaiderS #clustering #graph
Finding Botnets Using Minimal Graph Clusterings (PH, TS), p. 37.
ICMLICML-2012-JalaliS12a #clustering #optimisation
Clustering using Max-norm Constrained Optimization (AJ, NS), p. 205.
ICMLICML-2012-JiangLS #3d #learning
Learning Object Arrangements in 3D Scenes using Human Context (YJ, ML, AS), p. 119.
ICMLICML-2012-LeRMDCCDN #learning #scalability
Building high-level features using large scale unsupervised learning (QVL, MR, RM, MD, GC, KC, JD, AYN), p. 69.
ICMLICML-2012-SejdinovicGSF #kernel #testing
Hypothesis testing using pairwise distances and associated kernels (DS, AG, BKS, KF), p. 104.
ICMLICML-2012-ShanKRBSR #matrix #predict #probability
Gap Filling in the Plant Kingdom — Trait Prediction Using Hierarchical Probabilistic Matrix Factorization (HS, JK, PBR, AB, FS, MR), p. 47.
ICMLICML-2012-SilverC #composition #modelling
Compositional Planning Using Optimal Option Models (DS, KC), p. 165.
ICMLICML-2012-YuSL #network #speech
Conversational Speech Transcription Using Context-Dependent Deep Neural Networks (DY, FS, GL), p. 1.
ICMLICML-2012-ZhaiHBW #image #modelling #process
Modeling Images using Transformed Indian Buffet Processes (KZ, YH, JLBG, SW), p. 118.
ICPRICPR-2012-0001ZP #segmentation
Unsupervised dynamic texture segmentation using local descriptors in volumes (JC, GZ, MP), pp. 3622–3625.
ICPRICPR-2012-AfzalBKSB #documentation #image #parametricity #robust
Robust stereo matching for document images using parameter selection of text-line extraction (MZA, SSB, MK, FS, TMB), pp. 331–334.
ICPRICPR-2012-AhmedA #gesture #modelling
Flow Modeling and skin-based Gaussian pruning to recognize gestural actions using HMM (ORA, AAH), pp. 3488–3491.
ICPRICPR-2012-AliGBPNP #biology #classification
Classification of biological cells using bio-inspired descriptors (WBHA, DG, MB, PP, RN, TP), pp. 3353–3357.
ICPRICPR-2012-AotoTSMY #estimation
Position estimation of near point light sources using a clear hollow sphere (TA, TT, TS, YM, NY), pp. 3721–3724.
ICPRICPR-2012-AryafarJS #automation #classification
Automatic musical genre classification using sparsity-eager support vector machines (KA, SJ, AS), pp. 1526–1529.
ICPRICPR-2012-AttamimiNN #markov #multi #recognition
Hierarchical multilevel object recognition using Markov model (MA, TN, TN), pp. 2963–2966.
ICPRICPR-2012-AydemirEGK #summary #video
Video summarization using simple action patterns (MSA, UE, AG, MEK), pp. 2047–2050.
ICPRICPR-2012-AzizWH
Shape signature using the edge-based Laplacian (FA, RCW, ERH), pp. 1594–1597.
ICPRICPR-2012-BaiHHR #clustering #complexity #graph
Graph clustering using graph entropy complexity traces (LB, ERH, LH, PR), pp. 2881–2884.
ICPRICPR-2012-BaiHR #graph #kernel
Jensen-Shannon graph kernel using information functionals (LB, ERH, PR), pp. 2877–2880.
ICPRICPR-2012-BanerjeeN #kernel #learning #multi #process #recognition
Pose based activity recognition using Multiple Kernel learning (PB, RN), pp. 445–448.
ICPRICPR-2012-BarbulescuGGMR #2d #3d #detection #estimation
3D human pose estimation using 2D body part detectors (AB, WG, JG, TBM, FXR), pp. 2484–2487.
ICPRICPR-2012-BespalovQBS #classification #image #scalability
Large-scale image classification using supervised spatial encoder (DB, YQ, BB, AS), pp. 581–584.
ICPRICPR-2012-BicegoL #2d #biology #recognition #sequence #tool support
2D shape recognition using biological sequence alignment tools (MB, PL), pp. 1359–1362.
ICPRICPR-2012-BoomHHF #clustering #dataset #image
Supporting ground-truth annotation of image datasets using clustering (BJB, PXH, JH, RBF), pp. 1542–1545.
ICPRICPR-2012-BougesCBL #classification #nearest neighbour
Using k-nearest neighbors to handle missing weak classifiers in a boosted cascade (PB, TC, CB, GL), pp. 1763–1766.
ICPRICPR-2012-BoulmerkaA #segmentation
Thresholding-based segmentation revisited using mixtures of generalized Gaussian distributions (AB, MSA), pp. 2894–2897.
ICPRICPR-2012-BuchholzKWW #3d #image #locality
3D object localization using single camera images (DB, DK, SW, FMW), pp. 821–824.
ICPRICPR-2012-ChangDZDW #representation #sketching #synthesis
Smoothness-constrained face photo-sketch synthesis using sparse representation (LC, XD, MZ, FD, ZW), pp. 3025–3029.
ICPRICPR-2012-ChenHCHC #analysis
Occluded human action analysis using dynamic manifold model (LCC, JWH, CHC, CYH, DYC), pp. 1245–1248.
ICPRICPR-2012-ChenLL #artificial reality #image
Depth image enhancement for Kinect using region growing and bilateral filter (LC, HL, SL), pp. 3070–3073.
ICPRICPR-2012-ChenXF #approximate
Compression of GPS trajectories using optimized approximation (MC, MX, PF), pp. 3180–3183.
ICPRICPR-2012-CheungP #detection
Salient region detection using local and global saliency (YmC, QP), pp. 210–213.
ICPRICPR-2012-ChowdhuryBP #detection
Scene text detection using sparse stroke information and MLP (ARC, UB, SKP), pp. 294–297.
ICPRICPR-2012-ChowdhuryKPD #design #graph #video
Video storyboard design using Delaunay graphs (ASC, SKK, RP, MND), pp. 3108–3111.
ICPRICPR-2012-CrandallFP #modelling #probability #visual notation
Layer-finding in radar echograms using probabilistic graphical models (DJC, GCF, JP), pp. 1530–1533.
ICPRICPR-2012-DattaBFP #identification #modelling
Appearance modeling for person re-identification using Weighted Brightness Transfer Functions (AD, LMGB, RF, SP), pp. 2367–2370.
ICPRICPR-2012-DoTT #multi #representation
Text/graphic separation using a sparse representation with multi-learned dictionaries (THD, ST, ORT), pp. 689–692.
ICPRICPR-2012-EdmundsonS #image #performance #retrieval
Fast JPEG image retrieval using optimised Huffman tables (DE, GS), pp. 3188–3191.
ICPRICPR-2012-El-GaalyT #kernel #multi #recognition
RGBD object pose recognition using local-global multi-kernel regression (TEG, MT), pp. 2468–2471.
ICPRICPR-2012-ElnakibNCPGE #3d #analysis #quantifier
Quantification of age-related brain cortex change using 3D shape analysis (AE, MN, MC, HYP, GLG, AEB), pp. 41–44.
ICPRICPR-2012-ErsoyBPP #classification #image
HEp-2 cell classification in IIF images using Shareboost (IE, FB, JP, KP), pp. 3362–3365.
ICPRICPR-2012-FernandezT #documentation #segmentation
Document segmentation using Relative Location Features (FCF, ORT), pp. 1562–1565.
ICPRICPR-2012-Gao12a #clustering #estimation #multi
Facial age estimation using Clustered Multi-task Support Vector Regression Machine (PXG), pp. 541–544.
ICPRICPR-2012-GaoM #analysis #canonical #correlation #detection #kernel #multi
Multi-modality movie scene detection using Kernel Canonical Correlation Analysis (GG, HM), pp. 3074–3077.
ICPRICPR-2012-GlodekSPS #classification #markov #multi #network
Multi-modal Fusion based on classifiers using reject options and Markov Fusion Networks (MG, MS, GP, FS), pp. 1084–1087.
ICPRICPR-2012-GonfausGGRG #classification #geometry
Edge classification using photo-geometric features (JMG, TG, AG, FXR, JG), pp. 1497–1500.
ICPRICPR-2012-GujraniyaM #classification #modelling #performance #topic
Efficient classification using phrases generated by topic models (DG, MNM), pp. 2331–2334.
ICPRICPR-2012-HaraKMM #3d #generative #video
Fast-accurate 3D face model generation using a single video camera (TH, HK, AM, SM), pp. 1269–1272.
ICPRICPR-2012-HeLL #image
Single image super-resolution using Gaussian Mixture Model (HH, JL, XL), pp. 1916–1919.
ICPRICPR-2012-HesseGGE #multi #recognition
Multi-view facial expression recognition using local appearance features (NH, TG, HG, HKE), pp. 3533–3536.
ICPRICPR-2012-HsuNWC #component
Pedestrian tracking in low contrast regions using aggregated background model and Silhouette Components (GSH, HPN, CHW, SLC), pp. 3680–3683.
ICPRICPR-2012-HuangH #invariant
Binary invariant cross color descriptor using galaxy sampling (GHH, CRH), pp. 2610–2613.
ICPRICPR-2012-HuiC #robust #towards
Towards a robust hand-eye calibration using normal flows (TWH, RC), pp. 2545–2548.
ICPRICPR-2012-IkemuraF #detection
Human detection by Haar-like filtering using depth information (SI, HF), pp. 813–816.
ICPRICPR-2012-Imajo #algorithm #performance
Fast Gaussian filtering algorithm using splines (KI), pp. 489–492.
ICPRICPR-2012-InoueSK #representation
Local intensity compensation using sparse representation (KI, HS, YK), pp. 951–954.
ICPRICPR-2012-IshidaKKN #generative #recognition
Road marking recognition for map generation using sparse tensor voting (HI, KK, YK, TN), pp. 1132–1135.
ICPRICPR-2012-ItohTA #3d #graph #image #sequence
3D tracking of soccer players using time-situation graph in monocular image sequence (HI, TT, YA), pp. 2532–2536.
ICPRICPR-2012-IwamotoHSTXC #image #representation #self
Super-resolution of MR volumetric images using sparse representation and self-similarity (YI, XHH, SS, KT, WX, YWC), pp. 3758–3761.
ICPRICPR-2012-KananA #order #pseudo #recognition
Recognition of facial expressions using locally weighted and adjusted order Pseudo Zernike Moments (HRK, MA), pp. 3419–3422.
ICPRICPR-2012-KataokaSM #detection
Region of Interest detection using indoor structure and saliency map (KK, KS, MM), pp. 3329–3332.
ICPRICPR-2012-KawabataK #approach #multi
Plane based multi camera calibration under unknown correspondence using ICP-like approach (SK, YK), pp. 3700–3703.
ICPRICPR-2012-KawaiMHIY #identification
Person re-identification using view-dependent score-level fusion of gait and color features (RK, YM, CH, HI, YY), pp. 2694–2697.
ICPRICPR-2012-KennardBS #2d #approach #detection #geometry #verification
Offline signature verification and forgery detection using a 2-D geometric warping approach (DJK, WAB, TWS), pp. 3733–3736.
ICPRICPR-2012-KrijtheHL #classification
Improving cross-validation based classifier selection using meta-learning (JHK, TKH, ML), pp. 2873–2876.
ICPRICPR-2012-KuriharaA #correlation #image
Motion blur free photometric stereo using correlation image sensor (TK, SA), pp. 1872–1875.
ICPRICPR-2012-KusumaSLL #recognition #sequence
Appearance-based object recognition using weighted longest increasing subsequence (GPK, AS, YL, JAL), pp. 3668–3671.
ICPRICPR-2012-LamSS #image #statistics
Denoising hyperspectral images using spectral domain statistics (AL, IS, YS), pp. 477–480.
ICPRICPR-2012-LeeCP #estimation
Articulated hand configuration and rotation estimation using extended torus manifold embedding (CSL, SYC, SWP), pp. 441–444.
ICPRICPR-2012-LeeLCY #lightweight #random #representation
Lightweight Random Ferns using binary representation (SL, SWL, YNC, HSY), pp. 1342–1345.
ICPRICPR-2012-LinnerS #comparison #normalisation #quality
Comparison of restoration quality on square and hexagonal grids using normalized convolution (EL, RS), pp. 3046–3049.
ICPRICPR-2012-LinSCLH #recognition
Human action recognition using Action Trait Code (SYL, CKS, SCC, MSL, YPH), pp. 3456–3459.
ICPRICPR-2012-LiPMH #classification #email #incremental #learning
Business email classification using incremental subspace learning (ML, YP, RM, HYH), pp. 625–628.
ICPRICPR-2012-LiST #locality
Accurate iris localization using contour segments (HL, ZS, TT), pp. 3398–3401.
ICPRICPR-2012-LiuLS #documentation #image #modelling #probability #visual notation
Document image matching using probabilistic graphical models (LL, YL, CYS), pp. 637–640.
ICPRICPR-2012-LiuWZL
Pan-sharpening using weighted red-black wavelet (QL, YW, ZZ, LL), pp. 1908–1911.
ICPRICPR-2012-LiuXAR #geometry #recognition
Hand posture recognition using finger geometric feature (LL, JX, HA, XR), pp. 565–568.
ICPRICPR-2012-LiVBB #clustering #learning
Feature learning using Generalized Extreme Value distribution based K-means clustering (ZL, OV, HB, RB), pp. 1538–1541.
ICPRICPR-2012-LiW #encoding #matrix #recognition
Iris recognition using ordinal encoding of Log-Euclidean covariance matrices (PL, GW), pp. 2420–2423.
ICPRICPR-2012-LiYLKZL #classification #multi
Multiclass boosting SVM using different texture features in HEp-2 cell staining pattern classification (KL, JY, ZL, XK, RZ, WL), pp. 170–173.
ICPRICPR-2012-LuHLC #recognition
Insect species recognition using discriminative local soft coding (AL, XH, CLL, XC), pp. 1221–1224.
ICPRICPR-2012-LuLZSCO
Learning-based deformable registration using weighted mutual information (YL, RL, LZ, YS, CC, SHO), pp. 2626–2629.
ICPRICPR-2012-LuoKM #3d
Endoscope 3-D motion tracking using an aggressive particle filtering for boosting electromagnetic guidance endoscopy (XL, TK, KM), pp. 117–120.
ICPRICPR-2012-MaLXS #detection #image
Anomaly detection with spatio-temporal context using depth images (XM, TL, FX, FS), pp. 2590–2593.
ICPRICPR-2012-MartinezS #monitoring
Breath rate monitoring during sleep using near-ir imagery and PCA (MM, RS), pp. 3472–3475.
ICPRICPR-2012-McCloskeyD #detection #metadata #process #video
Activity detection in the wild using video metadata (SM, PD), pp. 3140–3143.
ICPRICPR-2012-MinKCK #approach #detection #higher-order
A superpixel MRF approach using high-order likelihood for moving object detection (JM, HK, JC, ISK), pp. 266–269.
ICPRICPR-2012-MoriyamaAS #analysis
Face analysis of aggressive moods in automobile driving using mutual subspace method (TM, KA, NS), pp. 2898–2901.
ICPRICPR-2012-MotlicekSWMM #authentication #mobile #modelling #variability
Bi-modal authentication in mobile environments using session variability modelling (PM, LES, RW, CM, SM), pp. 1100–1103.
ICPRICPR-2012-MujumdarVK #framework #multi #novel #segmentation
A novel framework for segmentation of stroke lesions in Diffusion Weighted MRI using multiple b-value data (SM, RV, LTK), pp. 3762–3765.
ICPRICPR-2012-NaitoKSS
Deblurring depth blur and motion blur simultaneously by using space-time coding (RN, TK, FS, JS), pp. 2177–2180.
ICPRICPR-2012-NakazawaMMNHYY #multi #re-engineering
Dynamic scene reconstruction using asynchronous multiple Kinects (MN, IM, YM, HN, HH, HY, YY), pp. 469–472.
ICPRICPR-2012-NarayanR #segmentation
Motion segmentation using curve fitting on Lagrangian particle trajectories (SN, KRR), pp. 3692–3695.
ICPRICPR-2012-NegrelPG #categorisation #image
Using spatial pyramids with compacted VLAT for image categorization (RN, DP, PHG), pp. 2460–2463.
ICPRICPR-2012-NgC #verification
Face verification using temporal affective cues (ESN, AYSC), pp. 1249–1252.
ICPRICPR-2012-NguyenVC #multi #recognition
Face recognition using Multi-modal Binary Patterns (TPN, NSV, AC), pp. 2343–2346.
ICPRICPR-2012-NiigakiSM #detection
Circular object detection based on separability and uniformity of feature distributions using Bhattacharyya Coefficient (HN, JS, MM), pp. 2009–2012.
ICPRICPR-2012-NikanA #recognition
Human face recognition under occlusion using LBP and entropy weighted voting (SN, MA), pp. 1699–1702.
ICPRICPR-2012-OumerP #3d #estimation #image
3D point tracking and pose estimation of a space object using stereo images (NWO, GP), pp. 796–800.
ICPRICPR-2012-PalenichkaPKL #image #modelling #multi
Model-based extraction of image area descriptors using a multi-scale attention operator (RMP, MP, YK, AL), pp. 853–856.
ICPRICPR-2012-PerdigotoA #3d #image #re-engineering
Reconstruction of 3D lines from a single axial catadioptric image using cross-ratio (LP, HA), pp. 857–860.
ICPRICPR-2012-PerezMMSV #recognition
Combining gradient histograms using orientation tensors for human action recognition (EdAP, VFM, LMM, DOS, MBV), pp. 3460–3463.
ICPRICPR-2012-PhanST #detection #symmetry
Text detection in natural scenes using Gradient Vector Flow-Guided symmetry (TQP, PS, CLT), pp. 3296–3299.
ICPRICPR-2012-PorwalZG #network #recognition
Handwritten Arabic text recognition using Deep Belief Networks (UP, YZ, VG), pp. 302–305.
ICPRICPR-2012-RebagliatiSPS #distance #edit distance #graph #set
Computing the graph edit distance using dominant sets (NR, ASR, MP, FS), pp. 1080–1083.
ICPRICPR-2012-ReinbacherRB #game studies #named
RoμNect: Hand mounted depth sensing using a commodity gaming sensor (CR, MR, HB), pp. 461–464.
ICPRICPR-2012-RiechertZMK #estimation #hybrid #realtime #recursion
Real-time disparity estimation using line-wise hybrid recursive matching and cross-bilateral median up-sampling (CR, FZ, MM, PK), pp. 3168–3171.
ICPRICPR-2012-RodriguesPBPM #image #multi #segmentation #towards
Towards breast ultrasound image segmentation using multi-resolution pixel descriptors (RR, AMGP, RB, MP, JM), pp. 2833–2836.
ICPRICPR-2012-RohithK #3d #estimation #modelling
Augmenting monocular motion estimation using intermittent 3D models from depth sensors (MVR, CK), pp. 473–476.
ICPRICPR-2012-RoyH #classification #component #detection #documentation #image
Text detection on camera acquired document images using supervised classification of connected components in wavelet domain (UR, GH), pp. 270–273.
ICPRICPR-2012-SankaranJ #network #recognition
Recognition of printed Devanagari text using BLSTM Neural Network (NS, CVJ), pp. 322–325.
ICPRICPR-2012-SantosPTGPF #classification #image #multi #visual notation #word
Improving texture description in remote sensing image multi-scale classification tasks by using visual words (JAdS, OABP, RdST, PHG, SPF, AXF), pp. 3090–3093.
ICPRICPR-2012-SchmeingJ #optimisation
Faithful Spatio-Temporal disocclusion filling using local optimization (MS, XJ), pp. 3799–3802.
ICPRICPR-2012-SchuldhausKJESL #classification
Classification of surfaces and inclinations during outdoor running using shoe-mounted inertial sensors (DS, PK, UJ, BE, HS, ML), pp. 2258–2261.
ICPRICPR-2012-ShenZ #3d #recognition
Hyperspectral face recognition using 3D Gabor wavelets (LS, SZ), pp. 1574–1577.
ICPRICPR-2012-ShibataK #modelling #recognition
Emotion recognition modeling of sitting postures by using pressure sensors and accelerometers (TS, YK), pp. 1124–1127.
ICPRICPR-2012-ShinPJB #detection
Moving objects detection using freely moving depth sensing camera (YDS, JHP, GRJ, MB), pp. 1314–1317.
ICPRICPR-2012-SimoesSW #detection #image
Using local texture maps of brain MR images to detect Mild Cognitive Impairment (RS, CHS, AMvCvW), pp. 153–156.
ICPRICPR-2012-SoranHLS #detection
Tremor detection using motion filtering and SVM (BS, JNH, SIL, LGS), pp. 178–181.
ICPRICPR-2012-SuLT #documentation #framework #image #learning #markov #random
A learning framework for degraded document image binarization using Markov Random Field (BS, SL, CLT), pp. 3200–3203.
ICPRICPR-2012-SuYLW #bound #classification #editing
Local color editing using color classification and boundary inpainting (ZS, XY, XL, DW), pp. 3196–3199.
ICPRICPR-2012-SvarmSEO #image
Point track creation in unordered image collections using Gomory-Hu trees (LS, ZS, OE, CO), pp. 2116–2119.
ICPRICPR-2012-TajimaIA #3d #correlation
A non-rigid registration method for medical volume data using 3D Phase-Only Correlation (YT, KI, TA), pp. 93–96.
ICPRICPR-2012-TangS #independence #learning #network #performance #testing
Efficient and accurate learning of Bayesian networks using chi-squared independence tests (YT, SNS), pp. 2723–2726.
ICPRICPR-2012-ThanhMNMY #detection #recognition #robust
Inertial-sensor-based walking action recognition using robust step detection and inter-class relationships (TNT, YM, HN, YM, YY), pp. 3811–3814.
ICPRICPR-2012-TianC12a #image #optimisation
Depth image up-sampling using ant colony optimization (JT, LC), pp. 3795–3798.
ICPRICPR-2012-TsuboshitaKFO #adaptation #image
Image annotation using adapted Gaussian mixture model (YT, NK, MF, MO), pp. 1346–1350.
ICPRICPR-2012-TsuruKO
Mixed-reality snapshot system using environmental depth sensors (HT, IK, YO), pp. 97–100.
ICPRICPR-2012-UddinCKS
Accurate genomic signal recovery using compressed sensing (BU, MEC, HAK, GS), pp. 3144–3147.
ICPRICPR-2012-Ugurlu #detection
Head posture detection using skin and hair information (YU), pp. 1–4.
ICPRICPR-2012-ValevY #classification #clustering #graph
Classification using graph partitioning (VV, NY), pp. 1261–1264.
ICPRICPR-2012-VaradarajanV #semantics #visual notation
Semantic saliency using k-TR theory of visual perception (KMV, MV), pp. 3676–3679.
ICPRICPR-2012-VillamizarGSM #learning #online #random
Online human-assisted learning using Random Ferns (MV, AG, AS, FMN), pp. 2821–2824.
ICPRICPR-2012-VitaladevuniCPN #detection #documentation #image
Detecting near-duplicate document images using interest point matching (SNPV, FC, RP, PN), pp. 347–350.
ICPRICPR-2012-WangCCP #detection #realtime
Real-time smoke detection using texture and color features (YW, TWC, RC, NTP), pp. 1727–1730.
ICPRICPR-2012-WangHWZ #classification #gender
Facial image-based gender classification using Local Circular Patterns (CW, DH, YW, GZ), pp. 2432–2435.
ICPRICPR-2012-WangOJBK
Tracking Tetrahymena pyriformis cells using decision trees (QW, YO, AAJ, KLB, MK), pp. 1843–1847.
ICPRICPR-2012-WeibelDWR #detection #graph
Contrast-enhancing seam detection and blending using graph cuts (TW, CD, DW, RR), pp. 2732–2735.
ICPRICPR-2012-WittW #programming
Sparse stereo by edge-based search using dynamic programming (JW, UW), pp. 3631–3635.
ICPRICPR-2012-XiaSF #towards #verification #visual notation
Toward kinship verification using visual attributes (SX, MS, YF), pp. 549–552.
ICPRICPR-2012-XuanSCS #algorithm
An Enhanced EM algorithm using maximum entropy distribution as initial condition (GX, YQS, PC, PS), pp. 849–852.
ICPRICPR-2012-XuGN #image
Morphological filtering in shape spaces: Applications using tree-based image representations (YX, TG, LN), pp. 485–488.
ICPRICPR-2012-YagiMM #online #retrieval #robust #similarity
Robust on-line handwritten object retrieval using a similarity measure based on overlap area of circles (TY, HM, MM), pp. 721–724.
ICPRICPR-2012-YangZLP #3d #optimisation
Coupled 3D tracking and pose optimization of rigid objects using particle filter (HY, YZ, XL, IP), pp. 1451–1454.
ICPRICPR-2012-YlioinasHP #classification
Age Classification in Unconstrained Conditions Using LBP Variants (JY, AH, MP), pp. 1257–1260.
ICPRICPR-2012-Yu #locality #video
Localization and extraction of the four clock-digits using the knowledge of the digital video clock (XY), pp. 1217–1220.
ICPRICPR-2012-ZarifFR #image #multi #performance #similarity
Fast and efficient multichannel image completion using local similarity (SZ, IF, DR), pp. 3116–3119.
ICPRICPR-2012-ZhangFWZJ #image #scalability
Scalable image co-segmentation using color and covariance features (SZ, WF, LW, JZ, JJ), pp. 3708–3711.
ICPRICPR-2012-ZhangH #feature model #recognition
Face recognition using semi-supervised spectral feature selection (ZZ, ERH), pp. 1294–1297.
ICPRICPR-2012-ZhangH12b #estimation
Simultaneous reflectance estimation and surface shape recovery using polarisation (LZ, ERH), pp. 1876–1879.
ICPRICPR-2012-ZhangL #detection
Arbitrarily oriented text detection using geodesic distances between corners and skeletons (YZ, JL), pp. 1896–1899.
ICPRICPR-2012-ZhangLM #composition #multi #recognition
Multi-subregion face recognition using coarse-to-fine Quad-tree decomposition (CZ, XL, TM), pp. 1004–1007.
ICPRICPR-2012-ZhangXSS #modelling #process #recognition #representation #smarttech
Sparse representation for motion primitive-based human activity modeling and recognition using wearable sensors (MZ, WX, AAS, MS), pp. 1807–1810.
ICPRICPR-2012-ZhuoCQYX #algorithm #classification #image #learning
Image classification using HTM cortical learning algorithms (WZ, ZC, YQ, ZY, YX), pp. 2452–2455.
ICPRICPR-2012-ZhuW #gesture #kernel #recognition
Single-frame hand gesture recognition using color and depth kernel descriptors (XZ, KYKW), pp. 2989–2992.
ICPRICPR-2012-ZillyRMWSK #multi
Multi-camera rectification using linearized trifocal tensor (FZ, CR, MM, WW, TS, PK), pp. 2727–2731.
ICPRICPR-2012-ZouKR #image #segmentation #semantics
Semantic image segmentation using region bank (WZ, KK, JR), pp. 922–925.
KDDKDD-2012-BoleyMG #linear
Linear space direct pattern sampling using coupling from the past (MB, SM, TG), pp. 69–77.
KDDKDD-2012-CorreaL #clustering #graph
Locally-scaled spectral clustering using empty region graphs (CDC, PL), pp. 1330–1338.
KDDKDD-2012-GunnemannFS #clustering #modelling #multi
Multi-view clustering using mixture models in subspace projections (SG, IF, TS), pp. 132–140.
KDDKDD-2012-HiraiY #clustering #detection #normalisation
Detecting changes of clustering structures using normalized maximum likelihood coding (SH, KY), pp. 343–351.
KDDKDD-2012-KimLX #image #multi #predict #process #web
Web image prediction using multivariate point processes (GK, FFL, EPX), pp. 1068–1076.
KDDKDD-2012-LiLP #coordination #performance
Fast bregman divergence NMF using taylor expansion and coordinate descent (LL, GL, HP), pp. 307–315.
KDDKDD-2012-RamG
Maximum inner-product search using cone trees (PR, AGG), pp. 931–939.
KDDKDD-2012-YuanZX
Discovering regions of different functions in a city using human mobility and POIs (JY, YZ, XX), pp. 186–194.
KDIRKDIR-2012-ArbelaitzGLMPP #adaptation #clustering #mining #navigation #profiling
Adaptation of the User Navigation Scheme using Clustering and Frequent Pattern Mining Techiques for Profiling (OA, IG, AL, JM, JMP, IP), pp. 187–192.
KDIRKDIR-2012-BallEC #named #open source #social
Undermining — Social Engineering using Open Source Intelligence Gathering (LB, GE, NC), pp. 275–280.
KDIRKDIR-2012-BhattacharjeeBG #data mining #mining #network #optimisation
Product Assortment Decisions for a Network of Retail Stores using Data Mining with Optimization (SB, FB, RDG), pp. 319–323.
KDIRKDIR-2012-ChueaphunKMC #nearest neighbour #random #recognition
Lanna Dharma Printed Character Recognition using k-Nearest Neighbor and Conditional Random Fields (CC, AK, SM, JC), pp. 169–174.
KDIRKDIR-2012-DuarteFD #clustering #constraints
Evidence Accumulation Clustering using Pairwise Constraints (JMMD, ALNF, FJFD), pp. 293–299.
KDIRKDIR-2012-FormosoFCC #performance #recommendation
Using Neighborhood Pre-computation to Increase Recommendation Efficiency (VF, DF, FC, VC), pp. 333–335.
KDIRKDIR-2012-IkebeKT #learning #predict #smarttech
Friendship Prediction using Semi-supervised Learning of Latent Features in Smartphone Usage Data (YI, MK, HT), pp. 199–205.
KDIRKDIR-2012-MedinaFRF #semantics #wiki
Measuring Entity Semantic Relatedness using Wikipedia (LASM, ALNF, RR, JF), pp. 431–437.
KDIRKDIR-2012-Potuzak #algorithm #network #optimisation #search-based
Issues of Optimization of a Genetic Algorithm for Traffic Network Division using a Genetic Algorithm (TP), pp. 340–343.
KEODKEOD-2012-AbdelazzizN #ontology #recommendation
Enhancing the Results of Recommender Systems using Implicit Ontology Relations (LA, KN), pp. 5–14.
KEODKEOD-2012-DiasMS #enterprise #health #ontology
Using Enterprise Ontology for Improving the National Health System — Demonstrated in the Case of a Pharmacy and an Emergency Department (DGD, CM, MMdS), pp. 441–451.
KEODKEOD-2012-GirardiAG #framework #independence #ontology
An Ontology-based Data Acquisition Infrastructure — Using Ontologies to Create Domain-independent Software Systems (DG, KA, MG), pp. 155–160.
KEODKEOD-2012-HmidaCBN #3d #logic
From 9-IM Topological Operators to Qualitative Spatial Relations using 3D Selective Nef Complexes and Logic Rules for Bodies (HBH, CC, FB, CN), pp. 208–213.
KEODKEOD-2012-KawtrakulMCRPNK #latency #social #social media
Improving Disaster Responsiveness using a Mix of Social Media and e-Government (AK, IM, HC, SR, KP, MN, VK), pp. 423–426.
KEODKEOD-2012-KhairMZ #data mining #education #mining #roadmap #student
Creating an Educational Roadmap for Engineering Students via an Optimal and Iterative Yearly Regression Tree using Data Mining (MK, CEM, WZ), pp. 43–52.
KEODKEOD-2012-LiangCI #approach #development
A Product Development System using Knowledge-intensive Support Approach (JSL, KMC, PI), pp. 25–33.
KEODKEOD-2012-MendesASS
Using DEMO-based SLAs for Improving City Council Services (CM, MA, NS, MMdS), pp. 431–440.
KEODKEOD-2012-NogueiraG #programming #set
Recall-driven Product Tracing and Supply Chain Tracking using Answer Set Programming (MLN, NPG), pp. 125–133.
KEODKEOD-2012-SchlenoffFB #approach #ontology #recognition
An Approach to Ontology-based Intention Recognition using State Representations (CS, SF, SB), pp. 178–183.
KEODKEOD-2012-SuzukiF #overview #segmentation #similarity #word
Segmentation of Review Texts by using Thesaurus and Corpus-based Word Similarity (YS, FF), pp. 381–384.
KMISKMIS-2012-Borchardt #information management #social #social media
Using Social Media for Knowledge Management in SME (UB), pp. 31–39.
KMISKMIS-2012-HamadaAS #generative #learning
A Generation Method of Reference Operation using Reinforcement Learning on Project Manager Skill-up Simulator (KH, MA, MS), pp. 15–20.
KMISKMIS-2012-MarsanCE #analysis #behaviour #enterprise #framework #information management #platform #scalability #tool support
Factors Influencing the Behavioral Intention of using Enterprise 2.0 Tools as a Knowledge Management Platform — An Analysis of the UTAUT Model in an Large Real Estate Company (BM, LC, EE), pp. 281–284.
KMISKMIS-2012-NgocIC #case study #modelling
Modeling of Indicators using UTL — A Study Case with Hop3x System (DPTN, SI, CC), pp. 269–272.
KMISKMIS-2012-OtsukiAS
An Improvement Method of User Operations using Decision Tree on Project Manager Skill-up Simulator (MO, MA, MS), pp. 158–163.
KRKR-2012-ChaudhriS #knowledge base #programming #reasoning #set #specification
Specifying and Reasoning with Underspecified Knowledge Bases Using Answer Set Programming (VKC, TCS).
KRKR-2012-MorettiT #ranking #set
Ranking Sets of Possibly Interacting Objects Using Shapley Extensions (SM, AT).
MLDMMLDM-2012-Ba-KaraitSS #classification #hybrid #optimisation
EEG Signals Classification Using a Hybrid Method Based on Negative Selection and Particle Swarm Optimization (NOSBK, SMS, RS), pp. 427–438.
MLDMMLDM-2012-CarvalhoPS #classification #image
Classification of Breast Tissues in Mammographic Images in Mass and Non-mass Using McIntosh’s Diversity Index and SVM (PMdSC, ACdP, ACS), pp. 482–494.
MLDMMLDM-2012-KalpakisYHMSSS #analysis #permutation #predict
Outcome Prediction for Patients with Severe Traumatic Brain Injury Using Permutation Entropy Analysis of Electronic Vital Signs Data (KK, SY, PFMH, CFM, LGS, DMS, TMS), pp. 415–426.
MLDMMLDM-2012-MondalPMMB #approach #clustering #concept analysis #mining
A New Approach for Association Rule Mining and Bi-clustering Using Formal Concept Analysis (KCM, NP, AM, UM, SB), pp. 86–101.
MLDMMLDM-2012-Moreira-MatiasMGB #categorisation #classification #matrix
Text Categorization Using an Ensemble Classifier Based on a Mean Co-association Matrix (LMM, JMM, JG, PB), pp. 525–539.
MLDMMLDM-2012-NascimentoPS #classification #image
Lung Nodules Classification in CT Images Using Shannon and Simpson Diversity Indices and SVM (LBN, ACdP, ACS), pp. 454–466.
MLDMMLDM-2012-SapkotaBS #grammar inference #principle
Unsupervised Grammar Inference Using the Minimum Description Length Principle (US, BRB, APS), pp. 141–153.
MLDMMLDM-2012-SinghCS #approach #hybrid #performance #recognition
A Hybrid Approach to Increase the Performance of Protein Folding Recognition Using Support Vector Machines (LS, GC, DS), pp. 660–668.
MLDMMLDM-2012-TaTB #approach #clustering #data type
Clustering Data Stream by a Sub-window Approach Using DCA (MTT, LTHA, LBA), pp. 279–292.
MLDMMLDM-2012-VlaseMI #clustering #metadata
Improvement of K-means Clustering Using Patents Metadata (MV, DM, AI), pp. 293–305.
MLDMMLDM-2012-XuCG #concept #learning #multi
Constructing Target Concept in Multiple Instance Learning Using Maximum Partial Entropy (TX, DKYC, IG), pp. 169–182.
RecSysRecSys-2012-BelloginP #clustering #collaboration #graph
Using graph partitioning techniques for neighbour selection in user-based collaborative filtering (AB, JP), pp. 213–216.
RecSysRecSys-2012-DeDGM #difference #learning
Local learning of item dissimilarity using content and link structure (AD, MSD, NG, PM), pp. 221–224.
RecSysRecSys-2012-Lathia #health
Using ratings to profile your health (NL), pp. 303–304.
RecSysRecSys-2012-Ninaus #heuristic #recommendation #requirements
Using group recommendation heuristics for the prioritization of requirements (GN), pp. 329–332.
RecSysRecSys-2012-PhelanMS #named #realtime #twitter
Yokie: explorations in curated real-time search & discovery using twitter (OP, KM, BS), pp. 307–308.
RecSysRecSys-2012-YangSGL #network #on the #recommendation #social
On top-k recommendation using social networks (XY, HS, YG, YL), pp. 67–74.
SEKESEKE-2012-AlbuquerquePL #approach #case study #experience #natural language #requirements #reuse
Reuse of Experiences Applied to Requirements Engineering: An Approach Based on Natural Language Processing (AA, VP, TL), pp. 574–577.
SEKESEKE-2012-AlvesGBMA #named
SciprovMiner: Provenance Capture Using the OPM Model (TOMA, WG, RMMB, MAM, WA), pp. 491–494.
SEKESEKE-2012-DagninoSR #fault #machine learning
Forecasting Fault Events in Power Distribution Grids Using Machine Learning (AD, KS, LR), pp. 458–463.
SEKESEKE-2012-DingS #architecture #collaboration #mobile
Proactive Two Way Mobile Advertisement Using a Collaborative Client Server Architecture (WD, XS), pp. 768–773.
SEKESEKE-2012-El-SherifFE #concept #learning #multi #network #social
Using Social Networks for Learning New Concepts in Multi-Agent Systems (SMES, BHF, AE), pp. 261–266.
SEKESEKE-2012-FarfelederMK #elicitation #locality #requirements #semantics
Using Semantic Relatedness and Locality for Requirements Elicitation Guidance (SF, TM, AK), pp. 19–24.
SEKESEKE-2012-FreireCAK #monitoring #process #statistics #workflow
Software Process Monitoring Using Statistical Process Control Integrated in Workflow Systems (MAF, DAdC, EA, UK), pp. 557–562.
SEKESEKE-2012-HumayunG #empirical #trust
An Empirical Study on Improving Trust among GSD Teams Using KMR (MH, GC), pp. 131–134.
SEKESEKE-2012-JangidPE #analysis #mobile #predict #sentiment
A Mobile Application for Stock Market Prediction Using Sentiment Analysis (KJ, PP, ME), pp. 13–18.
SEKESEKE-2012-Lozano-FuentesGBSEWHGT
Using Cell Phones for Mosquito Vector Surveillance and Control (SLF, SG, JMB, DS, LE, FW, EHG, JGR, DTC), pp. 763–767.
SEKESEKE-2012-MarchettiG #framework #logic #model transformation
Model Transformation for Frameworks Using Logical Planning (GAM, ESG), pp. 563–569.
SEKESEKE-2012-MaZQQXY #analysis #dependence #design pattern #identification
Identification of Design Patterns Using Dependence Analysis (WM, XZ, XQ, JQ, LX, RY), pp. 289–292.
SEKESEKE-2012-PittoliSN #monitoring #network
Investigating the Use of Bayesian Networks as a Support Tool for Monitoring Software Projects (FP, ALRdS, DJN), pp. 570–573.
SEKESEKE-2012-RiveroC #usability #web
Using the Results from a Systematic Mapping Extension to Define a Usability Inspection Method for Web Applications (LR, TC), pp. 582–587.
SEKESEKE-2012-SalamahEO #automaton #consistency #ltl
Consistency Checks of System Properties Using LTL and Büchi Automata (SS, ME, OO), pp. 39–44.
SEKESEKE-2012-SalamiA #algorithm #diagrams #framework #retrieval #search-based
A Framework for Class Diagram Retrieval Using Genetic Algorithm (HOS, MAA), pp. 737–740.
SEKESEKE-2012-ShinKKJR #configuration management #dependence #impact analysis
Reconfiguration of Robot Applications using Data Dependency and Impact Analysis (MES, TK, SK, SJ, MR), pp. 684–687.
SEKESEKE-2012-SunLTZ #impact analysis #testing
Using FCA-based Change Impact Analysis for Regression Testing (XS, BL, CT, QZ), pp. 452–457.
SEKESEKE-2012-VieiraVNC #elicitation #empirical
Using Empirical Studies to Evaluate the REMO Requirement Elicitation Technique (SRCV, DV, RdN, TC), pp. 33–38.
SEKESEKE-2012-ZhuLLCZJ #continuation #difference #logic #verification
HybridUML Based Verification of CPS Using Differential Dynamic Logic (MZ, BL, JL, QC, XZ, SJ), pp. 235–238.
SIGIRSIGIR-2012-BenderskyC #dependence #higher-order #information retrieval #modelling #query
Modeling higher-order term dependencies in information retrieval using query hypergraphs (MB, WBC), pp. 941–950.
SIGIRSIGIR-2012-ChaC #analysis #modelling #topic
Social-network analysis using topic models (YC, JC), pp. 565–574.
SIGIRSIGIR-2012-ChandarC #documentation #novel #retrieval
Using preference judgments for novel document retrieval (PC, BC), pp. 861–870.
SIGIRSIGIR-2012-ChandarC12a #rank
Using PageRank to infer user preferences (PC, BC), pp. 1167–1168.
SIGIRSIGIR-2012-Cummins #modelling #monte carlo #performance #predict #simulation
Investigating performance predictors using monte carlo simulation and score distribution models (RC), pp. 1097–1098.
SIGIRSIGIR-2012-Ghosh #information retrieval
Improving e-discovery using information retrieval (KG), p. 996.
SIGIRSIGIR-2012-HuangWBW #modelling #process
Improving searcher models using mouse cursor activity (JH, RWW, GB, KW), pp. 195–204.
SIGIRSIGIR-2012-HuO #classification #dataset
Genre classification for million song dataset using confidence-based classifiers combination (YH, MO), pp. 1083–1084.
SIGIRSIGIR-2012-Khatiban #mining #trust
Building reputation and trust using federated search and opinion mining (SK), p. 994.
SIGIRSIGIR-2012-Ko #case study #classification
A study of term weighting schemes using class information for text classification (YK), pp. 1029–1030.
SIGIRSIGIR-2012-LieblingBW
Anticipatory search: using context to initiate search (DJL, PNB, RWW), pp. 1035–1036.
SIGIRSIGIR-2012-LiuBC #behaviour #interactive #personalisation
Personalization of search results using interaction behaviors in search sessions (CL, NJB, MJC), pp. 205–214.
SIGIRSIGIR-2012-MahdabiAKC #automation #concept #predict #query #refinement
Automatic refinement of patent queries using concept importance predictors (PM, LA, MK, FC), pp. 505–514.
SIGIRSIGIR-2012-MarquesL #information retrieval #java #visual notation
Visual information retrieval using Java and LIRE (OM, ML), p. 1193.
SIGIRSIGIR-2012-MinLLSJ #image #multi #platform
Multi-platform image search using tag enrichment (JM, CL, JL, DS, GJFJ), p. 1018.
SIGIRSIGIR-2012-ONeil #ranking #sentiment
Entity sentiment extraction using text ranking (JO), p. 1024.
SIGIRSIGIR-2012-ShuklaLT
Parallelizing ListNet training using spark (SS, ML, AT), pp. 1127–1128.
SIGIRSIGIR-2012-Sun #classification #word
Short text classification using very few words (AS), pp. 1145–1146.
SIGIRSIGIR-2012-TranF #information retrieval #interactive
Using eye-tracking with dynamic areas of interest for analyzing interactive information retrieval (VTT, NF), pp. 1165–1166.
ECMFAECMFA-2012-BurtonPRKPS #modelling #problem
Solving Acquisition Problems Using Model-Driven Engineering (FRB, RFP, LMR, DSK, SMP, SS), pp. 428–443.
ICMTICMT-2012-SenMTC #model transformation #modelling
Using Models of Partial Knowledge to Test Model Transformations (SS, JMM, MT, JC), pp. 24–39.
ICMTICMT-2012-VallecilloG #model transformation #type system
Typing Model Transformations Using Tracts (AV, MG), pp. 56–71.
MODELSMoDELS-2012-AranegaEM #feature model #model transformation
Using Feature Model to Build Model Transformation Chains (VA, AE, SM), pp. 562–578.
MODELSMoDELS-2012-BehjatiYB #approach #modelling #reuse #similarity
A Modeling Approach to Support the Similarity-Based Reuse of Configuration Data (RB, TY, LCB), pp. 497–513.
MODELSMoDELS-2012-ButtnerEC #atl #off the shelf #on the #smt #verification
On Verifying ATL Transformations Using “off-the-shelf” SMT Solvers (FB, ME, JC), pp. 432–448.
MODELSMoDELS-2012-ShinJB #analysis #empirical #evaluation #modelling #mutation testing #test coverage
Empirical Evaluation on FBD Model-Based Test Coverage Criteria Using Mutation Analysis (DS, EJ, DHB), pp. 465–479.
PLEASEPLEASE-2012-BaumgartFP #approach #certification #component #functional #performance #safety #towards
Towards efficient functional safety certification of construction machinery using a component-based approach (SB, JF, SP), pp. 1–4.
PLEASEPLEASE-2012-QuintonDHMC #feature model #modelling
Using feature modelling and automations to select among cloud solutions (CQ, LD, PH, SM, EC), pp. 17–20.
SPLCSPLC-2012-HeiderRGL #impact analysis #modelling #testing #variability
Using regression testing to analyze the impact of changes to variability models on products (WH, RR, PG, DL), pp. 196–205.
OOPSLAOOPSLA-2012-Anderson #fine-grained #parallel #policy #resource management
Efficiently combining parallel software using fine-grained, language-level, hierarchical resource management policies (ZRA), pp. 717–736.
OOPSLAOOPSLA-2012-BocqD #monad #named #network #process #streaming #virtual machine
Molecule: using monadic and streaming I/O to compose process networks on the JVM (SB, KD), pp. 315–334.
OOPSLAOOPSLA-2012-KulkarniC #compilation #machine learning #optimisation #problem
Mitigating the compiler optimization phase-ordering problem using machine learning (SK, JC), pp. 147–162.
OOPSLAOOPSLA-2012-RosuS #logic #reachability
Checking reachability using matching logic (GR, AS), pp. 555–574.
OOPSLAOOPSLA-2012-SiddiquiK #analysis #execution #scalability #symbolic computation
Scaling symbolic execution using ranged analysis (JHS, SK), pp. 523–536.
TOOLSTOOLS-EUROPE-2012-MehnertA #type system #verification
Verification of Snapshotable Trees Using Access Permissions and Typestate (HM, JA), pp. 187–201.
TOOLSTOOLS-EUROPE-2012-SoekenWD #behaviour #development #natural language
Assisted Behavior Driven Development Using Natural Language Processing (MS, RW, RD), pp. 269–287.
AdaEuropeAdaEurope-2012-GregertsenS #execution #hardware #performance
Improving the Performance of Execution Time Control by Using a Hardware Time Management Unit (KNG, AS), pp. 177–192.
HILTHILT-2012-BeltCHR #ada #automation #contract #verification
Leading-edge Ada verification technologies: highly automated Ada contract checking using bakar kiasan (JB, PC, JH, R), pp. 3–4.
HILTHILT-2012-Leino12a #proving #verification #why
Program proving using intermediate verification languages (IVLs) like boogie and why3 (KRML), pp. 25–26.
HILTHILT-2012-Taft #divide and conquer #manycore #named #programming #tutorial
Tutorial: multicore programming using divide-and-conquer and work stealing (STT), pp. 13–14.
PADLPADL-2012-BalducciniL #aspect-oriented #tool support
Practical and Methodological Aspects of the Use of Cutting-Edge ASP Tools (MB, YL), pp. 78–92.
PADLPADL-2012-GillN #logic
Handshaking in Kansas Lava Using Patch Logic (AG, BN), pp. 212–226.
PADLPADL-2012-HaveC #performance #program transformation
Efficient Tabling of Structured Data Using Indexing and Program Transformation (CTH, HC), pp. 93–107.
PEPMPEPM-2012-HirzelG #metaprogramming
Streams that compose using macros that oblige (MH, BG), pp. 141–150.
PLDIPLDI-2012-DilligDA #abduction #automation #fault
Automated error diagnosis using abductive inference (ID, TD, AA), pp. 181–192.
PPDPPPDP-2012-SulzmannL #regular expression
Regular expression sub-matching using partial derivatives (MS, KZML), pp. 79–90.
QAPLQAPL-2012-BelardinelliGL #automation #protocol #quantum #verification
Automated Verification of Quantum Protocols using MCMAS (FB, PG, AL), pp. 48–62.
SASSAS-2012-HoweK #analysis #parametricity
Polyhedral Analysis Using Parametric Objectives (JMH, AK), pp. 41–57.
SASSAS-2012-SanchezSSC #generative #invariant #self
Invariant Generation for Parametrized Systems Using Self-reflection — (Extended Version) (AS, SS, CS, BYEC), pp. 146–163.
RERE-2012-BerenbachSN #industrial #modelling #requirements
The use of a requirements modeling language for industrial applications (BB, FS, HN), pp. 285–290.
RERE-2012-FerrariG #detection
Using collective intelligence to detect pragmatic ambiguities (AF, SG), pp. 191–200.
RERE-2012-Ott #fault #legacy #natural language #specification
Defects in natural language requirement specifications at Mercedes-Benz: An investigation using a combination of legacy data and expert opinion (DO), pp. 291–296.
REFSQREFSQ-2012-DaramolaMSB #perspective #reasoning #requirements #research #semantics
Managing Implicit Requirements Using Semantic Case-Based Reasoning Research Preview (OD, TM, GS, SB), pp. 172–178.
SACSAC-PL-J-2009-J-CervelleFLR12 #implementation #parsing
Banzai+Tatoo: Using cutting-edge parsers for implementing high-performance servers (JC, RF, GL, GR), pp. 990–1005.
ASEASE-2012-AlmorsyGI #analysis #automation
Supporting automated vulnerability analysis using formalized vulnerability signatures (MA, JG, ASI), pp. 100–109.
ASEASE-2012-AlmorsyGI12a #automation #re-engineering
Supporting automated software re-engineering using re-aspects (MA, JG, ASI), pp. 230–233.
ASEASE-2012-AmalfitanoFTCM #android #automation #testing #user interface
Using GUI ripping for automated testing of Android applications (DA, ARF, PT, SDC, AMM), pp. 258–261.
ASEASE-2012-FaunesSB #algorithm #generative #model transformation
Generating model transformation rules from examples using an evolutionary algorithm (MF, HAS, MB), pp. 250–253.
ASEASE-2012-GopinathZK #effectiveness #fault #locality #specification
Improving the effectiveness of spectra-based fault localization using specifications (DG, RNZ, SK), pp. 40–49.
ASEASE-2012-HarmanLJWAC #challenge #programming #search-based #source code
The GISMOE challenge: constructing the pareto program surface using genetic programming to find better programs (MH, WBL, YJ, DRW, AA, JAC), pp. 1–14.
ASEASE-2012-IbrahimGHA #ambiguity #analysis #kernel #operating system #points-to
Supporting operating system kernel data disambiguation using points-to analysis (ASI, JG, JHHH, MA), pp. 234–237.
ASEASE-2012-KahkonenSH #automation #parallel #source code #testing #thread
Using unfoldings in automated testing of multithreaded programs (KK, OS, KH), pp. 150–159.
ASEASE-2012-LuCC #fault #learning #predict #reduction
Software defect prediction using semi-supervised learning with dimension reduction (HL, BC, MC), pp. 314–317.
ASEASE-2012-Lutz0D #collaboration #mobile #requirements
Using mobile devices for collaborative requirements engineering (RL, SS, SD), pp. 298–301.
ASEASE-2012-NijjarB #bound #smt #verification
Unbounded data model verification using SMT solvers (JN, TB), pp. 210–219.
ASEASE-2012-RubinC #difference #set
Locating distinguishing features using diff sets (JR, MC), pp. 242–245.
FSEFSE-2012-ZaeemK #generative #programming
Test input generation using dynamic programming (RNZ, SK), p. 34.
ICSEICSE-2012-AlkhalafBG #analysis #string #validation #verification
Verifying client-side input validation functions using string analysis (MA, TB, JLG), pp. 947–957.
ICSEICSE-2012-Bavota #refactoring #semantics
Using structural and semantic information to support software refactoring (GB), pp. 1479–1482.
ICSEICSE-2012-Chioasca #automation #machine learning #model transformation #requirements
Using machine learning to enhance automated requirements model transformation (EVC), pp. 1487–1490.
ICSEICSE-2012-CookHSS #compilation #composition #specification #verification
Specification engineering and modular verification using a web-integrated verifying compiler (CTC, HKH, HS, MS), pp. 1379–1382.
ICSEICSE-2012-DevosPDBMA #case study #industrial #performance #reuse #smarttech
Efficient reuse of domain-specific test knowledge: An industrial case in the smart card domain (ND, CP, JCD, RB, BM, GA), pp. 1123–1132.
ICSEICSE-2012-Dilshener #concept #information retrieval
Improving information retrieval-based concept location using contextual relationships (TD), pp. 1499–1502.
ICSEICSE-2012-Ghardallou #analysis #invariant #termination
Using invariant relations in the termination analysis of while loops (WG), pp. 1519–1522.
ICSEICSE-2012-Johnson #case study #question #static analysis #tool support #why
A study on improving static analysis tools: Why are we not using them? (BJ), pp. 1607–1609.
ICSEICSE-2012-KimKKJ #approach #case study #industrial #testing
Industrial application of concolic testing approach: A case study on libexif by using CREST-BV and KLEE (YK, MK, YJK, YJ), pp. 1143–1152.
ICSEICSE-2012-Mendes #case study #elicitation #estimation #industrial #lessons learnt #web
Using knowledge elicitation to improve Web effort estimation: Lessons from six industrial case studies (EM), pp. 1112–1121.
ICSEICSE-2012-NaganoNKAHUF #mining #repository #scalability
Using the GPGPU for scaling up Mining Software Repositories (RN, HN, YK, BA, KH, NU, AF), pp. 1435–1436.
ICSEICSE-2012-NguyenKWF #array #dynamic analysis #invariant #polynomial
Using dynamic analysis to discover polynomial and array invariants (TN, DK, WW, SF), pp. 683–693.
ICSEICSE-2012-SamirniSAMTH #automation #constraints #fault #generative #html #php #string #theorem proving
Automated repair of HTML generation errors in PHP applications using string constraint solving (HS, MS, SA, TDM, FT, LJH), pp. 277–287.
ICSEICSE-2012-Shang #developer
Bridging the divide between software developers and operators using logs (WS), pp. 1583–1586.
ICSEICSE-2012-SingerS #re-engineering #social
Influencing the adoption of software engineering methods using social software (LS, KS), pp. 1325–1328.
ICSEICSE-2012-SongPF #interactive #named
iTree: Efficiently discovering high-coverage configurations using interaction trees (CS, AP, JSF), pp. 903–913.
ICSEICSE-2012-SusB #education #integration #re-engineering
Using continuous integration of code and content to teach software engineering with limited resources (JGS, WB), pp. 1175–1184.
ICSEICSE-2012-TreudeGGS #development #interactive #named #visualisation
WorkItemExplorer: Visualizing software development tasks using an interactive exploration environment (CT, PG, LG, MADS), pp. 1399–1402.
ICSEICSE-2012-VakilianCNRBJ #automation #refactoring
Use, disuse, and misuse of automated refactorings (MV, NC, SN, BAR, BPB, REJ), pp. 233–243.
ICSEICSE-2012-Vetro #automation #identification #static analysis #technical debt
Using automatic static analysis to identify technical debt (AV), pp. 1613–1615.
ICSEICSE-2012-Yu #analysis #identification
Improving failure-inducing changes identification using coverage analysis (KY), pp. 1604–1606.
SACSAC-2012-AbdullahRTN #performance
Efficient matching of SPARQL subscriptions using rete (HA, MR, ST, EN), pp. 372–377.
SACSAC-2012-BernardiH #contract #modelling
Modelling session types using contracts (GB, MH), pp. 1941–1946.
SACSAC-2012-CarvalhoSG #adaptation #fuzzy #segmentation
Texture fuzzy segmentation using adaptive affinity functions (BMC, TSS, EG), pp. 51–53.
SACSAC-2012-ChenGZG #metric #network #similarity
Discovering missing links in networks using vertex similarity measures (HHC, LG, X(Z, CLG), pp. 138–143.
SACSAC-2012-ChenZD #algorithm #effectiveness #search-based #segmentation
Effective radical segmentation of offline handwritten Chinese characters by using an enhanced snake model and Genetic Algorithm (ZC, BZ, SD), pp. 54–55.
SACSAC-2012-ChhelLGS #biology #multi
Minimum multiple characterization of biological data using partially defined boolean formulas (FC, FL, AG, FS), pp. 1399–1405.
SACSAC-2012-ChoeYYR #algorithm #automation #realtime #scheduling #search-based
Real-time scheduling of twin stacking cranes in an automated container terminal using a genetic algorithm (RC, HY, YY, KRR), pp. 238–243.
SACSAC-2012-ChunM #health #integration #semantics #social #web
Social health data integration using semantic Web (SAC, BM), pp. 392–397.
SACSAC-2012-DasguptaK #analysis #precise
Precise shape analysis using field sensitivity (SD, AK), pp. 1300–1307.
SACSAC-2012-DavtyanKMRS #encryption
Integrity of electronic voting systems: fallacious use of cryptography (SD, AK, LM, AR, AAS), pp. 1486–1493.
SACSAC-2012-DayehH #biology #network
Analyzing incomplete biological pathways using network motifs (MED, MH), pp. 1355–1360.
SACSAC-2012-DiasDHS #sorting #symmetry
Sorting genomes using almost-symmetric inversions (ZD, UD, LSH, JCS), pp. 1368–1374.
SACSAC-2012-FkiJST #approach #composition #flexibility
A flexible approach for service composition using service patterns (EF, MJ, CSD, ST), pp. 1976–1983.
SACSAC-2012-FouqueLV #fault
Using faults for buffer overflow effects (PAF, DL, FV), pp. 1638–1639.
SACSAC-2012-HasegawaT #distance #invariant
Affine invariant shape matching using radon transform and dynamic time warping distance (MH, ST), pp. 777–781.
SACSAC-2012-HopRFH #ontology #visualisation
Using Hierarchical Edge Bundles to visualize complex ontologies in GLOW (WH, SdR, FF, FH), pp. 304–311.
SACSAC-2012-JeonC #javascript #jit #reuse
Reuse of JIT compiled code in JavaScript engine (SJ, JC), pp. 1840–1842.
SACSAC-2012-KamieHK #clustering #effectiveness #video #web
Effective web video clustering using playlist information (MK, TH, HK), pp. 949–956.
SACSAC-2012-KangJC #3d #scalability #video
Scalable depth map coding for 3D video using contour information (JK, HJ, KC), pp. 1028–1029.
SACSAC-2012-KuttyCN #modelling #recommendation
A people-to-people recommendation system using tensor space models (SK, LC, RN), pp. 187–192.
SACSAC-2012-MaamarFLH #implementation #social #specification #web #web service
Specifying and implementing social Web services operation using commitments (ZM, NF, ML, SH), pp. 1955–1960.
SACSAC-2012-MahdianGTM #smarttech
Location based routing using smartphones in an infrastructureless environment (AM, HG, ST, SM), pp. 594–599.
SACSAC-2012-MajchrzakS #agile #development #testing #web
Using spring Roo for the test-driven development of Web applications (TAM, AS), pp. 664–671.
SACSAC-2012-MaloneG #case study #groovy
A case study in the use of Groovy and Grails (KM, JG), pp. 1254–1255.
SACSAC-2012-MaruhashiTT #identification
A method for identification of moving objects by integrative use of a camera and accelerometers (NM, TT, MT), pp. 1–6.
SACSAC-2012-MbarekKPA #design #modelling #power management
Using model driven engineering to reliably accelerate early Low Power Intent Exploration for a system-on-chip design (OM, AK, AP, MA), pp. 1580–1587.
SACSAC-2012-MenorPB #kernel #predict #probability
Probabilistic prediction of protein phosphorylation sites using kernel machines (MM, GP, KB), pp. 1393–1398.
SACSAC-2012-NagarAB #functional #graph #similarity
Computing gene functional similarity using combined graphs (AN, HAM, SB), pp. 1381–1386.
SACSAC-2012-OliveiraCS #bound #on the
On using adversary simulators to obtain tight lower bounds for response times (RSdO, AC, RAS), pp. 1573–1579.
SACSAC-2012-OSullivanWL #design #integer
Designing data storage tier using Integer Programing (MJO, CGW, DL), pp. 426–433.
SACSAC-2012-ParraRMRDS #adaptation #constraints #optimisation #self #variability
Using constraint-based optimization and variability to support continuous self-adaptation (CAP, DR, SM, RR, LD, LS), pp. 486–491.
SACSAC-2012-QiCLHW #collaboration
Using inferred tag ratings to improve user-based collaborative filtering (QQ, ZC, JL, CH, QW), pp. 2008–2013.
SACSAC-2012-RajeDFRR #data access #implementation #ontology
Using ontology-based methods for implementing role-based access control in cooperative systems (SR, CD, MF, RR, JR), pp. 763–764.
SACSAC-2012-SarroMFG #algorithm #analysis #fault #predict #search-based
A further analysis on the use of Genetic Algorithm to configure Support Vector Machines for inter-release fault prediction (FS, SDM, FF, CG), pp. 1215–1220.
SACSAC-2012-SchluterC #correlation #detection #markov #modelling #predict
Hidden markov model-based time series prediction using motifs for detecting inter-time-serial correlations (TS, SC), pp. 158–164.
SACSAC-2012-SouzaPEMOW #navigation #network
Vision and GPS-based autonomous vehicle navigation using templates and artificial neural networks (JRS, GP, GBE, CCTM, FSO, DFW), pp. 280–285.
SACSAC-2012-SwainCNB #analysis #markov #performance
Performance analysis of IEEE 802.11 IBSS power save mode using a discrete-time markov model (PS, SC, SN, PB), pp. 631–633.
SACSAC-2012-WickerPK #classification #composition #matrix #multi
Multi-label classification using boolean matrix decomposition (JW, BP, SK), pp. 179–186.
SACSAC-2012-ZaraketNSJ #architecture #library #parallel #source code
Portable Parallel Programs using architecture-aware libraries (FAZ, MN, MS, AJ), pp. 1922–1924.
SLESLE-2012-AfroozehBBJMMS #gll #grammarware #semiparsing
Island Grammar-Based Parsing Using GLL and Tom (AA, JCB, MvdB, AJ, MM, PEM, ES), pp. 224–243.
SLESLE-2012-Storey #challenge #design #ontology #social
Addressing Cognitive and Social Challenges in Designing and Using Ontologies in the Biomedical Domain (MADS), pp. 1–3.
ASPLOSASPLOS-2012-ClementsKZ #scalability
Scalable address spaces using RCU balanced trees (ATC, MFK, NZ), pp. 199–210.
ASPLOSASPLOS-2012-LeeS #architecture #scheduling
Region scheduling: efficiently using the cache architectures via page-level affinity (ML, KS), pp. 451–462.
ASPLOSASPLOS-2012-LinWLZ #named #power management #smarttech
Reflex: using low-power processors in smartphones without knowing them (FXL, ZW, RL, LZ), pp. 13–24.
CASECASE-2012-Chang #detection #fault #feature model #process
Fault detection for plasma-enhanced chemical vapor deposition process using feature extraction (YJC), pp. 491–496.
CASECASE-2012-ChowdhuryTWSLG #automation #biology
Automated indirect transport of biological cells with optical tweezers using planar gripper formations (SC, AT, CW, PS, WL, SKG), pp. 267–272.
CASECASE-2012-DinhamF #detection
Weld seam detection using computer vision for robotic Arc Welding (MD, GF), pp. 771–776.
CASECASE-2012-DotoliFIR #agile #modelling #simulation
A lean manufacturing strategy using Value Stream Mapping, the Unified Modeling Language, and discrete event simulation (MD, MPF, GI, GR), pp. 668–673.
CASECASE-2012-FelekisWMRBSN #automation
Automated stiffness characterization of living tobacco BY2 cells using the Cellular Force Microscope (DF, AW, SM, ALRK, FB, RSS, BJN), pp. 285–290.
CASECASE-2012-FrankHEFDV #automation #modelling #realtime #requirements
Using contact points to integrate discipline spanning real-time requirements in modeling Networked Automation Systems for manufacturing systems (TF, TH, KE, AF, CD, BVH), pp. 851–856.
CASECASE-2012-HeZWZ #identification
Identification of dynamic posture in lower extremity using optical fiber sensor (CH, XZ, YW, ZZ), pp. 1057–1060.
CASECASE-2012-IsmailDH #higher-order
Observer-based trajectory tracking for a class of underactuated Lagrangian systems using higher-order sliding modes (RMTRI, TDN, QPH), pp. 1204–1209.
CASECASE-2012-JoKOO #feedback
Contact force control of a robotic hand using F/T sensory feedback with a rigid object (JJ, SKK, YO, SRO), pp. 436–441.
CASECASE-2012-JungCKM #detection
Collision detection using band designed Disturbance Observer (BjJ, HRC, JK, HM), pp. 1080–1085.
CASECASE-2012-KawarazakiY #recognition #speech
Remote control system of home electrical appliances using speech recognition (NK, TY), pp. 761–764.
CASECASE-2012-KimKHHL #framework #platform
A robot platform for unmanned weeding in a paddy field using sensor fusion (GHK, SCK, YKH, KSH, SGL), pp. 904–907.
CASECASE-2012-KimKS #algorithm #detection #recognition
Hole detection algorithm for square peg-in-hole using force-based shape recognition (YLK, BSK, JBS), pp. 1074–1079.
CASECASE-2012-KimKYOO #navigation
Actionable topological mapping for navigation using nearby objects (JK, JK, SY, YO, SO), pp. 1162–1167.
CASECASE-2012-KimYSP #detection #visual notation
Window detection for gondola robot using a visual camera (DYK, JY, HS, CWP), pp. 998–1003.
CASECASE-2012-KurzDP
Sampling Decision System in semiconductor manufacturing using Virtual Metrology (DK, CDL, JP), pp. 74–79.
CASECASE-2012-LeeB #execution #framework #lifecycle #simulation
Executable simulation lifecycle management framework using extensible and interoperable simulation language (HL, AB), pp. 237–242.
CASECASE-2012-LeeHJKL #matlab #simulation
Dynamic simulation of radial active magnetic bearing system for high speed rotor using ADAMS and MATLAB co-simulation (KCL, DKH, YHJ, CYK, MCL), pp. 880–885.
CASECASE-2012-LiK #automation #automaton #finite #generative #modelling #testing
Model-based automatic test generation for Simulink/Stateflow using extended finite automaton (ML, RK), pp. 857–862.
CASECASE-2012-LuiP #assembly #difference #evolution #flexibility #scheduling
Scheduling Flexible Assembly Lines using variants of Differential Evolution (WHVL, SGP), pp. 594–599.
CASECASE-2012-Ralston #automation
Automated longwall shearer horizon control using thermal infrared-based seam tracking (JCR), pp. 20–25.
CASECASE-2012-RyuOC
COM control of dual arm robot using COM Jacobian (KR, YO, MC), pp. 1071–1073.
CASECASE-2012-ShinPB #2d #3d #estimation
6DOF pose estimation using 2D-3D sensor fusion (YDS, JHP, MB), pp. 714–717.
CASECASE-2012-TangLY #nondeterminism
Tracking control of a compliant XY nano-positioner under plant uncertainty using a transfigured loop-shaping H∞ controller (HT, YL, QY), pp. 103–108.
CASECASE-2012-WangHDS #agile #analysis #protocol #simulation
Analysis of hospital rapid response protocols using simulation (SW, LEH, PD, CHS), pp. 315–322.
CASECASE-2012-WuY #estimation #linear #markov #metric
State estimation for Markovian Jump Linear System using quantized measurements (HW, HY), pp. 527–531.
CASECASE-2012-ZhangWZX #fault #memory management
A dynamic memory model for mechanical fault diagnosis using one-class support vector machine (QZ, JW, JZ, GX), pp. 497–501.
CASECASE-2012-ZhaoLKH #data fusion #locality #simulation
A simulation study of sensor data fusion using UKF for bucket wheel reclaimer localization (SZ, TFL, BK, AH), pp. 1192–1197.
CGOCGO-2012-ParkCA #graph #modelling #predict
Using graph-based program characterization for predictive modeling (EP, JC, MAA), pp. 196–206.
CGOCGO-2012-VankaT #data flow #dependence #performance #profiling
Efficient and accurate data dependence profiling using software signatures (RV, JT), pp. 186–195.
DACDAC-2012-ChangJC #configuration management #optimisation
Timing ECO optimization using metal-configurable gate-array spare cells (HYC, IHRJ, YWC), pp. 802–807.
DACDAC-2012-CropPC #detection #logic #throughput
Regaining throughput using completion detection for error-resilient, near-threshold logic (JC, RP, PC), pp. 974–979.
DACDAC-2012-DonkohLS #adaptation #design #hybrid #predict
A hybrid and adaptive model for predicting register file and SRAM power using a reference design (ED, AL, ES), pp. 62–67.
DACDAC-2012-ForoutanSP #3d #interface #low cost
Cost-efficient buffer sizing in shared-memory 3D-MPSoCs using wide I/O interfaces (SF, AS, FP), pp. 366–375.
DACDAC-2012-HamzehSV #morphism #named
EPIMap: using epimorphism to map applications on CGRAs (MH, AS, SBKV), pp. 1284–1291.
DACDAC-2012-HuangLR #energy #hardware #trade-off
A methodology for energy-quality tradeoff using imprecise hardware (JH, JL, GR), pp. 504–509.
DACDAC-2012-HuLWR #array #hardware
Hardware realization of BSB recall function using memristor crossbar arrays (MH, HL, QW, GSR), pp. 498–503.
DACDAC-2012-JungSB #off the shelf
Tracking appliance usage information in residential settings using off-the-shelf low-frequency meters (DJ, AS, AB), pp. 163–168.
DACDAC-2012-KumarBKV #analysis #predict #source code
Early prediction of NBTI effects using RTL source code analysis (JAK, KMB, HK, SV), pp. 808–813.
DACDAC-2012-LinMK #logic #satisfiability
Boolean satisfiability using noise based logic (PCKL, AM, SPK), pp. 1260–1261.
DACDAC-2012-MalburgFF #automation #design #hardware #locality #metric
Automated feature localization for hardware designs using coverage metrics (JM, AF, GF), pp. 941–946.
DACDAC-2012-MeirR #analysis #biology #named #network #performance
BLAST: efficient computation of nonlinear delay sensitivities in electronic and biological networks using barycentric Lagrange enabled transient adjoint analysis (AM, JSR), pp. 301–310.
DACDAC-2012-MorrisBZP #logic #named
mLogic: ultra-low voltage non-volatile logic circuits using STT-MTJ devices (DM, DB, JG(Z, LTP), pp. 486–491.
DACDAC-2012-ParkGMRR #architecture #design #energy #performance
Future cache design using STT MRAMs for improved energy efficiency: devices, circuits and architecture (SPP, SKG, NNM, AR, KR), pp. 492–497.
DACDAC-2012-SasanianWM #quantum
Realizing reversible circuits using a new class of quantum gates (ZS, RW, DMM), pp. 36–41.
DACDAC-2012-Suto #design
Rule agnostic routing by using design fabrics (GS), pp. 471–475.
DACDAC-2012-YuCSJC #design #detection
Accurate process-hotspot detection using critical design rule extraction (YTY, YCC, SS, IHRJ, CC), pp. 1167–1172.
DACDAC-2012-ZhangTT #identification
Identification of recovered ICs using fingerprints from a light-weight on-chip sensor (XZ, NT, MT), pp. 703–708.
DATEDATE-2012-0002EGB #performance
Area efficient asynchronous SDM routers using 2-stage Clos switches (WS, DAE, JDG, WJB), pp. 1495–1500.
DATEDATE-2012-AridhiZT #order #reduction #simulation #towards
Towards improving simulation of analog circuits using model order reduction (HA, MHZ, ST), pp. 1337–1342.
DATEDATE-2012-BeaumontHN #architecture #execution #hardware #replication #security
SAFER PATH: Security architecture using fragmented execution and replication for protection against trojaned hardware (MRB, BDH, TN), pp. 1000–1005.
DATEDATE-2012-ChatziparaskevasBP #difference #finite #parallel
An FPGA-based parallel processor for Black-Scholes option pricing using finite differences schemes (GC, AB, IP), pp. 709–714.
DATEDATE-2012-CordesM #algorithm #parallel #search-based
Multi-objective aware extraction of task-level parallelism using genetic algorithms (DC, PM), pp. 394–399.
DATEDATE-2012-Gamatie #design #streaming
Design of streaming applications on MPSoCs using abstract clocks (AG), pp. 763–768.
DATEDATE-2012-KatzRZ #csp #generative
Generating instruction streams using abstract CSP (YK, MR, AZ), pp. 15–20.
DATEDATE-2012-LeMKV #debugging #satisfiability
Non-solution implications using reverse domination in a modern SAT-based debugging environment (BL, HM, BK, AGV), pp. 629–634.
DATEDATE-2012-MarianiSPZSB #architecture #configuration management #design #multi #resource management #runtime
Using multi-objective design space exploration to enable run-time resource management for reconfigurable architectures (GM, VMS, GP, VZ, CS, KB), pp. 1379–1384.
DATEDATE-2012-MaricauJG #analysis #learning #multi #reliability
Hierarchical analog circuit reliability analysis using multivariate nonlinear regression and active learning sample selection (EM, DdJ, GGEG), pp. 745–750.
DATEDATE-2012-MarinMLB #design #incremental #verification
Verification of partial designs using incremental QBF solving (PM, CM, MDTL, BB), pp. 623–628.
DATEDATE-2012-MillerVG #automation #cyber-physical #mockup #named #testing
MEDS: Mockup Electronic Data Sheets for automated testing of cyber-physical systems using digital mockups (BM, FV, TG), pp. 1417–1420.
DATEDATE-2012-NarayananDZT #design #verification
Verifying jitter in an analog and mixed signal design using dynamic time warping (RN, AD, MHZ, ST), pp. 1413–1416.
DATEDATE-2012-QianTT #configuration management #self
A flit-level speedup scheme for network-on-chips using self-reconfigurable bi-directional channels (ZQ, YFT, CYT), pp. 1295–1300.
DATEDATE-2012-RoxEG #analysis #design #network
Using timing analysis for the design of future switched based Ethernet automotive networks (JR, RE, PG), pp. 57–62.
DATEDATE-2012-SabrySA #3d
Thermal balancing of liquid-cooled 3D-MPSoCs using channel modulation (MMS, AS, DA), pp. 599–604.
DATEDATE-2012-ShahRK #bound #scheduling
Bounding WCET of applications using SDRAM with Priority Based Budget Scheduling in MPSoCs (HS, AR, AK), pp. 665–670.
DATEDATE-2012-ShoaibJV
Enabling advanced inference on sensor nodes through direct use of compressively-sensed signals (MS, NKJ, NV), pp. 437–442.
DATEDATE-2012-StattelmannGCBR #hybrid #modelling #simulation
Hybrid source-level simulation of data caches using abstract cache models (SS, GG, CC, OB, WR), pp. 376–381.
DATEDATE-2012-WilleDOO #automation #design #power management #synthesis
Automatic design of low-power encoders using reversible circuit synthesis (RW, RD, CO, AGO), pp. 1036–1041.
HPCAHPCA-2012-BalakrishnanS #behaviour #named #probability
WEST: Cloning data cache behavior using Stochastic Traces (GB, YS), pp. 387–398.
HPCAHPCA-2012-BattleHHR #flexibility
Flexible register management using reference counting (SJB, ADH, MH, AR), pp. 273–284.
HPDCHPDC-2012-DelamareFKL #distributed #named
SpeQuloS: a QoS service for BoT applications using best effort distributed computing infrastructures (SD, GF, DK, OL), pp. 173–186.
HPDCHPDC-2012-LeeWF #distributed #named #resource management
PonD: dynamic creation of HTC pool on demand using a decentralized resource discovery system (KL, DW, RJOF), pp. 161–172.
ISMMISMM-2012-OCallahan #memory management #question #web #why
Why is your web browser using so much memory? (RO), pp. 1–2.
LCTESLCTES-2012-KhudiaWM #embedded #fault #performance
Efficient soft error protection for commodity embedded microprocessors using profile information (DSK, GW, SAM), pp. 99–108.
LCTESLCTES-2012-KyleBFLT #embedded #manycore #set #simulation
Efficiently parallelizing instruction set simulation of embedded multi-core processors using region-based just-in-time dynamic binary translation (SCK, IB, BF, HL, NPT), pp. 21–30.
OSDIOSDI-2012-KotlaRRSW #data access #hardware #named
Pasture: Secure Offline Data Access Using Commodity Trusted Hardware (RK, TR, IR, PS, BW), pp. 321–334.
PDPPDP-2012-GrutzLFVHDK #parallel
Enabling Parallel Computing of a Brain Connectivity Map Using the MediGRID-Infrastructure and FSL (RG, BL, NKF, FV, AH, FD, DK), pp. 596–602.
PDPPDP-2012-HernandezGCGIS #estimation
Accelerating Fibre Orientation Estimation from Diffusion Weighted Magnetic Resonance Imaging Using GPUs (MH, GDG, JMC, JMG, AI, SNS), pp. 622–626.
PPoPPPPoPP-2012-TaoBB #development #gpu #kernel #scalability
Using GPU’s to accelerate stencil-based computation kernels for the development of large scale scientific applications on heterogeneous systems (JT, MB, SRB), pp. 287–288.
FASEFASE-2012-SalayFC #independence #modelling #refinement
Language Independent Refinement Using Partial Modeling (RS, MF, MC), pp. 224–239.
FASEFASE-2012-ShiCD #composition #execution #integration #product line #symbolic computation #testing
Integration Testing of Software Product Lines Using Compositional Symbolic Execution (JS, MBC, MBD), pp. 270–284.
FASEFASE-2012-UsaolaML #reduction #testing
Reduction of Test Suites Using Mutation (MPU, PRM, BPL), pp. 425–438.
FoSSaCSFoSSaCS-2012-PreugschatW #automaton #effectiveness #logic
Effective Characterizations of Simple Fragments of Temporal Logic Using Prophetic Automata (SP, TW), pp. 135–149.
STOCSTOC-2012-AbrahamN
Using petal-decompositions to build a low stretch spanning tree (IA, ON), pp. 395–406.
STOCSTOC-2012-KelnerMP #approximate #multi #performance
Faster approximate multicommodity flow using quadratically coupled flows (JAK, GLM, RP), pp. 1–18.
TACASTACAS-2012-FehnkerGHMPT #analysis #automation
Automated Analysis of AODV Using UPPAAL (AF, RJvG, PH, AM, MP, WLT), pp. 173–187.
TACASTACAS-2012-HolzerKSTV #contest #proving #reachability
Proving Reachability Using FShell — (Competition Contribution) (AH, DK, CS, MT, HV), pp. 538–541.
TACASTACAS-2012-LangM #equation #lts #model checking #network
Partial Model Checking Using Networks of Labelled Transition Systems and Boolean Equation Systems (FL, RM), pp. 141–156.
TACASTACAS-2012-ZaeemGKM #data type #satisfiability
History-Aware Data Structure Repair Using SAT (RNZ, DG, SK, KSM), pp. 2–17.
WRLAWRLA-2012-Riesco #maude #specification
Using Narrowing to Test Maude Specifications (AR), pp. 201–220.
CAVCAV-2012-EsparzaGK #probability #proving #source code #termination
Proving Termination of Probabilistic Programs Using Patterns (JE, AG, SK), pp. 123–138.
CAVCAV-2012-FredriksonJJRPSY #abstraction #performance #policy #refinement #runtime
Efficient Runtime Policy Enforcement Using Counterexample-Guided Abstraction Refinement (MF, RJ, SJ, TWR, PAP, HS, VY), pp. 548–563.
ICLPICLP-2012-SchandaB #development #programming #set
Using Answer Set Programming in the Development of Verified Software (FS, MB), pp. 72–85.
ICLPICLP-2012-ZomboriCS #constraints #logic programming #static typing #type inference
Static Type Inference for the Q language using Constraint Logic Programming (ZZ, JC, PS), pp. 119–129.
ICLPICLP-J-2012-AreiasR #concurrent #multi #thread #towards
Towards multi-threaded local tabling using a common table space (MA, RR), pp. 427–443.
ICLPICLP-J-2012-BliemMW #declarative #named #problem #programming
D-FLAT: Declarative problem solving using tree decompositions and answer-set programming (BB, MM, SW), pp. 445–464.
ICSTICST-2012-AlesioGNB #constraints #optimisation #realtime #testing
Testing Deadline Misses for Real-Time Systems Using Constraint Optimization Techniques (SDA, AG, SN, LCB), pp. 764–769.
ICSTICST-2012-BorjessonF #automation #case study #comparative #industrial #testing #tool support #user interface #visual notation
Automated System Testing Using Visual GUI Testing Tools: A Comparative Study in Industry (EB, RF), pp. 350–359.
ICSTICST-2012-DucheneGRR #detection #fuzzing #model inference
XSS Vulnerability Detection Using Model Inference Assisted Evolutionary Fuzzing (FD, RG, SR, JLR), pp. 815–817.
ICSTICST-2012-ElrakaibyMT #analysis #mutation testing #policy #testing
Testing Obligation Policy Enforcement Using Mutation Analysis (YE, TM, YLT), pp. 673–680.
ICSTICST-2012-EnderlinDGB #grammarware #php #testing
Grammar-Based Testing Using Realistic Domains in PHP (IE, FD, AG, FB), pp. 509–518.
ICSTICST-2012-GotliebHB #constraints #programming
Minimum Pairwise Coverage Using Constraint Programming Techniques (AG, AH, BB), pp. 773–774.
ICSTICST-2012-GrooteOW #formal method
Analyzing a Controller of a Power Distribution Unit Using Formal Methods (JFG, AO, JHW), pp. 420–428.
ICSTICST-2012-JonssonBSE #automation #scalability #towards
Towards Automated Anomaly Report Assignment in Large Complex Systems Using Stacked Generalization (LJ, DB, KS, SE), pp. 437–446.
ICSTICST-2012-LiuNT #bound #case study #smt #verification
Bounded Program Verification Using an SMT Solver: A Case Study (TL, MN, MT), pp. 101–110.
ICSTICST-2012-MalikK #analysis #graph
Dynamic Shape Analysis Using Spectral Graph Properties (MZM, SK), pp. 211–220.
ICSTICST-2012-MalzJG #fuzzy #logic #testing
Prioritization of Test Cases Using Software Agents and Fuzzy Logic (CM, NJ, PG), pp. 483–486.
ICSTICST-2012-McMinnSS #data type #generative #query #search-based #string #web
Search-Based Test Input Generation for String Data Types Using the Results of Web Queries (PM, MS, MS), pp. 141–150.
ICSTICST-2012-Nguyen #comprehension #detection #performance #scalability
Using Control Charts for Detecting and Understanding Performance Regressions in Large Software (THDN), pp. 491–494.
ICSTICST-2012-PapadakisT #fault
Using Mutants to Locate “Unknown” Faults (MP, YLT), pp. 691–700.
ICSTICST-2012-RaposD #execution #generative #incremental #modelling #symbolic computation #testing #uml
Incremental Test Case Generation for UML-RT Models Using Symbolic Execution (EJR, JD), pp. 962–963.
ICSTICST-2012-ShakyaXLLKK #classification #combinator #testing
Isolating Failure-Inducing Combinations in Combinatorial Testing Using Test Augmentation and Classification (KS, TX, NL, YL, RK, DRK), pp. 620–623.
ICSTICST-2012-WehbiOB #monitoring #security
Events-Based Security Monitoring Using MMT Tool (BW, EMdO, MB), pp. 860–863.
ICSTICST-2012-Wotawa #challenge #constraints #fault #open science #research #source code
Open Research Challenges of Localizing Faults in Programs Using Constraints (FW), pp. 770–771.
ICTSSICTSS-2012-LahamiKBJ #adaptation #architecture #design #distributed #problem
Using Knapsack Problem Model to Design a Resource Aware Test Architecture for Adaptable and Distributed Systems (ML, MK, MB, MJ), pp. 103–118.
ICTSSICTSS-2012-TaylorHBD #behaviour #testing
Using Behaviour Inference to Optimise Regression Test Sets (RT, MH, KB, JD), pp. 184–199.
IJCARIJCAR-2012-JacquelBDD #automation #deduction #modulo theories #proving #theorem proving #verification
Tableaux Modulo Theories Using Superdeduction — An Application to the Verification of B Proof Rules with the Zenon Automated Theorem Prover (MJ, KB, DD, CD), pp. 332–338.
ISSTAISSTA-2012-SuiYX #analysis #detection #memory management
Static memory leak detection using full-sparse value-flow analysis (YS, DY, JX), pp. 254–264.
LICSLICS-2012-GrigorieffV #algorithm #bound
Functionals Using Bounded Information and the Dynamics of Algorithms (SG, PV), pp. 345–354.
ICSTSAT-2012-TanjoTB #csp #encoding #named #order #satisfiability
Azucar: A SAT-Based CSP Solver Using Compact Order Encoding — (TT, NT, MB), pp. 456–462.
TAPTAP-2012-BengoleaAMF #bound #test coverage #testing
Using Coverage Criteria on RepOK to Reduce Bounded-Exhaustive Test Suites (VSB, NA, DM, MFF), pp. 19–34.
TAPTAP-2012-SenniF #constraints #data type #generative #logic programming #testing
Generation of Test Data Structures Using Constraint Logic Programming (VS, FF), pp. 115–131.
CBSECBSE-2011-TambeG #component #distributed #embedded #realtime
Rectifying orphan components using group-failover in distributed real-time and embedded systems (ST, ASG), pp. 139–148.
ECSAECSA-2011-BruckmannGP #architecture #enterprise #monitoring #realtime #towards
Towards Real-Time Monitoring and Controlling of Enterprise Architectures Using Business Software Control Centers (TB, VG, MP), pp. 287–294.
ECSAECSA-2011-NavarroCPR #architecture #model transformation
Using Model Transformation Techniques for the Superimposition of Architectural Styles (EN, CEC, DEP, CR), pp. 379–387.
ECSAECSA-2011-SilvaB #architecture #specification
A Model for Specifying Rationale Using an Architecture Description Language (LdS, DB), pp. 319–327.
ECSAECSA-2011-TibermacineZ #evolution #quality #requirements #web #web service
Supervising the Evolution of Web Service Orchestrations Using Quality Requirements (CT, TZ), pp. 1–16.
WICSAWICSA-2011-TsakirisKM #case study #evaluation #hybrid #industrial #plugin #quality
Evaluation of the Use of Quality Attribute Scenarios in a Plug-In Hybrid Electric Vehicle Controls System — Industrial Case Study (AT, JK, RM), pp. 66–72.
WICSAWICSA-2011-Woods #architecture #assessment #industrial
Industrial Architectural Assessment Using TARA (EW), pp. 56–65.
DocEngDocEng-2011-RossiR #representation #topic
Building a topic hierarchy using the bag-of-related-words representation (RGR, SOR), pp. 195–204.
DRRDRR-2011-BallS #automation #statistics #tool support
Statistical characterization of handwriting characteristics using automated tools (GRB, SNS), pp. 1–10.
DRRDRR-2011-BukhariSB #algorithm #documentation #image #multi #segmentation
Improved document image segmentation algorithm using multiresolution morphology (SSB, FS, TMB), pp. 1–10.
DRRDRR-2011-ChenCL #constraints #identification
Using perturbed handwriting to support writer identification in the presence of severe data constraints (JC, WC, DPL), pp. 1–10.
DRRDRR-2011-CutterBSB #identification
Font group identification using reconstructed fonts (MPC, JvB, FS, TMB), pp. 1–10.
DRRDRR-2011-HamdaniAHMA #optimisation #recognition
Improving a HMM-based off-line handwriting recognition system using MME-PSO optimization (MH, HEA, TMH, VM, AMA), pp. 1–10.
DRRDRR-2011-KimLT #automation #identification
Automated identification of biomedical article type using support Vector machines (ICK, DXL, GRT), pp. 1–10.
DRRDRR-2011-KunduHBCFJM #online #recognition #tablet
Online medical symbol recognition using a Tablet PC (AK, QH, SB, CC, RF, SJ, SM), pp. 1–10.
DRRDRR-2011-LiuZ #image #mobile
Segmenting texts from outdoor images taken by mobile phones using color features (ZL, HZ), pp. 1–10.
DRRDRR-2011-PengSGS #approach #documentation
Binarization of camera-captured document using A MAP approach (XP, SS, VG, RS), pp. 1–10.
DRRDRR-2011-SaabniE #distance #documentation #word
Word spotting for handwritten documents using Chamfer Distance and Dynamic Time Warping (RS, JES), pp. 1–10.
HTHT-2011-Contractor #multi #network #web
From disasters to WOW: using web science to understand and enable 21st century multidimensional networks (NSC), pp. 1–2.
HTHT-2011-GoedeMNW #network #social #summary
Succinct summaries of narrative events using social networks (BdG, MM, AN, JvW), pp. 299–304.
HTHT-2011-SahW #automation #fuzzy #metadata #mining
Automatic mining of cognitive metadata using fuzzy inference (MS, VW), pp. 37–46.
HTHT-2011-SeroussiBZ #modelling #personalisation #predict #rating
Personalised rating prediction for new users using latent factor models (YS, FB, IZ), pp. 47–56.
HTHT-2011-SolisA #experience #hypermedia #wiki
An experience using a spatial hypertext Wiki (CS, NA), pp. 133–142.
HTHT-2011-TakahashiOYIOT #analysis #wiki
Evaluating significance of historical entities based on tempo-spatial impacts analysis using Wikipedia link structure (YT, HO, MY, HI, SO, KT), pp. 83–92.
ICDARICDAR-2011-AbediF #analysis #documentation #image #locality #string
Localization of Digit Strings in Farsi/Arabic Document Images Using Structural Features and Syntactical Analysis (AA, KF), pp. 728–733.
ICDARICDAR-2011-AlvaroSB #2d #context-free grammar #probability #recognition
Recognition of Printed Mathematical Expressions Using Two-Dimensional Stochastic Context-Free Grammars (FA, JAS, JMB), pp. 1225–1229.
ICDARICDAR-2011-AtanasiuLV #novel #retrieval
Writer Retrieval — Exploration of a Novel Biometric Scenario Using Perceptual Features Derived from Script Orientation (VA, LLS, NV), pp. 628–632.
ICDARICDAR-2011-BaechlerI #analysis #layout #multi
Multi Resolution Layout Analysis of Medieval Manuscripts Using Dynamic MLP (MB, RI), pp. 1185–1189.
ICDARICDAR-2011-BarbozaLP #automation #documentation #summary
Using Readers’ Highlighting on Monochromatic Documents for Automatic Text Transcription and Summarization (RdSB, RDL, VMdSP), pp. 212–216.
ICDARICDAR-2011-BuiVPO #identification #recognition #word
Writer Identification Using TF-IDF for Cursive Handwritten Word Recognition (QAB, MV, SP, JMO), pp. 844–848.
ICDARICDAR-2011-BukhariSB #set
Text-Line Extraction Using a Convolution of Isotropic Gaussian Filter with a Set of Line Filters (SSB, FS, TMB), pp. 579–583.
ICDARICDAR-2011-CaoPN11a #identification #markov #modelling #recognition
Handwritten and Typewritten Text Identification and Recognition Using Hidden Markov Models (HC, RP, PN), pp. 744–748.
ICDARICDAR-2011-CelikY #2d #graph grammar #probability #recognition
Probabilistic Mathematical Formula Recognition Using a 2D Context-Free Graph Grammar (MC, BAY), pp. 161–166.
ICDARICDAR-2011-ColuttoG #difference #performance #recognition #word
Efficient Word Recognition Using a Pixel-Based Dissimilarity Measure (SC, BG), pp. 1110–1114.
ICDARICDAR-2011-CoustatyBBL #algorithm #image #ontology #semantic gap
Using Ontologies to Reduce the Semantic Gap between Historians and Image Processing Algorithms (MC, AB, KB, GL), pp. 156–160.
ICDARICDAR-2011-CoustatyO #documentation #image
Discrimination of Old Document Images Using Their Style (MC, JMO), pp. 389–393.
ICDARICDAR-2011-DuHSS
Snap and Translate Using Windows Phone (JD, QH, LS, JS), pp. 809–813.
ICDARICDAR-2011-EmilieBA #constraints #network #physics #recognition #semantics
Use of Semantic and Physical Constraints in Bayesian Networks for Form Recognition (EP, YB, AB), pp. 946–950.
ICDARICDAR-2011-Epshtein #documentation
Determining Document Skew Using Inter-line Spaces (BE), pp. 27–31.
ICDARICDAR-2011-GarzSD #analysis #layout
Layout Analysis for Historical Manuscripts Using Sift Features (AG, RS, MD), pp. 508–512.
ICDARICDAR-2011-HaddadHKA #adaptation #network #online #recognition
Improvement of On-line Recognition Systems Using a RBF-Neural Network Based Writer Adaptation Module (LH, TMH, MK, AMA), pp. 284–288.
ICDARICDAR-2011-HamamuraINOS #clustering #concurrent #optimisation #recognition #word
Concurrent Optimization of Context Clustering and GMM for Offline Handwritten Word Recognition Using HMM (TH, BI, TN, NO, SS), pp. 523–527.
ICDARICDAR-2011-HassanCG #distance #documentation #edit distance #image
Document Image Indexing Using Edit Distance Based Hashing (EH, SC, MG), pp. 1200–1204.
ICDARICDAR-2011-HuangYCL #documentation #keyword #statistics
Keyword Spotting in Offline Chinese Handwritten Documents Using a Statistical Model (LH, FY, QHC, CLL), pp. 78–82.
ICDARICDAR-2011-HuZ #online #recognition
HMM-Based Recognition of Online Handwritten Mathematical Symbols Using Segmental K-Means Initialization and a Modified Pen-Up/Down Feature (LH, RZ), pp. 457–462.
ICDARICDAR-2011-IndermuhleFFB #documentation #keyword #network #online
Keyword Spotting in Online Handwritten Documents Containing Text and Non-text Using BLSTM Neural Networks (EI, VF, AF, HB), pp. 73–77.
ICDARICDAR-2011-IwamuraKK #image #multi #recognition
Recognition of Multiple Characters in a Scene Image Using Arrangement of Local Features (MI, TK, KK), pp. 1409–1413.
ICDARICDAR-2011-JainD #identification
Offline Writer Identification Using K-Adjacent Segments (RJ, DSD), pp. 769–773.
ICDARICDAR-2011-JiangDLW #algorithm #markov #novel #segmentation #string
A Novel Short Merged Off-line Handwritten Chinese Character String Segmentation Algorithm Using Hidden Markov Model (ZJ, XD, CL, YW), pp. 668–672.
ICDARICDAR-2011-KatoDTIM #recognition
Low Resolution QR-Code Recognition by Applying Super-Resolution Using the Property of QR-Codes (YK, DD, TT, II, HM), pp. 992–996.
ICDARICDAR-2011-KimO #documentation #image #segmentation
Script-Free Text Line Segmentation Using Interline Space Model for Printed Document Images (MK, ISO), pp. 1354–1358.
ICDARICDAR-2011-KleberDS #estimation
Scale Space Binarization Using Edge Information Weighted by a Foreground Estimation (FK, MD, RS), pp. 1180–1184.
ICDARICDAR-2011-KluznerT
Page Curling Correction for Scanned Books Using Local Distortion Information (VK, AT), pp. 890–894.
ICDARICDAR-2011-KonyaES
Character Enhancement for Historical Newspapers Printed Using Hot Metal Typesetting (IVK, SE, CS), pp. 936–940.
ICDARICDAR-2011-KumarD #image #performance
Fast Rule-Line Removal Using Integral Images and Support Vector Machines (JK, DSD), pp. 584–588.
ICDARICDAR-2011-KumarPD #classification #documentation #image #learning #multi
Document Image Classification and Labeling Using Multiple Instance Learning (JK, JP, DSD), pp. 1059–1063.
ICDARICDAR-2011-KunwarR #geometry #online #recognition
Online Handwriting Recognition of Tamil Script Using Fractal Geometry (RK, AGR), pp. 1389–1393.
ICDARICDAR-2011-LeBS #documentation #image
Ternary Entropy-Based Binarization of Degraded Document Images Using Morphological Operators (THNL, TDB, CYS), pp. 114–118.
ICDARICDAR-2011-LiuLS #graph #image #retrieval
Retrieval of Envelope Images Using Graph Matching (LL, YL, CYS), pp. 99–103.
ICDARICDAR-2011-MandalRP #documentation #random #segmentation
Signature Segmentation from Machine Printed Documents Using Conditional Random Field (RM, PPR, UP), pp. 1170–1174.
ICDARICDAR-2011-MarinaiMS11a #distance #retrieval
Using Earth Mover’s Distance in the Bag-of-Visual-Words Model for Mathematical Symbol Retrieval (SM, BM, GS), pp. 1309–1313.
ICDARICDAR-2011-NeumannM #image #locality
Text Localization in Real-World Images Using Efficiently Pruned Exhaustive Search (LN, JM), pp. 687–691.
ICDARICDAR-2011-PanZSN #invariant
Recognizing Characters with Severe Perspective Distortion Using Hash Tables and Perspective Invariants (PP, YZ, JS, SN), pp. 548–552.
ICDARICDAR-2011-PengCPN #random #video
Text Extraction from Video Using Conditional Random Fields (XP, HC, RP, PN), pp. 1029–1033.
ICDARICDAR-2011-PinsonB #component
Connected Component Level Discrimination of Handwritten and Machine-Printed Text Using Eigenfaces (SJP, WAB), pp. 1394–1398.
ICDARICDAR-2011-RahnemoonfarA #documentation #image
Restoration of Arbitrarily Warped Historical Document Images Using Flow Lines (MR, AA), pp. 905–909.
ICDARICDAR-2011-RoyRR #documentation #retrieval #word
Word Retrieval in Historical Document Using Character-Primitives (PPR, JYR, NR), pp. 678–682.
ICDARICDAR-2011-SaabniE #independence
Language-Independent Text Lines Extraction Using Seam Carving (RS, JES), pp. 563–568.
ICDARICDAR-2011-SaldarriagaC #network #online #word
Indexing On-line Handwritten Texts Using Word Confusion Networks (SPS, MC), pp. 197–201.
ICDARICDAR-2011-SituLT #image #locality #probability #web
Text Localization in Web Images Using Probabilistic Candidate Selection Model (LS, RL, CLT), pp. 1359–1363.
ICDARICDAR-2011-SunK #retrieval #visual notation
Similar Manga Retrieval Using Visual Vocabulary Based on Regions of Interest (WS, KK), pp. 1075–1079.
ICDARICDAR-2011-TaoLJG #learning #locality #recognition
Similar Handwritten Chinese Character Recognition Using Discriminative Locality Alignment Manifold Learning (DT, LL, LJ, YG), pp. 1012–1016.
ICDARICDAR-2011-VincentNP #algorithm #documentation
Document Recto-verso Registration Using a Dynamic Time Warping Algorithm (VR, NJ, JPD), pp. 1230–1234.
ICDARICDAR-2011-WakaharaK #clustering #image #string
Binarization of Color Character Strings in Scene Images Using K-Means Clustering and Support Vector Machines (TW, KK), pp. 274–278.
ICDARICDAR-2011-WangWZ #graph #online #verification
On-line Signature Verification Using Segment-to-Segment Graph Matching (KW, YW, ZZ), pp. 804–808.
ICDARICDAR-2011-XiaWL #clustering #keyword #knowledge-based
Chinese Keyword Spotting Using Knowledge-Based Clustering (YX, KW, ML), pp. 789–793.
ICDARICDAR-2011-XuYWL #analysis
Touching Character Separation in Chinese Handwriting Using Visibility-Based Foreground Analysis (LX, FY, QFW, CLL), pp. 859–863.
ICDARICDAR-2011-YouADGT #detection
Detecting Figure-Panel Labels in Medical Journal Articles Using MRF (DY, SA, DDF, VG, GRT), pp. 967–971.
ICDARICDAR-2011-ZanibbiY #documentation #image #query
Math Spotting: Retrieving Math in Technical Documents Using Handwritten Query Images (RZ, LY), pp. 446–451.
ICDARICDAR-2011-ZhangLYDW #random #recognition
An Improved Scene Text Extraction Method Using Conditional Random Field and Optical Character Recognition (HZ, CL, CY, XD, KW), pp. 708–712.
ICDARICDAR-2011-ZhouYWWNL #random
Transcript Mapping for Handwritten Text Lines Using Conditional Random Fields (XDZ, FY, DHW, QFW, MN, CLL), pp. 58–62.
ICDARICDAR-2011-ZhuN #online #optimisation #parametricity #recognition
On-line Handwritten Japanese Characters Recognition Using a MRF Model with Parameter Optimization by CRF (BZ, MN), pp. 603–607.
ICDARICDAR-2011-ZhuN11b #online #recognition
Trie-Lexicon-Driven Recognition for On-line Handwritten Japanese Disease Names Using a Time-Synchronous Method (BZ, MN), pp. 1130–1134.
JCDLJCDL-2011-FreireJ
Using national bibliographies for rights clearance (NF, AJ), pp. 167–174.
JCDLJCDL-2011-GippMB #comparative #detection #evaluation
Comparative evaluation of text- and citation-based plagiarism detection approaches using guttenplag (BG, NM, JB), pp. 255–258.
JCDLJCDL-2011-KawaseH #classification #folksonomy
Classification of user interest patterns using a virtual folksonomy (RK, EH), pp. 105–108.
JCDLJCDL-2011-KleinWN #web
Rediscovering missing web pages using link neighborhood lexical signatures (MK, JW, MLN), pp. 137–140.
JCDLJCDL-2011-LiZYWWW #gpu #recommendation #social
A social network-aware top-N recommender system using GPU (RL, YZ, HY, XW, JW, BW), pp. 287–296.
JCDLJCDL-2011-MarshallS #reuse #visual notation
The ownership and reuse of visual media (CCM, FMSI), pp. 157–166.
JCDLJCDL-2011-MartinHRF
Indexing musical pieces using their major repetition (BM, PH, MR, PF), pp. 153–156.
JCDLJCDL-2011-MurthyLHFPDT #identification
Use of subimages in fish species identification: a qualitative study (UM, LTL, EH, EAF, MAPQ, LMLD, RdST), pp. 185–194.
JCDLJCDL-2011-SaadG #case study #web
Archiving the web using page changes patterns: a case study (MBS, SG), pp. 113–122.
JCDLJCDL-2011-SanchezCRNLB #collaboration #library #network #visualisation
Visualizing collaboration networks implicit in digital libraries using OntoStarFish (JAS, OC, AR, MAMN, JCL, EB), pp. 213–222.
JCDLJCDL-2011-SchererBS #multi #repository #research #retrieval
Retrieval and exploratory search in multivariate research data repositories using regressional features (MS, JB, TS), pp. 363–372.
PODSPODS-2011-CohenK
Get the most out of your sample: optimal unbiased estimators using partial information (EC, HK), pp. 13–24.
SIGMODSIGMOD-2011-ArasuKL #constraints #declarative #generative
Data generation using declarative constraints (AA, RK, JL), pp. 685–696.
SIGMODSIGMOD-2011-DoZPDNH
Turbocharging DBMS buffer pool using SSDs (JD, DZ, JMP, DJD, JFN, AH), pp. 1113–1124.
SIGMODSIGMOD-2011-KohlerYZ #parallel #performance
Efficient parallel skyline processing using hyperplane projections (HK, JY, XZ), pp. 85–96.
SIGMODSIGMOD-2011-LiMDMS #framework #pipes and filters #platform #scalability
A platform for scalable one-pass analytics using MapReduce (BL, EM, YD, AM, PJS), pp. 985–996.
SIGMODSIGMOD-2011-LiuRGGWAM #analysis #multi #named #query #sequence
E-Cube: multi-dimensional event sequence analysis using hierarchical pattern query sharing (ML, EAR, KG, CG, SW, IA, AM), pp. 889–900.
SIGMODSIGMOD-2011-OkcanR #pipes and filters
Processing theta-joins using MapReduce (AO, MR), pp. 949–960.
TPDLTPDL-2011-BronHR #documentation
Linking Archives Using Document Enrichment and Term Selection (MB, BH, MdR), pp. 360–371.
TPDLTPDL-2011-CeccarelliGLNT #experience #query
Improving Europeana Search Experience Using Query Logs (DC, SG, CL, FMN, GT), pp. 384–395.
TPDLTPDL-2011-KnothRZ #mining #repository #semantics
Connecting Repositories in the Open Access Domain Using Text Mining and Semantic Data (PK, VR, ZZ), pp. 483–487.
TPDLTPDL-2011-SaadPG #crawling #navigation #web
Coherence-Oriented Crawling and Navigation Using Patterns for Web Archives (MBS, ZP, SG), pp. 421–433.
TPDLTPDL-2011-SmithOG #capacity #case study #named
CloudCAP: A Case Study in Capacity Planning Using the Cloud (JAS, JFO, JRG), pp. 110–117.
VLDBVLDB-2011-AliCFWDR #online #visualisation
Online Visualization of Geospatial Stream Data using the WorldWide Telescope (MHA, BC, JF, CW, SMD, BSR), pp. 1379–1382.
VLDBVLDB-2011-AoZWSWLLL #algorithm #parallel #performance
Efficient Parallel Lists Intersection and Index Compression Algorithms using Graphics Processing Units (NA, FZ, DW, DSS, GW, XL, JL, SL), pp. 470–481.
VLDBVLDB-2011-ArasuKL #constraints #declarative #generative #named
DataSynth: Generating Synthetic Data using Declarative Constraints (AA, RK, JL), pp. 1418–1421.
VLDBVLDB-2011-DasNAA #database #lightweight #migration #named
Albatross: Lightweight Elasticity in Shared Storage Databases for the Cloud using Live Data Migration (SD, SN, DA, AEA), pp. 494–505.
VLDBVLDB-2011-KimRA #algebra #pipes and filters
From SPARQL to MapReduce: The Journey Using a Nested TripleGroup Algebra (HK, PR, KA), pp. 1426–1429.
VLDBVLDB-2011-KocR #classification #incremental #maintenance
Incrementally maintaining classification using an RDBMS (MLK, CR), pp. 302–313.
VLDBVLDB-2011-LeeNS #estimation #locality #similarity
Similarity Join Size Estimation using Locality Sensitive Hashing (HL, RTN, KS), pp. 338–349.
VLDBVLDB-2011-NiuRDS #logic #markov #named #network #scalability #statistics
Tuffy: Scaling up Statistical Inference in Markov Logic Networks using an RDBMS (FN, CR, AD, JWS), pp. 373–384.
VLDBVLDB-2011-RaoST #consistency #scalability
Using Paxos to Build a Scalable, Consistent, and Highly Available Datastore (JR, EJS, ST), pp. 243–254.
VLDBVLDB-2012-KruegerKGSSCPDZ11 #database #manycore #performance
Fast Updates on Read-Optimized Databases Using Multi-Core CPUs (JK, CK, MG, NS, DS, JC, HP, PD, AZ), pp. 61–72.
VLDBVLDB-2012-KumarR11 #probability
Probabilistic Management of OCR Data using an RDBMS (AK, CR), pp. 322–333.
VLDBVLDB-2012-RuttenbergS11 #distance
Indexing the Earth Mover’s Distance Using Normal Distributions (BER, AKS), pp. 205–216.
CSEETCSEET-2011-BollinHM #education #project management #simulation
Teaching software project management using simulations (AB, EH, RTM), pp. 81–90.
CSEETCSEET-2011-LethbridgeMFB #education #programming #uml
Teaching UML using umple: Applying model-oriented programming in the classroom (TCL, GM, AF, OBB), pp. 421–428.
CSEETCSEET-2011-LongstreetC #education #game studies #re-engineering #student
Using games in software engineering education to increase student success and retention (CSL, KMLC), p. 554.
CSEETCSEET-2011-LuLL #analysis
Competence analysis of IT professionals involved in business services — Using a qualitative method (HKL, CHL, PCL), pp. 61–70.
CSEETCSEET-2011-OffuttLAX #abstraction #design #education #web
Using abstraction and Web applications to teach criteria-based test design (JO, NL, PA, WX), pp. 227–236.
CSEETCSEET-2011-RadermacherW #empirical #interactive #programming #student
Investigating student-instructor interactions when using pair programming: An empirical study (AR, GSW), pp. 41–50.
CSEETCSEET-2011-RoshandelGL #education #re-engineering
Using community-based projects in software engineering education (RR, JG, RL), pp. 472–476.
CSEETCSEET-2011-Scharff #agile #assurance #development #quality
Guiding global software development projects using Scrum and Agile with quality assurance (CS), pp. 274–283.
ITiCSEITiCSE-2011-BackCMM #case study #modelling #student
A study in engaging female students in computer science using role models (JB, PC, CM, PWM), pp. 63–67.
ITiCSEITiCSE-2011-GuimaraesSA #education #game studies #security #video
Using video games to teach security (MAMG, HES, RA), p. 346.
ITiCSEITiCSE-2011-Harms #api #implementation #java
A Java implementation of the myro API for using personal robots in CS1 (DEH), p. 338.
ITiCSEITiCSE-2011-HarrachA #collaboration #learning #optimisation #process #recommendation
Optimizing collaborative learning processes by using recommendation systems (SH, MA), p. 389.
ITiCSEITiCSE-2011-KleinKT #analysis #assessment #automation #semantics
Automated assessment of short free-text responses in computer science using latent semantic analysis (RK, AK, MT), pp. 158–162.
ITiCSEITiCSE-2011-LangeFL
An update on the use of community-based non-profit organizations in capstone projects (DKL, RCF, PML), p. 372.
ITiCSEITiCSE-2011-Law #development #documentation #student
Using student blogs for documentation in software development projects (RL), p. 366.
ITiCSEITiCSE-2011-MarkhamB #bound #twitter
Collaborating across international boundaries: using twitter as a tool in the classroom (SM, SB), p. 382.
ITiCSEITiCSE-2011-MesserK #problem #process
The use of mediating artifacts in embedding problem solving processes in an e-learning environment (OMM, AK), p. 390.
ITiCSEITiCSE-2011-StrieweG11a #automation #programming #runtime
Using run time traces in automated programming tutoring (MS, MG), pp. 303–307.
ITiCSEITiCSE-2011-VilnerZT #education #inheritance
Using greenfoot in teaching inheritance in CS1 (TV, EZ, ST), p. 342.
ITiCSEITiCSE-2011-WittmannBK #programming
Using the SCORE software package to analyse novice computer graphics programming (MRAW, MB, MKT), pp. 118–122.
SIGITESIGITE-2011-Li #concept #framework #open source
Introducing virtualization management concepts using open source cloud infrastructure managers (PL), pp. 309–310.
SIGITESIGITE-2011-SettleWS #design #evaluation #game studies #student
Engaging game design students using peer evaluation (AS, CW, CS), pp. 73–78.
SIGITESIGITE-2011-VillaromanRS #artificial reality #education #interactive
Teaching natural user interaction using OpenNI and the Microsoft Kinect sensor (NV, DR, BS), pp. 227–232.
CSMRCSMR-2011-CorazzaMMS #clustering
Investigating the Use of Lexical Information for Software System Clustering (AC, SDM, VM, GS), pp. 35–44.
CSMRCSMR-2011-CoutoVF #case study #compilation #product line
Extracting Software Product Lines: A Case Study Using Conditional Compilation (MVC, MTV, EF), pp. 191–200.
CSMRCSMR-2011-KohlKPDM #analysis #maintenance #multi
Using Multivariate Split Analysis for an Improved Maintenance of Automotive Diagnosis Functions (JK, AK, JPP, AD, SM), pp. 305–308.
CSMRCSMR-2011-SilvaPAM #execution #on the
On the Use of Execution Trace Alignment for Driving Perfective Changes (LLS, KRP, SdA, MdAM), pp. 221–230.
ICPCICPC-2011-Cordy #clone detection #detection #incremental #scalability #similarity
Exploring Large-Scale System Similarity Using Incremental Clone Detection and Live Scatterplots (JRC), pp. 151–160.
ICPCICPC-2011-HouL #api #case study #framework
Obstacles in Using Frameworks and APIs: An Exploratory Study of Programmers’ Newsgroup Discussions (DH, LL), pp. 91–100.
ICPCICPC-2011-LuciaPOPP #traceability
Improving IR-based Traceability Recovery Using Smoothing Filters (ADL, MDP, RO, AP, SP), pp. 21–30.
ICPCICPC-2011-PanchenkoKPZ #database #precise #query #scalability #source code
Precise and Scalable Querying of Syntactical Source Code Patterns Using Sample Code Snippets and a Database (OP, JK, HP, AZ), pp. 41–50.
ICSMEICSM-2011-DraganCHM #commit
Using stereotypes to help characterize commits (ND, MLC, MH, JIM), pp. 520–523.
ICSMEICSM-2011-KhomhCZSD #fault #predict #testing
Predicting post-release defects using pre-release field testing results (FK, BC, YZ, AS, DD), pp. 253–262.
ICSMEICSM-2011-MirakhorliC #architecture #information management #maintenance #modelling #traceability
Using tactic traceability information models to reduce the risk of architectural degradation during system maintenance (MM, JCH), pp. 123–132.
ICSMEICSM-2011-PaymalPBS #evolution #graph #metric #process
Measuring disruption from software evolution activities using graph-based metrics (PP, RP, SB, HPS), pp. 532–535.
ICSMEICSM-2011-QusefBOLB #concept #named #slicing #traceability
SCOTCH: Test-to-code traceability using slicing and conceptual coupling (AQ, GB, RO, ADL, DB), pp. 63–72.
ICSMEICSM-2011-RomanoP #interface #java #metric #predict #source code
Using source code metrics to predict change-prone Java interfaces (DR, MP), pp. 303–312.
ICSMEICSM-2011-ShternT #clustering #multi
Evaluating software clustering using multiple simulated authoritative decompositions (MS, VT), pp. 353–361.
MSRMSR-2011-BinkleyHL #identifier #speech
Improving identifier informativeness using part of speech information (DB, MH, DL), pp. 203–206.
MSRMSR-2011-LiZ #re-engineering #semantics #web
Integrating software engineering data using semantic web technologies (YFL, HZ), pp. 211–214.
WCREWCRE-2011-AryaniPLMN #dependence #predict #question
Can We Predict Dependencies Using Domain information? (AA, FP, ML, ANM, ON), pp. 55–64.
WCREWCRE-2011-Beard #debugging #information retrieval #locality
Extending Bug Localization Using Information Retrieval and Code Clone Location Techniques (MDB), pp. 425–428.
WCREWCRE-2011-FuhrHR #clustering #dynamic analysis #implementation #legacy #reuse
Using Dynamic Analysis and Clustering for Implementing Services by Reusing Legacy Code (AF, TH, VR), pp. 275–279.
WCREWCRE-2011-GrantCS #analysis #concept #reverse engineering #source code
Reverse Engineering Co-maintenance Relationships Using Conceptual Analysis of Source Code (SG, JRC, DBS), pp. 87–91.
WCREWCRE-2011-KellensRNSJ #evolution #quantifier #reasoning #source code
Reasoning over the Evolution of Source Code Using Quantified Regular Path Expressions (AK, CDR, CN, RS, VJ), pp. 389–393.
WCREWCRE-2011-MyersS #execution
Focusing on Execution Traces Using Diver (DM, MADS), pp. 439–440.
WCREWCRE-2011-WangLXJ #empirical #information retrieval #kernel #linux #locality
Concern Localization using Information Retrieval: An Empirical Study on Linux Kernel (SW, DL, ZX, LJ), pp. 92–96.
CIAACIAA-J-2010-YuBI11 #automaton #multi #relational #string #verification
Relational String Verification Using Multi-Track Automata (FY, TB, OHI), pp. 1909–1924.
CIAACIAA-2011-CarninoF #automaton #generative #markov #random
Random Generation of Deterministic Acyclic Automata Using Markov Chains (VC, SDF), pp. 65–75.
DLTDLT-2011-KuncO #automaton #finite
Describing Periodicity in Two-Way Deterministic Finite Automata Using Transformation Semigroups (MK, AO), pp. 324–336.
LATALATA-2011-LabathR #information management
Simplifying DPDA Using Supplementary Information (PL, BR), pp. 342–353.
IFMIFM-J-2009-ColvinH11 #behaviour #csp #semantics #specification
A semantics for Behavior Trees using CSP with specification commands (RC, IJH), pp. 891–914.
FMFM-2011-BartheCK #relational #source code #verification
Relational Verification Using Product Programs (GB, JMC, CK), pp. 200–214.
FMFM-2011-MullerR #verification
Using Debuggers to Understand Failed Verification Attempts (PM, JNR), pp. 73–87.
RTARTA-2011-FalkeKS #analysis #c #compilation #source code #termination
Termination Analysis of C Programs Using Compiler Intermediate Languages (SF, DK, CS), pp. 41–50.
RTARTA-2011-KochemsO #analysis #functional #linear #reachability
Improved Functional Flow and Reachability Analyses Using Indexed Linear Tree Grammars (JK, CHLO), pp. 187–202.
SEFMSEFM-2011-JacquelBDD #automation #proving #theorem proving #verification
Verifying B Proof Rules Using Deep Embedding and Automated Theorem Proving (MJ, KB, DD, CD), pp. 253–268.
SEFMSEFM-2011-OnoHTNH #coq #pipes and filters #specification
Using Coq in Specification and Program Extraction of Hadoop MapReduce Applications (KO, YH, YT, NN, MH), pp. 350–365.
SEFMSEFM-2011-Sanchez
Using System Dynamics to Assess the Role of Socio-economic Status in Tuberculosis Incidence (MAS), pp. 464–475.
ICFPICFP-2011-ChyzakD #generative #ml #runtime #web
Using camlp4 for presenting dynamic mathematics on the web: DynaMoW, an OCaml language extension for the run-time generation of mathematical contents and their presentation on the web (FC, AD), pp. 259–265.
IFLIFL-2011-Thomsen #functional #logic #optimisation
Describing and Optimising Reversible Logic Using a Functional Language (MKT), pp. 148–163.
AIIDEAIIDE-2011-FujitaIM #detection #network
Detecting Real Money Traders in MMORPG by Using Trading Network (AF, HI, HM).
AIIDEAIIDE-2011-TastanS #game studies #learning #policy
Learning Policies for First Person Shooter Games Using Inverse Reinforcement Learning (BT, GRS).
CoGCIG-2011-AgapitosOBT #learning #modelling #programming #search-based
Learning environment models in car racing using stateful Genetic Programming (AA, MO0, AB, TT), pp. 219–226.
CoGCIG-2011-AlhejaliL #programming #search-based
Using a training camp with Genetic Programming to evolve Ms Pac-Man agents (AMA, SML), pp. 118–125.
CoGCIG-2011-AntonioFCP #algorithm #evaluation #game studies #optimisation #search-based
Optimization of an evaluation function of the 4-sided dominoes game using a genetic algorithm (NSA, CFFCF, MGFC, RP), pp. 24–30.
CoGCIG-2011-SarjantPDS #game studies #online #policy #relational
Using the online cross-entropy method to learn relational policies for playing different games (SS, BP, KD, TS), pp. 182–189.
CoGCIG-2011-ThawonmasT #automation #evolution #game studies #generative
Frame selection using iterative grammatical evolution for automatic comic generation from game logs (RT, YT), pp. 31–38.
CoGCIG-2011-UusitaloJ #approach
A reactive mutli-agent approach to car driving using artificial potential fields (TU, SJJ), pp. 203–210.
DiGRADiGRA-2011-CederholmHLSE #game studies
The Aiming Game: Using a Game with Biofeedback for Training in Emotion Regulation (HC, OH, CL, CCS, JE).
DiGRADiGRA-2011-KultimaA #game studies
Using the VNA Ideation Game at Global Game Jam (AK, KA).
DiGRADiGRA-2011-LacasaBC #game studies #online
Adolescent thinking and online writing after the use of commercial games in the classroom (PL, RMB, HdC).
DiGRADiGRA-2011-SoppittM #analysis #comprehension #experience
Understanding Player Experience using Sequential Analysis (MS, GM).
FDGFDG-2011-Consalvo #game studies #social
Using your friends: social mechanics in social games (MC), pp. 188–195.
FDGFDG-2011-FolmerLE #3d #navigation
Navigating a 3D avatar using a single switch (EF, FL, BE), pp. 154–160.
FDGFDG-2011-HaleY #detection #navigation
Using navigation meshes for collision detection (DHH, GMY), pp. 316–318.
FDGFDG-2011-HarrisonR #behaviour #predict
Using sequential observations to model and predict player behavior (BEH, DLR), pp. 91–98.
FDGFDG-2011-LavioleHS #game studies #physics #simulation
Tabletop games using real environment and physical simulation (JL, MH, CS), pp. 322–324.
FDGFDG-2011-MorelliF #game studies #gesture #realtime #video
Real-time sensory substitution to enable players who are blind to play video games using whole body gestures (TM, EF), pp. 147–153.
FDGFDG-2011-SloanKN #game studies
Feeling the ambiance: using smart ambiance to increase contextual awareness in game agents (CS, JDK, BMN), pp. 298–300.
CoGVS-Games-2011-AnagnostouV #artificial reality
Square AR: Using Augmented Reality for Urban Planning (KA, PV), pp. 128–131.
CoGVS-Games-2011-BirchallG #development #education #evaluation #game studies #named
Elemental: An Insight into the Development and Evaluation of a Secondary Education Chemistry Game Using XNA (JB, CG), pp. 32–39.
CoGVS-Games-2011-Broin #game studies
Using a Criteria-Based User Model for Facilitating Flow in Serious Games (DO), pp. 63–69.
CoGVS-Games-2011-ChilcottS #3d #learning #multi #online #web
Ageing Well and Learning through Online Immersive Participation Using a Multi-user Web 3D Environment (MC, AS), pp. 70–75.
CoGVS-Games-2011-ChristopoulosMAK
Using Virtual Environments to Tell the Story: “The Battle of Thermopylae” (DC, PM, AA, JNK), pp. 84–91.
CoGVS-Games-2011-HulusicR #education
The Use of Live Virtual Guides in Educational Applications (VH, SR), pp. 92–97.
CoGVS-Games-2011-NetoSNPF #game studies #interactive
Solis'Curse - A Cultural Heritage Game Using Voice Interaction with a Virtual Agent (JNN, RS, JPN, JMP, JF), pp. 164–167.
CoGVS-Games-2011-Schwenk #realtime
Real-Time Rendering of Dynamic Area and Volume Lights Using Hierarchical Irradiance Volumes (KS), pp. 136–139.
CHICHI-2011-ChangL #framework #migration #mobile
Deep shot: a framework for migrating tasks across devices using mobile phone cameras (THC, YL), pp. 2163–2172.
CHICHI-2011-ChiZXYW #authoring #collaboration #coordination #email
Using email to facilitate wiki-based coordinated, collaborative authoring (CYC, MXZ, WX, MY, EW), pp. 3459–3468.
CHICHI-2011-CohnMPT #gesture
Your noise is my command: sensing gestures using the body as an antenna (GC, DM, SNP, DST), pp. 791–800.
CHICHI-2011-CowanL #interactive #mobile #named
ShadowPuppets: supporting collocated interaction with mobile projector phones using hand shadows (LGC, KAL), pp. 2707–2716.
CHICHI-2011-CramerHTYH #interactive #student #visual notation
Classroom-based assistive technology: collective use of interactive visual schedules by students with autism (MC, SHH, MT, MTY, GRH), pp. 1–10.
CHICHI-2011-EllingLJ #eye tracking
Retrospective think-aloud method: using eye movements as an extra cue for participants’ verbalizations (SE, LL, MdJ), pp. 1161–1170.
CHICHI-2011-EppLM #identification
Identifying emotional states using keystroke dynamics (CE, ML, RLM), pp. 715–724.
CHICHI-2011-Freeman #eye tracking #protocol #usability
Triggered think-aloud protocol: using eye tracking to improve usability test moderation (BF), pp. 1171–1174.
CHICHI-2011-HarrisonHWFH #design #named #user interface #visual notation
Kineticons: using iconographic motion in graphical user interface design (CH, GH, KDDW, JF, SEH), pp. 1999–2008.
CHICHI-2011-HuangWD #problem
No clicks, no problem: using cursor movements to understand and improve search (JH, RWW, STD), pp. 1225–1234.
CHICHI-2011-HutamaSFG #correlation #interactive #multi
Distinguishing multiple smart-phone interactions on a multi-touch wall display using tilt correlation (WH, PS, CWF, WBG), pp. 3315–3318.
CHICHI-2011-John #design #modelling #performance #predict #recommendation #user interface
Using predictive human performance models to inspire and support UI design recommendations (BEJ), pp. 983–986.
CHICHI-2011-JunuzovicIHZTB #multimodal #overview #what
What did i miss?: in-meeting review using multimodal accelerated instant replay (air) conferencing (SJ, KI, RH, ZZ, JCT, CB), pp. 513–522.
CHICHI-2011-KhotSK #authentication #named #novel
MARASIM: a novel jigsaw based authentication scheme using tagging (RAK, KS, PK), pp. 2605–2614.
CHICHI-2011-KimP #reuse
Practices in the creative reuse of e-waste (SK, EP), pp. 2395–2404.
CHICHI-2011-KimS #community #health #interface #online
Using interface cues in online health community boards to change impressions and encourage user contribution (HSK, SSS), pp. 599–608.
CHICHI-2011-KuhnCQS
Using tags to encourage reflection and annotation on data during nomadic inquiry (AK, CC, CQ, SS), pp. 667–670.
CHICHI-2011-LaheyGBV #comprehension #flexibility #gesture #mobile #named
PaperPhone: understanding the use of bend gestures in mobile devices with flexible electronic paper displays (BL, AG, WB, RV), pp. 1303–1312.
CHICHI-2011-Light #design #performance
Democratising technology: making transformation using designing, performance and props (AL), pp. 2239–2242.
CHICHI-2011-LuceroHJ #collaboration #mobile #named
Pass-them-around: collaborative use of mobile phones for photo sharing (AL, JH, TJ), pp. 1787–1796.
CHICHI-2011-LuL #gesture #mobile #user interface
Gesture avatar: a technique for operating mobile user interfaces using gestures (HL, YL), pp. 207–216.
CHICHI-2011-MarshallB #case study #experience #interactive #performance
Using fast interaction to create intense experiences (JM, SB), pp. 1255–1264.
CHICHI-2011-MarshallS #social #social media #twitter
Social media ownership: using twitter as a window onto current attitudes and beliefs (CCM, FMSI), pp. 1081–1090.
CHICHI-2011-MatthewsD #mobile
In the mood: engaging teenagers in psychotherapy using mobile phones (MM, GD), pp. 2947–2956.
CHICHI-2011-NackeKLM #design #game studies #interactive
Biofeedback game design: using direct and indirect physiological control to enhance game interaction (LEN, MK, CL, RLM), pp. 103–112.
CHICHI-2011-NiKW #communication #named
AnatOnMe: facilitating doctor-patient communication using a projection-based handheld device (TN, AKK, DW), pp. 3333–3342.
CHICHI-2011-SporkaFKPHM #named #predict
CHANTI: predictive text entry using non-verbal vocal input (AJS, TF, SHK, OP, PH, ISM), pp. 2463–2472.
CHICHI-2011-TamakiMR #named
PossessedHand: techniques for controlling human hands using electrical muscles stimuli (ET, TM, JR), pp. 543–552.
CHICHI-2011-WeilenmannJ #comprehension #interactive #people
Understanding people and animals: the use of a positioning system in ordinary human-canine interaction (AW, OJ), pp. 2631–2640.
CHICHI-2011-WobbrockFGH #analysis #parametricity #rank
The aligned rank transform for nonparametric factorial analyses using only anova procedures (JOW, LF, DG, JJH), pp. 143–146.
CHICHI-2011-YangGIF #proximity
TouchCuts and TouchZoom: enhanced target selection for touch displays using finger proximity sensing (XDY, TG, PI, GWF), pp. 2585–2594.
CHICHI-2011-YataniNTT #overview #user interface #word
Review spotlight: a user interface for summarizing user-generated reviews using adjective-noun word pairs (KY, MN, AT, KNT), pp. 1541–1550.
CHICHI-2011-ZhaoCB #multi #named #navigation #visual notation
KronoMiner: using multi-foci navigation for the visual exploration of time-series data (JZ, FC, RB), pp. 1737–1746.
CSCWCSCW-2011-FanLZTSW #game studies #gesture #social
Surprise Grabber: a co-located tangible social game using phone hand gesture (MF, XL, YZ, LT, YS, HW), pp. 625–628.
CSCWCSCW-2011-GergleC #collaboration #eye tracking #mobile #what
See what I’m saying?: using Dyadic Mobile Eye tracking to study collaborative reference (DG, ATC), pp. 435–444.
CSCWCSCW-2011-GuibourdencheVGFH #distributed #multi #process #product line
Using multiple scores for transcribing the distributed activities of a family (JG, JVR, MG, MF, YH), pp. 637–640.
CSCWCSCW-2011-KamranC #collaboration #ontology #social #social media
Defining ontology by using users collaboration on social media (SK, FC), pp. 657–660.
CSCWCSCW-2011-MarshallRP #interactive #physics
Using F-formations to analyse spatial patterns of interaction in physical environments (PM, YR, NP), pp. 445–454.
CSCWCSCW-2011-MistryNM11a #named
SPARSH: passing data using the body as a medium (PM, SN, PM), pp. 689–692.
CSCWCSCW-2011-NewmanLMRM #challenge #facebook #health #network #online #problem #social
It’s not that I don’t have problems, I’m just not putting them on facebook: challenges and opportunities in using online social networks for health (MWN, DL, SAM, PR, MEM), pp. 341–350.
HCIDHM-2011-EilersM #composition #learning #modelling
Learning the Relevant Percepts of Modular Hierarchical Bayesian Driver Models Using a Bayesian Information Criterion (ME, CM), pp. 463–472.
HCIDHM-2011-OdenthalMKKS #empirical
An Empirical Study of Disassembling Using an Augmented Vision System (BO, MPM, WK, BK, CMS), pp. 399–408.
HCIDHM-2011-QinTD #type system
The Upper Extremity Loading during Typing Using One, Two and Three Fingers (JQ, MT, JTD), pp. 178–185.
HCIDHM-2011-WuHYNH #parametricity
Using Physiological Parameters to Evaluate Operator’s Workload in Manual Controlled Rendezvous and Docking (RVD) (BW, FH, ZY, JN, WH), pp. 426–435.
HCIDUXU-v1-2011-BjorndalRM #industrial #lessons learnt #requirements #specification
Lessons Learned from Using Personas and Scenarios for Requirements Specification of Next-Generation Industrial Robots (PB, MJR, SM), pp. 378–387.
HCIDUXU-v1-2011-BotellaGT #evaluation #heuristic #interactive
Using Interaction Patterns in Heuristic Evaluation (FB, JAG, RT), pp. 23–32.
HCIDUXU-v1-2011-KashiwaseKKFYJ #mobile
Comparisons on Kansei Factors of Attractiveness between Initial and Long Term Use of Mobile Phone (NK, KK, HK, SF, MY, HJ), pp. 593–601.
HCIDUXU-v1-2011-OhgiS #case study #enterprise #standard
ISO Standards and Enterprise Software: A Case Study Using SUMI and SUS in an International Sale (JO, JS), pp. 178–184.
HCIDUXU-v1-2011-RitterE #segmentation
An Extensible Tool for the Annotation of Videos Using Segmentation and Tracking (MR, ME), pp. 295–304.
HCIDUXU-v1-2011-YamagishiJKKF #mobile
Proposal for Indices to Assess Attractiveness on Initial Use of Mobile Phones (MY, HJ, KK, HK, SF), pp. 696–705.
HCIDUXU-v2-2011-ChaeKN #experience
Measuring Drivers’ Dynamic Seating Experience Using Pressure Mats (SC, GK, KN), pp. 368–375.
HCIDUXU-v2-2011-ChenL11a #2d #3d #design #evaluation #interface
Design and Evaluation of the Customized Product Color Combination Interfaces Using 3D Model and 2D Illustration Display (CYC, YJL), pp. 269–275.
HCIDUXU-v2-2011-KhashmanL
Measuring Cultural Markers in Arabic Government Websites Using Hofstede’s Cultural Dimensions (NK, AL), pp. 431–439.
HCIDUXU-v2-2011-RubegniML #interactive #scalability #social
Talking to Strangers: Using Large Public Displays to Facilitate Social Interaction (ER, NM, ML), pp. 195–204.
HCIDUXU-v2-2011-ShenPC
A Solution to Revisitation Using Organic Bookmark Management (STS, SDP, KMC), pp. 46–52.
HCIHCD-2011-BurkhardtNBSK #named #semantics
SemaZoom: Semantics Exploration by Using a Layer-Based Focus and Context Metaphor (DB, KN, MB, CS, AK), pp. 491–499.
HCIHCD-2011-Lin #communication #design #research #semantics
Research in the Use of Product Semantics to Communicate Product Design Information (CHL), pp. 556–565.
HCIHCI-DDA-2011-DittmarF #implementation #interactive #modelling
Intertwined Modeling and Implementation of Interactive Systems Using HOPS (AD, PF), pp. 194–203.
HCIHCI-DDA-2011-HessMT #interactive
Differentiating between Successful and Less Successful Products by Using MAInEEAC — A Model for Interaction Characterization (SH, AM, MT), pp. 238–247.
HCIHCI-DDA-2011-IglesiasT #component #representation #user interface
User Interface Representation Using Simple Components (JRI, PMTF), pp. 278–287.
HCIHCI-DDA-2011-KimJRWS #behaviour #simulation
Human Behavioral Simulation Using Affordance-Based Agent Model (NK, JJ, LR, RAW, YJS), pp. 368–377.
HCIHCI-DDA-2011-KogaT #recommendation #topic #twitter
Developing a User Recommendation Engine on Twitter Using Estimated Latent Topics (HK, TT), pp. 461–470.
HCIHCI-DDA-2011-LuoY #algorithm #clustering #framework #network #novel #parallel
A Novel Parallel Clustering Algorithm Based on Artificial Immune Network Using nVidia CUDA Framework (RL, QY), pp. 598–607.
HCIHCI-DDA-2011-ShiraiT #composition #interactive #music
A Proposal of an Interactive Music Composition System Using Gibbs Sampler (AS, TT), pp. 490–497.
HCIHCI-ITE-2011-AbushamB #graph #recognition
Face Recognition Using Local Graph Structure (LGS) (EEAA, HKB), pp. 169–175.
HCIHCI-ITE-2011-AngeliniCCKM #gesture #interactive #multi #scalability
Multi-user Pointing and Gesture Interaction for Large Screen Using Infrared Emitters and Accelerometers (LA, MC, SC, OAK, EM), pp. 185–193.
HCIHCI-ITE-2011-ChoiHK #3d #estimation #gesture #interface
3D-Position Estimation for Hand Gesture Interface Using a Single Camera (SHC, JHH, JHK), pp. 231–237.
HCIHCI-ITE-2011-JayaramanB #interface
Uni-model Human System Interface Using sEMG (SJ, VB), pp. 446–453.
HCIHCI-ITE-2011-KimiokaST #multi
Niboshi for Slate Devices: A Japanese Input Method Using Multi-touch for Slate Devices (GK, BS, JT), pp. 81–89.
HCIHCI-ITE-2011-LeeOL #recognition
Facial Expression Recognition Using AAMICPF (JSL, CMO, CWL), pp. 268–274.
HCIHCI-ITE-2011-MorieCB #case study
Report on a Preliminary Study Using Breath Control and a Virtual Jogging Scenario as Biofeedback for Resilience Training (JFM, EC, JGB), pp. 474–480.
HCIHCI-ITE-2011-NakaI #3d #communication #gesture #interface
Web-Based Nonverbal Communication Interface Using 3DAgents with Natural Gestures (TN, TI), pp. 565–574.
HCIHCI-ITE-2011-NebeKJF #interactive #multi
Exploiting New Interaction Techniques for Disaster Control Management Using Multitouch-, Tangible- and Pen-Based-Interaction (KN, FK, HJ, HF), pp. 100–109.
HCIHCI-ITE-2011-NebeMK #multi #requirements
An Investigation on Requirements for Co-located Group-Work Using Multitouch-, Pen-Based- and Tangible-Interaction (KN, TM, FK), pp. 90–99.
HCIHCI-ITE-2011-OkamotoYW #visual notation
A Configuration Method of Visual Media by Using Characters of Audiences for Embodied Sport Cheering (KO, MY, TW), pp. 585–592.
HCIHCI-MIIE-2011-ForutanpourR #collaboration #mobile #named
ProJest: Enabling Higher Levels of Collaboration Using Today’s Mobile Devices (BF, JR), pp. 48–58.
HCIHCI-MIIE-2011-GaoG #mobile #representation
The Effect of Time Orientation and Representation of Points of Interests on the Use of Mobile Tour Guide (FG, QG), pp. 59–68.
HCIHCI-MIIE-2011-KimHJHMJ #analysis #behaviour #video
Analysis of Low-Floor Bus Passengers’ Behavior Patterns Using Video Observation (JYK, HH, BSJ, BHH, YJM, YGJ), pp. 391–400.
HCIHCI-MIIE-2011-MinKH #recognition
Spectral Subtraction Based Emotion Recognition Using EEG (JHM, HOK, KSH), pp. 569–576.
HCIHCI-MIIE-2011-PlocherJC
Using Sound Patterns to Enhance Directional Sound for Emergency Route Guidance (TP, ZJJ, FYDC), pp. 329–337.
HCIHCI-MIIE-2011-RattanyuM #biology #recognition
Emotion Recognition Using Biological Signal in Intelligent Space (KR, MM), pp. 586–592.
HCIHCI-UA-2011-BellegoBBT #smarttech
Using a Smart Phone for Information Rendering in Computer-Aided Surgery (GLB, MB, IB, JT), pp. 202–209.
HCIHCI-UA-2011-ItoIN #bias #information management #parametricity
Method for Cultivating the “Inquiry-Mindset” Using the Information Access-Based Belief Bias Parameter (KI, YI, SN), pp. 48–57.
HCIHCI-UA-2011-KimCD #health
Using Pen-Based Computing in Technology for Health (HK, YSC, EYLD), pp. 192–201.
HCIHCI-UA-2011-LargeB #comparison #interface #retrieval #visualisation
A Comparison of Children’s and Adults’ Retrieval Performances and Affective Reactions When Using a Conventional Interface and an Information Visualization Interface (AL, JB), pp. 590–598.
HCIHCI-UA-2011-Levis #communication #towards #women
Working toward Women’s Economic Empowerment: Using Information and Communication Technology in Developing Areas to Market Traditional Crafts (MSL), pp. 266–273.
HCIHCI-UA-2011-LinHLYH #mining
Using Grounded Theory and Text Mining to Find Interesting Reading Materials for Slow EFL Learners (YCL, ClH, MHL, HFY, CFH), pp. 77–85.
HCIHCI-UA-2011-MaehigashiMTKMH #automation
Experimental Investigation of Misuse and Disuse in Using Automation System (AM, KM, HT, KK, JM, YH), pp. 384–393.
HCIHCI-UA-2011-Nesset #evaluation #visual notation
Following the Signs: Children’s Use of Visual Cues to Facilitate Website Evaluation (VN), pp. 599–606.
HCIHCI-UA-2011-OhkuraKKTESIW
Restoration Support System for a Historic Textile Market Using Virtual Environment (MO, MK, YK, ST, HE, AS, TI, YW), pp. 413–422.
HCIHCI-UA-2011-Wang11a #interactive #learning #network #student #tool support
Interactions between Human and Computer Networks: EFL College Students Using Computer Learning Tools in Remedial English Classes (ALW), pp. 107–112.
HCIHIMI-v1-2011-KinoshitaTN #visualisation
Kansei Stroll Map: Walking around a City Using Visualized Impressions of Streetscapes (YK, ST, TN), pp. 211–220.
HCIHIMI-v1-2011-KomatsuO #case study #evaluation #visual notation
Study on Evaluation of Kawaii Colors Using Visual Analog Scale (TK, MO), pp. 103–108.
HCIHIMI-v1-2011-KotaniHKA #information management
Characteristics of Information Transmission Rates Using Noncontact Tactile Display (KK, MH, NK, TA), pp. 450–453.
HCIHIMI-v1-2011-LeeKW #authentication #multi #smarttech
Cryptanalysis to a Remote User Authentication Scheme Using Smart Cards for Multi-server Environment (YL, JK, DW), pp. 321–329.
HCIHIMI-v1-2011-MitaWKM #case study #communication
A Study of Attention Control by Using Eye Communication with an Anthropomorphic Agent (TM, RW, NK, KM), pp. 603–611.
HCIHIMI-v1-2011-NakanishiY
Applicability of Touch Sense Controllers Using Warm and Cold Sensations (MN, SY), pp. 470–477.
HCIHIMI-v1-2011-TanakaYSN #comparison
Characteristics of Comfortable Sheet Switches on Control Panels of Electrical Appliances: Comparison Using Older and Younger Users (YT, YY, MS, MN), pp. 498–507.
HCIHIMI-v1-2011-TogawaKY #communication #detection #network #peer-to-peer #visualisation
Peer-to-Peer File Sharing Communication Detection Using Spherical SOM Visualization for Network Management (ST, KK, YY), pp. 259–267.
HCIHIMI-v2-2011-BagciMKKT #adaptation #recognition
Object and Scene Recognition Using Color Descriptors and Adaptive Color KLT (VHB, MGM, RK, RK, VT), pp. 355–363.
HCIHIMI-v2-2011-FagerstromG #empirical #facebook #network #social
Co-Creation of Value through Social Network Marketing: A Field Experiment Using a Facebook Campaign to Increase Conversion Rate (AF, GG), pp. 229–235.
HCIHIMI-v2-2011-FukadaKKH #evaluation #information management #user interface
Evaluation of Disaster Information Management System Using Tabletop User Interfaces (HF, KK, AK, NH), pp. 373–380.
HCIHIMI-v2-2011-SagaTKTM #analysis #comparison
Comparison Analysis for Text Data by Using FACT-Graph (RS, ST, KK, HT, KM), pp. 75–83.
HCIHIMI-v2-2011-TanumaSNN #artificial reality #design
Comfortable Design of Task-Related Information Displayed Using Optical See-Through Head-Mounted Display (KT, TS, MN, MN), pp. 419–429.
HCIIDGD-2011-BrandND #embedded #interactive #network #social
Using Embedded Technology Badges to Derive Social Networks, Patterns of Interaction and Space Utilization in a Corporate Headquarters (JLB, GN, HD), pp. 353–360.
HCIIDGD-2011-SalgadoSL #design
Using Metaphors to Explore Cultural Perspectives in Cross-Cultural Design (LCdCS, CSdS, CFL), pp. 94–103.
HCIOCSC-2011-Alducin-QuinteroCMGJ #design #modelling #process
Productivity Improvement by Using Social-Annotations about Design Intent in CAD Modelling Process (GAQ, MC, JMG, DAGZ, MDJ), pp. 153–161.
HCIOCSC-2011-BaekSH #research
Meet Researcher in the Real World Using the ConAR: Context-Aware Researcher (SWB, JS, TDH), pp. 12–19.
HCIOCSC-2011-YoshinoM #communication
GAZO GAZO KUN: Photo-Sharing System Using an Anthropomorphic Photo Frame for Communication Support (TY, TM), pp. 297–305.
CAiSECAiSE-2011-BiderJS #architecture #case study #communication #experience #process
Experiences of Using Different Communication Styles in Business Process Support Systems with the Shared Spaces Architecture (IB, PJ, RS), pp. 299–313.
CAiSECAiSE-2011-GuabtniNB #correlation #graph #interactive
Using Graph Aggregation for Service Interaction Message Correlation (AG, HRMN, BB), pp. 642–656.
CAiSECAiSE-2011-LemaitreH #database #evaluation #fault #framework #quality #taxonomy
Quality Evaluation and Improvement Framework for Database Schemas — Using Defect Taxonomies (JL, JLH), pp. 536–550.
CAiSECAiSE-2011-NobauerSMZ #elicitation #enterprise #named #requirements
S3C: Using Service Discovery to Support Requirements Elicitation in the ERP Domain (MN, NS, NAMM, KZ), pp. 18–32.
CAiSECAiSE-2011-RoySSWB #design #enterprise
Using SOA Governance Design Methodologies to Augment Enterprise Service Descriptions (MR, BS, DS, IW, BB), pp. 566–581.
CAiSECAiSE-2011-SchmidtJ #analysis #design #requirements #security
Connecting Security Requirements Analysis and Secure Design Using Patterns and UMLsec (HS, JJ), pp. 367–382.
CAiSECAiSE-2011-SpindlerLNGN
Using Synchronised Tag Clouds for Browsing Data Collections (AdS, SL, MN, MG, MCN), pp. 214–228.
EDOCEDOC-2011-AdriansyahDA #consistency #cost analysis
Conformance Checking Using Cost-Based Fitness Analysis (AA, BFvD, WMPvdA), pp. 55–64.
EDOCEDOC-2011-CurleyK #case study #framework #maturity
Using the IT Capability Maturity Framework to Improve IT Capability and Value Creation: An Intel IT Case Study (MC, JK), pp. 107–115.
EDOCEDOC-2011-HildebrandtMS #design #graph
Designing a Cross-Organizational Case Management System Using Dynamic Condition Response Graphs (TTH, RRM, TS), pp. 161–170.
EDOCEDOC-2011-Hull #flexibility #towards
Towards Flexible Service Interoperation Using Business Artifacts (RH), pp. 20–21.
ICEISICEIS-J-2011-Li11f #analysis #approach #case study #machine learning #type system
A Study on Noisy Typing Stream Analysis Using Machine Learning Approach (JL0), pp. 149–161.
ICEISICEIS-J-2011-NovaisCJM11a #approach #difference #evolution #interactive #on the #visualisation
On the Use of Software Visualization to Analyze Software Evolution: An Interactive Differential Approach (RLN, GdFC, PRMSJ, MGM), pp. 241–255.
ICEISICEIS-v1-2011-AsghariNAA #approach #enterprise #fuzzy #implementation #resource management #risk management
Risk Management in Enterprise Resource Planning Implementation using a Fuzzy Approach (HAA, MN, FA, FA), pp. 290–294.
ICEISICEIS-v1-2011-Kim #communication #network
CRL Distribution using an Alternative Communication Media for Vehicular Networks (HK), pp. 217–222.
ICEISICEIS-v1-2011-RamirezC #fault #process
Fault Diagnosis of Batch Processes Release using PCA Contribution Plots as Fault Signatures (AWR, JCL), pp. 223–228.
ICEISICEIS-v1-2011-VaneaP #metadata #multi #ontology #semantics
Semantically Enhancing Multimedia Data Warehouses — Using Ontologies as Part of the Metadata (AV, RP), pp. 163–168.
ICEISICEIS-v2-2011-KisilevichKBTR #open source #tool support
Developing a Price Management Decision Support System for Hotel Brokers using Free and Open Source Tools (SK, DAK, RB, MT, LR), pp. 147–156.
ICEISICEIS-v2-2011-LiOAK #fault #identification #modelling #network
Patterns Identification for Hitting Adjacent Key Errors Correction using Neural Network Models (JL, KO, MSA, HBK), pp. 5–12.
ICEISICEIS-v2-2011-TarsauliyaTS #network #search-based
Financial Time Series Forecast using Simulated Annealing and Threshold Acceptance Genetic BPA Neural Network (AT, RT, AS), pp. 172–177.
ICEISICEIS-v2-2011-TianZX #analysis #case study #network #social
Study on the Knowledge -Sharing Network of Innovation Teams using Social Network Analysis (ZT, ZZ, DX), pp. 438–443.
ICEISICEIS-v2-2011-ZhuXM #assessment #network #risk management
Operational Hazard Risk Assessment using Bayesian Networks (ZJZ, YX, EM), pp. 135–139.
ICEISICEIS-v3-2011-BhuiyanRH #case study #modelling #multi
Supporting Business Modeling using Multiple Notations — A Case Study (MB, SR, KH), pp. 301–306.
ICEISICEIS-v3-2011-NovaisCJM #approach #difference #evolution #interactive #on the #visualisation
On the Use of Software Visualization to Analyze Software Evolution — An Interactive Differential Approach (RLN, GdFC, PRMSJ, MGdMN), pp. 15–24.
ICEISICEIS-v3-2011-PapatheocharousTYA #agile #cost analysis #development #diagrams #estimation #modelling
Cost Modeling and Estimation in Agile Software Development Environments using Influence Diagrams (EP, DT, PSY, ASA), pp. 117–127.
ICEISICEIS-v3-2011-WangWWL #modelling #workflow
Formally Modeling and Analyzing Data-centric Workflow using WFCP-net and ASK-CTL (ZW, JW, LW, GL), pp. 139–144.
ICEISICEIS-v4-2011-Ganesan #enterprise #framework #modelling #process
Composite Enterprise Process Modeling (CEProM) Framework — Setting up a Process Modeling Center of Excellence using CEProM Framework (EG), pp. 378–383.
ICEISICEIS-v4-2011-LuCGD #algorithm #multi #network #optimisation #quality
Quality of Service Optimization of Wireless Sensor Networks using a Multi-objective Immune Co-evolutionary Algorithm (XL, ZRC, LG, YD), pp. 160–164.
ICEISICEIS-v4-2011-Naderipour #ad hoc #industrial #mining #process
Mining of Ad-hoc Business Processes using Microsoft Sharepoint, Nitro & Prom 6.0 — An Industrial Practice (FN), pp. 413–418.
ICEISICEIS-v4-2011-OuazzaneAKL #design #framework #web
An e-Business Framework Design using Enhanced Web 2.0 Technology (KO, MSA, HBK, JL), pp. 97–102.
CIKMCIKM-2011-Ando #encoding #relational
Latent feature encoding using dyadic and relational data (SA), pp. 2201–2204.
CIKMCIKM-2011-BanerjeeC #distributed #feature model #privacy
Privacy preserving feature selection for distributed data using virtual dimension (MB, SC), pp. 2281–2284.
CIKMCIKM-2011-BicerTN #keyword #modelling #ranking
Ranking support for keyword search on structured data using relevance models (VB, TT, RN), pp. 1669–1678.
CIKMCIKM-2011-BingLW #query #social #topic
Using query log and social tagging to refine queries based on latent topics (LB, WL, TLW), pp. 583–592.
CIKMCIKM-2011-BykauMRV #evolution #query
Supporting queries spanning across phases of evolving artifacts using Steiner forests (SB, JM, FR, YV), pp. 1649–1658.
CIKMCIKM-2011-DangXC #aspect-oriented #clustering #query
Inferring query aspects from reformulations using clustering (VD, XX, WBC), pp. 2117–2120.
CIKMCIKM-2011-GangulyLMJ #feedback #pseudo #query #reduction
Patent query reduction using pseudo relevance feedback (DG, JL, WM, GJFJ), pp. 1953–1956.
CIKMCIKM-2011-GaoL #adaptation #analysis #classification #probability #sentiment
A cross-domain adaptation method for sentiment classification using probabilistic latent analysis (SG, HL), pp. 1047–1052.
CIKMCIKM-2011-Garcia-Alvarado0O #named #ontology #performance
ONTOCUBE: efficient ontology extraction using OLAP cubes (CGA, ZC, CO), pp. 2429–2432.
CIKMCIKM-2011-HeerschopGHFKJ #analysis
Polarity analysis of texts using discourse structure (BH, FG, AH, FF, UK, FdJ), pp. 1061–1070.
CIKMCIKM-2011-HeRSOQ #case study #generative
Generating links to background knowledge: a case study using narrative radiology reports (JH, MdR, MS, RCvO, YQ), pp. 1867–1876.
CIKMCIKM-2011-HuiHLW #statistics
Relevance weighting using within-document term statistics (KH, BH, TL, BW), pp. 99–104.
CIKMCIKM-2011-HuTL #microblog #semantics
Enhancing accessibility of microblogging messages using semantic knowledge (XH, LT, HL), pp. 2465–2468.
CIKMCIKM-2011-JacobDG #classification #corpus #multi #social
Classification and annotation in social corpora using multiple relations (YJ, LD, PG), pp. 1215–1220.
CIKMCIKM-2011-KasiviswanathanMBS #detection #learning #taxonomy #topic
Emerging topic detection using dictionary learning (SPK, PM, AB, VS), pp. 745–754.
CIKMCIKM-2011-KongDH #matrix #robust
Robust nonnegative matrix factorization using L21-norm (DK, CHQD, HH), pp. 673–682.
CIKMCIKM-2011-KustarevULGSS #metric
Smoothing NDCG metrics using tied scores (AK, YU, YL, EG, IS, PS), pp. 2053–2056.
CIKMCIKM-2011-LeeRK #algorithm #recognition
Named entity recognition using a modified Pegasos algorithm (CL, PMR, HK), pp. 2337–2340.
CIKMCIKM-2011-LinTC #classification #independence #sentiment #word
Language-independent sentiment classification using three common words (ZL, ST, XC), pp. 1041–1046.
CIKMCIKM-2011-LiuWZ #clustering #feature model
Feature selection using hierarchical feature clustering (HL, XW, SZ), pp. 979–984.
CIKMCIKM-2011-MagdyJ #performance
An efficient method for using machine translation technologies in cross-language patent search (WM, GJFJ), pp. 1925–1928.
CIKMCIKM-2011-MaLL
Selecting related terms in query-logs using two-stage SimRank (YM, HL, YL), pp. 1969–1972.
CIKMCIKM-2011-NiuLX #graph #named #ranking
DIGRank: using global degree to facilitate ranking in an incomplete graph (XN, LL, KX), pp. 2297–2300.
CIKMCIKM-2011-OzertemVL #set
Suggestion set utility maximization using session logs (UO, EV, LL), pp. 105–114.
CIKMCIKM-2011-Pasca #query #web #what
Asking what no one has asked before: using phrase similarities to generate synthetic web search queries (MP), pp. 1347–1352.
CIKMCIKM-2011-PeelWZ #string
Collection-based compression using discovered long matching strings (AP, AW, JZ), pp. 2361–2364.
CIKMCIKM-2011-PilzP #distance
From names to entities using thematic context distance (AP, GP), pp. 857–866.
CIKMCIKM-2011-QuattroneCMFU #effectiveness #folksonomy #retrieval #similarity
Effective retrieval of resources in folksonomies using a new tag similarity measure (GQ, LC, PDM, EF, DU), pp. 545–550.
CIKMCIKM-2011-SoodL #detection #probability
Probabilistic near-duplicate detection using simhash (SS, DL), pp. 1117–1126.
CIKMCIKM-2011-VinzamuriK #classification #convergence #design
Designing an ensemble classifier over subspace classifiers using iterative convergence routine (BV, KK), pp. 693–698.
CIKMCIKM-2011-VirgilioM #calculus #data analysis
RFID data analysis using tensor calculus for supply chain management (RDV, FM), pp. 1743–1748.
CIKMCIKM-2011-WangZLBW #classification #multi #random
Using random walks for multi-label classification (CW, WZ, ZL, YB, JW), pp. 2197–2200.
CIKMCIKM-2011-WeichselbraunGS #game studies #sentiment
Using games with a purpose and bootstrapping to create domain-specific sentiment lexicons (AW, SG, AS), pp. 1053–1060.
CIKMCIKM-2011-WesselOVBK #3d #modelling #performance #retrieval
Efficient retrieval of 3D building models using embeddings of attributed subgraphs (RW, SO, RV, IB, RK), pp. 2097–2100.
CIKMCIKM-2011-WuQD #owl #pipes and filters
Finding all justifications of OWL entailments using TMS and MapReduce (GW, GQ, JD), pp. 1425–1434.
ECIRECIR-2011-AktolgaAS #ranking
Passage Reranking for Question Answering Using Syntactic Structures and Answer Types (EA, JA, DAS), pp. 617–628.
ECIRECIR-2011-AlbakourKNKSFR #evaluation #named #query
AutoEval: An Evaluation Methodology for Evaluating Query Suggestions Using Query Logs (MDA, UK, NN, YK, DS, MF, ANDR), pp. 605–610.
ECIRECIR-2011-AlonsoB #crowdsourcing #design #implementation
Design and Implementation of Relevance Assessments Using Crowdsourcing (OA, RABY), pp. 153–164.
ECIRECIR-2011-BadrinathVM #query #summary
Improving Query Focused Summarization Using Look-Ahead Strategy (RB, SV, CEVM), pp. 641–652.
ECIRECIR-2011-BuccioMS #framework #predict #towards
Towards Predicting Relevance Using a Quantum-Like Framework (EDB, MM, DS), pp. 755–758.
ECIRECIR-2011-GeraniKCC #retrieval
Personal Blog Retrieval Using Opinion Features (SG, MK, MJC, FC), pp. 747–750.
ECIRECIR-2011-KinsellaPB #classification #metadata #social #social media #topic
Topic Classification in Social Media Using Metadata from Hyperlinked Objects (SK, AP, JGB), pp. 201–206.
ECIRECIR-2011-OhCM #classification #modelling #scalability #taxonomy
Text Classification for a Large-Scale Taxonomy Using Dynamically Mixed Local and Global Models for a Node (HSO, YC, SHM), pp. 7–18.
ECIRECIR-2011-PhelanMBS #recommendation #twitter
Terms of a Feather: Content-Based News Recommendation and Discovery Using Twitter (OP, KM, MB, BS), pp. 448–459.
ECIRECIR-2011-ZhaoJWHLYL #modelling #topic #twitter
Comparing Twitter and Traditional Media Using Topic Models (WXZ, JJ, JW, JH, EPL, HY, XL), pp. 338–349.
ICMLICML-2011-CrammerG #adaptation #classification #feedback #multi
Multiclass Classification with Bandit Feedback using Adaptive Regularization (KC, CG), pp. 273–280.
ICMLICML-2011-HockingVBJ #algorithm #clustering #named
Clusterpath: an Algorithm for Clustering using Convex Fusion Penalties (TH, JPV, FRB, AJ), pp. 745–752.
ICMLICML-2011-HuWC #coordination #kernel #learning #named #parametricity #scalability
BCDNPKL: Scalable Non-Parametric Kernel Learning Using Block Coordinate Descent (EH, BW, SC), pp. 209–216.
ICMLICML-2011-JawanpuriaNR #kernel #learning #performance
Efficient Rule Ensemble Learning using Hierarchical Kernels (PJ, JSN, GR), pp. 161–168.
ICMLICML-2011-JegelkaB11a #approximate #bound
Approximation Bounds for Inference using Cooperative Cuts (SJ, JAB), pp. 577–584.
ICMLICML-2011-JetchevT #feedback #retrieval
Task Space Retrieval Using Inverse Feedback Control (NJ, MT), pp. 449–456.
ICMLICML-2011-KamisettyXL #approximate #correlation
Approximating Correlated Equilibria using Relaxations on the Marginal Polytope (HK, EPX, CJL), pp. 1153–1160.
ICMLICML-2011-LiuI #bound #difference
Bounding the Partition Function using Holder’s Inequality (QL, ATI), pp. 849–856.
ICMLICML-2011-Potetz #linear #problem
Estimating the Bayes Point Using Linear Knapsack Problems (BP), pp. 257–264.
ICMLICML-2011-SuSM #classification #multi #naive bayes #scalability
Large Scale Text Classification using Semisupervised Multinomial Naive Bayes (JS, JSS, SM), pp. 97–104.
ICMLICML-2011-YangR #learning #on the #visual notation
On the Use of Variational Inference for Learning Discrete Graphical Model (EY, PDR), pp. 1009–1016.
KDDKDD-2011-ApplegateDKU #clustering #distance #multi
Unsupervised clustering of multidimensional distributions using earth mover distance (DA, TD, SK, SU), pp. 636–644.
KDDKDD-2011-DalviKMR #nearest neighbour
Sampling hidden objects using nearest-neighbor oracles (NND, RK, AM, VR), pp. 1325–1333.
KDDKDD-2011-Dhurandhar #predict
Improving predictions using aggregate information (AD), pp. 1118–1126.
KDDKDD-2011-EneIM #clustering #performance #pipes and filters
Fast clustering using MapReduce (AE, SI, BM), pp. 681–689.
KDDKDD-2011-HendersonGLAETF #graph #mining #recursion
It’s who you know: graph mining using recursive structural features (KH, BG, LL, LA, TER, HT, CF), pp. 663–671.
KDDKDD-2011-Inchiosa #data mining #mining #scalability
Accelerating large-scale data mining using in-database analytics (MEI), p. 778.
KDDKDD-2011-LeeOYK #privacy #semantics
Protecting location privacy using location semantics (BL, JO, HY, JK), pp. 1289–1297.
KDDKDD-2011-McCloskeyKIKB #behaviour #data mining #mining
From market baskets to mole rats: using data mining techniques to analyze RFID data describing laboratory animal behavior (DPM, MEK, SPI, IK, SBM), pp. 301–306.
KDDKDD-2011-MenonCGAK #collaboration #predict
Response prediction using collaborative filtering with hierarchies and side-information (AKM, KPC, SG, DA, NK), pp. 141–149.
KDDKDD-2011-MesterharmP #algorithm #learning #online
Active learning using on-line algorithms (CM, MJP), pp. 850–858.
KDDKDD-2011-PereiraB #classification #functional
Classification of functional magnetic resonance imaging data using informative pattern features (FP, MB), pp. 940–946.
KDDKDD-2011-SatpalBSRS #information management #logic #markov #network #web
Web information extraction using markov logic networks (SS, SB, SS, RR, PS), pp. 1406–1414.
KDDKDD-2011-SimonLJV #comprehension #image
Understanding atrophy trajectories in alzheimer’s disease using association rules on MRI images (GJS, PWL, CRJJ, PV), pp. 369–376.
KDIRKDIR-2011-ArmanoGV #concept #semantics
Semantic Enrichment of Contextual Advertising by using Concepts (GA, AG, EV), pp. 232–237.
KDIRKDIR-2011-BallesterosFDHG #analysis #dependence
Inferring the Scope of Speculation using Dependency Analysis (MB, VF, AD, JH, PG), pp. 256–261.
KDIRKDIR-2011-BressoBSMKSND #mining #reduction
Use of Domain Knowledge for Dimension Reduction — Application to Mining of Drug Side Effects (EB, SB, MST, GM, ASK, MS, AN, MDD), pp. 271–276.
KDIRKDIR-2011-GuoK #ontology #research
Discovering Relationship Associations from the Literature Related to Research Projects in Sustainability Science using Ontology and Inference (WG, SBK), pp. 390–393.
KDIRKDIR-2011-LachetarB #algorithm #categorisation #metadata
Application of an Ant Colony Algorithm — For Song Categorising using Metadata (NL, HB), pp. 379–384.
KDIRKDIR-2011-LiVM #graph #learning #relational #visual notation
Unsupervised Handwritten Graphical Symbol Learning — Using Minimum Description Length Principle on Relational Graph (JL, CVG, HM), pp. 172–178.
KDIRKDIR-2011-MartelotH #algorithm #community #detection #multi #optimisation
Multi-scale Community Detection using Stability as Optimisation Criterion in a Greedy Algorithm (ELM, CH), pp. 216–225.
KDIRKDIR-2011-MauleKR #approach #automation
Automated Approach for Whole Brain Infarction Core Delineation — Using Non-contrast and Computed Tomography Angiography (PM, JK, VR), pp. 433–437.
KDIRKDIR-2011-OmerBG #algorithm #mining #motivation
A New Frequent Similar Tree Algorithm Motivated by Dom Mining — Using RTDM and its New Variant — SiSTeR (OB, RB, SG), pp. 238–243.
KDIRKDIR-2011-PrachuabsupakijS #classification #multi #set
Multi-class Data Classification for Imbalanced Data Set using Combined Sampling Approaches (WP, NS), pp. 166–171.
KDIRKDIR-2011-RavulaCL #dynamic analysis
Dynamic Analysis of Malware using Decision Trees (RRR, CCC, KJL), pp. 74–83.
KDIRKDIR-2011-ReuterC #identification #learning #similarity
Learning Similarity Functions for Event Identification using Support Vector Machines (TR, PC), pp. 208–215.
KDIRKDIR-2011-RomeiT #process #programming #xquery
Programming the KDD Process using XQuery (AR, FT), pp. 131–139.
KEODKEOD-2011-GerberGM #ambiguity #consistency #development #ontology #standard
Using Formal Ontologies for the Development of Consistent and Unambiguous Financial Accounting Standards (MCG, AG, AvdM), pp. 419–424.
KEODKEOD-2011-KohnMSL #complexity #ontology
Use of Existing Ontologies as Input for Structural Complexity Management — Reducing the Effort for Analysing and Improving Engineering Systems (AK, MM, HXS, UL), pp. 195–201.
KEODKEOD-2011-MendesFS
Comparing Services using DEMO (CM, JF, MMdS), pp. 528–537.
KEODKEOD-2011-OkumuraH #concept
A Refining Method of Obtained Attributes to Characterize Undefined Concepts using Search Engine (NO, YH), pp. 493–497.
KEODKEOD-2011-Rios-AlvaradoLS #taxonomy #web
Structuring Taxonomies by using Linguistic Patterns and WordNet on Web Search (ABRA, ILA, VSS), pp. 273–278.
KEODKEOD-2011-SuzukiF #classification #documentation #multi
Multi-labeled Patent Document Classification using Technical Term Thesaurus (YS, FF), pp. 425–428.
KMISKMIS-2011-AlaviJY #performance
An Investigation of the Use of KMS on Clinical Performance (MA, SLJ, YY), pp. 236–240.
KMISKMIS-2011-Chebel-MorelloHZ #adaptation #modelling #reasoning
Adaptation based on Knowledge Models for Diagnostic Systems using Case-base Reasoning (BCM, MKH, NZ), pp. 223–229.
KMISKMIS-2011-CostantinoDFS #analysis #evaluation #nondeterminism
A Model using Data Envelopment Analysis for the Cross Evaluation of Suppliers under Uncertainty (NC, MD, MF, FS), pp. 152–157.
KMISKMIS-2011-FortierS #modelling #process #requirements
Defining Information Requirements — Using Business Process Modeling for Incident Response for Chemical Facilities (SCF, GLS), pp. 411–417.
KMISKMIS-2011-Grim-YefsahRT11a #network #process #robust
Using Information of an Informal Network to Evaluate Business Process Robustness (MGY, CRS, VTG), pp. 430–435.
KMISKMIS-2011-LunesuPC11a #approach #knowledge base #multi #standard
Using a Standards-based Approach for a Multimedia Knowledge-base (MIL, FEP, GC), pp. 87–95.
KMISKMIS-2011-Nishioka #process
Quotation Process Management of One-of-a-kind Production using PSLX Information Model (YN), pp. 167–172.
KMISKMIS-2011-SchmidlK #information management
Using Task Histories to Support Person-to-person Knowledge Exchange — Extracting and using Contextual Overlap and Levels of Expertise to Connect Knowledge Workers (JS, HK), pp. 77–86.
MLDMMLDM-2011-AlshukriCZ #bound #detection #incremental #random
Incremental Web-Site Boundary Detection Using Random Walks (AA, FC, MZ), pp. 414–427.
MLDMMLDM-2011-CataltepeSBE #classification
Collective Classification Using Heterogeneous Classifiers (, AS, KB, AE), pp. 155–169.
MLDMMLDM-2011-ChenER #mining #parametricity
Mining Spatial Trajectories Using Non-parametric Density Functions (CSC, CFE, NJR), pp. 496–510.
MLDMMLDM-2011-Garcia-ConstantinoCNRST #classification #generative #summary
An Investigation Concerning the Generation of Text Summarisation Classifiers Using Secondary Data (MGC, FC, PJN, AR, CS, AT), pp. 387–398.
MLDMMLDM-2011-GunesCO #algorithm #classification #named #novel #relational #search-based
GA-TVRC: A Novel Relational Time Varying Classifier to Extract Temporal Information Using Genetic Algorithms (IG, , SGÖ), pp. 568–583.
MLDMMLDM-2011-Kessl #mining #parallel
Static Load Balancing of Parallel Mining of Frequent Itemsets Using Reservoir Sampling (RK), pp. 553–567.
MLDMMLDM-2011-PerezR #array #detection
Detection of Phenotypes in Microarray Data Using Force- Directed Placement Transformss (DVP, KAR), pp. 320–334.
MLDMMLDM-2011-PiatkowskaMNP #analysis #image #multi #semantics
A Decision Support System Based on the Semantic Analysis of Melanoma Images Using Multi-elitist PSO and SVM (WP, JM, LN, KP), pp. 362–374.
RecSysRecSys-2011-DalyG #effectiveness #recommendation #social
Effective event discovery: using location and social information for scoping event recommendations (EMD, WG), pp. 277–280.
RecSysRecSys-2011-Faridani #analysis #canonical #correlation #recommendation #sentiment
Using canonical correlation analysis for generalized sentiment analysis, product recommendation and search (SF), pp. 355–358.
RecSysRecSys-2011-KatzOSRS #collaboration #wiki
Using Wikipedia to boost collaborative filtering techniques (GK, NO, BS, LR, GS), pp. 285–288.
RecSysRecSys-2011-SekoYMM #behaviour #recommendation #representation
Group recommendation using feature space representing behavioral tendency and power balance among members (SS, TY, MM, SyM), pp. 101–108.
SEKESEKE-2011-AlmeidaMA #analysis #execution #process
Analysis of the continuity of software processes execution in software organizations assessed in MPS.BR using Grounded Theory (CDAdA, TCM, AA), pp. 792–797.
SEKESEKE-2011-AndradeDBW #approach #communication #documentation #retrieval
An approach for retrieval and knowledge communication using medical documents (RA, MARD, FCB, AvW), pp. 169–174.
SEKESEKE-2011-AntunesCCG #development #information management
Using Contextual Information to Improve Awareness in Software Development(S) (BA, JC, PC, PG), pp. 349–352.
SEKESEKE-2011-BhattacharyaCSK #enterprise
Dynamic Service Choreography using Context Aware Enterprise Service Bus (SB, JC, SS, AK), pp. 319–324.
SEKESEKE-2011-BragaD #detection #information management #tool support
Fraud Detection in Selection Exams Using Knowledge Engineering Tools (MdMB, MARD), pp. 163–168.
SEKESEKE-2011-El-KharboutlyG #analysis #architecture #concurrent #probability #reliability
Architecture-based Reliability Analysis of Concurrent Software Applications using Stochastic Reward Nets (REK, SSG), pp. 635–639.
SEKESEKE-2011-FronzaSSV #predict
Failure Prediction based on Log Files Using the Cox Proportional Hazard Model (IF, AS, GS, JV), pp. 456–461.
SEKESEKE-2011-GregoriadesLP11a #calculus #risk management
Project Risk Management Using Event Calculus(S) (AG, VPL, PP), pp. 335–338.
SEKESEKE-2011-Kaiser #concurrent #debugging #higher-order
Constructing Subtle Concurrency Bugs Using Synchronization-Centric Second-Order Mutation Operators (LWGK), pp. 244–249.
SEKESEKE-2011-MachadoAF #evolution #requirements #semantics
Using Semantic Annotations for Supporting Requirements Evolution (BNM, LdOA, RdAF), pp. 185–190.
SEKESEKE-2011-SanfordWX #analysis #modelling #security
Security Analysis of FileZilla Server Using Threat Models (MS, DW, DX), pp. 678–682.
SEKESEKE-2011-ScatalonGC #approach #delivery #ontology
Packaging Controlled Experiments Using an Evolutionary Approach Based on Ontology(S) (LPS, REG, RCMC), pp. 408–413.
SEKESEKE-2011-SouzaSMCSZ #concurrent #quality #reachability #testing
Using Coverage and Reachability Testing to Improve Concurrent Program Testing Quality (SdRSdS, PSLdS, MCCM, MSC, AdSS, EZ), pp. 207–212.
SEKESEKE-2011-SunHGZWY #detection #novel #petri net
A Novel Method for Formally Detecting RFID Event Using Petri Nets (JS, YH, XG, SZ, LW, CYY), pp. 122–125.
SEKESEKE-2011-SunWH #architecture #design #modelling #ontology
Design Software Architecture Models using Ontology (JS, HHW, TH), pp. 191–196.
SEKESEKE-2011-VilkomirKT #algorithm #case study #interface #testing
Interface Testing Using a Subgraph Splitting Algorithm: A Case Study (SV, AAK, NT), pp. 219–224.
SEKESEKE-2011-WagnerFF #process #security
Using Security Patterns to Tailor Software Process (RW, LMF, ABF), pp. 672–677.
SEKESEKE-2011-WangKN #empirical #metric
An Empirical Study of Software Metrics Selection Using Support Vector Machine (HW, TMK, AN), pp. 83–88.
SIGIRSIGIR-2011-AgeevGLA #game studies #interactive #modelling #web
Find it if you can: a game for modeling different types of web search success using interaction data (MA, QG, DL, EA), pp. 345–354.
SIGIRSIGIR-2011-BennettRWY #metadata #personalisation #web
Inferring and using location metadata to personalize web search (PNB, FR, RWW, EY), pp. 135–144.
SIGIRSIGIR-2011-BlancoHHMPTT #crowdsourcing #evaluation #reliability
Repeatable and reliable search system evaluation using crowdsourcing (RB, HH, DMH, PM, JP, HST, DTT), pp. 923–932.
SIGIRSIGIR-2011-BouadjenekHBD #personalisation #query #social
Personalized social query expansion using social bookmarking systems (MRB, HH, MB, JD), pp. 1113–1114.
SIGIRSIGIR-2011-Campos #analysis #query #web
Using k-Top retrieved web snippets to date temporalimplicit queries based on web content analysis (RNTC), pp. 1325–1326.
SIGIRSIGIR-2011-CumminsJO #performance #predict #query #standard
Improved query performance prediction using standard deviation (RC, JMJ, CO), pp. 1089–1090.
SIGIRSIGIR-2011-DingS #documentation #performance #retrieval
Faster top-k document retrieval using block-max indexes (SD, TS), pp. 993–1002.
SIGIRSIGIR-2011-InagakiBCM #mobile #web
Enhancing mobile search using web search log data (YI, JB, YC, MM), pp. 1201–1202.
SIGIRSIGIR-2011-JethavaCBBD #identification #multi #scalability
Scalable multi-dimensional user intent identification using tree structured distributions (VJ, LCB, RABY, CB, DPD), pp. 395–404.
SIGIRSIGIR-2011-LappasPS #mining #network #social
Mining tags using social endorsement networks (TL, KP, TS), pp. 195–204.
SIGIRSIGIR-2011-LeeHWHS #dataset #graph #image #learning #multi #pipes and filters #scalability
Multi-layer graph-based semi-supervised learning for large-scale image datasets using mapreduce (WYL, LCH, GLW, WHH, YFS), pp. 1121–1122.
SIGIRSIGIR-2011-Li11a #information retrieval
Domain-specific information retrieval using rcommenders (WL), pp. 1327–1328.
SIGIRSIGIR-2011-LiDS #concept #recommendation #semantics
Semantic tag recommendation using concept model (CL, AD, AS), pp. 1159–1160.
SIGIRSIGIR-2011-LiHZW #information retrieval #query #segmentation
Unsupervised query segmentation using clickthrough for information retrieval (YL, BJPH, CZ, KW), pp. 285–294.
SIGIRSIGIR-2011-LimsopathamSMO
Disambiguating biomedical acronyms using EMIM (NL, RLTS, CM, IO), pp. 1213–1214.
SIGIRSIGIR-2011-LiZMWCGX #comparative #comparison
Product comparison using comparative relations (SL, ZJZ, ZM, MW, TSC, JG, WX), pp. 1151–1152.
SIGIRSIGIR-2011-MoshfeghiPJ #collaboration #semantics
Handling data sparsity in collaborative filtering using emotion and semantic based features (YM, BP, JMJ), pp. 625–634.
SIGIRSIGIR-2011-OchiOO #predict #rating #word
Rating prediction using feature words extracted from customer reviews (MO, MO, RO), pp. 1205–1206.
SIGIRSIGIR-2011-PaikPP #algorithm #novel #statistics
A novel corpus-based stemming algorithm using co-occurrence statistics (JHP, DP, SKP), pp. 863–872.
SIGIRSIGIR-2011-SakaiS
Evaluating diversified search results using per-intent graded relevance (TS, RS), pp. 1043–1052.
SIGIRSIGIR-2011-Wang #comprehension #information management #recommendation
Understanding and using contextual information in recommender systems (LW), pp. 1329–1330.
SIGIRSIGIR-2011-WangHND #classification #information management #matrix #web
Cross-language web page classification via dual knowledge transfer using nonnegative matrix tri-factorization (HW, HH, FN, CHQD), pp. 933–942.
SIGIRSIGIR-2011-WuYLLYX #learning #rank
Learning to rank using query-level regression (JW, ZY, YL, HL, ZY, KX), pp. 1091–1092.
SIGIRSIGIR-2011-YangLSZZ #collaboration #learning #recommendation
Collaborative competitive filtering: learning recommender using context of user choice (SHY, BL, AJS, HZ, ZZ), pp. 295–304.
SIGIRSIGIR-2011-ZhaoHH #information retrieval #named #probability
CRTER: using cross terms to enhance probabilistic information retrieval (JZ, JXH, BH), pp. 155–164.
SIGIRSIGIR-2011-ZhouHH #ad hoc #estimation #probability
Enhancing ad-hoc relevance weighting using probability density estimation (XZ, JXH, BH), pp. 175–184.
BXBX-2011-Boronat #consistency #detection #maude #modelling #nondeterminism #specification
Inconsistency detection and resolution in heterogenous model-based specifications using Maude (AB), p. 53.
BXBX-2011-Cleve #co-evolution #source code
Co-evolving schemas and programs using coupled transformations (AC), p. 54.
ECMFAECMFA-2011-ColomboKL #analysis #design #generative #modelling #problem #requirements
Generating Early Design Models from Requirements Analysis Artifacts Using Problem Frames and SysML (PC, FK, LL), pp. 97–114.
MODELSMoDELS-2011-AliBAW #algorithm #aspect-oriented #industrial #modelling #robust #testing #uml
An Industrial Application of Robustness Testing Using Aspect-Oriented Modeling, UML/MARTE, and Search Algorithms (SA, LCB, AA, SW), pp. 108–122.
MODELSMoDELS-2011-Chimiak-Opoka #framework #metric #modelling #ocl #uml
Measuring UML Models Using Metrics Defined in OCL within the SQUAM Framework (JCO), pp. 47–61.
MODELSMoDELS-2011-IzukuraYOSKX #approach #development #modelling
Applying a Model-Based Approach to IT Systems Development Using SysML Extension (SI, KY, TO, HS, DK, JX), pp. 563–577.
MODELSMoDELS-2011-MaozRR11a #alloy #analysis #diagrams #named #revisited
CD2Alloy: Class Diagrams Analysis Using Alloy Revisited (SM, JOR, BR), pp. 592–607.
MODELSMoDELS-2011-MoffettBD #consistency #model checking #protocol #uml #verification
Verifying UML-RT Protocol Conformance Using Model Checking (YM, AB, JD), pp. 410–424.
MODELSMoDELS-2011-ZhangK #architecture #collaboration #industrial #modelling
Using Delta Model for Collaborative Work of Industrial Large-Scaled E/E Architecture Models (RZ, AK), pp. 714–728.
PLEASEPLEASE-2011-Kulkarni #challenge #delivery
Use of SPLE to deliver custom solutions at product cost: challenges and a way forward (VK), pp. 1–5.
PLEASEPLEASE-2011-SunCGW #approach #feature model
Supporting feature model configuration using a demonstration-based approach (YS, HC, JGG, JW), pp. 55–59.
SPLCSPLC-2011-GhezziS #approach #model checking #non-functional #parametricity #performance #product line #towards #verification
Verifying Non-functional Properties of Software Product Lines: Towards an Efficient Approach Using Parametric Model Checking (CG, AMS), pp. 170–174.
SPLCSPLC-2011-VolterV #domain-specific language #product line
Product Line Engineering Using Domain-Specific Languages (MV, EV), pp. 70–79.
ECOOPECOOP-2011-Duala-EkokoR #api #recommendation
Using Structure-Based Recommendations to Facilitate Discoverability in APIs (EDE, MPR), pp. 79–104.
ECOOPECOOP-2011-RichardsHBV #javascript #scalability
The Eval That Men Do — A Large-Scale Study of the Use of Eval in JavaScript Applications (GR, CH, BB, JV), pp. 52–78.
OOPSLAOOPSLA-2011-Golan-GuetaBARSY #automation
Automatic fine-grain locking using shape properties (GGG, NGB, AA, GR, MS, EY), pp. 225–242.
OOPSLAOOPSLA-2011-KeLZBJD #dependence #parallel #programming
Safe parallel programming using dynamic dependence hints (CK, LL, CZ, TB, BJ, CD), pp. 243–258.
OOPSLAOOPSLA-2011-WeeratungeZJ
Accentuating the positive: atomicity inference and enforcement using correct executions (DW, XZ, SJ), pp. 19–34.
PLATEAUPLATEAU-2011-BarisicAGB #case study #domain-specific language #quality
Quality in use of domain-specific languages: a case study (AB, VA, MG, BB), pp. 65–72.
PLATEAUPLATEAU-2011-ShonleGL #design
Using metaphors from natural discussion to improve the design of arcum (MS, WGG, SL), pp. 39–44.
PLATEAUPLATEAU-2011-StefikSSS #comparison #empirical #perl #programming language
An empirical comparison of the accuracy rates of novices using the quorum, perl, and randomo programming languages (AS, SS, MS, KS), pp. 3–8.
AdaEuropeAdaEurope-2011-ChilAOP #ada #interface
Using Robotics as a Motivational Tool: An Ada Interface to a Pioneer Robot (RC, DA, FJO, JAP), pp. 147–159.
AdaEuropeAdaEurope-2011-OLeary #reliability #web #web service
Assuring Software Reliability While Using Web Services and Commercial Products (JO), pp. 1–16.
AdaEuropeAdaEurope-2011-SaezTC #ada #framework #multi #platform #realtime
A Real-Time Framework for Multiprocessor Platforms Using Ada 2012 (SS, ST, AC), pp. 46–60.
LOPSTRLOPSTR-2011-FioravantiPPS
Using Real Relaxations during Program Specialization (FF, AP, MP, VS), pp. 106–122.
LOPSTRLOPSTR-2011-Gallagher #analysis #logic programming #source code
Analysis of Logic Programs Using Regular Tree Languages — (JPG), pp. 1–3.
LOPSTRLOPSTR-2011-PilozziS #analysis #self #termination
Improved Termination Analysis of CHR Using Self-sustainability Analysis (PP, DDS), pp. 189–204.
PADLPADL-2011-ChristakisS #detection #fault #message passing #static analysis
Detection of Asynchronous Message Passing Errors Using Static Analysis (MC, KFS), pp. 5–18.
PADLPADL-2011-RedlEK #declarative #set
Declarative Belief Set Merging Using Merging Plans (CR, TE, TK), pp. 99–114.
PADLPADL-2011-SalgueiroDBA #constraints #detection
Using Constraints for Intrusion Detection: The NeMODe System (PDS, DD, IB, SA), pp. 115–129.
PEPMPEPM-2011-AlbertBGHPR
Verified resource guarantees using COSTA and KeY (EA, RB, SG, RH, GP, GRD), pp. 73–76.
PLDIPLDI-2011-BohmKKFT #compilation #parallel
Generalized just-in-time trace compilation using a parallel task farm in a dynamic binary translator (IB, TJKEvK, SCK, BF, NPT), pp. 74–85.
PLDIPLDI-2011-JoseM #fault #locality #satisfiability
Cause clue clauses: error localization using maximum satisfiability (MJ, RM), pp. 437–446.
PLDIPLDI-2011-LuciaWC #comprehension #concurrent #execution #fault
Isolating and understanding concurrency errors using reconstructed execution fragments (BL, BPW, LC), pp. 378–388.
PLDIPLDI-2011-RamanKOLA #distributed #parallel
Parallelism orchestration using DoPE: the degree of parallelism executive (AR, HK, TO, JWL, DIA), pp. 26–37.
PLDIPLDI-2011-SrivastavaBMS #api #detection #implementation #multi #policy #security
A security policy oracle: detecting security holes using multiple API implementations (VS, MDB, KSM, VS), pp. 343–354.
PLDIPLDI-2011-ZengWL #concurrent #data type #monitoring #named
Cruiser: concurrent heap buffer overflow monitoring using lock-free data structures (QZ, DW, PL), pp. 367–377.
POPLPOPL-2011-DilligDA #precise #reasoning #source code
Precise reasoning for programs using containers (ID, TD, AA), pp. 187–200.
POPLPOPL-2011-Gulwani #automation #spreadsheet #string
Automating string processing in spreadsheets using input-output examples (SG), pp. 317–330.
POPLPOPL-2011-JoishaSBBC #automation #compilation #effectiveness #optimisation #parallel #reuse #thread
A technique for the effective and automatic reuse of classical compiler optimizations on multithreaded code (PGJ, RSS, PB, HJB, DRC), pp. 623–636.
POPLPOPL-2011-RamseyD #composition #dependent type #independence #low level #type system
Resourceable, retargetable, modular instruction selection using a machine-independent, type-based tiling of low-level intermediate code (NR, JD), pp. 575–586.
PPDPPPDP-2011-BourdierC #analysis #network #policy #security #term rewriting
Symbolic analysis of network security policies using rewrite systems (TB, HC), pp. 77–88.
PPDPPPDP-2011-EscobarKLMMNS #analysis #encryption #protocol #unification
Protocol analysis in Maude-NPA using unification modulo homomorphic encryption (SE, DK, CL, CM, JM, PN, RS), pp. 65–76.
PPDPPPDP-2011-InabaHHKN #higher-order #logic #monad #verification
Graph-transformation verification using monadic second-order logic (KI, SH, ZH, HK, KN), pp. 17–28.
SASSAS-2011-DonaldsonHKR #verification
Software Verification Using k-Induction (AFD, LH, DK, PR), pp. 351–368.
SASSAS-2011-MadhusudanQ #performance
Efficient Decision Procedures for Heaps Using STRAND (PM, XQ), pp. 43–59.
SASSAS-2011-MonniauxG #bound #fixpoint #model checking
Using Bounded Model Checking to Focus Fixpoint Iterations (DM, LG), pp. 369–385.
AdaSIGAda-2011-BeltHRCHD #contract #execution #symbolic computation
Enhancing spark’s contract checking facilities using symbolic execution (JB, JH, R, PC, DH, XD), pp. 47–60.
RERE-2011-FranchMTC #framework #modelling #on the
On the joint use of i* with other modelling frameworks: A vision paper (XF, AM, JT, CC), pp. 133–142.
REFSQREFSQ-2011-DhunganaSG #elicitation #modelling #product line #requirements #research #variability
Research Preview: Supporting End-User Requirements Elicitation Using Product Line Variability Models (DD, NS, FG), pp. 66–71.
ASEASE-2011-AlshahwanH #automation #re-engineering #testing #web
Automated web application testing using search based software engineering (NA, MH), pp. 3–12.
ASEASE-2011-AlvesGJd #impact analysis #slicing
Fault-localization using dynamic slicing and change impact analysis (EA, MG, VJ, Md), pp. 520–523.
ASEASE-2011-ApelSWRB #detection #feature model #interactive #verification
Detection of feature interactions using feature-aware verification (SA, HS, PW, AvR, DB), pp. 372–375.
ASEASE-2011-Bandyopadhyay #fault #locality #testing
Improving spectrum-based fault localization using proximity-based weighting of test cases (AB), pp. 660–664.
ASEASE-2011-GarciaPMMC #architecture
Enhancing architectural recovery using concerns (JG, DP, CM, NM, YC), pp. 552–555.
ASEASE-2011-KhalekYZMK #alloy #java #named #source code #specification #testing
TestEra: A tool for testing Java programs using alloy specifications (SAK, GY, LZ, DM, SK), pp. 608–611.
ASEASE-2011-LutzJP #assurance #modelling
Using model-based assurance to strengthen diagnostic procedures (RRL, JJ, APH), pp. 516–519.
ASEASE-2011-RathfelderKE #automation #capacity #performance #predict
Capacity planning for event-based systems using automated performance predictions (CR, SK, DE), pp. 352–361.
ASEASE-2011-SagdeoAKV #clustering #invariant #named
PRECIS: Inferring invariants using program path guided clustering (PS, VA, SK, SV), pp. 532–535.
ASEASE-2011-StehleLSRM #geometry
Diagnosis of software failures using computational geometry (ES, KL, MS, CR, SM), pp. 496–499.
ASEASE-2011-SunL #concept analysis
Using Formal Concept Analysis to support change analysis (XS, BL), pp. 641–645.
ASEASE-2011-VakiliD #declarative #model checking #modelling
Using model checking to analyze static properties of declarative models (AV, NAD), pp. 428–431.
ESEC-FSEESEC-FSE-2011-BarzilayHY #developer #social #social media
Using social media to study the diversity of example usage among professional developers (OB, OH, AY), pp. 472–475.
ESEC-FSEESEC-FSE-2011-CifuentesKLHVBZCTH #fault #scalability
Static deep error checking in large system applications using parfait (CC, NK, LL, NH, MV, AB, JZ, AC, DT, CH), pp. 432–435.
ESEC-FSEESEC-FSE-2011-LiCK #analysis #performance #points-to
Boosting the performance of flow-sensitive points-to analysis using value flow (LL, CC, NK), pp. 343–353.
ESEC-FSEESEC-FSE-2011-PalmaST #interactive #requirements #smt
Using an SMT solver for interactive requirements prioritization (FP, AS, PT), pp. 48–58.
ESEC-FSEESEC-FSE-2011-RamamurthiRS #analysis #data flow #graph #probability
Probabilistic dataflow analysis using path profiles on structure graphs (AR, SR, YNS), pp. 512–515.
ESEC-FSEESEC-FSE-2011-ZhengZL #api #recommendation #web
Cross-library API recommendation using web search engines (WZ, QZ, MRL), pp. 480–483.
ICSEICSE-2011-ArcuriB #algorithm #random #re-engineering #statistics #testing
A practical guide for using statistical tests to assess randomized algorithms in software engineering (AA, LCB), pp. 1–10.
ICSEICSE-2011-Bhattacharya #development #evolution #maintenance
Using software evolution history to facilitate development and maintenance (PB), pp. 1122–1123.
ICSEICSE-2011-CordeiroF #bound #concurrent #model checking #multi #smt #thread #verification
Verifying multi-threaded software using smt-based context-bounded model checking (LC, BF), pp. 331–340.
ICSEICSE-2011-DietlDEMS
Building and using pluggable type-checkers (WD, SD, MDE, KM, TWS), pp. 681–690.
ICSEICSE-2011-FeinRSMGGBCLSMMSD #automation #deployment #tool support
Using MATCON to generate CASE tools that guide deployment of pre-packaged applications (EF, NR, SS, PM, SG, RG, MB, SKC, JL, VSS, SM, DM, BS, PD), pp. 1016–1018.
ICSEICSE-2011-Goeritzer #impact analysis #industrial
Using impact analysis in industry (RG), pp. 1155–1157.
ICSEICSE-2011-KamalrudinHG #case study #interactive #quality #requirements
Improving requirements quality using essential use case interaction patterns (MK, JGH, JCG), pp. 531–540.
ICSEICSE-2011-LimDF #identification #network #requirements #social
StakeSource2.0: using social networks of stakeholders to identify and prioritise requirements (SLL, DD, AF), pp. 1022–1024.
ICSEICSE-2011-Malik #analysis #graph
Dynamic shape analysis of program heap using graph spectra (MZM), pp. 952–955.
ICSEICSE-2011-MurtazaMGL #fault
Diagnosing new faults using mutants and prior faults (SSM, NHM, MG, ZL), pp. 960–963.
ICSEICSE-2011-Smith #functional #requirements #security #testing
Systematizing security test case planning using functional requirements phrases (BS), pp. 1136–1137.
ICSEICSE-2011-Thomas #mining #modelling #repository #topic
Mining software repositories using topic models (SWT), pp. 1138–1139.
ICSEICSE-2011-TofanGA #architecture #grid
Capturing tacit architectural knowledge using the repertory grid technique (DT, MG, PA), pp. 916–919.
SACSAC-2011-BabichCPK #abstraction #case study #eclipse #fault #object-oriented #predict
Using a class abstraction technique to predict faults in OO classes: a case study through six releases of the Eclipse JDT (DB, PJC, JFP, BMGK), pp. 1419–1424.
SACSAC-2011-BelcaidBHP #clustering #performance
Efficient clustering of populations using a minimal SNP panel (MB, KB, DH, GP), pp. 83–88.
SACSAC-2011-ChangH #approach #model transformation #multi #verification
A model transformation approach for verifying multi-agent systems using SPIN (LC, XH), pp. 37–42.
SACSAC-2011-FabreKT #lessons learnt #robust
Robustness of automotive applications using reflective computing: lessons learnt (JCF, MOK, FT), pp. 230–235.
SACSAC-2011-HeinenE #incremental #modelling
Incremental feature-based mapping from sonar data using Gaussian mixture models (MRH, PME), pp. 1370–1375.
SACSAC-2011-HuLCHXL #image #segmentation
Image segmentation of cervical vertebra in X-ray radiographs using the curve fitting strategy (HH, HL, LC, CCH, XX, ZL), pp. 853–858.
SACSAC-2011-Jamil #graph #query #unification
Computing subgraph isomorphic queries using structural unification and minimum graph structures (HMJ), pp. 1053–1058.
SACSAC-2011-KimuraEFYN #behaviour #detection #motivation #named #persuasion #smarttech
iDetective: a persuasive application to motivate healthier behavior using smart phone (HK, JE, YF, AY, TN), pp. 399–404.
SACSAC-2011-KostakisKMM #comparison #graph
Improved call graph comparison using simulated annealing (OK, JK, HM, KM), pp. 1516–1523.
SACSAC-2011-LeungJ #data type #mining #nondeterminism
Frequent itemset mining of uncertain data streams using the damped window model (CKSL, FJ), pp. 950–955.
SACSAC-2011-LinXYYZGQCG #anti #hardware #named
SPAD: software protection through anti-debugging using hardware virtualization (QL, MX, MY, PY, MZ, SG, ZQ, KC, HG), pp. 623–624.
SACSAC-2011-Liu #agile #configuration management
Rapid application configuration in Amazon cloud using configurable virtual appliances (HL), pp. 147–154.
SACSAC-2011-MakanjuZM #retrieval
Storage and retrieval of system log events using a structured schema based on message type transformation (AM, ANZH, EEM), pp. 528–533.
SACSAC-2011-MeerBHFK #automation #framework #web
A framework for automatic annotation of web pages using the Google rich snippets vocabulary (JvdM, FB, FH, FF, UK), pp. 765–772.
SACSAC-2011-NakajimaLYZGXYDQCG #hybrid #optimisation #virtual machine
Optimizing virtual machines using hybrid virtualization (JN, QL, SY, MZ, SG, MX, PY, YD, ZQ, KC, HG), pp. 573–578.
SACSAC-2011-SebastianC #approach #design #re-engineering #towards
Towards designing a tool for event reconstruction using Gladyshev Approach (MS, PC), pp. 193–194.
SACSAC-2011-SunLZTCW #dependence #impact analysis #object-oriented #source code
Using lattice of class and method dependence for change impact analysis of object oriented programs (XS, BL, SZ, CT, XC, WW), pp. 1439–1444.
SACSAC-2011-TranCTV #automation #modelling #process #reuse
Automatic reuse of process patterns in process modeling (HNT, BC, TDT, MHV), pp. 1431–1438.
SACSAC-2011-TrindadeR #3d #multi #navigation
Improving 3D navigation in multiscale environments using cubemap-based techniques (DRT, ABR), pp. 1215–1221.
SACSAC-2011-VenkateshGBC #fixpoint #implementation #markov #modelling #recognition #speech
Fixed-point implementation of isolated sub-word level speech recognition using hidden Markov models (NV, RG, RB, MGC), pp. 368–373.
SACSAC-2011-YuLGZZ #fault #modelling #multi
Locating faults using multiple spectra-specific models (KY, ML, QG, HZ, XZ), pp. 1404–1410.
SACSAC-2011-YuMGTBGGTL
System-level co-simulation of integrated avionics using polychrony (HY, YM, YG, JPT, LB, TG, PLG, AT, OL), pp. 354–359.
SACSAC-2011-ZhangWAWLL #performance
Fast lists intersection with Bloom filter using graphics processing units (FZ, DW, NA, GW, XL, JL), pp. 825–826.
SACSAC-2011-ZouaqGH #concept #graph
Ontologizing concept maps using graph theory (AZ, DG, MH), pp. 1687–1692.
LDTALDTA-2011-SoderbergH #editing #jastadd #semantics #tool support
Building semantic editors using JastAdd: tool demonstration (ES, GH), p. 11.
SLESLE-2011-JoncheereS #composition #workflow
Uniform Modularization of Workflow Concerns Using Unify (NJ, RVDS), pp. 77–96.
SLESLE-2011-StappersWRAN #case study #domain-specific language #formal method #industrial
Formalizing a Domain Specific Language Using SOS: An Industrial Case Study (FPMS, SW, MAR, SA, IN), pp. 223–242.
ASPLOSASPLOS-2011-KamruzzamanST #manycore #migration #thread
Inter-core prefetching for multicore processors using migrating helper threads (MK, SS, DMT), pp. 393–404.
CASECASE-2011-BoemPFP #clustering #distance #multi
Multi-feature trajectory clustering using Earth Mover’s Distance (FB, FAP, GF, TP), pp. 310–315.
CASECASE-2011-CabasinoGSSZ #fault #petri net
Fault diagnosis of an ABS system using Petri nets (MPC, AG, CS, AS, KZ), pp. 594–599.
CASECASE-2011-FantiSU #constraints #problem #scheduling #symmetry
Solving scheduling problems in distribution centers using symmetry breaking constraints (MPF, GS, WU), pp. 58–65.
CASECASE-2011-FeiMA #automaton #finite #modelling #resource management
Modeling sequential resource allocation systems using Extended Finite Automata (ZF, SM, ), pp. 444–449.
CASECASE-2011-GhomriA #hybrid #petri net
Continuous flow systems and control methodology using Hybrid Petri nets (LG, HA), pp. 419–424.
CASECASE-2011-HajiD #case study #simulation
A simulation case study: Reducing outpatient waiting time of otolaryngology care services using VBA (MH, HD), pp. 525–530.
CASECASE-2011-HaoD #incremental #optimisation
Optimization of tool trajectory for Incremental Sheet Forming using closed loop control (WH, SD), pp. 779–784.
CASECASE-2011-HeoOP #locality #mobile
A localization system of mobile robots using artificial landmarks (DHH, ARO, THP), pp. 139–144.
CASECASE-2011-JamesBHACC #mining #mobile
Tele-operation of a mobile mining robot using a panoramic display: an exploration of operators sense of presence (CAJ, TPB, KH, LA, CC, AC), pp. 279–284.
CASECASE-2011-JulvezMV #analysis #simulation
Analysis and simulation of manufacturing systems using SimHPN toolbox (JJ, CM, CRV), pp. 432–437.
CASECASE-2011-KurzKP #maintenance #network
Dynamic Maintenance in semiconductor manufacturing using Bayesian networks (DK, JK, JP), pp. 238–243.
CASECASE-2011-MohanSBKE #3d #image
3D scanning of object surfaces using structured light and a single camera image (SM, KBS, IB, VK, RDE), pp. 151–156.
CASECASE-2011-RatnakarZ #detection
An ultrasound system for tumor detection in soft tissues using low transient pulse (ARR, MZ), pp. 684–689.
CASECASE-2011-StyliosG #fuzzy #modelling
Modeling complex logistics systems using soft computing methodology of Fuzzy Cognitive Maps (CDS, GKG), pp. 72–77.
CASECASE-2011-UrliM #industrial #realtime
Use of Ethernet communications for real-time control systems in the metals industry (LU, SM), pp. 6–11.
CASECASE-2011-XieZSL #fuzzy
Position servo control of the slider in double toggle mechanical press using Bezier curve model and fuzzy control (JX, SZ, ZS, JL), pp. 773–778.
CCCC-2011-GreweO #approach #clustering
A Static Task Partitioning Approach for Heterogeneous Systems Using OpenCL (DG, MFPO), pp. 286–305.
CCCC-2011-JenistaED #parallel #reachability
Using Disjoint Reachability for Parallelization (JCJ, YHE, BD), pp. 198–224.
CCCC-2011-NaeemL #alias #analysis #performance #set #summary
Faster Alias Set Analysis Using Summaries (NAN, OL), pp. 82–103.
CGOCGO-2011-LiuM #analysis #locality #problem
Pinpointing data locality problems using data-centric analysis (XL, JMMC), pp. 171–180.
CGOCGO-2011-SanchezASPS #compilation
Using machines to learn method-specific compilation strategies (RNS, JNA, DS, MP, MGS), pp. 257–266.
DACDAC-2011-GeQ #machine learning #multi
Dynamic thermal management for multimedia applications using machine learning (YG, QQ), pp. 95–100.
DACDAC-2011-GhaniN #branch #grid #power management #verification
Power grid verification using node and branch dominance (NHAG, FNN), pp. 682–687.
DACDAC-2011-HaddadN #analysis #grid #power management
Power grid correction using sensitivity analysis under an RC model (PAH, FNN), pp. 688–693.
DACDAC-2011-KesturIPANC #architecture #co-evolution #design #framework #re-engineering
An algorithm-architecture co-design framework for gridding reconstruction using FPGAs (SK, KMI, SP, AAM, VN, CC), pp. 585–590.
DACDAC-2011-KuoSR #analysis #performance #reachability #source code
Efficient WCRT analysis of synchronous programs using reachability (MMYK, RS, PSR), pp. 480–485.
DACDAC-2011-LinH #satisfiability
Using SAT-based Craig interpolation to enlarge clock gating functions (THL, CY(H), pp. 621–626.
DACDAC-2011-MirandaRBW #design #modelling #standard #statistics
Statistical characterization of standard cells using design of experiments with response surface modeling (MM, PR, LB, GIW), pp. 77–82.
DACDAC-2011-NowrozWR #modelling
Improved post-silicon power modeling using AC lock-in techniques (ANN, GW, SR), pp. 101–106.
DACDAC-2011-SorgenfreiS #detection
Single-molecule electronic detection using nanoscale field-effect devices (SS, KLS), pp. 712–717.
DACDAC-2011-TsaiZCH #bidirectional #fault tolerance
A fault-tolerant NoC scheme using bidirectional channel (WCT, DYZ, SJC, YHH), pp. 918–923.
DACDAC-2011-WangXAP #classification #learning #policy #power management
Deriving a near-optimal power management policy using model-free reinforcement learning and Bayesian classification (YW, QX, ACA, MP), pp. 41–46.
DACDAC-2011-WeiP #security
Integrated circuit security techniques using variable supply voltage (SW, MP), pp. 248–253.
DACDAC-2011-YangBC #detection #embedded #energy #fault
Energy-efficient MIMO detection using unequal error protection for embedded joint decoding system (YSY, PB, GC), pp. 579–584.
DATEDATE-2011-Al-DujailyMXYP #concurrent #detection #network #runtime #transitive
Run-time deadlock detection in networks-on-chip using coupled transitive closure networks (RAD, TSTM, FX, AY, MP), pp. 497–502.
DATEDATE-2011-AlordaTBS #embedded #optimisation
Stability optimization of embedded 8T SRAMs using Word-Line Voltage modulation (BA, GT, SAB, JS), pp. 986–991.
DATEDATE-2011-AmoryOMML #energy
Evaluating energy consumption of homogeneous MPSoCs using spare tiles (AMA, LO, CAMM, FGM, ML), pp. 1164–1167.
DATEDATE-2011-AsadiniaMTS
Supporting non-contiguous processor allocation in mesh-based CMPs using virtual point-to-point links (MA, MM, AT, HSA), pp. 413–418.
DATEDATE-2011-ButtrickK #3d #network #on the #testing
On testing prebond dies with incomplete clock networks in a 3D IC using DLLs (MB, SK), pp. 1418–1423.
DATEDATE-2011-DammHJPS #architecture #component #contract #design #integration #specification #testing
Using contract-based component specifications for virtual integration testing and architecture design (WD, HH, BJ, TP, IS), pp. 1023–1028.
DATEDATE-2011-EggersglusD #fault #generative #optimisation #pseudo #testing
As-Robust-As-Possible test generation in the presence of small delay defects using pseudo-Boolean optimization (SE, RD), pp. 1291–1296.
DATEDATE-2011-GoyalN #grid #performance #power management #verification
Efficient RC power grid verification using node elimination (AG, FNN), pp. 257–260.
DATEDATE-2011-GrammatikakisPSP #estimation
System-level power estimation methodology using cycle- and bit-accurate TLM (MDG, SP, JPS, CP), pp. 1125–1126.
DATEDATE-2011-KaraklajicFSV #detection #fault #low cost
Low-cost fault detection method for ECC using Montgomery powering ladder (DK, JF, JMS, IV), pp. 1016–1021.
DATEDATE-2011-KimCSY #modelling #parallel #performance #simulation
Temporal parallel simulation: A fast gate-level HDL simulation using higher level models (DK, MJC, KS, SY), pp. 1584–1589.
DATEDATE-2011-LiuHRG #optimisation #process
Global optimization of integrated transformers for high frequency microwave circuits using a Gaussian process based surrogate model (BL, YH, PR, GGEG), pp. 1101–1106.
DATEDATE-2011-LiuSTV #design #generative #towards #validation
Towards coverage closure: Using GoldMine assertions for generating design validation stimulus (LL, DS, WT, SV), pp. 173–178.
DATEDATE-2011-MeyerGCLS #cost analysis #execution #safety
Reducing the cost of redundant execution in safety-critical systems using relaxed dedication (BHM, NJG, BHC, JL, KS), pp. 1249–1254.
DATEDATE-2011-MeyerNHBSGSB #configuration management #performance
Fast Start-up for Spartan-6 FPGAs using Dynamic Partial Reconfiguration (JM, JN, MH, LB, OS, RMG, RS, JB), pp. 1542–1547.
DATEDATE-2011-NarayananZT #correctness #pattern matching #process
Ensuring correctness of analog circuits in presence of noise and process variations using pattern matching (RN, MHZ, ST), pp. 1188–1191.
DATEDATE-2011-SinghSG #generative #performance #testing
Testing of high-speed DACs using PRBS generation with “Alternate-Bit-Tapping” (MS, MS, SG), pp. 377–382.
DATEDATE-2011-VissersNN #interface #realtime #synthesis #tool support
Building real-time HDTV applications in FPGAs using processors, AXI interfaces and high level synthesis tools (KAV, SN, JN), pp. 848–850.
DATEDATE-2011-WangKAWMA #energy #simulation
Accelerated simulation of tunable vibration energy harvesting systems using a linearised state-space technique (LW, TJK, BMAH, ASW, GVM, INAG), pp. 1267–1272.
DATEDATE-2011-WangNKWRLMB #configuration management
High-temperature (>500°C) reconfigurable computing using silicon carbide NEMS switches (XW, SN, ARK, FGW, SR, THL, MM, SB), pp. 1065–1070.
DATEDATE-2011-YeHL #fault #multi #on the
On diagnosis of multiple faults using compacted responses (JY, YH, XL), pp. 679–684.
HPCAHPCA-2011-CarreteroVARMG #hardware #process
Hardware/software-based diagnosis of load-store queues using expandable activity logs (JC, XV, JA, TR, MM, AG), pp. 321–331.
HPCAHPCA-2011-GhasemiDK #architecture
Low-voltage on-chip cache architecture using heterogeneous cell sizes for high-performance processors (HRG, SCD, NSK), pp. 38–49.
HPCAHPCA-2011-MehraraHSM #javascript #parallel
Dynamic parallelization of JavaScript applications using an ultra-lightweight speculation mechanism (MM, PCH, MS, SAM), pp. 87–98.
HPCAHPCA-2011-PellauerAKPE #manycore #named #simulation
HAsim: FPGA-based high-detail multicore simulation using time-division multiplexing (MP, MA, MAK, AP, JSE), pp. 406–417.
HPDCHPDC-2011-BalkirFR #architecture #distributed #mining #pipes and filters
A distributed look-up architecture for text mining applications using mapreduce (ASB, ITF, AR), pp. 279–280.
HPDCHPDC-2011-HudsonNRWJP #case study #data-driven #experience #simulation
Experiences using smaash to manage data-intensive simulations (RH, JN, LBR, KW, GCJI, MEP), pp. 205–216.
HPDCHPDC-2011-WolinskyF #case study #distributed #experience #grid #self
Experiences with self-organizing, decentralized grids using the grid appliance (DIW, RJOF), pp. 183–194.
HPDCHPDC-2011-ZhouKB #debugging #detection #locality #named #parallel #scalability #source code
Vrisha: using scaling properties of parallel programs for bug detection and localization (BZ, MK, SB), pp. 85–96.
LCTESLCTES-2011-NavabpourBF #debugging #testing
Software debugging and testing using the abstract diagnosis theory (SN, BB, SF), pp. 111–120.
PDPPDP-2011-CorneaB #benchmark #distributed #metric #performance #predict
Performance Prediction of Distributed Applications Using Block Benchmarking Methods (BFC, JB), pp. 183–190.
PDPPDP-2011-MotokubotaIH #parametricity
Accelerating Parameter Sweep Applications Using CUDA (MM, FI, KH), pp. 111–118.
PDPPDP-2011-ReyesS #optimisation #prototype
Optimize or Wait? Using llc Fast-Prototyping Tool to Evaluate CUDA Optimizations (RR, FdS), pp. 257–261.
PDPPDP-2011-WathWL #estimation #grid #parallel
Parallel Hematopoietic Stem Cell Division Rate Estimation Using an Agent-Based Model on the Grid (RCvdW, EvdW, PL), pp. 311–317.
SOSPSOSP-2011-VeeraraghavanCFN #detection
Detecting and surviving data races using complementary schedules (KV, PMC, JF, SN), pp. 369–384.
ESOPESOP-2011-GuhaSK #analysis #type system
Typing Local Control and State Using Flow Analysis (AG, CS, SK), pp. 256–275.
FASEFASE-2011-EhrigET #graph #version control
A Formal Resolution Strategy for Operation-Based Conflicts in Model Versioning Using Graph Modifications (HE, CE, GT), pp. 202–216.
FASEFASE-2011-KelsenMG #complexity #modelling
Models within Models: Taming Model Complexity Using the Sub-model Lattice (PK, QM, CG), pp. 171–185.
FASEFASE-2011-KhanH #analysis #contract #dependence #modelling #on the #testing #visual notation
On Model-Based Regression Testing of Web-Services Using Dependency Analysis of Visual Contracts (TAK, RH), pp. 341–355.
STOCSTOC-2011-Goyal #constant #protocol
Constant round non-malleable protocols using one way functions (VG), pp. 695–704.
TACASTACAS-2011-GarbervetskyGN #invariant
Enforcing Structural Invariants Using Dynamic Frames (DG, DG, AN), pp. 65–80.
TACASTACAS-2011-GopinathMK #program repair #satisfiability
Specification-Based Program Repair Using SAT (DG, MZM, SK), pp. 173–188.
TACASTACAS-2011-TalupurH #model checking
Biased Model Checking Using Flows (MT, HH), pp. 239–253.
CADECADE-2011-SchneiderS #automation #first-order #ontology #owl #proving #reasoning #theorem proving
Reasoning in the OWL 2 Full Ontology Language Using First-Order Automated Theorem Proving (MS, GS), pp. 461–475.
CAVCAV-2011-DudkaPV #data type #logic #named
Predator: A Practical Tool for Checking Manipulation of Dynamic Data Structures Using Separation Logic (KD, PP, TV), pp. 372–378.
CAVCAV-2011-Jhala #verification
Using Types for Software Verification (RJ), p. 20.
CAVCAV-2011-JhalaMR #functional #named #source code #verification
HMC: Verifying Functional Programs Using Abstract Interpreters (RJ, RM, AR), pp. 470–485.
CAVCAV-2011-RamanK #behaviour #specification
Analyzing Unsynthesizable Specifications for High-Level Robot Behavior Using LTLMoP (VR, HKG), pp. 663–668.
CAVCAV-2011-SharmaDDA #generative #invariant
Simplifying Loop Invariant Generation Using Splitter Predicates (RS, ID, TD, AA), pp. 703–719.
CAVCAV-2011-SinghalA #simulation #verification
Using Coverage to Deploy Formal Verification in a Simulation World (VS, PA), pp. 44–49.
ICLPICLP-2011-ChishamPSW #logic programming #named #repository #web #web service
CDAOStore: A Phylogenetic Repository Using Logic Programming and Web Services (BC, EP, TCS, BW), pp. 209–219.
ICLPICLP-2011-NicholsonSS #generative #logic #music #probability
Improving the Outcome of a Probabilistic Logic Music System Generator by Using Perlin Noise (CJN, DDS, JS), pp. 231–239.
ICLPICLP-2011-OstrowskiFSA #evolution #ontology
Evolution of Ontologies using ASP (MO, GF, TS, GA), pp. 16–27.
ICLPICLP-J-2011-CodishGBFG #analysis #constraints #integer #satisfiability #termination
SAT-based termination analysis using monotonicity constraints over the integers (MC, IG, AMBA, CF, JG), pp. 503–520.
ICLPICLP-J-2011-CorapiRVPS #design #induction #learning
Normative design using inductive learning (DC, AR, MDV, JAP, KS), pp. 783–799.
ICLPICLP-J-2011-DurzinskyMOSW #automation #network #re-engineering
Automatic network reconstruction using ASP (MD, WM, MO, TS, AW), pp. 749–766.
ICSTICST-2011-ChenCZXF #clustering #testing
Using semi-supervised clustering to improve regression test selection techniques (SC, ZC, ZZ, BX, YF), pp. 1–10.
ICSTICST-2011-KhalekK #constraints #database #relational #testing #theorem proving
Systematic Testing of Database Engines Using a Relational Constraint Solver (SAK, SK), pp. 50–59.
ICSTICST-2011-MalikSK #constraints #data type #debugging
Constraint-Based Program Debugging Using Data Structure Repair (MZM, JHS, SK), pp. 190–199.
ICSTICST-2011-Nica #on the #testing
On the Improvement of the Mutation Score Using Distinguishing Test Cases (SN), pp. 423–426.
ICSTICST-2011-SmithW #detection #heuristic #sql #web
Using SQL Hotspots in a Prioritization Heuristic for Detecting All Types of Web Application Vulnerabilities (BHS, LW), pp. 220–229.
ICSTICST-2011-YuSSR #embedded #testing
Using Property-Based Oracles when Testing Embedded System Applications (TY, AS, WSa, GR), pp. 100–109.
ICTSSICTSS-2011-MammarCJMO #c #detection #source code #testing
Using Testing Techniques for Vulnerability Detection in C Programs (AM, ARC, WJ, WM, EMdO), pp. 80–96.
ICTSSICTSS-2011-MeinkeN #term rewriting #testing
Learning-Based Testing for Reactive Systems Using Term Rewriting Technology (KM, FN), pp. 97–114.
ICTSSICTSS-2011-SchwarzlAW #composition #random testing #testing
Compositional Random Testing Using Extended Symbolic Transition Systems (CS, BKA, FW), pp. 179–194.
ISSTAISSTA-2011-GuoE #automation #data analysis #persistent
Using automatic persistent memoization to facilitate data analysis scripting (PJG, DRE), pp. 287–297.
ISSTAISSTA-2011-NaminK #testing
The use of mutation in testing experiments and its sensitivity to external threats (ASN, SK), pp. 342–352.
ISSTAISSTA-2011-SegallTF #combinator #design #diagrams
Using binary decision diagrams for combinatorial test design (IS, RTB, EF), pp. 254–264.
ICSTSAT-2011-BennettS #principle
Model Counting Using the Inclusion-Exclusion Principle (HB, SS), pp. 362–363.
ICSTSAT-2011-GableskeH #named #random #satisfiability
EagleUP: Solving Random 3-SAT Using SLS with Unit Propagation (OG, MH), pp. 367–368.
TAPTAP-2011-HeamM #approach #automaton #random testing #testing
A Random Testing Approach Using Pushdown Automata (PCH, CM), pp. 119–133.
VMCAIVMCAI-2011-ChengRKB #embedded #fault tolerance #game studies #synthesis #theory and practice
Synthesis of Fault-Tolerant Embedded Systems Using Games: From Theory to Practice (CHC, HR, AK, CB), pp. 118–133.
CBSECBSE-2010-AllierSSV #component #consistency #execution #object-oriented
Restructuring Object-Oriented Applications into Component-Oriented Applications by Using Consistency with Execution Traces (SA, HAS, SS, SV), pp. 216–231.
CBSECBSE-2010-EichbergKMM #component #composition #feature model #modelling
Component Composition Using Feature Models (ME, KK, RM, MM), pp. 200–215.
ECSAECSA-2010-ChristensenHL #architecture #assurance #lightweight #quality
Lightweight and Continuous Architectural Software Quality Assurance Using the aSQA Technique (HBC, KMH, BL), pp. 118–132.
ECSAECSA-2010-ElorantaK #architecture #evaluation
Using Domain Knowledge to Boost Software Architecture Evaluation (VPE, KK), pp. 319–326.
ECSAECSA-2010-PerezDGA #agile #architecture #flexibility
Flexible Working Architectures: Agile Architecting Using PPCs (JP, JD, JG, PPA), pp. 102–117.
QoSAQoSA-2010-ChauvelSCHM #adaptation #architecture #self
Using QoS-Contracts to Drive Architecture-Centric Self-adaptation (FC, HS, XC, GH, HM), pp. 102–118.
DocEngDocEng-2010-BeaudouxBJ #authoring #modelling
Using model driven engineering technologies for building authoring applications (OB, AB, JMJ), pp. 279–282.
DocEngDocEng-2010-KarolHHA #documentation #feature model #modelling #product line
Using feature models for creating families of documents (SK, MH, FH, UA), pp. 259–262.
DocEngDocEng-2010-NamaneSM #feature model #matrix #recognition
Degraded dot matrix character recognition using CSM-based feature extraction (AN, EHS, PM), pp. 207–210.
DocEngDocEng-2010-OllisBB #documentation
Optimized reprocessing of documents using stored processor state (JAO, DFB, SRB), pp. 135–138.
DocEngDocEng-2010-SojkaH #documentation #library #optimisation
Document engineering for a digital library: PDF recompression using JBIG2 and other optimizations of PDF documents (PS, RH), pp. 3–12.
DocEngDocEng-2010-ThaoM #data type #detection #version control #xml
Using versioned tree data structure, change detection and node identity for three-way XML merging (CT, EVM), pp. 77–86.
DRRDRR-2010-BallKSN #analysis #documentation
Analysis of line structure in handwritten documents using the Hough transform (GRB, HK, SNS, AN), pp. 1–10.
DRRDRR-2010-BianneKL #clustering #modelling #recognition #word
Context-dependent HMM modeling using tree-based clustering for the recognition of handwritten words (ALB, CK, LLS), pp. 1–10.
DRRDRR-2010-ChazalonC #definite clause grammar #documentation
Using definite clause grammars to build a global system for analyzing collections of documents (JC, BC), pp. 1–10.
DRRDRR-2010-ChenMT #automation #performance #validation #word
Efficient automatic OCR word validation using word partial format derivation and language model (SC, DM, GRT), pp. 1–10.
DRRDRR-2010-PeredaT #precise #semiparsing
Date of birth extraction using precise shallow parsing (RP, KT), pp. 1–10.
DRRDRR-2010-YouADRGT #image #multimodal #retrieval
Biomedical article retrieval using multimodal features and image annotations in region-based CBIR (DY, SA, DDF, MMR, VG, GRT), pp. 1–10.
TPDLECDL-2010-BiaMG #library
Estimating Digitization Costs in Digital Libraries Using DiCoMo (AB, RM, JG), pp. 136–147.
TPDLECDL-2010-BiaMG10a #documentation #mindmap
Using Mind Maps to Model Semistructured Documents (AB, RM, JG), pp. 421–424.
TPDLECDL-2010-BillerbeckDFIK #query #ranking #web
Ranking Entities Using Web Search Query Logs (BB, GD, CSF, TI, RK), pp. 273–281.
TPDLECDL-2010-Black #data type #framework #metadata #pattern matching
Using Pattern Language as a Framework for Future Metadata Structure (EAB), pp. 393–396.
TPDLECDL-2010-CamargoCG #image #matrix #multimodal #visualisation
Multimodal Image Collection Visualization Using Non-negative Matrix Factorization (JEC, JCC, FAG), pp. 429–432.
HTHT-2010-ChoudhuryFAGLY #automation #social
Automatic construction of travel itineraries using social breadcrumbs (MDC, MF, SAY, NG, RL, CY), pp. 35–44.
HTHT-2010-FossC #adaptation #authoring #generative #hypermedia #tool support
The next generation authoring adaptive hypermedia: using and evaluating the MOT3.0 and PEAL tools (JGKF, AIC), pp. 83–92.
HTHT-2010-GasslerZTS #named #recommendation
SnoopyDB: narrowing the gap between structured and unstructured information using recommendations (WG, EZ, MT, GS), pp. 271–272.
JCDLJCDL-2010-AngroshCS #identification #library #random #towards
Context identification of sentences in related work sections using a conditional random field: towards intelligent digital libraries (MAA, SC, NS), pp. 293–302.
JCDLJCDL-2010-BammanBC #multi
Transferring structural markup across translations using multilingual alignment and projection (DB, AB, GRC), pp. 11–20.
JCDLJCDL-2010-MonroyFC #library #multi #ontology #taxonomy
Using an ontology and a multilingual glossary for enhancing the nautical archaeology digital library (CM, RF, FC), pp. 259–262.
JCDLJCDL-2010-TahmasebiNTR #documentation #word
Using word sense discrimination on historic document collections (NT, KN, TT, TR), pp. 89–98.
PODSPODS-2010-ReS #comprehension #estimation
Understanding cardinality estimation using entropy maximization (CR, DS), pp. 53–64.
SIGMODSIGMOD-2010-BaoDKR #workflow
An optimal labeling scheme for workflow provenance using skeleton labels (ZB, SBD, SK, SR), pp. 711–722.
SIGMODSIGMOD-2010-GatterbauerS #trust
Data conflict resolution using trust mappings (WG, DS), pp. 219–230.
SIGMODSIGMOD-2010-JinYW #classification #graph #named
GAIA: graph classification using evolutionary computation (NJ, CY, WW), pp. 879–890.
SIGMODSIGMOD-2010-ShindeGGD #locality #similarity
Similarity search and locality sensitive hashing using ternary content addressable memories (RS, AG, PG, DD), pp. 375–386.
SIGMODSIGMOD-2010-VernicaCL #parallel #performance #pipes and filters
Efficient parallel set-similarity joins using MapReduce (RV, MJC, CL), pp. 495–506.
SIGMODSIGMOD-2010-YangWLW #keyword #optimisation #web
Optimizing content freshness of relations extracted from the web using keyword search (MY, HW, LL, MW), pp. 819–830.
VLDBVLDB-2010-DyresonBM #xml
Using XMorph to Transform XML Data (CED, SSB, KM), pp. 1541–1544.
VLDBVLDB-2010-GolabKKS #quality #semantics
Data Auditor: Exploring Data Quality and Semantics using Pattern Tableaux (LG, HJK, FK, DS), pp. 1641–1644.
VLDBVLDB-2010-KazemitabarDAAS #query #sql
Geospatial Stream Query Processing using Microsoft SQL Server StreamInsight (SJK, UD, MHA, AA, CS), pp. 1537–1540.
VLDBVLDB-2010-LimayeSC #web
Annotating and Searching Web Tables Using Entities, Types and Relationships (GL, SS, SC), pp. 1338–1347.
VLDBVLDB-2010-MiddelfartP
Using Sentinel Technology in the TARGIT BI Suite (MM, TBP), pp. 1629–1632.
VLDBVLDB-2010-TermehchyW #keyword #named #xml
EXTRUCT: Using Deep Structural Information in XML Keyword Search (AT, MW), pp. 1593–1596.
VLDBVLDB-2011-LeeH10 #clustering #named #performance
QSkycube: Efficient Skycube Computation using Point-Based Space Partitioning (JL, SwH), pp. 185–196.
CSEETCSEET-2010-LewHS #re-engineering
Using LEGO MINDSTORMS NXT and LEJOS in an Advanced Software Engineering Course (MWL, TBH, MS), pp. 121–128.
EDMEDM-2010-BousbiaLBR #behaviour #learning #web
Analyzing Learning Styles using Behavioral Indicators in Web based Learning Environments (NB, JML, AB, IR), pp. 279–280.
EDMEDM-2010-CadeO #modelling #topic
Using Topic Models to Bridge Coding Schemes of Differing Granularity (WLC, AO), pp. 281–282.
EDMEDM-2010-FalakmasirH #data mining #education #mining
Using Educational Data Mining Methods to Study the Impact of Virtual Classroom in E-Learning (MHF, JH), pp. 241–248.
EDMEDM-2010-FinchamABF #modelling
Using Neural Imaging and Cognitive Modeling to Infer Mental States while Using an Intelligent Tutoring System (JMF, JRA, SB, JLF), pp. 51–60.
EDMEDM-2010-GongBH #multi #parametricity
Using multiple Dirichlet distributions to improve parameter plausibility (YG, JEB, NTH), pp. 61–70.
EDMEDM-2010-HowardJN #mining #process
Examining Learner Control in a Structured Inquiry Cycle Using Process Mining (LH, JJ, CN), pp. 71–80.
EDMEDM-2010-JeongBJH #analysis #behaviour #effectiveness #learning #markov #modelling
Analysis of Productive Learning Behaviors in a Structured Inquiry Cycle Using Hidden Markov Models (HJ, GB, JJ, LH), pp. 81–90.
EDMEDM-2010-KhodeirWDH #abduction #difference #network #probability #student
Inferring the Differential Student Model in a Probabilistic Domain Using Abduction inference in Bayesian networks (NK, NMW, NMD, NH), pp. 299–300.
EDMEDM-2010-MacfadyenS #design #interactive #monitoring #online
Using LiMS (the Learner Interaction Monitoring System) to Track Online Learner Engagement and Evaluate Course Design (LM, PS), pp. 301–302.
EDMEDM-2010-MontalvoBPNG #identification #machine learning #student
Identifying Students’ Inquiry Planning Using Machine Learning (OM, RSJdB, MASP, AN, JDG), pp. 141–150.
EDMEDM-2010-PedroBMNG #behaviour #detection
Using Text Replay Tagging to Produce Detectors of Systematic Experimentation Behavior Patterns (MSP, RSJdB, OM, AN, JDG), pp. 181–190.
EDMEDM-2010-ShanabrookCWA #behaviour #identification #student
Identifying High-Level Student Behavior Using Sequence-based Motif Discovery (DHS, DGC, BPW, IA), pp. 191–200.
EDMEDM-2010-StamperBC #knowledge base #problem
Using a Bayesian Knowledge Base for Hint Selection on Domain Specific Problems (JCS, TB, MJC), pp. 327–328.
EDMEDM-2010-YudelsonBMM #adaptation #education #integration #optimisation #semantics
Using Numeric Optimization To Refine Semantic User Model Integration Of Adaptive Educational Systems (MY, PB, AM, MM), pp. 221–230.
ITiCSEITiCSE-2010-AlaoutinenS #programming #self #student #taxonomy
Student self-assessment in a programming course using bloom’s revised taxonomy (SA, KS), pp. 155–159.
ITiCSEITiCSE-2010-AydinolG #web
Advantage of using web 2.0 applications in class (ABA, ÖG), p. 308.
ITiCSEITiCSE-2010-BasawapatnaKR #design #education #game studies #scalability
Using scalable game design to teach computer science from middle school to graduate school (ARB, KHK, AR), pp. 224–228.
ITiCSEITiCSE-2010-BasawapatnaR #feedback #how #physics #student
Cyberspace meets brick and mortar: an investigation into how students engage in peer to peer feedback using both cyberlearning and physical infrastructures (ARB, AR), pp. 184–188.
ITiCSEITiCSE-2010-Crescenzi
Using AVs to explain NP-completeness (PC), p. 299.
ITiCSEITiCSE-2010-FinkelsteinPHDCB #game studies #named #network #social #student
SNAG: using social networking games to increase student retention in computer science (SLF, EP, AH, KD, SRC, TB), pp. 142–146.
ITiCSEITiCSE-2010-GarlickC #empirical
Using alice in CS1: a quantitative experiment (RG, ECC), pp. 165–168.
ITiCSEITiCSE-2010-GunawardenaTK #collaboration
Encouraging reading and collaboration using classroom salon (AG, AT, DK), pp. 254–258.
ITiCSEITiCSE-2010-HowardJN #behaviour #design #learning #online
Reflecting on online learning designs using observed behavior (LH, JJ, CN), pp. 179–183.
ITiCSEITiCSE-2010-KiesmullerSBR #identification #online #pattern matching #pattern recognition #problem #recognition
Online identification of learner problem solving strategies using pattern recognition methods (UK, SS, TB, KR), pp. 274–278.
ITiCSEITiCSE-2010-KyrilovCT #assessment #case study #education #evaluation #online
Improving CS education at Wits using an online assessment and evaluation system: a case study (AK, JC, MT), p. 314.
ITiCSEITiCSE-2010-Larraza-MendiluzeG #game studies #learning #process #topic
Changing the learning process of the input/output topic using a game in a portable console (ELM, NGV), p. 316.
ITiCSEITiCSE-2010-MarkhamK #case study #experience
Using personal robots in CS1: experiences, outcomes, and attitudinal influences (SM, KNK), pp. 204–208.
ITiCSEITiCSE-2010-MartinezLDC #case study #experience #re-engineering
Experiences in software engineering courses using psychometrics with RAMSET (LGM, GL, ARD, JRC), pp. 244–248.
SIGITESIGITE-2010-KulgachevJ #evaluation #network #performance
802.11 networks performance evaluation using OPNET (VK, HJ), pp. 149–152.
SIGITESIGITE-2010-WangHY #education #network #security
Using VMware VCenter lab manager in undergraduate education for system administration and network security (XW, GCH, RY), pp. 43–52.
CSMRCSMR-2010-MadaniGPGA #identifier #recognition #source code #speech #word
Recognizing Words from Source Code Identifiers Using Speech Recognition Techniques (NM, LG, MDP, YGG, GA), pp. 68–77.
CSMRCSMR-2010-NadiHM #predict #set
Does the Past Say It All? Using History to Predict Change Sets in a CMDB (SN, RCH, SM), pp. 97–106.
CSMRCSMR-2010-OzkayaPGC #architecture #evolution #requirements
Using Architecturally Significant Requirements for Guiding System Evolution (IO, JADP, AG, SC), pp. 127–136.
CSMRCSMR-2010-Shrinivasan #migration
Data Migration from a Product to a Data Warehouse Using ETL Tool (CS), pp. 63–65.
ICPCICPC-2010-ChenR #case study #dependence #feature model #graph
Case Study of Feature Location Using Dependence Graph, after 10 Years (KC, VR), pp. 1–3.
ICPCICPC-2010-RevelleDP #data fusion #feature model #mining #web
Using Data Fusion and Web Mining to Support Feature Location in Software (MR, BD, DP), pp. 14–23.
ICPCICPC-2010-ScannielloDDD #algorithm #clustering
Using the Kleinberg Algorithm and Vector Space Model for Software System Clustering (GS, AD, CD, TD), pp. 180–189.
ICSMEICSM-2010-AbdallahMG #robust #slicing
Certifying software robustness using program slicing (MA, MM, KG), pp. 1–2.
ICSMEICSM-2010-CanforaCCP #detection #empirical #logic #multi
Using multivariate time series and association rules to detect logical change coupling: An empirical study (GC, MC, LC, MDP), pp. 1–10.
ICSMEICSM-2010-DajsurenGM #legacy
Modernizing legacy software using a System Grokking technology (YD, MG, DM), pp. 1–7.
ICSMEICSM-2010-GethersP #modelling #object-oriented #relational #topic
Using Relational Topic Models to capture coupling among classes in object-oriented software systems (MG, DP), pp. 1–10.
ICSMEICSM-2010-HindleGH #process
Software process recovery using Recovered Unified Process Views (AH, MWG, RCH), pp. 1–10.
ICSMEICSM-2010-JalbertB #clone detection #concurrent #debugging #detection #identification
Using clone detection to identify bugs in concurrent software (KJ, JSB), pp. 1–5.
ICSMEICSM-2010-KameiMMMAH #debugging #modelling #predict
Revisiting common bug prediction findings using effort-aware models (YK, SM, AM, KiM, BA, AEH), pp. 1–10.
ICSMEICSM-2010-SaleckerG #graph #testing
Pairwise test set calculation using k-partite graphs (ES, SG), pp. 1–5.
ICSMEICSM-2010-SavageDGP #named #source code #topic
TopicXP: Exploring topics in source code using Latent Dirichlet Allocation (TS, BD, MG, DP), pp. 1–6.
ICSMEICSM-2010-Wilson #concept #ontology
Using ontology fragments in concept location (LAW), pp. 1–2.
MSRMSR-2010-JuzgadoV #difference #re-engineering
Using differences among replications of software engineering experiments to gain knowledge (NJJ, SV).
MSRMSR-2010-PentaGA #approach #identification
Identifying licensing of jar archives using a code-search approach (MDP, DMG, GA), pp. 151–160.
SCAMSCAM-2010-KatsV #aspect-oriented #case study #encapsulation #framework #logic #platform #programming
Encapsulating Software Platform Logic by Aspect-Oriented Programming: A Case Study in Using Aspects for Language Portability (LCLK, EV), pp. 147–156.
SCAMSCAM-2010-ThomasAHB #evolution #modelling #topic #validation
Validating the Use of Topic Models for Software Evolution (SWT, BA, AEH, DB), pp. 55–64.
WCREWCRE-2010-BittencourtSGM #automation #information retrieval #modelling
Improving Automated Mapping in Reflexion Models Using Information Retrieval Techniques (RAB, GJdSS, DDSG, GCM), pp. 163–172.
WCREWCRE-2010-GratiSP #diagrams #execution #interactive #sequence chart #visualisation
Extracting Sequence Diagrams from Execution Traces Using Interactive Visualization (HG, HAS, PP), pp. 87–96.
WCREWCRE-2010-HaiducAMM #automation #on the #source code #summary
On the Use of Automated Text Summarization Techniques for Summarizing Source Code (SH, JA, LM, AM), pp. 35–44.
WCREWCRE-2010-SelimFZ #clone detection #detection #representation
Enhancing Source-Based Clone Detection Using Intermediate Representation (GMKS, KCF, YZ), pp. 227–236.
WCREWCRE-2010-WongASLM #behaviour #detection #programming #reverse engineering #search-based
Reverse Engineering Utility Functions Using Genetic Programming to Detect Anomalous Behavior in Software (SW, MA, JS, KL, SM), pp. 141–149.
CIAACIAA-2010-Johnson #natural language
Uniformizing Rational Relations for Natural Language Applications Using Weighted Determinization (JHJ), pp. 173–180.
CIAACIAA-2010-Jonoska #automaton #self
Using Automata to Describe Self-Assembled Nanostructures (NJ), pp. 1–3.
CIAACIAA-2010-YuBI #automaton #multi #relational #string #verification
Relational String Verification Using Multi-track Automata (FY, TB, OHI), pp. 290–299.
DLTDLT-2010-Head #algebra #parallel
Using Light to Implement Parallel Boolean Algebra (TH), pp. 231–242.
ICALPICALP-v1-2010-BojanczykP #automaton #evaluation #nondeterminism #performance
Efficient Evaluation of Nondeterministic Automata Using Factorization Forests (MB, PP), pp. 515–526.
ICALPICALP-v2-2010-FontaineLV #algebra #approach #automaton
Automata for Coalgebras: An Approach Using Predicate Liftings (GF, RAL, YV), pp. 381–392.
LATALATA-2010-KasprzikK #learning #string
String Extension Learning Using Lattices (AK, TK), pp. 380–391.
LATALATA-2010-LetichevskySS #automaton #equivalence #finite #multi #problem #proving
The Equivalence Problem of Deterministic Multitape Finite Automata: A New Proof of Solvability Using a Multidimensional Tape (AAL, ASS, SKS), pp. 392–402.
LATALATA-2010-Penaloza #reasoning #standard
Using Sums-of-Products for Non-standard Reasoning (RP), pp. 488–499.
IFMIFM-2010-LanoR #model transformation #specification #uml #verification
Specification and Verification of Model Transformations Using UML-RSDS (KL, SKR), pp. 199–214.
SEFMSEFM-2010-GothelG #automation #invariant #network #realtime #towards #verification
Towards the Semi-Automatic Verification of Parameterized Real-Time Systems Using Network Invariants (TG, SG), pp. 310–314.
SEFMSEFM-2010-LindsayWY #assessment #behaviour #model checking #safety
Safety Assessment Using Behavior Trees and Model Checking (PAL, KW, NY), pp. 181–190.
SEFMSEFM-2010-ScannielloRT #architecture #empirical #evaluation #semantics
Architecture Recovery Using Latent Semantic Indexing and K-Means: An Empirical Evaluation (GS, MR, GT), pp. 103–112.
SEFMSEFM-2010-TudoseO #design pattern #execution #symbolic computation #testing
A Method for Testing Software Systems Based on State Design Pattern Using Symbolic Execution (CT, RO), pp. 113–117.
FLOPSFLOPS-2010-MorihataM #automation #parallel #quantifier #recursion
Automatic Parallelization of Recursive Functions Using Quantifier Elimination (AM, KM), pp. 321–336.
FLOPSFLOPS-2010-Sagonas #concurrent #detection #erlang #fault #source code #static analysis
Using Static Analysis to Detect Type Errors and Concurrency Defects in Erlang Programs (KFS), pp. 13–18.
HaskellHaskell-2010-Morris #case study #design #experience
Experience report: using hackage to inform language design (JGM), pp. 61–66.
ICFPICFP-2010-BradyH #domain-specific language #implementation #partial evaluation
Scrapping your inefficient engine: using partial evaluation to improve domain-specific language implementation (EB, KH), pp. 297–308.
ICFPICFP-2010-Pop #case study #experience #haskell #python
Experience report: Haskell as a reagent: results and observations on the use of Haskell in a python project (IP), pp. 369–374.
ICFPICFP-2010-ScottSGM #functional #industrial #programming
Using functional programming within an industrial product group: perspectives and perceptions (DJS, RS, TG, AM), pp. 87–92.
IFLIFL-2010-BjornsonTG #f# #user interface
Composing Reactive GUIs in F# Using WebSharper (JB, AT, AG), pp. 203–216.
LISPILC-2010-YuasaY #low level #validation
Validating low-level instructions for fixnums using BDDs (SY, MY), pp. 11–20.
AIIDEAIIDE-2010-GoldO #game studies
Using Machine Translation to Convert Between Difficulties in Rhythm Games (KG, AO).
AIIDEAIIDE-2010-HeckelY #behaviour #coordination #multi
Multi-Agent Coordination Using Dynamic Behavior-Based Subsumption (FWPH, GMY).
AIIDEAIIDE-2010-SharifiZS #behaviour #game studies #learning
Learning Companion Behaviors Using Reinforcement Learning in Games (AS, RZ, DS).
AIIDEAIIDE-2010-YoungbloodHHC #agile #behaviour #development #game studies
Rapid Development of Characters in FPS/3PS Games Using Visually-Specified Behavior-based Control (GMY, FWPH, DHH, AC).
CoGCIG-2010-BeaudryBCK #challenge #game studies #markov
Using Markov decision theory to provide a fair challenge in a roll-and-move board game (EB, FB, SC, FK), pp. 1–8.
CoGCIG-2010-BenbassatS #evolution #programming #search-based
Evolving Lose-Checkers players using genetic programming (AB, MS), pp. 30–37.
CoGCIG-2010-CardamoneLLB #algorithm #search-based
Searching for the optimal racing line using genetic algorithms (LC, DL, PLL, APB), pp. 388–394.
CoGCIG-2010-LevillainORB #experience #fuzzy
Characterizing player's experience from physiological signals using fuzzy decision trees (FL, JOO, MR, BBM), pp. 75–82.
CoGCIG-2010-MawhorterM #generative
Procedural level generation using occupancy-regulated extension (PAM, MM), pp. 351–358.
CoGCIG-2010-OnievaCLL #fuzzy #logic
Overtaking opponents with blocking strategies using fuzzy logic (EO, LC, DL, PLL), pp. 123–130.
CoGCIG-2010-RawalRM #behaviour
Constructing competitive and cooperative agent behavior using coevolution (AR, PR, RM), pp. 107–114.
CoGCIG-2010-SmithAHL #education
Using co-evolved RTS opponents to teach spatial tactics (GS, PA, RH, SJL), pp. 146–153.
FDGFDG-2010-BoyceB #game studies #learning #motivation
BeadLoom Game: using game elements to increase motivation and learning (AKB, TB), pp. 25–31.
FDGFDG-2010-SheldonPKOCTR #approach #game studies #learning #mobile #named #student
Weatherlings: a new approach to student learning using web-based mobile games (JS, JP, EK, JO, VHHC, PWT, LR), pp. 203–208.
FDGFDG-2010-TreanorMW #design #exclamation #game studies #logic #visual notation
Kaboom! is a many-splendored thing: an interpretation and design methodology for message-driven games using graphical logics (MT, MM, NWF), pp. 224–231.
CoGVS-Games-2010-YusoffCG #game studies #validation
Validation of Serious Games Attributes Using the Technology Acceptance Model (AY, RC, LG), pp. 45–51.
ICGTICGT-2010-Qayum #automation #graph transformation #refactoring #search-based
Automated Assistance for Search-Based Refactoring Using Unfolding of Graph Transformation Systems (FQ), pp. 407–409.
ICGTICGT-2010-SpicherMG #declarative
Declarative Mesh Subdivision Using Topological Rewriting in MGS (AS, OM, JLG), pp. 298–313.
ICGTICGT-2010-Zambon #abstraction #graph transformation #verification
Using Graph Transformations and Graph Abstractions for Software Verification (EZ), pp. 416–418.
CHICHI-2010-BillingsW #comprehension #online
Understanding dispute resolution online: using text to reflect personal and substantive issues in conflict (MB, LAW), pp. 1447–1456.
CHICHI-2010-ChangYM #testing #user interface
GUI testing using computer vision (THC, TY, RCM), pp. 1535–1544.
CHICHI-2010-ChevalierDBF #documentation #navigation
Using text animated transitions to support navigation in document histories (FC, PD, AB, JDF), pp. 683–692.
CHICHI-2010-DixonF #behaviour #implementation #interface #named #reverse engineering
Prefab: implementing advanced behaviors using pixel-based reverse engineering of interface structure (MD, JF), pp. 1525–1534.
CHICHI-2010-DixonPH #feedback #named #recognition #sketching
iCanDraw: using sketch recognition and corrective feedback to assist a user in drawing human faces (DD, MP, TH), pp. 897–906.
CHICHI-2010-DruinFHGH #interface #keyword
Children’s roles using keyword search interfaces at home (AD, EF, HH, EG, LH), pp. 413–422.
CHICHI-2010-HeerB #crowdsourcing #design #visual notation #visualisation
Crowdsourcing graphical perception: using mechanical turk to assess visualization design (JH, MB), pp. 203–212.
CHICHI-2010-HogganB #interface #multimodal #named #testing
Crosstrainer: testing the use of multimodal interfaces in situ (EEH, SAB), pp. 333–342.
CHICHI-2010-HuhNS #comprehension #reuse
Finding the lost treasure: understanding reuse of used computing devices (JH, KN, NS), pp. 1875–1878.
CHICHI-2010-LankST #documentation #fault #injection
Estimating residual error rate in recognized handwritten documents using artificial error injection (EL, RS, MAT), pp. 1–4.
CHICHI-2010-McGookinRB #graph #interactive
Clutching at straws: using tangible interaction to provide non-visual access to graphs (DKM, ER, SAB), pp. 1715–1724.
CHICHI-2010-SongGGF #interactive #mobile #named
MouseLight: bimanual interactions on digital paper using a pen and a spatially-aware mobile projector (HS, FG, TG, GWF), pp. 2451–2460.
CHICHI-2010-VertanenM #performance #speech
Speech dasher: fast writing using speech and gaze (KV, DJCM), pp. 595–598.
CHICHI-2010-Villamarin-SalomonB #behaviour
Using reinforcement to strengthen users’ secure behaviors (RVS, JCB), pp. 363–372.
CHICHI-2010-WeaverBSIL #analysis #artificial reality #empirical #order
An empirical task analysis of warehouse order picking using head-mounted displays (KW, HB, TS, HI, ML), pp. 1695–1704.
CHICHI-2010-WuDM #detection #enterprise #network #social
Detecting professional versus personal closeness using an enterprise social network site (AW, JMD, DRM), pp. 1955–1964.
CHICHI-2010-YukselDTS #human-computer #interface #multi #novel
A novel brain-computer interface using a multi-touch surface (BFY, MD, JT, AS), pp. 855–858.
CSCWCSCW-2010-BurkeKW #communication #social
Social use of computer-mediated communication by adults on the autism spectrum (MB, RK, DW), pp. 425–434.
SOFTVISSOFTVIS-2010-AnslowMNTB #evaluation #scalability #visualisation
User evaluation of polymetric views using a large visualization wall (CA, SM, JN, EDT, RB), pp. 25–34.
SOFTVISSOFTVIS-2010-LinTOB #comprehension #profiling #towards
Towards anomaly comprehension: using structural compression to navigate profiling call-trees (SL, FT, TCO, LJB), pp. 103–112.
SOFTVISSOFTVIS-2010-TrumperBD #comprehension #parallel #thread #visualisation
Understanding complex multithreaded software systems by using trace visualization (JT, JB, JD), pp. 133–142.
SOFTVISSOFTVIS-2010-Zeckzer #layout #matrix #visualisation
Visualizing software entities using a matrix layout (DZ), pp. 207–208.
CAiSECAiSE-2010-CastanoFM #semantics #variability #web
Dealing with Matching Variability of Semantic Web Data Using Contexts (SC, AF, SM), pp. 194–208.
CAiSECAiSE-2010-Paraszczak
The Influence of IT Systems on the Use of the Earth’s Resources (JRP), pp. 7–8.
EDOCEDOC-2010-AmarLCN #aspect-oriented #imperative #programming
Using Aspect-Oriented Programming to Trace Imperative Transformations (BA, HL, BC, CN), pp. 143–152.
EDOCEDOC-2010-EshuisN #framework #outsourcing #process
A Framework for Service Outsourcing Using Process Views (RE, AN), pp. 99–108.
EDOCEDOC-2010-QuartelSL #architecture #enterprise #modelling #requirements
IT Portfolio Valuation — Using Enterprise Architecture and Business Requirements Modeling (DACQ, MWAS, MML), pp. 3–13.
EDOCEDOC-2010-ZdravkovicI #approach #design #framework #modelling #ontology
A Model-Driven Approach for Designing E-Services Using Business Ontological Frameworks (JZ, TI), pp. 121–130.
ICEISICEIS-AIDSS-2010-AdamLDB #clustering #parallel #performance
Performance Gain for Clustering with Growing Neural Gas using Parallelization Methods (AA, SL, SD, WB), pp. 264–269.
ICEISICEIS-AIDSS-2010-FariaGSMM #automation #natural language #ontology
Using Natural Language Processing for Automatic Extraction of Ontology Instances (CGdF, RG, IS, MM, DM), pp. 278–283.
ICEISICEIS-AIDSS-2010-GerberKM #formal method #metamodelling #ontology #towards
Towards the Formalisation of the TOGAF Content Metamodel using Ontologies (AG, PK, AvdM), pp. 54–64.
ICEISICEIS-AIDSS-2010-GilS #implementation #performance #process
Using Key Performance Indicators to Facilitate the Strategy Implementation and Business Process Improvement in SME’s (MMG, DNS), pp. 193–197.
ICEISICEIS-AIDSS-2010-HaasMSD #information management #named
ConTask — Using Context-sensitive Assistance to Improve Task-oriented Knowledge Work (JH, HM, SS, AD), pp. 30–39.
ICEISICEIS-AIDSS-2010-MoriyasuYN #learning #self
Supervised Learning for Agent Positioning by using Self-organizing Map (KM, TY, HN), pp. 368–372.
ICEISICEIS-AIDSS-2010-SahaPMB #classification #clustering #difference #image
Improvement of Differential Crisp Clustering using ANN Classifier for Unsupervised Pixel Classification of Satellite Image (IS, DP, UM, SB), pp. 21–29.
ICEISICEIS-AIDSS-2010-SalasPRR #identification
Identification of Areas with Similar Wind Patterns using SOFM (JCPS, AAP, JJGdlR, JGR), pp. 40–45.
ICEISICEIS-AIDSS-2010-TomeAC #architecture #enterprise #experience #named
TREEAD — A Tool that Enables the Re-use of Experience in Enterprise Architecture Description (PT, LA, EC), pp. 332–343.
ICEISICEIS-AIDSS-2010-VialeBGP #approach #modelling #process #scalability #sequence
Modeling Large Scale Manufacturing Process from Timed Data — Using the TOM4L Approach and Sequence Alignment Information for Modeling STMicroelectronics’ Production Processes (PV, NB, MLG, JP), pp. 129–138.
ICEISICEIS-DISI-2010-BarczynskiFBS #adaptation #concept #information management #modelling #named
AdaptIE — Using Domain Language Concept to Enable Domain Experts in Modeling of Information Extraction Plans (WMB, FF, FB, DS), pp. 249–256.
ICEISICEIS-DISI-2010-FerrucciGOS #development
Estimating Software Development Effort using Tabu Search (FF, CG, RO, FS), pp. 236–241.
ICEISICEIS-DISI-2010-KasprzakBCO #effectiveness #enterprise #scalability
Access Rights in Enterprise Full-text Search — Searching Large Intranets Effectively using Virtual Terms (JK, MB, MC, TO), pp. 32–39.
ICEISICEIS-DISI-2010-LemosCV #query #relational #sql #xml
Using SQL/XML for Efficiently Translating Queries over XML View of Relational Data (FCL, CC, VMPV), pp. 269–274.
ICEISICEIS-DISI-2010-PanZH #library #open source #query #retrieval
An Open Source Software based Library Catalogue System using Soundexing Retrieval and Query Caching (ZP, YZ, JH), pp. 182–189.
ICEISICEIS-DISI-2010-PopovicCJ #process #quality
Absorption of Information Provided by Business Intelligence Systems — The Effect of Information Quality on the Use of Information in Business Processes (AP, PSC, JJ), pp. 176–181.
ICEISICEIS-DISI-2010-SchusterJS #web
Finding and Classifying Product Relationships using Information from the Public Web (DS, TMJ, AS), pp. 300–309.
ICEISICEIS-DISI-2010-SunyaevKDK #framework #health
Attack Scenarios for Possible Misuse of Peripheral Parts in the German Health Information Infrastructure (AS, AK, SD, HK), pp. 229–235.
ICEISICEIS-HCI-2010-AstolfiMSA #difference #enterprise #people #problem
Using Cultural Differences to Join People with Common Interests or Problems in Enterprise Environment (GA, VMAdM, MARS, JCA), pp. 192–197.
ICEISICEIS-HCI-2010-TranKVW #declarative #generative #modelling #user interface
Using Task and Data Models for user Interface Declarative Generation (VT, MK, JV, YW), pp. 155–160.
ICEISICEIS-ISAS-2010-GradlMWK #enterprise #modelling #network #process
Modeling ERP Business Processes using Layered Queueing Networks (SG, MM, HW, HK), pp. 255–260.
ICEISICEIS-J-2010-BottcherHM10a #xml
Using XML Schema Subtraction to Compress Electronic Payment Messages (SB, RH, CM), pp. 451–463.
ICEISICEIS-J-2010-Cruz-LaraOGBBC #chat #communication #interface #standard
A Chat Interface Using Standards for Communication and e-Learning in Virtual Worlds (SCL, TO, JG, NB, LB, JPC), pp. 541–554.
ICEISICEIS-J-2010-HernandesSF10a #collaboration #concept #ontology #taxonomy #visualisation
Using Visualization and a Collaborative Glossary to Support Ontology Conceptualization (EMH, DS, SF), pp. 90–103.
ICEISICEIS-J-2010-LopesVSS
Using Cases, Evidences and Context to Support Decision Making (ECL, VV, ACS, US), pp. 340–356.
ICEISICEIS-J-2010-UrbanoRO10a #metric
Extracting Trustworthiness Tendencies Using the Frequency Increase Metric (JU, APR, ECO), pp. 208–221.
ICEISICEIS-SAIC-2010-GoyalK #approach #automation #fuzzy #multi #set
Using Fuzzy Set Approach in Multi-attribute Automated Auctions (MLG, SK), pp. 81–85.
ICEISICEIS-SAIC-2010-Kristensen #abstraction #collaboration #message passing
Abstraction from Collaboration between Agents using Asynchronous Message-passing (BBK), pp. 86–92.
CIKMCIKM-2010-AjiWAG #analysis #modelling
Using the past to score the present: extending term weighting models through revision history analysis (AA, YW, EA, EG), pp. 629–638.
CIKMCIKM-2010-BatalH #classification #predict
Constructing classification features using minimal predictive patterns (IB, MH), pp. 869–878.
CIKMCIKM-2010-BenderskyCS #feedback #pseudo #query
Structural annotation of search queries using pseudo-relevance feedback (MB, WBC, DAS), pp. 1537–1540.
CIKMCIKM-2010-CarmanCHB #modelling #personalisation #query #topic #towards
Towards query log based personalization using topic models (MJC, FC, MH, MB), pp. 1849–1852.
CIKMCIKM-2010-CartrightALM #approximate #modelling #performance #query
Fast query expansion using approximations of relevance models (MAC, JA, VL, AM), pp. 1573–1576.
CIKMCIKM-2010-ChrysakisCP #algorithm #evaluation #network #peer-to-peer #query
Evaluation of top-k queries in peer-to-peer networks using threshold algorithms (IC, CC, DP), pp. 1305–1308.
CIKMCIKM-2010-DingSBVWLC #automation #detection #embedded #feature model #framework #image
Automatic detection of craters in planetary images: an embedded framework using feature selection and boosting (WD, TFS, LPCB, RV, YW, ZL, TC), pp. 749–758.
CIKMCIKM-2010-FengZXY #crawling #rank
Focused crawling using navigational rank (SF, LZ, YX, CY), pp. 1513–1516.
CIKMCIKM-2010-Grefenstette #semantics
Use of semantics in real life applications (GG), pp. 5–6.
CIKMCIKM-2010-GuptaGNM #query
Efficiently querying archived data using Hadoop (RG, HG, UN, MKM), pp. 1301–1304.
CIKMCIKM-2010-HarveyRC #modelling #ranking #social #topic
Ranking social bookmarks using topic models (MH, IR, MJC), pp. 1401–1404.
CIKMCIKM-2010-HuangSN #graph #query #refinement #word
Query model refinement using word graphs (YH, LS, JYN), pp. 1453–1456.
CIKMCIKM-2010-JindalLL #overview
Finding unusual review patterns using unexpected rules (NJ, BL, EPL), pp. 1549–1552.
CIKMCIKM-2010-KapteinSVK #ranking #wiki
Entity ranking using Wikipedia as a pivot (RK, PS, APdV, JK), pp. 69–78.
CIKMCIKM-2010-KohnckeB #category theory #documentation #wiki
Using Wikipedia categories for compact representations of chemical documents (BK, WTB), pp. 1809–1812.
CIKMCIKM-2010-KurashimaIIF #recommendation
Travel route recommendation using geotags in photo sharing sites (TK, TI, GI, KF), pp. 579–588.
CIKMCIKM-2010-LangMWL #concept #markov #random
Improved latent concept expansion using hierarchical markov random fields (HL, DM, BW, JTL), pp. 249–258.
CIKMCIKM-2010-LiLY #named #query #semantics
EntityEngine: answering entity-relationship queries using shallow semantics (XL, CL, CY), pp. 1925–1926.
CIKMCIKM-2010-LimNJLL #behaviour #detection #overview #rating
Detecting product review spammers using rating behaviors (EPL, VAN, NJ, BL, HWL), pp. 939–948.
CIKMCIKM-2010-LiQKG #automation #constraints #model merging
Automatic schema merging using mapping constraints among incomplete sources (XL, CQ, DK, SG), pp. 299–308.
CIKMCIKM-2010-MoonLCLZC #feedback #learning #online #ranking #realtime
Online learning for recency search ranking using real-time user feedback (TM, LL, WC, CL, ZZ, YC), pp. 1501–1504.
CIKMCIKM-2010-NguyenYLF #case study #experience #learning #multi #ranking
Experiences with using SVM-based learning for multi-objective ranking (LTN, WGY, RL, OF), pp. 1917–1920.
CIKMCIKM-2010-PobleteBMB #graph #image #query #retrieval #semantic gap #web
Visual-semantic graphs: using queries to reduce the semantic gap in web image retrieval (BP, BB, MM, JMB), pp. 1553–1556.
CIKMCIKM-2010-ShavittWW #peer-to-peer #recommendation
Building recommendation systems using peer-to-peer shared content (YS, EW, UW), pp. 1457–1460.
CIKMCIKM-2010-ShiN #dependence
Using various term dependencies according to their utilities (LS, JYN), pp. 1493–1496.
CIKMCIKM-2010-SotoudehA #detection #framework #induction
Partial drift detection using a rule induction framework (DS, AA), pp. 769–778.
CIKMCIKM-2010-VijayalakshmiMMDRM #algorithm #search-based
Intelligent sales forecasting engine using genetic algorithms (MV, BM, RM, AD, RR, KM), pp. 1669–1672.
CIKMCIKM-2010-WangL #clustering #documentation #incremental #summary
Document update summarization using incremental hierarchical clustering (DW, TL), pp. 279–288.
CIKMCIKM-2010-WhiteBD #predict
Predicting short-term interests using activity-based search context (RWW, PNB, STD), pp. 1009–1018.
CIKMCIKM-2010-WoodLH #concept #image
Searching consumer image collections using web-based concept expansion (MDW, ACL, SH), pp. 679–688.
CIKMCIKM-2010-XueCS #analysis #modelling
Modeling reformulation using passage analysis (XX, WBC, DAS), pp. 1497–1500.
CIKMCIKM-2010-XueHC #query #set
Improving verbose queries using subset distribution (XX, SH, WBC), pp. 1059–1068.
ECIRECIR-2010-AltingovdeAU #retrieval #xml
XML Retrieval Using Pruned Element-Index Files (ISA, DA, ÖU), pp. 306–318.
ECIRECIR-2010-AlyDHS #concept #modelling #retrieval
Beyond Shot Retrieval: Searching for Broadcast News Items Using Language Models of Concepts (RA, ARD, DH, AFS), pp. 241–252.
ECIRECIR-2010-CoxZFH #approximate #correctness #query
Improving Query Correctness Using Centralized Probably Approximately Correct (PAC) Search (IJC, JZ, RF, LKH), pp. 265–280.
ECIRECIR-2010-GoharianFYM #peer-to-peer #query
Enriching Peer-to-Peer File Descriptors Using Association Rules on Query Logs (NG, OF, WGY, JM), pp. 636–639.
ECIRECIR-2010-KabadjovSSPP #evaluation #summary #taxonomy
Enhancing N-Gram-Based Summary Evaluation Using Information Content and a Taxonomy (MAK, JS, RS, MP, BP), pp. 662–666.
ECIRECIR-2010-KimCLL #detection #effectiveness #image #named #sequence
BASIL: Effective Near-Duplicate Image Detection Using Gene Sequence Alignment (HsK, HWC, JL, DL), pp. 229–240.
ECIRECIR-2010-RamanUBB #documentation #feedback #on the #pseudo
On Improving Pseudo-Relevance Feedback Using Pseudo-Irrelevant Documents (KR, RU, PB, AB), pp. 573–576.
ECIRECIR-2010-UdupaK #analysis #canonical #correlation #equivalence
Transliteration Equivalence Using Canonical Correlation Analysis (RU, MMK), pp. 75–86.
ECIRECIR-2010-YangJX #enterprise
Using Weighted Tagging to Facilitate Enterprise Search (SY, JJ, YX), pp. 590–593.
ECIRECIR-2010-YinHL #information retrieval #ranking #wiki
Promoting Ranking Diversity for Biomedical Information Retrieval Using Wikipedia (XY, XH, ZL), pp. 495–507.
ECIRECIR-2010-ZucconA #documentation #probability #quantum #rank #ranking
Using the Quantum Probability Ranking Principle to Rank Interdependent Documents (GZ, LA), pp. 357–369.
ICMLICML-2010-BshoutyL #clustering #linear
Finding Planted Partitions in Nearly Linear Time using Arrested Spectral Clustering (NHB, PML), pp. 135–142.
ICMLICML-2010-Busa-FeketeK #performance
Fast boosting using adversarial bandits (RBF, BK), pp. 143–150.
ICMLICML-2010-CumminsN #named #recognition #visual notation
FAB-MAP: Appearance-Based Place Recognition and Mapping using a Learned Visual Vocabulary Model (MJC, PMN), pp. 3–10.
ICMLICML-2010-DruckM #generative #learning #modelling
High-Performance Semi-Supervised Learning using Discriminatively Constrained Generative Models (GD, AM), pp. 319–326.
ICMLICML-2010-KokD #learning #logic #markov #network
Learning Markov Logic Networks Using Structural Motifs (SK, PMD), pp. 551–558.
ICMLICML-2010-LayB #classification #predict
Supervised Aggregation of Classifiers using Artificial Prediction Markets (NL, AB), pp. 591–598.
ICMLICML-2010-PetrikTPZ #approximate #feature model #linear #markov #process #source code
Feature Selection Using Regularization in Approximate Linear Programs for Markov Decision Processes (MP, GT, RP, SZ), pp. 871–878.
ICMLICML-2010-Salakhutdinov #adaptation #learning
Learning Deep Boltzmann Machines using Adaptive MCMC (RS), pp. 943–950.
ICMLICML-2010-YuZ #coordination
Improved Local Coordinate Coding using Local Tangents (KY, TZ), pp. 1215–1222.
ICPRICPR-2010-AdluruTWD #re-engineering
Improving Undersampled MRI Reconstruction Using Non-local Means (GA, TT, RTW, EVRDB), pp. 4000–4003.
ICPRICPR-2010-Allili #retrieval
Wavelet-Based Texture Retrieval Using a Mixture of Generalized Gaussian Distributions (MSA), pp. 3143–3146.
ICPRICPR-2010-AlySTT #multi #recognition #robust #self #similarity
Robust Face Recognition Using Multiple Self-Organized Gabor Features and Local Similarity Matching (SKHA, AS, NT, RiT), pp. 2909–2912.
ICPRICPR-2010-AmanoK #predict
Appearance Control Using Projection with Model Predictive Control (TA, HK), pp. 2832–2835.
ICPRICPR-2010-AnYB #documentation #segmentation
Document Segmentation Using Pixel-Accurate Ground Truth (CA, DY, HSB), pp. 245–248.
ICPRICPR-2010-AriA #estimation #modelling #optimisation
Maximum Likelihood Estimation of Gaussian Mixture Models Using Particle Swarm Optimization (CA, SA), pp. 746–749.
ICPRICPR-2010-ArvanitopoulosBT #fault #linear #subclass
Subclass Error Correcting Output Codes Using Fisher’s Linear Discriminant Ratio (NA, DB, AT), pp. 2953–2956.
ICPRICPR-2010-AshrafSF #constraints #invariant #rank #recognition
View-Invariant Action Recognition Using Rank Constraint (NA, YS, HF), pp. 3611–3614.
ICPRICPR-2010-AslanAFRAX #3d #graph #segmentation
3D Vertebral Body Segmentation Using Shape Based Graph Cuts (MSA, AMA, AAF, HMR, BA, PX), pp. 3951–3954.
ICPRICPR-2010-AtmosukartoSH #3d #learning #programming #search-based
The Use of Genetic Programming for Learning 3D Craniofacial Shape Quantifications (IA, LGS, CH), pp. 2444–2447.
ICPRICPR-2010-AzarM #automation #image #network #sequence
Automated Tracking of the Carotid Artery in Ultrasound Image Sequences Using a Self Organizing Neural Network (JCA, HHM), pp. 2544–2547.
ICPRICPR-2010-BanimahdE #distance #image #segmentation #set
Lip Segmentation Using Level Set Method: Fusing Landmark Edge Distance and Image Information (SRB, HE), pp. 2432–2435.
ICPRICPR-2010-BassiouK #clustering #distance #word
Word Clustering Using PLSA Enhanced with Long Distance Bigrams (NB, CK), pp. 4226–4229.
ICPRICPR-2010-BayramogluA #image #recognition
Shape Index SIFT: Range Image Recognition Using Local Features (NB, AAA), pp. 352–355.
ICPRICPR-2010-BaysalKD
Recognizing Human Actions Using Key Poses (SB, MCK, PD), pp. 1727–1730.
ICPRICPR-2010-BenabbasLID #modelling #recognition
Action Recognition Using Direction Models of Motion (YB, AL, NI, CD), pp. 4295–4298.
ICPRICPR-2010-BicegoMMAF #2d #kernel #recognition
2D Shape Recognition Using Information Theoretic Kernels (MB, AFTM, VM, PMQA, MATF), pp. 25–28.
ICPRICPR-2010-BimboLMP #detection #geometry
Person Detection Using Temporal and Geometric Context with a Pan Tilt Zoom Camera (ADB, GL, IM, FP), pp. 3886–3889.
ICPRICPR-2010-BouchrikaCNMT #detection #people
Using Gait Features for Improving Walking People Detection (IB, JNC, MSN, RM, GT), pp. 3097–3100.
ICPRICPR-2010-BozkurtEEE #recognition #speech
Use of Line Spectral Frequencies for Emotion Recognition from Speech (EB, EE, ÇEE, ATE), pp. 3708–3711.
ICPRICPR-2010-BuloP #clustering #difference #probability
Probabilistic Clustering Using the Baum-Eagon Inequality (SRB, MP), pp. 1429–1432.
ICPRICPR-2010-CadavidA #automation #detection #modelling #visual notation
Exploiting Visual Quasi-periodicity for Automated Chewing Event Detection Using Active Appearance Models and Support Vector Machines (SC, MAM), pp. 1714–1717.
ICPRICPR-2010-CakirC #2d #feature model #image
Image Feature Extraction Using 2D Mel-Cepstrum (, AEÇ), pp. 674–677.
ICPRICPR-2010-CalderaraPC #people #similarity #statistics
Alignment-Based Similarity of People Trajectories Using Semi-directional Statistics (SC, AP, RC), pp. 4275–4278.
ICPRICPR-2010-CandamoGKG #detection
Detecting Wires in Cluttered Urban Scenes Using a Gaussian Model (JC, DBG, RK, SG), pp. 432–435.
ICPRICPR-2010-CaoZL #markov #random
Human Body Parts Tracking Using Sequential Markov Random Fields (XQC, JZ, ZQL), pp. 1759–1762.
ICPRICPR-2010-Carneiro #automation #case study #comparative #design #image
A Comparative Study on the Use of an Ensemble of Feature Extractors for the Automatic Design of Local Image Descriptors (GC), pp. 3356–3359.
ICPRICPR-2010-CeolinH #difference #gender #metric
Characterising Facial Gender Difference Using Fisher-Rao Metric (SC, ERH), pp. 4308–4311.
ICPRICPR-2010-ChenNW #estimation #multi
Actual Midline Estimation from Brain CT Scan Using Multiple Regions Shape Matching (WC, KN, KW), pp. 2552–2555.
ICPRICPR-2010-ChoiMLSBPF #3d #multi #re-engineering
3D Face Reconstruction Using a Single or Multiple Views (JC, GGM, YL, LS, ORPB, MP, TCF), pp. 3959–3962.
ICPRICPR-2010-ChoPPKKALL #hybrid #segmentation
Level-Set Segmentation of Brain Tumors Using a New Hybrid Speed Function (WC, JP, SYP, SHK, SWK, GA, MEL, GL), pp. 1545–1548.
ICPRICPR-2010-ChoudhuryM #standard
Color Constancy Using Standard Deviation of Color Channels (AC, GGM), pp. 1722–1726.
ICPRICPR-2010-ChowdhuryCGR #graph #video
Cell Tracking in Video Microscopy Using Bipartite Graph Matching (ASC, RC, MG, NR), pp. 2456–2459.
ICPRICPR-2010-CiompiPR #approach #random
A Meta-Learning Approach to Conditional Random Fields Using Error-Correcting Output Codes (FC, OP, PR), pp. 710–713.
ICPRICPR-2010-ColemanSG #architecture #feature model
Coarse Scale Feature Extraction Using the Spiral Architecture Structure (SAC, BWS, BG), pp. 2370–2373.
ICPRICPR-2010-CoutinhoFF #identification #parsing
One-Lead ECG-based Personal Identification Using Ziv-Merhav Cross Parsing (DPC, ALNF, MATF), pp. 3858–3861.
ICPRICPR-2010-DahmG #2d #3d #approach #invariant #novel #recognition
A Novel Pose Invariant Face Recognition Approach Using a 2D-3D Searching Strategy (ND, YG), pp. 3967–3970.
ICPRICPR-2010-DaubneyX #3d #image #refinement
Estimating 3D Human Pose from Single Images Using Iterative Refinement of the Prior (BD, XX), pp. 3440–3443.
ICPRICPR-2010-DehzangiMCL #classification #fuzzy
Framewise Phone Classification Using Weighted Fuzzy Classification Rules (OD, BM, EC, HL), pp. 4186–4189.
ICPRICPR-2010-DickinsonHA #multi #video
Segmenting Video Foreground Using a Multi-Class MRF (PD, AH, KA), pp. 1848–1851.
ICPRICPR-2010-DornaikaC #classification #detection #performance
Efficient Object Detection and Matching Using Feature Classification (FD, FC), pp. 3073–3076.
ICPRICPR-2010-DuboisPM #adaptation #analysis #component #composition
Decomposition of Dynamic Textures Using Morphological Component Analysis: A New Adaptative Strategy (SD, RP, MM), pp. 2258–2261.
ICPRICPR-2010-EkbalSG #feature model #multi #optimisation #recognition
Feature Selection Using Multiobjective Optimization for Named Entity Recognition (AE, SS, CSG), pp. 1937–1940.
ICPRICPR-2010-EklundAOYK #communication #interface #realtime
A Brain Computer Interface for Communication Using Real-Time fMRI (AE, MTA, HO, AY, HK), pp. 3665–3669.
ICPRICPR-2010-ElmezainAM #gesture #random #recognition #robust #segmentation
A Robust Method for Hand Gesture Segmentation and Recognition Using Forward Spotting Scheme in Conditional Random Fields (ME, AAH, BM), pp. 3850–3853.
ICPRICPR-2010-ErdoganG
Semi-blind Speech-Music Separation Using Sparsity and Continuity Priors (HE, EMG), pp. 4573–4576.
ICPRICPR-2010-ErgulA #classification #topic
Scene Classification Using Spatial Pyramid of Latent Topics (EE, NA), pp. 3603–3606.
ICPRICPR-2010-FischerKFB #documentation #modelling #word
HMM-based Word Spotting in Handwritten Documents Using Subword Models (AF, AK, VF, HB), pp. 3416–3419.
ICPRICPR-2010-FleckD #image #invariant
Using Local Affine Invariants to Improve Image Matching (DF, ZD), pp. 1844–1847.
ICPRICPR-2010-FornesELV #classification
Symbol Classification Using Dynamic Aligned Shape Descriptor (AF, SE, JL, EV), pp. 1957–1960.
ICPRICPR-2010-FouheySB #detection #image #multi
Multiple Plane Detection in Image Pairs Using J-Linkage (DFF, DS, AJB), pp. 336–339.
ICPRICPR-2010-FraundorferWP #locality #mobile #visual notation #word
Combining Monocular and Stereo Cues for Mobile Robot Localization Using Visual Words (FF, CW, MP), pp. 3927–3930.
ICPRICPR-2010-FujitaHSTS #detection #image
An Improved Method for Cirrhosis Detection Using Liver’s Ultrasound Images (YF, YH, MS, ST, IS), pp. 2294–2297.
ICPRICPR-2010-GajsekSM #canonical #correlation #multi #recognition
Multi-modal Emotion Recognition Using Canonical Correlations and Acoustic Features (RG, VS, FM), pp. 4133–4136.
ICPRICPR-2010-GhaeminiaSS #adaptation
Adaptive Motion Model for Human Tracking Using Particle Filter (MHG, AHS, SBS), pp. 2073–2076.
ICPRICPR-2010-Gonzalez-RubioC #multi #on the #string
On the Use of Median String for Multi-source Translation (JGR, FC), pp. 4328–4331.
ICPRICPR-2010-GrazziniDS #image #multi
Multichannel Image Regularisation Using Anisotropic Geodesic Filtering (JG, SED, PS), pp. 2664–2667.
ICPRICPR-2010-GriptonL #kernel #semistructured data
Kernel Domain Description with Incomplete Data: Using Instance-Specific Margins to Avoid Imputation (AG, WL), pp. 2921–2924.
ICPRICPR-2010-GuoBC #approach #learning
Support Vectors Selection for Supervised Learning Using an Ensemble Approach (LG, SB, NC), pp. 37–40.
ICPRICPR-2010-GuoH
Cascaded Background Subtraction Using Block-Based and Pixel-Based Codebooks (JMG, CSH), pp. 1373–1376.
ICPRICPR-2010-GuoM #detection
Action Detection in Crowded Videos Using Masks (PG, ZM), pp. 1767–1770.
ICPRICPR-2010-GuoMR #database #performance #recognition #scalability
Cross-Age Face Recognition on a Very Large Database: The Performance versus Age Intervals and Improvement Using Soft Biometric Traits (GG, GM, KR), pp. 3392–3395.
ICPRICPR-2010-HaberdarS #detection #framework #mobile #platform #refinement #video
Disparity Map Refinement for Video Based Scene Change Detection Using a Mobile Stereo Camera Platform (HH, SKS), pp. 3890–3893.
ICPRICPR-2010-HafnerGLUVW #classification #image
Endoscopic Image Classification Using Edge-Based Features (MH, AG, ML, AU, AV, FW), pp. 2724–2727.
ICPRICPR-2010-HarirchiRMDG #algorithm #detection
Two-Level Algorithm for MCs Detection in Mammograms Using Diverse-Adaboost-SVM (FH, PR, HAM, FD, MG), pp. 269–272.
ICPRICPR-2010-HassanAMHW #authentication #image #self
Secure Self-Recovery Image Authentication Using Randomly-Sized Blocks (AMH, AAH, BM, YMYH, MAAW), pp. 1445–1448.
ICPRICPR-2010-HassanCG #documentation #image #kernel #retrieval
Document Image Retrieval Using Feature Combination in Kernel Space (EH, SC, MG), pp. 2009–2012.
ICPRICPR-2010-HoriKY #generative #image #multi #sequence
Arbitrary Stereoscopic View Generation Using Multiple Omnidirectional Image Sequences (MH, MK, NY), pp. 286–289.
ICPRICPR-2010-Hotta #classification #visual notation #word
Scene Classification Using Local Co-occurrence Feature in Subspace Obtained by KPCA of Local Blob Visual Words (KH), pp. 4230–4233.
ICPRICPR-2010-HsinLLC #image
Image Inpainting Using Structure-Guided Priority Belief Propagation and Label Transformations (HFH, JJL, CSL, HYC), pp. 4492–4495.
ICPRICPR-2010-HuC #distance #retrieval #sketching #video
Motion-sketch Based Video Retrieval Using a Trellis Levenshtein Distance (RH, JPC), pp. 121–124.
ICPRICPR-2010-HuQHJT #recognition
Action Recognition Using Spatial-Temporal Context (QH, LQ, QH, SJ, QT), pp. 1521–1524.
ICPRICPR-2010-HuYLS #3d #locality #multi #novel
A Novel Facial Localization for Three-dimensional Face Using Multi-level Partition of Unity Implicits (YH, JY, WL, PS), pp. 682–685.
ICPRICPR-2010-IbrahimKKG #analysis #online #verification
On-Line Signature Verification Using 1-D Velocity-Based Directional Analysis (MTI, MJK, MAK, LG), pp. 3830–3833.
ICPRICPR-2010-InoueSSF #feature model #modelling
High-Level Feature Extraction Using SIFT GMMs and Audio Models (NI, TS, KS, SF), pp. 3220–3223.
ICPRICPR-2010-IzadiS #automation #detection #image #segmentation
Automatic Building Detection in Aerial Images Using a Hierarchical Feature Based Image Segmentation (MI, PS), pp. 472–475.
ICPRICPR-2010-JabidKC #classification #gender
Gender Classification Using Local Directional Pattern (LDP) (TJ, MHK, OC), pp. 2162–2165.
ICPRICPR-2010-JagerPCC #3d #analysis
Dual Channel Colocalization for Cell Cycle Analysis Using 3D Confocal Microscopy (SJ, KP, CSCD, MCC), pp. 2580–2583.
ICPRICPR-2010-JakkojuKJ #classification #performance
Fast and Spatially-Smooth Terrain Classification Using Monocular Camera (CJ, KMK, CVJ), pp. 4060–4063.
ICPRICPR-2010-JammalamadakaJKM #matrix
Discriminative Basis Selection Using Non-negative Matrix Factorization (AJ, SJ, SK, BSM), pp. 1533–1536.
ICPRICPR-2010-JiaM #design
Classifying Textile Designs Using Bags of Shapes (WJ, SJM), pp. 294–297.
ICPRICPR-2010-Jiang #3d #re-engineering
3D Human Pose Reconstruction Using Millions of Exemplars (HJ), pp. 1674–1677.
ICPRICPR-2010-JiI #recognition
Using Moments on Spatiotemporal Plane for Facial Expression Recognition (YJ, KI), pp. 3806–3809.
ICPRICPR-2010-JoshiWL #semantics
Suggesting Songs for Media Creation Using Semantics (DJ, MDW, JL), pp. 3208–3211.
ICPRICPR-2010-KalafatlarY #3d #segmentation
3D Articulated Shape Segmentation Using Motion Information (EK, YY), pp. 3595–3598.
ICPRICPR-2010-KanetoNB #estimation #realtime
Real-Time User Position Estimation in Indoor Environments Using Digital Watermarking for Audio Signals (RK, YN, NB), pp. 97–100.
ICPRICPR-2010-KayaCC #design
Designing a Pattern Stabilization Method Using Scleral Blood Vessels for Laser Eye Surgery (AK, ABC, HBC), pp. 698–701.
ICPRICPR-2010-KeustermansMVS #automation #identification #modelling
Automated Cephalometric Landmark Identification Using Shape and Local Appearance Models (JK, WM, DV, PS), pp. 2464–2467.
ICPRICPR-2010-KhosrowabadiQWA #bound #detection #recognition #self
EEG-based Emotion Recognition Using Self-Organizing Map for Boundary Detection (RK, HCQ, AW, KKA), pp. 4242–4245.
ICPRICPR-2010-KhwajaAG #invariant #recognition #representation
Illumination and Expression Invariant Recognition Using SSIM Based Sparse Representation (AAK, AA, RG), pp. 4028–4031.
ICPRICPR-2010-KimL #markov #monte carlo #optimisation #random
Continuous Markov Random Field Optimization Using Fusion Move Driven Markov Chain Monte Carlo Technique (WK, KML), pp. 1364–1367.
ICPRICPR-2010-KimYOC #optimisation #video
Recovery Video Stabilization Using MRF-MAP Optimization (SWK, KMY, SO, JYC), pp. 2804–2807.
ICPRICPR-2010-KitaW #clustering #image
Binarization of Color Characters in Scene Images Using k-means Clustering and Support Vector Machines (KK, TW), pp. 3183–3186.
ICPRICPR-2010-KohGC #locality #robust
A Robust Iris Localization Method Using an Active Contour Model and Hough Transform (JK, VG, VC), pp. 2852–2856.
ICPRICPR-2010-KootstraBK #segmentation #symmetry
Using Symmetry to Select Fixation Points for Segmentation (GK, NB, DK), pp. 3894–3897.
ICPRICPR-2010-KrauszB #recognition
Action Recognition in Videos Using Nonnegative Tensor Factorization (BK, CB), pp. 1763–1766.
ICPRICPR-2010-KrishnanS #detection
Detecting Group Turn Patterns in Conversations Using Audio-Video Change Scale-Space (RK, SS), pp. 137–140.
ICPRICPR-2010-KryszczukHS #orthogonal #predict
Direct Printability Prediction in VLSI Using Features from Orthogonal Transforms (KK, PH, RS), pp. 2764–2767.
ICPRICPR-2010-KumarCCAPH #classification #complexity
Heart Murmur Classification Using Complexity Signatures (DK, PC, RC, MA, RPP, JH), pp. 2564–2567.
ICPRICPR-2010-KumeTSY #estimation #image #parametricity #video
Extrinsic Camera Parameter Estimation Using Video Images and GPS Considering GPS Positioning Accuracy (HK, TT, TS, NY), pp. 3923–3926.
ICPRICPR-2010-KusakunniranWZL #multi #recognition
Multi-view Gait Recognition Based on Motion Regression Using Multilayer Perceptron (WK, QW, JZ, HL), pp. 2186–2189.
ICPRICPR-2010-LawalAM #abduction #classification #network #recognition
Recognition of Handwritten Arabic (Indian) Numerals Using Freeman’s Chain Codes and Abductive Network Classifiers (IAL, REAA, SAM), pp. 1884–1887.
ICPRICPR-2010-LeeCL #algorithm #data-driven #graph #markov #monte carlo
A Graph Matching Algorithm Using Data-Driven Markov Chain Monte Carlo Sampling (JL, MC, KML), pp. 2816–2819.
ICPRICPR-2010-LeeHH #automation #gender #recognition
Automatic Gender Recognition Using Fusion of Facial Strips (PHL, JYH, YPH), pp. 1140–1143.
ICPRICPR-2010-LeeP #information retrieval
Tracking Hand Rotation and Grasping from an IR Camera Using Cylindrical Manifold Embedding (CSL, SWP), pp. 2612–2615.
ICPRICPR-2010-Lei #distance #verification
Combining the Likelihood and the Kullback-Leibler Distance in Estimating the Universal Background Model for Speaker Verification Using SVM (ZL), pp. 4553–4556.
ICPRICPR-2010-Liao
Region Description Using Extended Local Ternary Patterns (WHL), pp. 1003–1006.
ICPRICPR-2010-LiGW #adaptation #image #reduction
Adaptive Enhancement with Speckle Reduction for SAR Images Using Mirror-Extended Curvelet and PSO (YL, HG, QW), pp. 4520–4523.
ICPRICPR-2010-LiIK #recognition #robust #word
Robust Face Recognition Using Block-Based Bag of Words (ZL, JiI, MK), pp. 1285–1288.
ICPRICPR-2010-LiLD #learning
Learning GMM Using Elliptically Contoured Distributions (BL, WL, LD), pp. 511–514.
ICPRICPR-2010-LinW #detection #framework #platform
Detecting Moving Objects Using a Camera on a Moving Platform (CCL, MW), pp. 460–463.
ICPRICPR-2010-LiuA #learning #semantics
Learning Scene Semantics Using Fiedler Embedding (JL, SA), pp. 3627–3630.
ICPRICPR-2010-LiuCLL #automation #locality #parametricity
A Lip Contour Extraction Method Using Localized Active Contour Model with Automatic Parameter Selection (XL, YmC, ML, HL), pp. 4332–4335.
ICPRICPR-2010-LiuLH #learning #multi #representation
Semi-supervised Trajectory Learning Using a Multi-Scale Key Point Based Trajectory Representation (YL, XL, WH), pp. 3525–3528.
ICPRICPR-2010-LiuR
Estimating Nonrigid Shape Deformation Using Moments (WL, ER), pp. 185–188.
ICPRICPR-2010-LiuS #similarity #visual notation
Visual Tracking Using Sparsity Induced Similarity (HL, FS), pp. 1702–1705.
ICPRICPR-2010-LiuWWY #adaptation #linear
Pan-Sharpening Using an Adaptive Linear Model (LL, YW, YW, HY), pp. 4512–4515.
ICPRICPR-2010-LiZ
One-Shot Scanning Using a Color Stripe Pattern (RL, HZ), pp. 1666–1669.
ICPRICPR-2010-LiZZ #detection #invariant
Abandoned Objects Detection Using Double Illumination Invariant Foreground Masks (XL, CZ, DZ), pp. 436–439.
ICPRICPR-2010-LlobetCPA #finite #transducer
OCR Post-processing Using Weighted Finite-State Transducers (RL, JRCN, JCPC, JA), pp. 2021–2024.
ICPRICPR-2010-LutfYL #identification
Offline Arabic Handwriting Identification Using Language Diacritics (ML, XY, HL), pp. 1912–1915.
ICPRICPR-2010-LvBYD #verification #visual notation
Off-Line Signature Verification Using Graphical Model (HL, XB, WY, JD), pp. 3784–3788.
ICPRICPR-2010-Machucho-CadenaB #3d #algebra #geometry #re-engineering
3D Reconstruction of Tumors for Applications in Laparoscopy Using Conformal Geometric Algebra (RMC, EBC), pp. 2532–2535.
ICPRICPR-2010-MalgireddyCSGM #framework #gesture #modelling #recognition
A Framework for Hand Gesture Recognition and Spotting Using Sub-gesture Modeling (MRM, JJC, SS, VG, DM), pp. 3780–3783.
ICPRICPR-2010-MansouriAT #video
MPEG-2 Video Watermarking Using Pattern Consideration (AM, AMA, FTA), pp. 2428–2431.
ICPRICPR-2010-MatsukawaK #recognition
Action Recognition Using Three-Way Cross-Correlations Feature of Local Moton Attributes (TM, TK), pp. 1731–1734.
ICPRICPR-2010-MaTW #analysis #random
Nonlinear Blind Source Separation Using Slow Feature Analysis with Random Features (KM, QT, JW), pp. 830–833.
ICPRICPR-2010-MehmoodN #detection #kernel
Anomaly Detection for Longwave FLIR Imagery Using Kernel Wavelet-RX (AM, NMN), pp. 1385–1388.
ICPRICPR-2010-MonzoAAM #case study #comparative #locality #recognition
A Comparative Study of Facial Landmark Localization Methods for Face Recognition Using HOG descriptors (DM, AA, AA, JMM), pp. 1330–1333.
ICPRICPR-2010-MoriMY #recognition
Gait Recognition Using Period-Based Phase Synchronization for Low Frame-Rate Videos (AM, YM, YY), pp. 2194–2197.
ICPRICPR-2010-MoroTU #detection
Detection of Moving Objects with Removal of Cast Shadows and Periodic Changes Using Stereo Vision (AM, KT, KU), pp. 328–331.
ICPRICPR-2010-MozaffariBA #classification #gender #geometry #image
Gender Classification Using Single Frontal Image Per Person: Combination of Appearance and Geometric Based Features (SM, HB, RA), pp. 1192–1195.
ICPRICPR-2010-NacereddineTZH #image #retrieval
Shape-Based Image Retrieval Using a New Descriptor Based on the Radon and Wavelet Transforms (NN, ST, DZ, LH), pp. 1997–2000.
ICPRICPR-2010-NasonovK #performance
Fast Super-Resolution Using Weighted Median Filtering (AVN, ASK), pp. 2230–2233.
ICPRICPR-2010-NishidaKOH #algorithm #visual notation
Visual Tracking Algorithm Using Pixel-Pair Feature (KN, TK, YO, MH), pp. 1808–1811.
ICPRICPR-2010-NordbergZ #2d #geometry #image #multi #segmentation
Multibody Motion Segmentation Using the Geometry of 6 Points in 2D Images (KN, VZ), pp. 1783–1787.
ICPRICPR-2010-NymanHA #constraints #framework #multi #platform
Multi-camera Platform Calibration Using Multi-linear Constraints (PN, AH, ), pp. 53–56.
ICPRICPR-2010-OhH #learning #process #video
Unsupervised Learning of Activities in Video Using Scene Context (SO, AH), pp. 3579–3582.
ICPRICPR-2010-OliverTLM #automation #segmentation #set
Automatic Diagnosis of Masses by Using Level set Segmentation and Shape Description (AO, AT, XL, JM), pp. 2528–2531.
ICPRICPR-2010-OzdemirA #classification #image #representation
Image Classification Using Subgraph Histogram Representation (, SA), pp. 1112–1115.
ICPRICPR-2010-PaivaJT #analysis #image
Using Sequential Context for Image Analysis (ARCP, EJ, TT), pp. 2800–2803.
ICPRICPR-2010-PaivaT #detection #image
Detection of Salient Image Points Using Principal Subspace Manifold Structure (ARCP, TT), pp. 1389–1392.
ICPRICPR-2010-PanMSHN #adaptation #estimation #video
A Dual Pass Video Stabilization System Using Iterative Motion Estimation and Adaptive Motion Smoothing (PP, AM, JS, YH, SN), pp. 2298–2301.
ICPRICPR-2010-PapalazarouRW #detection #estimation #image #multi
Multiple Model Estimation for the Detection of Curvilinear Segments in Medical X-ray Images Using Sparse-plus-dense-RANSAC (CP, PMJR, PHNdW), pp. 2484–2487.
ICPRICPR-2010-PapariCP #detection #novel
Steerable Filtering Using Novel Circular Harmonic Functions with Application to Edge Detection (GP, PC, NP), pp. 3947–3950.
ICPRICPR-2010-ParkKS #detection #markov #modelling #recognition #visual notation
Visual Recognition of Types of Structural Corridor Landmarks Using Vanishing Points Detection and Hidden Markov Models (YP, SSK, IHS), pp. 3292–3295.
ICPRICPR-2010-PatrauceanGC #identification #invariant
Bubble Tag Identification Using an Invariant — Under — Perspective Signature (VP, PG, JC), pp. 408–411.
ICPRICPR-2010-PaulaOBS #recognition
Forest Species Recognition Using Color-Based Features (PLdP, LSO, AdSBJ, RS), pp. 4178–4181.
ICPRICPR-2010-PengSGS #classification #documentation
Text Separation from Mixed Documents Using a Tree-Structured Classifier (XP, SS, VG, RS), pp. 241–244.
ICPRICPR-2010-PengYZC #classification #segmentation
Retinal Blood Vessels Segmentation Using the Radial Projection and Supervised Classification (QP, XY, LZ, YmC), pp. 1489–1492.
ICPRICPR-2010-PhamTN #bound #segmentation #similarity
Bounding-Box Based Segmentation with Single Min-cut Using Distant Pixel Similarity (VQP, KT, TN), pp. 4420–4423.
ICPRICPR-2010-PiroonratanaWUALC #identification #morphism #nondeterminism #ranking #symmetry
Identification of Ancestry Informative Markers from Chromosome-Wide Single Nucleotide Polymorphisms Using Symmetrical Uncertainty Ranking (TP, WW, TU, AA, CL, NC), pp. 2448–2451.
ICPRICPR-2010-PlumptonKLJ #classification #linear #online
On-Line fMRI Data Classification Using Linear and Ensemble Classifiers (COP, LIK, DEJL, SJJ), pp. 4312–4315.
ICPRICPR-2010-PrumVO #online #recognition #word
On-Line Handwriting Word Recognition Using a Bi-character Model (SP, MV, JMO), pp. 2700–2703.
ICPRICPR-2010-QiaoC #3d #analysis #component #modelling #statistics
Statistical Texture Modeling for Medical Volume Using Generalized N-Dimensional Principal Component Analysis Method and 3D Volume Morphing (XQ, YWC), pp. 2488–2491.
ICPRICPR-2010-QuelhasMC #3d #quantifier
3D Cell Nuclei Fluorescence Quantification Using Sliding Band Filter (PQ, AMM, ACC), pp. 2508–2511.
ICPRICPR-2010-QuWL #difference #image #recognition
Action Recognition Using Space-Time Shape Difference Images (HQ, LW, CL), pp. 3661–3664.
ICPRICPR-2010-RahtuSH #random
Compressing Sparse Feature Vectors Using Random Ortho-Projections (ER, MS, JH), pp. 1397–1400.
ICPRICPR-2010-RantosonSFM #3d #metric
Non Contact 3D Measurement Scheme for Transparent Objects Using UV Structured light (RR, CS, DF, FM), pp. 1646–1649.
ICPRICPR-2010-RaraAESF #re-engineering #recognition
Face Recognition at-a-Distance Using Texture, Dense- and Sparse-Stereo Reconstruction (HMR, AMA, SYE, TLS, AAF), pp. 1221–1224.
ICPRICPR-2010-ReckyL #detection
Windows Detection Using K-means in CIE-Lab Color Space (MR, FL), pp. 356–359.
ICPRICPR-2010-RoyM #video
Crossmodal Matching of Speakers Using Lip and Voice Features in Temporally Non-overlapping Audio and Video Streams (AR, SM), pp. 4504–4507.
ICPRICPR-2010-RoySB #game studies #image #segmentation
Segmentation of Unideal Iris Images Using Game Theory (KR, CYS, PB), pp. 2844–2847.
ICPRICPR-2010-SadekAMS #automation #realtime #recognition
Real-Time Automatic Traffic Accident Recognition Using HFG (SS, AAH, BM, US), pp. 3348–3351.
ICPRICPR-2010-SagheerHNS #recognition #word
Holistic Urdu Handwritten Word Recognition Using Support Vector Machine (MWS, CLH, NN, CYS), pp. 1900–1903.
ICPRICPR-2010-SanromaAS #approach #graph
A Discrete Labelling Approach to Attributed Graph Matching Using SIFT Features (GS, RA, FS), pp. 954–957.
ICPRICPR-2010-SantoshWL #visual notation
Using Spatial Relations for Graphical Symbol Description (KCS, LW, BL), pp. 2041–2044.
ICPRICPR-2010-SarginGMR
Object Tracking with Ratio Cycles Using Shape and Appearance Cues (MES, PG, BSM, KR), pp. 3649–3652.
ICPRICPR-2010-SatakeM #multi
Stereo-Based Multi-person Tracking Using Overlapping Silhouette Templates (JS, JM), pp. 4304–4307.
ICPRICPR-2010-ScharfenbergerCF #artificial reality #predict
Driver Body-Height Prediction for an Ergonomically Optimized Ingress Using a Single Omnidirectional Camera (CS, SC, GF), pp. 298–301.
ICPRICPR-2010-SenechalBP #automation #detection
Automatic Facial Action Detection Using Histogram Variation Between Emotional States (TS, KB, LP), pp. 3752–3755.
ICPRICPR-2010-SenkoK #clustering #pattern matching #pattern recognition #recognition
Pattern Recognition Method Using Ensembles of Regularities Found by Optimal Partitioning (OVS, AVK), pp. 2957–2960.
ICPRICPR-2010-SeppkeDH #detection #energy #image #symmetry
Using Snakes with Asymmetric Energy Terms for the Detection of Varying-Contrast Edges in SAR Images (BS, LSDF, NH), pp. 2792–2795.
ICPRICPR-2010-SeppkeDHW #equation #multi #parametricity #performance
Fast Derivation of Soil Surface Roughness Parameters Using Multi-band SAR Imagery and the Integral Equation Model (BS, LSDF, JAH, FW), pp. 3931–3934.
ICPRICPR-2010-SfikasHN #analysis #clustering #multi
Multiple Atlas Inference and Population Analysis Using Spectral Clustering (GS, CH, CN), pp. 2500–2503.
ICPRICPR-2010-ShamiliBA #detection #distributed #machine learning #mobile
Malware Detection on Mobile Devices Using Distributed Machine Learning (ASS, CB, TA), pp. 4348–4351.
ICPRICPR-2010-ShiSG #documentation #image
Removing Rule-Lines from Binary Handwritten Arabic Document Images Using Directional Local Profile (ZS, SS, VG), pp. 1916–1919.
ICPRICPR-2010-ShobeirinejadG #classification #gender
Gender Classification Using Interlaced Derivative Patterns (AS, YG), pp. 1509–1512.
ICPRICPR-2010-SilveiraM #image
Boosting Alzheimer Disease Diagnosis Using PET Images (MS, JSM), pp. 2556–2559.
ICPRICPR-2010-Simsekli #automation #classification #music
Automatic Music Genre Classification Using Bass Lines (US), pp. 4137–4140.
ICPRICPR-2010-SirmacekU #detection #network
Road Network Extraction Using Edge Detection and Spatial Voting (BS, ), pp. 3113–3116.
ICPRICPR-2010-SmeetsFHVS #3d #approach #composition #invariant #modelling #recognition
Fusion of an Isometric Deformation Modeling Approach Using Spectral Decomposition and a Region-Based Approach Using ICP for Expression-Invariant 3D Face Recognition (DS, TF, JH, DV, PS), pp. 1172–1175.
ICPRICPR-2010-SoldeaESU #approach #image #segmentation
Segmentation of Anatomical Structures in Brain MR Images Using Atlases in FSL — A Quantitative Approach (OS, AE, DFS, DU, , AE, MGU, ZF, MC), pp. 2592–2595.
ICPRICPR-2010-SoltanaACA #adaptation #algorithm #search-based
Adaptive Feature and Score Level Fusion Strategy Using Genetic Algorithms (WBS, MA, LC, CBA), pp. 4316–4319.
ICPRICPR-2010-SrikrishnanC #analysis #linear
Crowd Motion Analysis Using Linear Cyclic Pursuit (VS, SC), pp. 3340–3343.
ICPRICPR-2010-StarkWP #representation #speech
Single Channel Speech Separation Using Source-Filter Representation (MS, MW, FP), pp. 826–829.
ICPRICPR-2010-SteerAM #data fusion #recognition
Audio-Visual Data Fusion Using a Particle Filter in the Application of Face Recognition (MAS, AAH, BM), pp. 4392–4395.
ICPRICPR-2010-SulicPKK #distributed #random #reduction
Dimensionality Reduction for Distributed Vision Systems Using Random Projection (VS, JP, MK, SK), pp. 380–383.
ICPRICPR-2010-SultaniC #detection
Abnormal Traffic Detection Using Intelligent Driver Model (WS, JYC), pp. 324–327.
ICPRICPR-2010-SuryanarayanSM #recognition
Dynamic Hand Pose Recognition Using Depth Data (PS, AS, DM), pp. 3105–3108.
ICPRICPR-2010-SuzukiIAT #algorithm #estimation #image
A Scale Estimation Algorithm Using Phase-Based Correspondence Matching for Electron Microscope Images (AS, KI, TA, RT), pp. 2420–2423.
ICPRICPR-2010-SzeptyckiACZGS #2d #composition
Partial Face Biometry Using Shape Decomposition on 2D Conformal Maps of Faces (PS, MA, LC, WZ, XDG, DS), pp. 1505–1508.
ICPRICPR-2010-TabiaCDV #3d #retrieval
3D-Shape Retrieval Using Curves and HMM (HT, OC, MD, JPV), pp. 3147–3150.
ICPRICPR-2010-Tagawa #eye tracking #modelling #statistics
Depth Perception Model Based on Fixational Eye Movements Using Bayesian Statistical Inference (NT), pp. 1662–1665.
ICPRICPR-2010-TangHLL #retrieval
A Person Retrieval Solution Using Finger Vein Patterns (DT, BH, RL, WL), pp. 1306–1309.
ICPRICPR-2010-TanveerI #approach
A Bayesian Approach to Face Hallucination Using DLPP and KRR (MT, NI), pp. 2154–2157.
ICPRICPR-2010-TaxHVP #clustering #concept #detection #learning #multi
The Detection of Concept Frames Using Clustering Multi-instance Learning (DMJT, EH, MFV, MP), pp. 2917–2920.
ICPRICPR-2010-TekeT #image #multi #strict
Multi-spectral Satellite Image Registration Using Scale-Restricted SURF (MT, AT), pp. 2310–2313.
ICPRICPR-2010-ThiCZWS #modelling #recognition
Weakly Supervised Action Recognition Using Implicit Shape Models (THT, LC, JZ, LW, SS), pp. 3517–3520.
ICPRICPR-2010-TorrentPLFSMP #approach #detection
Detecting Faint Compact Sources Using Local Features and a Boosting Approach (AT, MP, XL, JF, JRSS, JM, JMP), pp. 4613–4616.
ICPRICPR-2010-TrummerMD #online #optimisation
Online Next-Best-View Planning for Accuracy Optimization Using an Extended E-Criterion (MT, CM, JD), pp. 1642–1645.
ICPRICPR-2010-TsaiHTC #detection #pipes and filters #predict #scalability
Learning-Based Vehicle Detection Using Up-Scaling Schemes and Predictive Frame Pipeline Structures (YMT, KYH, CCT, LGC), pp. 3101–3104.
ICPRICPR-2010-TumaIP #classification #kernel #set
Hydroacoustic Signal Classification Using Kernel Functions for Variable Feature Sets (MT, CI, MP), pp. 1011–1014.
ICPRICPR-2010-TurkerKG #classification #image #network
Classification of Polarimetric SAR Images Using Evolutionary RBF Networks (TI, SK, MG), pp. 4324–4327.
ICPRICPR-2010-UbukataTMU #multi #segmentation
Multi-object Segmentation in a Projection Plane Using Subtraction Stereo (TU, KT, AM, KU), pp. 3296–3299.
ICPRICPR-2010-Velasco-ForeroA #modelling #statistics
Statistical Shape Modeling Using Morphological Representations (SVF, JA), pp. 3537–3540.
ICPRICPR-2010-VenkateshaT #process #recognition
Human Activity Recognition Using Local Shape Descriptors (SV, MT), pp. 3704–3707.
ICPRICPR-2010-VenkateshJ
Human Electrocardiogram for Biometrics Using DTW and FLDA (NV, SJ), pp. 3838–3841.
ICPRICPR-2010-VenkateshKM #3d #approach #recognition
Resampling Approach to Facial Expression Recognition Using 3D Meshes (YVV, AAK, OVRM), pp. 3772–3775.
ICPRICPR-2010-Wang #detection #documentation #recognition
Document Logo Detection and Recognition Using Bayesian Model (HW), pp. 1961–1964.
ICPRICPR-2010-WangAYL #bottom-up #estimation #learning #top-down
Combined Top-Down/Bottom-Up Human Articulated Pose Estimation Using AdaBoost Learning (SW, HA, TY, SL), pp. 3670–3673.
ICPRICPR-2010-WangC10a #3d #estimation
Articulated Human Body: 3D Pose Estimation Using a Single Camera (ZW, RC), pp. 3768–3771.
ICPRICPR-2010-WangH #multi #random #recognition
Cancelable Face Recognition Using Random Multiplicative Transform (YW, DH), pp. 1261–1264.
ICPRICPR-2010-WangH10a #case study #classification #design #multi #prototype
A Study of Designing Compact Recognizers of Handwritten Chinese Characters Using Multiple-Prototype Based Classifiers (YW, QH), pp. 1872–1875.
ICPRICPR-2010-WangJMS #process
Decoding Finger Flexion from Electrocorticographic Signals Using a Sparse Gaussian Process (ZW, QJ, KJM, GS), pp. 3756–3759.
ICPRICPR-2010-WangLL #3d #linear #programming
Monocular 3D Tracking of Deformable Surfaces Using Linear Programming (CW, XL, YL), pp. 1710–1713.
ICPRICPR-2010-WangLS #documentation #identification
Noise Tolerant Script Identification of Printed Oriental and English Documents Using a Downgraded Pixel Density Feature (NW, LL, CYS), pp. 2037–2040.
ICPRICPR-2010-WangM #learning #order #process
Gaussian Process Learning from Order Relationships Using Expectation Propagation (RW, SJM), pp. 605–608.
ICPRICPR-2010-WangSLYB #classification
Shape Classification Using Tree -Unions (BW, WS, WL, XY, XB), pp. 983–986.
ICPRICPR-2010-WartakB #estimation
Optical Flow Estimation Using Diffusion Distances (SW, AGB), pp. 189–192.
ICPRICPR-2010-WatanabeNKI #estimation
Estimation of Non-rigid Surface Deformation Using Developable Surface Model (YW, TN, TK, MI), pp. 197–200.
ICPRICPR-2010-WijnhovenW #detection #performance #probability
Fast Training of Object Detection Using Stochastic Gradient Descent (RGJW, PHNdW), pp. 424–427.
ICPRICPR-2010-WuHCCT #detection #interactive #visual notation
Human Smoking Event Detection Using Visual Interaction Clues (PW, JWH, JCC, SCC, SYT), pp. 4344–4347.
ICPRICPR-2010-WuLW #image #learning #retrieval
Enhancing SVM Active Learning for Image Retrieval Using Semi-supervised Bias-Ensemble (JW, ML, CLW), pp. 3175–3178.
ICPRICPR-2010-XiaLH #mining #modelling
Mining Exemplars for Object Modelling Using Affinity Propagation (SX, JL, ERH), pp. 918–921.
ICPRICPR-2010-Xie #segmentation #set
Level Set Based Segmentation Using Local Feature Distribution (XX), pp. 2780–2783.
ICPRICPR-2010-XuHW #similarity
Rectifying Non-Euclidean Similarity Data Using Ricci Flow Embedding (WX, ERH, RCW), pp. 3324–3327.
ICPRICPR-2010-YaegashiY #kernel #learning #multi #recognition
Geotagged Photo Recognition Using Corresponding Aerial Photos with Multiple Kernel Learning (KY, KY), pp. 3272–3275.
ICPRICPR-2010-YamanakaSS #adaptation #image
Adaptive Image Projection onto Non-planar Screen Using Projector-Camera Systems (TY, FS, JS), pp. 307–310.
ICPRICPR-2010-YamauchiBS #3d #modelling
3D Human Body Modeling Using Range Data (KY, BB, HS), pp. 3476–3479.
ICPRICPR-2010-YangSZ #analysis #multi #recognition
Face Recognition Using a Multi-manifold Discriminant Analysis Method (WY, CS, LZ), pp. 527–530.
ICPRICPR-2010-YoonK #recognition
Human Action Recognition Using Segmented Skeletal Features (SMY, AK), pp. 3740–3743.
ICPRICPR-2010-ZareG #multi #pattern matching #pattern recognition #recognition
Pattern Recognition Using Functions of Multiple Instances (AZ, PDG), pp. 1092–1095.
ICPRICPR-2010-ZhangGC #detection #invariant
Water Reflection Detection Using a Flip Invariant Shape Detector (HZ, XG, XC), pp. 633–636.
ICPRICPR-2010-ZhangHTW #3d #evaluation #framework #modelling
3D Model Based Vehicle Tracking Using Gradient Based Fitness Evaluation under Particle Filter Framework (ZZ, KH, TT, YW), pp. 1771–1774.
ICPRICPR-2010-ZhangK10a #detection #graph
Text Detection Using Edge Gradient and Graph Spectrum (JZ, RK), pp. 3979–3982.
ICPRICPR-2010-ZhangSSQ #keyword
Improved Mandarin Keyword Spotting Using Confusion Garbage Model (SZ, ZS, QS, YQ), pp. 3700–3703.
ICPRICPR-2010-ZhangWB #classification
Age Classification Base on Gait Using HMM (DZ, YW, BB), pp. 3834–3837.
ICPRICPR-2010-ZhangZ #analysis #canonical #correlation #image
Exposing Digital Image Forgeries by Using Canonical Correlation Analysis (CZ, HZ), pp. 838–841.
ICPRICPR-2010-ZhangZZZ #classification #kernel #metric
Time Series Classification Using Support Vector Machine with Gaussian Elastic Metric Kernel (DZ, WZ, DZ, HZ), pp. 29–32.
ICPRICPR-2010-ZhouK #identification #image #locality
Personal Identification from Iris Images Using Localized Radon Transform (YZ, AK), pp. 2840–2843.
ICPRICPR-2010-ZhouWH #2d #3d #realtime
Real-Time 3D Face and Facial Action Tracking Using Extended 2D+3D AAMs (MZ, YW, XH), pp. 3963–3966.
ICPRICPR-2010-ZhuHYL #behaviour #learning #metric #prototype #recognition
Prototype Learning Using Metric Learning Based Behavior Recognition (PZ, WH, CY, LL), pp. 2604–2607.
ICPRICPR-2010-ZouH #3d #performance
Recovering 3D Shape Using an Improved Fast Marching Method (CZ, ERH), pp. 1678–1681.
ICPRICPR-2010-ZwengK #behaviour #image #multi #recognition #sequence
Unexpected Human Behavior Recognition in Image Sequences Using Multiple Features (AZ, MK), pp. 368–371.
KDDKDD-2010-AbeMPRJTBACKDG #learning #optimisation
Optimizing debt collections using constrained reinforcement learning (NA, PM, CP, CKR, DLJ, VPT, JJB, GFA, BRC, MK, MD, TG), pp. 75–84.
KDDKDD-2010-ChuaL #generative #modelling #network #online #rating #trust
Trust network inference for online rating data using generative models (FCTC, EPL), pp. 889–898.
KDDKDD-2010-LiuMTLL #learning #metric #optimisation
Semi-supervised sparse metric learning using alternating linearization optimization (WL, SM, DT, JL, PL), pp. 1139–1148.
KDDKDD-2010-MaxwellBR #graph #memory management #mining
Diagnosing memory leaks using graph mining on heap dumps (EKM, GB, NR), pp. 115–124.
KDDKDD-2010-PrestonBKSF #clustering #constraints
Redefining class definitions using constraint-based clustering: an application to remote sensing of the earth’s surface (DP, CEB, RK, DSM, MAF), pp. 823–832.
KDDKDD-2010-RothBDFHLLMM #graph #social
Suggesting friends using the implicit social graph (MR, ABD, DD, GF, IH, AL, NL, YM, RM), pp. 233–242.
KDDKDD-2010-SatoN #modelling #process #topic
Topic models with power-law using Pitman-Yor process (IS, HN), pp. 673–682.
KDDKDD-2010-YangO #feature model #predict #probability
Feature selection for support vector regression using probabilistic prediction (JBY, CJO), pp. 343–352.
KDDKDD-2010-YeLCJ #automation #categorisation #clustering
Automatic malware categorization using cluster ensemble (YY, TL, YC, QJ), pp. 95–104.
KDDKDD-2010-ZhengSTLLCH #data mining #mining #network
Using data mining techniques to address critical information exchange needs in disaster affected public-private networks (LZ, CS, LT, TL, SL, SCC, VH), pp. 125–134.
KDIRKDIR-2010-BallesterosBG #dependence #parsing
Text Simplification using Dependency Parsing for Spanish (MB, SB, PG), pp. 330–335.
KDIRKDIR-2010-BallesterosHFG #dependence #parsing
Giving Shape to an N-version Dependency Parser — Improving Dependency Parsing Accuracy for Spanish using Maltparser (MB, JH, VF, PG), pp. 336–341.
KDIRKDIR-2010-Bernard #formal method #modelling #reuse
Characterisation, Formalisation and Reuse of Knowledge — Models, Methods and Application Cases (AB), p. 13.
KDIRKDIR-2010-CamposMO #random #recognition
Recognition of Gene/Protein Names using Conditional Random Fields (DC, SM, JLO), pp. 275–280.
KDIRKDIR-2010-Ghosh #locality #mining #modelling #multi #predict #scalability
Actionable Mining of Large, Multi-relational Data using Localized Predictive Models (JG), pp. 9–10.
KDIRKDIR-2010-HelouA #metric #multi #semantics
Semantic Measures based on Wordnet using Multiple Information Sources (MAH, AA), pp. 500–503.
KDIRKDIR-2010-JedrzejczakW #generative #query
Integrated Candidate Generation in Processing Batches of Frequent Itemset Queries using Apriori (PJ, MW), pp. 487–490.
KDIRKDIR-2010-KrainesGHMT #generative
Generating Literature-based Knowledge Discoveries in Life Sciences using Relationship Associations (SBK, WG, DH, HM, TT), pp. 35–44.
KDIRKDIR-2010-MollerEDS #automation #ontology #recognition
Automatic Spatial Plausibility Checks for Medical Object Recognition Results using a Spatio-anatomical Ontology (MM, PE, AD, DS), pp. 5–13.
KDIRKDIR-2010-Studer #lightweight #modelling #process #semantics #web
Process-oriented Semantic Web Search — Using Lightweight Semantic Models for Supporting the Search Process (RS), p. 7.
KDIRKDIR-2010-TsengPF #classification #markov
The Typhoon Track Classification using Tri-plots and Markov Chain (JCHT, HKKP, CF), pp. 364–369.
KDIRKDIR-2010-ZhangUC #information management
A Comprehensive Solution to Procedural Knowledge Acquisition using Information Extraction (ZZ, VSU, FC), pp. 432–437.
KEODKEOD-2010-CasasCC #fibonacci #modelling #representation #specification #towards
Towards a Representation of Enviromental Models using Specification and Description Language — From the Fibonacci Model to a Wildfire Model (PFiC, MC, JC), pp. 343–346.
KEODKEOD-2010-ChatterjeeB #documentation #network #random #summary
Single Document Text Summarization using Random Indexing and Neural Networks (NC, AB), pp. 171–176.
KEODKEOD-2010-ChatterjeeKRD #automation #classification #email #ontology
Automatic Email Classification using user Preference Ontology (NC, SK, SR, VD), pp. 165–170.
KEODKEOD-2010-EynardMM #analysis #on the #ontology
On the Use of Correspondence Analysis to Learn Seed Ontologies from Text (DE, FM, MM), pp. 430–437.
KEODKEOD-2010-KamelR #ontology #parallel
Ontology Building using Parallel Enumerative Structures (MK, BR), pp. 276–281.
KEODKEOD-2010-NairM #multi #network
Informledge System — A Modified Knowledge Network with Autonomous Nodes using Multi-lateral Links (TRGN, MM), pp. 351–354.
KEODKEOD-2010-TiwariAMK #mobile #web #web service
Dynamic Discovery of Web Services using Mobile Agents (GT, RA, SM, DSK), pp. 497–500.
KEODKEOD-2010-ValienteRV #modelling #owl #semantics
Defining the Semantics of It Service Management Models using OWL and SWRL (MCV, DR, CVC), pp. 378–381.
KEODKEOD-2010-YunSNYKK #framework #platform #semantics #web #workflow
Improving the Workflow of Semantic Web Portals using M/R in Cloud Platform (SY, MS, HN, SKY, HK, HGK), pp. 485–488.
KEODKEOD-2010-ZakraouiZ #interactive #programming #set #web
Integrating Context Knowledge in user Interaction using Answer Set Programming for Enhancing Web Accessibility (JZ, WLZ), pp. 459–466.
KMISKMIS-2010-BornerL #enterprise
Using Role-plays to Acquire Process-oriented Knowledge in Enterprises (RB, ML), pp. 149–156.
KMISKMIS-2010-BrockV #analysis #data flow #semantics
A Method for Interoperability between Structured Data Sources using Semantic Analysis (DLB, JV), pp. 234–239.
KMISKMIS-2010-Caballero-GilCM #analysis #clustering #information management #simulation
Knowledge Management using Clusters in VANETs — Description, Simulation and Analysis (CCG, PCG, JMG), pp. 170–175.
KMISKMIS-2010-KrainesG #ontology #reuse #semantics
Supporting Reuse of Knowledge of Failures through Ontology-based Semantic Search (SBK, WG), pp. 164–169.
KMISKMIS-2010-SrivastavaS #composition #game studies #validation
The Validation of a Dynamic Service Composition Model using a Simple Game (AS, PGS), pp. 260–266.
RecSysRecSys-2010-HannonBS #collaboration #recommendation #twitter
Recommending twitter users to follow using content and collaborative filtering approaches (JH, MB, BS), pp. 199–206.
RecSysRecSys-2010-LeeB #collaboration #process #recommendation #self
Using self-defined group activities for improvingrecommendations in collaborative tagging systems (DHL, PB), pp. 221–224.
RecSysRecSys-2010-VasukiNLD #network #recommendation
Affiliation recommendation using auxiliary networks (VV, NN, ZL, ISD), pp. 103–110.
SEKESEKE-2010-ArrudaCD #detection #framework
A Framework for Detecting Code Piracy Using Class Structure (PA, PC, DD), pp. 559–564.
SEKESEKE-2010-FagundesS #estimation #fault
Software Defect Estimation using Support Vector Regression (RAdAF, RMCRdS), pp. 265–268.
SEKESEKE-2010-JuniorLAMW #impact analysis #learning #multi
Impact Analysis Model for Brasília Area Control Center using Multi-agent System with Reinforcement Learning (ACdAJ, AFL, CRFdA, ACMAdM, LW), pp. 499–502.
SEKESEKE-2010-KhoshgoftaarG #machine learning #metric #novel #re-engineering
Software Engineering with Computational Intelligence and Machine Learning A Novel Software Metric Selection Technique Using the Area Under ROC Curves (TMK, KG), pp. 203–208.
SEKESEKE-2010-KhounSiavashB #metric #ontology #semantics
Using the whole structure of ontology for semantic relatedness measurement (EK, ABD), pp. 79–83.
SEKESEKE-2010-MarcaciniR #clustering #incremental #topic
Incremental Construction of Topic Hierarchies using Hierarchical Term Clustering (RMM, SOR), p. 553.
SEKESEKE-2010-MoshirpourMF #behaviour #detection #distributed #specification
Detecting Emergent Behavior in Distributed Systems Using Scenario-Based Specifications (MM, AM, BHF), pp. 349–354.
SEKESEKE-2010-PaikariRR #case study #comparative #fault #predict #reasoning
A Comparative Study of Attribute Weighting Techniques for Software Defect Prediction Using Case-based Reasoning (EP, MMR, GR), pp. 380–386.
SEKESEKE-2010-Radlinski #development #predict #quality
Software Development Effort and Quality Prediction Using Bayesian Nets and small Local Qualitative Data (LR), pp. 113–116.
SEKESEKE-2010-RodriguesVZ #automation #modelling #product line #testing
PLeTs-Test Automation using Software Product Lines and Model Based Testing (EdMR, LDV, AFZ), pp. 483–488.
SEKESEKE-2010-ShewchukG #experience #functional #maintenance #testing #user interface
Experience with Maintenance of a Functional GUI Test Suite using IBM Rational Functional Tester (YS, VG), pp. 489–494.
SEKESEKE-2010-VilaMF #adaptation #analysis #qvt #strict
Using QVT for adapting question analysis to restricted domain QA systems (KV, JNM, AF), pp. 335–338.
SEKESEKE-2010-Wang #black box #parametricity #testing
Reducing Black-box Test Suite Using Input Parameter Relationships (LW), pp. 180–185.
SEKESEKE-2010-XuanJRYL #automation #classification #debugging
Automatic Bug Triage using Semi-Supervised Text Classification (JX, HJ, ZR, JY, ZL), pp. 209–214.
SIGIRSIGIR-2010-ChandarC
Diversification of search results using webgraphs (PC, BC), pp. 869–870.
SIGIRSIGIR-2010-ClementsSVR #behaviour #predict
Using flickr geotags to predict user travel behaviour (MC, PS, APdV, MJTR), pp. 851–852.
SIGIRSIGIR-2010-DuZYCC #query #recognition
Using search session context for named entity recognition in query (JD, ZZ, JY, YC, ZC), pp. 765–766.
SIGIRSIGIR-2010-GaoCWZ #learning #rank
Learning to rank only using training data from related domain (WG, PC, KFW, AZ), pp. 162–169.
SIGIRSIGIR-2010-GoharianM #classification #query
Context aware query classification using dynamic query window and relationship net (NG, SSRM), pp. 723–724.
SIGIRSIGIR-2010-KimC #documentation #multi #ranking
Ranking using multiple document types in desktop search (JK, WBC), pp. 50–57.
SIGIRSIGIR-2010-LeeLSR #precise #retrieval #sentiment
High precision opinion retrieval using sentiment-relevance flows (SWL, JTL, YIS, HCR), pp. 817–818.
SIGIRSIGIR-2010-LopesR #health #information retrieval #precise
Using local precision to compare search engines in consumer health information retrieval (CTL, CR), pp. 835–836.
SIGIRSIGIR-2010-MeijR #modelling #query #wiki
Supervised query modeling using wikipedia (EM, MdR), pp. 875–876.
SIGIRSIGIR-2010-MerhavMBYF #recognition #relational
Incorporating global information into named entity recognition systems using relational context (YM, FdSM, DB, WGY, OF), pp. 883–884.
SIGIRSIGIR-2010-MojdehC #consistency #learning
Semi-supervised spam filtering using aggressive consistency learning (MM, GVC), pp. 751–752.
SIGIRSIGIR-2010-RothK #modelling #retrieval
Cross-language retrieval using link-based language models (BR, DK), pp. 773–774.
SIGIRSIGIR-2010-ShtokKC #modelling #predict #statistics
Using statistical decision theory and relevance models for query-performance prediction (AS, OK, DC), pp. 259–266.
SIGIRSIGIR-2010-WhiteC
Exploring the use of labels to shortcut search trails (RWW, RC), pp. 811–812.
SIGIRSIGIR-2010-WooLLSR #ranking #retrieval
Achieving high accuracy retrieval using intra-document term ranking (HWW, JTL, SWL, YIS, HCR), pp. 885–886.
SIGIRSIGIR-2010-YiLWR #video
Contextual video advertising system using scene information inferred from video scripts (BJY, JTL, HWW, HCR), pp. 771–772.
SIGIRSIGIR-2010-YinHZL #approach #modelling #wiki
A survival modeling approach to biomedical search result diversification using wikipedia (XY, XH, XZ, ZL), pp. 901–902.
SIGIRSIGIR-2010-ZhangWL #interactive #multi #named #summary #visualisation
VisualSum: an interactive multi-document summarization system using visualization (YZ, DW, TL), pp. 857–858.
ECMFAECMFA-2010-JohannesF #abstraction #composition #framework #modelling #network #reuse
Adding Abstraction and Reuse to a Network Modelling Tool Using the Reuseware Composition Framework (JJ, MAF), pp. 132–143.
ECMFAECMFA-2010-KessentiniBSB #diagrams #heuristic #petri net #sequence chart
Example-Based Sequence Diagrams to Colored Petri Nets Transformation Using Heuristic Search (MK, AB, HAS, MB), pp. 156–172.
MODELSMoDELS-v1-2010-KolovosRAPPB #emf #model transformation
Taming EMF and GMF Using Model Transformation (DSK, LMR, SbA, RFP, FACP, GB), pp. 211–225.
MODELSMoDELS-v1-2010-NoyritGTS #consistency #modelling #multi #uml
Consistent Modeling Using Multiple UML Profiles (FN, SG, FT, BS), pp. 392–406.
MODELSMoDELS-v2-2010-GerthKLE #detection #precise #process
Precise Detection of Conflicting Change Operations Using Process Model Terms (CG, JMK, ML, GE), pp. 93–107.
MODELSMoDELS-v2-2010-LanoR #model transformation #modelling #slicing #uml
Slicing of UML Models Using Model Transformations (KL, SKR), pp. 228–242.
MODELSMoDELS-v2-2010-LoniewskiIA #development #modelling #overview #requirements
A Systematic Review of the Use of Requirements Engineering Techniques in Model-Driven Development (GL, EI, SA), pp. 213–227.
SPLCSPLC-2010-Elizondo #composition #development
Using Composition Connectors to Support Software Asset Development (PVE), pp. 496–497.
SPLCSPLC-2010-GadelhaCGCFL #approach #component #product line
An Approach for Developing Component-Based Groupware Product Lines Using the Groupware Workbench (BG, EC, MAG, AC, HF, CJPdL), pp. 446–450.
SPLCSPLC-2010-GhanamM #execution #feature model #modelling #testing
Linking Feature Models to Code Artifacts Using Executable Acceptance Tests (YG, FM), pp. 211–225.
SPLCSPLC-2010-HartmannKMRTY #component #integration
Using MDA for Integration of Heterogeneous Components in Software Supply Chains (HH, MK, AAJM, JR, TT, TYH), pp. 361–376.
ECOOPECOOP-2010-DhooliaMSS #debugging
Debugging Model-Transformation Failures Using Dynamic Tainting (PD, SM, VSS, SS), pp. 26–51.
ECOOPECOOP-2010-GilL #java #source code
The Use of Overloading in Java Programs (JYG, KL), pp. 529–551.
ECOOPECOOP-2010-ZaeemK #alloy #contract #data type
Contract-Based Data Structure Repair Using Alloy (RNZ, SK), pp. 577–598.
OOPSLAOOPSLA-2010-Kell #adaptation #assembly #component #interface
Component adaptation and assembly using interface relations (SK), pp. 322–340.
OOPSLAOOPSLA-2010-LernerVG #aspect-oriented #javascript
Supporting dynamic, third-party code customizations in JavaScript using aspects (BSL, HV, DG), pp. 361–376.
AdaEuropeAdaEurope-2010-AnderssonP #ada #algorithm #implementation #manycore #realtime #scheduling
Implementing Multicore Real-Time Scheduling Algorithms Based on Task Splitting Using Ada 2012 (BA, LMP), pp. 54–67.
AdaEuropeAdaEurope-2010-PastorASA #approach #modelling #realtime #sequence #towards
Towards the Definition of a Pattern Sequence for Real-Time Applications Using a Model-Driven Engineering Approach (JAP, DA, PS, ), pp. 167–180.
AdaEuropeAdaEurope-2010-White #ada #hardware #scheduling
Using Hardware Support for Scheduling with Ada (RW), pp. 125–138.
LOPSTRLOPSTR-2010-VoetsS #analysis #logic programming #source code
Non-termination Analysis of Logic Programs Using Types (DV, DDS), pp. 133–148.
PADLPADL-2010-DieterleHL #composition
Skeleton Composition Using Remote Data (MD, TH, RL), pp. 73–87.
PEPMPEPM-2010-Henglein #algebra #equivalence #lazy evaluation #optimisation #relational
Optimizing relational algebra operations using generic equivalence discriminators and lazy products (FH), pp. 73–82.
PEPMPEPM-2010-HofmannK #detection #morphism #problem #towards
I/O guided detection of list catamorphisms: towards problem specific use of program templates in IP (MH, EK), pp. 93–100.
PLDIPLDI-2010-BaekC #approximate #energy #framework #named #programming
Green: a framework for supporting energy-conscious programming using controlled approximation (WB, TMC), pp. 198–209.
PLDIPLDI-2010-WestbrookRIYAT #java #multi #named #programming
Mint: Java multi-stage programming using weak separability (EMW, MR, JI, YY, TA, WT), pp. 400–411.
POPLPOPL-2010-DiasR #automation #declarative #generative
Automatically generating instruction selectors using declarative machine descriptions (JD, NR), pp. 403–416.
PPDPPPDP-2010-BrabrandT #ambiguity #pattern matching #regular expression #string
Typed and unambiguous pattern matching on strings using regular expressions (CB, JGT), pp. 243–254.
QAPLQAPL-2010-AltisenLM #automaton #calculus #component #evaluation #interface #performance #realtime
Performance Evaluation of Components Using a Granularity-based Interface Between Real-Time Calculus and Timed Automata (KA, YL, MM), pp. 16–33.
SASSAS-2010-BrauerK #abstraction #automation
Automatic Abstraction for Intervals Using Boolean Formulae (JB, AK), pp. 167–183.
SASSAS-2010-Lesens #question #static analysis #why
Using Static Analysis in Space: Why Doing so? (DL), pp. 51–70.
AdaSIGAda-2010-BradleyPZ #ada #development #realtime
Real-time system development in ada using LEGO® mindstorms® NXT (PJB, JAdlP, JZ), pp. 37–40.
AdaSIGAda-2010-JemliR #compilation #problem #static analysis
A methodology for avoiding known compiler problems using static analysis (MJ, JPR), pp. 23–30.
AdaSIGAda-2010-Pettit #ada #concurrent #design #embedded #realtime #uml
Designing real-time, concurrent, and embedded software systems using UML and Ada (RGPI), pp. 7–8.
AdaSIGAda-2010-Rosen #object-oriented #reliability
Use of object oriented technologies in high reliability system (JPR), pp. 3–4.
RERE-2010-BittnerRGW #multi #requirements
Manufacturer-Supplier Requirements Synchronization Using Exchange Containers and Multi-Level Systems (MB, MOR, HG, MW), pp. 325–330.
RERE-2010-ClementsB #architecture
Using Business Goals to Inform a Software Architecture (PCC, LB), pp. 69–78.
RERE-2010-LockerbieBMBE #analysis #concept #modelling #simulation
Using i* Modelling as a Bridge between Air Traffic Management Operational Concepts and Agent-based Simulation Analysis (JL, DB, NAMM, HAPB, MHCE), pp. 351–356.
RERE-2010-SalinesiMDD #constraints #integer #requirements #reuse #theorem proving
Using Integer Constraint Solving in Reuse Based Requirements Engineering (CS, RM, DD, OD), pp. 243–251.
RERE-2010-SawahMR #elicitation #modelling #overview #perspective #requirements
Using Cognitive Mapping to Elicit Modelling Requirements: An Overview (SES, AM, MR), pp. 357–363.
RERE-2010-SeyffGG #information management
Using Contextual Information to Guide on-site Analysts (NS, FG, PG), pp. 397–398.
RERE-2010-SeyffGM #mobile #tool support
Using Mobile RE Tools to Give End-Users Their Own Voice (NS, FG, NAMM), pp. 37–46.
RERE-2010-Stanbridge #analysis #test coverage #testing #user interface
Retrospective Requirement Analysis Using Code Coverage of GUI Driven System Tests (CS), pp. 411–412.
RERE-2010-WnukCR #reduction #requirements #towards
Guiding Requirements Scoping Using ROI: Towards Agility, Openness and Waste Reduction (KW, DC, BR), pp. 409–410.
REFSQREFSQ-2010-ProynovaPWW #perspective #requirements #research
Use of Personal Values in Requirements Engineering — A Research Preview (RP, BP, AW, TW), pp. 17–22.
ASEASE-2010-KimYS #debugging #memory management #model checking #named
JRF-E: using model checking to give advice on eliminating memory model-related bugs (KK, TYK, BAS), pp. 215–224.
ASEASE-2010-NgocO #fault
Checking roundoff errors using counterexample-guided narrowing (DTBN, MO), pp. 301–304.
ASEASE-2010-RatanotayanonCS #feature model #transitive
Using transitive changesets to support feature location (SR, HJC, SES), pp. 341–344.
ASEASE-2010-ShangAH #case study #experience #mining #pipes and filters #repository #scalability #tool support
An experience report on scaling tools for mining software repositories using MapReduce (WS, BA, AEH), pp. 275–284.
ASEASE-2010-TrezentosLO #dependence #named #optimisation #problem #pseudo
Apt-pbo: solving the software dependency problem using pseudo-boolean optimization (PT, IL, ALO), pp. 427–436.
FSEFSE-2010-ErnstA #type system
Building and using pluggable type systems (MDE, MA), pp. 375–376.
FSEFSE-2010-HalleB #analysis #interactive #message passing
Realizability analysis for message-based interactions using shared-state projections (SH, TB), pp. 27–36.
FSEFSE-2010-KanadeARR #dependence #representation #testing
Representation dependence testing using program inversion (AK, RA, SKR, GR), pp. 277–286.
FSEFSE-2010-MyersS #dynamic analysis #ide #user interface
Using dynamic analysis to create trace-focused user interfaces for IDEs (DM, MADS), pp. 367–368.
FSEFSE-2010-Shokry #behaviour #synthesis #towards
Towards behavior elaboration and synthesis using modes (HS), pp. 349–352.
ICSEICSE-2010-AdamsJH #identification
Identifying crosscutting concerns using historical code changes (BA, ZMJ, AEH), pp. 305–314.
ICSEICSE-2010-FritzM #developer
Using information fragments to answer the questions developers ask (TF, GCM), pp. 175–184.
ICSEICSE-2010-GorschekTA #concept #empirical #object-oriented #scalability
A large-scale empirical study of practitioners’ use of object-oriented concepts (TG, EDT, LA), pp. 115–124.
ICSEICSE-2010-JilaniMLGM #invariant
Using invariant functions and invariant relations to compute loop functions (LLJ, OM, AL, WG, AM), pp. 317–318.
ICSEICSE-2010-KrkaBPGM #behaviour #execution #invariant #model inference
Using dynamic execution traces and program invariants to enhance behavioral model inference (IK, YB, DP, JG, NM), pp. 179–182.
ICSEICSE-2010-LewisW #fault #monitoring #runtime
Runtime repair of software faults using event-driven monitoring (CL, JW), pp. 275–280.
ICSEICSE-2010-LimQF #named #network #scalability #social
StakeNet: using social networks to analyse the stakeholders of large-scale software projects (SLL, DQ, AF), pp. 295–304.
ICSEICSE-2010-Marinho #consistency #modelling #ocl #product line
A proposal for consistency checking in dynamic software product line models using OCL (FGM), pp. 333–334.
ICSEICSE-2010-NitaN #adaptation #api #source code
Using twinning to adapt programs to alternative APIs (MN, DN), pp. 205–214.
ICSEICSE-2010-ReisnerSMFP #behaviour #configuration management #evaluation #symbolic computation
Using symbolic evaluation to understand behavior in configurable software systems (ER, CS, KKM, JSF, AP), pp. 445–454.
ICSEICSE-2010-SallehMGB #empirical #programming
An empirical study of the effects of conscientiousness in pair programming using the five-factor personality model (NS, EM, JCG, GSJB), pp. 577–586.
ICSEICSE-2010-SharpdD #re-engineering #research
Using ethnographic methods in software engineering research (HS, CRBdS, YD), pp. 491–492.
ICSEICSE-2010-TreudeS #developer
Awareness 2.0: staying aware of projects, developers and tasks using dashboards and feeds (CT, MADS), pp. 365–374.
SACSAC-2010-AlmeidaYA10a #principle
Filtering spams using the minimum description length principle (TAA, AY, JA), pp. 1854–1858.
SACSAC-2010-BechikhSG #mobile #multi #optimisation
Searching for knee regions in multi-objective optimization using mobile reference points (SB, LBS, KG), pp. 1118–1125.
SACSAC-2010-BettiniDS #implementation #product line
Implementing software product lines using traits (LB, FD, IS), pp. 2096–2102.
SACSAC-2010-BicegoLOP #array #classification #modelling #topic
Expression microarray classification using topic models (MB, PL, BO, AP), pp. 1516–1520.
SACSAC-2010-BrogleBB #multi #quality
Quality of service for multicasting using NICE (MB, SB, TB), pp. 670–677.
SACSAC-2010-BucchiaroneGFT #experience #natural language #requirements #scalability #set
An experience in using a tool for evaluating a large set of natural language requirements (AB, SG, AF, GT), pp. 281–286.
SACSAC-2010-ChokshiB #analysis #calculus #performance #realtime #revisited
Performance analysis of FlexRay-based systems using real-time calculus, revisited (DBC, PB), pp. 351–356.
SACSAC-2010-DrumondG #concept #logic #markov #ontology
Extracting ontology concept hierarchies from text using Markov logic (LD, RG), pp. 1354–1358.
SACSAC-2010-FunfzigTA #constraints #parametricity
Haptic manipulation of rational parametric planar cubics using shape constraints (CF, PT, GA), pp. 1253–1257.
SACSAC-2010-FuPTW
Mitigating denial of capability attacks using sink tree based quota allocation (ZF, MP, PT, WW), pp. 713–718.
SACSAC-2010-GabrielSN #clustering #matrix #similarity
Eigenvector-based clustering using aggregated similarity matrices (HHG, MS, AN), pp. 1083–1087.
SACSAC-2010-GiuntaPT #aspect-oriented #design pattern
Using aspects and annotations to separate application code from design patterns (RG, GP, ET), pp. 2183–2189.
SACSAC-2010-GoncalvesCCGS #modelling #towards
Towards the modeling reactive and proactive agents by using MAS-ML (EJTG, MIC, GALdC, GFG, VTdS), pp. 936–937.
SACSAC-2010-GongWWLZY
Recognizing affect from non-stylized body motion using shape of Gaussian descriptors (LG, TW, CW, FL, FZ, XY), pp. 1203–1206.
SACSAC-2010-GuermaziHH #analysis #classification #image #web
Classification of violent web images using context based analysis (RG, MH, ABH), pp. 1768–1773.
SACSAC-2010-GuoQL #configuration management #energy #network #optimisation
A general energy optimization model for wireless networks using configurable antennas (SG, ZQ, SL), pp. 246–250.
SACSAC-2010-HassanB #distributed #file system
Semi-join computation on distributed file systems using map-reduce-merge model (MAHH, MB), pp. 406–413.
SACSAC-2010-HautakorpiM #algorithm #network
Load balancing for structured P2P networks using the advanced finger selection algorithm (AFSA) (JH, JM), pp. 655–662.
SACSAC-2010-HeinzlS #validation #xml
Using XML schema to improve writing, validation, and structure of WS-policies (SH, BS), pp. 2422–2429.
SACSAC-2010-HoqueRA #named #protocol #scalability
S-search: finding RFID tags using scalable and secure search protocol (MEH, FR, SIA), pp. 439–443.
SACSAC-2010-JiKYC #3d #how #interactive
How to manage interactive dialogues of avatar agents by using 3D spatial information of virtual world (SHJ, JWK, TY, HGC), pp. 1181–1187.
SACSAC-2010-KimKMY #multi #network #predict #probability
Probabilistic context prediction using time-inferred multiple pattern networks (YHK, WK, KM, YY), pp. 1015–1019.
SACSAC-2010-Kuzume
Input device for disabled persons using expiration and tooth-touch sound signals (KK), pp. 1159–1164.
SACSAC-2010-LanLSH #algorithm #classification #image
An improved K-view algorithm for image texture classification using new characteristic views selection methods (YL, HL, ES, CCH), pp. 959–963.
SACSAC-2010-LeeJL #detection #graph
Detecting metamorphic malwares using code graphs (JL, KJ, HL), pp. 1970–1977.
SACSAC-2010-LeeKWAHP #3d #finite #random
Tracking random finite objects using 3D-LIDAR in marine environments (KWL, BK, WSW, MA, FSH, NMP), pp. 1282–1287.
SACSAC-2010-MacielNJIS #interactive
Reality cues-based interaction using whole-body awareness (AM, LPN, VAMJ, JMTI, LFMSS), pp. 1224–1228.
SACSAC-2010-MalkowskiJHPKP #analysis #benchmark #database #empirical #metric #scalability
Empirical analysis of database server scalability using an N-tier benchmark with read-intensive workload (SM, DJ, MH, JP, YK, CP), pp. 1680–1687.
SACSAC-2010-MaranzatoPLN #detection
Fraud detection in reputation systems in e-markets using logistic regression (RM, AMP, APdL, MN), pp. 1454–1455.
SACSAC-2010-McDonaldTKG #component #reduction
Using logic-based reduction for adversarial component recovery (JTM, EDT, YCK, MRG), pp. 1993–2000.
SACSAC-2010-MenorBBGP #classification #markov #taxonomy
Virus DNA-fragment classification using taxonomic hidden Markov model profiles (MM, KB, MB, YG, GP), pp. 1567–1571.
SACSAC-2010-MiaoOWS #distributed #network
Coverage-hole trap model in target tracking using distributed relay-robot network (HM, CCO, XW, CS), pp. 1299–1304.
SACSAC-2010-MigotinaRF #automation #detection #fuzzy #parametricity
Automatic K-complex detection using Hjorth parameters and fuzzy decision (DM, ACR, ALNF), pp. 979–980.
SACSAC-2010-MillerRPW #identification
Personal identification using periocular skin texture (PEM, AWR, SJP, DLW), pp. 1496–1500.
SACSAC-2010-MissenBC #detection
Using passage-based language model for opinion detection in blogs (MMSM, MB, GC), pp. 1821–1822.
SACSAC-2010-MustaphaZAG #composition #ontology #semantics
Enhancing semantic search using case-based modular ontology (NBM, HBZ, MAA, HHBG), pp. 1438–1439.
SACSAC-2010-NinagawaE #modelling #network #predict #probability
Link prediction using probabilistic group models of network structure (AN, KE), pp. 1115–1116.
SACSAC-2010-ParizekY #component #interactive #traversal
Extraction of component-environment interaction model using state space traversal (PP, NY), pp. 2203–2210.
SACSAC-2010-Perez-CastilloGP #on the #process
On the use of patterns to recover business processes (RPC, IGRdG, MP), pp. 165–166.
SACSAC-2010-PirkolaT #approach #crawling #problem
Addressing the limited scope problem of focused crawling using a result merging approach (AP, TT), pp. 1735–1740.
SACSAC-2010-PortugalR #algorithm #clustering #graph #multi
MSP algorithm: multi-robot patrolling based on territory allocation using balanced graph partitioning (DP, RPR), pp. 1271–1276.
SACSAC-2010-RiponGHT #approach #layout #multi #problem
Multi-objective evolutionary approach for solving facility layout problem using local search (KSNR, KG, MH, JT), pp. 1155–1156.
SACSAC-2010-Roder #interactive #requirements #usability
Using interaction requirements to operationalize usability (HR), pp. 318–319.
SACSAC-2010-RoyPL #component #detection #documentation #image
Seal object detection in document images using GHT of local component shapes (PPR, UP, JL), pp. 23–27.
SACSAC-2010-RyuCC #image #layout #named
PHOTOLAND: a new image layout system using spatio-temporal information in digital photos (DSR, WKC, HGC), pp. 1884–1891.
SACSAC-2010-ShahinLK #architecture #design #visualisation
Rationale visualization of software architectural design decision using compendium (MS, PL, MRK), pp. 2367–2368.
SACSAC-2010-ShinKNNTO #named #ontology #recommendation
ONTOMO: web-based ontology building system: ---instance recommendation using bootstrapping--- (IS, TK, HN, KN, YT, AO), pp. 1442–1443.
SACSAC-2010-SmithH #documentation #image #retrieval
Document retrieval using image features (DS, RH), pp. 47–51.
SACSAC-2010-StoffelSKK #analysis #documentation #visual notation
Enhancing document structure analysis using visual analytics (AS, DS, HK, DAK), pp. 8–12.
SACSAC-2010-VermolenHL #consistency #modelling #proving
Proving consistency of VDM models using HOL (SV, JH, PGL), pp. 2503–2510.
SACSAC-2010-WeeL
Client-side load balancer using cloud (SW, HL), pp. 399–405.
SACSAC-2010-Youssef #metric #parallel #performance
Using surface effect measures to model parallel performance (BBY), pp. 2400–2401.
LDTALDTA-J-2007-AkessonEH #attribute grammar #compilation #implementation #jastadd
Implementation of a Modelica compiler using JastAdd attribute grammars (, TE, GH), pp. 21–38.
LDTALDTA-J-2007-CamachoMBV #automation #generative #tool support #verification
Automated generation of program translation and verification tools using annotated grammars (DOC, KM, MvdB, JJV), pp. 3–20.
LDTALDTA-2010-Freudenthal #domain-specific language #enterprise
Using DSLs for developing enterprise systems (MF), p. 11.
SLESLE-2010-HostO #canonical #identification #implementation #java #semantics
Canonical Method Names for Java — Using Implementation Semantics to Identify Synonymous Verbs (EWH, BMØ), pp. 226–245.
SLESLE-2010-JohnstoneS10a #generative
Translator Generation Using ART (AJ, ES), pp. 306–315.
ASPLOSASPLOS-2010-KirmanM #power management
A power-efficient all-optical on-chip interconnect using wavelength-based oblivious routing (NK, JFM), pp. 15–28.
ASPLOSASPLOS-2010-RamanKMJA #concurrent #parallel #thread #transaction
Speculative parallelization using software multi-threaded transactions (AR, HK, TRM, TBJ, DIA), pp. 65–76.
ASPLOSASPLOS-2010-WooL #gpu #named #programmable
COMPASS: a programmable data prefetcher using idle GPU shaders (DHW, HHSL), pp. 297–310.
CASECASE-2010-AnandFLM #distributed #implementation #network
A practical implementation of distributed system control over an asynchronous Ethernet network using time stamped data (DMA, JGF, YSLB, JRM), pp. 515–520.
CASECASE-2010-AngererPA #configuration management #mobile #named
MobComm: Using BDI-agents for the reconfiguration of mobile commissioning robots (SA, RP, RA), pp. 822–827.
CASECASE-2010-CabasinoGS #fault #petri net
Diagnosis using labeled Petri nets: Faults may either be silent or undistinguishable events (MPC, AG, CS), pp. 485–490.
CASECASE-2010-DhupatiKRR #analysis #detection #novel #speech #validation
A novel drowsiness detection scheme based on speech analysis with validation using simultaneous EEG recordings (LSD, SK, AR, AR), pp. 917–921.
CASECASE-2010-FrohlichS #automation #constraints #matrix #modelling #problem #scheduling
Relation matrices for automated MILP modeling of scheduling problems using temporal constraints (RF, SCS), pp. 69–74.
CASECASE-2010-GujarathiM #generative #integration
Generative CAD and CAE integration using common data model (GPG, YM), pp. 586–591.
CASECASE-2010-HuSF #analysis #biology
Dynamics analysis and closed-loop control of biological cells in transportation using robotic manipulation system with optical tweezers (SH, DS, GF), pp. 240–245.
CASECASE-2010-IshiiONTOTM #analysis #image
Cardiac motion analysis of a rat model for myocardial infarction using high-frame-rate stereo images (II, TO, YN, TT, KO, AT, HM), pp. 780–785.
CASECASE-2010-JohnsonM #optimisation
Local planning using switching time optimization (ERJ, TDM), pp. 828–834.
CASECASE-2010-Kanamori #design
Anti-windup controller design using gravity compensation for Euler-Lagrange systems with actuator saturation (MK), pp. 798–803.
CASECASE-2010-KwokHFRW #approach #image
Color image contrast enhancement using a local equalization and weighted sum approach (NMK, QPH, GF, ABR, DW), pp. 568–573.
CASECASE-2010-LeBSK #modelling #realtime #towards
Towards virtual instruments for cardiovascular healthcare: Real-time modeling of cardiovascular dynamics using ECG signals (TQL, STSB, AS, RK), pp. 903–910.
CASECASE-2010-MaruyamaKHTA
Nanomanipulation of single virus using Dielectrophoretic concentration on a microfluidic chip (HM, KK, AH, TT, FA), pp. 710–715.
CASECASE-2010-MikosFBF #design #development #distributed #ontology #reuse
Development of a system for distributed sharing and reuse of design and manufacturing knowledge in the PFMEA domain using a description logics-based ontology (WLM, JCEF, PEAB, LSF), pp. 598–603.
CASECASE-2010-PaullGLM #adaptation
An information gain based adaptive path planning method for an autonomous underwater vehicle using sidescan sonar (LP, SSG, HL, VM), pp. 835–840.
CASECASE-2010-RososhanskyXL #automation
Coverage based tool path planning for automated polishing using contact stress theory (MR, FX, YL), pp. 592–597.
CASECASE-2010-SunCL #algorithm #scheduling
Scheduling of steel-making and continuous casting system using the surrogate subgradient algorithm for lagrangian relaxation (LS, TC, PBL), pp. 885–890.
CCCC-2010-CraikK #object-oriented #parallel #source code
Using Ownership to Reason about Inherent Parallelism in Object-Oriented Programs (AC, WK), pp. 145–164.
CGOCGO-2010-GottschlichVS #memory management #performance #transaction
An efficient software transactional memory using commit-time invalidation (JEG, MV, JGS), pp. 101–110.
DACDAC-2010-Ababei #design #modelling #network #optimisation
Network on chip design and optimization using specialized influence models (CA), pp. 625–626.
DACDAC-2010-CallegariDWA #classification #learning
Classification rule learning using subgroup discovery of cross-domain attributes responsible for design-silicon mismatch (NC, DGD, LCW, MSA), pp. 374–379.
DACDAC-2010-ChoRXP #network
History-based VLSI legalization using network flow (MC, HR, HX, RP), pp. 286–291.
DACDAC-2010-ConstantinidesA #debugging #testing
Using introspective software-based testing for post-silicon debug and repair (KC, TMA), pp. 537–542.
DACDAC-2010-DadgourHSB #analysis #design #energy #logic
Design and analysis of compact ultra energy-efficient logic gates using laterally-actuated double-electrode NEMS (HFD, MMH, CS, KB), pp. 893–896.
DACDAC-2010-DhimanMR #modelling #online #predict
A system for online power prediction in virtualized environments using Gaussian mixture models (GD, KM, TR), pp. 807–812.
DACDAC-2010-LiangM #reuse
Instruction cache locking using temporal reuse profile (YL, TM), pp. 344–349.
DACDAC-2010-ParkBWM #debugging #graph #locality #named
BLoG: post-silicon bug localization in processors using bug localization graphs (SBP, AB, HW, SM), pp. 368–373.
DACDAC-2010-PigorschS #preprocessor #satisfiability
An AIG-Based QBF-solver using SAT for preprocessing (FP, CS), pp. 170–175.
DACDAC-2010-Potkonjak #synthesis #tool support
Synthesis of trustable ICs using untrusted CAD tools (MP), pp. 633–634.
DACDAC-2010-WangM #approximate #named #realtime #scalability
PreDVS: preemptive dynamic voltage scaling for real-time systems using approximation scheme (WW, PM), pp. 705–710.
DATEDATE-2010-AndalamRG #multi #predict #thread
Deterministic, predictable and light-weight multithreading using PRET-C (SA, PSR, AG), pp. 1653–1656.
DATEDATE-2010-ArtiagaC #metadata
Using filesystem virtualization to avoid metadata bottlenecks (EA, TC), pp. 562–567.
DATEDATE-2010-Aue #internet #mobile #power management
Low power mobile internet devices using LTE technology (VA), p. 794.
DATEDATE-2010-BarrioMMHM #functional #synthesis
Using Speculative Functional Units in high level synthesis (AADB, MCM, JMM, RH, SOM), pp. 1779–1784.
DATEDATE-2010-BolteSBNB
Non-intrusive virtualization management using libvirt (MB, MS, GB, ON, AB), pp. 574–579.
DATEDATE-2010-ChenABF #monitoring
Non-invasive blood oxygen saturation monitoring for neonates using reflectance pulse oximeter (WC, IA, SBO, LMGF), pp. 1530–1535.
DATEDATE-2010-ChengDMMRWRA #parametricity
Capturing intrinsic parameter fluctuations using the PSP compact model (BC, DD, NM, CM, GR, XW, SR, AA), pp. 650–653.
DATEDATE-2010-ChenLJC #distributed #manycore #memory management
Supporting Distributed Shared Memory on multi-core Network-on-Chips using a dual microcoded controller (XC, ZL, AJ, SC), pp. 39–44.
DATEDATE-2010-DadgourB #architecture #design #detection #novel #pipes and filters
Aging-resilient design of pipelined architectures using novel detection and correction circuits (HFD, KB), pp. 244–249.
DATEDATE-2010-DammMHG #modelling #network #simulation #transaction
Using Transaction Level Modeling techniques for wireless sensor network simulation (MD, JM, JH, CG), pp. 1047–1052.
DATEDATE-2010-DietrichEH #analysis #statistics
Digital statistical analysis using VHDL (MD, UE, JH), pp. 1007–1010.
DATEDATE-2010-El-MoselhyD #order #reduction #statistics
Variation-aware interconnect extraction using statistical moment preserving model order reduction (TAEM, LD), pp. 453–458.
DATEDATE-2010-GaoH #geometry #optimisation #programming
A power optimization method for CMOS Op-Amps using sub-space based geometric programming (WG, RH), pp. 508–513.
DATEDATE-2010-GiraldoMJM #hardware
A HMMER hardware accelerator using divergences (JFEG, NM, RPJ, ACMAdM), pp. 405–410.
DATEDATE-2010-HatamiP #analysis #component #library #performance #representation #robust
Efficient representation, stratification, and compression of variational CSM library waveforms using Robust Principle Component Analysis (SH, MP), pp. 1285–1290.
DATEDATE-2010-KanoriaMM #analysis #markov #monte carlo #statistics
Statistical static timing analysis using Markov chain Monte Carlo (YK, SM, AM), pp. 813–818.
DATEDATE-2010-KarnerASW #network #runtime #simulation
Holistic simulation of FlexRay networks by using run-time model switching (MK, EA, CS, RW), pp. 544–549.
DATEDATE-2010-KlemmF #c++ #embedded #metaprogramming
Bitstream processing for embedded systems using C++ metaprogramming (RK, GF), pp. 909–913.
DATEDATE-2010-LarsenLNP #analysis #realtime #synthesis
Scenario-based analysis and synthesis of real-time systems using uppaal (KGL, SL, BN, SP), pp. 447–452.
DATEDATE-2010-MishraJ #optimisation #power management #synthesis
Low-power FinFET circuit synthesis using surface orientation optimization (PM, NKJ), pp. 311–314.
DATEDATE-2010-PomeranzR #requirements #sequence #testing
Reducing the storage requirements of a test sequence by using a background vector (IP, SMR), pp. 1237–1242.
DATEDATE-2010-ShafiqueMH #adaptation #complexity #reduction #video
An HVS-based Adaptive Computational Complexity Reduction Scheme for H.264/AVC video encoder using Prognostic Early Mode Exclusion (MS, BM, JH), pp. 1713–1718.
DATEDATE-2010-SoekenWKGD #modelling #ocl #satisfiability #uml #verification
Verifying UML/OCL models using Boolean satisfiability (MS, RW, MK, MG, RD), pp. 1341–1344.
DATEDATE-2010-TajalliL #design #framework #power management
Ultra-low power mixed-signal design platform using subthreshold source-coupled circuits (AT, YL), pp. 711–716.
DATEDATE-2010-VadlamaniZBT #adaptation #composition #fault #manycore
Multicore soft error rate stabilization using adaptive dual modular redundancy (RV, JZ, WPB, RT), pp. 27–32.
DATEDATE-2010-VasudevanSPTTJ #automation #data mining #generative #mining #named #static analysis
GoldMine: Automatic assertion generation using data mining and static analysis (SV, DS, SJP, DT, WT, DRJ), pp. 626–629.
DATEDATE-2010-ZengC #metric
Interconnect delay and slew metrics using the beta distribution (JKZ, CPC), pp. 1329–1332.
DATEDATE-2010-ZhangLL #approach #markov #modelling #simulation #verification
An abstraction-guided simulation approach using Markov models for microprocessor verification (TZ, TL, XL), pp. 484–489.
HPCAHPCA-2010-BiswasRMACJPPS #metric
Explaining cache SER anomaly using DUE AVF measurement (AB, CR, SSM, VA, LC, AJ, AEP, MP, NS), pp. 1–12.
HPCAHPCA-2010-KaseridisSCJ #resource management #scalability
A bandwidth-aware memory-subsystem resource management using non-invasive resource profilers for large CMP systems (DK, JS, JC, LKJ), pp. 1–11.
HPCAHPCA-2010-TangBHC #architecture #cpu #performance
DMA cache: Using on-chip storage to architecturally separate I/O data from CPU data for improving I/O performance (DT, YB, WH, MC), pp. 1–12.
HPDCHPDC-2010-BatiniGM #architecture #enterprise
Optimal enterprise data architecture using publish and subscribe (CB, SG, AM), pp. 541–547.
HPDCHPDC-2010-BhagawatyJPABK #design #implementation #simulation
Design, implementation and use of a simulation data archive for coastal science (HB, LJ, SP, GA, NB, TK), pp. 651–657.
HPDCHPDC-2010-BuiYT #abstraction #distributed #named #python #workflow
Weaver: integrating distributed computing abstractions into scientific workflows using Python (PB, LY, DT), pp. 636–643.
HPDCHPDC-2010-ChenCHCH #adaptation
Improving host swapping using adaptive prefetching and paging notifier (WZC, HC, WH, XC, DH), pp. 300–303.
HPDCHPDC-2010-CoutinhoOOBLDM #parallel #workflow
Data parallelism in bioinformatics workflows using Hydra (FC, ESO, DdO, VPB, AABL, AMRD, MM), pp. 507–515.
HPDCHPDC-2010-DonassoloCLV #performance #scalability #simulation #volunteer
Fast and scalable simulation of volunteer computing systems using SimGrid (BD, HC, AL, PV), pp. 605–612.
HPDCHPDC-2010-HenschelMS #distributed #workflow
A distributed workflow for an astrophysical OpenMP application: using the data capacitor over WAN to enhance productivity (RH, SM, SCS), pp. 644–650.
HPDCHPDC-2010-JabriM
Authorization within grid-computing using certificateless identity-based proxy signature (MAJ, SM), pp. 292–295.
HPDCHPDC-2010-KimHMAJ #distributed #energy #scalability
Exploring the RNA folding energy landscape using scalable distributed cyberinfrastructure (JK, WH, SM, FAE, SJ), pp. 477–488.
HPDCHPDC-2010-LiewAHH #data type #distributed #graph #optimisation #parallel #streaming #towards
Towards optimising distributed data streaming graphs using parallel streams (CSL, MPA, JIvH, LH), pp. 725–736.
HPDCHPDC-2010-LimPF #named #performance
SoftPower: fine-grain power estimations using performance counters (MYL, AP, RJF), pp. 308–311.
HPDCHPDC-2010-StoutFMG #clustering #network #scalability
Scaling virtual organization clusters over a wide area network using the Kestrel workload management system (LS, MF, MAM, SG), pp. 692–698.
HPDCHPDC-2010-StuartCMO #multi #pipes and filters
Multi-GPU volume rendering using MapReduce (JAS, CKC, KLM, JDO), pp. 841–848.
ISMMISMM-2010-TianFG #parallel #predict
Speculative parallelization using state separation and multiple value prediction (CT, MF, RG), pp. 63–72.
OSDIOSDI-2010-AnanthanarayananKGSLSH #clustering
Reining in the Outliers in Map-Reduce Clusters using Mantri (GA, SK, AGG, IS, YL, BS, EH), pp. 265–278.
OSDIOSDI-2010-FeldmanZFF #collaboration #named
SPORC: Group Collaboration using Untrusted Cloud Resources (AJF, WPZ, MJF, EWF), pp. 337–350.
OSDIOSDI-2010-KimWZK
Intrusion Recovery Using Selective Re-execution (TK, XW, NZ, MFK), pp. 89–104.
OSDIOSDI-2010-PengD #distributed #incremental #scalability #transaction
Large-scale Incremental Processing Using Distributed Transactions and Notifications (DP, FD), pp. 251–264.
PDPPDP-2010-BittencourtSM #algorithm #graph #lookahead #scheduling
DAG Scheduling Using a Lookahead Variant of the Heterogeneous Earliest Finish Time Algorithm (LFB, RS, ERMM), pp. 27–34.
PDPPDP-2010-EbrahimiDLPT #architecture #interface #network
A High-Performance Network Interface Architecture for NoCs Using Reorder Buffer Sharing (ME, MD, PL, JP, HT), pp. 546–550.
PDPPDP-2010-FloresAA #energy #hardware
Energy-Efficient Hardware Prefetching for CMPs Using Heterogeneous Interconnects (AF, JLA, MEA), pp. 147–154.
PDPPDP-2010-LeoAGZ #analysis #clustering #data transformation #throughput
Using Virtual Clusters to Decouple Computation and Data Management in High Throughput Analysis Applications (SL, PA, MG, GZ), pp. 411–415.
PDPPDP-2010-MarosiKFL
Sandboxing for Desktop Grids Using Virtualization (CAM, PK, GF, OL), pp. 559–566.
PDPPDP-2010-MartinezCPRP #modelling #performance
Performance Modeling of MPI Applications Using Model Selection Techniques (DRM, JCC, TFP, FFR, VBP), pp. 95–102.
PDPPDP-2010-MinhW #parallel #predict
Using Historical Data to Predict Application Runtimes on Backfilling Parallel Systems (TNM, LW), pp. 246–252.
PPoPPPPoPP-2010-CastaldoW #parallel #scalability
Scaling LAPACK panel operations using parallel cache assignment (AMC, RCW), pp. 223–232.
PPoPPPPoPP-2010-LupeiSPMBKA #game studies #memory management #parallel #scalability #towards #transaction
Towards scalable and transparent parallelization of multiplayer games using transactional memory support (DL, BS, DP, MM, MB, WK, CA), pp. 325–326.
PPoPPPPoPP-2010-SandesM #comparison #gpu #named #sequence
CUDAlign: using GPU to accelerate the comparison of megabase genomic sequences (EFdOS, ACMAdM), pp. 137–146.
PPoPPPPoPP-2010-UpadhyayaMP #data type #generative #performance
Using data structure knowledge for efficient lock generation and strong atomicity (GU, SPM, VSP), pp. 281–292.
PPoPPPPoPP-2010-ZhaiCZ #named #parallel #performance #predict #scalability
PHANTOM: predicting performance of parallel applications on large-scale parallel machines using a single node (JZ, WC, WZ), pp. 305–314.
FASEFASE-2010-DarvasM #consistency #proving
Proving Consistency and Completeness of Model Classes Using Theory Interpretation (ÁD, PM), pp. 218–232.
TACASTACAS-2010-ParizekK #component #detection #fault #java #performance #random
Efficient Detection of Errors in Java Components Using Random Environment and Restarts (PP, TK), pp. 451–465.
CAVCAV-2010-TorreMP #concurrent #interface #linear #model checking #source code
Model-Checking Parameterized Concurrent Programs Using Linear Interfaces (SLT, PM, GP), pp. 629–644.
ICLPICLP-2010-ShakarianSS10 #network #optimisation #problem #social #source code
Using Generalized Annotated Programs to Solve Social Network Optimization Problems (PS, VSS, MLS), pp. 182–191.
ICSTICST-2010-DebroyW #automation #source code
Using Mutation to Automatically Suggest Fixes for Faulty Programs (VD, WEW), pp. 65–74.
ICSTICST-2010-HuangCM #algorithm #search-based #testing #user interface
Repairing GUI Test Suites Using a Genetic Algorithm (SH, MBC, AMM), pp. 245–254.
ICSTICST-2010-Laurent #concept #formal method #process #testing #validation #verification
Using Formal Methods and Testability Concepts in the Avionics Systems Validation and Verification (V&V) Process (OL), pp. 1–10.
ICTSSICTSS-2010-AartsJU #abstraction #communication #generative #infinity #modelling #protocol
Generating Models of Infinite-State Communication Protocols Using Regular Inference with Abstraction (FA, BJ, JU), pp. 188–204.
ICTSSICTSS-2010-ArcuriIB #black box #embedded #random #realtime #search-based #testing
Black-Box System Testing of Real-Time Embedded Systems Using Random and Search-Based Testing (AA, MZZI, LCB), pp. 95–110.
ICTSSICTSS-2010-LamanchaU #generative #product line #testing
Testing Product Generation in Software Product Lines Using Pairwise for Features Coverage (BPL, MPU), pp. 111–125.
ISSTAISSTA-2010-DanielGM #execution #on the #symbolic computation
On test repair using symbolic execution (BD, TG, DM), pp. 207–218.
ISSTAISSTA-2010-WeeratungeZSJ #concurrent #debugging #slicing
Analyzing concurrency bugs using dual slicing (DW, XZ, WNS, SJ), pp. 253–264.
ICSTSAT-2010-Ehlers #automaton #satisfiability
Minimising Deterministic Büchi Automata Precisely Using SAT Solving (RE), pp. 326–332.
ICSTSAT-2010-FuhsS #linear #satisfiability #source code
Synthesizing Shortest Linear Straight-Line Programs over GF(2) Using SAT (CF, PSK), pp. 71–84.
TAPTAP-2010-BueDKB #abstraction #behaviour
Building a Test-Ready Abstraction of a Behavioral Model Using CLP (PCB, FD, ADK, FB), pp. 167–182.
TAPTAP-2010-ClaessenSH #named #specification #testing
QuickSpec: Guessing Formal Specifications Using Testing (KC, NS, JH), pp. 6–21.
TAPTAP-2010-GladischTBY #generative #testing #verification
Generating Regression Unit Tests Using a Combination of Verification and Capture & Replay (CG, SST, BB, AY), pp. 61–76.
VMCAIVMCAI-2010-BuZL #automaton #hybrid #programming #reachability #verification
Path-Oriented Reachability Verification of a Class of Nonlinear Hybrid Automata Using Convex Programming (LB, JZ, XL), pp. 78–94.
CBSECBSE-2009-Bickford #component #specification
Component Specification Using Event Classes (MB), pp. 140–155.
QoSAQoSA-2009-KrogmannSBKMM #architecture #feedback #performance #predict #visualisation
Improved Feedback for Architectural Performance Prediction Using Software Cartography Visualizations (KK, CMS, SB, MK, AM, FM), pp. 52–69.
WICSA-ECSAWICSA-ECSA-2009-AboudAFHTUV #architecture #automation #classification #component #concept
Automated architectural component classification using concept lattices (NAA, GA, JRF, MH, CT, CU, SV), pp. 21–30.
WICSA-ECSAWICSA-ECSA-2009-Babar #agile #architecture #case study #challenge #development
An exploratory study of architectural practices and challenges in using agile software development approaches (MAB), pp. 81–90.
WICSA-ECSAWICSA-ECSA-2009-BucchiaronePVR #modelling #self #verification
Self-Repairing systems modeling and verification using AGG (AB, PP, CV, OR), pp. 181–190.
WICSA-ECSAWICSA-ECSA-2009-EmeryH #architecture #framework
Every architecture description needs a framework: Expressing architecture frameworks using ISO/IEC 42010 (DEE, RH), pp. 31–40.
WICSA-ECSAWICSA-ECSA-2009-HenttonenM #architecture #open source #reuse #tool support
Open source based tools for sharing and reuse of software architectural knowledge (KH, MM), pp. 41–50.
WICSA-ECSAWICSA-ECSA-2009-LiuLXSZ #architecture #enterprise #integration
Using architecture integration patterns to compose enterprise mashups (YL, XL, LX, MS, LZ), pp. 111–120.
WICSA-ECSAWICSA-ECSA-2009-NordCEH #architecture #documentation #set
Reviewing architecture documents using question sets (RLN, PCC, DEE, RH), pp. 325–328.
WICSA-ECSAWICSA-ECSA-2009-RooSA #adaptation #architecture #embedded #multi #optimisation
An architectural style for optimizing system qualities in adaptive embedded systems using Multi-Objective Optimization (AdR, HS, MA), pp. 349–352.
DocEngDocEng-2009-DiazAK #product line
Using DITA for documenting software product lines (OD, FIA, JK), pp. 231–240.
DocEngDocEng-2009-Hassan09a #documentation #graph #interactive #named
GraphWrap: a system for interactive wrapping of pdf documents using graph matching techniques (TH), pp. 247–248.
DocEngDocEng-2009-JoshiL #analysis #documentation #image #natural language #web
Web document text and images extraction using DOM analysis and natural language processing (PMJ, SL), pp. 218–221.
DRRDRR-2009-HalimaA #concept #recognition #segmentation
Simultaneous segmentation and recognition of Arabic printed text using linguistic concepts of vocabulary (MBH, AMA), pp. 1–10.
DRRDRR-2009-LiD #difference #independence #verification
Improving semi-text-independent method of writer verification using difference vector (XL, XD), pp. 1–10.
DRRDRR-2009-NakaiKI #documentation #image
Camera-based document image mosaicing using LLAH (TN, KK, MI), pp. 1–10.
DRRDRR-2009-NonnemakerB #classification
Using synthetic data safely in classification (JN, HSB), pp. 1–10.
DRRDRR-2009-TaghvaC #analysis #bound #documentation
Document boundary determination using structural and lexical analysis (KT, MAC), pp. 1–10.
DRRDRR-2009-TanVK #clustering #identification #online
Online writer identification using alphabetic information clustering (GXT, CVG, ACK), pp. 1–10.
TPDLECDL-2009-DammKFC #concept #library #multimodal #music #query
A Concept for Using Combined Multimodal Queries in Digital Music Libraries (DD, FK, CF, MC), pp. 261–272.
TPDLECDL-2009-MachadoPFMM #component #user interface
User Interface for a Geo-Temporal Search Service Using DIGMAP Components (JM, GP, NF, BM, HM), pp. 483–486.
TPDLECDL-2009-OlsenS #distributed #library
Gaining Access to Decentralised Library Resources Using Location-Aware Services (BSO, ITS), pp. 388–391.
TPDLECDL-2009-TonniesB #evaluation #library #quality #roadmap #semantics
Using Semantic Technologies in Digital Libraries — A Roadmap to Quality Evaluation (ST, WTB), pp. 168–179.
HTHT-2009-AmitayCHOSYG #approach #social
Social search and discovery using a unified approach (EA, DC, NH, SOK, AS, SY, NG), pp. 199–208.
HTHT-2009-HargoodMW
Using a thematic model to enrich photo montages (CH, DEM, MJW), pp. 135–140.
HTHT-2009-Martinez-RomoA #approach #information management #web
Retrieving broken web links using an approach based on contextual information (JMR, LA), pp. 351–352.
ICDARICDAR-2009-Abd-AlmageedKD #documentation #linear
Page Rule-Line Removal Using Linear Subspaces in Monochromatic Handwritten Arabic Documents (WAA, JK, DSD), pp. 768–772.
ICDARICDAR-2009-AbdulkaderC #fault #learning #low cost #multi
Low Cost Correction of OCR Errors Using Learning in a Multi-Engine Environment (AA, MRC), pp. 576–580.
ICDARICDAR-2009-AhmadVK #markov #recognition #word
Lexicon-Based Word Recognition Using Support Vector Machine and Hidden Markov Model (ARA, CVG, MK), pp. 161–165.
ICDARICDAR-2009-BarratT #image #modelling #network
Modeling, Classifying and Annotating Weakly Annotated Images Using Bayesian Network (SB, ST), pp. 1201–1205.
ICDARICDAR-2009-BledaBGZLMPV #online #recognition
Improving a DTW-Based Recognition Engine for On-line Handwritten Characters by Using MLPs (MJCB, SEB, JGM, FZM, DLP, AMV, FPV, JMVT), pp. 1260–1264.
ICDARICDAR-2009-BodicLAHLK #detection #graph #integer #linear #programming
Symbol Detection Using Region Adjacency Graphs and Integer Linear Programming (PLB, HL, SA, PH, YL, AK), pp. 1320–1324.
ICDARICDAR-2009-BoussellaaBZAA #algorithm #documentation #image
Enhanced Text Extraction from Arabic Degraded Document Images Using EM Algorithm (WB, AB, AZ, HEA, AMA), pp. 743–747.
ICDARICDAR-2009-BukhariSB09a #independence #segmentation
Script-Independent Handwritten Textlines Segmentation Using Active Contours (SSB, FS, TMB), pp. 446–450.
ICDARICDAR-2009-CaoPSN #adaptation #clustering
Unsupervised HMM Adaptation Using Page Style Clustering (HC, RP, SS, PN), pp. 1091–1095.
ICDARICDAR-2009-DiemS #recognition
Recognition of Degraded Handwritten Characters Using Local Features (MD, RS), pp. 221–225.
ICDARICDAR-2009-ElbaatiBKEAA #recognition
Arabic Handwriting Recognition Using Restored Stroke Chronology (AE, HB, MK, AE, HEA, AMA), pp. 411–415.
ICDARICDAR-2009-FornesLSB #identification #music #on the
On the Use of Textural Features for Writer Identification in Old Handwritten Music Scores (AF, JL, GS, HB), pp. 996–1000.
ICDARICDAR-2009-GalballyFMO #evaluation #verification
Evaluation of Brute-force Attack to Dynamic Signature Verification Using Synthetic Samples (JG, JF, MMD, JOG), pp. 131–135.
ICDARICDAR-2009-GarainP #identification #multi
Off-Line Multi-Script Writer Identification Using AR Coefficients (UG, TP), pp. 991–995.
ICDARICDAR-2009-HamdaniAKA #multi #online #recognition
Combining Multiple HMMs Using On-line and Off-line Features for Off-line Arabic Handwriting Recognition (MH, HEA, MK, AMA), pp. 201–205.
ICDARICDAR-2009-HanifP #algorithm #detection #image #locality
Text Detection and Localization in Complex Scene Images using Constrained AdaBoost Algorithm (SMH, LP), pp. 1–5.
ICDARICDAR-2009-Hassan #documentation #graph
User-Guided Wrapping of PDF Documents Using Graph Matching Techniques (TH), pp. 631–635.
ICDARICDAR-2009-HeH09a #classification #estimation #online
Affine Distortion Compensation for an Isolated Online Handwritten Chinese Character Using Combined Orientation Estimation and HMM-Based Minimax Classification (TH, QH), pp. 1226–1230.
ICDARICDAR-2009-HoangTP #diagrams #image
Extraction of Nom Text Regions from Stele Images Using Area Voronoi Diagram (TVH, ST, NYP), pp. 921–925.
ICDARICDAR-2009-HuangDJG #adaptation #analysis #incremental #linear #online #recognition
Writer Adaptive Online Handwriting Recognition Using Incremental Linear Discriminant Analysis (ZH, KD, LJ, XG), pp. 91–95.
ICDARICDAR-2009-IbrahimKKAG #analysis #dependence #online #verification
On-Line Signature Verification: Directional Analysis of a Signature Using Weighted Relative Angle Partitions for Exploitation of Inter-Feature Dependencies (MTI, MJK, MAK, KSA, LG), pp. 41–45.
ICDARICDAR-2009-ImpedovoFM #recognition #word
HMM Based Handwritten Word Recognition System by Using Singularities (SI, AF, RM), pp. 783–787.
ICDARICDAR-2009-KimLK #mobile
Scene Text Extraction Using Focus of Mobile Camera (EK, SL, JHK), pp. 166–170.
ICDARICDAR-2009-LandreMR #classification #difference #image
Ornamental Letters Image Classification Using Local Dissimilarity Maps (JL, FMN, SR), pp. 186–190.
ICDARICDAR-2009-LeloreB #documentation #image #markov
Document Image Binarisation Using Markov Field Model (TL, FB), pp. 551–555.
ICDARICDAR-2009-LuqmanBR #classification #graph #network #recognition
Graphic Symbol Recognition Using Graph Based Signature and Bayesian Network Classifier (MML, TB, JYR), pp. 1325–1329.
ICDARICDAR-2009-MansjurWJ #automation #categorisation #classification #kernel #learning #topic
Using Kernel Density Classifier with Topic Model and Cost Sensitive Learning for Automatic Text Categorization (DSM, TSW, BHJ), pp. 1086–1090.
ICDARICDAR-2009-MarinaiMS #clustering #order
Mathematical Symbol Indexing Using Topologically Ordered Clusters of Shape Contexts (SM, BM, GS), pp. 1041–1045.
ICDARICDAR-2009-MiyaoM #adaptation #online #recognition
Writer Adaptation for Online Handwriting Recognition System Using Virtual Examples (HM, MM), pp. 1156–1160.
ICDARICDAR-2009-MoghaddamRC #approach #classification #independence #multi #segmentation #set
Restoration and Segmentation of Highly Degraded Characters Using a Shape-Independent Level Set Approach and Multi-level Classifiers (RFM, DRH, MC), pp. 828–832.
ICDARICDAR-2009-MontreuilGHN #2d #documentation #layout #random
Unconstrained Handwritten Document Layout Extraction Using 2D Conditional Random Fields (FM, EG, LH, SN), pp. 853–857.
ICDARICDAR-2009-MuramatsuYM #authentication #online
Biometric Person Authentication Method Using Camera-Based Online Signature Acquisition (DM, KY, TM), pp. 46–50.
ICDARICDAR-2009-NakaiKI #documentation #image #realtime #retrieval #web
Real-Time Retrieval for Images of Documents in Various Languages Using a Web Camera (TN, KK, MI), pp. 146–150.
ICDARICDAR-2009-PalWK #case study #classification #comparative #recognition
Comparative Study of Devnagari Handwritten Character Recognition Using Different Feature and Classifiers (UP, TW, FK), pp. 1111–1115.
ICDARICDAR-2009-PanBS #recognition
Isolated Handwritten Farsi Numerals Recognition Using Sparse and Over-Complete Representations (WP, TDB, CYS), pp. 586–590.
ICDARICDAR-2009-PavelecOJNB #identification #modelling
Author Identification Using Compression Models (DP, LSO, EJRJ, FDNN, LVB), pp. 936–940.
ICDARICDAR-2009-RomeroTV #feedback #image
Using Mouse Feedback in Computer Assisted Transcription of Handwritten Text Images (VR, AHT, EV), pp. 96–100.
ICDARICDAR-2009-RoyPLD #multi #programming #segmentation
Multi-Oriented and Multi-Sized Touching Character Segmentation Using Dynamic Programming (PPR, UP, JL, MD), pp. 11–15.
ICDARICDAR-2009-SaldarriagaMV #documentation #online #recognition
Using top n Recognition Candidates to Categorize On-line Handwritten Documents (SPS, EM, CVG), pp. 881–885.
ICDARICDAR-2009-SundaramR #online #recognition
An Improved Online Tamil Character Recognition Engine Using Post-Processing Methods (SS, AGR), pp. 1216–1220.
ICDARICDAR-2009-WakaharaU #2d #composition
Hierarchical Decomposition of Handwriting Deformation Vector Field Using 2D Warping and Global/Local Affine Transformation (TW, SU), pp. 1141–1145.
ICDARICDAR-2009-WangBA #automation #documentation
Document Content Extraction Using Automatically Discovered Features (SYW, HSB, CA), pp. 1076–1080.
ICDARICDAR-2009-WangH #classification #design #fault #modelling #parametricity #precise
Design Compact Recognizers of Handwritten Chinese Characters Using Precision Constrained Gaussian Models, Minimum Classification Error Training and Parameter Compression (YW, QH), pp. 36–40.
ICDARICDAR-2009-YiPX #integration #multi #recognition #video
Using Multiple Frame Integration for the Text Recognition of Video (JY, YP, JX), pp. 71–75.
ICDARICDAR-2009-ZhouLN #online #random #recognition #string
Online Handwritten Japanese Character String Recognition Using Conditional Random Fields (XDZ, CLL, MN), pp. 521–525.
JCDLJCDL-2009-Barker #education #library #online
Science teachers’ use of online resources and the digital library for Earth system education (LJB), pp. 1–10.
JCDLJCDL-2009-GaleasKF #analysis #assessment #documentation #fourier
Document relevance assessment via term distribution analysis using fourier series expansion (PG, RK, BF), pp. 277–284.
JCDLJCDL-2009-HaqN #encryption
Using timed-release cryptography to mitigate the preservation risk of embargo periods (RH, MLN), pp. 183–192.
JCDLJCDL-2009-MurataTMK #ranking
Query-page intention matching using clicked titles and snippets to boost search rankings (MM, HT, YM, RK), pp. 105–114.
JCDLJCDL-2009-PereiraRZLGF #ambiguity #web
Using web information for author name disambiguation (DAP, BARN, NZ, AHFL, MAG, AAF), pp. 49–58.
JCDLJCDL-2009-TreeratpitukG #random
Disambiguating authors in academic publications using random forests (PT, CLG), pp. 39–48.
SIGMODSIGMOD-2009-ChaudhuriNS #profiling #static analysis
Bridging the application and DBMS divide using static analysis and dynamic profiling (SC, VRN, MS), pp. 1039–1042.
SIGMODSIGMOD-2009-ChenOG #performance
Fast and dynamic OLAP exploration using UDFs (ZC, CO, CGA), pp. 1087–1090.
SIGMODSIGMOD-2009-Chi #social #web
Augmented social cognition: using social web technology to enhance the ability of groups to remember, think, and reason (EHC), pp. 973–984.
SIGMODSIGMOD-2009-IsardY #distributed #programming language
Distributed data-parallel computing using a high-level programming language (MI, YY), pp. 987–994.
SIGMODSIGMOD-2009-PaparizosNSA #data flow #query #web
Answering web queries using structured data sources (SP, AN, JCS, RA), pp. 1127–1130.
SIGMODSIGMOD-2009-Plattner #approach #database #in memory
A common database approach for OLTP and OLAP using an in-memory column database (HP), pp. 1–2.
SIGMODSIGMOD-2009-ZhangMC #clustering #scalability
Scalable skyline computation using object-based space partitioning (SZ, NM, DWC), pp. 483–494.
VLDBVLDB-2009-CanimBMLR
An Object Placement Advisor for DB2 Using Solid State Storage (MC, BB, GAM, CAL, KAR), pp. 1318–1329.
VLDBVLDB-2009-CautisDOV #performance #query #set #specification #xpath
Efficient Rewriting of XPath Queries Using Query Set Specifications (BC, AD, NO, VV), pp. 301–312.
VLDBVLDB-2009-JohnsonPA #inheritance #scalability
Improving OLTP Scalability using Speculative Lock Inheritance (RJ, IP, AA), pp. 479–489.
VLDBVLDB-2009-LeglerLSK #distributed #mining #robust
Robust Distributed Top-N Frequent Pattern Mining Using the SAP BW Accelerator (TL, WL, JS, JK), pp. 1438–1449.
VLDBVLDB-2009-LiuJ
Using Trees to Depict a Forest (BL, HVJ), pp. 133–144.
VLDBVLDB-2009-NandiB #named #taxonomy
HAMSTER: Using Search Clicklogs for Schema and Taxonomy Matching (AN, PAB), pp. 181–192.
VLDBVLDB-2009-PereiraRSTWH #question #web
Answering Web Questions Using Structured Data — Dream or Reality? (FP, AR, SS, WTP, GW, AYH), p. 1646.
VLDBVLDB-2009-Rajaraman #named #topic #web
Kosmix: High-Performance Topic Exploration using the Deep Web (AR), pp. 1524–1529.
VLDBVLDB-2009-WangSCMKZPY #data transformation #named #semantics #web
SMDM: Enhancing Enterprise-Wide Master Data Management Using Semantic Web Technologies (XW, XS, FC, LM, NK, KZ, YP, YY), pp. 1594–1597.
VLDBVLDB-2009-WillhalmPBPZS #in memory #named #performance
SIMD-Scan: Ultra Fast in-Memory Table Scan using on-Chip Vector Processing Units (TW, NP, YB, HP, AZ, JS), pp. 385–394.
CSEETCSEET-2009-Al-Yahya #re-engineering #wiki
Using Wikis to Support Teamwork Skills in Software Engineering Courses (MMAY), pp. 142–149.
CSEETCSEET-2009-GB #education #ontology #re-engineering
Using Ontologies to Aid the Teaching of Software Engineering (SPG, AB), pp. 224–231.
CSEETCSEET-2009-KoolmanojwongB #case study #education #experience #research
Using Software Project Courses to Integrate Education and Research: An Experience Report (SK, BWB), pp. 26–33.
CSEETCSEET-2009-McMeekinKCC #taxonomy
Evaluating Software Inspection Cognition Levels Using Bloom’s Taxonomy (DAM, BRvK, EC, DJAC), pp. 232–239.
CSEETCSEET-2009-Padua #quality
Using Quality Audits to Assess Software Course Projects (WP), pp. 162–165.
CSEETCSEET-2009-TaranMSS #authoring #case study #framework #industrial #multi #platform #scalability
Using Rich Multimedia Case Studies: Developing a Scalable Authoring Platform for Academia and Industry (GT, RM, RS, AS), pp. 61–68.
CSEETCSEET-2009-WuWSK #development #education #evaluation #framework #game studies
An Evaluation of Using a Game Development Framework in Higher Education (BW, AIW, JES, TBK), pp. 41–44.
EDMEDM-2009-AbbasS #learning
an Argument Learning Environment Using Agent-Based ITS (ALES) (SA, HS), pp. 200–209.
EDMEDM-2009-AgapitoO #detection #performance
Detecting Symptoms of Low Performance Using Production Rules (JBA, AO), pp. 31–40.
EDMEDM-2009-FengBH #composition #education #learning
Using Learning Decomposition and Bootstrapping with Randomization to Compare the Impact of Different Educational Interventions on Learning (MF, JB, NTH), pp. 51–60.
EDMEDM-2009-PavlikCK #analysis #automation #domain model #learning #modelling
Learning Factors Transfer Analysis: Using Learning Curve Analysis to Automatically Generate Domain Models (PIPJ, HC, KRK), pp. 121–130.
EDMEDM-2009-RaiGB #parametricity
Using Dirichlet priors to improve model parameter plausibility (DR, YG, JB), pp. 141–150.
EDMEDM-2009-SacinASO #data mining #education #mining #recommendation
Recommendation in Higher Education Using Data Mining Techniques (CVS, JBA, LS, AO), pp. 191–199.
ITiCSEITiCSE-2009-AhoniemiK
Analyzing the use of a rubric-based grading tool (TA, VK), pp. 333–337.
ITiCSEITiCSE-2009-Al-BowAEFFLLM #education #game studies #programming #student
Using game creation for teaching computer programming to high school students and teachers (MAB, DA, JE, RF, JF, CL, STL, SM), pp. 104–108.
ITiCSEITiCSE-2009-AltinBEKOSSSMPR09a #experience #learning #student #tool support #user interface
Use of intuitive tools to enhance student learning and user experience (RA, MB, NE, CK, ÖCÖ, MS, HS, DS, CCM, CP, CRR), p. 365.
ITiCSEITiCSE-2009-BlasGMB #analysis #automation #composition
Automatic E-learning contents composition by using gap analysis techniques (JMdB, JMG, LdM, RB), p. 369.
ITiCSEITiCSE-2009-BrabrandD #taxonomy
Analyzing CS competencies using the SOLO taxonomy (CB, BD), p. 1.
ITiCSEITiCSE-2009-Dooley
Peer assessments using the moodle workshop tool (JFD), p. 344.
ITiCSEITiCSE-2009-Draganova #learning #mobile
Use of mobile phone technologies in learning (CD), p. 399.
ITiCSEITiCSE-2009-EnglishR #assessment #automation #case study #source code #student
Evaluating students’ programs using automated assessment: a case study (JE, TR), p. 371.
ITiCSEITiCSE-2009-Garcia-MateosA #algorithm #data type #online
A course on algorithms and data structures using on-line judging (GGM, JLFA), pp. 45–49.
ITiCSEITiCSE-2009-Gomez-MartinJA #design pattern #education #game studies #product line
Teaching design patterns using a family of games (MAGM, GJD, JA), pp. 268–272.
ITiCSEITiCSE-2009-Kultur
Keeping the pace in CS-1 through the use of CMS (CK), p. 398.
ITiCSEITiCSE-2009-MaFRRW #modelling #visualisation
Improving the mental models held by novice programmers using cognitive conflict and jeliot visualisations (LM, JDF, MR, IR, MW), pp. 166–170.
ITiCSEITiCSE-2009-MoffatT #algorithm #education
The use of MUVE technology in teaching AI algorithms (DCM, KT), p. 396.
ITiCSEITiCSE-2009-PatersonHC #approach #education #modelling #object-oriented #programming
Using coding patterns in a model-driven approach to teaching object oriented programming (JHP, JH, KFC), p. 358.
ITiCSEITiCSE-2009-Rubio-SanchezV #recursion
Tail recursion by using function generalization (MRS, JÁVI), p. 394.
ITiCSEITiCSE-2009-SoriaP #architecture #aspect-oriented #development #education #open source
Teaching software architectures and aspect-oriented software development using open-source projects (CCS, JP), p. 385.
ITiCSEITiCSE-2009-Steenkiste
The use of a controlled wireless testbed in courses (PS), pp. 80–84.
ITiCSEITiCSE-2009-Townsend #student
Using a groupware system in CS1 to engage introverted students (GCT), pp. 16–20.
ITiCSEITiCSE-2009-VillalobosCJ #interactive #learning #programming
Developing programming skills by using interactive learning objects (JV, NAC, CJ), pp. 151–155.
SIGITESIGITE-2009-Connolly #design #education #guidelines #web
No longer partying like it’s 1999: designing a modern web stream using the it2008 curriculum guidelines (RWC), pp. 74–79.
SIGITESIGITE-2009-Cross #protocol
Using a protocol analyzer to introduce communications protocols (GWC), pp. 178–181.
SIGITESIGITE-2009-HansenBGRM #novel #open source
A novel IP telephony course using open-source software (RAH, VMB, RG, DR, LM), pp. 43–49.
SIGITESIGITE-2009-OhMP #education #encryption #internet #protocol #simulation
Teaching high-assurance internet protocol encryption (haipe) using opnet modeler simulation tool (THO, SM, YP), pp. 161–165.
SIGITESIGITE-2009-PakC #assessment #markov #modelling #risk management
Asset priority risk assessment using hidden markov models (CP, JC), pp. 65–73.
SIGITESIGITE-2009-Stanley #architecture #education #hardware #logic #network #operating system #simulation
Using digital logic simulation as a teaching aid in discrete mathematics, hardware and operating systems, networking, computer organization and computer architecture: a workshop outline (TDS), pp. 1–2.
ICPCICPC-J-2008-HindleGH09 #complexity #rank
Reading beside the lines: Using indentation to rank revisions by complexity (AH, MWG, RCH), pp. 414–429.
CSMRCSMR-2009-BurenR #analysis #architecture #maintenance
Architectural Maintenance Using a Data Warehouse System for Availability Analysis (GB, CR), pp. 307–308.
CSMRCSMR-2009-Chikofsky #architecture #process
Using the ACART Process for Architecture Compliance (EJC), pp. 313–314.
CSMRCSMR-2009-FrankeJLUHEK #assessment #metric #network
A Method for Choosing Software Assessment Measures Using Bayesian Networks and Diagnosis (UF, PJ, RL, JU, DH, ME, JK), pp. 241–246.
CSMRCSMR-2009-Gimnich #design
Using Existing Software Assets in SOA Design (RG), pp. 309–310.
CSMRCSMR-2009-KpodjedoRGA #algorithm #evolution #question
Recovering the Evolution Stable Part Using an ECGM Algorithm: Is There a Tunnel in Mozilla? (SK, FR, PG, GA), pp. 179–188.
CSMRCSMR-2009-PatelHR #clustering #dependence #dynamic analysis
Software Clustering Using Dynamic Analysis and Static Dependencies (CP, AHL, JR), pp. 27–36.
CSMRCSMR-2009-Rombach #design #maintenance #product line
Design for Maintenance — Use of Engineering Principles and Product Line Technology (HDR), pp. 1–2.
CSMRCSMR-2009-SoriaPC #architecture #fault #locality #modelling #tool support
Tool Support for Fault Localization Using Architectural Models (AS, JADP, MRC), pp. 59–68.
CSMRCSMR-2009-SoriaPC09a #architecture #aspect-oriented #configuration management
Handling the Dynamic Reconfiguration of Software Architectures Using Aspects (CCS, JP, JÁC), pp. 263–266.
ICPCICPC-2009-GueheneucKM #comprehension
Working session: Using eye-tracking to understand program comprehension (YGG, HHK, JIM), pp. 278–279.
ICPCICPC-2009-MurphyVS #behaviour #process #programming
Using activity traces to characterize programming behaviour beyond the lab (GCM, PV, DCS), pp. 90–94.
ICPCICPC-2009-StefikG #debugging #empirical
Using spoken text to aid debugging: An empirical study (AS, EG), pp. 110–119.
ICSMEICSM-2009-AlamAH #dependence
Measuring the progress of projects using the time dependence of code changes (OA, BA, AEH), pp. 329–338.
ICSMEICSM-2009-BettenburgSH #empirical #off the shelf #risk management
An empirical study on the risks of using off-the-shelf techniques for processing mailing list data (NB, ES, AEH), pp. 539–542.
ICSMEICSM-2009-DaraLLST #execution #testing
Using dynamic execution data to generate test cases (RD, SL, WL, ASG, LT), pp. 433–436.
ICSMEICSM-2009-DongG #comprehension #hybrid
Understanding source package organization using the hybrid model (XD, MWG), pp. 575–578.
ICSMEICSM-2009-DraganCM
Using method stereotype distribution as a signature descriptor for software systems (ND, MLC, JIM), pp. 567–570.
ICSMEICSM-2009-FerzundAW #classification #metric
Software change classification using hunk metrics (JF, SNA, FW), pp. 471–474.
ICSMEICSM-2009-FokaefsTCS #clustering #object-oriented
Decomposing object-oriented class modules using an agglomerative clustering technique (MF, NT, AC, JS), pp. 93–101.
ICSMEICSM-2009-GayHMM #concept #feedback #on the
On the use of relevance feedback in IR-based concept location (GG, SH, AM, TM), pp. 351–360.
ICSMEICSM-2009-HolmesCWD #case study #source code
The end-to-end use of source code examples: An exploratory study (RH, RC, RJW, JD), pp. 555–558.
ICSMEICSM-2009-JeffreyGG #effectiveness #fault #locality #multi #performance
Effective and efficient localization of multiple faults using value replacement (DJ, NG, RG), pp. 221–230.
ICSMEICSM-2009-Li #analysis #dependence #identification
Identifying high-level dependence structures using slice-based dependence analysis (ZL), pp. 457–460.
ICSMEICSM-2009-Poshyvanyk #information retrieval #maintenance
Using information retrieval to support software maintenance tasks (DP), pp. 453–456.
ICSMEICSM-2009-ShihabJH #developer #open source
Studying the use of developer IRC meetings in open source projects (ES, ZMJ, AEH), pp. 147–156.
ICSMEICSM-2009-ShternT #clustering #evaluation
Refining clustering evaluation using structure indicators (MS, VT), pp. 297–305.
ICSMEICSM-2009-VasaLBN #analysis #comparative #evolution
Comparative analysis of evolving software systems using the Gini coefficient (RV, ML, PB, ON), pp. 179–188.
ICSMEICSM-2009-WitZD #clone tracking
Managing code clones using dynamic change tracking and resolution (MdW, AZ, AvD), pp. 169–178.
ICSMEICSM-2009-YokomoriSNI #component #framework #impact analysis #ranking
Assessing the impact of framework changes using component ranking (RY, HPS, MN, KI), pp. 189–198.
ICSMEICSM-2009-Yoo #impact analysis #metric #performance
Performance impact analysis with KPP using application response measurement in E-government systems (NY), pp. 503–506.
ICSMEICSM-2009-YoshikawaHS #natural language #ontology #source code #traceability
Recovering traceability links between a simple natural language sentence and source code using domain ontologies (TY, SH, MS), pp. 551–554.
MSRMSR-2009-EkanayakeTGB #concept #fault #predict #quality
Tracking concept drift of software projects using defect prediction quality (JE, JT, HCG, AB), pp. 51–60.
MSRMSR-2009-Kuhn #automation #component #evolution #source code #word
Automatic labeling of software components and their evolution using log-likelihood ratio of word frequencies in source code (AK), pp. 175–178.
MSRMSR-2009-LubsenZP #co-evolution
Using association rules to study the co-evolution of production & test code (ZL, AZ, MP), pp. 151–154.
MSRMSR-2009-MatterKN #debugging #developer
Assigning bug reports using a vocabulary-based expertise model of developers (DM, AK, ON), pp. 131–140.
MSRMSR-2009-ShihabJH #chat #developer #gnome #internet #on the
On the use of Internet Relay Chat (IRC) meetings by developers of the GNOME GTK+ project (ES, ZMJ, AEH), pp. 107–110.
MSRMSR-2009-TianRP #automation #categorisation
Using Latent Dirichlet Allocation for automatic categorization of software (KT, MR, DP), pp. 163–166.
WCREWCRE-1999-CapobiancoLOPP99a #analysis #traceability
Traceability Recovery Using Numerical Analysis (GC, ADL, RO, AP, SP), pp. 195–204.
WCREWCRE-1999-GatrellCH99a #c# #design pattern #replication
Design Patterns and Change Proneness: A Replication Using Proprietary C# Software (MG, SC, TH), pp. 160–164.
WCREWCRE-1999-Perez-CastilloGAP99a #legacy #on the #source code
On the Use of ADM to Contextualize Data on Legacy Source Code for Software Modernization (RPC, IGRdG, OAG, MP), pp. 128–132.
WCREWCRE-1999-YangPZ99a #concept analysis #data access #feature model #multi #semantics
Domain Feature Model Recovery from Multiple Applications Using Data Access Semantics and Formal Concept Analysis (YY, XP, WZ), pp. 215–224.
CIAACIAA-2009-AhnH #heuristic #implementation
Implementation of State Elimination Using Heuristics (JHA, YSH), pp. 178–187.
CIAACIAA-2009-Sastre-Martinez #network #parsing #performance #recursion
Efficient Parsing Using Filtered-Popping Recursive Transition Networks (JMSM), pp. 241–244.
ICALPICALP-v1-2009-Jansen #constant #scheduling
An EPTAS for Scheduling Jobs on Uniform Processors: Using an MILP Relaxation with a Constant Number of Integral Variables (KJ), pp. 562–573.
ICALPICALP-v1-2009-Nederlof #algorithm #performance #problem
Fast Polynomial-Space Algorithms Using Möbius Inversion: Improving on Steiner Tree and Related Problems (JN), pp. 713–725.
ICALPICALP-v2-2009-CooperIKK #graph #random
Derandomizing Random Walks in Undirected Graphs Using Locally Fair Exploration Strategies (CC, DI, RK, AK), pp. 411–422.
LATALATA-2009-Blanchet-SadriMRW #algorithm #word
An Answer to a Conjecture on Overlaps in Partial Words Using Periodicity Algorithms (FBS, RM, AR, EW), pp. 188–199.
LATALATA-2009-Onodera #locality
New Morphic Characterizations of Languages in Chomsky Hierarchy Using Insertion and Locality (KO), pp. 648–659.
FMFM-2009-HjortRLPS #modelling #testing #user interface
Model-Based GUI Testing Using Uppaal at Novo Nordisk (UHH, JIR, KGL, MAP, AS), pp. 814–818.
FMFM-2009-JeffordsHAL #composition #fault tolerance #formal method #refinement
A Formal Method for Developing Provably Correct Fault-Tolerant Systems Using Partial Refinement and Composition (RDJ, CLH, MA, EIL), pp. 173–189.
FMFM-2009-JostLHSH #analysis #bound
“Carbon Credits” for Resource-Bounded Computations Using Amortised Analysis (SJ, HWL, KH, NS, MH), pp. 354–369.
FMFM-2009-LangM #composition #confluence #detection #partial order #reduction
Partial Order Reductions Using Compositional Confluence Detection (FL, RM), pp. 157–172.
FMFM-2009-ShaoKP #approach #bound #formal method #incremental #lightweight
An Incremental Approach to Scope-Bounded Checking Using a Lightweight Formal Method (DS, SK, DEP), pp. 757–772.
IFMIFM-2009-SalaunB #algebra #encoding #process
Realizability of Choreographies Using Process Algebra Encodings (GS, TB), pp. 167–182.
SEFMSEFM-2009-BertoliniM #model checking #probability #testing #user interface
Using Probabilistic Model Checking to Evaluate GUI Testing Techniques (CB, AM), pp. 115–124.
SEFMSEFM-2009-HieronsJUY #adaptation #sequence
Checking Sequence Construction Using Adaptive and Preset Distinguishing Sequences (RMH, GVJ, HU, HY), pp. 157–166.
SEFMSEFM-2009-HummelT #behaviour #specification
Behavioral Specification of Reactive Systems Using Stream-Based I/O Tables (BH, JT), pp. 137–146.
SEFMSEFM-2009-SubramaniamGP #finite #impact analysis #state machine #testing
Using Change Impact Analysis to Select Tests for Extended Finite State Machines (MS, BG, ZP), pp. 93–102.
SEFMSEFM-2009-TruongTN #analysis #coordination #multi
Coordinated Consensus Analysis of Multi-agent Systems Using Event-B (NTT, TBT, VHN), pp. 201–209.
SFMSFM-2009-ClarkGT #analysis #web #web service
Quantitative Analysis of Web Services Using SRMC (AC, SG, MT), pp. 296–339.
TLCATLCA-2009-Atkey #for free #parametricity #representation #syntax
Syntax for Free: Representing Syntax with Binding Using Parametricity (RA), pp. 35–49.
CEFPCEFP-2009-TothBHLTK #behaviour #dependence #erlang #graph #impact analysis #source code
Impact Analysis of Erlang Programs Using Behaviour Dependency Graphs (MT, IB, ZH, LL, MT, TK), pp. 372–390.
ICFPICFP-2009-GazagnaireH #database #functional #named #performance #programming #transaction
OXenstored: an efficient hierarchical and transactional database using functional programming with reference cell comparisons (TG, VH), pp. 203–214.
ICFPICFP-2009-PaganoAMCCWMC #case study #certification #embedded #experience #framework #ml #safety #tool support
Experience report: using objective caml to develop safety-critical embedded tools in a certification framework (BP, OA, TM, BC, EC, PW, PM, JLC), pp. 215–220.
ICFPICFP-2009-Pierce #education #programming language #proving
λ, the ultimate TA: using a proof assistant to teach programming language foundations (BCP), pp. 121–122.
AIIDEAIIDE-2009-TutenelSBK #design #game studies #semantics
Using Semantics to Improve the Design of Game Worlds (TT, RMS, RB, KJdK).
AIIDEAIIDE-2009-ZhaoS #behaviour #game studies #learning #modelling
Learning Character Behaviors Using Agent Modeling in Games (RZ, DS).
CoGCIG-2009-AveryLA #coordination #evolution
Evolving coordinated spatial tactics for autonomous entities using influence maps (PA, SJL, BA), pp. 341–348.
CoGCIG-2009-CardamoneLL #learning
Learning drivers for TORCS through imitation using supervised methods (LC, DL, PLL), pp. 148–155.
CoGCIG-2009-CowleyCBH #behaviour #modelling #predict
Analyzing player behavior in Pacman using feature-driven decision theoretic predictive modeling (BC, DC, MMB, RJH), pp. 170–177.
CoGCIG-2009-DrachenCY #modelling #self
Player modeling using self-organization in Tomb Raider: Underworld (AD, AC, GNY), pp. 1–8.
CoGCIG-2009-EbnerT #evolution #programming #search-based
Evolving driving controllers using Genetic Programming (ME, TT), pp. 279–286.
CoGCIG-2009-GalwayCB #difference #game studies #learning
Improving Temporal Difference game agent control using a dynamic exploration during control learning (LG, DC, MMB), pp. 38–45.
CoGCIG-2009-JangYC #algorithm #game studies #realtime
Optimal strategy selection of non-player character on real time strategy game using a speciated evolutionary algorithm (SHJ, JY, SBC), pp. 75–79.
CoGCIG-2009-MalikD #behaviour #coordination #metaprogramming #multi #testing
Improving testing of multi-unit computer players for unwanted behavior using coordination macros (AM, JD), pp. 355–362.
CoGCIG-2009-ThompsonL #automation #execution #realtime
Realtime execution of automated plans using evolutionary robotics (TT, JL), pp. 333–340.
DiGRADiGRA-2009-AndersonBCDLM #game studies #problem #video
Using microgenetic methods to investigate problem solving in video games (AA, CB, KMC, JD, AL, WM).
DiGRADiGRA-2009-DahlskogKA #classification #functional #game studies
Mapping the game landscape: Locating genres using functional classification (SD, AK, EA).
DiGRADiGRA-2009-EylesE #game studies
Using an RFID game to phenomenologically test a theoretical systemic model for describing ambient games (ME, RE).
DiGRADiGRA-2009-RibbensP #case study #experience #research
Researching player experiences through the use of different qualitative methods (WR, YP).
DiGRADiGRA-2009-RyanS #comprehension #game studies #interactive #learning #video
Evaluating Interactive Entertainment using Breakdown: Understanding Embodied Learning in Video Games (WR, MAS).
DiGRADiGRA-2009-Salazar #framework #multi #simulation
Simulating a Quasi-Simulation: A framework for using Multi Agent Simulation Techniques for studying MMORPGs (JS).
FDGFDG-2009-ChertoffBLL #3d #game studies
An exploration of menu techniques using a 3D game input device (DBC, RWB, JJLJ), pp. 256–262.
CoGVS-Games-2009-CharlesCM #game studies #representation #student
Using Player and World Representation Techniques from Computer Games to Improve Student Engagement (DC, TC, MM), pp. 36–42.
CoGVS-Games-2009-Halloran #communication #game studies
It's Talk, But Not as We Know It: Using VoIP to Communicate in War Games (JH0), pp. 133–140.
CoGVS-Games-2009-ValerioPMMSC
Second Life Information Desk System Using Instant Messaging and Short Messaging Service Technologies (SV, JP, LM, PM, CS, FdC), pp. 125–132.
CoGVS-Games-2009-VidaniC #design #game studies #modelling
Using a Task Modeling Formalism in the Design of Serious Games for Emergency Medical Procedures (ACV, LC), pp. 95–102.
GT-VMTGT-VMT-2009-MazanekM09a #diagrams #parsing
Contraction of Unconnected Diagrams using Least Cost Parsing (SM, MM), pp. 189–201.
CHICHI-2009-AokiHMMPSW #community #research
A vehicle for research: using street sweepers to explore the landscape of environmental community action (PMA, RJH, AMM, CM, EP, SS, AW), pp. 375–384.
CHICHI-2009-AppertZ #tool support
Using strokes as command shortcuts: cognitive benefits and toolkit support (CA, SZ), pp. 2289–2298.
CHICHI-2009-BaoG #what
What’s “this” you say?: the use of local references on distant displays (PB, DG), pp. 1029–1032.
CHICHI-2009-BergmanTBCW
It’s not that important: demoting personal information of low subjective importance using GrayArea (OB, ST, RBM, EC, SW), pp. 269–278.
CHICHI-2009-BuscherCM #eye tracking #predict #web #what
What do you see when you’re surfing?: using eye tracking to predict salient regions of web pages (GB, EC, MRM), pp. 21–30.
CHICHI-2009-FeketeEG #named
Motion-pointing: target selection using elliptical motions (JDF, NE, YG), pp. 289–298.
CHICHI-2009-FindlaterMMD #adaptation #performance
Ephemeral adaptation: the use of gradual onset to improve menu selection performance (LF, KM, JM, JQD), pp. 1655–1664.
CHICHI-2009-Gerber #effectiveness
Using improvisation to enhance the effectiveness of brainstorming (EG), pp. 97–104.
CHICHI-2009-HongC
Annotate once, appear anywhere: collective foraging for snippets of interest using paragraph fingerprinting (LH, EHC), pp. 1791–1794.
CHICHI-2009-HornSCJ #education #programming language #visual notation
Comparing the use of tangible and graphical programming languages for informal science education (MSH, ETS, RJC, RJKJ), pp. 975–984.
CHICHI-2009-JakobsenH #source code #visualisation
Fisheyes in the field: using method triangulation to study the adoption and use of a source code visualization (MRJ, KH), pp. 1579–1588.
CHICHI-2009-KitturCS #topic #what #wiki
What’s in Wikipedia?: mapping topics and conflict using socially annotated category structure (AK, EHC, BS), pp. 1509–1512.
CHICHI-2009-LawA #game studies #named
Input-agreement: a new mechanism for collecting data using human computation games (EL, LvA), pp. 1197–1206.
CHICHI-2009-MarshallFHRHRYD #interactive #physics
Fighting for control: children’s embodied interactions when using physical and digital representations (PM, RF, AH, JR, EH, YR, NY, NSD), pp. 2149–2152.
CHICHI-2009-WonJH #visual notation #web
Contextual web history: using visual and contextual cues to improve web browser history (SSW, JJ, JIH), pp. 1457–1466.
CHICHI-2009-YamashitaIKI #multi
Difficulties in establishing common ground in multiparty groups using machine translation (NY, RI, HK, TI), pp. 679–688.
HCIDHM-2009-Butler #3d
Using 3D Head and Respirator Shapes to Analyze Respirator Fit (KMB), pp. 483–491.
HCIDHM-2009-EllegastHS #assessment
Workload Assessment in Field Using the Ambulatory CUELA System (RPE, IH, CS), pp. 221–226.
HCIDHM-2009-FaustC #3d
3D Body Scanning’s Contribution to the Use of Apparel as an Identity Construction Tool (MEF, SC), pp. 19–28.
HCIDHM-2009-JeonJKH #classification #gender
Facial Gender Classification Using LUT-Based Sub-images and DIE (JBJ, SHJ, DJK, KSH), pp. 36–45.
HCIDHM-2009-McInnesSP #reliability
Within and Between-Subject Reliability Using Classic Jack for Ergonomic Assessments (BM, AS, JP), pp. 653–660.
HCIDHM-2009-PandithLD #evaluation
The Impact of Change in Software on Satisfaction: Evaluation Using Critical Incident Technique (CIT) (AP, ML, VGD), pp. 717–726.
HCIDHM-2009-SummerskillMCGSD #case study #evaluation #validation
Validation of the HADRIAN System Using an ATM Evaluation Case Study (SJS, RM, KC, DEG, RES, PD), pp. 727–736.
HCIHCD-2009-CantoniBFB #human-computer #requirements
Playful Holistic Support to HCI Requirements Using LEGO Bricks (LC, LB, MF, DB), pp. 844–853.
HCIHCD-2009-ChuangO #correlation #design #mobile
A Photo Correlation Map Using Mobile AP II for Scenario-Based Design (YLC, MO), pp. 177–183.
HCIHCD-2009-HasanMP #e-commerce #usability
Using Google Analytics to Evaluate the Usability of E-Commerce Sites (LH, AM, SGP), pp. 697–706.
HCIHCD-2009-HashizumeKY #communication #difference
Regional Difference in the Use of Cell Phone and Other Communication Media among Senior Users (AH, MK, TY), pp. 426–435.
HCIHCD-2009-JarrettQRAS #analysis #development #metric #testing #usability #web
Using Measurements from Usability Testing, Search Log Analysis and Web Traffic Analysis to Inform Development of a Complex Web Site Used for Complex Tasks (CJ, WQ, IR, SA, VS), pp. 729–738.
HCIHCD-2009-JonesND #information retrieval #set
Use of Nursing Management Minimum Data Set (NMMDS) for a Focused Information Retrieval (JFJ, ETN, CD), pp. 972–978.
HCIHCD-2009-MisawaF #case study #experience #generative #idea #user interface
A Proposal of XB-Method, an Idea Generation System for New Services Using User Experiences (NM, MF), pp. 276–283.
HCIHCD-2009-Rocker
Perceived Usefulness and Perceived Ease-of-Use of Ambient Intelligence Applications in Office Environments (CR), pp. 1052–1061.
HCIHCD-2009-Seland #design #game studies #mobile
Empowering End Users in Design of Mobile Technology Using Role Play as a Method: Reflections on the Role-Play Conduction (GS), pp. 912–921.
HCIHCD-2009-ShibukawaFIN #effectiveness
Fundamental Studies on Effective e-Learning Using Physiology Indices (MS, MFF, YI, SPN), pp. 795–804.
HCIHCD-2009-YuL #generative #idea
Facilitating Idea Generation Using Personas (DJY, WCL), pp. 381–388.
HCIHCI-AUII-2009-FanS #3d #navigation #user interface
Pull and Push: Proximity-Aware User Interface for Navigating in 3D Space Using a Handheld Camera (MF, YS), pp. 133–140.
HCIHCI-AUII-2009-IizukaAM #behaviour
The Anticipation of Human Behavior Using “Parasitic Humanoid” (HI, HA, TM), pp. 284–293.
HCIHCI-AUII-2009-JeongSGKJ
Object Scanning Using a Sensor Frame (SJ, TS, GG, KHK, JWJ), pp. 433–439.
HCIHCI-AUII-2009-JiK #named
CLURD: A New Character-Inputting System Using One 5-Way Key Module (HJ, TK), pp. 39–47.
HCIHCI-AUII-2009-KimPS #3d #design
Menu Design in Cell Phones: Use of 3D Menus (KK, RWP, GS), pp. 48–57.
HCIHCI-AUII-2009-KubickiLLSKC #human-computer #interactive
New Human-Computer Interactions Using Tangible Objects: Application on a Digital Tabletop with RFID Technology (SK, SL, YL, PDS, CK, JC), pp. 446–455.
HCIHCI-AUII-2009-LeeJLJCY #monitoring #smarttech
Wearable ECG Monitoring System Using Conductive Fabrics and Active Electrodes (SHL, SMJ, CKL, KSJ, GC, SKY), pp. 778–783.
HCIHCI-AUII-2009-MatsuiIK #image #recognition
Front Environment Recognition of Personal Vehicle Using the Image Sensor and Acceleration Sensors for Everyday Computing (TM, TI, YK), pp. 151–158.
HCIHCI-AUII-2009-SongPJPKJ #effectiveness #human-computer #interactive #multi
Multi-pointing Method Using a Desk Lamp and Single Camera for Effective Human-Computer Interaction (TS, TCP, SJ, JHP, KHK, JWJ), pp. 520–525.
HCIHCI-AUII-2009-SungJC #metric
Establishing a Measurement System for Human Motions Using a Textile-Based Motion Sensor (MS, KJ, GC), pp. 784–792.
HCIHCI-AUII-2009-TakadaOKT #navigation #smarttech
A Context-Aware AR Navigation System Using Wearable Sensors (DT, TO, KK, HT), pp. 793–801.
HCIHCI-AUII-2009-TokiwaYNSI
Motion Capture System Using an Optical Resolver (TT, MY, HN, MS, MI), pp. 536–543.
HCIHCI-NIMT-2009-BeinhauerH #evaluation #mobile #multimodal
Using Acoustic Landscapes for the Evaluation of Multimodal Mobile Applications (WB, CH), pp. 3–11.
HCIHCI-NIMT-2009-ChoumaneS #interactive #modelling #multimodal
Modeling and Using Salience in Multimodal Interaction Systems (AC, JS), pp. 12–18.
HCIHCI-NIMT-2009-Jain #human-computer #multimodal
Value of Using Multimodal Data in HCI Methodologies (JJ), pp. 48–57.
HCIHCI-NIMT-2009-KotaniYAH #representation
Representation of Velocity Information by Using Tactile Apparent Motion (KK, TY, TA, KH), pp. 470–478.
HCIHCI-NIMT-2009-KoudaKS #design #interface
Motion Stroke-A Tablet-Based Interface for Motion Design Tool Using Drawing (HK, IK, KS), pp. 821–829.
HCIHCI-NIMT-2009-MikhailAGSSE #communication #named
BEXPLORER: Computer and Communication Control Using EEG (MM, MAS, MG, NS, BS, KEA), pp. 579–587.
HCIHCI-NIMT-2009-MiwaIWIN
Shadow Awareness: Bodily Expression Supporting System with Use of Artificial Shadow (YM, SI, TW, KI, HN), pp. 226–235.
HCIHCI-NIMT-2009-OkitaNS #communication
Non-verbal Communication System Using Pictograms (MO, YN, HS), pp. 720–724.
HCIHCI-NIMT-2009-SadP09a #gesture #representation
Using Pictographic Representation, Syntactic Information and Gestures in Text Entry (HHS, FP), pp. 735–744.
HCIHCI-NIMT-2009-SanchezFFP #development #interface
Development of Symbiotic Brain-Machine Interfaces Using a Neurophysiology Cyberworkstation (JCS, RJOF, JABF, JCP), pp. 606–615.
HCIHCI-NIMT-2009-SchreiberWB #concept #interactive
New Interaction Concepts by Using the Wii Remote (MS, MvWM, RB), pp. 261–270.
HCIHCI-NIMT-2009-SuzukiMT #interactive #interface
Interaction Technique for a Pen-Based Interface Using Finger Motions (YS, KM, JT), pp. 503–512.
HCIHCI-NT-2009-AbeOO #automation #image
Automatic Method for Measuring Eye Blinks Using Split-Interlaced Images (KA, SO, MO), pp. 3–11.
HCIHCI-NT-2009-BeeldersBMD #interface #performance #prototype #word
Measuring User Performance for Different Interfaces Using a Word Processor Prototype (TRB, PJB, TM, ED), pp. 395–404.
HCIHCI-NT-2009-HaesenMLC #design #multi
Supporting Multidisciplinary Teams and Early Design Stages Using Storyboards (MH, JM, KL, KC), pp. 616–623.
HCIHCI-NT-2009-HermannJSS #internet
Acceptance of Future Technologies Using Personal Data: A Focus Group with Young Internet Users (FH, DJ, DS, AS), pp. 431–437.
HCIHCI-NT-2009-KimWW #adaptation #parametricity #process #recognition #research
The Research on Adaptive Process for Emotion Recognition by Using Time-Dependent Parameters of Autonomic Nervous Response (JK, MCW, JW), pp. 77–84.
HCIHCI-NT-2009-MiyazakiSY #behaviour #distributed #java #runtime #virtual machine
Investigating the Run Time Behavior of Distributed Applications by Using Tiny Java Virtual Machines with Wireless Communications (TM, TS, FY), pp. 882–889.
HCIHCI-NT-2009-OkuboF #development #estimation
Development of Estimation System for Concentrate Situation Using Acceleration Sensor (MO, AF), pp. 131–140.
HCIHCI-NT-2009-SuzukiMSANYF #estimation #on the #performance
On the Possibility about Performance Estimation Just before Beginning a Voluntary Motion Using Movement Related Cortical Potential (SS, TM, YS, KA, NN, TY, SF), pp. 184–191.
HCIHCI-VAD-2009-BuxtonTF #evaluation #heuristic #scalability
Heuristic Evaluation of Mission-Critical Software Using a Large Team (TB, AT, ALF), pp. 673–682.
HCIHCI-VAD-2009-CasasOP #education #tablet
Using Tablet PCs and Pen-Based Technologies to Support Engineering Education (IC, SFO, JP), pp. 31–38.
HCIHCI-VAD-2009-MampadiCG #adaptation #hypermedia #information management #learning
The Effects of Prior Knowledge on the Use of Adaptive Hypermedia Learning Systems (FM, SYC, GG), pp. 156–165.
HCIHCI-VAD-2009-OHearB #enterprise #process #user interface
Using Activity Descriptions to Generate User Interfaces for ERP Software (TO, YB), pp. 577–586.
HCIHCI-VAD-2009-Sano #framework
A Proposal for a Framework for an e-Alumni Program Using SNS (HS), pp. 209–216.
HCIHIMI-DIE-2009-KumeS #analysis #web
Construction of the Data Save System of the Cusp Surface Analysis Using Web Application (YK, JSS), pp. 665–674.
HCIHIMI-DIE-2009-LaquaiAPR #3d #interactive #multimodal #user interface
Using 3D Touch Interaction for a Multimodal Zoomable User Interface (FL, MA, TP, GR), pp. 543–552.
HCIHIMI-DIE-2009-LeeLKC #detection #enterprise #fault #information management #process #statistics
Proactive Fault Detection Schema for Enterprise Information System Using Statistical Process Control (CL, DL, JK, JWC), pp. 113–122.
HCIHIMI-DIE-2009-MistrzykR #industrial #modelling
Practical Use of Task Models for Building and Modeling Operations Chart in the Industrial Production (TM, AR), pp. 140–148.
HCIHIMI-DIE-2009-NakagawaNM
Determination of Inspection Threshold Using Perceptive Sensitivities of Experienced Panel (MN, HN, TM), pp. 279–286.
HCIHIMI-DIE-2009-Soderston #experience #tool support #user interface
A Retrospective and Prospective View of Information Technology Professionals’ Use of Tools: Maturing the User Experience (CS), pp. 306–315.
HCIHIMI-DIE-2009-SrinivasSPK #classification #feature model #performance
Efficient Text Classification Using Best Feature Selection and Combination of Methods (MS, KPS, EVP, SAK), pp. 437–446.
HCIHIMI-II-2009-HadaS #development #mobile #process
Development of an Annotation-Based Classroom Activities Support Environment Using Digital Appliance, Mobile Device and PC (YH, MS), pp. 642–649.
HCIHIMI-II-2009-HasegawaOWMM #estimation #mobile
Legible Character Size on Mobile Terminal Screens: Estimation Using Pinch-in/Out on the iPod Touch Panel (SH, MO, TW, SM, MM), pp. 395–402.
HCIHIMI-II-2009-KimMC #clustering #network #protocol
A Hierarchical Data Dissemination Protocol Using Probability-Based Clustering for Wireless Sensor Networks (MK, MWM, HC), pp. 149–158.
HCIHIMI-II-2009-KimMPH #performance #visualisation
Efficient Annotation Visualization Using Distinctive Features (SKK, SHM, JP, SYH), pp. 295–303.
HCIHIMI-II-2009-LigdaJLJ #automation #distributed #tool support
Pilot Confidence with ATC Automation Using Cockpit Situation Display Tools in a Distributed Traffic Management Environment (SVL, NHJ, JL, WWJ), pp. 816–825.
HCIHIMI-II-2009-MilanovaKRTK #adaptation #image #representation #retrieval
Content Based Image Retrieval Using Adaptive Inverse Pyramid Representation (MGM, RK, SHR, VT, RK), pp. 304–314.
HCIHIMI-II-2009-SawaragiIHN #approach #identification
Identifying Latent Similarities among Near-Miss Incident Records Using a Text-Mining Method and a Scenario-Based Approach (TS, KI, YH, HN), pp. 594–603.
HCIHIMI-II-2009-SchwarzlerRWR #modelling #visual notation
Using Graphical Models for an Intelligent Mixed-Initiative Dialog Management System (SS, GR, FW, GR), pp. 201–209.
HCIHIMI-II-2009-WatanabeOHMM #mobile
Usefulness of Mobile Information Provision Systems Using Graphic Text -Visibility of Graphic Text on Mobile Phones (TW, MO, SH, SM, MM), pp. 476–485.
HCIHIMI-II-2009-YajimaSM
Remote Consultation System Using Hierarchically Structured Agents (HY, JS, KM), pp. 609–618.
HCIIDGD-2009-BoseS #hypermedia
The Use of Hypertext as a Vocabulary Acquisition Strategy for English as Second Language Learners (DB, DS), pp. 147–155.
HCIIDGD-2009-EngleF #metric #multi #scalability
Rescaling Non-metric Data to Metric Data Using Multi-Dimensional Scaling (KME, GAF), pp. 245–253.
HCIIDGD-2009-PhukanR #eye tracking #usability
Considerations for Using Eye Trackers during Usability Studies (AP, MR), pp. 301–307.
HCIIDGD-2009-SwansonSG #framework
Exploring Cultural Context Using the Contextual Scenario Framework (ES, KS, JG), pp. 117–126.
HCIOCSC-2009-AndersenFLN #development #game studies
The Coming Revolution in Competence Development: Using Serious Games to Improve Cross-Cultural Skills (BA, MF, PL, VPN), pp. 413–422.
HCIOCSC-2009-ChaLHK #evaluation
User Reputation Evaluation Using Co-occurrence Feature and Collective Intelligence (JWC, HwL, YSH, LK), pp. 305–311.
HCIOCSC-2009-JohnsonB #community #wiki
Creating Community through the Use of a Class Wiki (KAJ, JB), pp. 471–478.
HCIOCSC-2009-KadenbachK #challenge #collaboration #development #education #social
Benefits and Challenges of Using Collaborative Development Environments with Social Software in Higher Computer Science Education (DK, CK), pp. 479–487.
HCIOCSC-2009-SongNKE #recommendation #word
A Proposed Movie Recommendation Method Using Emotional Word Selection (MS, HN, HGK, JE), pp. 525–534.
HCIOCSC-2009-TsuchihashiO #case study #interface
A Study on the Interface for Viewing the Information Menu of a Town from Intersections Using a Digital Compass (MT, KO), pp. 126–133.
CAiSECAiSE-2009-GaillyP #modelling #ontology #standard
Using the REA Ontology to Create Interoperability between E-Collaboration Modeling Standards (FG, GP), pp. 395–409.
CAiSECAiSE-2009-GiachettiMP #automation #domain-specific language #generative #modelling #uml
Using UML as a Domain-Specific Modeling Language: A Proposal for Automatic Generation of UML Profiles (GG, BM, OP), pp. 110–124.
CAiSECAiSE-2009-KaiyaTSSK #analysis #quality #requirements
Spectrum Analysis for Quality Requirements by Using a Term-Characteristics Map (HK, MT, SS, TS, KK), pp. 546–560.
CAiSECAiSE-2009-LiuLYWH #analysis #constraints #verification #workflow
ETL Workflow Analysis and Verification Using Backwards Constraint Propagation (JL, SL, DY, JW, TH), pp. 455–469.
CAiSECAiSE-2009-MaoBPF #automation #generative
Defining and Using Schematic Correspondences for Automatically Generating Schema Mappings (LM, KB, NWP, AAAF), pp. 79–93.
CAiSECAiSE-2009-SalayM #diagrams #quality #test coverage
Improving Model Quality Using Diagram Coverage Criteria (RS, JM), pp. 186–200.
CAiSECAiSE-2009-SalayME #megamodelling #modelling
Using Macromodels to Manage Collections of Related Models (RS, JM, SME), pp. 141–155.
EDOCEDOC-2009-BoukhebouzeABM #modelling #process #rule-based #verification
Rule-Based Modeling and Verification of Business Processes Using ECAPE Net (MB, YA, ANB, ZM), p. 74–?.
EDOCEDOC-2009-BucklEMRS #architecture #enterprise
Using Enterprise Architecture Management Patterns to Complement TOGAF (SB, AME, FM, RR, CMS), pp. 34–41.
ICEISICEIS-AIDSS-2009-CastroAP #approach #concept #implementation #metadata #named
K-annotations — An Approach for Conceptual Knowledge Implementation using Metadata Annotations (ESEC, MA, RTP), pp. 66–72.
ICEISICEIS-AIDSS-2009-CastroO #multi #quality
Using Quality Costs in a Multi-agent System for an Airline Operations Control (AJMC, EO), pp. 19–24.
ICEISICEIS-AIDSS-2009-ChongC
An Investigation into Dynamic Customer Requirement using Computational Intelligence (YTC, CHC), pp. 113–117.
ICEISICEIS-AIDSS-2009-KhashmanD #image #network
Optimum DCT Compression of Medical Images using Neural Networks (AK, KD), pp. 90–95.
ICEISICEIS-AIDSS-2009-KuoWHH #clustering #network #optimisation #order
An Order Clustering System using ART2 Neural Network and Particle Swarm Optimization Methodn (RJK, MJW, TWH, TLH), pp. 54–59.
ICEISICEIS-AIDSS-2009-MarinicaOG #algorithm #mining
User-driven Association Rule Mining using a Local Algorithm (CM, AO, FG), pp. 200–205.
ICEISICEIS-AIDSS-2009-OReilly #algorithm #multi #optimisation
Frequency Assignment Optimization using the Swarm Intelligence Multi-agent based Algorithm (SIMBA) (GBO), pp. 25–32.
ICEISICEIS-AIDSS-2009-RaimbaultGL #diagrams #information management #uml
Using UML Class Diagram as a Knowledge Engineering Tool (TR, DG, SL), pp. 60–65.
ICEISICEIS-AIDSS-2009-RodriguesNCM
Estimating Greenhouse Gas Emissions using Computational Intelligence (JAPR, LBN, PHGC, JCCBSdM), pp. 248–250.
ICEISICEIS-AIDSS-2009-SunLTT #2d #invariant #recognition
Using GRA for 2D Invariant Object Recognition (THS, JCL, CHT, FCT), pp. 108–112.
ICEISICEIS-AIDSS-2009-TsengCH #approach #assembly #multi #sequence
A Decision Support System for Multi-plant Assembly Sequence Planning using a PSO Approach (YJT, JYC, FYH), pp. 124–129.
ICEISICEIS-DISI-2009-GroppeGK #optimisation
Optimization of SPARQL by using coreSPARQL (JG, SG, JK), pp. 107–112.
ICEISICEIS-DISI-2009-GuerraBOSS #keyword #named
Keymantic: A Keyword-based Search Engine using Structural Knowledge (FG, SB, MO, AS, CS), pp. 241–246.
ICEISICEIS-DISI-2009-GustienePH #analysis #design #framework #integration #semantics
Semantic Framework for Information Integration — Using Service-oriented Analysis and Design (PG, IP, HH), pp. 64–69.
ICEISICEIS-DISI-2009-MoserMBM #approach #integration #modelling #performance #requirements #semantics
Efficient System Integration using Semantic Requirements and Capability Models — An Approach for Integrating Heterogeneous Business Services (TM, RM, SB, AM), pp. 56–63.
ICEISICEIS-DISI-2009-RomeuAC #integration #metric
Integration Method Among BSC, CMMI and Six Sigma using GQM to Support Measurement Definition (MIBCIS) (LR, JA, AC), pp. 171–176.
ICEISICEIS-HCI-2009-JuniorJATPASN #interactive #internet #multi #prototype #web
Back Channel in Interactive Digital Television Systems: Strategies for Prototyping Applications using an Interactive Service Provider — Internet Computing — Interactive and Multimedia Web Applications (JBdSJ, JCdMMJ, ICA, FCT, GMP, PMdÁ, MdS, RFdN), pp. 130–135.
ICEISICEIS-HCI-2009-NakanishiTO #artificial reality #complexity #design #effectiveness #guidelines #verification
Study for Establishing Design Guidelines for Manuals using Augmented Reality Technology — Verification and Expansion of the Basic Model Describing “Effective Complexity” (MN, SiT, YO), pp. 21–26.
ICEISICEIS-HCI-2009-NetoD #case study #gesture #scalability
A Study on the use of Gestures for Large Displays (AN, CD), pp. 55–60.
ICEISICEIS-ISAS-2009-CiaramellaCLM #agile #process #prototype
Using BPMN and Tracing for Rapid Business Process Prototyping Environments (AC, MGCAC, BL, FM), pp. 206–212.
ICEISICEIS-ISAS-2009-FerreiraCAB #modelling #requirements
Keeping the Rationale of IS Requirements using Organizational Business Models (JJF, VMC, RMdA, FAB), pp. 292–297.
ICEISICEIS-ISAS-2009-KinderenGA #modelling #multi #reasoning
Reasoning about Customer Needs in Multi-supplier ICT Service Bundles using Decision Models (SdK, JG, HA), pp. 131–136.
ICEISICEIS-ISAS-2009-MansourH #approach #database #framework #rule-based #xml
A Rule-based Approach and Framework for Managing Best Practices — An XML-based Management using Pure Database System Utilities (EM, HH), pp. 109–115.
ICEISICEIS-ISAS-2009-NascimentoITR #legacy #process
A Method for Rewriting Legacy Systems using Business Process Management Technology (GSdN, CI, LHT, MR), pp. 57–62.
ICEISICEIS-ISAS-2009-OussenaB #analysis #implementation #modelling #process
Layered Process Models — Analysis and Implementation (using MDA Principles) (SO, BSB), pp. 168–175.
ICEISICEIS-J-2009-CallegariB #fuzzy #logic #multi
A Multi-criteria Resource Selection Method for Software Projects Using Fuzzy Logic (DAC, RMB), pp. 376–388.
ICEISICEIS-J-2009-CarrascoHRSE #embedded #interface #monitoring #safety
Remote Controlling and Monitoring of Safety Devices Using Web-Interface Embedded Systems (AC, MDH, MCR, FS, JIE), pp. 737–744.
ICEISICEIS-J-2009-GadK #clustering #performance #semantics #similarity
Enhancing Text Clustering Performance Using Semantic Similarity (WKG, MSK), pp. 325–335.
ICEISICEIS-J-2009-MohebiS #ambiguity #analysis #clustering #detection #hybrid #network
An Optimized Hybrid Kohonen Neural Network for Ambiguity Detection in Cluster Analysis Using Simulated Annealing (EM, MNMS), pp. 389–401.
ICEISICEIS-J-2009-NachevHS #fuzzy #network #predict
Insolvency Prediction of Irish Companies Using Backpropagation and Fuzzy ARTMAP Neural Networks (AN, SH, BS), pp. 287–298.
ICEISICEIS-J-2009-NollR #concept #traceability
Concepts-Based Traceability: Using Experiments to Evaluate Traceability Techniques (RPN, MBR), pp. 539–550.
ICEISICEIS-J-2009-Sun #network
Stereo Matching Using Synchronous Hopfield Neural Network (THS), pp. 336–347.
ICEISICEIS-SAIC-2009-CernuzziZ #design #named #tool support
Gaia4E: A Tool Supporting the Design of MAS using Gaia (LC, FZ), pp. 82–88.
ICEISICEIS-SAIC-2009-CiuffoI #case study #collaboration #information management #recommendation
Using Grids to Support Information Filtering Systems — A Case Study of Running Collaborative Filtering Recommendations on gLite (LNC, EI), pp. 12–18.
ICEISICEIS-SAIC-2009-GandhiT #categorisation #email #ontology
Ontology-based Email Categorization and Task Inference using a Lexicon-enhanced Ontology (PG, RT), pp. 102–107.
ICEISICEIS-SAIC-2009-LeeLK #classification
Blog Classification using K-means (KJL, ML, WK), pp. 61–67.
CIKMCIKM-2009-AchananuparpYC
Using negative voting to diversify answers in non-factoid question answering (PA, CCY, XC), pp. 1681–1684.
CIKMCIKM-2009-AlgarniLXL #effectiveness #feedback #information management
An effective model of using negative relevance feedback for information filtering (AA, YL, YX, RYKL), pp. 1605–1608.
CIKMCIKM-2009-AlonsoGB #clustering #timeline
Clustering and exploring search results using timeline constructions (OA, MG, RABY), pp. 97–106.
CIKMCIKM-2009-AnastasakosHKR #approach #collaboration #graph #recommendation
A collaborative filtering approach to ad recommendation using the query-ad click graph (TA, DH, SK, HR), pp. 1927–1930.
CIKMCIKM-2009-BalasubramanianC #automation #generative #modelling #topic
Automatic generation of topic pages using query-based aspect models (NB, SC), pp. 2049–2052.
CIKMCIKM-2009-BatalH #classification
Boosting KNN text classification accuracy by using supervised term weighting schemes (IB, MH), pp. 2041–2044.
CIKMCIKM-2009-BohmNPW #clustering
Density-based clustering using graphics processors (CB, RN, CP, BW), pp. 661–670.
CIKMCIKM-2009-CaoCCJZ #categorisation #modelling #retrieval
The use of categorization information in language models for question retrieval (XC, GC, BC, CSJ, CZ), pp. 265–274.
CIKMCIKM-2009-DasdanDKD #automation #interface #query #retrieval
Automatic retrieval of similar content using search engine query interface (AD, PD, SK, CD), pp. 701–710.
CIKMCIKM-2009-DengKL #retrieval
Enhancing expertise retrieval using community-aware strategies (HD, IK, MRL), pp. 1733–1736.
CIKMCIKM-2009-FernandezL #retrieval
Using opinion-based features to boost sentence retrieval (RTF, DEL), pp. 1617–1620.
CIKMCIKM-2009-GurajadaK #clustering #maintenance #online
On-line index maintenance using horizontal partitioning (SG, PSK), pp. 435–444.
CIKMCIKM-2009-GwaderaC #mining #ranking
Mining and ranking streams of news stories using cross-stream sequential patterns (RG, FC), pp. 1709–1712.
CIKMCIKM-2009-HuSZC #clustering #semantics
Exploiting internal and external semantics for the clustering of short texts using world knowledge (XH, NS, CZ, TSC), pp. 919–928.
CIKMCIKM-2009-IslamI #set #web
Real-word spelling correction using Google web 1Tn-gram data set (AI, DI), pp. 1689–1692.
CIKMCIKM-2009-KatoOOT #query #relational #web
Query by analogical example: relational search using web search engine indices (MPK, HO, SO, KT), pp. 27–36.
CIKMCIKM-2009-KhareA #empirical #interface #markov #segmentation
An empirical study on using hidden markov model for search interface segmentation (RK, YA), pp. 17–26.
CIKMCIKM-2009-KimC #pseudo #retrieval
Retrieval experiments using pseudo-desktop collections (JK, WBC), pp. 1297–1306.
CIKMCIKM-2009-KobayakawaKTOKT #analysis #classification #kernel
Opinion classification with tree kernel SVM using linguistic modality analysis (TSK, TK, HT, NO, JDK, JT), pp. 1791–1794.
CIKMCIKM-2009-KuttyNL #approach #clustering #documentation #named #xml
XCFS: an XML documents clustering approach using both the structure and the content (SK, RN, YL), pp. 1729–1732.
CIKMCIKM-2009-LeeNL #approach #feedback #retrieval
An improved feedback approach using relevant local posts for blog feed retrieval (YL, SHN, JHL), pp. 1971–1974.
CIKMCIKM-2009-LeeVRKMI #adaptation #performance #topic
Measuring system performance and topic discernment using generalized adaptive-weight mean (CTL, VV, EMR, GK, NMF, AI), pp. 2033–2036.
CIKMCIKM-2009-LiuZ #classification #sentiment
Cross-domain sentiment classification using a two-stage method (KL, JZ), pp. 1717–1720.
CIKMCIKM-2009-LuHM #algorithm #approximate #performance
Efficient algorithms for approximate member extraction using signature-based inverted lists (JL, JH, XM), pp. 315–324.
CIKMCIKM-2009-MabroukehE #mining #ontology #predict #semantics #web
Using domain ontology for semantic web usage mining and next page prediction (NRM, CIE), pp. 1677–1680.
CIKMCIKM-2009-MaCQG #game studies
Improving search engines using human computation games (HM, RC, CQ, AG), pp. 275–284.
CIKMCIKM-2009-MartineauFJP #classification #difference #problem #word
Improving binary classification on text problems using differential word features (JM, TF, AJ, SP), pp. 2019–2024.
CIKMCIKM-2009-MouzaLRS #algebra #n-gram #named #string
AS-index: a structure for string search using n-grams and algebraic signatures (CdM, WL, PR, TJES), pp. 295–304.
CIKMCIKM-2009-PanCASD #feature model #ranking
Feature selection for ranking using boosted trees (FP, TC, DA, FS, GD), pp. 2025–2028.
CIKMCIKM-2009-ParkG #automation #metric #realtime #towards
Towards real-time measurement of customer satisfaction using automatically generated call transcripts (YP, SCG), pp. 1387–1396.
CIKMCIKM-2009-ParkR #analysis #information retrieval #kernel #semantics
Kernel latent semantic analysis using an information retrieval based kernel (LAFP, KR), pp. 1721–1724.
CIKMCIKM-2009-PuH #clustering #feedback #pseudo #semantics
Pseudo relevance feedback using semantic clustering in relevance language model (QP, DH), pp. 1931–1934.
CIKMCIKM-2009-RachakondaS #topic
Finding the topical anchors of a context using lexical cooccurrence data (ARR, SS), pp. 1741–1744.
CIKMCIKM-2009-RafieiL #query #web
Data extraction from the web using wild card queries (DR, HL), pp. 1939–1942.
CIKMCIKM-2009-SeoCS #community #concurrent #online #thread
Online community search using thread structure (JS, WBC, DAS), pp. 1907–1910.
CIKMCIKM-2009-VienVCYKC #kernel #locality #named #visualisation
VRIFA: a nonlinear SVM visualization tool using nomogram and localized radial basis function (LRBF) kernels (NAV, NHV, TC, HY, SK, BHC), pp. 2081–2082.
CIKMCIKM-2009-ViyanonM #database #detection #relational #similarity #xml
A system for detecting xml similarity in content and structure using relational database (WV, SKM), pp. 1197–1206.
CIKMCIKM-2009-VriesKCC #array #robust
Robust record linkage blocking using suffix arrays (TdV, HK, SC, PC), pp. 305–314.
CIKMCIKM-2009-WangML #learning #programming #question #rank #search-based
Learning to rank using evolutionary computation: immune programming or genetic programming? (SW, JM, JL), pp. 1879–1882.
CIKMCIKM-2009-WimalasuriyaD #information management #multi #ontology
Using multiple ontologies in information extraction (DCW, DD), pp. 235–244.
CIKMCIKM-2009-WuCZZ #approach #definite clause grammar #learning #novel #rank
Smoothing DCG for learning to rank: a novel approach using smoothed hinge functions (MW, YC, ZZ, HZ), pp. 1923–1926.
CIKMCIKM-2009-WuTW #query #revisited #xml
Answering XML queries using materialized views revisited (XW, DT, WHW), pp. 475–484.
CIKMCIKM-2009-XiaYZ #automation #web
Automatic web data extraction using tree alignment (YX, HY, SZ), pp. 1645–1648.
CIKMCIKM-2009-XuFZH #feature model #orthogonal
To obtain orthogonal feature extraction using training data selection (YX, SF, JZ, OH), pp. 1819–1822.
CIKMCIKM-2009-YangXBHSY #case study #cumulative #generative #information retrieval #social
A study of information retrieval on accumulative social descriptions using the generation features (LY, SX, SB, DH, ZS, YY), pp. 721–730.
ECIRECIR-2009-Ailon #algorithm #linear #query #ranking
A Simple Linear Ranking Algorithm Using Query Dependent Intercept Variables (NA), pp. 685–690.
ECIRECIR-2009-BolelliEG #detection #topic
Topic and Trend Detection in Text Collections Using Latent Dirichlet Allocation (LB, SE, CLG), pp. 776–780.
ECIRECIR-2009-Efron #aspect-oriented #multi #query
Using Multiple Query Aspects to Build Test Collections without Human Relevance Judgments (ME), pp. 276–287.
ECIRECIR-2009-HalveyPHVHGJ #case study #difference #low level #metric #retrieval #video
Diversity, Assortment, Dissimilarity, Variety: A Study of Diversity Measures Using Low Level Features for Video Retrieval (MH, PP, DH, RV, FH, AG, JMJ), pp. 126–137.
ECIRECIR-2009-KarimzadehganWR
Enhancing Expert Finding Using Organizational Hierarchies (MK, RWW, MR), pp. 177–188.
ECIRECIR-2009-LlorenteR #automation #higher-order #image #statistics
Using Second Order Statistics to Enhance Automated Image Annotation (AL, SMR), pp. 570–577.
ECIRECIR-2009-MissenB #detection #semantics
Using WordNet’s Semantic Relations for Opinion Detection in Blogs (MMSM, MB), pp. 729–733.
ECIRECIR-2009-WeerkampBR #email #information management
Using Contextual Information to Improve Search in Email Archives (WW, KB, MdR), pp. 400–411.
ECIRECIR-2009-YinSC #query
Query Expansion Using External Evidence (ZY, MS, NC), pp. 362–374.
ICMLICML-2009-CamposZJ #constraints #learning #network
Structure learning of Bayesian networks using constraints (CPdC, ZZ, QJ), pp. 113–120.
ICMLICML-2009-LiKZ #learning
Semi-supervised learning using label mean (YFL, JTK, ZHZ), pp. 633–640.
ICMLICML-2009-PlathTN #classification #image #multi #random #segmentation
Multi-class image segmentation using conditional random fields and global classification (NP, MT, SN), pp. 817–824.
ICMLICML-2009-RainaMN #learning #scalability
Large-scale deep unsupervised learning using graphics processors (RR, AM, AYN), pp. 873–880.
ICMLICML-2009-Schmidt #process
Function factorization using warped Gaussian processes (MNS), pp. 921–928.
ICMLICML-2009-TielemanH #performance #persistent
Using fast weights to improve persistent contrastive divergence (TT, GEH), pp. 1033–1040.
ICMLICML-2009-Toussaint #approximate #optimisation
Robot trajectory optimization using approximate inference (MT), pp. 1049–1056.
ICMLICML-2009-YiWSS #probability
Stochastic search using the natural gradient (YS, DW, TS, JS), pp. 1161–1168.
ICMLICML-2009-YuLZG #collaboration #parametricity #predict #random #scalability
Large-scale collaborative prediction using a nonparametric random effects model (KY, JDL, SZ, YG), pp. 1185–1192.
ICMLICML-2009-ZhanLLZ #learning #metric
Learning instance specific distances using metric propagation (DCZ, ML, YFL, ZHZ), pp. 1225–1232.
KDDKDD-2009-DundarHBRR #case study #dataset #detection #learning
Learning with a non-exhaustive training dataset: a case study: detection of bacteria cultures using optical-scattering technology (MD, EDH, AKB, JPR, BR), pp. 279–288.
KDDKDD-2009-FuxmanKGATS #automation #classification
Improving classification accuracy using automatically extracted training data (AF, AK, ABG, RA, PT, JCS), pp. 1145–1154.
KDDKDD-2009-JiYLZKY #interactive
Drosophila gene expression pattern annotation using sparse features and term-term interactions (SJ, LY, YXL, ZHZ, SK, JY), pp. 407–416.
KDDKDD-2009-Macskassy #empirical #graph #learning #metric
Using graph-based metrics with empirical risk minimization to speed up active learning on networked data (SAM), pp. 597–606.
KDDKDD-2009-MakanjuZM #clustering
Clustering event logs using iterative partitioning (AM, ANZH, EEM), pp. 1255–1264.
KDDKDD-2009-MaunzHK #graph #mining #refinement #scalability
Large-scale graph mining using backbone refinement classes (AM, CH, SK), pp. 617–626.
KDDKDD-2009-PatnaikMSR #data mining #mining
Sustainable operation and management of data center chillers using temporal data mining (DP, MM, RKS, NR), pp. 1305–1314.
KDDKDD-2009-SatuluriP #clustering #community #graph #probability #scalability
Scalable graph clustering using stochastic flows: applications to community discovery (VS, SP), pp. 737–746.
KDDKDD-2009-VatturiW #detection
Category detection using hierarchical mean shift (PV, WKW), pp. 847–856.
KDDKDD-2009-XuYL #mining
Named entity mining from click-through data using weakly supervised latent dirichlet allocation (GX, SHY, HL), pp. 1365–1374.
KDIRKDIR-2009-DuarteDRF #clustering #consistency
Cluster Ensemble Selection — Using Average Cluster Consistency (FJFD, JMMD, FR, ALNF), pp. 85–95.
KDIRKDIR-2009-FatemiPRS #concept #mining #retrieval #semantics #video
Using Association Rule Mining to Enrich Semantic Concepts for Video Retrieval (NF, FP, LER, AFS), pp. 119–126.
KDIRKDIR-2009-GoyalBM #query
Entailment of Causal Queries in Narratives using Action Language (PG, LB, TMM), pp. 112–118.
KDIRKDIR-2009-GuoK #ontology
Discovering Relationship Associations in Life Sciences using Ontology and Inference (WG, SBK), pp. 10–17.
KDIRKDIR-2009-KimRM #retrieval #semantics
A Patent Retrieval Method using Semantic Annotations (YK, JR, SHM), pp. 211–218.
KDIRKDIR-2009-KulkarniC #concept #semantics #word
Computation of the Semantic Relatedness between Words using Concept Clouds (SK, DC), pp. 183–188.
KDIRKDIR-2009-LamB #categorisation #invariant #multi
Invariant Categorisation of Polygonal Objects using Multi-resolution Signatures (RL, JMHdB), pp. 168–173.
KDIRKDIR-2009-WangVH #documentation #probability #retrieval
Document Retrieval using a Probabilistic Knowledge Model (SW, SV, MH), pp. 26–33.
KEODKEOD-2009-CeaGMS #development #ontology
Using Linguistic Patterns to Enhance Ontology Development (GAdC, AGP, EMP, MdCSF), pp. 206–213.
KEODKEOD-2009-DumitrescuK #performance #reuse #self #towards
Towards Social-software for the Efficient Reuse of Solution Patterns for Self-optimizing Systems (RD, BK), pp. 342–347.
KEODKEOD-2009-Hufflen #component #framework #non-functional
A Framework for Managing Components using Non-functional Properties (JMH), pp. 460–463.
KEODKEOD-2009-YiR #algorithm #clustering #ontology
Using a Clustering Algorithm for Domain Related Ontology Construction (HY, VJRS), pp. 336–341.
KEODKEOD-2009-ZghalKYN #composition #named #ontology
OACAS — Ontologies Alignment using Composition and Aggregation of Similarities (SZ, MK, SBY, EMN), pp. 233–238.
KMISKMIS-2009-AlvesM #correlation
Best use of Knowledge in a Space Program — Managing the Correlated Technologies (MBA, AMM), pp. 301–304.
KMISKMIS-2009-Kume #analysis #visual notation #web
Application of Cusp Surface Analysis using Web Application to Visual Perception (YK), pp. 251–257.
MLDMMLDM-2009-CelepcikayEO #dataset
Regional Pattern Discovery in Geo-referenced Datasets Using PCA (OUC, CFE, CO), pp. 719–733.
MLDMMLDM-2009-GadK #clustering #semantics #similarity
New Semantic Similarity Based Model for Text Clustering Using Extended Gloss Overlaps (WKG, MSK), pp. 663–677.
MLDMMLDM-2009-GoncalvesQ #classification #kernel #semantics
Using Graph-Kernels to Represent Semantic Information in Text Classification (TG, PQ), pp. 632–646.
MLDMMLDM-2009-KobayashiS #classification #distributed #linear #representation
A Linear Classification Method in a Very High Dimensional Space Using Distributed Representation (TK, IS), pp. 137–147.
MLDMMLDM-2009-NunesSP #detection #image
Detection of Masses in Mammographic Images Using Simpson’s Diversity Index in Circular Regions and SVM (APN, ACS, ACdP), pp. 540–553.
MLDMMLDM-2009-QureshiZ #quality
Using Resampling Techniques for Better Quality Discretization (TQ, DAZ), pp. 68–81.
MLDMMLDM-2009-RiesenB #difference #graph #prototype #reduction
Dissimilarity Based Vector Space Embedding of Graphs Using Prototype Reduction Schemes (KR, HB), pp. 617–631.
MLDMMLDM-2009-SilvaSNPJN #classification #geometry #image #metric
Lung Nodules Classification in CT Images Using Simpson’s Index, Geometrical Measures and One-Class SVM (CAdS, ACS, SMBN, ACdP, GBJ, RAN), pp. 810–822.
RecSysRecSys-2009-Golbeck #recommendation #social #trust #tutorial
Tutorial on using social trust for recommender systems (JG), pp. 425–426.
RecSysRecSys-2009-JamaliE #network #recommendation #trust
Using a trust network to improve top-N recommendation (MJ, ME), pp. 181–188.
RecSysRecSys-2009-MoghaddamJEH #feedback #named #recommendation #trust
FeedbackTrust: using feedback effects in trust-based recommendation systems (SM, MJ, ME, JH), pp. 269–272.
RecSysRecSys-2009-PhelanMS #realtime #recommendation #topic #twitter
Using twitter to recommend real-time topical news (OP, KM, BS), pp. 385–388.
RecSysRecSys-2009-QuerciaC #mobile #named #recommendation
FriendSensing: recommending friends using mobile phones (DQ, LC), pp. 273–276.
RecSysRecSys-2009-UmyarovT #estimation #modelling #rating #recommendation
Improving rating estimation in recommender systems using aggregation- and variance-based hierarchical models (AU, AT), pp. 37–44.
SEKESEKE-2009-AhsanFW #debugging #estimation #machine learning
Program File Bug Fix Effort Estimation Using Machine Learning Methods for OSS (SNA, JF, FW), pp. 129–134.
SEKESEKE-2009-AndresMN #mining #realtime #testing
Using a Mining Frequency Patterns Model to Automate Passive Testing of Real-time Systems (CA, MGM, MN), pp. 426–431.
SEKESEKE-2009-FarZYA #concept #documentation #learning #semantics
Realization of Semantic Search Using Concept Learning and Document Annotation Agents (BHF, CZ, Z(Y, MA), pp. 164–169.
SEKESEKE-2009-GarlanCSBC #analysis #architecture
Using Service-oriented Architectures for Socio-Cultural Analysis (DG, KMC, BRS, MWB, OC), pp. 370–375.
SEKESEKE-2009-HuangCPHP #automation #information management
Automated Nursing Knowledge Management Using Indexing (SH, SC, ASP, SH, MP), pp. 93–96.
SEKESEKE-2009-LemkeR #framework #platform
Using Knowledge Objects to Exchange Knowledge in a MAS Platform (APL, MBR), pp. 206–211.
SEKESEKE-2009-PengLPF #algorithm #requirements
Requirements Discovery Based on RGPS Using Evolutionary Algorithm (TP, BL, WP, ZF), pp. 286–290.
SEKESEKE-2009-PortoMF #comprehension #visualisation
The Use of Reading Technique and Visualization for Program Understanding (DP, MGM, SCPFF), pp. 386–391.
SEKESEKE-2009-RusNSC #algorithm #clustering #fault #graph
Clustering of Defect Reports Using Graph Partitioning Algorithms (VR, XN, SGS, YC), pp. 442–445.
SEKESEKE-2009-WilliamsR #risk management #statistics
Accelerated Risk Management using Statistical Triggers (RW, KR), pp. 643–648.
SIGIRSIGIR-2009-ArampatzisKR #optimisation
Where to stop reading a ranked list?: threshold optimization using truncated score distributions (AA, JK, SR), pp. 524–531.
SIGIRSIGIR-2009-BolourianMR #named #quantifier #topic
SugarCube: quantification of topic propagation in the blogosphere using percolation theory (AAB, YM, CJvR), pp. 786–787.
SIGIRSIGIR-2009-Bossard #automation #documentation #summary
Using document structure for automatic summarization (AB), p. 849.
SIGIRSIGIR-2009-BrunoM #approach #clustering #modelling #multi
Multiview clustering: a late fusion approach using latent models (EB, SMM), pp. 736–737.
SIGIRSIGIR-2009-CarmelRZ #clustering #wiki
Enhancing cluster labeling using wikipedia (DC, HR, NZ), pp. 139–146.
SIGIRSIGIR-2009-Collins-ThompsonB #performance #predict #query
Estimating query performance using class predictions (KCT, PNB), pp. 672–673.
SIGIRSIGIR-2009-DouSNW #web
Using anchor texts with their hyperlink structure for web search (ZD, RS, JYN, JRW), pp. 227–234.
SIGIRSIGIR-2009-GuanBMCW #graph #multi #personalisation #ranking #recommendation
Personalized tag recommendation using graph-based ranking on multi-type interrelated objects (ZG, JB, QM, CC, CW), pp. 540–547.
SIGIRSIGIR-2009-ItakuraC #detection #markov #wiki
Using dynamic markov compression to detect vandalism in the wikipedia (KYI, CLAC), pp. 822–823.
SIGIRSIGIR-2009-KapteinKK #ad hoc #category theory #wiki
Using wikipedia categories for ad hoc search (RK, MK, JK), pp. 824–825.
SIGIRSIGIR-2009-KeikhaCC #random
Blog distillation using random walks (MK, MJC, FC), pp. 638–639.
SIGIRSIGIR-2009-KumaranC #predict #quality #query
Reducing long queries using query quality predictors (GK, VRC), pp. 564–571.
SIGIRSIGIR-2009-LeeLP #reduction #similarity
Tag-based object similarity computation using term space dimension reduction (YKL, SJL, JP), pp. 790–791.
SIGIRSIGIR-2009-Liu #community #ranking
Using computational community interest as an indicator for ranking (XL), p. 851.
SIGIRSIGIR-2009-Liu09a #information retrieval #personalisation #topic
Personalizing information retrieval using task features, topic knowledge, and task product (JL), p. 855.
SIGIRSIGIR-2009-MaCQG #game studies
Page hunt: improving search engines using human computation games (HM, RC, CQ, AG), pp. 746–747.
SIGIRSIGIR-2009-McDougallM
Expertise search in academia using facets (DM, CM), p. 834.
SIGIRSIGIR-2009-MetzlerNCR #documentation
Building enriched document representations using aggregated anchor text (DM, JN, HC, SR), pp. 219–226.
SIGIRSIGIR-2009-NohPYLP #automation #folksonomy #multi #network
An automatic translation of tags for multimedia contents using folksonomy networks (TGN, SBP, HGY, SJL, SYP), pp. 492–499.
SIGIRSIGIR-2009-PunithaJG #automation #feature model #multi #query #retrieval #topic #video
Topic prerogative feature selection using multiple query examples for automatic video retrieval (PP, JMJ, AG), pp. 804–805.
SIGIRSIGIR-2009-RavanaPM
System scoring using partial prior information (SDR, LAFP, AM), pp. 788–789.
SIGIRSIGIR-2009-SeoJ #graph #precise #retrieval
High precision retrieval using relevance-flow graph (JS, JJ), pp. 694–695.
SIGIRSIGIR-2009-SiersdorferPS #automation #video
Automatic video tagging using content redundancy (SS, JSP, MS), pp. 395–402.
SIGIRSIGIR-2009-SubramaniamSDV #fuzzy #similarity #string
Experiments in CLIR using fuzzy string search based on surface similarity (SS, AKS, PD, VV), pp. 682–683.
SIGIRSIGIR-2009-TomasikTT #classification #image
Tagging products using image classification (BT, PT, DT), pp. 792–793.
SIGIRSIGIR-2009-WangLF #automation #fuzzy #predict
Automatic URL completion and prediction using fuzzy type-ahead search (JW, GL, JF), pp. 634–635.
SIGIRSIGIR-2009-XuM #web
Evaluating web search using task completion time (YX, DM), pp. 676–677.
SIGIRSIGIR-2009-YehK #documentation #image
Searching documentation using text, OCR, and image (TY, BK), pp. 776–777.
ECMFAECMDA-FA-2009-EvansFM #case study #eclipse #experience #modelling #network
Experiences of Developing a Network Modeling Tool Using the Eclipse Environment (AE, MAF, PM), pp. 301–312.
ECMFAECMDA-FA-2009-KublerG #approach #mining #qvt
A Pattern Mining Approach Using QVT (JK, TG), pp. 50–65.
ECMFAECMDA-FA-2009-TisiJFCB #higher-order #model transformation #on the
On the Use of Higher-Order Model Transformations (MT, FJ, PF, SC, JB), pp. 18–33.
ICMTICMT-2009-AmstelLB #asf+sdf #metric #model transformation #quality
Using Metrics for Assessing the Quality of ASF+SDF Model Transformations (MvA, CFJL, MvdB), pp. 239–248.
ICMTICMT-2009-FabroABJ #model transformation
Achieving Rule Interoperability Using Chains of Model Transformations (MDDF, PA, JB, FJ), pp. 249–259.
MODELSMoDELS-2009-DrusinskyS #logic #uml
Using UML Statecharts with Knowledge Logic Guards (DD, MtS), pp. 586–590.
MODELSMoDELS-2009-JurackT #concept #distributed #graph transformation #model transformation #towards
Towards Composite Model Transformations Using Distributed Graph Transformation Concepts (SJ, GT), pp. 226–240.
MODELSMoDELS-2009-KusterGZ #automation #development #incremental #model transformation #testing
Incremental Development of Model Transformation Chains Using Automated Testing (JMK, TG, OZ), pp. 733–747.
MODELSMoDELS-2009-LeungMLLSTL #ontology #scalability #semantics
Scalable Semantic Annotation Using Lattice-Based Ontologies (MKL, TM, EAL, EL, CPS, ST, BL), pp. 393–407.
MODELSMoDELS-2009-LloydJ #analysis #authentication #ml #security
Security Analysis of a Biometric Authentication System Using UMLsec and JML (JL, JJ), pp. 77–91.
MODELSMoDELS-2009-MaozMK #modelling #testing
Model-Based Testing Using LSCs and S2A (SM, JM, MK), pp. 301–306.
MODELSMoDELS-2009-WimmerKSKRS #debugging #modelling #petri net #qvt
Reviving QVT Relations: Model-Based Debugging Using Colored Petri Nets (MW, AK, JS, GK, WR, WS), pp. 727–732.
SPLCSPLC-2009-SchmidL #optimisation #product line
Introducing and optimizing software product lines using the FEF (KS, FvdL), p. 311.
SPLCSPLC-2009-Voelter #domain-specific language #product line
Using domain specific languages for product line engineering (MV), p. 329.
MODELSMoDELS-2009-DrusinskyS #logic #uml
Using UML Statecharts with Knowledge Logic Guards (DD, MtS), pp. 586–590.
MODELSMoDELS-2009-JurackT #concept #distributed #graph transformation #model transformation #towards
Towards Composite Model Transformations Using Distributed Graph Transformation Concepts (SJ, GT), pp. 226–240.
MODELSMoDELS-2009-KusterGZ #automation #development #incremental #model transformation #testing
Incremental Development of Model Transformation Chains Using Automated Testing (JMK, TG, OZ), pp. 733–747.
MODELSMoDELS-2009-LeungMLLSTL #ontology #scalability #semantics
Scalable Semantic Annotation Using Lattice-Based Ontologies (MKL, TM, EAL, EL, CPS, ST, BL), pp. 393–407.
MODELSMoDELS-2009-LloydJ #analysis #authentication #ml #security
Security Analysis of a Biometric Authentication System Using UMLsec and JML (JL, JJ), pp. 77–91.
MODELSMoDELS-2009-MaozMK #modelling #testing
Model-Based Testing Using LSCs and S2A (SM, JM, MK), pp. 301–306.
MODELSMoDELS-2009-WimmerKSKRS #debugging #modelling #petri net #qvt
Reviving QVT Relations: Model-Based Debugging Using Colored Petri Nets (MW, AK, JS, GK, WR, WS), pp. 727–732.
ECOOPECOOP-2009-CutsemBDM
Adding State and Visibility Control to Traits Using Lexical Nesting (TVC, AB, SD, WDM), pp. 220–243.
ECOOPECOOP-2009-XuRS #alias #analysis #points-to #scalability
Scaling CFL-Reachability-Based Points-To Analysis Using Context-Sensitive Must-Not-Alias Analysis (G(X, AR, MS), pp. 98–122.
OOPSLAOOPSLA-2009-Abi-AntounA #analysis #architecture #consistency #runtime
Static extraction and conformance analysis of hierarchical runtime architectural structure using annotations (MAA, JA), pp. 321–340.
TOOLSTOOLS-EUROPE-2009-BruniV #generative #named #prototype #virtual machine
PyGirl: Generating Whole-System VMs from High-Level Prototypes Using PyPy (CB, TV), pp. 328–347.
TOOLSTOOLS-EUROPE-2009-SadilekW #grammarware #semantics
Using Grammarware Languages to Define Operational Semantics of Modelled Languages (DAS, GW), pp. 348–356.
TOOLSTOOLS-EUROPE-2009-StrickerHS #constraints #design #diagrams #uml
Designing Design Constraints in the UML Using Join Point Designation Diagrams (VS, SH, DS), pp. 57–76.
AdaEuropeAdaEurope-2009-Montoya-DatoAG #ada #experience #online #programming
An Experience on Ada Programming Using On-Line Judging (FJMD, JLFA, GGM), pp. 75–89.
LOPSTRLOPSTR-2009-AstefanoaeiBR #testing
Using Rewrite Strategies for Testing BUpL Agents (LA, FSdB, MBvR), pp. 143–157.
LOPSTRLOPSTR-2009-CzenkoE #flexibility
LP with Flexible Grouping and Aggregates Using Modes (MC, SE), pp. 67–81.
LOPSTRLOPSTR-2009-ScandoloKH #parallel #pipes and filters
Program Parallelization Using Synchronized Pipelining (LS, CK, MVH), pp. 173–187.
PADLPADL-2009-MaldeO #analysis #haskell #scalability #sequence
Using Bloom Filters for Large Scale Gene Sequence Analysis in Haskell (KM, BO), pp. 183–194.
PEPMPEPM-2009-CifuentesKLS #debugging #detection #program analysis
Program analysis for bug detection using parfait: invited talk (CC, NK, LL, BS), pp. 7–8.
PEPMPEPM-2009-SalamaMTGO #consistency #dependent type
Static consistency checking for verilog wire interconnects: using dependent types to check the sanity of verilog descriptions (CS, GM, WT, JG, JO), pp. 121–130.
PLDIPLDI-2009-AftandilianG #garbage collection
GC assertions: using the garbage collector to check heap properties (EA, SZG), pp. 235–244.
PLDIPLDI-2009-KunduTL #equivalence #optimisation #proving
Proving optimizations correct using parameterized program equivalence (SK, ZT, SL), pp. 327–337.
PLDIPLDI-2009-MehraraHHM #hardware #low cost #memory management #transaction
Parallelizing sequential applications on commodity hardware using a low-cost software transactional memory (MM, JH, PCH, SAM), pp. 166–176.
PLDIPLDI-2009-RavitchJAL #automation #generative #library #static analysis
Automatic generation of library bindings using static analysis (TR, SJ, EA, BL), pp. 352–362.
PLDIPLDI-2009-SrivastavaG #abstraction #verification
Program verification using templates over predicate abstraction (SS, SG), pp. 223–234.
PLDIPLDI-2009-TorreMP #calculus #fixpoint #recursion #source code
Analyzing recursive programs using a fixed-point calculus (SLT, PM, GP), pp. 211–222.
POPLPOPL-2009-BrunelDHLM #logic #model checking
A foundation for flow-based program matching: using temporal logic and model checking (JB, DD, RRH, JLL, GM), pp. 114–126.
SASSAS-2009-DohKS #parsing #static analysis #string
Abstract Parsing: Static Analysis of Dynamically Generated String Output Using LR-Parsing Technology (KGD, HK, DAS), pp. 256–272.
SASSAS-2009-Qadeer #algorithm #smt #verification
Algorithmic Verification of Systems Software Using SMT Solvers (SQ), p. 2.
SASSAS-2009-Simon #analysis #optimisation #pointer #similarity
Optimizing Pointer Analysis Using Bisimilarity (LS), pp. 222–237.
AdaSIGAda-2009-Barkstrom #ada #algorithm #concurrent #multi #on the #problem
On using Ada to solve problems in computational economics and related disciplines with concurrent, multiagent algorithms (BRB), pp. 61–72.
AdaSIGAda-2009-DelangePPKSK #simulation #validation
Validate, simulate, and implement ARINC653 systems using the AADL (JD, LP, AP, MK, FS, FK), pp. 31–44.
AdaSIGAda-2009-LosebyCB #embedded
Use of SPARK in a resource constrained embedded system (CL, PC, CB), pp. 87–90.
AdaSIGAda-2009-Sward09a #ada
Georegistration of imagery from unmanned aircraft systems using Ada (RES), pp. 121–126.
RERE-2009-AdamDEG #requirements
Using Task-oriented Requirements Engineering in Different Domains (SA, JD, ME, AG), pp. 267–272.
RERE-2009-CarvalloF #component #on the #process #requirements
On the Use of Requirements for Driving Call-for-Tender Processes for Procuring Coarse-grained OTS Components (JPC, XF), pp. 287–292.
RERE-2009-KonradD #industrial #lessons learnt #modelling
Lessons Learned from the Use of Artifact Models in Industrial Projects (SK, HD), pp. 349–354.
RERE-2009-TunJLNY #problem
Are Your Lights Off? Using Problem Frames to Diagnose System Failures (TTT, MJ, RCL, BN, YY), pp. 343–348.
ASEASE-2009-CassellAGN #automation #clustering #towards
Towards Automating Class-Splitting Using Betweenness Clustering (KC, PA, LG, JN), pp. 595–599.
ASEASE-2009-GuldaliFJSE #automation #clustering #requirements #testing
Semi-automated Test Planning for e-ID Systems by Using Requirements Clustering (BG, HF, MJ, SS, GE), pp. 29–39.
ASEASE-2009-KimYS #concurrent #detection #heuristic #memory management #model checking #precise
Precise Data Race Detection in a Relaxed Memory Model Using Heuristic-Based Model Checking (KK, TYK, BAS), pp. 495–499.
ASEASE-2009-LedruPB #string #testing
Using String Distances for Test Case Prioritisation (YL, AP, SB), pp. 510–514.
ASEASE-2009-LiXTHS #automation #generative #named #regular expression #source code #testing
Reggae: Automated Test Generation for Programs Using Complex Regular Expressions (NL, TX, NT, JdH, WS), pp. 515–519.
ASEASE-2009-MalikGEK #automation #data type #debugging
A Case for Automated Debugging Using Data Structure Repair (MZM, KG, BE, SK), pp. 620–624.
ASEASE-2009-RayMACSM #validation #verification
Validating Automotive Control Software Using Instrumentation-Based Verification (AR, IM, CA, RC, CPS, CM), pp. 15–25.
ASEASE-2009-WeiglhoferFW #fault #locality #testing
Using Spectrum-Based Fault Localization for Test Case Grouping (MW, GF, FW), pp. 630–634.
ASEASE-2009-YuAB #analysis #generative #source code #string
Generating Vulnerability Signatures for String Manipulating Programs Using Automata-Based Forward and Backward Symbolic Analyses (FY, MA, TB), pp. 605–609.
ESEC-FSEESEC-FSE-2009-MaiaKUM #modelling #probability #refinement #towards
Towards accurate probabilistic models using state refinement (PHMM, JK, SU, NCM), pp. 281–284.
ESEC-FSEESEC-FSE-2009-VangalaCT #clustering #comparison #execution #testing
Test case comparison and clustering using program profiles and static execution (VV, JC, PT), pp. 293–294.
ICSEICSE-2009-CalinescuK #analysis
Using quantitative analysis to implement autonomic IT systems (RC, MZK), pp. 100–110.
ICSEICSE-2009-CasoBGU #abstraction #contract #finite #validation
Validation of contracts using enabledness preserving finite state abstractions (GdC, VAB, DG, SU), pp. 452–462.
ICSEICSE-2009-ComanSS #analysis #automation #case study #industrial #metric #re-engineering
A case-study on using an Automated In-process Software Engineering Measurement and Analysis system in an industrial environment (IDC, AS, GS), pp. 89–99.
ICSEICSE-2009-Hassan #complexity #fault #predict
Predicting faults using the complexity of code changes (AEH), pp. 78–88.
ICSEICSE-2009-MenziesWBH #how #probability #process
How to avoid drastic software process change (using stochastic stability) (TM, SW, BWB, JH), pp. 540–550.
ICSEICSE-2009-MorinBNJ #adaptation #aspect-oriented #modelling
Taming Dynamically Adaptive Systems using models and aspects (BM, OB, GN, JMJ), pp. 122–132.
ICSEICSE-2009-SantelicesJYH #lightweight #multi
Lightweight fault-localization using multiple coverage types (RAS, JAJ, YY, MJH), pp. 56–66.
ICSEICSE-2009-WeimerNGF #automation #programming #search-based
Automatically finding patches using genetic programming (WW, TN, CLG, SF), pp. 364–374.
ICSEICSE-2009-WolfSDN #analysis #communication #developer #network #predict #social
Predicting build failures using social network analysis on developer communication (TW, AS, DD, THDN), pp. 1–11.
SACSAC-2009-Abbadeni #database #information retrieval #multi #query #visual notation
Information retrieval from visual databases using multiple representations and multiple queries (NA), pp. 1523–1527.
SACSAC-2009-BaechlerBH #image #modelling #verification
Labeled images verification using Gaussian mixture models (MB, JLB, JH), pp. 1331–1335.
SACSAC-2009-BreauxLOA #identification #requirements
Identifying vulnerabilities and critical requirements using criminal court proceedings (TDB, JDL, PNO, AIA), pp. 355–359.
SACSAC-2009-BuresHM #component #product line
Using a product line for creating component systems (TB, PH, MM), pp. 501–508.
SACSAC-2009-CaldersGPR #mining #process
Using minimum description length for process mining (TC, CWG, MP, AR), pp. 1451–1455.
SACSAC-2009-CasadeiV #design #model checking #probability #self #simulation
Using probabilistic model checking and simulation for designing self-organizing systems (MC, MV), pp. 2103–2104.
SACSAC-2009-ChunLSC #multi #predict #video
An enhanced multi-view video compression using the constrained inter-view prediction (SC, SL, KS, KC), pp. 1811–1815.
SACSAC-2009-DaiMSZ #concept analysis #towards
Towards “WYDIWYS” for MIMI using concept analysis (JD, RM, JS, GQZ), pp. 91–97.
SACSAC-2009-DaoudTBC #ontology #personalisation
A session based personalized search using an ontological user profile (MD, LTL, MB, BC), pp. 1732–1736.
SACSAC-2009-DelicatoSPOBP #adaptation #aspect-oriented #composition #mobile
Using aspects and dynamic composition to provide context-aware adaptation for mobile applications (FCD, ILAS, PFP, ALSO, TVB, LP), pp. 456–460.
SACSAC-2009-DemailleLS #abstract syntax tree #effectiveness #named #parsing
TWEAST: a simple and effective technique to implement concrete-syntax AST rewriting using partial parsing (AD, RL, BS), pp. 1924–1929.
SACSAC-2009-EsfahaniMSU #mining #process
Using process mining to business process distribution (FSE, MAAM, MNS, NIU), pp. 2140–2145.
SACSAC-2009-FilhoNLA #framework #memory management #mobile #visualisation
A framework for text visualization using memory traffic management for mobile devices (JBFF, JdSRN, CRFL, RMCA), pp. 1847–1848.
SACSAC-2009-FloraTB #forensics #identification #image
Forensic bite mark identification using image processing methods (GF, MT, HB), pp. 903–907.
SACSAC-2009-GonzalesLL #community #online #requirements
Requirements engineering using appreciative inquiry for an online community of caregivers of children with autism (CHG, GL, GDL), pp. 142–146.
SACSAC-2009-HalleV #monitoring #runtime #streaming #web #web service #xml
Runtime monitoring of web service choreographies using streaming XML (SH, RV), pp. 2118–2125.
SACSAC-2009-HarshN #multi
Using geo-spatial session tagging for smart multicast session discovery (PH, REN), pp. 22–27.
SACSAC-2009-HijikataHON #algorithm #analysis
HITS algorithm improvement using anchor-related text extracted by DOM structure analysis (YH, BQH, MO, SN), pp. 1691–1698.
SACSAC-2009-HoqueRA #authentication #privacy #protocol #robust #security
Supporting recovery, privacy and security in RFID systems using a robust authentication protocol (MEH, FR, SIA), pp. 1062–1066.
SACSAC-2009-HuangSMZH #approach
A new cross-training approach by using labeled data (DH, ES, GM, HZ, CCH), pp. 941–942.
SACSAC-2009-JeschkePV #development #web
Using web accessibility patterns for web application development (SJ, OP, HV), pp. 129–135.
SACSAC-2009-LemosBOML #code search #reuse #testing
Applying test-driven code search to the reuse of auxiliary functionality (OALL, SKB, JO, PCM, CVL), pp. 476–482.
SACSAC-2009-LimaH #approach
Computing data cubes using exact sub-graph matching: the sequential MCG approach (JdCL, CMH), pp. 1541–1548.
SACSAC-2009-LindvallFKCJ #network #semantics
Searching for relevant software change artifacts using semantic networks (ML, RLF, GK, ZC, VPJ), pp. 496–500.
SACSAC-2009-LiuDSYH #algorithm #classification #image #invariant
A new K-View algorithm for texture image classification using rotation-invariant feature (HL, SD, ES, CY, CCH), pp. 914–921.
SACSAC-2009-LiuTS #classification #complexity #learning
Assessing complexity of service-oriented computing using learning classifier systems (LL, ST, HS), pp. 2170–2171.
SACSAC-2009-LuYLELW #correlation #data type #detection #incremental
Incremental outlier detection in data streams using local correlation integral (XL, TY, ZL, ME, WL, HW), pp. 1520–1521.
SACSAC-2009-MacielH #architecture #rest #transaction
An optimistic technique for transactions control using REST architectural style (LAHdSM, CMH), pp. 664–669.
SACSAC-2009-MagaudNS #coq #formal method #theorem
Formalizing Desargues’ theorem in Coq using ranks (NM, JN, PS), pp. 1110–1115.
SACSAC-2009-MarquesF #documentation
Reconstructing strip-shredded documents using color as feature matching (MAOM, COAF), pp. 893–894.
SACSAC-2009-MartinsHM #image #multi #re-engineering
Super-resolution image reconstruction using the generalized isotropic multi-level logistic model (ALDM, MRPH, NDAM), pp. 934–938.
SACSAC-2009-MattheT #query
Bipolar query satisfaction using satisfaction and dissatisfaction degrees: bipolar satisfaction degrees (TM, GDT), pp. 1699–1703.
SACSAC-2009-MoallemL #distributed #grid #scheduling
Using artificial life techniques for distributed grid job scheduling (AM, SAL), pp. 1091–1097.
SACSAC-2009-NetoFP #named #people
MATRACA: a tool to provide support for people with impaired vision when using the computer for simple tasks (FGdON, JMF, RRGP), pp. 158–159.
SACSAC-2009-OlowoyeyeTF #segmentation
Medical volume segmentation using bank of Gabor filters (AO, MT, SF), pp. 826–829.
SACSAC-2009-PaganoPL #multi #realtime
Real-time multi-view vision systems using WSNs (PP, FP, YL), pp. 2191–2196.
SACSAC-2009-ParkH #embedded #fine-grained #operating system #programming
Building a customizable embedded operating system with fine-grained joinpoints using the AOX programming environment (JP, SH), pp. 1952–1956.
SACSAC-2009-ParkKLKK #network #realtime
A mobility management scheme using SCTP-SIP for real-time services across heterogeneous networks (HP, MK, SL, SK, YK), pp. 196–200.
SACSAC-2009-ParkPR #algorithm #automation
Planning for remarshaling in an automated container terminal using cooperative coevolutionary algorithms (KP, TP, KRR), pp. 1098–1105.
SACSAC-2009-ParkYAMP #algorithm #approach #detection #novel #search-based #segmentation
A novel approach to detect copy number variation using segmentation and genetic algorithm (CP, YY, JA, MM, SP), pp. 788–792.
SACSAC-2009-PassitoMM #analysis #network #protocol
Analysis of the secure RTP protocol on voice over wireless networks using extended MedQoS (AP, EdSM, EM), pp. 86–87.
SACSAC-2009-PostarnakevichS #modelling #representation #visualisation
Global-to-local representation and visualization of molecular surfaces using deformable models (NP, RS), pp. 782–787.
SACSAC-2009-RamanathanRG #delivery #framework #people #process #trade-off
The people, the process or the technology?: Using the ACE framework to make tradeoffs in service delivery improvement (JR, RR, RG), pp. 259–264.
SACSAC-2009-RodriguesSC #composition #embedded #functional #set #verification
Improving functional verification of embedded systems using hierarchical composition and set theory (CLR, KRGdS, HdNC), pp. 1632–1636.
SACSAC-2009-RyuKC #algorithm #detection #documentation #evolution
A detecting and tracing algorithm for unauthorized internet-news plagiarism using spatio-temporal document evolution model (CKR, HJK, HGC), pp. 863–868.
SACSAC-2009-SchmidtSS #approach #personalisation #social #web
Socially filtered web search: an approach using social bookmarking tags to personalize web search (KUS, TS, LS), pp. 670–674.
SACSAC-2009-ShaLW #classification #visual notation
Foreground classification using active template in the scene context for visual surveillance (XS, XL, JW), pp. 943–944.
SACSAC-2009-SherminO #network
Using dynamic bayesian networks to infer gene regulatory networks from expression profiles (AS, MAO), pp. 799–803.
SACSAC-2009-TanakaKTN #navigation #predict
A destination prediction method using driving contexts and trajectory for car navigation systems (KT, YK, TT, SN), pp. 190–195.
SACSAC-2009-TarratacaSC #gesture #recognition #smarttech
The current feasibility of gesture recognition for a smartphone using J2ME (LT, ACS, JMPC), pp. 1642–1649.
SACSAC-2009-TokoroTT #smarttech
A pointing method using two accelerometers for wearable computing (YT, TT, MT), pp. 136–141.
SACSAC-2009-YounM #email #ontology #personalisation
Spam decisions on gray e-mail using personalized ontologies (SY, DM), pp. 1262–1266.
LDTALDTA-2008-FokkerS09 #abstract interpretation #attribute grammar #functional #source code
Abstract Interpretation of Functional Programs using an Attribute Grammar System (JF, SDS), pp. 117–133.
GPCEGPCE-2009-Nikhil #design #hardware
Using GPCE principles for hardware systems and accelerators: (bridging the gap to HW design) (RSN), pp. 1–2.
ASPLOSASPLOS-2009-CaulfieldGS #clustering #data-driven #memory management #named #performance #power management
Gordon: using flash memory to build fast, power-efficient clusters for data-intensive applications (AMC, LMG, SS), pp. 217–228.
ASPLOSASPLOS-2009-SidiroglouLPVNK #automation #named #self
ASSURE: automatic software self-healing using rescue points (SS, OL, CP, NV, JN, ADK), pp. 37–48.
CASECASE-2009-AlenljungL #graph #verification
Formal verification of PLC controlled systems using Sensor Graphs (TA, BL), pp. 164–170.
CASECASE-2009-BalajiGK #case study
Selection of a machine tool for FMS using ELECTRE III — a case study (CMB, AG, RK), pp. 171–176.
CASECASE-2009-BeraN
A Simple instrumentation calibration technique for Electrical Impedance Tomography (EIT) using a 16-electrode phantom (TKB, JN), pp. 347–352.
CASECASE-2009-BukkapatnamMKSK #monitoring #realtime
Real-time monitoring of container stability loss using wireless vibration sensor tags (STSB, SM, JK, VS, RK), pp. 221–226.
CASECASE-2009-ChakiC #approach #automation #fuzzy #multi
An Automatic decission support system for medical instrument suppliers using fuzzy multifactor based approach (AC, TC), pp. 158–163.
CASECASE-2009-GargM #agile #algorithm #clustering #named
RACK: RApid clustering using K-means algorithm (VKG, MNM), pp. 621–626.
CASECASE-2009-HariharanB #markov #process
Misplaced item search in a warehouse using an RFID-based Partially Observable Markov Decision Process (POMDP) model (SH, STSB), pp. 443–448.
CASECASE-2009-JohnsonM #animation #automation #optimisation #synthesis
Automated trajectory synthesis from animation data using trajectory optimization (ERJ, TDM), pp. 274–279.
CASECASE-2009-KumarWKSS #analysis #fuzzy #predict #variability
A fuzzy filtering based system for maximal oxygen uptake prediction using heart rate variability analysis (MK, MW, SK, NS, RS), pp. 604–608.
CASECASE-2009-Makkapati #segmentation
Improved wavelet-based microscope autofocusing for blood smears by using segmentation (VM), pp. 208–211.
CASECASE-2009-NaveenRR #algorithm #difference #evolution #network #search-based
Rule extraction from differential evolution trained radial basis function network using genetic algorithms (NN, VR, CRR), pp. 152–157.
CASECASE-2009-SenguptaDBMD #detection #fault #modelling
Fault detection of Air Intake Systems of SI gasoline engines using mean value and within cycle models (SS, SD, AKB, SM, AKD), pp. 361–366.
CASECASE-2009-VoronovA #model checking #process #verification
Verification of process operations using model checking (AV, ), pp. 415–420.
CASECASE-2009-YuanZ
Micro-mixing of highly viscous bio-samples using orbital shaking (LY, YFZ), pp. 579–584.
CCCC-2009-AbadiBHHI #implementation #memory management #transaction
Implementation and Use of Transactional Memory with Dynamic Separation (MA, AB, TH, JH, MI), pp. 63–77.
DACDAC-2009-AbercrombiePC #design #equation #simulation
Use of lithography simulation for the calibration of equation-based design rule checks (DA, FP, CC), pp. 67–70.
DACDAC-2009-BaiocchiC #in memory #memory management
Heterogeneous code cache: using scratchpad and main memory in dynamic binary translators (JB, BRC), pp. 744–749.
DACDAC-2009-ChoudhuryM #logic #lookahead #optimisation
Timing-driven optimization using lookahead logic circuits (MRC, KM), pp. 390–395.
DACDAC-2009-EllithorpeTK #architecture #named #network
Internet-in-a-Box: emulating datacenter network architectures using FPGAs (JDE, ZT, RHK), pp. 880–883.
DACDAC-2009-FeySD #bound #fault tolerance
Computing bounds for fault tolerance using formal techniques (GF, AS, RD), pp. 190–195.
DACDAC-2009-GhaniN #approximate #grid #performance #power management #verification
Fast vectorless power grid verification using an approximate inverse technique (NHAG, FNN), pp. 184–189.
DACDAC-2009-HelinskiAP #physics
A physical unclonable function defined using power distribution system equivalent resistance variations (RH, DA, JP), pp. 676–681.
DACDAC-2009-JainC #graph #performance #satisfiability
Efficient SAT solving for non-clausal formulas using DPLL, graphs, and watched cuts (HJ, EMC), pp. 563–568.
DACDAC-2009-LeeK #manycore #optimisation #throughput
Optimizing throughput of power- and thermal-constrained multicore processors using DVFS and per-core power-gating (JL, NSK), pp. 47–50.
DACDAC-2009-MehrotraS #performance #robust
A robust and efficient harmonic balance (HB) using direct solution of HB Jacobian (AM, AS), pp. 370–375.
DACDAC-2009-PatilLZWM #logic
Digital VLSI logic technology using Carbon Nanotube FETs: frequently asked questions (NP, AL, JZ, HSPW, SM), pp. 304–309.
DACDAC-2009-PotkonjakNNM #detection #hardware
Hardware Trojan horse detection using gate-level characterization (MP, AN, MN, TM), pp. 688–693.
DACDAC-2009-SarbisheiAF #clustering #heuristic #optimisation #polynomial
Polynomial datapath optimization using partitioning and compensation heuristics (OS, BA, MF), pp. 931–936.
DACDAC-2009-ShinPS #synthesis
Register allocation for high-level synthesis using dual supply voltages (IS, SP, YS), pp. 937–942.
DACDAC-2009-StrojwasJRP
Creating an affordable 22nm node using design-lithography co-optimization (AJS, TJ, VR, LTP), pp. 95–96.
DACDAC-2009-WangCSC #graph #power management #synthesis
Low power gated bus synthesis using shortest-path Steiner graph for system-on-chip communications (RW, NCC, BS, CKC), pp. 166–171.
DACDAC-2009-WuDL #3d #integer #named #programming #scalability
GRIP: scalable 3D global routing using integer programming (THW, AD, JTL), pp. 320–325.
DACDAC-2009-ZengZNGGS #optimisation #scheduling
Scheduling the FlexRay bus using optimization techniques (HZ, WZ, MDN, AG, PG, ALSV), pp. 874–877.
DACDAC-2009-ZhangS #estimation
Accurate temperature estimation using noisy thermal sensors (YZ, AS), pp. 472–477.
DATEDATE-2009-AlvesNDB #detection #fault #multi
Detecting errors using multi-cycle invariance information (NA, KN, JD, RIB), pp. 791–796.
DATEDATE-2009-BaertBWA
Exploring parallelizations of applications for MPSoC platforms using MPA (RB, EB, SW, TJA), pp. 1148–1153.
DATEDATE-2009-BildBD #performance
Minimization of NBTI performance degradation using internal node control (DRB, GEB, RPD), pp. 148–153.
DATEDATE-2009-ChangBM #design
Customizing IP cores for system-on-chip designs using extensive external don’t-cares (KHC, VB, ILM), pp. 582–585.
DATEDATE-2009-DarbariAFB #design #simulation
Selective state retention design using symbolic simulation (AD, BMAH, DF, JB), pp. 1644–1649.
DATEDATE-2009-DensmoreSDPS #design #evaluation #framework
UMTS MPSoC design evaluation using a system level design framework (DD, AS, AD, RP, ALSV), pp. 478–483.
DATEDATE-2009-GuoS #bound #design #distributed #optimisation
Optimizing the HW/SW boundary of an ECC SoC design using control hierarchy and distributed storage (XG, PS), pp. 454–459.
DATEDATE-2009-KinsmanN #finite #modulo theories #precise
Finite Precision bit-width allocation using SAT-Modulo Theory (ABK, NN), pp. 1106–1111.
DATEDATE-2009-KirchnerBG #simulation
Analogue mixed signal simulation using spice and SystemC (TK, NB, CG), pp. 284–287.
DATEDATE-2009-KochteZIKRWCP #modelling #transaction #validation
Test exploration and validation using transaction level models (MAK, CGZ, MEI, RSK, MR, HJW, SDC, PP), pp. 1250–1253.
DATEDATE-2009-KravetsM #logic #synthesis
Sequential logic synthesis using symbolic bi-decomposition (VNK, AM), pp. 1458–1463.
DATEDATE-2009-LinW
Rewiring using IRredundancy Removal and Addition (CCL, CYW), pp. 324–327.
DATEDATE-2009-MitraZPW #logic
Imperfection-immune VLSI logic circuits using Carbon Nanotube Field Effect Transistors (SM, JZ, NP, HW), pp. 436–441.
DATEDATE-2009-MollCRB #modelling #performance #protocol
Fast and accurate protocol specific bus modeling using TLM 2.0 (HWMvM, HC, VR, MB), pp. 316–319.
DATEDATE-2009-OzturkK #compilation #execution #memory management
Using dynamic compilation for continuing execution under reduced memory availability (ÖÖ, MTK), pp. 1373–1378.
DATEDATE-2009-PurandareWK #abstraction #refinement
Strengthening properties using abstraction refinement (MP, TW, DK), pp. 1692–1697.
DATEDATE-2009-RealVD #correlation
Enhancing correlation electromagnetic attack using planar near-field cartography (DR, FV, MD), pp. 628–633.
DATEDATE-2009-RobertsKM #energy #memory management
Using non-volatile memory to save energy in servers (DR, TK, TNM), pp. 743–748.
DATEDATE-2009-SafizadehTATB #nondeterminism
Using randomization to cope with circuit uncertainty (HS, MT, EKA, GT, KB), pp. 815–820.
DATEDATE-2009-SinhaRBS #design #multi #protocol
Multi-clock Soc design using protocol conversion (RS, PSR, SB, ZS), pp. 123–128.
DATEDATE-2009-TannirK #analysis
Computation of IP3 using single-tone moments analysis (DT, RK), pp. 718–723.
DATEDATE-2009-WangCTHR #modelling #optimisation #performance #polynomial
An efficient decoupling capacitance optimization using piecewise polynomial models (XW, YC, SXDT, XH, JR), pp. 1190–1195.
DATEDATE-2009-WangM
An accurate interconnect thermal model using equivalent transmission line circuit (BW, PM), pp. 280–283.
HPCAHPCA-2009-PowellBEMSY #named #parametricity #runtime
CAMP: A technique to estimate per-structure power at run-time using a few simple parameters (MDP, AB, JSE, SSM, BRS, SMY), pp. 289–300.
HPCAHPCA-2009-ReddiGHWSB #predict
Voltage emergency prediction: Using signatures to reduce operating margins (VJR, MSG, GHH, GYW, MDS, DMB), pp. 18–29.
HPDCHPDC-2009-AssuncaoCB #capacity #clustering #in the cloud
Evaluating the cost-benefit of using cloud computing to extend the capacity of clusters (MDdA, AdC, RB), pp. 141–150.
HPDCHPDC-2009-HironakaST #concurrent #performance
High performance wide-area overlay using deadlock-free routing (KH, HS, KT), pp. 81–90.
HPDCHPDC-2009-Reeuwijk #data flow #framework #learning #named #peer-to-peer #self
Maestro: a self-organizing peer-to-peer dataflow framework using reinforcement learning (CvR), pp. 187–196.
ISMMISMM-2009-GuanSJ #performance #policy
Investigating the effects of using different nursery sizing policies on performance (XG, WSa, CJ), pp. 59–68.
ISMMISMM-2009-NaeemL #alias #analysis #performance #set
Efficient alias set analysis using SSA form (NAN, OL), pp. 79–88.
ISMMISMM-2009-SerranoZ #garbage collection #optimisation
Placement optimization using data context collected during garbage collection (MJS, XZ), pp. 69–78.
PDPPDP-2009-AchourNS #adaptation #algorithm #clustering #modelling #on the #performance
On the Use of Performance Models for Adaptive Algorithm Selection on Heterogeneous Clusters (SA, WN, LAS), pp. 85–89.
PDPPDP-2009-CasconOHDR #concurrent #interface #multi #network #thread
A Multi-Threaded Network Interface Using Network Processors (PC, JO, WMH, AFD, IR), pp. 196–200.
PDPPDP-2009-EngelmannVNS #fault tolerance #migration
Proactive Fault Tolerance Using Preemptive Migration (CE, GV, TN, SLS), pp. 252–257.
PDPPDP-2009-FrancoBFA #2d #implementation #parallel
A Parallel Implementation of the 2D Wavelet Transform Using CUDA (JF, GB, JF, MEA), pp. 111–118.
PDPPDP-2009-KunisR #algorithm #constraints #optimisation #parallel #precedence #scheduling
Optimization of Layer-based Scheduling Algorithms for Mixed Parallel Applications with Precedence Constraints Using Move-blocks (RK, GR), pp. 70–77.
PDPPDP-2009-SantosAPDRS #monitoring #performance #scheduling #web #web service
Using Web Services for Performance Monitoring and Scheduling (AS, FA, VBP, DD, JR, ES), pp. 361–368.
PPoPPPPoPP-2009-AbadiHM #hardware #memory management #off the shelf #transaction
Transactional memory with strong atomicity using off-the-shelf memory protection hardware (MA, TH, MM), pp. 185–196.
PPoPPPPoPP-2009-LiBH #distributed #multi #performance #scalability #scheduling
Efficient and scalable multiprocessor fair scheduling using distributed weighted round-robin (TL, DPB, SH), pp. 65–74.
PPoPPPPoPP-2009-ZyulkyarovGUCAHV #game studies #interactive #memory management #multi #transaction
Atomic quake: using transactional memory in an interactive multiplayer game server (FZ, VG, OSÜ, AC, EA, TH, MV), pp. 25–34.
SOSPSOSP-2009-DunaganZS #combinator #graph #named #optimisation
Heat-ray: combating identity snowball attacks using machinelearning, combinatorial optimization and attack graphs (JD, AXZ, DRS), pp. 305–320.
ESOPESOP-2009-Campbell #analysis #data type #memory management
Amortised Memory Analysis Using the Depth of Data Structures (BC), pp. 190–204.
ESOPESOP-2009-Reynolds #category theory #design #programming language
Using Category Theory to Design Programming Languages (JCR), pp. 62–63.
FASEFASE-2009-AguirreFMMW #alloy #behaviour #specification
Describing and Analyzing Behaviours over Tabular Specifications Using (Dyn)Alloy (NA, MFF, MMM, TSEM, AW), pp. 155–170.
FASEFASE-2009-ChatterjeeJS #java #named #query
SNIFF: A Search Engine for Java Using Free-Form Queries (SC, SJ, KS), pp. 385–400.
FASEFASE-2009-KovacsV #array #invariant #proving #source code #theorem proving
Finding Loop Invariants for Programs over Arrays Using a Theorem Prover (LK, AV), pp. 470–485.
STOCSTOC-2009-AndersenP #evolution #set
Finding sparse cuts locally using evolving sets (RA, YP), pp. 235–244.
STOCSTOC-2009-Gentry #encryption
Fully homomorphic encryption using ideal lattices (CG), pp. 169–178.
STOCSTOC-2009-Liu #algorithm #quantum
Quantum algorithms using the curvelet transform (YKL), pp. 391–400.
CAVCAV-2009-BeerBCOT
Explaining Counterexamples Using Causality (IB, SBD, HC, AO, RJT), pp. 94–108.
CAVCAV-2009-DangS #image #polynomial
Image Computation for Polynomial Dynamical Systems Using the Bernstein Expansion (TD, DS), pp. 219–232.
CAVCAV-2009-GuernicG #analysis #hybrid #reachability
Reachability Analysis of Hybrid Systems Using Support Functions (CLG, AG), pp. 540–554.
CAVCAV-2009-LahiriQR #concurrent #detection #fault #precise #smt
Static and Precise Detection of Concurrency Errors in Systems Code Using SMT Solvers (SKL, SQ, ZR), pp. 509–524.
CAVCAV-2009-MajumdarX #testing
Reducing Test Inputs Using Information Partitions (RM, RGX), pp. 555–569.
CAVCAV-2009-Monniaux #float #linear #on the
On Using Floating-Point Computations to Help an Exact Linear Arithmetic Decision Procedure (DM), pp. 570–583.
CAVCAV-2009-VerdoolaegeJB #equivalence #source code
Equivalence Checking of Static Affine Programs Using Widening to Handle Recurrences (SV, GJ, MB), pp. 599–613.
CSLCSL-2009-GaboardiP #bound #semantics
Upper Bounds on Stream I/O Using Semantic Interpretations (MG, RP), pp. 271–286.
ICLPICLP-2009-BroechelerSS #logic programming #probability #query #source code
Using Histograms to Better Answer Queries to Probabilistic Logic Programs (MB, GIS, VSS), pp. 40–54.
ICLPICLP-2009-Mungall #case study #experience #logic programming
Experiences Using Logic Programming in Bioinformatics (CM), pp. 1–21.
ICLPICLP-2009-PaluDPR #constraints #lazy evaluation #programming #set
Answer Set Programming with Constraints Using Lazy Grounding (ADP, AD, EP, GR), pp. 115–129.
ICLPICLP-2009-Raiser #constraints #graph transformation
Analysing Graph Transformation Systems Using Extended Methods from Constraint Handling Rules (FR), pp. 540–541.
ICLPICLP-2009-Todorova #natural language #prolog
Answering Questions from Natural Language Using A-Prolog (YT), pp. 544–546.
ICLPICLP-2009-Wielemaker #prolog #web
Enabling Serendipitous Search on the Web of Data Using Prolog (JW), p. 36.
ICSTICST-2009-BandyopadhyayG #generative #modelling #sequence #state machine #uml
Test Input Generation Using UML Sequence and State Machines Models (AB, SG), pp. 121–130.
ICSTICST-2009-KaminskiA #detection #fault #logic #testing
Using Logic Criterion Feasibility to Reduce Test Set Size While Guaranteeing Fault Detection (GKK, PA), pp. 356–365.
ICSTICST-2009-KaminskiA09a #fault #logic #mutation testing #performance #testing
Using a Fault Hierarchy to Improve the Efficiency of DNF Logic Mutation Testing (GKK, PA), pp. 386–395.
ICSTICST-2009-MurphyKVC #approach #assurance #quality #testing
Quality Assurance of Software Applications Using the In Vivo Testing Approach (CM, GEK, IV, MC), pp. 111–120.
ICSTICST-2009-MurphySK #ml #runtime #testing
Using JML Runtime Assertion Checking to Automate Metamorphic Testing in Applications without Test Oracles (CM, KS, GEK), pp. 436–445.
ICSTICST-2009-PostS #bound #equivalence #functional #implementation #model checking #proving
Proving Functional Equivalence of Two AES Implementations Using Bounded Model Checking (HP, CS), pp. 31–40.
ISSTAISSTA-2009-AdlerFKPRSUZ #analysis #string #test coverage
Advanced code coverage analysis using substring holes (YA, EF, MK, DP, OR, MS, SU, AZ), pp. 37–46.
ISSTAISSTA-2009-ChengLZWY #debugging #graph #identification #mining
Identifying bug signatures using discriminative graph mining (HC, DL, YZ, XW, XY), pp. 141–152.
ISSTAISSTA-2009-ClauseO #automation #identification #named
Penumbra: automatically identifying failure-relevant inputs using dynamic tainting (JAC, AO), pp. 249–260.
ISSTAISSTA-2009-ZhangHGXM #integer #linear #programming #testing
Time-aware test-case prioritization using integer linear programming (LZ, SSH, CG, TX, HM), pp. 213–224.
MBTMBT-2009-DadeauLH #automaton #generative #on the #random #testing
On the Use of Uniform Random Generation of Automata for Testing (FD, JL, PCH), pp. 37–51.
MBTMBT-2009-SchumannSH #graph #nondeterminism #testing
Computing Optimal Tests for Non-deterministic Systems Using DNNF Graphs (AS, MS, JH), pp. 87–99.
ICSTSAT-2009-BonetJ #metric #satisfiability
Efficiently Calculating Evolutionary Tree Measures Using SAT (MLB, KSJ), pp. 4–17.
ICSTSAT-2009-HaimW #machine learning
Restart Strategy Selection Using Machine Learning Techniques (SH, TW), pp. 312–325.
ICSTSAT-2009-KojevnikovKY #performance
Finding Efficient Circuits Using SAT-Solvers (AK, ASK, GY), pp. 32–44.
FATESTestCom-FATES-2009-AdjirSR #realtime #testing
Testing Real-Time Systems Using TINA (NA, PdSS, KMR), pp. 1–15.
FATESTestCom-FATES-2009-ErnitsRJV #modelling #testing #web
Model-Based Testing of Web Applications Using NModel (JPE, RR, JJ, MV), pp. 211–216.
FATESTestCom-FATES-2009-SubramaniamXGP #approach #proving #testing #theorem proving
An Approach for Test Selection for EFSMs Using a Theorem Prover (MS, LX, BG, ZP), pp. 146–162.
VMCAIVMCAI-2009-KiddRDV #debugging #random
Finding Concurrency-Related Bugs Using Random Isolation (NK, TWR, JD, MV), pp. 198–213.
VMCAIVMCAI-2009-TalyGT #constraints #logic #theorem proving
Synthesizing Switching Logic Using Constraint Solving (AT, SG, AT), pp. 305–319.
VMCAIVMCAI-2009-WimmerBB #bound #generative #markov #model checking
Counterexample Generation for Discrete-Time Markov Chains Using Bounded Model Checking (RW, BB, BB), pp. 366–380.
CBSECBSE-2008-KuperbergKR #behaviour #black box #component #modelling #parametricity #performance #predict
Performance Prediction for Black-Box Components Using Reengineered Parametric Behaviour Models (MK, KK, RHR), pp. 48–63.
ECSAECSA-2008-DamaseviciusST #component #design #diagrams #feature model #generative #metaprogramming #ontology
Domain Ontology-Based Generative Component Design Using Feature Diagrams and Meta-programming Techniques (RD, VS, JT), pp. 338–341.
ECSAECSA-2008-FilhoCNOLAM #design #overview #perspective
Evaluating Domain Design Approaches Using Systematic Review (EDdSF, RdOC, DFSN, THBdO, LBL, ESdA, SRdLM), pp. 50–65.
ECSAECSA-2008-KamalA #behaviour #design pattern #modelling
Modeling Architectural Patterns’ Behavior Using Architectural Primitives (AWK, PA), pp. 164–179.
ECSAECSA-2008-NavarroC #approach #architecture #automation #design
Automating the Trace of Architectural Design Decisions and Rationales Using a MDD Approach (EN, CEC), pp. 114–130.
ECSAECSA-2008-Perry #architecture #design #evolution #maintenance
Issues in Architecture Evolution: Using Design Intent in Maintenance and Controlling Dynamic Evolution (DEP), p. 1.
ECSAECSA-2008-SanzQCMO #architecture #modelling #representation
Representing Service-Oriented Architectural Models Using pi-ADL (MLS, ZQ, CEC, EM, FO), pp. 273–280.
QoSAQoSA-2008-ArdagnaGM #architecture #modelling
Rethinking the Use of Models in Software Architecture (DA, CG, RM), pp. 1–27.
WICSAWICSA-2008-Aldrich #architecture
Using Types to Enforce Architectural Structure (JA), pp. 211–220.
WICSAWICSA-2008-LaMantiaCMR #design #evolution #matrix #scalability
Analyzing the Evolution of Large-Scale Software Systems Using Design Structure Matrices and Design Rule Theory: Two Exploratory Cases (MJL, YC, AM, JR), pp. 83–92.
DocEngDocEng-2008-AlkhateebL #composition #documentation #generative #towards
Towards extending and using SPARQL for modular document generation (FA, SL), pp. 164–172.
DocEngDocEng-2008-KumarS #automation #documentation #n-gram
Automatic keyphrase extraction from scientific documents using N-gram filtration technique (NK, KS), pp. 199–208.
DocEngDocEng-2008-Nguyen #algorithm #documentation #image
A rotation method for binary document images using DDA algorithm (DTN), pp. 267–270.
DocEngDocEng-2008-RonnauPB #documentation #reliability #xml
Merging changes in XML documents using reliable context fingerprints (SR, CP, UMB), pp. 52–61.
DocEngDocEng-2008-ValleCP #documentation #identification #performance #visual notation
Fast identification of visual documents using local descriptors (EV, MC, SPF), pp. 173–176.
DRRDRR-2008-AntaniDLST #image
Exploring use of images in clinical articles for decision support in evidence-based medicine (SA, DDF, JL, BVS, GRT), p. 68150.
DRRDRR-2008-BaiNS #composition
Extracting curved text lines using the chain composition and the expanded grouping method (NNB, KN, YS), p. 68150.
DRRDRR-2008-ChanVT #identification #online #prototype
Online writer identification using character prototypes distributions (SKC, CVG, YHT), p. 68150.
DRRDRR-2008-El-HajjML #modelling #recognition #word
Recognition of Arabic handwritten words using contextual character models (REH, CM, LLS), p. 681503.
DRRDRR-2008-ShafaitKB #adaptation #image #implementation #performance
Efficient implementation of local adaptive thresholding techniques using integral images (FS, DK, TMB), p. 681510.
DRRDRR-2008-XiangTLW #recognition #reliability
Achieving high recognition reliability using decision trees and AdaBoost (JX, XT, YL, PSPW), p. 68150.
DRRDRR-2008-XiuB #adaptation #recognition
Whole-book recognition using mutual-entropy-driven model adaptation (PX, HSB), p. 681506.
DRRDRR-2008-ZouLT #html #online
Extracting a sparsely located named entity from online HTML medical articles using support vector machine (JZ, DXL, GRT), p. 68150.
TPDLECDL-2008-BindingT #web #web service
Using Terminology Web Services for the Archaeological Domain (CB, DT), pp. 392–393.
TPDLECDL-2008-FernandezMFVA #agile #development #library
Agile DL: Building a DELOS-ConformedDigital Library Using Agile Software Development (JDF, MAMP, PdlF, JV, JA), pp. 398–399.
TPDLECDL-2008-IkedaZG
Matching Hierarchies Using Shared Objects (RI, KZ, HGM), pp. 209–220.
TPDLECDL-2008-UematsuIFKO #proximity
Proximity Scoring Using Sentence-Based Inverted Index for Practical Full-Text Search (YU, TI, KF, RK, HO), pp. 308–319.
TPDLECDL-2008-YangPJLH #ambiguity #correlation #topic #web
Author Name Disambiguation for Citations Using Topic and Web Correlation (KHY, HTP, JYJ, HML, JMH), pp. 185–196.
HTHT-2008-ChiM #comprehension #performance #social
Understanding the efficiency of social tagging systems using information theory (EHC, TM), pp. 81–88.
HTHT-2008-ChoudhurySJS #communication #predict #social
Dynamic prediction of communication flow using social context (MDC, HS, AJ, DDS), pp. 49–54.
HTHT-2008-Diniz #education #hypermedia
Efl and hypertext: using webquests to maximize english teaching (MGD), pp. 223–224.
HTHT-2008-LeeBG #community #ranking #similarity
Extracting and ranking viral communities using seeds and content similarity (HCL, AB, LG), pp. 139–148.
HTHT-2008-TomsaB #social #visualisation
Hyperlinks visualization using social bookmarking (MT, MB), pp. 245–246.
JCDLJCDL-2008-CarmelYR #analysis #library
Enhancing digital libraries using missing content analysis (DC, EYT, HR), pp. 1–10.
JCDLJCDL-2008-HariharanHM #summary #web
Discovering gis sources on the web using summaries (RH, BH, SM), pp. 94–103.
JCDLJCDL-2008-Hetzner #markov #metadata #modelling
A simple method for citation metadata extraction using hidden markov models (EH), pp. 280–284.
JCDLJCDL-2008-KhooPWRPD #library #metric #web
Using web metrics to analyze digital libraries (MK, JP, ALW, MR, BP, RAD), pp. 375–384.
JCDLJCDL-2008-PereiraRZL #web
Using web information for creating publication venue authority files (DAP, BARN, NZ, AHFL), pp. 295–304.
JCDLJCDL-2008-TibenderanaO #library
Acceptance and use of electronic library services in ugandan universities (PKGT, PJO), pp. 323–332.
SIGMODSIGMOD-2008-BohmFP #clustering #component #independence
Outlier-robust clustering using independent components (CB, CF, CP), pp. 185–198.
SIGMODSIGMOD-2008-LeeC #performance #query
Efficient storage scheme and query processing for supply chain management using RFID (CHL, CWC), pp. 291–302.
VLDBVLDB-2008-Cohen #constraints #generative #xml
Generating XML structure using examples and constraints (SC), pp. 490–501.
VLDBVLDB-2008-CohenK #estimation #sketching
Tighter estimation using bottom k sketches (EC, HK), pp. 213–224.
VLDBVLDB-2008-CormodeSYZ #graph
Anonymizing bipartite graph data using safe groupings (GC, DS, TY, QZ), pp. 833–844.
VLDBVLDB-2008-FontouraJKOTV #taxonomy
Relaxation in text search using taxonomies (MF, VJ, RK, CO, AT, SV), pp. 672–683.
VLDBVLDB-2008-KwonBG #distributed #fault tolerance #file system
Fault-tolerant stream processing using a distributed, replicated file system (YK, MB, AGG), pp. 574–585.
VLDBVLDB-2008-LeeHLG #classification #clustering #named
TraClass: trajectory classification using hierarchical region-based and trajectory-based clustering (JGL, JH, XL, HG), pp. 1081–1094.
VLDBVLDB-2008-MetwallyEAA #correlation #detection #named
SLEUTH: Single-pubLisher attack dEtection Using correlaTion Hunting (AM, FE, DA, AEA), pp. 1217–1228.
CSEETCSEET-2008-GotterbarnM #re-engineering
Using the Software Engineering Code of Ethics in Professional Computing Issues (DG, KWM), p. 273.
CSEETCSEET-2008-JohnsgardM #overview #programming
Using Alice in Overview Courses to Improve Success Rates in Programming I (KJ, JM), pp. 129–136.
CSEETCSEET-2008-RasR #information management #learning
Improving Knowledge Acquisition in Capstone Projects Using Learning Spaces for Experiential Learning (ER, JR), pp. 77–84.
CSEETCSEET-2008-SalamahG #education #model checking #specification
A Technique for Using Model Checkers to Teach Formal Specifications (SS, AQG), pp. 181–188.
EDMEDM-2008-BarnesSLC #case study #logic #proving #student
A pilot study on logic proof tutoring using hints generated from historical student data (TB, JCS, LL, MJC), pp. 197–201.
EDMEDM-2008-PavlikCWK #performance
Using Item-type Performance Covariance to Improve the Skill Model of an Existing Tutor (PIP, HC, LW, KRK), pp. 77–86.
ITiCSEITiCSE-2008-Albin-ClarkK #game studies #simulation
The use of role play to simulate a tethered swarm of robots for urban search and rescue (USAR) (AAC, TRVAK), p. 335.
ITiCSEITiCSE-2008-Connolly #design #development #education #multi #platform
Complecto mutatio: teaching software design best practices using multi-platform development (RWC), p. 345.
ITiCSEITiCSE-2008-DennyLH #student
Student use of the PeerWise system (PD, ALR, JH), pp. 73–77.
ITiCSEITiCSE-2008-Deugo08a #eclipse
Using eclipse in the classroom (DD), p. 322.
ITiCSEITiCSE-2008-Kurmas #automation #logic #performance #student #testing
Improving student performance using automated testing of simulated digital logic circuits (ZK), pp. 265–270.
ITiCSEITiCSE-2008-LinhoffS #education #game studies #programming
Teaching game programming using XNA (JL, AS), pp. 250–254.
ITiCSEITiCSE-2008-MorenoICM #database #design #distance #education #learning #towards
Using accessible digital resources for teaching database design: towards an inclusive distance learning proposal (LM, AI, EC, PM), pp. 32–36.
ITiCSEITiCSE-2008-SalterD #logic #multi #scalability
Using DLSim 3: a scalable, extensible, multi-level logic simulator (RMS, JLD), p. 315.
SIGITESIGITE-2008-Edirisinghe #education #fault #game studies #identification #programming #student
Teaching students to identify common programming errors using a game (EMNSE), pp. 95–98.
SIGITESIGITE-2008-MullinsC #programming #student
Engaging students in programming fundamentals using alice 2.0 (PMM, MC), pp. 81–88.
CSMRCSMR-2008-CosmaM #comprehension #dependence #distributed #object-oriented
Understanding the Impact of Distribution in Object-Oriented Distributed Systems Using Structural Program Dependencies (DCC, RM), pp. 103–112.
CSMRCSMR-2008-GlorieZHD #case study #concept analysis #evolution #experience #industrial #scalability
Splitting a Large Software Archive for Easing Future Software Evolution — An Industrial Experience Report using Formal Concept Analysis (MG, AZ, LH, AvD), pp. 153–162.
CSMRCSMR-2008-LagerstromJ #architecture #enterprise #maintenance #modelling #predict
Using Architectural Models to Predict the Maintainability of Enterprise Systems (RL, PJ), pp. 248–252.
CSMRCSMR-2008-MendeBKM #clone detection #detection #evolution #product line
Supporting the Grow-and-Prune Model in Software Product Lines Evolution Using Clone Detection (TM, FB, RK, GM), pp. 163–172.
CSMRCSMR-2008-SpekKL #architecture #concept #semantics #towards
Towards Recovering Architectural Concepts Using Latent Semantic Indexing (PvdS, SK, PvdL), pp. 253–257.
CSMRCSMR-2008-Trifu #data flow #identification #object-oriented
Using Dataflow Information for Concern Identification in Object-Oriented Software Systems (MT), pp. 193–202.
ICPCICPC-2008-EaddyAAG #dynamic analysis #information retrieval #named #program analysis #requirements #source code
CERBERUS: Tracing Requirements to Source Code Using Information Retrieval, Dynamic Analysis, and Program Analysis (ME, AVA, GA, YGG), pp. 53–62.
ICPCICPC-2008-HaiducM #on the #source code
On the Use of Domain Terms in Source Code (SH, AM), pp. 113–122.
ICPCICPC-2008-Parr #embedded #reuse #semantics
The Reuse of Grammars with Embedded Semantic Actions (TP), pp. 5–10.
ICPCICPC-2008-RoyC08a #detection #flexibility #named #normalisation #pretty-printing
NICAD: Accurate Detection of Near-Miss Intentional Clones Using Flexible Pretty-Printing and Code Normalization (CKR, JRC), pp. 172–181.
ICSMEICSM-2008-JeffreyGG #debugging #identification #memory management
Identifying the root causes of memory bugs using corrupted memory location suppression (DJ, NG, RG), pp. 356–365.
ICSMEICSM-2008-KothariBMS #algebra #development #on the #performance
On evaluating the efficiency of software feature development using algebraic manifolds (JK, DB, SM, AS), pp. 7–16.
ICSMEICSM-2008-LiH #random testing #testing
Using random test selection to gain confidence in modified software (WL, MJH), pp. 267–276.
ICSMEICSM-2008-LuciaOV #metric #semantics
Using structural and semantic metrics to improve class cohesion (ADL, RO, LV), pp. 27–36.
ICSMEICSM-2008-MalikH #adaptation #co-evolution #evolution #heuristic
Supporting software evolution using adaptive change propagation heuristics (HM, AEH), pp. 177–186.
ICSMEICSM-2008-RiccaPT #guidelines #lessons learnt #maintenance
Guidelines on the use of Fit tables in software maintenance tasks: Lessons learned from 8 experiments (FR, MDP, MT), pp. 317–326.
MSRMSR-2008-HataMK #precise
An extension of fault-prone filtering using precise training and a dynamic threshold (HH, OM, TK), pp. 89–98.
MSRMSR-2008-SiyCS #challenge #developer #segmentation
Summarizing developer work history using time series segmentation: challenge report (HPS, PC, MS), pp. 137–140.
SCAMSCAM-2008-BoogerdM #analysis #data flow #on the #profiling
On the Use of Data Flow Analysis in Static Profiling (CB, LM), pp. 79–88.
SCAMSCAM-2008-CeccatoDT #legacy #program transformation
Using Program Transformations to Add Structure to a Legacy Data Model (MC, TRD, PT), pp. 197–206.
SCAMSCAM-2008-GiffhornH #analysis #java #precise #source code
Precise Analysis of Java Programs Using JOANA (DG, CH), pp. 267–268.
SCAMSCAM-2008-JiaH #fault #higher-order #mutation testing #testing
Constructing Subtle Faults Using Higher Order Mutation Testing (YJ, MH), pp. 249–258.
WCREWCRE-2008-GrantCS #analysis #automation #component #concept #independence
Automated Concept Location Using Independent Component Analysis (SG, JRC, DBS), pp. 138–142.
WCREWCRE-2008-LukinsKE #debugging #locality #retrieval #source code
Source Code Retrieval for Bug Localization Using Latent Dirichlet Allocation (SKL, NAK, LHE), pp. 155–164.
WCREWCRE-2008-Muliawan #higher-order #model transformation #transformation language
Extending a Model Transformation Language Using Higher Order Transformations (OM), pp. 315–318.
WCREWCRE-2008-RompaeyD #estimation
Estimation of Test Code Changes Using Historical Release Data (BVR, SD), pp. 269–278.
CIAACIAA-2008-GarciaPAR #automaton #finite #learning #nondeterminism #regular expression
Learning Regular Languages Using Nondeterministic Finite Automata (PG, MVdP, GIA, JR), pp. 92–101.
ICALPICALP-B-2008-AxelssonHL #context-free grammar #incremental #satisfiability
Analyzing Context-Free Grammars Using an Incremental SAT Solver (RA, KH, ML), pp. 410–422.
LATALATA-2008-Klunder #automaton #finite
Characterization of Star-Connected Languages Using Finite Automata (BK), pp. 311–320.
FMFM-2008-ChalinR #fault #ml #performance #runtime
JML Runtime Assertion Checking: Improved Error Reporting and Efficiency Using Strong Validity (PC, FR), pp. 246–261.
FMFM-2008-ChetaliN #evaluation #formal method #industrial #security
Industrial Use of Formal Methods for a High-Level Security Evaluation (BC, QHN), pp. 198–213.
FMFM-2008-MacedoLF #development #distributed #incremental #realtime
Incremental Development of a Distributed Real-Time Model of a Cardiac Pacing System Using VDM (HDM, PGL, JSF), pp. 181–197.
RTARTA-2008-MoserS #polynomial #proving
Proving Quadratic Derivational Complexities Using Context Dependent Interpretations (GM, AS), pp. 276–290.
SEFMSEFM-2008-GuoS #finite #impact analysis #proving #state machine #theorem proving
Formal Change Impact Analyses of Extended Finite State Machines Using a Theorem Prover (BG, MS), pp. 335–344.
SEFMSEFM-2008-SalasK #modelling #policy #privacy #testing
Testing Privacy Policies Using Models (PAPS, PK), pp. 117–126.
SEFMSEFM-2008-TruongTHNTH #aspect-oriented #interactive #interface #programming #protocol
Checking Interface Interaction Protocols Using Aspect-Oriented Programming (AHT, TBT, DVH, VHN, NTTT, PDH), pp. 382–386.
SEFMSEFM-2008-XavierHM #fault tolerance #source code #verification
Using Formal Verification to Reduce Test Space of Fault-Tolerant Programs (KSX, SH, ACVdM), pp. 181–190.
FLOPSFLOPS-2008-Julien #induction #integer
Certified Exact Real Arithmetic Using Co-induction in Arbitrary Integer Base (NJ), pp. 48–63.
FLOPSFLOPS-2008-PrinceGM #proving
Proving Properties about Lists Using Containers (RP, NG, CM), pp. 97–112.
IFLIFL-2008-LijnseP #automation #data type #database #programming #relational
Between Types and Tables — Using Generic Programming for Automated Mapping between Data Types and Relational Databases (BL, RP), pp. 272–290.
AIIDEAIIDE-2008-CutumisuSBS #game studies #learning
Agent Learning using Action-Dependent Learning Rates in Computer Role-Playing Games (MC, DS, MHB, RSS).
CoGCIG-2008-ChiouW #adaptation #programming #user satisfaction
Player Adaptive Entertainment Computing (PAEC): Mechanism to model user satisfaction by using Neuro Linguistic Programming (NLP) techniques (AC, KWW), pp. 343–349.
CoGCIG-2008-DjordjevichXBWGV #game studies
Preparing for the aftermath: Using emotional agents in game-based training for disaster response (DD, PGX, MLB, JW, MRG, SJV), pp. 266–275.
CoGCIG-2008-OlesenYH #challenge #game studies #realtime
Real-time challenge balance in an RTS game using rtNEAT (JKO, GNY, JH), pp. 87–94.
CoGCIG-2008-OsakiSTK #difference #evaluation #learning #probability
An Othello evaluation function based on Temporal Difference Learning using probability of winning (YO, KS, YT, YK), pp. 205–211.
CoGCIG-2008-Sahraei-ArdakaniRRL #case study #optimisation
A study of electricity market dynamics using Invasive Weed Colonization Optimization (MSA, MR, ARK, CL), pp. 276–282.
CoGCIG-2008-WenderW #game studies #learning
Using reinforcement learning for city site selection in the turn-based strategy game Civilization IV (SW, IDW), pp. 372–377.
CoGCIG-2008-WestraHDD #adaptation #game studies #online
On-line adapting games using agent organizations (JW, HvH, VD, FD), pp. 243–250.
CoGCIG-2008-WittkampBH #adaptation
Using NEAT for continuous adaptation and teamwork formation in Pacman (MW, LB, PH), pp. 234–242.
GT-VMTGT-VMT-2006-JakobS08 #graph grammar #metamodelling #modelling
View Creation of Meta Models by Using Modified Triple Graph Grammars (JJ, AS), pp. 181–190.
GT-VMTGT-VMT-2006-Varro08 #database #graph transformation #implementation #independence #plugin #query
Implementing an EJB3-Specific Graph Transformation Plugin by Using Database Independent Queries (GV), pp. 121–132.
GT-VCGT-VC-2007-BruniBGM08 #architecture #graph grammar #modelling
Modelling Dynamic Software Architectures using Typed Graph Grammars (RB, AB, SG, HCM), pp. 39–53.
GT-VMTGT-VMT-2008-BaresiGMM #abstraction #graph transformation #verification
Using Graph Transformation Systems to Specify and Verify Data Abstractions (LB, CG, AM, MM).
GT-VMTGT-VMT-2008-BucchiaroneG #architecture #verification
Dynamic Software Architectures Verification using DynAlloy (AB, JPG).
GT-VMTGT-VMT-2008-GrabskaSL #design #graph transformation #reasoning #visual notation
Visual Design and Reasoning with the Use of Hypergraph Transformations (EG, GMS, TLL).
ICGTICGT-2008-EhrigE #correctness #graph #model transformation #semantics
Semantical Correctness and Completeness of Model Transformations Using Graph and Rule Transformation (HE, CE), pp. 194–210.
ICGTICGT-2008-Khan #analysis #configuration management #graph transformation #modelling #network
Model-Based Analysis of Network Reconfigurations Using Graph Transformation Systems (AK), pp. 502–504.
ICGTICGT-2008-RangelLKEB #behaviour #refactoring
Behavior Preservation in Model Refactoring Using DPO Transformations with Borrowed Contexts (GR, LL, BK, HE, PB), pp. 242–256.
ICGTICGT-2008-Striewe #graph grammar #implementation #state machine
Using a Triple Graph Grammar for State Machine Implementations (MS), pp. 514–516.
CHICHI-2008-BuechleyECC #arduino #education
The LilyPad Arduino: using computational textiles to investigate engagement, aesthetics, and diversity in computer science education (LB, ME, JC, AC), pp. 423–432.
CHICHI-2008-ClawsonLRIS #automation #fault #type system
Automatic whiteout++: correcting mini-QWERTY typing errors using keypress timing (JC, KL, AR, RAI, TS), pp. 573–582.
CHICHI-2008-DugganP #topic #web
Knowledge in the head and on the web: using topic expertise to aid search (GBD, SJP), pp. 39–48.
CHICHI-2008-GeyerDDMBM #reuse #social
Use and reuse of shared lists as a social content type (WG, CD, JMD, DRM, BB, MJM), pp. 1545–1554.
CHICHI-2008-GrafSSWR #interactive #search-based #user interface
In-car interaction using search-based user interfaces (SG, WS, AS, AW, GR), pp. 1685–1688.
CHICHI-2008-GuoS #case study #comparative #interactive #user interface
Exploring the use of tangible user interfaces for human-robot interaction: a comparative study (CG, ES), pp. 121–130.
CHICHI-2008-HornbaekF #empirical #evaluation #usability
Making use of business goals in usability evaluation: an experiment with novice evaluators (KH, EF), pp. 903–912.
CHICHI-2008-HsiehLHK #communication
Using tags to assist near-synchronous communication (GH, JL, SEH, RK), pp. 223–226.
CHICHI-2008-Joinson #facebook #people
Looking at, looking up or keeping up with people?: motives and use of facebook (ANJ), pp. 1027–1036.
CHICHI-2008-KangWA #interactive #mobile #social #video
Social copresence in anonymous social interactions using a mobile video telephone (SHK, JHW, SKA), pp. 1535–1544.
CHICHI-2008-KatsanosTA #analysis #architecture #design #named #semantics #web
AutoCardSorter: designing the information architecture of a web site using latent semantic analysis (CK, NKT, NMA), pp. 875–878.
CHICHI-2008-KobayashiI #multi #scalability
Ninja cursors: using multiple cursors to assist target acquisition on large screens (MK, TI), pp. 949–958.
CHICHI-2008-LanirBF #design #visual notation
Observing presenters’ use of visual aids to inform the design of classroom presentation software (JL, KSB, LF), pp. 695–704.
CHICHI-2008-LawranceBBR #behaviour #maintenance
Using information scent to model the dynamic foraging behavior of programmers in maintenance tasks (JL, RKEB, MMB, KR), pp. 1323–1332.
CHICHI-2008-MorrisBM #named #type system
SuperBreak: using interactivity to enhance ergonomic typing breaks (DM, AJBB, BM), pp. 1817–1826.
CHICHI-2008-MoscovichH #multi
Indirect mappings of multi-touch input using one and two hands (TM, JFH), pp. 1275–1284.
CHICHI-2008-OganAJ #learning #predict
Pause, predict, and ponder: use of narrative videos to improve cultural discussion and learning (AO, VA, CJ), pp. 155–162.
CHICHI-2008-RatwaniMT #eye tracking #fault #predict
Predicting postcompletion errors using eye movements (RMR, JMM, JGT), pp. 539–542.
CHICHI-2008-SankarpandianLE #named
Talc: using desktop graffiti to fight software vulnerability (KS, TL, WKE), pp. 1055–1064.
CHICHI-2008-SaponasTMB #interface
Demonstrating the feasibility of using forearm electromyography for muscle-computer interfaces (TSS, DST, DM, RB), pp. 515–524.
CHICHI-2008-SzentgyorgyiTL #game studies #social
Renegade gaming: practices surrounding social use of the Nintendo DS handheld gaming system (CS, MAT, EL), pp. 1463–1472.
CHICHI-2008-TianXWZLSD #3d #user interface
Tilt menu: using the 3D orientation information of pen devices to extend the selection capability of pen-based user interfaces (FT, LX, HW, XZ, YL, VS, GD), pp. 1371–1380.
CHICHI-2008-YataniPBN #gesture #named
Escape: a target selection technique using visually-cued gestures (KY, KP, MWB, MWN), pp. 285–294.
CSCWCSCW-2008-HancockTF #symmetry
I know something you don’t: the use of asymmetric personal information for interpersonal advantage (JTH, CLT, KF), pp. 413–416.
CSCWCSCW-2008-ReillyMWI
Small details: using one device to navigate together (DFR, BM, CRW, KMI), pp. 253–256.
SOFTVISSOFTVIS-2008-AnslowNMB #3d #visualisation #web
Web software visualization using extensible 3D (X3D) graphics (CA, JN, SM, RB), pp. 213–214.
SOFTVISSOFTVIS-2008-ParduhnSW #algorithm #graph #visualisation
Algorithm visualization using concrete and abstract shape graphs (SAP, RS, RW), pp. 33–36.
SOFTVISSOFTVIS-2008-ZeckzerKSHK #3d #clustering #communication #graph #reliability #visualisation
Analyzing the reliability of communication between software entities using a 3D visualization of clustered graphs (DZ, RK, LS, HH, TK), pp. 37–46.
CAiSECAiSE-2008-DeckerKLPW #modelling
Modeling Service Choreographies Using BPMN and BPEL4Chor (GD, OK, FL, KP, MW), pp. 79–93.
CAiSECAiSE-2008-HerssensJF
Capturing and Using QoS Relationships to Improve Service Selection (CH, IJ, SF), pp. 312–327.
CAiSECAiSE-2008-MuehlenR #how #modelling #process
How Much Language Is Enough? Theoretical and Practical Use of the Business Process Modeling Notation (MzM, JR), pp. 465–479.
CAiSECAiSE-2008-ViscusiTS #approach #case study #empirical
Strategic Alignment in the Context of e-Services — An Empirical Investigation of the INSTAL Approach Using the Italian eGovernment Initiative Case Study (GV, LHT, CS), pp. 163–166.
EDOCEDOC-2008-KavimandanKG #automation #enterprise #model transformation #synthesis #workflow
Automated Context-Sensitive Dialog Synthesis for Enterprise Workflows Using Templatized Model Transformations (AK, RK, ASG), pp. 159–168.
EDOCEDOC-2008-NarmanSJEC #analysis #architecture #enterprise #modelling #quality
Using Enterprise Architecture Models for System Quality Analysis (PN, MS, PJ, ME, MC), pp. 14–23.
EDOCEDOC-2008-TakahashiTIHF #approach #composition #coordination #metadata #multi #protocol
Coordination Protocol Composition Approach Using Metadata in Multi-agent Systems (RT, KT, FI, SH, YF), pp. 372–378.
ICEISICEIS-AIDSS-2008-BurdescuML #concept #student
Building a Decision Support System for Students by Using Concept Maps (DDB, MCM, BL), pp. 130–135.
ICEISICEIS-AIDSS-2008-MahdaviSP #approach #automation
Machine Grouping in Cellular Manufacturing System Using Tandem Automated Guided vehicle with ACO Based Six Sigma Approach (IM, BS, MMP), pp. 261–267.
ICEISICEIS-AIDSS-2008-Nachev #network
Forecasting with ARTMAP-IC Neural Networks — An Application Using Corporate Bankruptcy Data (AN), pp. 167–172.
ICEISICEIS-AIDSS-2008-SchmidtV #reasoning
Using Case-Based Reasoning to Explain Exceptional Cases (RS, OV), pp. 119–124.
ICEISICEIS-AIDSS-2008-TsengKH #approach #assembly
A Decision Support System for Integrated Assembly and Disassembly Planning Using a GA Approach (YJT, HTK, FYH), pp. 348–355.
ICEISICEIS-DISI-2008-MoraGRPBGCR #metric #qvt
Software Measurement by Using QVT Transformations in an MDA Context (BM, FG, FR, MP, AB, AG, JÁC, IR), pp. 117–124.
ICEISICEIS-HCI-2008-LeivaCGA #development #maintenance #workflow
A Cooperative Method for System Development and Maintenance Using Workflow Technologies (JLL, JLC, AG, MAA), pp. 130–135.
ICEISICEIS-HCI-2008-MordechaiFD #interface #named #taxonomy
TTLS: A Grouped Display of Search Results Based on Organizational Taxonomy Using the LCC&K Interface (VM, AJF, OD), pp. 47–53.
ICEISICEIS-ISAS1-2008-GullaBK #concept #ontology
Using Association Rules to Learn Concept Relationships in Ontologies (JAG, TB, GSK), pp. 58–65.
ICEISICEIS-ISAS1-2008-LoewensternS #lifecycle
IT Service Management of Using Heterogeneous, Dynamically Alterable Configuration Item Lifecycles (DL, LS), pp. 155–160.
ICEISICEIS-ISAS2-2008-BrunetSLG #modelling
Using Variants in KAOS Goal Modelling (JB, FS, RL, CG), pp. 339–344.
ICEISICEIS-ISAS2-2008-PivetaMPAGP #process #ranking #refactoring
Ranking Refactoring Patterns Using the Analytical Hierarchy Process (EKP, AMDM, MSP, JA, PG, RTP), pp. 195–200.
ICEISICEIS-ISAS2-2008-Prpitsch #process
From Process to Software Systems’ Service — Using a Layered Model to Connect Technical and Process-related Views (CP), pp. 298–304.
ICEISICEIS-J-2008-PapatheocharousA08a #algorithm #approach #hybrid #modelling #network #predict #search-based
Hybrid Computational Models for Software Cost Prediction: An Approach Using Artificial Neural Networks and Genetic Algorithms (EP, ASA), pp. 87–100.
ICEISICEIS-SAIC-2008-BaguesBBGI #communication #protocol #semantics
Use of Semantic Technology to Describe and Reason about Communication Protocols (MIB, IB, JB, AG, AI), pp. 67–72.
ICEISICEIS-SAIC-2008-BoukadiGV #aspect-oriented #collaboration #enterprise
Enhancing Enterprise Collaboration Using Context-Aware Service Based on Aspects (KB, CG, LV), pp. 29–36.
ICEISICEIS-SAIC-2008-BrockeTW #e-commerce #mobile
Making Use of Mobile Devices in E-Commerce — Overcoming Organizational Barriers through User Participation (JvB, BT, DW), pp. 168–173.
ICEISICEIS-SAIC-2008-DAgostiniFDG #semantics
Contextual Semantic Search — Capturing, using the User’s Context to Direct Semantic Search (CSD, RF, MARD, FAOG), pp. 154–159.
ICEISICEIS-SAIC-2008-KangasharjuK #data transfer #mobile #xml
Using Bit-Efficient XML to Optimize Data Transfer of XForms-Based Mobile Services (JK, OK), pp. 5–11.
ICEISICEIS-SAIC-2008-RanW #adaptation #metric #performance
Develop Adaptive Workplace E-Learning Environments by Using Performance Measurement Systems (WR, MW), pp. 142–147.
ICEISICEIS-SAIC-2008-StellerKCNL #approach #pervasive #reasoning #semantics
A Weighted Approach for Optimised Reasoning for Pervasive Service Discovery Using Semantics and Context (LS, SK, SC, JN, SWL), pp. 113–118.
CIKMCIKM-2008-BaoYFXSY #social
Boosting social annotations using propagation (SB, BY, BF, SX, ZS, YY), pp. 1507–1508.
CIKMCIKM-2008-BarskySTU
A new method for indexing genomes using on-disk suffix trees (MB, US, AT, CU), pp. 649–658.
CIKMCIKM-2008-BroderCFGJR #feedback #web
Search advertising using web relevance feedback (AZB, PC, MF, EG, VJ, LR), pp. 1013–1022.
CIKMCIKM-2008-ChanLY #logic #modelling
Coreference resolution using expressive logic models (KC, WL, XY), pp. 1373–1374.
CIKMCIKM-2008-DaoudTB #graph #ontology #personalisation
Using a graph-based ontological user profile for personalizing search (MD, LTL, MB), pp. 1495–1496.
CIKMCIKM-2008-HuangS #markov #query
A latent variable model for query expansion using the hidden markov model (QH, DS), pp. 1417–1418.
CIKMCIKM-2008-MahouiTSC #identification #modelling #predict
Identification of gene function using prediction by partial matching (PPM) language models (MM, WJT, AKTS, SC), pp. 779–786.
CIKMCIKM-2008-MaYLK #mining #network #process #social
Mining social networks using heat diffusion processes for marketing candidates selection (HM, HY, MRL, IK), pp. 233–242.
CIKMCIKM-2008-MaYLK08a #matrix #named #probability #recommendation #social
SoRec: social recommendation using probabilistic matrix factorization (HM, HY, MRL, IK), pp. 931–940.
CIKMCIKM-2008-MeiZC #query
Query suggestion using hitting time (QM, DZ, KWC), pp. 469–478.
CIKMCIKM-2008-QuMG #network #semantics
Using tag semantic network for keyphrase extraction in blogs (LQ, CM, IG), pp. 1381–1382.
CIKMCIKM-2008-RahurkarC
Using the current browsing context to improve search relevance (MR, SC), pp. 1493–1494.
CIKMCIKM-2008-RaviP #scalability
Using structured text for large-scale attribute extraction (SR, MP), pp. 1183–1192.
CIKMCIKM-2008-RosenfeldFU #classification #sequence #web
Using sequence classification for filtering web pages (BR, RF, LHU), pp. 1355–1356.
CIKMCIKM-2008-SeoC
Blog site search using resource selection (JS, WBC), pp. 1053–1062.
CIKMCIKM-2008-ShiNC
Relating dependent indexes using dempster-shafer theory (LS, JYN, GC), pp. 429–438.
CIKMCIKM-2008-VinayMC #effectiveness #rank #retrieval
Estimating retrieval effectiveness using rank distributions (VV, NMF, IJC), pp. 1425–1426.
CIKMCIKM-2008-WangZRM #automation #online #ranking #topic
Automatic online news topic ranking using media focus and user attention based on aging theory (CW, MZ, LR, SM), pp. 1033–1042.
CIKMCIKM-2008-XinLTL #comprehension #random
Academic conference homepage understanding using constrained hierarchical conditional random fields (XX, JL, JT, QL), pp. 1301–1310.
CIKMCIKM-2008-XuDW #query #wiki
Entity-based query reformulation using wikipedia (YX, FD, BW), pp. 1441–1442.
ECIRECIR-2008-AbdullahG #approach #usability
Using a Task-Based Approach in Evaluating the Usability of BoBIs in an E-book Environment (NA, FG), pp. 246–257.
ECIRECIR-2008-AyacheQ #corpus #learning #video
Video Corpus Annotation Using Active Learning (SA, GQ), pp. 187–198.
ECIRECIR-2008-CloughR #design #image #visualisation
Key Design Issues with Visualising Images Using Google Earth (PDC, SR), pp. 570–574.
ECIRECIR-2008-EidoonYO #ontology
Ontology Matching Using Vector Space (ZE, NY, FO), pp. 472–481.
ECIRECIR-2008-HeLR #metric #predict #query
Using Coherence-Based Measures to Predict Query Difficulty (JH, ML, MdR), pp. 689–694.
ECIRECIR-2008-HuangBCQ #image #network #retrieval #web
Improving Web Image Retrieval Using Image Annotations and Inference Network (PH, JB, CC, GQ), pp. 617–621.
ECIRECIR-2008-LillisTCD #data fusion #probability
Extending Probabilistic Data Fusion Using Sliding Windows (DL, FT, RWC, JD), pp. 358–369.
ECIRECIR-2008-NaKL08c #probability #similarity
Query-Based Inter-document Similarity Using Probabilistic Co-relevance Model (SHN, ISK, JHL), pp. 684–688.
ECIRECIR-2008-NunesRD #web
Use of Temporal Expressions in Web Search (SN, CR, GD), pp. 580–584.
ECIRECIR-2008-RitchieTR #information retrieval
Using Terms from Citations for IR: Some First Results (AR, ST, SR), pp. 211–221.
ECIRECIR-2008-ScholerSBT
Using Clicks as Implicit Judgments: Expectations Versus Observations (FS, MS, BB, AT), pp. 28–39.
ECIRECIR-2008-SongHRB #composition #mining #modelling #multi #query
Facilitating Query Decomposition in Query Language Modeling by Association Rule Mining Using Multiple Sliding Windows (DS, QH, SMR, PB), pp. 334–345.
ECIRECIR-2008-ValletHJ #evaluation #graph #recommendation
Use of Implicit Graph for Recommending Relevant Videos: A Simulated Evaluation (DV, FH, JMJ), pp. 199–210.
ECIRECIR-2008-ZhaoST #effectiveness #performance #predict #query #similarity #variability
Effective Pre-retrieval Query Performance Prediction Using Similarity and Variability Evidence (YZ, FS, YT), pp. 52–64.
ICMLICML-2008-DoshiPR #learning
Reinforcement learning with limited reinforcement: using Bayes risk for active learning in POMDPs (FD, JP, NR), pp. 256–263.
ICMLICML-2008-KirshnerP #dependence
ICA and ISA using Schweizer-Wolff measure of dependence (SK, BP), pp. 464–471.
ICMLICML-2008-LarochelleB #classification #strict
Classification using discriminative restricted Boltzmann machines (HL, YB), pp. 536–543.
ICMLICML-2008-SahbiARK #kernel #recognition #robust
Robust matching and recognition using context-dependent kernels (HS, JYA, JR, RK), pp. 856–863.
ICMLICML-2008-SalakhutdinovM08a #markov #matrix #monte carlo #probability
Bayesian probabilistic matrix factorization using Markov chain Monte Carlo (RS, AM), pp. 880–887.
ICMLICML-2008-ShiBY #learning #modelling
Data spectroscopy: learning mixture models using eigenspaces of convolution operators (TS, MB, BY), pp. 936–943.
ICMLICML-2008-SyedBS #learning #linear #programming
Apprenticeship learning using linear programming (US, MHB, RES), pp. 1032–1039.
ICMLICML-2008-Tieleman #approximate #strict
Training restricted Boltzmann machines using approximations to the likelihood gradient (TT), pp. 1064–1071.
ICMLICML-2008-WangM #analysis
Manifold alignment using Procrustes analysis (CW, SM), pp. 1120–1127.
ICMLICML-2008-YueJ #predict #set
Predicting diverse subsets using structural SVMs (YY, TJ), pp. 1224–1231.
ICPRICPR-2008-Abd-AlmageedASD #classification #hybrid
Document-zone classification using partial least squares and hybrid classifiers (WAA, MA, WS, DSD), pp. 1–4.
ICPRICPR-2008-AgrisBK #adaptation #agile #approach #recognition
Rapid signer adaptation for continuous sign language recognition using a combined approach of eigenvoices, MLLR, and MAP (UvA, CB, KFK), pp. 1–4.
ICPRICPR-2008-AmanoK #feedback
Appearance enhancement using a projector-camera feedback system (TA, HK), pp. 1–4.
ICPRICPR-2008-Baradarani #segmentation
Moving object segmentation using the 9/7-10/8 dual-tree complex filter bank (AB), pp. 1–4.
ICPRICPR-2008-BarratT #effectiveness #image #network #retrieval #semantics #visual notation
Visual features with semantic combination using Bayesian network for a more effective image retrieval (SB, ST), pp. 1–4.
ICPRICPR-2008-BazinKDV #image
Improvement of feature matching in catadioptric images using gyroscope data (JCB, IK, CD, PV), pp. 1–5.
ICPRICPR-2008-CamposJ #constraints #learning #network #parametricity
Improving Bayesian Network parameter learning using constraints (CPdC, QJ), pp. 1–4.
ICPRICPR-2008-ChakrabortyE #constraints #invariant #locality
Object localization using affine invariant substructure constraints (IC, AME), pp. 1–5.
ICPRICPR-2008-ChamaretM #validation #video
Attention-based video reframing: Validation using eye-tracking (CC, OLM), pp. 1–4.
ICPRICPR-2008-ChandraS
A method for removing cyclic artefacts in discrete tomography using latin squares (SC, IDS), pp. 1–4.
ICPRICPR-2008-ChangLAH #clique #clustering #constraints
Unsupervised clustering using hyperclique pattern constraints (YC, DJL, JKA, YH), pp. 1–4.
ICPRICPR-2008-ChangLAH08a #collaboration #image #learning
Using collaborative learning for image contrast enhancement (YC, DJL, JKA, YH), pp. 1–4.
ICPRICPR-2008-ChenCW #higher-order #named #performance
HOPS: Efficient region labeling using Higher Order Proxy Neighborhoods (AYCC, JJC, LW), pp. 1–4.
ICPRICPR-2008-ChenSXS #algorithm #identification #search-based
Computer graphics identification using genetic algorithm (WC, YQS, GX, WS), pp. 1–4.
ICPRICPR-2008-ChenZP #segmentation
Unsupervised dynamic texture segmentation using local spatiotemporal descriptors (JC, GZ, MP), pp. 1–4.
ICPRICPR-2008-CheongL #approach #image #matrix #multi #orthogonal #recognition
An approach to texture-based image recognition by deconstructing multispectral co-occurrence matrices using Tchebichef orthogonal polynomials (MCYC, KSL), pp. 1–4.
ICPRICPR-2008-ChoB #dependence #image
Image inpainting using wavelet-based inter- and intra-scale dependency (DC, TDB), pp. 1–4.
ICPRICPR-2008-ChoiMSH #analysis
Quantitative analysis of Iaido proficiency by using motion data (WC, SM, HS, KH), pp. 1–4.
ICPRICPR-2008-ChuangHFH #detection #multi
Monocular multi-human detection using Augmented Histograms of Oriented Gradients (CHC, SSH, LCF, PYH), pp. 1–4.
ICPRICPR-2008-DehzangiMCL #classification #fuzzy #learning #speech
Fuzzy rule selection using Iterative Rule Learning for speech data classification (OD, BM, CES, HL), pp. 1–4.
ICPRICPR-2008-DonoserB #matrix #segmentation
Using covariance matrices for unsupervised texture segmentation (MD, HB), pp. 1–4.
ICPRICPR-2008-EmmsHW #graph #quantum
Graph drawing using quantum commute time (DE, ERH, RCW), pp. 1–4.
ICPRICPR-2008-FabletLSMCB #learning
Weakly supervised learning using proportion-based information: An application to fisheries acoustics (RF, RL, CS, JM, PC, JMB), pp. 1–4.
ICPRICPR-2008-FengGDJ #retrieval
Motion capture data retrieval using an artist’s doll (TCF, PG, JD, BJ), pp. 1–4.
ICPRICPR-2008-FerrerVSRB #algorithm #approximate #graph
An approximate algorithm for median graph computation using graph embedding (MF, EV, FS, KR, HB), pp. 1–4.
ICPRICPR-2008-GatosPP #adaptation #documentation #image #multi
Improved document image binarization by using a combination of multiple binarization techniques and adapted edge information (BG, IP, SJP), pp. 1–4.
ICPRICPR-2008-GhoshM #classification #documentation #kernel #similarity #xml
Combining content and structure similarity for XML document classification using composite SVM kernels (SG, PM), pp. 1–4.
ICPRICPR-2008-GongC #graph #learning #online #optimisation #realtime #segmentation
Real-time foreground segmentation on GPUs using local online learning and global graph cut optimization (MG, LC), pp. 1–4.
ICPRICPR-2008-Gonzalez-AguirreABD #geometry #graph #modelling #self #visual notation
Model-based visual self-localization using geometry and graphs (DIGA, TA, EBC, RD), pp. 1–5.
ICPRICPR-2008-GuehamBC #automation #classification #correlation #forensics
Automatic classification of partial shoeprints using Advanced Correlation Filters for use in forensic science (MG, AB, DC), pp. 1–4.
ICPRICPR-2008-GuimaraesPP #approach #detection #difference #distance #graph #video
An approach for video cut detection using bipartite graph matching as dissimilarity distance (SJFG, ZKGdPJ, HBdP), pp. 1–4.
ICPRICPR-2008-GuoYZZY #embedded #markov #random
Face super-resolution using 8-connected Markov Random Fields with embedded prior (KG, XY, RZ, GZ, SY), pp. 1–4.
ICPRICPR-2008-HahnKW #3d #algorithm #estimation
Spatio-temporal 3D pose estimation and tracking of human body parts using the Shape Flow algorithm (MH, LK, CW), pp. 1–4.
ICPRICPR-2008-HainesW #random
Combining shape-from-shading and stereo using Gaussian-Markov random fields (TSFH, RCW), pp. 1–4.
ICPRICPR-2008-HanYJ #evaluation #online
Online feature evaluation for object tracking using Kalman Filter (ZH, QY, JJ), pp. 1–4.
ICPRICPR-2008-HidakaK #feature model #optimisation
Non-Neighboring Rectangular Feature selection using Particle Swarm Optimization (AH, TK), pp. 1–4.
ICPRICPR-2008-HortaMF #algorithm #clustering #comparison #image
A comparison of clustering fully polarimetric SAR images using SEM algorithm and G0P mixture modelwith different initializations (MMH, NDAM, ACF), pp. 1–4.
ICPRICPR-2008-HossainMJY #adaptation #identification #invariant
Clothes-invariant gait identification using part-based adaptive weight control (MAH, YM, WJ, YY), pp. 1–4.
ICPRICPR-2008-HsiaoCC #recognition
Human action recognition using temporal-state shape contexts (PCH, CSC, LWC), pp. 1–4.
ICPRICPR-2008-HuangST #detection #video
Detecting moving text in video using temporal information (WH, PS, CLT), pp. 1–4.
ICPRICPR-2008-HuAS08a #learning
Learning motion patterns in crowded scenes using motion flow field (MH, SA, MS), pp. 1–5.
ICPRICPR-2008-HuSM #categorisation #clustering
Categorization using semi-supervised clustering (JH, MS, AM), pp. 1–4.
ICPRICPR-2008-IbrahimG #online #verification
On-line signature verification by using most discriminating points (MTI, LG), pp. 1–4.
ICPRICPR-2008-Ilic #recognition
Object labeling for recognition using vocabulary trees (SI), pp. 1–4.
ICPRICPR-2008-IzadiS #robust
Robust region-based background subtraction and shadow removing using color and gradient information (MI, PS), pp. 1–5.
ICPRICPR-2008-JiaDQA #3d #estimation #metric
Directionality measurement and illumination estimation of 3D surface textures by using mojette transform (PJ, JD, LQ, FA), pp. 1–4.
ICPRICPR-2008-KaholV #analysis #modelling #process
Hand motion expertise analysis using dynamic hierarchical activity modeling and isomap (KK, MV), pp. 1–4.
ICPRICPR-2008-KangKNN #image #multi #recognition #segmentation
Multiband image segmentation and object recognition using texture filter banks (YK, KK, TN, YN), pp. 1–4.
ICPRICPR-2008-KarnickMP #approach #classification #concept #incremental #learning #multi
Incremental learning in non-stationary environments with concept drift using a multiple classifier based approach (MTK, MM, RP), pp. 1–4.
ICPRICPR-2008-KashimaHRS #clustering #distance
K-means clustering of proportional data using L1 distance (HK, JH, BKR, MS), pp. 1–4.
ICPRICPR-2008-KasuyaKKO #estimation #robust
Robust trajectory estimation of soccer players by using two cameras (NK, IK, YK, YO), pp. 1–4.
ICPRICPR-2008-KatayamaUS #coordination #online #recognition
A new HMM for on-line character recognition using pen-direction and pen-coordinate features (YK, SU, HS), pp. 1–4.
ICPRICPR-2008-KazuiMMF #detection #matrix
Incoherent motion detection using a time-series Gram matrix feature (MK, MM, SM, HF), pp. 1–5.
ICPRICPR-2008-KimS #consistency #detection #sequence #video
Static text region detection in video sequences using color and orientation consistencies (DK, KS), pp. 1–4.
ICPRICPR-2008-Kita #case study #detection #image
A study of change detection from satellite images using joint intensity histogram (YK), pp. 1–4.
ICPRICPR-2008-KleinLM
Preceding car tracking using belief functions and a particle filter (JK, CL, PM), pp. 1–4.
ICPRICPR-2008-KonKAT #adaptation #detection #interactive #realtime
Adaptive habituation detection to build human computer interactive systems using a real-time cross-modal computation (MK, TK, KA, HT), pp. 1–4.
ICPRICPR-2008-LachezeB #image #locality
Image sampling for localization using entropy (LL, RB), pp. 1–4.
ICPRICPR-2008-LeeWN #detection #performance
Very fast ellipse detection using GPU-based RHT (JKL, BAW, TSN), pp. 1–4.
ICPRICPR-2008-LiDM #feature model #learning #locality
Localized feature selection for Gaussian mixtures using variational learning (YL, MD, YM), pp. 1–4.
ICPRICPR-2008-LinG #infinity
Depth recovery using defocus blur at infinity (HYL, KDG), pp. 1–4.
ICPRICPR-2008-LiuS08a #detection #robust
Robust outdoor text detection using text intensity and shape features (ZL, SS), pp. 1–4.
ICPRICPR-2008-LiYWS #invariant
Bi-model tracking of object of interest using invariant spatiogram descriptor (JL, WYY, JGW, WS), pp. 1–4.
ICPRICPR-2008-Machucho-CadenaCB
Rendering of brain tumors using endoneurosonography (RMC, SdlCR, EBC), pp. 1–4.
ICPRICPR-2008-MakiHM #image
Tracking features on a moving object using local image bases (AM, YH, TM), pp. 1–5.
ICPRICPR-2008-MandalW #recognition
Face recognition using curvelet based PCA (TM, QMJW), pp. 1–4.
ICPRICPR-2008-MaruyamaKYT #3d #locality
3D object localization based on occluding contour using STL CAD model (KM, YK, TY, FT), pp. 1–4.
ICPRICPR-2008-MeiS #image #parametricity #statistics
Unsupervised image embedding using nonparametric statistics (GM, CRS), pp. 1–4.
ICPRICPR-2008-MirzaeiR #clustering #transitive
Combining hierarchical clusterings using min-transitive closure (AM, MR), pp. 1–4.
ICPRICPR-2008-MohantaSC #detection #multi
Detection of representative frames of a shot using multivariate Wald-Wolfowitz test (PPM, SKS, BC), pp. 1–4.
ICPRICPR-2008-MooreSLD #image #segmentation #top-down
Top down image segmentation using congealing and graph-cut (DM, JS, SL, BAD), pp. 1–4.
ICPRICPR-2008-MunizCR #classification #independence
Use of band ratioing for building illumination independent texture classification systems (RM, JAC, MRS), pp. 1–4.
ICPRICPR-2008-MuraiF #bound #detection #video
Shot boundary detection using co-occurrence of global motion in video stream (YM, HF), pp. 1–4.
ICPRICPR-2008-OkaKXLW #authentication #named #similarity #sketching
Scribble-a-Secret: Similarity-based password authentication using sketches (MO, KK, YX, LL, FW), pp. 1–4.
ICPRICPR-2008-OnishiTA #3d #estimation #image
3D human posture estimation using the HOG features from monocular image (KO, TT, YA), pp. 1–4.
ICPRICPR-2008-PaclikLND #analysis #estimation #multi
Variance estimation for two-class and multi-class ROC analysis using operating point averaging (PP, CL, JN, RPWD), pp. 1–4.
ICPRICPR-2008-PalaioB #adaptation #multi
Multi-object tracking using an adaptive transition model particle filter with region covariance data association (HP, JB), pp. 1–4.
ICPRICPR-2008-PanBS #detection #image #representation
Text detection from scene images using sparse representation (WP, TDB, CYS), pp. 1–5.
ICPRICPR-2008-PengXXD #recognition
Face recognition using anisotropic dual-tree complex wavelet packets (YP, XX, WX, QD), pp. 1–4.
ICPRICPR-2008-PohK #authentication #bound #fault #multimodal #on the
On using error bounds to optimize cost-sensitive multimodal biometric authentication (NP, JK), pp. 1–4.
ICPRICPR-2008-RebiereAD #image
Image mosaicing using local optical flow registration (NR, MFAF, FD), pp. 1–5.
ICPRICPR-2008-Rokui
Tree-structure lossless coding using intervector angle (JR), pp. 1–4.
ICPRICPR-2008-RyooA #fuzzy #nondeterminism #process
Human activities: Handling uncertainties using fuzzy time intervals (MSR, JKA), pp. 1–5.
ICPRICPR-2008-SahaB #clustering #multi #symmetry
A new multiobjective simulated annealing based clustering technique using stability and symmetry (SS, SB), pp. 1–4.
ICPRICPR-2008-SanromaSA #clique #graph
Improving the matching of graphs generated from shapes by the use of procrustes distances into a clique-based MAP formulation (GS, FS, RA), pp. 1–4.
ICPRICPR-2008-SekiH #3d #multi #realtime
Real-time 3D tracking using multiple sample points (AS, HH), pp. 1–4.
ICPRICPR-2008-ShenCH #image #retrieval
Face image retrieval by using Haar features (BCS, CSC, HHH), pp. 1–4.
ICPRICPR-2008-ShenCLB #random
Stereo matching using random walks (RS, IC, XL, AB), pp. 1–4.
ICPRICPR-2008-ShenZL #detection #higher-order #programming
Deformable surface stereo tracking-by-detection using Second Order Cone Programming (SS, YZ, YL), pp. 1–4.
ICPRICPR-2008-ShinK #algorithm
Enhanced Resolution-aware Fitting algorithm using interpolation operator (JS, DK), pp. 1–4.
ICPRICPR-2008-ShivakumaraHT #detection #performance #video
Efficient video text detection using edge features (PS, WH, CLT), pp. 1–4.
ICPRICPR-2008-SinghNGBSP #hybrid #random
Hybrid SVM — Random Forest classication system for oral cancer screening using LIF spectra (RKS, SKN, LG, SB, CS, KMP), pp. 1–4.
ICPRICPR-2008-Stelldinger #re-engineering
Topologically correct surface reconstruction using alpha shapes and relations to ball-pivoting (PS), pp. 1–4.
ICPRICPR-2008-SugaFTA #graph #recognition #segmentation
Object recognition and segmentation using SIFT and Graph Cuts (AS, KF, TT, YA), pp. 1–4.
ICPRICPR-2008-SugimotoO #array #image #synthesis
Virtual focusing image synthesis for user-specified image region using camera array (SS, MO), pp. 1–4.
ICPRICPR-2008-SukumarBPKA #locality #multi #nondeterminism
Uncertainty minimization in multi-sensor localization systems using model selection theory (SRS, HB, DLP, AK, MAA), pp. 1–4.
ICPRICPR-2008-SuS #generative #modelling
Generative models for fingerprint individuality using ridge models (CS, SNS), pp. 1–4.
ICPRICPR-2008-SuzukiSZ #network
Supervised enhancement of lung nodules by use of a massive-training artificial neural network (MTANN) in computer-aided diagnosis (CAD) (KS, ZS, JZ), pp. 1–4.
ICPRICPR-2008-TaketomiSY #database #estimation #realtime
Real-time camera position and posture estimation using a feature landmark database with priorities (TT, TS, NY), pp. 1–4.
ICPRICPR-2008-ThomeeHBL #retrieval
Using an artificial imagination for texture retrieval (BT, MJH, EMB, MSL), pp. 1–4.
ICPRICPR-2008-Trujillo-RomeroD #pseudo
Registration by using a pseudo color attribute (FTR, MD), pp. 1–4.
ICPRICPR-2008-TsolakisFD #framework #performance
A framework for efficient correspondence using feature interrelations (AGT, MF, AD), pp. 1–4.
ICPRICPR-2008-TsuchiyaF #feature model
A method of feature selection using contribution ratio based on boosting (MT, HF), pp. 1–4.
ICPRICPR-2008-UedaT #locality #on the #scalability
On the scalability of robot localization using high-dimensional features (TU, KT), pp. 1–4.
ICPRICPR-2008-UkitaKK
IBR-based free-viewpoint imaging of a complex scene using few cameras (NU, SK, MK), pp. 1–4.
ICPRICPR-2008-VajariaSK #multi #retrieval
Clip retrieval using multi-modal biometrics in meeting archives (HV, SS, RK), pp. 1–4.
ICPRICPR-2008-Vega-PonsRV #algorithm #segmentation #set
Active contour algorithm for texture segmentation using a texture feature set (SVP, JLGR, OLV), pp. 1–4.
ICPRICPR-2008-WachenfeldTJ #recognition #robust
Robust recognition of 1-D barcodes using camera phones (SW, ST, XJ), pp. 1–4.
ICPRICPR-2008-WangC #classification #semantics
Film shot classification using directing semantics (HLW, LFC), pp. 1–4.
ICPRICPR-2008-WangM #invariant #probability #recognition #similarity
Scale invariant face recognition using probabilistic similarity measure (ZW, ZM), pp. 1–4.
ICPRICPR-2008-WangTHW #bound
Object boundary extraction using Active B-Snake Model (YW, EKT, ZH, JGW), pp. 1–4.
ICPRICPR-2008-WatanabeIHY #algorithm #performance #reduction #video
A fast algorithm of video super-resolution using dimensionality reduction by DCT and example selection (KW, YI, TH, MY), pp. 1–5.
ICPRICPR-2008-WetzkerPKBAM #detection #generative #probability #roadmap #social
Detecting trends in social bookmarking systems using a probabilistic generative model and smoothing (RW, TP, AK, CB, TA, FM), pp. 1–4.
ICPRICPR-2008-WongCF #adaptation #image
Phase-adaptive image signal fusion using complex-valued wavelets (AW, DAC, PWF), pp. 1–4.
ICPRICPR-2008-WuF #3d #classification #learning #multi
Multiple view based 3D object classification using ensemble learning of local subspaces (JW, KF), pp. 1–4.
ICPRICPR-2008-XiaoL #higher-order
Improvement on Mean Shift based tracking using second-order information (LX, PL), pp. 1–4.
ICPRICPR-2008-XiaoWH #graph #invariant #recognition
Object recognition using graph spectral invariants (XB, RCW, ERH), pp. 1–4.
ICPRICPR-2008-YamaguchiWNN #estimation #image #sequence
Road region estimation using a sequence of monocular images (KY, AW, TN, YN), pp. 1–4.
ICPRICPR-2008-YangB #algorithm #fault #sketching
Curve fitting algorithm using iterative error minimization for sketch beautification (JY, HB), pp. 1–4.
ICPRICPR-2008-YangQ #analysis #component #detection #independence #network
A network intrusion detection method using independent component analysis (DY, HQ), pp. 1–4.
ICPRICPR-2008-YangYWY #fuzzy #recognition
Face recognition using Complete Fuzzy LDA (WY, HY, JW, JY), pp. 1–4.
ICPRICPR-2008-YanZ #correlation #multimodal
Multimodal biometrics fusion using Correlation Filter Bank (YY, YJZ), pp. 1–4.
ICPRICPR-2008-YaoADTHM
Computer-aided grading of lymphangioleiomyomatosis (LAM) using HRCT (JY, NA, AD, AMTD, OMH, JM), pp. 1–4.
ICPRICPR-2008-YaoCAPKA #probability
Sensor planning for PTZ cameras using the probability of camera overload (YY, CHC, BRA, DLP, AK, MAA), pp. 1–5.
ICPRICPR-2008-YenCWWC #video
A scene-based video watermarking technique using SVMs (SHY, HWC, CJW, PSPW, MCC), pp. 1–4.
ICPRICPR-2008-YiAC #invariant #kernel
Orientation and scale invariant mean shift using object mask-based kernel (KMY, HSA, JYC), pp. 1–4.
ICPRICPR-2008-YingZ #detection #performance
Efficient detection of projected concentric circles using four intersection points on a secant line (XY, HZ), pp. 1–4.
ICPRICPR-2008-ZareG #detection #process
Endmember detection using the Dirichlet process (AZ, PDG), pp. 1–4.
ICPRICPR-2008-ZhangYDG #recognition
Handwritten Chinese character recognition using Local Discriminant Projection with Prior Information (HZ, JY, WD, JG), pp. 1–4.
ICPRICPR-2008-ZhaoG #multi #recognition
Establishing point correspondence using multidirectional binary pattern for face recognition (SZ, YG), pp. 1–4.
ICPRICPR-2008-ZhongYSCG #clustering
Hierarchical background subtraction using local pixel clustering (BZ, HY, SS, XC, WG), pp. 1–4.
ICPRICPR-2008-ZhouWS #classification #process #recognition
Human motion recognition using Gaussian Processes classification (HZ, LW, DS), pp. 1–4.
ICPRICPR-2008-ZhuangZHH #estimation #markov
Face age estimation using patch-based hidden Markov model supervectors (XZ, XZ, MHJ, TSH), pp. 1–4.
ICPRICPR-2008-ZitouniSOD #algorithm #graph #image #ranking #web
Re-ranking of web image search results using a graph algorithm (HZ, SGS, DO, PD), pp. 1–4.
KDDKDD-2008-CaroCS
Using tagflake for condensing navigable tag hierarchies from tag clouds (LDC, KSC, MLS), pp. 1069–1072.
KDDKDD-2008-ChowGS #detection #privacy
Detecting privacy leaks using corpus-based association rules (RC, PG, JS), pp. 893–901.
KDDKDD-2008-Christen #automation #classification #nearest neighbour
Automatic record linkage using seeded nearest neighbour and support vector machine classification (PC), pp. 151–159.
KDDKDD-2008-GallagherTEF #classification #network
Using ghost edges for classification in sparsely labeled networks (BG, HT, TER, CF), pp. 256–264.
KDDKDD-2008-GrossmanG #data mining #mining #performance
Data mining using high performance data clouds: experimental studies using sector and sphere (RLG, YG), pp. 920–927.
KDDKDD-2008-HallSM #dependence
Unsupervised deduplication using cross-field dependencies (RH, CAS, AM), pp. 310–317.
KDDKDD-2008-HoT #automation #multi
Automated cyclone discovery and tracking using knowledge sharing in multiple heterogeneous satellite data (SSH, AT), pp. 928–936.
KDDKDD-2008-KoenigsteinST #analysis #query #string
Spotting out emerging artists using geo-aware analysis of P2P query strings (NK, YS, TT), pp. 937–945.
KDDKDD-2008-LaxmanTW #generative #modelling #predict #sequence
Stream prediction using a generative model based on frequent episodes in event sequences (SL, VT, RWW), pp. 453–461.
KDDKDD-2008-MelvilleRL #modelling #web
Customer targeting models using actively-selected web content (PM, SR, RDL), pp. 946–953.
KDDKDD-2008-SarmaGI #query
Bypass rates: reducing query abandonment using negative inferences (ADS, SG, SI), pp. 177–185.
KDDKDD-2008-SatoYN #graph #information management #parametricity #semantics #word
Knowledge discovery of semantic relationships between words using nonparametric bayesian graph model (IS, MY, HN), pp. 587–595.
KDDKDD-2008-ShengPI #data mining #mining #multi #quality
Get another label? improving data quality and data mining using multiple, noisy labelers (VSS, FJP, PGI), pp. 614–622.
KDDKDD-2008-WangD #classification #kernel #semantics #wiki
Building semantic kernels for text classification using wikipedia (PW, CD), pp. 713–721.
KDDKDD-2008-YuJ #kernel
Training structural svms with kernels using sampled cuts (CNJY, TJ), pp. 794–802.
KDDKDD-2008-ZengMLBM #analysis #predict
Using predictive analysis to improve invoice-to-cash collection (SZ, PM, CAL, IMBM, CM), pp. 1043–1050.
KRKR-2008-DohertyS #reasoning
Reasoning with Qualitative Preferences and Cardinalities using Generalized Circumscription (PD, AS), pp. 560–570.
KRKR-2008-MotikGHS #graph #representation
Representing Structured Objects using Description Graphs (BM, BCG, IH, US), pp. 296–306.
RecSysRecSys-2008-BogersB #recommendation
Recommending scientific articles using citeulike (TB, AvdB), pp. 287–290.
RecSysRecSys-2008-KagieWG #difference
Choosing attribute weights for item dissimilarity using clikstream data with an application to a product catalog map (MK, MCvW, PJFG), pp. 195–202.
RecSysRecSys-2008-Kwon #rating #recommendation
Improving top-n recommendation techniques using rating variance (YK), pp. 307–310.
RecSysRecSys-2008-ShepitsenGMB #clustering #personalisation #recommendation #social
Personalized recommendation in social tagging systems using hierarchical clustering (AS, JG, BM, RDB), pp. 259–266.
RecSysRecSys-2008-ZanardiC #ranking #recommendation #social
Social ranking: uncovering relevant content using tag-based recommender systems (VZ, LC), pp. 51–58.
SEKESEKE-2008-AssawamekinSP #automation #multi #ontology #requirements #traceability
Automated Multiperspective Requirements Traceability Using Ontology Matching Technique (NA, TS, CP), pp. 460–465.
SEKESEKE-2008-BalushiSPCL #identification #ontology #quality
Identifying NFRs Conflicts Using Quality Ontology (THAB, PRFS, MP, ÓC, PL), pp. 929–934.
SEKESEKE-2008-Barros #information management #predict
Predicting Software Project Size Using Project Generated Information (MdOB), pp. 149–154.
SEKESEKE-2008-BrandlFW #modelling #reasoning #testing
Coverage-based Testing Using Qualitative Reasoning Models (HB, GF, FW), pp. 393–398.
SEKESEKE-2008-CuiSXM #architecture #design #reuse
A Decision-centric Architecture Design Method Facilitating the Contextually Capture and Reuse of Design Knowledge (XC, YS, SX, HM), pp. 321–326.
SEKESEKE-2008-DasguptaEFKSV #design #fault tolerance #grid #standard
Design of a Fault-tolerant Job-flow Manager for Grid Environments Using Standard Technologies, Job-flow Patterns, and a Transparent Proxy (GD, OE, LF, SK, SMS, BV), pp. 814–819.
SEKESEKE-2008-DuZR #concept analysis #release planning
Explaining Product Release Planning Results Using Concept Analysis (GD, TZ, GR), pp. 137–142.
SEKESEKE-2008-FilhoV #testing #web #web service #xml
Using XML Patterns to Guide Perturbation Based Testing of Web Services (PNCF, SRV), pp. 197–202.
SEKESEKE-2008-FraserWW #automaton #testing
Using Observer Automata to Select Test Cases for Test Purposes (GF, MW, FW), pp. 709–714.
SEKESEKE-2008-HittleG #fault #file system #injection #testing
Fault Injection Testing of User-space File Systems Using Traditional and Aspect-based Techniques (JH, SG), pp. 873–876.
SEKESEKE-2008-KimBBSA #behaviour #named #visualisation
VisRFID: Visualizing Customer Behavior in Geotemporal Space Using RFID Technology (BK, KB, MB, RS, BA), pp. 422–427.
SEKESEKE-2008-KornerG #automation #ontology
Improving Automatic Model Creation Using Ontologies (SJK, TG), pp. 691–696.
SEKESEKE-2008-LucasSM #classification #personalisation #recommendation #towards
Comparing the Use of Traditional and Associative Classifiers towards Personalized Recommendations (JPL, SS, MNMG), pp. 607–612.
SEKESEKE-2008-MahoneyE #monitoring
Using Scenario Monitoring to Address State Based Crosscutting Concerns (MM, TE), pp. 581–586.
SEKESEKE-2008-MarquesMNF #approach #interface #ontology #semantics #web #web service
Active Ontologies — an Approach for Using Ontologies as Semantic Web Services Interfaces (TCM, MGM, JCCN, PPMF), pp. 847–852.
SEKESEKE-2008-MuhlenfeldMMS #execution #modelling #ontology #process
Ontology-based Process Modeling and Execution Using STEP/EXPRESS (AM, WM, FM, MS), pp. 935–940.
SEKESEKE-2008-ParkK #automaton #bound #constraints #lts #model checking
Using Boolean Cardinality Constraint for LTS Bounded Model Checking (SP, GK), pp. 537–542.
SEKESEKE-2008-ReddyreddyX #xml
Securing Service-oriented Systems Using State-Based XML Firewall (AR, HX), pp. 512–518.
SEKESEKE-2008-TekbacakTD #approach #certification #data access #security #semantics
A Semantic Based Certification and Access Control Approach Using Security Patterns on SEAGENT (FT, TT, OD), pp. 741–744.
SEKESEKE-2008-ZhongYAF
Ontology-learning Supported Sematic Search Using Cooperative Agents (CZ, Z(Y, MA, BHF), pp. 123–128.
SIGIRSIGIR-2008-BalogRW #modelling #retrieval
Bloggers as experts: feed distillation using expert retrieval models (KB, MdR, WW), pp. 753–754.
SIGIRSIGIR-2008-Banerjee #classification #corpus #modelling #topic
Improving text classification accuracy using topic modeling over an additional corpus (SB), pp. 867–868.
SIGIRSIGIR-2008-BenderskyK #graph #ranking
Re-ranking search results using document-passage graphs (MB, OK), pp. 853–854.
SIGIRSIGIR-2008-BuscherDE #feedback #query
Query expansion using gaze-based feedback on the subdocument level (GB, AD, LvE), pp. 387–394.
SIGIRSIGIR-2008-DingLLP #clustering #probability
Posterior probabilistic clustering using NMF (CHQD, TL, DL, WP), pp. 831–832.
SIGIRSIGIR-2008-DruckMM #learning
Learning from labeled features using generalized expectation criteria (GD, GSM, AM), pp. 595–602.
SIGIRSIGIR-2008-Gan #approach #query
Using a mediated query approach for matching unstructured query with structured resources (KHG), p. 895.
SIGIRSIGIR-2008-GengLQALS #nearest neighbour #query #ranking
Query dependent ranking using K-nearest neighbor (XG, TYL, TQ, AA, HL, HYS), pp. 115–122.
SIGIRSIGIR-2008-GuanWCBW #crawling #effectiveness #estimation #online #topic
Guide focused crawler efficiently and effectively using on-line topical importance estimation (ZG, CW, CC, JB, JW), pp. 757–758.
SIGIRSIGIR-2008-HeMO #metric #retrieval
Retrieval sensitivity under training using different measures (BH, CM, IO), pp. 67–74.
SIGIRSIGIR-2008-HeMO08a #ranking
Ranking opinionated blog posts using OpinionFinder (BH, CM, IO), pp. 727–728.
SIGIRSIGIR-2008-JiangN #video #visual notation
Bag-of-visual-words expansion using visual relatedness for video indexing (YGJ, CWN), pp. 769–770.
SIGIRSIGIR-2008-JohoHJ #documentation #summary
Emulating query-biased summaries using document titles (HJ, DH, JMJ), pp. 709–710.
SIGIRSIGIR-2008-KapteinLHK #modelling #web
Using parsimonious language models on web data (RK, RL, DH, JK), pp. 763–764.
SIGIRSIGIR-2008-PengL #analysis #evolution #topic
Author-topic evolution analysis using three-way non-negative Paratucker (WP, TL), pp. 819–820.
SIGIRSIGIR-2008-TanWC #detection #sentiment
Combining learn-based and lexicon-based techniques for sentiment detection without using labeled examples (ST, YW, XC), pp. 743–744.
SIGIRSIGIR-2008-TrieschniggMRK #concept #modelling
Measuring concept relatedness using language models (DT, EM, MdR, WK), pp. 823–824.
SIGIRSIGIR-2008-VelosoAGM #learning #rank
Learning to rank at query-time using association rules (AV, HMdA, MAG, WMJ), pp. 267–274.
SIGIRSIGIR-2008-WangH #documentation #retrieval
Improving biomedical document retrieval using domain knowledge (SW, MH), pp. 785–786.
SIGIRSIGIR-2008-WanY #analysis #clustering #multi #summary
Multi-document summarization using cluster-based link analysis (XW, JY), pp. 299–306.
SIGIRSIGIR-2008-YuZXG #categorisation #design #learning
trNon-greedy active learning for text categorization using convex ansductive experimental design (KY, SZ, WX, YG), pp. 635–642.
BXBX-2008-Hidaka1 #bidirectional #graph transformation
Bidirectional Graph Transformation using UnCAL (SH), p. 43.
ECMFAECMDA-FA-2008-BercoviciFW #architecture
From Business Architecture to SOA Realization Using MDD (AB, FF, AJW), pp. 381–392.
ECMFAECMDA-FA-2008-NogueraD #domain model #framework #modelling #validation
Annotation Framework Validation Using Domain Models (CN, LD), pp. 48–62.
ICMTICMT-2008-VignagaPB #contract #interactive #model transformation
Extracting Object Interactions Out of Software Contracts Using Model Transformations (AV, DP, MCB), pp. 245–259.
MODELSMoDELS-2008-El-BoussaidiM #constraints #design #detection
Detecting Patterns of Poor Design Solutions Using Constraint Propagation (GEB, HM), pp. 189–203.
MODELSMoDELS-2008-OberCL #behaviour #composition #modelling #slicing
Behavioral Modelling and Composition of Object Slices Using Event Observation (IO, BC, YL), pp. 219–233.
MODELSMoDELS-2008-RosseboR #composition #policy #specification #uml
Specifying Service Composition Using UML 2.x and Composition Policies (JEYR, RKR), pp. 520–536.
MODELSMoDELS-2008-SinhaKPW #case study #modelling #requirements #validation
Requirements Modeling and Validation Using Bi-layer Use Case Descriptions (AS, MK, AMP, CW), pp. 97–112.
SPLCSPLC-2008-GustavssonA #embedded #flexibility #product line
Evaluating Flexibility in Embedded Automotive Product Lines Using Real Options (HG, JA), pp. 235–242.
SPLCSPLC-2008-HartmannT #diagrams #feature model #multi #product line #variability
Using Feature Diagrams with Context Variability to Model Multiple Product Lines for Software Supply Chains (HH, TT), pp. 12–21.
MODELSMoDELS-2008-El-BoussaidiM #constraints #design #detection
Detecting Patterns of Poor Design Solutions Using Constraint Propagation (GEB, HM), pp. 189–203.
MODELSMoDELS-2008-OberCL #behaviour #composition #modelling #slicing
Behavioral Modelling and Composition of Object Slices Using Event Observation (IO, BC, YL), pp. 219–233.
MODELSMoDELS-2008-RosseboR #composition #policy #specification #uml
Specifying Service Composition Using UML 2.x and Composition Policies (JEYR, RKR), pp. 520–536.
MODELSMoDELS-2008-SinhaKPW #case study #modelling #requirements #validation
Requirements Modeling and Validation Using Bi-layer Use Case Descriptions (AS, MK, AMP, CW), pp. 97–112.
TOOLSTOOLS-EUROPE-2008-CohenGM #program transformation
Guarded Program Transformations Using JTL (TC, JYG, IM), pp. 100–120.
AdaEuropeAdaEurope-2008-Evequoz #concurrent #performance #word
Practical, Fast and Simple Concurrent FIFO Queues Using Single Word Synchronization Primitives (CE), pp. 59–72.
PADLPADL-2008-Marpons-UceroMCHMF #automation #consistency #logic programming
Automatic Coding Rule Conformance Checking Using Logic Programming (GMU, JMC, MC, ÁHN, JJMN, LÅF), pp. 18–34.
PEPMPEPM-2008-GillenwaterMSZTGO #hardware #static typing
Synthesizable high level hardware descriptions: using statically typed two-level languages to guarantee verilog synthesizability (JG, GM, CS, AYZ, WT, JG, JO), pp. 41–50.
PEPMPEPM-2008-ZhuK #library
Specialization for applications using shared libraries (PZ, SCK), pp. 159–168.
PLDIPLDI-2008-ChughVJL #analysis #concurrent #data flow #detection #source code
Dataflow analysis for concurrent programs using datarace detection (RC, JWV, RJ, SL), pp. 316–326.
POPLPOPL-2008-LahiriQ #precise #smt #verification
Back to the future: revisiting precise program verification using SMT solvers (SKL, SQ), pp. 171–182.
PPDPPPDP-2008-MoralesCH #automaton #generative
Comparing tag scheme variations using an abstract machine generator (JFM, MC, MVH), pp. 32–43.
PPDPPPDP-2008-PlasmeijerJKA #ajax #declarative #evaluation #workflow
Declarative Ajax and client side evaluation of workflows using iTasks (RP, JMJ, PWMK, PA), pp. 56–66.
QAPLQAPL-2008-Smith #abstract interpretation #imperative #probability #source code
Probabilistic Abstract Interpretation of Imperative Programs using Truncated Normal Distributions (MJAS), pp. 43–59.
SASSAS-2008-AllamigeonGG #invariant
Inferring Min and Max Invariants Using Max-Plus Polyhedra (XA, SG, EG), pp. 189–204.
SASSAS-2008-LalR #data flow #multi #query
Solving Multiple Dataflow Queries Using WPDSs (AL, TWR), pp. 93–109.
SASSAS-2008-PrabhuS #analysis #array #java #pointer
Field Flow Sensitive Pointer and Escape Analysis for Java Using Heap Array SSA (PP, PS), pp. 110–127.
SASSAS-2008-RamanathanSGJ #protocol
Protocol Inference Using Static Path Profiles (MKR, KS, AG, SJ), pp. 78–92.
AdaSIGAda-2008-Moore #ada
A buffer container class hierarchy using Ada 2005 (BJM), pp. 57–74.
AdaSIGAda-2008-SwardW #architecture #enterprise #multi
A multi-language service-oriented architecture using an enterprise service bus (RES, KJW), pp. 85–90.
RERE-2008-Castro-HerreraDCM #data mining #elicitation #mining #process #recommendation #requirements #scalability
Using Data Mining and Recommender Systems to Facilitate Large-Scale, Open, and Inclusive Requirements Elicitation Processes (CCH, CD, JCH, BM), pp. 165–168.
RERE-2008-FeatherHMU #analysis #deployment #requirements
Guiding Technology Deployment Decisions using a Quantitative Requirements Analysis Technique (MSF, KAH, RMM, SU), pp. 271–276.
RERE-2008-MavinNWML #requirements
Using Scenarios to Discover Requirements for Engine Control Systems (AM, MN, PW, NAMM, PL), pp. 235–240.
RERE-2008-RifautD #assessment #framework #quality #requirements
Using Goal-Oriented Requirements Engineering for Improving the Quality of ISO/IEC 15504 based Compliance Assessment Frameworks (AR, ED), pp. 33–42.
RERE-2008-Szoke #automation #scheduling
A Proposed Method for Automated Project Scheduling using Goals and Scenarios (AS), pp. 339–340.
REFSQREFSQ-2008-SchlosserJM #database #requirements
Using a Creativity Workshop to Generate Requirements for an Event Database Application (CS, SJ, NAMM), pp. 109–122.
ASEASE-2008-AdnanGDZ #analysis #clustering #component #design #interface
Using Cluster Analysis to Improve the Design of Component Interfaces (RA, BG, AvD, JZ), pp. 383–386.
ASEASE-2008-AndreouP #estimation #fuzzy
Software Cost Estimation using Fuzzy Decision Trees (ASA, EP), pp. 371–374.
ASEASE-2008-BrichauKM #source code
Enforcing Structural Regularities in Source Code using IntensiVE (JB, AK, KM), pp. 471–472.
ASEASE-2008-CamachoM #automation #named
APPAREIL: A Tool for Building Automated Program Translators Using Annotated Grammars (DOC, KM), pp. 489–490.
ASEASE-2008-Hall #modelling #queue #realtime #specification #validation
Validating Real Time Specifications using Real Time Event Queue Modeling (RJH), pp. 79–88.
ASEASE-2008-KhalekELK #constraints #generative #relational #testing #theorem proving
Query-Aware Test Generation Using a Relational Constraint Solver (SAK, BE, YOL, SK), pp. 238–247.
ASEASE-2008-PortOM #requirements #simulation
Using Simulation to Investigate Requirements Prioritization Strategies (DP, AO, TM), pp. 268–277.
ASEASE-2008-RakamaricH #automation #axiom #static analysis
Automatic Inference of Frame Axioms Using Static Analysis (ZR, AJH), pp. 89–98.
ASEASE-2008-TurnerPKC #approach #automation #code generation #process #web
An Automated Test Code Generation Method for Web Applications using Activity Oriented Approach (DAT, MP, JK, JC), pp. 411–414.
FSEFSE-2008-DragertDR #concurrent #generative
Generation of concurrency control code using discrete-event systems theory (CD, JD, KR), pp. 146–157.
FSEFSE-2008-KoesnandarERHSS #metaprogramming #web
Using assertions to help end-user programmers create dependable web macros (AK, SGE, GR, LH, CS, KTS), pp. 124–134.
FSEFSE-2008-KulturTB #estimation #memory management #named #network
ENNA: software effort estimation using ensemble of neural networks with associative memory (YK, BT, ABB), pp. 330–338.
FSEFSE-2008-OsterweilCEPWBH #dataset #experience #process #workflow
Experience in using a process language to define scientific workflow and generate dataset provenance (LJO, LAC, AME, RMP, AEW, ERB, JLH), pp. 319–329.
FSEFSE-2008-YuWGB #composition #encoding #performance #summary #verification #web #web service
Modular verification of web services using efficient symbolic encoding and summarization (FY, CW, AG, TB), pp. 192–202.
ICSEICSE-2008-BunyakiatiFSC #standard #testing #uml
Using JULE to generate a compliance test suite for the UML standard (PB, AF, JS, CC), pp. 827–830.
ICSEICSE-2008-GannodBH #education #re-engineering
Using the inverted classroom to teach software engineering (GCG, JEB, MTH), pp. 777–786.
ICSEICSE-2008-SankaranarayananIG #induction #library #logic programming #mining #specification
Mining library specifications using inductive logic programming (SS, FI, AG), pp. 131–140.
ICSEICSE-2008-SicardBP #architecture #component #self
Using components for architecture-based management: the self-repair case (SS, FB, NDP), pp. 101–110.
ICSEICSE-2008-WangZXAS #approach #debugging #detection #execution #natural language
An approach to detecting duplicate bug reports using natural language and execution information (XW, LZ, TX, JA, JS), pp. 461–470.
ICSEICSE-2008-XuR #detection #java #memory management #precise #profiling
Precise memory leak detection for java software using container profiling (G(X, AR), pp. 151–160.
ICSEICSE-2008-YilmazPW #fault #locality
Time will tell: fault localization using time spectra (CY, AMP, CW), pp. 81–90.
ICSEICSE-2008-ZimmermannN #analysis #dependence #fault #graph #network #predict
Predicting defects using network analysis on dependency graphs (TZ, NN), pp. 531–540.
SACSAC-2008-AbedMS #analysis #graph #multi #proving #reachability #theorem proving
Reachability analysis using multiway decision graphs in the HOL theorem prover (SA, OAM, GAS), pp. 333–338.
SACSAC-2008-AbreuGZG #automation #fault #invariant #locality
Automatic software fault localization using generic program invariants (RA, AG, PZ, AJCvG), pp. 712–717.
SACSAC-2008-AgulhariSB
Compressing electrocardiogram signals using parameterized wavelets (CMA, RMRS, ISB), pp. 1348–1352.
SACSAC-2008-AhamedRH #architecture #distributed #identification #scalability
Secured tag identification using EDSA (enhanced distributed scalable architecture) (SIA, FR, MEH), pp. 1902–1907.
SACSAC-2008-AiresSM
Optical flow using color information: preliminary results (KRTA, AMS, AADM), pp. 1607–1611.
SACSAC-2008-AndresAN #experience #formal method #information management
Using formal methods to develop a complex information system: a practical/theoretical experience (CA, RGA, MN), pp. 848–849.
SACSAC-2008-AntonellisMT #clustering #documentation #named #summary #xml
XEdge: clustering homogeneous and heterogeneous XML documents using edge summaries (PA, CM, NT), pp. 1081–1088.
SACSAC-2008-AntonyBHP #approach #biology #interactive #mining #validation
Computational approach to biological validation of protein-protein interactions discovered using literature mining (AA, SB, SH, MJP), pp. 1302–1306.
SACSAC-2008-AraujoPFLO #distributed #named
FlagelLink: a decision support system for distributed flagellar data using data warehouse (FFA, ÂMAP, KMF, BFL, DMO), pp. 1268–1272.
SACSAC-2008-BadishiK #adaptation
Improving denial of service resistance using dynamic local adaptations (GB, IK), pp. 2212–2218.
SACSAC-2008-BraghettoFP #algebra #execution #process
Using process algebra to control the execution of business processes (KRB, JEF, CP), pp. 128–129.
SACSAC-2008-BroiniziFG #framework #requirements
Using annotations in the naked objects framework to explore data requirements (MEBB, JEF, AG), pp. 630–637.
SACSAC-2008-BuenoWJ #automation #generative #testing
Automatic test data generation using particle systems (PMSB, WEW, MJ), pp. 809–814.
SACSAC-2008-BussBSE #analysis #flexibility #graph #pointer
Flexible pointer analysis using assign-fetch graphs (MB, DB, VCS, SAE), pp. 234–239.
SACSAC-2008-CarvalhoLGS #identification #programming #search-based
Replica identification using genetic programming (MGdC, AHFL, MAG, ASdS), pp. 1801–1806.
SACSAC-2008-ChongKLG #energy #network
Using association rules for energy conservation in wireless sensor networks (SKC, SK, SWL, MMG), pp. 971–975.
SACSAC-2008-CorreaIZF #analysis #image #mobile
Medical image analysis using mobile devices (BC, EI, AZ, MF), pp. 1380–1384.
SACSAC-2008-Denner-Broser #algorithm #analysis #problem
An algorithm for the tracing problem using interval analysis (BDB), pp. 1832–1837.
SACSAC-2008-DingMH #approach #refinement #specification
An approach for specification construction using property-preserving refinement patterns (JD, LM, XH), pp. 797–803.
SACSAC-2008-FonsecaVM #data access #detection #online
Online detection of malicious data access using DBMS auditing (JF, MV, HM), pp. 1013–1020.
SACSAC-2008-GarciaH #analysis #functional #metric
Integrating functional metrics, COCOMO II and earned value analysis for software projects using PMBoK (CALG, CMH), pp. 820–825.
SACSAC-2008-GarciaT #security #semantics #web #web service
Web service security management using semantic web techniques (DZGG, MBFdT), pp. 2256–2260.
SACSAC-2008-HieronsJUY #adaptation #sequence
Using adaptive distinguishing sequences in checking sequence constructions (RMH, GVJ, HU, HY), pp. 682–687.
SACSAC-2008-KeyvanpourA #approach #image #interactive #retrieval #semantics
A new approach for interactive semantic image retrieval using the high level semantics (MK, SA), pp. 1175–1179.
SACSAC-2008-KuangZ #algorithm #detection
An anomaly intrusion detection method using the CSI-KNN algorithm (LK, MZ), pp. 921–926.
SACSAC-2008-LiG #detection #network #optimisation
TCM-KNN scheme for network anomaly detection using feature-based optimizations (YL, LG), pp. 2103–2109.
SACSAC-2008-LuizPBR #approach #mobile #programming #search-based
A new approach to control a population of mobile robots using genetic programming (AL, FP, GB, MR), pp. 1602–1606.
SACSAC-2008-MaagG #approach #protocol #self #testing
Interoperability testing of a MANET routing protocol using a node self-similarity approach (SM, CG), pp. 1908–1912.
SACSAC-2008-MatosBP #recognition
Face recognition using DCT coefficients selection (FMdSM, LVB, JvdP), pp. 1753–1757.
SACSAC-2008-MengleG #algorithm #ambiguity #classification #feature model
Using ambiguity measure feature selection algorithm for support vector machine classifier (SSRM, NG), pp. 916–920.
SACSAC-2008-MengleGP #category theory #classification
Discovering relationships among categories using misclassification information (SSRM, NG, AP), pp. 932–937.
SACSAC-2008-MorimotoO #metric #video
Eyelid measurements using digital video processing (CHM, TFdO), pp. 1369–1373.
SACSAC-2008-Nassiri #3d #e-commerce #trust
Increasing trust through the use of 3d e-commerce environment (NN), pp. 1463–1466.
SACSAC-2008-NecaskyP #concept #design #semantics #web #web service
Designing semantic web services using conceptual model (MN, JP), pp. 2243–2247.
SACSAC-2008-OsadaOKKK #diagrams #metric
Proposing metrics of difficulty of domain knowledge using usecase diagrams (AO, DO, NK, HK, KK), pp. 624–629.
SACSAC-2008-PavelecJBO #identification #independence
Author identification using writer-dependent and writer-independent strategies (DP, EJRJ, LVB, LSO), pp. 414–418.
SACSAC-2008-PereiraAGS #architecture #configuration management #hybrid
Using traditional loop unrolling to fit application on a new hybrid reconfigurable architecture (MMP, SRFdA, BCdO, ISS), pp. 1552–1553.
SACSAC-2008-RadtkeSW #algorithm #classification
Using the RRT algorithm to optimize classification systems for handwritten digits and letters (PVWR, RS, TW), pp. 1748–1752.
SACSAC-2008-ReynosoCGP #diagrams #metric #ocl #statechart #uml
Formal definition of measures for UML statechart diagrams using OCL (LR, JACL, MG, MP), pp. 846–847.
SACSAC-2008-RochaR #animation #evaluation
An evaluation of a collision handling system using sphere-trees for plausible rigid body animation (RdSR, MAFR), pp. 1241–1245.
SACSAC-2008-SchobelP #case study #clustering #cpu #kernel #research #scheduling
Kernel-mode scheduling server for CPU partitioning: a case study using the Windows research kernel (MS, AP), pp. 1700–1704.
SACSAC-2008-SuKZG #classification #collaboration #machine learning
Imputation-boosted collaborative filtering using machine learning classifiers (XS, TMK, XZ, RG), pp. 949–950.
SACSAC-2008-SungCM #clustering #concept #learning #lifecycle #ontology #performance #web
Efficient concept clustering for ontology learning using an event life cycle on the web (SS, SC, DM), pp. 2310–2314.
SACSAC-2008-TanWWC #detection #problem #semantics
Using unlabeled data to handle domain-transfer problem of semantic detection (ST, YW, GW, XC), pp. 896–903.
SACSAC-2008-TierneyJ #ontology #semantics
C-SAW---contextual semantic alignment of ontologies: using negative semantic reinforcement (BT, MJ), pp. 2346–2347.
SACSAC-2008-VictorPB
Context addressing using context-aware flooding (KV, JP, YB), pp. 1960–1961.
SACSAC-2008-Willassen #calculus
Using simplified event calculus in digital investigation (SYW), pp. 1438–1442.
SACSAC-2008-XuWQ #modelling #verification
Modeling and verifying BPEL using synchronized net (CX, HW, WQ), pp. 2358–2362.
SACSAC-2008-YuiMUK #distributed #named #parallel #xquery
XBird/D: distributed and parallel XQuery processing using remote proxy (MY, JM, SU, HK), pp. 1003–1007.
SACSAC-2008-ZhangMD #feature model #fuzzy #image #retrieval #set
Texture feature extraction and description using fuzzy set of main dominant directions of variable scales in content-based medical image retrieval (GZ, ZMM, LD), pp. 1760–1761.
SACSAC-2008-ZhuDXW #documentation #image #linear
Perspective rectification of camera-based document images using local linear structure (YZ, RD, BX, CW), pp. 451–452.
LDTALDTA-2007-AkessonEH08 #compilation #development #jastadd
Development of a Modelica Compiler Using JastAdd (, TE, GH), pp. 117–131.
LDTALDTA-2007-HameyG08 #domain-specific language #experience #implementation #stratego
Implementing a Domain-Specific Language Using Stratego/XT: An Experience Paper (LGCH, SG), pp. 37–51.
GPCEGPCE-2008-ApelKB #aspect-oriented #functional #refactoring
Program refactoring using functional aspects (SA, CK, DSB), pp. 161–170.
GPCEGPCE-2008-Batory #modelling
Using modern mathematics as an FOSD modeling language (DSB), pp. 35–44.
GPCEGPCE-2008-GottschlingL #c++ #compilation #concept #library #performance #reuse #robust #semantics
Integrating semantics and compilation: using c++ concepts to develop robust and efficient reusable libraries (PG, AL), pp. 67–76.
SLESLE-2008-LiangD #evaluation #model transformation #txl
A Practical Evaluation of Using TXL for Model Transformation (HL, JD), pp. 245–264.
SLESLE-2008-Nilsson-NymanEH #semiparsing
Practical Scope Recovery Using Bridge Parsing (ENN, TE, GH), pp. 95–113.
ASPLOSASPLOS-2008-GummarajuCTR #manycore #named #programming
Streamware: programming general-purpose multicore processors using streams (JG, JC, YT, MR), pp. 297–307.
CASECASE-2008-AddadA #algebra #architecture #evaluation #graph #modelling
Modeling and response time evaluation of ethernet-based control architectures using timed event graphs and Max-Plus algebra (BA, SA), pp. 418–423.
CASECASE-2008-Andoh #identification
Coulomb friction identification for mechatronic servo systems with limited strokes using two reference inputs (FA), pp. 265–272.
CASECASE-2008-ChoiJSKRKKSACC #automation #development #flexibility #framework #mobile #platform
Development of flexible laboratory automation platform using Mobile Agents in the clinical laboratory (BC, SMJ, SHS, JK, SR, MCK, JK, WHS, KTA, WC, HRC), pp. 918–923.
CASECASE-2008-DaiCL
Robot tracking using vision and laser sensors (WD, AC, PXL), pp. 169–174.
CASECASE-2008-HanX #identification #multi #network
Nonlinear systems identification using dynamic multi-time scales neural networks (XH, WFX), pp. 448–453.
CASECASE-2008-HooverMR #3d #detection #image #matrix
Pose detection of 3-D objects using images sampled on SO(3), spherical harmonics, and wigner-D matrices (RCH, AAM, RGR), pp. 47–52.
CASECASE-2008-HouZWCT #adaptation #approach #fuzzy #nondeterminism
Adaptive dynamic surface control of a class of uncertain nonlinear systems in pure-feedback form using fuzzy backstepping approach (ZGH, AMZ, FXW, LC, MT), pp. 821–826.
CASECASE-2008-LiuSXYLZF #agile #approach
Rapid robot/workcell calibration using line-based approach (YL, YS, NX, RY, XL, GZ, TAF), pp. 510–515.
CASECASE-2008-MitaniH #analysis #metric #symmetry
Analysis of contact between feeder surface and microparts based on measurements for microparts feeder using an asymmetric surface (AM, SH), pp. 720–725.
CASECASE-2008-MittalYBB #difference #equation #modelling #multi #performance #probability
Dynamics and performance modeling of multi-stage manufacturing systems using nonlinear stochastic differential equations (UM, HY, STSB, LGB), pp. 498–503.
CASECASE-2008-NagleW #named
GSP: Extending G-Code using JSP servlet technologies (SN, JW), pp. 953–958.
CASECASE-2008-PonnambalamPMS #network
Modified ART1 neural networks for cell formation using production data (SGP, RSP, SSM, SS), pp. 603–608.
CASECASE-2008-RohPSYC0LC #flexibility
Flexible docking mechanism using combination of magnetic force with error-compensation capability (SgR, JHP, YKS, KY, MC, HSK, HL, HRC), pp. 697–702.
CASECASE-2008-SharmaBDC #assembly #generative #optimisation #sequence
Generation of optimized robotic assembly sequence using ant colony optimization (SS, BBB, PD, BBC), pp. 894–899.
CASECASE-2008-SrivastavaVK #combinator
Procurement of global logistics services using combinatorial auctions (NKS, NV, SK), pp. 297–302.
CASECASE-2008-TamadazteDFF #automation #multi #visual notation
Automatic micromanipulation using multiscale visual servoing (BT, SD, GF, NLFP), pp. 977–982.
CASECASE-2008-UnverM #automation #composition #design pattern #throughput
Using architectural software patterns in support of controlling modular high throughput screening automation systems (HÖÜ, JM), pp. 912–917.
CASECASE-2008-XuDAG #3d #random
Motion planning for steerable needles in 3D environments with obstacles using rapidly-exploring Random Trees and backchaining (JX, VD, RA, KG), pp. 41–46.
CASECASE-2008-ZhuCS #markov #recognition
Human intention recognition in Smart Assisted Living Systems using a Hierarchical Hidden Markov Model (CZ, QC, WS), pp. 253–258.
CCCC-2008-ZhaoRARW #debugging #how #performance
How to Do a Million Watchpoints: Efficient Debugging Using Dynamic Instrumentation (QZ, RMR, SPA, LR, WFW), pp. 147–162.
DACDAC-2008-BharathES #algorithm #automation #search-based
Automatic package and board decoupling capacitor placement using genetic algorithms and M-FDM (KB, EE, MS), pp. 560–565.
DACDAC-2008-BrockmanLKKM #array #design #memory management #multi #programmable
Design of a mask-programmable memory/multiplier array using G4-FET technology (JBB, SL, PMK, AK, MMM), pp. 337–338.
DACDAC-2008-CookS #design #predict
Predictive design space exploration using genetically programmed response surfaces (HC, KS), pp. 960–965.
DACDAC-2008-CoskunRG #learning #multi #online
Temperature management in multiprocessor SoCs using online learning (AKC, TSR, KCG), pp. 890–893.
DACDAC-2008-DargaSM #performance #symmetry
Faster symmetry discovery using sparsity of symmetries (PTD, KAS, ILM), pp. 149–154.
DACDAC-2008-DasikaDFMB
DVFS in loop accelerators using BLADES (GSD, SD, KF, SAM, DMB), pp. 894–897.
DACDAC-2008-GaoKKLAM #estimation #hybrid #multi #performance #simulation
Multiprocessor performance estimation using hybrid simulation (LG, KK, SK, RL, GA, HM), pp. 325–330.
DACDAC-2008-GulatiK #fault #simulation #towards
Towards acceleration of fault simulation using graphics processing units (KG, SPK), pp. 822–827.
DACDAC-2008-JinC #benchmark #case study #metric #performance #simulation #statistics
Improve simulation efficiency using statistical benchmark subsetting: an ImplantBench case study (ZJ, ACC), pp. 970–973.
DACDAC-2008-JoshiCSBA #power management #reduction
Leakage power reduction using stress-enhanced layouts (VJ, BC, DS, DB, KA), pp. 912–917.
DACDAC-2008-Ng #challenge #modelling #verification
Challenges in using system-level models for RTL verification (KN), pp. 812–815.
DACDAC-2008-OzisikyilmazMC #design #machine learning #performance
Efficient system design space exploration using machine learning techniques (, GM, ANC), pp. 966–969.
DACDAC-2008-PaulB #configuration management #memory management #performance #resource management
Reconfigurable computing using content addressable memory for improved performance and resource usage (SP, SB), pp. 786–791.
DACDAC-2008-SauerGL #framework #functional #modelling #named #performance
SystemClick: a domain-specific framework for early exploration using functional performance models (CS, MG, HPL), pp. 480–485.
DACDAC-2008-TamPB #analysis #automation #layout #locality #precise
Precise failure localization using automated layout analysis of diagnosis candidates (WCT, OP, RD(B), pp. 367–372.
DACDAC-2008-YuB #fault #multi
Multiple defect diagnosis using no assumptions on failing pattern characteristics (XY, RD(B), pp. 361–366.
DACDAC-2008-ZhangYZDKDKC #optimisation #power management
Low power passive equalizer optimization using tritonic step response (LZ, WY, HZ, AD, GAK, DMD, ESK, CKC), pp. 570–573.
DATEDATE-2008-BadarogluDLC
Calibration of Integrated CMOS Hall Sensors Using Coil-on-Chip in ATE Environment (MB, GD, FL, OC), pp. 873–878.
DATEDATE-2008-BrisolaraORLCW #code generation #uml
Using UML as Front-end for Heterogeneous Software Code Generation Strategies (LBdB, MFdSO, RMR, LCL, LC, FRW), pp. 504–509.
DATEDATE-2008-ChoiC #testing
Digital bit stream jitter testing using jitter expansion (HWC, AC), pp. 1468–1473.
DATEDATE-2008-CopeCL #configuration management #gpu #logic #memory management
Using Reconfigurable Logic to Optimise GPU Memory Accesses (BC, PYKC, WL), pp. 44–49.
DATEDATE-2008-CorderoK
Clock Distribution Scheme using Coplanar Transmission Lines (VHCC, SPK), pp. 985–990.
DATEDATE-2008-FarahaniFS #architecture #network #scalability
Scalable Architecture for on-Chip Neural Network Training using Swarm Intelligence (AFF, SMF, SS), pp. 1340–1345.
DATEDATE-2008-FeinsteinTM #detection #equivalence #logic
Partially Redundant Logic Detection Using Symbolic Equivalence Checking in Reversible and Irreversible Logic Circuits (DYF, MAT, DMM), pp. 1378–1381.
DATEDATE-2008-GhoshNR #adaptation #fault tolerance #novel
A Novel Low Overhead Fault Tolerant Kogge-Stone Adder Using Adaptive Clocking (SG, PN, KR), pp. 366–371.
DATEDATE-2008-KazmierskiZA #approximate #mobile #modelling #performance
Efficient circuit-level modelling of ballistic CNT using piecewise non-linear approximation of mobile charge density (TJK, DZ, BMAH), pp. 146–151.
DATEDATE-2008-LiMM #concurrent #named #self
CASP: Concurrent Autonomous Chip Self-Test Using Stored Test Patterns (YL, SM, SM), pp. 885–890.
DATEDATE-2008-Marques-SilvaP #algorithm #satisfiability
Algorithms for Maximum Satisfiability using Unsatisfiable Cores (JMS, JP), pp. 408–413.
DATEDATE-2008-MuraliMAGBBM #manycore #optimisation #platform
Temperature Control of High-Performance Multi-core Platforms Using Convex Optimization (SM, AM, DA, RG, SPB, LB, GDM), pp. 110–115.
DATEDATE-2008-NagpalGK #approach #design
A Delay-efficient Radiation-hard Digital Design Approach Using CWSP Elements (CN, RG, SPK), pp. 354–359.
DATEDATE-2008-PakbazniaP
Coarse-Grain MTCMOS Sleep Transistor Sizing Using Delay Budgeting (EP, MP), pp. 385–390.
DATEDATE-2008-ParkSP #embedded #execution
Hiding Cache Miss Penalty Using Priority-based Execution for Embedded Processors (SP, AS, YP), pp. 1190–1195.
DATEDATE-2008-PlazaMB #constraints #generative #random
Random Stimulus Generation using Entropy and XOR Constraints (SP, ILM, VB), pp. 664–669.
DATEDATE-2008-PradhanV #performance #synthesis
Fast Analog Circuit Synthesis Using Sensitivity Based Near Neighbor Searches (AP, RV), pp. 523–526.
DATEDATE-2008-SchirnerD #modelling #scheduling
Introducing Preemptive Scheduling in Abstract RTOS Models using Result Oriented Modeling (GS, RD), pp. 122–127.
DATEDATE-2008-SteinhorstH #model checking #specification
Model Checking of Analog Systems using an Analog Specification Language (SS, LH), pp. 324–329.
DATEDATE-2008-TanQ #framework #markov #power management #probability
A Framework of Stochastic Power Management Using Hidden Markov Model (YT, QQ), pp. 92–97.
DATEDATE-2008-ThoguluvaRC #architecture #performance #programmable #security
Efficient Software Architecture for IPSec Acceleration Using a Programmable Security Processor (JT, AR, STC), pp. 1148–1153.
DATEDATE-2008-VillarJGK #specification
Heterogeneous System-level Specification Using SystemC (EV, AJ, CG, TK).
DATEDATE-2008-YonedaF #functional #reuse
Wrapper and TAM Co-Optimization for Reuse of SoC Functional Interconnects (TY, HF), pp. 1366–1369.
DATEDATE-2008-YuanHX
Re-Examining the Use of Network-on-Chip as Test Access Mechanism (FY, LH, QX), pp. 808–811.
DATEDATE-2008-ZhangHXL #fault #manycore
Defect Tolerance in Homogeneous Manycore Processors Using Core-Level Redundancy with Unified Topology (LZ, YH, QX, XL), pp. 891–896.
DATEDATE-2008-ZhouPB #analysis #generative #metric #modelling
Harvesting Wasted Heat in a Microprocessor Using Thermoelectric Generators: Modeling, Analysis and Measurement (YZ, SP, SB), pp. 98–103.
HPCAHPCA-2008-ChenMP #constraints #graph #memory management #runtime #validation
Runtime validation of memory ordering using constraint graph checking (KC, SM, PP), pp. 415–426.
HPCAHPCA-2008-ChungDKK #memory management #thread #transaction
Thread-safe dynamic binary translation using transactional memory (JC, MD, HK, CK), pp. 279–289.
HPCAHPCA-2008-KimGWB #analysis #performance
System level analysis of fast, per-core DVFS using on-chip switching regulators (WK, MSG, GYW, DMB), pp. 123–134.
HPCAHPCA-2008-LeeKMP #predict
Performance-aware speculation control using wrong path usefulness prediction (CJL, HK, OM, YNP), pp. 39–49.
HPDCHPDC-2008-CarreraSWTA
Managing SLAs of heterogeneous workloads using dynamic application placement (DC, MS, IW, JT, EA), pp. 217–218.
HPDCHPDC-2008-KhannaCKSSKF #data transfer #multi #network #optimisation
Multi-hop path splitting and multi-pathing optimizations for data transfers over shared wide-area networks using gridFTP (GK, ÜVÇ, TMK, PS, JHS, RK, ITF), pp. 225–226.
HPDCHPDC-2008-ManosMKCKT #distributed #performance
Distributed mpi cross-site run performance using mpig (SM, MDM, OK, PVC, NTK, BRT), pp. 229–230.
HPDCHPDC-2008-ShiPRJJ #adaptation #fault tolerance #grid #named #safety
Dynasa: adapting grid applications to safety using fault-tolerant methods (XS, JLP, ER, HJ, HJ), pp. 237–238.
HPDCHPDC-2008-SotomayorKF #execution #virtual machine
Combining batch execution and leasing using virtual machines (BS, KK, ITF), pp. 87–96.
LCTESLCTES-2008-EbnerBSKWK
Generalized instruction selection using SSA-graphs (DE, FB, BS, AK, PW, AK), pp. 31–40.
OSDIOSDI-2008-BansalA
Binary Translation Using Peephole Superoptimizers (SB, AA), pp. 177–192.
OSDIOSDI-2008-YuIFBEGC #distributed #named
DryadLINQ: A System for General-Purpose Distributed Data-Parallel Computing Using a High-Level Language (YY, MI, DF, MB, ÚE, PKG, JC), pp. 1–14.
OSDIOSDI-2008-ZeldovichKDK #hardware #memory management #policy #security
Hardware Enforcement of Application Security Policies Using Tagged Memory (NZ, HK, MD, CK), pp. 225–240.
PDPPDP-2008-BerbecaruA #performance
An Optimized Double Cache Technique for Efficient Use of Forward-secure Signature Schemes (DB, LA), pp. 581–589.
PDPPDP-2008-ColmenarMGLH #modelling #probability
Modelling Asynchronous Systems using Probability Distribution Functions (JMC, NM, OG, JL, JIH), pp. 3–11.
PDPPDP-2008-GoswamiG #contract
Resource Selection in Grids Using Contract Net (KG, AG), pp. 105–109.
PDPPDP-2008-KecskemetiKTKD #automation #deployment
Automatic Service Deployment Using Virtualisation (GK, PK, GT, TK, TD), pp. 628–635.
PDPPDP-2008-KrenekPKFSDSWM #analysis #multi #simulation
Multiple Ligand Trajectory Docking Study — Semiautomatic Analysis of Molecular Dynamics Simulations using EGEE gLite Services (AK, MP, JK, JF, ZS, FD, JS, JW, LM), pp. 447–454.
PDPPDP-2008-LouatiZ #network
Personal Overlay Networks Management Using a P2P-based Publish/Subscribe Naming System (WL, DZ), pp. 95–99.
PDPPDP-2008-MerzPW #coordination #distributed #framework #network #simulation
A Simulation Framework for Distributed Super-Peer Topology Construction Using Network Coordinates (PM, MP, SW), pp. 491–498.
PDPPDP-2008-TaillardGD #approach #framework #performance #visual notation
A Graphical Framework for High Performance Computing Using An MDE Approach (JT, FG, JLD), pp. 165–173.
PPoPPPPoPP-2008-AnsariKJLKW #adaptation #algorithm #case study #concurrent #experience #memory management #transaction
Experiences using adaptive concurrency in transactional memory with Lee’s routing algorithm (MA, CK, KJ, ML, CCK, IW), pp. 261–262.
PPoPPPPoPP-2008-ChengCHT #classification #manycore #platform #scalability
Scalable packet classification using interpreting: a cross-platform multi-core solution (HC, ZC, BH, XT), pp. 33–42.
PPoPPPPoPP-2008-LevM #hardware #memory management #transaction
Split hardware transactions: true nesting of transactions using best-effort hardware transactional memory (YL, JWM), pp. 197–206.
PPoPPPPoPP-2008-PraunBC #analysis #concurrent #dependence #modelling
Modeling optimistic concurrency using quantitative dependence analysis (CvP, RB, CC), pp. 185–196.
PPoPPPPoPP-2008-RyooRBSKH #evaluation #gpu #optimisation #parallel #performance #thread
Optimization principles and application performance evaluation of a multithreaded GPU using CUDA (SR, CIR, SSB, SSS, DBK, WmWH), pp. 73–82.
FASEFASE-2008-AlrajehRU #behaviour #modelling
Deriving Non-zeno Behavior Models from Goal Models Using ILP (DA, AR, SU), pp. 1–15.
FASEFASE-2008-BergJR #similarity #state machine #testing
Regular Inference for State Machines Using Domains with Equality Tests (TB, BJ, HR), pp. 317–331.
FASEFASE-2008-JurjensSY #analysis #automation #security
Automated Analysis of Permission-Based Security Using UMLsec (JJ, JS, YY), pp. 292–295.
FoSSaCSFoSSaCS-2008-GruberJ #bound #communication #complexity #regular expression
Optimal Lower Bounds on Regular Expression Size Using Communication Complexity (HG, JJ), pp. 273–286.
STOCSTOC-2008-Ben-AroyaT #combinator #graph
A combinatorial construction of almost-ramanujan graphs using the zig-zag product (ABA, ATS), pp. 325–334.
STOCSTOC-2008-DeKSS #composition #integer #multi #performance
Fast integer multiplication using modular arithmetic (AD, PPK, CS, RS), pp. 499–506.
TACASTACAS-2008-ChocklerGY #automation #performance #refinement
Efficient Automatic STE Refinement Using Responsibility (HC, OG, AY), pp. 233–248.
TACASTACAS-2008-McMillan #generative #invariant #proving #quantifier
Quantified Invariant Generation Using an Interpolating Saturation Prover (KLM), pp. 413–427.
TACASTACAS-2008-SankaranarayananDI #hybrid #model checking
Symbolic Model Checking of Hybrid Systems Using Template Polyhedra (SS, TD, FI), pp. 188–202.
CAVCAV-2008-KashyapG
Producing Short Counterexamples Using “Crucial Events” (SK, VKG), pp. 491–503.
CAVCAV-2008-KingS #congruence #equation #satisfiability
Inferring Congruence Equations Using SAT (AK, HS), pp. 281–293.
CSLCSL-2008-Nguyen #proving
Proving Infinitude of Prime Numbers Using Binomial Coefficients (PN), pp. 184–198.
ICLPICLP-2008-AlpuenteEI #dependence #termination
Termination of Narrowing Using Dependency Pairs (MA, SE, JI), pp. 317–331.
ICLPICLP-2008-AnhRD #implementation
An Implementation of Extended P-Log Using XASP (HTA, CDPKR, CVD), pp. 739–743.
ICLPICLP-2008-Baral #information management #programming #reasoning #representation #set
Using Answer Set Programming for Knowledge Representation and Reasoning: Future Directions (CB), pp. 69–70.
ICLPICLP-2008-BeniniBM #constraints #multi #platform #policy #programming #resource management
Resource Management Policy Handling Multiple Use-Cases in MPSoC Platforms Using Constraint Programming (LB, DB, MM), pp. 470–484.
ICLPICLP-2008-CliffeVBP #animation #declarative #named #programming #set #visualisation
ASPVIZ: Declarative Visualisation and Animation Using Answer Set Programming (OC, MDV, MB, JAP), pp. 724–728.
ICLPICLP-2008-EglyGW #framework #implementation #named #programming
ASPARTIX: Implementing Argumentation Frameworks Using Answer-Set Programming (UE, SAG, SW), pp. 734–738.
ICLPICLP-2008-MontaliTACGLM #declarative #logic programming #specification #verification
Verification from Declarative Specifications Using Logic Programming (MM, PT, MA, FC, MG, EL, PM), pp. 440–454.
ICLPICLP-2008-MuggletonST #bias #declarative #logic programming #named
TopLog: ILP Using a Logic Program Declarative Bias (SM, JCAS, ATN), pp. 687–692.
ICLPICLP-2008-Santos #bias #declarative #logic programming #named
TopLog: ILP Using a Logic Program Declarative Bias (JCAS), pp. 818–819.
ICLPICLP-2008-Tsitovich #detection #model checking #security
Detection of Security Vulnerabilities Using Guided Model Checking (AT), pp. 822–823.
ICSTICST-2008-HaslingGB #case study #modelling #requirements #testing #uml
Model Based Testing of System Requirements using UML Use Case Models (BH, HG, KB), pp. 367–376.
ICSTICST-2008-McQuillanP #alloy #analysis #metamodelling #metric #object-oriented
A Metamodel for the Measurement of Object-Oriented Systems: An Analysis using Alloy (JAM, JFP), pp. 288–297.
ICSTICST-2008-RingsNG #grid #testing #workflow
Testing Grid Application Workflows Using TTCN-3 (TR, HN, JG), pp. 210–219.
ICSTICST-2008-SherriffW #composition #empirical #impact analysis
Empirical Software Change Impact Analysis using Singular Value Decomposition (MS, LW), pp. 268–277.
ICSTICST-2008-WareWS #metric #predict
The Use of Intra-Release Product Measures in Predicting Release Readiness (MPW, FGW, MS), pp. 230–237.
IJCARIJCAR-2008-MouraB #effectiveness #logic #set
Deciding Effectively Propositional Logic Using DPLL and Substitution Sets (LMdM, NB), pp. 410–425.
ISSTAISSTA-2008-BoddenH #aspectj #concurrent #detection #effectiveness #named
Racer: effective race detection using aspectj (EB, KH), pp. 155–166.
ISSTAISSTA-2008-DoR #analysis #modelling #testing
Using sensitivity analysis to create simplified economic models for regression testing (HD, GR), pp. 51–62.
ISSTAISSTA-2008-JeffreyGG #fault #locality
Fault localization using value replacement (DJ, NG, RG), pp. 167–178.
LICSLICS-2008-Burel #deduction #first-order #representation #type system
A First-Order Representation of Pure Type Systems Using Superdeduction (GB), pp. 253–263.
MBTMBT-2008-Jurjens #case study #modelling #security #testing
Model-based Security Testing Using UMLsec: A Case Study (JJ), pp. 93–104.
ICSTSAT-2008-EibachPV #satisfiability
Attacking Bivium Using SAT Solvers (TE, EP, GV), pp. 63–76.
ICSTSAT-2008-KottlerKS08a #bound #np-hard #satisfiability #subclass
A New Bound for an NP-Hard Subclass of 3-SAT Using Backdoors (SK, MK, CS), pp. 161–167.
FATESTestCom-FATES-2008-DangN #generative #hybrid #testing
Using Disparity to Enhance Test Generation for Hybrid Systems (TD, TN), pp. 54–69.
CBSECBSE-2007-FornasierWG #component #composition #named #programming #runtime
Soya: A Programming Model and Runtime Environment for Component Composition Using SSDL (PF, JW, IG), pp. 227–241.
ECSAECSA-2007-FuentesGPV #architecture
Using Connectors to Model Crosscutting Influences in Software Architectures (LF, NG, MP, JAV), pp. 292–295.
ECSAECSA-2007-OrtizPAAS #approach #architecture #case study #component #experience #framework
Experiences Using a Component-Oriented Architectural Framework for Robots and Its Improvement with a MDE Approach (FJO, JAP, DA, , PS), pp. 335–338.
QoSAQoSA-2007-PaceC #architecture #design #quality
Using Planning Techniques to Assist Quality-Driven Architectural Design Exploration (JADP, MRC), pp. 33–52.
WICSAWICSA-2007-RossoM #approach #architecture #knowledge-based #scalability
Assessing the Architectonics of Large, Software-Intensive Systems Using a Knowledge-Based Approach (CDR, AM), p. 2.
DocEngDocEng-2007-Storey #documentation #folksonomy #navigation #ontology #taxonomy
Navigating documents using ontologies, taxonomies and folksonomies (MADS), p. 2.
DRRDRR-2007-KimLT #documentation #identification #online
Identification of comment-on sentences in online biomedical documents using support vector machines (ICK, DXL, GRT).
DRRDRR-2007-Likforman-SulemS #network #recognition
Recognition of degraded handwritten digits using dynamic Bayesian networks (LLS, MS).
DRRDRR-2007-ShettySBS #documentation #random #segmentation
Segmentation and labeling of documents using conditional random fields (SS, HS, MJB, SNS).
TPDLECDL-2007-ChenWL #image
Using Watermarks and Offline DRM to Protect Digital Images in DIAS (HYC, HAW, CLL), pp. 529–531.
TPDLECDL-2007-GortonFF #framework #generative #library #specification
Specification and Generation of Digital Libraries into DSpace Using the 5S Framework (DG, WF, EAF), pp. 567–569.
TPDLECDL-2007-ImaiKS #library #mobile
Retrieving Tsunami Digital Library by Use of Mobile Phones (SI, YK, NS), pp. 525–528.
TPDLECDL-2007-KongL #logic #multi #xml
Using XML Logical Structure to Retrieve (Multimedia) Objects (ZK, ML), pp. 100–111.
TPDLECDL-2007-Martinez-PrietoFVA #logic #xml
Electronic Work : Building Dynamic Services over Logical Structure Using Aqueducts for XML Processing (MAMP, PdlF, JV, JA), pp. 445–448.
TPDLECDL-2007-Shiri #interface #library #metadata #visual notation
The Use of Metadata in Visual Interfaces to Digital Libraries (AS), pp. 489–494.
HTHT-2007-ChinC #hypermedia #identification #social
Identifying subcommunities using cohesive subgroups in social hypertext (AC, MHC), pp. 175–178.
HTHT-2007-FigueiraL #interactive #learning #visualisation
Interaction visualization in web-based learning using igraphs (ÁRF, JBL), pp. 45–46.
HTHT-2007-LeblancA #learning
Using forum in an organizational learning context (AL, MHA), pp. 41–42.
HTHT-2007-MasonT #case study #network #social
Tags, networks, narrative: exploring the use of social software for the study of narrative in digital contexts (BLM, ST), pp. 39–40.
HTHT-2007-SinclairML #wiki
Dynamic link service 2.0: using wikipedia as a linkbase (PASS, KM, PHL), pp. 161–162.
ICDARICDAR-2007-BernardAH #random #recognition
Using Random Forests for Handwritten Digit Recognition (SB, SA, LH), pp. 1043–1047.
ICDARICDAR-2007-BhardwajSSS #on the #verification
On the Use of Lexeme Features for Writer Verification (AB, AS, HS, SNS), pp. 1088–1092.
ICDARICDAR-2007-BrinkSB #identification #towards #verification
Towards Explainable Writer Verification and Identification Using Vantage Writers (AB, LS, MB), pp. 824–828.
ICDARICDAR-2007-ChouGC #classification #multi #recognition
Recognition of Fragmented Characters Using Multiple Feature-Subset Classifiers (CHC, CYG, FC), pp. 198–202.
ICDARICDAR-2007-CostagliolaDR #diagrams #grammarware #sketching
Using Grammar-Based Recognizers for Symbol Completion in Diagrammatic Sketches (GC, VD, MR), pp. 1078–1082.
ICDARICDAR-2007-DasariB #identification
Identification of Non-Black Inks Using HSV Colour Space (HD, CB), pp. 486–490.
ICDARICDAR-2007-FinkP #modelling #on the #recognition
On the Use of Context-Dependent Modeling Units for HMM-Based Offline Handwriting Recognition (GAF, TP), pp. 729–733.
ICDARICDAR-2007-FujimotoSTSN #documentation #image #parallel #programming
Curved paper rectification for digital camera document images by shape from parallel geodesics using continuous dynamic programming (KF, JS, HT, MS, SN), pp. 267–271.
ICDARICDAR-2007-Furmaniak #segmentation
Unsupervised Newspaper Segmentation Using Language Context (RF), pp. 1263–1267.
ICDARICDAR-2007-GaoWHD #documentation #image #integer #linear #programming
Decompose Document Image Using Integer Linear Programming (DG, YW, HH, MD), pp. 397–401.
ICDARICDAR-2007-GazzahA #analysis #identification
Arabic Handwriting Texture Analysis for Writer Identification Using the DWT-Lifting Scheme (SG, NEBA), pp. 1133–1137.
ICDARICDAR-2007-HamamuraAI #algorithm #probability #recognition #word
An Analytic Word Recognition Algorithm Using a Posteriori Probability (TH, TA, BI), pp. 669–673.
ICDARICDAR-2007-HirayamaNK #classification #difference
A Classifier of Similar Characters using Compound Mahalanobis Function based on Difference Subspace (JH, HN, NK), pp. 432–436.
ICDARICDAR-2007-HuangLM #string
Cryptogram Decoding for OCR Using Numerization Strings (GBH, EGLM, AM), pp. 208–212.
ICDARICDAR-2007-HuangSHFN #approach #difference #recognition
An SVM-Based High-accurate Recognition Approach for Handwritten Numerals by Using Difference Features (KH, JS, YH, KF, SN), pp. 589–593.
ICDARICDAR-2007-HummIH #modelling #statistics #verification
Spoken Handwriting Verification Using Statistical Models (AH, RI, JH), pp. 999–1003.
ICDARICDAR-2007-ImdadBERE #identification
Writer Identification Using Steered Hermite Features and SVM (AI, SB, VE, CRM, HE), pp. 839–843.
ICDARICDAR-2007-JinZ #synthesis
Synthesis of Chinese Character Using Affine Transformation (LJ, XZ), pp. 218–222.
ICDARICDAR-2007-KeshariW #hybrid #recognition
Hybrid Mathematical Symbol Recognition Using Support Vector Machines (BK, SMW), pp. 859–863.
ICDARICDAR-2007-KramerKKB #finite #metadata #probability #transducer
Bibliographic Meta-Data Extraction Using Probabilistic Finite State Transducers (MK, HK, DK, TMB), pp. 609–613.
ICDARICDAR-2007-KunduHHPG #recognition
Arabic Handwriting Recognition Using Variable Duration HMM (AK, TH, BH, JP, LVG), pp. 644–648.
ICDARICDAR-2007-Likforman-SulemS #network #recognition
Recognition of Broken Characters from Historical Printed Books Using Dynamic Bayesian Networks (LLS, MS), pp. 173–177.
ICDARICDAR-2007-LiwickiIB #detection #online #programming
On-Line Handwritten Text Line Detection Using Dynamic Programming (ML, EI, HB), pp. 447–451.
ICDARICDAR-2007-LouloudisGH #approach #detection #documentation
Text Line Detection in Unconstrained Handwritten Documents Using a Block-Based Hough Transform Approach (GL, BG, CH), pp. 599–603.
ICDARICDAR-2007-LuthyVB #markov #modelling #segmentation
Using Hidden Markov Models as a Tool for Handwritten Text Line Segmentation (FL, TV, HB), p. 8–?.
ICDARICDAR-2007-NamboodiriNJ #on the
On Using Classical Poetry Structure for Indian Language Post-Processing (AMN, PJN, CVJ), pp. 1238–1242.
ICDARICDAR-2007-NguyenBML #classification #verification
Off-line Signature Verification Using Enhanced Modified Direction Features in Conjunction with Neural Classifiers and Support Vector Machines (VN, MB, VM, GL), pp. 734–738.
ICDARICDAR-2007-NicolasDPH #2d #documentation #image #random #segmentation
Document Image Segmentation Using a 2D Conditional Random Field Model (SN, JD, TP, LH), pp. 407–411.
ICDARICDAR-2007-PanBS #segmentation
Text Segmentation from Complex Background Using Sparse Representations (WP, TDB, CYS), pp. 412–416.
ICDARICDAR-2007-PrasanthBSRM #online
Elastic Matching of Online Handwritten Tamil and Telugu Scripts Using Local Features (LP, VB, RS, GVR, DM), pp. 1028–1032.
ICDARICDAR-2007-PrusaH #2d #recognition
Mathematical Formulae Recognition Using 2D Grammars (DP, VH), pp. 849–853.
ICDARICDAR-2007-QuiniouA #detection #fault #network #online #recognition
Use of a Confusion Network to Detect and Correct Errors in an On-Line Handwritten Sentence Recognition System (SQ, ÉA), pp. 382–386.
ICDARICDAR-2007-RinglstetterRGS #fault
Deriving Symbol Dependent Edit Weights for Text Correction_The Use of Error Dictionaries (CR, UR, AG, KUS), pp. 639–643.
ICDARICDAR-2007-SekiFNSM #analysis #documentation #information management
Information Management System Using Structure Analysis of Paper/Electronic Documents and Its Applications (MS, MF, TN, HS, KM), pp. 689–693.
ICDARICDAR-2007-ShettySS #random #recognition #word
Handwritten Word Recognition Using Conditional Random Fields (SS, HS, SNS), pp. 1098–1102.
ICDARICDAR-2007-TanakaG
Autonomous Text Capturing Robot Using Improved DCT Feature and Text Tracking (MT, HG), pp. 1178–1182.
ICDARICDAR-2007-TonouchiK #mobile #online #recognition
Text Input System Using Online Overlapped Handwriting Recognition for Mobile Devices (YT, AK), pp. 754–758.
ICDARICDAR-2007-ToujAA #segmentation
Two Approaches for Arabic Script Recognition-Based Segmentation Using the Hough Transform (ST, NEBA, HA), pp. 654–658.
ICDARICDAR-2007-WendlingR #recognition
Symbol Recognition Using a 2-class Hierarchical Model of Choquet Integrals (LW, JR), pp. 634–638.
ICDARICDAR-2007-WickRL #fault #modelling #topic
Context-Sensitive Error Correction: Using Topic Models to Improve OCR (MLW, MGR, EGLM), pp. 1168–1172.
ICDARICDAR-2007-YangJ #kernel #recognition
Handwritten Chinese Character Recognition Using Modified LDA and Kernel FDA (DY, LJ), pp. 914–918.
ICDARICDAR-2007-YangJZH #recognition
Finger-Written Chinese Characters Recognition Using Hierarchical LDA (DY, LJ, LXZ, JCH), pp. 322–326.
ICDARICDAR-2007-ZhangYT #documentation #image
Removing Shading Distortions in Camera-based Document Images Using Inpainting and Surface Fitting With Radial Basis Functions (LZ, AMY, CLT), pp. 984–988.
ICDARICDAR-2007-ZiaratbanFE
Use of Legal Amount to Confirm or Correct the Courtesy Amount on Farsi Bank Checks (MZ, KF, ME), pp. 1123–1127.
ICDARICDAR-2007-ZiaratbanFF #feature model #recognition
Language-Based Feature Extraction Using Template-Matching In Farsi/Arabic Handwritten Numeral Recognition (MZ, KF, FF), pp. 297–301.
JCDLJCDL-2007-AbbasiC #analysis #categorisation #communication #visualisation
Categorization and analysis of text in computer mediated communication archives using visualization (AA, HC), pp. 11–18.
JCDLJCDL-2007-BorgmanWMP #architecture #embedded #library #network
Drowning in data: digital library architecture to support scientific use of embedded sensor networks (CLB, JCW, MSM, AP), pp. 269–277.
JCDLJCDL-2007-CheeS #clustering #community #documentation
Document clustering using small world communities (BWC, BRS), pp. 53–62.
JCDLJCDL-2007-DruinWMB #case study #library
Children’s interests and concerns when using the international children’s digital library: a four-country case study (AD, AW, SM, BBB), pp. 167–176.
JCDLJCDL-2007-Ernst-GerlachF #retrieval
Retrieval in text collections with historic spelling using linguistic and spelling variants (AEG, NF), pp. 333–341.
JCDLJCDL-2007-LiCZL #automation #case study #classification #network
Automatic patent classification using citation network information: an experimental study in nanotechnology (XL, HC, ZZ, JL), pp. 419–427.
JCDLJCDL-2007-NewmanHCS #metadata #modelling #statistics #topic
Subject metadata enrichment using statistical topic models (DN, KH, CC, PS), pp. 366–375.
JCDLJCDL-2007-RichardsonF
Using bilingual ETD collections to mine phrase translations (RR, EAF), pp. 352–353.
JCDLJCDL-2007-TakedaT #clustering #named #performance #summary
UpdateNews: a news clustering and summarization system using efficient text processing (TT, AT), pp. 438–439.
SIGMODSIGMOD-2007-BandiMAA #algorithm #data type #performance
Fast data stream algorithms using associative memories (NB, AM, DA, AEA), pp. 247–256.
SIGMODSIGMOD-2007-ChandyG #database
Event processing using database technology (KMC, DG), pp. 1169–1170.
SIGMODSIGMOD-2007-FaloutsosKS #graph #matrix #mining #scalability #tool support
Mining large graphs and streams using matrix and tensor tools (CF, TGK, JS), p. 1174.
SIGMODSIGMOD-2007-FangHLYGLS #named #query
GPUQP: query co-processing using graphics processors (RF, BH, ML, KY, NKG, QL, PVS), pp. 1061–1063.
SIGMODSIGMOD-2007-LarsonLZZ #assurance #estimation #quality
Cardinality estimation using sample views with quality assurance (PÅL, WL, JZ, PZ), pp. 175–186.
SIGMODSIGMOD-2007-NandiJ #interface #query
Assisted querying using instant-response interfaces (AN, HVJ), pp. 1156–1158.
SIGMODSIGMOD-2007-TufteLMPBR #estimation
Travel time estimation using NiagaraST and latte (KT, JL, DM, VP, RLB, JR), pp. 1091–1093.
SIGMODSIGMOD-2007-ZhouGBN #query
Query relaxation using malleable schemas (XZ, JG, WTB, WN), pp. 545–556.
VLDBVLDB-2007-AbadiMMH #clustering #data transformation #scalability #semantics #web
Scalable Semantic Web Data Management Using Vertical Partitioning (DJA, AM, SM, KJH), pp. 411–422.
VLDBVLDB-2007-BhattacharyaMS #distributed #modelling #named #network #query #statistics
MIST: Distributed Indexing and Querying in Sensor Networks using Statistical Models (AB, AM, AKS), pp. 854–865.
VLDBVLDB-2007-Helmer #documentation #similarity
Measuring the Structural Similarity of Semistructured Documents Using Entropy (SH), pp. 1022–1032.
VLDBVLDB-2007-LimWW
Unifying Data and Domain Knowledge Using Virtual Views (LL, HW, MW), pp. 255–266.
VLDBVLDB-2007-LitwinMRS #algebra #performance #string
Fast nGram-Based String Search Over Data Encoded Using Algebraic Signatures (WL, RM, PR, TJES), pp. 207–218.
VLDBVLDB-2007-LiuWC #keyword #named #semantics #xml
XSeek: A Semantic XML Search Engine Using Keywords (ZL, JW, YC), pp. 1330–1333.
VLDBVLDB-2007-LiWY #approximate #named #performance #query #string
VGRAM: Improving Performance of Approximate Queries on String Collections Using Variable-Length Grams (CL, BW, XY), pp. 303–314.
VLDBVLDB-2007-PapadomanolakisDA #automation #database #design #performance #query
Efficient Use of the Query Optimizer for Automated Database Design (SP, DD, AA), pp. 1093–1104.
VLDBVLDB-2007-ShenDNR #datalog #declarative #embedded #information management
Declarative Information Extraction Using Datalog with Embedded Extraction Predicates (WS, AD, JFN, RR), pp. 1033–1044.
VLDBVLDB-2007-ZinnBG #modelling #query
Modeling and Querying Vague Spatial Objects Using Shapelets (DZ, JB, MG), pp. 567–578.
CSEETCSEET-2007-CarverHHHR #programming #re-engineering #student
Increased Retention of Early Computer Science and Software Engineering Students Using Pair Programming (JCC, LH, LH, JEH, DSR), pp. 115–122.
CSEETCSEET-2007-Chao #collaboration #student #wiki
Student Project Collaboration Using Wikis (JC), pp. 255–261.
CSEETCSEET-2007-McGregorBBBK #architecture #education #reasoning
Using an Architecture Reasoning Tool to Teach Software Architecture (JDM, FB, LB, PB, MK), pp. 275–282.
CSEETCSEET-2007-Padua #development #modelling
Using Model-Driven Development in Time-Constrained Course Projects (WP), pp. 133–140.
CSEETCSEET-2007-RootRT #concept #re-engineering
Key Software Engineering Concepts for Project Success: The Use of “Boot Camp” to Establish Successful Software Projects (DR, MRL, GT), pp. 203–210.
CSEETCSEET-2007-Staron #analysis #learning #student
Using Students as Subjects in Experiments--A Quantitative Analysis of the Influence of Experimentation on Students’ Learning Proces (MS), pp. 221–228.
CSEETCSEET-2007-Taran #education #game studies #re-engineering #risk management
Using Games in Software Engineering Education to Teach Risk Management (GT), pp. 211–220.
ITiCSEITiCSE-2007-CaronnaSMIHT #predict
Prediction of modulators of pyruvate kinase in smiles text using aprori methods (JSC, RS, JDM, VLI, KGH, JHT), p. 348.
ITiCSEITiCSE-2007-DistasioW #education #framework #game studies
Inclusive computer science education using a ready-made computer game framework (JD, TPW), pp. 116–120.
ITiCSEITiCSE-2007-FreireFPT #education #web
Using screen readers to reinforce web accessibility education (APF, RPdMF, DMBP, MAST), pp. 82–86.
ITiCSEITiCSE-2007-GorraLC #assessment #database #student
An account of the use of synoptic assessment for students in the area of databases at level 2 (AG, SL, JC), p. 334.
ITiCSEITiCSE-2007-Impagliazzo #approach #source code
Using an outcome-based approach to assess computing programs (JI), p. 344.
ITiCSEITiCSE-2007-KheirW #realtime #speech #student
Inclusion of deaf students in computer science classes using real-time speech transcription (RK, TW), pp. 261–265.
ITiCSEITiCSE-2007-Lewis #student #word
Are pictures worth 1000 words? the use of affective imagery surveys to capture student perceptions of the computing discipline (TLL), p. 312.
ITiCSEITiCSE-2007-OliverGMA #learning
Using disruptive technology for explorative learning (IO, KG, AM, CA), pp. 96–100.
SIGITESIGITE-2007-Bailey #web
A web systems laboratory using portable hard drives (MGB), pp. 107–112.
SIGITESIGITE-2007-ChaKL #abstraction #problem
Using puzzles: problem-solving and abstraction (SC, DK, WGL), pp. 135–140.
SIGITESIGITE-2007-GuimaraesM #animation #database #education #security
Using animation courseware in the teaching of database security (MAMG, MM), pp. 253–258.
SIGITESIGITE-2007-MiertschinW #concept #learning
Using concept maps to navigate complex learning environments (SLM, CLW), pp. 175–184.
SIGITESIGITE-2007-ToderickL #linux #physics
Using VPN technology to remove physical barriers in linux lab experiments (LT, PJLI), pp. 113–118.
CSMRCSMR-2007-BrandBEJKKSV #ide #legacy #maintenance
Using The Meta-Environment for Maintenance and Renovation (MvdB, MB, GRE, HAdJ, PK, ATK, TvdS, JJV), pp. 331–332.
CSMRCSMR-2007-LoeschP #concept analysis #product line #variability
Restructuring Variability in Software Product Lines using Concept Analysis of Product Configurations (FL, EP), pp. 159–170.
CSMRCSMR-2007-Lormans #evolution #monitoring #requirements
Monitoring Requirements Evolution using Views (ML), pp. 349–352.
ICPCICPC-2007-CornelissenHZMWD #comprehension #execution #sequence
Understanding Execution Traces Using Massive Sequence and Circular Bundle Views (BC, DH, AZ, LM, JJvW, AvD), pp. 49–58.
ICPCICPC-2007-MirarabHT #co-evolution #network #predict
Using Bayesian Belief Networks to Predict Change Propagation in Software Systems (SM, AH, LT), pp. 177–188.
ICPCICPC-2007-StefikAPB #debugging #named
WAD: A Feasibility study using the Wicked Audio Debugger (AS, RTA, RP, JB), pp. 69–80.
ICPCICPC-2007-Vivanco #algorithm #complexity #identification #metric #modelling #predict #search-based #source code
Use of a Genetic Algorithm to Identify Source Code Metrics Which Improves Cognitive Complexity Predictive Models (RAV), pp. 297–300.
ICSMEICSM-2007-Anda #maintenance #metric
Assessing Software System Maintainability using Structural Measures and Expert Assessments (BA), pp. 204–213.
ICSMEICSM-2007-CossetteW #analysis #dependence #evaluation #semiparsing
Polylingual Dependency Analysis Using Island Grammars: A Cost Versus Accuracy Evaluation (BC, RJW), pp. 214–223.
ICSMEICSM-2007-GustavssonLLMB #development #distributed #maintenance #modelling #uml
Simplifying maintenance by using XSLT to unlock UML models in a distributed development environment (HG, BL, BL, AM, MB), pp. 465–468.
ICSMEICSM-2007-LuccaFT #classification #concept analysis #web
Web Pages Classification using Concept Analysis (GADL, ARF, PT), pp. 385–394.
ICSMEICSM-2007-Salahuddin #testing
Analysing the Impact of Change on Test Sets Using X-Machines (SS), pp. 511–512.
ICSMEICSM-2007-Vivanco #approach #modelling #predict #quality
Improving Predictive Models of Software Quality Using an Evolutionary Computational Approach (RV), pp. 503–504.
ICSMEICSM-2007-WalkinshawRW #feature model
Feature Location and Extraction using Landmarks and Barriers (NW, MR, MW), pp. 54–63.
MSRMSR-2007-German #open source
Using Software Distributions to Understand the Relationship among Free and Open Source Software Projects (DMG), p. 24.
MSRMSR-2007-HerraizGR07a #analysis #eclipse
Forecasting the Number of Changes in Eclipse Using Time Series Analysis (IH, JMGB, GR), p. 32.
MSRMSR-2007-LivieriHMI #analysis #evolution #kernel #linux
Analysis of the Linux Kernel Evolution Using Code Clone Coverage (SL, YH, MM, KI), p. 22.
MSRMSR-2007-Masticola #development #lightweight #mining #repository
Lightweight Risk Mitigation for Software Development Projects Using Repository Mining (SPM), p. 13.
MSRMSR-2007-ValettoHECWW #congruence #development #repository
Using Software Repositories to Investigate Socio-technical Congruence in Development Projects (GV, MEH, KE, SC, MNW, CW), p. 25.
SCAMSCAM-2007-MolinaS #approximate #open source #performance #source code
Fast Approximate Matching of Programs for Protecting Libre/Open Source Software by Using Spatial Indexes (AJMM, TS), pp. 111–122.
SCAMSCAM-2007-RodenVEM #agile #empirical #metric #modelling #process #quality
An Empirical Study of the Relationship of Stability Metrics and the QMOOD Quality Models Over Software Developed Using Highly Iterative or Agile Software Processes (PLR, SV, LHE, SLM), pp. 171–179.
WCREWCRE-2007-McNairGW #architecture #evolution #visualisation
Visualizing Software Architecture Evolution Using Change-Sets (AM, DMG, JHWJ), pp. 130–139.
WCREWCRE-2007-RaberL #data mining #debugging #mining
Emulated Breakpoint Debugger and Data Mining Using Detours (JR, EL), pp. 271–272.
WCREWCRE-2007-Staiger #analysis #reverse engineering #user interface #visual notation
Reverse Engineering of Graphical User Interfaces Using Static Analyses (SS), pp. 189–198.
CIAACIAA-2007-Marschner #transducer
Efficiently Matching with Local Grammars Using Prefix Overlay Transducers (CM), pp. 314–316.
LATALATA-2007-KutribM #automaton #performance #recognition
Fast Reversible Language Recognition Using Cellular Automata (MK, AM), pp. 331–342.
IFMIFM-2007-HasanT #cumulative #probability #verification
Verification of Probabilistic Properties in HOL Using the Cumulative Distribution Function (OH, ST), pp. 333–352.
IFMIFM-2007-PlaggeL #model checking #specification #validation
Validating Z Specifications Using the ProBAnimator and Model Checker (DP, ML), pp. 480–500.
IFMIFM-2007-PodorozhnyKPZ #alloy #multi #verification
Verification of Multi-agent Negotiations Using the Alloy Analyzer (RMP, SK, DEP, XZ), pp. 501–517.
RTARTA-2007-EscobarM #infinity #model checking
Symbolic Model Checking of Infinite-State Systems Using Narrowing (SE, JM), pp. 153–168.
RTARTA-2007-KorpM #bound #proving #term rewriting #termination
Proving Termination of Rewrite Systems Using Bounds (MK, AM), pp. 273–287.
SEFMSEFM-2007-CrockerC #automation #c #reasoning #source code #verification
Verification of C Programs Using Automated Reasoning (DC, JC), pp. 7–14.
SEFMSEFM-2007-Lano #diagrams #interactive #specification
Formal Specification using Interaction Diagrams (KL), pp. 293–304.
SEFMSEFM-2007-SahaRC #modelling #protocol #verification
Modeling and Verification of TTCAN Startup Protocol Using Synchronous Calendar (IS, SR, KC), pp. 69–79.
SEFMSEFM-2007-SampathRSR #case study #generative #how
How to Test Program Generators? A Case Study using flex (PS, ACR, KCS, SR), pp. 80–92.
ICFPICFP-2007-BeshersFS #case study #experience #functional #linux #programming
Experience report: using functional programming to manage a linux distribution (CB, DF, JS), pp. 213–218.
ICFPICFP-2007-MarlowYJ #lazy evaluation #performance #pointer
Faster laziness using dynamic pointer tagging (SM, ARY, SLPJ), pp. 277–288.
IFLIFL-2007-Kleeblatt #dependent type
Checking Dependent Types Using Compiled Code (DK), pp. 165–182.
IFLIFL-2007-NaylorR #graph #reduction
The Reduceron: Widening the von Neumann Bottleneck for Graph Reduction Using an FPGA (MN, CR), pp. 129–146.
LISPILC-2007-Borden #classification
Classification using conditional probabilities and Shannon’s definition of information (AB), p. 15.
LISPILC-2007-HerzeelGCD #e-commerce #lisp
Modularizing crosscuts in an e-commerce application in Lisp using HALO (CH, KG, PC, TD), p. 11.
CoGCIG-2007-CarterL #algorithm
An Investigation into Tournament Poker Strategy using Evolutionary Algorithms (RGC, JL), pp. 117–124.
CoGCIG-2007-FinkDA #behaviour #game studies #machine learning
Extracting NPC behavior from computer games using computer vision and machine learning techniques (AF, JD, JA), pp. 24–31.
CoGCIG-2007-LeighLM #algorithm #search-based
Using a Genetic Algorithm to Explore A*-like Pathfinding Algorithms (REL, SJL, CM), pp. 72–79.
CoGCIG-2007-OommenGP #bound #finite #game studies #probability
Using Stochastic AI Techniques to Achieve Unbounded Resolution in Finite Player Goore Games and its Applications (BJO, OCG, AP), pp. 161–167.
CoGCIG-2007-RunarssonJ #evaluation #learning
Effect of look-ahead search depth in learning position evaluation functions for Othello using -greedy exploration (TPR, EOJ), pp. 210–215.
CoGCIG-2007-SeredynskiBK #ad hoc #behaviour #evolution #game studies #modelling #network
Modelling the Evolution of Cooperative Behavior in Ad Hoc Networks using a Game Based Model (MS, PB, MAK), pp. 96–103.
CoGCIG-2007-VenessB #effectiveness #game studies #probability
Effective Use of Transposition Tables in Stochastic Game Tree Search (JV, AB), pp. 112–116.
DiGRADiGRA-2007-BraggeS #game studies #mining #profiling #research #tool support
Profiling Academic Research on Digital Games Using Text Mining Tools (JB, JS).
DiGRADiGRA-2007-DekkerC #game studies
Please Biofeed the Zombies: Enhancing the Gameplay and Display of a Horror Game Using Biofeedback (AD, EC).
DiGRADiGRA-2007-KamRTC #design pattern #game studies #mobile
Mobile Gaming with Children in Rural India: Contextual Factors in the Use of Game Design Patterns (MK, VR, AT, JFC).
DiGRADiGRA-2007-NatkinYJM #adaptation #game studies #modelling #multi #ubiquitous
Creating Multiplayer Ubiquitous Games using an adaptive narration model based on a user's model (SN, CY, SJ, BM).
DiGRADiGRA-2007-WyeldLCGLH #game studies
The Ethics of Indigenous Storytelling: using the Torque Game Engine to Support Australian Aboriginal Cultural Heritage (TGW, BL, JC, CG, BL, JH).
FDGGDCSE-J-2007-Youngblood #education #game studies #student
Engaging Students in Advanced Computer Science Education Using Game Segments (GMY).
AGTIVEAGTIVE-2007-AschenbrennerG #graph #graph grammar
Transforming Scene Graphs Using Triple Graph Grammars — A Practice Report (NA, LG), pp. 32–43.
AGTIVEAGTIVE-2007-BiermannEET #eclipse #editing #generative #plugin
Generating Eclipse Editor Plug-Ins Using Tiger (EB, KE, CE, GT), pp. 583–584.
AGTIVEAGTIVE-2007-EngelsGSW #consistency #contract #modelling #process #visual notation #web #web service
Assuring Consistency of Business Process Models and Web Services Using Visual Contracts (GE, BG, CS, HW), pp. 17–31.
AGTIVEAGTIVE-2007-GogollaBD #graph transformation #ocl
From Graph Transformation to OCL Using USE (MG, FB, DHD), pp. 585–586.
AGTIVEAGTIVE-2007-LeenheerM #collaboration #evolution #graph transformation #ontology
Using Graph Transformation to Support Collaborative Ontology Evolution (PDL, TM), pp. 44–58.
GT-VMTGT-VMT-2007-BisztrayH #csp #process #verification
Rule-Level Verification of Business Process Transformations using CSP (DB, RH).
GT-VMTGT-VMT-2007-BonevaHKR #graph transformation #multi #simulation
Simulating Multigraph Transformations Using Simple Graphs (IB, FH, HK, AR).
CHICHI-2007-BirnholtzGMB #case study #process #scalability
An exploratory study of input configuration and group process in a negotiation task using a large display (JPB, TG, CM, RB), pp. 91–100.
CHICHI-2007-DingEKLCSWB #empirical #visual notation
An empirical study of the use of visually enhanced voip audio conferencing: the case of IEAC (XD, TE, WAK, SL, JC, JBS, TVW, WEB), pp. 1019–1028.
CHICHI-2007-KristenssonZ #gesture
Command strokes with and without preview: using pen gestures on keyboard for command selection (POK, SZ), pp. 1137–1146.
CHICHI-2007-KumarPW #named
EyePoint: practical pointing and selection using gaze and keyboard (MK, AP, TW), pp. 421–430.
CHICHI-2007-LankCR #predict
Endpoint prediction using motion kinematics (EL, YCNC, JR), pp. 637–646.
CHICHI-2007-LudfordPRT
Capturing, sharing, and using local place information (PJL, RP, KR, LGT), pp. 1235–1244.
CHICHI-2007-MoravejiLDOW #design #named
Comicboarding: using comics as proxies for participatory design with children (NM, JL, JD, PO, SW), pp. 1371–1374.
CHICHI-2007-NenonenLHLJH #game studies #interactive
Using heart rate to control an interactive game (VN, AL, VH, TL, MJ, PH), pp. 853–856.
CHICHI-2007-SchrammelGST #exclamation #quote
“Look!”: using the gaze direction of embodied agents (JS, AG, RS, MT), pp. 1187–1190.
CHICHI-2007-SeayK #game studies #online #problem #self
Project massive: self-regulation and problematic use of online gaming (AFS, REK), pp. 829–838.
CHICHI-2007-SellenFAHRW #case study #memory management
Do life-logging technologies support memory for the past?: an experimental study using sensecam (AS, AF, MA, SH, CR, KRW), pp. 81–90.
CHICHI-2007-TangLPWD #interactive #process
Recent shortcuts: using recent interactions to support shared activities (JCT, JL, JSP, SW, CD), pp. 1263–1272.
CHICHI-2007-VogelB #interface #named
Shift: a technique for operating pen-based interfaces using touch (DV, PB), pp. 657–666.
CHICHI-2007-ZhaoDCBB #feedback #named
Earpod: eyes-free menu selection using touch input and reactive audio feedback (SZ, PD, MHC, RB, PB), pp. 1395–1404.
HCIDHM-2007-BeurierCMTW #approach #data-driven #database #simulation
Simulation of Digital Human Hand Postures of Car Controls Using a Data Based Approach (GB, NC, GM, JT, XW), pp. 13–22.
HCIDHM-2007-EndoKKMKM #assessment #design
A Computer-Aided Ergonomic Assessment and Product Design System Using Digital Hands (YE, SK, TK, NM, MK, MM), pp. 833–842.
HCIDHM-2007-FanC #adaptation
A Modified Particle Swarm Optimizer Using an Adaptive Dynamic Weight Scheme (SKSF, JMC), pp. 56–65.
HCIDHM-2007-GeorgeG #modelling
Facilitating Pronunciation Skills for Children with Phonological Disorders Using Human Modelling (JG, PG), pp. 595–605.
HCIDHM-2007-KimPHL #design #evaluation
Evaluation of Navy Shipboard Habitability for a Warship Design Using Human Model (HK, JHP, HH, CML), pp. 884–893.
HCIDHM-2007-LeeFCBEAP #finite #modelling
Finite Element Modeling to Aid in Refining the Rehabilitation of Amputees Using Osseointegrated Prostheses (WL, LF, NJC, RB, JE, CA, MJP), pp. 655–658.
HCIDHM-2007-VolzBHK #automation #generative #linear #metric
Automatic, Body Measurements Based Generation of Individual Avatars Using Highly Adjustable Linear Transformation (AV, RB, SH, KK), pp. 453–459.
HCIDHM-2007-WashburnSG #maintenance #multimodal
Using Multimodal Technologies to Enhance Aviation Maintenance Inspection Training (CW, PS, AKG), pp. 1018–1026.
HCIDHM-2007-YaoMW #3d #low cost
Low Cost 3D Shape Acquisition System Using Strip Shifting Pattern (LY, LM, DW), pp. 276–285.
HCIDHM-2007-ZhaoL #3d #image #locality #orthogonal
Capturing 3D Human Motion from Monocular Images Using Orthogonal Locality Preserving Projection (XZ, YL), pp. 304–313.
HCIHCI-AS-2007-KimuraTHTAOT #analysis #approach
The Analysis of Near-Miss Cases Using Data-Mining Approach (MK, KT, TH, YT, TA, MO, FT), pp. 474–483.
HCIHCI-AS-2007-KojimaIN #documentation
Document Management and Information Organizing Method Using RFID Tags (HK, KI, NN), pp. 601–610.
HCIHCI-AS-2007-LeeNB #monitoring #network #reliability
Personal Life Logger and Belonging Monitor Using Reliable ZigBee Networks (KL, KN, CB), pp. 961–970.
HCIHCI-IDU-2007-BaranauskasN #design #flexibility #interactive
Using Patterns to Support the Design of Flexible User Interaction (MCCB, VPdAN), pp. 1033–1042.
HCIHCI-IDU-2007-Forsman #experience #human-computer #research #tool support
After Hurricane Katrina: Post Disaster Experience Research Using HCI Tools and Techniques (CF), pp. 78–87.
HCIHCI-IDU-2007-Gomez-CarneroI #representation
Evaluator of User’s Actions (Eua) Using the Model of Abstract Representation Dgaui (SGC, JRI), pp. 463–471.
HCIHCI-IDU-2007-LingLX #complexity #validation #web
Validating Information Complexity Questionnaires Using Travel Web Sites (CL, ML, JX), pp. 901–910.
HCIHCI-IDU-2007-OkamotoKGI #design
Participatory Design Using Scenarios in Different Cultures (MO, HK, IG, KI), pp. 223–231.
HCIHCI-IDU-2007-StrybelVDKNCG #predict
Predicting Perceived Situation Awareness of Low Altitude Aircraft in Terminal Airspace Using Probe Questions (TZS, KPLV, JPD, JK, TKN, VC, FPG), pp. 939–948.
HCIHCI-IDU-2007-TarbyERTLK #architecture #aspect-oriented #comparison #evaluation #interactive #programming #usability
Traces Using Aspect Oriented Programming and Interactive Agent-Based Architecture for Early Usability Evaluation: Basic Principles and Comparison (JCT, HE, JR, CDT, PL, CK), pp. 632–641.
HCIHCI-IDU-2007-TranMC #independence #memory management
Using Memory Aid to Build Memory Independence (QTT, EDM, GC), pp. 959–965.
HCIHCI-IDU-2007-VogiazouFL #design #process
The Use of Improvisational Role-Play in User Centered Design Processes (YV, JF, JL), pp. 262–272.
HCIHCI-IPT-2007-ChenC
Using Agent Technology to Study Human Action and Perception Through a Virtual Street Simulator (CHC, MLC), pp. 560–568.
HCIHCI-IPT-2007-DzwiarekLNRS #artificial reality #assessment #visual notation
Assessment of Perception of Visual Warning Signals Generated Using an Augmented Reality System (MD, AL, AN, CR, TS), pp. 579–586.
HCIHCI-IPT-2007-GalludLTP #experience #interactive #mobile
Using Mobile Devices to Improve the Interactive Experience of Visitors in Art Museums (JAG, MDL, RT, VMRP), pp. 280–287.
HCIHCI-IPT-2007-JeonKB #mobile
Interacting with a Tabletop Display Using a Camera Equipped Mobile Phone (SJ, GJK, MB), pp. 336–343.
HCIHCI-IPT-2007-ParkJ #automation #detection #documentation #image #mobile #word
Automatic Word Detection System for Document Image Using Mobile Devices (AP, KJ), pp. 438–444.
HCIHCI-IPT-2007-SongWT #game studies #interface
A Tangible Game Interface Using Projector-Camera Systems (PS, SW, JT), pp. 956–965.
HCIHCI-IPT-2007-TsaoCC #concept #design #flexibility #research #smarttech
The Research of Using Image-Transformation to the Conceptual Design of Wearable Product with Flexible Display (YCT, LCC, SCC), pp. 1220–1229.
HCIHCI-IPT-2007-YoshidaMS #interactive #mobile #visual notation
Mobile Magic Hand: Camera Phone Based Interaction Using Visual Code and Optical Flow (YY, KM, TS), pp. 513–521.
HCIHCI-MIE-2007-Alexandris #human-computer #quote #semantics
“Show and Tell”: Using Semantically Processable Prosodic Markers for Spatial Expressions in an HCI System for Consumer Complaints (CA), pp. 13–22.
HCIHCI-MIE-2007-ChanCCHH #detection #multi
A New Method for Multi-finger Detection Using a Regular Diffuser (LWC, YFC, YWC, YPH, JYjH), pp. 573–582.
HCIHCI-MIE-2007-ChangKP #constraints #evolution #set
Lip Contour Extraction Using Level Set Curve Evolution with Shape Constraint (JSC, EYK, SHP), pp. 583–588.
HCIHCI-MIE-2007-ChungK #classification
Classification of a Person Picture and Scenery Picture Using Structured Simplicity (MBC, IJK), pp. 821–828.
HCIHCI-MIE-2007-DerakhshiK #bound #fuzzy #network #predict #sequence #word
Using Recurrent Fuzzy Neural Networks for Predicting Word Boundaries in a Phoneme Sequence in Persian Language (MRFD, MRK), pp. 50–59.
HCIHCI-MIE-2007-HanYYJ #analysis #automation #image #mobile #semantics
Automatic Mobile Content Conversion Using Semantic Image Analysis (EH, JY, HY, KJ), pp. 298–307.
HCIHCI-MIE-2007-HilligesKPBK #analysis #automation #classification #image #quality #sorting
Browsing and Sorting Digital Pictures Using Automatic Image Classification and Quality Analysis (OH, PK, AP, AB, HPK), pp. 882–891.
HCIHCI-MIE-2007-HirotaWI #interface
Menu Selection Using Auditory Interface (KH, YW, YI), pp. 70–75.
HCIHCI-MIE-2007-JangKC #geometry #visual notation
Position and Pose Computation of a Moving Camera Using Geometric Edge Matching for Visual SLAM (HJ, GYK, HIC), pp. 634–641.
HCIHCI-MIE-2007-JangWB #named
MEMORIA: Personal Memento Service Using Intelligent Gadgets (HJ, JW, CB), pp. 331–339.
HCIHCI-MIE-2007-JungKK #estimation #image #modelling
Human Pose Estimation Using a Mixture of Gaussians Based Image Modeling (DJJ, KSK, HJK), pp. 649–658.
HCIHCI-MIE-2007-JuSK #game studies #people #quote
“Shooting a Bird”: Game System Using Facial Feature for the Handicapped People (JJ, YS, EYK), pp. 642–648.
HCIHCI-MIE-2007-KangEKKASK #modelling #multi
Human Motion Modeling Using Multivision (BDK, JSE, JHK, CK, SHA, BJS, SKK), pp. 659–668.
HCIHCI-MIE-2007-KimKEKASK #adaptation #detection #realtime
Real-Time Face Tracking System Using Adaptive Face Detector and Kalman Filter (JHK, BDK, JSE, CK, SHA, BJS, SKK), pp. 669–678.
HCIHCI-MIE-2007-KimSK #network
Emotion-Based Textile Indexing Using Neural Networks (NYK, YS, EYK), pp. 349–357.
HCIHCI-MIE-2007-KwonPKK #recognition
Human Shape Tracking for Gait Recognition Using Active Contours with Mean Shift (KSK, SHP, EYK, HJK), pp. 690–699.
HCIHCI-MIE-2007-MehtaC #ontology
Developing a Conversational Agent Using Ontologies (MM, AC), pp. 154–164.
HCIHCI-MIE-2007-OguraNS #communication #parallel #thread
Exploration of Possibility of Multithreaded Conversations Using a Voice Communication System (KO, KN, KS), pp. 186–195.
HCIHCI-MIE-2007-ReveiuDF #adaptation #multi #retrieval
Using Content-Based Multimedia Data Retrieval for Multimedia Content Adaptation (AR, MD, FF), pp. 486–492.
HCIHCI-MIE-2007-SetiawanHL #interactive #multi #people
Multiple People Labeling and Tracking Using Stereo for Human Computer Interaction (NAS, SJH, CWL), pp. 738–746.
HCIHCI-MIE-2007-WangYCI #interactive #interface #multimodal #realtime
Character Agents in E-Learning Interface Using Multimodal Real-Time Interaction (HW, JY, MHC, MI), pp. 225–231.
HCIHCI-MIE-2007-YoonK #case study #interactive
A Study on Interactive Artwork as an Aesthetic Object Using Computer Vision System (JY, JK), pp. 763–768.
HCIHIMI-IIE-2007-AlsharaI #integration #learning
Business Integration Using the Interdisciplinary Project Based Learning Model (IPBL) (OKA, MI), pp. 823–833.
HCIHIMI-IIE-2007-DoyoSA #case study #transaction
A Study of Production / Transaction-Related Model Using Control Theory (DD, KS, KA), pp. 855–862.
HCIHIMI-IIE-2007-FisherBHSJ #email #lessons learnt #metadata #social
Using Social Metadata in Email Triage: Lessons from the Field (DF, AJBB, BH, MAS, AJ), pp. 13–22.
HCIHIMI-IIE-2007-HarunN #user interface
User Interface for Knowledge Sharing Using Knowledge Gardening Metaphor (AFH, NLMN), pp. 319–327.
HCIHIMI-IIE-2007-HashimotoN #community #memory management
Fond Memory Management System by Using Information About Communities (KH, YN), pp. 23–29.
HCIHIMI-IIE-2007-HsuCSWY #analysis #assessment #game studies #interface #online
Function Interfaces Assessment of Online Game Websites in Great China Area Using Content Analysis (CIH, CC, CHS, PJW, YJY), pp. 337–346.
HCIHIMI-IIE-2007-IshiiYIN #navigation
A Navigation System Using Ultrasonic Directional Speaker with Rotating Base (KI, YY, MI, KN), pp. 526–535.
HCIHIMI-IIE-2007-KaminoyamaMHSKA #navigation #people
Walk Navigation System Using Photographs for People with Dementia (HK, TM, FH, KS, NK, SA), pp. 1039–1049.
HCIHIMI-IIE-2007-KanekoNATT #analysis #generative #mining
A Method for Generating Plans for Retail Store Improvements Using Text Mining and Conjoint Analysis (TK, YN, MA, TT, YT), pp. 910–917.
HCIHIMI-IIE-2007-LiuYCL #estimation #health #modelling
Health Risk Estimation of Dichlorobenzene Exposure Workers by Using Computer Models (PSL, RMY, YMC, CYL), pp. 1060–1066.
HCIHIMI-IIE-2007-MaILJ
Use of Chinese Short Messages (DM, FI, YL, LJ), pp. 582–591.
HCIHIMI-IIE-2007-NagamatsuKKS #development #eye tracking
Development of a Skill Acquisition Support System Using Expert’s Eye Movement (TN, YK, JK, HS), pp. 430–439.
HCIHIMI-IIE-2007-WakitaAT #metric #mobile #prototype
Methodology for Constructing a Prototype Site for Finding Employment SPI Measures Using Mobile Phones (SW, MA, TT), pp. 983–993.
HCIHIMI-IIE-2007-WangCH #memory management
Using Long Term Memory for Bookmark Management (MJW, KMC, TKH), pp. 812–820.
HCIHIMI-IIE-2007-YamaguchiNAHKN #artificial reality #named #navigation
AR-Navi: An In-Vehicle Navigation System Using Video-Based Augmented Reality Technology (YY, TN, KA, MH, HK, SN), pp. 1139–1147.
HCIHIMI-IIE-2007-YoonKPLY #game studies #modelling
Game Player Modeling Using D-FSMs (TBY, DMK, KHP, JHL, KHY), pp. 490–499.
HCIHIMI-MTT-2007-AblassmeierPRR #network
Context-Aware Information Agents for the Automotive Domain Using Bayesian Networks (MA, TP, SR, GR), pp. 561–570.
HCIHIMI-MTT-2007-ChienC #comprehension
The Use of Dynamic Display to Improve Reading Comprehension for the Small Screen of a Wrist Watch (YHC, CHC), pp. 814–823.
HCIHIMI-MTT-2007-ChoBKC #difference #on the #probability
On Achieving Proportional Loss Differentiation Using Dynamic-MQDDP with Differential Drop Probability (KC, SB, JK, JWC), pp. 584–593.
HCIHIMI-MTT-2007-CornsML #approach #development #machine learning #optimisation
Development of an Approach for Optimizing the Accuracy of Classifying Claims Narratives Using a Machine Learning Tool (TEXTMINER[4]) (HLC, HRM, MRL), pp. 411–416.
HCIHIMI-MTT-2007-GoncalvesaMJ #documentation
Using Autobiographic Information to Retrieve Real and Electronic Documents (DG, TJVG, RM, JAJ), pp. 427–436.
HCIHIMI-MTT-2007-Jeong #comprehension
Suggestion of Methods for Understanding User’s Emotional Changes While Using a Product (SHJ), pp. 59–67.
HCIHIMI-MTT-2007-JiGC #comparison #word
Selecting Target Word Using Contexonym Comparison Method (HJ, BG, HC), pp. 463–470.
HCIHIMI-MTT-2007-KwonSH #design #implementation #realtime
Design and Implementation of Enhanced Real Time News Service Using RSS and VoiceXML (HJK, JHS, KSH), pp. 677–686.
HCIHIMI-MTT-2007-LeeJ #case study
A Study on a Stereoscopic Display System Using a Rotary Disk Type Beam Shutter (KHL, TJJ), pp. 868–875.
HCIHIMI-MTT-2007-MarucciLC #approach #classification #fuzzy
Computer Classification of Injury Narratives Using a Fuzzy Bayes Approach: Improving the Model (HRM, MRL, HLC), pp. 500–506.
HCIHIMI-MTT-2007-Miki #collaboration #development #guidelines
Use of Socio-technical Guidelines in Collaborative System Development (HM), pp. 90–97.
HCIHIMI-MTT-2007-NagaiEK #comprehension #process
Measuring Brain Activities Related to Understanding Using Near-Infrared Spectroscopy (NIRS) (MN, NE, TK), pp. 884–893.
HCIHIMI-MTT-2007-SakuradaHON #interface #online #recognition
A Japanese Text Input Interface Using On-Line Writing-Box-Free Handwriting Recognition and Kana-to-Kanji Conversion (TS, YH, HO, MN), pp. 940–949.
HCIHIMI-MTT-2007-ShiIL #query #visual notation
Facilitating Visual Queries in the TreeMap Using Distortion Techniques (KS, PI, PCL), pp. 345–353.
HCIHIMI-MTT-2007-TogawaKY #communication #detection #mining #network #peer-to-peer
Peer-to-Peer File Sharing Communication Detection System Using Network Traffic Mining (ST, KK, YY), pp. 769–778.
HCIOCSC-2007-BlevisLRS #design #interactive #research
Using Design Critique as Research to Link Sustainability and Interactive Technologies (EB, YKL, DR, ES), pp. 22–31.
HCIOCSC-2007-NuschkeJ #collaboration #communication #framework #information management #tool support
A Framework for Inter-organizational Collaboration Using Communication and Knowledge Management Tools (PN, XJ), pp. 406–415.
VISSOFTVISSOFT-2007-BohnerGHM #analysis #source code #uml #visual notation #visualisation
Evolutional Insights from UML and Source Code Versions using Information Visualization and Visual Analysis (SAB, DG, TH, KM), pp. 145–148.
VISSOFTVISSOFT-2007-HoltenCW #sequence #visualisation
Trace Visualization Using Hierarchical Edge Bundles and Massive Sequence Views (DH, BC, JJvW), pp. 47–54.
VISSOFTVISSOFT-2007-LangelierD #analysis #visual notation
Visual Analysis of Azureus using VERSO (GL, KD), pp. 163–164.
VISSOFTVISSOFT-2007-LienhardKG #agile #prototype #visualisation
Rapid Prototyping of Visualizations using Mondrian (AL, AK, OG), pp. 67–70.
CAiSECAiSE-2007-EderW #comparison #detection #graph #ontology
Change Detection in Ontologies Using DAG Comparison (JE, KW), pp. 21–35.
CAiSECAiSE-2007-LiuBW #behaviour #modelling
Modeling Business Contexture and Behavior Using Business Artifacts (RL, KB, FYW), pp. 324–339.
CAiSECAiSE-2007-SilvaAMC #design #social
Designing Social Patterns Using Advanced Separation of Concerns (CTLLS, JA, AMDM, JC), pp. 309–323.
EDOCEDOC-2007-LiningtonL #approach #behaviour #modelling #security
Incorporating Security Behaviour into Business Models Using a Model Driven Approach (PFL, PL), pp. 405–413.
EDOCEDOC-2007-MilanovicKGGWDH #integration #process
Business Process Integration by Using General Rule Markup Language (MM, NK, DG, AG, GW, VD, MH), pp. 353–364.
EDOCEDOC-2007-Molina-JimenezSC #consistency #implementation #message passing #middleware
Implementing Business Conversations with Consistency Guarantees Using Message-Oriented Middleware (CMJ, SKS, NC), pp. 51–62.
EDOCEDOC-2007-RosenbergEMPD #aspect-oriented #development #process #quality #top-down
Integrating Quality of Service Aspects in Top-Down Business Process Development Using WS-CDL and WS-BPEL (FR, CE, AM, CP, SD), pp. 15–26.
EDOCEDOC-2007-SunithaAK
Controlled Delegation in e-cheques Using Proxy Signatures (NRS, BBA, PK), pp. 414–422.
ICEISICEIS-AIDSS-2007-BermejoGP #email
Attribute Construction for E-Mail Foldering by Using Wrappered Forward Greedy Search (PB, JAG, JMP), pp. 247–252.
ICEISICEIS-AIDSS-2007-KirwanGM #adaptation #case study #energy #implementation #information management
Energy Management Information Systems: An Exploratory study of Implementations Using Adaptive Structuration Theory (OK, WG, PM), pp. 303–309.
ICEISICEIS-AIDSS-2007-KrohaR #classification
Using Grammars for Text Classification (PK, TR), pp. 259–264.
ICEISICEIS-AIDSS-2007-LiuCM #recognition
Named Entity Recognition in Biomedical Literature Using Two-Layer Support Vector Machines (FL, YC, BM), pp. 39–48.
ICEISICEIS-AIDSS-2007-YingboJJ #learning #predict #process #workflow
Using Decision Tree Learning to Predict Workflow Activity Time Consumption (YL, JW, JS), pp. 69–75.
ICEISICEIS-DISI-2007-AraqueSD #data flow #monitoring #web
Monitoring web data sources using temporal properties as an external resources of a data warehouse (FA, AS, CD), pp. 28–35.
ICEISICEIS-DISI-2007-CairesC #architecture #semantics #web
Using semantic web and service oriented technologies to build loosely coupled systems: SWOAT — a service and semantic web oriented architecture technology (BC, JC), pp. 226–232.
ICEISICEIS-DISI-2007-Calvo-FloresNGF #case study #fuzzy
Using fuzzy datacubes in the study of trading strategies (MDCF, JFNN, ELGG, JCFM), pp. 164–169.
ICEISICEIS-DISI-2007-GroppeGL #order
Using an index of precomputed joins in order to speed up SPARQL processing (SG, JG, VL), pp. 13–20.
ICEISICEIS-DISI-2007-PapatheocharousA #estimation #network
Software cost estimation using artificial neural networks with inputs selection (EP, ASA), pp. 398–407.
ICEISICEIS-DISI-2007-RaminhosP #approach #declarative
Extraction and transformation of data from semi-structured text files using a declarative approach (RR, JMP), pp. 199–205.
ICEISICEIS-DISI-2007-RayG
A method for early correspondence discovery using instance data (IR, CJMG), pp. 258–263.
ICEISICEIS-EIS-2007-AddinquyT #enterprise #requirements #specification
Reducing Requirements to EIS Specifications GAP Using RM-ODP Enterprise Viewpoint (CA, BT), pp. 31–38.
ICEISICEIS-EIS-2007-KarnouskosS #enterprise #network #towards
Towards Enterprise Applications Using Wireless Sensor Networks (SK, PS), pp. 230–236.
ICEISICEIS-HCI-2007-AraujoB #architecture #education #game studies
Using Games in the Teaching of Digital Systems and of Computers Architecture (PJGdA, JVB), pp. 5–10.
ICEISICEIS-HCI-2007-ArjunanWKY #human-computer #recognition #speech
Silent Bilingual Vowel Recognition — Using fSEMG for HCI based Speech Commands (SPA, HW, DKK, WCY), pp. 68–78.
ICEISICEIS-HCI-2007-FariaBVR #framework #platform
Platform to Drive an Intelligent Wheelchair Using Facial Expressions (PMF, RAMB, EV, LPR), pp. 164–169.
ICEISICEIS-HCI-2007-IshikawaYY #multi #novel
Novel View Telepresence with High-Scalability Using Multi-Casted Omni-Directional Videos (TI, KY, NY), pp. 148–156.
ICEISICEIS-J-2007-ArjunanWKNY #recognition
Recognition of Human Voice Utterances from Facial Surface EMG without Using Audio Signals (SPA, HW, DKK, GRN, WCY), pp. 366–378.
ICEISICEIS-J-2007-Barjis07a #modelling #process #simulation
A Business Process Modeling and Simulation Method Using DEMO (JB), pp. 254–265.
ICEISICEIS-J-2007-CastroO07a #distributed #multi #problem
Solving Airline Operations Problems Using Specialized Agents in a Distributed Multi-Agent System (AJMC, ECO), pp. 173–184.
ICEISICEIS-J-2007-TraversonA #requirements #specification
Linking Requirements to EIS Specifications Using Correspondence Rules (BT, CA), pp. 276–285.
ICEISICEIS-SAIC-2007-BoukadiGMB #petri net #specification #verification #web #web service
Specification and Verification of Views over Composite Web Services Using High Level Petri-Nets (KB, CG, ZM, DB), pp. 107–112.
ICEISICEIS-SAIC-2007-CheungSB #collaboration
Value Creation for SMES Using Collaborative Commerce Marketplaces (YPC, DS, JB), pp. 63–71.
ICEISICEIS-SAIC-2007-GarcesQCHC #e-commerce #modelling #multi #transaction
E-Commerce Transaction Modeling Using Moderately Open Multi-Agent Systems (AG, RQ, MC, JH, EC), pp. 167–172.
ICEISICEIS-SAIC-2007-Maximilien #approach #challenge #problem #ruby #semantics #web #web service
A Partial Solution to the Semantic Web Services Challenge Problem Using Swashup — The Ruby on Rails Services Mashup Approach (EMM), pp. 438–446.
ICEISICEIS-SAIC-2007-PoloniaCO #scalability
A MODEL to Optimize the Use of Imaging Equipment and Human Skills Scattered in Very Large Geographical Areas (DFP, CMAC, JLO), pp. 208–212.
ICEISICEIS-SAIC-2007-RezguiN #categorisation #composition #ontology #semantics
Ontology-Based Dynamic Service Composition Using Semantic Relatedness and Categorization Techniques (YR, SN), pp. 113–120.
ICEISICEIS-SAIC-2007-RuizB #documentation
Summarizing Documents Using Fractal Techniques (MDR, ABB), pp. 26–33.
ICEISICEIS-SAIC-2007-Silva #collaboration
Using Narratives in Collaborative Writing — An Example (NDS), pp. 351–358.
ICEISICEIS-SAIC-2007-WuGRSM #automation #composition #process #semantics #web #web service
Automatic Composition of Semantic Web Services Using Process Mediation (ZW, KG, AR, APS, JAM), pp. 453–462.
CIKMCIKM-2007-CarteretteA #documentation #evaluation #retrieval
Semiautomatic evaluation of retrieval systems using document similarities (BC, JA), pp. 873–876.
CIKMCIKM-2007-GuoCXW #maintenance #online #performance
Efficient on-line index maintenance for dynamic text collections by using dynamic balancing tree (RG, XC, HX, BW), pp. 751–760.
CIKMCIKM-2007-JurczykA #analysis #community
Discovering authorities in question answer communities by using link analysis (PJ, EA), pp. 919–922.
CIKMCIKM-2007-LadY #feedback
Generalizing from relevance feedback using named entity wildcards (AL, YY), pp. 721–730.
CIKMCIKM-2007-LiMGDBM #predict #process
Predicting individual priorities of shared activities using support vector machines (LL, MJM, WG, CD, BB, DRM), pp. 515–524.
CIKMCIKM-2007-Pasca07a #query #web
Weakly-supervised discovery of named entities using web search queries (MP), pp. 683–690.
CIKMCIKM-2007-PeraN #email #similarity #word
Using word similarity to eradicate junk emails (MSP, YKN), pp. 943–946.
CIKMCIKM-2007-WangFZ #feedback #query #retrieval
Improve retrieval accuracy for difficult queries using negative feedback (XW, HF, CZ), pp. 991–994.
CIKMCIKM-2007-XuBCY #information retrieval #social
Using social annotations to improve language model for information retrieval (SX, SB, YC, YY), pp. 1003–1006.
CIKMCIKM-2007-YangQZGL #analysis #graph #web
Link analysis using time series of web graphs (LY, LQ, YPZ, BG, TYL), pp. 1011–1014.
CIKMCIKM-2007-YanH #feedback #multi #probability #query #retrieval
Query expansion using probabilistic local feedback with application to multimedia retrieval (RY, AGH), pp. 361–370.
CIKMCIKM-2007-YuTT #category theory #evaluation #ontology #wiki
Ontology evaluation using wikipedia categories for browsing (JY, JAT, AMT), pp. 223–232.
ECIRECIR-2007-AshooriL #repository #topic #xml
Using Topic Shifts for Focussed Access to XML Repositories (EA, ML), pp. 444–455.
ECIRECIR-2007-AslamP #estimation #multi #query
Query Hardness Estimation Using Jensen-Shannon Divergence Among Multiple Scoring Functions (JAA, VP), pp. 198–209.
ECIRECIR-2007-BrunnertAR #enterprise #people #retrieval #visualisation
Enterprise People and Skill Discovery Using Tolerant Retrieval and Visualization (JB, OA, DR), pp. 674–677.
ECIRECIR-2007-HeD #classification #naive bayes
Improving Naive Bayes Text Classifier Using Smoothing Methods (FH, XD), pp. 703–707.
ECIRECIR-2007-MacdonaldO #feedback
Using Relevance Feedback in Expert Search (CM, IO), pp. 431–443.
ECIRECIR-2007-MartinetS #documentation
Using Visual-Textual Mutual Information and Entropy for Inter-modal Document Indexing (JM, SS), pp. 549–556.
ECIRECIR-2007-Medina-PagolaRHP #distance #documentation #representation
Document Representation Using Global Association Distance Model (JEMP, AYRG, AHD, JHP), pp. 565–572.
ECIRECIR-2007-MeenaP #analysis #sentiment
Sentence Level Sentiment Analysis in the Presence of Conjuncts Using Linguistic Analysis (AM, TVP), pp. 573–580.
ECIRECIR-2007-MeloS #classification #multi #ontology
Multilingual Text Classification Using Ontologies (GdM, SS), pp. 541–548.
ECIRECIR-2007-MoreauCS #automation #machine learning #query
Automatic Morphological Query Expansion Using Analogy-Based Machine Learning (FM, VC, PS), pp. 222–233.
ECIRECIR-2007-PaltoglouSS #algorithm #modelling #multi
Results Merging Algorithm Using Multiple Regression Models (GP, MS, MS), pp. 173–184.
ECIRECIR-2007-RoullandKCRGPO #clustering #query #refinement
Query Reformulation and Refinement Using NLP-Based Sentence Clustering (FR, ANK, SC, CR, AG, KP, JO), pp. 210–221.
ECIRECIR-2007-ShahE #detection #documentation #metric #representation #topic
Use of Topicality and Information Measures to Improve Document Representation for Story Link Detection (CS, KE), pp. 393–404.
ECIRECIR-2007-YamoutOT #feedback #query
Relevance Feedback Using Weight Propagation Compared with Information-Theoretic Query Expansion (FY, MPO, JT), pp. 258–270.
ECIRECIR-2007-YuSLWM #image #ranking
Improve Ranking by Using Image Information (QY, SS, ZL, JRW, WYM), pp. 645–652.
ECIRECIR-2007-ZhangZC #performance #scalability
Efficient Construction of FM-index Using Overlapping Block Processing for Large Scale Texts (DZ, YZ, JC), pp. 113–123.
ECIRECIR-2007-ZwolL #effectiveness #retrieval #semantics #xml
Effective Use of Semantic Structure in XML Retrieval (RvZ, TvL), pp. 621–628.
ICMLICML-2007-DingL #adaptation #analysis #clustering #reduction
Adaptive dimension reduction using discriminant analysis and K-means clustering (CHQD, TL), pp. 521–528.
ICMLICML-2007-GerberTW #reduction #robust
Robust non-linear dimensionality reduction using successive 1-dimensional Laplacian Eigenmaps (SG, TT, RTW), pp. 281–288.
ICMLICML-2007-LeskovecF #graph #modelling #multi #scalability
Scalable modeling of real graphs using Kronecker multiplication (JL, CF), pp. 497–504.
ICMLICML-2007-Mahadevan #3d #adaptation #learning #multi
Adaptive mesh compression in 3D computer graphics using multiscale manifold learning (SM), pp. 585–592.
ICMLICML-2007-NilssonSJ #kernel #reduction
Regression on manifolds using kernel dimension reduction (JN, FS, MIJ), pp. 697–704.
ICMLICML-2007-WipfN
Beamforming using the relevance vector machine (DPW, SSN), pp. 1023–1030.
KDDKDD-2007-BeckerA #concept #ranking #realtime
Real-time ranking with concept drift using expert advice (HB, MA), pp. 86–94.
KDDKDD-2007-ChewBKA #information retrieval
Cross-language information retrieval using PARAFAC2 (PAC, BWB, TGK, AA), pp. 143–152.
KDDKDD-2007-CulottaWHMM #adaptation #database #metric #similarity
Canonicalization of database records using adaptive similarity measures (AC, MLW, RH, MM, AM), pp. 201–209.
KDDKDD-2007-DingSJL #framework #kernel #learning #recommendation
A learning framework using Green’s function and kernel regularization with application to recommender system (CHQD, RJ, TL, HDS), pp. 260–269.
KDDKDD-2007-SatoN #documentation #information management #multi #parametricity #topic
Knowledge discovery of multiple-topic document using parametric mixture model with dirichlet prior (IS, HN), pp. 590–598.
KDDKDD-2007-Schickel-ZuberF #clustering #learning #recommendation
Using hierarchical clustering for learning theontologies used in recommendation systems (VSZ, BF), pp. 599–608.
KDDKDD-2007-SrihariXS #documentation #generative
Use of ranked cross document evidence trails for hypothesis generation (RKS, LX, TS), pp. 677–686.
MLDMMLDM-2007-HanKK #performance #sequence
Efficient Subsequence Matching Using the Longest Common Subsequence with a Dual Match Index (TSH, SKK, JK), pp. 585–600.
MLDMMLDM-2007-MartinsSSPG #classification #image
Classification of Breast Masses in Mammogram Images Using Ripley’s K Function and Support Vector Machine (LdOM, ECdS, ACS, ACdP, MG), pp. 784–794.
MLDMMLDM-2007-PracnerTRI #attribute grammar #categorisation
Categorizing Evolved CoreWar Warriors Using EM and Attribute Evaluation (DP, NT, MR, MI), pp. 681–693.
MLDMMLDM-2007-SunV
Data Selection Using SASH Trees for Support Vector Machines (CS, RV), pp. 286–295.
MLDMMLDM-2007-ZagorisPK #algorithm #fuzzy #reduction #self
Color Reduction Using the Combination of the Kohonen Self-Organized Feature Map and the Gustafson-Kessel Fuzzy Algorithm (KZ, NP, IK), pp. 703–715.
RecSysRecSys-2007-LathiaHC #collaboration #distributed #metric
Private distributed collaborative filtering using estimated concordance measures (NL, SH, LC), pp. 1–8.
RecSysRecSys-2007-NathansonBG #adaptation #clustering #recommendation
Eigentaste 5.0: constant-time adaptability in a recommender system using item clustering (TN, EB, KYG), pp. 149–152.
RecSysRecSys-2007-Vuorikari #education #information retrieval #question #reuse #social
Can social information retrieval enhance the discovery and reuse of digital educational content? (RV), pp. 207–210.
SEKESEKE-2007-AmouiST #network #predict
Temporal Software Change Prediction Using Neural Networks (MA, MS, LT), pp. 380–385.
SEKESEKE-2007-GuzmanPP #modelling #pattern matching
Using Model-Driven Pattern Matching to derive functionalities in Models (IGRdG, MP, MP), pp. 529–534.
SEKESEKE-2007-HofmeisterW #architecture #design #independence #platform
Designing a Platform-Independent Use-Case for a Composite Application using a Reference Architecture (HH, GW), pp. 227–231.
SEKESEKE-2007-HuangL07a #composition #reasoning
Service Composition Using Planning and Case-Based Reasoning (KHH, AL), pp. 610–615.
SEKESEKE-2007-KanaskarSR #analysis #approach #detection
A Dynamical System Approach to Intrusion Detection Using System Call Analysis (NK, RS, SR), pp. 710–717.
SEKESEKE-2007-KrenickyWE #design #query
Exploratory Design of Derivation Business Rules Using Query Rewriting (RK, DW, SME), pp. 467–472.
SEKESEKE-2007-MizouniSD #case study #composition #requirements
Using Formal Composition of Use Cases in Requirements Engineering (RM, AS, RD), p. 238–?.
SEKESEKE-2007-MonteiroOG #implementation #source code #user interface
A Proposal to Delegate GUI Implementation using a Source Code based Model (MM, PO, RG), pp. 29–32.
SEKESEKE-2007-MoserPS #agile #development #incremental #modelling #predict
Incremental Effort Prediction Models in Agile Development using Radial Basis Functions (RM, WP, GS), pp. 519–522.
SEKESEKE-2007-PengJRZ #case study #component #database #product line #reuse
Reuse of Database Access Layer Components in JEE Product Lines: Limitations and a Possible Solution (Case Study) (DP, SJ, DCR, HZ), pp. 308–313.
SEKESEKE-2007-Rhem #modelling #uml
Knowledge Modelling using UML (AJR), p. 755–?.
SEKESEKE-2007-SettasS #ontology #project management
Using Ontologies to Represent Software Project Management Antipatterns (DS, IS), pp. 604–609.
SEKESEKE-2007-TranCT #modelling #process
Broadening the Use of Process Patterns for Modeling Processes (HNT, BC, DTBT), pp. 57–62.
SEKESEKE-2007-WongZQCD #effectiveness #fault #locality #network
Effective Fault Localization using BP Neural Networks (WEW, LZ, YQ, KYC, JD), pp. 374–379.
SIGIRSIGIR-2007-AlonsoGB #timeline #visualisation
Search results using timeline visualizations (OA, MG, RABY), p. 908.
SIGIRSIGIR-2007-AzzopardiRB #analysis #query #topic
Building simulated queries for known-item topics: an analysis using six european languages (LA, MdR, KB), pp. 455–462.
SIGIRSIGIR-2007-BaiNCB #information retrieval #query
Using query contexts in information retrieval (JB, JYN, GC, HB), pp. 15–22.
SIGIRSIGIR-2007-BanerjeeRG #clustering #wiki
Clustering short texts using wikipedia (SB, KR, AG), pp. 787–788.
SIGIRSIGIR-2007-BroderFGJJZ #classification #query #robust #web
Robust classification of rare queries using web knowledge (AZB, MF, EG, AJ, VJ, TZ), pp. 231–238.
SIGIRSIGIR-2007-CastilloDGMS #detection #web
Know your neighbors: web spam detection using the web topology (CC, DD, AG, VM, FS), pp. 423–430.
SIGIRSIGIR-2007-Collins-ThompsonC #estimation #feedback #nondeterminism #pseudo
Estimation and use of uncertainty in pseudo-relevance feedback (KCT, JC), pp. 303–310.
SIGIRSIGIR-2007-Diaz #performance #predict
Performance prediction using spatial autocorrelation (FD), pp. 583–590.
SIGIRSIGIR-2007-FernandezL #analysis #detection
Novelty detection using local context analysis (RTF, DEL), pp. 725–726.
SIGIRSIGIR-2007-FranzX #multi #segmentation
Story segmentation of broadcast news in Arabic, Chinese and English using multi-window features (MF, JMX), pp. 703–704.
SIGIRSIGIR-2007-FuKS #collaboration #query #retrieval #topic
Using collaborative queries to improve retrieval for difficult topics (XF, DK, CS), pp. 879–880.
SIGIRSIGIR-2007-GaoNNZHWH #query
Cross-lingual query suggestion using query logs of different languages (WG, CN, JYN, MZ, JH, KFW, HWH), pp. 463–470.
SIGIRSIGIR-2007-KoAS #effectiveness #feedback #generative #pseudo
An effective snippet generation method using the pseudo relevance feedback technique (YK, HA, JS), pp. 711–712.
SIGIRSIGIR-2007-KyriakopoulouK #classification #clustering
Using clustering to enhance text classification (AK, TK), pp. 805–806.
SIGIRSIGIR-2007-LiLHC #ad hoc #corpus #query #wiki
Improving weak ad-hoc queries using wikipedia as external corpus (YL, RWPL, EKSH, KFLC), pp. 797–798.
SIGIRSIGIR-2007-LiuHAY #named #performance #predict #sentiment
ARSA: a sentiment-aware model for predicting sales performance using blogs (YL, XH, AA, XY), pp. 607–614.
SIGIRSIGIR-2007-Metzler #modelling #parametricity
Using gradient descent to optimize language modeling smoothing parameters (DM), pp. 687–688.
SIGIRSIGIR-2007-MetzlerC #concept #markov #random
Latent concept expansion using markov random fields (DM, WBC), pp. 311–318.
SIGIRSIGIR-2007-QiuLBCK #ambiguity #metadata #query
Quantify query ambiguity using ODP metadata (GQ, KL, JB, CC, ZK), pp. 697–698.
SIGIRSIGIR-2007-SitbonB #segmentation #topic
Topic segmentation using weighted lexical links (WLL) (LS, PB), pp. 737–738.
SIGIRSIGIR-2007-SmuckerA #similarity #web
Using similarity links as shortcuts to relevant web pages (MDS, JA), pp. 863–864.
SIGIRSIGIR-2007-TurnbullBTL #semantics #set #towards
Towards musical query-by-semantic-description using the CAL500 data set (DT, LB, DAT, GRGL), pp. 439–446.
SIGIRSIGIR-2007-Wan #clustering #documentation #evaluation #named
OMES: a new evaluation strategy using optimal matching for document clustering (XW), pp. 693–694.
SIGIRSIGIR-2007-WhiteBC #interactive #web
Studying the use of popular destinations to enhance web search interaction (RWW, MB, SC), pp. 159–166.
SIGIRSIGIR-2007-ZhangHRJ #learning #query
Query rewriting using active learning for sponsored search (WVZ, XH, BR, RJ), pp. 853–854.
SIGIRSIGIR-2007-ZhengCSZ #framework #learning #ranking
A regression framework for learning ranking functions using relative relevance judgments (ZZ, KC, GS, HZ), pp. 287–294.
SIGIRSIGIR-2007-ZhuYCG #classification #matrix
Combining content and link for classification using matrix factorization (SZ, KY, YC, YG), pp. 487–494.
ECMFAECMDA-FA-2007-Warmer #domain-specific language #modelling
A Model Driven Software Factory Using Domain Specific Languages (JW), pp. 194–203.
MODELSMoDELS-2007-JayaramanWEG #analysis #composition #detection #feature model #interactive #product line
Model Composition in Product Lines and Feature Interaction Detection Using Critical Pair Analysis (PKJ, JW, AME, HG), pp. 151–165.
MODELSMoDELS-2007-PilskalnsWI #debugging #runtime #uml
Runtime Debugging Using Reverse-Engineered UML (OP, SW, FI), pp. 605–619.
SPLCSPLC-2007-BeucheBDFGHJJKMW #product line #requirements #tool support
Using Requirements Management Tools in Software Product Line Engineering: The State of the Practice (DB, AB, HD, AF, HG, GH, DJ, IJ, RTK, TvdM, AW), pp. 84–96.
SPLCSPLC-2007-KastnerAB #aspectj #case study #implementation
A Case Study Implementing Features Using AspectJ (CK, SA, DSB), pp. 223–232.
SPLCSPLC-2007-VolterG #aspect-oriented #development #implementation #modelling #product line
Product Line Implementation using Aspect-Oriented and Model-Driven Software Development (MV, IG), pp. 233–242.
MODELSMoDELS-2007-JayaramanWEG #analysis #composition #detection #feature model #interactive #product line
Model Composition in Product Lines and Feature Interaction Detection Using Critical Pair Analysis (PKJ, JW, AME, HG), pp. 151–165.
MODELSMoDELS-2007-PilskalnsWI #debugging #runtime #uml
Runtime Debugging Using Reverse-Engineered UML (OP, SW, FI), pp. 605–619.
ECOOPECOOP-2007-DoorenS #abstraction #inheritance
A Higher Abstraction Level Using First-Class Inheritance Relations (MvD, ES), pp. 425–449.
ECOOPECOOP-2007-VaziriTFD #declarative
Declarative Object Identity Using Relation Types (MV, FT, SF, JD), pp. 54–78.
OOPSLAOOPSLA-2007-BuytaertGHAEB #compilation
Using hpm-sampling to drive dynamic compilation (DB, AG, MH, MA, LE, KDB), pp. 553–568.
OOPSLAOOPSLA-2007-Rinard #termination
Using early phase termination to eliminate load imbalances at barrier synchronization points (MCR), pp. 369–386.
AdaEuropeAdaEurope-2007-AlonsoVSAL #ada #approach #automation #code generation #modelling
Automatic Ada Code Generation Using a Model-Driven Engineering Approach (DA, CVC, PS, , FL), pp. 168–179.
LOPSTRLOPSTR-2007-ZhangN #constraints #scalability #theorem proving #unification
A Scalable Inclusion Constraint Solver Using Unification (YZ, FN), pp. 121–137.
PADLPADL-2007-AlbertGHP #analysis #bytecode #java #logic programming #source code #verification
Verification of Java Bytecode Using Analysis and Transformation of Logic Programs (EA, MGZ, LH, GP), pp. 124–139.
PADLPADL-2007-FisselerKBKM #algebra #haskell #information management
Algebraic Knowledge Discovery Using Haskell (JF, GKI, CB, AK, CM), pp. 80–93.
PADLPADL-2007-HuangHP #named #parallel #process
HPorter: Using Arrows to Compose Parallel Processes (LH, PH, JP), pp. 275–289.
PEPMPEPM-2007-RooverDBND #behaviour #logic #query #similarity #source code
Behavioral similarity matching using concrete source code templates in logic queries (CDR, TD, JB, CN, LD), pp. 92–101.
PLDIPLDI-2007-CheremPR #analysis #detection #memory management
Practical memory leak detection using guarded value-flow analysis (SC, LP, RR), pp. 480–491.
PLDIPLDI-2007-DilligDA #consistency #detection #fault #nondeterminism #semantics
Static error detection using semantic inconsistency inference (ID, TD, AA), pp. 435–445.
PLDIPLDI-2007-RamanathanGJ #mining #specification
Static specification inference using predicate mining (MKR, AG, SJ), pp. 123–134.
POPLPOPL-2007-ShenSMD #approximate #locality
Locality approximation using time (XS, JS, BM, CD), pp. 55–61.
PPDPPPDP-2007-Lucas #proving #termination
Practical use of polynomials over the reals in proofs of termination (SL), pp. 39–50.
PPDPPPDP-2007-Sagonas #detection #erlang #fault #source code #static analysis
Detecting defects in Erlang programs using static analysis (KFS), p. 37.
QAPLQAPL-2007-BistarelliMRS #constraints #graph #logic programming #modelling #multi
Modelling Multicast QoS Routing by using Best-Tree Search in And-or Graphs and Soft Constraint Logic Programming (SB, UM, FR, FS), pp. 111–127.
QAPLQAPL-2007-YaikhomCGH #approach #modelling #performance
A Structural Approach for Modelling Performance of Systems Using Skeletons (GY, MC, SG, JH), pp. 167–183.
SASSAS-2007-SankaranarayananIG #program analysis
Program Analysis Using Symbolic Ranges (SS, FI, AG), pp. 366–383.
SASSAS-2007-Tip #constraints #refactoring
Refactoring Using Type Constraints (FT), pp. 1–17.
AdaSIGAda-2007-Lau #imperative #reasoning #source code
Using SPARK for a beginner’s course on reasoning about imperative programs (KKL), pp. 75–78.
AdaSIGAda-2007-Maurer #ada #proving
Using mathematics to improve ada compiled code, part 2: the proof (WDM), pp. 11–26.
AdaSIGAda-2007-PukiteL #design #logic #simulation
Generic discrete event simulations using DEGAS: application to logic design and digital signal processing (PP, LL), pp. 27–40.
AdaSIGAda-2007-Sward #ada #architecture #named #web #web service
SP2: exposing ada web services using a service-oriented architecture (SOA) (RES), p. 4.
AdaSIGAda-2007-Sward07a #ada #architecture
Using ada in a service-Ooriented architecture (RES), pp. 63–68.
RERE-2007-BhatG #maintenance
Enhancing Requirement Stakeholder Satisfaction during Far-shore Maintenance of Custom Developed Software using Shift-Pattern Model (JMB, MG), pp. 322–327.
RERE-2007-ConejeroHMA #requirements
Discovering Volatile and Aspectual Requirements Using a Crosscutting Pattern (JMC, JH, AMDM, JA), pp. 391–392.
RERE-2007-Fricker #network #social
Explaining Stakeholder Negotiation Using Social Goal Networks (SF), pp. 387–388.
RERE-2007-KartsevaGT #design #enterprise
Value-based Design of Networked Enterprises Using e3control Patterns (VK, JG, YHT), pp. 91–100.
RERE-2007-MaidenLRJB #modelling
Using Satisfaction Arguments to Enhance i* Modelling of an Air Traffic Management System (NAMM, JL, DR, SJ, DB), pp. 49–52.
RERE-2007-MunirajJ #prototype #requirements
Requirements Engineering using Prototyping Projects in Healthcare Diagnostic Software Applications (GM, VJ), pp. 307–312.
RERE-2007-SmithG #game studies #lightweight #requirements
Using a Game to Introduce Lightweight Requirements Engineering (RS, OG), pp. 379–380.
REFSQREFSQ-2007-FrickerGM #implementation
Handshaking Between Software Projects and Stakeholders Using Implementation Proposals (SF, TG, PM), pp. 144–159.
ASEASE-2007-CabotCR #constraints #modelling #named #ocl #programming #uml #verification
UMLtoCSP: a tool for the formal verification of UML/OCL models using constraint programming (JC, RC, DR), pp. 547–548.
ASEASE-2007-ChenM #concurrent #source code #testing
Testing concurrent programs using value schedules (JC, SM), pp. 313–322.
ASEASE-2007-ClauseDOP #effectiveness #memory management
Effective memory protection using dynamic tainting (JAC, ID, AO, MP), pp. 284–292.
ASEASE-2007-LemosBOMMBL #named #reuse #source code
CodeGenie: using test-cases to search and reuse source code (OALL, SKB, JO, RSM, PCM, PB, CVL), pp. 525–526.
ASEASE-2007-MajumdarX #generative #testing
Directed test generation using symbolic grammars (RM, RGX), pp. 134–143.
ASEASE-2007-NaslavskyR #modelling #testing #traceability
Using traceability to support model-based regression testing (LN, DJR), pp. 567–570.
ASEASE-2007-PoshyvanykM #design #incremental #information retrieval
Using information retrieval to support design of incremental change of software (DP, AM), pp. 563–566.
ESEC-FSEESEC-FSE-2007-Coman #analysis #automation #developer #low level
An analysis of developers’ tasks using low-level, automatically collected data (IDC), pp. 579–582.
ESEC-FSEESEC-FSE-2007-GrechanikMP #traceability
Recovering and using use-case-diagram-to-source-code traceability links (MG, KSM, DEP), pp. 95–104.
ESEC-FSEESEC-FSE-2007-HalfondO #automation #generative #interface #testing #web
Improving test case generation for web applications using automated interface discovery (WGJH, AO), pp. 145–154.
ESEC-FSEESEC-FSE-2007-MajumdarX #generative #testing
Directed test generation using symbolic grammars (RM, RGX), pp. 553–556.
ESEC-FSEESEC-FSE-2007-PatelBS #capacity #case study
A case study in assessing and improving capacity using an anatomy of good practice (MP, AB, KS), pp. 509–512.
ESEC-FSEESEC-FSE-2007-SankaranarayananCJI #constraints #feedback #generative #monte carlo
State space exploration using feedback constraint generation and Monte-Carlo sampling (SS, RMC, GJ, FI), pp. 321–330.
ESEC-FSEESEC-FSE-2007-SherriffHLW #identification #static analysis
Using groupings of static analysis alerts to identify files likely to contain field failures (MS, SSH, JML, LAW), pp. 565–568.
ESEC-FSEESEC-FSE-2007-XuRTQ #java #performance
Efficient checkpointing of java software using context-sensitive capture and replay (G(X, AR, YT, FQ), pp. 85–94.
ESEC-FSEESEC-FSE-2007-ZibinPAAKE #java
Object and reference immutability using java generics (YZ, AP, MA, SA, AK, MDE), pp. 75–84.
GTTSEGTTSE-2007-SeguraBCT #automation #feature model #graph transformation #modelling
Automated Merging of Feature Models Using Graph Transformations (SS, DB, ARC, PT), pp. 489–505.
ICSEICSE-2007-BernerWK #test coverage #testing
Enhancing Software Testing by Judicious Use of Code Coverage Information (SB, RW, RKK), pp. 612–620.
ICSEICSE-2007-BestJN #distributed #information management #modelling #security
Model-Based Security Engineering of Distributed Information Systems Using UMLsec (BB, JJ, BN), pp. 581–590.
ICSEICSE-2007-GanapathyKJJ #concept analysis #legacy #mining
Mining Security-Sensitive Operations in Legacy Code Using Concept Analysis (VG, DK, TJ, SJ), pp. 458–467.
ICSEICSE-2007-LivieriHMI #analysis #distributed #open source #source code #visualisation
Very-Large Scale Code Clone Analysis and Visualization of Open Source Programs Using Distributed CCFinder: D-CCFinder (SL, YH, MM, KI), pp. 106–115.
ICSEICSE-2007-RajapakseJ #analysis #trade-off #web
Using Server Pages to Unify Clones in Web Applications: A Trade-Off Analysis (DCR, SJ), pp. 116–126.
ICSEICSE-2007-RunesonAN #detection #fault #natural language
Detection of Duplicate Defect Reports Using Natural Language Processing (PR, MA, ON), pp. 499–510.
ICSEICSE-2007-Staron #education #evaluation #learning #process #re-engineering #student
Using Experiments in Software Engineering as an Auxiliary Tool for Teaching — A Qualitative Evaluation from the Perspective of Students’ Learning Process (MS), pp. 673–676.
ICSEICSE-2007-YuanM #feedback #runtime #testing #user interface
Using GUI Run-Time State as Feedback to Generate Test Cases (XY, AMM), pp. 396–405.
ICSEICSE-2007-Zualkernan #learning #programming
Using Soloman-Felder Learning Style Index to Evaluate Pedagogical Resources for Introductory Programming Classes (IAZ), pp. 723–726.
SACSAC-2007-AhamedHSK #pervasive
Wellness assistant: a virtual wellness assistant using pervasive computing (SIA, MMH, KS, AJK), pp. 782–787.
SACSAC-2007-Avila-GarciaER #modelling #product line
Using software product lines to manage model families in model-driven engineering (OAG, AE, EVSR), pp. 1006–1011.
SACSAC-2007-BistarelliFP
Using CP-nets as a guide for countermeasure selection (SB, FF, PP), pp. 300–304.
SACSAC-2007-BoussellaaZA #hybrid
A methodology for the separation of foreground/background in Arabic historical manuscripts using hybrid methods (WB, AZ, AMA), pp. 605–609.
SACSAC-2007-BraghettoFP #control flow #process #specification
Using control-flow patterns for specifying business processes in cooperative environments (KRB, JEF, CP), pp. 1234–1241.
SACSAC-2007-CambroneroPDV #modelling #web #web service
Using RT-UML for modelling web services (MEC, JJP, GD, VV), pp. 643–648.
SACSAC-2007-Cardoso-CachopoO #categorisation #classification
Semi-supervised single-label text categorization using centroid-based classifiers (ACC, ALO), pp. 844–851.
SACSAC-2007-ChenL #hardware
Use of hardware Z-buffered rasterization to accelerate ray tracing (CCC, DSML), pp. 1046–1050.
SACSAC-2007-Chiong #algorithm #search-based
Applying genetic algorithms to economy market using iterated prisoner’s dilemma (RC), pp. 733–737.
SACSAC-2007-CimadamoreV #approach #java
Reifying wildcards in Java using the EGO approach (MC, MV), pp. 1315–1322.
SACSAC-2007-DjelloulDF #constraints #finite #first-order #infinity #prolog #theorem proving #towards #unification
Toward a first-order extension of Prolog’s unification using CHR: a CHR first-order constraint solver over finite or infinite trees (KD, TBHD, TWF), pp. 58–64.
SACSAC-2007-FabroV #automation #integration #modelling #weaving
Semi-automatic model integration using matching transformations and weaving models (MDDF, PV), pp. 963–970.
SACSAC-2007-FangWLYD #assessment #detection #multi #sequence
The detection and assessment of possible RNA secondary structure using multiple sequence alignment (XF, ZW, ZL, BY, FD), pp. 133–137.
SACSAC-2007-GooneratneTH #algorithm #graph #traversal #verification #web #web service
Verification of web service descriptions using graph-based traversal algorithms (NG, ZT, JH), pp. 1385–1392.
SACSAC-2007-HuXP #approach #modelling
Modeling deceptive information dissemination using a holistic approach (YH, ZX, BP), pp. 1591–1598.
SACSAC-2007-KawsarFN #lightweight
A lightweight indoor location model for sentient artefacts using sentient artefacts (FK, KF, TN), pp. 1624–1631.
SACSAC-2007-Kofron #behaviour #component #protocol
Checking software component behavior using behavior protocols and spin (JK), pp. 1513–1517.
SACSAC-2007-LebbahMR #constraints #implementation #performance #reduction
Using constraint techniques for a safe and fast implementation of optimality-based reduction (YL, CM, MR), pp. 326–331.
SACSAC-2007-LeeHPLJK #performance #regular expression
A high performance NIDS using FPGA-based regular expression matching (JL, SHH, NP, SWL, SJ, YSK), pp. 1187–1191.
SACSAC-2007-MilsztajnG #3d #algorithm #markov #random #search-based #segmentation
Three-dimensional segmentation of brain tissues using Markov random fields and genetic algorithms (FM, KdG), pp. 745–746.
SACSAC-2007-NollR #ontology #traceability
Enhancing traceability using ontologies (RPN, MBR), pp. 1496–1497.
SACSAC-2007-NoordendeBT #mobile #security
Guarding security sensitive content using confined mobile agents (Gv'N, FMTB, AST), pp. 48–55.
SACSAC-2007-OHareGJLOS
Using text search for personal photo collections with the MediAssist system (NO, CG, GJFJ, HL, NEO, AFS), pp. 880–881.
SACSAC-2007-OliveiraAS #component #formal method #model checking #modelling #petri net #verification
Formal modelling and verification of a component model using coloured petri nets and model checking (EASO, HOdA, LDdS), pp. 1427–1431.
SACSAC-2007-PaliwalAB #distributed #verification #web #web service
Web service orchestration and verification using MSC and CP nets (AVP, NRA, CB), pp. 1693–1694.
SACSAC-2007-PaulK #precise #slicing
Precise dynamic slicing using execution-summary (AP, RK), pp. 1330–1331.
SACSAC-2007-PereraGB #low level #visualisation
Preattentive processing: using low-level vision psychology to encode information in visualisations (NP, AG, KB), pp. 1090–1091.
SACSAC-2007-PlattGM #detection #on the #query #sequence #topic
On using user query sequence to detect off-topic search (AP, NG, SSRM), pp. 882–883.
SACSAC-2007-PolatD #privacy
Effects of inconsistently masked data using RPT on CF with privacy (HP, WD), pp. 649–653.
SACSAC-2007-SarfrazR #algorithm #image #polynomial #random
A randomized knot insertion algorithm for outline capture of planar images using cubic spline (MS, AR), pp. 71–75.
SACSAC-2007-TanC #classification
Using hypothesis margin to boost centroid text classifier (ST, XC), pp. 398–403.
SACSAC-2007-TetsuyaAHN #ad hoc #generative #network
Topology information generation methods using a routing table in ad hoc network applications (TT, AK, TH, SN), pp. 896–900.
SACSAC-2007-VarroB #automation #induction #logic programming #model transformation
Automating model transformation by example using inductive logic programming (DV, ZB), pp. 978–984.
SACSAC-2007-VuMTA #knowledge base #web
Using a knowledge base to disambiguate personal name in web search results (QMV, TM, AT, JA), pp. 839–843.
SACSAC-2007-XingXE #approximate #automation #documentation #xml
Building automatic mapping between XML documents using approximate tree matching (GX, ZX, AE), pp. 525–526.
SACSAC-2007-XiongCL #classification #database #mining #multi
Mining multiple private databases using a kNN classifier (LX, SC, LL), pp. 435–440.
SACSAC-2007-YiYC #mobile #multi
Tracking multiple mobile objects using IEEE 802.15.4-based ultrasonic sensor devices (SY, JY, HC), pp. 1638–1639.
SACSAC-2007-ZhangMMB #locality #network #performance #problem #self
Performance problem localization in self-healing, service-oriented systems using Bayesian networks (RZ, SM, SM, AB), pp. 104–109.
SACSAC-2007-ZhouHP #database #image
An additive-attack-proof watermarking mechanism for databases’ copyrights protection using image (XZ, MH, ZP), pp. 254–258.
GPCEGPCE-2007-JarviMS #adaptation #c++ #composition #concept #library
Library composition and adaptation using c++ concepts (JJ, MAM, JNS), pp. 73–82.
CASECASE-2007-AramakiNKHT #interface #knowledge base
Human-Robot Interface by using frame like knowledge base (SA, TN, MK, YH, TT), pp. 729–734.
CASECASE-2007-BasileCT #fault #online
Improving on-line fault diagnosis for discrete event systems using time (FB, PC, GDT), pp. 26–32.
CASECASE-2007-BukkapatnamK #monitoring
Container Integrity and Condition Monitoring using RF Vibration Sensor Tags (STSB, RK), pp. 585–590.
CASECASE-2007-ChalfounBKP #fault #matrix
Calibration Using Generalized Error Matrices of a Long Reach Articulated Carrier (JC, CB, DK, YP), pp. 777–782.
CASECASE-2007-FalkmanLA #specification
Specification of Production Systems using PPN and Sequential Operation Charts (PF, BL, KA), pp. 20–25.
CASECASE-2007-FontanelliRS #algorithm #locality #metric #performance
A Fast RANSAC-Based Registration Algorithm for Accurate Localization in Unknown Environments using LIDAR Measurements (DF, LR, SS), pp. 597–602.
CASECASE-2007-Gonzalez-CastoloL #approximate #fuzzy #petri net
Approximating State of DES Using Fuzzy Timed Petri Nets (JCGC, ELM), pp. 722–728.
CASECASE-2007-JacksonCM
A Rationale for the use of Optical Mice Chips for Economic and Accurate Vehicle Tracking (JDJ, DWC, JM), pp. 939–944.
CASECASE-2007-KimCAY #mobile
RFID-enabled Target Tracking and Following with a Mobile Robot Using Direction Finding Antennas (MK, NYC, HSA, WY), pp. 1014–1019.
CASECASE-2007-KimLSSZ #approach #biology #metric #performance
Iterative Control Approach to High-Speed Force-Distance Curve Measurement Using AFM for Biological Applications (KSK, ZL, PS, SS, QZ), pp. 219–224.
CASECASE-2007-KimLSSZ07a #approach #biology #metric #performance
Iterative Control Approach to High-Speed Force-Distance Curve Measurement Using AFM for Biological Applications (KSK, ZL, PS, SS, QZ), p. 91–?.
CASECASE-2007-LamLY #automation #framework #platform #sketching
Robot Drawing Techniques for Contoured Surface Using an Automated Sketching Platform (JHML, KWL, YY), pp. 735–740.
CASECASE-2007-LiuWL #algorithm #design #effectiveness #multi #platform #product line #search-based #towards
Towards Effective Multi-platforming Design of Product Family using Genetic Algorithm (ZL, YSW, KSL), pp. 300–305.
CASECASE-2007-LjungkrantzA #case study #component #industrial #library #logic #programming
A Study of Industrial Logic Control Programming using Library Components (OL, ), pp. 117–122.
CASECASE-2007-LuHF #network #process #robust #smarttech
Creating Robust Activity Maps Using Wireless Sensor Network in a Smart Home (CHL, YcH, LCF), pp. 741–746.
CASECASE-2007-LuimulaSPPAL #mobile #ubiquitous
Improving the Remote Control of a Mobile Robot Using Positioning and Ubiquitous Techniques (ML, KS, TP, SP, JA, AL), pp. 1027–1033.
CASECASE-2007-MarefatP #automation #modelling #process #retrieval #reuse #similarity
Similarity-Based Retrieval of CAD Solid Models for Automated Reuse of Machining Process Plans (MMM, CP), pp. 312–317.
CASECASE-2007-McVittieSMMLHM #automation #classification
Automated Classification of Macrophage Membrane Integrity using a Fluorescent Live/Dead Stain (PM, CSS, TWM, SM, MEL, MH, DRM), pp. 554–559.
CASECASE-2007-MitaniYH #analysis
Feeding of Submillimeter-sized Microparts along a Saw-tooth Surface Using Only Horizontal Vibration: Analysis of Convexities on the Surface of Microparts (AM, TY, SH), pp. 69–76.
CASECASE-2007-SarkisSD #automation #modelling #parametricity
Modeling the Variation of the Intrinsic Parameters of an Automatic Zoom Camera System using Moving Least-Squares (MS, CTS, KD), pp. 560–565.
CASECASE-2007-WangLS #injection
Autonomous Zebrafish Embryo Injection Using a Microrobotic System (WW, XL, YS), pp. 363–368.
CASECASE-2007-YamamotoFI #3d #metric #multi #performance
A High-Speed 3D Shape Measurement System Using a Multi-Sided Mirror (KY, HF, II), pp. 823–828.
CASECASE-2007-YogeswaranPT #algorithm #heuristic #hybrid #problem #search-based
An hybrid heuristic using genetic algorithm and simulated annealing algorithm to solve machine loading problem in FMS (MY, SGP, MKT), pp. 182–187.
CASECASE-2007-YoonHMSR #algorithm #image #navigation #performance
Efficient Navigation Algorithm Using 1D Panoramic Images (SY, WH, SKM, YS, KSR), pp. 536–541.
CASECASE-2007-YuanZCC #automation
Automatic Mixing of Bio-Samples Using Micro-Channel and Centrifugation (LY, YFZ, WC, MC), pp. 634–639.
CASECASE-2007-ZuHT #coordination #generative #integer #linear #programming
Trajectory Generation in Relative Velocity Coordinates Using Mixed Integer Linear Programming with IHDR Guidance (DZ, JH, DT), pp. 1125–1130.
CCCC-2007-JeonSH #data access #layout
Layout Transformations for Heap Objects Using Static Access Patterns (JJ, KS, HH), pp. 187–201.
CCCC-2007-LeeRBM #constraints #control flow #graph
Correcting the Dynamic Call Graph Using Control-Flow Constraints (BL, KR, MDB, KSM), pp. 80–95.
CCCC-2007-NagarakatteG #integer #linear #pipes and filters #programming #scheduling
Register Allocation and Optimal Spill Code Scheduling in Software Pipelined Loops Using 0-1 Integer Linear Programming Formulation (SGN, RG), pp. 126–140.
CCCC-2007-PazP #garbage collection
Using Prefetching to Improve Reference-Counting Garbage Collectors (HP, EP), pp. 48–63.
CCCC-2007-ScholzB #analysis #composition #data flow #framework
A New Elimination-Based Data Flow Analysis Framework Using Annotated Decomposition Trees (BS, JB), pp. 202–217.
CGOCGO-2007-BarthouDCDJ #compilation #composition #kernel #optimisation
Loop Optimization using Hierarchical Compilation and Kernel Decomposition (DB, SD, PC, AD, WJ), pp. 170–184.
CGOCGO-2007-CavazosFABOT #compilation #optimisation #performance
Rapidly Selecting Good Compiler Optimizations using Performance Counters (JC, GF, FVA, EVB, MFPO, OT), pp. 185–197.
CGOCGO-2007-DaiLH #execution #network #pipes and filters
Pipelined Execution of Critical Sections Using Software-Controlled Caching in Network Processors (JD, LL, BH), pp. 312–324.
CGOCGO-2007-GrzegorczykSKW #feedback
Isla Vista Heap Sizing: Using Feedback to Avoid Paging (CG, SS, CK, RW), pp. 325–340.
COCVCOCV-2007-FangS #bidirectional #compilation #generative #java
Generating Java Compiler Optimizers Using Bidirectional CTL (LF, MS), pp. 49–63.
DACDAC-2007-AksoyCFM #metric #optimisation
Optimization of Area in Digital FIR Filters using Gate-Level Metrics (LA, EACdC, PFF, JCM), pp. 420–423.
DACDAC-2007-ChenL #statistics #testing
Extraction of Statistical Timing Profiles Using Test Data (YYC, JJL), pp. 509–514.
DACDAC-2007-CzajkowskiB
Using Negative Edge Triggered FFs to Reduce Glitching Power in FPGA Circuits (TSC, SDB), pp. 324–329.
DACDAC-2007-DengBWYZ #named #performance #satisfiability
EHSAT: An Efficient RTL Satisfiability Solver Using an Extended DPLL Procedure (SD, JB, WW, XY, YZ), pp. 588–593.
DACDAC-2007-DongL #performance #simulation
Accelerating Harmonic Balance Simulation Using Efficient Parallelizable Hierarchical Preconditioning (WD, PL), pp. 436–439.
DACDAC-2007-FengLZ #analysis #higher-order #parametricity #performance #reduction #statistics
Fast Second-Order Statistical Static Timing Analysis Using Parameter Dimension Reduction (ZF, PL, YZ), pp. 244–249.
DACDAC-2007-GhodratLR #analysis #estimation #hybrid
Accelerating System-on-Chip Power Analysis Using Hybrid Power Estimation (MAG, KL, AR), pp. 883–886.
DACDAC-2007-HallschmidS #automation #energy #modelling
Automatic Cache Tuning for Energy-Efficiency using Local Regression Modeling (PH, RS), pp. 732–737.
DACDAC-2007-KangKIAR #estimation #metric #online #reliability
Characterization and Estimation of Circuit Reliability Degradation under NBTI using On-Line IDDQ Measurement (KK, KK, AEI, MAA, KR), pp. 358–363.
DACDAC-2007-KangKR #design #power management
Variation Resilient Low-Power Circuit Design Methodology using On-Chip Phase Locked Loop (KK, KK, KR), pp. 934–939.
DACDAC-2007-KocKEO #embedded #memory management #multi
Reducing Off-Chip Memory Access Costs Using Data Recomputation in Embedded Chip Multi-processors (HK, MTK, EE, ÖÖ), pp. 224–229.
DACDAC-2007-LiuLC #algorithm #approximate #multi #optimisation
A Provably Good Approximation Algorithm for Power Optimization Using Multiple Supply Voltages (HYL, WPL, YWC), pp. 887–890.
DACDAC-2007-RamalingamSNOP #analysis #composition #modelling
Accurate Waveform Modeling using Singular Value Decomposition with Applications to Timing Analysis (AR, AKS, SRN, MO, DZP), pp. 148–153.
DACDAC-2007-YeZL #optimisation #performance #power management #statistics
Statistical Leakage Power Minimization Using Fast Equi-Slack Shell Based Optimization (XY, YZ, PL), pp. 853–858.
DACDAC-2007-ZhouLS #bound #embedded #hybrid #multi #performance
Fast Capacitance Extraction in Multilayer, Conformal and Embedded Dielectric using Hybrid Boundary Element Method (NYZ, ZL, WS), pp. 835–840.
DACDAC-2007-ZhuGSDK #architecture #power management #towards
Towards An Ultra-Low-Power Architecture Using Single-Electron Tunneling Transistors (CZ, Z(G, LS, RPD, RGK), pp. 312–317.
DATEDATE-2007-AnisN #architecture #debugging #interactive #low cost
Interactive presentation: Low cost debug architecture using lossy compression for silicon debug (EA, NN), pp. 225–230.
DATEDATE-2007-BorremansLWR #analysis #multi
Nonlinearity analysis of Analog/RF circuits using combined multisine and volterra analysis (JB, LDL, PW, YR), pp. 261–266.
DATEDATE-2007-ChangLR #performance
Improve CAM power efficiency using decoupled match line scheme (YJC, YHL, SJR), pp. 165–170.
DATEDATE-2007-CiesielskiAGGB #data flow #diagrams
Data-flow transformations using Taylor expansion diagrams (MJC, SA, DGP, JG, EB), pp. 455–460.
DATEDATE-2007-ClausZMS #configuration management #hardware #video
Using partial-run-time reconfigurable hardware to accelerate video processing in driver assistance system (CC, JZ, FHM, WS), pp. 498–503.
DATEDATE-2007-ErdoganO #analysis
An ADC-BiST scheme using sequential code analysis (ESE, SO), pp. 713–718.
DATEDATE-2007-FaragES #2d #configuration management
Improving utilization of reconfigurable resources using two dimensional compaction (AAEF, HMEB, SIS), pp. 135–140.
DATEDATE-2007-GhoshBR #adaptation #scheduling #synthesis
Low-overhead circuit synthesis for temperature adaptation using dynamic voltage scheduling (SG, SB, KR), pp. 1532–1537.
DATEDATE-2007-GuptaOJWB #comprehension #distributed #multi #network
Understanding voltage variations in chip multiprocessors using a distributed power-delivery network (MSG, JLO, RJ, GYW, DMB), pp. 624–629.
DATEDATE-2007-HaastregtK #interactive #optimisation #performance #random
Interactive presentation: Feasibility of combined area and performance optimization for superscalar processors using random search (SvH, PMWK), pp. 606–611.
DATEDATE-2007-HosseinabadyDN #testing
Using the inter- and intra-switch regularity in NoC switch testing (MH, AD, ZN), pp. 361–366.
DATEDATE-2007-HuangT #analysis #correlation #multi #performance
Performance analysis of multimedia applications using correlated streams (KH, LT), pp. 912–917.
DATEDATE-2007-KraemerLAM #interactive #parallel #program transformation #source code
Interactive presentation: SoftSIMD — exploiting subword parallelism using source code transformations (SK, RL, GA, HM), pp. 1349–1354.
DATEDATE-2007-KroeningS #image #interactive #proving #refinement #word
Interactive presentation: Image computation and predicate refinement for RTL verilog using word level proofs (DK, NS), pp. 1325–1330.
DATEDATE-2007-LaouamriA #framework #network #testing
Remote testing and diagnosis of System-on-Chips using network management frameworks (OL, CA), pp. 373–378.
DATEDATE-2007-LataireVP #design #interactive #multi #optimisation
Interactive presentation: Optimizing analog filter designs for minimum nonlinear distortions using multisine excitations (JL, GV, RP), pp. 267–272.
DATEDATE-2007-MangassarianVSNA #estimation #process #pseudo #satisfiability
Maximum circuit activity estimation using pseudo-boolean satisfiability (HM, AGV, SS, FNN, MSA), pp. 1538–1543.
DATEDATE-2007-MarianiBC #design
Using an innovative SoC-level FMEA methodology to design in compliance with IEC61508 (RM, GB, FC), pp. 492–497.
DATEDATE-2007-MuellerGS #design #polynomial #programming #trade-off
Trade-off design of analog circuits using goal attainment and “Wave Front” sequential quadratic programming (DM, HEG, US), pp. 75–80.
DATEDATE-2007-NardiTNAGLS #analysis #design #statistics
Use of statistical timing analysis on real designs (AN, ET, SN, AA, SG, TL, JS), pp. 1605–1610.
DATEDATE-2007-QuSN #configuration management #energy #interactive #runtime #scalability
Interactive presentation: Using dynamic voltage scaling to reduce the configuration energy of run time reconfigurable devices (YQ, JPS, JN), pp. 147–152.
DATEDATE-2007-RenterghemDVVQ #compilation #development
Development of an ASIP enabling flows in ethernet access using a retargetable compilation flow (KVR, PD, DV, JV, XZQ), pp. 1418–1423.
DATEDATE-2007-RousseauMGMLDG #certification #configuration management
Enabling certification for dynamic partial reconfiguration using a minimal flow (BR, PM, DG, DM, JDL, FD, YG), pp. 983–988.
DATEDATE-2007-SeongM #performance #taxonomy
An efficient code compression technique using application-aware bitmask and dictionary selection methods (SWS, PM), pp. 582–587.
DATEDATE-2007-SheldonVL #design #interactive #paradigm
Interactive presentation: Soft-core processor customization using the design of experiments paradigm (DS, FV, SL), pp. 821–826.
DATEDATE-2007-TadesseSLBG #analysis #modelling #satisfiability
Accurate timing analysis using SAT and pattern-dependent delay models (DT, DS, EL, RIB, JG), pp. 1018–1023.
DATEDATE-2007-TongbongMC #evaluation #interactive #metric #multi #statistics #testing
Interactive presentation: Evaluation of test measures for LNA production testing using a multinormal statistical model (JT, SM, JLC), pp. 731–736.
DATEDATE-2007-WangCW #optimisation #scheduling #testing
SoC testing using LFSR reseeding, and scan-slice-based TAM optimization and test scheduling (ZW, KC, SW), pp. 201–206.
DATEDATE-2007-Wong #equation #performance #symmetry
Fast positive-real balanced truncation of symmetric systems using cross Riccati equations (NW), pp. 1496–1501.
DATEDATE-2007-YonedaIF #algorithm #configuration management #interactive #scheduling
Interactive presentation: An SoC test scheduling algorithm using reconfigurable union wrappers (TY, MI, HF), pp. 231–236.
DATEDATE-2007-ZhouB #approach #reduction #scheduling #testing
Test cost reduction for SoC using a combined approach to test data compression and test scheduling (QZ, KJB), pp. 39–44.
HPCAHPCA-2007-ClarkHYMF #hardware #lightweight
Liquid SIMD: Abstracting SIMD Hardware using Lightweight Dynamic Mapping (NC, AH, SY, SAM, KF), pp. 216–227.
HPDCHPDC-2007-HackerM #queue #reliability
Using queue structures to improve job reliability (TJH, ZM), pp. 43–54.
HPDCHPDC-2007-KimKMBS #network
Using content-addressable networks for load balancing in desktop grids (JSK, PJK, MAM, BB, AS), pp. 189–198.
HPDCHPDC-2007-MullerGSF #case study #game studies #multi #online #replication #scalability
Scaling multiplayer online games using proxy-server replication: a case study of Quake 2 (JM, SG, TS, SF), pp. 219–220.
ISMMISMM-2007-NguyenR #detection #memory management
Detecting and eliminating memory leaks using cyclic memory allocation (HHN, MCR), pp. 15–30.
LCTESLCTES-2007-AbouGhazalehFRXLCMM #cpu #machine learning #scalability
Integrated CPU and l2 cache voltage scaling using machine learning (NA, APF, CR, RX, FL, BRC, DM, RGM), pp. 41–50.
LCTESLCTES-2007-HinesTW
Addressing instruction fetch bottlenecks by using an instruction register file (SRH, GST, DBW), pp. 165–174.
PDPPDP-2007-ChongHF #java #memory management
Pretenuring in Java by Object Lifetime and Reference Density Using Scratch-Pad Memory (KFC, CYH, ASF), pp. 205–212.
PDPPDP-2007-PlazaVBP #detection #image #network #parallel
Parallel Detection of Targets in Hyperspectral Images Using Heterogeneous Networks of Workstations (AP, DV, SB, JP), pp. 333–340.
PDPPDP-2007-Talia
Using Grids for Exploiting Data Abundance in Science (DT).
PPoPPPPoPP-2007-GontmakherMS #energy #multi #performance #thread
Using fine grain multithreading for energy efficient computing (AG, AM, AS), pp. 259–269.
PPoPPPPoPP-2007-KejariwalTGLKBNVP #analysis #concurrent #cpu #performance #specification #thread
Tight analysis of the performance potential of thread speculation using spec CPU 2006 (AK, XT, MG, WL, SK, UB, AN, AVV, CDP), pp. 215–225.
PPoPPPPoPP-2007-MamidalaNVSP #on the #performance #scalability #trade-off
On using connection-oriented vs. connection-less transport for performance and scalability of collective and one-sided operations: trade-offs and impact (ARM, SN, AV, GS, DKP), pp. 46–54.
SOSPSOSP-2007-RossbachHPRAW #hardware #memory management #named #operating system #transaction
TxLinux: using and managing hardware transactional memory in an operating system (CJR, OSH, DEP, HER, BA, EW), pp. 87–102.
SOSPSOSP-2007-VandiverBLM #commit #fault #scheduling #transaction
Tolerating byzantine faults in transaction processing systems using commit barrier scheduling (BV, HB, BL, SM), pp. 59–72.
WRLAWRLA-J-2004-MeseguerT07 #analysis #encryption #protocol #reachability #verification
Symbolic reachability analysis using narrowing and its application to verification of cryptographic protocols (JM, PT), pp. 123–160.
ESOPESOP-2007-LeinoS #invariant #verification
Using History Invariants to Verify Observers (KRML, WS), pp. 80–94.
FASEFASE-2007-KleinG #diagrams #specification
Joint Structural and Temporal Property Specification Using Timed Story Scenario Diagrams (FK, HG), pp. 185–199.
FoSSaCSFoSSaCS-2007-BengtsonP #formal method #logic #π-calculus
Formalising the π-Calculus Using Nominal Logic (JB, JP), pp. 63–77.
TACASTACAS-2007-YuCL #bound #diagrams #reachability
Bounded Reachability Checking of Asynchronous Systems Using Decision Diagrams (AJY, GC, GL), pp. 648–663.
AMOSTA-MOST-2007-ChenPU #analysis #dependence #generative #modelling #testing
Model-based regression test suite generation using dependence analysis (YC, RLP, HU), pp. 54–62.
AMOSTA-MOST-2007-FraserW #generative #ltl #model checking #performance #testing
Using LTL rewriting to improve the performance of model-checker based test-case generation (GF, FW), pp. 64–74.
CADECADE-2007-GeBT #modulo theories #quantifier #satisfiability #verification
Solving Quantified Verification Conditions Using Satisfiability Modulo Theories (YG, CB, CT), pp. 167–182.
CADECADE-2007-Harrison #automation #proving
Automating Elementary Number-Theoretic Proofs Using Gröbner Bases (JH), pp. 51–66.
CADECADE-2007-KoprowskiM #dependence #predict #satisfiability
Predictive Labeling with Dependency Pairs Using SAT (AK, AM), pp. 410–425.
CADECADE-2007-MotikSH #logic #reasoning
Optimized Reasoning in Description Logics Using Hypertableaux (BM, RS, IH), pp. 67–83.
CADECADE-2007-TiwariG #logic #program analysis #proving #theorem proving
Logical Interpretation: Static Program Analysis Using Theorem Proving (AT, SG), pp. 147–166.
CAVCAV-2007-SinhaC #composition #lazy evaluation #learning #satisfiability #verification
SAT-Based Compositional Verification Using Lazy Learning (NS, EMC), pp. 39–54.
CAVCAV-2007-WangYGI #precise #reachability
Using Counterexamples for Improving the Precision of Reachability Computation with Polyhedra (CW, ZY, AG, FI), pp. 352–365.
ICLPICLP-2007-NieuwenborghCV #fuzzy #set
Computing Fuzzy Answer Sets Using dlvhex (DVN, MDC, DV), pp. 449–450.
ICLPICLP-2007-West #animation #logic programming #programming language #specification
The Use of a Logic Programming Language in the Animation of Z Specifications (MMW), pp. 451–452.
ISSTAISSTA-2007-Koster #consistency #quality
Using portfolio theory for better and more consistent quality (KK), pp. 108–117.
ISSTAISSTA-2007-NainarCRL #debugging #statistics
Statistical debugging using compound boolean predicates (PAN, TC, JR, BL), pp. 5–15.
ISSTAISSTA-2007-ShohamYFP #abstraction #mining #specification
Static specification mining using automata-based abstractions (SS, EY, SF, MP), pp. 174–184.
MBTMBT-2007-DadeauLB #java #ml #specification #testing
Measuring a Java Test Suite Coverage Using JML Specifications (FD, YL, LdB), pp. 21–32.
MBTMBT-2007-OuimetL #automation #consistency #satisfiability #specification #state machine #verification
Automated Verification of Completeness and Consistency of Abstract State Machine Specifications using a SAT Solver (MO, KL), pp. 85–97.
ICSTSAT-2007-DeKV
Inversion Attacks on Secure Hash Functions Using satSolvers (DD, AK, RV), pp. 377–382.
TAPTAP-2007-Gargantini #detection #fault #model checking #testing
Using Model Checking to Generate Fault Detecting Tests (AG), pp. 189–206.
TAPTAP-2007-LiuMS #automation #contract #generative #quality #query #testing
Using Contracts and Boolean Queries to Improve the Quality of Automatic Test Generation (L(L, BM, BS), pp. 114–130.
TAPTAP-2007-RummerS #calculus #java #logic #proving #source code
Proving Programs Incorrect Using a Sequent Calculus for Java Dynamic Logic (PR, MAS), pp. 41–60.
VMCAIVMCAI-2007-BouillaguetKWZR #data type #first-order #proving #theorem proving #verification
Using First-Order Theorem Provers in the Jahob Data Structure Verification System (CB, VK, TW, KZ, MCR), pp. 74–88.
CBSECBSE-2006-CangussuCW #component #multi #process
Multi Criteria Selection of Components Using the Analytic Hierarchy Process (JWC, KMLC, WEW), pp. 67–81.
CBSECBSE-2006-CervantesC #architecture #lightweight #product line #workflow
Using a Lightweight Workflow Engine in a Plugin-Based Product Line Architecture (HC, SCV), pp. 198–205.
DocEngDocEng-2006-GormishS #documentation #editing #image #standard
Standards based high resolution Document editing using low resolution proxy images (MJG, ELS), p. 33.
DocEngDocEng-2006-QeliF #aspect-oriented #documentation #programming #xml #xpath
Filtering XML documents using XPath expressions and aspect-oriented programming (EQ, BF), pp. 85–87.
DocEngDocEng-2006-QeliGF #detection #documentation #xml #xpath
Customizable detection of changes for XML documents using XPath expressions (EQ, JG, BF), pp. 88–90.
DRRDRR-2006-TaghvaBCBPN #automation #information management #relational
Automatic redaction of private information using relational information extraction (KT, RB, JSC, JB, RP, TAN).
TPDLECDL-2006-AmatoBDFRS #experience #library #multi
Using MILOS to Build a Multimedia Digital Library Application: The PhotoBook Experience (GA, PB, FD, FF, FR, PS), pp. 379–390.
TPDLECDL-2006-ParkKKLK #personalisation
Personalized Digital E-library Service Using Users’ Profile Information (WP, WK, SK, HL, YKK), pp. 528–531.
TPDLECDL-2006-SmithKN #replication #repository
Repository Replication Using NNTP and SMTP (JAS, MK, MLN), pp. 51–62.
TPDLECDL-2006-SzlavikTL #retrieval #summary #xml
The Use of Summaries in XML Retrieval (ZS, AT, ML), pp. 75–86.
HTHT-2006-Delort #documentation #identification
Identifying commented passages of documents using implicit hyperlinks (JYD), pp. 89–98.
HTHT-2006-Ruddle #hypermedia #navigation #string
Using string-matching to analyze hypertext navigation (RAR), pp. 49–52.
JCDLJCDL-2006-JordanWG #algorithm #feedback #generative #query
Using controlled query generation to evaluate blind relevance feedback algorithms (CJ, CRW, QG), pp. 286–295.
JCDLJCDL-2006-KaczmarekHE #certification #evaluation #repository
Repository software evaluation using the audit checklist for certification of trusted digital repositories (JK, TGH, JE), pp. 107–108.
JCDLJCDL-2006-KulesKS #categorisation #category theory #web
Categorizing web search results into meaningful and stable categories using fast-feature techniques (BK, JK, BS), pp. 210–219.
JCDLJCDL-2006-McMartinIMWM #library
Factors motivating use of digital libraries (FPM, ERI, CM, AJW, GM), pp. 254–255.
JCDLJCDL-2006-MedelyanW #consistency
Measuring inter-indexer consistency using a thesaurus (OM, IHW), pp. 274–275.
JCDLJCDL-2006-OnELKP #approach #clique #effectiveness #library #problem
An effective approach to entity resolution problem using quasi-clique and its application to digital libraries (BWO, EE, DL, JK, JP), pp. 51–52.
JCDLJCDL-2006-ReckerP #education #library
Using resources across educational digital libraries (MR, BP), pp. 240–241.
JCDLJCDL-2006-ReichherzerB #documentation #requirements
Quantifying software requirements for supporting archived office documents using emulation (TR, GB), pp. 86–94.
PODSPODS-2006-GoelGM #modelling #optimisation
Asking the right questions: model-driven optimization using probes (AG, SG, KM), pp. 203–212.
SIGMODSIGMOD-2006-DengR #approximate #detection #streaming
Approximately detecting duplicates for streaming data using stable bloom filters (FD, DR), pp. 25–36.
SIGMODSIGMOD-2006-GawlickKL #database #declarative
Using the oracle database as a declarative RSS hub (DG, MK, ZHL), p. 722.
SIGMODSIGMOD-2006-GouKC #evaluation #performance #query
Query evaluation using overlapping views: completeness and efficiency (GG, MK, RC), pp. 37–48.
SIGMODSIGMOD-2006-KoudasMS #case study #experience
Using SPIDER: an experience report (NK, AM, DS), p. 719.
SIGMODSIGMOD-2006-LimLLWS #data type #query
Continuous query processing in data streams using duality of data and queries (HSL, JGL, MJL, KYW, IYS), pp. 313–324.
SIGMODSIGMOD-2006-OnoseDPC #query #xml
Rewriting nested XML queries using nested views (NO, AD, YP, EC), pp. 443–454.
VLDBVLDB-2006-BunemanCFK #distributed #partial evaluation #query
Using Partial Evaluation in Distributed Query Evaluation (PB, GC, WF, AK), pp. 211–222.
VLDBVLDB-2006-DasGKT #query
Answering Top-k Queries Using Views (GD, DG, NK, DT), pp. 451–462.
VLDBVLDB-2006-HuangCLL #evolution #xml
XML Evolution: A Two-phase XML Processing Model Using XML Prefiltering Techniques (CHH, TRC, JJL, HML), pp. 1215–1218.
VLDBVLDB-2006-LakshmananWZ #query
Answering Tree Pattern Queries Using Views (LVSL, WHW, Z(Z), pp. 571–582.
VLDBVLDB-2006-MorfoniosI
CURE for Cubes: Cubing Using a ROLAP Engine (KM, YEI), pp. 379–390.
VLDBVLDB-2006-SubramaniamPPKG #detection #modelling #online #parametricity
Online Outlier Detection in Sensor Data Using Non-Parametric Models (SS, TP, DP, VK, DG), pp. 187–198.
VLDBVLDB-2006-ZhangZWSP #feedback #image #interactive
Using High Dimensional Indexes to Support Relevance Feedback Based Interactive Images Retrival (JZ, XZ, WW, BS, JP), pp. 1211–1214.
CSEETCSEET-2006-BurgeT #case study #challenge #education #re-engineering
Rising to the Challenge: Using Business-Oriented Case Studies in Software Engineering Education (JEB, DT), pp. 43–50.
ITiCSEITiCSE-2006-AssuncaoO #dot-net #education #framework #platform #web #web service
Teaching web services using .NET platform (LA, ALO), p. 339.
ITiCSEITiCSE-2006-Chamillard #education #performance #predict #student
Using student performance predictions in a computer science curriculum (ATC), pp. 260–264.
ITiCSEITiCSE-2006-DaviesCT #education #ontology
Using a computing ontology for educational purposes (GD, LNC, HT), p. 334.
ITiCSEITiCSE-2006-Godejord #education #social
Exploring teacher methodology: using the example of sexual abuse of children as a way of teaching social informatics (PAG), p. 340.
ITiCSEITiCSE-2006-HoodH #education #project management #simulation
Teaching software project management using simulations (DJH, CSH), pp. 289–293.
ITiCSEITiCSE-2006-LeidigFL #information management
The use of community-based non-profit organizations in information systems capstone projects (PML, RCF, JL), pp. 148–152.
ITiCSEITiCSE-2006-ShanmugasundaramJH #visualisation
Knowledge building using visualizations (VS, PJ, CDH), pp. 23–27.
ITiCSEITiCSE-2006-SpaccoHPEHP #case study #design #experience #programming #testing
Experiences with marmoset: designing and using an advanced submission and testing system for programming courses (JS, DH, WP, FE, JKH, NPP), pp. 13–17.
ITiCSEITiCSE-2006-ThomasWS #automation
Using patterns in the automatic marking of ER-diagrams (PGT, KGW, NS), pp. 83–87.
ITiCSEITiCSE-2006-Utting #education #java #problem #programming
Problems in the initial teaching of programming using Java: the case for replacing J2SE with J2ME (IU), pp. 193–196.
SIGITESIGITE-2006-Rutherfoord #case study
Using personality inventories to form teams for class projects: a case study (RHR), pp. 9–14.
SCAMSCAM-J-2005-ZhangBCD06
Using source transformation to test and model check implicit-invocation systems (HZ, JSB, JRC, JD), pp. 209–227.
CSMRCSMR-2006-GraafWD #architecture #migration #model transformation
Migrating Supervisory Control Architectures Using Model Transformations (BG, SW, AvD), pp. 153–164.
CSMRCSMR-2006-IvkovicK #architecture #framework #model transformation #refactoring #semantics
A Framework for Software Architecture Refactoring using Model Transformations and Semantic Annotations (II, KK), pp. 135–144.
CSMRCSMR-2006-TonuAT #approach #architecture
Evaluating Architectural Stability Using a Metric-Based Approach (SAT, AA, LT), pp. 261–270.
CSMRCSMR-2006-WierdaDS #architecture #case study #clustering
Using Version Information in Architectural Clustering — A Case Study (AW, ED, LJS), pp. 214–228.
ICPCICPC-2006-BermanDGG #comprehension
The Sound of Software: Using Sonification to Aid Comprehension (LIB, SD, KBG, NG), pp. 225–229.
ICPCICPC-2006-JetleyZI #analysis #slicing
Using Abstraction-driven Slicing for Postmortem Analysis of Software (RPJ, YZ, SPI), pp. 107–116.
ICPCICPC-2006-JinC #reverse engineering #tool support
Integrating Reverse Engineering Tools Using a Service-Sharing Methodology (DJ, JRC), pp. 94–99.
ICPCICPC-2006-KothariSMH #clustering #evolution
Studying the Evolution of Software Systems Using Change Clusters (JK, AS, SM, AEH), pp. 46–55.
ICPCICPC-2006-LawrieFB #assessment #information retrieval #quality
Leveraged Quality Assessment using Information Retrieval Techniques (DJL, HF, DB), pp. 149–158.
ICPCICPC-2006-SafyallahS #dynamic analysis #execution #mining
Dynamic Analysis of Software Systems using Execution Pattern Mining (HS, KS), pp. 84–88.
ICPCICPC-2006-StefikFA #comprehension #debugging #effectiveness #music #runtime
Layered Program Auralization: Using Music to Increase Runtime Program Comprehension and Debugging Effectiveness (AS, KF, RTA), pp. 89–93.
ICSMEICSM-2006-CanforaCP #co-evolution #identification #on the
On the Use of Line Co-change for Identifying Crosscutting Concern Code (GC, LC, MDP), pp. 213–222.
ICSMEICSM-2006-FisherCZ #comprehension #difference
Using Sex Differences to Link Spatial Cognition and Program Comprehension (MF, AC, LZ), pp. 289–298.
ICSMEICSM-2006-GoldHLM #approach #bound #concept #source code
Allowing Overlapping Boundaries in Source Code using a Search Based Approach to Concept Binding (NG, MH, ZL, KM), pp. 310–319.
ICSMEICSM-2006-Hou #constraints #design #source code
Using Structural Constraints to Specify and Check Design Intent in Source Code — Ph.D. Dissertation Synopsis (DH), pp. 343–346.
ICSMEICSM-2006-JaffriK #delivery #performance
Efficient Delivery of Software Updates Using Advanced Compression Techniques (TJ, KK), pp. 267–268.
ICSMEICSM-2006-LuciaPOZ #comprehension #named #traceability
COCONUT: COde COmprehension Nurturant Using Traceability (ADL, MDP, RO, FZ), pp. 274–275.
ICSMEICSM-2006-TonellaAS #ranking #testing
Using the Case-Based Ranking Methodology for Test Case Prioritization (PT, PA, AS), pp. 123–133.
ICSMEICSM-2006-ZhangCZ #e-commerce #process #re-engineering #user interface
Reengineering User Interfaces of E-Commerce Applications Using Business Processes (QZ, RC, YZ), pp. 428–437.
MSRMSR-2006-GermanRS #comprehension
Using evolutionary annotations from change logs to enhance program comprehension (DMG, PCR, MADS), pp. 159–162.
MSRMSR-2006-KakimotoMKTTM #identification
Using software birthmarks to identify similar classes and major functionalities (TK, AM, YK, HT, MT, KiM), pp. 171–172.
MSRMSR-2006-SagerBPK #algorithm #detection #java
Detecting similar Java classes using tree algorithms (TS, AB, MP, CK), pp. 65–71.
MSRMSR-2006-TsunodaMKKM #developer
Analyzing OSS developers’ working time using mailing lists archives (MT, AM, TK, YK, KiM), pp. 181–182.
SCAMSCAM-2006-BoogerdM #profiling
Prioritizing Software Inspection Results using Static Profiling (CB, LM), pp. 149–160.
SCAMSCAM-2006-PanKW #classification #debugging #metric #slicing
Bug Classification Using Program Slicing Metrics (KP, SK, EJWJ), pp. 31–42.
SCAMSCAM-2006-WalensteinMCL #normalisation #term rewriting
Normalizing Metamorphic Malware Using Term Rewriting (AW, RM, MRC, AL), pp. 75–84.
WCREWCRE-2006-BeyerH #evolution #visualisation
Animated Visualization of Software History using Evolution Storyboards (DB, AEH), pp. 199–210.
WCREWCRE-2006-Cerulo #development #on the #process
On the Use of Process Trails to Understand Software Development (LC), pp. 303–304.
WCREWCRE-2006-CleveHH #dependence #graph #reverse engineering
Data Reverse Engineering using System Dependency Graphs (AC, JH, JLH), pp. 157–166.
WCREWCRE-2006-KoschkeFF #clone detection #detection #syntax
Clone Detection Using Abstract Syntax Suffix Trees (RK, RF, PF), pp. 253–262.
WCREWCRE-2006-LormansGDSS #case study #industrial #monitoring #requirements
Monitoring Requirements Coverage using Reconstructed Views: An Industrial Case Study (ML, HGG, AvD, RvS, AS), pp. 275–284.
CIAACIAA-2006-AntoniouHIMP #automaton #finite
Finding Common Motifs with Gaps Using Finite Automata (PA, JH, CSI, BM, PP), pp. 69–77.
DLTDLT-2006-Domaratzki
Characterizing DNA Bond Shapes Using Trajectories (MD), pp. 180–191.
ICALPICALP-v1-2006-Radhakrishnan #lazy evaluation #random
Gap Amplification in PCPs Using Lazy Random Walks (JR), pp. 96–107.
ICALPICALP-v2-2006-DodisR #on the #quantum
On the Impossibility of Extracting Classical Randomness Using a Quantum Computer (YD, RR), pp. 204–215.
FMFM-2006-Boute #formal method #independence #problem
Using Domain-Independent Problems for Introducing Formal Methods (RTB), pp. 316–331.
FMFM-2006-DelahayeED #security
Certifying Airport Security Regulations Using the Focal Environment (DD, JFÉ, VDG), pp. 48–63.
FMFM-2006-Preoteasa #logic #pointer #recursion #verification
Mechanical Verification of Recursive Procedures Manipulating Pointers Using Separation Logic (VP), pp. 508–523.
FMFM-2006-UmenoL #automaton #case study #protocol #proving #safety #theorem proving
Proving Safety Properties of an Aircraft Landing Protocol Using I/O Automata and the PVS Theorem Prover: A Case Study (SU, NAL), pp. 64–80.
FMFM-2006-ZhengWWX #approach #case study #development #formal method #object-oriented
Partially Introducing Formal Methods into Object-Oriented Development: Case Studies Using a Metrics-Driven Approach (YZ, JW, KW, JX), pp. 190–204.
RTARTA-2006-Bruggink #finite #higher-order #product line #proving
A Proof of Finite Family Developments for Higher-Order Rewriting Using a Prefix Property (HJSB), pp. 372–386.
RTARTA-2006-Bryant #infinity #verification
Formal Verification of Infinite State Systems Using Boolean Methods (REB), pp. 1–3.
SEFMSEFM-2006-RodriguesBCFG #approach
A Bag-of-Tasks Approach for State Space Exploration Using Computational Grids (CLR, PESB, JMC, JCAdF, DSG), pp. 226–235.
SEFMSEFM-2006-ZhangHW #component #declarative #modelling #performance #scheduling #uml
Declarative Performance Modeling for Component-Based System using UML Profile for Schedulability, Performance and Time (YZ, TH, JW), pp. 246–258.
SFMSFM-2006-Harrison #float #proving #theorem proving #verification
Floating-Point Verification Using Theorem Proving (JH), pp. 211–242.
FLOPSFLOPS-2006-DiscoloHMJS #data type #haskell
Lock Free Data Structures Using STM in Haskell (AD, TH, SM, SLPJ, SS), pp. 65–80.
FLOPSFLOPS-2006-Tozawa #transducer #type checking #xml
XML Type Checking Using High-Level Tree Transducer (AT), pp. 81–96.
ICFPICFP-2006-HickeyNYK #hybrid #representation
Mechanized meta-reasoning using a hybrid HOAS/de bruijn representation and reflection (JH, AN, XY, AK), pp. 172–183.
IFLIFL-2006-TrojahnerGS #array #on the #optimisation #source code
On Optimising Shape-Generic Array Programs Using Symbolic Structural Information (KT, CG, SBS), pp. 1–18.
AIIDEAIIDE-2006-JohanssonO #multi
Using Multi-Agent System Technology in Risk Bots (SJJ, FO), pp. 42–47.
AIIDEAIIDE-2006-Kacmarcik #natural language
Using Natural Language to Manage NPC Dialog (GK), pp. 115–117.
AIIDEAIIDE-2006-Knight #lightweight #network #simulation
Lightweight Simulation of Air Traffic Control Using Simple Temporal Networks (RK), pp. 48–53.
AIIDEAIIDE-2006-McAlindenLCT
Using Environmental Annotations and Affordances to Model Culture (RM, MvL, WC, WT), pp. 145–146.
AIIDEAIIDE-2006-PriceG #network #re-engineering
Plausible Environment Reconstruction Using Bayesian Networks (RGP, SDG), pp. 130–132.
AIIDEAIIDE-2006-SturtevantB #abstraction #collaboration
Improving Collaborative Pathfinding Using Map Abstraction (NRS, MB), pp. 80–85.
CoGCIG-2006-ConradieE #game studies #optimisation
Training Bao Game-Playing Agents using Coevolutionary Particle Swarm Optimization (JC, APE), pp. 67–74.
CoGCIG-2006-GordonR #game studies #identification #set
Trappy Minimax - using Iterative Deepening to Identify and Set Traps in Two-Player Games (VSG, AR), pp. 205–210.
CoGCIG-2006-HeinzKGBL #empirical #game studies #realtime #recognition #smarttech
Using Wearable Sensors for Real-Time Recognition Tasks in Games of Martial Arts - An Initial Experiment (EAH, KSK, MG, DB, PL), pp. 98–102.
CoGCIG-2006-MillerMC #detection #network
Anomaly Detection in Magnetic Motion Capture using a 2-Layer SOM network (IM, SM, BC), pp. 236–242.
CoGCIG-2006-NakashimaITN #evolution
The Effect of Using Match History on the Evolution of RoboCup Soccer Team Strategies (TN, HI, MT, MN), pp. 60–66.
CoGCIG-2006-ReynoldsAA #algorithm #game studies #optimisation #problem
Optimization Problem Solving using Predator/Prey Games and Cultural Algorithms (RGR, MZA, RSA), pp. 119–125.
CoGCIG-2006-RiceMSS #game studies
A Player for Tactical Air Strike Games Using Evolutionary Computation (AJR, JRM, AS, SS), pp. 83–89.
CoGCIG-2006-WittkampB #adaptation #evolution #game studies #programming #search-based
Evolving Adaptive Play for the Game of Spoof Using Genetic Programming (MW, LB), pp. 164–172.
ICGTICGT-2006-BaresiS #alloy #graph transformation #on the
On the Use of Alloy to Analyze Graph Transformation Systems (LB, PS), pp. 306–320.
ICGTICGT-2006-MendizabalD #analysis #distributed #graph grammar #non-functional #probability
Non-functional Analysis of Distributed Systems in Unreliable Environments Using Stochastic Object Based Graph Grammars (OMM, FLD), pp. 275–290.
CHICHI-2006-BentleyMH #music
Personal vs. commercial content: the similarities between consumer use of photos and music (FB, CJM, GH), pp. 667–676.
CHICHI-2006-BonhardHMS #recommendation #similarity
Accounting for taste: using profile similarity to improve recommender systems (PB, CH, JDM, MAS), pp. 1057–1066.
CHICHI-2006-CosleyFTR #community #overview
Using intelligent task routing and contribution review to help communities build artifacts of lasting value (DC, DF, LGT, JR), pp. 1037–1046.
CHICHI-2006-DillonKCB #visual notation
Visual search and reading tasks using ClearType and regular displays: two experiments (AD, LK, GOC, RGB), pp. 503–511.
CHICHI-2006-GrossmanHBAB
Hover widgets: using the tracking state to extend the capabilities of pen-operated devices (TG, KH, PB, MA, RB), pp. 861–870.
CHICHI-2006-JiangOMS #interactive #pointer
Direct pointer: direct manipulation for large-display interaction using handheld cameras (HJ, EO, NM, YS), pp. 1107–1110.
CHICHI-2006-KramerOF #communication
Using linguistic features to measure presence in computer-mediated communication (ADIK, LMO, SRF), pp. 913–916.
CHICHI-2006-LukPLMLH #design #interactive #mobile #prototype
A role for haptics in mobile interaction: initial design using a handheld tactile display prototype (JL, JP, SL, KEM, VL, VH), pp. 171–180.
CHICHI-2006-MedynskiyDF #analysis #community #development #hybrid #network #online
Using hybrid networks for the analysis of online software development communities (YEM, ND, AF), pp. 513–516.
CHICHI-2006-PrabakerBC #authoring #documentation #evaluation #programming
An evaluation of using programming by demonstration and guided walkthrough techniques for authoring and utilizing documentation (MP, LDB, VC), pp. 241–250.
CHICHI-2006-PuVF
Increasing user decision accuracy using suggestions (PP, PV, BF), pp. 121–130.
CHICHI-2006-WeiszEK
Synchronous broadcast messaging: the use of ICT (JDW, TE, WAK), pp. 1293–1302.
CHICHI-2006-WilsonA #game studies
Text entry using a dual joystick game controller (ADW, MA), pp. 475–478.
CHICHI-2006-ZhaoAH #multi
Zone and polygon menus: using relative position to increase the breadth of multi-stroke marking menus (SZ, MA, KH), pp. 1077–1086.
CSCWCSCW-2006-KayanFS #difference
Cultural differences in the use of instant messaging in Asia and North America (SK, SRF, LDS), pp. 525–528.
CSCWCSCW-2006-TangLMLD #interactive
Unobtrusive but invasive: using screen recording to collect field data on computer-mediated interaction (JCT, SBL, MJM, JL, CD), pp. 479–482.
SOFTVISSOFTVIS-2006-AlspaughTB #social #visualisation
Using social agents to visualize software scenarios (TAA, BT, EB), pp. 87–94.
SOFTVISSOFTVIS-2006-Reiss #abstraction #execution #visualisation
Visualizing program execution using user abstractions (SPR), pp. 125–134.
EDOCEDOC-2006-BarrettP #automation #composition #modelling #semantics #web #web service
Semi-Automatic Distribution Pattern Modeling of Web Service Compositions using Semantics (RB, CP), pp. 417–422.
EDOCEDOC-2006-DongYZ #composition #petri net #testing #web #web service
Testing BPEL-based Web Service Composition Using High-level Petri Nets (WLD, HY, YBZ), pp. 441–444.
EDOCEDOC-2006-KunduB #xml
Secure Dissemination of XML Content Using Structure-based Routing (AK, EB), pp. 153–164.
EDOCEDOC-2006-YanZY #contract #modelling #ontology #owl #semantics
Ontology Modeling for Contract: Using OWL to Express Semantic Relations (YY, JZ, MY), pp. 409–412.
ICEISICEIS-AIDSS-2006-AbdullahPBK #architecture #development #information management #knowledge-based #modelling #uml
Knowledge Engineering Using the UML Profile — Adopting the Model-Driven Architecture for Knowledge-Based System Development (MSA, RFP, IDB, CK), pp. 74–81.
ICEISICEIS-AIDSS-2006-ProchazkaKK #fuzzy #information management #petri net #process
Various Process Wizard for Information Systems — Using Fuzzy Petri Nets for Process Definition (JP, JK, CK), pp. 235–242.
ICEISICEIS-AIDSS-2006-ThuD #predict #risk management
Predicting Cardiovascular Risks — Using POSSUM, PPOSSUM and Neural Net Techniques (TNTT, DND), pp. 230–234.
ICEISICEIS-DISI-2006-BraunerCBL
Using Gazetteers to Annotate Geographic Catalog Entries (DFB, MAC, KKB, LAPPL), pp. 215–220.
ICEISICEIS-DISI-2006-Eessaar #database #relational #repository
Using Relational Databases in the Engineering Repository Systems (EE), pp. 30–37.
ICEISICEIS-DISI-2006-PatroARMB #case study #database #information management #integration
Databases and Information Systems Integration Using CALOPUS: A Case Study (PKP, PA, MR, RMV, SB), pp. 200–207.
ICEISICEIS-HCI-2006-Bakhtyari #automation #feedback #generative #ontology #student
Automatic Feedback Generation — Using Ontology in an Intelligent Tutoring System for Both Learner and Author Based on Student Model (PB), pp. 116–123.
ICEISICEIS-HCI-2006-LiSB #correlation #hybrid #recognition #sketching #synthesis
Face Recognition from Sketches Using Advanced Correlation Filters Using Hybrid Eigenanalysis for Face Synthesis (YhL, MS, VB), pp. 11–18.
ICEISICEIS-ISAS-2006-BokhariP #information management #petri net #validation
Validation of Information Systems Using Petri Nets (AB, WFSP), pp. 284–289.
ICEISICEIS-ISAS-2006-ChengP #aspect-oriented #development #embedded #overview #realtime #resource management #scheduling
Using Aspect-Oriented Software Development in Real-Time Embedded Systems Software — A Review of Scheduling, Resource Allocation and Synchronization (PLC, GAP), pp. 388–393.
ICEISICEIS-ISAS-2006-CostelloFMLD #approach #distributed #framework #modelling #named #process
iWISE: A Framework for Providing Distributed Process Visibility Using an Event-Based Process Modelling Approach (CC, WF, OM, GL, JD), pp. 224–233.
ICEISICEIS-ISAS-2006-DasguptaSKG #hybrid #modelling #re-engineering
Hybrid Modeling Using I* and Agentspeak(L) Agents in Agent Oriented Software Engineering (AD, FS, AK, AKG), pp. 420–425.
ICEISICEIS-ISAS-2006-ShishkovQ #modelling #process #refinement
Refinement of SDBC Business Process Models Using ISDL (BS, DACQ), pp. 61–69.
ICEISICEIS-ISAS-2006-ZdravkovicH #flexibility #process
Flexible Realization of Business Processes Using Existing Services (JZ, MH), pp. 165–172.
ICEISICEIS-J-2006-PourrazV #approach #architecture #evolution
Managing Service-Based EAI Architectures Evolution Using a Formal Architecture-Centric Approach (FP, HV), pp. 269–280.
ICEISICEIS-SAIC-2006-KoutsomitropoulosMKP #information management #logic
OWL-Based Knowledge Discovery Using Description Logics Reasoners (DAK, DPM, ANK, TSP), pp. 43–50.
ICEISICEIS-SAIC-2006-MartinelliSS
E-Procurement Adoption among Italian Firms by Using Domain Names (MM, IS, MS), pp. 124–131.
ICEISICEIS-SAIC-2006-SchwindG #combinator #grid #resource management
Using Shadow Prices for Resource Allocation in a Combinatorial Grid with Proxy-Bidding Agents (MS, OG), pp. 11–18.
CIKMCIKM-2006-BoydellS #community #personalisation #web
Capturing community search expertise for personalized web search using snippet-indexes (OB, BS), pp. 277–286.
CIKMCIKM-2006-ChirkovaS #optimisation #query
Query optimization using restructured views (RC, FS), pp. 642–651.
CIKMCIKM-2006-HoseLS #distributed #summary
Processing relaxed skylines in PDMS using distributed data summaries (KH, CL, KUS), pp. 425–434.
CIKMCIKM-2006-LiC #detection #topic
Improving novelty detection for general topics using sentence level information patterns (XL, WBC), pp. 238–247.
CIKMCIKM-2006-MarsoloPR #query
Structure-based querying of proteins using wavelets (KM, SP, KR), pp. 24–33.
CIKMCIKM-2006-Melucci #ranking
Ranking in context using vector spaces (MM), pp. 866–867.
CIKMCIKM-2006-QamraTC #clustering #mining
Mining blog stories using community-based and temporal clustering (AQ, BLT, EYC), pp. 58–67.
CIKMCIKM-2006-RanganathanL #database #information retrieval #query #relational #semantics
Information retrieval from relational databases using semantic queries (AR, ZL), pp. 820–821.
CIKMCIKM-2006-YangJZNX #clustering #documentation #ranking #validation
Document re-ranking using cluster validation and label propagation (LY, DHJ, GZ, NY, GX), pp. 690–697.
CIKMCIKM-2006-ZhuangC #query #ranking
Re-ranking search results using query logs (ZZ, SC), pp. 860–861.
CIKMCIKM-2006-ZieglerSL #automation #proximity #semantics #taxonomy
Automatic computation of semantic proximity using taxonomic knowledge (CNZ, KS, GL), pp. 465–474.
ECIRECIR-2006-ChenOT #image #memory management
Browsing Personal Images Using Episodic Memory (Time + Location) (CC, MPO, JT), pp. 362–372.
ECIRECIR-2006-KarbasiB #documentation #effectiveness #normalisation #scalability
Document Length Normalization Using Effective Level of Term Frequency in Large Collections (SK, MB), pp. 72–83.
ECIRECIR-2006-RodeH #query
Using Query Profiles for Clarification (HR, DH), pp. 205–216.
ECIRECIR-2006-WanY #documentation #similarity
Using Proportional Transportation Distances for Measuring Document Similarity (XW, JY), pp. 25–36.
ECIRECIR-2006-WenRB #behaviour #online #topic
The Effects on Topic Familiarity on Online Search Behaviour and Use of Relevance Criteria (LW, IR, PB), pp. 456–459.
ECIRECIR-2006-YamoutOT #feedback
Relevance Feedback Using Weight Propagation (FY, MPO, JT), pp. 575–578.
ECIRECIR-2006-ZhouZH #approach #concept #information retrieval #modelling
Using Concept-Based Indexing to Improve Language Modeling Approach to Genomic IR (XZ, XZ, XH), pp. 444–455.
ICMLICML-2006-AbbeelQN #learning #modelling
Using inaccurate models in reinforcement learning (PA, MQ, AYN), pp. 1–8.
ICMLICML-2006-BezakovaKS #graph
Graph model selection using maximum likelihood (IB, AK, RS), pp. 105–112.
ICMLICML-2006-BowlingMJNW #learning #policy #predict
Learning predictive state representations using non-blind policies (MHB, PM, MJ, JN, DFW), pp. 129–136.
ICMLICML-2006-DeCoste #collaboration #matrix #predict
Collaborative prediction using ensembles of Maximum Margin Matrix Factorizations (DD), pp. 249–256.
ICMLICML-2006-LeeGW #classification
Using query-specific variance estimates to combine Bayesian classifiers (CHL, RG, SW), pp. 529–536.
ICMLICML-2006-MaggioniM #analysis #evaluation #markov #multi #performance #policy #process
Fast direct policy evaluation using multiscale analysis of Markov diffusion processes (MM, SM), pp. 601–608.
ICMLICML-2006-RainaNK #learning
Constructing informative priors using transfer learning (RR, AYN, DK), pp. 713–720.
ICMLICML-2006-SilvaBBE #detection
Dealing with non-stationary environments using context detection (BCdS, EWB, ALCB, PME), pp. 217–224.
ICMLICML-2006-TeoV #array #kernel #performance #string
Fast and space efficient string kernels using suffix arrays (CHT, SVNV), pp. 929–936.
ICMLICML-2006-XiKSWR #classification #performance #reduction
Fast time series classification using numerosity reduction (XX, EJK, CRS, LW, CAR), pp. 1033–1040.
ICPRICPR-v1-2006-AhmadL #image #multi #recognition #sequence
HMM-based Human Action Recognition Using Multiview Image Sequences (MA, SWL), pp. 263–266.
ICPRICPR-v1-2006-ArandjelovicC #classification #set
Face Set Classification using Maximally Probable Mutual Modes (OA, RC), pp. 511–514.
ICPRICPR-v1-2006-AsharafM #clustering #scalability
Scalable non-linear Support Vector Machine using hierarchical clustering (SA, MNM), pp. 908–911.
ICPRICPR-v1-2006-BabaMA #geometry
A Unified Camera Calibration Using Geometry and Blur of Feature Points (MB, MM, NA), pp. 816–819.
ICPRICPR-v1-2006-BartelsWM #generative
DTM Generation from LIDAR Data using Skewness Balancing (MB, HW, DCM), pp. 566–569.
ICPRICPR-v1-2006-Bayro-CorrochanoM #algebra #fuzzy #geometry #logic
Object Manipulation using Fuzzy Logic and Geometric Algebra (EBC, RMC), pp. 1120–1123.
ICPRICPR-v1-2006-BenjellounTM #detection
Vertebra Edge Detection Using Polar Signature (MB, HT, SM), pp. 476–479.
ICPRICPR-v1-2006-Bernier #3d #realtime
Real-Time 3D Articulated Pose Tracking using Particle Filters Interacting through Belief Propagation (OB), pp. 90–93.
ICPRICPR-v1-2006-BerrettiBP #3d #clustering
Partitioning of 3D Meshes using Reeb Gra (SB, ADB, PP), pp. 19–22.
ICPRICPR-v1-2006-BhattacharyaRD #clustering #fuzzy #image #representation #retrieval #semantics
Image Representation and Retrieval Using Support Vector Machine and Fuzzy C-means Clustering Based Semantical Spaces (PB, MMR, BCD), pp. 929–935.
ICPRICPR-v1-2006-BuenaposadaM #animation #independence #performance
Performance driven facial animation using illumination independent appearance-based tracking (JMB, EM), pp. 303–306.
ICPRICPR-v1-2006-CaoXF #constant #self
Self-Calibration Using Constant Camera Motion (XC, JX, HF), pp. 595–598.
ICPRICPR-v1-2006-ChangCYY #estimation #interactive #realtime
An Intelligent Bulletin Board System with Real-time Vision-based Interaction Using Head Pose Estimation (CYC, PCC, YSY, JFY), pp. 1140–1143.
ICPRICPR-v1-2006-ChaoTTJ #detection #fault
Defect detection in low-contrast glass substrates using anisotropic diffusion (SMC, DMT, YHT, YRJ), pp. 654–657.
ICPRICPR-v1-2006-ChenCLT #algorithm #automation #graph #image #segmentation
Automatic Segmentation of Lung Fields from Radiographic Images of SARS Patients Using a New Graph Cuts Algorithm (SC, LC, JL, XT), pp. 271–274.
ICPRICPR-v1-2006-ChenHHH #segmentation
Segmentation of Human Body Parts Using Deformable Triangulation (CCC, JWH, YTH, CYH), pp. 355–358.
ICPRICPR-v1-2006-ConduracheA #2d #classification #image #linear #segmentation
Vessel Segmentation in 2D-Projection Images Using a Supervised Linear Hysteresis Classifier (AC, TA), pp. 343–346.
ICPRICPR-v1-2006-DongWH #gesture #segmentation #sequence #similarity #video
Gesture Segmentation from a Video Sequence Using Greedy Similarity Measure (QD, YW, ZH), pp. 331–334.
ICPRICPR-v1-2006-DoYC #detection #estimation
Skin Color Detection through Estimation and Conversion of Illuminant Color using Sclera Region of Eye under Varying Illumination (HCD, JYY, SIC), pp. 327–330.
ICPRICPR-v1-2006-DuCXL #interactive #network #process
Recognizing Interaction Activities using Dynamic Bayesian Network (YD, FC, WX, YL), pp. 618–621.
ICPRICPR-v1-2006-FaggianPC #recognition #segmentation #video
Face Recognition From Video using Active Appearance Model Segmentation (NF, APP, TJC), pp. 287–290.
ICPRICPR-v1-2006-FrippWCO #3d #automation #modelling #segmentation
Automatic Segmentation of the Knee Bones using 3D Active Shape Models (JF, SKW, SC, SO), pp. 167–170.
ICPRICPR-v1-2006-FuTC #orthogonal
Specular Free Spectral Imaging Using Orthogonal Subspace Projection (ZF, RTT, TC), pp. 812–815.
ICPRICPR-v1-2006-GaoWFZ #recognition
Face Recognition Using Most Discriminative Local and Global Features (YG, YW, XF, XZ), pp. 351–354.
ICPRICPR-v1-2006-ItoO #detection #invariant #recognition
Detection and Recognition of Moving Objects by Using Motion Invariants (SI, NO), pp. 683–686.
ICPRICPR-v1-2006-Katayama
Camera Calibration with a Transparent Calibration Tool Using Color Filters: Application to Stereo Camera Calibration for a Distant Object (YK), pp. 607–612.
ICPRICPR-v1-2006-KaufholdCHR #classification #recognition #segmentation
Recognition and Segmentation of Scene Content using Region-Based Classification (JPK, RC, AH, PR), pp. 755–760.
ICPRICPR-v1-2006-KawasakiFN #3d
3D acquisition system using uncalibrated line-laser projec (HK, RF, YN), pp. 1071–1075.
ICPRICPR-v1-2006-KimK #classification
Simultaneous Classification and VisualWord Selection using Entropy-based Minimum Description Length (SK, ISK), pp. 650–653.
ICPRICPR-v1-2006-KimK06a #parametricity
Estimating Intrinsic Parameters of Cameras using Two Arbitrary Rectangles (JSK, ISK), pp. 707–710.
ICPRICPR-v1-2006-KushalRFPH #locality #modelling #visual notation
Audio-Visual Speaker Localization Using Graphical Models (AK, MR, FFL, JP, TSH), pp. 291–294.
ICPRICPR-v1-2006-LaggerF #multi
Using Specularities to Recover Multiple Light Sources in the Presence of Texture (PL, PF), pp. 587–590.
ICPRICPR-v1-2006-Lhuillier #effectiveness #fault
Effective and Generic Structure from Motion using Angular Error (ML), pp. 67–70.
ICPRICPR-v1-2006-LiangA
Fingerprint Matching Using Minutia Polygons (XL, TA), pp. 1046–1049.
ICPRICPR-v1-2006-LiSH #image #recognition
Face Recognition using Patch-based Spin Images (YL, WAPS, ERH), pp. 408–411.
ICPRICPR-v1-2006-LiuLYAL #coordination
Object Tracking Using Globally Coordinated Nonlinear Manifolds (CBL, RSL, MHY, NA, SEL), pp. 844–847.
ICPRICPR-v1-2006-LladoBA #parametricity #re-engineering
Euclidean Reconstruction of Deformable Structure Using a Perspective Camera with Varying Intrinsic Parameters (XL, ADB, LdA), pp. 139–142.
ICPRICPR-v1-2006-Lopez-FrancoB #algebra #geometry #invariant #navigation
Omnidirectional Vision and Invariant Theory for Robot Navigation Using Conformal Geometric Algebra (CLF, EBC), pp. 570–573.
ICPRICPR-v1-2006-LublinermanOZC #linear #process #recognition #validation
Activity Recognition from Silhouettes using Linear Systems and Model (In)validation Techniques (RL, NO, DZ, OIC), pp. 347–350.
ICPRICPR-v1-2006-MarmoAC #classification #set
Microfossils shape classification using a set of width values (RM, SA, VC), pp. 691–694.
ICPRICPR-v1-2006-MenezesLD #3d #data fusion #gesture
Data Fusion for 3D Gestures Tracking using a Camera mounted on a Robot (PM, FL, JD), pp. 464–467.
ICPRICPR-v1-2006-MiaoQS #composition #principle
Unsupervised Decomposition of Mixed Pixels Using the Maximum Entropy Principle (LM, HQ, HS), pp. 1067–1070.
ICPRICPR-v1-2006-OhayonR #3d #estimation #robust
Robust 3D Head Tracking Using Camera Pose Estimation (SO, ER), pp. 1063–1066.
ICPRICPR-v1-2006-PerrinDZ #2d #3d #assessment #parametricity #process
2D and 3D Vegetation Resource Parameters Assessment using Marked Point Processes (GP, XD, JZ), pp. 1–4.
ICPRICPR-v1-2006-PongC #3d #detection #modelling
Optimal Cascade Construction for Detection using 3D Models (HKP, TJC), pp. 808–811.
ICPRICPR-v1-2006-PradeepR
Improving Shape from Focus Using Defocus Information (KSP, ANR), pp. 731–734.
ICPRICPR-v1-2006-PrehnS #adaptation #algorithm #classification #clustering #incremental #robust
An Adaptive Classification Algorithm Using Robust Incremental Clustering (HP, GS), pp. 896–899.
ICPRICPR-v1-2006-PupilliC #3d #modelling #realtime
Real-Time Camera Tracking Using Known 3D Models and a Particle Filter (MP, AC), pp. 199–203.
ICPRICPR-v1-2006-QiuGDC #image #optimisation
Tone Mapping for HDR Image using Optimization A New Closed Form Solution (GQ, JG, JD, MC), pp. 996–999.
ICPRICPR-v1-2006-RavulapalliS #video
Association of Sound to Motion in Video using Perceptual Organization (SR, SS), pp. 1216–1219.
ICPRICPR-v1-2006-ReiterDLB #3d #analysis #canonical #correlation #re-engineering
3D and Infrared Face Reconstruction from RGB data using Canonical Correlation Analysis (MR, RD, GL, HB), pp. 425–428.
ICPRICPR-v1-2006-RiponTKI #algorithm #clustering #multi #search-based
Multi-Objective Evolutionary Clustering using Variable-Length Real Jumping Genes Genetic Algorithm (KSNR, CHT, SK, MKI), pp. 1200–1203.
ICPRICPR-v1-2006-SungLK #realtime #recognition
A Real-Time Facial Expression Recognition using the STAAM (JS, SL, DK), pp. 275–278.
ICPRICPR-v1-2006-TakeshimaIK #detection #self
Object Contour Detection Using Spatio-temporal Self-sim (HT, TI, TK), pp. 613–617.
ICPRICPR-v1-2006-TakizawaY #3d #modelling #re-engineering
Surface Reconstruction from Stereovision Data Using a 3-D MRF of Discrete Object Models (HT, SY), pp. 27–30.
ICPRICPR-v1-2006-TanakaHOK
Use of Viewpoint Information for Example Selection in CBIR (KT, MH, NO, EK), p. 1054.
ICPRICPR-v1-2006-TongWZJ #multi
Facial Feature Tracking using a Multi-State Hierarchical Shape Model under Varying Face Pose and Facial Expression (YT, YW, ZZ, QJ), pp. 283–286.
ICPRICPR-v1-2006-TrujilloO #detection #evolution #how
Using Evolution to Learn How to Perform Interest Point Detection (LT, GO), pp. 211–214.
ICPRICPR-v1-2006-WangB #3d #automation #estimation
Automatic Estimation of 3D Transformations using Skeletons for Object Alignment (TW, AB), pp. 51–54.
ICPRICPR-v1-2006-WeiB #data analysis #segmentation #statistics
Unsupervised Segmentation Using Gabor Wavelets and Statistical Features in LIDAR Data Analysis (HW, MB), pp. 667–670.
ICPRICPR-v1-2006-WijewickremaPE #image #re-engineering
Reconstruction of Spheres using Occluding Contours from Stereo Images (SNRW, APP, CEE), pp. 151–154.
ICPRICPR-v1-2006-WongC #classification #gesture #recognition
Continuous Gesture Recognition using a Sparse Bayesian Classifier (SFW, RC), pp. 1084–1087.
ICPRICPR-v1-2006-WuW #graph
Stereo Correspondence Using Stripe Adjacency Graph (CCW, ZFW), pp. 123–126.
ICPRICPR-v1-2006-XieL #animation #markov #modelling #speech
Speech Animation Using Coupled Hidden Markov Models (LX, ZQL), pp. 1128–1131.
ICPRICPR-v1-2006-YingZ06a #image
Using Sphere Images for Calibrating Fisheye Cameras under the Unified Imaging Model of the Central Catadioptric and Fisheye Cameras (XY, HZ), pp. 539–542.
ICPRICPR-v1-2006-YinWLB #3d #interactive
Analyzing Facial Expressions Using Intensity-Variant 3D Data For Human Computer Interaction (LY, XW, PL, AB), pp. 1248–1251.
ICPRICPR-v1-2006-YouZCWT #representation
Face Representation By Using Non-tensor Product Wavelets (XY, DZ, QC, PSPW, YYT), pp. 503–506.
ICPRICPR-v1-2006-ZengL #markov #random #segmentation
Stroke Segmentation of Chinese Characters Using Markov Random Fields (JZ, ZQL), pp. 868–871.
ICPRICPR-v1-2006-ZhangFX #detection #image #orthogonal
Detection of moving cast shadows using image orthogonal transform (WZ, XF, YX), pp. 626–629.
ICPRICPR-v1-2006-ZhangSL #multi #segmentation
Motion Segmentation by Multibody Trifocal Tensor Using Line Correspondence (JZ, FS, YL), pp. 599–602.
ICPRICPR-v1-2006-ZhangT #documentation #image
RestoringWarped Document Images using Shape-from-Shading and Surface Interpolation (LZ, CLT), pp. 642–645.
ICPRICPR-v1-2006-ZhongMH
Camera Calibration Using Circle and Right Angles (HZ, FM, YSH), pp. 646–649.
ICPRICPR-v1-2006-ZhouW06a #verification
Face Verification Using GaborWavelets and AdaBoost (MZ, HW), pp. 404–407.
ICPRICPR-v2-2006-AhnKB #estimation #graph #robust #segmentation
Robust Object Segmentation Using Graph Cut with Object and Background Seed Estimation (JHA, KCK, HB), pp. 361–364.
ICPRICPR-v2-2006-AndelicSKK #hybrid #kernel #modelling #speech
A Hybrid HMM-Based Speech Recognizer Using Kernel-Based Discriminants as Acoustic Models (EA, MS, MK, SEK), pp. 1158–1161.
ICPRICPR-v2-2006-ArivazhaganGK #classification #statistics
Texture classification using Curvelet Statistical and Co-occurrence Features (SA, LG, TGSK), pp. 938–941.
ICPRICPR-v2-2006-BarakatB
Rule Extraction from Support Vector Machines: Measuring the Explanation Capability Using the Area under the ROC Curve (NHB, APB), pp. 812–815.
ICPRICPR-v2-2006-BhattacharyaRD06a #clustering #fuzzy #image #representation #retrieval #semantics
Image Representation and Retrieval Using Support Vector Machine and Fuzzy C-means Clustering Based Semantical Spaces (PB, MMR, BCD), pp. 1162–1168.
ICPRICPR-v2-2006-BhuiyanN #classification #detection #image
Anti-personnel Mine Detection and Classification Using GPR Image (AB, BN), pp. 1082–1085.
ICPRICPR-v2-2006-ChenB #classification #invariant
Invariant Texture Classification Using Ridgelet Packets (GC, PB), pp. 464–467.
ICPRICPR-v2-2006-ChenW #analysis #component #independence #segmentation
Texture Segmentation Using Independent Component Analysis of Gabor Features (YC, RW), pp. 147–150.
ICPRICPR-v2-2006-ChenY #modelling #video
Exploiting High Dimensional Video Features Using Layered Gaussian Mixture Models (DC, JY), pp. 1078–1081.
ICPRICPR-v2-2006-ChiangK #classification
Classification of Line and Character Pixels on Raster Maps Using Discrete Cosine Transformation Coefficients and Support Vector Machine (YYC, CAK), pp. 1034–1037.
ICPRICPR-v2-2006-ChiuL #invariant
Matching Interest Points Using Affine Invariant Concentric Circles (HPC, TLP), pp. 167–170.
ICPRICPR-v2-2006-ChoiLY #classification #feature model
Feature Extraction for Bank Note Classification Using Wavelet Transform (EC, JL, JY), pp. 934–937.
ICPRICPR-v2-2006-CourteilleDM #problem
A Global Solution to the SFS Problem Using B-spline Surface and Simulated Annealing (FC, JDD, GM), pp. 332–335.
ICPRICPR-v2-2006-DornaikaD #modelling #recognition
Facial Expression Recognition using Auto-regressive Models (FD, FD), pp. 520–523.
ICPRICPR-v2-2006-DowsonBK #image
Image template matching using Mutual Information and NP-Windows (NDHD, RB, TK), pp. 1186–1191.
ICPRICPR-v2-2006-Ekbal #classification #predict
Improvement of Prediction Accuracy Using Discretization and Voting Classifier (AE), pp. 695–698.
ICPRICPR-v2-2006-FangC #detection #robust #statistics
Using Statistical Shape Priors in Geodesic Active Contours for Robust Object Detection (WF, KLC), pp. 304–307.
ICPRICPR-v2-2006-FloreaBRB #image #representation
Using texture-based symbolic features for medical image representation (FF, EB, AR, AB), pp. 946–949.
ICPRICPR-v2-2006-FuLHB #image #retrieval
Content-based Image Retrieval Using Gabor-Zernike Features (XF, YL, RWH, SB), pp. 417–420.
ICPRICPR-v2-2006-GanD #relational
Differentiating Between Many Similar Features using Relational Information in Space and Scale (TSYG, TD), pp. 638–641.
ICPRICPR-v2-2006-GongY #estimation #orthogonal #programming
Disparity Flow Estimation using Orthogonal Reliability-based Dynamic Programming (MG, YHY), pp. 70–73.
ICPRICPR-v2-2006-GrimHSP #approach #modelling
A Subspace Approach to Texture Modelling by Using Gaussian Mixtures (JG, MH, PS, PP), pp. 235–238.
ICPRICPR-v2-2006-Guo #perspective
Plane Rectification Using a Circle and Points from a Single View (FG), pp. 9–12.
ICPRICPR-v2-2006-GuptaD #detection #multi
Texture Edge Detection using Multi-resolution Features and SOM (LG, SD), pp. 199–202.
ICPRICPR-v2-2006-HaindlM #approach #modelling #multi #segmentation
Unsupervised Texture Segmentation Using Multispectral Modelling Approach (MH, SM), pp. 203–206.
ICPRICPR-v2-2006-InoueNK #analysis #feature model #kernel #recognition #string
Historical Hand-Written String Recognition by Non-linear Discriminant Analysis using Kernel Feature Selection (RI, HN, NK), pp. 1094–1097.
ICPRICPR-v2-2006-KimYL #estimation #image #interactive #modelling #parametricity #random #segmentation
New MRF Parameter Estimation Technique for Texture Image Segmentation using Hierarchical GMRF Model Based on Random Spatial Interaction and Mean Field Theory (DHK, IDY, SUL), pp. 365–368.
ICPRICPR-v2-2006-Kita #detection
Change detection using joint intensity histogram (YK), pp. 351–356.
ICPRICPR-v2-2006-KuijperOBG #2d #set #symmetry
Matching 2D Shapes using their Symmetry Sets (AK, OFO, PB, PJG), pp. 179–182.
ICPRICPR-v2-2006-LeS #detection #named #robust
Ent-Boost: Boosting Using Entropy Measure for Robust Object Detection (DDL, SS), pp. 602–605.
ICPRICPR-v2-2006-LiLL #framework #geometry #multi
A Geometric Active Contour Framework using Multi-Cue and Local Feature (ZL, QL, HL), pp. 113–116.
ICPRICPR-v2-2006-LiLWH #detection #framework #image #novel
A Novel Framework for Urban Change Detection Using VHR Satellite Images (WL, XL, YW, ZH), pp. 312–315.
ICPRICPR-v2-2006-LimCG #identification
Scene Identification using Discriminative Patterns (JHL, JPC, SG), pp. 642–645.
ICPRICPR-v2-2006-Liu #classification #feature model #polynomial #recognition
High Accuracy Handwritten Chinese Character Recognition Using Quadratic Classifiers with Discriminative Feature Extraction (CLL), pp. 942–945.
ICPRICPR-v2-2006-LiuL #classification #image
Genus-Zero Shape Classification Using Spherical Normal Image (SL, JL), pp. 126–129.
ICPRICPR-v2-2006-LocteauRALHT #algorithm #approximate #multi #search-based
Approximation of Digital Curves using a Multi-Objective Genetic Algorithm (HL, RR, SA, YL, PH, ÉT), pp. 716–719.
ICPRICPR-v2-2006-Mainar-RuizP #approximate #multi #nearest neighbour
Approximate Nearest Neighbor Search using a Single Space-filling Curve and Multiple Representations of the Data Points (GMR, JCPC), pp. 502–505.
ICPRICPR-v2-2006-MakkapatiM #encoding
Contour Encoding Based on Extraction of Key Points Using Wavelet Transform (VM, PRM), pp. 1177–1180.
ICPRICPR-v2-2006-Mancas-ThillouG
Character Segmentation-by-Recognition Using Log-Gabor Filters (CMT, BG), pp. 901–904.
ICPRICPR-v2-2006-MaZSCG #estimation #robust
Robust Head Pose Estimation Using LGBP (BM, WZ, SS, XC, WG), pp. 512–515.
ICPRICPR-v2-2006-MeleMS #categorisation #image #probability
Image Categorization Using Local Probabilistic Descriptors (KM, JM, DS), pp. 336–340.
ICPRICPR-v2-2006-NedzvedAU #pseudo
Gray-scale thinning by using a pseudo-distance map (AN, SA, SU), pp. 239–242.
ICPRICPR-v2-2006-OsawaWWY #3d
Human Tracking by Particle Filtering Using Full 3D Model of Both Target and Environment (TO, XW, KW, TY), pp. 25–28.
ICPRICPR-v2-2006-PanBD #bottom-up #contest #functional #image #segmentation
Bottom-Up Hierarchical Image Segmentation Using Region Competition and the Mumford-Shah Functional (YP, JDB, SMD), pp. 117–121.
ICPRICPR-v2-2006-PriorW #fault #parametricity #probability #random
Parameter Tuning using the Out-of-Bootstrap Generalisation Error Estimate for Stochastic Discrimination and Random Forests (MP, TW), pp. 498–501.
ICPRICPR-v2-2006-QiaoY06a #bidirectional #image #multi
Recover Writing Trajectory from Multiple Stroked Image Using Bidirectional Dynamic Search (YQ, MY), pp. 970–973.
ICPRICPR-v2-2006-RamalhoM #detection #image
Using Boosting to Improve Oil Spill Detection in SAR Images (GLBR, FNSdM), pp. 1066–1069.
ICPRICPR-v2-2006-SenerU #analysis #component #independence #invariant #normalisation
A New Affine Invariant Curve Normalization Technique Using Independent Component Analysis (SS, MU), p. 48.
ICPRICPR-v2-2006-ShiratoriGK #performance
An Efficient Text Capture Method for Moving Robots Using DCT Feature and Text Tracking (HS, HG, HK), pp. 1050–1053.
ICPRICPR-v2-2006-SomolP #algorithm #feature model #keyword #multi #prototype
Multi-Subset Selection for Keyword Extraction and Other Prototype Search Tasks Using Feature Selection Algorithms (PS, PP), pp. 736–739.
ICPRICPR-v2-2006-Strand #3d #distance #fourier #grid #image #re-engineering
Using the Hexagonal Grid for Three-Dimensional Images: Direct Fourier Method Reconstruction and Weighted Distance Transform (RS), pp. 1169–1172.
ICPRICPR-v2-2006-Sun06a #multi #recognition
Multi-Linguistic Optical Font Recognition Using Stroke Templates (HMS), pp. 889–892.
ICPRICPR-v2-2006-SunV #detection #linear #multi #performance
Fast Linear Feature Detection Using Multiple Directional Non-Maximum Suppression (CS, PV), pp. 288–291.
ICPRICPR-v2-2006-TangT #analysis #linear #performance
Fast Linear Discriminant Analysis Using Binary Bases (FT, HT), pp. 52–55.
ICPRICPR-v2-2006-TerradesTV #adaptation
Combination of shape descriptors using an adaptation of boosting (ORT, ST, EV), pp. 764–767.
ICPRICPR-v2-2006-UsoPSG #clustering #multi
Clustering-based multispectral band selection using mutual information (AMU, FP, JMS, PGS), pp. 760–763.
ICPRICPR-v2-2006-WangH #equation #probability
Probabilistic Relaxation using the Heat Equation (HW, ERH), pp. 666–669.
ICPRICPR-v2-2006-WangZC #locality #performance
Efficient Topological Localization Using Orientation Adjacency Coherence Histograms (JW, HZ, RC), pp. 271–274.
ICPRICPR-v2-2006-YangG #composition #invariant
Line-Based Affine Invariant Object Location Using Transformation Space Decomposition (RY, YG), pp. 646–649.
ICPRICPR-v2-2006-YangQHE #adaptation #geometry #image #recognition #retrieval
Near-Duplicate Image Recognition and Content-based Image Retrieval using Adaptive Hierarchical Geometric Centroids (MY, GQ, JH, DE), pp. 958–961.
ICPRICPR-v2-2006-YangS #detection #random
Detecting Coarticulation in Sign Language using Conditional Random Fields (RY, SS), pp. 108–112.
ICPRICPR-v2-2006-YaslanC #classification #feature model #music
Audio Music Genre Classification Using Different Classifiers and Feature Selection Methods (YY, ), pp. 573–576.
ICPRICPR-v2-2006-YokobayashiW #correlation #recognition
Binarization and Recognition of Degraded Characters Using a Maximum Separability Axis in Color Space and GAT Correlation (MY, TW), pp. 885–888.
ICPRICPR-v2-2006-YuC #image #segmentation #semantics
Joint Image Segmentation and Interpretation Using Iterative Semantic Region Growing on SAR Sea Ice Imagery (QY, DAC), pp. 223–226.
ICPRICPR-v2-2006-ZhangJHW #detection
Learning-Based License Plate Detection Using Global and Local Features (HZ, WJ, XH, QW), pp. 1102–1105.
ICPRICPR-v2-2006-Zheng #recognition
Machine Printed Arabic Character Recognition Using S-GCM (LZ), pp. 893–896.
ICPRICPR-v2-2006-ZhouBS #image
Extracting Lines in Noisy Image Using Directional Information (JZ, WFB, GASA), pp. 215–218.
ICPRICPR-v3-2006-AbateNRS #3d #fourier #recognition
3D Face Recognition using Normal Sphere and General Fourier Descriptor (AFA, MN, DR, GS), pp. 1183–1186.
ICPRICPR-v3-2006-AbdallahHB #composition #image #performance #robust
A robust block-based image watermarking scheme using fast Hadamard transform and singular value decomposition (EEA, ABH, PB), pp. 673–676.
ICPRICPR-v3-2006-AgrawalK #locality #realtime
Real-time Localization in Outdoor Environments using Stereo Vision and Inexpensive GPS (MA, KK), pp. 1063–1068.
ICPRICPR-v3-2006-AlleneP #image #optimisation
Image Renaissance Using Discrete Optimization (CA, NP), pp. 631–634.
ICPRICPR-v3-2006-ArreolaFB #classification #linear #performance
Fast Support Vector Machine Classification using linear SVMs (KZA, JF, HB), pp. 366–369.
ICPRICPR-v3-2006-AsanoTTTANTHM
Extraction of trabecular structures of mandible excluding tooth roots on dental panoramic radiographs using mathematical morphology (AA, TT, AT, CMA, TN, KT, TH, MM), pp. 988–991.
ICPRICPR-v3-2006-AssabieB #recognition
Ethiopic Character Recognition Using Direction Field Tensor (YA, JB), pp. 284–287.
ICPRICPR-v3-2006-BarbuRLAHT #algorithm #classification #graph #recognition #search-based
Graph Classification Using Genetic Algorithm and Graph Probing Application to Symbol Recognition (EB, RR, HL, SA, PH, ÉT), pp. 296–299.
ICPRICPR-v3-2006-BeleznaiFB #multi
Multiple Object Tracking Using Local PCA (CB, BF, HB), pp. 79–82.
ICPRICPR-v3-2006-BeveridgeSR #classification #comparison #detection #naive bayes
A Comparison of Pixel, Edge andWavelet Features for Face Detection using a Semi-Naive Bayesian Classifier (JRB, JS, BR), pp. 1175–1178.
ICPRICPR-v3-2006-BianchiniMS #locality #network #recursion
Object Localization Using Input/Output Recursive Neural Networks (MB, MM, LS), pp. 95–98.
ICPRICPR-v3-2006-BouchaffraT #markov #recognition
Protein Fold Recognition using a Structural Hidden Markov Model (DB, JT), pp. 186–189.
ICPRICPR-v3-2006-CaronV #evaluation #image #modelling #quality
Compressed Image Quality Evaluation using Power Law Models (YC, NV), pp. 657–660.
ICPRICPR-v3-2006-ChairunnandaGC #distance #edit distance #sequence
Enhancing Edit Distance on Real Sequences Filters using Histogram Distance on Fixed Reference Ordering (PC, VG, LC), pp. 582–585.
ICPRICPR-v3-2006-ChoiAB #segmentation
Face Alignment Using Segmentation and a Combined AAM in a PTZ Camera (KC, JHA, HB), pp. 1191–1194.
ICPRICPR-v3-2006-EmmsHW #graph #quantum
Graph Matching using Interference of Coined Quantum Walks (DE, ERH, RCW), pp. 133–136.
ICPRICPR-v3-2006-ErikssonA #image
Bijective Image Registration using Thin-Plate Splines. (APE, ), pp. 798–801.
ICPRICPR-v3-2006-GuoL #image #multi
Multi-modality Image Registration Using Mutual Information Based on Gradient Vector Flow (YG, CCL), pp. 697–700.
ICPRICPR-v3-2006-GutmanWLCT #analysis
Hippocampal Surface Analysis Using Spherical Harmonic Function Applied to Surface Conformal Mapping (BG, YW, LML, TFC, PMT), pp. 964–967.
ICPRICPR-v3-2006-HuangL #image
A Secret Image Sharing Method Using Integer-to-Integer Wavelet Transform (CPH, CCL), pp. 802–805.
ICPRICPR-v3-2006-KananFE #locality #performance #recognition
An Efficient Face Recognition System Using a New Optimized Localization Method (HRK, KF, ME), pp. 564–567.
ICPRICPR-v3-2006-KlausSK #adaptation #difference #self
Segment-Based Stereo Matching Using Belief Propagation and a Self-Adapting Dissimilarity Measure (AK, MS, KFK), pp. 15–18.
ICPRICPR-v3-2006-KohmuraW #algorithm #search-based
Determining Optimal Filters for Binarization of Degraded Characters in Color Using Genetic Algorithms (HK, TW), pp. 661–664.
ICPRICPR-v3-2006-KyweFM #algorithm #image #realtime #scheduling
Scheduling of Image Processing Using Anytime Algorithm for Real-time System (WWK, DF, KM), pp. 1095–1098.
ICPRICPR-v3-2006-LakamperL #3d
Using Extended EM to Segment Planar Structures in 3D (RL, LJL), pp. 1077–1082.
ICPRICPR-v3-2006-LamL #identification
Human Identification by Using the Motion and Static Characteristic of Gait (THWL, RSTL), pp. 996–999.
ICPRICPR-v3-2006-LeeE06a
Simultaneous Inference of View and Body Pose using Torus Manifolds (CSL, AME), pp. 489–494.
ICPRICPR-v3-2006-LeoputraTL #distributed
Non-overlapping Distributed Tracking using Particle Filter (WSL, TT, FLL), pp. 181–185.
ICPRICPR-v3-2006-LernerV #classification #fuzzy #image #search-based
Image Classification for Genetic Diagnosis using Fuzzy ARTMAP (BL, BV), pp. 362–365.
ICPRICPR-v3-2006-LiC #classification #nearest neighbour #probability
Classification Using the Local Probabilistic Centers of k-Nearest Neighbors (BYL, YWC), pp. 1220–1223.
ICPRICPR-v3-2006-LiPKZ #multimodal
Multimodal Registration using the Discrete Wavelet Frame Transform (SL, JP, JTK, JZ), pp. 877–880.
ICPRICPR-v3-2006-MakkapatiM06a
Vector Quantization Using Reflections of Triangular Subcodevectors (VM, PRM), pp. 701–704.
ICPRICPR-v3-2006-NgOFGN #automation #image #information management #segmentation
Automatic Segmentation of Muscles of Mastication from Magnetic Resonance Images Using Prior Knowledge (HPN, SHO, KWCF, PSG, WLN), pp. 968–971.
ICPRICPR-v3-2006-NguyenSQN #fuzzy #predict
Traffic Prediction Using Ying-Yang Fuzzy Cerebellar Model Articulation Controller (MNN, DS, CQ, GSN), pp. 258–261.
ICPRICPR-v3-2006-NieuwenhuisY #image #knowledge base #network
Knowledge Based Image Enhancement Using Neural Networks (CN, MY), pp. 814–817.
ICPRICPR-v3-2006-PalenichkaZ #image #network
Perceptual Knowledge Extraction Using Bayesian Networks of Salient Image Objects (RMP, MBZ), pp. 1216–1219.
ICPRICPR-v3-2006-ParkJKKH #multi #named #visual notation
ViSE: Visual Search Engine Using Multiple Networked Cameras (UP, AKJ, IK, KK, NH), pp. 1204–1207.
ICPRICPR-v3-2006-ParkLL #3d
Superimposing 3D Virtual Objects using Markerless Tracking (SCP, SWL, SWL), pp. 897–900.
ICPRICPR-v3-2006-PetterssonKB #automation #segmentation
Automatic Hip Bone Segmentation Using Non-Rigid Registration (JP, HK, MB), pp. 946–949.
ICPRICPR-v3-2006-PlotzFHKLMMSSS #automation #detection #modelling #music #probability
Automatic Detection of Song Changes in Music Mixes Using Stochastic Models (TP, GAF, PH, SK, KL, TM, MM, LS, MS, HS), pp. 665–668.
ICPRICPR-v3-2006-QiuH #graph
Graph Matching using Commute Time Spanning Trees (HQ, ERH), pp. 1224–1227.
ICPRICPR-v3-2006-QiuXT #clustering #feedback #kernel #performance
Efficient Relevance Feedback Using Semi-supervised Kernel-specified K-means Clustering (BQ, CX, QT), pp. 316–319.
ICPRICPR-v3-2006-RendekW #consistency #set
Extraction of Consistent Subsets of Descriptors using Choquet Integral (JR, LW), pp. 208–211.
ICPRICPR-v3-2006-SakaiA #detection #metric
Human and Object Detection in Smoke-filled Space using Millimeter-wave radar based Measurement System (MS, YA), p. 750.
ICPRICPR-v3-2006-ScheundersB #component #image #multi
Wavelet denoising of multicomponent images, using a Gaussian Scale Mixture model (PS, SDB), pp. 754–757.
ICPRICPR-v3-2006-SchlapbachB #identification #modelling
Off-lineWriter Identification Using Gaussian Mixture Models (AS, HB), pp. 992–995.
ICPRICPR-v3-2006-ShinozakiUGR #image
Correction of intensity of a color image using a range intensity image (MS, KU, GG, MR), pp. 774–777.
ICPRICPR-v3-2006-SmithKHI #recognition
Face Recognition Using Angular LDA and SVM Ensembles (RSS, JK, MH, JI), pp. 1008–1012.
ICPRICPR-v3-2006-TianK06a #algorithm #distance #performance
An Efficient Algorithm for Point Matching Using Hilbert Scanning Distance (LT, SiK), pp. 873–876.
ICPRICPR-v3-2006-Wang06a #analysis
Abnormal Walking Gait Analysis Using Silhouette-Masked Flow Histograms (LW0), pp. 473–476.
ICPRICPR-v3-2006-WangGZLZ #identification
Palmprint Identification using Boosting Local Binary Pattern (XW, HG, HZ, BL, ZZ), pp. 503–506.
ICPRICPR-v3-2006-WangWKH #probability #video
Tracking a Variable Number of Human Groups in Video Using Probability Hypothesis Density (YDW, JKW, AAK, WH), pp. 1127–1130.
ICPRICPR-v3-2006-WongWC #classification #robust
Robust Appearance-based Tracking using a sparse Bayesian classifier (SFW, KYKW, RC), pp. 47–50.
ICPRICPR-v3-2006-XueD #2d #3d #locality #multi
3D+2D Face Localization Using Boosting in Multi-Modal Feature Space (FX, XD), pp. 499–502.
ICPRICPR-v3-2006-XueLF #image
Iterative Image Restoration using a Non-Local Regularization Function and a Local Regularization Operator (FX, QSL, WF), pp. 766–769.
ICPRICPR-v3-2006-YamazakiCX #analysis #component #image #independence #kernel
Separating Reflections from Images Using Kernel Independent Component Analysis (MY, YWC, GX), pp. 194–197.
ICPRICPR-v3-2006-YamazoeUA #constraints #geometry #multi #optimisation
Multiple Camera Calibration with Bundled Optimization using Silhouette Geometry Constraints (HY, AU, SA), pp. 960–963.
ICPRICPR-v3-2006-YangL06a #3d #image #learning #sequence
Reconstructing 3D Human Body Pose from Stereo Image Sequences Using Hierarchical Human Body Model Learning (HDY, SWL), pp. 1004–1007.
ICPRICPR-v3-2006-YuL #distance #recognition
Shape Recognition using Curve Segment Hausdorff Distance (XY, MKHL), pp. 441–444.
ICPRICPR-v3-2006-YunBK #dependence #realtime #recognition #relational #visual notation
Real-time Object Recognition using Relational Dependency based on Graphical Model (WHY, SYB, DK), pp. 28–32.
ICPRICPR-v3-2006-ZhangY #image #multi
Multiple Regions of Interest Image Coding using Compensation Scheme and Alternating Shift (LbZ, XY), pp. 758–761.
ICPRICPR-v3-2006-ZouariHL #comparison
Experimental Comparison of Combination Rules using Simulated Data (HZ, LH, YL), pp. 152–155.
ICPRICPR-v4-2006-AndersenJM #estimation
Estimation of Dynamic Light Changes in Outdoor Scenes Without the use of Calibration Objects (MSA, TJ, CBM), pp. 91–94.
ICPRICPR-v4-2006-ChenLL #video
Video Scene Extraction Using Mosaic Technique (LHC, YCL, HYML), pp. 723–726.
ICPRICPR-v4-2006-ChikkerurPJRB #locality #representation
Fingerprint Representation Using Localized Texture Features (SC, SP, AJ, NKR, RMB), pp. 521–524.
ICPRICPR-v4-2006-Choi #cumulative #recognition #robust #speech
A Noise Robust Front-end for Speech Recognition Using Hough Transform and Cumulative Distribution Mapping (EHCC), pp. 286–289.
ICPRICPR-v4-2006-CuiZZS #multi #people #robust
Robust Tracking of Multiple People in Crowds Using Laser Range Scanners (JC, HZ, HZ, RS), pp. 857–860.
ICPRICPR-v4-2006-DhandraHHM #analysis #image #segmentation
Analysis of Abnormality in Endoscopic images using Combined HSI Color Space and Watershed Segmentation (BVD, RH, MH, VSM), pp. 695–698.
ICPRICPR-v4-2006-FengC #invariant
Fingerprint Indexing Using Ridge Invariants (JF, AC), pp. 433–436.
ICPRICPR-v4-2006-FusseneggerOP #locality #segmentation
Object localization/segmentation using generic shape priors (MF, AO, AP), pp. 41–44.
ICPRICPR-v4-2006-Garcia-PerezMBB #image #retrieval
Object-Based Image Retrieval Using Active Nets (DGP, AMG, SB, ADB), pp. 750–753.
ICPRICPR-v4-2006-HafezJ #estimation #visual notation
Target Model Estimation using Particle Filters for Visual Servoing (AHAH, CVJ), pp. 651–654.
ICPRICPR-v4-2006-HeYTWX #image #matrix #novel #retrieval #symmetry
Texture Image Retrieval Using Novel Non-separable Filter Banks Based on Centrally Symmetric Matrices (ZH, XY, YYT, PSPW, YX), pp. 161–164.
ICPRICPR-v4-2006-JainCD
Pores and Ridges: Fingerprint Matching Using Level 3 Features (AKJ, YC, MD), pp. 477–480.
ICPRICPR-v4-2006-KimPL #3d
Tracking 3D Human Body using Particle Filter in Moving Monocular Camera (SK, CBP, SWL), pp. 805–808.
ICPRICPR-v4-2006-KropotovPVV #kernel #on the #principle
On Kernel Selection in Relevance Vector Machines Using Stability Principle (DK, NP, OV, DV), pp. 233–236.
ICPRICPR-v4-2006-KryszczukD #detection
Singular point detection in fingerprints using quadrant change information (KK, AD), pp. 594–597.
ICPRICPR-v4-2006-KwonYKL #clustering
Fingerprint Matching Method Using Minutiae Clustering and Warping (DK, IDY, DHK, SUL), pp. 525–528.
ICPRICPR-v4-2006-KyweYM #lens
Contact Lens Extraction by Using Thermo-Vision (WWK, MY, KM), pp. 570–573.
ICPRICPR-v4-2006-LaurendeauB #distance
Shape-Based Contour Interpolation and Extrapolation Using Distance Mapping (DL, OB), pp. 659–662.
ICPRICPR-v4-2006-LiC06a #classification #nearest neighbour #probability
Classification Using the Local Probabilistic Centers of k-Nearest Neighbors (BYL, YWC), p. 954.
ICPRICPR-v4-2006-LienY #performance #predict
A Fast Mode Decision Method for H.264/AVC Using the Spatial-Temporal Prediction Scheme (CCL, CPY), pp. 334–337.
ICPRICPR-v4-2006-LiL06a #identification
Hierarchical Identification of Palmprint using Line-based Hough Transform (FL, MKHL), pp. 149–152.
ICPRICPR-v4-2006-LiZZB #analysis #approach #automation #multi #segmentation
A New Approach to Automated Retinal Vessel Segmentation Using Multiscale Analysis (QL, LZ, DZ, PB), pp. 77–80.
ICPRICPR-v4-2006-LuC06a #3d #analysis #metric
Practical 3-D Shape Measurement Using Optimal Intensity-Modulated Projection and Intensity-Phase Analysis Techniques (CL, GC), pp. 870–873.
ICPRICPR-v4-2006-MacenkoCM #detection #segmentation
Lesion Detection Using Morphological Watershed Segmentation and Modelbased Inverse Filtering (MM, MC, LM), pp. 679–682.
ICPRICPR-v4-2006-MellakhPD
Using Signal/Residual Information of Eigenfaces for PCA Face Space Dimensionality Characteristics (MAM, DPD, BD), pp. 574–577.
ICPRICPR-v4-2006-MoncrieffVW #modelling
Unifying Background Models over Complex Audio using Entropy (SM, SV, GAWW), pp. 249–253.
ICPRICPR-v4-2006-NagaharaMIYS #generative #video
High-resolution Video Generation Using Morphing (HN, TM, YI, MY, TS), pp. 338–341.
ICPRICPR-v4-2006-NagarC #design #fuzzy #symmetry
Biometrics based Asymmetric Cryptosystem Design Using Modified Fuzzy Vault Scheme (AN, SC), pp. 537–540.
ICPRICPR-v4-2006-NiuG #network
Recovering Non-overlapping Network Topology Using Far-field Vehicle Tracking Data (CN, EG), pp. 944–949.
ICPRICPR-v4-2006-NosratighodsAE #novel #set #verification
Speaker Verification Using A Novel Set of Dynamic Features (MN, EA, JE), pp. 266–269.
ICPRICPR-v4-2006-Onoguchi #correlation #detection
Moving Object Detection Using a Cross Correlation between a Short Accumulated Histogram and a Long Accumulated Histogram (KO), pp. 896–899.
ICPRICPR-v4-2006-PalenichkaZ06a #image #network
Perceptual Knowledge Extraction Using Bayesian Networks of Salient Image Objects (RMP, MBZ), p. 953.
ICPRICPR-v4-2006-QiuH06a #graph
Graph Matching using Commute Time Spanning Tr (HQ, ERH), p. 955.
ICPRICPR-v4-2006-QuanZ
Data Hiding in MPEG Compressed Audio Using Wet Paper Codes (XQ, HZ), pp. 727–730.
ICPRICPR-v4-2006-ReisertB #3d #data-driven #database #integration #invariant
Invariant Features for 3D-Data based on Group Integration using Directional Information and Spherical Harmonic Expansion (MR, HB), pp. 206–209.
ICPRICPR-v4-2006-Rivera-RoveloB #algebra #framework #geometry #realtime
Non-Rigid Alignment and Real-Time Tracking Using the Geometric Algebra Framework (JRR, EBC), pp. 675–678.
ICPRICPR-v4-2006-ShaZT #set
Minutiae-based Fingerprint Matching Using Subset Combination (LS, FZ, XT), pp. 566–569.
ICPRICPR-v4-2006-ShibuyaU #image #mobile #self #standard
Self-Localization of a Mobile Robot Using Compressed Image Data of Average and Standard Deviation (NS, KU), pp. 614–617.
ICPRICPR-v4-2006-SmithH
Estimating Cast Shadows using SFS and Class-based Surface Completion (WAPS, ERH), pp. 86–90.
ICPRICPR-v4-2006-SvenssonGFSOS #composition #framework #fuzzy #image
Using a fuzzy framework for delineation and decomposition of Immunoglobulin G in cryo electron tomographic images (SS, MG, DF, US, LGO, SS), pp. 687–690.
ICPRICPR-v4-2006-TodorovicA #3d #classification #segmentation
3D Texture Classification Using the Belief Net of a Segmentation Tree (ST, NA), pp. 33–36.
ICPRICPR-v4-2006-UranishiNYIMC #metric
Whole Shape Measurement System Using a Single Camera and a Cylindrical Mirror (YU, MN, YY, MI, YM, KC), pp. 866–869.
ICPRICPR-v4-2006-VillamizarSA #detection #image #invariant #realtime
Computation of Rotation Local Invariant Features using the Integral Image for Real Time Object Detection (MV, AS, JAC), pp. 81–85.
ICPRICPR-v4-2006-WangAC #identification #multi #recognition
Multi-lingual Phoneme Recognition and Language Identification Using Phonotactic Information (LW, EA, EHCC), pp. 245–248.
ICPRICPR-v4-2006-WangC #detection #video
Detecting Video Texts Using Spatial-Temporal Wavelet Transform (YKW, JMC), pp. 754–757.
ICPRICPR-v4-2006-WangK #approach #automation #estimation
Automatic Alignment of High-Resolution NMR Spectra Using a Bayesian Estimation Approach (ZW, SBK), pp. 667–670.
ICPRICPR-v4-2006-WangWLJK #analysis #classification #component #independence
Content-Based Audio Classification Using Support Vector Machines and Independent Component Analysis (JCW, JFW, CBL, KTJ, WHK), pp. 157–160.
ICPRICPR-v4-2006-WangXC #2d #automation #classification #pseudo #video
Automatic Sports Video Genre Classification using Pseudo-2D-HMM (JW, CX, EC), pp. 778–781.
ICPRICPR-v4-2006-WuQ #geometry #identification
A Hierarchical Palmprint Identification Method Using Hand Geometry and Grayscale Distribution Features (JW, ZQ), pp. 409–412.
ICPRICPR-v4-2006-YamaguchiKN #detection #estimation
Vehicle Ego-Motion Estimation and Moving Object Detection using a Monocular Camera (KY, TK, YN), pp. 610–613.
ICPRICPR-v4-2006-YangG06a #multi #verification
Multi-SNR GMMs-Based Noise-Robust Speaker Verification Using 1/fa Noises (LY, WG), pp. 241–244.
ICPRICPR-v4-2006-YaoLYZL06a #algorithm #recognition
Iris Recognition Algorithm Using Modified Log-Gabor Filters (PY, JL, XY, ZZ, BL), pp. 461–464.
ICPRICPR-v4-2006-YiA
An Omnidirectional Stereo Vision System Using a Single Camera (SY, NA), pp. 861–865.
ICPRICPR-v4-2006-YuanMZL #matrix #recognition
Ear Recognition using Improved Non-Negative Matrix Factorization (LY, ZM, YZ, KL), pp. 501–504.
ICPRICPR-v4-2006-YuC06a #segmentation #statistics
Filament Preserving Segmentation for SAR Sea Ice Imagery Using a New Statistical Model (QY, DAC), pp. 849–852.
ICPRICPR-v4-2006-ZaimQSIT #clustering #image #robust #segmentation
A Robust and Accurate Segmentation of Iris Images Using Optimal Partitioning (AZ, MKQ, JS, JI, RT), pp. 578–581.
ICPRICPR-v4-2006-ZhaoCLP #recognition
Gait Recognition Using Fractal Scale and Wavelet Moments (GZ, LC, HL, MP), pp. 453–456.
ICPRICPR-v4-2006-ZhaoG06a #automation #energy #estimation #modelling
Automated Face Pose Estimation Using Elastic Energy Models (SZ, YG), pp. 618–621.
ICPRICPR-v4-2006-ZhaoSC #clustering
Fingerprint Registration Using Minutia Clusters and Centroid Structure 1 (DZ, FS, AC), pp. 413–416.
ICPRICPR-v4-2006-ZhengLZ #encryption #generative
Cryptographic Key Generation from Biometric Data Using Lattice Mapping (GZ, WL, CZ), pp. 513–516.
KDDKDD-2006-BarbaraDR #detection #statistics #testing
Detecting outliers using transduction and statistical testing (DB, CD, JPR), pp. 55–64.
KDDKDD-2006-KeCN #approach #correlation #mining
Mining quantitative correlated patterns using an information-theoretic approach (YK, JC, WN), pp. 227–236.
KDDKDD-2006-LiuZBX #analysis
Rule interestingness analysis using OLAP operations (BL, KZ, JB, WX), pp. 297–306.
KDDKDD-2006-LoekitoB #diagrams #mining #performance
Fast mining of high dimensional expressive contrast patterns using zero-suppressed binary decision diagrams (EL, JB), pp. 307–316.
KDDKDD-2006-ManiyarN #algorithm #data mining #mining #visual notation #visualisation
Visual data mining using principled projection algorithms and information visualization techniques (DMM, ITN), pp. 643–648.
KDDKDD-2006-NathBM #approach #classification #clustering #scalability
Clustering based large margin classification: a scalable approach using SOCP formulation (JSN, CB, MNM), pp. 674–679.
KDDKDD-2006-RattiganMJ #approximate #network #performance
Using structure indices for efficient approximation of network properties (MJR, MEM, DJ), pp. 357–366.
KDDKDD-2006-WangP #modelling #probability
Summarizing itemset patterns using probabilistic models (CW, SP), pp. 730–735.
KDDKDD-2006-XuWPWSF
Utility-based anonymization using local recoding (JX, WW, JP, XW, BS, AWCF), pp. 785–790.
KRKR-2006-BonetG #heuristic
Heuristics for Planning with Penalties and Rewards using Compiled Knowledge (BB, HG), pp. 452–462.
KRKR-2006-ClassenL #knowledge-based #source code
Foundations for Knowledge-Based Programs using ES (JC, GL), pp. 318–328.
SEKESEKE-2006-HuangC #probability #rule-based #similarity
Using Conditional Probability to Measure Rule-based Knowledge Similarity (CJH, MYC), pp. 41–44.
SEKESEKE-2006-HungL #data mining #mining #performance
Using Data Mining Schemes for Improvement on System Performance in Virtual Environments (SSH, DSML), pp. 61–66.
SEKESEKE-2006-KuleszaLAG #aspect-oriented #generative
Customizing Aspect-Oriented Variabilities using Generative Techniques (UK, CJPdL, PSCA, AG), pp. 17–22.
SEKESEKE-2006-MazzoleniVFMB #image #towards
Towards a contextualized access to the cultural heritage world using 360 Panoramic Images (PM, SV, SF, PM, EB), pp. 416–419.
SEKESEKE-2006-Merz #approach #java #security
Using the Dynamic Proxy Approach to Introduce Role-Based Security to Java Data Objects (MM), pp. 404–409.
SEKESEKE-2006-MichielsRBBD #modelling #testing
Program Testing Using High-Level Property-Driven Models (IM, CDR, JB, EGB, TD), pp. 489–494.
SEKESEKE-2006-PilskalnsA #design #ocl #security #testing #uml
Using UML Designs to Generate OCL for Security Testing (OP, AAA), pp. 505–510.
SEKESEKE-2006-SornilS #detection
Improving Intrusion Detection Systems Using Reference Vectors (OS, PS), pp. 398–403.
SEKESEKE-2006-SteinmacherLH #analysis #process #simulation #workflow
Task Anticipation: A Quantitative Analysis Using Workflow Process Simulation (IS, JVdL, EHMH), pp. 601–606.
SEKESEKE-2006-YuLSH #modelling
Modeling Complex Software Systems Using an Aspect Extension of Object-Z (HY, DL, ZS, XH), pp. 11–16.
SIGIRSIGIR-2006-AlonsoG #clustering
Clustering of search results using temporal attributes (OA, MG), pp. 597–598.
SIGIRSIGIR-2006-AnhM #evaluation #query
Pruned query evaluation using pre-computed impacts (VNA, AM), pp. 372–379.
SIGIRSIGIR-2006-AslamPY #evaluation #statistics
A statistical method for system evaluation using incomplete judgments (JAA, VP, EY), pp. 541–548.
SIGIRSIGIR-2006-DiazM #corpus #estimation #modelling #scalability
Improving the estimation of relevance models using large external corpora (FD, DM), pp. 154–161.
SIGIRSIGIR-2006-FernandezVC #rank
Using historical data to enhance rank aggregation (MF, DV, PC), pp. 643–644.
SIGIRSIGIR-2006-LiR #named #web
DeWild: a tool for searching the web using wild cards (HL, DR), p. 731.
SIGIRSIGIR-2006-MacdonaldO06a #framework #platform
Searching for expertise using the terrier platform (CM, IO), p. 732.
SIGIRSIGIR-2006-MayfieldM #documentation #retrieval
Improving QA retrieval using document priors (JM, PM), pp. 677–678.
SIGIRSIGIR-2006-MinkovCN #ambiguity #email #graph
Contextual search and name disambiguation in email using graphs (EM, WWC, AYN), pp. 27–34.
SIGIRSIGIR-2006-ParikhK #feedback #named #query
Unity: relevance feedback using user query logs (JP, SK), pp. 689–690.
SIGIRSIGIR-2006-RadlinskiD #personalisation #web
Improving personalized web search using result diversification (FR, STD), pp. 691–692.
SIGIRSIGIR-2006-RamirezWV #xml
Using small XML elements to support relevance (GR, TW, APdV), pp. 693–694.
SIGIRSIGIR-2006-TreeratpitukC #automation #case study #clustering #statistics
An experimental study on automatically labeling hierarchical clusters using statistical features (PT, JPC), pp. 707–708.
SIGIRSIGIR-2006-VaradarajanHL #web
Searching the web using composed pages (RV, VH, TL), pp. 713–714.
SIGIRSIGIR-2006-VassilvitskiiB #distance #feedback #web
Using web-graph distance for relevance feedback in web search (SV, EB), pp. 147–153.
ECMFAECMDA-FA-2006-BraheO #modelling #process #uml
Business Process Modeling: Defining Domain Specific Modeling Languages by Use of UML Profiles (SB, ), pp. 241–255.
ECMFAECMDA-FA-2006-EngelPK #model merging
Using a Model Merging Language for Reconciling Model Versions (KDE, RFP, DSK), pp. 143–157.
MODELSMoDELS-2006-DuarteKU #information management
Model Extraction Using Context Information (LMD, JK, SU), pp. 380–394.
MODELSMoDELS-2006-DucasseG #execution #metalanguage #smalltalk
Using Smalltalk as a Reflective Executable Meta-language (SD, TG), pp. 604–618.
MODELSMoDELS-2006-MensSD #analysis #consistency #dependence #detection #nondeterminism
Detecting and Resolving Model Inconsistencies Using Transformation Dependency Analysis (TM, RVDS, MD), pp. 200–214.
MODELSMoDELS-2006-SchattkowskyHE #design #process #synthesis #uml
Using UML Activities for System-on-Chip Design and Synthesis (TS, JHH, GE), pp. 737–752.
SPLCSPL-BOOK-2006-Engelsma #diagrams #evolution #incremental #integration #multi #product line
Incremental Systems Integration within Multidisciplinary Product Line Engineering Using Configuration Item Evolution Diagrams (EE), pp. 523–555.
SPLCSPLC-2006-HallsteinsenSSF #adaptation #product line
Using Product Line Techniques to Build Adaptive Systems (SOH, ES, AS, JF), pp. 141–150.
SPLCSPLC-2006-SpinczykP #feature model #modelling
Using Feature Models for Product Derivation (OS, HP), p. 225.
SPLCSPLC-2006-TraskRPB #component #modelling #product line
Using Model-Driven Engineering to Complement Software Product Line Engineering in Developing Software Defined Radio Components and Applications (BT, AR, DP, VB), pp. 192–202.
MODELSMoDELS-2006-DuarteKU #information management
Model Extraction Using Context Information (LMD, JK, SU), pp. 380–394.
MODELSMoDELS-2006-DucasseG #execution #metalanguage #smalltalk
Using Smalltalk as a Reflective Executable Meta-language (SD, TG), pp. 604–618.
MODELSMoDELS-2006-MensSD #analysis #consistency #dependence #detection #nondeterminism
Detecting and Resolving Model Inconsistencies Using Transformation Dependency Analysis (TM, RVDS, MD), pp. 200–214.
MODELSMoDELS-2006-SchattkowskyHE #design #process #synthesis #uml
Using UML Activities for System-on-Chip Design and Synthesis (TS, JHH, GE), pp. 737–752.
OOPSLAOOPSLA-2006-CavazosO #compilation
Method-specific dynamic compilation using logistic regression (JC, MFPO), pp. 229–240.
OOPSLAOOPSLA-2006-FairbanksGS #design #framework
Design fragments make using frameworks easier (GF, DG, WLS), pp. 75–88.
OOPSLAOOPSLA-2006-Hutchins #prototype
Eliminating distinctions of class: using prototypes to model virtual classes (DH), pp. 1–20.
OOPSLAOOPSLA-2006-KitMB #analysis #requirements #semantics
Isolating and relating concerns in requirements using latent semantic analysis (LKK, CKM, ELAB), pp. 383–396.
QAPLQAPL-2005-BinderH06 #bytecode #cpu #metric
Using Bytecode Instruction Counting as Portable CPU Consumption Metric (WB, JH), pp. 57–77.
AdaEuropeAdaEurope-2006-Maurer #ada
Using Mathematics to Improve Ada Compiled Code (WDM), pp. 191–202.
LOPSTRLOPSTR-2006-ArroyoRSV #graph #partial evaluation
Improving Offline Narrowing-Driven Partial Evaluation Using Size-Change Graphs (GA, JGR, JS, GV), pp. 60–76.
LOPSTRLOPSTR-2006-LeuschelCE #logic programming #online #partial evaluation #source code
Supervising Offline Partial Evaluation of Logic Programs Using Online Techniques (ML, SJC, DE), pp. 43–59.
LOPSTRLOPSTR-2006-Payet #detection #term rewriting
Detecting Non-termination of Term Rewriting Systems Using an Unfolding Operator (ÉP), pp. 194–209.
PADLPADL-2006-GouraudG #functional #java #testing #virtual machine
Using CHRs to Generate Functional Test Cases for the Java Card Virtual Machine (SDG, AG), pp. 1–15.
PADLPADL-2006-NavasBH #analysis #clique #performance #top-down
Efficient Top-Down Set-Sharing Analysis Using Cliques (JAN, FB, MVH), pp. 183–198.
PADLPADL-2006-QuesadaRDC #problem
Using Dominators for Solving Constrained Path Problems (LQ, PVR, YD, RC), pp. 73–87.
PEPMPEPM-2006-Edwards #fixpoint #simulation
Using program specialization to speed SystemC fixed-point simulation (SAE), pp. 21–28.
PLDIPLDI-2006-LauAHC #online #optimisation #performance
Online performance auditing: using hot optimizations without getting burned (JL, MA, MH, BC), pp. 239–251.
QAPLQAPL-2006-BinderH06a #bytecode #profiling #virtual machine
Exact and Portable Profiling for the JVM Using Bytecode Instruction Counting (WB, JH), pp. 45–64.
SASSAS-2006-Arnold #analysis #logic #refinement
Specialized 3-Valued Logic Shape Analysis Using Structure-Based Refinement and Loose Embedding (GA), pp. 204–220.
SASSAS-2006-ChangHN #analysis #low level
Analysis of Low-Level Code Using Cooperating Decompilers (BYEC, MH, GCN), pp. 318–335.
AdaSIGAda-2006-Carlisle #ada #automation #generative #object-oriented #parsing
Automatic OO parser generation using visitors for Ada 2005 (MCC), pp. 3–8.
AdaSIGAda-2006-Klein #ada
Use of Ada in Lockheed Martin for air traffic management and beyond (JK), p. 1.
AdaSIGAda-2006-Taft #ada #exclamation #why
Why you should be using Ada 2005 now! (STT), p. 75.
RERE-2006-AlencarMACSM #aspect-oriented
Using Aspects to Simplify iModels (FMRA, AMDM, JA, JC, CTLLS, JM), pp. 328–329.
RERE-2006-Gonzalez-BaixauliLL #elicitation #interactive #non-functional #requirements
Eliciting Non-Functional Requirements Interactions Using the Personal Construct Theory (BGB, JCSdPL, MAL), pp. 340–341.
RERE-2006-GordijnPW #comprehension #modelling
Understanding Business Strategies of Networked Value Constellations Using Goal- and Value Modeling (JG, MP, RW), pp. 126–135.
RERE-2006-KaiyaS #elicitation #ontology #requirements
Using Domain Ontology as Domain Knowledge for Requirements Elicitation (HK, MS), pp. 186–195.
ASEASE-2006-Antkiewicz #modelling
Round-Trip Engineering of Framework-Based Software using Framework-Specific Modeling Languages (MA), pp. 323–326.
ASEASE-2006-FalbRA #automation #design #interactive #specification #synthesis #user interface
Using communicative acts in interaction design specifications for automated synthesis of user interfaces (JF, TR, EA), pp. 261–264.
ASEASE-2006-HassanZ #certification #predict
Using Decision Trees to Predict the Certification Result of a Build (AEH, KZ), pp. 189–198.
ASEASE-2006-Jurjens #analysis #automation #java #proving #security #source code #theorem proving
Security Analysis of Crypto-based Java Programs using Automated Theorem Provers (JJ), pp. 167–176.
ASEASE-2006-LiuYR #library #model checking
Software Library Usage Pattern Extraction Using a Software Model Checker (CL, EY, DJR), pp. 301–304.
ASEASE-2006-RobbyDH #framework #model checking
Domain-specific Model Checking Using The Bogor Framework (R, MBD, JH), pp. 369–370.
FSEFSE-2006-GirouxR #detection #testing
Detecting increases in feature coupling using regression tests (OG, MPR), pp. 163–174.
FSEFSE-2006-HalfondOM #evaluation #injection #sql
Using positive tainting and syntax-aware evaluation to counter SQL injection attacks (WGJH, AO, PM), pp. 175–185.
FSEFSE-2006-KerstenM
Using task context to improve programmer productivity (MK, GCM), pp. 1–11.
FSEFSE-2006-StorzerRRT #classification #java #source code
Finding failure-inducing changes in java programs using change classification (MS, BGR, XR, FT), pp. 57–68.
ICSEICSE-2006-AbeMKKH #classification #estimation
Estimation of project success using Bayesian classifier (SA, OM, TK, NK, MH), pp. 600–603.
ICSEICSE-2006-Dolins #process
Using the balanced scorecard process to compute the value of software applications (SBD), pp. 881–884.
ICSEICSE-2006-FrantzeskouSGK #effectiveness #identification #source code
Effective identification of source code authors using byte-level information (GF, ES, SG, SKK), pp. 893–896.
ICSEICSE-2006-HalfondO #injection #sql
Preventing SQL injection attacks using AMNESIA (WGJH, AO), pp. 795–798.
ICSEICSE-2006-Holmes #reuse #scalability
Unanticipated reuse of large-scale software features (RH), pp. 961–964.
ICSEICSE-2006-JiamthubthugsinS #development
Portfolio management of software development projects using COCOMO II (WJ, DS), pp. 889–892.
ICSEICSE-2006-KrugerMM #architecture #aspect-oriented #performance
Efficient exploration of service-oriented architectures using aspects (IHK, RM, MM), pp. 62–71.
ICSEICSE-2006-NakamichiSSM #behaviour #detection #usability #web
Detecting low usability web pages using quantitative data of users’ behavior (NN, KS, MS, KiM), pp. 569–576.
ICSEICSE-2006-RundleD #agile
Using return on investment to compare agile and plan-driven practices in undergraduate group projects (PJR, RGD), pp. 649–654.
ICSEICSE-2006-Sindhgatta #information retrieval #source code
Using an information retrieval system to retrieve source code samples (RS), pp. 905–908.
ICSEICSE-2006-YangBC #estimation #integration #off the shelf
Assessing COTS integration risk using cost estimation inputs (YY, BWB, BC), pp. 431–438.
ICSEICSE-2006-ZouZ #automation #e-commerce #evolution #framework #generative #process
A framework for automatic generation of evolvable e-commerce workplaces using business processes (YZ, QZ), pp. 799–802.
SACSAC-2006-AlmeidaG #algorithm #database #incremental #nearest neighbour #network
Using Dijkstra’s algorithm to incrementally find the k-Nearest Neighbors in spatial network databases (VTdA, RHG), pp. 58–62.
SACSAC-2006-AltLM #linear #on the #probability #problem
On the numerical solution to linear problems using stochastic arithmetic (RA, JLL, SM), pp. 1635–1639.
SACSAC-2006-Bellur #consistency #object-oriented #on the #workflow
On using OO techniques to establish workflow conformance (UB), pp. 1447–1448.
SACSAC-2006-BernsteinK #ontology #retrieval #similarity #towards
Imprecise RDQL: towards generic retrieval in ontologies using similarity joins (AB, CK), pp. 1684–1689.
SACSAC-2006-BonnetEV #ad hoc #mobile #network
Quiescent consensus in mobile ad-hoc networks using eventually storage-free broadcasts (FB, PDE, EV), pp. 670–674.
SACSAC-2006-ChongL
An extension of dead end elimination for protein side-chain conformation using merge-decoupling (KFC, HWL), pp. 195–199.
SACSAC-2006-CraigL #classification #learning
Protein classification using transductive learning on phylogenetic profiles (RAC, LL), pp. 161–166.
SACSAC-2006-CutelloNP #algorithm #hybrid #optimisation
Real coded clonal selection algorithm for unconstrained global optimization using a hybrid inversely proportional hypermutation operator (VC, GN, MP), pp. 950–954.
SACSAC-2006-DinechinLM #verification
Assisted verification of elementary functions using Gappa (FdD, CQL, GM), pp. 1318–1322.
SACSAC-2006-GuoW #data mining #mining #on the #privacy
On the use of spectral filtering for privacy preserving data mining (SG, XW), pp. 622–626.
SACSAC-2006-JacquenetL #documentation
Using the structure of documents to improve the discovery of unexpected information (FJ, CL), pp. 1036–1042.
SACSAC-2006-KacemKJD #architecture #uml
Describing dynamic software architectures using an extended UML model (MHK, AHK, MJ, KD), pp. 1245–1249.
SACSAC-2006-KatsimpaPSTT #modelling #reverse engineering
Application modeling using reverse engineering techniques (TK, YP, ES, GT, AKT), pp. 1250–1255.
SACSAC-2006-KramerMH #case study #elicitation #mobile
Field study on methods for elicitation of preferences using a mobile digital assistant for a dynamic tour guide (RK, MM, KtH), pp. 997–1001.
SACSAC-2006-RuizCCP #algebra #analysis #concurrent #e-commerce #process #protocol #set
Analysis of the SET e-commerce protocol using a true concurrency process algebra (MCR, DC, FC, JJP), pp. 879–886.
SACSAC-2006-SauvagnatHB #question #retrieval #what #xml
XML retrieval: what about using contextual relevance? (KS, LH, MB), pp. 1114–1115.
SACSAC-2006-SharminAA #adaptation #middleware #resource management #self #usability
Ubicomp assistant: an omnipresent customizable service using MARKS (middleware adaptability for resource discovery, knowledge usability and self-healing) (MS, SA, SIA), pp. 1013–1017.
SACSAC-2006-SinghXMH #geometry #linear #locality #problem #programming
Solving the brachytherapy seed localization problem using geometric and linear programming techniques (VS, LM, JX, KRH), pp. 229–234.
SACSAC-2006-SoaresB #kernel #parametricity
Selecting parameters of SVM using meta-learning and kernel matrix-based meta-features (CS, PB), pp. 564–568.
SACSAC-2006-SzlavikTL #interactive #retrieval #summary #xml
Investigating the use of summarisation for interactive XML retrieval (ZS, AT, ML), pp. 1068–1072.
SACSAC-2006-WuBGRM #compilation #development
Separation of concerns in compiler development using aspect-orientation (XW, BRB, JGG, SR, MM), pp. 1585–1590.
SACSAC-2006-YuJV #kernel #privacy
Privacy-preserving SVM using nonlinear kernels on horizontally partitioned data (HY, XJ, JV), pp. 603–610.
SACSAC-2006-ZhouAL #database #image #interactive #retrieval #similarity
Dynamic interactive spatial similarity retrieval in iconic image databases using enhanced digraph (XMZ, CHA, TWL), pp. 46–51.
GPCEGPCE-2006-BromanNF #constraints #equation
Determining over- and under-constrained systems of equations using structural constraint delta (DB, KN, PF), pp. 151–160.
ASPLOSASPLOS-2006-ChilimbiG #debugging #detection #identification #named
HeapMD: identifying heap-based bugs using anomaly detection (TMC, VG), pp. 219–228.
ASPLOSASPLOS-2006-KgilDSBDMRF #3d #energy #multi #named #performance
PicoServer: using 3D stacking technology to enable a compact energy efficient chip multiprocessor (TK, SD, AGS, NLB, RGD, TNM, SKR, KF), pp. 117–128.
ASPLOSASPLOS-2006-NarayanasamyPC #dependence #memory management
Recording shared memory dependencies using strata (SN, CP, BC), pp. 229–240.
ASPLOSASPLOS-2006-TarditiPO #named #parallel
Accelerator: using data parallelism to program GPUs for general-purpose uses (DT, SP, JO), pp. 325–335.
CASECASE-2006-ChaoSZJM #analysis #automation #information management
Single-cell information extraction and viability analysis using automated microscopy (ShC, TJS, SZ, KAJI, DRM), pp. 33–38.
CASECASE-2006-GuoLX #modelling #on the #petri net
On Modeling a Soccer Robot System Using Petri Nets (BG, ZL, SX), pp. 460–465.
CASECASE-2006-HuSHL #modelling #probability
Vision-based Indoor Scene Cognition Using a Spatial Probabilistic Modeling Method (JSH, TMS, HCH, PCL), pp. 620–625.
CASECASE-2006-KwokHLF #image #multi #optimisation
Intensity-Preserving Contrast Enhancement for Gray-Level Images using Multi-objective Particle Swarm Optimization (NMK, QPH, DL, GF), pp. 21–26.
CASECASE-2006-KwokLWY #framework #platform #replication
Evolutionary Replication of Calligraphic Characters By A Robot Drawing Platform Using Experimentally Acquired Brush Footprint (KWK, KWL, SMW, YY), pp. 466–471.
CASECASE-2006-LamiriX
Operating Rooms Planning Using Lagrangian Relaxation Technique (ML, XX), pp. 176–181.
CASECASE-2006-LiLWC #automation #component #equation #generative #graph #linear
Automatic Generation of Component-level Dynamic Equations Using Extensible Element Linear Graph Method (YL, ZL, HW, YC), pp. 118–123.
CASECASE-2006-LopatinY #algorithm #approximate #polynomial
Using the forward search and the polynomial approximation algorithms in the exact algorithm for manipulator’s control in an unknown environment (PKL, ASY), pp. 206–211.
CASECASE-2006-RaghavanV #optimisation #parallel #product line #scheduling
Scheduling Parallel Batch Processors with Incompatible Job Families Using Ant Colony Optimization (NRSR, MV), pp. 507–512.
CASECASE-2006-SchiffG #automation #network
Automated Intruder Tracking using Particle Filtering and a Network of Binary Motion Sensors (JS, KG), pp. 580–587.
CASECASE-2006-ShaoHM #algorithm #analysis #component #linear #multi
Quantitative Analysis Using NIR by Building Principal Component- Multiple Linear Regression-BP Algorithm (YS, YH, JM), pp. 161–164.
CASECASE-2006-XuLT #visual notation
Visual Positioning Using Four-Point Planar Patterns (DX, YL, MT), pp. 600–605.
CASECASE-2006-XuWZZ #algorithm #automation #detection
An Automatic EEG Spike Detection Algorithm Using Morphological Filter (GX, JW, QZ, JZ), pp. 170–175.
CASECASE-2006-YoungSB #implementation #interactive
Implementing Bubblegrams: The Use of Haar-Like Features for Human-Robot Interaction (JEY, ES, JEB), pp. 298–303.
CCCC-2006-DiasR #assembly #declarative
Converting Intermediate Code to Assembly Code Using Declarative Machine Descriptions (JD, NR), pp. 217–231.
CCCC-2006-Necula #dependent type #low level #type system
Using Dependent Types to Port Type Systems to Low-Level Languages (GCN), p. 1.
CGOCGO-2006-AgakovBCFFOTTW #machine learning #optimisation
Using Machine Learning to Focus Iterative Optimization (FVA, EVB, JC, BF, GF, MFPO, JT, MT, CKIW), pp. 295–305.
CGOCGO-2006-NandaLLC #named #runtime
BIRD: Binary Interpretation using Runtime Disassembly (SN, WL, LCL, TcC), pp. 358–370.
DACDAC-2006-AksoyCFM #constraints #integer #linear #optimisation #programming #satisfiability #synthesis
Optimization of area under a delay constraint in digital filter synthesis using SAT-based integer linear programming (LA, EACdC, PFF, JM), pp. 669–674.
DACDAC-2006-BrahmbhattZWQ #adaptation #algorithm #encoding #hybrid #power management
Low-power bus encoding using an adaptive hybrid algorithm (ARB, JZ, QW, QQ), pp. 987–990.
DACDAC-2006-BrierM #architecture #c #c++ #modelling #verification
Use of C/C++ models for architecture exploration and verification of DSPs (DB, RSM), pp. 79–84.
DACDAC-2006-ChaoCWCW #analysis
Unknown-tolerance analysis and test-quality control for test response compaction using space compactors (MCTC, KTC, SW, STC, WW), pp. 1083–1088.
DACDAC-2006-FatemiNP #analysis #logic #statistics
Statistical logic cell delay analysis using a current-based model (HF, SN, MP), pp. 253–256.
DACDAC-2006-GoffioulVDDC #consistency #design #object-oriented
Ensuring consistency during front-end design using an object-oriented interfacing tool called NETLISP (MG, GV, JVD, BD, BC), pp. 889–892.
DACDAC-2006-GopalakrishnanLP #architecture #metric
Architecture-aware FPGA placement using metric embedding (PG, XL, LTP), pp. 460–465.
DACDAC-2006-GuthausSB #programming
Clock buffer and wire sizing using sequential programming (MRG, DS, RBB), pp. 1041–1046.
DACDAC-2006-SinghS #analysis #component #correlation #independence #parametricity #statistics
Statistical timing analysis with correlated non-gaussian parameters using independent component analysis (JS, SSS), pp. 155–160.
DACDAC-2006-TanimotoYNH #realtime
A real time budgeting method for module-level-pipelined bus based system using bus scenarios (TT, SY, AN, TH), pp. 37–42.
DACDAC-2006-WangGDK #design #optimisation
Design space exploration using time and resource duality with the ant colony optimization (GW, WG, BD, RK), pp. 451–454.
DACDAC-2006-YuhYC
Placement of digital microfluidic biochips using the t-tree formulation (PHY, CLY, YWC), pp. 931–934.
DACDAC-2006-ZhangMBC #detection #representation #satisfiability #scalability #simulation #symmetry
Symmetry detection for large Boolean functions using circuit representation, simulation, and satisfiability (JSZ, AM, RKB, MCJ), pp. 510–515.
DACDAC-2006-ZhaoPSYF #algorithm #linear #megamodelling #performance #programming
A fast on-chip decoupling capacitance budgeting algorithm using macromodeling and linear programming (MZ, RP, SS, SY, YF), pp. 217–222.
DATEDATE-2006-AbdollahiP #analysis #diagrams #quantum #synthesis
Analysis and synthesis of quantum circuits by using quantum decision diagrams (AA, MP), pp. 317–322.
DATEDATE-2006-AhmedM #design #performance #uml
Faster exploration of high level design alternatives using UML for better partitions (WA, DM), pp. 579–580.
DATEDATE-2006-Al-JunaidK #modelling
HDL models of ferromagnetic core hysteresis using timeless discretisation of the magnetic slope (HAJ, TJK), pp. 644–645.
DATEDATE-2006-AmelifardFP
Reducing the sub-threshold and gate-tunneling leakage of SRAM cells using Dual-Vt and Dual-Tox assignment (BA, FF, MP), pp. 995–1000.
DATEDATE-2006-BanerjeeRMB #fine-grained #logic #power management #synthesis
Low power synthesis of dynamic logic circuits using fine-grained clock gating (NB, KR, HMM, SB), pp. 862–867.
DATEDATE-2006-Beutel #framework #platform #prototype
Fast-prototyping using the BTnode platform (JB), pp. 977–982.