BibSLEIGH
BibSLEIGH corpus
BibSLEIGH tags
BibSLEIGH bundles
BibSLEIGH people
CC-BY
Open Knowledge
XHTML 1.0 W3C Rec
CSS 2.1 W3C CanRec
email twitter
Used together with:
base (885)
use (832)
system (793)
program (709)
model (703)

Stem analysi$ (all stems)

7059 papers:

CBSECBSE-2015-KimBNMLSLP #analysis #probability #scheduling
Quantitative Schedulability Analysis of Continuous Probability Tasks in a Hierarchical Context (JHK, AB, UN, MM, KGL, AS, IL, LTXP), pp. 91–100.
ECSAECSA-2015-StierKGR #analysis #architecture #energy #modelling #performance
Model-Based Energy Efficiency Analysis of Software Architectures (CS, AK, HG, RHR), pp. 221–238.
ECSAECSA-2015-TrubianiGE #analysis #architecture #modelling #nondeterminism #performance #traceability
Exploiting Traceability Uncertainty Between Software Architectural Models and Performance Analysis Results (CT, AG, AE), pp. 305–321.
WICSAWICSA-2015-AbukwaikNR #analysis #concept
A Proactive Support for Conceptual Interoperability Analysis in Software Systems (HA, MN, HDR), pp. 119–122.
CASECASE-2015-CarmenateRLBM #analysis #approach #behaviour #energy #modelling #using
Modeling and analyzing occupant behaviors in building energy analysis using an information space approach (TC, MMR, DL, LB, AM), pp. 425–431.
CASECASE-2015-HanZ #analysis #energy
Charge transfer and energy transfer analysis of battery charge equalization (WH, LZ), pp. 1137–1138.
CASECASE-2015-JiaZAX #analysis #performance
Performance analysis of Bernoulli serial production lines with switch-on/off machine control (ZJ, LZ, JA, GX), pp. 477–482.
CASECASE-2015-MeddouriDF #analysis #generative #induction #performance #predict #using
Performance analysis of an autonomous induction generator under different operating conditions using predictive control (SM, LAD, LF), pp. 1118–1124.
CASECASE-2015-NonakaSLNKK #analysis #simulation #statistics
The S-Model: A digital manufacturing system combined with autonomous statistical analysis and autonomous discrete-event simulation for smart manufacturing (YN, YS, AL, SN, KK, YK), pp. 1006–1011.
CASECASE-2015-SaezMBT #analysis #hybrid #performance #realtime #simulation
Real-time hybrid simulation of manufacturing systems for performance analysis and control (MS, FPM, KB, DMT), pp. 526–531.
CASECASE-2015-XiePLLY #analysis
Hand-eye calibration and its accuracy analysis in robotic grinding (HX, CtP, WLL, YhL, ZPY), pp. 862–867.
CASECASE-2015-XieZLSD #agile #analysis #approach #multi #process
Analysis of multi-patient rapid response processes: An iterative approach (XX, ZZ, JL, CHS, PD), pp. 740–745.
CASECASE-2015-ZhongLBM #analysis #modelling
Modeling and analysis of e-visits in primary care (XZ, JL, PAB, AJM), pp. 955–960.
DACDAC-2015-ChangHLW #analysis #encoding #functional #named
TA-FTA: transition-aware functional timing analysis with a four-valued encoding (JCCC, RHMH, LYZL, CHPW), p. 6.
DACDAC-2015-ChenTSHK #analysis #modelling #multi #reliability
Interconnect reliability modeling and analysis for multi-branch interconnect trees (HBC, SXDT, VS, XH, TK), p. 6.
DACDAC-2015-EspinosaHAAR #analysis #correlation #robust #set #verification
Analysis and RTL correlation of instruction set simulators for automotive microcontroller robustness verification (JE, CH, JA, DdA, JCR), p. 6.
DACDAC-2015-HanF #analysis #approach #cpu #gpu #graph #scalability
Transient-simulation guided graph sparsification approach to scalable harmonic balance (HB) analysis of post-layout RF circuits leveraging heterogeneous CPU-GPU computing systems (LH, ZF), p. 6.
DACDAC-2015-KrishnaNRT #analysis #composition #modelling #product line
Compositional modeling and analysis of automotive feature product lines (SNK, GKN, SR, AT), p. 6.
DACDAC-2015-LiuZWYX #analysis #difference #encryption #fault #named
DERA: yet another differential fault attack on cryptographic devices based on error rate analysis (YL, JZ, LW, FY, QX), p. 6.
DACDAC-2015-MundhenkSLFC #analysis #architecture #model checking #probability #security #using
Security analysis of automotive architectures using probabilistic model checking (PM, SS, ML, SAF, SC), p. 6.
DACDAC-2015-RoseM #analysis #design #performance
Performance analysis of a memristive crossbar PUF design (GSR, CAM), p. 6.
DACDAC-2015-ThieleAE #analysis #scheduling
Improving formal timing analysis of switched ethernet by exploiting FIFO scheduling (DT, PA, RE), p. 6.
DACDAC-2015-YangTJ #analysis
Criticality-dependency-aware timing characterization and analysis (YMY, KHT, IHRJ), p. 6.
DATEDATE-2015-AhmadyanGNCV #analysis #diagrams #performance
Fast eye diagram analysis for high-speed CMOS circuits (SNA, CG, SN, EC, SV), pp. 1377–1382.
DATEDATE-2015-AndradeMVAPL #analysis #data flow #modelling
Pre-simulation symbolic analysis of synchronization issues between discrete event and timed data flow models of computation (LA, TM, AV, CBA, FP, MML), pp. 1671–1676.
DATEDATE-2015-BaldwinBRPB #analysis #array #predict #using
Gait analysis for fall prediction using hierarchical textile-based capacitive sensor arrays (RB, SB, RR, CP, NB), pp. 1293–1298.
DATEDATE-2015-BiondiB #analysis #modelling
Engine control: task modeling and analysis (AB, GCB), pp. 525–530.
DATEDATE-2015-ChangD #analysis #model checking #modelling #using
May-happen-in-parallel analysis of ESL models using UPPAAL model checking (CWC, RD), pp. 1567–1570.
DATEDATE-2015-DeyCAM #analysis #difference #fault
Improved practical differential fault analysis of grain-128 (PD, AC, AA, DM), pp. 459–464.
DATEDATE-2015-FeldS #analysis #dependence
Sufficient response time analysis considering dependencies between rate-dependent tasks (TF, FS), pp. 519–524.
DATEDATE-2015-GuanTW0 #analysis #realtime
Delay analysis of structural real-time workload (NG, YT, YW, WY), pp. 223–228.
DATEDATE-2015-HoqueMS #analysis #approach #maintenance #model checking #probability #reliability #towards
Towards an accurate reliability, availability and maintainability analysis approach for satellite systems based on probabilistic model checking (KAH, OAM, YS), pp. 1635–1640.
DATEDATE-2015-IqtedarHSH #analysis #distributed #probability
Formal probabilistic analysis of distributed dynamic thermal management (SI, OH, MS, JH), pp. 1221–1224.
DATEDATE-2015-KhosraviMGT #analysis #optimisation #reliability
Uncertainty-aware reliability analysis and optimization (FK, MM, MG, JT), pp. 97–102.
DATEDATE-2015-KriebelRSASH #analysis #combinator #configuration management #fault #named #performance
ACSEM: accuracy-configurable fast soft error masking analysis in combinatorial circuits (FK, SR, DS, PVA, MS, JH), pp. 824–829.
DATEDATE-2015-LezosDM #analysis #distance #locality #optimisation #reuse
Reuse distance analysis for locality optimization in loop-dominated applications (CL, GD, KM), pp. 1237–1240.
DATEDATE-2015-MacherSBAK #analysis #named
SAHARA: a security-aware hazard and risk analysis method (GM, HS, RB, EA, CK), pp. 621–624.
DATEDATE-2015-MajumderLBP #analysis #architecture #manycore #probability
NoC-enabled multicore architectures for stochastic analysis of biomolecular reactions (TM, XL, PB, PP), pp. 1102–1107.
DATEDATE-2015-RamboE #analysis #communication #worst-case
Worst-case communication time analysis of networks-on-chip with shared virtual channels (EAR, RE), pp. 537–542.
DATEDATE-2015-SeylerSGNT #analysis #formal method
Formal analysis of the startup delay of SOME/IP service discovery (JRS, TS, MG, NN, JT), pp. 49–54.
DATEDATE-2015-SonghoriMLK #automation #data analysis #framework #hardware #named
AHEAD: automated framework for hardware accelerated iterative data analysis (EMS, AM, XL, FK), pp. 942–947.
DATEDATE-2015-ThangamuthuCCL #analysis #network
Analysis of ethernet-switch traffic shapers for in-vehicle networking applications (ST, NC, PJLC, JJL), pp. 55–60.
DATEDATE-2015-WartelKGBSTQLMB #analysis #case study #hardware
Timing analysis of an avionics case study on complex hardware/software platforms (FW, LK, AG, AB, ZRS, BT, EQ, CL, EM, IB, JA, LCG, TV, FJC), pp. 397–402.
DocEngDocEng-2015-NicholasB #analysis #documentation
Document Engineering Issues in Document Analysis (CN, RB), pp. 229–230.
DRRDRR-2015-ChenSWLHI #analysis #dataset #documentation #layout
Ground truth model, tool, and dataset for layout analysis of historical documents (KC, MS, HW, ML, JH, RI), p. 940204.
HTHT-2015-ApaolazaHJ #analysis #behaviour #interactive #low level #web
Longitudinal Analysis of Low-Level Web Interaction through Micro Behaviours (AA, SH, CJ), pp. 337–340.
HTHT-2015-Baeza-YatesS #analysis #generative
Wisdom of the Crowd or Wisdom of a Few?: An Analysis of Users’ Content Generation (RABY, DST), pp. 69–74.
HTHT-2015-BurnapCS #analysis #classification #communication #twitter
Machine Classification and Analysis of Suicide-Related Communication on Twitter (PB, WC, JS), pp. 75–84.
HTHT-2015-MishraDBS #analysis #incremental #learning #sentiment
Sentiment Analysis with Incremental Human-in-the-Loop Learning and Lexical Resource Customization (SM, JD, JB, ES), pp. 323–325.
SIGMODSIGMOD-2015-0002KBDHKFG #coordination #program analysis #protocol #transaction
The Homeostasis Protocol: Avoiding Transaction Coordination Through Program Analysis (SR, LK, GB, BD, HH, CK, NF, JG), pp. 1311–1326.
SIGMODSIGMOD-2015-ElgamalYAMH #analysis #big data #component #distributed #named #scalability
sPCA: Scalable Principal Component Analysis for Big Data on Distributed Platforms (TE, MY, AA, WM, MH), pp. 79–91.
SIGMODSIGMOD-2015-ZengADAS #analysis #big data #interactive #named #online
G-OLA: Generalized On-Line Aggregation for Interactive Analysis on Big Data (KZ, SA, AD, MA, IS), pp. 913–918.
VLDBVLDB-2015-BrancotteYBBDH #analysis #rank
Rank aggregation with ties: Experiments and Analysis (BB, BY, GB, SCB, AD, SH), pp. 1202–1213.
VLDBVLDB-2015-YangCLW #analysis #nearest neighbour #query
Reverse k Nearest Neighbors Query Processing: Experiments and Analysis (SY, MAC, XL, WW), pp. 605–616.
ITiCSEITiCSE-2015-BellettiniLMMMT #analysis #how #performance #student
How Challenging are Bebras Tasks?: An IRT Analysis Based on the Performance of Italian Students (CB, VL, DM, MM, AM, MT), pp. 27–32.
ITiCSEITiCSE-2015-Rubio #analysis #automation #categorisation #clustering #programming #student #using
Automatic Categorization of Introductory Programming Students using Cluster Analysis (MAR), p. 340.
ITiCSEITiCSE-2015-UraiUO #analysis #distributed #programming
Enhancements to Support Functions of Distributed Pair Programming Based on Action Analysis (TU, TU, NO), pp. 177–182.
ESOPESOP-2015-0002S #automation #cost analysis #parallel #source code
Automatic Static Cost Analysis for Parallel Programs (JH, ZS), pp. 132–157.
ESOPESOP-2015-CernyHKRZ #abstraction #analysis #execution #worst-case
Segment Abstraction for Worst-Case Execution Time Analysis (PC, TAH, LK, AR, JZ), pp. 105–131.
ESOPESOP-2015-ChengR #detection #spreadsheet #static analysis
Static Analysis of Spreadsheet Applications for Type-Unsafe Operations Detection (TC, XR), pp. 26–52.
ESOPESOP-2015-EmmiGMR #analysis #source code
Analysis of Asynchronous Programs with Event-Based Synchronization (ME, PG, RM, FRV), pp. 535–559.
ESOPESOP-2015-VasconcelosJFH #analysis #functional #lazy evaluation #recursion #type system
Type-Based Allocation Analysis for Co-recursion in Lazy Functional Languages (PBV, SJ, MF, KH), pp. 787–811.
TACASTACAS-2015-AlbertFR #analysis #cumulative
Non-cumulative Resource Analysis (EA, JCF, GRD), pp. 85–100.
TACASTACAS-2015-ArmandoBCCMMM #framework #mobile #named #security #static analysis #verification
SAM: The Static Analysis Module of the MAVERIC Mobile App Security Verification Platform (AA, GB, GC, GC, GDM, RM, AM), pp. 225–230.
TACASTACAS-2015-DjoudiB #analysis #low level #named
BINSEC: Binary Code Analysis with Low-Level Regions (AD, SB), pp. 212–217.
TACASTACAS-2015-FleuryLPV #analysis #framework #named
Insight: An Open Binary Analysis Framework (EF, OL, GP, AV), pp. 218–224.
TACASTACAS-2015-GuanTAS0 #analysis #refinement #scalability
Scalable Timing Analysis with Refinement (NG, YT, JA, MS, WY), pp. 3–18.
TACASTACAS-2015-HolikHLRSV #analysis #automaton #contest #named #using
Forester: Shape Analysis Using Tree Automata — (Competition Contribution) (LH, MH, OL, AR, JS, TV), pp. 432–435.
TACASTACAS-2015-Immler #analysis #reachability
Verified Reachability Analysis of Continuous Systems (FI), pp. 37–51.
TACASTACAS-2015-KongGCC #analysis #hybrid #named
dReach: δ-Reachability Analysis for Hybrid Systems (SK, SG, WC, EMC), pp. 200–205.
TACASTACAS-2015-NamjoshiT #analysis #network #process
Analysis of Dynamic Process Networks (KSN, RJT), pp. 164–178.
TACASTACAS-2015-Sankur #analysis #automaton #robust
Symbolic Quantitative Robustness Analysis of Timed Automata (OS), pp. 484–498.
ICPCICPC-2015-LafetaMR #dynamic analysis #framework #using
Framework instantiation using cookbooks constructed with static and dynamic analysis (RFL, MdAM, DR), pp. 125–128.
ICPCICPC-2015-MartinCAA #analysis #empirical #open source
Make it simple: an empirical analysis of GNU make feature use in open source projects (DHM, JRC, BA, GA), pp. 207–217.
ICPCICPC-2015-SaeidiHKJ #analysis #interactive #modelling #named #source code #topic
ITMViz: interactive topic modeling for source code analysis (AS, JH, RK, SJ), pp. 295–298.
ICPCICPC-2015-Zeller #dynamic analysis
Test complement exclusion: guarantees from dynamic analysis (AZ), pp. 1–2.
ICSMEICSME-2015-DongAS #fault #static analysis #using
Practical and accurate pinpointing of configuration errors using static analysis (ZD, AA, KS), pp. 171–180.
ICSMEICSME-2015-DorningerPK #industrial #static analysis #user interface #using
Using static analysis for knowledge extraction from industrial User Interfaces (BD, JP, AK), pp. 497–500.
ICSMEICSME-2015-GoeminneM #analysis #database #framework #java #towards
Towards a survival analysis of database framework usage in Java projects (MG, TM), pp. 551–555.
ICSMEICSME-2015-JongelingDS #analysis #re-engineering #research #sentiment #tool support
Choosing your weapons: On sentiment analysis tools for software engineering research (RJ, SD, AS), pp. 531–535.
ICSMEICSME-2015-KhadkaSKSHJDB #analysis #case study #legacy #what
Does software modernization deliver what it aimed for? A post modernization analysis of five software modernization case studies (RK, PS, BK, AS, JH, SJ, EvD, MB), pp. 477–486.
ICSMEICSME-2015-LuciaDGR #automation #behaviour #design pattern #detection #dynamic analysis #towards
Towards automating dynamic analysis for behavioral design pattern detection (ADL, VD, CG, MR), pp. 161–170.
ICSMEICSME-2015-ValeM #architecture #dynamic analysis #mining #named #using
Keecle: Mining key architecturally relevant classes using dynamic analysis (LdNV, MdAM), pp. 566–570.
ICSMEICSME-2015-Yamashita #analysis #assessment #benchmark #case study #experience #metric #quality #visualisation
Experiences from performing software quality evaluations via combining benchmark-based metrics analysis, software visualization, and expert assessment (AY), pp. 421–428.
ICSMEICSME-2015-YamashitaZFW #analysis #comparative #industrial #open source #replication #smell
Inter-smell relations in industrial and open source systems: A replication and comparative analysis (AY, MZ, FAF, BW), pp. 121–130.
MSRMSR-2015-ClaesMCV #analysis
A Historical Analysis of Debian Package Incompatibilities (MC, TM, RDC, JV), pp. 212–223.
MSRMSR-2015-MalikZG #analysis #energy
Going Green: An Exploratory Analysis of Energy-Related Questions (HM, PZ, MWG), pp. 418–421.
MSRMSR-2015-ZouXGYYZ #analysis #developer #empirical #non-functional #requirements #stack overflow #topic #using
Which Non-functional Requirements Do Developers Focus On? An Empirical Study on Stack Overflow Using Topic Analysis (JZ, LX, WG, MY, DY, XZ), pp. 446–449.
SANERSANER-2015-Abi-AntounWKGR #graph #impact analysis
Impact analysis based on a global hierarchical Object Graph (MAA, YW, EK, AG, VR), pp. 221–230.
SANERSANER-2015-AlawnehHH #analysis #metamodelling #performance #towards
Towards a common metamodel for traces of high performance computing systems to enable software analysis tasks (LA, AHL, JH), pp. 111–120.
SANERSANER-2015-CaiS #dependence #effectiveness #framework #impact analysis
A framework for cost-effective dependence-based dynamic impact analysis (HC, RAS), pp. 231–240.
SANERSANER-2015-CaiS15a #analysis #dependence #fine-grained #named
TRACERJD: Generic trace-based dynamic dependence analysis with fine-grained logging (HC, RAS), pp. 489–493.
SANERSANER-2015-KoboriMI #analysis #evolution #java
Evolution analysis for Accessibility Excessiveness in Java (KK, MM, KI), pp. 83–90.
SANERSANER-2015-LaverdiereBM #analysis #composition #graph #using
Taint analysis of manual service compositions using Cross-Application Call Graphs (MAL, BJB, EM), pp. 585–589.
SANERSANER-2015-Martin #analysis #framework #towards
Towards a framework for analysis, transformation, and manipulation of Makefiles (DM), pp. 601–602.
SANERSANER-2015-MattsenWS #abstract domain #analysis
A non-convex abstract domain for the value analysis of binaries (SM, AW, SS), pp. 271–280.
SANERSANER-2015-MedicherlaK #analysis #approximate #precise #scalability
Precision vs. scalability: Context sensitive analysis with prefix approximation (RKM, RK), pp. 281–290.
SANERSANER-2015-MuskeB #on the #static analysis #tool support
On implementational variations in static analysis tools (TM, PB), pp. 512–515.
SANERSANER-2015-NairJNH #analysis
A static code analysis tool for control system software (SN, RJ, ARN, SHS), pp. 459–463.
SANERSANER-2015-PanichellaAPA #code review #developer #question #static analysis #tool support
Would static analysis tools help developers with code reviews? (SP, VA, MDP, GA), pp. 161–170.
SANERSANER-2015-SilvaCMS #analysis #fine-grained
Niche vs. breadth: Calculating expertise over time through a fine-grained analysis (JRdSJ, EC, LM, AS), pp. 409–418.
SCAMSCAM-2015-DarizRS #analysis #programmable
A static microcode analysis tool for programmable load drivers (LD, MR, MS), pp. 265–270.
SCAMSCAM-2015-PintoKT #analysis #automation #multi #performance
Automating the performance deviation analysis for multiple system releases: An evolutionary study (FP, UK, CT), pp. 201–210.
PEPMPEPM-2015-HoekH #analysis #php
Object-sensitive Type Analysis of PHP (HEVdH, JH), pp. 9–20.
PEPMPEPM-2015-KootH #analysis #exception #functional #higher-order #semantics #strict #type system
Type-based Exception Analysis for Non-strict Higher-order Functional Languages with Imprecise Exception Semantics (RK, JH), pp. 127–138.
PEPMPEPM-2015-VerstoepH #analysis #functional #higher-order #strict
Polyvariant Cardinality Analysis for Non-strict Higher-order Functional Languages: Brief Announcement (HV, JH), pp. 139–142.
PLDIPLDI-2015-DeligiannisDKLT #analysis #programming #state machine #testing
Asynchronous programming, analysis and testing with state machines (PD, AFD, JK, AL, PT), pp. 154–164.
PLDIPLDI-2015-SinghPV #performance #program analysis
Making numerical program analysis fast (GS, MP, MTV), pp. 303–313.
PLDIPLDI-2015-WeijiangBLK #analysis #dependence
Tree dependence analysis (YW, SB, JL, MK), pp. 314–325.
SASSAS-2015-AlbertCJR #cost analysis #distributed #parallel
Parallel Cost Analysis of Distributed Systems (EA, JC, EBJ, GRD), pp. 275–292.
SASSAS-2015-AlbertGG #analysis #interprocedural #source code
May-Happen-in-Parallel Analysis for Asynchronous Programs with Inter-Procedural Synchronization (EA, SG, PG), pp. 72–89.
SASSAS-2015-AldousM #low level #static analysis
Static Analysis of Non-interference in Expressive Low-Level Languages (PA, MM), pp. 1–17.
SASSAS-2015-BakhirkinBP #analysis #set
A Forward Analysis for Recurrent Sets (AB, JB, NP), pp. 293–311.
SASSAS-2015-CastelnuovoNRSY #analysis #bottom-up #case study #composition #top-down
Modularity in Lattices: A Case Study on the Correspondence Between Top-Down and Bottom-Up Analysis (GC, MN, NR, MS, HY), pp. 252–274.
SASSAS-2015-CattaruzzaASK #analysis #bound
Unbounded-Time Analysis of Guarded LTI Systems with Inputs by Abstract Acceleration (DC, AA, PS, DK), pp. 312–331.
SASSAS-2015-LeeHYC #static analysis
Static Analysis with Set-Closure in Secrecy (WL, HH, KY, JHC), pp. 18–35.
SASSAS-2015-LiRC #analysis
Shape Analysis for Unstructured Sharing (HL, XR, BYEC), pp. 90–108.
SASSAS-2015-LiTX #analysis #effectiveness
Effective Soundness-Guided Reflection Analysis (YL, TT, JX), pp. 162–180.
SASSAS-2015-RapoportLT #analysis #correlation #data flow #precise
Precise Data Flow Analysis in the Presence of Correlated Method Calls (MR, OL, FT), pp. 54–71.
STOCSTOC-2015-DworkFHPRR #adaptation #data analysis #statistics
Preserving Statistical Validity in Adaptive Data Analysis (CD, VF, MH, TP, OR, ALR), pp. 117–126.
STOCSTOC-2015-SchulmanS #algorithm #analysis #matrix
Analysis of a Classical Matrix Preconditioning Algorithm (LJS, AS), pp. 831–840.
DLTDLT-2015-BrandlS #analysis #automaton #complexity #finite #monad
Complexity Analysis: Transformation Monoids of Finite Automata (CB, HUS), pp. 143–154.
ICALPICALP-v2-2015-Boreale #analysis #approximate #generative #probability
Analysis of Probabilistic Systems via Generating Functions and Padé Approximation (MB), pp. 82–94.
FMFM-2015-AlbertACGGMPR #analysis #concurrent #distributed #source code
Resource Analysis: From Sequential to Concurrent and Distributed Programs (EA, PA, JC, SG, MGZ, EMM, GP, GRD), pp. 3–17.
FMFM-2015-ChimdyalwarDCVC #abstraction #bound #model checking #static analysis #using
Eliminating Static Analysis False Positives Using Loop Abstraction and Bounded Model Checking (BC, PD, AC, SV, AC), pp. 573–576.
FMFM-2015-Damm #analysis #automation #lessons learnt #named #verification
AVACS: Automatic Verification and Analysis of Complex Systems Highlights and Lessons Learned (WD), pp. 18–19.
FMFM-2015-LiuH #analysis #android #case study #kernel #security
Case Study: Static Security Analysis of the Android Goldfish Kernel (TL, RH), pp. 589–592.
FMFM-2015-NelsonFK #difference #network #program analysis
Static Differential Program Analysis for Software-Defined Networks (TN, ADF, SK), pp. 395–413.
SEFMSEFM-2015-KamaliHKP #analysis #distributed #formal method
Formal Analysis of Proactive, Distributed Routing (MK, PH, MK, LP), pp. 175–189.
ICGTICGT-2015-Stuckrath #analysis #graph transformation #named #using #verification
Uncover: Using Coverability Analysis for Verifying Graph Transformation Systems (JS), pp. 266–274.
ICGTICGT-2015-TaentzerG #analysis #confluence #graph transformation #towards
Towards Local Confluence Analysis for Amalgamated Graph Transformation (GT, UG), pp. 69–86.
CHICHI-2015-AmershiCDLSS #analysis #machine learning #named #performance #tool support
ModelTracker: Redesigning Performance Analysis Tools for Machine Learning (SA, MC, SMD, BL, PYS, JS), pp. 337–346.
CHICHI-2015-AsthanaSG #analysis #assessment #human-computer
Survival Analysis: Objective assessment of Wait Time in HCI (SA, PS, PG), pp. 367–376.
CHICHI-2015-ButlerASGP #analysis #automation #design #game studies
Automatic Game Progression Design through Analysis of Solution Features (EB, EA, AMS, SG, ZP), pp. 2407–2416.
CHICHI-2015-DerbovenMS #analysis #case study #design #multimodal
Multimodal Analysis in Participatory Design with Children: A Primary School Case Study (JD, MVM, KS), pp. 2825–2828.
CHICHI-2015-HourcadeMWP #analysis #exclamation #using
Look, My Baby Is Using an iPad! An Analysis of YouTube Videos of Infants and Toddlers Using Tablets (JPH, SLM, DW, LP), pp. 1915–1924.
CHICHI-2015-HoyleTACK #analysis #privacy #smarttech
Sensitive Lifelogs: A Privacy Analysis of Photos from Wearable Cameras (RH, RT, DLA, DJC, AK), pp. 1645–1648.
CHICHI-2015-HuangSHH #analysis #how
How Activists Are Both Born and Made: An Analysis of Users on Change.org (SWH, M(S, BMH, GH), pp. 211–220.
CHICHI-2015-LesselAK #analysis #people
Analysis of Recycling Capabilities of Individuals and Crowds to Encourage and Educate People to Separate Their Garbage Playfully (PL, MA, AK), pp. 1095–1104.
CHICHI-2015-OskampBHG #analysis #design #evaluation #multi #named
TerraGuide: Design and Evaluation of a Multi-Surface Environment for Terrain Visibility Analysis (MO, CB, RH, TCNG), pp. 3553–3562.
CHICHI-2015-PandeyRSNB #analysis #empirical #how #visualisation
How Deceptive are Deceptive Visualizations?: An Empirical Analysis of Common Distortion Techniques (AVP, KR, MLS, ON, EB), pp. 1469–1478.
CHICHI-2015-TinatiKSLSS #case study #data analysis #design #framework #multi
Designing for Citizen Data Analysis: A Cross-Sectional Case Study of a Multi-Domain Citizen Science Platform (RT, MVK, EPBS, MLR, RJS, NS), pp. 4069–4078.
CHICHI-2015-VatavuW #analysis #elicitation #formal method #metric #tool support
Formalizing Agreement Analysis for Elicitation Studies: New Measures, Significance Test, and Toolkit (RDV, JOW), pp. 1325–1334.
CHICHI-2015-Wacharamanotham #analysis #named #statistics
Statsplorer: Guiding Novices in Statistical Analysis (CW, KS, STV, JOB), pp. 2693–2702.
CSCWCSCW-2015-MacLeanGLMH #analysis #health #named #online
Forum77: An Analysis of an Online Health Forum Dedicated to Addiction Recovery (DLM, SG, AL, CDM, JH), pp. 1511–1526.
CSCWCSCW-2015-SavageM #analysis #online
Participatory Militias: An Analysis of an Armed Movement’s Online Audience (SS, AMH), pp. 724–733.
HCIDHM-EH-2015-Hu0LZY #3d #analysis #development #finite
Development of a 3D Finite Element Model of the Chinese 50th Male for the Analysis of Automotive Impact (HH, LD, XL, CZ, YY), pp. 258–265.
HCIDHM-EH-2015-HuDLZY #analysis
Biomechanical Analysis of Human Thorax and Abdomen During Automotive Impact (HH, LD, XL, CZ, YY), pp. 266–273.
HCIDHM-EH-2015-HuZZRL #analysis #correlation
Correlation Analysis on the Main and Basic Body Dimension for Chinese Adults (HH, CZ, XZ, LR, TL), pp. 37–43.
HCIDHM-EH-2015-KanazawaOWWTGH15a #analysis #experience
Experience Factors Influence on Motion Technique of “The Way of Tea” by Motion Analysis (SK, TO, ZW, TW, YT, AG, HH), pp. 155–163.
HCIDHM-EH-2015-LiuCKQF #data analysis #power management
Balancing Power Consumption and Data Analysis Accuracy Through Adjusting Sampling Rates: Seeking for the Optimal Configuration of Inertial Sensors for Power Wheelchair Users (TL, CC, MK, GQ, JF), pp. 184–192.
HCIDHM-EH-2015-TianLYJCS #analysis #scalability #video
Single-Variable Scenario Analysis of Vehicle-Pedestrian Potential Crash Based on Video Analysis Results of Large-Scale Naturalistic Driving Data (RT, LL, KY, FJ, YC, RS), pp. 295–304.
HCIDHM-EH-2015-UchidaHKEMOUG #analysis #process #using
Process Analysis of the Hand Lay-Up Method Using CFRP Prepreg Sheets (TU, HH, KK, AE, MM, JO, TU, AG), pp. 227–236.
HCIDHM-EH-2015-ZhouYLXZ #analysis
Moment Analysis of Virtual Human Joint Based on JACK (QXZ, QY, ZQL, FX, SZ), pp. 100–109.
HCIDHM-HM-2015-BoringJM #analysis #modelling #performance #reliability
Human Performance Modeling for Dynamic Human Reliability Analysis (RLB, JCJ, DM), pp. 223–234.
HCIDHM-HM-2015-GotoLTYH #analysis #eye tracking
Analysis of Eye Movement of Caregiver Concerning on Transfer Operation (AG, ML, YT, TY, HH), pp. 58–65.
HCIDHM-HM-2015-IkaiMKIH #analysis
Analysis of the Skills to Acupuncture (YI, MM, NK, HI, HH), pp. 66–73.
HCIDHM-HM-2015-KitajimaKMMMH #analysis #comprehension #process
Process Analysis of Manufacturing of Sewing Scissors by All Forging Process and Understanding of Its Sharpness (YK, KK, MM, KM, YM, HH), pp. 124–132.
HCIDHM-HM-2015-KurataniHHKUGH #analysis #comparison #process
Expert vs. Elementary Skill Comparison and Process Analysis in VaRTM-Manufactured Carbon Fiber Reinforced Composites (YK, KH, TH, TK, TU, AG, HH), pp. 133–142.
HCIDHM-HM-2015-SendaSKST #analysis #process
Process Analysis of Kyo Karakami Manufacturing (SS, ES, TK, MS, YT), pp. 368–378.
HCIDHM-HM-2015-SudaTHYGH #analysis #process
Process Analysis of Expert and Non-expert Engineers in Quartz Glass Joint Process (MS, TT, AH, YY, AG, HH), pp. 389–398.
HCIDHM-HM-2015-SugimotoYNG #analysis #process
EMG Activity Analysis of Expert Skills on Handheld Grinding Work for Metallographic Sample (TS, HY, HN, AG), pp. 165–173.
HCIDHM-HM-2015-WangTTITGH #analysis
Numerical Analysis on “Kana-Ami” Structure Between Expert and Non-expert (ZW, KiT, TT, KI, YT, AG, HH), pp. 192–200.
HCIDHM-HM-2015-WangTTTGH #analysis #process
Motion Analysis of Interval Time During “Kana-ami” Making Process (ZW, KiT, TT, YT, AG, HH), pp. 201–211.
HCIDHM-HM-2015-WangTTTGH15a #analysis #process
Brain Activity Analysis on “Kana-Ami” Making Process (ZW, KiT, TT, YT, AG, HH), pp. 212–219.
HCIDUXU-DD-2015-EmanuelRM #analysis #interactive
Rhetoric of Interaction: Analysis of Pathos (BE, CR, MM), pp. 417–427.
HCIDUXU-DD-2015-Fernandez #analysis #health #human-computer #interactive
Interactive Digital Storytelling and HCI Techniques Applied for Edutainment in Interactive Health Projects: Analysis of Two USC’s Labyrinth Projects (JIMF), pp. 621–633.
HCIDUXU-DD-2015-OliveiraMMM #analysis #behaviour #design
Scenario Analysis as a Tool for Informing the Design of Behaviour Change Interventions (LCRdO, MCM, VM, AJM), pp. 535–547.
HCIDUXU-DD-2015-TarkkanenHR #analysis #problem #testing #usability
Are We Testing Utility? Analysis of Usability Problem Types (KT, VH, PR), pp. 269–280.
HCIDUXU-IXD-2015-IwamotoKM #analysis #case study #using
A Study of Conversation Support System Between the Elderly Person and Young Adults by Using Facial Expression Analysis (MI, NK, KM), pp. 616–627.
HCIDUXU-IXD-2015-KoshiyamaPR #analysis #architecture #repository #usability
Analysis of Usability and Information Architecture of the UFRN Institutional Repository (DK, ALSdP, JGSR), pp. 197–207.
HCIDUXU-IXD-2015-Naskova #analysis #usability
Usability Analysis of IxDA.org (JN), pp. 63–73.
HCIDUXU-IXD-2015-OliveiraVSBRS #analysis #interactive #usability
Ergonomic and Usability Analysis of Interactive Whiteboards in the Academic Environment (EO, EV, ES, SB, TR, MMS), pp. 208–217.
HCIDUXU-IXD-2015-RaffaeleAJCPCS #analysis #game studies #legacy #multi #usability
Doctor Who: Legacy, an Analysis of Usability and Playability of a Multi-platform Game (RR, RA, IJ, BC, GP, BJAdC, MMS), pp. 283–291.
HCIDUXU-UI-2015-DaggeFR #analysis #comparative #named #process
HARSim: Posterior Load Comparative Analysis Process (RD, EF, FR), pp. 34–44.
HCIDUXU-UI-2015-KronbauerMS #analysis #evaluation #experience #interactive #mobile #user interface
Capture and Analysis of Interaction Data for the Evaluation of User Experience with Mobile Devices (AHK, DM, CASS), pp. 54–65.
HCIDUXU-UI-2015-LeeKK #analysis #case study #experience #user interface
A Study Customer Journey Map for User Experience Analysis of Information and Communications Technology Service (JHL, MJK, SWK), pp. 66–74.
HCIDUXU-UI-2015-MarcusB #analysis #design
Chinese User-Experience Design: An Initial Analysis (AM, SB), pp. 107–117.
HCIDUXU-UI-2015-MarczalJ #analysis #behaviour #mobile
Behavioural Variables Analysis in Mobile Environments (DM, PTAJ), pp. 118–130.
HCIDUXU-UI-2015-Nawrot #data analysis #difference #gender #question #towards #women
Gender Differences in Temporal Data Analysis — Toward Women or Men Empowerment? (IN), pp. 232–242.
HCIDUXU-UI-2015-RodriguesEM #analysis #collaboration
Digital Collections: Analysis of Collaborative Platforms (CR, BE, MM), pp. 353–362.
HCIHCI-DE-2015-GrobelnyM #algorithm #analysis #comparative #design #grid #visual notation
Comparative Analysis of Regular Grid Based Algorithms in the Design of Graphical Control Panels (JG, RM), pp. 332–339.
HCIHCI-DE-2015-HashizumeK #analysis #smarttech #usability
Analysis of Factors Influencing the Satisfaction of the Usability Evaluations in Smartphone Applications (AH, SK), pp. 194–201.
HCIHCI-IT-2015-MurataM #analysis #eye tracking #using
Nonlinear Dynamical Analysis of Eye Movement Characteristics Using Attractor Plot and First Lyapunov Exponent (AM, TM), pp. 78–85.
HCIHCI-IT-2015-MutoM #analysis #development #interactive
Analysis of Eye Hand Interaction in Drawing Figure and Letter — For the Development of Handwrite-Training Device (YM, TM), pp. 107–117.
HCIHCI-IT-2015-SarsharNR #analysis #human-computer #on the #smarttech #usability
On the Usability of Smartphone Apps in Emergencies — An HCI Analysis of GDACSmobile and SmartRescue Apps (PS, VN, JR), pp. 765–774.
HCIHCI-IT-2015-SatoAOO #analysis #automation #classification #image
Automatic Classification Between Involuntary and Two Types of Voluntary Blinks Based on an Image Analysis (HS, KA, SO, MO), pp. 140–149.
HCIHCI-IT-2015-ZhuF #analysis #game studies #online
A Lexical Analysis of Nouns and Adjectives from Online Game Reviews (MZ, XF), pp. 670–680.
HCIHCI-UC-2015-Ujita #analysis #reliability #using
Accident Analysis by Using Methodology of Resilience Engineering, High Reliability Organization, and Risk Literacy (HU), pp. 358–369.
HCIHIMI-IKC-2015-HayashiH #analysis #concept #learning #process
Analysis of the Relationship Between Metacognitive Ability and Learning Activity with Kit-Build Concept Map (YH, TH), pp. 304–312.
HCIHIMI-IKC-2015-MakhtarI #analysis #evaluation
An Analysis of Ear Plethysmogram for Evaluation of Driver’s Mental Workload Level (AKM, MI), pp. 213–224.
HCIHIMI-IKC-2015-MatsudaOHT #analysis #automation #generative #multi #problem #testing #using
Analysis of Multiple-Choice Tests Through Erroneous Choices Using a Technique of Automatic Problem Generation (NM, HO, TH, HT), pp. 362–369.
HCIHIMI-IKC-2015-WangN #analysis #identification #matrix
Dot Matrix Analysis of Plant Operation Data for Identifying Sequential Alarms Triggered by Single Root Cause (ZW, MN), pp. 152–158.
HCIHIMI-IKC-2015-YamadaAY #analysis #internet
An Analysis of the Synergistic Effect in the Advertisement — Between the Television Commercials and the Internet Commercials (TY, YA, KY), pp. 159–170.
HCIHIMI-IKD-2015-BurkhardtNGAK #impact analysis #modelling #policy #simulation #visualisation
Explorative Visualization of Impact Analysis for Policy Modeling by Bonding Open Government and Simulation Data (DB, KN, EG, AA, JK), pp. 34–45.
HCIHIMI-IKD-2015-MorizumiA #analysis #using
Analysis Using Purchasing Data in Japan (RM, YA), pp. 640–647.
HCILCT-2015-AltanC #analysis #animation #education
An Eye-Tracking Analysis of Spatial Contiguity Effect in Educational Animations (TA, ), pp. 3–13.
HCILCT-2015-DalipiYK #analysis #performance #semantics #using
Enhancing the Learner’s Performance Analysis Using SMEUS Semantic E-learning System and Business Intelligence Technologies (FD, SYY, ZK), pp. 208–217.
HCISCSM-2015-GerritsenB #analysis #predict
Simulation-Based Prediction and Analysis of Collective Emotional States (CG, WRJvB), pp. 118–126.
HCISCSM-2015-KastratiIYD #analysis #network #online #social #using
Analysis of Online Social Networks Posts to Investigate Suspects Using SEMCON (ZK, ASI, SYY, FD), pp. 148–157.
HCISCSM-2015-KinclNPS #analysis #independence #sentiment
Language-Independent Sentiment Analysis with Surrounding Context Extension (TK, MN, JP, PS), pp. 158–168.
AdaEuropeAdaEurope-2015-JaradatBP #analysis #maintenance #safety #using
Using Sensitivity Analysis to Facilitate the Maintenance of Safety Cases (OJ, IB, SP), pp. 162–176.
AdaEuropeAdaEurope-2015-ZamoranoG #analysis #scheduling
Schedulability Analysis of PWM Tasks for the UPMSat-2 ADCS (JZ, JG), pp. 85–99.
ICEISICEIS-v2-2015-BandyszakRWP #analysis #information management #specification #validation
Supporting the Validation of Structured Analysis Specifications in the Engineering of Information Systems by Test Path Exploration (TB, MR, TW, KP), pp. 252–259.
ICEISICEIS-v2-2015-Judrups #analysis #information management #integration
Analysis of Knowledge Management and E-Learning Integration Approaches (JJ), pp. 451–456.
ICEISICEIS-v2-2015-PerezNGD #analysis #development #process
A Tool for the Analysis of Change Management Processes in Software Development Cycles (MP, ÁN, HAPG, JCD), pp. 482–485.
ICEISICEIS-v2-2015-SariK #analysis #debugging #monitoring #predict
Bug Prediction for an ATM Monitoring Software — Use of Logistic Regression Analysis for Bug Prediction (ÖS, OK), pp. 382–387.
ICEISICEIS-v2-2015-SouzaVS #analysis #semantics
Semantically Enriching the Detrending Step of Time Series Analysis (LdS, MSMGV, MSS), pp. 475–481.
ICEISICEIS-v2-2015-ZoglaMS #analysis #problem #quality #taxonomy
Analysis of Data Quality Problem Taxonomies (AZ, IM, ES), pp. 445–450.
ICEISICEIS-v3-2015-BauerBTR #analysis #flexibility #maintenance #repository
A SOA Repository with Advanced Analysis Capabilities — Improving the Maintenance and Flexibility of Service-Oriented Applications (TB, SB, JT, MR), pp. 238–248.
ICEISICEIS-v3-2015-ThabetGG #analysis #mining #petri net #process
Petri Net Model Cost Extension based on Process Mining — Cost Data Description and Analysis (DT, SAG, HHBG), pp. 268–275.
ICEISICEIS-v3-2015-ValentimCM #analysis #case study #specification
Evaluating an Inspection Technique for Use Case Specifications — Quantitative and Qualitative Analysis (NMCV, TC, JCM), pp. 13–24.
ECIRECIR-2015-BansalBV #analysis #semantics #towards
Towards Deep Semantic Analysis of Hashtags (PB, RB, VV), pp. 453–464.
ECIRECIR-2015-BiyaniBCM #analysis #concurrent #online #retrieval #thread #using
Using Subjectivity Analysis to Improve Thread Retrieval in Online Forums (PB, SB, CC, PM), pp. 495–500.
ECIRECIR-2015-CaoC #analysis #behaviour #detection #social #social media
Detecting Spam URLs in Social Media via Behavioral Analysis (CC, JC), pp. 703–714.
ECIRECIR-2015-HienertHWK #analysis #named
WHOSE — A Tool for Whole-Session Analysis in IIR (DH, WvH, AW, DK), pp. 172–183.
ECIRECIR-2015-HuynhHR #analysis #learning #sentiment #strict
Learning Higher-Level Features with Convolutional Restricted Boltzmann Machines for Sentiment Analysis (TH, YH, SMR), pp. 447–452.
ECIRECIR-2015-Kelly #analysis #estimation #information retrieval #statistics
Statistical Power Analysis for Sample Size Estimation in Information Retrieval Experiments with Users (DK), pp. 822–825.
ECIRECIR-2015-KoolenBBK #analysis #social #social media
Looking for Books in Social Media: An Analysis of Complex Search Requests (MK, TB, AvdB, JK), pp. 184–196.
ECIRECIR-2015-Moghaddam #analysis #fault #feedback #mining #sentiment
Beyond Sentiment Analysis: Mining Defects and Improvements from Customer Feedback (SM), pp. 400–410.
ECIRECIR-2015-SabetghadamLBR #analysis #graph #reachability
Reachability Analysis of Graph Modelled Collections (SS, ML, RB, AR), pp. 370–381.
ICMLICML-2015-GanCHCC #analysis #modelling #scalability #topic
Scalable Deep Poisson Factor Analysis for Topic Modeling (ZG, CC, RH, DEC, LC), pp. 1823–1832.
ICMLICML-2015-GongY #analysis #convergence #memory management
A Modified Orthant-Wise Limited Memory Quasi-Newton Method with Convergence Analysis (PG, JY), pp. 276–284.
ICMLICML-2015-HuangGS #analysis #component #independence
Deterministic Independent Component Analysis (RH, AG, CS), pp. 2521–2530.
ICMLICML-2015-KomiyamaHN #analysis #multi #probability #problem
Optimal Regret Analysis of Thompson Sampling in Stochastic Multi-armed Bandit Problem with Multiple Plays (JK, JH, HN), pp. 1152–1161.
ICMLICML-2015-MaLF #analysis #canonical #correlation #dataset #linear #scalability
Finding Linear Structure in Large Datasets with Scalable Canonical Correlation Analysis (ZM, YL, DPF), pp. 169–178.
ICMLICML-2015-NishiharaLRPJ #analysis #convergence
A General Analysis of the Convergence of ADMM (RN, LL, BR, AP, MIJ), pp. 343–352.
ICMLICML-2015-PerrotH #analysis #learning #metric
A Theoretical Analysis of Metric Hypothesis Transfer Learning (MP, AH), pp. 1708–1717.
ICMLICML-2015-PrasadPR #analysis #axiom #rank
Distributional Rank Aggregation, and an Axiomatic Analysis (AP, HHP, PDR), pp. 2104–2112.
ICMLICML-2015-WangWS #analysis #clustering
A Deterministic Analysis of Noisy Sparse Subspace Clustering for Dimensionality-reduced Data (YW, YXW, AS), pp. 1422–1431.
ICMLICML-2015-YangX15a #analysis #component #streaming
Streaming Sparse Principal Component Analysis (WY, HX), pp. 494–503.
ICMLICML-2015-ZhouZS #analysis #bound #convergence #fault #first-order
ℓ₁,p-Norm Regularization: Error Bounds and Convergence Rate Analysis of First-Order Methods (ZZ, QZ, AMCS), pp. 1501–1510.
KDDKDD-2015-ChaoHZ #analysis #kernel
Optimal Kernel Group Transformation for Exploratory Regression Analysis and Graphics (PC, QH, MZ), pp. 905–914.
KDDKDD-2015-EmbarBPV #analysis #online #social #topic
Online Topic-based Social Influence Analysis for the Wimbledon Championships (VRE, IB, VP, RV), pp. 1759–1768.
KDDKDD-2015-NagarajanWBNBHT #analysis #predict
Predicting Future Scientific Discoveries Based on a Networked Analysis of the Past Literature (MN, ADW, BJB, IBN, SB, PJH, METD, SB, AKA, JJL, SR, CMB, CRP, LK, AML, AL, HZ, SB, GW, YC, LAD, WSS, OL), pp. 2019–2028.
KDDKDD-2015-OkumuraST #analysis #classification #incremental #linear #problem
Quick Sensitivity Analysis for Incremental Data Modification and Its Application to Leave-one-out CV in Linear Classification Problems (SO, YS, IT), pp. 885–894.
KDDKDD-2015-ZhangLZSKYJ #analysis #biology #image #learning #modelling #multi
Deep Model Based Transfer and Multi-Task Learning for Biological Image Analysis (WZ, RL, TZ, QS, SK, JY, SJ), pp. 1475–1484.
KDDKDD-2015-ZhouLB #analysis #clustering #graph
Integrating Vertex-centric Clustering with Edge-centric Clustering for Meta Path Graph Analysis (YZ, LL, DB), pp. 1563–1572.
MLDMMLDM-2015-AlzahraniAAB #data analysis
Data Analysis for Courses Registration (NA, RA, NA, GB), pp. 357–367.
MLDMMLDM-2015-CoralloFMACCGS #analysis #approach #sentiment
Sentiment Analysis for Government: An Optimized Approach (AC, LF, MM, MA, AC, VC, EG, DS), pp. 98–112.
MLDMMLDM-2015-KarkkainenS #analysis #component #robust
Robust Principal Component Analysis of Data with Missing Values (TK, MS), pp. 140–154.
MLDMMLDM-2015-KrasotkinaM15a #analysis #approach
A Bayesian Approach to Sparse Cox Regression in High-Dimentional Survival Analysis (OK, VM), pp. 425–437.
MLDMMLDM-2015-MojahedBWI #analysis #clustering #matrix #semistructured data #similarity #using
Applying Clustering Analysis to Heterogeneous Data Using Similarity Matrix Fusion (SMF) (AM, JHBS, WW, BdlI), pp. 251–265.
MLDMMLDM-2015-ShaluntsB #analysis #named #sentiment
SentiSAIL: Sentiment Analysis in English, German and Russian (GS, GB), pp. 87–97.
RecSysRecSys-2015-SifaOB #analysis #migration
User Churn Migration Analysis with DEDICOM (RS, CO, CB), pp. 321–324.
RecSysRecSys-2015-SousaDBM #analysis #named #network #recommendation
CNARe: Co-authorship Networks Analysis and Recommendations (GAdS, MAD, MAB, MMM), pp. 329–330.
SEKESEKE-2015-BarchetSF #analysis #collaboration #dependence #risk management
Analysis of Risk Dependencies in Collaborative Risk Management (CB, LAdLS, LMF), pp. 314–319.
SEKESEKE-2015-GokhaleE #analysis #network #social
Social Analysis of the SEKE Co-Author Network (SSG, REK), pp. 237–243.
SEKESEKE-2015-RamosCRSAP #analysis #architecture #recommendation
Recommendation in the Digital TV Domain: an Architecture based on Textual Description Analysis (FBAR, AAMC, RRdS, GS, HOdA, AP), pp. 99–104.
SEKESEKE-2015-SaputriL #analysis #machine learning #perspective
Are We Living in a Happy Country: An Analysis of National Happiness from Machine Learning Perspective (TRDS, SWL), pp. 174–177.
SEKESEKE-2015-SunSWZ #analysis #data flow #detection #fault #integer #using
Improving the Accuracy of Integer Signedness Error Detection Using Data Flow Analysis (HS, CS, YW, QZ), pp. 601–606.
SEKESEKE-2015-Tasse #analysis #identification #metric #using
Using peak analysis for identifying lagged effects between software metrics (JT), pp. 512–515.
SEKESEKE-2015-ValeSSA #agile #analysis #evaluation #industrial #named #process
RiSE-DA: An Agile Domain Analysis Process and its Industrial Evaluation (TV, ISS, IFdS, ESdA), pp. 696–699.
SEKESEKE-2015-ZhangGAU #analysis #mobile
Test Model and Coverage Analysis for Location-based Mobile Services (TZ, JG, OEKA, TU), pp. 80–86.
SEKESEKE-2015-ZouCH #impact analysis #mobile #topic #user interface
Topic Matching Based Change Impact Analysis from Feature on User Interface of Mobile Apps (QZ, XC, YH), pp. 477–482.
SIGIRSIGIR-2015-Dori-Hacohen #analysis #detection
Controversy Detection and Stance Analysis (SDH), p. 1057.
SIGIRSIGIR-2015-HeindorfPSE #analysis #corpus #detection #knowledge base #towards
Towards Vandalism Detection in Knowledge Bases: Corpus Construction and Analysis (SH, MP, BS, GE), pp. 831–834.
SIGIRSIGIR-2015-KrstovskiSK #analysis #modelling #retrieval
Evaluating Retrieval Models through Histogram Analysis (KK, DAS, MJK), pp. 859–862.
SIGIRSIGIR-2015-SeverynM15a #analysis #network #sentiment #twitter
Twitter Sentiment Analysis with Deep Convolutional Neural Networks (AS, AM), pp. 959–962.
MODELSMoDELS-J-2011-BavotaGOLTGC15 #analysis #diagrams #fine-grained #maintenance #uml
A fine-grained analysis of the support provided by UML class diagrams and ER diagrams during data model maintenance (GB, CG, RO, ADL, GT, MG, JACL), pp. 287–306.
MODELSMoDELS-J-2011-BavotaGOLTGC15 #analysis #diagrams #fine-grained #maintenance #uml
A fine-grained analysis of the support provided by UML class diagrams and ER diagrams during data model maintenance (GB, CG, RO, ADL, GT, MG, JACL), pp. 287–306.
AMTAMT-2015-GholizadehDKM #analysis #model transformation
Analysis of Source-to-Target Model Transformations in QueST (HG, ZD, SK, TSEM), pp. 46–55.
BXBX-2015-HidakaBTM #analysis #approach #bidirectional #graph transformation
Trace-based Approach to Editability and Correspondence Analysis for Bidirectional Graph Transformations (SH, MB, QMT, KM), pp. 51–65.
ECMFAECMFA-2015-BerardinelliMPP #analysis #design #energy
Energy Consumption Analysis and Design of Energy-Aware WSN Agents in fUML (LB, ADM, SP, LP, WT), pp. 1–17.
MoDELSMoDELS-2015-Rodriguez-Echeverria #analysis #approach #evolution #model transformation #statistics
A statistical analysis approach to assist model transformation evolution (RRE, FM), pp. 226–235.
ECOOPECOOP-2015-Alimadadi0P #hybrid #impact analysis #javascript
Hybrid DOM-Sensitive Change Impact Analysis for JavaScript (SA, AM, KP), pp. 321–345.
ECOOPECOOP-2015-CentonzePT #analysis
Access-rights Analysis in the Presence of Subjects (PC, MP, OT), pp. 222–246.
ECOOPECOOP-2015-HauzarK #framework #php #static analysis
Framework for Static Analysis of PHP Applications (DH, JK), pp. 689–711.
ECOOPECOOP-2015-ParkR #javascript #precise #scalability #static analysis
Scalable and Precise Static Analysis of JavaScript Applications via Loop-Sensitivity (CP, SR), pp. 735–756.
ECOOPECOOP-2015-WeiR #adaptation #analysis #javascript
Adaptive Context-sensitive Analysis for JavaScript (SW, BGR), pp. 712–734.
OOPSLAOOPSLA-2015-DaraisMH #composition #program analysis #reuse
Galois transformers and modular abstract interpreters: reusable metatheory for program analysis (DD, MM, DVH), pp. 552–571.
OOPSLAOOPSLA-2015-DietrichHS #analysis #java #points-to
Giga-scale exhaustive points-to analysis for Java in under a minute (JD, NH, BS), pp. 535–551.
OOPSLAOOPSLA-2015-FuBS #analysis #automation #fault
Automated backward error analysis for numerical code (ZF, ZB, ZS), pp. 639–654.
OOPSLAOOPSLA-2015-MadsenTL #javascript #static analysis
Static analysis of event-driven Node.js JavaScript applications (MM, FT, OL), pp. 505–519.
OOPSLAOOPSLA-2015-OhYY #adaptation #learning #optimisation #program analysis
Learning a strategy for adapting a program analysis via bayesian optimisation (HO, HY, KY), pp. 572–588.
OOPSLAOOPSLA-2015-ToffolaPG #dynamic analysis #performance #problem
Performance problems you can fix: a dynamic analysis of memoization opportunities (LDT, MP, TRG), pp. 607–622.
GPCEGPCE-2015-El-SharkawyKS #analysis #semantics #tool support
Analysing the Kconfig semantics and its analysis tools (SES, AK, KS), pp. 45–54.
PPDPPPDP-2015-GarciaLL #static analysis
Static analysis of cloud elasticity (AG, CL, ML), pp. 125–136.
PPDPPPDP-2015-Hofmann #analysis #automation
Automatic amortized analysis (MH), p. 5.
QAPLQAPL-2015-RosendahlK #analysis #probability
Probabilistic Output Analysis by Program Manipulation (MR, MHK), pp. 110–124.
POPLPOPL-2015-ChatterjeePV #analysis #interprocedural
Quantitative Interprocedural Analysis (KC, AP, YV), pp. 539–551.
POPLPOPL-2015-PredaGLM #analysis #automaton #bytecode #semantics #similarity
Abstract Symbolic Automata: Mixed syntactic/semantic similarity analysis of executables (MDP, RG, AL, IM), pp. 329–341.
POPLPOPL-2015-TangWZXZM #analysis #data flow
Summary-Based Context-Sensitive Data-Dependence Analysis in Presence of Callbacks (HT, XW, LZ, BX, LZ, HM), pp. 83–95.
SACSAC-2015-AlvesMM #case study #detection #fault #impact analysis #refactoring #test coverage
Test coverage and impact analysis for detecting refactoring faults: a study on the extract method refactoring (ELGA, TM, PDdLM), pp. 1534–1540.
SACSAC-2015-DuanZHX #analysis #framework #network #performance
Performance analysis for a service delivery platform in software defined network (QD, MZ, JH, CCX), pp. 2257–2262.
SACSAC-2015-FerreiraMME #analysis #comparison #kernel #memory management
An experimental comparison analysis of kernel-level memory allocators (TBF, RM, AM, BEC), pp. 2054–2059.
SACSAC-2015-GimenesGRG #analysis #graph #multimodal #repository
Multimodal graph-based analysis over the DBLP repository: critical discoveries and hypotheses (GPG, HG, JFRJ, MG), pp. 1129–1135.
SACSAC-2015-IqbalKK #analysis #sentiment
Bias-aware lexicon-based sentiment analysis (MI, AK, FK), pp. 845–850.
SACSAC-2015-IsraelHS #analysis #multi #semantics #summary
Semantic analysis for focused multi-document summarization (fMDS) of text (QI, HH, IYS), pp. 339–344.
SACSAC-2015-Jung0B #analysis #embedded #encoding #identification #power management
Identification of embedded control units by state encoding and power consumption analysis (EJ, CM, LB), pp. 1957–1959.
SACSAC-2015-KrutzMS #analysis #detection #effectiveness #using
Examining the effectiveness of using concolic analysis to detect code clones (DEK, SAM, ES), pp. 1610–1615.
SACSAC-2015-LopezR #analysis #metaprogramming
Meta-programming with well-typed code analysis (ML, GDR), pp. 2119–2121.
SACSAC-2015-MaltaPSBF #analysis #bibliography #case study #distance #information management
A survey analysis on goal orientation changes in an information systems distance course: a Brazilian case study (CAM, ROAP, APdS, IIB, AQdOF), pp. 227–232.
SACSAC-2015-MongioviGFPT #analysis #approach #data flow #detection #hybrid #java
Combining static and dynamic data flow analysis: a hybrid approach for detecting data leaks in java applications (MM, GG, AF, GP, ET), pp. 1573–1579.
SACSAC-2015-MoreiraJR #analysis #reduction #similarity #visual notation
Visual similarity analysis in loop closure through data dimensionality reduction via diffusion maps (LASM, CMJ, PFFR), pp. 289–294.
SACSAC-2015-OjameruayeB #analysis #framework
A risk — aware framework for compliance goal-obstacle analysis (BO, RB), pp. 1401–1402.
SACSAC-2015-PiMMG #analysis #health #ontology #security
Ontology definition and cognitive analysis in ocupational health and security (OHS) environments (NSP, LM, JMM, ACBG), pp. 201–206.
SACSAC-2015-Puffitsch #analysis #bound #branch #predict
Persistence-based branch misprediction bounds for WCET analysis (WP), pp. 1898–1905.
SACSAC-2015-RaniseTV #analysis #automation #constraints #policy
Automated analysis of RBAC policies with temporal constraints and static role hierarchies (SR, ATT, LV), pp. 2177–2184.
SACSAC-2015-SilvaMS #analysis #quality
Authorship contribution dynamics on publication venues in computer science: an aggregated quality analysis (THPS, MMM, APCdS), pp. 1142–1147.
ESEC-FSEESEC-FSE-2015-0002SGBZ #automation #impact analysis #named #natural language #requirements
NARCIA: an automated tool for change impact analysis in natural language requirements (CA, MS, AG, LCB, FZ), pp. 962–965.
ESEC-FSEESEC-FSE-2015-BusanyM #analysis #behaviour #statistics
Behavioral log analysis with statistical guarantees (NB, SM), pp. 898–901.
ESEC-FSEESEC-FSE-2015-FuLB #analysis #automation #memory dump #memory management #pointer
Automatically deriving pointer reference expressions from binary code for memory dump analysis (YF, ZL, DB), pp. 614–624.
ESEC-FSEESEC-FSE-2015-GreenyerHMB #analysis #re-engineering #requirements
Evaluating a formal scenario-based method for the requirements analysis in automotive software engineering (JG, MH, JM, RB), pp. 1002–1005.
ESEC-FSEESEC-FSE-2015-LiLWH #analysis #android #java #string
String analysis for Java and Android applications (DL, YL, MW, WGJH), pp. 661–672.
ESEC-FSEESEC-FSE-2015-MangalZNN #approach #program analysis
A user-guided approach to program analysis (RM, XZ, AVN, MN), pp. 462–473.
ESEC-FSEESEC-FSE-2015-SmithJMCL #developer #security #static analysis
Questions developers ask while diagnosing potential security vulnerabilities with static analysis (JS, BJ, ERMH, BC, HRL), pp. 248–259.
ICSEICSE-v1-2015-AvgustinovBHLMM #developer #static analysis
Tracking Static Analysis Violations over Time to Capture Developer Characteristics (PA, AIB, ASH, RGL, GM, OdM, MS, JT), pp. 437–447.
ICSEICSE-v1-2015-HuangLR #analysis #concurrent #named #predict
GPredict: Generic Predictive Concurrency Analysis (JH, QL, GR), pp. 847–857.
ICSEICSE-v1-2015-OcteauLDJM #analysis #android #communication #component #constant
Composite Constant Propagation: Application to Android Inter-Component Communication Analysis (DO, DL, MD, SJ, PM), pp. 77–88.
ICSEICSE-v1-2015-PanW0G #analysis #javascript
Gray Computing: An Analysis of Computing with Background JavaScript Tasks (YP, JW, YS, JG), pp. 167–177.
ICSEICSE-v1-2015-PradelSS #analysis #consistency #javascript #named #nondeterminism
TypeDevil: Dynamic Type Inconsistency Analysis for JavaScript (MP, PS, KS), pp. 314–324.
ICSEICSE-v1-2015-SadowskiGJSW #ecosystem #named #program analysis
Tricorder: Building a Program Analysis Ecosystem (CS, JvG, CJ, ES, CW), pp. 598–608.
ICSEICSE-v1-2015-WeissRL #fault #program analysis #scalability
Database-Backed Program Analysis for Scalable Error Propagation (CW, CRG, BL), pp. 586–597.
ICSEICSE-v1-2015-YangYWWR #analysis #android #control flow
Static Control-Flow Analysis of User-Driven Callbacks in Android Applications (SY, DY, HW, YW, AR), pp. 89–99.
ICSEICSE-v1-2015-YiYLZW #analysis #testing
A Synergistic Analysis Method for Explaining Failed Regression Tests (QY, ZY, JL, CZ, CW), pp. 257–267.
ICSEICSE-v2-2015-AlexandruG #agile #analysis #multi
Rapid Multi-Purpose, Multi-Commit Code Analysis (CVA, HCG), pp. 635–638.
ICSEICSE-v2-2015-Berghe #analysis #security #towards
Towards a Practical Security Analysis Methodology (AvDB), pp. 883–886.
ICSEICSE-v2-2015-Bichhawat #analysis
Post-Dominator Analysis for Precisely Handling Implicit Flows (AB), pp. 787–789.
ICSEICSE-v2-2015-Hachem #analysis #architecture #data access #modelling #towards
Towards Model Driven Architecture and Analysis of System of Systems Access Control (JEH), pp. 867–870.
ICSEICSE-v2-2015-HermansM #analysis #dataset #email #spreadsheet
Enron’s Spreadsheets and Related Emails: A Dataset and Analysis (FH, ERMH), pp. 7–16.
ICSEICSE-v2-2015-KlasBDSH #analysis #evaluation #modelling #scalability #testing
A Large-Scale Technology Evaluation Study: Effects of Model-based Analysis and Testing (MK, TB, AD, TS, PH), pp. 119–128.
ICSEICSE-v2-2015-MaleticC #analysis #semiparsing #source code #using
Exploration, Analysis, and Manipulation of Source Code Using srcML (JIM, MLC), pp. 951–952.
ICSEICSE-v2-2015-MaplesdenRTHG #analysis #case study #industrial #performance #using
Performance Analysis Using Subsuming Methods: An Industrial Case Study (DM, KvR, EDT, JGH, JCG), pp. 149–158.
ICSEICSE-v2-2015-Palomba #analysis #detection #smell
Textual Analysis for Code Smell Detection (FP), pp. 769–771.
ICSEICSE-v2-2015-SadeghiBM #analysis #android #security #using
Analysis of Android Inter-App Security Vulnerabilities Using COVERT (AS, HB, SM), pp. 725–728.
ICSEICSE-v2-2015-Zieris #analysis #information management #programming
Qualitative Analysis of Knowledge Transfer in Pair Programming (FZ), pp. 855–858.
SLESLE-2015-Bagge #analysis #library
Analysis and transformation with the nuthatch tree-walking library (AHB), pp. 83–88.
SPLCSPLC-2015-BeekFG #adaptation #analysis #paradigm #product line
Applying the product lines paradigm to the quantitative analysis of collective adaptive systems (MHtB, AF, SG), pp. 321–326.
SPLCSPLC-2015-BeekFGM #analysis #product line #using
Using FMC for family-based analysis of software product lines (MHtB, AF, SG, FM), pp. 432–439.
SPLCSPLC-2015-BeekLLV #analysis #constraints #modelling #probability #product line #statistics
Statistical analysis of probabilistic models of software product lines with quantitative constraints (MHtB, AL, ALL, AV), pp. 11–15.
SPLCSPLC-2015-DomisAB #analysis #modelling #safety #tool support #uml #using #variability
Integrating variability and safety analysis models using commercial UML-based tools (DD, RA, MB), pp. 225–234.
SPLCSPLC-2015-KassmeyerSS #impact analysis #process #safety #variability
A process to support a systematic change impact analysis of variability and safety in automotive functions (MK, MS, MS), pp. 235–244.
SPLCSPLC-2015-LiangGCR #analysis #feature model #modelling #satisfiability #scalability
SAT-based analysis of large real-world feature models is easy (JH(L, VG, KC, VR), pp. 91–100.
SPLCSPLC-2015-YueAS #analysis #case study #cyber-physical #experience #product line
Cyber-physical system product line engineering: comprehensive domain analysis and experience report (TY, SA, BS), pp. 338–347.
ASPLOSASPLOS-2015-SenguptaBZBK #bound #dynamic analysis #hybrid
Hybrid Static: Dynamic Analysis for Statically Bounded Region Serializability (AS, SB, MZ, MDB, MK), pp. 561–575.
CCCC-2015-AllenSK #analysis #points-to #scalability #staged
Staged Points-to Analysis for Large Code Bases (NA, BS, PK), pp. 131–150.
CGOCGO-2015-NagarajG #analysis #approximate #mining #pointer #using
Approximating flow-sensitive pointer analysis using frequent itemset mining (VN, RG), pp. 225–234.
CGOCGO-2015-OanceaR #analysis #induction #scalability
Scalable conditional induction variables (CIV) analysis (CEO, LR), pp. 213–224.
HPCAHPCA-2015-ZhaoY #analysis #distance #manycore #reuse #scalability
Studying the impact of multicore processor scaling on directory techniques via reuse distance analysis (MZ, DY), pp. 590–602.
HPDCHPDC-2015-BerrocalBDLC #data analysis #detection #lightweight #runtime
Lightweight Silent Data Corruption Detection Based on Runtime Data Analysis for HPC Applications (EB, LABG, SD, ZL, FC), pp. 275–278.
HPDCHPDC-2015-SuWA #data analysis #generative #performance
In-Situ Bitmaps Generation and Efficient Data Analysis based on Bitmaps (YS, YW, GA), pp. 61–72.
LCTESLCTES-2015-0001HL #analysis #kernel #realtime
Cross-Kernel Control-Flow-Graph Analysis for Event-Driven Real-Time Systems (CD, MH, DL), p. 10.
LCTESLCTES-2015-BarijoughHKG #analysis #streaming #trade-off
Implementation-Aware Model Analysis: The Case of Buffer-Throughput Tradeoff in Streaming Applications (KMB, MH, VK, SG), p. 10.
LCTESLCTES-2015-StilkerichLES #analysis #embedded #realtime
A Practical Getaway: Applications of Escape Analysis in Embedded Real-Time Systems (IS, CL, CE, MS), p. 11.
LCTESLCTES-2015-ZhangK #abstract interpretation #analysis #persistent #precise
Improving the Precision of Abstract Interpretation Based Cache Persistence Analysis (ZZ, XDK), p. 10.
PPoPPPPoPP-2015-DasSR #communication #concurrent #detection #program analysis #thread
Section based program analysis to reduce overhead of detecting unsynchronized thread communication (MD, GS, JR), pp. 283–284.
SOSPSOSP-2015-HooffLZZ #analysis #named #scalability
Vuvuzela: scalable private messaging resistant to traffic analysis (JvdH, DL, MZ, NZ), pp. 137–152.
CAVCAV-2015-AbateBCK #adaptation #analysis #markov #network
Adaptive Aggregation of Markov Chains: Quantitative Analysis of Chemical Reaction Networks (AA, LB, MC, MZK), pp. 195–213.
CAVCAV-2015-BozzanoCGM #analysis #modelling #performance #safety
Efficient Anytime Techniques for Model-Based Safety Analysis (MB, AC, AG, CM), pp. 603–621.
CAVCAV-2015-BozzanoCPJKPRT #analysis #design #safety
Formal Design and Safety Analysis of AIR6110 Wheel Brake System (MB, AC, AFP, DJ, GK, TP, RR, ST), pp. 518–535.
CSLCSL-2015-ClementeL #analysis #automaton #first-order #reachability
Reachability Analysis of First-order Definable Pushdown Systems (LC, SL), pp. 244–259.
CSLCSL-2015-SchwentickVZ #source code #static analysis
Static Analysis for Logic-based Dynamic Programs (TS, NV, TZ), pp. 308–324.
ICLPICLP-2015-KieslST #analysis #on the #source code
On Structural Analysis of Non-Ground Answer-Set Programs (BK, PS, HT).
ICLPICLP-J-2015-GangeNSSS #horn clause #program analysis #program transformation #representation
Horn clauses as an intermediate representation for program analysis and transformation (GG, JAN, PS, HS, PJS), pp. 526–542.
ICSTICST-2015-0001YPGS #analysis #generative #testing #using
Generating Succinct Test Cases Using Don’t Care Analysis (CN, HY, MRP, IG, KS), pp. 1–10.
ICSTICST-2015-MidtgaardM #static analysis
QuickChecking Static Analysis Properties (JM, AM), pp. 1–10.
ICSTICST-2015-NardoPB #analysis #generative #modelling #mutation testing #testing
Generating Complex and Faulty Test Data through Model-Based Mutation Analysis (DDN, FP, LCB), pp. 1–10.
ISSTAISSTA-2015-AquinoBCDP #constraints #program analysis #proving #reuse
Reusing constraint proofs in program analysis (AA, FAB, MC, GD, MP), pp. 305–315.
ISSTAISSTA-2015-DimjasevicG #analysis #assurance #generative #runtime #testing #verification
Test-case generation for runtime analysis and vice versa: verification of aircraft separation assurance (MD, DG), pp. 282–292.
ISSTAISSTA-2015-HuangDMD #analysis #android #precise #scalability
Scalable and precise taint analysis for Android (WH, YD, AM, JD), pp. 106–117.
ISSTAISSTA-2015-QiLAR #analysis #correctness #generative
An analysis of patch plausibility and correctness for generate-and-validate patch generation systems (ZQ, FL, SA, MCR), pp. 24–36.
RTARTA-2015-GenetS #analysis #reachability
Reachability Analysis of Innermost Rewriting (TG, YS), pp. 177–193.
RTARTA-2015-NageleFM #analysis #automation #confluence #term rewriting
Improving Automatic Confluence Analysis of Rewrite Systems by Redundant Rules (JN, BF, AM), pp. 257–268.
ICSTSAT-2015-FalknerLH #analysis #automation #named #performance #satisfiability
SpySMAC: Automated Configuration and Performance Analysis of SAT Solvers (SF, MTL, FH), pp. 215–222.
TAPTAP-2015-GrinchteinCP #analysis #constraints #optimisation #protocol
A Constraint Optimisation Model for Analysis of Telecommunication Protocol Logs (OG, MC, JP), pp. 137–154.
TLCATLCA-2015-HofmannM #analysis #multi #term rewriting
Multivariate Amortised Resource Analysis for Term Rewrite Systems (MH, GM), pp. 241–256.
VMCAIVMCAI-2015-BackesR #abstraction #analysis #clustering #graph transformation #infinity
Analysis of Infinite-State Graph Transformation Systems by Cluster Abstraction (PB, JR), pp. 135–152.
VMCAIVMCAI-2015-NagarS #analysis #using
Path Sensitive Cache Analysis Using Cache Miss Paths (KN, YNS), pp. 43–60.
VMCAIVMCAI-2015-PrabhakarS #abstraction #analysis #hybrid
Foundations of Quantitative Predicate Abstraction for Stability Analysis of Hybrid Systems (PP, MGS), pp. 318–335.
ECSAECSA-2014-BerardinelliMP #analysis #design #network #performance
fUML-Driven Design and Performance Analysis of Software Agents for Wireless Sensor Network (LB, ADM, SP), pp. 324–339.
ECSAECSA-2014-XiongFPM #architecture #as a service #cost analysis #performance #scalability
Scalable Architectures for Platform-as-a-Service Clouds: Performance and Cost Analysis (HX, FF, CP, NM), pp. 226–233.
WICSAWICSA-2014-FuZBX #analysis
A Recoverability-Oriented Analysis for Operations on Cloud Applications (MF, LZ, LB, XX), pp. 125–128.
ASEASE-2014-AbalBW #analysis #debugging #kernel #linux #variability
42 variability bugs in the linux kernel: a qualitative analysis (IA, CB, AW), pp. 421–432.
ASEASE-2014-Angerer #impact analysis #multi #product line #variability
Variability-aware change impact analysis of multi-language product lines (FA), pp. 903–906.
ASEASE-2014-CaiS #dependence #impact analysis #named #precise #using
Diver: precise dynamic impact analysis using dependence-based trace pruning (HC, RAS), pp. 343–348.
ASEASE-2014-EllisHKLLLMM #analysis #automation #requirements
Automated requirements analysis for a molecular watchdog timer (SJE, ERH, THK, JIL, JHL, RRL, DM, ASM), pp. 767–778.
ASEASE-2014-MarasSC #analysis #named #reuse #web
Firecrow: a tool for web application analysis and reuse (JM, MS, JC), pp. 847–850.
ASEASE-2014-NearJ #analysis #interactive #named #security #web
Derailer: interactive security analysis for web applications (JPN, DJ), pp. 587–598.
ASEASE-2014-RamaK #dynamic analysis #refactoring
A dynamic analysis to support object-sharing code refactorings (GMR, RK), pp. 713–724.
ASEASE-2014-SeguraSC #analysis #automation #case study #e-commerce #experience #testing #variability
Automated variability analysis and testing of an E-commerce site.: an experience report (SS, ABS, ARC), pp. 139–150.
ASEASE-2014-StephenSSE #big data #program analysis
Program analysis for secure big data processing (JJS, SS, RS, PTE), pp. 277–288.
ASEASE-2014-TarvoR #analysis #automation #modelling #parallel #performance #source code #thread
Automated analysis of multithreaded programs for performance modeling (AT, SPR), pp. 7–18.
CASECASE-2014-ChenGGLCL #analysis #approach #behaviour #scheduling
A residential load scheduling approach based on load behavior analysis (SC, FG, XG, TL, YC, YL), pp. 954–959.
CASECASE-2014-ChuLSO #analysis #contract #flexibility #linear #parametricity #programming #using
Flexibility analysis on a supply chain contract using a parametric Linear Programming model (CC, EEL, XS, DO), pp. 704–709.
CASECASE-2014-GargSYPCHPAG #analysis #automation #reachability
Exact reachability analysis for planning skew-line needle arrangements for automated brachytherapy (AG, TS, GY, SP, JAMC, ICH, JP, AA, KYG), pp. 524–531.
CASECASE-2014-HanZH #analysis
System-theoretic analysis of battery systems during equalization, charging, and discharging (WH, LZ, YH), pp. 158–163.
CASECASE-2014-HuYLC #analysis #automation #modelling #multi #petri net
Simplifying supervisory controllers of automated manufacturing systems via Petri net modeling and multiset analysis (HH, YY, YL, CC), pp. 449–454.
CASECASE-2014-JiangCWWS #3d #analysis #fault #re-engineering #using
Error analysis and experiments of 3D reconstruction using a RGB-D sensor (SYJ, NYCC, CCW, CHW, KTS), pp. 1020–1025.
CASECASE-2014-JiaZAX #analysis
Analysis and improvement of batch-based production lines with Bernoulli machines (ZJ, LZ, JA, GX), pp. 13–18.
CASECASE-2014-LiaoLCHF #analysis
Vision based gait analysis on robotic walking stabilization system for patients with Parkinson’s Disease (CKL, CDL, CYC, CMH, LCF), pp. 818–823.
CASECASE-2014-PengHHW #analysis #effectiveness #metric
An effective wavelength utilization for spectroscopic analysis on orchid chlorophyll measurement (YHP, CSH, PCH, YDW), pp. 716–721.
CASECASE-2014-WangGWG #analysis #behaviour #generative #multi
Analysis of multi-location PEV charging behaviors based on trip chain generation (DW, XG, JW, JG), pp. 151–156.
CASECASE-2014-WuCT #analysis #memory management #modelling #multi
Multistage semiconductor memory inventory model based on survival analysis (JZW, CFC, YCT), pp. 613–618.
CASECASE-2014-ZhuWQZ #analysis #clustering #constraints #modelling #multi #petri net #scheduling #tool support
Modeling and schedulability analysis of single-arm multi-cluster tools with residency time constraints via Petri nets (QZ, NW, YQ, MZ), pp. 81–86.
DACDAC-2014-AthavaleMHV #analysis #source code #test coverage #using
Code Coverage of Assertions Using RTL Source Code Analysis (VA, SM, SH, SV), p. 6.
DACDAC-2014-IyengarG #analysis #embedded #memory management #modelling #power management #robust
Modeling and Analysis of Domain Wall Dynamics for Robust and Low-Power Embedded Memory (AI, SG), p. 6.
DACDAC-2014-KiamehrOTN #analysis #approach #fault
Radiation-Induced Soft Error Analysis of SRAMs in SOI FinFET Technology: A Device to Circuit Approach (SK, THO, MBT, SRN), p. 6.
DACDAC-2014-KleebergerMS #analysis
Workload- and Instruction-Aware Timing Analysis: The missing Link between Technology and System-level Resilience (VK, PRM, US), p. 6.
DACDAC-2014-LiangC #analysis #clustering #named #network #probability #reduction #scalability #smarttech
ClusRed: Clustering and Network Reduction Based Probabilistic Optimal Power Flow Analysis for Large-Scale Smart Grids (YL, DC), p. 6.
DACDAC-2014-LinL #analysis #parallel #reachability #verification
Parallel Hierarchical Reachability Analysis for Analog Verification (HL, PL), p. 6.
DACDAC-2014-NandakumarM #analysis
System-Level Floorplan-Aware Analysis of Integrated CPU-GPUs (VSN, MMS), p. 6.
DACDAC-2014-QuintonBHNNE #analysis #design #network
Typical Worst Case Response-Time Analysis and its Use in Automotive Network Design (SQ, TTB, JH, MN, MN, RE), p. 6.
DACDAC-2014-SchneiderPP #agile #analysis #multi
MASH{fifo}: A Hardware-Based Multiple Cache Simulator for Rapid FIFO Cache Analysis (JS, JP, SP), p. 6.
DACDAC-2014-ShankarSWP #analysis #concept #design #specification
Ontology-guided Conceptual Analysis of Design Specifications (AS, BPS, FGW, CAP), p. 6.
DACDAC-2014-ShanSFZTXYL #algorithm #analysis #configuration management #encryption #multi
A Side-channel Analysis Resistant Reconfigurable Cryptographic Coprocessor Supporting Multiple Block Cipher Algorithms (WS, LS, XF, XZ, CT, ZX, JY, JL), p. 6.
DACDAC-2014-ShrivastavaRJW #analysis #control flow #fault
Quantitative Analysis of Control Flow Checking Mechanisms for Soft Errors (AS, AR, RJ, CJW), p. 6.
DACDAC-2014-SiyoumGC #analysis #data flow
Symbolic Analysis of Dataflow Applications Mapped onto Shared Heterogeneous Resources (FS, MG, HC), p. 6.
DACDAC-2014-WaksmanRSS #analysis #assessment #functional #identification
A Red Team/Blue Team Assessment of Functional Analysis Methods for Malicious Circuit Identification (AW, JR, MS, SS), p. 4.
DACDAC-2014-XueQBYT #analysis #framework #manycore #scalability
Disease Diagnosis-on-a-Chip: Large Scale Networks-on-Chip based Multicore Platform for Protein Folding Analysis (YX, ZQ, PB, FY, CYT), p. 6.
DACDAC-2014-ZhengBB #analysis #identification #named #robust #towards
CACI: Dynamic Current Analysis Towards Robust Recycled Chip Identification (YZ, AB, SB), p. 6.
DATEDATE-2014-AltmeyerD #analysis #correctness #on the #precise #probability
On the correctness, optimality and precision of Static Probabilistic Timing Analysis (SA, RID), pp. 1–6.
DATEDATE-2014-BeneventiBVDB #analysis #identification #logic
Thermal analysis and model identification techniques for a logic + WIDEIO stacked DRAM test chip (FB, AB, PV, DD, LB), pp. 1–4.
DATEDATE-2014-ButtazzoBB #adaptation #analysis #design
Rate-adaptive tasks: Model, analysis, and design issues (GCB, EB, DB), pp. 1–6.
DATEDATE-2014-ChenHD #analysis #graph #modelling
May-happen-in-parallel analysis based on segment graphs for safe ESL models (WC, XH, RD), pp. 1–6.
DATEDATE-2014-ChienYHLC #analysis #geometry #image
Package geometric aware thermal analysis by infrared-radiation thermal images (JHC, HY, RSH, HJL, SCC), pp. 1–4.
DATEDATE-2014-EbrahimiETSCA #analysis #embedded #fault
Comprehensive analysis of alpha and neutron particle-induced soft errors in an embedded processor at nanoscales (ME, AE, MBT, RS, EC, DA), pp. 1–6.
DATEDATE-2014-FischerCM #analysis #design #modelling
Power modeling and analysis in early design phases (BF, CC, HM), pp. 1–6.
DATEDATE-2014-FrijnsASVGSC #analysis #graph
Timing analysis of First-Come First-Served scheduled interval-timed Directed Acyclic Graphs (RF, SA, SS, JV, MCWG, RRHS, HC), pp. 1–6.
DATEDATE-2014-GanapathyCACGR #analysis #framework #memory management #named #robust
INFORMER: An integrated framework for early-stage memory robustness analysis (SG, RC, DA, EC, AG, AR), pp. 1–4.
DATEDATE-2014-GangopadhyayLNR #adaptation #analysis #linear #modelling #performance
Modeling and analysis of digital linear dropout regulators with adaptive control for high efficiency under wide dynamic range digital loads (SG, YL, SBN, AR), pp. 1–6.
DATEDATE-2014-GhalatyAS #analysis #fault
Analyzing and eliminating the causes of fault sensitivity analysis (NFG, AA, PS), pp. 1–6.
DATEDATE-2014-Guan0 #analysis #performance #scheduling
General and efficient Response Time Analysis for EDF scheduling (NG, WY), pp. 1–6.
DATEDATE-2014-HoffmanRAA #analysis #fault #memory management
Wear-out analysis of Error Correction Techniques in Phase-Change Memory (CH, LR, RA, GA), pp. 1–4.
DATEDATE-2014-KarakonstantisSSAB #analysis #approach #energy #variability
A quality-scalable and energy-efficient approach for spectral analysis of heart rate variability (GK, AS, MMS, DA, AB), pp. 1–6.
DATEDATE-2014-KhanAHKKRC #analysis #bias
Bias Temperature Instability analysis of FinFET based SRAM cells (SK, IA, SH, HK, BK, PR, FC), pp. 1–6.
DATEDATE-2014-LongLY #analysis #bound #evaluation #modelling #multi
Analysis and evaluation of per-flow delay bound for multiplexing models (YL, ZL, XY), pp. 1–4.
DATEDATE-2014-NowotschPHPS #analysis #monitoring #multi #off the shelf
Monitoring and WCET analysis in COTS multi-core-SoC-based mixed-criticality systems (JN, MP, AH, WP, AS), pp. 1–5.
DATEDATE-2014-PandeyV #analysis #fault #safety
Transient errors resiliency analysis technique for automotive safety critical applications (SP, BV), pp. 1–4.
DATEDATE-2014-RadojicicGMP #analysis
Semi-symbolic analysis of mixed-signal systems including discontinuities (CR, CG, JM, XP), pp. 1–4.
DATEDATE-2014-RamboTDAE #analysis #realtime
Failure analysis of a network-on-chip for real-time mixed-critical systems (EAR, AT, JD, LA, RE), pp. 1–4.
DATEDATE-2014-RanaC #analysis #named #reduction #scalability #simulation
SSFB: A highly-efficient and scalable simulation reduction technique for SRAM yield analysis (MR, RC), pp. 1–6.
DATEDATE-2014-SalunkheMB #analysis #data flow #modelling
Mode-Controlled Dataflow based modeling & analysis of a 4G-LTE receiver (HS, OM, KvB), pp. 1–4.
DATEDATE-2014-SiddiqueT #analysis #formal method #towards
Towards the formal analysis of microresonators based photonic systems (US, ST), pp. 1–6.
DATEDATE-2014-SinghSWPWC #analysis #specification
Cross-correlation of specification and RTL for soft IP analysis (BPS, AS, FGW, CAP, DJW, SC), pp. 1–6.
DATEDATE-2014-SongDY #analysis #bound #multi #order #parametricity #performance #reduction
Zonotope-based nonlinear model order reduction for fast performance bound analysis of analog circuits with multiple-interval-valued parameter variations (YS, SMPD, HY), pp. 1–6.
DATEDATE-2014-VijaykumarV #analysis #canonical #statistics #using
Statistical static timing analysis using a skew-normal canonical delay model (MV, VV), pp. 1–6.
DATEDATE-2014-VillenaS #analysis #network #performance #variability
Efficient analysis of variability impact on interconnect lines and resistor networks (JFV, LMS), pp. 1–6.
DATEDATE-2014-ZhangB #analysis #probability
Stochastic analysis of Bubble Razor (GZ, PAB), pp. 1–6.
DATEDATE-2014-ZhangYW #analysis #performance #problem
Efficient high-sigma yield analysis for high dimensional problems (MZ, ZY, YW), pp. 1–6.
DocEngDocEng-2014-DiemKS #analysis #classification #documentation
Ruling analysis and classification of torn documents (MD, FK, RS), pp. 63–72.
DocEngDocEng-2014-KolbergFRF #analysis #documentation #performance #throughput #using
JAR tool: using document analysis for improving the throughput of high performance printing environments (MLK, LGF, MR, CF), pp. 175–178.
DRRDRR-2014-FengLLLT #analysis #geometry
Structure analysis for plane geometry figures (TF, XL, LL, KL, ZT), p. ?–11.
DRRDRR-2014-LiPLD #analysis #online #verification
On-line signature verification method by Laplacian spectral analysis and dynamic time warping (CL, LP, CL, XD), p. ?–10.
DRRDRR-2014-LiuWTLG #analysis #automation #comprehension #image
Automatic comic page image understanding based on edge segment analysis (DL, YW, ZT, LL, LG), p. ?–12.
HTHT-2014-KimWWO #analysis #multi #twitter
Sociolinguistic analysis of Twitter in multilingual societies (SK, IW, LW, AHO), pp. 243–248.
HTHT-2014-ZhangBR #analysis #empirical #network #social #social media
Empirical analysis of implicit brand networks on social media (KZ, SB, SR), pp. 190–199.
PODSPODS-2014-Cohen #analysis #graph #sketching
All-distances sketches, revisited: HIP estimators for massive graphs analysis (EC), pp. 88–99.
PODSPODS-2014-NgoNRR #analysis #worst-case
Beyond worst-case analysis for joins with minesweeper (HQN, DTN, CR, AR), pp. 234–245.
SIGMODSIGMOD-2014-BlanasWBDS #data analysis #parallel
Parallel data analysis directly on scientific file formats (SB, KW, SB, BD, AS), pp. 385–396.
SIGMODSIGMOD-2014-GulwaniM #data analysis #interactive #named #natural language #programming #spreadsheet
NLyze: interactive programming by natural language for spreadsheet data analysis and manipulation (SG, MM), pp. 803–814.
SIGMODSIGMOD-2014-Musleh #analysis #twitter #visual notation
Spatio-temporal visual analysis for event-specific tweets (MM), pp. 1611–1612.
SIGMODSIGMOD-2014-ZhuGCL #analysis #clustering #graph #sentiment #social #social media
Tripartite graph clustering for dynamic sentiment analysis on social media (LZ, AG, JC, KL), pp. 1531–1542.
VLDBVLDB-2014-DeutchMT #analysis #framework #process
A Provenance Framework for Data-Dependent Process Analysis (DD, YM, VT), pp. 457–468.
VLDBVLDB-2014-JacobKS #analysis
A System for Management and Analysis of Preference Data (MJ, BK, JS), pp. 1255–1258.
VLDBVLDB-2014-Markl #big data #data analysis #declarative #independence
Breaking the Chains: On Declarative Data Analysis and Data Independence in the Big Data Era (VM), pp. 1730–1733.
VLDBVLDB-2014-MortonBGM #challenge
Support the Data Enthusiast: Challenges for Next-Generation Data-Analysis Systems (KM, MB, DG, JDM), pp. 453–456.
VLDBVLDB-2014-ProserpioGM #data analysis
Calibrating Data to Sensitivity in Private Data Analysis (DP, SG, FM), pp. 637–648.
VLDBVLDB-2014-ZhangTCO #analysis #data transformation #in memory #performance
Efficient In-memory Data Management: An Analysis (HZ, BMT, GC, BCO), pp. 833–836.
CSEETCSEET-2014-Steppe #analysis #dependence #design #education #graph #using
Teaching analysis of software designs using dependency graphs (KS), pp. 65–73.
ITiCSEITiCSE-2014-FerreiraM #algorithm #analysis #design #education #using
The magic of algorithm design and analysis: teaching algorithmic skills using magic card tricks (JFF, AM), pp. 75–80.
ITiCSEITiCSE-2014-KohNBR #analysis #validation
Early validation of computational thinking pattern analysis (KHK, HN, ARB, AR), pp. 213–218.
ESOPESOP-2014-Fu #abstraction #analysis #memory management
Targeted Update — Aggressive Memory Abstraction Beyond Common Sense and Its Application on Static Numeric Analysis (ZF), pp. 534–553.
ESOPESOP-2014-MangalNY #analysis #interprocedural
A Correspondence between Two Approaches to Interprocedural Analysis in the Presence of Join (RM, MN, HY), pp. 513–533.
FASEFASE-2014-CohenM #analysis #configuration management #semantics #specification
Semantically Configurable Analysis of Scenario-Based Specifications (BC, SM), pp. 185–199.
FASEFASE-2014-FerraraSB #cost analysis #named
TouchCost: Cost Analysis of TouchDevelop Scripts (PF, DS, LB), pp. 109–124.
FASEFASE-2014-HuangDM #analysis #java #type system #web
Type-Based Taint Analysis for Java Web Applications (WH, YD, AM), pp. 140–154.
FASEFASE-2014-KowalST #analysis #performance
Family-Based Performance Analysis of Variant-Rich Software Systems (MK, IS, MT), pp. 94–108.
FASEFASE-2014-MudduluruR #abstraction #incremental #performance #static analysis #using
Efficient Incremental Static Analysis Using Path Abstraction (RM, MKR), pp. 125–139.
FASEFASE-2014-SadeghiEM #analysis #mining #repository #security
Mining the Categorized Software Repositories to Improve the Analysis of Security Vulnerabilities (AS, NE, SM), pp. 155–169.
FoSSaCSFoSSaCS-2014-BonnetKL #analysis #parallel #probability #process
Analysis of Probabilistic Basic Parallel Processes (RB, SK, AWL), pp. 43–57.
TACASTACAS-2014-BrockschmidtEFFG #analysis #complexity #integer #runtime #source code
Alternating Runtime and Size Complexity Analysis of Integer Programs (MB, FE, SF, CF, JG), pp. 140–155.
WRLAWRLA-2014-Genet #automaton #functional #source code #static analysis #towards #using
Towards Static Analysis of Functional Programs Using Tree Automata Completion (TG), pp. 147–161.
WRLAWRLA-2014-RochaMM #analysis #smt
Rewriting Modulo SMT and Open System Analysis (CR, JM, CAM), pp. 247–262.
SANERCSMR-WCRE-2014-AlalfiCD #analysis #clustering #experience #industrial
Analysis and clustering of model clones: An automotive industrial experience (MHA, JRC, TRD), pp. 375–378.
SANERCSMR-WCRE-2014-SantosVA #analysis #clustering #semantics #using
Remodularization analysis using semantic clustering (GS, MTV, NA), pp. 224–233.
ICPCICPC-2014-BinkleyHLO #analysis #comprehension #source code
Understanding LDA in source code analysis (DB, DH, DJL, JO), pp. 26–36.
ICPCICPC-2014-GuptaS #program analysis #quality
A semiautomated method for classifying program analysis rules into a quality model (SG, HKS), pp. 266–270.
ICSMEICSME-2014-ChaikalisLMC #analysis #evolution #named
SEAgle: Effortless Software Evolution Analysis (TC, EL, GM, AC), pp. 581–584.
ICSMEICSME-2014-KlattKS #analysis #dependence
Program Dependency Analysis for Consolidating Customized Product Copies (BK, KK, CS), pp. 496–500.
ICSMEICSME-2014-LandmanSV #analysis #corpus #empirical #java #scalability
Empirical Analysis of the Relationship between CC and SLOC in a Large Corpus of Java Methods (DL, AS, JJV), pp. 221–230.
ICSMEICSME-2014-MondalRS #analysis #fine-grained
A Fine-Grained Analysis on the Evolutionary Coupling of Cloned Code (MM, CKR, KAS), pp. 51–60.
ICSMEICSME-2014-Muske #analysis #bibliography #clustering
Improving Review of Clustered-Code Analysis Warnings (TM), pp. 569–572.
ICSMEICSME-2014-SajnaniSOL #analysis #component #quality
Is Popularity a Measure of Quality? An Analysis of Maven Components (HS, VS, JO, CVL), pp. 231–240.
ICSMEICSME-2014-Stephan #analysis #clone detection #detection #evaluation #mutation testing #using
Model Clone Detector Evaluation Using Mutation Analysis (MS), pp. 633–638.
ICSMEICSME-2014-TaoQ #analysis #concurrent #java #refactoring #source code
Refactoring Java Concurrent Programs Based on Synchronization Requirement Analysis (BT, JQ), pp. 361–370.
ICSMEICSME-2014-WongXZHZM #analysis #fault #locality #segmentation
Boosting Bug-Report-Oriented Fault Localization with Segmentation and Stack-Trace Analysis (CPW, YX, HZ, DH, LZ, HM), pp. 181–190.
MSRMSR-2014-BloemenAKO #analysis #database #dependence #open source
Innovation diffusion in open source software: preliminary analysis of dependency changes in the gentoo portage package database (RB, CA, SK, GOM), pp. 316–319.
MSRMSR-2014-FarahTC #analysis #architecture #named #quality #scalability
OpenHub: a scalable architecture for the analysis of software quality attributes (GF, JST, DC), pp. 420–423.
MSRMSR-2014-GuzmanAL #analysis #commit #empirical #git #sentiment
Sentiment analysis of commit comments in GitHub: an empirical study (EG, DA, YL), pp. 352–355.
MSRMSR-2014-HanamTHL #ranking #static analysis
Finding patterns in static analysis alerts: improving actionable alert ranking (QH, LT, RH, PL), pp. 152–161.
MSRMSR-2014-MurgiaTAO #analysis #developer
Do developers feel emotions? an exploratory analysis of emotions in software artifacts (AM, PT, BA, MO), pp. 262–271.
MSRMSR-2014-PleteaVS #analysis #git #security #sentiment
Security and emotion: sentiment analysis of security discussions on GitHub (DP, BV, AS), pp. 348–351.
MSRMSR-2014-SteidlHJ #analysis #incremental #source code
Incremental origin analysis of source code files (DS, BH, EJ), pp. 42–51.
MSRMSR-2014-ZanjaniSK #commit #impact analysis #interactive #source code
Impact analysis of change requests on source code based on interaction and commit histories (MBZ, GS, HHK), pp. 162–171.
SCAMSCAM-2014-CaiJSZZ #analysis #named #predict
SENSA: Sensitivity Analysis for Quantitative Change-Impact Prediction (HC, SJ, RAS, YJZ, YZ), pp. 165–174.
SCAMSCAM-2014-HutchinsBS #analysis #c #c++ #concurrent #safety #thread
C/C++ Thread Safety Analysis (DH, AB, DS), pp. 41–46.
SCAMSCAM-2014-LiangSM #analysis #performance
Fast Flow Analysis with Godel Hashes (SL, WS, MM), pp. 225–234.
SCAMSCAM-2014-LiangSMKH #analysis #automaton #exception
Pruning, Pushdown Exception-Flow Analysis (SL, WS, MM, AWK, DVH), pp. 265–274.
SCAMSCAM-2014-TengeriBHG #analysis #repository #test coverage #testing #tool support
Toolset and Program Repository for Code Coverage-Based Test Suite Analysis and Manipulation (DT, ÁB, DH, TG), pp. 47–52.
SCAMSCAM-2014-YadegariD #analysis
Bit-Level Taint Analysis (BY, SD), pp. 255–264.
PEPMPEPM-2014-HanusS #analysis #composition #functional #logic programming #source code
A modular and generic analysis server system for functional logic programs (MH, FS), pp. 181–188.
PEPMPEPM-2014-KerneisSH #continuation #named #performance #static analysis
QEMU/CPC: static analysis and CPS conversion for safe, portable, and efficient coroutines (GK, CS, SH), pp. 83–94.
PLDIPLDI-2014-ArztRFBBKTOM #analysis #android #named #precise
FlowDroid: precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for Android apps (SA, SR, CF, EB, AB, JK, YLT, DO, PM), p. 29.
PLDIPLDI-2014-BorgesFdPV #analysis #composition #probability #quantifier
Compositional solution space quantification for probabilistic software analysis (MB, AF, Md, CSP, WV), p. 15.
PLDIPLDI-2014-MitraLABSG #analysis #debugging #parallel #scalability
Accurate application progress analysis for large-scale parallel debugging (SM, IL, DHA, SB, MS, TG), p. 23.
PLDIPLDI-2014-OhLHYY #context-sensitive grammar
Selective context-sensitivity guided by impact pre-analysis (HO, WL, KH, HY, KY), p. 49.
PLDIPLDI-2014-SmaragdakisKB #analysis #context-sensitive grammar
Introspective analysis: context-sensitivity, across the board (YS, GK, GB), p. 50.
PLDIPLDI-2014-ZhangMNY #analysis #bottom-up #hybrid #interprocedural #top-down
Hybrid top-down and bottom-up interprocedural analysis (XZ, RM, MN, HY), p. 28.
SASSAS-2014-AlbertFR #cost analysis #distributed
Peak Cost Analysis of Distributed Systems (EA, JCF, GRD), pp. 18–33.
SASSAS-2014-BakhirkinBP #abstraction #analysis #approximate
Backward Analysis via over-Approximate Abstraction and under-Approximate Subtraction (AB, JB, NP), pp. 34–50.
SASSAS-2014-BessonJV #java #named #static analysis
SawjaCard: A Static Analysis Tool for Certifying Java Card Applications (FB, TPJ, PV), pp. 51–67.
SASSAS-2014-CoxCR #analysis #automation #source code
Automatic Analysis of Open Objects in Dynamic Language Programs (AC, BYEC, XR), pp. 134–150.
SASSAS-2014-MadsenM #analysis #data flow #pointer #reachability
Sparse Dataflow Analysis with Pointers and Reachability (MM, AM), pp. 201–218.
SASSAS-2014-YeSX #analysis #pointer
Region-Based Selective Flow-Sensitive Pointer Analysis (SY, YS, JX), pp. 319–336.
STOCSTOC-2014-BhaskaraCMV #analysis
Smoothed analysis of tensor decompositions (AB, MC, AM, AV), pp. 594–603.
STOCSTOC-2014-DworkTT0 #analysis #bound #component #privacy
Analyze gauss: optimal bounds for privacy-preserving principal component analysis (CD, KT, AT, LZ), pp. 11–20.
FLOPSFLOPS-2014-HoffmannS #analysis #array #integer #type system
Type-Based Amortized Resource Analysis with Integers and Arrays (JH, ZS), pp. 152–168.
ICALPICALP-v1-2014-DosaS #analysis
Optimal Analysis of Best Fit Bin Packing (GD, JS), pp. 429–441.
LATALATA-2014-FelgenhauerT #analysis #automaton #reachability
Reachability Analysis with State-Compatible Automata (BF, RT), pp. 347–359.
LATALATA-2014-SeidlK #analysis #data flow #interprocedural #xml
Interprocedural Information Flow Analysis of XML Processors (HS, MK), pp. 34–61.
FMFM-2014-AntoninoSW #analysis #concurrent #csp #network #process #refinement
A Refinement Based Strategy for Local Deadlock Analysis of Networks of CSP Processes (PRGA, AS, JW), pp. 62–77.
FMFM-2014-BaeOM #analysis #multi #semantics
Definition, Semantics, and Analysis of Multirate Synchronous AADL (KB, PCÖ, JM), pp. 94–109.
FMFM-2014-ButinM #analysis
Log Analysis for Data Protection Accountability (DB, DLM), pp. 163–178.
FMFM-2014-ForejtKNS #analysis #communication #precise #predict #source code
Precise Predictive Analysis for Discovering Communication Deadlocks in MPI Programs (VF, DK, GN, SS), pp. 263–278.
FMFM-2014-KordyLMP #algorithm #analysis #automaton #robust
A Symbolic Algorithm for the Analysis of Robust Timed Automata (PK, RL, SM, JWP), pp. 351–366.
FMFM-2014-LakshmiAK #analysis #liveness #reachability #using
Checking Liveness Properties of Presburger Counter Systems Using Reachability Analysis (KVL, AA, RK), pp. 335–350.
FMFM-2014-LiuGL #analysis #reliability
MDP-Based Reliability Analysis of an Ambient Assisted Living System (YL, LG, YL), pp. 688–702.
FMFM-2014-WenMM #analysis #formal method #information management #towards
Towards a Formal Analysis of Information Leakage for Signature Attacks in Preferential Elections (RW, AM, CM), pp. 595–610.
IFMIFM-2014-BruniSNN #analysis #protocol #security
Formal Security Analysis of the MaCAN Protocol (AB, MS, FN, HRN), pp. 241–255.
IFMIFM-2014-CalvaneseKSVZ #analysis #data type
Shape and Content — A Database-Theoretic Perspective on the Analysis of Data Structures (DC, TK, MS, HV, FZ), pp. 3–17.
IFMIFM-2014-GilmoreTV #analysis #evaluation
An Analysis Pathway for the Quantitative Evaluation of Public Transport Systems (SG, MT, AV), pp. 71–86.
IFMIFM-2014-RamsdellDGR #analysis #hybrid #protocol #security
A Hybrid Analysis for Security Protocols with State (JDR, DJD, JDG, PDR), pp. 272–287.
SEFMSEFM-2014-BeckerSAB #analysis #constraints #deployment #fault tolerance #formal method
A Formal Model for Constraint-Based Deployment Calculation and Analysis for Fault-Tolerant Systems (KB, BS, MA, CB), pp. 205–219.
SEFMSEFM-2014-BratNSV #abstract interpretation #framework #named #static analysis
IKOS: A Framework for Static Analysis Based on Abstract Interpretation (GB, JAN, NS, AV), pp. 271–277.
SEFMSEFM-2014-DeganoFG #adaptation #reliability #static analysis
A Two-Phase Static Analysis for Reliable Adaptation (PD, GLF, LG), pp. 347–362.
SEFMSEFM-2014-GrovO #analysis #consistency #formal method #multi
Increasing Consistency in Multi-site Data Stores: Megastore-CGC and Its Formal Analysis (JG, PCÖ), pp. 159–174.
SFMSFM-2014-BubelMH #analysis #execution #modelling
Analysis of Executable Software Models (RB, AFM, RH), pp. 1–25.
ICFPICFP-2014-ChenE #analysis #parametricity #product line #type system
Type-based parametric analysis of program families (SC, ME), pp. 39–51.
ICFPICFP-2014-KakiJ #analysis #framework #higher-order #relational
A relational framework for higher-order shape analysis (GK, SJ), pp. 311–324.
IFLIFL-2014-AdsitF #analysis #control flow #performance #system f
An Efficient Type- and Control-Flow Analysis for System F (CA, MF), p. 3.
LISPILC-2014-LevineY #analysis #assessment #profiling
Leadership Trait Analysis and Threat Assessment with Profiler Plus (NL, MY), p. 50.
GRAPHITEGRAPHITE-2014-DelzannoRT #analysis #protocol
Graph- versus Vector-Based Analysis of a Consensus Protocol (GD, AR, RT), pp. 44–57.
GRAPHITEGRAPHITE-2014-FernandezKP #analysis #framework #graph grammar #interactive #modelling
Strategic Port Graph Rewriting: An Interactive Modelling and Analysis Framework (MF, HK, BP), pp. 15–29.
ICGTICGT-2014-AnjorinLST #graph grammar #model transformation #performance #static analysis
A Static Analysis of Non-confluent Triple Graph Grammars for Efficient Model Transformation (AA, EL, AS, GT), pp. 130–145.
CHICHI-2014-GoyalLCF #analysis #collaboration
Effects of implicit sharing in collaborative analysis (NG, GL, DC, SRF), pp. 129–138.
CHICHI-2014-LeeSS #analysis #bound #design #research
Stay on the boundary: artifact analysis exploring researcher and user framing of robot design (HRL, SS, ES), pp. 1471–1474.
CHICHI-2014-LiuGFXHK #analysis
CHI 1994-2013: mapping two decades of intellectual progress through co-word analysis (YL, JG, DF, BX, SH, VK), pp. 3553–3562.
CHICHI-2014-ShelleyLMDSS #data analysis #design #student
Information-building applications: designing for data exploration and analysis by elementary school students (TS, LL, TM, CD, BLS, AS), pp. 2123–2132.
CHICHI-2014-Smith #analysis #comprehension #game studies #generative
Understanding procedural content generation: a design-centric analysis of the role of PCG in games (GS), pp. 917–926.
CHICHI-2014-XuYRFHB #analysis #exclamation
Show me the money!: an analysis of project updates during crowdfunding campaigns (AX, XY, HR, WTF, SWH, BPB), pp. 591–600.
CSCWCSCW-2014-BackstromK #analysis #facebook #network #social
Romantic partnerships and the dispersion of social ties: a network analysis of relationship status on facebook (LB, JMK), pp. 831–841.
CSCWCSCW-2014-KangKK #analysis #collaboration #information management #tool support
Teammate inaccuracy blindness: when information sharing tools hinder collaborative analysis (RK, AK, SBK), pp. 797–806.
HCIDHM-2014-ItoTGK #analysis #research
Research on Senior Response to Transfer Assistance between Wheelchair and Bed — EEG Analysis (MI, YT, AG, NK), pp. 558–566.
HCIDHM-2014-KarlovicPMSRRS #analysis #case study #comparison
Analysis and Comparison of Ergonomics in Laparoscopic and Open Surgery — A Pilot Study (KK, SP, TM, KDS, RR, MAR, BS), pp. 273–281.
HCIDHM-2014-MirandaRV #analysis #development #memory management #mobile #testing
Analysis of Luria Memory Tests for Development on Mobile Devices (JAHM, EHR, AMV), pp. 546–557.
HCIDHM-2014-OhgiriYYKH #analysis #comparison
Comparison of Gait Analysis by the Way of Semi-structured Interviews (MO, KY, HY, NK, HH), pp. 43–54.
HCIDHM-2014-OkaGTNH #analysis
Motion Analysis of the Pounding Technique Used for the Second Lining in the Fabrication of Traditional Japanese Hanging Scrolls (YO, AG, YT, CN, HH), pp. 55–65.
HCIDHM-2014-SugimotoYG #analysis
Analysis of Expert Skills on Handheld Grinding Work for Metallographic Sample (TS, HY, AG), pp. 66–77.
HCIDHM-2014-WongpatikasereeKT #analysis
Context-Aware Posture Analysis in a Workstation-Oriented Office Environment (KW, HK, YT), pp. 148–159.
HCIDHM-2014-ZhouLXZZ #analysis #metric #parametricity
Measurement and Analysis of Anthropometric Parameters of Young Male Vehicle Drivers (QXZ, ZQL, FX, SZ, SZ), pp. 174–181.
HCIDUXU-DI-2014-ChammasQM #analysis #design #interactive
An Analysis of Design Methodologies of Interactive System for Mobiles (AC, MQ, CRM), pp. 213–222.
HCIDUXU-DI-2014-NovickVSG #analysis #empirical #game studies #usability
Empirical Analysis of Playability vs. Usability in a Computer Game (DGN, JV, BS, IG), pp. 720–731.
HCIDUXU-DI-2014-ShafiqICRAAR #analysis #case study #learning #smarttech #usability #user satisfaction #what
To What Extent System Usability Effects User Satisfaction: A Case Study of Smart Phone Features Analysis for Learning of Novice (MS, MI, JGC, ZR, MA, WA, SR), pp. 346–357.
HCIDUXU-DP-2014-BarrosSF14a #analysis #artificial reality #evaluation #using
Ergonomic Evaluation of Manual Force Levels of the Elderly in the Handling of Products: An Analysis Using Virtual Reality (RQB, MMS, MGF), pp. 124–132.
HCIDUXU-DP-2014-SilvaPS #analysis #concept #using
Brands Analysis Using Informational Ergonomics Concepts: A Proposal (JCRPdS, LCP, JCPdS), pp. 90–101.
HCIDUXU-TMT-2014-FilippiB #analysis #aspect-oriented #functional #human-computer #interactive #nondeterminism
In-Depth Analysis of Non-deterministic Aspects of Human-Machine Interaction and Update of Dedicated Functional Mock-Ups (SF, DB), pp. 185–196.
HCIDUXU-TMT-2014-NieminenRTN #analysis #collaboration #industrial #information management
Collaboration Space for Creative Knowledge Work — Analysis of Industrial Pilots (MPN, MR, MT, MN), pp. 653–662.
HCIDUXU-TMT-2014-QuaresmaG #analysis #smarttech #usability
Usability Analysis of Smartphone Applications for Drivers (MQ, RCG), pp. 352–362.
HCIDUXU-TMT-2014-Tao #analysis #identification #user interface
Grammatical Analysis of User Interface Events for Task Identification (YT), pp. 197–205.
HCIHCI-AS-2014-FerreiraB #analysis #elicitation #people #requirements #semantics
Eliciting Accessibility Requirements for People with Hearing Loss: A Semantic and Norm Analysis (MAMF, RB), pp. 277–288.
HCIHCI-AS-2014-HooeyABF #analysis #design #fault
Evidence-Based Error Analysis: Supporting the Design of Error-Tolerant Systems (BLH, MA, RB, DCF), pp. 401–412.
HCIHCI-AS-2014-LandyLNPLM #analysis #comparative #development #predict
Finding Directions to a Good GPS System — A Comparative Analysis and Development of a Predictive Model (JL, TL, NN, PP, EL, PM), pp. 454–465.
HCIHCI-AS-2014-RafalakBW #analysis #evaluation
Analysis of Demographical Factors’ Influence on Websites’ Credibility Evaluation (MR, PB, AW), pp. 57–68.
HCIHIMI-AS-2014-Coelho #analysis
Association of CCR and BCC Efficiencies to Market Variables in a Retrospective Two Stage Data Envelope Analysis (DAC), pp. 151–159.
HCIHIMI-AS-2014-JangKJS #analysis #framework #reliability
A Framework of Human Reliability Analysis Method Considering Soft Control in Digital Main Control Rooms (IJ, ARK, WJ, PHS), pp. 335–346.
HCIHIMI-AS-2014-TanikawaA #analysis #bibliography
User Analysis and Questionnaire Survey (MT, YA), pp. 489–497.
HCIHIMI-DE-2014-KimitaNS #analysis #education
Application of a Requirement Analysis Template to Lectures in a Higher Education Institution (KK, YN, YS), pp. 594–601.
HCIHIMI-DE-2014-LinKT #analysis #collaboration #design #learning
A Learning Method for Product Analysis in Product Design — Learning Method of Product Analysis Utilizing Collaborative Learning and a List of Analysis Items (HL, HK, TT), pp. 503–513.
HCIHIMI-DE-2014-NazemiRKK #adaptation #analysis #similarity #visualisation
User Similarity and Deviation Analysis for Adaptive Visualizations (KN, WR, JK, AK), pp. 64–75.
HCILCT-NLE-2014-BrayshawGNWB #analysis #case study #evaluation #heuristic
Investigating Heuristic Evaluation as a Methodology for Evaluating Pedagogical Software: An Analysis Employing Three Case Studies (MB, NG, JTN, LW, AB), pp. 25–35.
HCILCT-NLE-2014-IbanezN #analysis #architecture #interactive
An Interactive Installation for the Architectural Analysis of Space and Form in Historical Buildings (LAHI, VBN), pp. 43–52.
HCILCT-NLE-2014-Jo0L #analysis #empirical #people
Empirical Analysis of Changes in Human Creativity in People Who Work with Humanoid Robots and Their Avatars (DJ, JGL, KCL), pp. 273–281.
HCISCSM-2014-AhangamaLKP #analysis #mobile #monitoring
Revolutionizing Mobile Healthcare Monitoring Technology: Analysis of Features through Task Model (SA, YSL, SYK, DCCP), pp. 298–305.
HCISCSM-2014-AhnMHNHPM #analysis #network #representation #semantics #social #twitter
Social Network Representation and Dissemination of Pre-Exposure Prophylaxis (PrEP): A Semantic Network Analysis of HIV Prevention Drug on Twitter (ZA, MM, JH, YN, CWH, MP, JM), pp. 160–169.
HCISCSM-2014-IoannidisPKKFA #analysis #named #social #social media
SONETA: A Social Media Geo-Trends Analysis Tool (II, EP, CK, NK, CF, NMA), pp. 186–196.
HCISCSM-2014-LopesMP #analysis #social #web
Virtual Homage to the Dead: An Analysis of Digital Memorials in the Social Web (ADL, CM, VCP), pp. 67–78.
HCISCSM-2014-MendesFFC #analysis #classification #how #social #using
How Do Users Express Their Emotions Regarding the Social System in Use? A Classification of Their Postings by Using the Emotional Analysis of Norman (MSM, EF, VF, MFdC), pp. 229–241.
VISSOFTVISSOFT-2014-VoineaT #analysis #visual notation
Visual Clone Analysis with SolidSDD (LV, ACT), pp. 79–82.
AdaEuropeAdaEurope-2014-BurgstallerB #ada #algebra #source code #static analysis
Kronecker Algebra for Static Analysis of Ada Programs with Protected Objects (BB, JB), pp. 27–42.
AdaEuropeAdaEurope-2014-QamhiehM #analysis #graph #multi #scheduling
Schedulability Analysis for Directed Acyclic Graphs on Multiprocessor Systems at a Subtask Level (MQ, SM), pp. 119–133.
CAiSECAiSE-2014-NobauerSG #analysis #approach #automation #evaluation #product line #similarity
Similarity Analysis within Product Line Scoping: An Evaluation of a Semi-automatic Approach (MN, NS, IG), pp. 165–179.
CAiSECAiSE-2014-RuizCEFP #analysis #information management #process
Integrating the Goal and Business Process Perspectives in Information System Analysis (MR, DC, SE, XF, OP), pp. 332–346.
EDOCEDOC-2014-FlorezSV #analysis #approach #automation #enterprise #modelling
Extensible Model-Based Approach for Supporting Automatic Enterprise Analysis (HF, MES, JV), pp. 32–41.
EDOCEDOC-2014-Franke #analysis #architecture #enterprise
Enterprise Architecture Analysis with Production Functions (UF), pp. 52–60.
EDOCEDOC-2014-MukkamalaHV #analysis #sentiment #social
Fuzzy-Set Based Sentiment Analysis of Big Social Data (RRM, AH, RKV), pp. 71–80.
EDOCEDOC-2014-NardiFA #analysis #modelling #ontology
An Ontological Analysis of Service Modeling at ArchiMate’s Business Layer (JCN, RdAF, JPAA), pp. 92–100.
ICEISICEIS-v1-2014-LettnerZ #data analysis #framework #industrial #product line
A Data Analysis Framework for High-variety Product Lines in the Industrial Manufacturing Domain (CL, MZ), pp. 209–216.
ICEISICEIS-v1-2014-TimoteoVF #analysis #case study #dataset #network #project management
Evaluating Artificial Neural Networks and Traditional Approaches for Risk Analysis in Software Project Management — A Case Study with PERIL Dataset (CT, MV, SF), pp. 472–479.
ICEISICEIS-v2-2014-BeenK #analysis #approach #internet #online #people
Finding You on the Internet — An Approach for Finding On-line Presences of People for Fraud Risk Analysis (HB, MvK), pp. 697–706.
ICEISICEIS-v2-2014-HernandesTTF #analysis #mining #using #visualisation
Using Visualization and Text Mining to Improve Qualitative Analysis (EMH, ET, ADT, SCPFF), pp. 201–208.
ICEISICEIS-v2-2014-HoosGKM #analysis #framework #identification #mobile #process
Improving Business Processes Through Mobile Apps — An Analysis Framework to Identify Value-added App Usage Scenarios (EH, CG, SK, BM), pp. 71–82.
ICEISICEIS-v2-2014-PanfilenkoEML #impact analysis #independence #model transformation #recommendation #requirements
Recommendations for Impact Analysis of Model Transformations — From the Requirements Model to the Platform-independent Model (DVP, AE, CM, PL), pp. 428–434.
ICEISICEIS-v2-2014-PereiraZS #concept analysis
Extraction of Classes Through the Application of Formal Concept Analysis (DP, LZ, MS), pp. 275–282.
ICEISICEIS-v2-2014-ProcaciSA #analysis #community #metric #online #people #reduction #reliability
Finding Reliable People in Online Communities of Questions and Answers — Analysis of Metrics and Scope Reduction (TBP, SWMS, LCVdA), pp. 526–535.
ICEISICEIS-v2-2014-VieiraJF #analysis #network
A Risk Analysis Method for Selecting Service Providers in P2P Service Overlay Networks (RGV, OCAJ, AF), pp. 477–488.
ICEISICEIS-v3-2014-AlvesVS #analysis #architecture
Architecture Principles Compliance Analysis (JA, AV, PS), pp. 328–334.
ICEISICEIS-v3-2014-NaranjoSV #analysis #architecture #enterprise #named
PRIMROSe — A Tool for Enterprise Architecture Analysis and Diagnosis (DN, MES, JV), pp. 201–213.
CIKMCIKM-2014-ArapakisLV #analysis #comprehension #gesture
Understanding Within-Content Engagement through Pattern Analysis of Mouse Gestures (IA, ML, GV), pp. 1439–1448.
CIKMCIKM-2014-CarmelMPS #analysis #community #using
Improving Term Weighting for Community Question Answering Search Using Syntactic Analysis (DC, AM, YP, IS), pp. 351–360.
CIKMCIKM-2014-JiaDGZ #analysis #community #network
Analysis on Community Variational Trend in Dynamic Networks (XJ, ND, JG, AZ), pp. 151–160.
CIKMCIKM-2014-LinJXWCW #analysis #sentiment
A Cross-Lingual Joint Aspect/Sentiment Model for Sentiment Analysis (ZL, XJ, XX, WW, XC, YW), pp. 1089–1098.
CIKMCIKM-2014-MengCS #analysis #approximate #keyword #query #semantics
Semantic Approximate Keyword Query Based on Keyword and Query Coupling Relationship Analysis (XM, LC, JS), pp. 529–538.
CIKMCIKM-2014-PhanDXPK #analysis #health #network #physics #process #social
Analysis of Physical Activity Propagation in a Health Social Network (NP, DD, XX, BP, DK), pp. 1329–1338.
CIKMCIKM-2014-RahimiSK #analysis #axiom #information retrieval
Axiomatic Analysis of Cross-Language Information Retrieval (RR, AS, IK), pp. 1875–1878.
CIKMCIKM-2014-RosenthalJ #analysis #enterprise
Enterprise Discussion Analysis (SR, AJ), pp. 1967–1970.
CIKMCIKM-2014-ShangLCC #analysis #component #robust
Robust Principal Component Analysis with Missing Data (FS, YL, JC, HC), pp. 1149–1158.
CIKMCIKM-2014-SpirinHDKB #analysis #facebook #graph #network #online #people #query #scalability #social
People Search within an Online Social Network: Large Scale Analysis of Facebook Graph Search Query Logs (NVS, JH, MD, KGK, MB), pp. 1009–1018.
CIKMCIKM-2014-TaoIWS #analysis #canonical #correlation
Exploring Shared Subspace and Joint Sparsity for Canonical Correlation Analysis (LT, HHSI, YW, XS), pp. 1887–1890.
CIKMCIKM-2014-TaxidouF #agile #analysis #information management #named #realtime #twitter
RApID: A System for Real-time Analysis of Information Diffusion in Twitter (IT, PMF), pp. 2060–2062.
CIKMCIKM-2014-WilkieA #analysis #bias #performance #retrieval
A Retrievability Analysis: Exploring the Relationship Between Retrieval Bias and Retrieval Performance (CW, LA), pp. 81–90.
CIKMCIKM-2014-YilmazVCRB #analysis #documentation
Relevance and Effort: An Analysis of Document Utility (EY, MV, NC, FR, PB), pp. 91–100.
ECIRECIR-2014-MonizJ #analysis #sentiment
Sentiment Analysis and the Impact of Employee Satisfaction on Firm Earnings (AM, FdJ), pp. 519–527.
ECIRECIR-2014-WilkieA #analysis #bias #empirical #retrieval
Best and Fairest: An Empirical Analysis of Retrieval System Bias (CW, LA), pp. 13–25.
ICMLICML-c1-2014-ChazalGLM #convergence #data analysis #diagrams #estimation #persistent
Convergence rates for persistence diagram estimation in Topological Data Analysis (FC, MG, CL, BM), pp. 163–171.
ICMLICML-c1-2014-MillerBAG #analysis #process
Factorized Point Process Intensities: A Spatial Analysis of Professional Basketball (AM, LB, RPA, KG), pp. 235–243.
ICMLICML-c1-2014-TangMNMZ #analysis #comprehension #modelling #topic
Understanding the Limiting Factors of Topic Modeling via Posterior Contraction Analysis (JT, ZM, XN, QM, MZ), pp. 190–198.
ICMLICML-c2-2014-Lopez-PazSSGS #analysis #component #random
Randomized Nonlinear Component Analysis (DLP, SS, AJS, ZG, BS), pp. 1359–1367.
ICMLICML-c2-2014-MukutaH #analysis #canonical #correlation #probability
Probabilistic Partial Canonical Correlation Analysis (YM, TH), pp. 1449–1457.
ICMLICML-c2-2014-NguyenMVEB #analysis #correlation #multi
Multivariate Maximal Correlation Analysis (HVN, EM, JV, PE, KB), pp. 775–783.
ICMLICML-c2-2014-NieYH #analysis #component #robust
Optimal Mean Robust Principal Component Analysis (FN, JY, HH), pp. 1062–1070.
ICMLICML-c2-2014-SatoKN #analysis #normalisation
Latent Confusion Analysis by Normalized Gamma Construction (IS, HK, HN), pp. 1116–1124.
ICMLICML-c2-2014-SatoN #analysis #approximate #equation #probability #process #using
Approximation Analysis of Stochastic Gradient Langevin Dynamics by using Fokker-Planck Equation and Ito Process (IS, HN), pp. 982–990.
ICMLICML-c2-2014-SunZZ #analysis #convergence
A Convergence Rate Analysis for LogitBoost, MART and Their Variant (PS, TZ, JZ), pp. 1251–1259.
ICMLICML-c2-2014-TaylorGP #analysis #approximate #linear #programming
An Analysis of State-Relevance Weights and Sampling Distributions on L1-Regularized Approximate Linear Programming Approximation Accuracy (GT, CG, DP), pp. 451–459.
ICMLICML-c2-2014-ToulisAR #analysis #linear #modelling #probability #statistics
Statistical analysis of stochastic gradient methods for generalized linear models (PT, EA, JR), pp. 667–675.
ICMLICML-c2-2014-TuZWQ #analysis #scalability
Making Fisher Discriminant Analysis Scalable (BT, ZZ, SW, HQ), pp. 964–972.
ICMLICML-c2-2014-ZhaoMXZZ #analysis #component #robust
Robust Principal Component Analysis with Complex Noise (QZ, DM, ZX, WZ, LZ), pp. 55–63.
ICPRICPR-2014-AhmadKM #analysis
Computer Assisted Analysis System of Electroencephalogram for Diagnosing Epilepsy (MAA, NAK, WM), pp. 3386–3391.
ICPRICPR-2014-AndreuLMG #analysis #automation #classification #gender #image
Analysis of the Effect of Image Resolution on Automatic Face Gender Classification (YA, JLC, RAM, PGS), pp. 273–278.
ICPRICPR-2014-ArvanitopoulosBT #analysis #learning
Laplacian Support Vector Analysis for Subspace Discriminative Learning (NA, DB, AT), pp. 1609–1614.
ICPRICPR-2014-BauckhageM #analysis #clustering #kernel #web
Kernel Archetypal Analysis for Clustering Web Search Frequency Time Series (CB, KM), pp. 1544–1549.
ICPRICPR-2014-BiswasZLMV #analysis #detection #image #using
Lesion Detection in Breast Ultrasound Images Using Tissue Transition Analysis (SB, FZ, XL, RM, VV), pp. 1185–1188.
ICPRICPR-2014-ChengY #analysis
Nighttime Traffic Flow Analysis for Rain-Drop Tampered Cameras (HYC, CCY), pp. 714–719.
ICPRICPR-2014-ChenYJ #analysis #feature model #linear #robust
An Improved Linear Discriminant Analysis with L1-Norm for Robust Feature Extraction (XC, JY, ZJ), pp. 1585–1590.
ICPRICPR-2014-DengHXC #analysis #composition #matrix #rank
Sparse and Low Rank Matrix Decomposition Based Local Morphological Analysis and Its Application to Diagnosis of Cirrhosis Livers (JD, XHH, GX, YWC), pp. 3363–3368.
ICPRICPR-2014-FernandezT #analysis #documentation #layout
EM-Based Layout Analysis Method for Structured Documents (FCF, ORT), pp. 315–320.
ICPRICPR-2014-FuscoEM #data analysis #locality #network
Bad Data Analysis with Sparse Sensors for Leak Localisation in Water Distribution Networks (FF, BE, SM), pp. 3642–3647.
ICPRICPR-2014-Hess-FloresRJ #analysis #multi #nondeterminism
Uncertainty, Baseline, and Noise Analysis for L1 Error-Based Multi-view Triangulation (MHF, SR, KIJ), pp. 4074–4079.
ICPRICPR-2014-HongZP #analysis #estimation #image
Pose Estimation via Complex-Frequency Domain Analysis of Image Gradient Orientations (XH, GZ, MP), pp. 1740–1745.
ICPRICPR-2014-HuDGX #analysis #distance #reduction
Max-K-Min Distance Analysis for Dimension Reduction (JH, WD, JG, YX), pp. 726–731.
ICPRICPR-2014-KrytheL #analysis #linear
Implicitly Constrained Semi-supervised Linear Discriminant Analysis (JHK, ML), pp. 3762–3767.
ICPRICPR-2014-KurtekS #analysis #segmentation #using
Handwritten Text Segmentation Using Elastic Shape Analysis (SK, AS), pp. 2501–2506.
ICPRICPR-2014-LinCCLH #analysis #detection
Left-Luggage Detection from Finite-State-Machine Analysis in Static-Camera Videos (KL, SCC, CSC, DTL, YPH), pp. 4600–4605.
ICPRICPR-2014-LinH #analysis #using
Crossroad Traffic Surveillance Using Superpixel Tracking and Vehicle Trajectory Analysis (DTL, CHH), pp. 2251–2256.
ICPRICPR-2014-LiuS #analysis
Discriminative Partition Sparsity Analysis (LL, LS), pp. 1597–1602.
ICPRICPR-2014-LiuXYZ #analysis
Texture Analysis with Shape Co-occurrence Patterns (GL, GSX, WY, LZ), pp. 1627–1632.
ICPRICPR-2014-LiWQXG #analysis #estimation
Confidence Estimation and Reputation Analysis in Aspect Extraction (YL, HW, ZQ, WX, JG), pp. 3612–3617.
ICPRICPR-2014-MoilanenZP #agile #analysis #difference #using
Spotting Rapid Facial Movements from Videos Using Appearance-Based Feature Difference Analysis (AM, GZ, MP), pp. 1722–1727.
ICPRICPR-2014-MollerPB #analysis #quantifier #using
Quantification of Actin Structures Using Unsupervised Pattern Analysis Techniques (BM, EP, NB), pp. 3251–3256.
ICPRICPR-2014-MoriKO #analysis #collaboration #framework #online #search-based
Search-Based Content Analysis System on Online Collaborative Platform for Film Production (MM, HK, MO), pp. 1091–1096.
ICPRICPR-2014-OhPKHB #analysis #image #personalisation #social
Personalized Economy of Images in Social Forums: An Analysis on Supply, Consumption, and Saliency (SO, MP, IK, AH, JB), pp. 2011–2016.
ICPRICPR-2014-OkadaFWP #analysis #random
Microenvironment-Based Protein Function Analysis by Random Forest (KO, LF, MW, DP), pp. 3138–3143.
ICPRICPR-2014-OnalAVFOOY #analysis #modelling
Modeling the Brain Connectivity for Pattern Analysis (IO, EA, BV, OF, MO, , FTYV), pp. 3339–3344.
ICPRICPR-2014-SariE #analysis #detection #fault #independence #using
Texture Defect Detection Using Independent Vector Analysis in Wavelet Domain (LS, AE), pp. 1639–1644.
ICPRICPR-2014-SeckDT #3d #analysis #geometry #using
3D Facial Skin Texture Analysis Using Geometric Descriptors (AS, HD, BT), pp. 1126–1131.
ICPRICPR-2014-SlitiHBA #analysis #robust #using
A More Robust Mean Shift Tracker Using Joint Monogenic Signal Analysis and Color Histogram (OS, HH, FB, HA), pp. 2453–2458.
ICPRICPR-2014-TavakoliYRHS #analysis #eye tracking #recognition
Emotional Valence Recognition, Analysis of Salience and Eye Movements (HRT, VY, ER, JH, NS), pp. 4666–4671.
ICPRICPR-2014-TuXN #analysis #detection #process
Computational Auditory Scene Analysis Based Voice Activity Detection (MT, XX, XN), pp. 797–802.
ICPRICPR-2014-WangGLYWY #analysis #canonical #correlation
Unsupervised Discriminant Canonical Correlation Analysis for Feature Fusion (SW, XG, JL, JYY, RW, JY), pp. 1550–1555.
ICPRICPR-2014-WatanabeW #analysis #component #distance #learning #metric #performance
Logistic Component Analysis for Fast Distance Metric Learning (KW, TW), pp. 1278–1282.
ICPRICPR-2014-YanRLSS #analysis #clustering #invariant #linear #multi #recognition
Clustered Multi-task Linear Discriminant Analysis for View Invariant Color-Depth Action Recognition (YY, ER, GL, RS, NS), pp. 3493–3498.
ICPRICPR-2014-YeWH #analysis #component #graph
Graph Characterization from Entropy Component Analysis (CY, RCW, ERH), pp. 3845–3850.
ICPRICPR-2014-ZhangWGZZ #analysis #using #verification
Low Computation Face Verification Using Class Center Analysis (XZ, JW, YG, SZ, SZ), pp. 4543–4547.
KDDKDD-2014-AkibaMK #analysis #network
Network structural analysis via core-tree-decomposition Publication of this article pending inquiry (TA, TM, KiK), pp. 1476–1485.
KDDKDD-2014-JiangCWXZY #analysis #behaviour #flexibility #multi #named
FEMA: flexible evolutionary multi-faceted analysis for dynamic behavioral pattern discovery (MJ, PC, FW, XX, WZ, SY), pp. 1186–1195.
KDDKDD-2014-LanSB #analysis #learning
Time-varying learning and content analytics via sparse factor analysis (ASL, CS, RGB), pp. 452–461.
KDDKDD-2014-TamhaneISDA #analysis #predict #risk management #student
Predicting student risks through longitudinal analysis (AT, SI, BS, MD, JA), pp. 1544–1552.
KDDKDD-2014-YuH0 #analysis #detection #named #social #social media
GLAD: group anomaly detection in social media analysis (QRY, XH, YL), pp. 372–381.
KDDKDD-2014-ZhuSY #analysis #mining #network #social
Network mining and analysis for social applications (FZ, HS, XY), p. 1974.
KDIRKDIR-2014-CastelltortL #analysis #graph
NoSQL Graph-based OLAP Analysis (AC, AL), pp. 217–224.
KDIRKDIR-2014-HafethAC #analysis #case study #classification
Text Analysis of User-Generated Contents for Health-care Applications — Case Study on Smoking Status Classification (DAH, AA, DC), pp. 242–249.
KDIRKDIR-2014-LiuF #analysis #classification #sentiment #topic #web
Web Content Classification based on Topic and Sentiment Analysis of Text (SL, TF), pp. 300–307.
KDIRKDIR-2014-LiuF14a #analysis #classification #n-gram #sentiment #similarity #web
Combining N-gram based Similarity Analysis with Sentiment Analysis in Web Content Classification (SL, TF), pp. 530–537.
KDIRKDIR-2014-PsomakelisTAV #analysis #sentiment #twitter
Comparing Methods for Twitter Sentiment Analysis (EP, KT, DA, TAV), pp. 225–232.
KDIRKDIR-2014-WanJLL #analysis #challenge #sentiment #web
Sentimental Analysis of Web Financial Reviews — Opportunities and Challenges (CW, TJ, DL, GL), pp. 366–373.
KEODKEOD-2014-AzaiezA #analysis #how #question #towards
How to Guarantee Analysis Results Coherence after Data Warehouse Schema Changes Propagation towards Data Marts? (NA, JA), pp. 428–435.
KRKR-2014-BhattST #analysis #architecture #design #experience #industrial #user interface
Computing Narratives of Cognitive User Experience for Building Design Analysis: KR for Industry Scale Computer-Aided Architecture Design (MB, CPLS, MT).
KRKR-2014-Delgrande #analysis #towards
Towards a Knowledge Level Analysis of Forgetting (JPD).
RecSysRecSys-2014-NoiaORTS #analysis #recommendation #towards
An analysis of users’ propensity toward diversity in recommendations (TDN, VCO, JR, PT, EDS), pp. 285–288.
SEKESEKE-2014-BarnesL #analysis #clustering
Text-Based Clustering and Analysis of Intelligent Argumentation Data (ECB, XFL), pp. 422–425.
SEKESEKE-2014-ChenHQJ #performance #static analysis #using
Improving Static Analysis Performance Using Rule-Filtering Technique (DC, RH, BQ, SJ), pp. 19–24.
SEKESEKE-2014-El-KharboutlyGF #analysis #security
Industry-wise Analysis of Security Breaches in Data Loss Incidents (REK, SSG, LF), pp. 615–619.
SEKESEKE-2014-Garcia-NunesSZB #analysis #collaboration #fuzzy #modelling
Mental models analysis based on fuzzy rules for collaborative decision-making (PIGN, AES, ACZ, GB), pp. 695–700.
SEKESEKE-2014-JuniorCMS #data analysis #gpu #repository
Exploratory Data Analysis of Software Repositories via GPU Processing (JRDSJ, EC, LM, AS), pp. 495–500.
SEKESEKE-2014-PaikariF #analysis #design #implementation #simulation
Analysis, Design and Implementation of an Agent Based System for Simulating Connected Vehicles (EP, BHF), pp. 338–343.
SEKESEKE-2014-SalmanSD14a #concept analysis #impact analysis #using
Feature-Level Change Impact Analysis Using Formal Concept Analysis (HES, AS, CD), pp. 447–452.
SEKESEKE-2014-SchotsRS #analysis #performance #process
A Body of Knowledge for Executing Performance Analysis of Software Processes (NCLS, ARR, GS), pp. 560–565.
SEKESEKE-2014-VianaCS #analysis #information management
Knowledge Transfer between Senior and Novice Software Engineers: A Qualitative Analysis (DV, TC, CRBdS), pp. 235–240.
SEKESEKE-2014-WangC #analysis #approach #social #visualisation
User Profile Visualization to facilitate MSLIM-model-based Social Influence Analysis based on Slow Intelligence Approach (YW, SKC), pp. 653–658.
SEKESEKE-2014-WanZWS #analysis #graph #performance #points-to
Efficient Points-To Analysis for Partial Call Graph Construction (ZW, BZ, YW, YS), pp. 416–421.
SEKESEKE-2014-YangWSFC #analysis #debugging #fault
Bug Inducing Analysis to Prevent Fault Prone Bug Fixes (HY, CW, QS, YF, ZC), pp. 620–625.
SIGIRSIGIR-2014-FangZ #analysis #axiom #information retrieval #modelling #optimisation
Axiomatic analysis and optimization of information retrieval models (HF, CZ), p. 1288.
SIGIRSIGIR-2014-GoeuriotKL #analysis #information retrieval #query
An analysis of query difficulty for information retrieval in the medical domain (LG, LK, JL), pp. 1007–1010.
SIGIRSIGIR-2014-LourencoVPMFP #analysis #sentiment
Economically-efficient sentiment stream analysis (RLdOJ, AV, AMP, WMJ, RF, SP), pp. 637–646.
SIGIRSIGIR-2014-NiuLGCG #data analysis #learning #rank #robust #what
What makes data robust: a data analysis in learning to rank (SN, YL, JG, XC, XG), pp. 1191–1194.
SIGIRSIGIR-2014-PelejaSM #analysis #sentiment
Reputation analysis with a ranked sentiment-lexicon (FP, JS, JM), pp. 1207–1210.
SIGIRSIGIR-2014-ThomasL #composition #data analysis #distance #information retrieval
Compositional data analysis (CoDA) approaches to distance in information retrieval (PT, DL), pp. 991–994.
SIGIRSIGIR-2014-TsolmonL #analysis #modelling #timeline
An event extraction model based on timeline and user analysis in Latent Dirichlet allocation (BT, KSL), pp. 1187–1190.
SIGIRSIGIR-2014-UstaAVOU #analysis #education #how #learning #student
How k-12 students search for learning?: analysis of an educational search engine log (AU, ISA, IBV, RO, ÖU), pp. 1151–1154.
SIGIRSIGIR-2014-ZhangL0ZLM #analysis #modelling #recommendation #sentiment
Explicit factor models for explainable recommendation based on phrase-level sentiment analysis (YZ, GL, MZ, YZ, YL, SM), pp. 83–92.
AMTAMT-2014-GogollaHH #dynamic analysis #modelling #ocl #on the #uml
On Static and Dynamic Analysis of UML and OCL Transformation Models (MG, LH, FH), pp. 24–33.
ECMFAECMFA-2014-Moreno-DelgadoDZT #analysis #composition #domain-specific language #flexibility
Modular DSLs for Flexible Analysis: An e-Motions Reimplementation of Palladio (AMD, FD, SZ, JT), pp. 132–147.
ICMTICMT-2014-GonzalezC #analysis #constraints #generative #model transformation #testing
Test Data Generation for Model Transformations Combining Partition and Constraint Analysis (CAG, JC), pp. 25–41.
ICMTICMT-2014-GuanaS #analysis
ChainTracker, a Model-Transformation Trace Analysis Tool for Code-Generation Environments (VG, ES), pp. 146–153.
ECOOPECOOP-2014-LiT #analysis #fault #python #source code
Finding Reference-Counting Errors in Python/C Programs with Affine Analysis (SL, GT), pp. 80–104.
ECOOPECOOP-2014-WeiR #analysis #behaviour #javascript #points-to
State-Sensitive Points-to Analysis for the Dynamic Behavior of JavaScript Objects (SW, BGR), pp. 1–26.
OOPSLAOOPSLA-2014-AndreasenM #static analysis
Determinacy in static analysis for jQuery (EA, AM), pp. 17–31.
OOPSLAOOPSLA-2014-BrutschyF0 #developer #independence #static analysis
Static analysis for independent app developers (LB, PF, PM), pp. 847–860.
OOPSLAOOPSLA-2014-GligoricSPVNL #automation #dynamic analysis #migration #refactoring #search-based #using
Automated migration of build scripts using dynamic analysis and search-based refactoring (MG, WS, CP, DvV, IN, BL), pp. 599–616.
OOPSLAOOPSLA-2014-HsiaoCN #corpus #program analysis #statistics #using #web
Using web corpus statistics for program analysis (CHH, MJC, SN), pp. 49–65.
OOPSLAOOPSLA-2014-ParrHF #adaptation #dynamic analysis #ll #parsing #power of
Adaptive LL(*) parsing: the power of dynamic analysis (TP, SH, KF), pp. 579–598.
OOPSLAOOPSLA-2014-ZhangXZYS #alias #analysis #c #performance
Efficient subcubic alias analysis for C (QZ, XX, CZ, HY, ZS), pp. 829–845.
POPLPOPL-2014-ChaudhuriFK #analysis #consistency #source code
Consistency analysis of decision-making programs (SC, AF, ZK), pp. 555–568.
POPLPOPL-2014-CoughlinC #analysis #composition #invariant
Fissile type analysis: modular checking of almost everywhere invariants (DC, BYEC), pp. 73–86.
POPLPOPL-2014-SergeyVJ #analysis #composition #higher-order #theory and practice
Modular, higher-order cardinality analysis in theory and practice (IS, DV, SLPJ), pp. 335–348.
POPLPOPL-2014-SharmaNA #program analysis #trade-off
Bias-variance tradeoffs in program analysis (RS, AVN, AA), pp. 127–138.
RERE-2014-AnishG #analysis #requirements
Product knowledge configurator for requirements gap analysis and customizations (PRA, SG), pp. 437–443.
RERE-2014-BadgerTC #analysis #design #named #requirements #verification
VARED: Verification and analysis of requirements and early designs (JMB, DT, CC), pp. 325–326.
RERE-2014-GuzmanM #analysis #fine-grained #how #sentiment
How Do Users Like This Feature? A Fine Grained Sentiment Analysis of App Reviews (EG, WM), pp. 153–162.
RERE-2014-MartinsO #analysis #case study #fault #functional #protocol #requirements #safety #using
A case study using a protocol to derive safety functional requirements from Fault Tree Analysis (LEGM, TdO), pp. 412–419.
RERE-2014-NguyenGA #analysis #automation #named #ontology #requirements
GUITAR: An ontology-based automated requirements analysis tool (THN, JCG, MA), pp. 315–316.
RERE-2014-SaxenaC #agile #analysis #named #requirements
Decisively: Application of Quantitative Analysis and Decision Science in Agile Requirements Engineering (SKS, RC), pp. 323–324.
REFSQREFSQ-2014-AlebrahimFHM #analysis #interactive #problem #requirements
Problem-Based Requirements Interaction Analysis (AA, SF, MH, RM), pp. 200–215.
REFSQREFSQ-2014-NairVMTdB #analysis #problem #safety #traceability
Safety Evidence Traceability: Problem Analysis and Model (SN, JLdlV, AM, GT, LdlB, FB), pp. 309–324.
REFSQREFSQ-2014-RiegelD #analysis #elicitation #heuristic #optimisation #performance
An Analysis of Priority-Based Decision Heuristics for Optimizing Elicitation Efficiency (NR, JD), pp. 268–284.
REFSQREFSQ-2014-SannierB #analysis #approach #modelling #named #requirements
INCREMENT: A Mixed MDE-IR Approach for Regulatory Requirements Modeling and Analysis (NS, BB), pp. 135–151.
REFSQREFSQ-2014-SethiaP #analysis #elicitation #empirical #performance #requirements
The Effects of Requirements Elicitation Issues on Software Project Performance: An Empirical Analysis (NKS, ASP), pp. 285–300.
REFSQREFSQ-2014-YangLJC #adaptation #analysis #bibliography #modelling #requirements #self
A Systematic Literature Review of Requirements Modeling and Analysis for Self-adaptive Systems (ZY, ZL, ZJ, YC), pp. 55–71.
SACSAC-2014-AntunesBMBC #analysis #architecture #enterprise #ontology
Ontology-based enterprise architecture model analysis (GA, MB, RM, JLB, AC), pp. 1420–1422.
SACSAC-2014-ChangCHKL #analysis #behaviour #mobile
Application behavior analysis in resource consumption for mobile devices (SWC, SWC, PCH, TWK, CWL), pp. 1469–1474.
SACSAC-2014-Chen #analysis #behaviour #coordination #energy #research #scheduling #student
Student research abstract: demand behavior analysis and coordination scheduling for energy saving in smart building (SC), pp. 569–570.
SACSAC-2014-HalderZC #analysis #database #information management #query
Information leakage analysis of database query languages (RH, MZ, AC), pp. 813–820.
SACSAC-2014-HuangLD #analysis #modelling #multi #network #performance
Modeling and analysis on network performance for cloud service delivery with multiple paths (JH, JL, QD), pp. 667–673.
SACSAC-2014-HuangYKYLYGFQ #analysis #clustering #self
Diffusion-based clustering analysis of coherent X-ray scattering patterns of self-assembled nanoparticles (HH, SY, KK, KGY, FL, DY, OG, AF, HQ), pp. 85–90.
SACSAC-2014-KangI #dynamic analysis
Analysis of binary code topology for dynamic analysis (BK, EGI), pp. 1731–1732.
SACSAC-2014-KangS #analysis #implementation #scheduling
Schedulability analysis support for automotive systems: from requirement to implementation (EYK, PYS), pp. 1080–1085.
SACSAC-2014-KumeNNS #dynamic analysis #framework
A dynamic analysis technique to extract symptoms that suggest side effects in framework applications (IK, NN, MN, ES), pp. 1176–1178.
SACSAC-2014-OliveiraO #analysis #kernel #linux
Mapping of the synchronization mechanisms of the Linux kernel to the response-time analysis model (DBdO, RSdO), pp. 1543–1544.
SACSAC-2014-OliveiraSB #analysis #coordination
Quantitative analysis of Reo-based service coordination (NO, AS, LSB), pp. 1247–1254.
SACSAC-2014-PapadakisT #analysis #approach #effectiveness #fault #locality #mutation testing
Effective fault localization via mutation analysis: a selective mutation approach (MP, YLT), pp. 1293–1300.
SACSAC-2014-ParkH #analysis #network #performance
Performance analysis of the golden-SM in the V2V network (MCP, DSH), pp. 1739–1740.
SACSAC-2014-QuilleTR #analysis
Spectral analysis and text processing over the computer science literature: patterns and discoveries (RVEQ, CTJ, JFRJ), pp. 653–657.
SACSAC-2014-SeoKTC #analysis #framework #network #social
A structural analysis of literary fictions with social network framework (JS, SHK, HT, HGC), pp. 634–640.
SACSAC-2014-ShoshitaishviliIDV #analysis #scalability #security #trade-off
Do you feel lucky?: a large-scale analysis of risk-rewards trade-offs in cyber security (YS, LI, AD, GV), pp. 1649–1656.
SACSAC-2014-TragatschnigTZ #impact analysis #using
Impact analysis for event-based systems using change patterns (ST, HT, UZ), pp. 763–768.
SACSAC-2014-XiaLWZ #analysis #predict
Build system analysis with link prediction (XX, DL, XW, BZ), pp. 1184–1186.
SACSAC-2014-ZhanLS #analysis #in the cloud #mobile
A green analysis of mobile cloud computing applications (KZ, CHL, PS), pp. 357–362.
FSEFSE-2014-Banerjee #energy #performance #static analysis #testing
Static analysis driven performance and energy testing (AB), pp. 791–794.
FSEFSE-2014-DevroeyPCPLS #analysis #mutation testing #variability
A variability perspective of mutation analysis (XD, GP, MC, MP, AL, PYS), pp. 841–844.
FSEFSE-2014-FengADA #android #detection #named #semantics #static analysis
Apposcopy: semantics-based detection of Android malware through static analysis (YF, SA, ID, AA), pp. 576–587.
FSEFSE-2014-Gao #program analysis #testing
Numerical program analysis and testing (ZG), pp. 779–782.
FSEFSE-2014-Gui00ND #agile #analysis #named #nondeterminism #reliability #tool support
RaPiD: a toolkit for reliability analysis of non-deterministic systems (LG, JS, YL, TKN, JSD), pp. 727–730.
FSEFSE-2014-KashyapDKWGSWH #framework #javascript #named #static analysis
JSAI: a static analysis platform for JavaScript (VK, KD, EAK, JW, KG, JS, BW, BH), pp. 121–132.
FSEFSE-2014-LerchHBM #analysis #named #performance #scalability
FlowTwist: efficient context-sensitive inside-out taint analysis for large codebases (JL, BH, EB, MM), pp. 98–108.
FSEFSE-2014-LuoHEM #analysis #empirical #testing
An empirical analysis of flaky tests (QL, FH, LE, DM), pp. 643–653.
FSEFSE-2014-XiaoCK #analysis #architecture #named #quality #tool support
Titan: a toolset that connects software architecture with quality analysis (LX, YC, RK), pp. 763–766.
FSEFSE-2014-Yang #analysis #bibliography #network #open source #perspective #social
Social network analysis in open source software peer review (XY), pp. 820–822.
ICSEICSE-2014-AndroutsopoulosCDHH #analysis #fault #testing
An analysis of the relationship between conditional entropy and failed error propagation in software testing (KA, DC, HD, RMH, MH), pp. 573–583.
ICSEICSE-2014-BagheriTS #automation #dynamic analysis #named
TradeMaker: automated dynamic analysis of synthesized tradespaces (HB, CT, KJS), pp. 106–116.
ICSEICSE-2014-HuangMSZ #analysis #performance #testing
Performance regression testing target prioritization via performance risk analysis (PH, XM, DS, YZ), pp. 60–71.
ICSEICSE-2014-NguyenKWF #dynamic analysis #invariant #using
Using dynamic analysis to generate disjunctive invariants (TN, DK, WW, SF), pp. 608–619.
ICSEICSE-2014-SuR #analysis #empirical #parametricity #probability
Perturbation analysis of stochastic systems with empirical distribution parameters (GS, DSR), pp. 311–321.
ICSEICSE-2014-YaoHJ #analysis #case study #equivalence #using
A study of equivalent and stubborn mutation operators using human analysis of equivalence (XY, MH, YJ), pp. 919–930.
LDTALDTA-J-2011-SauthoffG #analysis #domain-specific language #optimisation #programming
Yield grammar analysis and product optimization in a domain-specific language for dynamic programming (GS, RG), pp. 2–22.
SPLCSPLC-2014-DomisSGAK #analysis #case study #experience #industrial #reuse
Customizing domain analysis for assessing the reuse potential of industrial software systems: experience report (DD, SS, TG, MA, HK), pp. 310–319.
CCCC-2014-MadsenA #analysis #string
String Analysis for Dynamic Field Access (MM, EA), pp. 197–217.
CGOCGO-2014-RountevY #analysis #android #user interface
Static Reference Analysis for GUI Objects in Android Software (AR, DY), p. 143.
CGOCGO-2014-StadlerWM #analysis #java
Partial Escape Analysis and Scalar Replacement for Java (LS, TW, HM), p. 165.
CGOCGO-2014-YeSX #analysis #detection
Accelerating Dynamic Detection of Uses of Undefined Values with Static Value-Flow Analysis (DY, YS, JX), p. 154.
HPDCHPDC-2014-BeaumontM #analysis #matrix #multi #scheduling
Analysis of dynamic scheduling strategies for matrix multiplication on heterogeneous platforms (OB, LM), pp. 141–152.
HPDCHPDC-2014-SuAWBS #analysis #correlation #dataset #distributed #parallel
Supporting correlation analysis on scientific datasets in parallel and distributed settings (YS, GA, JW, AB, HWS), pp. 191–202.
HPDCHPDC-2014-YinWFZZ #analysis #middleware #named #scalability #visualisation
SLAM: scalable locality-aware middleware for I/O in scientific analysis and visualization (JY, JW, WcF, XZ, JZ), pp. 257–260.
ISMMISMM-2014-RatnakarN #analysis #constraints #graph #performance #points-to
Push-pull constraint graph for efficient points-to analysis (BR, RN), pp. 25–33.
LCTESLCTES-2014-BallabrigaCR #analysis
Cache-related preemption delay analysis for FIFO caches (CB, LKC, AR), pp. 33–42.
LCTESLCTES-2014-RoyRWW #analysis #approximate #automation #named
ASAC: automatic sensitivity analysis for approximate computing (PR, RR, CW, WFW), pp. 95–104.
OSDIOSDI-2014-ChowMFPW #analysis #internet #performance #scalability
The Mystery Machine: End-to-end Performance Analysis of Large-scale Internet Services (MC, DM, JF, DP, TFW), pp. 217–231.
OSDIOSDI-2014-YuanLZRZZJS #analysis #data-driven #distributed #testing
Simple Testing Can Prevent Most Critical Failures: An Analysis of Production Failures in Distributed Data-Intensive Systems (DY, YL, XZ, GRR, XZ, YZ, PJ, MS), pp. 249–265.
PPoPPPPoPP-2014-MaAC #algorithm #analysis #manycore #thread
Theoretical analysis of classic algorithms on highly-threaded many-core GPUs (LM, KA, RDC), pp. 391–392.
CAVCAV-2014-AlglaveKNP #approach #automation #static analysis
Don’t Sit on the Fence — A Static Analysis Approach to Automatic Fence Insertion (JA, DK, VN, DP), pp. 508–524.
CAVCAV-2014-ChatterjeeCD #analysis #probability
CEGAR for Qualitative Analysis of Probabilistic Systems (KC, MC, PD), pp. 473–490.
CAVCAV-2014-EsparzaLMMN #analysis #approach #smt
An SMT-Based Approach to Coverability Analysis (JE, RLG, RM, PM, FN), pp. 603–619.
CAVCAV-2014-Hagemann #analysis #hybrid #orthogonal #reachability #using
Reachability Analysis of Hybrid Systems Using Symbolic Orthogonal Projections (WH), pp. 407–423.
CAVCAV-2014-HeizmannHP #analysis #learning #source code #termination
Termination Analysis by Learning Terminating Programs (MH, JH, AP), pp. 797–813.
CAVCAV-2014-ItzhakyBRST #analysis
Property-Directed Shape Analysis (SI, NB, TWR, MS, AVT), pp. 35–51.
CAVCAV-2014-LeGQC #analysis #higher-order
Shape Analysis via Second-Order Bi-Abduction (QLL, CG, SQ, WNC), pp. 52–68.
CAVCAV-2014-SinnZV #bound #complexity #scalability #static analysis
A Simple and Scalable Static Analysis for Bound Analysis and Amortized Complexity Analysis (MS, FZ, HV), pp. 745–761.
ICLPICLP-J-2014-SerranoLH #abstract interpretation #analysis #logic programming #resource management #source code #using
Resource Usage Analysis of Logic Programs via Abstract Interpretation Using Sized Types (AS, PLG, MVH), pp. 739–754.
ICSTICST-2014-HaysHB #testing #validation
Validation of Software Testing Experiments: A Meta-Analysis of ICST 2013 (MH, JHH, ACB), pp. 333–342.
ICSTICST-2014-LiO #analysis #empirical #modelling #testing
An Empirical Analysis of Test Oracle Strategies for Model-Based Testing (NL, JO), pp. 363–372.
ICSTICST-2014-MiicBT #analysis #automation #multi #test coverage #testing
Automated Multi-platform Testing and Code Coverage Analysis of the CP2K Application (MM, IB, MT), pp. 95–98.
ICSTICST-2014-PapadakisHT #analysis #combinator #interactive #mutation testing #testing
Sampling Program Inputs with Mutation Analysis: Going Beyond Combinatorial Interaction Testing (MP, CH, YLT), pp. 1–10.
ICSTICST-2014-WiklundSEL #analysis #automation #empirical #testing
Impediments for Automated Testing — An Empirical Analysis of a User Support Discussion Board (KW, DS, SE, KL), pp. 113–122.
ISSTAISSTA-2014-Chen #constraints #program analysis #proving #reuse #scalability
Reusing constraint proofs for scalable program analysis (MC), pp. 449–452.
ISSTAISSTA-2014-HendersonPYHWZY #analysis #framework #performance
Make it work, make it right, make it fast: building a platform-neutral whole-system dynamic binary analysis platform (AH, AP, LKY, XH, XW, RZ, HY), pp. 248–258.
ISSTAISSTA-2014-Just #analysis #framework #java #mutation testing #performance #scalability
The major mutation framework: efficient and scalable mutation analysis for Java (RJ), pp. 433–436.
ISSTAISSTA-2014-JustEF #analysis #clustering #execution #mutation testing #performance
Efficient mutation analysis by propagating and partitioning infected execution states (RJ, MDE, GF), pp. 315–326.
ISSTAISSTA-2014-MarinescuHC #analysis #evolution #framework #named
Covrig: a framework for the analysis of code, test, and coverage evolution in real software (PDM, PH, CC), pp. 93–104.
ISSTAISSTA-2014-TrippFP #analysis #hybrid #javascript #partial evaluation #security #web
Hybrid security analysis of web JavaScript code via dynamic partial evaluation (OT, PF, MP), pp. 49–59.
ISSTAISSTA-2014-XiaoBIMGC #analysis #dependence #effectiveness #type system
ARC++: effective typestate and lifetime dependency analysis (XX, GB, FI, NM, AG, DC), pp. 116–126.
LICSLICS-CSL-2014-BaierDK #analysis #model checking #probability #trade-off
Trade-off analysis meets probabilistic model checking (CB, CD, SK), p. 10.
RTARTA-TLCA-2014-HirokawaM #analysis #automation #complexity
Automated Complexity Analysis Based on Context-Sensitive Rewriting (NH, GM), pp. 257–271.
RTARTA-TLCA-2014-LiuDJ #analysis #confluence
Confluence by Critical Pair Analysis (JL, ND, JPJ), pp. 287–302.
ICSTSAT-2014-BacchusN #algorithm #analysis #satisfiability
Cores in Core Based MaxSat Algorithms: An Analysis (FB, NN), pp. 7–15.
SMTSMT-2014-CarlssonGP #analysis #constraints #programming #protocol
Protocol Log Analysis with Constraint Programming (MC, OG, JP), pp. 17–26.
SMTSMT-2014-FremontS #program analysis #smt
Speeding Up SMT-Based Quantitative Program Analysis (DJF, SAS), pp. 3–13.
VMCAIVMCAI-2014-Fu #abstract domain #analysis #java #points-to #scalability
Modularly Combining Numeric Abstract Domains with Points-to Analysis, and a Scalable Static Numeric Analyzer for Java (ZF), pp. 282–301.
VMCAIVMCAI-2014-GustavssonGL #analysis #execution #parallel #using
Timing Analysis of Parallel Software Using Abstract Execution (AG, JG, BL), pp. 59–77.
VMCAIVMCAI-2014-Mine #abstract interpretation #analysis #relational #thread
Relational Thread-Modular Static Value Analysis by Abstract Interpretation (AM), pp. 39–58.
VMCAIVMCAI-2014-SchwarzSVA #analysis #precise #source code
Precise Analysis of Value-Dependent Synchronization in Priority Scheduled Programs (MDS, HS, VV, KA), pp. 21–38.
CBSECBSE-2013-LednickiCS #analysis #execution #worst-case
Model level worst-case execution time analysis for IEC 61499 (LL, JC, KS), pp. 169–178.
ECSAECSA-2013-BuchgeherW #analysis #architecture #consistency #towards
Towards Continuous Reference Architecture Conformance Analysis (GB, RW), pp. 332–335.
ECSAECSA-2013-GoknilSPM #analysis #constraints #modelling
Analysis Support for TADL2 Timing Constraints on EAST-ADL Models (AG, JS, MAPF, FM), pp. 89–105.
QoSAQoSA-2013-BeckerLB #adaptation #analysis #performance #requirements #self #validation
Performance analysis of self-adaptive systems for requirements validation at design-time (MB, ML, SB), pp. 43–52.
QoSAQoSA-2013-BerardinelliLM #analysis #execution #non-functional
Combining fUML and profiles for non-functional analysis based on model execution traces (LB, PL, TM), pp. 79–88.
QoSAQoSA-2013-KlattK #analysis #architecture #difference
Improving product copy consolidation by architecture-aware difference analysis (BK, MK), pp. 117–122.
QoSAQoSA-2013-TrubianiMCAG #analysis #architecture #modelling #nondeterminism #performance
Model-based performance analysis of software architectures under uncertainty (CT, IM, VC, AA, LG), pp. 69–78.
ASEASE-2013-AnnervazKSS #analysis #domain model #modelling #natural language #quality #requirements
Natural language requirements quality analysis based on business domain models (KMA, VSK, SS, MS), pp. 676–681.
ASEASE-2013-GarciaIM #analysis #architecture #comparative
A comparative analysis of software architecture recovery techniques (JG, II, NM), pp. 486–496.
ASEASE-2013-LetsholoZC #analysis #modelling #named #requirements
TRAM: A tool for transforming textual requirements into analysis models (KL, LZ, EVC), pp. 738–741.
ASEASE-2013-OhmannL #analysis #control flow #debugging #lightweight
Lightweight control-flow instrumentation and postmortem analysis in support of debugging (PO, BL), pp. 378–388.
ASEASE-2013-PalepuXJ #dependence #dynamic analysis #performance #summary
Improving efficiency of dynamic analysis with dynamic dependence summaries (VKP, G(X, JAJ), pp. 59–69.
ASEASE-2013-RosnerSAKF #alloy #analysis #clustering #modelling #named #parallel
Ranger: Parallel analysis of alloy models by range partitioning (NR, JHS, NA, SK, MFF), pp. 147–157.
ASEASE-2013-Servant #analysis #debugging #using
Supporting bug investigation using history analysis (FS), pp. 754–757.
ASEASE-2013-Wu0LD #analysis #automation #component #dependence #using
Automatically partition software into least privilege components using dynamic data dependency analysis (YW, JS, YL, JSD), pp. 323–333.
CASECASE-2013-ChenZAX #analysis #finite
Analysis of production completion time in Bernoulli serial lines with finite buffers (GC, LZ, JA, GX), pp. 770–775.
CASECASE-2013-ChenZH #analysis #modelling #performance
Mathematical modeling and performance analysis of battery equalization systems (HC, LZ, YH), pp. 711–716.
CASECASE-2013-FantiIRU #analysis #scheduling #simulation
A simulation based analysis of production scheduling in a steelmaking and continuous casting plant (MPF, GI, GR, WU), pp. 150–155.
CASECASE-2013-GiulianiCP #analysis #optimisation
A computational analysis of nondifferentiable optimization: Applications to production maximization in gas-lifted oil fields (CMG, EC, AP), pp. 286–291.
CASECASE-2013-LanzaKPSS #analysis #automation #detection #fault #using
Automated optical detection of particles and defects on a Li-Ion-cell surface using a single-point analysis (GL, AK, SP, AS, SS), pp. 675–680.
CASECASE-2013-Markovski #analysis #synthesis
Synthesis and analysis of supervisory controllers for time-abstracted discrete-event systems (JM), pp. 1075–1082.
CASECASE-2013-SaidiM #analysis #configuration management #development #self
Analysis and development of self-reconfigurable open kinematic machinery systems (RAS, BPM), pp. 966–971.
CASECASE-2013-WuCY #analysis #policy #reachability
A control policy for γ-nets without reachability analysis and siphon enumeration (WW, DYC, FY), pp. 1133–1138.
CASECASE-2013-XieLSD #analysis #approach #markov #modelling #process
Modeling and analysis of hospital inpatient rescue process: A Markov chain approach (XX, JL, CHS, YD), pp. 978–983.
CASECASE-2013-ZhangH #algorithm #analysis #convergence #coordination #implementation #optimisation #parallel
Convergence analysis and parallel computing implementation for the multiagent coordination optimization algorithm with applications (HZ, QH), pp. 825–830.
CASECASE-2013-ZhaoL #analysis #exponential #multi
Analysis of multi-product manufacturing systems with homogeneous exponential machines (CZ, JL), pp. 386–391.
CASECASE-2013-ZhongLEHF #analysis #modelling #process #testing
Modeling and analysis of mammography testing process at a breast imaging center of University of Wisconsin medical foundation (XZ, JL, SME, CH, LF), pp. 611–616.
CASECASE-2013-ZhouKZS #analysis
Causal analysis for non-stationary time series in sensor-rich smart buildings (YZ, ZK, LZ, CJS), pp. 593–598.
DACDAC-2013-AgostaBMP #analysis
Compiler-based side channel vulnerability analysis and optimized countermeasures application (GA, AB, MM, GP), p. 6.
DACDAC-2013-AlleMD #analysis #dependence #pipes and filters #runtime #synthesis
Runtime dependency analysis for loop pipelining in high-level synthesis (MA, AM, SD), p. 10.
DACDAC-2013-AndalamGSRR #analysis #precise
Precise timing analysis for direct-mapped caches (SA, AG, RS, PSR, JR), p. 10.
DACDAC-2013-ChippaCRR #analysis #approximate
Analysis and characterization of inherent application resilience for approximate computing (VKC, STC, KR, AR), p. 9.
DACDAC-2013-DingLM #analysis #multi #realtime
Integrated instruction cache analysis and locking in multitasking real-time systems (HD, YL, TM), p. 10.
DACDAC-2013-EbrahimiAT #analysis #approach #multi
A layout-based approach for multiple event transient analysis (ME, HA, MBT), p. 6.
DACDAC-2013-KuruvillaSPVC #analysis #optimisation #set #statistics
Speeding up computation of the max/min of a set of gaussians for statistical timing analysis and optimization (VK, DS, JP, CV, NC), p. 7.
DACDAC-2013-LinLM #analysis #hybrid #kernel #reachability #verification
Verification of digitally-intensive analog circuits via kernel ridge regression and hybrid reachability analysis (HL, PL, CJM), p. 6.
DACDAC-2013-MallikZLCBBBCRBMV #analysis #evaluation #framework #named
TEASE: a systematic analysis framework for early evaluation of FinFET-based advanced technology nodes (AM, PZ, TTL, BC, BB, PRDB, RB, KC, JR, MB, AM, DV), p. 6.
DACDAC-2013-Miskov-ZivanovMF #analysis #automation #behaviour #design #network
Dynamic behavior of cell signaling networks: model design and analysis automation (NMZ, DM, JRF), p. 6.
DACDAC-2013-RaiSST #algorithm #analysis #distributed #network #process
Distributed stable states for process networks: algorithm, analysis, and experiments on intel SCC (DR, LS, NS, LT), p. 10.
DATEDATE-2013-AhmadyanV #analysis #reachability #reduction #set
Reachability analysis of nonlinear analog circuits through iterative reachable set reduction (SNA, SV), pp. 1436–1441.
DATEDATE-2013-AitkenFKRR #analysis #how #question #reliability
Reliability analysis reloaded: how will we survive? (RA, GF, ZTK, FR, MSR), pp. 358–367.
DATEDATE-2013-AlieeGRT #analysis #automation #fault #reliability
Automatic success tree-based reliability analysis for the consideration of transient and permanent faults (HA, MG, FR, JT), pp. 1621–1626.
DATEDATE-2013-BanaiyanMofradDG #analysis #distributed #fault tolerance #modelling
Modeling and analysis of fault-tolerant distributed memories for networks-on-chip (AB, ND, GG), pp. 1605–1608.
DATEDATE-2013-BoleyCAC #analysis #estimation #performance
Leveraging sensitivity analysis for fast, accurate estimation of SRAM dynamic write VMIN (JB, VC, RCA, BHC), pp. 1819–1824.
DATEDATE-2013-BundMS #analysis
Event density analysis for event triggered control systems (TB, BM, FS), pp. 1111–1116.
DATEDATE-2013-CaiHMM #analysis #memory management #modelling
Threshold voltage distribution in MLC NAND flash memory: characterization, analysis, and modeling (YC, EFH, OM, KM), pp. 1285–1290.
DATEDATE-2013-CastellanaF #analysis #independence #liveness #scheduling #synthesis
Scheduling independent liveness analysis for register binding in high level synthesis (VGC, FF), pp. 1571–1574.
DATEDATE-2013-ChenM #analysis #modelling #reliability
System-level modeling and microprocessor reliability analysis for backend wearout mechanisms (CCC, LM), pp. 1615–1620.
DATEDATE-2013-ChenRSIFC #analysis #process
A SPICE-compatible model of graphene nano-ribbon field-effect transistors enabling circuit-level delay and power analysis under process variation (YYC, AR, AS, GI, GF, DC), pp. 1789–1794.
DATEDATE-2013-DiazSSR #analysis #network #performance #security #simulation
Wireless sensor network simulation for security and performance analysis (AD, PS, JS, JR), pp. 432–435.
DATEDATE-2013-DoganBCABA #analysis #embedded #execution #multi #power management
Synchronizing code execution on ultra-low-power embedded multi-channel signal analysis platforms (AYD, RB, JC, GA, AB, DA), pp. 396–399.
DATEDATE-2013-FakihGFR #analysis #architecture #model checking #performance #towards #using
Towards performance analysis of SDFGs mapped to shared-bus architectures using model-checking (MF, KG, MF, AR), pp. 1167–1172.
DATEDATE-2013-FirouziKTN #analysis #runtime
Incorporating the impacts of workload-dependent runtime variations into timing analysis (FF, SK, MBT, SRN), pp. 1022–1025.
DATEDATE-2013-GuanYL0 #analysis #approach #estimation
FIFO cache analysis for WCET estimation: a quantitative approach (NG, XY, ML, WY), pp. 296–301.
DATEDATE-2013-HasanA #analysis #fault #feedback #formal method #using
Formal analysis of steady state errors in feedback control systems using HOL-light (OH, MA), pp. 1423–1426.
DATEDATE-2013-HellwegeHPP #analysis #metric #reliability
Reliability analysis for integrated circuit amplifiers used in neural measurement systems (NH, NH, DPD, SP), pp. 713–716.
DATEDATE-2013-ImagawaTOS #analysis #architecture #configuration management #effectiveness
A cost-effective selective TMR for heterogeneous coarse-grained reconfigurable architectures based on DFG-level vulnerability analysis (TI, HT, HO, TS), pp. 701–706.
DATEDATE-2013-KosmidisCQABC #analysis #design #probability
Probabilistic timing analysis on conventional cache designs (LK, CC, EQ, JA, EDB, FJC), pp. 603–606.
DATEDATE-2013-LishernessLC #analysis #mutation testing
Mutation analysis with coverage discounting (PL, NL, KT(C), pp. 31–34.
DATEDATE-2013-LiZCZ #analysis #multi #simulation
Multi-level phase analysis for sampling simulation (JL, WZ, HC, BZ), pp. 649–654.
DATEDATE-2013-MalburgFF #analysis #comprehension #data flow #design
Tuning dynamic data flow analysis to support design understanding (JM, AF, GF), pp. 1179–1184.
DATEDATE-2013-MaYGGTBH #analysis #architecture #towards #validation
Toward polychronous analysis and validation for timed software architectures in AADL (YM, HY, TG, PLG, JPT, LB, MH), pp. 1173–1178.
DATEDATE-2013-NegreanKE #analysis #manycore
Timing analysis of multi-mode applications on AUTOSAR conform multi-core systems (MN, SK, RE), pp. 302–307.
DATEDATE-2013-NeukirchnerQMAE #analysis #realtime
Sensitivity analysis for arbitrary activation patterns in real-time systems (MN, SQ, TM, PA, RE), pp. 135–140.
DATEDATE-2013-PollexFSMMW #analysis #constant #realtime
Sufficient real-time analysis for an engine control unit with constant angular velocities (VP, TF, FS, UM, RM, GW), pp. 1335–1338.
DATEDATE-2013-QianJBTMM #analysis #named #performance #using
SVR-NoC: a performance analysis tool for network-on-chips using learning-based support vector regression model (ZQ, DCJ, PB, CYT, DM, RM), pp. 354–357.
DATEDATE-2013-QuintonNE #analysis #formal method #realtime
Formal analysis of sporadic bursts in real-time systems (SQ, MN, RE), pp. 767–772.
DATEDATE-2013-RaminiGBB #3d #analysis #manycore #power management #using
Contrasting wavelength-routed optical NoC topologies for power-efficient 3D-stacked multicore processors using physical-layer analysis (LR, PG, SB, DB), pp. 1589–1594.
DATEDATE-2013-SchneiderZGMC #analysis #composition
Compositional analysis of switched ethernet topologies (RS, LZ, DG, AM, SC), pp. 1099–1104.
DATEDATE-2013-ShahKA #analysis #bound
Bounding SDRAM interference: detailed analysis vs. latency-rate analysis (HS, AK, BA), pp. 308–313.
DATEDATE-2013-StanisicVCDMLM #analysis #embedded #performance #power management
Performance analysis of HPC applications on low-power embedded platforms (LS, BV, JC, AD, VMM, AL, JFM), pp. 475–480.
DATEDATE-2013-SubramanyanTPRSM #analysis #functional #reverse engineering #using
Reverse engineering digital circuits using functional analysis (PS, NT, KP, DR, AS, SM), pp. 1277–1280.
DATEDATE-2013-TheissingMSSS #analysis #fault
Comprehensive analysis of software countermeasures against fault attacks (NT, DM, MS, FS, GS), pp. 404–409.
DATEDATE-2013-WagnerW #analysis #performance #statistics
Efficient variation-aware statistical dynamic timing analysis for delay test applications (MW, HJW), pp. 276–281.
DATEDATE-2013-WildermannZT #analysis #distributed #game studies #manycore
Game-theoretic analysis of decentralized core allocation schemes on many-core systems (SW, TZ, JT), pp. 1498–1503.
DATEDATE-2013-YaoYW #adaptation #analysis #modelling #online #performance
Efficient importance sampling for high-sigma yield analysis with adaptive online surrogate modeling (JY, ZY, YW), pp. 1291–1296.
DATEDATE-2013-YilmazSWO #analysis #fault #industrial #scalability #simulation
Fault analysis and simulation of large scale industrial mixed-signal circuits (EY, GS, LW, SO), pp. 565–570.
DRRDRR-2013-MehriGHM #analysis #documentation #image #multi #segmentation #using
Old document image segmentation using the autocorrelation function and multiresolution analysis (MM, PGK, PH, RM).
DRRDRR-2013-SimistiraPKC #analysis #online
Structural analysis of online handwritten mathematical symbols based on support vector machines (FS, VP, VK, GC).
HTHT-2013-WangQS #analysis #realtime #social #twitter
Reading tweeting minds: real-time analysis of short text for computational social science (ZW, DQ, DÓS), pp. 169–173.
HTHT-2013-WeiHGLZW #analysis #behaviour #case study #twitter
Mainstream media behavior analysis on Twitter: a case study on UK general election (ZW, YH, WG, BL, LZ, KFW), pp. 174–178.
ICDARICDAR-2013-AlkalaiBSL #analysis #identification
Improving Formula Analysis with Line and Mathematics Identification (MA, JBB, VS, XL), pp. 334–338.
ICDARICDAR-2013-AntonacopoulosCPP #analysis #contest #layout
ICDAR 2013 Competition on Historical Newspaper Layout Analysis (HNLA 2013) (AA, CC, CP, SP), pp. 1454–1458.
ICDARICDAR-2013-GriechischML #analysis #online
Online Signature Analysis Based on Accelerometric and Gyroscopic Pens and Legendre Series (EG, MIM, ML), pp. 374–378.
ICDARICDAR-2013-KirbyH #analysis #using
Analysis of Topographic Maps for Recreational Purposes Using Decision Trees (RK, TCH), pp. 1105–1109.
ICDARICDAR-2013-LiPXW #analysis #consistency #online #order #verification
A Stroke Order Verification Method for On-Line Handwritten Chinese Characters Based on Tempo-spatial Consistency Analysis (RL, LP, EX, NW), pp. 999–1003.
ICDARICDAR-2013-StammLD #analysis #approach #documentation #multi #partial order
Continuous Partial-Order Planning for Multichannel Document Analysis: A Process-Driven Approach (KS, ML, AD), pp. 626–630.
ICDARICDAR-2013-TangHF #analysis #approach #recognition
A Progressive Structural Analysis Approach for Handwritten Chemical Formula Recognition (PT, SCH, CWF), pp. 359–363.
ICDARICDAR-2013-WangLD #analysis #recognition
Similar Pattern Discriminant Analysis for Improving Chinese Character Recognition Accuracy (YW, CL, XD), pp. 1056–1060.
ICDARICDAR-2013-WeiBSI #analysis #classification #documentation #evaluation #layout
Evaluation of SVM, MLP and GMM Classifiers for Layout Analysis of Historical Documents (HW, MB, FS, RI), pp. 1220–1224.
ICDARICDAR-2013-YinLS #analysis #detection #documentation #framework #image #multi #novel
A Novel Multi-view Object Class Detection Framework for Document Image Content Analysis (WY, TL, FS), pp. 1095–1099.
ICDARICDAR-2013-ZirariENM #analysis #component #documentation #image #segmentation #using
A Document Image Segmentation System Using Analysis of Connected Components (FZ, AE, SN, DM), pp. 753–757.
PODSPODS-2013-CalvaneseGM #analysis #database #perspective #process
Foundations of data-aware process analysis: a database theory perspective (DC, GDG, MM), pp. 1–12.
SIGMODSIGMOD-2013-GuilleFHZ #analysis #framework #mining #named #open source #social
SONDY: an open source platform for social dynamics mining and analysis (AG, CF, HH, DAZ), pp. 1005–1008.
SIGMODSIGMOD-2013-HuangB0 #data analysis #in the cloud #named #optimisation #statistics
Cumulon: optimizing statistical data analysis in the cloud (BH, SB, JY), pp. 1–12.
SIGMODSIGMOD-2013-LapeineHHG #data analysis #interactive #mobile #query
Mobile interaction and query optimizationin a protein-ligand data analysis system (ML, KGH, EH, NMG), pp. 1291–1292.
SIGMODSIGMOD-2013-MoustafaMDG #analysis #declarative #interactive #named #network
GRDB: a system for declarative and interactive analysis of noisy information networks (WEM, HM, AD, LG), pp. 1085–1088.
SIGMODSIGMOD-2013-SuZWHZ #analysis #similarity
Calibrating trajectory data for similarity-based analysis (HS, KZ, HW, JH, XZ), pp. 833–844.
SIGMODSIGMOD-2013-TaoYLBCHKSWWW #analysis #named #network #research
Research-insight: providing insight on research by publication network analysis (FT, XY, KHL, GB, XC, JH, RK, YS, CW, LW, TW), pp. 1093–1096.
VLDBVLDB-2013-DeutchMT #analysis #named #process
PROPOLIS: Provisioned Analysis of Data-Centric Processes (DD, YM, VT), pp. 1302–1305.
VLDBVLDB-2013-MoyersSWKVBC #analysis #array #image #parallel
A Demonstration of Iterative Parallel Array Processing in Support of Telescope Image Analysis (MM, ES, SW, KSK, JV, MB, AJC), pp. 1322–1325.
VLDBVLDB-2013-OkcanRPF #analysis #named
Scolopax: Exploratory Analysis of Scientific Data (AO, MR, BP, DF), pp. 1298–1301.
VLDBVLDB-2013-SeoPSL #analysis #distributed #graph #scalability
Distributed SociaLite: A Datalog-Based Language for Large-Scale Graph Analysis (JS, JP, JS, MSL), pp. 1906–1917.
VLDBVLDB-2013-SowellSCDG #analysis #in memory #memory management
An Experimental Analysis of Iterated Spatial Joins in Main Memory (BS, MAVS, TC, AJD, JG), pp. 1882–1893.
VLDBVLDB-2013-Taxidou #analysis #information management #realtime #social #social media
Realtime Analysis of Information Diffusion in Social Media (IT), pp. 1416–1421.
ITiCSEITiCSE-2013-HerreroLOST13a #analysis #empirical #performance
An empirical analysis of the influence of classmates on the academic performance (CH, ML, JO, JS, ST), p. 328.
ITiCSEITiCSE-2013-Trakhtenbrot #algorithm #analysis #complexity #concept #problem #student
Students misconceptions in analysis of algorithmic and computational complexity of problems (MT), pp. 353–354.
ESOPESOP-2013-AlpuenteBFS #analysis #logic #specification
Slicing-Based Trace Analysis of Rewriting Logic Specifications with iJulienne (MA, DB, FF, JS), pp. 121–124.
ESOPESOP-2013-CollingbourneDKQ #analysis #gpu #kernel #semantics #verification
Interleaving and Lock-Step Semantics for Analysis and Verification of GPU Kernels (PC, AFD, JK, SQ), pp. 270–289.
ESOPESOP-2013-HofmannR #analysis #automation #type inference
Automatic Type Inference for Amortised Heap-Space Analysis (MH, DR), pp. 593–613.
FASEFASE-2013-LinPEHR #analysis #behaviour #requirements #sequence #specification #string
Augmenting Sequence Enumeration with String-Rewriting for Requirements Analysis and Behavioral Specification (LL, JHP, RE, RMH, CRM), pp. 179–193.
FASEFASE-2013-TrippPCCG #analysis #named #scalability #security #web
Andromeda: Accurate and Scalable Security Analysis of Web Applications (OT, MP, PC, RC, SG), pp. 210–225.
FoSSaCSFoSSaCS-2013-HainryMP #analysis #complexity #process #type system
Type-Based Complexity Analysis for Fork Processes (EH, JYM, RP), pp. 305–320.
TACASTACAS-2013-BalasubramanianPKL #analysis #multi #named #statechart
Polyglot: Systematic Analysis for Multiple Statechart Formalisms (DB, CSP, GK, MRL), pp. 523–529.
TACASTACAS-2013-FerraraMP #analysis #data access #policy #self
Policy Analysis for Self-administrated Role-Based Access Control (ALF, PM, GP), pp. 432–447.
TACASTACAS-2013-GodefroidY #analysis #source code
Analysis of Boolean Programs (PG, MY), pp. 214–229.
TACASTACAS-2013-Lowe #analysis #contest
CPAchecker with Explicit-Value Analysis Based on CEGAR and Interpolation — (Competition Contribution) (SL), pp. 610–612.
TACASTACAS-2013-VizelGS #analysis #reachability #using
Intertwined Forward-Backward Reachability Analysis Using Interpolants (YV, OG, SS), pp. 308–323.
TACASTACAS-2013-Wendler #analysis #contest
CPAchecker with Sequential Combination of Explicit-State Analysis and Predicate Analysis — (Competition Contribution) (PW), pp. 613–615.
CSMRCSMR-2013-BhattacharyaUNK #analysis #android #debugging #empirical #open source
An Empirical Analysis of Bug Reports and Bug Fixing in Open Source Android Apps (PB, LU, IN, SCK), pp. 133–143.
CSMRCSMR-2013-GhaithWPM #analysis #detection #independence #performance #testing
Profile-Based, Load-Independent Anomaly Detection and Analysis in Performance Regression Testing of Software Systems (SG, MW, PP, JM), pp. 379–383.
CSMRCSMR-2013-JezekHB #analysis #compilation #library
Supplying Compiler’s Static Compatibility Checks by the Analysis of Third-Party Libraries (KJ, LH, PB), pp. 375–378.
CSMRCSMR-2013-LehnertFR #impact analysis #rule-based
Rule-Based Impact Analysis for Heterogeneous Software Artifacts (SL, QuaF, MR), pp. 209–218.
CSMRCSMR-2013-Nagy #data-driven #static analysis
Static Analysis of Data-Intensive Applications (CN), pp. 435–438.
ICPCICPC-2013-MurakamiHHIK #analysis #clone detection #detection #lightweight #source code
Gapped code clone detection with lightweight source code analysis (HM, KH, YH, HI, SK), pp. 93–102.
ICPCICPC-2013-PruijtKB #analysis #architecture #dependence #on the
On the accuracy of Architecture Compliance Checking support Accuracy of dependency analysis and violation reporting (LP, CK, SB), pp. 172–181.
ICPCICPC-2013-SteidlHJ #analysis #quality #source code
Quality analysis of source code comments (DS, BH, EJ), pp. 83–92.
ICSMEICSM-2013-AnandEKSBK #abstraction #analysis #bytecode #framework #memory management #stack
An Accurate Stack Memory Abstraction and Symbolic Analysis Framework for Executables (KA, KE, AK, MS, RB, ADK), pp. 90–99.
ICSMEICSM-2013-Beck #analysis #multi
Analysis of Multi-dimensional Code Couplings (FB), pp. 560–565.
ICSMEICSM-2013-CollardDM #analysis #framework #named #semiparsing #source code #tool support
srcML: An Infrastructure for the Exploration, Analysis, and Manipulation of Source Code: A Tool Demonstration (MLC, MJD, JIM), pp. 516–519.
ICSMEICSM-2013-MartinezDM #abstract syntax tree #analysis #automation
Automatically Extracting Instances of Code Change Patterns with AST Analysis (MM, LD, MM), pp. 388–391.
ICSMEICSM-2013-OsmanCP #algorithm #analysis #diagrams #machine learning
An Analysis of Machine Learning Algorithms for Condensing Reverse Engineered Class Diagrams (MHO, MRVC, PvdP), pp. 140–149.
ICSMEICSM-2013-SahaRS #analysis #evolution #named
gCad: A Near-Miss Clone Genealogy Extractor to Support Clone Evolution Analysis (RKS, CKR, KAS), pp. 488–491.
ICSMEICSM-2013-TianLS #analysis #debugging #multi #named #predict
DRONE: Predicting Priority of Reported Bugs by Multi-factor Analysis (YT, DL, CS), pp. 200–209.
ICSMEICSM-2013-VenkataramaniABM #analysis #repository #scalability #semantics
Latent Co-development Analysis Based Semantic Search for Large Code Repositories (RV, AMA, VDB, BM), pp. 372–375.
ICSMEICSM-2013-YukselS #analysis #automation #case study #classification
Automated Classification of Static Code Analysis Alerts: A Case Study (UY, HS), pp. 532–535.
MSRMSR-2013-CampbellZXHM #analysis #detection #documentation #topic #using
Deficient documentation detection: a methodology to locate deficient project documentation using topic analysis (JCC, CZ, ZX, AH, JM), pp. 57–60.
MSRMSR-2013-DemeyerMWL #analysis #exclamation
Happy birthday! a trend analysis on past MSR papers (SD, AM, KW, AL), pp. 353–362.
MSRMSR-2013-FuLLDZX #analysis #behaviour #comprehension
Contextual analysis of program logs for understanding system behaviors (QF, JGL, QL, RD, DZ, TX), pp. 397–400.
MSRMSR-2013-VasquezDP #analysis #development #mobile #stack overflow #using
An exploratory analysis of mobile development issues using stack overflow (MLV, BD, DP), pp. 93–96.
SCAMSCAM-2013-BiallasOCH #analysis #named #pointer
PtrTracker: Pragmatic pointer analysis (SB, MCO, FC, RH), pp. 69–73.
SCAMSCAM-2013-FabryRJ #analysis #source code
Aspectual source code analysis with GASR (JF, CDR, VJ), pp. 53–62.
SCAMSCAM-2013-MuskeBS #bibliography #clustering #reduction #static analysis
Review efforts reduction by partitioning of static analysis warnings (TBM, AB, TS), pp. 106–115.
SCAMSCAM-2013-PapadakisDT #analysis #fault #mutation testing #named #using
Proteum/FL: A tool for localizing faults using mutation analysis (MP, MED, YLT), pp. 94–99.
SCAMSCAM-2013-SvajlenkoRD #analysis #generative #named #similarity #tool support
ForkSim: Generating software forks for evaluating cross-project similarity analysis tools (JS, CKR, SD), pp. 37–42.
WCREWCRE-2013-ClearyGVSSP #analysis #interactive #memory management #multi
Reconstructing program memory state from multi-gigabyte instruction traces to support interactive analysis (BC, PG, EV, MADS, MS, FP), pp. 42–51.
WCREWCRE-2013-FryW #clustering #fault #maintenance #static analysis
Clustering static analysis defect reports to reduce maintenance costs (ZPF, WW), pp. 282–291.
WCREWCRE-2013-SaeidiHKJ #analysis #legacy #modelling #named #tool support
Gelato: GEneric language tools for model-driven analysis of legacy software systems (AS, JH, RK, SJ), pp. 481–482.
PEPMPEPM-2013-SunCZ #analysis #constraints #locality #source code
Constraint-based locality analysis for X10 programs (QS, YC, JZ), pp. 137–146.
PLDIPLDI-2013-KastrinisS #analysis #context-sensitive grammar #hybrid #points-to
Hybrid context-sensitivity for points-to analysis (GK, YS), pp. 423–434.
PLDIPLDI-2013-SankaranarayananCG #probability #source code #static analysis
Static analysis for probabilistic programs: inferring whole program properties from finitely many paths (SS, AC, SG), pp. 447–458.
PLDIPLDI-2013-SchaferSDT #analysis
Dynamic determinacy analysis (MS, MS, JD, FT), pp. 165–174.
PLDIPLDI-2013-ZhangLYS #algorithm #alias #analysis #performance
Fast algorithms for Dyck-CFL-reachability with applications to alias analysis (QZ, MRL, HY, ZS), pp. 435–446.
PLDIPLDI-2013-ZhangNY #abstraction #analysis #data flow #parametricity
Finding optimum abstractions in parametric dataflow analysis (XZ, MN, HY), pp. 365–376.
SASSAS-2013-BlazyLMP #abstract interpretation #analysis #c #verification
Formal Verification of a C Value Analysis Based on Abstract Interpretation (SB, VL, AM, DP), pp. 324–344.
SASSAS-2013-DragoiES #analysis #data type
Local Shape Analysis for Overlaid Data Structures (CD, CE, MS), pp. 150–171.
SASSAS-2013-Goubault #abstract interpretation #source code #static analysis
Static Analysis by Abstract Interpretation of Numerical Programs and Systems, and FLUCTUAT (EG), pp. 1–3.
SASSAS-2013-Sankaranarayanan #static analysis
Static Analysis in the Continuously Changing World (SS), pp. 4–5.
SASSAS-2013-WhiteM #algebra #analysis #memory management #optimisation #using
Concise Analysis Using Implication Algebras for Task-Local Memory Optimisation (LW, AM), pp. 433–453.
STOCSTOC-2013-HardtR #analysis #worst-case
Beyond worst-case analysis in private singular vector computation (MH, AR), pp. 331–340.
STOCSTOC-2013-KwokLLGT #algorithm #analysis #clustering #difference #higher-order
Improved Cheeger’s inequality: analysis of spectral partitioning algorithms through higher order spectral gap (TCK, LCL, YTL, SOG, LT), pp. 11–20.
CIAACIAA-2013-DreyfusHK #analysis #approximate #reachability
Enhancing Approximations for Regular Reachability Analysis (AD, PCH, OK), pp. 331–339.
ICALPICALP-v1-2013-DeDS #algorithm #analysis #difference #fourier #geometry #robust
A Robust Khintchine Inequality, and Algorithms for Computing Optimal Constants in Fourier Analysis and High-Dimensional Geometry (AD, ID, RAS), pp. 376–387.
ICALPICALP-v2-2013-HartungNNS #analysis #complexity #graph
A Refined Complexity Analysis of Degree Anonymization in Graphs (SH, AN, RN, OS), pp. 594–606.
ICALPICALP-v2-2013-PetricekOM #named #static analysis
Coeffects: Unified Static Analysis of Context-Dependence (TP, DAO, AM), pp. 385–397.
LATALATA-2013-FernauHV #analysis #automaton #multi #problem
A Multivariate Analysis of Some DFA Problems (HF, PH, YV), pp. 275–286.
IFMIFM-2013-GiachinoGLLW #analysis #concurrent #theory and practice
Deadlock Analysis of Concurrent Objects: Theory and Practice (EG, CAG, CL, ML, PYHW), pp. 394–411.
IFMIFM-2013-Song00LD #analysis #divide and conquer #reachability
Improved Reachability Analysis in DTMC via Divide and Conquer (SS, LG, JS, YL, JSD), pp. 162–176.
SEFMSEFM-2013-TranST #composition #static analysis #transaction
Compositional Static Analysis for Implicit Join Synchronization in a Transactional Setting (TMTT, MS, HT), pp. 212–228.
SFMSFM-2013-GratieIP #analysis #biology
ODE Analysis of Biological Systems (DEG, BI, IP), pp. 29–62.
SFMSFM-2013-KopfR #analysis #automation #data flow
Automation of Quantitative Information-Flow Analysis (BK, AR), pp. 1–28.
GT-VMTGT-VMT-2013-MaximovaEE #analysis #graph transformation
Analysis of Hypergraph Transformation Systems in AGG based on M-Functors (MM, HE, CE).
CHICHI-2013-AlperBRIF #analysis #comparison #graph
Weighted graph comparison techniques for brain connectivity analysis (BA, BB, NHR, TI, JDF), pp. 483–492.
CHICHI-2013-BrownML #analysis #mobile #video
iPhone in vivo: video analysis of mobile device use (BATB, MM, EL), pp. 1031–1040.
CHICHI-2013-GoyalLF #analysis #visualisation
Effects of visualization and note-taking on sensemaking and analysis (NG, GL, SRF), pp. 2721–2724.
CHICHI-2013-HarpsteadMA #data analysis #education #game studies #learning
In search of learning: facilitating data analysis in educational games (EH, BAM, VA), pp. 79–88.
CHICHI-2013-VellosoBG #analysis #modelling #named
MotionMA: motion modelling and analysis by demonstration (EV, AB, HG), pp. 1309–1318.
CHICHI-2013-WalshFYD #analysis #design #framework
FACIT PD: a framework for analysis and creation of intergenerational techniques for participatory design (GW, EF, JCY, AD), pp. 2893–2902.
CHICHI-2013-WangBK #analysis #facebook #gender #topic
Gender, topic, and audience response: an analysis of user-generated content on facebook (YCW, MB, REK), pp. 31–34.
CSCWCSCW-2013-AlmuhimediWLSA #analysis #scalability #twitter
Tweets are forever: a large-scale quantitative analysis of deleted tweets (HA, SW, BL, NMS, AA), pp. 897–908.
CSCWCSCW-2013-Hautasaari #analysis #process #quote #wiki
“Could someone please translate this?”: activity analysis of wikipedia article translation by non-experts (AMJH), pp. 945–954.
CSCWCSCW-2013-Robert #analysis #multi
A multi-level analysis of the impact of shared leadership in diverse virtual teams (LPRJ), pp. 363–374.
CSCWCSCW-2013-SmithQC #analysis #identification #using
Finger on the pulse: identifying deprivation using transit flow analysis (CSC, DQ, LC), pp. 683–692.
HCIDHM-SET-2013-ChiLC #analysis
The Causal Analysis of Requested Alterations for Pressure Garments (CFC, CHL, HWC), pp. 173–182.
HCIDHM-SET-2013-HungCSC #analysis #case study #comparative #education #effectiveness #women
A Comparative Analysis of the Educational Effectiveness of Leaflet and Website for Low-Literate Patients — A Case Study of Immigrant Mothers in Taipei (YLH, KRC, CS, TC), pp. 204–213.
HCIDUXU-CXC-2013-AsanoY #analysis #design
Observation Analysis Method for Culture Centered Design — Proposal of KH Method - (KA, KY), pp. 11–19.
HCIDUXU-CXC-2013-CarvalhoSNM #analysis #comparative #game studies #interactive #usability
Interactive Doodles: A Comparative Analysis of the Usability and Playability of Google Trademark Games between 2010 and 2012 (BJAdC, MMS, AMMdN, RPM), pp. 508–517.
HCIDUXU-NTE-2013-BarrosSFCC #analysis #artificial reality #people
Virtual Reality Immersion: An Important Tool for Diagnostic Analysis and Rehabilitation of People with Disabilities (HOB, MMS, ELRF, WC, FC), pp. 337–344.
HCIDUXU-NTE-2013-Danylak #analysis #gesture #human-computer #interactive
Semiotic Analysis for Gestural and Emotional Human-Computer Interaction (RD), pp. 465–474.
HCIDUXU-NTE-2013-Gyoda #ad hoc #analysis #communication #evaluation #network #performance
Analysis and Evaluation of Wireless Ad Hoc Network Performance for a Disaster Communication Model and Scenarios (KG), pp. 65–74.
HCIDUXU-PMT-2013-ChynalSS #data analysis #evaluation #eye tracking #usability #using
Remote Usability Evaluation Using Eye Tracking Enhanced with Intelligent Data Analysis (PC, JS, JMS), pp. 212–221.
HCIDUXU-PMT-2013-KohnoYSN #analysis #approach #design
Pragmatic Approach to Cost Benefit Analysis of User Centered Design (IK, HY, SS, MN), pp. 525–534.
HCIDUXU-PMT-2013-ZhangD #analysis #interactive
User-Mobile Phone Interactions: A Postphenomenology Analysis (BZ, HD), pp. 171–180.
HCIDUXU-WM-2013-BucchianicoCP #analysis #communication #towards #visual notation
Branding “for All”: Toward the Definition of Inclusive Toolkits of Analysis and Visual Communication for Brand Identities (GDB, SC, SP), pp. 23–29.
HCIDUXU-WM-2013-Kim13a #analysis #query
Analysis of Query Entries of a Job Search Engine (YK), pp. 203–211.
HCIHCI-III-2013-IteyaMK #analysis #using #visual notation
Responses Analysis of Visual and Linguistic Information on Digital Signage Using fNIRS (SI, AM, TK), pp. 411–420.
HCIHCI-III-2013-KimKAPW #analysis #artificial reality #social
Brain Function Connectivity Analysis for Recognizing Different Relation of Social Emotion in Virtual Reality (JK, DK, SA, SP, MCW), pp. 441–447.
HCIHCI-III-2013-StorzRMLE #analysis #detection #machine learning #visualisation #workflow
Annotate. Train. Evaluate. A Unified Tool for the Analysis and Visualization of Workflows in Machine Learning Applied to Object Detection (MS, MR, RM, HL, ME), pp. 196–205.
HCIHCI-IMT-2013-Farhadi-NiakiEA #analysis #design #gesture #usability
Design and Usability Analysis of Gesture-Based Control for Common Desktop Tasks (FFN, SAE, AA), pp. 215–224.
HCIHCI-IMT-2013-SakataKN #analysis #collaboration #communication #scalability
Communication Analysis of Remote Collaboration System with Arm Scaling Function (NS, TK, SN), pp. 378–387.
HCIHCI-IMT-2013-SrivastavaT #analysis #realtime #using
Real Time Mono-vision Based Customizable Virtual Keyboard Using Finger Tip Speed Analysis (SS, RCT), pp. 497–505.
HCIHCI-UC-2013-KuramochiOTHN #analysis #community #graph #network #semantics #twitter #using
Applying to Twitter Networks of a Community Extraction Method Using Intersection Graph and Semantic Analysis (TK, NO, KT, YH, SN), pp. 314–323.
HCIHCI-UC-2013-TajimaIK #analysis
Analysis of Customer Preference through Unforced Natural Passive Observation (TT, YI, TK), pp. 466–474.
HCIHIMI-D-2013-KobayashiYA #analysis #behaviour
Analysis of Purchasing Behavior Focusing on the Passage of Time at a Group Buying Site of Coupon (TK, TY, YA), pp. 449–455.
HCIHIMI-D-2013-KotaniKSA #analysis #development #memory management #using
Analysis of Spatiotemporal Memory Using Air-Jets as Tactile Stimuli for Development of Noncontact Tactile Displays (KK, NK, SS, TA), pp. 620–627.
HCIHIMI-D-2013-SusukiTOM #analysis #behaviour
Cognitive Analysis of Driver’s Behavior with Seamless Display of Back-Monitor and Side-View Mirror (NS, KT, MO, HM), pp. 642–649.
HCIHIMI-HSM-2013-ChiangWCH #analysis #performance #smarttech
An Analysis of Smartphone Size Regarding Operating Performance (ZHC, CCW, ACC, CyH), pp. 363–372.
HCIHIMI-HSM-2013-HerronV #analysis #bibliography
Are Prescription Labels Usable? A Review and Analysis (MH, KPLV), pp. 252–260.
HCIHIMI-HSM-2013-LeeJ #analysis #simulation #using
Task Analysis of Soft Control Operations Using Simulation Data in Nuclear Power Plants (SJL, WJ), pp. 524–529.
HCIHIMI-HSM-2013-Noda #analysis #industrial #monitoring #performance #statistics
Performance Monitoring of Industrial Plant Alarm Systems by Statistical Analysis of Plant Operation Data (MN), pp. 131–135.
HCIHIMI-LCCB-2013-AntolosLLV #analysis #using
Burglary Crime Analysis Using Logistic Regression (DA, DL, AL, DAV), pp. 549–558.
HCIHIMI-LCCB-2013-KuritaKWS #analysis
A Method for Service Failure Effects Analysis Based on Customer Satisfaction (YK, KK, KW, YS), pp. 485–494.
HCIHIMI-LCCB-2013-YajimaHY #analysis #communication #design
Application of Ethno-Cognitive Interview and Analysis Method for the Smart Communication Design (AY, HH, TY), pp. 649–657.
HCIOCSC-2013-Abascal-MenaLZ #analysis #behaviour #mining #twitter
User Generated Content: An Analysis of User Behavior by Mining Political Tweets (RAM, ÉLO, JSZH), pp. 3–12.
HCIOCSC-2013-AdnanHAT #analysis #behaviour #eye tracking #network #online #social
Eye Tracking Analysis of User Behavior in Online Social Networks (WAWA, WNHH, NA, JT), pp. 113–119.
HCIOCSC-2013-YamauchiHN #analysis #source code #twitter
Searching Emotional Scenes in TV Programs Based on Twitter Emotion Analysis (TY, YH, YIN), pp. 432–441.
VISSOFTVISSOFT-2013-KarranTD #analysis #named #thread #visual notation
SYNCTRACE: Visual thread-interplay analysis (BK, JT, JD), pp. 1–10.
AdaEuropeAdaEurope-2013-AsensioLCN #analysis #approach #execution #safety #worst-case
Worst-Case Execution Time Analysis Approach for Safety-Critical Airborne Software (EA, IL, AC, JN), pp. 161–176.
HILTHILT-2013-CarterFHHT #analysis #named
SAW: the software analysis workbench (KC, AF, JH, BH, AT), pp. 15–18.
HILTHILT-2013-Whalen #analysis #architecture #development #formal method #modelling #scalability #using
Up and out: scaling formal analysis using model-based development and architecture modeling (MWW), pp. 41–42.
CAiSECAiSE-2013-BeheshtiBN #ad hoc #analysis #aspect-oriented #process
Enabling the Analysis of Cross-Cutting Aspects in Ad-Hoc Processes (SMRB, BB, HRMN), pp. 51–67.
CAiSECAiSE-2013-PapottiPSCP #analysis #code generation #modelling
A Quantitative Analysis of Model-Driven Code Generation through Software Experimentation (PEP, AFdP, WLdS, CEC, LFP), pp. 321–337.
EDOCEDOC-2013-TranZ #analysis #approach #architecture #verification
Event Actors Based Approach for Supporting Analysis and Verification of Event-Driven Architectures (HT, UZ), pp. 217–226.
ICEISICEIS-J-2013-BouneffaA13a #approach #graph grammar #impact analysis #ontology
The Change Impact Analysis in BPM Based Software Applications: A Graph Rewriting and Ontology Based Approach (MB, AA), pp. 280–295.
ICEISICEIS-J-2013-PintoKG13a #analysis #approach #architecture #automation #evaluation #metadata
An Automated Architectural Evaluation Approach Based on Metadata and Code Analysis (FP, UK, EMG), pp. 490–505.
ICEISICEIS-J-2013-RothPS13a #analysis #twitter
Tweeting Politicians: An Analysis of the Usage of a Micro Blogging System (MR, GP, JS), pp. 351–365.
ICEISICEIS-v1-2013-BentayebK #adaptation #analysis #constraints #semantics
Adapting OLAP Analysis to User’s Constraints through Semantic Hierarchies (FB, RK), pp. 193–200.
ICEISICEIS-v1-2013-ChiuFW #analysis #collaboration #integration #performance #social
An Analysis of Supply Chain Collaboration and Its Impact on Firm Performance — An Integration of Social Capital, Justice, and Technology Use (MLC, CYF, ILW), pp. 5–12.
ICEISICEIS-v1-2013-QasimR #analysis #classification #evaluation #linear #using
Classification of Hepatitis Patients and Fibrosis Evaluation using Decision Trees and Linear Discriminant Analysis (RQ, RMR), pp. 239–246.
ICEISICEIS-v1-2013-ZaamouneBPB #analysis #approach #multi #relational
A New Relational Spatial OLAP Approach for Multi-resolution and Spatio-multidimensional Analysis of Incomplete Field Data (MZ, SB, FP, PB), pp. 145–152.
ICEISICEIS-v2-2013-CuzzocreaF #analysis #comparative #exclamation #metamodelling #power of #state of the art
Comparative Analysis of State-of-the-Art Spatial Data Warehouse Meta-models — Catching the Expressive Power of SDW Schemas! (AC, RdNF), pp. 302–309.
ICEISICEIS-v2-2013-SampaioM #analysis
Analysis and Improvement System WebAnywhere (CFdSS, LCM), pp. 403–409.
ICEISICEIS-v2-2013-SuB #analysis #composition #data flow #graph #web #web service
Service Call Graph (SCG) — Information Flow Analysis in Web Service Composition (ZS, FB), pp. 17–24.
ICEISICEIS-v3-2013-AndargoliBK #analysis
Analysis of Interoperability in the Queensland Disaster Management System (AEA, PB, HK), pp. 310–317.
ICEISICEIS-v3-2013-DiefenthalerB #analysis #architecture #enterprise #semantics #using #web
Gap Analysis in Enterprise Architecture using Semantic Web Technologies (PD, BB), pp. 211–220.
ICEISICEIS-v3-2013-FerreiraFSCRPO #analysis #interactive #search-based
Log Analysis of Human Computer Interactions Regarding Break The Glass Accesses to Genetic Reports (AMF, PF, CSP, RJCC, PPR, AdCP, VO), pp. 46–53.
CIKMCIKM-2013-ArdonBMRSTT #analysis #topic #twitter
Spatio-temporal and events based analysis of topic popularity in twitter (SA, AB, AM, AR, AS, RMT, ST), pp. 219–228.
CIKMCIKM-2013-FangHZ #analysis #bibliography #sentiment
Exploring weakly supervised latent sentiment explanations for aspect-level review analysis (LF, MH, XZ), pp. 1057–1066.
CIKMCIKM-2013-KellerMWB #adaptation #analysis #flexibility
Flexible and adaptive subspace search for outlier analysis (FK, EM, AW, KB), pp. 1381–1390.
CIKMCIKM-2013-SubbianAS #analysis #mining #social
Content-centric flow mining for influence analysis in social streams (KS, CCA, JS), pp. 841–846.
ECIRECIR-2013-ChenC #analysis #multi #network #topic #using
A Topic Person Multi-polarization Method Using Friendship Network Analysis (ZYC, CCC), pp. 688–692.
ECIRECIR-2013-HuiGHL #analysis #keyword
Sponsored Search Ad Selection by Keyword Structure Analysis (KH, BG, BH, TL), pp. 230–241.
ECIRECIR-2013-NarangNMSD #analysis #evolution #microblog #social #topic
Discovery and Analysis of Evolving Topical Social Discussions on Unstructured Microblogs (KN, SN, SM, LVS, KD), pp. 545–556.
ECIRECIR-2013-PicaultR #analysis #interactive #multi #named #social
SIAM: Social Interaction Analysis for Multimedia (JP, MR), pp. 841–844.
ICMLICML-c1-2013-AvronBTZ #analysis #canonical #correlation #performance #reduction
Efficient Dimensionality Reduction for Canonical Correlation Analysis (HA, CB, ST, AZ), pp. 347–355.
ICMLICML-c1-2013-HanL13a #analysis #component
Principal Component Analysis on non-Gaussian Dependent Data (FH, HL), pp. 240–248.
ICMLICML-c1-2013-LivniLSNSG #analysis #component
Vanishing Component Analysis (RL, DL, SS, HN, SSS, AG), pp. 597–605.
ICMLICML-c1-2013-ZhangC #analysis #linear
Sparse Uncorrelated Linear Discriminant Analysis (XZ, DC), pp. 45–52.
ICMLICML-c2-2013-ChangKKZ #analysis #canonical #correlation #independence #kernel
Canonical Correlation Analysis based on Hilbert-Schmidt Independence Criterion and Centered Kernel Target Alignment (BC, UK, RK, JZ), pp. 316–324.
ICMLICML-c2-2013-Goerg #analysis #component
Forecastable Component Analysis (GMG), pp. 64–72.
ICMLICML-c3-2013-AndrewABL #analysis #canonical #correlation
Deep Canonical Correlation Analysis (GA, RA, JAB, KL), pp. 1247–1255.
ICMLICML-c3-2013-BaktashmotlaghHBLS #analysis #classification #video
Non-Linear Stationary Subspace Analysis with Application to Video Classification (MB, MTH, AB, BCL, MS), pp. 450–458.
ICMLICML-c3-2013-Kuleshov #algorithm #analysis #component #performance
Fast algorithms for sparse principal component analysis based on Rayleigh quotient iteration (VK), pp. 1418–1425.
KDDKDD-2013-CaiQ #analysis #linear #on the #rank
On the equivalent of low-rank linear regressions and linear discriminant analysis based regressions (XC, CHQD, FN, HH), pp. 1124–1132.
KDDKDD-2013-ChenTTY #analysis #kernel #modelling #performance
Model-based kernel for efficient time series analysis (HC, FT, PT, XY), pp. 392–400.
KDDKDD-2013-DavidsonGCW #analysis #network
Network discovery via constrained tensor analysis of fMRI data (IND, SG, OTC, PBW), pp. 194–202.
KDDKDD-2013-KermanyMBNM #analysis #framework
Analysis of advanced meter infrastructure data of water consumption in apartment buildings (EK, HM, DB, YN, HM), pp. 1159–1167.
KDDKDD-2013-MaiyaTLR #analysis #documentation
Exploratory analysis of highly heterogeneous document collections (ASM, JPT, FLL, RMR), pp. 1375–1383.
KDDKDD-2013-SunXY #analysis #component #robust
Robust principal component analysis via capped norms (QS, SX, JY), pp. 311–319.
KDDKDD-2013-WangLLWWC #analysis #named #twitter
SEA: a system for event analysis on chinese tweets (YW, HL, HL, JW, ZW, JC), pp. 1498–1501.
KDDKDD-2013-Wright #data analysis #learning #optimisation
Optimization in learning and data analysis (SJW), p. 3.
KDDKDD-2013-ZhuYGM #analysis #modelling #scalability #topic
Scalable text and link analysis with mixed-topic link models (YZ, XY, LG, CM), pp. 473–481.
KDIRKDIR-KMIS-2013-Gonzalez-BrambilaJG #analysis #database #research
Analysis of Mexican Research Production — Exploring a Scientifical Database (SBGB, MJM, CNGB), pp. 177–182.
KDIRKDIR-KMIS-2013-Ibarra-SanchezPO #analysis #case study #risk management #using
Hospital Risk Management using Healthcare Failure Mode and Effects Analysis — A Case Study on Ventilators Whithin an Intensive Care Unit (MAIS, ABPA, MROP), pp. 328–335.
KDIRKDIR-KMIS-2013-LlavoriLGNAS #analysis #framework #named #sentiment #towards
i-SLOD: Towards an Infrastructure for Enabling the Dissemination and Analysis of Sentiment Data (RBL, DML, LGM, VN, MJA, IS), pp. 214–219.
KDIRKDIR-KMIS-2013-OliveiraCL #analysis #concept
Business Analytics — Analysis of an Emerging Concept (MPVdO, CXC, MBL), pp. 547–551.
KDIRKDIR-KMIS-2013-PapulaVH #analysis #enterprise #network #process
Knowledge Networks as a Source of Knowledge Initiatives and Innovation Activity in Small and Medium Enterprises — Regression Analysis for EU 27 Countries (JP, JV, JH), pp. 389–396.
KDIRKDIR-KMIS-2013-SaijoSWK #analysis #case study #collaboration #community #multi #process
An Analysis of Multi-disciplinary — Inter-agency Collaboration Process — Case Study of a Japanese Community Care Access Center (MS, TS, MW, SK), pp. 470–475.
MLDMMLDM-2013-NikovskiWESSMT #data analysis #detection
Smart Meter Data Analysis for Power Theft Detection (DNN, ZW, AE, HS, KS, TM, KT), pp. 379–389.
MLDMMLDM-2013-SentzH #analysis
Information Gap Analysis for Decision Support Systems in Evidence-Based Medicine (KS, FMH), pp. 543–554.
MLDMMLDM-2013-YasojimaFBOS #analysis #case study #generative #power management
Partial Discharge Analysis and Inspection Alert Generation in High Power Transformers: A Case Study of an Autotransformer Bank at Eletrobrás-ELETRONORTE Vila do Conde Station (CTKY, MSF, FdSB, TFdO, AMdS), pp. 367–378.
RecSysRecSys-2013-ChowJKS #data analysis #difference #recommendation
Differential data analysis for recommender systems (RC, HJ, BPK, GS), pp. 323–326.
RecSysRecSys-2013-DoerfelJ #analysis #evaluation #recommendation
An analysis of tag-recommender evaluation procedures (SD, RJ), pp. 343–346.
SEKESEKE-2013-Al-MsiedeenSHUVS #concept analysis #mining #object-oriented #semantics #source code #using
Mining Features from the Object-Oriented Source Code of a Collection of Software Variants Using Formal Concept Analysis and Latent Semantic Indexing (RAM, ADS, MH, CU, SV, HES), pp. 244–249.
SEKESEKE-2013-ChaoY #analysis #order #reachability #scalability
A Best Method to Synthesize Very Large K-th Order Systems without Reachability Analysis (S) (DYC, THY), pp. 417–420.
SEKESEKE-2013-HansenM #analysis #ecosystem #network #towards
Towards a Network Ecology of Software Ecosystems: an Analysis of two OSGi Ecosystems (KMH, KM), pp. 326–331.
SEKESEKE-2013-JanesMSS #analysis #problem #programming #requirements
Domain Analysis in Combination with Extreme Programming toAddress Requirements Volatility Problems (S) (AJ, SM, AS, GS), pp. 226–231.
SEKESEKE-2013-LiuWL #analysis #detection #named #online #performance #pointer
ELCD: an efficient online cycle detection technique for pointer analysis (FL, LW, BL), pp. 606–611.
SEKESEKE-2013-NishiuraMWH #analysis #mutation testing #testing
Mutation Analysis for JavaScriptWeb Application Testing (KN, YM, HW, SH), pp. 159–165.
SEKESEKE-2013-SantosBC #analysis #education #game studies #modelling #programming #semantics
A Knowledge Modeling System for Semantic Analysis of Games Applied to Programming Education (ECOdS, GBB, EWGC), pp. 668–673.
SEKESEKE-2013-WangWMX #analysis #how #performance
How Does Acquirer’s Participation Influence Performance of Software Projects: A Quantitative Analysis (S) (YW, JW, JM, BX), pp. 537–541.
SEKESEKE-2013-WangZLBCT #analysis #modelling #non-functional #object-oriented #requirements
Integrating Functional with Non-functional Requirements Analysis In Object Oriented Modeling Tool Based on HOOMT (S) (JW, FZ, X(L, ECB, BC, MT), pp. 59–62.
SEKESEKE-2013-WeiX #analysis #e-commerce #effectiveness #evaluation
A Formal Cost-Effectiveness Analysis Model for Product Evaluation in E-Commerce (RW, HX), pp. 287–293.
SIGIRSIGIR-2013-AnH #analysis #information retrieval #probability #semantics
Boosting novelty for biomedical information retrieval through probabilistic latent semantic analysis (XA, JXH), pp. 829–832.
SIGIRSIGIR-2013-ChaBHC #analysis #modelling #network #social #topic
Incorporating popularity in topic models for social network analysis (YC, BB, CCH, JC), pp. 223–232.
SIGIRSIGIR-2013-GippMBLN #analysis #detection
Demonstration of citation pattern analysis for plagiarism detection (BG, NM, CB, ML, AN), pp. 1119–1120.
SIGIRSIGIR-2013-GolbusA #analysis #framework #information retrieval
A mutual information-based framework for the analysis of information retrieval systems (PBG, JAA), pp. 683–692.
SIGIRSIGIR-2013-PappasP #analysis #collaboration #sentiment
Sentiment analysis of user comments for one-class collaborative filtering over ted talks (NP, APB), pp. 773–776.
SIGIRSIGIR-2013-SonKP #analysis #locality #recommendation #semantics
A location-based news article recommendation with explicit localized semantic analysis (JWS, AYK, SBP), pp. 293–302.
AMTAMT-2013-AgirreES #architecture #automation #development #impact analysis #migration #modelling
Automatic Impact Analysis of Software Architecture Migration on Model Driven Software Development (JAA, LE, GS), pp. 52–61.
MODELSMoDELS-2013-NoyritGT #analysis #domain-specific language #integration #modelling #using
Computer Assisted Integration of Domain-Specific Modeling Languages Using Text Analysis Techniques (FN, SG, FT), pp. 505–521.
MODELSMoDELS-2013-PerezGCCC #analysis #modelling #network #policy #security
Model-Driven Extraction and Analysis of Network Security Policies (SMP, JGA, FC, NCB, JC), pp. 52–68.
MODELSMoDELS-2013-SaadB #analysis #data flow
Data-Flow Based Model Analysis and Its Applications (CS, BB), pp. 707–723.
MODELSMoDELS-2013-StorrleF #analysis #physics #towards #visual notation
Towards an Operationalization of the “Physics of Notations” for the Analysis of Visual Languages (HS, AF), pp. 104–120.
MODELSMoDELS-2013-NoyritGT #analysis #domain-specific language #integration #modelling #using
Computer Assisted Integration of Domain-Specific Modeling Languages Using Text Analysis Techniques (FN, SG, FT), pp. 505–521.
MODELSMoDELS-2013-PerezGCCC #analysis #modelling #network #policy #security
Model-Driven Extraction and Analysis of Network Security Policies (SMP, JGA, FC, NCB, JC), pp. 52–68.
MODELSMoDELS-2013-SaadB #analysis #data flow
Data-Flow Based Model Analysis and Its Applications (CS, BB), pp. 707–723.
MODELSMoDELS-2013-StorrleF #analysis #physics #towards #visual notation
Towards an Operationalization of the “Physics of Notations” for the Analysis of Visual Languages (HS, AF), pp. 104–120.
ECOOPECOOP-2013-AliL #named #program analysis
Averroes: Whole-Program Analysis without the Whole Program (KA, OL), pp. 378–400.
ECOOPECOOP-2013-AnsaloniKZBBT #composition #java #program analysis #tool support #virtual machine
Enabling Modularity and Re-use in Dynamic Program Analysis Tools for the Java Virtual Machine (DA, SK, YZ, LB, WB, PT), pp. 352–377.
OnwardOnward-2013-Repenning #interactive #program analysis #programming
Conversational programming: exploring interactive program analysis (AR), pp. 63–74.
OnwardOnward-2013-RossoJ #analysis #concept #design #git #what
What’s wrong with git?: a conceptual design analysis (SPDR, DJ), pp. 37–52.
OnwardOnward-2013-ValleeWZFK #modelling #problem #reasoning #security
Usable security as a static-analysis problem: modeling and reasoning about user permissions in social-sharing systems (HQdlV, JMW, WZ, KF, SK), pp. 1–16.
OOPSLAOOPSLA-2013-BhattacharyaGN #detection #program analysis
Combining concern input with program analysis for bloat detection (SB, KG, MGN), pp. 745–764.
OOPSLAOOPSLA-2013-ChongDKKQ #abstraction #analysis #gpu #invariant #kernel
Barrier invariants: a shared state abstraction for the analysis of data-dependent GPU kernels (NC, AFD, PHJK, JK, SQ), pp. 605–622.
OOPSLAOOPSLA-2013-MeyerovichR #analysis #empirical #programming language
Empirical analysis of programming language adoption (LAM, ASR), pp. 1–18.
OOPSLAOOPSLA-2013-SmaragdakisBK #analysis #points-to #preprocessor
Set-based pre-processing for points-to analysis (YS, GB, GK), pp. 253–270.
OOPSLAOOPSLA-2013-TetaliLMM #named #static analysis
MrCrypt: static analysis for secure cloud computations (SDT, ML, RM, TDM), pp. 271–286.
GPCEGPCE-2013-MarekKZBBTASS #framework #java #named #program analysis #robust
ShadowVM: robust and comprehensive dynamic program analysis for the java platform (LM, SK, YZ, LB, WB, PT, DA, AS, AS), pp. 105–114.
LOPSTRLOPSTR-2013-AlbertGG #analysis #approach
A Transformational Approach to Resource Analysis with Typed-Norms (EA, SG, RG), pp. 38–53.
LOPSTRLOPSTR-2013-LiqatKSGLGHE #analysis #energy #modelling #source code
Energy Consumption Analysis of Programs Based on XMOS ISA-Level Models (UL, SK, AS, KG, PLG, NG, MVH, KE), pp. 72–90.
PPDPPPDP-2013-MontenegroPS #analysis #functional #regular expression #using
Shape analysis in a functional language by using regular languages (MM, RP, CS), pp. 251–262.
QAPLQAPL-2013-NgoH #analysis #concurrent #multi #security #source code #thread
Quantitative Security Analysis for Multi-threaded Programs (TMN, MH), pp. 34–48.
PADLPADL-2013-RodriguesASF #abstraction #analysis #composition #declarative #multi #using
A Declarative Compositional Timing Analysis for Multicores Using the Latency-Rate Abstraction (VR, BA, SMdS, MF), pp. 43–59.
RERE-2013-BreauxR #analysis #formal method #multi #privacy #requirements #specification
Formal analysis of privacy requirements specifications for multi-tier applications (TDB, AR), pp. 14–20.
RERE-2013-MasseyEAS #analysis #automation #documentation #mining #policy #requirements
Automated text mining for requirements analysis of policy documents (AKM, JE, AIA, PPS), pp. 4–13.
RERE-2013-NistalaK #analysis #approach #consistency #requirements #validation
An approach to carry out consistency analysis on requirements: Validating and tracking requirements through a configuration structure (PN, PK), pp. 320–325.
REFSQREFSQ-2013-BonBGALTBFGATA #analysis #case study #requirements
Use Case and Requirements Analysis in a Remote Rural Context in Mali (AB, VdB, NBG, CvA, PDL, WT, SB, MF, AG, MA, AT, HA), pp. 331–346.
REFSQREFSQ-2013-BreauxG #analysis #requirements #specification #traceability #using
Regulatory Requirements Traceability and Analysis Using Semi-formal Specifications (TDB, DGG), pp. 141–157.
SACSAC-PL-J-2010-PopeeaC13 #analysis #debugging #proving #safety
Dual analysis for proving safety and finding bugs (CP, WNC), pp. 390–411.
SACSAC-2013-AbeniM #analysis #interactive
Analysis of client/server interactions in a reservation-based system (LA, NM), pp. 1603–1609.
SACSAC-2013-CameronSNMM #analysis #component #performance #realtime #rule-based
Performance analysis of a rule-based SOA component for real-time applications (AC, MS, NN, WM, TM), pp. 1877–1884.
SACSAC-2013-ChenLWW #abstraction #source code #static analysis
Static analysis of list-manipulating programs via bit-vectors and numerical abstractions (LC, RL, XW, JW), pp. 1204–1210.
SACSAC-2013-DelahayeKS #c #dynamic analysis #source code #specification
Common specification language for static and dynamic analysis of C programs (MD, NK, JS), pp. 1230–1235.
SACSAC-2013-GregioFAGMJ #analysis #behaviour #empirical #internet
An empirical analysis of malicious internet banking software behavior (ARAG, DSFF, VMA, PLdG, VFM, MJ), pp. 1830–1835.
SACSAC-2013-HogenboomBFBJK #analysis #sentiment
Exploiting emoticons in sentiment analysis (AH, DB, FF, MB, FdJ, UK), pp. 703–710.
SACSAC-2013-HuangXCL #adaptation #algorithm #analysis #detection #implementation #parallel #random testing #testing
Failure-detection capability analysis of implementing parallelism in adaptive random testing algorithms (RH, XX, JC, YL), pp. 1049–1054.
SACSAC-2013-KalyanC #analysis #navigation #using
A feasibility analysis on using bathymetry for navigation of autonomous underwater vehicles (BK, MC), pp. 229–231.
SACSAC-2013-KoPH #analysis #design #realtime #video
Design analysis for real-time video transcoding on cloud systems (SK, SP, HH), pp. 1610–1615.
SACSAC-2013-MeloAOAMB #analysis #approach #concept #visual notation
A conceptual approach to gene expression analysis enhanced by visual analytics (CAM, MAA, CO, SA, KM, AB), pp. 1314–1319.
SACSAC-2013-PayetDKV #analysis #execution #scalability
EARs in the wild: large-scale analysis of execution after redirect vulnerabilities (PP, AD, CK, GV), pp. 1792–1799.
SACSAC-2013-SenatoreP #collaboration #concept analysis #fuzzy #navigation
Lattice navigation for collaborative filtering by means of (fuzzy) formal concept analysis (SS, GP), pp. 920–926.
SACSAC-2013-TsukudaOYIT #analysis #coordination
Discovering unexpected information on the basis of popularity/unpopularity analysis of coordinate objects and their relationships (KT, HO, MY, HI, KT), pp. 878–885.
SACSAC-2013-VeeraragavanBMVNM #analysis #comprehension #distributed #experience #interactive #metric #multi #quality
Understanding the quality of experience in modern distributed interactive multimedia applications in presence of failures: metrics and analysis (NRV, AB, LM, RV, NN, HM), pp. 439–446.
SACSAC-2013-WaflerH #analysis #approach #dependence #grid #modelling #smarttech
A combined structural and dynamic modelling approach for dependability analysis in smart grid (JW, PEH), pp. 660–665.
SACSAC-2013-ZhongM #analysis #empirical #game studies
Google play is not a long tail market: an empirical analysis of app adoption on the Google play app market (NZ, FM), pp. 499–504.
ESEC-FSEESEC-FSE-2013-ClaretRNGB #analysis #data flow #using
Bayesian inference using data flow analysis (GC, SKR, AVN, ADG, JB), pp. 92–102.
ESEC-FSEESEC-FSE-2013-JiangZLSHGS #analysis #reliability #runtime
System reliability calculation based on the run-time analysis of ladder program (YJ, HZ, HL, XS, WNNH, MG, JS), pp. 695–698.
ESEC-FSEESEC-FSE-2013-KimMKBSBd #combinator #configuration management #dynamic analysis #lightweight #named #testing
SPLat: lightweight dynamic analysis for reducing combinatorics in testing configurable systems (CHPK, DM, SK, DSB, SS, PB, Md), pp. 257–267.
ESEC-FSEESEC-FSE-2013-KumarCS #analysis #industrial #precise #scalability
Precise range analysis on large industry code (SK, BC, US), pp. 675–678.
ESEC-FSEESEC-FSE-2013-KumarN #static analysis #tool support
The economics of static analysis tools (RK, AVN), pp. 707–710.
ESEC-FSEESEC-FSE-2013-LiebigRKADL #analysis #scalability
Scalable analysis of variable software (JL, AvR, CK, SA, JD, CL), pp. 81–91.
ESEC-FSEESEC-FSE-2013-MadsenLF #framework #javascript #library #static analysis
Practical static analysis of JavaScript applications in the presence of frameworks and libraries (MM, BL, MF), pp. 499–509.
ESEC-FSEESEC-FSE-2013-QiuLS #analysis #co-evolution #database #empirical
An empirical analysis of the co-evolution of schema and code in database applications (DQ, BL, ZS), pp. 125–135.
ESEC-FSEESEC-FSE-2013-SenKBG #dynamic analysis #framework #javascript #named
Jalangi: a selective record-replay and dynamic analysis framework for JavaScript (KS, SK, TGB, SG), pp. 488–498.
ESEC-FSEESEC-FSE-2013-SenKBG13a #dynamic analysis #framework #javascript #named #testing
Jalangi: a tool framework for concolic testing, selective record-replay, and dynamic analysis of JavaScript (KS, SK, TGB, SG), pp. 615–618.
ESEC-FSEESEC-FSE-2013-WangZCZZ #javascript #program analysis
Extracting URLs from JavaScript via program analysis (QW, JZ, YC, YZ, JZ), pp. 627–630.
ESEC-FSEESEC-FSE-2013-WuHTY #alias #analysis #detection #effectiveness #fault
Effective dynamic detection of alias analysis errors (JW, GH, YT, JY), pp. 279–289.
ESEC-FSEESEC-FSE-2013-ZhengZG #analysis #named #string #web
Z3-str: a z3-based string solver for web application analysis (YZ, XZ, VG), pp. 114–124.
ICSEICSE-2013-AlmorsyGI #analysis #architecture #automation #security #using
Automated software architecture security risk analysis using formalized signatures (MA, JG, ASI), pp. 662–671.
ICSEICSE-2013-Balachandran #automation #code review #quality #recommendation #static analysis #using
Reducing human effort and improving quality in peer code reviews using automatic static analysis and reviewer recommendation (VB), pp. 931–940.
ICSEICSE-2013-CarrenoW #analysis #approach #evolution #requirements
Analysis of user comments: an approach for software requirements evolution (LVGC, KW), pp. 582–591.
ICSEICSE-2013-FilieriPV #analysis #reliability
Reliability analysis in symbolic pathfinder (AF, CSP, WV), pp. 622–631.
ICSEICSE-2013-HaoLHG #energy #mobile #program analysis #using
Estimating mobile application energy consumption using program analysis (SH, DL, WGJH, RG), pp. 92–101.
ICSEICSE-2013-Johnson04a #comprehension #program analysis
Novice understanding of program analysis tool notifications (BJ), pp. 1432–1434.
ICSEICSE-2013-JohnsonSMB #debugging #developer #question #static analysis #tool support #why
Why don’t software developers use static analysis tools to find bugs? (BJ, YS, ERMH, RWB), pp. 672–681.
ICSEICSE-2013-Le #analysis
Segmented symbolic analysis (WL), pp. 212–221.
ICSEICSE-2013-Muslu #analysis #development #maintenance
Integrating systematic exploration, analysis, and maintenance in software development (KM), pp. 1389–1392.
ICSEICSE-2013-NguyenQRC #analysis #named #program repair #semantics
SemFix: program repair via semantic analysis (HDTN, DQ, AR, SC), pp. 772–781.
ICSEICSE-2013-SchwankeXC #analysis #architecture #quality
Measuring architecture quality by structure plus history analysis (RWS, LX, YC), pp. 891–900.
ICSEICSE-2013-SharTB #hybrid #injection #mining #program analysis #sql #using
Mining SQL injection and cross site scripting vulnerabilities using hybrid program analysis (LKS, HBKT, LCB), pp. 642–651.
ICSEICSE-2013-StephanASC #analysis #clone detection #comparison #detection #framework #mutation testing #using
Using mutation analysis for a model-clone detector comparison framework (MS, MHA, AS, JRC), pp. 1261–1264.
ICSEICSE-2013-ZhengZ #detection #execution #static analysis #web
Path sensitive static analysis of web applications for remote code execution vulnerability detection (YZ, XZ), pp. 652–661.
LDTALDTA-J-2009-SoderbergEHM #abstract syntax tree #analysis #syntax
Extensible intraprocedural flow analysis at the abstract syntax tree level (ES, TE, GH, EM), pp. 1809–1827.
SLESLE-2013-WachsmuthKVGV #analysis #incremental #independence
A Language Independent Task Engine for Incremental Name and Type Analysis (GW, GDPK, VAV, DMG, EV), pp. 260–280.
PLEASEPLEASE-2013-HuangYKHU #analysis #domain-specific language #mining #repository #towards
Domain analysis for mining software repositories: Towards feature-based DSL construction (CH, KY, YK, KH, NU), pp. 41–44.
SPLCSPLC-2013-EichelbergerS #analysis #modelling #variability
A systematic analysis of textual variability modeling languages (HE, KS), pp. 12–21.
SPLCSPLC-2013-KoziolekGGDS #analysis #case study #experience #identification #reuse
Experiences from identifying software reuse opportunities by domain analysis (HK, TG, TdG, DD, SS), pp. 208–217.
SPLCSPLC-2013-McGregor #analysis #ecosystem #modelling #tutorial
Ecosystem modeling and analysis: a tutorial (JDM), p. 282.
CCCC-2013-KastrinisS #analysis #effectiveness #exception #java #performance #points-to
Efficient and Effective Handling of Exceptions in Java Points-to Analysis (GK, YS), pp. 41–60.
CCCC-2013-LuSXX #analysis #incremental #points-to
An Incremental Points-to Analysis with CFL-Reachability (YL, LS, XX, JX), pp. 61–81.
CCCC-2013-SiegelS #analysis #named
FESA: Fold- and Expand-Based Shape Analysis (HS, AS), pp. 82–101.
CGOCGO-2013-JeonGT #named #performance #program analysis
Skadu: Efficient vector shadow memories for poly-scopic program analysis (DJ, SG, MBT), p. 12.
CGOCGO-2013-KruijfS #analysis #code generation #evaluation #implementation
Idempotent code generation: Implementation, analysis, and evaluation (MdK, KS), p. 12.
CGOCGO-2013-LaiS #analysis #bound #optimisation #performance
Performance upper bound analysis and optimization of SGEMM on Fermi and Kepler GPUs (JL, AS), p. 10.
CGOCGO-2013-PienaarH #javascript #memory management #named #static analysis
JSWhiz: Static analysis for JavaScript memory leaks (JAP, RH), p. 11.
ISMMISMM-2013-LiCK #analysis #graph #pointer #precise #scalability
Precise and scalable context-sensitive pointer analysis via value flow graph (LL, CC, NK), pp. 85–96.
LCTESLCTES-2013-HuberPP #analysis #control flow #graph #using
Combined WCET analysis of bitcode and machine code using control-flow relation graphs (BH, DP, PPP), pp. 163–172.
LCTESLCTES-2013-MorenoFH #analysis #debugging #embedded
Non-intrusive program tracing and debugging of deployed embedded systems through side-channel analysis (CM, SF, MAH), pp. 77–88.
PLOSPLOS-2013-BurtsevMER #analysis #named #performance #streaming
Weir: a streaming language for performance analysis (AB, NM, EE, RR), p. 6.
PPoPPPPoPP-2013-WuZZJS #algorithm #analysis #complexity #design #gpu #memory management
Complexity analysis and algorithm design for reorganizing data to minimize non-coalesced memory accesses on GPU (BW, ZZ, EZZ, YJ, XS), pp. 57–68.
PPoPPPPoPP-2013-YukiFRS #analysis #array #data flow #source code
Array dataflow analysis for polyhedral X10 programs (TY, PF, SVR, VS), pp. 23–34.
SOSPSOSP-2013-HuangBRLKL #analysis #facebook
An analysis of Facebook photo caching (QH, KB, RvR, WL, SK, HCL), pp. 167–181.
CADECADE-2013-ErbaturEKLLMMNSS #analysis #encryption #paradigm #protocol #symmetry #unification
Asymmetric Unification: A New Unification Paradigm for Cryptographic Protocol Analysis (SE, SE, DK, ZL, CL, CM, JM, PN, SS, RS), pp. 231–248.
CAVCAV-2013-ChakarovS #probability #program analysis
Probabilistic Program Analysis with Martingales (AC, SS), pp. 511–526.
CAVCAV-2013-FarzanK #bound #named #parallel #static analysis
Duet: Static Analysis for Unbounded Parallelism (AF, ZK), pp. 191–196.
CAVCAV-2013-HolikLRSV #analysis #automation #automaton
Fully Automated Shape Analysis Based on Forest Automata (LH, OL, AR, JS, TV), pp. 740–755.
CAVCAV-2013-MeierSCB #analysis #protocol #proving #security
The TAMARIN Prover for the Symbolic Analysis of Security Protocols (SM, BS, CC, DAB), pp. 696–701.
CAVCAV-2013-Sankur #analysis #automaton #named #robust
Shrinktech: A Tool for the Robustness Analysis of Timed Automata (OS), pp. 1006–1012.
ICLPICLP-J-2013-LiangK #analysis #logic programming #scalability #source code
A practical analysis of non-termination in large logic programs (SL, MK), pp. 705–719.
ICLPICLP-J-2013-MaLWRL #analysis #approach #declarative #distributed #execution #specification
A declarative approach to distributed computing: Specification, execution and analysis (JM, FL, DW, AR, JL), pp. 815–830.
ICSTICST-2013-CarrozzaCNPR #analysis #industrial #predict
Analysis and Prediction of Mandelbugs in an Industrial Software System (GC, DC, RN, RP, SR), pp. 262–271.
ICSTICST-2013-GargantiniGM #analysis #automation #named #robust
AURORA: AUtomatic RObustness coveRage Analysis Tool (AG, MG, EM), pp. 463–470.
ICSTICST-2013-ShuSHP #analysis #dependence #framework #named
JavaPDG: A New Platform for Program Dependence Analysis (GS, BS, TADH, AP), pp. 408–415.
ISSTAISSTA-2013-Ghaith #analysis #performance #testing #transaction
Analysis of performance regression testing data by transaction profiles (SG), pp. 370–373.
ISSTAISSTA-2013-HillsKV #empirical #perspective #php #static analysis
An empirical study of PHP feature usage: a static analysis perspective (MH, PK, JJV), pp. 325–335.
ISSTAISSTA-2013-HowarGR #analysis #generative #hybrid #interface #learning
Hybrid learning: interface generation through static, dynamic, and symbolic analysis (FH, DG, ZR), pp. 268–279.
ISSTAISSTA-2013-RosnerGBBRPZF #analysis #bound #invariant #parallel #refinement
Parallel bounded analysis in code with rich invariants by refinement of field bounds (NR, JPG, SB, GMB, SPDR, LP, LZ, MFF), pp. 23–33.
ISSTAISSTA-2013-WeiR #analysis #javascript
Practical blended taint analysis for JavaScript (SW, BGR), pp. 336–346.
LICSLICS-2013-ChaudhuriSV #analysis
Regular Real Analysis (SC, SS, MYV), pp. 509–518.
RTARTA-2013-BauLNW #analysis #term rewriting #termination
Compression of Rewriting Systems for Termination Analysis (AB, ML, EN, JW), pp. 97–112.
TAPTAP-2013-GogollaBC #analysis #benchmark #metric #ocl #tool support #uml
Initiating a Benchmark for UML and OCL Analysis Tools (MG, FB, JC), pp. 115–132.
VMCAIVMCAI-2013-DAntoniV #static analysis #string
Static Analysis of String Encoders and Decoders (LD, MV), pp. 209–228.
VMCAIVMCAI-2013-SamantaDC #analysis #robust
Robustness Analysis of Networked Systems (RS, JVD, SC), pp. 229–247.
VMCAIVMCAI-2013-SeladjiB #abstract domain #analysis #fixpoint #tool support #using
Fixpoint Computation in the Polyhedra Abstract Domain Using Convex and Numerical Analysis Tools (YS, OB), pp. 149–168.
CBSECBSE-2012-BenesBCO #analysis #component #development #model checking #probability #reliability
Reliability analysis in component-based development via probabilistic model checking (NB, BB, IC, RO), pp. 83–92.
CBSECBSE-2012-Carlson #analysis #component #embedded
Timing analysis of component-based embedded systems (JC), pp. 151–156.
WICSA-ECSAWICSA-ECSA-2012-AstekinS #analysis #clone detection #detection #simulation
Utilizing Clone Detection for Domain Analysis of Simulation Systems (MA, HS), pp. 287–291.
WICSA-ECSAWICSA-ECSA-2012-EdwardsBM #analysis #automation #code generation #modelling
Automated Analysis and Code Generation for Domain-Specific Models (GE, YB, NM), pp. 161–170.
WICSA-ECSAWICSA-ECSA-2012-SuYZ #analysis #architecture #component #semantics
Semantic Analysis of Component-aspect Dynamism for Connector-based Architecture Styles (GS, MY, CZ), pp. 151–160.
WICSA-ECSAWICSA-ECSA-2012-TauschPA #analysis #domain-specific language #named #traceability
TracQL: A Domain-Specific Language for Traceability Analysis (NT, MP, JA), pp. 320–324.
ASEASE-2012-AlmorsyGI #analysis #automation #using
Supporting automated vulnerability analysis using formalized vulnerability signatures (MA, JG, ASI), pp. 100–109.
ASEASE-2012-IbrahimGHA #ambiguity #analysis #kernel #operating system #points-to #using
Supporting operating system kernel data disambiguation using points-to analysis (ASI, JG, JHHH, MA), pp. 234–237.
ASEASE-2012-Shang0X #analysis #experience #incremental #performance #points-to #precise #summary
Fast and precise points-to analysis with incremental CFL-reachability summarisation: preliminary experience (LS, YL, JX), pp. 270–273.
ASEASE-2012-TamrawiNNN #analysis #named #refactoring
SYMake: a build code analysis and refactoring tool for makefiles (AT, HAN, HVN, TNN), pp. 366–369.
ASEASE-2012-XiaoTFHM #analysis #privacy
User-aware privacy control via extended static-information-flow analysis (XX, NT, MF, JdH, MM), pp. 80–89.
CASECASE-2012-ChenF #analysis #rule-based
Treatment of missing values for association rule-based tool commonality analysis in semiconductor manufacturing (RHC, CMF), pp. 886–891.
CASECASE-2012-ChenZAB #analysis #approach #performance #realtime
Real-time performance analysis of production lines: A system-theoretic approach (GC, LZ, JA, SB), pp. 656–661.
CASECASE-2012-ChoiFN #analysis #assembly
Vibration analysis in robotic ultrasonic welding for battery assembly (SC, TAF, SN), pp. 550–554.
CASECASE-2012-CostantinoDEFS #analysis #evaluation #fuzzy #novel #performance
A novel fuzzy Data Envelopment Analysis methodology for performance evaluation in a two-stage supply chain (NC, MD, NE, MF, FS), pp. 974–979.
CASECASE-2012-HoerningSWS #analysis #robust #simulation #tool support
Improving discrete event simulation in the emergency department with innovative and robust input analysis tools (SH, JS, TW, LS), pp. 131–136.
CASECASE-2012-Kim #analysis #fuzzy #robust
Robust stability analysis of T-S fuzzy systems with interval time-varying delays via a relaxation technique (SHK), pp. 829–832.
CASECASE-2012-LinKH #analysis #functional #modelling
Fitting a functional structural plant model based on global sensitivity analysis (YL, MK, JH), pp. 790–795.
CASECASE-2012-LiuJCLX #analysis #canonical #correlation #fault #identification #linear #research
Research on fault identification for complex system based on generalized linear canonical correlation analysis (DL, DJ, XC, AL, GX), pp. 474–478.
CASECASE-2012-QiaoWZ #analysis #clustering #petri net #scheduling #tool support
Petri net-based scheduling analysis of dual-arm cluster tools with wafer revisiting (YQ, NW, MZ), pp. 206–211.
CASECASE-2012-ShinPKA #analysis #linear
Structural analysis of built-in sensor frame in jaws with linear type gripper (DHS, TSP, YGK, JA), pp. 810–814.
CASECASE-2012-WangHDS #agile #analysis #protocol #simulation #using
Analysis of hospital rapid response protocols using simulation (SW, LEH, PD, CHS), pp. 315–322.
CASECASE-2012-YumKK #analysis #bibliography #perspective
Analysis of defective patterns on wafers in semiconductor manufacturing: A bibliographical review (BJY, JHK, SJK), pp. 86–90.
DACDAC-2012-AgostaBP #analysis
A code morphing methodology to automate power analysis countermeasures (GA, AB, GP), pp. 77–82.
DACDAC-2012-ChungJ #analysis #functional #performance
Functional timing analysis made fast and general (YTC, JHRJ), pp. 1055–1060.
DACDAC-2012-GhosalLRTPWTA #analysis #data access #data flow #semantics
Static dataflow with access patterns: semantics and analysis (AG, RL, KR, ST, AP, GW, TNT, HAA), pp. 656–663.
DACDAC-2012-JungPL #3d #reliability
Chip/package co-analysis of thermo-mechanical stress and reliability in TSV-based 3D ICs (MJ, DZP, SKL), pp. 317–326.
DACDAC-2012-KumarBKV #analysis #predict #source code #using
Early prediction of NBTI effects using RTL source code analysis (JAK, KMB, HK, SV), pp. 808–813.
DACDAC-2012-LoS #analysis #execution #monitoring #parallel #runtime #worst-case
Worst-case execution time analysis for parallel run-time monitoring (DL, GES), pp. 421–429.
DACDAC-2012-MeirR #analysis #biology #named #network #performance #using
BLAST: efficient computation of nonlinear delay sensitivities in electronic and biological networks using barycentric Lagrange enabled transient adjoint analysis (AM, JSR), pp. 301–310.
DACDAC-2012-RajendranPSK #analysis #logic #obfuscation #security
Security analysis of logic obfuscation (JR, YP, OS, RK), pp. 83–89.
DACDAC-2012-RoyC #analysis #predict
Predicting timing violations through instruction-level path sensitization analysis (SR, KC), pp. 1074–1081.
DACDAC-2012-UkhovBEP #analysis #embedded #multi #optimisation #reliability
Steady-state dynamic temperature analysis and reliability optimization for embedded multiprocessor systems (IU, MB, PE, ZP), pp. 197–204.
DACDAC-2012-WenZCWX #analysis #named #performance #reliability #scalability #statistics
PS3-RAM: a fast portable and scalable statistical STT-RAM reliability analysis method (WW, YZ, YC, YW, YX), pp. 1191–1196.
DACDAC-2012-ZhaoSL #3d #analysis
Analysis of DC current crowding in through-silicon-vias and its impact on power integrity in 3D ICs (XZ, MS, SKL), pp. 157–162.
DACDAC-2012-ZolotovSHFVXLV #analysis #statistics
Timing analysis with nonseparable statistical and deterministic variations (VZ, DS, JGH, EAF, CV, JX, JL, NV), pp. 1061–1066.
DATEDATE-2012-BesteT #analysis #robust #standard
Layout-Driven Robustness Analysis for misaligned Carbon Nanotubes in CNTFET-based standard cells (MB, MBT), pp. 1609–1614.
DATEDATE-2012-BozgaDHHLLT #analysis #embedded #modelling #state of the art #tool support
State-of-the-art tools and techniques for quantitative modeling and analysis of embedded systems (MB, AD, AH, HH, KGL, AL, JT), pp. 370–375.
DATEDATE-2012-CaiHMM #analysis #fault #memory management #metric
Error patterns in MLC NAND flash memory: Measurement, characterization, and analysis (YC, EFH, OM, KM), pp. 521–526.
DATEDATE-2012-ChangCM #analysis
RTL analysis and modifications for improving at-speed test (KHC, HZC, ILM), pp. 400–405.
DATEDATE-2012-Chaturvedi #static analysis
Static analysis of asynchronous clock domain crossings (SC), pp. 1122–1125.
DATEDATE-2012-JafariJL #analysis #scheduling #worst-case
Worst-case delay analysis of Variable Bit-Rate flows in network-on-chip with aggregate scheduling (FJ, AJ, ZL), pp. 538–541.
DATEDATE-2012-KnothJS #analysis #modelling
Current source modeling for power and timing analysis at different supply voltages (CK, HJ, US), pp. 923–928.
DATEDATE-2012-LiH #analysis #logic #named #performance #reliability
RAG: An efficient reliability analysis of logic circuits on graphics processing units (ML, MSH), pp. 316–319.
DATEDATE-2012-LinWCCCHYS #analysis #functional #mutation testing #probability
A probabilistic analysis method for functional qualification under Mutation Analysis (HYL, CYW, SCC, YCC, HMC, CYH, YCY, CCS), pp. 147–152.
DATEDATE-2012-LiuTW #analysis #approach #graph #parallel #statistics
Parallel statistical analysis of analog circuits by GPU-accelerated graph-based approach (XL, SXDT, HW), pp. 852–857.
DATEDATE-2012-MaricauJG #analysis #learning #multi #reliability #using
Hierarchical analog circuit reliability analysis using multivariate nonlinear regression and active learning sample selection (EM, DdJ, GGEG), pp. 745–750.
DATEDATE-2012-MarinhoNPP #analysis #float #scheduling
Preemption delay analysis for floating non-preemptive region scheduling (JM, VN, SMP, IP), pp. 497–502.
DATEDATE-2012-MasrurGCCAB #analysis #communication #cyber-physical #hybrid #protocol
Timing analysis of cyber-physical applications for hybrid communication protocols (AM, DG, SC, JJC, AA, AB), pp. 1233–1238.
DATEDATE-2012-MengC #3d #analysis #energy #performance #runtime
Analysis and runtime management of 3D systems with stacked DRAM for boosting energy efficiency (JM, AKC), pp. 611–616.
DATEDATE-2012-MiryalaCMP #analysis #network
IR-drop analysis of graphene-based power distribution networks (SM, AC, EM, MP), pp. 81–86.
DATEDATE-2012-NeogyR #analysis #design #injection
Analysis and design of sub-harmonically injection locked oscillators (AN, JSR), pp. 1209–1214.
DATEDATE-2012-OzTKT #analysis #parallel #thread #trade-off
Performance-reliability tradeoff analysis for multithreaded applications (IO, HRT, MTK, OT), pp. 893–898.
DATEDATE-2012-PerinTBM #analysis #implementation
Amplitude demodulation-based EM analysis of different RSA implementations (GP, LT, PB, PM), pp. 1167–1172.
DATEDATE-2012-PiscitelliP #analysis #design #hybrid
Design space pruning through hybrid analysis in system-level design space exploration (RP, ADP), pp. 781–786.
DATEDATE-2012-QuintonEBY #analysis #challenge #probability #roadmap
Challenges and new trends in probabilistic timing analysis (SQ, RE, DB, PMY), pp. 810–815.
DATEDATE-2012-QuintonHE #analysis #formal method #realtime
Formal analysis of sporadic overload in real-time systems (SQ, MH, RE), pp. 515–520.
DATEDATE-2012-RahimiBG #analysis
Analysis of instruction-level vulnerability to dynamic voltage and temperature variations (AR, LB, RKG), pp. 1102–1105.
DATEDATE-2012-RajendranPSK #analysis #encryption #fault #logic #perspective
Logic encryption: A fault analysis perspective (JR, YP, OS, RK), pp. 953–958.
DATEDATE-2012-RoxEG #analysis #design #network #using
Using timing analysis for the design of future switched based Ethernet automotive networks (JR, RE, PG), pp. 57–62.
DATEDATE-2012-SchrijenL #analysis #comparative
Comparative analysis of SRAM memories used as PUF primitives (GJS, VvdL), pp. 1319–1324.
DATEDATE-2012-TangZBM #analysis #correlation #modelling #statistics
Transistor-level gate model based statistical timing analysis considering correlations (QT, AZ, MB, NvdM), pp. 917–922.
DATEDATE-2012-ThieleE #analysis #data flow #graph #optimisation #performance
Optimizing performance analysis for synchronous dataflow graphs with shared resources (DT, RE), pp. 635–640.
DATEDATE-2012-TsaiLL #analysis #configuration management #design
Design and analysis of via-configurable routing fabrics for structured ASICs (HPT, RBL, LCL), pp. 1479–1482.
DATEDATE-2012-XuLHRHT #analysis #power management
Variation-aware leakage power model extraction for system-level hierarchical power analysis (YX, BL, RH, BR, CH, JT), pp. 346–351.
DATEDATE-2012-ZhangPM #3d #analysis #grid #power management
Voltage propagation method for 3-D power grid analysis (CZ, VFP, GDM), pp. 844–847.
DATEDATE-2012-ZimmermannBR #analysis #multi #power management
Analysis of multi-domain scenarios for optimized dynamic power management strategies (JZ, OB, WR), pp. 862–865.
DATEDATE-2012-ZohnerKSH #analysis
Side channel analysis of the SHA-3 finalists (MZ, MK, MS, SAH), pp. 1012–1017.
DocEngDocEng-2012-JunediGL #analysis #independence #revisited #xml
XML query-update independence analysis revisited (MJ, PG, NL), pp. 95–98.
DRRDRR-2012-ChazalonC #analysis #documentation #interactive #performance
Iterative analysis of document collections enables efficient human-initiated interaction (JC, BC).
HTHT-2012-AisoposPTV #analysis #comparative #microblog #sentiment
Content vs. context for sentiment analysis: a comparative analysis over microblogs (FA, GP, KT, TAV), pp. 187–196.
HTHT-2012-KlienS #analysis #network
Short links under attack: geographical analysis of spam in a URL shortener network (FK, MS), pp. 83–88.
HTHT-2012-NakajimaZIN #analysis #detection #scalability
Early detection of buzzwords based on large-scale time-series analysis of blog entries (SN, JZ, YI, RYN), pp. 275–284.
PODSPODS-2012-LetelierPPS #optimisation #query #semantics #static analysis #web
Static analysis and optimization of semantic web queries (AL, JP, RP, SS), pp. 89–100.
PODSPODS-2012-Mahoney #approximate #data analysis #scalability
Approximate computation and implicit regularization for very large-scale data analysis (MWM), pp. 143–154.
SIGMODSIGMOD-2012-EngleLXZFSS #data analysis #distributed #memory management #named #performance #using
Shark: fast data analysis using coarse-grained distributed memory (CE, AL, RX, MZ, MJF, SS, IS), pp. 689–692.
SIGMODSIGMOD-2012-MohanTSSC #data analysis #named #privacy
GUPT: privacy preserving data analysis made easy (PM, AT, ES, DS, DEC), pp. 349–360.
SIGMODSIGMOD-2012-YangZMWX #analysis #difference #privacy
Differential privacy in data publication and analysis (YY, ZZ, GM, MW, XX), pp. 601–606.
VLDBVLDB-2012-AlsubaieeAABBBCGHKLOPVW #analysis #big data #data transformation #named #open source
ASTERIX: An Open Source System for “Big Data” Management and Analysis (SA, YA, HA, AB, VRB, YB, MJC, RG, ZH, YSK, CL, NO, PP, RV, JW), pp. 1898–1901.
VLDBVLDB-2012-DalviMP #analysis #web
An Analysis of Structured Data on the Web (NND, AM, BP), pp. 680–691.
VLDBVLDB-2012-DasTADY #analysis #framework #what
Who Tags What? An Analysis Framework (MD, ST, SAY, GD, CY), pp. 1567–1578.
VLDBVLDB-2012-GawadeK #analysis #execution #framework #interactive #named #query #visual notation
Stethoscope: A platform for interactive visual analysis of query execution plans (MG, MLK), pp. 1926–1929.
VLDBVLDB-2012-LetelierPPS #analysis #named
SPAM: A SPARQL Analysis and Manipulation Tool (AL, JP, RP, SS), pp. 1958–1961.
VLDBVLDB-2012-RoyDMSW #analysis
Massive Genomic Data Processing and Deep Analysis (AR, YD, EM, YS, BLW), pp. 1906–1909.
VLDBVLDB-2012-Shim #algorithm #big data #data analysis #pipes and filters
MapReduce Algorithms for Big Data Analysis (KS), pp. 2016–2017.
VLDBVLDB-2012-SunHYY #analysis #approach #mining #network
Mining Knowledge from Interconnected Data: A Heterogeneous Information Network Analysis Approach (YS, JH, XY, PSY), pp. 2022–2023.
VLDBVLDB-2012-XuLGC #analysis #big data #clustering #in the cloud #interactive #named #visual notation
CloudVista: Interactive and Economical Visual Cluster Analysis for Big Data in the Cloud (HX, ZL, SG, KC), pp. 1886–1889.
VLDBVLDB-2012-ZhangZXYW #analysis #difference #functional #privacy
Functional Mechanism: Regression Analysis under Differential Privacy (JZ, ZZ, XX, YY, MW), pp. 1364–1375.
VLDBVLDB-2013-ZhaoT12 #analysis #network #scalability #social #visual notation
Large Scale Cohesive Subgraphs Discovery for Social Network Visual Analysis (FZ, AKHT), pp. 85–96.
ITiCSEITiCSE-2012-BrownPSE #analysis #complexity #generative #named
JUG: a JUnit generation, time complexity analysis and reporting tool to streamline grading (CB, RP, BS, JE), pp. 99–104.
TACASTACAS-2012-BouajjaniE #analysis #bound #message passing #source code
Bounded Phase Analysis of Message-Passing Programs (AB, ME), pp. 451–465.
TACASTACAS-2012-DSilvaHKT #analysis #bound #learning
Numeric Bounds Analysis with Conflict-Driven Learning (VD, LH, DK, MT), pp. 48–63.
TACASTACAS-2012-FehnkerGHMPT #analysis #automation #using
Automated Analysis of AODV Using UPPAAL (AF, RJvG, PH, AM, MP, WLT), pp. 173–187.
TACASTACAS-2012-FriedmannL #analysis #automaton
Ramsey-Based Analysis of Parity Automata (OF, ML), pp. 64–78.
TACASTACAS-2012-LoweW #analysis #contest
CPAchecker with Adjustable Predicate Analysis — (Competition Contribution) (SL, PW), pp. 528–530.
TACASTACAS-2012-ShvedMM #analysis #contest
Predicate Analysis with BLAST 2.7 — (Competition Contribution) (PS, MUM, VSM), pp. 525–527.
TACASTACAS-2012-WangTGLS #analysis #formal method
Reduction-Based Formal Analysis of BGP Instances (AW, CLT, AJTG, BTL, AS), pp. 283–298.
WRLAWRLA-2012-FadlisyahOA #analysis #formal method #modelling
Formal Modeling and Analysis of Human Body Exposure to Extreme Heat in HI-Maude (MF, PCÖ, ), pp. 139–161.
WRLAWRLA-2012-HillsKV #program analysis #rascal
Program Analysis Scenarios in Rascal (MH, PK, JJV), pp. 10–30.
WRLAWRLA-2012-WirsingEMM #analysis #architecture #design #maude
Design and Analysis of Cloud-Based Architectures with KLAIM and Maude (MW, JE, TM, JM), pp. 54–82.
CSMRCSMR-2012-Dovgalyuk #debugging #dynamic analysis #execution #multi
Deterministic Replay of System’s Execution with Multi-target QEMU Simulator for Dynamic Analysis and Reverse Debugging (PD), pp. 553–556.
CSMRCSMR-2012-GauthierM #case study #concept analysis #data access #modelling
Investigation of Access Control Models with Formal Concept Analysis: A Case Study (FG, EM), pp. 397–402.
CSMRCSMR-2012-GoulaoFWA #analysis #case study #comparative #evolution #predict #using
Software Evolution Prediction Using Seasonal Time Analysis: A Comparative Study (MG, NF, MW, FBeA), pp. 213–222.
CSMRCSMR-2012-HashimotoM #analysis #fine-grained #mining
Enhancing History-Based Concern Mining with Fine-Grained Change Analysis (MH, AM), pp. 75–84.
CSMRCSMR-2012-HoraADBCVM #analysis #debugging #visual notation
Bug Maps: A Tool for the Visual Exploration and Analysis of Bugs (AH, NA, SD, MUB, CC, MTV, JM), pp. 523–526.
CSMRCSMR-2012-JaszSBOG #impact analysis #using
Impact Analysis Using Static Execute After in WebKit (JJ, LS, ÁB, CO, TG), pp. 95–104.
CSMRCSMR-2012-KazatoHOMHS #concept analysis #feature model #multi
Feature Location for Multi-Layer System Based on Formal Concept Analysis (HK, SH, SO, SM, TH, MS), pp. 429–434.
CSMRCSMR-2012-KimKKB #analysis #database
Rebuilding a Unified Database Service via Context Analysis Method (WK, THK, SK, DHB), pp. 471–474.
CSMRCSMR-2012-LamkanfiD #analysis #debugging
Filtering Bug Reports for Fix-Time Analysis (AL, SD), pp. 379–384.
CSMRCSMR-2012-PerezDGM #analysis #ecosystem #named
SECONDA: Software Ecosystem Analysis Dashboard (JP, RD, MG, TM), pp. 527–530.
CSMRCSMR-2012-TerceiroMCC #analysis #complexity #comprehension #evolution
Understanding Structural Complexity Evolution: A Quantitative Analysis (ASdAT, MGM, CC, DSC), pp. 85–94.
ICPCICPC-2012-TenevD #analysis
Applying bioinformatics in the analysis of software variants (VLT, SD), pp. 259–260.
ICSMEICSM-2012-BauerHHJC #analysis #framework #incremental #quality #scalability
A framework for incremental quality analysis of large software systems (VB, LH, BH, EJ, MC), pp. 537–546.
ICSMEICSM-2012-BavotaQOLB #analysis #empirical #maintenance #smell #testing
An empirical analysis of the distribution of unit test smells and their impact on software maintenance (GB, AQ, RO, ADL, DB), pp. 56–65.
ICSMEICSM-2012-ChaikalisMC #analysis #evolution #named #network
SEANets: Software evolution analysis with networks (TC, GM, AC), pp. 634–637.
ICSMEICSM-2012-HindleBZN #analysis #developer #implementation #question #requirements #topic
Relating requirements to implementation via topic analysis: Do topics extracted from requirements make sense to managers and developers? (AH, CB, TZ, NN), pp. 243–252.
ICSMEICSM-2012-KimuraHIK #dynamic analysis #refactoring
Move code refactoring with dynamic analysis (SK, YH, HI, SK), pp. 575–578.
ICSMEICSM-2012-Pollock #analysis #challenge #natural language
Leveraging natural language analysis of software: Achievements, challenges, and opportunities (LLP), p. 4.
ICSMEICSM-2012-QuAR #impact analysis #testing #using
Configuration selection using code change impact analysis for regression testing (XQ, MA, BR), pp. 129–138.
ICSMEICSM-2012-RaemaekersDV #analysis #library
Measuring software library stability through historical version analysis (SR, AvD, JV), pp. 378–387.
ICSMEICSM-2012-RungtaPB #behaviour #evolution #impact analysis
A change impact analysis to characterize evolving program behaviors (NR, SP, JB), pp. 109–118.
ICSMEICSM-2012-Wilkerson #impact analysis #taxonomy
A software change impact analysis taxonomy (JWW), pp. 625–628.
ICSMEICSM-2012-YazdanshenasM #component #fine-grained #impact analysis #product line
Fine-grained change impact analysis for component-based product families (ARY, LM), pp. 119–128.
MSRMSR-2012-GigerPG #analysis #empirical #predict
Can we predict types of code changes? An empirical analysis (EG, MP, HCG), pp. 217–226.
MSRMSR-2012-GuanaRHS #analysis #android #architecture #multi
Do the stars align? Multidimensional analysis of Android’s layered architecture (VG, FR, AH, ES), pp. 124–127.
MSRMSR-2012-HarmanJZ #analysis #mining
App store mining and analysis: MSR for app stores (MH, YJ, YZ), pp. 108–111.
MSRMSR-2012-RotellaC #analysis #bibliography
Analysis of customer satisfaction survey data (PR, SC), pp. 88–97.
SCAMSCAM-2012-AftandilianSPK #compilation #java #program analysis #tool support #using
Building Useful Program Analysis Tools Using an Extensible Java Compiler (EA, RS, SP, SK), pp. 14–23.
SCAMSCAM-2012-GutzmannLL #analysis #framework #points-to
Collections Frameworks for Points-To Analysis (TG, JL, WL), pp. 4–13.
SCAMSCAM-2012-KargenS #analysis #comprehension #data flow #named
InputTracer: A Data-Flow Analysis Tool for Manual Program Comprehension of x86 Binaries (UK, NS), pp. 138–143.
SCAMSCAM-2012-LazarescuL #analysis #c #dependence #parallel #source code
Dynamic Trace-Based Data Dependency Analysis for Parallelization of C Programs (MTL, LL), pp. 126–131.
SCAMSCAM-2012-MayerS #analysis #refactoring
Cross-Language Code Analysis and Refactoring (PM, AS), pp. 94–103.
SCAMSCAM-2012-SchrettnerJGBG #clustering #dependence #impact analysis #using
Impact Analysis in the Presence of Dependence Clusters Using Static Execute after in WebKit (LS, JJ, TG, ÁB, TG), pp. 24–33.
SCAMSCAM-2012-Xie #analysis #testing
Cooperative Testing and Analysis: Human-Tool, Tool-Tool and Human-Human Cooperations to Get Work Done (TX), pp. 1–3.
SCAMSCAM-2012-ZollerS #java #named
AccessAnalysis: A Tool for Measuring the Appropriateness of Access Modifiers in Java Systems (CZ, AS), pp. 120–125.
WCREWCRE-2012-ClearySCSP #analysis #assembly #named
ATLANTIS — Assembly Trace Analysis Environment (BC, MADS, LC, MS, FP), pp. 505–506.
WCREWCRE-2012-HanZFHWS #analysis #android #comprehension #debugging #topic
Understanding Android Fragmentation with Topic Analysis of Vendor-Specific Bugs (DH, CZ, XF, AH, KW, ES), pp. 83–92.
WCREWCRE-2012-JanaN #detection #dynamic analysis #precise #using
Precise Detection of Uninitialized Variables Using Dynamic Analysis — Extending to Aggregate and Vector Types (AJ, RN), pp. 197–201.
WCREWCRE-2012-Kinder #obfuscation #static analysis #towards
Towards Static Analysis of Virtualization-Obfuscated Binaries (JK), pp. 61–70.
WCREWCRE-2012-SteidlHJ #analysis #network #recommendation #using
Using Network Analysis for Recommendation of Central Software Classes (DS, BH, EJ), pp. 93–102.
PEPMPEPM-2012-AlbertCPR #analysis #incremental #resource management
Incremental resource usage analysis (EA, JC, GP, GRD), pp. 25–34.
PLDIPLDI-2012-BenzHH #float #problem #program analysis
A dynamic program analysis to find floating-point accuracy problems (FB, AH, SH), pp. 453–462.
PLDIPLDI-2012-ChiwKRSS #analysis #domain-specific language #image #named #parallel #visualisation
Diderot: a parallel DSL for image analysis and visualization (CC, GK, JR, LS, NS), pp. 111–120.
PLDIPLDI-2012-HolewinskiRRFPRS #analysis
Dynamic trace-based analysis of vectorization potential of applications (JH, RR, MR, NF, LNP, AR, PS), pp. 371–382.
PLDIPLDI-2012-KruijfSJ #compilation #design #static analysis
Static analysis and compiler design for idempotent processing (MdK, KS, SJ), pp. 475–486.
PLDIPLDI-2012-LeeCFN #hybrid #named #program analysis
Chimera: hybrid program analysis for determinism (DL, PMC, JF, SN), pp. 463–474.
PLDIPLDI-2012-WuTHCY #analysis #parallel #precise #source code
Sound and precise analysis of parallel programs through schedule specialization (JW, YT, GH, HC, JY), pp. 205–216.
SASSAS-2012-Alonso-BlasG #approach #cost analysis #on the
On the Limits of the Classical Approach to Cost Analysis (DEAB, SG), pp. 405–421.
SASSAS-2012-CalvertM #analysis #calculus #control flow
Control Flow Analysis for the Join Calculus (PC, AM), pp. 181–197.
SASSAS-2012-GoubaultPV #composition #static analysis
Modular Static Analysis with Zonotopes (EG, SP, FV), pp. 24–40.
SASSAS-2012-HenryMM #abstract interpretation #algorithm #analysis #evaluation
Succinct Representations for Abstract Interpretation — Combined Analysis Algorithms and Experimental Evaluation (JH, DM, MM), pp. 283–299.
SASSAS-2012-HoweK #analysis #parametricity #using
Polyhedral Analysis Using Parametric Objectives (JMH, AK), pp. 41–57.
SASSAS-2012-KhedkerMR #analysis #pointer
Liveness-Based Pointer Analysis (UPK, AM, PSR), pp. 265–282.
SASSAS-2012-Ledesma-GarzaR #analysis #functional #higher-order #reachability #source code
Binary Reachability Analysis of Higher Order Functional Programs (RLG, AR), pp. 388–404.
SASSAS-2012-LeePMH #analysis #parallel #performance
Efficient May Happen in Parallel Analysis for Async-Finish Parallelism (JKL, JP, RM, HH), pp. 5–23.
SASSAS-2012-MadhavanRV #analysis #composition #higher-order #source code
Modular Heap Analysis for Higher-Order Programs (RM, GR, KV), pp. 370–387.
STOCSTOC-2012-BrandtIKK #analysis
An analysis of one-dimensional schelling segregation (CB, NI, GK, RK), pp. 789–804.
STOCSTOC-2012-BrunschR #analysis #multi #optimisation
Improved smoothed analysis of multiobjective optimization (TB, HR), pp. 407–426.
STOCSTOC-2012-ChanP #analysis #bound #fourier #network
Tight bounds for monotone switching networks via fourier analysis (SMC, AP), pp. 495–504.
FLOPSFLOPS-2012-TobitaTK #analysis #higher-order #model checking
Exact Flow Analysis by Higher-Order Model Checking (YT, TT, NK), pp. 275–289.
LATALATA-2012-NikolicS #analysis #array
Automaton-Based Array Initialization Analysis (DN, FS), pp. 420–432.
FMFM-2012-BeekMS #analysis #named #variability
VMC: A Tool for Product Variability Analysis (MHtB, FM, AS), pp. 450–454.
FMFM-2012-MinamideM #analysis #html #parsing #reachability #specification #testing
Reachability Analysis of the HTML5 Parser Specification and Its Application to Compatibility Testing (YM, SM), pp. 293–307.
FMFM-2012-NguyenSLDL #analysis
Improved BDD-Based Discrete Analysis of Timed Systems (TKN, JS, YL, JSD, YL), pp. 326–340.
FMFM-2012-OwreSS #analysis #automation #cyber-physical
Automatic Dimensional Analysis of Cyber-Physical Systems (SO, IS, NS), pp. 356–371.
IFMIFM-2012-BorgerCG #analysis #framework #web
Contribution to a Rigorous Analysis of Web Application Frameworks (EB, AC, VG), pp. 1–20.
IFMIFM-2012-KazemeyniJOB #analysis #modelling #network #probability
MULE-Based Wireless Sensor Networks: Probabilistic Modeling and Quantitative Analysis (FK, EBJ, OO, IB), pp. 143–157.
IFMIFM-2012-ZhangNN #model checking #revisited #static analysis
Model Checking as Static Analysis: Revisited (FZ, FN, HRN), pp. 99–112.
SEFMSEFM-2012-AyraultBDP #analysis #dependence #ml
ML Dependency Analysis for Assessors (PA, VB, CD, FP), pp. 278–292.
SEFMSEFM-2012-CuoqKKPSY #analysis #named #perspective
Frama-C — A Software Analysis Perspective (PC, FK, NK, VP, JS, BY), pp. 233–247.
SFMSFM-2012-Becker #analysis #model transformation #non-functional
Model Transformations in Non-functional Analysis (SB), pp. 263–289.
SFMSFM-2012-CortellessaMT #analysis #modelling #performance
Software Performance Antipatterns: Modeling and Analysis (VC, ADM, CT), pp. 290–335.
ICFPICFP-2012-EarlSMH #analysis #automaton #higher-order #source code
Introspective pushdown analysis of higher-order programs (CE, IS, MM, DVH), pp. 177–188.
ICFPICFP-2012-SimoesVFJH #analysis #automation #functional #lazy evaluation #memory management #source code
Automatic amortised analysis of dynamic memory allocation for lazy functional programs (HRS, PBV, MF, SJ, KH), pp. 165–176.
IFLIFL-2012-Fluet #analysis #control flow #system f
A Type- and Control-Flow Analysis for System F (MF), pp. 122–139.
GRAPHITEGRAPHITE-2012-BeckmannFKM #analysis #graph
A structural analysis of the A5/1 state transition graph (AB, JF, JK, UM), pp. 5–19.
CHICHI-2012-BaurBB #analysis #component #music #scalability
Listening factors: a large-scale principal components analysis of long-term music listening histories (DB, JB, AB), pp. 1273–1276.
CHICHI-2012-BrechtEBG #analysis #network #social
Corporate career presences on social network sites: an analysis of hedonic and utilitarian value (FB, AE, CB, OG), pp. 2441–2450.
CHICHI-2012-ChuangRMH #analysis #design #modelling #trust #visualisation
Interpretation and trust: designing model-driven visualizations for text analysis (JC, DR, CDM, JH), pp. 443–452.
CHICHI-2012-DixonFW #analysis #interface #using #visual notation
A general-purpose target-aware pointing enhancement using pixel-level analysis of graphical interfaces (MD, JF, JOW), pp. 3167–3176.
CHICHI-2012-FolstadLH #analysis #bibliography #evaluation #usability
Analysis in practical usability evaluation: a survey study (AF, EL, KH), pp. 2127–2136.
CHICHI-2012-KapteinR #analysis #statistics
Rethinking statistical analysis methods for CHI (MK, JR), pp. 1105–1114.
CHICHI-2012-MustafaLM #analysis #visual notation
EEG analysis of implicit human visual perception (MM, LL, MAM), pp. 513–516.
CHICHI-2012-WallnerK #analysis #approach #visualisation
A spatiotemporal visualization approach for the analysis of gameplay data (GW, SK), pp. 1115–1124.
CHICHI-2012-WillettHA #crowdsourcing #data analysis #social
Strategies for crowdsourcing social data analysis (WW, JH, MA), pp. 227–236.
CHICHI-2012-ZiemkiewiczGL #analysis #graph #visualisation
Analysis within and between graphs: observed user strategies in immunobiology visualization (CZ, SRG, DHL), pp. 1655–1658.
CSCWCSCW-2012-BorgeGSC #analysis #process
Patterns of team processes and breakdowns in information analysis tasks (MB, CHG, SIS, JMC), pp. 1105–1114.
CSCWCSCW-2012-EhrlichC #analysis #communication #development #distributed #multi #performance
All-for-one and one-for-all?: a multi-level analysis of communication patterns and individual performance in geographically distributed software development (KE, MC), pp. 945–954.
CSCWCSCW-2012-HarboeMIH #collaboration #data analysis #diagrams
Computer support for collaborative data analysis: augmenting paper affinity diagrams (GH, JM, II, EMH), pp. 1179–1182.
CSCWCSCW-2012-KeeganGC #analysis #collaboration #editing #multi #network #statistics #wiki
Do editors or articles drive collaboration?: multilevel statistical network analysis of wikipedia coauthorship (BK, DG, NSC), pp. 427–436.
CSCWCSCW-2012-McDonaldGZ #analysis #prototype #social #type system
Building for social translucence: a domain analysis and prototype system (DWM, SG, MZ), pp. 637–646.
CSCWCSCW-2012-NguyenF #analysis #how
How did you feel during our conversation?: retrospective analysis of intercultural and same-culture instant messaging conversations (DTN, SRF), pp. 117–126.
HILTHILT-2012-LiSRM #analysis #protocol #realtime #scheduling
Applicability of real-time schedulability analysis on a software radio protocol (SL, FS, SR, MB), pp. 81–94.
CAiSECAiSE-2012-ZawawyKMM #analysis #logic #markov #network #using
Requirements-Driven Root Cause Analysis Using Markov Logic Networks (HZ, KK, JM, SM), pp. 350–365.
EDOCEDOC-2012-BinzLNS #analysis #enterprise #graph transformation #segmentation
Improving the Manageability of Enterprise Topologies Through Segmentation, Graph Transformation, and Analysis Strategies (TB, FL, AN, DS), pp. 61–70.
EDOCEDOC-2012-BurattinMAS #analysis #declarative #process
Techniques for a Posteriori Analysis of Declarative Processes (AB, FMM, WMPvdA, AS), pp. 41–50.
EDOCEDOC-2012-WangWART #analysis #composition #ecosystem #modelling
Compositional QoS Modeling and Analysis of Cloud-based Federated Ecosystems (GW, HW, SA, RR, JPT), pp. 173–182.
ICEISICEIS-J-2012-AmarGMHLN12a #automation #concept analysis
Finding Semi-Automatically a Greatest Common Model Thanks to Formal Concept Analysis (BA, AOG, AM, MH, TL, CN), pp. 72–91.
ICEISICEIS-J-2012-GeJG #analysis #recommendation
Bringing Diversity to Recommendation Lists — An Analysis of the Placement of Diverse Items (MG, DJ, FG), pp. 293–305.
ICEISICEIS-v1-2012-AmarGMHLN #concept analysis #using
Using Formal Concept Analysis to Extract a Greatest Common Model (BA, AOG, AM, MH, TL, CN), pp. 27–37.
ICEISICEIS-v2-2012-ChenIAPGLMW #enterprise #impact analysis #scalability
Change Impact Analysis for Large-scale Enterprise Systems (WC, AI, AA, JP, CG, ML, TSEM, AW), pp. 359–368.
ICEISICEIS-v2-2012-FonteBCGH #evaluation #program analysis #using
Program Analysis and Evaluation using Quimera (DF, IVB, DCdC, ALG, PRH), pp. 209–219.
ICEISICEIS-v2-2012-PolasikGWKPT #analysis #mobile #process
Chronometric Analysis of a Payment Process for Cash, Cards and Mobile Devices (MP, JG, GW, JK, KP, NT), pp. 220–229.
ICEISICEIS-v2-2012-SemenovV #analysis #architecture #social #social media
Ontology-guided Social Media Analysis — System Architecture (AS, JV), pp. 335–341.
ICEISICEIS-v3-2012-BauerEFH #analysis #consistency #process
Resource-oriented Consistency Analysis of Engineering Processes (BB, TE, CF, BH), pp. 206–211.
ICEISICEIS-v3-2012-BonacinHRPB #analysis #aspect-oriented #challenge #problem #social
Interacting with Dynamic Social Knowledge — Revealing Challenges through an Analysis of Pragmatic Aspects of Problem Solving (RB, HHH, JCdR, RP, MCCB), pp. 54–63.
ICEISICEIS-v3-2012-CansadoVS #analysis #architecture #enterprise #multi #using
Using Multi-criteria Analysis to Evaluate Enterprise Architecture Scenarios (FC, AV, GS), pp. 232–237.
CIKMCIKM-2012-AmatiAG #analysis #microblog
Survival analysis for freshness in microblogging search (GA, GA, CG), pp. 2483–2486.
CIKMCIKM-2012-AshkanC #analysis #behaviour #modelling
Modeling browsing behavior for click analysis in sponsored search (AA, CLAC), pp. 2015–2019.
CIKMCIKM-2012-DengSZ #analysis #documentation #performance #scalability
Efficient jaccard-based diversity analysis of large document collections (FD, SS, SZ), pp. 1402–1411.
CIKMCIKM-2012-DybalaRAS #analysis #comparative #generative #ranking
Data filtering in humor generation: comparative analysis of hit rate and co-occurrence rankings as a method to choose usable pun candidates (PD, RR, KA, KS), pp. 2587–2590.
CIKMCIKM-2012-EldardiryN #analysis #classification #graph #how #predict
An analysis of how ensembles of collective classifiers improve predictions in graphs (HE, JN), pp. 225–234.
CIKMCIKM-2012-HuHXLUZ #analysis #mining
Finding nuggets in IP portfolios: core patent mining through textual temporal analysis (PH, MH, PX, WL, AKU, XZ), pp. 1819–1823.
CIKMCIKM-2012-JatowtT #analysis #scalability
Large scale analysis of changes in english vocabulary over recent time (AJ, KT), pp. 2523–2526.
CIKMCIKM-2012-JatowtT12a #analysis #comparative #readability #wiki
Is wikipedia too difficult?: comparative analysis of readability of wikipedia, simple wikipedia and britannica (AJ, KT), pp. 2607–2610.
CIKMCIKM-2012-Jin #analysis #multi #process #profiling
User activity profiling with multi-layer analysis (HJ), pp. 2030–2034.
CIKMCIKM-2012-KazaiCYT #analysis #fault #information retrieval
An analysis of systematic judging errors in information retrieval (GK, NC, EY, SMMT), pp. 105–114.
CIKMCIKM-2012-LeelanupabZJ #analysis #cumulative #parametricity
A comprehensive analysis of parameter settings for novelty-biased cumulative gain (TL, GZ, JMJ), pp. 1950–1954.
CIKMCIKM-2012-LiuW #analysis #on the #semantics
On the connections between explicit semantic analysis and latent semantic analysis (CL, YMW), pp. 1804–1808.
CIKMCIKM-2012-LiuZG #analysis #ranking
Full-text citation analysis: enhancing bibliometric and scientific publication ranking (XL, JZ, CG), pp. 1975–1979.
CIKMCIKM-2012-RahmanBH #algorithm #analysis #approximate #graph #named #scalability
GRAFT: an approximate graphlet counting algorithm for large graph analysis (MR, MB, MAH), pp. 1467–1471.
CIKMCIKM-2012-YueJHH #analysis #collaboration #query #web
Where do the query terms come from?: an analysis of query reformulation in collaborative web search (ZY, JJ, SH, DH), pp. 2595–2598.
ECIRECIR-2012-AlbakourKNASFR #analysis #query #web
Analysis of Query Reformulations in a Search Engine of a Local Web Site (MDA, UK, NN, IA, DS, MF, ANDR), pp. 517–521.
ECIRECIR-2012-Bloom #analysis #graph
Applying Power Graph Analysis to Weighted Graphs (NB), pp. 548–551.
ECIRECIR-2012-KarimzadehganZ #analysis #axiom #information retrieval
Axiomatic Analysis of Translation Language Model for Information Retrieval (MK, CZ), pp. 268–280.
ECIRECIR-2012-KarlgrenSOEH #analysis #sentiment
Usefulness of Sentiment Analysis (JK, MS, FO, FE, OH), pp. 426–435.
ECIRECIR-2012-ZucconAZW #analysis #retrieval #using
Top-k Retrieval Using Facility Location Analysis (GZ, LA, DZ, JW), pp. 305–316.
ICMLICML-2012-ChenCRCC #analysis #linear
Communications Inspired Linear Discriminant Analysis (MC, WRC, MRDR, LC, ARC), p. 196.
ICMLICML-2012-KalaitzisL #analysis #component
Residual Components Analysis (AAK, NDL), p. 73.
ICMLICML-2012-MairalY #analysis #complexity
Complexity Analysis of the Lasso Regularization Path (JM, BY), p. 238.
ICMLICML-2012-McAfeeO #code generation #network #static analysis
Utilizing Static Analysis and Code Generation to Accelerate Neural Networks (LCM, KO), p. 192.
ICMLICML-2012-MerchanteGG #analysis #approach #linear #performance
An Efficient Approach to Sparse Linear Discriminant Analysis (LFSM, YG, GG), p. 168.
ICMLICML-2012-PachauriCS #analysis #problem
Incorporating Domain Knowledge in Matching Problems via Harmonic Analysis (DP, MDC, VS), p. 112.
ICMLICML-2012-VogtR #analysis
A Complete Analysis of the l_1, p Group-Lasso (JEV, VR), p. 143.
ICMLICML-2012-XuYQ #composition #data analysis #infinity #modelling #multi #parametricity
Infinite Tucker Decomposition: Nonparametric Bayesian Models for Multiway Data Analysis (ZX, FY, AQ), p. 218.
ICMLICML-2012-YgerBGR #adaptation #analysis #canonical #correlation #matrix
Adaptive Canonical Correlation Analysis Based On Matrix Manifolds (FY, MB, GG, AR), p. 43.
ICMLICML-2012-YuS #analysis #kernel
Analysis of Kernel Mean Matching under Covariate Shift (YY, CS), p. 150.
ICPRICPR-2012-Abdel-HakimE #analysis #component #named #online #performance #robust
FRPCA: Fast Robust Principal Component Analysis for online observations (AEAH, MES), pp. 413–416.
ICPRICPR-2012-AbouelenienY #analysis #fault #named #performance
SampleBoost: Improving boosting performance by destabilizing weak learners based on weighted error analysis (MA, XY), pp. 585–588.
ICPRICPR-2012-AiDHC #analysis #component #feature model #independence #multi
Multiple feature selection and fusion based on generalized N-dimensional independent component analysis (DA, GD, XHH, YWC), pp. 971–974.
ICPRICPR-2012-AjmeraD #analysis #detection #word
Combining text and prosodic analysis for prominent word detection (JA, ODD), pp. 1534–1537.
ICPRICPR-2012-BenJY #analysis #automation #clustering #fuzzy
Automatic fuzzy clustering based on mistake analysis (SB, ZJ, JY), pp. 2914–2917.
ICPRICPR-2012-CantoniOFP #analysis
Structural analysis of protein Secondary Structure by GHT (VC, OO, AF, AP), pp. 1767–1770.
ICPRICPR-2012-ChenHCHC #analysis #using
Occluded human action analysis using dynamic manifold model (LCC, JWH, CHC, CYH, DYC), pp. 1245–1248.
ICPRICPR-2012-ChenYY #analysis #null #recognition #scalability
Large margin null space discriminant analysis with applications to face recognition (XC, JY, WY), pp. 1679–1682.
ICPRICPR-2012-ElnakibNCPGE #3d #analysis #quantifier #using
Quantification of age-related brain cortex change using 3D shape analysis (AE, MN, MC, HYP, GLG, AEB), pp. 41–44.
ICPRICPR-2012-ErYAK #analysis #modelling
Traffic accident risk analysis based on relation of Common Route Models (UE, SY, OA, MEK), pp. 2561–2564.
ICPRICPR-2012-GaoM #analysis #canonical #correlation #detection #kernel #multi #using
Multi-modality movie scene detection using Kernel Canonical Correlation Analysis (GG, HM), pp. 3074–3077.
ICPRICPR-2012-GhoshC #analysis #automation #classification
Feature analysis for automatic classification of HEp-2 florescence patterns : Computer-Aided Diagnosis of Auto-immune diseases (SG, VC), pp. 174–177.
ICPRICPR-2012-GuiST #analysis #estimation #parametricity
Regularization parameter estimation for spectral regression discriminant analysis based on perturbation theory (JG, ZS, TT), pp. 401–404.
ICPRICPR-2012-HuangA #analysis #detection #perspective
Saliency detection via divergence analysis: A unified perspective (JBH, NA), pp. 2748–2751.
ICPRICPR-2012-HuangL #analysis #automation #component #detection #independence
Automated mitosis detection based on eXclusive Independent Component Analysis (CHH, HKL), pp. 1856–1859.
ICPRICPR-2012-Iwata #analysis #optimisation
Placing landmarks suitably for shape analysis by optimization (KI), pp. 2359–2362.
ICPRICPR-2012-JoshiDGBP #analysis #classification
Neural-net classification for spatio-temporal descriptor based depression analysis (JJ, AD, RG, MB, GP), pp. 2634–2638.
ICPRICPR-2012-KimuraSKS #analysis #component #design
Designing various component analysis at will (AK, HS, HK, MS), pp. 2959–2962.
ICPRICPR-2012-KorffFKSBPS #analysis #image #library #recognition
Compound color recognition via image analysis on high-throughput compound libraries (MvK, JF, AK, JS, GB, OP, TS), pp. 1289–1293.
ICPRICPR-2012-KostopoulouZMV #2d #analysis #image
2D-GE image analysis focusing on elimination of spurious spots (EK, EZ, DM, AV), pp. 1627–1630.
ICPRICPR-2012-KrawczykS #analysis #classification #effectiveness #multi
Effective multiple classifier systems for breast thermogram analysis (BK, GS), pp. 3345–3348.
ICPRICPR-2012-LeiLL #analysis #feature model #linear #performance #recognition
Efficient feature selection for linear discriminant analysis and its application to face recognition (ZL, SL, SZL), pp. 1136–1139.
ICPRICPR-2012-LiuF #analysis #kernel #multi
Multiple kernel discriminant analysis (XZL, GCF), pp. 1691–1694.
ICPRICPR-2012-LiuL #analysis #detection #learning #multi
Unsupervised multi-target trajectory detection, learning and analysis in complicated environments (HL, JL), pp. 3716–3720.
ICPRICPR-2012-LuuSBS #adaptation #analysis #multi
Compressed Submanifold Multifactor Analysis with adaptive factor structures (KL, MS, TDB, CYS), pp. 2715–2718.
ICPRICPR-2012-MoriyamaAS #analysis #using
Face analysis of aggressive moods in automobile driving using mutual subspace method (TM, KA, NS), pp. 2898–2901.
ICPRICPR-2012-MoyouP #analysis
Shape analysis on the hypersphere of wavelet densities (MM, AMP), pp. 2091–2094.
ICPRICPR-2012-Noh #analysis #classification #learning #metric #nearest neighbour
χ2 Metric learning for nearest neighbor classification and its analysis (SN), pp. 991–995.
ICPRICPR-2012-Ohtsuka #analysis #detection
Advanced ridge flux analysis for fingerprint minutiae detection (TO), pp. 1225–1228.
ICPRICPR-2012-PangHYQW #analysis #classification #learning
Theoretical analysis of learning local anchors for classification (JP, QH, BY, LQ, DW), pp. 1803–1806.
ICPRICPR-2012-ParisHG #analysis #categorisation #image #towards
Sparse coding for histograms of local binary patterns applied for image categorization: Toward a Bag-of-Scenes analysis (SP, XH, HG), pp. 2817–2820.
ICPRICPR-2012-RingJKE #analysis #classification #complexity #design #embedded #performance
Software-based performance and complexity analysis for the design of embedded classification systems (MR, UJ, PK, BE), pp. 2266–2269.
ICPRICPR-2012-SantosFTRGPF #analysis #classification #correlation #image #multi
Descriptor correlation analysis for remote sensing image multi-scale classification (JAdS, FAF, RdST, AR, PHG, SPF, AXF), pp. 3078–3081.
ICPRICPR-2012-SchaeferD #analysis #multi
Multi-dimensional local binary pattern descriptors for improved texture analysis (GS, NPD), pp. 2500–2503.
ICPRICPR-2012-ShaoS #analysis #distance #reduction
Fractional-step max-min distance analysis for dimension reduction (GS, NS), pp. 396–400.
ICPRICPR-2012-ShenMZ #analysis #graph #learning #online
Unsupervised online learning trajectory analysis based on weighted directed graph (YS, ZM, JZ), pp. 1306–1309.
ICPRICPR-2012-StammD #analysis #documentation
Searching attentive tasks with document analysis evidences and Dempster-Shafer theory (KS, AD), pp. 529–532.
ICPRICPR-2012-SuWF #analysis #canonical #correlation #evaluation #generative
Evaluation of canonical correlation analysis: A Correlation Generation Model (YS, SW, YF), pp. 1751–1754.
ICPRICPR-2012-TangZKC #analysis #forensics #image #visualisation
Visualizing vein patterns from color skin images based on image mapping for forensics analysis (CT, HZ, AWKK, NC), pp. 2387–2390.
ICPRICPR-2012-TawariT #analysis
Audio-visual data association for face expression analysis (AT, MMT), pp. 1120–1123.
ICPRICPR-2012-WangGFC #analysis #segmentation
Curvature-driven volumetric segmentation of binary shapes: An application to snow microstructure analysis (XW, LG, FF, DC), pp. 742–745.
ICPRICPR-2012-WangSCPZ #analysis #component #feature model #named
STPCA: Sparse tensor Principal Component Analysis for feature extraction (SW, MS, YHC, EPP, CZ), pp. 2278–2281.
ICPRICPR-2012-WilkinsonO #analysis #documentation
Mask-edge connectivity: Theory, computation, and application to historical document analysis (MHFW, JO), pp. 1334–1337.
ICPRICPR-2012-YokotaHKW #analysis #estimation #image
Estimation of earthquake ground motion by image analysis of sliding objects taken with a fixed camera (AY, TH, HK, TW), pp. 784–787.
ICPRICPR-2012-ZhangLC #analysis #detection #multi #novel
A novel spatial-temporal multi-scale method for detection and analysis of infrared multiple moving objects (TZ, HL, JC), pp. 1884–1887.
KDDKDD-2012-KangPHF #algorithm #analysis #named #scalability
GigaTensor: scaling tensor analysis up by 100 times — algorithms and discoveries (UK, EEP, AH, CF), pp. 316–324.
KDDKDD-2012-LiuSZFNW #data analysis #named #visualisation
AssocExplorer: an association rule visualization system for exploratory data analysis (GL, AS, HZ, MF, SKN, LW), pp. 1536–1539.
KDDKDD-2012-MiaoGMYTAS #analysis #documentation
Latent association analysis of document pairs (GM, ZG, LEM, XY, ST, NA, JS), pp. 1415–1423.
KDDKDD-2012-SongCWWYD #analysis #behaviour
Coupled behavior analysis for capturing coupling relationships in group-based market manipulations (YS, LC, XW, GW, WY, WD), pp. 976–984.
KDDKDD-2012-TangWYHZYGHXLU #analysis #mining #named #topic
PatentMiner: topic-driven patent analysis and mining (JT, BW, YY, PH, YZ, XY, BG, MH, PX, WL, AKU), pp. 1366–1374.
KDDKDD-2012-Ueda #data analysis #relational
Bayesian relational data analysis (NU), p. 815.
KDDKDD-2012-YuanWTNY #analysis #learning #multi
Multi-source learning for joint analysis of incomplete multi-modality neuroimaging data (LY, YW, PMT, VAN, JY), pp. 1149–1157.
KDDKDD-2012-YuZSWWQZ #analysis #data mining #in the cloud #mining #named #network #social
BC-PDM: data mining, social network analysis and text mining system based on cloud computing (LY, JZ, WCS, BW, BW, LQ, BRZ), pp. 1496–1499.
KDDKDD-2012-ZhaoDWX #analysis #named #sentiment #twitter
MoodLens: an emoticon-based sentiment analysis system for chinese tweets (JZ, LD, JW, KX), pp. 1528–1531.
KDDKDD-2012-ZhouQM #behaviour #data analysis #social #social media
Social media data analysis for revealing collective behaviors (AZ, WQ, HM), p. 1402.
KDIRKDIR-2012-BressoGDNS #3d #concept analysis #learning #relational
Formal Concept Analysis for the Interpretation of Relational Learning Applied on 3D Protein-binding Sites (EB, RG, MDD, AN, MST), pp. 111–120.
KDIRKDIR-2012-FukumotoMM #analysis #collaboration #recommendation #sentiment
Collaborative Filtering based on Sentiment Analysis of Guest Reviews for Hotel Recommendation (FF, CM, SM), pp. 193–198.
KDIRKDIR-2012-Machado #analysis #image #retrieval
Factor Analysis and the Retrieval of Medical Images Depicting Structures with Similar Shapes (AMCM), pp. 175–180.
KDIRKDIR-2012-MountassirBB #analysis #problem #semistructured data #sentiment #set
Addressing the Problem of Unbalanced Data Sets in Sentiment Analysis (AM, HB, IB), pp. 306–311.
KDIRKDIR-2012-SpiegelA #analysis #distance #invariant
An Order-invariant Time Series Distance Measure — Position on Recent Developments in Time Series Analysis (SS, SA), pp. 264–268.
KDIRKDIR-2012-UddinAH #analysis #network #social
New Directions in the Analysis of Social Network Dynamics (MSU, SRA, LH), pp. 269–274.
KEODKEOD-2012-HlomaniS #analysis #framework #towards #workflow
Towards an Ontology-driven Framework for Workflow Analysis (HH, DAS), pp. 405–410.
KEODKEOD-2012-LinharesD #analysis #functional #geometry
Geometric Knowledge Analysis based in Part Functional Descriptions (JCL, AD), pp. 307–313.
KMISKMIS-2012-MarsanCE #analysis #behaviour #enterprise #framework #information management #scalability #tool support #using
Factors Influencing the Behavioral Intention of using Enterprise 2.0 Tools as a Knowledge Management Platform — An Analysis of the UTAUT Model in an Large Real Estate Company (BM, LC, EE), pp. 281–284.
KMISKMIS-2012-PanTG #analysis #component
A Component-based Method for Stakeholder Analysis (YCP, YT, SRG), pp. 290–293.
KRKR-2012-CohnRS #analysis #representation #video
Thinking Inside the Box: A Comprehensive Spatial Representation for Video Analysis (AGC, JR, MS).
MLDMMLDM-2012-KalpakisYHMSSS #analysis #permutation #predict #using
Outcome Prediction for Patients with Severe Traumatic Brain Injury Using Permutation Entropy Analysis of Electronic Vital Signs Data (KK, SY, PFMH, CFM, LGS, DMS, TMS), pp. 415–426.
MLDMMLDM-2012-MondalPMMB #approach #clustering #concept analysis #mining #using
A New Approach for Association Rule Mining and Bi-clustering Using Formal Concept Analysis (KCM, NP, AM, UM, SB), pp. 86–101.
MLDMMLDM-2012-StaroszczykOM #analysis #comparative #feature model #recognition
Comparative Analysis of Feature Selection Methods for Blood Cell Recognition in Leukemia (TS, SO, TM), pp. 467–481.
SEKESEKE-2012-ChenCZS #analysis #approach #integration
A Model-centric Approach for the Integration of Software Analysis Methods (XC, JC, ZZ, LS), pp. 211–216.
SEKESEKE-2012-DingM #analysis #fuzzy #modelling
Modeling and Analysis of Switched Fuzzy Systems (ZD, JM), pp. 135–138.
SEKESEKE-2012-DuttaUA #analysis #approach #automation #semantics #verification
Requirement Analysis and Automated Verification: A Semantic Approach (AD, PDU, SA), pp. 51–54.
SEKESEKE-2012-JangidPE #analysis #mobile #predict #sentiment #using
A Mobile Application for Stock Market Prediction Using Sentiment Analysis (KJ, PP, ME), pp. 13–18.
SEKESEKE-2012-LiuMLS #analysis #non-functional #specification
Risk-driven Non-functional Requirement Analysis and Specification (YL, ZM, HL, WS), pp. 55–60.
SEKESEKE-2012-LiuZSH #analysis #architecture #modelling #named
SAMAT — A Tool for Software Architecture Modeling and Analysis (SL, RZ, ZS, XH), pp. 352–358.
SEKESEKE-2012-MaZQQXY #analysis #dependence #design pattern #identification #using
Identification of Design Patterns Using Dependence Analysis (WM, XZ, XQ, JQ, LX, RY), pp. 289–292.
SEKESEKE-2012-ShinKKJR #configuration management #dependence #impact analysis #using
Reconfiguration of Robot Applications using Data Dependency and Impact Analysis (MES, TK, SK, SJ, MR), pp. 684–687.
SEKESEKE-2012-SunLTZ #impact analysis #testing #using
Using FCA-based Change Impact Analysis for Regression Testing (XS, BL, CT, QZ), pp. 452–457.
SEKESEKE-2012-VegiFCOB #analysis #named
DC2AP: A Dublin Core Application Profile to Analysis Patterns (LFdMV, JLF, GLdSC, AdPO, JLB), pp. 511–516.
SEKESEKE-2012-WangL #analysis #approach #modelling #petri net #workflow
Resource Modeling and Analysis for Workflows: A Petri Net Approach (JW, DL), pp. 381–386.
SEKESEKE-2012-ZhangLS #graph #impact analysis #mining
Mining Call Graph for Change Impact Analysis (QZ, BL, XS), pp. 7–12.
SIGIRSIGIR-2012-ChaC #analysis #modelling #topic #using
Social-network analysis using topic models (YC, JC), pp. 565–574.
SIGIRSIGIR-2012-ChinS #analysis
Survival analysis of click logs (SCC, WNS), pp. 1149–1150.
SIGIRSIGIR-2012-NunzioS #classification #data analysis #naive bayes #visual notation
A visual tool for bayesian data analysis: the impact of smoothing on naive bayes text classifiers (GMDN, AS), p. 1002.
SIGIRSIGIR-2012-YangLLR #analysis #graph #twitter
Finding interesting posts in Twitter based on retweet graph analysis (MCY, JTL, SWL, HCR), pp. 1073–1074.
MODELSMoDELS-2012-MaraeeB #analysis #comparative #constraints #guidelines #modelling #recommendation #uml
Inter-association Constraints in UML2: Comparative Analysis, Usage Recommendations, and Modeling Guidelines (AM, MB), pp. 302–318.
MODELSMoDELS-2012-NejatiASB #analysis #cpu #embedded #modelling #safety #testing
Modeling and Analysis of CPU Usage in Safety-Critical Embedded Systems to Support Stress Testing (SN, SDA, MS, LCB), pp. 759–775.
MODELSMoDELS-2012-ShinJB #analysis #empirical #evaluation #modelling #mutation testing #test coverage #using
Empirical Evaluation on FBD Model-Based Test Coverage Criteria Using Mutation Analysis (DS, EJ, DHB), pp. 465–479.
MODELSMoDELS-2012-WilliamsBPP #analysis #modelling
Sensitivity Analysis in Model-Driven Engineering (JRW, FRB, RFP, FACP), pp. 743–758.
MODELSMoDELS-2012-MaraeeB #analysis #comparative #constraints #guidelines #modelling #recommendation #uml
Inter-association Constraints in UML2: Comparative Analysis, Usage Recommendations, and Modeling Guidelines (AM, MB), pp. 302–318.
MODELSMoDELS-2012-NejatiASB #analysis #cpu #embedded #modelling #safety #testing
Modeling and Analysis of CPU Usage in Safety-Critical Embedded Systems to Support Stress Testing (SN, SDA, MS, LCB), pp. 759–775.
MODELSMoDELS-2012-ShinJB #analysis #empirical #evaluation #modelling #mutation testing #test coverage #using
Empirical Evaluation on FBD Model-Based Test Coverage Criteria Using Mutation Analysis (DS, EJ, DHB), pp. 465–479.
MODELSMoDELS-2012-WilliamsBPP #analysis #modelling
Sensitivity Analysis in Model-Driven Engineering (JRW, FRB, RFP, FACP), pp. 743–758.
ECOOPECOOP-2012-DeD #analysis #java #pointer #scalability
Scalable Flow-Sensitive Pointer Analysis for Java with Strong Updates (AD, DD), pp. 665–687.
ECOOPECOOP-2012-DohertyH #framework #matlab #named #static analysis
McSAF: A Static Analysis Framework for MATLAB (JD, LJH), pp. 132–155.
ECOOPECOOP-2012-KarimDGS #analysis #framework
An Analysis of the Mozilla Jetpack Extension Framework (RK, MD, VG, CcS), pp. 333–355.
ECOOPECOOP-2012-MorandatHOV #data analysis #design
Evaluating the Design of the R Language — Objects and Functions for Data Analysis (FM, BH, LO, JV), pp. 104–131.
ECOOPECOOP-2012-SridharanDCST #analysis #correlation #javascript #points-to
Correlation Tracking for Points-To Analysis of JavaScript (MS, JD, SC, MS, FT), pp. 435–458.
OOPSLAOOPSLA-2012-BaoZZ #nondeterminism #program analysis
White box sampling in uncertain data processing enabled by program analysis (TB, YZ, XZ), pp. 897–914.
OOPSLAOOPSLA-2012-MusluBHEN #analysis #development #ide #recommendation
Speculative analysis of integrated development environment recommendations (KM, YB, RH, MDE, DN), pp. 669–682.
OOPSLAOOPSLA-2012-SiddiquiK #analysis #execution #scalability #symbolic computation #using
Scaling symbolic execution using ranged analysis (JHS, SK), pp. 523–536.
LOPSTRLOPSTR-2012-ChristiansenHLP #data analysis #declarative #pipes and filters
A Declarative Pipeline Language for Complex Data Analysis (HC, CTH, OTL, MP), pp. 17–34.
LOPSTRLOPSTR-2012-MantelS #analysis #data flow #dependence
Types vs. PDGs in Information Flow Analysis (HM, HS), pp. 106–121.
LOPSTRLOPSTR-2012-Zinn #program analysis #reasoning
Program Analysis and Manipulation to Reproduce Learners’ Erroneous Reasoning (CZ), pp. 228–243.
QAPLQAPL-2012-GazeauMP #analysis #float #robust #source code
A non-local method for robustness analysis of floating point programs (IG, DM, CP), pp. 63–76.
POPLPOPL-2012-BouajjaniE #analysis #parallel #recursion #source code
Analysis of recursively parallel programs (AB, ME), pp. 203–214.
RERE-2012-Alexandrova #analysis #development #legacy #requirements
Business requirements analysis and development for legacy system replacement projects in government organizations (AA), pp. 337–340.
RERE-2012-CailliauL #analysis #framework #probability
A probabilistic framework for goal-oriented risk analysis (AC, AvL), pp. 201–210.
RERE-2012-LutzLLKMSBH #analysis #product line #requirements
Requirements analysis for a product family of DNA nanodevices (RRL, JHL, JIL, THK, DM, DMS, TB, ERH), pp. 211–220.
REFSQREFSQ-2012-BruniFST #analysis #automation #multimodal #perspective #requirements #research
Automatic Analysis of Multimodal Requirements: A Research Preview (EB, AF, NS, GT), pp. 218–224.
REFSQREFSQ-2012-Radlinski #analysis #empirical #quality #requirements
Empirical Analysis of the Impact of Requirements Engineering on Software Quality (LR), pp. 232–238.
REFSQREFSQ-2012-RaspotnigO #analysis #case study #diagrams #sequence chart
Supporting Failure Mode and Effect Analysis: A Case Study with Failure Sequence Diagrams (CR, ALO), pp. 117–131.
REFSQREFSQ-2012-WangLWZW #approach #dependence #impact analysis #simulation
A Simulation Approach for Impact Analysis of Requirement Volatility Considering Dependency Change (JW, JL, QW, HZ, HW), pp. 59–76.
SACSAC-2012-BalduzziZBKL #analysis #security
A security analysis of amazon’s elastic compute cloud service (MB, JZ, DB, EK, SL), pp. 1427–1434.
SACSAC-2012-ChebaroKGJ #dynamic analysis #slicing #verification
Program slicing enhances a verification technique combining static and dynamic analysis (OC, NK, AG, JJ), pp. 1284–1291.
SACSAC-2012-DasguptaK #analysis #precise #using
Precise shape analysis using field sensitivity (SD, AK), pp. 1300–1307.
SACSAC-2012-DestefanisTCM #analysis #anti #java #scalability
An analysis of anti-micro-patterns effects on fault-proneness in large Java systems (GD, RT, GC, MM), pp. 1251–1253.
SACSAC-2012-DragoB #analysis #architecture #design #graph #manycore #named
DAG3: a tool for design and analysis of applications for multicore architectures (MLD, JB), pp. 1159–1164.
SACSAC-2012-GomesP #analysis #interactive #social
A media-based social interactions analysis procedure (AKG, MdGCP), pp. 1018–1024.
SACSAC-2012-KhucSRR #analysis #distributed #scalability #sentiment #towards #twitter
Towards building large-scale distributed systems for twitter sentiment analysis (VNK, CS, RR, JR), pp. 459–464.
SACSAC-2012-MengHO #algorithm #analysis #search-based
Analysis of a triploid genetic algorithm over deceptive landscapes (LM, SH, CO), pp. 244–249.
SACSAC-2012-NetoA #analysis #process
Keeping decisions and rationale explicit in business process analysis (MSdSN, RMdA), pp. 1702–1708.
SACSAC-2012-NunesARTCS #analysis #data type
To be or not to be real: fractal analysis of data streams from a regional climate change model (SAN, AMHdÁ, LASR, AJMT, PPC, EPMdS), pp. 831–832.
SACSAC-2012-SantosCSLB #analysis #heuristic #identification #modelling #process
Analysis of heuristics to identify crosscutting concerns in business process models (FJNS, CC, FMS, JCSdPL, TVB), pp. 1725–1726.
SACSAC-2012-SarroMFG #algorithm #analysis #fault #predict #search-based
A further analysis on the use of Genetic Algorithm to configure Support Vector Machines for inter-release fault prediction (FS, SDM, FF, CG), pp. 1215–1220.
SACSAC-2012-SchaadB #analysis #automation #named
TAM2: automated threat analysis (AS, MB), pp. 1103–1108.
SACSAC-2012-ScholteRBK #analysis #empirical #validation #web
An empirical analysis of input validation mechanisms in web applications and languages (TS, WKR, DB, EK), pp. 1419–1426.
SACSAC-2012-SwainCNB #analysis #markov #performance #using
Performance analysis of IEEE 802.11 IBSS power save mode using a discrete-time markov model (PS, SC, SN, PB), pp. 631–633.
SACSAC-2012-ZanioliFC #information management #named #static analysis
SAILS: static analysis of information leakage with sample (MZ, PF, AC), pp. 1308–1313.
FSEFSE-2012-AcharyaR #impact analysis #industrial #slicing
Practical change impact analysis based on static program slicing for industrial software systems (MA, BR), p. 13.
FSEFSE-2012-BirdZ #analysis #branch
Assessing the value of branches with what-if analysis (CB, TZ), p. 45.
FSEFSE-2012-GanaiLG #analysis #concurrent #multi #named #source code #thread
DTAM: dynamic taint analysis of multi-threaded programs for relevancy (MKG, DL, AG), p. 46.
FSEFSE-2012-RayWK #analysis #migration #named
REPERTOIRE: a cross-system porting analysis tool for forked software projects (BR, CW, MK), p. 8.
FSEFSE-2012-VisserGD #constraints #named #program analysis #reuse
Green: reducing, reusing and recycling constraints in program analysis (WV, JG, MBD), p. 58.
FSEFSE-2012-WangZXXM #analysis #automation #collaboration #hybrid #web
Automating presentation changes in dynamic web applications via collaborative hybrid analysis (XW, LZ, TX, YX, HM), p. 16.
FSEFSE-2012-ZhangKK #evolution #fault #impact analysis #java #named #source code
FaultTracer: a change impact and regression fault analysis tool for evolving Java programs (LZ, MK, SK), p. 40.
ICSEICSE-2012-AlkhalafBG #analysis #string #using #validation #verification
Verifying client-side input validation functions using string analysis (MA, TB, JLG), pp. 947–957.
ICSEICSE-2012-BhattacharyaINF #analysis #evolution #graph #predict
Graph-based analysis and prediction for software evolution (PB, MI, IN, MF), pp. 419–429.
ICSEICSE-2012-Camilli #analysis #in the cloud #petri net
Petri nets state space analysis in the cloud (MC), pp. 1638–1640.
ICSEICSE-2012-EsteveKNPY #analysis #correctness #dependence #performance #safety
Formal correctness, safety, dependability, and performance analysis of a satellite (MAE, JPK, VYN, BP, YY), pp. 1022–1031.
ICSEICSE-2012-GethersDKP #impact analysis
Integrated impact analysis for managing software changes (MG, BD, HHK, DP), pp. 430–440.
ICSEICSE-2012-Ghardallou #analysis #invariant #termination #using
Using invariant relations in the termination analysis of while loops (WG), pp. 1519–1522.
ICSEICSE-2012-Jaafar #analysis #evolution #on the #source code
On the analysis of evolution of software artefacts and programs (FJ), pp. 1563–1566.
ICSEICSE-2012-Johnson #case study #question #static analysis #tool support #using #why
A study on improving static analysis tools: Why are we not using them? (BJ), pp. 1607–1609.
ICSEICSE-2012-MesbahM #analysis #automation #css #maintenance
Automated analysis of CSS rules to support style maintenance (AM, SM), pp. 408–418.
ICSEICSE-2012-NguyenKWF #array #dynamic analysis #invariant #polynomial #using
Using dynamic analysis to discover polynomial and array invariants (TN, DK, WW, SF), pp. 683–693.
ICSEICSE-2012-NguyenNDKS #analysis #developer #fault
Inferring developer expertise through defect analysis (TTN, TNN, ED, TK, PS), pp. 1297–1300.
ICSEICSE-2012-Schulte #analysis #automation #industrial
Ten years of automated code analysis at Microsoft (Invited industrial talk) (WS), p. 1001.
ICSEICSE-2012-ShahzadSL #analysis #lifecycle #scalability
A large scale exploratory analysis of software vulnerability life cycles (MS, MZS, AXL), pp. 771–781.
ICSEICSE-2012-SunSPR #mining #static analysis
Extending static analysis by mining project-specific rules (BS, GS, AP, BR), pp. 1054–1063.
ICSEICSE-2012-TamrawiNNN #analysis #evaluation #symbolic computation
Build code analysis with symbolic evaluation (AT, HAN, HVN, TNN), pp. 650–660.
ICSEICSE-2012-UddinDR #analysis #api #concept
Temporal analysis of API usage concepts (GU, BD, MPR), pp. 804–814.
ICSEICSE-2012-Vetro #automation #identification #static analysis #technical debt #using
Using automatic static analysis to identify technical debt (AV), pp. 1613–1615.
ICSEICSE-2012-Yu #analysis #identification #using
Improving failure-inducing changes identification using coverage analysis (KY), pp. 1604–1606.
SLESLE-2012-KaminskiW #analysis #attribute grammar #composition
Modular Well-Definedness Analysis for Attribute Grammars (TK, EVW), pp. 352–371.
SLESLE-2012-KrishnanW #analysis #attribute grammar #higher-order #termination
Termination Analysis for Higher-Order Attribute Grammars (LK, EVW), pp. 44–63.
SLESLE-2012-Sloane #abstraction #analysis #attribute grammar #evaluation
Profile-Based Abstraction and Analysis of Attribute Grammar Evaluation (AMS), pp. 24–43.
PLEASEPLEASE-2012-ShimbaraWKKO #testing
Feature-analysis-based selection method for system configuration for system testing (DS, HW, SK, MK, HO), pp. 61–64.
SPLCSPLC-2012-El-SharkawyDS #analysis #feature model #modelling
From feature models to decision models and back again an analysis based on formal transformations (SES, SD, KS), pp. 126–135.
SPLCSPLC-2012-OliveiraBN #analysis #debugging #product line
Supporting the analysis of bug prevalence in software product lines with product genealogy (THBdO, MB, EYN), pp. 181–185.
ASPLOSASPLOS-2012-HongCSO #analysis #domain-specific language #graph #named #performance
Green-Marl: a DSL for easy and efficient graph analysis (SH, HC, ES, KO), pp. 349–362.
CCCC-2012-JimboreanMLC #framework #named #program analysis
VMAD: An Advanced Dynamic Program Analysis and Instrumentation Framework (AJ, LM, VL, PC), pp. 220–239.
CCCC-2012-MarronLB #analysis #paradigm #programming
Programming Paradigm Driven Heap Analysis (MM, OL, AB), pp. 41–60.
CCCC-2012-PuttaN #analysis #parallel #points-to
Parallel Replication-Based Points-To Analysis (SP, RN), pp. 61–80.
CCCC-2012-YangBMIGSSS #c++ #inheritance #program analysis
Object Model Construction for Inheritance in C++ and Its Applications to Program Analysis (JY, GB, NM, FI, AG, NS, SS, NS), pp. 144–164.
CGOCGO-2012-AnsaloniBHC #multi #program analysis
Deferred methods: accelerating dynamic program analysis on multicores (DA, WB, AH, LYC), pp. 242–251.
CGOCGO-2012-MatosevicA #analysis #bottom-up #data access #performance #summary
Efficient bottom-up heap analysis for symbolic path-based data access summaries (IM, TSA), pp. 252–263.
CGOCGO-2012-ShangXX #analysis #on-demand #points-to
On-demand dynamic summary-based points-to analysis (LS, XX, JX), pp. 264–274.
ISMMISMM-2012-Nasre #analysis #constraints #graph #performance #points-to
Exploiting the structure of the constraint graph for efficient points-to analysis (RN), pp. 121–132.
LCTESLCTES-2012-FangLZLCZ #analysis #multi #predict
Improving dynamic prediction accuracy through multi-level phase analysis (ZF, JL, WZ, YL, HC, BZ), pp. 89–98.
LCTESLCTES-2012-SallenaveD #embedded #lightweight #static analysis
Lightweight generics in embedded systems through static analysis (OS, RD), pp. 11–20.
PPoPPPPoPP-2012-CaniouDRCA #analysis #constraints #parallel #performance
Performance analysis of parallel constraint-based local search (YC, DD, FR, PC, SA), pp. 337–338.
PPoPPPPoPP-2012-Mendez-LojoBP #analysis #gpu #implementation #points-to
A GPU implementation of inclusion-based points-to analysis (MML, MB, KP), pp. 107–116.
PPoPPPPoPP-2012-SimDKV #analysis #framework #identification #performance
A performance analysis framework for identifying potential benefits in GPGPU applications (JS, AD, HK, RWV), pp. 11–22.
PPoPPPPoPP-2012-TzenakisPKPVN #analysis #dependence #named #parallel
BDDT: : block-level dynamic dependence analysis for deterministic task-based parallelism (GT, AP, JK, PP, HV, DSN), pp. 301–302.
CAVCAV-2012-BogomolovFGLPW #analysis #distance #reachability
A Box-Based Distance between Regions for Guiding the Reachability Analysis of SpaceEx (SB, GF, RG, HL, AP, MW), pp. 479–494.
CAVCAV-2012-HagueL #analysis #bound #parallel #source code #thread
Synchronisation- and Reversal-Bounded Analysis of Multithreaded Programs with Counters (MH, AWL), pp. 260–276.
CAVCAV-2012-HasuoS #hybrid #standard #static analysis
Exercises in Nonstandard Static Analysis of Hybrid Systems (IH, KS), pp. 462–478.
CAVCAV-2012-LeeWY #algorithm #analysis #learning #termination
Termination Analysis with Algorithmic Learning (WL, BYW, KY), pp. 88–104.
CAVCAV-2012-Venet #analysis #difference #invariant #linear #scalability
The Gauge Domain: Scalable Analysis of Linear Inequality Invariants (AV), pp. 139–154.
ICLPICLP-2012-Hanus #analysis #lazy evaluation #nondeterminism
Improving Lazy Non-Deterministic Computations by Demand Analysis (MH), pp. 130–143.
ICSTICST-2012-CunninghamHH #analysis #combinator #testing
A System Analysis Study Comparing Reverse Engineered Combinatorial Testing to Expert Judgment (AMCJ, JDH, RJH), pp. 630–635.
ICSTICST-2012-DanH #analysis #comparison #float #mutation testing #semantics
Semantic Mutation Analysis of Floating-Point Comparison (HD, RMH), pp. 290–299.
ICSTICST-2012-ElrakaibyMT #analysis #mutation testing #policy #testing #using
Testing Obligation Policy Enforcement Using Mutation Analysis (YE, TM, YLT), pp. 673–680.
ICSTICST-2012-GuoSC #analysis #clustering #testing
Analysis of Test Clusters for Regression Testing (BG, MS, PC), p. 736.
ICSTICST-2012-JustKS #analysis #effectiveness #mutation testing #performance #question
Do Redundant Mutants Affect the Effectiveness and Efficiency of Mutation Analysis? (RJ, GMK, FS), pp. 720–725.
ICSTICST-2012-Kannavara #source code #static analysis
Securing Opensource Code via Static Analysis (RK), pp. 429–436.
ICSTICST-2012-MalikK #analysis #graph #using
Dynamic Shape Analysis Using Spectral Graph Properties (MZM, SK), pp. 211–220.
ICSTICST-2012-MassicotteCNM #analysis #testing
A Testing Model for Dynamic Malware Analysis Systems (FM, MC, HN, FM), pp. 826–833.
ICSTICST-2012-MizanF #analysis #automation #performance
Automated Performance Model Construction through Event Log Analysis (AM, GF), pp. 636–641.
ICSTICST-2012-PasareanuB #analysis #statechart
Statechart Analysis with Symbolic PathFinder (CSP, DB), p. 772.
ICSTICST-2012-PonsiniMR #abstract interpretation #analysis #constraints #float #programming #source code
Combining Constraint Programming and Abstract Interpretation for Value Analysis of Floating-point Programs (OP, CM, MR), pp. 775–776.
ICSTICST-2012-SiddiquiMK #analysis #constraints #data flow #lightweight #theorem proving
Lightweight Data-Flow Analysis for Execution-Driven Constraint Solving (JHS, DM, SK), pp. 91–100.
ICSTICST-2012-VorobyovK #automation #constraints #generative #static analysis #testing #theorem proving
Combining Static Analysis and Constraint Solving for Automatic Test Case Generation (KV, PK), pp. 915–920.
ICSTICST-2012-ZamanAH #analysis #empirical #performance #scalability
A Large Scale Empirical Study on User-Centric Performance Analysis (SZ, BA, AEH), pp. 410–419.
ICTSSICTSS-2012-Havelund #analysis
Requirements-Driven Log Analysis (Extended Abstract) (KH), pp. 1–4.
IJCARIJCAR-2012-FosterS #algebra #analysis #automation
Automated Analysis of Regular Algebra (SF, GS), pp. 271–285.
IJCARIJCAR-2012-NikolicS #analysis #reachability
Reachability Analysis of Program Variables (DN, FS), pp. 423–438.
ISSTAISSTA-2012-AlkhalafCFBOK #analysis #consistency #difference #named #nondeterminism #string #validation
ViewPoints: differential string analysis for discovering client- and server-side input validation inconsistencies (MA, SRC, MF, TB, AO, CK), pp. 56–66.
ISSTAISSTA-2012-SuiYX #analysis #detection #memory management #using
Static memory leak detection using full-sparse value-flow analysis (YS, DY, JX), pp. 254–264.
ISSTAISSTA-2012-TombF #analysis #consistency #detection #nondeterminism #reachability
Detecting inconsistencies via universal reachability analysis (AT, CF), pp. 287–297.
ICSTSAT-2012-KottlerZSK #analysis #named #satisfiability
CoPAn: Exploring Recurring Patterns in Conflict Analysis of CDCL SAT Solvers — (Tool Presentation) (SK, CZ, PS, MK), pp. 449–455.
TAPTAP-2012-SulzmannZ #analysis #finite #linear #logic
Constructive Finite Trace Analysis with Linear Temporal Logic (MS, AZ), pp. 132–148.
VMCAIVMCAI-2012-LeeLY #clustering #static analysis #statistics
Sound Non-statistical Clustering of Static Analysis Alarms (WL, WL, KY), pp. 299–314.
CBSECBSE-2011-DistefanoFGM #analysis #composition #multi #reliability #workflow
A compositional method for reliability analysis of workflows affected by multiple failure modes (SD, AF, CG, RM), pp. 149–158.
CBSECBSE-2011-InoueH #analysis #component #data flow
A method for data-flow analysis of business components (TI, SH), pp. 51–60.
ECSAECSA-2011-AdmodisastroK #analysis #approach #architecture #black box #development
An Architecture Analysis Approach for Supporting Black-Box Software Development (NA, GK), pp. 180–189.
ECSAECSA-2011-DiazPGW #architecture #impact analysis #product line
Change Impact Analysis in Product-Line Architectures (JD, JP, JG, ALW), pp. 114–129.
QoSAQoSA-ISARCS-2011-HofigD #analysis #execution
Failure-dependent execution time analysis (KH, DD), pp. 115–122.
WICSAWICSA-2011-BrownNOP #analysis #architecture #dependence #release planning
Analysis and Management of Architectural Dependencies in Iterative Release Planning (NB, RLN, IO, MP), pp. 103–112.
WICSAWICSA-2011-Dobrica #analysis #architecture #integration #modelling #quality
Exploring Approaches of Integration Software Architecture Modeling with Quality Analysis Models (LD), pp. 113–122.
WICSAWICSA-2011-GanesanLCJJZ #analysis #architecture #re-engineering
Architecture Reconstruction and Analysis of Medical Device Software (DG, ML, RC, RPJ, PLJ, YZ), pp. 194–203.
WICSAWICSA-2011-GhezziG #analysis #architecture #as a service #lightweight #named
SOFAS: A Lightweight Architecture for Software Analysis as a Service (GG, HCG), pp. 93–102.
WICSAWICSA-2011-MichalikW #impact analysis #product line #towards
Towards a Solution for Change Impact Analysis of Software Product Line Products (BM, DW), pp. 290–293.
WICSAWICSA-2011-PetrovBN #analysis #architecture #design #enterprise #multi
The Need for a Multilevel Context-Aware Software Architecture Analysis and Design Method with Enterprise and System Architecture Concerns as First Class Entities (PP, UB, RLN), pp. 147–156.
ASEASE-2011-AlvesGJd #impact analysis #slicing #using
Fault-localization using dynamic slicing and change impact analysis (EA, MG, VJ, Md), pp. 520–523.
ASEASE-2011-Dwyer #analysis #behaviour #testing
Unifying testing and analysis through behavioral coverage (MBD), p. 2.
ASEASE-2011-Ganai #analysis #precise #scalability
Scalable and precise symbolic analysis for atomicity violations (MKG), pp. 123–132.
ASEASE-2011-GanovKP #alloy #analysis #incremental #performance
A case for alloy annotations for efficient incremental analysis via domain specific solvers (SRG, SK, DEP), pp. 464–467.
ASEASE-2011-GethersKDP #adaptation #approach #impact analysis #source code
An adaptive approach to impact analysis from change requests to source code (MG, HHK, BD, DP), pp. 540–543.
ASEASE-2011-JustSK #analysis #compilation #java #mutation testing #named #performance
MAJOR: An efficient and extensible tool for mutation analysis in a Java compiler (RJ, FS, GMK), pp. 612–615.
ASEASE-2011-OsterSB #analysis #automation #requirements
Automating analysis of qualitative preferences in goal-oriented requirements engineering (ZJO, GRS, SB), pp. 448–451.
ASEASE-2011-OverbeyJ #analysis #difference #lightweight #refactoring #reuse #tool support
Differential precondition checking: A lightweight, reusable analysis for refactoring tools (JLO, REJ), pp. 303–312.
ASEASE-2011-PohlLP #algorithm #analysis #automation #comparison #feature model #modelling #performance
A performance comparison of contemporary algorithmic approaches for automated analysis operations on feature models (RP, KL, KP), pp. 313–322.
ASEASE-2011-SunL #concept analysis #using
Using Formal Concept Analysis to support change analysis (XS, BL), pp. 641–645.
ASEASE-2011-ZurowskaD #analysis #modelling #named #uml
SAUML: A tool for symbolic analysis of UML-RT models (KZ, JD), pp. 604–607.
CASECASE-2011-BasileCC #analysis #automation
A discrete event model for the control and analysis of complex automated warehouse systems (FB, PC, JC), pp. 201–207.
CASECASE-2011-Gonzalez-CastoloL #analysis #fuzzy #nondeterminism
State uncertainty analysis of Fuzzy Timed DES (JCGC, ELM), pp. 600–606.
CASECASE-2011-JulvezMV #analysis #simulation #using
Analysis and simulation of manufacturing systems using SimHPN toolbox (JJ, CM, CRV), pp. 432–437.
CASECASE-2011-LeH #analysis #random
Marginal analysis on binary pairwise Gibbs random fields (TL, CNH), pp. 316–321.
CASECASE-2011-LemattreDFPS #analysis #architecture #design #reachability
Designing operational control architectures of critical systems by reachability analysis (TL, BD, JMF, JFP, PS), pp. 12–18.
CASECASE-2011-QiaoWZ #analysis #clustering #modelling #tool support
Modeling and analysis of dual-arm cluster tools for wafer fabrication with revisiting (YQ, NW, MZ), pp. 90–95.
CASECASE-2011-TalpasanuK #analysis #approach
Exoskeleton systems kinematics analysis with graph-matroid approach (IT, SK), pp. 822–827.
CASECASE-2011-WangLH #analysis #modelling
Modeling and analysis of care delivery services within patient rooms (JW, JL, PKH), pp. 537–542.
DACDAC-2011-BayrakRBSI #analysis #automation #towards
A first step towards automatic application of power analysis countermeasures (AGB, FR, PB, FXS, PI), pp. 230–235.
DACDAC-2011-ChenKCH #analysis #multi #reliability
Reliability analysis and improvement for multi-level non-volatile memories with soft information (SLC, BRK, JNC, CTH), pp. 753–758.
DACDAC-2011-CoptyKN #analysis #architecture #performance #statistics #transaction
Transaction level statistical analysis for efficient micro-architectural power and performance studies (EC, GK, SN), pp. 351–356.
DACDAC-2011-Fey #analysis #data flow #multi
Orchestrated multi-level information flow analysis to understand SoCs (GF), pp. 284–285.
DACDAC-2011-GongYH #analysis #monte carlo #orthogonal #performance #probability
Fast non-monte-carlo transient noise analysis for high-precision analog/RF circuits by stochastic orthogonal polynomials (FG, HY, LH), pp. 298–303.
DACDAC-2011-HaddadN #analysis #grid #power management #using
Power grid correction using sensitivity analysis under an RC model (PAH, FNN), pp. 688–693.
DACDAC-2011-HaoTSS #analysis #bound #performance #process
Performance bound analysis of analog circuits considering process variations (ZH, SXDT, RS, GS), pp. 310–315.
DACDAC-2011-HeRK #concept analysis #embedded #generative #testing
Test-case generation for embedded simulink via formal concept analysis (NH, PR, DK), pp. 224–229.
DACDAC-2011-HsuLFWHHY #analysis #design #manycore #modelling #named
PowerDepot: integrating IP-based power modeling with ESL power analysis for multi-core SoC designs (CWH, JLL, SCF, CCW, SYH, WTH, JCY), pp. 47–52.
DACDAC-2011-JungMPL #3d #analysis #optimisation #reliability
TSV stress-aware full-chip mechanical reliability analysis and optimization for 3D IC (MJ, JM, DZP, SKL), pp. 188–193.
DACDAC-2011-KoseF #algorithm #analysis #information retrieval #locality #performance
Fast algorithms for IR voltage drop analysis exploiting locality (SK, EGF), pp. 996–1001.
DACDAC-2011-KuoSR #analysis #performance #reachability #source code #using
Efficient WCRT analysis of synchronous programs using reachability (MMYK, RS, PSR), pp. 480–485.
DACDAC-2011-LiuSCKKL #3d #analysis #optimisation
Full-chip TSV-to-TSV coupling analysis and optimization in 3D IC (CL, TS, JC, JK, JK, SKL), pp. 783–788.
DACDAC-2011-MillerBHDCB #analysis #testing #validation
A method to leverage pre-silicon collateral and analysis for post-silicon testing and validation (GM, BB, YCH, JD, XC, GB), pp. 575–578.
DACDAC-2011-OnaissiTLN #analysis #approach #performance
A fast approach for static timing analysis covering all PVT corners (SO, FT, JL, FNN), pp. 777–782.
DACDAC-2011-SunLT #analysis #approximate #grid #incremental #performance #power management
Efficient incremental analysis of on-chip power grid via sparse approximation (PS, XL, MYT), pp. 676–681.
DACDAC-2011-ThieleSYB #analysis #embedded #multi #synthesis
Thermal-aware system analysis and software synthesis for embedded multi-processors (LT, LS, HY, IB), pp. 268–273.
DACDAC-2011-ToettcherCTW #analysis #constraints
Biochemical oscillator sensitivity analysis in the presence of conservation constraints (JET, AC, BT, JW), pp. 806–811.
DACDAC-2011-YounKH #analysis #convergence
Global convergence analysis of mixed-signal systems (SY, JK, MH), pp. 498–503.
DATEDATE-2011-AndalamRG #analysis #source code
Pruning infeasible paths for tight WCRT analysis of synchronous programs (SA, PSR, AG), pp. 204–209.
DATEDATE-2011-BiKVSM #analysis #performance #statistics
Fast statistical analysis of RC nets subject to manufacturing variabilities (YB, KJvdK, JFV, LMS, NvdM), pp. 31–37.
DATEDATE-2011-BoghratiS #analysis #grid #performance #power management #random
A scaled random walk solver for fast power grid analysis (BB, SSS), pp. 38–43.
DATEDATE-2011-BonannoBS #analysis #energy #modelling #monitoring #optimisation #tool support
Energy analysis methods and tools for modelling and Optimizing monitoring tyre systems (AB, AB, MS), pp. 1121–1122.
DATEDATE-2011-BoosNSHHGKS #analysis
Strategies for initial sizing and operating point analysis of analog circuits (VB, JN, MS, SH, SH, HG, DK, RS), pp. 1672–1674.
DATEDATE-2011-ChenGSS #analysis #performance
Data-oriented performance analysis of SHA-3 candidates on FPGA accelerated computers (ZC, XG, AS, PS), pp. 1650–1655.
DATEDATE-2011-ChenO #analysis #fault #image #statistics
Diagnosing scan chain timing faults through statistical feature analysis of scan images (MC, AO), pp. 185–190.
DATEDATE-2011-ErbP #analysis #performance
A method for fast jitter tolerance analysis of high-speed PLLs (SE, WP), pp. 1107–1112.
DATEDATE-2011-GielenMW #analysis #reliability
Analog circuit reliability in sub-32 nanometer CMOS: Analysis and mitigation (GGEG, EM, PHNDW), pp. 1474–1479.
DATEDATE-2011-HanJS #analysis
Clause simplification through dominator analysis (HH, HJ, FS), pp. 143–148.
DATEDATE-2011-KimYLAJ #3d #analysis #embedded #mobile #performance
A quantitative analysis of performance benefits of 3D die stacking on mobile and embedded SoC (DK, SY, SL, JHA, HJ), pp. 1333–1338.
DATEDATE-2011-KobayashiH #analysis #correlation #power management
An LOCV-based static timing analysis considering spatial correlations of power supply variations (SK, KH), pp. 559–562.
DATEDATE-2011-KozhikkottuVRD #analysis #named #performance #variability
VESPA: Variability emulation for System-on-Chip performance analysis (VJK, RV, AR, SD), pp. 2–7.
DATEDATE-2011-LiuV #analysis #generative #performance #source code #validation
Efficient validation input generation in RTL by hybridized source code analysis (LL, SV), pp. 1596–1601.
DATEDATE-2011-MaricauG #analysis #probability #reliability
Stochastic circuit reliability analysis (EM, GGEG), pp. 1285–1290.
DATEDATE-2011-MerrettAWZRMRLFA #analysis #modelling #monte carlo #performance #statistics #variability
Modelling circuit performance variations due to statistical variability: Monte Carlo static timing analysis (MM, PA, YW, MZ, DR, CM, SR, ZL, SBF, AA), pp. 1537–1540.
DATEDATE-2011-PerathonerLT #analysis #component #performance
Composing heterogeneous components for system-wide performance analysis (SP, KL, LT), pp. 842–847.
DATEDATE-2011-RaiYBCT #analysis #realtime #worst-case
Worst-case temperature analysis for real-time systems (DR, HY, IB, JJC, LT), pp. 631–636.
DATEDATE-2011-RossiTSM #analysis #fault #memory management #performance #reliability
Error correcting code analysis for cache memory high reliability and performance (DR, NT, MS, CM), pp. 1620–1625.
DATEDATE-2011-StattelmannBR #analysis #manycore #performance #simulation
Fast and accurate resource conflict simulation for performance analysis of multi-core systems (SS, OB, WR), pp. 210–215.
DATEDATE-2011-TsukiyamaF #algorithm #analysis #statistics
An algorithm to improve accuracy of criticality in statistical static timing analysis (ST, MF), pp. 1529–1532.
DATEDATE-2011-VatajeluF #analysis #in memory #memory management #robust
Robustness analysis of 6T SRAMs in memory retention mode under PVT variations (EIV, JF), pp. 980–985.
DATEDATE-2011-WuM #analysis #optimisation
Aging-aware timing analysis and optimization considering path sensitization (KCW, DM), pp. 1572–1577.
DocEngDocEng-2011-BeelL #analysis #mindmap
An exploratory analysis of mind maps (JB, SL), pp. 81–84.
DRRDRR-2011-LamiroyLKH #analysis #documentation #how #research #resource management
How carefully designed open resource sharing can help and expand document analysis research (BL, DPL, HFK, JH), pp. 1–10.
DRRDRR-2011-SiddiqiKV #analysis #identification
Feature relevance analysis for writer identification (IS, KK, NV), pp. 1–10.
HTHT-2011-TakahashiOYIOT #analysis #using #wiki
Evaluating significance of historical entities based on tempo-spatial impacts analysis using Wikipedia link structure (YT, HO, MY, HI, SO, KT), pp. 83–92.
ICDARICDAR-2011-AbediF #analysis #documentation #image #locality #string #using
Localization of Digit Strings in Farsi/Arabic Document Images Using Structural Features and Syntactical Analysis (AA, KF), pp. 728–733.
ICDARICDAR-2011-AbedWM #analysis #bibliography #contest #documentation #perspective #recognition
International Conference on Document Analysis and Recognition (ICDAR 2011) — Competitions Overview (HEA, LW, VM), pp. 1437–1443.
ICDARICDAR-2011-AhmedLWD #analysis #architecture #automation
Improved Automatic Analysis of Architectural Floor Plans (SA, ML, MW, AD), pp. 864–869.
ICDARICDAR-2011-AntonacopoulosCPP #analysis #contest #documentation #layout
Historical Document Layout Analysis Competition (AA, CC, CP, SP), pp. 1516–1520.
ICDARICDAR-2011-BaechlerI #analysis #layout #multi #using
Multi Resolution Layout Analysis of Medieval Manuscripts Using Dynamic MLP (MB, RI), pp. 1185–1189.
ICDARICDAR-2011-BakerSSS #analysis #documentation
Comparing Approaches to Mathematical Document Analysis from PDF (JBB, APS, VS, MS), pp. 463–467.
ICDARICDAR-2011-BukhariSB11a #analysis #documentation #image #layout #performance
High Performance Layout Analysis of Arabic and Urdu Document Images (SSB, FS, TMB), pp. 1275–1279.
ICDARICDAR-2011-ChattopadhyaySSR #analysis #corpus
Creation and Analysis of a Corpus of Text Rich Indian TV Videos (TC, SS, AS, NR), pp. 849–853.
ICDARICDAR-2011-ChazalonCL #analysis #documentation #interactive #performance
Iterative Analysis of Pages in Document Collections for Efficient User Interaction (JC, BC, AL), pp. 503–507.
ICDARICDAR-2011-ClausnerPA11a #analysis #documentation #evaluation #layout #performance
Scenario Driven In-depth Performance Evaluation of Document Layout Analysis Methods (CC, SP, AA), pp. 1404–1408.
ICDARICDAR-2011-DiemKS #analysis #classification #documentation #layout
Text Classification and Document Layout Analysis of Paper Fragments (MD, FK, RS), pp. 854–858.
ICDARICDAR-2011-GalballyFMP #analysis #quality
Quality Analysis of Dynamic Signature Based on the Sigma-Lognormal Model (JG, JFA, MMD, RP), pp. 633–637.
ICDARICDAR-2011-GarzSD #analysis #layout #using
Layout Analysis for Historical Manuscripts Using Sift Features (AG, RS, MD), pp. 508–512.
ICDARICDAR-2011-KokawaBOWK #analysis #automation #classification #fault
An Impact of OCR Errors on Automated Classification of OCR Japanese Texts with Parts-of-Speech Analysis (AK, LSPB, WO, TW, FK), pp. 543–547.
ICDARICDAR-2011-KurbielKE #analysis #component #independence #novel #preprocessor
A Novel Preprocessing Method for Hectography Prints Based on Independent Component Analysis (TK, IVK, SE), pp. 1145–1149.
ICDARICDAR-2011-LamiroyL #analysis #architecture #benchmark #documentation #metric
An Open Architecture for End-to-End Document Analysis Benchmarking (BL, DPL), pp. 42–47.
ICDARICDAR-2011-LamiroyLS #algorithm #analysis #contest #documentation
Document Analysis Algorithm Contributions in End-to-End Applications: Report on the ICDAR 2011 Contest (BL, DPL, TS), pp. 1521–1525.
ICDARICDAR-2011-LazzaraLGJMC #analysis #documentation #framework #image
The SCRIBO Module of the Olena Platform: A Free Software Framework for Document Image Analysis (GL, RL, TG, YJ, JM, ACL), pp. 252–258.
ICDARICDAR-2011-MalleronE #analysis #approach #documentation
A Mixed Approach for Handwritten Documents Structural Analysis (VM, VE), pp. 269–273.
ICDARICDAR-2011-XuYWL #analysis #using
Touching Character Separation in Chinese Handwriting Using Visibility-Based Foreground Analysis (LX, FY, QFW, CLL), pp. 859–863.
SIGMODSIGMOD-2011-CastellanosDHGDLZS #analysis #framework #named #social
LCI: a social channel analysis platform for live customer intelligence (MC, UD, MH, RG, MD, YL, LZ, MS), pp. 1049–1058.
SIGMODSIGMOD-2011-FlaounasATSNBC #analysis #monitoring #named
NOAM: news outlets analysis and monitoring system (INF, OA, MT, TS, FN, TDB, NC), pp. 1275–1278.
SIGMODSIGMOD-2011-HanPLKY #analysis #graph #performance
iGraph in action: performance analysis of disk-based graph indexing techniques (WSH, MDP, JL, RK, JXY), pp. 1241–1242.
SIGMODSIGMOD-2011-KanagalLD #analysis #database #evaluation #probability #query #robust
Sensitivity analysis and explanations for robust query evaluation in probabilistic databases (BK, JL, AD), pp. 841–852.
SIGMODSIGMOD-2011-LiuRGGWAM #analysis #multi #named #query #sequence #using
E-Cube: multi-dimensional event sequence analysis using hierarchical pattern query sharing (ML, EAR, KG, CG, SW, IA, AM), pp. 889–900.
SIGMODSIGMOD-2011-WeningerDFHHJKKLMSTWY #analysis #named #network
WINACS: construction and analysis of web-based computer science information networks (TW, MD, FF, JMH, JH, TJJ, SK, HK, ZL, DM, YS, NET, CW, XY), pp. 1255–1258.
VLDBVLDB-2011-BeyerEGBEKOS #data analysis #named #scalability #scripting language #semistructured data
Jaql: A Scripting Language for Large Scale Semistructured Data Analysis (KSB, VE, RG, AB, MYE, CCK, , EJS), pp. 1272–1283.
VLDBVLDB-2011-BudakAA #analysis #network #online #social
Structural Trend Analysis for Online Social Networks (CB, DA, AEA), pp. 646–656.
VLDBVLDB-2011-HerodotouB #cost analysis #optimisation #pipes and filters #profiling #source code
Profiling, What-if Analysis, and Cost-based Optimization of MapReduce Programs (HH, SB), pp. 1111–1122.
VLDBVLDB-2011-HuiKS #analysis #documentation #named #xml
HIWAS: Enabling Technology for Analysis of Clinical Data in XML Documents (JH, SEK, PS), pp. 1260–1271.
VLDBVLDB-2011-KarwaRSY #analysis #graph
Private Analysis of Graph Structure (VK, SR, AS, GY), pp. 1146–1157.
CSEETCSEET-2011-LuLL #analysis #using
Competence analysis of IT professionals involved in business services — Using a qualitative method (HKL, CHL, PCL), pp. 61–70.
CSEETCSEET-2011-TsukamotoTNM #analysis #motivation #programming
Analysis of the motivation of learners in the in-house training of programming in Japanese ICT industries (HT, YT, HN, KiM), pp. 121–128.
ITiCSEITiCSE-2011-Hijon-NeiraV #analysis #interactive
Merlin-Mo, an interactions analysis system for Moodle (RHN, JÁVI), p. 340.
ITiCSEITiCSE-2011-KleinKT #analysis #assessment #automation #semantics #using
Automated assessment of short free-text responses in computer science using latent semantic analysis (RK, AK, MT), pp. 158–162.
ESOPESOP-2011-ChenMWC #analysis #linear
Linear Absolute Value Relation Analysis (LC, AM, JW, PC), pp. 156–175.
ESOPESOP-2011-DeDN #analysis #data flow #source code
Dataflow Analysis for Datarace-Free Programs (AD, DD, RN), pp. 196–215.
ESOPESOP-2011-GuhaSK #analysis #type system #using
Typing Local Control and State Using Flow Analysis (AG, CS, SK), pp. 256–275.
ESOPESOP-2011-Mine #c #embedded #fault #parallel #runtime #source code #static analysis
Static Analysis of Run-Time Errors in Embedded Critical Parallel C Programs (AM), pp. 398–418.
ESOPESOP-2011-SotinJ #analysis #interprocedural #pointer #precise #stack
Precise Interprocedural Analysis in the Presence of Pointers to the Stack (PS, BJ), pp. 459–479.
FASEFASE-2011-BendispostoL #analysis #automation
Automatic Flow Analysis for Event-B (JB, ML), pp. 50–64.
FASEFASE-2011-KhanH #analysis #contract #dependence #modelling #on the #testing #using #visual notation
On Model-Based Regression Testing of Web-Services Using Dependency Analysis of Visual Contracts (TAK, RH), pp. 341–355.
FASEFASE-2011-TkachukR #analysis #automation #generative #web
Automated Driver Generation for Analysis of Web Applications (OT, SPR), pp. 326–340.
FoSSaCSFoSSaCS-2011-JaubertR #analysis #automaton #robust
Quantitative Robustness Analysis of Flat Timed Automata (RJ, PAR), pp. 229–244.
TACASTACAS-2011-GaravelLMS #analysis #distributed #process
CADP 2010: A Toolbox for the Construction and Analysis of Distributed Processes (HG, FL, RM, WS), pp. 372–387.
TACASTACAS-2011-Holzmann #design #development #reliability
Reliable Software Development: Analysis-Aware Design (GJH), pp. 1–2.
TACASTACAS-2011-SeshiaK #analysis #named #tool support
GameTime: A Toolkit for Timing Analysis of Software (SAS, JK), pp. 388–392.
TACASTACAS-2011-TsitovichSWK #analysis #summary #termination
Loop Summarization and Termination Analysis (AT, NS, CMW, DK), pp. 81–95.
ICPCICPC-J-2009-HsuH11 #analysis #comparison #estimation #relational
Comparison of weighted grey relational analysis for software effort estimation (CJH, CYH), pp. 165–200.
SCAMSCAM-J-2009-DesharnaisAS11 #analysis #identification #metric
Identification and analysis of attributes and base measures within ISO 9126 (JMD, AA, WS), pp. 447–460.
CSMRCSMR-2011-KohlKPDM #analysis #maintenance #multi #using
Using Multivariate Split Analysis for an Improved Maintenance of Automotive Diagnosis Functions (JK, AK, JPP, AD, SM), pp. 305–308.
ICPCICPC-2011-Ali #analysis #automation #named #retrieval #trust
Trustrace: Improving Automated Trace Retrieval through Resource Trust Analysis (NA), pp. 230–233.
ICPCICPC-2011-HassaineBGHA #impact analysis
Change Impact Analysis: An Earthquake Metaphor (SH, FB, YGG, SH, GA), pp. 209–210.
ICPCICPC-2011-Sharafi #analysis #architecture #visualisation
A Systematic Analysis of Software Architecture Visualization Techniques (ZS), pp. 254–257.
ICSMEICSM-2011-DamG #automation #impact analysis
Automated change impact analysis for agent systems (HKD, AG), pp. 33–42.
ICSMEICSM-2011-PirzadehHS #analysis #execution #mining
Exploiting text mining techniques in the analysis of execution traces (HP, AHL, MS), pp. 223–232.
ICSMEICSM-2011-SnipesRM #analysis
Code Hot Spot: A tool for extraction and analysis of code change history (WS, BPR, ERMH), pp. 392–401.
ICSMEICSM-2011-TorresTPWY #analysis #evolution #named #visual notation
Maleku: An evolutionary visual software analysis tool for providing insights into software evolution (AGT, RT, FJGP, MW, YY), pp. 594–597.
MSRMSR-2011-HindleEGM #analysis #automation #maintenance #process #topic
Automated topic naming to support cross-project analysis of software maintenance activities (AH, NAE, MWG, JM), pp. 163–172.
MSRMSR-2011-SadowskiLLZW #algorithm #analysis #empirical
An empirical analysis of the FixCache algorithm (CS, CL, ZL, XZ, EJWJ), pp. 219–222.
MSRMSR-2011-WangBD #analysis #debugging #eclipse
System compatibility analysis of Eclipse and Netbeans based on bug data (XOW, EB, PTD), pp. 230–233.
SCAMSCAM-2011-Gold #analysis #music #programming #source code
Knitting Music and Programming: Reflections on the Frontiers of Source Code Analysis (NG), pp. 10–14.
SCAMSCAM-2011-Keul #analysis
Tuning Static Data Race Analysis for Automotive Control Software (SK), pp. 45–54.
SCAMSCAM-2011-Larson #program analysis #set
Program Analysis Too Loopy? Set the Loops Aside (EL), pp. 15–24.
SCAMSCAM-2011-PavluSK #alias #analysis #comparison #graph #precise #set
Computation of Alias Sets from Shape Graphs for Comparison of Shape Analysis Precision (VP, MS, AK), pp. 25–34.
SCAMSCAM-2011-SfayhiS #analysis #interactive #visualisation #what
What You See is What You Asked for: An Effort-Based Transformation of Code Analysis Tasks into Interactive Visualization Scenarios (AS, HAS), pp. 195–203.
WCREWCRE-2011-FuhrHR #clustering #dynamic analysis #implementation #legacy #reuse #using
Using Dynamic Analysis and Clustering for Implementing Services by Reusing Legacy Code (AF, TH, VR), pp. 275–279.
WCREWCRE-2011-GrantCS #analysis #concept #reverse engineering #source code #using
Reverse Engineering Co-maintenance Relationships Using Conceptual Analysis of Source Code (SG, JRC, DBS), pp. 87–91.
WCREWCRE-2011-SeppMS #precise #relational #static analysis
Precise Static Analysis of Binaries by Extracting Relational Information (AS, BM, AS), pp. 357–366.
PEPMPEPM-J-2007-MollerS11 #graph #program analysis #xml
XML graphs in program analysis (AM, MIS), pp. 492–515.
PEPMPEPM-2011-Rinard #bound #probability #program analysis #program transformation #source code
Probabilistic accuracy bounds for perforated programs: a new foundation for program analysis and transformation (MCR), pp. 79–80.
PLDIPLDI-2011-BouajjaniDES #analysis #interprocedural #on the #source code
On inter-procedural analysis of programs with lists and data (AB, CD, CE, MS), pp. 578–589.
SASSAS-2011-BlackshearCSS #analysis #precise
The Flow-Insensitive Precision of Andersen’s Analysis in Practice (SB, BYEC, SS, MS), pp. 60–76.
SASSAS-2011-FlexederPS #analysis #assembly
Side-Effect Analysis of Assembly Code (AF, MP, HS), pp. 77–94.
SASSAS-2011-MadhavanRV #abstract interpretation #analysis
Purity Analysis: An Abstract Interpretation Formulation (RM, GR, KV), pp. 7–24.
SASSAS-2011-MightH #abstract interpretation #concurrent #higher-order #product line #source code #static analysis
A Family of Abstract Interpretations for Static Analysis of Concurrent Higher-Order Programs (MM, DVH), pp. 180–197.
SASSAS-2011-Mitchell #program analysis #security #web
Program Analysis for Web Security (JCM), p. 4.
SASSAS-2011-NoriR #machine learning #program analysis
Program Analysis and Machine Learning: A Win-Win Deal (AVN, SKR), pp. 2–3.
SASSAS-2011-ZulegerGSV #abstraction #analysis #bound #imperative #source code
Bound Analysis of Imperative Programs with the Size-Change Abstraction (FZ, SG, MS, HV), pp. 280–297.
ICALPICALP-v1-2011-BodlaenderJK #analysis #combinator #kernel #preprocessor
Preprocessing for Treewidth: A Combinatorial Analysis through Kernelization (HLB, BMPJ, SK), pp. 437–448.
ICALPICALP-v1-2011-BorosEFGMM #analysis #approximate #game studies #probability
Stochastic Mean Payoff Games: Smoothed Analysis and Approximation Schemes (EB, KME, MF, VG, KM, BM), pp. 147–158.
ICALPICALP-v2-2011-BrazdilKKV #analysis #bound #probability #recursion #runtime #source code
Runtime Analysis of Probabilistic Programs with Unbounded Recursion (TB, SK, AK, IHV), pp. 319–331.
FMFM-2011-BarringerH #analysis #domain-specific language #named #scala
TraceContract: A Scala DSL for Trace Analysis (HB, KH), pp. 57–72.
SEFMSEFM-2011-EggersRNF #analysis #hybrid #satisfiability
Improving SAT Modulo ODE for Hybrid Systems Analysis by Combining Different Enclosure Methods (AE, NR, NSN, MF), pp. 172–187.
SEFMSEFM-2011-ErnstSR #analysis #empirical #interactive #proving #theorem proving #verification
Verification of B + Trees: An Experiment Combining Shape Analysis and Interactive Theorem Proving (GE, GS, WR), pp. 188–203.
SEFMSEFM-2011-FadlisyahOA #analysis #formal method #hybrid #modelling #object-oriented
Object-Oriented Formal Modeling and Analysis of Interacting Hybrid Systems in HI-Maude (MF, PCÖ, ), pp. 415–430.
SEFMSEFM-2011-ParrinoGGF #analysis #bound #data flow #satisfiability #verification
A Dataflow Analysis to Improve SAT-Based Bounded Program Verification (BCP, JPG, DG, MFF), pp. 138–154.
SEFMSEFM-2011-Pedercini11a #analysis #development #policy
Development Policy Analysis in Mali: Sustainable Growth Prospects (MP), pp. 447–463.
CEFPCEFP-2011-TothB #erlang #static analysis
Static Analysis of Complex Software Systems Implemented in Erlang (MT, IB), pp. 440–498.
ICFPICFP-2011-VardoulakisS #analysis #automaton
Pushdown flow analysis of first-class control (DV, OS), pp. 69–80.
AGTIVEAGTIVE-2011-GalvaoZRWA #analysis #graph #knowledge-based
Knowledge-Based Graph Exploration Analysis (IG, EZ, AR, LW, MA), pp. 105–120.
CHICHI-2011-Bargas-AvilaH #analysis #challenge #empirical #experience #novel #user interface
Old wine in new bottles or novel challenges: a critical analysis of empirical studies of user experience (JABA, KH), pp. 2689–2698.
CHICHI-2011-BaumerT #analysis #distributed #process #video
Comparing activity theory with distributed cognition for video analysis: beyond “kicking the tires” (EPSB, BT), pp. 133–142.
CHICHI-2011-BragdonNLH #analysis #design #gesture #mobile
Experimental analysis of touch-screen gesture designs in mobile environments (AB, EN, YL, KH), pp. 403–412.
CHICHI-2011-FourneyMT #analysis #interactive #query #usability
Characterizing the usability of interactive applications through query log analysis (AF, RM, MAT), pp. 1817–1826.
CHICHI-2011-GillVPJ #analysis #privacy #taxonomy
Privacy dictionary: a linguistic taxonomy of privacy for content analysis (AJG, AV, CP, ANJ), pp. 3227–3236.
CHICHI-2011-MaLD #analysis #perspective
Perceptual analysis of talking avatar head movements: a quantitative perspective (XM, BHL, ZD), pp. 2699–2702.
CHICHI-2011-WillettHHA #analysis #collaboration #named #visual notation
CommentSpace: structured support for collaborative visual analysis (WW, JH, JMH, MA), pp. 3131–3140.
CSCWCSCW-2011-BardramD #analysis #process
Activity analysis: applying activity theory to analyze complex work in hospitals (JB, AD), pp. 455–464.
HCIDHM-2011-BenderiusMWW #analysis #modelling #optimisation #simulation
A Simulation Environment for Analysis and Optimization of Driver Models (OB, GM, KW, MW), pp. 453–462.
HCIDHM-2011-MarlerKJ #analysis #predict
Optimization-Based Posture Prediction for Analysis of Box Lifting Tasks (TM, LK, RJ), pp. 151–160.
HCIDHM-2011-SixiangCIL #3d #analysis #modelling #parametricity
3D Parametric Body Model Based on Chinese Female Anhtropometric Analysis (PS, CKC, WHI, AL), pp. 22–29.
HCIDHM-2011-TangwenF #analysis #architecture #cumulative #learning #polymorphism
Polymorphic Cumulative Learning in Integrated Cognitive Architectures for Analysis of Pilot-Aircraft Dynamic Environment (TY, SF), pp. 409–416.
HCIDHM-2011-WelkePRJ #analysis #how #modelling #validation #what
What Is Human? How the Analysis of Brain Dynamics Can Help to Improve and Validate Driver Models (SW, JP, MR, TJ), pp. 513–522.
HCIDUXU-v1-2011-HuangW #analysis #gesture #interactive #mobile #usability
Usability Analysis in Gesture Operation of Interactive E-Books on Mobile Devices (CHH, CMW), pp. 573–582.
HCIDUXU-v1-2011-Schmid #analysis #development #feedback #learning
Development of an Augmented Feedback Application to Support Motor Learning after Stroke: Requirement Analysis (SS), pp. 305–314.
HCIDUXU-v1-2011-YeratziotisSVN #analysis
Analysis of Emergent Use for Wellbeing Service Innovation (AY, CS, JV, MN), pp. 332–341.
HCIDUXU-v2-2011-Hsu11b #analysis #design
Analysis of Causal Relationships between Blog Design Criteria (CCH), pp. 13–19.
HCIDUXU-v2-2011-InversiniCB #analysis #assessment #case study #experience #risk management #usability #user interface
Connecting Usages with Usability Analysis through the User Experience Risk Assessment Model: A Case Study in the Tourism Domain (AI, LC, DB), pp. 283–293.
HCIDUXU-v2-2011-Nakata #analysis #clustering #monitoring #usability
Clustering Analysis to Evaluate Usability of Work-Flow Systems and to Monitor Proficiency of Workers (TN), pp. 487–496.
HCIDUXU-v2-2011-PohlmeyerB #analysis
A Conjoint Analysis of Attributes Affecting the Likelihood of Technology Use (AEP, LTMB), pp. 303–312.
HCIDUXU-v2-2011-WynnS #data analysis #low cost #video
Motivating Change and Reducing Cost with the Discount Video Data Analysis Technique (JW, JDS), pp. 321–328.
HCIHCD-2011-ChoiPJP #analysis #research #smarttech #state of the art
Scientometric Analysis of Research in Smart Clothing: State of the Art and Future Direction (KC, HP, ESJ, SP), pp. 500–508.
HCIHCD-2011-WangL11a #analysis #behaviour #design #evaluation
Task Analysis for Behavioral Factors Evaluation in Work System Design (LW, HYKL), pp. 440–448.
HCIHCI-DDA-2011-CharfiEKM #analysis #automation #evaluation #human-computer #interactive #network #towards
Towards an Automatic Analysis of Interaction Data for HCI Evaluation Application to a Transport Network Supervision System (SC, HE, CK, FM), pp. 175–184.
HCIHCI-DDA-2011-InoueAN #analysis #modelling
Cognitive Analysis for Knowledge Modeling in Air Traffic Control Work (SI, HA, KN), pp. 341–350.
HCIHCI-DDA-2011-KaelberM #analysis
From Structural Analysis to Scenarios and Patterns for Knowledge Sharing Applications (CK, CM), pp. 258–267.
HCIHCI-ITE-2011-AbeOO #analysis #detection #image
Eye-gaze Detection by Image Analysis under Natural Light (KA, SO, MO), pp. 176–184.
HCIHCI-ITE-2011-BarbuceanuADR #analysis #artificial reality #interactive #user interface
Attentive User Interface for Interaction within Virtual Reality Environments Based on Gaze Analysis (FB, CA, MD, ZR), pp. 204–213.
HCIHCI-ITE-2011-HsiaoJ #analysis #named #user interface
TiMBA — Tangible User Interface for Model Building and Analysis (CPH, BRJ), pp. 43–52.
HCIHCI-ITE-2011-InoueIFHIM #analysis
Manual and Accelerometer Analysis of Head Nodding Patterns in Goal-oriented Dialogues (MI, TI, NF, RH, TI, HM), pp. 259–267.
HCIHCI-MIIE-2011-KimHJHMJ #analysis #behaviour #using #video
Analysis of Low-Floor Bus Passengers’ Behavior Patterns Using Video Observation (JYK, HH, BSJ, BHH, YJM, YGJ), pp. 391–400.
HCIHCI-UA-2011-LeeKJ #analysis #fault
Control Error Analysis of Computerized Operational Environment in Nuclear Power Plants (SJL, JK, SCJ), pp. 360–367.
HCIHCI-UA-2011-RhiuRJY #analysis
Analysis of Customer Satisfaction on the Stiffness of Outside Panels of Passenger Cars (IR, TR, BJ, MHY), pp. 257–265.
HCIHCI-UA-2011-YangCS #analysis #learning #recognition
Facial Expression Recognition for Learning Status Analysis (MTY, YJC, YCS), pp. 131–138.
HCIHCI-UA-2011-YoshimiMIKOT #analysis #database
Construction and Analysis of Database on Outer Cases of Medicines (HY, HM, AI, MK, MO, FT), pp. 226–231.
HCIHIMI-v1-2011-JeonKLW #analysis #security #smarttech
A Practical Analysis of Smartphone Security (WJ, JK, YL, DW), pp. 311–320.
HCIHIMI-v1-2011-JeonLW #analysis
Analysis of Content Filtering Software (WJ, YL, DW), pp. 548–557.
HCIHIMI-v1-2011-OhoriSNI #analysis
Construction of a Model for Discriminating between Electroencephalographic Patterns at the Time of Incorrect Inputs Based on Sensitivity Spectrum Analysis (RO, DS, YN, SI), pp. 618–626.
HCIHIMI-v1-2011-Pavel #analysis #authentication #case study #protocol
Analysis of Authentication Protocols with Scyter: Case Study (OP), pp. 359–365.
HCIHIMI-v1-2011-TakahashiSHNIHKWK #analysis #process
Basic Study of Analysis of Human Brain Activities during Car Driving (NT, SS, YH, HN, HI, NH, SK, EW, SK), pp. 627–635.
HCIHIMI-v1-2011-VogelZO #analysis
Constructing Phylogenetic Trees Based on Intra-group Analysis of Human Mitochondrial DNA (IV, FZ, PO), pp. 165–169.
HCIHIMI-v2-2011-ItouOM #analysis #chat #word
Analysis on Relationship between Smiley and Emotional Word Included in Chat Text (JI, TO, JM), pp. 141–146.
HCIHIMI-v2-2011-KwackKC #analysis #mobile
Economic Analysis of SON-Enabled Mobile WiMAX (SK, JK, JC), pp. 268–277.
HCIHIMI-v2-2011-Otsuka #analysis #behaviour #comprehension #multimodal #people
Multimodal Conversation Scene Analysis for Understanding People’s Communicative Behaviors in Face-to-Face Meetings (KO), pp. 171–179.
HCIHIMI-v2-2011-SagaTKTM #analysis #comparison #using
Comparison Analysis for Text Data by Using FACT-Graph (RS, ST, KK, HT, KM), pp. 75–83.
HCIIDGD-2011-GaoQ #analysis #distributed #simulation
Analysis of the Applied Pattern of Distributed Computing Used in Simulation (SfG, HQ), pp. 152–158.
HCIIDGD-2011-RigbyD #analysis #design #network #on the
On the Design of Organizational Network Analysis Software (JR, HD), pp. 550–555.
HCIIDGD-2011-YuSZ #analysis
Driving Distraction Analysis by ECG Signals: An Entropy Analysis (LY, XS, KZ), pp. 258–264.
VISSOFTVISSOFT-2011-BeckTD #analysis #design #visual notation
A visual analysis and design tool for planning software reengineerings (MB, JT, JD), pp. 1–8.
AdaEuropeAdaEurope-2011-CoqR #ada #analysis #modelling #quality #source code
The SQALE Quality and Analysis Models for Assessing the Quality of Ada Source Code (TC, JPR), pp. 61–74.
AdaEuropeAdaEurope-2011-MedinaC #ada #analysis #design #distributed #modelling #realtime #uml
Model-Based Analysis and Design of Real-Time Distributed Systems with Ada and the UML Profile for MARTE (JLM, ÁGC), pp. 89–102.
AdaSIGAda-2011-AbrahamCP #ada #analysis #quality
Improving quality of Ada software with range analysis (JA, JC, CP), pp. 7–8.
AdaSIGAda-2011-AbrahamCP11a #ada #analysis #quality
Improving quality of Ada software with range analysis (JA, JC, CP), pp. 69–74.
AdaSIGAda-2011-GaudelSPRDL #ada #analysis #design pattern #pattern matching #pattern recognition #performance #recognition
An Ada design pattern recognition tool for AADL performance analysis (VG, FS, AP, SR, PD, JL), pp. 61–68.
CAiSECAiSE-2011-KabicherR #analysis #process
Human-Centered Process Engineering Based on Content Analysis and Process View Aggregation (SK, SRM), pp. 467–481.
CAiSECAiSE-2011-MoserWHB #analysis #automation #categorisation #empirical #requirements #semantics
Requirements Management with Semantic Technology: An Empirical Study on Automated Requirements Categorization and Conflict Analysis (TM, DW, MH, SB), pp. 3–17.
CAiSECAiSE-2011-SchmidtJ #analysis #design #requirements #security #using
Connecting Security Requirements Analysis and Secure Design Using Patterns and UMLsec (HS, JJ), pp. 367–382.
EDOCEDOC-2011-AdriansyahDA #consistency #cost analysis #using
Conformance Checking Using Cost-Based Fitness Analysis (AA, BFvD, WMPvdA), pp. 55–64.
EDOCEDOC-2011-Bellamy-McIntyreLW #analysis #authentication #enterprise #modelling
OpenID and the Enterprise: A Model-Based Analysis of Single Sign-On Authentication (JBM, CL, GW), pp. 129–138.
EDOCEDOC-2011-MelleriHM #analysis #modelling #standard #xml
Comparing Information Models in XML-based e-Business Standards — A Quantitative Analysis (IM, KH, JM), pp. 225–234.
ICEISICEIS-J-2011-ChangS11a #analysis #mobile #process #research #simulation
Research on Grid-Based Mobile Business Process and Analysis on Process Simulation (DC, LS), pp. 349–361.
ICEISICEIS-J-2011-Li11f #analysis #approach #case study #machine learning #type system #using
A Study on Noisy Typing Stream Analysis Using Machine Learning Approach (JL0), pp. 149–161.
ICEISICEIS-J-2011-PereiraB11a #analysis #evaluation #lens #social
Seeing Social Software Analysis and Evaluation through the Lenses of Culture (RP, MCCB), pp. 374–387.
ICEISICEIS-J-2011-PhillisK #analysis #approach
A System-of-Systems Approach to the Analysis and Conservation of Biodiversity (YAP, VSK), pp. 3–15.
ICEISICEIS-v1-2011-ChenZ #analysis #bound
Analysis on the Spatial Variation of the Center of Gravity of Inbound Tourism in China (YC, HZ), pp. 441–447.
ICEISICEIS-v1-2011-NiknafsSRR #analysis #comparative #predict
Comparative Analysis of Three Techniques for Predictions in Time Series Having Repetitive Patterns (AN, BS, MMR, GR), pp. 177–182.
ICEISICEIS-v1-2011-WangWH #data analysis #implementation
Research and Implementation of Campus Card Data Analysis System (FW, FW, LH), pp. 515–518.
ICEISICEIS-v1-2011-WeiY #analysis #behaviour #game studies #metric #security
Security Investment Analysis on Gaming Theory with Measurements of Cost and Decision Behavior (WW, RY), pp. 519–523.
ICEISICEIS-v2-2011-CanoCSF #analysis #architecture #integration #multi #process #segmentation
Multisensory Architecture for Intelligent Surveillance Systems — Integration of Segmentation, Tracking and Activity Analysis (FAC, JCC, JSC, AFC), pp. 157–162.
ICEISICEIS-v2-2011-LivaniPR #analysis
Decision Support System for Cost-benefit Analysis in Service Provision (EL, EP, GR), pp. 198–203.
ICEISICEIS-v2-2011-Pang #analysis #quality
Analysis of Remote Quality Inspection System for Construction Projects (JP), pp. 341–344.
ICEISICEIS-v2-2011-TianZX #analysis #case study #network #social #using
Study on the Knowledge -Sharing Network of Innovation Teams using Social Network Analysis (ZT, ZZ, DX), pp. 438–443.
ICEISICEIS-v2-2011-WangJ #analysis #empirical
An Empirical Analysis of Beijing Public Transport Users’ Satisfaction Level (HW, LJ), pp. 384–388.
ICEISICEIS-v3-2011-Li11e #analysis #quality
Construction and Analysis of Service Quality Model for Beijing Urban Mass Transit (WL), pp. 541–543.
ICEISICEIS-v3-2011-NiZY #analysis #uml
Analysis of Requirement Capture based on UML (TN, ZZ, YY), pp. 313–317.
ICEISICEIS-v3-2011-QuG #analysis #identification #outsourcing #risk management
The Analysis of IT Outsourcing Risk Identification on Principal-agent Theory (LQ, ZG), pp. 488–491.
ICEISICEIS-v3-2011-ShenYZT #analysis #documentation #security
Analysis of Core Documents in Information Security Based on Mapping Knowledge Domains (HZS, QJY, QJZ, LyT), pp. 421–427.
ICEISICEIS-v3-2011-TangX #analysis #communication #modelling #network
Modeling and Analysis of a Power Line Communication Network Subject to Channel Failure (ST, YX), pp. 184–189.
ICEISICEIS-v3-2011-Zhao #analysis #contest #industrial
The Competitive Strategy Analysis of Express Industry based on Time-based Competition (JZ), pp. 502–506.
ICEISICEIS-v3-2011-ZhouL #analysis #metric
A New Method and Metric for Quantitative Risk Analysis (PZ, HL), pp. 25–33.
ICEISICEIS-v3-2011-ZongYTS #analysis #research #visual notation
Visual Analysis of Research on Acceptance of Information Technology (QJZ, QJY, LyT, HZS), pp. 415–420.
ICEISICEIS-v4-2011-CuiYZ #analysis #empirical #industrial #social
An Empirical Analysis of the Relationship between Social Consumption Demand Factors and the Cultural Industry in China (LC, HY, HZ), pp. 606–610.
ICEISICEIS-v4-2011-FarwickABRVH #analysis #architecture #automation #bibliography #enterprise #maintenance #requirements
Requirements for Automated Enterprise Architecture Model Maintenance — A Requirements Analysis based on a Literature Review and an Exploratory Survey (MF, BA, RB, SR, KV, IH), pp. 325–337.
ICEISICEIS-v4-2011-Feng11a #analysis #enterprise
Factorial Analysis to Measure Developing Ability of Listed Retail Enterprises (YF), pp. 553–556.
ICEISICEIS-v4-2011-Huang #analysis #empirical #industrial #statistics
Which is Better Innovative Investment — An Empirical Analysis of Statistics from Chinese Industrial Undertakings (ZH), pp. 617–628.
ICEISICEIS-v4-2011-ShiL #analysis
Analysis of the Economic Benefit of Used Batteries based on Reverse Logistics (XS, ZL), pp. 736–742.
ICEISICEIS-v4-2011-SunL #analysis #industrial
Brief Analysis on Profits Allocation of IOT Industry Chain (QS, XL), pp. 165–169.
ICEISICEIS-v4-2011-XiongLL #analysis #industrial
The Analysis of the Internet-of-things Industrial Chain based on Hypercycle Theory (QX, XL, YL), pp. 513–517.
ICEISICEIS-v4-2011-YangR #analysis #e-commerce
Cost Earnings Analysis on Aquatic Product e-Commerce (ZY, SR), pp. 111–115.
CIKMCIKM-2011-BespalovBQS #analysis #classification #n-gram #sentiment
Sentiment classification based on supervised latent n-gram analysis (DB, BB, YQ, AS), pp. 375–382.
CIKMCIKM-2011-CachedaCFF #algorithm #analysis #dataset #nearest neighbour
Improving k-nearest neighbors algorithms: practical application of dataset analysis (FC, VC, DF, VF), pp. 2253–2256.
CIKMCIKM-2011-GaoL #adaptation #analysis #classification #probability #sentiment #using
A cross-domain adaptation method for sentiment classification using probabilistic latent analysis (SG, HL), pp. 1047–1052.
CIKMCIKM-2011-GottronAS #analysis #semantics
Insights into explicit semantic analysis (TG, MA, BS), pp. 1961–1964.
CIKMCIKM-2011-GuoZGS #analysis #aspect-oriented #multi #sentiment
Domain customization for aspect-oriented opinion analysis with multi-level latent sentiment clues (HG, HZ, ZG, ZS), pp. 2493–2496.
CIKMCIKM-2011-HeerschopGHFKJ #analysis #using
Polarity analysis of texts using discourse structure (BH, FG, AH, FF, UK, FdJ), pp. 1061–1070.
CIKMCIKM-2011-HsuC #analysis #component #independence #privacy
Privacy preservation by independent component analysis and variance control (CMH, MSC), pp. 925–930.
CIKMCIKM-2011-KimKFL #analysis
Spectral analysis of a blogosphere (SWK, KNK, CF, JHL), pp. 2145–2148.
CIKMCIKM-2011-LiBS #analysis #named #network #online #social #towards
CASINO: towards conformity-aware social influence analysis in online social networks (HL, SSB, AS), pp. 1007–1012.
CIKMCIKM-2011-VirgilioM #calculus #data analysis #using
RFID data analysis using tensor calculus for supply chain management (RDV, FM), pp. 1743–1748.
CIKMCIKM-2011-WangWLZZ #analysis #approach #classification #graph #hashtag #sentiment #topic #twitter
Topic sentiment analysis in twitter: a graph-based hashtag sentiment classification approach (XW, FW, XL, MZ, MZ), pp. 1031–1040.
CIKMCIKM-2011-YinHD #analysis #microblog #predict
Structural link analysis and prediction in microblogs (DY, LH, BDD), pp. 1163–1168.
ECIRECIR-2011-Carrillo-de-AlbornozPGD #analysis #bibliography #mining #rating #sentiment
A Joint Model of Feature Mining and Sentiment Analysis for Product Review Rating (JCdA, LP, PG, AD), pp. 55–66.
ECIRECIR-2011-KimC #analysis #web
An Analysis of Time-Instability in Web Search Results (JK, VRC), pp. 466–478.
ECIRECIR-2011-NunzioLM #analysis #multi
Multilingual Log Analysis: LogCLEF (GMDN, JL, TM), pp. 675–678.
ECIRECIR-2011-Rehurek #analysis #semantics
Subspace Tracking for Latent Semantic Analysis (RR), pp. 289–300.
ECIRECIR-2011-ZucconAR #analysis
Back to the Roots: Mean-Variance Analysis of Relevance Estimations (GZ, LA, KvR), pp. 716–720.
ICMLICML-2011-ChenPSDC #analysis #learning #process
The Hierarchical Beta Process for Convolutional Factor Analysis and Deep Learning (BC, GP, GS, DBD, LC), pp. 361–368.
ICMLICML-2011-GhavamzadehLMH #analysis
Finite-Sample Analysis of Lasso-TD (MG, AL, RM, MWH), pp. 1177–1184.
KDDKDD-2011-ChenDWSNL #analysis #process
Activity analysis based on low sample rate smart meters (FC, JD, BW, SS, MRN, CTL), pp. 240–248.
KDDKDD-2011-GuerraVMA #analysis #approach #bias #realtime #sentiment
From bias to opinion: a transfer-learning approach to real-time sentiment analysis (PHCG, AV, WMJ, VA), pp. 150–158.
KDDKDD-2011-Norton #analysis #power of
The power of analysis and data (DN), p. 784.
KDDKDD-2011-Norvig #data analysis #internet
Internet scale data analysis (PN), p. 2.
KDDKDD-2011-SinkovitsCSTRWB #analysis #data-driven #performance
Data intensive analysis on the gordon high performance data and compute system (RSS, PC, SS, MT, PR, NW, NB), pp. 747–748.
KDDKDD-2011-TanLTJZL #analysis #network #sentiment #social
User-level sentiment analysis incorporating social networks (CT, LL, JT, LJ, MZ, PL), pp. 1397–1405.
KDDKDD-2011-WangBB #analysis #component #matrix #multi
Common component analysis for multiple covariance matrices (HW, AB, DB), pp. 956–964.
KDDKDD-2011-WangLZ #analysis #keyword #rating
Latent aspect rating analysis without aspect keyword supervision (HW, YL, CZ), pp. 618–626.
KDIRKDIR-2011-BallesterosFDHG #analysis #dependence #using
Inferring the Scope of Speculation using Dependency Analysis (MB, VF, AD, JH, PG), pp. 256–261.
KDIRKDIR-2011-CostantiniFP #analysis #framework #natural language #representation
A Framework for Structured Knowledge Extraction and Representation from Natural Language through Deep Sentence Analysis (SC, NF, AP), pp. 282–287.
KDIRKDIR-2011-OlegA #analysis #approach #clustering
Methods for Discovering and Analysis of Regularities Systems — Approach based on Optimal Partitioning of Explanatory Variables Space (OVS, AVK), pp. 423–426.
KDIRKDIR-2011-RavulaCL #dynamic analysis #using
Dynamic Analysis of Malware using Decision Trees (RRR, CCC, KJL), pp. 74–83.
KDIRKDIR-2011-SethCRSB #analysis #query #similarity
A Tale of Two (Similar) Cities — Inferring City Similarity through Geo-spatial Query Log Analysis (RS, MC, DR, DS, SB), pp. 179–189.
KEODKEOD-2011-GoczylaWWZ #analysis #framework
Analysis of Mapping within S-module Framework (KG, AW, WW, TZ), pp. 267–272.
KEODKEOD-2011-PinchukINDBP #analysis #distributed #semantics #visual notation
Augmenting Semantics to Distributed Agents Logs — Enabling Graphical After Action Analysis of Federated Agents Logs (RP, SI, TN, TD, CB, GP), pp. 232–241.
KEODKEOD-2011-SeppalaN #analysis #modelling
Contextual Analysis and Modeling of Personal Wellness (AS, PN), pp. 202–207.
KMISKMIS-2011-CostantinoDFS #analysis #evaluation #nondeterminism #using
A Model using Data Envelopment Analysis for the Cross Evaluation of Suppliers under Uncertainty (NC, MD, MF, FS), pp. 152–157.
KMISKMIS-2011-SchauerZM #analysis #collaboration #enterprise #open source #tool support
A Feature-based Analysis of Open Source Tools for Enterprise 2.0 — Open Source Tools for Team Collaboration in SMEs (BS, MZ, RM), pp. 57–66.
MLDMMLDM-2011-AdolfHHCH #analysis #grid #power management
Techniques for Improving Filters in Power Grid Contingency Analysis (RA, DH, MH, YC, ZH), pp. 599–611.
MLDMMLDM-2011-JiangMY #analysis #sentiment #topic
Topic Sentiment Change Analysis (YJ, WM, CTY), pp. 443–457.
MLDMMLDM-2011-MohebzadaRR #analysis #constraints #generative
Sensitivity Analysis for Weak Constraint Generation (JGM, MMR, GR), pp. 239–252.
MLDMMLDM-2011-PiatkowskaMNP #analysis #image #multi #semantics #using
A Decision Support System Based on the Semantic Analysis of Melanoma Images Using Multi-elitist PSO and SVM (WP, JM, LN, KP), pp. 362–374.
RecSysRecSys-2011-Faridani #analysis #canonical #correlation #recommendation #sentiment #using
Using canonical correlation analysis for generalized sentiment analysis, product recommendation and search (SF), pp. 355–358.
RecSysRecSys-2011-LeeL #analysis #behaviour #music #recommendation
My head is your tail: applying link analysis on long-tailed music listening behavior for music recommendation (KL, KL), pp. 213–220.
SEKESEKE-2011-AlmeidaMA #analysis #execution #process #using
Analysis of the continuity of software processes execution in software organizations assessed in MPS.BR using Grounded Theory (CDAdA, TCM, AA), pp. 792–797.
SEKESEKE-2011-BadriT #analysis #control flow #dependence #empirical #testing
Empirical Analysis for Investigating the Effect of Control Flow Dependencies on Testability of Classes (MB, FT), pp. 475–480.
SEKESEKE-2011-ChangSWSP #analysis #component #design #social
Design of Component-based Slow Intelligence Systems and Application to Social Influence Analysis (SKC, YS, YW, CCS, TCP), pp. 9–16.
SEKESEKE-2011-ChenHS #adaptation #analysis #modelling #process #towards #validation
Towards Modeling and Validating Analysis Processes for Software Adaptation (XC, GH, LS), pp. 547–552.
SEKESEKE-2011-DoranTFG #analysis #architecture #nondeterminism #parametricity #reliability
Architecture-based Reliability Analysis With Uncertain Parameters (DD, MT, LF, SSG), pp. 629–634.
SEKESEKE-2011-El-KharboutlyG #analysis #architecture #concurrent #probability #reliability #using
Architecture-based Reliability Analysis of Concurrent Software Applications using Stochastic Reward Nets (REK, SSG), pp. 635–639.
SEKESEKE-2011-GaoGMTBK #analysis #complexity #component #configuration management #modelling #testing
Testing Configurable Component-Based Software — Configuration Test Modeling and Complexity Analysis (JG, JG, AM, CT, XB, DCK), pp. 495–502.
SEKESEKE-2011-GuedesV #analysis #case study #metamodelling #multi #requirements #uml #validation
Applying and Validating a UML Metamodel for the Requirements Analysis in Multi-Agent Systems: The AME-A Case Study (GTAG, RMV), pp. 746–751.
SEKESEKE-2011-GuoC #analysis #comparison #ontology #tool support #visualisation
A Comparison and Analysis of Some Ontology Visualization Tools (SSG, CWC), pp. 357–362.
SEKESEKE-2011-JuniorGM #analysis #architecture #product line #trade-off
A Meta-Process to Support Trade-Off Analysis in Software Product Line Architecture (EAdOJ, IMdSG, JCM), pp. 687–692.
SEKESEKE-2011-LiuL #analysis #parallel #petri net #pointer #thread
Multithreaded Pointer Analysis Based on Petri Net (FL, BL), pp. 127–130.
SEKESEKE-2011-MoserWHB #analysis #automation #detection #empirical #requirements #semantics
Automating the Detection of Complex Semantic Conflicts between Software Requirements (An empirical study on requirements conflict analysis with semantic technology) (TM, DW, MH, SB), pp. 729–735.
SEKESEKE-2011-SanfordWX #analysis #modelling #security #using
Security Analysis of FileZilla Server Using Threat Models (MS, DW, DX), pp. 678–682.
SEKESEKE-2011-WuXKP #analysis #data mining #debugging #mining #named #reliability
BUGMINER: Software Reliability Analysis Via Data Mining of Bug Reports (LW, BX, GEK, RJP), pp. 95–100.
SIGIRSIGIR-2011-BelloginCC #analysis #hybrid #network #recommendation #self #social
Self-adjusting hybrid recommenders based on social network analysis (AB, PC, IC), pp. 1147–1148.
SIGIRSIGIR-2011-Campos #analysis #query #using #web
Using k-Top retrieved web snippets to date temporalimplicit queries based on web content analysis (RNTC), pp. 1325–1326.
SIGIRSIGIR-2011-FangSSKM #analysis #query
Analysis of an expert search query log (YF, NS, LS, JK, APM), pp. 1189–1190.
SIGIRSIGIR-2011-KotovBWDT #analysis #modelling
Modeling and analysis of cross-session search tasks (AK, PNB, RWW, STD, JT), pp. 5–14.
SIGIRSIGIR-2011-Shokouhi #analysis #detection #query
Detecting seasonal queries by time-series analysis (MS), pp. 1171–1172.
SIGIRSIGIR-2011-SilvaGVMF #analysis #effectiveness #self #sentiment
Effective sentiment stream analysis with self-augmenting training and demand-driven projection (ISS, JG, AV, WMJ, RF), pp. 475–484.
SIGIRSIGIR-2011-WangA #analysis #semantics
Temporal latent semantic analysis for collaboratively generated content: preliminary results (YW, EA), pp. 1145–1146.
SIGIRSIGIR-2011-WeerkampBKMBR #analysis #people
People searching for people: analysis of a people search engine log (WW, RB, BK, EM, KB, MdR), pp. 45–54.
SIGIRSIGIR-2011-WeiHL #analysis #framework #recommendation #semantics
A unified framework for recommendations based on quaternary semantic analysis (WC, WH, MLL), pp. 1023–1032.
SIGIRSIGIR-2011-YangYD #analysis #network #predict
Award prediction with temporal citation network analysis (ZY, DY, BDD), pp. 1203–1204.
SIGIRSIGIR-2011-YinHXD #analysis #microblog
Link formation analysis in microblogs (DY, LH, XX, BDD), pp. 1235–1236.
SIGIRSIGIR-2011-Zhai #analysis #modelling #statistics #topic
Beyond search: statistical topic models for text analysis (CZ), pp. 3–4.
BXBX-2011-Hermann #analysis #graph grammar #model transformation
Analysis of Model Transformations based on TGGs (FH), p. 52.
ECMFAECMFA-2011-ColomboKL #analysis #design #generative #modelling #problem #requirements #using
Generating Early Design Models from Requirements Analysis Artifacts Using Problem Frames and SysML (PC, FK, LL), pp. 97–114.
ICMTICMT-2011-AmstelB #analysis #maintenance #model transformation
Model Transformation Analysis: Staying Ahead of the Maintenance Nightmare (MvA, MvdB), pp. 108–122.
ICMTICMT-2011-LepperT #analysis #optimisation #performance #visitor
Optimization of Visitor Performance by Reflection-Based Analysis (ML, BTyW), pp. 15–30.
MODELSMoDELS-2011-MaozRR #analysis #configuration management #consistency #diagrams #semantics
Semantically Configurable Consistency Analysis for Class and Object Diagrams (SM, JOR, BR), pp. 153–167.
MODELSMoDELS-2011-MaozRR11a #alloy #analysis #diagrams #named #revisited #using
CD2Alloy: Class Diagrams Analysis Using Alloy Revisited (SM, JOR, BR), pp. 592–607.
MODELSMoDELS-2011-MaozRR #analysis #configuration management #consistency #diagrams #semantics
Semantically Configurable Consistency Analysis for Class and Object Diagrams (SM, JOR, BR), pp. 153–167.
MODELSMoDELS-2011-MaozRR11a #alloy #analysis #diagrams #named #revisited #using
CD2Alloy: Class Diagrams Analysis Using Alloy Revisited (SM, JOR, BR), pp. 592–607.
ECOOPECOOP-2011-PrabhuMBIG #analysis #c++ #exception #interprocedural
Interprocedural Exception Analysis for C++ (PP, NM, GB, FI, AG), pp. 583–608.
OOPSLAOOPSLA-2011-DohertyHR #analysis #matlab
Kind analysis for MATLAB (JD, LJH, SR), pp. 99–118.
OOPSLAOOPSLA-2011-LiSD #analysis #concurrent #detection #named
SOS: saving time in dynamic race detection with stationary analysis (DL, WSa, MBD), pp. 35–50.
OOPSLAOOPSLA-2011-MadhavanK #analysis #approximate #null #verification
Null dereference verification via over-approximated weakest pre-conditions analysis (RM, RK), pp. 1033–1052.
OOPSLAOOPSLA-2011-SeweMSB #analysis #benchmark #design #java #metric #scala #virtual machine
Da capo con scala: design and analysis of a scala benchmark suite for the java virtual machine (AS, MM, AS, WB), pp. 657–676.
OOPSLAOOPSLA-2011-SridharanAPGTB #analysis #named #web
F4F: taint analysis of framework-based web applications (MS, SA, MP, SG, OT, RB), pp. 1053–1068.
TOOLSTOOLS-EUROPE-2011-CianconeFDMG #analysis #component #modelling #named #performance #reliability
KlaperSuite: An Integrated Model-Driven Environment for Reliability and Performance Analysis of Component-Based Systems (AC, AF, MLD, RM, VG), pp. 99–114.
GPCEGPCE-2011-HannousseDA #component #composition #interactive #modelling #static analysis
Static analysis of aspect interaction and composition in component models (AH, RD, GA), pp. 43–52.
LOPSTRLOPSTR-2011-Gallagher #analysis #logic programming #source code #using
Analysis of Logic Programs Using Regular Tree Languages — (Extended Abstract) (JPG), pp. 1–3.
LOPSTRLOPSTR-2011-PilozziS #analysis #self #termination #using
Improved Termination Analysis of CHR Using Self-sustainability Analysis (PP, DDS), pp. 189–204.
LOPSTRLOPSTR-2011-StroderESGF #analysis #complexity #linear #prolog #semantics #termination
A Linear Operational Semantics for Termination and Complexity Analysis of ISO Prolog (TS, FE, PSK, JG, CF), pp. 237–252.
PPDPPPDP-2011-BourdierC #analysis #network #policy #security #term rewriting #using
Symbolic analysis of network security policies using rewrite systems (TB, HC), pp. 77–88.
PPDPPPDP-2011-EscobarKLMMNS #analysis #encryption #protocol #unification #using
Protocol analysis in Maude-NPA using unification modulo homomorphic encryption (SE, DK, CL, CM, JM, PN, RS), pp. 65–76.
QAPLQAPL-2011-AssouramouD #analysis #hybrid #probability
Analysis of Non-Linear Probabilistic Hybrid Systems (JA, JD), pp. 104–119.
QAPLQAPL-2011-LeitnerFischerL #analysis #modelling #named #quantum #safety #uml
QuantUM: Quantitative Safety Analysis of UML Models (FLF, SL), pp. 16–30.
PADLPADL-2011-ChristakisS #detection #fault #message passing #static analysis #using
Detection of Asynchronous Message Passing Errors Using Static Analysis (MC, KFS), pp. 5–18.
POPLPOPL-2011-ChoiAYT #multi #source code #static analysis
Static analysis of multi-staged programs via unstaging translation (WC, BA, KY, MT), pp. 81–92.
POPLPOPL-2011-CousotCL #analysis #array #automation #parametricity #scalability #segmentation
A parametric segmentation functor for fully automatic and scalable array content analysis (PC, RC, FL), pp. 105–118.
POPLPOPL-2011-HoffmannAH #analysis #multi
Multivariate amortized resource analysis (JH, KA, MH), pp. 357–370.
POPLPOPL-2011-LhotakC #analysis #performance #points-to
Points-to analysis with efficient strong updates (OL, KCAC), pp. 3–16.
POPLPOPL-2011-PrabhuRMH #analysis #named
EigenCFA: accelerating flow analysis with GPUs (TP, SR, MM, MWH), pp. 511–522.
POPLPOPL-2011-PrountzosMPM #analysis #graph #optimisation #parallel #source code
A shape analysis for optimizing parallel graph programs (DP, RM, KP, KSM), pp. 159–172.
POPLPOPL-2011-SchwarzSVLM #protocol #source code #static analysis
Static analysis of interrupt-driven programs synchronized via the priority ceiling protocol (MDS, HS, VV, PL, MMO), pp. 93–104.
RERE-2011-CoteHSH #analysis #named #problem #requirements #uml
UML4PF — A tool for problem-oriented requirements analysis (IC, MH, HS, DH), pp. 349–350.
RERE-2011-DekhtyarDHHCK #analysis #on the #performance #requirements #statistics
On human analyst performance in assisted requirements tracing: Statistical analysis (AD, OD, JH, JHH, DC, WKK), pp. 111–120.
RERE-2011-KomssiKTLD #analysis #perspective #process
Integrating analysis of customers’ processes into roadmapping: The value-creation perspective (MK, MK, HT, LL, AMD), pp. 57–66.
RERE-2011-UbayashiKHT #analysis #bound #embedded
A context analysis method for embedded systems — Exploring a requirement boundary between a system and its context (NU, YK, MH, TT), pp. 143–152.
RERE-2011-WeverM #analysis #effectiveness #question #what
What are the day-to-day factors that are preventing business analysts from effective business analysis? (AW, NAMM), pp. 293–298.
SACSAC-2011-ClaycombS #analysis #authentication #formal method #ubiquitous
Formal analysis of device authentication applications in ubiquitous computing (WC, DS), pp. 451–452.
SACSAC-2011-ClevenWW #analysis #design #performance #problem #process
Process performance management: illuminating design issues through a systematic problem analysis (AC, RW, FW), pp. 280–286.
SACSAC-2011-DingZ #analysis #forensics
Time based data forensic and cross-reference analysis (XD, HZ), pp. 185–190.
SACSAC-2011-ElahiY #analysis #heuristic #metric #requirements #trade-off
Requirements trade-offs analysis in the absence of quantitative measures: a heuristic method (GE, ESKY), pp. 651–658.
SACSAC-2011-GomiI #analysis
A personal photograph browser for life log analysis based on location, time, and person (AG, TI), pp. 1245–1251.
SACSAC-2011-GutzmannLL #analysis #points-to
Feedback-driven points-to analysis (TG, JL, WL), pp. 1341–1342.
SACSAC-2011-HaBKBJ #analysis #network #perspective #social
Analyzing a Korean blogosphere: a social network analysis perspective (JH, DHB, SWK, SCB, BSJ), pp. 773–777.
SACSAC-2011-HuangK #ad hoc #analysis #performance
Performance analysis of IEEE 802.11 ad hoc based broadcast (YHH, CYK), pp. 72–73.
SACSAC-2011-LammelPS #analysis #java #open source #scalability
Large-scale, AST-based API-usage analysis of open-source Java projects (RL, EP, JS), pp. 1317–1324.
SACSAC-2011-LanLSH #algorithm #analysis #case study #classification #comparative #image
A comparative study and analysis on K-view based algorithms for image texture classification (YL, HL, ES, CCH), pp. 859–860.
SACSAC-2011-LiuCJ #aspect-oriented #impact analysis #object-oriented #source code
Change impact analysis for object-oriented programs evolved to aspect-oriented programs (CHL, SLC, WLJ), pp. 59–65.
SACSAC-2011-LiuZ11a #analysis #distance #performance #stack #worst-case
Stack distance based worst-case instruction cache performance analysis (YL, WZ), pp. 723–728.
SACSAC-2011-LuKNB #analysis #approach #embedded #realtime #simulation #statistics #validation
A statistical approach to simulation model validation in response-time analysis of complex real-time embedded systems (YL, JK, TN, IB), pp. 711–716.
SACSAC-2011-MagalhaesS #analysis #performance
Root-cause analysis of performance anomalies in web-based applications (JPM, LMS), pp. 209–216.
SACSAC-2011-ManyD #analysis #evaluation #fault tolerance #scheduling
Fault tolerance evaluation and schedulability analysis (FM, DD), pp. 729–734.
SACSAC-2011-SinhaTKWG #analysis #mobile #resource management
Resource-aware ECG analysis on mobile devices (AS, HT, SK, ABW, MMG), pp. 1012–1013.
SACSAC-2011-SunLZTCW #dependence #impact analysis #object-oriented #source code #using
Using lattice of class and method dependence for change impact analysis of object oriented programs (XS, BL, SZ, CT, XC, WW), pp. 1439–1444.
SACSAC-2011-VarelaABM #analysis #aspect-oriented #product line #requirements
Aspect-oriented analysis for software product lines requirements engineering (PV, JA, ISB, AMDM), pp. 667–674.
SACSAC-2011-YamamotoT #analysis #named #web
ImageAlert: credibility analysis of text-image pairs on the web (YY, KT), pp. 1724–1731.
SACSAC-2011-Zhang #analysis #constraints #geometry #graph #problem
Well-constrained completion for under-constrained geometric constraint problem based on connectivity analysis of graph (GFZ), pp. 1094–1099.
ESEC-FSEESEC-FSE-2011-JensenMM #api #html #javascript #modelling #static analysis #web
Modeling the HTML DOM and browser API in static analysis of JavaScript web applications (SHJ, MM, AM), pp. 59–69.
ESEC-FSEESEC-FSE-2011-LiCK #analysis #performance #points-to #using
Boosting the performance of flow-sensitive points-to analysis using value flow (LL, CC, NK), pp. 343–353.
ESEC-FSEESEC-FSE-2011-MeneelyRW #analysis #empirical #quality
Does adding manpower also affect quality?: an empirical, longitudinal analysis (AM, PR, LW), pp. 81–90.
ESEC-FSEESEC-FSE-2011-RamamurthiRS #analysis #data flow #graph #probability #using
Probabilistic dataflow analysis using path profiles on structure graphs (AR, SR, YNS), pp. 512–515.
GTTSEGTTSE-2011-CleveNH #database #program analysis #reverse engineering
Dynamic Program Analysis for Database Reverse Engineering (AC, NN, JLH), pp. 297–321.
GTTSEGTTSE-2011-Fuhrer #ide #static analysis
Leveraging Static Analysis in an IDE (RMF), pp. 101–158.
ICSEICSE-2011-AcharyaR #impact analysis #industrial #slicing
Practical change impact analysis based on static program slicing for industrial software systems (MA, BR), pp. 746–755.
ICSEICSE-2011-AdlerBRSSUZ #analysis #scalability #test coverage
Code coverage analysis in practice for large systems (YA, NB, OR, OS, NS, SU, AZ), pp. 736–745.
ICSEICSE-2011-BoddenSSOM #static analysis
Taming reflection: Aiding static analysis in the presence of reflection and custom class loaders (EB, AS, JS, HO, MM), pp. 241–250.
ICSEICSE-2011-CataldoH #analysis #development #empirical #feature model #integration
Factors leading to integration failures in global feature-oriented development: an empirical analysis (MC, JDH), pp. 161–170.
ICSEICSE-2011-Goeritzer #impact analysis #industrial #using
Using impact analysis in industry (RG), pp. 1155–1157.
ICSEICSE-2011-LiuZ #program analysis
Program analysis: from qualitative analysis to quantitative analysis (SL, JZ), pp. 956–959.
ICSEICSE-2011-Malik #analysis #graph #using
Dynamic shape analysis of program heap using graph spectra (MZM), pp. 952–955.
ICSEICSE-2011-NearMKJ #analysis #dependence #evaluation #lightweight
A lightweight code analysis and its role in evaluation of a dependability case (JPN, AM, EK, DJ), pp. 31–40.
ICSEICSE-2011-PirzadehH #analysis #behaviour #framework
A software behaviour analysis framework based on the human perception systems (HP, AHL), pp. 948–951.
ICSEICSE-2011-RamasubbuCBH #analysis #configuration management #multi #quality
Configuring global software teams: a multi-company analysis of project productivity, quality, and profits (NR, MC, RKB, JDH), pp. 261–270.
ICSEICSE-2011-SchmerlGDBC #analysis #case study #design #framework #named
SORASCS: a case study in soa-based platform design for socio-cultural analysis (BRS, DG, VD, MWB, KMC), pp. 643–652.
ICSEICSE-2011-SumnerBZP #analysis #nondeterminism #performance
Coalescing executions for fast uncertainty analysis (WNS, TB, XZ, SP), pp. 581–590.
ICSEICSE-2011-XiaoZZ #analysis #data type
Tracking data structures for postmortem analysis (XX, JZ, CZ), pp. 896–899.
ICSEICSE-2011-Xue #analysis #automation #legacy #product line #re-engineering #variability
Reengineering legacy software products into software product line based on automatic variability analysis (YX), pp. 1114–1117.
LDTALDTA-2011-GiegerichS #analysis #compilation
Yield grammar analysis in the Bellman’s GAP compiler (RG, GS), p. 7.
SLESLE-2011-HillsKV #named #program analysis #rascal
RLSRunner: Linking Rascal with K for Program Analysis (MH, PK, JJV), pp. 344–353.
SLESLE-2011-KlintLP #analysis #towards #visualisation
Towards a One-Stop-Shop for Analysis, Transformation and Visualization of Software (PK, BL, AvdP), pp. 1–18.
PLEASEPLEASE-2011-ChastekDM #analysis #variability
Commonality and variability analysis for resource constrained organizations (GJC, PD, JDM), pp. 31–34.
ASPLOSASPLOS-2011-ChipounovKC #analysis #framework #multi #named
S2E: a platform for in-vivo multi-path analysis of software systems (VC, VK, GC), pp. 265–278.
CCCC-2011-JoynerBS #analysis #array #bound
Subregion Analysis and Bounds Check Elimination for High Level Arrays (MJ, ZB, VS), pp. 246–265.
CCCC-2011-NaeemL #alias #analysis #performance #set #summary #using
Faster Alias Set Analysis Using Summaries (NAN, OL), pp. 82–103.
CCCC-2011-RimsadP #analysis #source code
Tainted Flow Analysis on e-SSA-Form Programs (AR, Md, FMQP), pp. 124–143.
CCCC-2011-RodriguezL #analysis #data flow #parallel
Actor-Based Parallel Dataflow Analysis (JR, OL), pp. 179–197.
CCCC-2011-SunZC #analysis #java #points-to #probability
Probabilistic Points-to Analysis for Java (QS, JZ, YC), pp. 62–81.
CGOCGO-2011-GreathouseLAB #analysis #data flow #distributed #scalability
Highly scalable distributed dataflow analysis (JLG, CL, TMA, VB), pp. 277–288.
CGOCGO-2011-HardekopfL #analysis #pointer
Flow-sensitive pointer analysis for millions of lines of code (BH, CL), pp. 289–298.
CGOCGO-2011-LiuM #analysis #locality #problem #using
Pinpointing data locality problems using data-centric analysis (XL, JMMC), pp. 171–180.
CGOCGO-2011-NasreG #analysis #constraints #evaluation #performance #points-to
Prioritizing constraint evaluation for efficient points-to analysis (RN, RG), pp. 267–276.
HPCAHPCA-2011-LeeSNY #analysis #order
Offline symbolic analysis to infer Total Store Order (DL, MS, SN, ZY), pp. 357–358.
HPCAHPCA-2011-ZhangO #analysis #architecture #gpu #performance
A quantitative performance analysis model for GPU architectures (YZ, JDO), pp. 382–393.
HPDCHPDC-2011-MinhW #analysis #parallel #performance #towards
Towards a profound analysis of bags-of-tasks in parallel systems and their performance impact (TNM, LW), pp. 111–122.
LCTESLCTES-2011-AlbertAGZ #analysis #parallel
Task-level analysis for a language with async/finish parallelism (EA, PA, SG, DZ), pp. 21–30.
LCTESLCTES-2011-AlthausAN #analysis #parametricity #performance #precise
Precise and efficient parametric path analysis (EA, SA, RN), pp. 141–150.
LCTESLCTES-2011-Cullmann #analysis #novel #persistent #theory and practice
Cache persistence analysis: a novel approachtheory and practice (CC), pp. 121–130.
LCTESLCTES-2011-GamatieG #design #embedded #multi #performance #source code #static analysis
Static analysis of synchronous programs in signal for efficient design of multi-clocked embedded systems (AG, LG), pp. 71–80.
PPoPPPPoPP-2011-DonaldsonKR #analysis #automation #named
SCRATCH: a tool for automatic analysis of dma races (AFD, DK, PR), pp. 311–312.
SOSPSOSP-2011-ChenSGK #analysis #design #enterprise #multi
Design implications for enterprise storage systems via multi-dimensional trace analysis (YC, KS, GRG, RHK), pp. 43–56.
CADECADE-2011-AlbertiAR #analysis #automation #named #policy #security
ASASP: Automated Symbolic Analysis of Security Policies (FA, AA, SR), pp. 26–33.
CADECADE-2011-FredriksonCJ #algorithm #analysis #approximate #behaviour #complexity
Dynamic Behavior Matching: A Complexity Analysis and New Approximation Algorithms (MF, MC, SJ), pp. 252–267.
CADECADE-2011-NoschinskiEG #analysis #complexity #dependence #framework #term rewriting
A Dependency Pair Framework for Innermost Complexity Analysis of Term Rewrite Systems (LN, FE, JG), pp. 422–438.
CADECADE-2011-PayetS #android #source code #static analysis
Static Analysis of Android Programs (ÉP, FS), pp. 439–445.
CAVCAV-2011-AtigBP #analysis
Getting Rid of Store-Buffers in TSO Analysis (MFA, AB, GP), pp. 99–115.
CAVCAV-2011-BabicRS #analysis #automaton
Malware Analysis with Tree Automata Inference (DB, DR, DS), pp. 116–131.
CAVCAV-2011-BardinHLLTV #analysis #framework
The BINCOA Framework for Binary Code Analysis (SB, PH, JL, OL, RT, AV), pp. 165–170.
CAVCAV-2011-BrazdilKK #analysis #bound #performance #probability #source code
Efficient Analysis of Probabilistic Programs with an Unbounded Counter (TB, SK, AK), pp. 208–224.
CAVCAV-2011-BrumleyJAS #analysis #framework #named
BAP: A Binary Analysis Platform (DB, IJ, TA, EJS), pp. 463–469.
CAVCAV-2011-ChatterjeeHJS #algorithm #analysis #automaton #markov #process
Symbolic Algorithms for Qualitative Analysis of Markov Decision Processes with Büchi Objectives (KC, MH, MJ, NS), pp. 260–276.
CAVCAV-2011-CookKV #program analysis #verification
Temporal Property Verification as a Program Analysis Task (BC, EK, MYV), pp. 333–348.
CAVCAV-2011-GaneshKAGHE #analysis #detection #named #string #testing
HAMPI: A String Solver for Testing, Analysis and Vulnerability Detection (VG, AK, SA, PJG, PH, MDE), pp. 1–19.
CAVCAV-2011-Lahiri #analysis #composition #smt
SMT-Based Modular Analysis of Sequential Systems Code (SKL), pp. 21–27.
CAVCAV-2011-LeeYP #data type #program analysis
Program Analysis for Overlaid Data Structures (OL, HY, RP), pp. 592–608.
CSLCSL-2011-Aschieri #analysis
Transfinite Update Procedures for Predicative Systems of Analysis (FA), pp. 20–34.
ICLPICLP-2011-ChristiansenHLP #analysis #network #sequence
Bayesian Annotation Networks for Complex Sequence Analysis (HC, CTH, OTL, MP), pp. 220–230.
ICLPICLP-J-2011-CodishGBFG #analysis #constraints #integer #satisfiability #termination #using
SAT-based termination analysis using monotonicity constraints over the integers (MC, IG, AMBA, CF, JG), pp. 503–520.
ICLPICLP-J-2011-VoetsS #analysis #integer #logic programming #source code
Non-termination analysis of logic programs with integer arithmetics (DV, DDS), pp. 521–536.
ICSTICST-2011-CzerwonkaDNTT #analysis #case study #experience #named #predict
CRANE: Failure Prediction, Change Analysis and Test Prioritization in Practice — Experiences from Windows (JC, RD, NN, AT, AT), pp. 357–366.
ICSTICST-2011-EldhHP #analysis #design #testing
Analysis of Mistakes as a Method to Improve Test Case Design (SE, HH, SP), pp. 70–79.
ICSTICST-2011-TsankovJOS #dynamic analysis #execution
Execution Hijacking: Improving Dynamic Analysis by Flying off Course (PT, WJ, AO, SS), pp. 200–209.
ISSTAISSTA-2011-BalasubramanianPWKL #analysis #modelling #multi #named #statechart
Polyglot: modeling and analysis for multiple Statechart formalisms (DB, CSP, MWW, GK, MRL), pp. 45–55.
ISSTAISSTA-2011-GuoE #automation #data analysis #persistent #using
Using automatic persistent memoization to facilitate data analysis scripting (PJG, DRE), pp. 287–297.
ISSTAISSTA-2011-McGillDS #analysis #concept #modelling #scalability
Scalable analysis of conceptual data models (MJM, LKD, REKS), pp. 56–66.
ISSTAISSTA-2011-TateishiPT #analysis #higher-order #logic #monad #string
Path- and index-sensitive string analysis based on monadic second-order logic (TT, MP, OT), pp. 166–176.
ISSTAISSTA-2011-XiaoZ #analysis #encoding #geometry #java #performance #points-to
Geometric encoding: forging the high performance context sensitive points-to analysis for Java (XX, CZ), pp. 188–198.
ISSTAISSTA-2011-YanXR #alias #analysis #java
Demand-driven context-sensitive alias analysis for Java (DY, G(X, AR), pp. 155–165.
ISSTAISSTA-2011-YasmeenG #analysis #automation #framework
Automated framework for formal operator task analysis (AY, ELG), pp. 78–88.
LICSLICS-2011-Marion #analysis #complexity #type system
A Type System for Complexity Flow Analysis (JYM), pp. 123–132.
RTARTA-2011-FalkeKS #analysis #c #compilation #source code #termination #using
Termination Analysis of C Programs Using Compiler Intermediate Languages (SF, DK, CS), pp. 41–50.
TAPTAP-2011-ChebaroKGJ #analysis #c #debugging #generative #slicing #testing
The SANTE Tool: Value Analysis, Program Slicing and Test Generation for C Program Debugging (OC, NK, AG, JJ), pp. 78–83.
VMCAIVMCAI-2011-AlbertGM #cost analysis #precise
More Precise Yet Widely Applicable Cost Analysis (EA, SG, ANM), pp. 38–53.
VMCAIVMCAI-2011-DonaldsonHK #lightweight #static analysis
Strengthening Induction-Based Race Checking with Lightweight Static Analysis (AFD, LH, DK), pp. 169–183.
VMCAIVMCAI-2011-GawlitzaLMSW #analysis #concurrent #process #reachability #source code
Join-Lock-Sensitive Forward Reachability Analysis for Concurrent Programs with Dynamic Process Creation (TMG, PL, MMO, HS, AW), pp. 199–213.
VMCAIVMCAI-2011-GoubaultP #finite #precise #static analysis
Static Analysis of Finite Precision Computations (EG, SP), pp. 232–247.
VMCAIVMCAI-2011-HooimeijerV #algorithm #analysis #automaton #evaluation #string
An Evaluation of Automata Algorithms for String Analysis (PH, MV), pp. 248–262.
VMCAIVMCAI-2011-KimC #abstract interpretation #analysis #string
String Analysis as an Abstract Interpretation (SWK, KMC), pp. 294–308.
VMCAIVMCAI-2011-OhBY #locality
Access Analysis-Based Tight Localization of Abstract Memories (HO, LB, KY), pp. 356–370.
VMCAIVMCAI-2011-SiegelG #analysis #formal method #message passing
Formal Analysis of Message Passing — (Invited Talk) (SFS, GG), pp. 2–18.
CBSECBSE-2010-FilieriGGM #analysis #component #multi #reliability
Reliability Analysis of Component-Based Systems with Multiple Failure Modes (AF, CG, VG, RM), pp. 1–20.
ECSAECSA-2010-KiwelekarJ #analysis #architecture #generative #ontology
Ontological Analysis for Generating Baseline Architectural Descriptions (AWK, RKJ), pp. 417–424.
ECSAECSA-2010-KiwelekarJ10a #architecture #communication #concept analysis #identification
Identifying Architectural Connectors through Formal Concept Analysis of Communication Primitives (AWK, RKJ), pp. 515–518.
ASEASE-2010-FattoriPMM #analysis
Dynamic and transparent analysis of commodity production systems (AF, RP, LM, MM), pp. 417–426.
ASEASE-2010-IvanovOSV #analysis #behaviour #embedded #modelling #set #tool support
REMES tool-chain: a set of integrated tools for behavioral modeling and analysis of embedded systems (DI, MO, CCS, AV), pp. 361–362.
ASEASE-2010-Letarte #analysis #graph #interprocedural #model checking #precise #representation
Model checking graph representation of precise boolean inter-procedural flow analysis (DL), pp. 511–516.
ASEASE-2010-LiangWWWXM #automation #effectiveness #set #static analysis
Automatic construction of an effective training set for prioritizing static analysis warnings (GL, LW, QW, QW, TX, HM), pp. 93–102.
CASECASE-2010-AhnM #analysis #behaviour #clustering #modelling #tool support
Analysis of circular cluster tools: Transient behavior and semiconductor equipment models (YA, JRM), pp. 39–44.
CASECASE-2010-AshrafTANBT #analysis #array
Structural and microfluidic analysis of MEMS based out-of-plane hollow silicon microneedle array for drug delivery (MWA, ST, NA, AN, ELB, AT), pp. 258–262.
CASECASE-2010-CaiM #analysis #approach #hybrid #industrial #process
Dwell-time approach to stability analysis for hybrid control systems: Application to an industrial refrigeration process (CC, SM), pp. 728–733.
CASECASE-2010-ChenWZZF #analysis #performance #process #towards
Towards performance analysis of wheel loading process in automotive manufacturing (HC, JW, BZ, GZ, TAF), pp. 234–239.
CASECASE-2010-DhupatiKRR #analysis #detection #novel #speech #using #validation
A novel drowsiness detection scheme based on speech analysis with validation using simultaneous EEG recordings (LSD, SK, AR, AR), pp. 917–921.
CASECASE-2010-GuoZW #analysis
Directed motion of an atomic scale engine and stability analysis (YG, WZ, ZW), pp. 545–550.
CASECASE-2010-HuSF #analysis #biology #using
Dynamics analysis and closed-loop control of biological cells in transportation using robotic manipulation system with optical tweezers (SH, DS, GF), pp. 240–245.
CASECASE-2010-IshiiONTOTM #analysis #image #using
Cardiac motion analysis of a rat model for myocardial infarction using high-frame-rate stereo images (II, TO, YN, TT, KO, AT, HM), pp. 780–785.
CASECASE-2010-LiH #analysis #framework #modelling #problem
Modeling and analysis of hospital emergency department: An analytical framework and problem formulation (JL, PKH), pp. 897–902.
CASECASE-2010-PintoKK #analysis #modelling #probability
A model-based end-to-end toolchain for the probabilistic analysis of complex systems (AP, SK, SK), pp. 994–1000.
CASECASE-2010-RodriguezBMRW #analysis #assembly #detection
Failure detection in assembly: Force signature analysis (AR, DB, MTM, GFR, JW), pp. 210–215.
CASECASE-2010-SouzaPC #analysis #distributed #implementation #network #predict
Distributed model predictive control applied to urban traffic networks: Implementation, experimentation, and analysis (FAdS, VBP, EC), pp. 399–405.
CASECASE-2010-TahersimaSRN #analysis
Thermal analysis of an HVAC system with TRV controlled hydronic radiator (FT, JS, HR, PGN), pp. 756–761.
CASECASE-2010-Zhang #analysis #design #exponential
Kanban-controlled exponential production lines: Analysis and design (LZ), pp. 445–450.
CASECASE-2010-ZhangWPTCPJ #analysis
Micro-thermal-fluid transient analysis and active control for two-phase microelectronics cooling (TZ, JTW, YP, TT, JYC, RP, MKJ), pp. 750–755.
DACDAC-2010-DadgourHSB #analysis #design #energy #logic #using
Design and analysis of compact ultra energy-efficient logic gates using laterally-actuated double-electrode NEMS (HFD, MMH, CS, KB), pp. 893–896.
DACDAC-2010-FengZ #analysis #grid #parallel #power management #robust
Parallel multigrid preconditioning on graphics processing units (GPUs) for robust power grid analysis (ZF, ZZ), pp. 661–666.
DACDAC-2010-FonsecaDBGPVB #analysis #reliability #simulation #statistics
A statistical simulation method for reliability analysis of SRAM core-cells (RAF, LD, AB, PG, SP, AV, NB), pp. 853–856.
DACDAC-2010-GaoYWY #analysis #correlation #estimation #performance #statistics
Efficient tail estimation for massive correlated log-normal sums: with applications in statistical leakage analysis (MG, ZY, YW, ZY), pp. 475–480.
DACDAC-2010-GlassLHT #analysis #reliability #scalability #towards
Towards scalable system-level reliability analysis (MG, ML, CH, JT), pp. 234–239.
DACDAC-2010-HorowitzJLLLM #analysis #equivalence #modelling
Fortifying analog models with equivalence checking and coverage analysis (MH, MJ, FL, SL, BL, JM), pp. 425–430.
DACDAC-2010-HsuLML #analysis #flexibility
Static timing analysis for flexible TFT circuits (CHH, CL, EHM, JCML), pp. 799–802.
DACDAC-2010-JuHRC #analysis #multi #source code
Timing analysis of esterel programs on general-purpose multiprocessors (LJ, BKH, AR, SC), pp. 48–51.
DACDAC-2010-LiuYT #algorithm #analysis #performance #robust #scalability
A robust periodic arnoldi shooting algorithm for efficient analysis of large-scale RF/MM ICs (XL, HY, SXDT), pp. 573–578.
DACDAC-2010-Miskov-ZivanovM #analysis #formal method #modelling #reasoning #reliability
Formal modeling and reasoning for reliability analysis (NMZ, DM), pp. 531–536.
DACDAC-2010-ObergHITSK #analysis #data flow
Theoretical analysis of gate level information flow tracking (JO, WH, AI, MT, TS, RK), pp. 244–247.
DACDAC-2010-SchranzhoferPCTC #analysis #manycore #modelling #resource management #worst-case
Worst-case response time analysis of resource access models in multi-core systems (AS, RP, JJC, LT, MC), pp. 332–337.
DACDAC-2010-ShenTX #algorithm #analysis #correlation #linear #power management #statistics
A linear algorithm for full-chip statistical leakage power analysis considering weak spatial correlation (RS, SXDT, JX), pp. 481–486.
DACDAC-2010-SilvaPS #analysis #modelling #parametricity
Speedpath analysis under parametric timing models (LGeS, JRP, LMS), pp. 268–273.
DACDAC-2010-TangZBM #analysis #simulation #statistics
RDE-based transistor-level gate simulation for statistical static timing analysis (QT, AZ, MB, NvdM), pp. 787–792.
DACDAC-2010-XieNXZLWYWL #analysis #fault
Crosstalk noise and bit error rate analysis for optical network-on-chip (YX, MN, JX, WZ, QL, XW, YY, XW, WL), pp. 657–660.
DACDAC-2010-YangALLP #3d #analysis #layout #optimisation
TSV stress aware timing analysis with applications to 3D-IC layout optimization (JSY, KA, YJL, SKL, DZP), pp. 803–806.
DACDAC-2010-YoonCPC #analysis #comparative #multi #network #physics
Virtual channels vs. multiple physical networks: a comparative analysis (YJY, NC, MP, LPC), pp. 162–165.
DACDAC-2010-ZengYFL #analysis #network #optimisation #power management #trade-off
Tradeoff analysis and optimization of power delivery networks with on-chip voltage regulation (ZZ, XY, ZF, PL), pp. 831–836.
DACDAC-2010-ZhangLH #analysis
Separatrices in high-dimensional state space: system-theoretical tangent computation and application to SRAM dynamic stability analysis (YZ, PL, GMH), pp. 567–572.
DACDAC-2010-ZuberDM #analysis #approach #statistics
A holistic approach for statistical SRAM analysis (PZ, PD, MM), pp. 717–722.
DATEDATE-2010-BauerSF #analysis #network #worst-case
Worst-case end-to-end delay analysis of an avionics AFDX network (HB, JLS, CF), pp. 1220–1224.
DATEDATE-2010-CastrillonVSSCLAM #analysis
Trace-based KPN composability analysis for mapping simultaneous applications to MPSoC platforms (JC, RV, AS, WS, JC, RL, GA, HM), pp. 753–758.
DATEDATE-2010-ChanHBBC #analysis #named #network
PhoenixSim: A simulator for physical-layer analysis of chip-scale photonic interconnection networks (JC, GH, AB, KB, LPC), pp. 691–696.
DATEDATE-2010-ChenDS #algorithm #analysis
Properties of and improvements to time-domain dynamic thermal analysis algorithms (XC, RPD, LS), pp. 1165–1170.
DATEDATE-2010-ChouYCDK #case study #design #nondeterminism #scalability
Finding reset nondeterminism in RTL designs — scalable X-analysis methodology and case study (HZC, HY, KHC, DD, SYK), pp. 1494–1499.
DATEDATE-2010-DietrichEH #analysis #statistics #using
Digital statistical analysis using VHDL (MD, UE, JH), pp. 1007–1010.
DATEDATE-2010-GuglielmoFP #analysis
Vacuity analysis for property qualification by mutation of checkers (LDG, FF, GP), pp. 478–483.
DATEDATE-2010-HatamiP #analysis #component #library #performance #representation #robust #using
Efficient representation, stratification, and compression of variational CSM library waveforms using Robust Principle Component Analysis (SH, MP), pp. 1285–1290.
DATEDATE-2010-JaffariA10a #analysis #correlation #performance #variability
Correlation controlled sampling for efficient variability analysis of analog circuits (JJ, MA), pp. 1305–1308.
DATEDATE-2010-KanoriaMM #analysis #markov #monte carlo #statistics #using
Statistical static timing analysis using Markov chain Monte Carlo (YK, SM, AM), pp. 813–818.
DATEDATE-2010-KlobedanzKT0 #analysis #case study #development #modelling
Timing modeling and analysis for AUTOSAR-based software development — a case study (KK, CK, AT, WM), pp. 642–645.
DATEDATE-2010-LakshmananBR #analysis
Integrated end-to-end timing analysis of networked AUTOSAR-compliant systems (KL, GB, RR), pp. 331–334.
DATEDATE-2010-LarsenLNP #analysis #realtime #synthesis #using
Scenario-based analysis and synthesis of real-time systems using uppaal (KGL, SL, BN, SP), pp. 447–452.
DATEDATE-2010-LiSBNO #analysis #implementation
Power Variance Analysis breaks a masked ASIC implementation of AES (YL, KS, LB, DN, KO), pp. 1059–1064.
DATEDATE-2010-LomneDMTR #analysis #difference #preprocessor #statistics
Differential Power Analysis enhancement with statistical preprocessing (VL, AD, PM, LT, MR), pp. 1301–1304.
DATEDATE-2010-LuckenbillLHMH #algorithm #analysis #fault #logic #named #reliability
RALF: Reliability Analysis for Logic Faults — An exact algorithm and its applications (SBL, JYL, YH, RM, LH), pp. 783–788.
DATEDATE-2010-PellizzoniSCCT #analysis #manycore #memory management
Worst case delay analysis for memory interference in multicore systems (RP, AS, JJC, MC, LT), pp. 741–746.
DATEDATE-2010-QaziTDSC #analysis #performance #reduction
Loop flattening & spherical sampling: Highly efficient model reduction techniques for SRAM yield analysis (MQ, MT, LD, DS, AC), pp. 801–806.
DATEDATE-2010-RitheGWDGBC #analysis #logic #statistics
Non-linear Operating Point Statistical Analysis for Local Variations in logic timing at low voltage (RR, JG, AW, SD, GG, DB, AC), pp. 965–968.
DATEDATE-2010-SchlieckerNE #analysis #bound #multi #performance
Bounding the shared resource load for the performance analysis of multiprocessor systems (SS, MN, RE), pp. 759–764.
DATEDATE-2010-TraubSKB #network
Scenario extraction for a refined timing-analysis of automotive network topologies (MT, TS, OK, JB), pp. 81–86.
DATEDATE-2010-VasudevanSPTTJ #automation #data mining #generative #mining #named #static analysis #using
GoldMine: Automatic assertion generation using data mining and static analysis (SV, DS, SJP, DT, WT, DRJ), pp. 626–629.
DATEDATE-2010-WieckowskiSBCIPA #analysis #black box
A black box method for stability analysis of arbitrary SRAM cell structures (MW, DS, DB, VC, SI, CP, RCA), pp. 795–800.
DATEDATE-2010-ZuberMDZJ #analysis #statistics
Statistical SRAM analysis for yield enhancement (PZ, MM, PD, KvdZ, JHJ), pp. 57–62.
DocEngDocEng-2010-AutexierM #documentation #impact analysis #semantics
Semantics-based change impact analysis for heterogeneous collections of documents (SA, NM), pp. 97–106.
DocEngDocEng-2010-TerradesTSRVJ #analysis #documentation #interactive #layout
Interactive layout analysis and transcription systems for historic handwritten documents (ORT, AHT, NS, VR, EV, AJ), pp. 219–222.
DRRDRR-2010-BallKSN #analysis #documentation #using
Analysis of line structure in handwritten documents using the Hough transform (GRB, HK, SNS, AN), pp. 1–10.
HTHT-2010-CartledgeN #analysis #graph
Analysis of graphs for digital preservation suitability (CLC, MLN), pp. 109–118.
HTHT-2010-MitzlaffBSH #analysis #network
Visit me, click me, be my friend: an analysis of evidence networks of user relationships in BibSonomy (FM, DB, GS, AH), pp. 265–270.
SIGMODSIGMOD-2010-Brown #analysis #array #bibliography #scalability
Overview of sciDB: large scale array storage, processing and analysis (PGB), pp. 963–968.
SIGMODSIGMOD-2010-HanSYY #analysis #approach #database #mining #network
Mining knowledge from databases: an information network analysis approach (JH, YS, XY, PSY), pp. 1251–1252.
VLDBVLDB-2010-AlexandrovBEHHKMNW #data analysis #parallel
Massively Parallel Data Analysis with PACTs on Nephele (AA, DB, SE, MH, FH, OK, VM, EN, DW), pp. 1625–1628.
VLDBVLDB-2010-BotanDDHMT #analysis #execution #named #semantics
SECRET: A Model for Analysis of the Execution Semantics of Stream Processing Systems (IB, RD, ND, LMH, RJM, NT), pp. 232–243.
VLDBVLDB-2010-HaasJAXPJ #analysis #database #named
MCDB-R: Risk Analysis in the Database (SA, RJ, LLP, FX, CMJ, PJH), pp. 782–793.
VLDBVLDB-2010-MelnikGLRSTV #analysis #dataset #interactive #named
Dremel: Interactive Analysis of Web-Scale Datasets (SM, AG, JJL, GR, SS, MT, TV), pp. 330–339.
VLDBVLDB-2010-SrivastavaGGJSSSY #data analysis #realtime
Enabling Real Time Data Analysis (DS, LG, RG, TJ, JS, VS, OS, JY), pp. 1–2.
CSEETCSEET-2010-UsmanKHI #analysis
Pedagogical and Structural Analysis of SE Courses (MU, JIK, MH, NI), pp. 136–143.
ITiCSEITiCSE-2010-Mirolo #analysis #learning #multi #recursion #student
Learning (through) recursion: a multidimensional analysis of the competences achieved by CS1 students (CM), pp. 160–164.
ITiCSEITiCSE-2010-SekiyaMY #analysis #education
Analysis of computer science related curriculum on LDA and Isomap (TS, YM, KY), pp. 48–52.
ESOPESOP-2010-AdjeGG #invariant #policy #static analysis
Coupling Policy Iteration with Semi-definite Relaxation to Compute Accurate Numerical Invariants in Static Analysis (AA, SG, EG), pp. 23–42.
ESOPESOP-2010-Atkey #analysis #logic
Amortised Resource Analysis with Separation Logic (RA), pp. 85–103.
ESOPESOP-2010-HoffmannH #analysis #polynomial
Amortized Resource Analysis with Polynomial Potential (JH, MH), pp. 287–306.
ESOPESOP-2010-VardoulakisS #analysis #approach #control flow #named
CFA2: A Context-Free Approach to Control-Flow Analysis (DV, OS), pp. 570–589.
FASEFASE-2010-BerardinelliCM #analysis #mobile #modelling #performance
Performance Modeling and Analysis of Context-Aware Mobile Software Systems (LB, VC, ADM), pp. 353–367.
FASEFASE-2010-BeyerHTZ #analysis #refinement
Shape Refinement through Explicit Heap Analysis (DB, TAH, GT, DZ), pp. 263–277.
FASEFASE-2010-EhrigERBP #analysis #formal method #self #verification
Formal Analysis and Verification of Self-Healing Systems (HE, CE, OR, AB, PP), pp. 139–153.
FoSSaCSFoSSaCS-2010-HeussnerLMS #analysis #automaton #communication #reachability
Reachability Analysis of Communicating Pushdown Systems (AH, JL, AM, GS), pp. 267–281.
FoSSaCSFoSSaCS-2010-NielsonN #logic #model checking #static analysis
Model Checking Is Static Analysis of Modal Logic (FN, HRN), pp. 191–205.
FoSSaCSFoSSaCS-2010-WiesZH #analysis #bound #process
Forward Analysis of Depth-Bounded Processes (TW, DZ, TAH), pp. 94–108.
TACASTACAS-2010-Aderhold #analysis #automation #higher-order #recursion #source code #termination
Automated Termination Analysis for Programs with Second-Order Recursion (MA), pp. 221–235.
TACASTACAS-2010-DonaldsonKR #analysis #automation #manycore #memory management
Automatic Analysis of Scratch-Pad Memory Code for Heterogeneous Multicore Processors (AFD, DK, PR), pp. 280–295.
TACASTACAS-2010-WangLGG #analysis
Trace-Based Symbolic Analysis for Atomicity Violations (CW, RL, MKG, AG), pp. 328–342.
TACASTACAS-2010-YuAB #analysis #named #php #string
Stranger: An Automata-Based String Analysis Tool for PHP (FY, MA, TB), pp. 154–157.
WRLAWRLA-2010-KatelmanKM #analysis #concurrent #semantics
Concurrent Rewriting Semantics and Analysis of Asynchronous Digital Circuits (MK, SK, JM), pp. 140–156.
CSMRCSMR-2010-Koschke #analysis #incremental
Incremental Reflexion Analysis (RK), pp. 1–10.
CSMRCSMR-2010-LiuM #analysis #case study #data flow
Static Information Flow Analysis with Handling of Implicit Flows and a Study on Effects of Implicit Flows vs Explicit Flows (YL, AM), pp. 146–155.
CSMRCSMR-2010-MaiaBFG #hybrid #impact analysis #object-oriented
The Hybrid Technique for Object-Oriented Software Change Impact Analysis (MCOM, RAB, JCAdF, DDSG), pp. 252–255.
CSMRCSMR-2010-MalikJAHFH #analysis #automation #comparison #enterprise #performance #scalability #testing
Automatic Comparison of Load Tests to Support the Performance Analysis of Large Enterprise Systems (HM, ZMJ, BA, AEH, PF, GH), pp. 222–231.
CSMRCSMR-2010-TothNJBF #impact analysis #named
CIASYS — Change Impact Analysis at System Level (GT, CN, JJ, ÁB, LJF), pp. 198–201.
ICPCICPC-2010-OlszakJ #analysis #java #named
Featureous: A Tool for Feature-Centric Analysis of Java Software (AO, BNJ), pp. 44–45.
ICPCICPC-2010-RatiuH #program analysis #web
Utilizing Web Search Engines for Program Analysis (DR, LH), pp. 94–103.
ICSMEICSM-2010-AryaniPH #analysis #case study #co-evolution #enterprise
Domain-based change propagation analysis: An enterprise system case study (AA, IDP, MH), pp. 1–9.
ICSMEICSM-2010-CeccatoT #consistency #legacy #migration #static analysis #thread
Static analysis for enforcing intra-thread consistent locks in the migration of a legacy system (MC, PT), pp. 1–9.
ICSMEICSM-2010-Cleve #data-driven #evolution #program analysis #program transformation
Program analysis and transformation for data-intensive system evolution (AC), pp. 1–6.
ICSMEICSM-2010-FisherDBR #analysis #context-sensitive grammar
Exploring the impact of context sensitivity on blended analysis (MFI, BD, SB, BGR), pp. 1–10.
ICSMEICSM-2010-Letarte #interprocedural #model checking #performance #static analysis
Conversion of fast inter-procedural static analysis to model checking (DL), pp. 1–2.
ICSMEICSM-2010-LuciaDGR #design pattern #detection #dynamic analysis #eclipse #plugin
An Eclipse plug-in for the detection of design pattern instances through static and dynamic analysis (ADL, VD, CG, MR), pp. 1–6.
ICSMEICSM-2010-ParandeK #analysis #dependence #open source
A longitudinal analysis of the dependency concentration in smaller modules for open-source software products (MAP, GK), pp. 1–5.
ICSMEICSM-2010-PerinGN #analysis #enterprise #java #transaction
Recovery and analysis of transaction scope from scattered information in Java Enterprise Applications (FP, TG, ON), pp. 1–10.
ICSMEICSM-2010-ZawawyKM #analysis
Log filtering and interpretation for root cause analysis (HZ, KK, JM), pp. 1–5.
MSRMSR-2010-ColacoMFH #analysis #developer
OSS developers context-specific Preferred Representational systems: A initial Neurolinguistic text analysis of the Apache mailing list (MCJ, MGM, MF, PHdS), pp. 126–129.
PASTEPASTE-2010-AyewahP #analysis #null
Null dereference analysis in practice (NA, WP), pp. 65–72.
PASTEPASTE-2010-CalmanZ #analysis #induction #information retrieval #interprocedural
Interprocedural induction variable analysis based on interprocedural SSA form IR (SC, JZ), pp. 37–44.
PASTEPASTE-2010-FlanaganF #concurrent #dynamic analysis #framework #source code
The RoadRunner dynamic analysis framework for concurrent programs (CF, SNF), pp. 1–8.
PASTEPASTE-2010-HaC #communication #concurrent #dynamic analysis
Opportunities for concurrent dynamic analysis with explicit inter-core communication (JH, SPC), pp. 17–20.
SCAMSCAM-2010-GrantC #analysis #concept #source code
Estimating the Optimal Number of Latent Concepts in Source Code Analysis (SG, JRC), pp. 65–74.
SCAMSCAM-2010-Harman #analysis #source code #why
Why Source Code Analysis and Manipulation Will Always be Important (MH), pp. 7–19.
SCAMSCAM-2010-KesterMB #concurrent #debugging #how #question #static analysis
How Good is Static Analysis at Finding Concurrency Bugs? (DK, MM, JSB), pp. 115–124.
SCAMSCAM-2010-LuoHDQ #concurrent #debugging #effectiveness #java #static analysis
Effective Static Analysis to Find Concurrency Bugs in Java (ZDL, LH, RD, YQ), pp. 135–144.
WCREWCRE-2010-Boughanmi #analysis #multi
Multi-Language and Heterogeneously-licensed Software Analysis (FB), pp. 293–296.
WCREWCRE-2010-GanesanLRWLT #analysis #architecture
Architectural Analysis of Systems Based on the Publisher-Subscriber Style (DG, ML, LR, RW, VL, TT), pp. 173–182.
WCREWCRE-2010-Guerrouj #analysis #automation #concept #identifier #source code
Automatic Derivation of Concepts Based on the Analysis of Source Code Identifiers (LG), pp. 301–304.
WCREWCRE-2010-KagdiGPC #concept #impact analysis #source code
Blending Conceptual and Evolutionary Couplings to Support Change Impact Analysis in Source Code (HHK, MG, DP, MLC), pp. 119–128.
WCREWCRE-2010-MilanovaL #comprehension #concurrent #java #source code #static analysis
Static Analysis for Understanding Shared Objects in Open Concurrent Java Programs (AM, YL), pp. 45–54.
WCREWCRE-2010-PerscheidSHGH #analysis #behaviour #online #runtime
Immediacy through Interactivity: Online Analysis of Run-time Behavior (MP, BS, RH, FG, MH), pp. 77–86.
PEPMPEPM-2010-LakhotiaBSM #analysis #bytecode #obfuscation
Context-sensitive analysis of obfuscated x86 executables (AL, DRB, AS, AM), pp. 131–140.
PLDIPLDI-2010-MightSH #functional #object-oriented #program analysis
Resolving and exploiting the k-CFA paradox: illuminating functional vs. object-oriented program analysis (MM, YS, DVH), pp. 305–315.
PLDIPLDI-2010-RichardsLBV #analysis #behaviour #javascript #source code
An analysis of the dynamic behavior of JavaScript programs (GR, SL, BB, JV), pp. 1–12.
SASSAS-2010-AlbertAGPD #analysis #approach
From Object Fields to Local Variables: A Practical Approach to Field-Sensitive Analysis (EA, PA, SG, GP, DVRD), pp. 100–116.
SASSAS-2010-AmatoPS #abstract domain #analysis #component
Deriving Numerical Abstract Domains via Principal Component Analysis (GA, MP, FS), pp. 134–150.
SASSAS-2010-CheriniRB #analysis #data type
A Shape Analysis for Non-linear Data Structures (RC, LR, JOB), pp. 201–217.
SASSAS-2010-DilligDA #constraints #online #scalability #source code #static analysis
Small Formulas for Large Programs: On-Line Constraint Simplification in Scalable Static Analysis (ID, TD, AA), pp. 236–252.
SASSAS-2010-FarzanK #analysis #composition #concurrent #source code
Compositional Bitvector Analysis for Concurrent Programs with Nested Locks (AF, ZK), pp. 253–270.
SASSAS-2010-JensenMT #analysis #interprocedural #lazy evaluation
Interprocedural Analysis with Lazy Propagation (SHJ, AM, PT), pp. 320–339.
SASSAS-2010-Lesens #question #static analysis #using #why
Using Static Analysis in Space: Why Doing so? (DL), pp. 51–70.
SASSAS-2010-NasreG #analysis #equation #linear #points-to
Points-to Analysis as a System of Linear Equations (RN, RG), pp. 422–438.
STOCSTOC-2010-KawamuraC #analysis #complexity
Complexity theory for operators in analysis (AK, SAC), pp. 495–502.
FLOPSFLOPS-2010-AvanziniM #analysis #complexity #graph grammar
Complexity Analysis by Graph Rewriting (MA, GM), pp. 257–271.
FLOPSFLOPS-2010-Sagonas #concurrent #detection #erlang #fault #source code #static analysis #using
Using Static Analysis to Detect Type Errors and Concurrency Defects in Erlang Programs (KFS), pp. 13–18.
LATALATA-2010-Casadio #analysis
Agreement and Cliticization in Italian: A Pregroup Analysis (CC), pp. 166–177.
LATALATA-2010-MarschallR #algorithm #analysis #automaton #pattern matching #probability
Exact Analysis of Horspool’s and Sunday’s Pattern Matching Algorithms with Probabilistic Arithmetic Automata (TM, SR), pp. 439–450.
LATALATA-2010-Muscholl #analysis #automaton #communication
Analysis of Communicating Automata (AM), pp. 50–57.
IFMIFM-2010-AutexierL #c #impact analysis #source code #verification
Adding Change Impact Analysis to the Formal Verification of C Programs (SA, CL), pp. 59–73.
IFMIFM-2010-MarronePV #analysis #dependence #inheritance #multi
Multiformalism and Transformation Inheritance for Dependability Analysis of Critical Systems (SM, CP, VV), pp. 215–228.
SEFMSEFM-2010-KokashKV #analysis #modelling #visual notation
Time and Data-Aware Analysis of Graphical Service Models in Reo (NK, CK, EPdV), pp. 125–134.
SEFMSEFM-2010-MassinkLBH #algebra #analysis #approach #process #scalability
A Scalable Fluid Flow Process Algebraic Approach to Emergency Egress Analysis (MM, DL, AB, MDH), pp. 169–180.
SEFMSEFM-2010-Powell #analysis #behaviour #modelling #scalability
Behavior Engineering — A Scalable Modeling and Analysis Method (DP), pp. 31–40.
SFMSFM-2010-PierroHW #probability #program analysis #semantics
Probabilistic Semantics and Program Analysis (ADP, CH, HW), pp. 1–42.
ICFPICFP-2010-HoldermansH #analysis #higher-order #polymorphism
Polyvariant flow analysis with higher-ranked polymorphic types and higher-order effect operators (SH, JH), pp. 63–74.
GT-VMTGT-VMT-2010-HermannCEK #analysis #equivalence #graph #performance #permutation #petri net
Efficient Analysis of Permutation Equivalence of Graph Derivations Based on Petri Nets (FH, AC, HE, BK).
ICGTICGT-2010-HermannEOG #analysis #behaviour #formal method #functional #graph grammar #model transformation
Formal Analysis of Functional Behaviour for Model Transformations Based on Triple Graph Grammars (FH, HE, FO, UG), pp. 155–170.
ICGTICGT-2010-Modica #analysis #communication #formal method #modelling #petri net
Formal Modeling and Analysis of Communication Platforms Like Skype Based on Petri Net Transformation Systems (TM), pp. 400–402.
CHICHI-2010-FreirePSG #analysis #interface #multi #named #network #visualisation
ManyNets: an interface for multiple network analysis and visualization (MF, CP, BS, JG), pp. 213–222.
CHICHI-2010-KapteinNM #analysis #consistency
Powerful and consistent analysis of likert-type ratingscales (MCK, CN, PM), pp. 2391–2394.
CHICHI-2010-PancieraPET #analysis #behaviour #lifecycle
Lurking? cyclopaths?: a quantitative lifecycle analysis of user behavior in a geowiki (KAP, RP, TE, LGT), pp. 1917–1926.
CHICHI-2010-ShengHKCD #analysis #effectiveness
Who falls for phish?: a demographic analysis of phishing susceptibility and effectiveness of interventions (SS, MBH, PK, LFC, JSD), pp. 373–382.
CHICHI-2010-WeaverBSIL #analysis #artificial reality #empirical #order #using
An empirical task analysis of warehouse order picking using head-mounted displays (KW, HB, TS, HI, ML), pp. 1695–1704.
CSCWCSCW-2010-BalakrishnanFKK #analysis #collaboration #information management #visualisation
Pitfalls of information access with visualizations in remote collaborative analysis (ADB, SRF, SBK, AK), pp. 411–420.
CSCWCSCW-2010-ScholandTP #analysis #network #social
Social language network analysis (AJS, YRT, JWP), pp. 23–26.
SOFTVISSOFTVIS-2010-AdamoliH #analysis #framework #named #performance #visualisation
Trevis: a context tree visualization & analysis framework and its use for classifying performance failure reports (AA, MH), pp. 73–82.
SOFTVISSOFTVIS-2010-BeckD10a #analysis #automation #distributed #towards #visualisation
Towards automated analysis and visualization of distributed software systems (MB, JD), pp. 213–214.
SOFTVISSOFTVIS-2010-KerrenJ #3d #analysis #diagrams #interactive #metric #roadmap
3D kiviat diagrams for the interactive analysis of software metric trends (AK, IJ), pp. 203–204.
AdaSIGAda-2010-JemliR #compilation #problem #static analysis #using
A methodology for avoiding known compiler problems using static analysis (MJ, JPR), pp. 23–30.
CAiSECAiSE-2010-RamdoyalCH #analysis #concept #database #interactive #reverse engineering #user interface
Reverse Engineering User Interfaces for Interactive Database Conceptual Analysis (RR, AC, JLH), pp. 332–347.
CAiSECAiSE-2010-SchonenbergJSA #analysis #simulation
Business Trend Analysis by Simulation (HS, JJ, NS, WMPvdA), pp. 515–529.
CAiSECAiSE-2010-StalhaneSB #analysis #case study #diagrams #safety #sequence chart
Comparing Safety Analysis Based on Sequence Diagrams and Textual Use Cases (TS, GS, LdB), pp. 165–179.
EDOCEDOC-2010-NarmanBKJ #analysis #hybrid #modelling #probability #quality #relational
Hybrid Probabilistic Relational Models for System Quality Analysis (PN, MB, JK, PJ), pp. 57–66.
ICEISICEIS-AIDSS-2010-CuzzocreaFP #abstraction #analysis #collaboration #effectiveness #flexibility #mining #process
Effective Analysis of Flexible Collaboration Processes by Way of Abstraction and Mining Techniques (AC, FF, LP), pp. 157–166.
ICEISICEIS-AIDSS-2010-HusterB #analysis #evolution #industrial #ontology #visual notation
Visual Trend Analysis — Ontology Evolution Support for the Trend Related Industry Sector (JH, AB), pp. 46–53.
ICEISICEIS-DISI-2010-CaronD #analysis #case study
What-if Analysis in OLAP — With a Case Study in Supermarket Sales Data (EC, HD), pp. 208–213.
ICEISICEIS-HCI-2010-FerrazS #analysis #multi #named
GlobeOLAP — Improving the Geospatial Realism in Multidimensional Analysis Environment (VRTF, MTPS), pp. 99–107.
ICEISICEIS-ISAS-2010-HulstijnG #analysis
Risk Analysis for Inter-organizational Controls (JH, JG), pp. 314–320.
ICEISICEIS-ISAS-2010-IizukaIT #analysis #approach #effectiveness #process #re-engineering
Analysis of Effective Approach for Business Process re-Engineering — From the Perspective of Organizational Factors (KI, YI, KT), pp. 384–389.
ICEISICEIS-ISAS-2010-SetiawanS #analysis #process
Socialization of Work Practice through Business Process Analysis (MAS, SWS), pp. 165–170.
CIKMCIKM-2010-AjiWAG #analysis #modelling #using
Using the past to score the present: extending term weighting models through revision history analysis (AA, YW, EA, EG), pp. 629–638.
CIKMCIKM-2010-GuanXZGY #analysis #classification #documentation #performance #reduction
Fast dimension reduction for document classification based on imprecise spectrum analysis (HG, BX, JZ, MG, TY), pp. 1753–1756.
CIKMCIKM-2010-GuoZGZS #analysis #mining #named
OpinionIt: a text mining system for cross-lingual opinion analysis (HG, HZ, ZG, XZ, ZS), pp. 1199–1208.
CIKMCIKM-2010-KaytoueANK #concept analysis
Embedding tolerance relations in formal concept analysis: an application in information fusion (MK, ZA, AN, SOK), pp. 1689–1692.
CIKMCIKM-2010-MadaniY #analysis #topic
Discovery of numerous specific topics via term co-occurrence analysis (OM, JY), pp. 1841–1844.
CIKMCIKM-2010-ShenWL #analysis #multi #summary #topic
Topic aspect analysis for multi-document summarization (CS, DW, TL), pp. 1545–1548.
CIKMCIKM-2010-XueCS #analysis #modelling #using
Modeling reformulation using passage analysis (XX, WBC, DAS), pp. 1497–1500.
CIKMCIKM-2010-YangZ #analysis #multi
Language pyramid and multi-scale text analysis (SHY, HZ), pp. 639–648.
ECIRECIR-2010-BierigCGB #data analysis #evaluation #framework #information retrieval #interactive #modelling
A Data Analysis and Modelling Framework for the Evaluation of Interactive Information Retrieval (RB, MJC, JG, NJB), pp. 673–674.
ECIRECIR-2010-UdupaK #analysis #canonical #correlation #equivalence #using
Transliteration Equivalence Using Canonical Correlation Analysis (RU, MMK), pp. 75–86.
ICMLICML-2010-BoureauPL #analysis #recognition #visual notation
A Theoretical Analysis of Feature Pooling in Visual Recognition (YLB, JP, YL), pp. 111–118.
ICMLICML-2010-DillonBL #analysis #generative #learning
Asymptotic Analysis of Generative Semi-Supervised Learning (JVD, KB, GL), pp. 295–302.
ICMLICML-2010-LazaricGM #algorithm #analysis #classification #policy
Analysis of a Classification-based Policy Iteration Algorithm (AL, MG, RM), pp. 607–614.
ICMLICML-2010-LazaricGM10a #analysis
Finite-Sample Analysis of LSTD (AL, MG, RM), pp. 615–622.
ICMLICML-2010-LiuNLL #analysis #graph #learning #relational
Learning Temporal Causal Graphs for Relational Time-Series Analysis (YL, ANM, ACL, YL), pp. 687–694.
ICMLICML-2010-LizotteBM #analysis #learning #multi #performance #random
Efficient Reinforcement Learning with Multiple Reward Functions for Randomized Controlled Trial Analysis (DJL, MHB, SAM), pp. 695–702.
ICMLICML-2010-TingHJ #analysis #convergence #graph
An Analysis of the Convergence of Graph Laplacians (DT, LH, MIJ), pp. 1079–1086.
ICMLICML-2010-WangZ #analysis
A New Analysis of Co-Training (WW, ZHZ), pp. 1135–1142.
ICPRICPR-2010-BoussellaaZABA #analysis #documentation #image #segmentation
Unsupervised Block Covering Analysis for Text-Line Segmentation of Arabic Ancient Handwritten Document Images (WB, AZ, HEA, AB, AMA), pp. 1929–1932.
ICPRICPR-2010-ChenSZCL #analysis #image
Color Image Analysis by Quaternion Zernike Moments (BC, HS, HZ, GC, LL), pp. 625–628.
ICPRICPR-2010-DonoserKB #analysis
Object Tracking by Structure Tensor Analysis (MD, SK, HB), pp. 2600–2603.
ICPRICPR-2010-DuboisPM #adaptation #analysis #component #composition #using
Decomposition of Dynamic Textures Using Morphological Component Analysis: A New Adaptative Strategy (SD, RP, MM), pp. 2258–2261.
ICPRICPR-2010-ElnakibECS #analysis #corpus
Dyslexia Diagnostics by Centerline-Based Shape Analysis of the Corpus Callosum (AE, AEB, MC, AES), pp. 261–264.
ICPRICPR-2010-FengY #analysis
Binary Discriminant Analysis for Face Template Protection (YCF, PCY), pp. 874–877.
ICPRICPR-2010-Feschet #analysis #composition #geometry #multi #parametricity
Multiscale Analysis from 1D Parametric Geometric Decomposition of Shapes (FF), pp. 2102–2105.
ICPRICPR-2010-GarciaMS #analysis #performance
Theoretical Analysis of a Performance Measure for Imbalanced Data (VG, RAM, JSS), pp. 617–620.
ICPRICPR-2010-GilPT #adaptation #analysis #integration #visual notation
Analysis and Adaptation of Integration Time in PMD Camera for Visual Servoing (PG, JP, FT), pp. 311–315.
ICPRICPR-2010-IbrahimKKG #analysis #online #using #verification
On-Line Signature Verification Using 1-D Velocity-Based Directional Analysis (MTI, MJK, MAK, LG), pp. 3830–3833.
ICPRICPR-2010-JagerPCC #3d #analysis #using
Dual Channel Colocalization for Cell Cycle Analysis Using 3D Confocal Microscopy (SJ, KP, CSCD, MCC), pp. 2580–2583.
ICPRICPR-2010-Jean #analysis
Local Optical Operators for Subpixel Scene Analysis (YDJ), pp. 3448–3451.
ICPRICPR-2010-JingLYBY #analysis #kernel
Kernel Uncorrelated Adjacent-class Discriminant Analysis (XYJ, SL, YFY, LSB, JY), pp. 706–709.
ICPRICPR-2010-JirachawengHLYA #analysis #modelling
Residual Analysis for Fingerprint Orientation Modeling (SJ, ZH, JL, WYY, VA), pp. 1196–1199.
ICPRICPR-2010-KasiviswanathanBS #analysis #documentation #top-down
Top Down Analysis of Line Structure in Handwritten Documents (HK, GRB, SNS), pp. 2025–2028.
ICPRICPR-2010-KhushabaEAAM #analysis #fuzzy #locality #orthogonal
Orthogonal Locality Sensitive Fuzzy Discriminant Analysis in Sleep-Stage Scoring (RNK, RE, AA, AAA, SM), pp. 165–168.
ICPRICPR-2010-LiP10a #analysis #classification #monitoring #realtime
Human State Classification and Predication for Critical Care Monitoring by Real-Time Bio-signal Analysis (XL, FP), pp. 2460–2463.
ICPRICPR-2010-LiZXCG #analysis #documentation #multi #sentiment
Exploiting Combined Multi-level Model for Document Sentiment Analysis (SL, HZ, WX, GC, JG), pp. 4141–4144.
ICPRICPR-2010-MaalejADSB #3d #analysis #recognition
Local 3D Shape Analysis for Facial Expression Recognition (AM, BBA, MD, AS, SB), pp. 4129–4132.
ICPRICPR-2010-MakiharaY #analysis #clustering
Cluster-Pairwise Discriminant Analysis (YM, YY), pp. 577–580.
ICPRICPR-2010-MarcialisRT #analysis #detection
Analysis of Fingerprint Pores for Vitality Detection (GLM, FR, AT), pp. 1289–1292.
ICPRICPR-2010-MaTW #analysis #random #using
Nonlinear Blind Source Separation Using Slow Feature Analysis with Random Features (KM, QT, JW), pp. 830–833.
ICPRICPR-2010-Meunier #analysis #assurance #automation #documentation #logic #quality
Automated Quality Assurance for Document Logical Analysis (JLM), pp. 253–256.
ICPRICPR-2010-OGorman #analysis #latency #speech
Latency in Speech Feature Analysis for Telepresence Event Coding (LO), pp. 4464–4467.
ICPRICPR-2010-OReillyP #analysis #prototype #statistics
Prototype-Based Methodology for the Statistical Analysis of Local Features in Stereotypical Handwriting Tasks (CO, RP), pp. 1864–1867.
ICPRICPR-2010-PaclikLLD #analysis #classification #optimisation
ROC Analysis and Cost-Sensitive Optimization for Hierarchical Classifiers (PP, CL, TL, RPWD), pp. 2977–2980.
ICPRICPR-2010-PaivaJT #analysis #image #using
Using Sequential Context for Image Analysis (ARCP, EJ, TT), pp. 2800–2803.
ICPRICPR-2010-PapadopoulosMKS #analysis #approach #image #learning #semantics #statistics
A Statistical Learning Approach to Spatial Context Exploitation for Semantic Image Analysis (GTP, VM, IK, MGS), pp. 3138–3142.
ICPRICPR-2010-ParkY #analysis #approach #game studies #network #social
Social Network Approach to Analysis of Soccer Game (KJP, AY), pp. 3935–3938.
ICPRICPR-2010-PetersenK #analysis #estimation #modelling #process #statistics
Statistical Analysis of Kalman Filters by Conversion to Gauss-Helmert Models with Applications to Process Noise Estimation (AP, RK), pp. 2386–2389.
ICPRICPR-2010-PletschacherA #analysis #framework
The PAGE (Page Analysis and Ground-Truth Elements) Format Framework (SP, AA), pp. 257–260.
ICPRICPR-2010-QiaoC #3d #analysis #component #modelling #statistics #using
Statistical Texture Modeling for Medical Volume Using Generalized N-Dimensional Principal Component Analysis Method and 3D Volume Morphing (XQ, YWC), pp. 2488–2491.
ICPRICPR-2010-RahimBBP #analysis #sequence
Pelvic Organs Dynamic Feature Analysis for MRI Sequence Discrimination (MR, MEB, RB, NP), pp. 2496–2499.
ICPRICPR-2010-RomeroTV #analysis #corpus #image
Computer Assisted Transcription of Text Images: Results on the GERMANA Corpus and Analysis of Improvements Needed for Practical Use (VR, AHT, EV), pp. 2017–2020.
ICPRICPR-2010-SafayaniS #analysis #multi #recognition
Heteroscedastic Multilinear Discriminant Analysis for Face Recognition (MS, MTMS), pp. 4287–4290.
ICPRICPR-2010-SagheerNHS #analysis #component #novel #word
A Novel Handwritten Urdu Word Spotting Based on Connected Components Analysis (MWS, NN, CLH, CYS), pp. 2013–2016.
ICPRICPR-2010-SaidLF #2d #analysis #multi
Multiscale Analysis of Digital Segments by Intersection of 2D Digital Lines (MS, JOL, FF), pp. 4097–4100.
ICPRICPR-2010-SakarK #analysis #canonical #correlation #feature model #hybrid
A Hybrid Method for Feature Selection Based on Mutual Information and Canonical Correlation Analysis (COS, OK), pp. 4360–4363.
ICPRICPR-2010-ScandaliarisVS #analysis #comparative #detection #image #video
Comparative Analysis for Detecting Objects Under Cast Shadows in Video Images (JS, MV, AS), pp. 4577–4580.
ICPRICPR-2010-SertelCLSG #analysis #approach #detection #image
An Image Analysis Approach for Detecting Malignant Cells in Digitized H&E-stained Histology Images of Follicular Lymphoma (OS, ÜVÇ, GL, AS, MNG), pp. 273–276.
ICPRICPR-2010-SethiC #analysis #motivation #probability #process #video
A Neurobiologically Motivated Stochastic Method for Analysis of Human Activities in Video (RJS, AKRC), pp. 281–285.
ICPRICPR-2010-SfikasHN #analysis #clustering #multi #using
Multiple Atlas Inference and Population Analysis Using Spectral Clustering (GS, CH, CN), pp. 2500–2503.
ICPRICPR-2010-SmithW #analysis
A Bias-Variance Analysis of Bootstrapped Class-Separability Weighting for Error-Correcting Output Code Ensembles (RSS, TW), pp. 61–64.
ICPRICPR-2010-SrikrishnanC #analysis #linear #using
Crowd Motion Analysis Using Linear Cyclic Pursuit (VS, SC), pp. 3340–3343.
ICPRICPR-2010-TawariT #analysis #speech
Speech Emotion Analysis in Noisy Real-World Environment (AT, MMT), pp. 4605–4608.
ICPRICPR-2010-TosunWSRM #analysis #component #image #independence
Joint Independent Component Analysis of Brain Perfusion and Structural Magnetic Resonance Images in Dementia (DT, MW, NS, HJR, BLM), pp. 2720–2723.
ICPRICPR-2010-UchidaL #analysis #recognition
Analysis of Local Features for Handwritten Character Recognition (SU, ML), pp. 1945–1948.
ICPRICPR-2010-VuYESHAY #analysis
Color Analysis for Segmenting Digestive Organs in VCE (HV, YY, TE, MS, KH, TA, KY), pp. 2468–2471.
ICPRICPR-2010-WangHL #analysis #incremental
Boosting Incremental Semi-supervised Discriminant Analysis for Tracking (HW, XH, CLL), pp. 2748–2751.
ICPRICPR-2010-WangWDTLG #analysis #interactive #video #web
Interactive Web Video Advertising with Context Analysis and Search (BW, JW, LYD, QT, HL, WG), pp. 3252–3255.
ICPRICPR-2010-WeissFM #3d #analysis #image #multi
Multiresolution Analysis of 3D Images Based on Discrete Distortion (KW, LDF, MMM), pp. 4093–4096.
ICPRICPR-2010-WilliamsTSB #analysis #multi #verification
Body Motion Analysis for Multi-modal Identity Verification (GW, GWT, KS, CB), pp. 2198–2201.
ICPRICPR-2010-YangGG #analysis #locality #recognition
Extended Locality Preserving Discriminant Analysis for Face Recognition (LY, WG, XG), pp. 539–542.
ICPRICPR-2010-YangSZ #analysis #multi #recognition #using
Face Recognition Using a Multi-manifold Discriminant Analysis Method (WY, CS, LZ), pp. 527–530.
ICPRICPR-2010-ZhangGA #analysis #linear
An Information Theoretic Linear Discriminant Analysis Method (HZ, CG, KKA), pp. 4182–4185.
ICPRICPR-2010-ZhangK #analysis #bound
Weighted Boundary Points for Shape Analysis (JZ, RK), pp. 1598–1601.
ICPRICPR-2010-ZhangZ #analysis #canonical #correlation #image #using
Exposing Digital Image Forgeries by Using Canonical Correlation Analysis (CZ, HZ), pp. 838–841.
KDDKDD-2010-DurrantK #analysis #classification #linear
Compressed fisher linear discriminant analysis: classification of randomly projected data (RJD, AK), pp. 1119–1128.
KDDKDD-2010-MarchRG #algorithm #analysis #performance
Fast euclidean minimum spanning tree: algorithm, analysis, and applications (WBM, PR, AGG), pp. 603–612.
KDDKDD-2010-WangLZ #analysis #approach #bibliography #rating
Latent aspect rating analysis on review text data: a rating regression approach (HW, YL, CZ), pp. 783–792.
KDIRKDIR-2010-AchaKV #analysis #data mining #mining #modelling
Tactical Analysis Modeling through Data Mining — Pattern Discovery in Racket Sports (ATA, WAK, JKV), pp. 176–181.
KDIRKDIR-2010-CarulloB #analysis #machine learning #mining #web
Machine Learning and Link Analysis for Web Content Mining (MC, EB), pp. 156–161.
KDIRKDIR-2010-Codina-FilbaN #analysis #behaviour #internet #query #web
Collective Behaviour in Internet — Tendency Analysis of the Frequency of User Web Queries (JCF, DFN), pp. 168–175.
KDIRKDIR-2010-Diday #data analysis
Extracting Knowledge from Complex Data by Symbolic Data Analysis (ED), pp. 5–6.
KDIRKDIR-2010-OzekiKT #analysis #multi #network
Multi-modal Analysis of Complex Network — Point Stimulus Response Depending on Its Location in the Network (TO, TK, YT), pp. 226–231.
KEODKEOD-2010-EynardMM #analysis #on the #ontology
On the Use of Correspondence Analysis to Learn Seed Ontologies from Text (DE, FM, MM), pp. 430–437.
KMISKMIS-2010-BrockV #analysis #data flow #semantics #using
A Method for Interoperability between Structured Data Sources using Semantic Analysis (DLB, JV), pp. 234–239.
KMISKMIS-2010-Caballero-GilCM #analysis #clustering #information management #simulation #using
Knowledge Management using Clusters in VANETs — Description, Simulation and Analysis (CCG, PCG, JMG), pp. 170–175.
KMISKMIS-2010-ScheibmayerIB #analysis #approach #framework #process
A Framework to Measure the Impact of Knowledge Process Supporting Technologies — An Integrated Approach for a Technology-oriented Business Benefit Analysis (MS, AI, MB), pp. 253–259.
KMISKMIS-2010-WiilGM #analysis #information management #network
CrimeFighter Assistant — A Knowledge Management Tool for Terrorist Network Analysis (UKW, JG, NM), pp. 15–24.
RecSysRecSys-2010-BerkovskyF #analysis #recommendation
Group-based recipe recommendations: analysis of data aggregation strategies (SB, JF), pp. 111–118.
RecSysRecSys-2010-MelloAZ #impact analysis #learning #rating
Active learning driven by rating impact analysis (CERdM, MAA, GZ), pp. 341–344.
SEKESEKE-2010-AlhassanCB #analysis #fault #network #people #social
Do More People Make the Code More Defect Prone?: Social Network Analysis in OSS Projects (SA, BC, ABB), pp. 93–98.
SEKESEKE-2010-CunhaCNAM #analysis #debugging #visual notation
A Visual Bug Report Analysis and Search Tool (CEAdC, YCC, PAdMSN, ESdA, SRdLM), pp. 742–747.
SEKESEKE-2010-El-Attar #analysis #case study #precise #robust #security
Developing Precise Misuse Cases with Security Robustness Analysis (MEA), pp. 571–576.
SEKESEKE-2010-IbrahimWEF #analysis #development #off the shelf
Conflict Analysis in Commercial Off-The-Shelf (COTS) Based Development (HI, TW, AE, BHF), pp. 686–691.
SEKESEKE-2010-JuniorLAMW #impact analysis #learning #multi #using
Impact Analysis Model for Brasília Area Control Center using Multi-agent System with Reinforcement Learning (ACdAJ, AFL, CRFdA, ACMAdM, LW), pp. 499–502.
SEKESEKE-2010-LuG #analysis #architecture #concurrent #performance #thread #web
Performance Analysis of a Web Server with Dynamic Thread Pool Architecture (JL, SSG), pp. 99–105.
SEKESEKE-2010-SarkarCCB #analysis #framework #object-oriented #requirements
Business-Object Oriented Requirements Analysis Framework for Data Warehouses (AS, SC, NC, SB), pp. 34–37.
SEKESEKE-2010-ThovexT #analysis #approach #modelling #multi #network #semantics #social
Dynamic and semantic social networks analysis: a new model based on a multidisciplinary approach (CT, FT), pp. 548–552.
SEKESEKE-2010-VilaMF #adaptation #analysis #qvt #strict #using
Using QVT for adapting question analysis to restricted domain QA systems (KV, JNM, AF), pp. 335–338.
SEKESEKE-2010-WangHW #analysis #petri net #process
A Hierarchical Timed Coloured Petri Nets for BPMN-based Process Analysis (CHW, PSH, FJW), pp. 417–420.
SEKESEKE-2010-WangPACC #analysis #automation #process
An Automatic Failure Mode and Effect Analysis Technique for Processes Defined in the Little-JIL Process Definition Language (DW, JP, GSA, LAC, BC), pp. 765–770.
SIGIRSIGIR-2010-LiuWD #analysis #behaviour #comprehension #web
Understanding web browsing behaviors through Weibull analysis of dwell time (CL, RWW, STD), pp. 379–386.
SIGIRSIGIR-2010-LiuYHA #adaptation #analysis #performance #predict #sentiment
S-PLASA+: adaptive sentiment analysis with application to sales performance prediction (YL, XY, XH, AA), pp. 873–874.
SIGIRSIGIR-2010-LiZM #analysis #process
Exploring desktop resources based on user activity analysis (YL, XZ, XM), p. 700.
SIGIRSIGIR-2010-MuhrKG #analysis #clustering
Analysis of structural relationships for hierarchical cluster labeling (MM, RK, MG), pp. 178–185.
SIGIRSIGIR-2010-TorresHS #analysis #information retrieval #query
Query log analysis in the context of information retrieval for children (SDT, DH, PS), pp. 847–848.
SIGIRSIGIR-2010-WangZ #analysis #effectiveness #information retrieval #metric #on the #optimisation #statistics
On statistical analysis and optimization of information retrieval effectiveness metrics (JW, JZ), pp. 226–233.
ECMFAECMFA-2010-ColomboKL #analysis #case study #modelling #problem #requirements
Requirements Analysis and Modeling with Problem Frames and SysML: A Case Study (PC, FK, LL), pp. 74–89.
MODELSMoDELS-v1-2010-SchwarzlP #analysis #consistency #modelling #uml
Static- and Dynamic Consistency Analysis of UML State Chart Models (CS, BP), pp. 151–165.
OOPSLAOOPSLA-2010-AltmanAFM #analysis #performance #source code
Performance analysis of idle programs (ERA, MA, SF, NM), pp. 739–753.
OOPSLAOOPSLA-2010-Mendez-LojoMP #analysis #parallel #points-to
Parallel inclusion-based points-to analysis (MML, AM, KP), pp. 428–443.
OOPSLAOOPSLA-2010-OssherBSAACDVFK #analysis #architecture #challenge #concept #flexibility #modelling #research #tool support
Flexible modeling tools for pre-requirements analysis: conceptual architecture and research challenges (HO, RKEB, IS, DA, AAT, MC, MD, JdV, AF, SK), pp. 848–864.
OOPSLAOOPSLA-2010-RinardHMS #analysis #comprehension #statistics
Patterns and statistical analysis for understanding reduced resource computing (MCR, HH, SM, SS), pp. 806–821.
GPCEGPCE-2010-SinceroTLS #analysis #performance #variability
Efficient extraction and analysis of preprocessor-based variability (JS, RT, DL, WSP), pp. 33–42.
GPCEGPCE-2010-TanterMBA #aspect-oriented #composition #dynamic analysis
Composition of dynamic analysis aspects (ÉT, PM, WB, DA), pp. 113–122.
LOPSTRLOPSTR-2010-SchumannCL #analysis #synthesis
Analysis of Air Traffic Track Data with the AutoBayes Synthesis System (JS, KC, AL), pp. 21–36.
LOPSTRLOPSTR-2010-StroderSG #analysis #dependence #logic programming #source code #termination
Dependency Triples for Improving Termination Analysis of Logic Programs with Cut (TS, PSK, JG), pp. 184–199.
LOPSTRLOPSTR-2010-VoetsS #analysis #logic programming #source code #using
Non-termination Analysis of Logic Programs Using Types (DV, DDS), pp. 133–148.
PPDPPPDP-2010-TekleL #analysis #complexity #datalog #performance #precise #query
Precise complexity analysis for efficient datalog queries (KTT, YAL), pp. 35–44.
QAPLQAPL-2010-GuedemannO #analysis #modelling #probability #safety
Probabilistic Model-Based Safety Analysis (MG, FO), pp. 114–128.
QAPLQAPL-2010-StefanekHB #analysis #parallel #performance
A new tool for the performance analysis of massively parallel computer systems (AS, RAH, JTB), pp. 159–181.
POPLPOPL-2010-ChaudhuriGL #analysis #source code
Continuity analysis of programs (SC, SG, RL), pp. 57–70.
POPLPOPL-2010-GodefroidNRT #composition #power of #program analysis
Compositional may-must program analysis: unleashing the power of alternation (PG, AVN, SKR, ST), pp. 43–56.
POPLPOPL-2010-HarrisSIG #program analysis #satisfiability #source code
Program analysis via satisfiability modulo path programs (WRH, SS, FI, AG), pp. 71–82.
RERE-2010-Al-EmranPR #analysis #release planning #robust
Decision Support for Product Release Planning Based on Robustness Analysis (AAE, DP, GR), pp. 157–166.
RERE-2010-FrickerG #analysis #case study #comparison #requirements
Comparison of Requirements Hand-off, Analysis, and Negotiation: Case Study (SF, MG), pp. 167–176.
RERE-2010-LockerbieBMBE #analysis #concept #modelling #simulation #using
Using i* Modelling as a Bridge between Air Traffic Management Operational Concepts and Agent-based Simulation Analysis (JL, DB, NAMM, HAPB, MHCE), pp. 351–356.
RERE-2010-SieglHG #analysis #modelling #requirements #testing
Model Based Requirements Analysis and Testing of Automotive Systems with Timed Usage Models (SS, KSJH, RG), pp. 345–350.
RERE-2010-SinhaPTN #analysis #automation #case study #natural language
Extending Automated Analysis of Natural Language Use Cases to Other Languages (AS, AMP, HT, TN), pp. 364–369.
RERE-2010-Stanbridge #analysis #test coverage #testing #user interface #using
Retrospective Requirement Analysis Using Code Coverage of GUI Driven System Tests (CS), pp. 411–412.
RERE-2010-YangRGWN #ambiguity #analysis #natural language #requirements
Extending Nocuous Ambiguity Analysis for Anaphora in Natural Language Requirements (HY, ANDR, VG, AW, BN), pp. 25–34.
SACSAC-PL-J-2008-BussBSE10 #analysis #debugging #novel #pointer
A novel analysis space for pointer analysis and its application for bug finding (MB, DB, VCS, SAE), pp. 921–942.
SACSAC-2010-BayerKK #analysis #performance
Improving the efficiency of dynamic malware analysis (UB, EK, CK), pp. 1871–1878.
SACSAC-2010-BelohlavekV #concept analysis #constraints
Background knowledge in formal concept analysis: constraints via closure operators (RB, VV), pp. 1113–1114.
SACSAC-2010-CappelliCGL #analysis #requirements #security
Transparency versus security: early analysis of antagonistic requirements (CC, HdSC, BGB, JCSdPL), pp. 298–305.
SACSAC-2010-ChakrabartiCGM #analysis #linear #privacy
Privacy preserving linear discriminant analysis from perturbed data (SC, ZC, AG, SM), pp. 610–615.
SACSAC-2010-ChokshiB #analysis #calculus #performance #realtime #revisited #using
Performance analysis of FlexRay-based systems using real-time calculus, revisited (DBC, PB), pp. 351–356.
SACSAC-2010-ClaycombS #analysis #framework #security
A framework for risk analysis in virtual directory security (WC, DS), pp. 1881–1882.
SACSAC-2010-DongD #analysis #probability
Analysis of collision probability in unsaturated situation (QD, WD), pp. 772–777.
SACSAC-2010-GravinoTS #analysis #comprehension #empirical #modelling #source code
An empirical investigation on the relation between analysis models and source code comprehension (CG, GT, GS), pp. 2365–2366.
SACSAC-2010-GuermaziHH #analysis #classification #image #using #web
Classification of violent web images using context based analysis (RG, MH, ABH), pp. 1768–1773.
SACSAC-2010-HansenS #analysis #implementation #optimisation #reachability
Reachability analysis of GSPDIs: theory, optimization, and implementation (HAH, GS), pp. 2511–2516.
SACSAC-2010-KhakpourKSJ #adaptation #analysis #formal method #self
Formal analysis of policy-based self-adaptive systems (NK, RK, MS, SJ), pp. 2536–2543.
SACSAC-2010-MalkowskiJHPKP #analysis #benchmark #database #empirical #metric #scalability #using
Empirical analysis of database server scalability using an N-tier benchmark with read-intensive workload (SM, DJ, MH, JP, YK, CP), pp. 1680–1687.
SACSAC-2010-MassinkHL #analysis #behaviour #scalability
Scalable analysis of collective behaviour in smart service systems (MM, MDH, DL), pp. 1173–1180.
SACSAC-2010-PopeeaC #analysis #debugging #proving #safety
Dual analysis for proving safety and finding bugs (CP, WNC), pp. 2137–2143.
SACSAC-2010-StoffelSKK #analysis #documentation #using #visual notation
Enhancing document structure analysis using visual analytics (AS, DS, HK, DAK), pp. 8–12.
SACSAC-2010-ZhangZ #analysis #canonical #correlation #random
Canonical random correlation analysis (JZ, DZ), pp. 1111–1112.
FSEFSE-2010-CossetteW #adaptation #analysis #dependence #lightweight #named #sketching
DSketch: lightweight, adaptable dependency analysis (BC, RJW), pp. 297–306.
FSEFSE-2010-DeAntoniMTRBMGRS #execution #named
RT-simex: retro-analysis of execution traces (JD, FM, FT, GR, JPB, CM, LG, LR, NS), pp. 377–378.
FSEFSE-2010-HalleB #analysis #interactive #message passing #using
Realizability analysis for message-based interactions using shared-state projections (SH, TB), pp. 27–36.
FSEFSE-2010-JoshiNSG #detection #dynamic analysis #effectiveness
An effective dynamic analysis for detecting generalized deadlocks (PJ, MN, KS, DG), pp. 327–336.
FSEFSE-2010-LiCK #analysis #detection #effectiveness
Practical and effective symbolic analysis for buffer overflow detection (LL, CC, NK), pp. 317–326.
FSEFSE-2010-LitvakDBRS #analysis #dependence
Field-sensitive program dependence analysis (SL, ND, RB, NR, MS), pp. 287–296.
FSEFSE-2010-MyersS #dynamic analysis #ide #user interface #using
Using dynamic analysis to create trace-focused user interfaces for IDEs (DM, MADS), pp. 367–368.
FSEFSE-2010-SinhaW #concurrent #program analysis #staged
Staged concurrent program analysis (NS, CW), pp. 47–56.
ICSEICSE-2010-Bodden #analysis #hybrid #performance #type system
Efficient hybrid typestate analysis by determining continuation-equivalent states (EB), pp. 5–14.
ICSEICSE-2010-CalikliBA #analysis #bias #developer #education #experience
An analysis of the effects of company culture, education and experience on confirmation bias levels of software developers and testers (, ABB, BA), pp. 187–190.
ICSEICSE-2010-CeccarelliCCP #approach #impact analysis
An eclectic approach for change impact analysis (MC, LC, GC, MDP), pp. 163–166.
ICSEICSE-2010-Erdogmus #analysis #effectiveness #re-engineering
Cost effectiveness analysis in software engineering (HE), pp. 479–480.
ICSEICSE-2010-Filho #impact analysis
Change impact analysis from business rules (AOF), pp. 353–354.
ICSEICSE-2010-Ghezzi #analysis #named
SOFAS: software analysis services (GG), pp. 381–384.
ICSEICSE-2010-HumayunBFLA #analysis #bibliography #development #education #empirical #quality
An empirical analysis of team review approaches for teaching quality software development (AH, WB, GAF, FL, RA), pp. 567–575.
ICSEICSE-2010-LiebigALKS #analysis #product line #variability
An analysis of the variability in forty preprocessor-based software product lines (JL, SA, CL, CK, MS), pp. 105–114.
ICSEICSE-2010-LimQF10a #analysis #crowdsourcing #named #network #power of #social
StakeSource: harnessing the power of crowdsourcing and social networks in stakeholder analysis (SLL, DQ, AF), pp. 239–242.
ICSEICSE-2010-Ma #analysis #constraints #testing #theorem proving
Constraint solving techniques for software testing and analysis (FM), pp. 417–420.
ICSEICSE-2010-Malik #analysis
A methodology to support load test analysis (HM), pp. 421–424.
ICSEICSE-2010-Nagappan #analysis #execution
Analysis of execution log files (MN), pp. 409–412.
ICSEICSE-2010-Popescu #component #impact analysis
Impact analysis for event-based components and systems (DP), pp. 401–404.
ICSEICSE-2010-Popescu10a #component #impact analysis #named
Helios: impact analysis for event-based components and systems (DP), pp. 531–532.
ICSEICSE-2010-SridharanN #data analysis #re-engineering
Bayesian methods for data analysis in software engineering (MS, ASN), pp. 477–478.
LDTALDTA-2009-DennisJW10 #algorithm #analysis #automation #memory management #named
SLAMM — Automating Memory Analysis for Numerical Algorithms (JMD, ERJ, WMW), pp. 89–104.
LDTALDTA-2010-CruzHP #analysis #named #online #verification
GamaSlicer: an online laboratory for program verification and analysis (DCdC, PRH, JSP), p. 3.
SLESLE-2010-FavreGLP #analysis #empirical
Empirical Language Analysis in Software Linguistics (JMF, DG, RL, EP), pp. 316–326.
SLESLE-2010-HerrmannsdoerferRK #analysis #identification #metamodelling
Metamodel Usage Analysis for Identifying Metamodel Improvements (MH, DR, MK), pp. 62–81.
SPLCSPLC-2010-FurtadoSR #analysis #game studies #product line
Streamlining Domain Analysis for Digital Games Product Lines (AWBF, ALMS, GLR), pp. 316–330.
ASPLOSASPLOS-2010-GoodsteinVCGKM #adaptation #analysis #data flow #monitoring #parallel
Butterfly analysis: adapting dataflow analysis to dynamic parallel monitoring (MLG, EV, SC, PBG, MAK, TCM), pp. 257–270.
CCCC-2010-JiangZTS #analysis #distance #locality #multi #question #reuse
Is Reuse Distance Applicable to Data Locality Analysis on Chip Multiprocessors? (YJ, EZZ, KT, XS), pp. 264–282.
CCCC-2010-LogozzoV #abstract interpretation #agile #analysis #javascript #named #optimisation
RATA: Rapid Atomic Type Analysis by Abstract Interpretation — Application to JavaScript Optimization (FL, HV), pp. 66–83.
CGOCGO-2010-LindermanHDMN #analysis #automation #optimisation #precise #towards
Towards program optimization through automated analysis of numerical precision (MDL, MH, DLD, THYM, GPN), pp. 230–237.
CGOCGO-2010-PatilPSLC #analysis #framework #named #parallel #source code
PinPlay: a framework for deterministic replay and reproducible analysis of parallel programs (HP, CP, MS, GL, JC), pp. 2–11.
CGOCGO-2010-PriceV #analysis #scalability
Large program trace analysis and compression with ZDDs (GDP, MV), pp. 32–41.
CGOCGO-2010-YuXHFZ #analysis #pointer #scalability
Level by level: making flow- and context-sensitive pointer analysis scalable for millions of lines of code (HY, JX, WH, XF, ZZ), pp. 218–229.
HPDCHPDC-2010-DunlavySS #analysis #modelling #named #scalability
ParaText: scalable text modeling and analysis (DMD, TMS, ETS), pp. 344–347.
HPDCHPDC-2010-SonmezYAIE #analysis #clustering #multi #performance #scheduling #workflow
Performance analysis of dynamic workflow scheduling in multicluster grids (OOS, NY, SA, AI, DHJE), pp. 49–60.
LCTESLCTES-2010-AltmeyerMR #analysis #bound
Resilience analysis: tightening the CRPD bound for set-associative caches (SA, CM, JR), pp. 153–162.
LCTESLCTES-2010-BiehlCT #analysis #development #embedded #modelling #safety
Integrating safety analysis into the model-based development toolchain of automotive embedded systems (MB, DJC, MT), pp. 125–132.
LCTESLCTES-2010-ForoozannejadHHG #analysis #streaming
Look into details: the benefits of fine-grain streaming buffer analysis (MHF, MH, TLH, SG), pp. 27–36.
LCTESLCTES-2010-LiXLZ #analysis #approximate #architecture #memory management
Analysis and approximation for bank selection instruction minimization on partitioned memory architecture (ML, CJX, TL, YZ), pp. 1–8.
LCTESLCTES-2010-PerathonerRTLR #analysis #modelling #performance
Modeling structured event streams in system level performance analysis (SP, TR, LT, KL, JR), pp. 37–46.
LCTESLCTES-2010-SchlicklingP #analysis #automation #modelling
Semi-automatic derivation of timing models for WCET analysis (MS, MP), pp. 67–76.
OSDIOSDI-2010-AttariyanF #analysis #automation #data flow #information management
Automating Configuration Troubleshooting with Dynamic Information Flow Analysis (MA, JF), pp. 237–250.
OSDIOSDI-2010-Boyd-WickizerCMPKMZ #analysis #linux #scalability
An Analysis of Linux Scalability to Many Cores (SBW, ATC, YM, AP, MFK, RM, NZ), pp. 1–16.
PPoPPPPoPP-2010-Chakrabarti #abstraction #analysis #effectiveness #performance #source code
New abstractions for effective performance analysis of STM programs (DRC), pp. 333–334.
PPoPPPPoPP-2010-RomeinBMN #analysis #implementation #performance
The LOFAR correlator: implementation and performance analysis (JWR, PCB, JDM, RvN), pp. 169–178.
CAVCAV-2010-AlbarghouthiGWC #analysis #symbolic computation
Abstract Analysis of Symbolic Executions (AA, AG, OW, MC), pp. 495–510.
CAVCAV-2010-BloemCGHKRSS #analysis #named #requirements #synthesis
RATSY — A New Requirements Analysis Tool with Synthesis (RB, AC, KG, GH, RK, MR, VS, RS), pp. 425–429.
CAVCAV-2010-KroeningSTW #analysis #composition #invariant #termination
Termination Analysis with Compositional Transition Invariants (DK, NS, AT, CMW), pp. 89–103.
CAVCAV-2010-KunduGW #analysis #concurrent #named #testing
Contessa: Concurrency Testing Augmented with Symbolic Analysis (SK, MKG, CW), pp. 127–131.
CAVCAV-2010-LiXBL #analysis #automaton #hardware #performance #reachability
Efficient Reachability Analysis of Büchi Pushdown Systems for Hardware/Software Co-verification (JL, FX, TB, VL), pp. 339–353.
ICLPICLP-2010-Dandois10 #logic programming #program analysis #source code
Program analysis for code duplication in logic programs (CD), pp. 241–247.
ICLPICLP-2010-Demeyer10 #concurrent #declarative #program analysis #programming
Program Analysis to Support Concurrent Programming in Declarative Languages (RD), pp. 248–254.
ICLPICLP-2010-Zwirchmayr10 #analysis
Cutting-Edge Timing Analysis Techniques (JZ), pp. 303–305.
ICLPICLP-J-2010-Schneider-KampGSST #analysis #automation #logic programming #source code #termination
Automated termination analysis for logic programs with cut (PSK, JG, TS, AS, RT), pp. 365–381.
ICSTICST-2010-KimSGSHN #analysis #automation #debugging #identification
Automated Bug Neighborhood Analysis for Identifying Incomplete Bug Fixes (MK, SS, CG, HS, MJH, MGN), pp. 383–392.
ICTSSICTSS-2010-DelamareMBT #aspect-oriented #impact analysis #named #testing #weaving
Vidock: A Tool for Impact Analysis of Aspect Weaving on Test Cases (RD, FM, BB, YLT), pp. 250–265.
IJCARIJCAR-2010-ChevalCD #analysis #automation #constraints #equivalence #security
Automating Security Analysis: Symbolic Equivalence of Constraint Systems (VC, HCL, SD), pp. 412–426.
ISSTAISSTA-2010-ArcuriIB #analysis #effectiveness #formal method #predict #random testing #testing
Formal analysis of the effectiveness and predictability of random testing (AA, MZZI, LCB), pp. 219–230.
ISSTAISSTA-2010-GaleottiRPF #analysis #bound #invariant #performance #verification
Analysis of invariants for efficient bounded verification (JPG, NR, CLP, MFF), pp. 25–36.
ISSTAISSTA-2010-GodefroidK #float #memory management #program analysis #proving #safety
Proving memory safety of floating-point computations by combining static and dynamic program analysis (PG, JK), pp. 1–12.
ISSTAISSTA-2010-Jiang #analysis #automation #testing
Automated analysis of load testing results (ZMJ), pp. 143–146.
ISSTAISSTA-2010-TangBLS #analysis #float #statistics
Perturbing numerical calculations for statistical analysis of floating-point program (in)stability (ET, ETB, XL, ZS), pp. 131–142.
RTARTA-2010-HillsR #approach #composition #logic #program analysis #semantics
A Rewriting Logic Semantics Approach to Modular Program Analysis (MH, GR), pp. 151–160.
RTARTA-2010-OttoBEG #analysis #automation #bytecode #java #term rewriting #termination
Automated Termination Analysis of Java Bytecode by Term Rewriting (CO, MB, CvE, JG), pp. 259–276.
RTARTA-2010-ZanklK #analysis #complexity #composition
Modular Complexity Analysis via Relative Complexity (HZ, MK), pp. 385–400.
TAPTAP-2010-Blanchette #algebra #analysis #data type #induction #recursion #relational
Relational Analysis of (Co)inductive Predicates, (Co)algebraic Datatypes, and (Co)recursive Functions (JCB), pp. 117–134.
TAPTAP-2010-BousquetL #analysis #evaluation #mutation testing #process #proving
Proof Process Evaluation with Mutation Analysis (LdB, ML), pp. 55–60.
TAPTAP-2010-ChebaroKGJ #c #debugging #generative #static analysis #testing
Combining Static Analysis and Test Generation for C Program Debugging (OC, NK, AG, JJ), pp. 94–100.
VMCAIVMCAI-2010-Esparza #analysis #probability #process
Analysis of Systems with Stochastic Process Creation (JE), p. 1.
VMCAIVMCAI-2010-KreikerSV #analysis #c #low level
Shape Analysis of Low-Level C with Overlapping Structures (JK, HS, VV), pp. 214–230.
VMCAIVMCAI-2010-MarronMSK #analysis #set
Shape Analysis with Reference Set Relations (MM, RM, DS, DK), pp. 247–262.
VMCAIVMCAI-2010-Might #analysis #pointer
Shape Analysis in the Absence of Pointers and Structure (MM), pp. 263–278.
VMCAIVMCAI-2010-PerrelleH #analysis #array #permutation
An Analysis of Permutations in Arrays (VP, NH), pp. 279–294.
VMCAIVMCAI-2010-WilhelmABGHRWW #analysis #realtime
Static Timing Analysis for Hard Real-Time Systems (RW, SA, CB, DG, JH, JR, BW, SW), pp. 3–22.
ASEASE-2009-Balagtas-FernandezH #analysis #framework #mobile #usability
A Methodology and Framework to Simplify Usability Analysis of Mobile Applications (FTBF, HH), pp. 520–524.
ASEASE-2009-DeshmukhES #analysis #concurrent #library
Symbolic Deadlock Analysis in Concurrent Libraries and Their Clients (JVD, EAE, SS), pp. 480–491.
ASEASE-2009-GonzalezCD #analysis #automation #implementation #workflow
Automating the Implementation of Analysis Concerns in Workflow Applications (OG, RC, DD), pp. 585–589.
ASEASE-2009-SaekiHK #analysis #requirements
A Tool for Attributed Goal-Oriented Requirements Analysis (MS, SH, HK), pp. 674–676.
ASEASE-2009-WongC #analysis #dependence #logic #modelling #performance
Improving the Efficiency of Dependency Analysis in Logical Decision Models (SW, YC), pp. 173–184.
CASECASE-2009-DotoliFMSU #analysis #petri net
The impact of ICT on an Intermodal Transportation System: an analysis by Petri Nets (MD, MPF, AMM, GS, WU), pp. 513–518.
CASECASE-2009-HeraguCKM #analysis #network #retrieval
Analysis of autonomous vehicle storage and retrieval system by open queueing network (SSH, XC, AK, CJM), pp. 455–459.
CASECASE-2009-KumarWKSS #analysis #fuzzy #predict #using #variability
A fuzzy filtering based system for maximal oxygen uptake prediction using heart rate variability analysis (MK, MW, SK, NS, RS), pp. 604–608.
CASECASE-2009-LiZF #analysis
Analysis of two-loop closed production systems (NL, LZ, WF), pp. 460–465.
CASECASE-2009-RamakrishnanR #analysis #linear
Delay-dependent stability analysis of linear system with additive time-varying delays (KR, GR), pp. 122–126.
DACDAC-2009-AyalaAB #analysis #data flow
Thermal-aware data flow analysis (JLA, DA, PB), pp. 613–614.
DACDAC-2009-CallegariWB #analysis #ranking
Speedpath analysis based on hypothesis pruning and ranking (NC, LCW, PB), pp. 346–351.
DACDAC-2009-GlassLTBC #analysis #architecture #design #encoding #hybrid #network
Designing heterogeneous ECU networks via compact architecture encoding and hybrid timing analysis (MG, ML, JT, UDB, SC), pp. 43–46.
DACDAC-2009-JuHCR #analysis #source code
Context-sensitive timing analysis of Esterel programs (LJ, BKH, SC, AR), pp. 870–873.
DACDAC-2009-KamhiNTW #analysis #architecture #named #statistics #transaction
MAGENTA: transaction-based statistical micro-architectural root-cause analysis (GK, AN, AT, AW), pp. 639–643.
DACDAC-2009-LinB #analysis #process
Analysis and mitigation of process variation impacts on Power-Attack Tolerance (LL, WPB), pp. 238–243.
DACDAC-2009-LingVFA #analysis #effectiveness
A moment-based effective characterization waveform for static timing analysis (DDL, CV, PF, SA), pp. 19–24.
DACDAC-2009-LuSZZYZ #analysis #process #reliability #statistics
Statistical reliability analysis under process variation and aging effects (YL, LS, HZ, HZ, FY, XZ), pp. 514–519.
DACDAC-2009-MutluLMC #analysis #approach #parametricity
A parametric approach for handling local variation effects in timing analysis (AAM, JL, RM, MC), pp. 126–129.
DACDAC-2009-ShiCHMTHW #analysis #gpu #grid #network #performance #power management
GPU friendly fast Poisson solver for structured power grid network analysis (JS, YC, WH, LM, SXDT, PHH, XW), pp. 178–183.
DACDAC-2009-TakahashiYT #analysis #statistics
A Gaussian mixture model for statistical timing analysis (ST, YY, ST), pp. 110–115.
DACDAC-2009-VeetilSBSR #analysis #dependence #performance
Efficient smart sampling based full-chip leakage analysis for intra-die variation considering state dependence (VV, DS, DB, SS, SR), pp. 154–159.
DACDAC-2009-WalravensVD #analysis #modelling #named #performance
ActivaSC: a highly efficient and non-intrusive extension for activity-based analysis of SystemC models (CW, YV, WD), pp. 172–177.
DACDAC-2009-WangYLP #analysis #parametricity
SRAM parametric failure analysis (JW, SY, XL, LTP), pp. 496–501.
DACDAC-2009-YeLCC #analysis #layout #process #variability
Variability analysis under layout pattern-dependent rapid-thermal annealing process (YY, FL, MC, YC), pp. 551–556.
DATEDATE-2009-BartoliniRB #analysis #quality #scalability #visual notation
Visual quality analysis for dynamic backlight scaling in LCD systems (AB, MR, LB), pp. 1428–1433.
DATEDATE-2009-BellasiFS #analysis #modelling #multi #power management #predict
Predictive models for multimedia applications power consumption based on use-case and OS level analysis (PB, WF, DS), pp. 1446–1451.
DATEDATE-2009-ChakrabortyGRP #analysis #optimisation
Analysis and optimization of NBTI induced clock skew in gated clock trees (AC, GG, AR, DZP), pp. 296–299.
DATEDATE-2009-GargM #3d #analysis #process #variability
System-level process variability analysis and mitigation for 3D MPSoCs (SG, DM), pp. 604–609.
DATEDATE-2009-HolcombLS #analysis #design #fault
Design as you see FIT: System-level soft error analysis of sequential circuits (DEH, WL, SAS), pp. 785–790.
DATEDATE-2009-IzosimovPPEP #analysis #embedded #fault tolerance #optimisation
Analysis and optimization of fault-tolerant embedded systems with hardened processors (VI, IP, PP, PE, ZP), pp. 682–687.
DATEDATE-2009-KuhneGD #analysis #comprehension #design
Property analysis and design understanding (UK, DG, RD), pp. 1246–1249.
DATEDATE-2009-LeeS #fault #static analysis
Static analysis to mitigate soft errors in register files (JL, AS), pp. 1367–1372.
DATEDATE-2009-LiCSSS #analysis #on the #statistics
On hierarchical statistical static timing analysis (BL, NC, MS, WS, US), pp. 1320–1325.
DATEDATE-2009-NegreanSE #analysis #multi
Response-time analysis of arbitrarily activated tasks in multiprocessor systems with shared resources (MN, SS, RE), pp. 524–529.
DATEDATE-2009-RistauLAF #analysis #parallel
Dimensioning heterogeneous MPSoCs via parallelism analysis (BR, TL, OA, GF), pp. 554–557.
DATEDATE-2009-SreedharK #analysis #on the
On linewidth-based yield analysis for nanometer lithography (AS, SK), pp. 381–386.
DATEDATE-2009-TannirK #analysis #using
Computation of IP3 using single-tone moments analysis (DT, RK), pp. 718–723.
DATEDATE-2009-ViehlPBR #analysis #performance #scheduling
White box performance analysis considering static non-preemptive software scheduling (AV, MP, OB, WR), pp. 513–518.
DATEDATE-2009-YangNV #automation #data analysis #debugging
Automated data analysis solutions to silicon debug (YSY, NN, AGV), pp. 982–987.
DocEngDocEng-2009-BarcenasGL #analysis #constraints #on the #query
On the analysis of queries with counting constraints (EB, PG, NL), pp. 21–24.
DocEngDocEng-2009-GeorgHCPI #analysis #documentation
From rhetorical structures to document structure: shallow pragmatic analysis for document engineering (GG, HH, MC, HP, MI), pp. 185–192.
DocEngDocEng-2009-Hassan #analysis #documentation
Object-level document analysis of PDF files (TH), pp. 47–55.
DocEngDocEng-2009-JoshiL #analysis #documentation #image #natural language #using #web
Web document text and images extraction using DOM analysis and natural language processing (PMJ, SL), pp. 218–221.
DRRDRR-2009-Ding #analysis #documentation #image #recognition #research #topic
Advanced topics in character recognition and document analysis: Research works in Intelligent Image & Document Research Lab, Tsinghua University (XD), pp. 1–10.
DRRDRR-2009-TaghvaC #analysis #bound #documentation #using
Document boundary determination using structural and lexical analysis (KT, MAC), pp. 1–10.
DRRDRR-2009-YouAADT #analysis #retrieval
Figure content analysis for improved biomedical article retrieval (DY, EA, SA, DDF, GRT), pp. 1–10.
HTHT-2009-RosenC #analysis #network #social
Social network analysis in virtual environments (DR, MC), pp. 317–322.
HTHT-2009-ToppanoR #analysis #design #hypermedia
Semiotic design and analysis of hypermedia (ET, VR), pp. 367–368.
HTHT-2009-WangC #analysis #web
Use noisy link analysis to improve web search (YW, JC), pp. 377–378.
ICDARICDAR-2009-AntonacopoulosBPP #analysis #dataset #documentation #evaluation #layout #performance
A Realistic Dataset for Performance Evaluation of Document Layout Analysis (AA, DB, CP, SP), pp. 296–300.
ICDARICDAR-2009-ChaudhuryJTSSM #analysis #image #pipes and filters
Google Newspaper Search — Image Processing and Analysis Pipeline (KC, AJ, ST, VS, SS, SM), pp. 621–625.
ICDARICDAR-2009-CollFL #analysis #documentation
Graphological Analysis of Handwritten Text Documents for Human Resources Recruitment (RC, AF, JL), pp. 1081–1085.
ICDARICDAR-2009-FerilliBEB #analysis #layout
A Distance-Based Technique for Non-Manhattan Layout Analysis (SF, MB, FE, TMAB), pp. 231–235.
ICDARICDAR-2009-Franke #analysis #forensics #reliability
Capturing Reliable Data for Computer-Based Forensic Handwriting Analysis II: Pen-position Activations (KF), pp. 1310–1314.
ICDARICDAR-2009-GaoTLTC #analysis #clustering #documentation
Analysis of Book Documents’ Table of Content Based on Clustering (LG, ZT, XL, XT, YC), pp. 911–915.
ICDARICDAR-2009-HeLS #analysis #linear #metric #novel #recognition
A Novel Rejection Measurement in Handwritten Numeral Recognition Based on Linear Discriminant Analysis (CLH, LL, CYS), pp. 451–455.
ICDARICDAR-2009-HendersonL #analysis #image
Raster Map Image Analysis (TCH, TL), pp. 376–380.
ICDARICDAR-2009-HuangDJG #adaptation #analysis #incremental #linear #online #recognition #using
Writer Adaptive Online Handwriting Recognition Using Incremental Linear Discriminant Analysis (ZH, KD, LJ, XG), pp. 91–95.
ICDARICDAR-2009-IbrahimKKAG #analysis #dependence #online #using #verification
On-Line Signature Verification: Directional Analysis of a Signature Using Weighted Relative Angle Partitions for Exploitation of Inter-Feature Dependencies (MTI, MJK, MAK, KSA, LG), pp. 41–45.
ICDARICDAR-2009-IndermuhleLB #analysis #documentation
Combining Alignment Results for Historical Handwritten Document Analysis (EI, ML, HB), pp. 1186–1190.
ICDARICDAR-2009-Long #analysis #architecture
An RDF-Based Blackboard Architecture for Improving Table Analysis (VL), pp. 916–920.
ICDARICDAR-2009-LoprestiZHT #analysis #documentation
Document Analysis Support for the Manual Auditing of Elections (DPL, XZ, XH, GT), pp. 733–737.
ICDARICDAR-2009-MalleronEEDR #analysis #documentation #layout
Text Lines and Snippets Extraction for 19th Century Handwriting Documents Layout Analysis (VM, VE, HE, SDC, PR), pp. 1001–1005.
ICDARICDAR-2009-SchullerSRK #analysis #bibliography #estimation #online #quote
“The Godfather” vs. “Chaos”: Comparing Linguistic Analysis Based on On-line Knowledge Sources and Bags-of-N-Grams for Movie Review Valence Estimation (BWS, JS, GR, TK), pp. 858–862.
ICDARICDAR-2009-SchulzEGAAD #analysis
Seizing the Treasure: Transferring Knowledge in Invoice Analysis (FS, ME, MG, BA, SA, AD), pp. 848–852.
ICDARICDAR-2009-Silva #analysis #documentation #learning #markov #modelling
Learning Rich Hidden Markov Models in Document Analysis: Table Location (ACeS), pp. 843–847.
ICDARICDAR-2009-Smith #analysis #detection #hybrid #layout
Hybrid Page Layout Analysis via Tab-Stop Detection (RWS), pp. 241–245.
SIGMODSIGMOD-2009-ChaudhuriNS #profiling #static analysis #using
Bridging the application and DBMS divide using static analysis and dynamic profiling (SC, VRN, MS), pp. 1039–1042.
SIGMODSIGMOD-2009-ChenKM #analysis #multi
Exploiting context analysis for combining multiple entity resolution systems (ZC, DVK, SM), pp. 207–218.
SIGMODSIGMOD-2009-Heer #data analysis #social
Voyagers and voyeurs: supporting social data analysis (JH), pp. 971–972.
SIGMODSIGMOD-2009-McSherry #data analysis #framework #privacy #query
Privacy integrated queries: an extensible platform for privacy-preserving data analysis (FM), pp. 19–30.
SIGMODSIGMOD-2009-PavloPRADMS #comparison #data analysis #scalability
A comparison of approaches to large-scale data analysis (AP, EP, AR, DJA, DJD, SM, MS), pp. 165–178.
SIGMODSIGMOD-2009-SunLDC #analysis #detection #workflow
Detecting and resolving unsound workflow views for correct provenance analysis (PS, ZL, SBD, YC), pp. 549–562.
VLDBVLDB-2009-BenediktC #analysis #independence #xml
Schema-Based Independence Analysis for XML Updates (MB, JC), pp. 61–72.
VLDBVLDB-2009-CohenDDHW #analysis #big data
MAD Skills: New Analysis Practices for Big Data (JC, BD, MD, JMH, CW), pp. 1481–1492.
VLDBVLDB-2009-DaiGBBL #analysis #interactive #named
TIAMAT: a Tool for Interactive Analysis of Microdata Anonymization Techniques (CD, GG, EB, JWB, NL), pp. 1618–1621.
VLDBVLDB-2009-HeerH #data analysis #social #visualisation
Data visualization & social data analysis (JH, JMH), pp. 1656–1657.
VLDBVLDB-2009-SchnaitterPG #analysis #design #interactive #modelling #physics
Index Interactions in Physical Design Tuning: Modeling, Analysis, and Applications (KS, NP, LG), pp. 1234–1245.
VLDBVLDB-2009-SunLNDC #analysis #detection #named #workflow
WOLVES: Achieving Correct Provenance Analysis by Detecting and Resolving Unsound Workflow Views (PS, ZL, SN, SBD, YC), pp. 1614–1617.
VLDBVLDB-2009-WuXMH #analysis #multi
Promotion Analysis in Multi-Dimensional Space (TW, DX, QM, JH), pp. 109–120.
ITiCSEITiCSE-2009-BlasGMB #analysis #automation #composition #using
Automatic E-learning contents composition by using gap analysis techniques (JMdB, JMG, LdM, RB), p. 369.
ITiCSEITiCSE-2009-Mirolo #analysis #modelling #problem #recursion
Mental models of recursive computations vs. recursive analysis in the problem domain (CM), p. 397.
ITiCSEITiCSE-2009-RosslingK09a #analysis #performance
A system for integral efficiency analysis of sustainable technologies (GR, YK), p. 395.
ESOPESOP-2009-Campbell #analysis #data type #memory management #using
Amortised Memory Analysis Using the Depth of Data Structures (BC), pp. 190–204.
FASEFASE-2009-AlTurkiDYCI #analysis #specification
Formal Specification and Analysis of Timing Properties in Software Systems (MA, DD, DY, AC, HI), pp. 262–277.
FASEFASE-2009-ChenWYS #detection #named #static analysis
HAVE: Detecting Atomicity Violations via Integrated Dynamic and Static Analysis (QC, LW, ZY, SDS), pp. 425–439.
FASEFASE-2009-ClarkGT #analysis #scalability
Scalable Analysis of Scalable Systems (AC, SG, MT), pp. 1–17.
FoSSaCSFoSSaCS-2009-KuhnrichSSK #analysis #data flow #infinity #interprocedural
Interprocedural Dataflow Analysis over Weight Domains with Infinite Descending Chains (MK, SS, JS, SK), pp. 440–455.
TACASTACAS-2009-AtigBQ #analysis #bound #concurrent #source code #thread
Context-Bounded Analysis for Concurrent Programs with Dynamic Creation of Threads (MFA, AB, SQ), pp. 107–123.
TACASTACAS-2009-BjornerTV #analysis #source code #string
Path Feasibility Analysis for String-Manipulating Programs (NB, NT, AV), pp. 307–321.
TACASTACAS-2009-GofmanLSZYS #analysis #data access #named #policy
RBAC-PAT: A Policy Analysis Tool for Role Based Access Control (MIG, RL, ACS, YZ, PY, SDS), pp. 46–49.
TACASTACAS-2009-NoriRTT #static analysis #testing
The YogiProject: Software Property Checking via Static Analysis and Testing (AVN, SKR, ST, AVT), pp. 178–181.
TACASTACAS-2009-OrzanWW #equation #static analysis
Static Analysis Techniques for Parameterised Boolean Equation Systems (SO, WW, TACW), pp. 230–245.
TACASTACAS-2009-YuBI #analysis #string #verification
Symbolic String Verification: Combining String Analysis and Size Analysis (FY, TB, OHI), pp. 322–336.
CSMRCSMR-2009-BurenR #analysis #architecture #maintenance #using
Architectural Maintenance Using a Data Warehouse System for Availability Analysis (GB, CR), pp. 307–308.
CSMRCSMR-2009-EkstedtFJLSUB #analysis #architecture #enterprise #maintenance
A Tool for Enterprise Architecture Analysis of Maintainability (ME, UF, PJ, RL, TS, JU, MB), pp. 327–328.
CSMRCSMR-2009-JoshiJ #concept analysis
Concept Analysis for Class Cohesion (PJ, RKJ), pp. 237–240.
CSMRCSMR-2009-Laitila #analysis #comprehension #named
SymAnalyzer: A Symbolic Analysis Tool for Program Comprehension (EL), pp. 325–326.
CSMRCSMR-2009-NagyM #analysis #fault #security
Static Security Analysis Based on Input-Related Software Faults (CN, SM), pp. 37–46.
CSMRCSMR-2009-PatelHR #clustering #dependence #dynamic analysis #using
Software Clustering Using Dynamic Analysis and Static Dependencies (CP, AHL, JR), pp. 27–36.
ICPCICPC-2009-FigueiredoSSGWN #analysis #design
Crosscutting patterns and design stability: An exploratory analysis (EF, BCdS, CS, AFG, JW, DJN), pp. 138–147.
ICPCICPC-2009-ForwardLB #analysis #comprehension
Improving program comprehension by enhancing program constructs: An analysis of the Umple language (AF, TCL, DB), pp. 311–312.
ICPCICPC-2009-GrantC #analysis
Vector space analysis of software clones (SG, JRC), pp. 233–237.
ICPCICPC-2009-LiuM #static analysis
Practical static analysis for inference of security-related program properties (YL, AM), pp. 50–59.
ICPCICPC-2009-PetrenkoR #impact analysis #precise
Variable granularity for improving precision of impact analysis (MP, VR), pp. 10–19.
ICPCICPC-2009-PopescuGM #analysis #dependence #precise
Enabling more precise dependency analysis in event-based systems (DP, JG, NM), pp. 305–306.
ICPCICPC-2009-ZhangDH #aspectj #impact analysis #tool support #visualisation
Impact analysis and visualization toolkit for static crosscutting in AspectJ (DZ, EDE, LJH), pp. 60–69.
ICSMEICSM-2009-HindleGH #analysis #developer #topic #what
What’s hot and what’s not: Windowed developer topic analysis (AH, MWG, RCH), pp. 339–348.
ICSMEICSM-2009-JiangHHF #analysis #automation #performance #testing
Automated performance analysis of load tests (ZMJ, AEH, GH, PF), pp. 125–134.
ICSMEICSM-2009-Li #analysis #dependence #identification #using
Identifying high-level dependence structures using slice-based dependence analysis (ZL), pp. 457–460.
ICSMEICSM-2009-LiGMMMGC #analysis #component #fault #multi #pervasive #scalability
Analysis of pervasive multiple-component defects in a large software system (ZL, MG, SSM, NHM, AVM, DG, EC), pp. 265–273.
ICSMEICSM-2009-LuciaOT #analysis #empirical #traceability
The role of the coverage analysis during IR-based traceability recovery: A controlled experiment (ADL, RO, GT), pp. 371–380.
ICSMEICSM-2009-Roy #analysis #detection
Detection and analysis of near-miss software clones (CKR), pp. 447–450.
ICSMEICSM-2009-VasaLBN #analysis #comparative #evolution #using
Comparative analysis of evolving software systems using the Gini coefficient (RV, ML, PB, ON), pp. 179–188.
ICSMEICSM-2009-WenzelKKK #3d #analysis #evolution #visualisation
Evolution analysis with animated and 3D-visualizations (SW, JK, UK, AK), pp. 475–478.
ICSMEICSM-2009-Yoo #impact analysis #metric #performance #using
Performance impact analysis with KPP using application response measurement in E-government systems (NY), pp. 503–506.
MSRMSR-2009-EnslenHPV #analysis #automation #identifier #mining #source code
Mining source code to automatically split identifiers for software analysis (EE, EH, LLP, KVS), pp. 71–80.
SCAMSCAM-2009-CanetCM #analysis #c #source code
A Value Analysis for C Programs (GC, PC, BM), pp. 123–124.
SCAMSCAM-2009-KlintSV #analysis #domain-specific language #named #rascal #source code
RASCAL: A Domain Specific Language for Source Code Analysis and Manipulation (PK, TvdS, JJV), pp. 168–177.
SCAMSCAM-2009-QianZX #analysis #lazy evaluation
Improving Side-Effect Analysis with Lazy Access Path Resolving (JQ, YZ, BX), pp. 35–44.
WCREWCRE-1999-BernardiL99a #analysis #identification #named #object-oriented
ConAn: A Tool for the Identification of Crosscutting Concerns in Object Oriented Systems Based on Type Hierarchy Analysis (MLB, GADL), pp. 319–320.
WCREWCRE-1999-CapobiancoLOPP99a #analysis #traceability #using
Traceability Recovery Using Numerical Analysis (GC, ADL, RO, AP, SP), pp. 195–204.
WCREWCRE-1999-Khomh99a #analysis #comprehension #design #named #quality
SQUAD: Software Quality Understanding through the Analysis of Design (FK), pp. 303–306.
WCREWCRE-1999-YangPZ99a #concept analysis #data access #feature model #multi #semantics #using
Domain Feature Model Recovery from Multiple Applications Using Data Access Semantics and Formal Concept Analysis (YY, XP, WZ), pp. 215–224.
PEPMPEPM-2009-CifuentesKLS #debugging #detection #program analysis #using
Program analysis for bug detection using parfait: invited talk (CC, NK, LL, BS), pp. 7–8.
PLDIPLDI-2009-GulwaniJK #analysis #bound #control flow #invariant #refinement
Control-flow refinement and progress invariants for bound analysis (SG, SJ, EK), pp. 375–385.
PLDIPLDI-2009-HoffmanEJ #analysis #semantics
Semantics-aware trace analysis (KJH, PE, SJ), pp. 453–464.
PLDIPLDI-2009-JoshiPSN #detection #program analysis #random
A randomized dynamic program analysis technique for detecting real deadlocks (PJ, CSP, KS, MN), pp. 110–120.
PLDIPLDI-2009-RavitchJAL #automation #generative #library #static analysis #using
Automatic generation of library bindings using static analysis (TR, SJ, EA, BL), pp. 352–362.
PLDIPLDI-2009-Rubio-GonzalezGLAA #analysis #fault #file system
Error propagation analysis for file systems (CRG, HSG, BL, RHAD, ACAD), pp. 270–280.
PLDIPLDI-2009-TallentMF #analysis #metric #performance
Binary analysis for measurement and attribution of program performance (NRT, JMMC, MWF), pp. 441–452.
PLDIPLDI-2009-TrippPFSW #analysis #effectiveness #named #web
TAJ: effective taint analysis of web applications (OT, MP, SJF, MS, OW), pp. 87–97.
SASSAS-2009-DohKS #parsing #static analysis #string #using
Abstract Parsing: Static Analysis of Dynamically Generated String Output Using LR-Parsing Technology (KGD, HK, DAS), pp. 256–272.
SASSAS-2009-GulavaniCRN #analysis #bottom-up
Bottom-Up Shape Analysis (BSG, SC, GR, AVN), pp. 188–204.
SASSAS-2009-JensenMT #analysis #javascript
Type Analysis for JavaScript (SHJ, AM, PT), pp. 238–255.
SASSAS-2009-SeidlV #analysis #concurrent #detection
Region Analysis for Race Detection (HS, VV), pp. 171–187.
SASSAS-2009-Simon #analysis #optimisation #pointer #similarity #using
Optimizing Pointer Analysis Using Bisimilarity (LS), pp. 222–237.
SASSAS-2009-SridharanF #analysis #complexity
The Complexity of Andersen’s Analysis in Practice (MS, SJF), pp. 205–221.
CIAACIAA-J-2008-DixonES09 #analysis
Analysis of Bit-Split Languages for Packet Scanning and Experiments with Wildcard Matching (RD, ÖE, TS), pp. 597–612.
CIAACIAA-2009-Seidl #automaton #finite #program analysis
Program Analysis through Finite Tree Automata (HS), p. 3.
ICALPICALP-v1-2009-BecchettiK #analysis #streaming
Competitive Analysis of Aggregate Max in Windowed Streaming (LB, EK), pp. 156–170.
ICALPICALP-v2-2009-FinkelG #analysis
Forward Analysis for WSTS, Part II: Complete WSTS (AF, JGL), pp. 188–199.
ICALPICALP-v2-2009-FriedrichSV #analysis #network
Smoothed Analysis of Balancing Networks (TF, TS, DV), pp. 472–483.
ICALPICALP-v2-2009-Mosk-AoyamaR #analysis #performance #worst-case
Worst-Case Efficiency Analysis of Queueing Disciplines (DMA, TR), pp. 546–557.
FMFM-2009-AlbertAGP #analysis
Field-Sensitive Value Analysis by Field-Insensitive Analysis (EA, PA, SG, GP), pp. 370–386.
FMFM-2009-HeidarianSV #analysis #network #protocol
Analysis of a Clock Synchronization Protocol for Wireless Sensor Networks (FH, JS, FWV), pp. 516–531.
FMFM-2009-JostLHSH #analysis #bound #using
“Carbon Credits” for Resource-Bounded Computations Using Amortised Analysis (SJ, HWL, KH, NS, MH), pp. 354–369.
FMFM-2009-SeidlVV #alias #analysis #linear #polynomial
A Smooth Combination of Linear and Herbrand Equalities for Polynomial Time Must-Alias Analysis (HS, VV, VV), pp. 644–659.
FMFM-2009-WangKGG #analysis #concurrent #predict #source code
Symbolic Predictive Analysis for Concurrent Programs (CW, SK, MKG, AG), pp. 256–272.
IFMIFM-2009-HasanAT #analysis #array #configuration management #fault #memory management #probability
Formal Probabilistic Analysis of Stuck-at Faults in Reconfigurable Memory Arrays (OH, NA, ST), pp. 277–291.
SEFMSEFM-2009-LienO #analysis #formal method #modelling #multi #protocol
Formal Modeling and Analysis of an IETF Multicast Protocol (EL, PCÖ), pp. 273–282.
SEFMSEFM-2009-NgocO #analysis #fault #model checking
Overflow and Roundoff Error Analysis via Model Checking (DTBN, MO), pp. 105–114.
SEFMSEFM-2009-SubramaniamGP #finite #impact analysis #state machine #testing #using
Using Change Impact Analysis to Select Tests for Extended Finite State Machines (MS, BG, ZP), pp. 93–102.
SEFMSEFM-2009-TruongTN #analysis #coordination #multi #using
Coordinated Consensus Analysis of Multi-agent Systems Using Event-B (NTT, TBT, VHN), pp. 201–209.
SFMSFM-2009-AalstMSW #analysis #formal method #interactive
Service Interaction: Patterns, Formalization, and Analysis (WMPvdA, AJM, CS, KW), pp. 42–88.
SFMSFM-2009-ClarkGT #analysis #using #web #web service
Quantitative Analysis of Web Services Using SRMC (AC, SG, MT), pp. 296–339.
CEFPCEFP-2009-TothBHLTK #behaviour #dependence #erlang #graph #impact analysis #source code #using
Impact Analysis of Erlang Programs Using Behaviour Dependency Graphs (MT, IB, ZH, LL, MT, TK), pp. 372–390.
ICFPICFP-2009-CuoqSBBCCMPP #case study #experience #framework #ml #static analysis
Experience report: OCaml for an industrial-strength static analysis framework (PC, JS, PB, RB, GC, LC, BM, VP, AP), pp. 281–286.
ICFPICFP-2009-MidtgaardJ #abstract interpretation #analysis #control flow
Control-flow analysis of function calls and returns by abstract interpretation (JM, TPJ), pp. 287–298.
CHICHI-2009-AlexanderCFGG #analysis #design #evaluation
Revisiting read wear: analysis, design, and evaluation of a footprints scrollbar (JA, AC, SF, CG, SG), pp. 1665–1674.
CHICHI-2009-BartneckH #analysis
Scientometric analysis of the CHI proceedings (CB, JH), pp. 699–708.
CHICHI-2009-DiakopoulosGE #analysis #named #online #quality #video
Videolyzer: quality analysis of online informational video for bloggers and journalists (ND, SG, IAE), pp. 799–808.
HCIDHM-2009-DzaackU #analysis #modelling #multi #performance #safety
Multilevel Analysis of Human Performance Models in Safety-Critical Systems (JD, LU), pp. 375–383.
HCIDHM-2009-Godil #analysis
Facial Shape Analysis and Sizing System (AG), pp. 29–35.
HCIHCD-2009-CaratozzoloMPZ #analysis
Caring and Curing by Mixing Information and Emotions in Orphan Diseases Websites: A Twofold Analysis (MCC, EM, OP, MZ), pp. 661–670.
HCIHCD-2009-JarrettQRAS #analysis #development #metric #testing #usability #using #web
Using Measurements from Usability Testing, Search Log Analysis and Web Traffic Analysis to Inform Development of a Complex Web Site Used for Complex Tasks (CJ, WQ, IR, SA, VS), pp. 729–738.
HCIHCD-2009-KohNTTWH #analysis #why
Why Taking Medicine Is a Chore — An Analysis of Routine and Contextual Factors in the Home (WKK, JN, OYT, ZT, AHYW, MGH), pp. 452–461.
HCIHCD-2009-KurosuH #analysis #behaviour #communication #development #research
Culture and Communication Behavior: A Research Based on the Artifact Development Analysis (MK, AH), pp. 468–475.
HCIHCD-2009-LinO #analysis #information management
The Method of User’s Requirement Analysis by Participation of the User: Constructing an Information System for Travelers (CYL, MO), pp. 862–868.
HCIHCD-2009-LokmanHNN #analysis #difference #evaluation
Website Affective Evaluation: Analysis of Differences in Evaluations Result by Data Population (AML, AFH, NLMN, MN), pp. 643–652.
HCIHCD-2009-NakanoR #analysis #corpus #multimodal #usability
Multimodal Corpus Analysis as a Method for Ensuring Cultural Usability of Embodied Conversational Agents (YIN, MR), pp. 521–530.
HCIHCD-2009-NieminenKRM #analysis #fine-grained #testing #towards #usability
Towards Fine-Grained Usability Testing: New Methodological Directions with Conversation Analysis (MN, SK, SR, PM), pp. 879–887.
HCIHCD-2009-Stephane #analysis #behaviour #predict #simulation
User Behavior Patterns: Gathering, Analysis, Simulation and Prediction (LS), pp. 322–331.
HCIHCD-2009-WadaY #analysis
The Proposal of Quantitative Analysis Method Based on the Method of Observation Engineering (TW, TY), pp. 342–350.
HCIHCI-AUII-2009-Cloud-BucknerSSYG #analysis #gender
Expression of Personality through Avatars: Analysis of Effects of Gender and Race on Perceptions of Personality (JCB, MS, BS, BY, JJG), pp. 248–256.
HCIHCI-AUII-2009-ImamuraOK #analysis #behaviour #modelling #ubiquitous
Modeling Personal Preferences on Commodities by Behavior Log Analysis with Ubiquitous Sensing (NI, AO, TK), pp. 294–303.
HCIHCI-NIMT-2009-GastBRRWMR #analysis #gesture #human-computer #interactive
Did I Get It Right: Head Gestures Analysis for Human-Machine Interactions (JG, AB, TR, GR, FW, CM, BR), pp. 170–177.
HCIHCI-NIMT-2009-MatsumotoUYM #analysis #interactive #ubiquitous #video
Life with a Robot Companion: Video Analysis of 16-Days of Interaction with a Home Robot in a “Ubiquitous Home” Environment (NM, HU, TY, HM), pp. 341–350.
HCIHCI-NT-2009-Goschnick #analysis #design #interactive #programming
People-Oriented Programming: From Agent-Oriented Analysis to the Design of Interactive Systems (SG), pp. 836–845.
HCIHCI-NT-2009-HoriguchiNSK #analysis #interactive
Analysis of Breakdowns in Menu-Based Interaction Based on Information Scent Model (YH, HN, TS, YK), pp. 438–445.
HCIHCI-NT-2009-LangeWB #analysis #automation #evaluation #information management
Automated Analysis of Eye-Tracking Data for the Evaluation of Driver Information Systems According to ISO/TS 15007-2: 2001 (CL, MW, HB), pp. 105–110.
HCIHCI-NT-2009-MatsudaUOM #analysis #eye tracking #multi
An Analysis of Eye Movements during Browsing Multiple Search Results Pages (YM, HU, MO, KiM), pp. 121–130.
HCIHCI-VAD-2009-EssabbahOHM #analysis #approach #design #interactive
A New Approach to Design an Interactive System for Molecular Analysis (ME, SO, JH, MM), pp. 713–722.
HCIHCI-VAD-2009-ParkHC #3d #analysis #experience #web
The Experience of Presence in 3D Web Environment: An Analysis of Korean Second Life (SP, HSH, MC), pp. 387–395.
HCIHCI-VAD-2009-Yarlikas #analysis #automation
A New Automatic Teller Machine (ATM) Proposal through the Analysis of ATMs of Three Banks (SY), pp. 641–650.
HCIHIMI-DIE-2009-BrangierDE #analysis #integration #library
The 7 Basic Functions of a Digital Library — Analysis of Focus Groups about the Usefulness of a Thematic Digital Library on the History of European Integration (EB, JD, LE), pp. 345–354.
HCIHIMI-DIE-2009-HendersonS #analysis #documentation #empirical
An Empirical Analysis of Personal Digital Document Structures (SH, AS), pp. 394–403.
HCIHIMI-DIE-2009-KumeS #analysis #using #web
Construction of the Data Save System of the Cusp Surface Analysis Using Web Application (YK, JSS), pp. 665–674.
HCIHIMI-DIE-2009-OcenasekS #analysis #metric #process #workflow
A Model for Measurement and Analysis of the Workflow Processes (PO, MS), pp. 149–153.
HCIHIMI-DIE-2009-UgaiA #analysis #network #social #tool support
Organization Diagnosis Tools Based on Social Network Analysis (TU, KA), pp. 181–189.
HCIHIMI-II-2009-FurukawaO #analysis
A Proposal of Collection and Analysis System of Near Miss Incident in Nursing Duties (AF, YO), pp. 497–502.
HCIHIMI-II-2009-FurutaSKAKT #analysis #collaboration #communication
Analysis of Team Communication and Collaboration in En-Route Air Traffic Control (KF, YS, TK, HA, DK, MT), pp. 758–765.
HCIHIMI-II-2009-KimuraONOT #analysis
Analysis on Descriptions of Dosage Regimens in Package Inserts of Medicines (MK, KO, KN, MO, FT), pp. 539–548.
HCIHIMI-II-2009-NozawaK #analysis #comparison #realtime #reduction
A Comparison of Artifact Reduction Methods for Real-Time Analysis of fNIRS Data (TN, TK), pp. 413–422.
HCIHIMI-II-2009-SagaTT #analysis #mining #named
Loopo: Integrated Text Miner for FACT-Graph-Based Trend Analysis (RS, HT, KT), pp. 192–200.
HCIHIMI-II-2009-SpinilloPL #analysis #safety
Patient Safety: Contributions from a Task Analysis Study on Medicine Usage by Brazilians (CS, SP, CL), pp. 604–608.
HCIIDGD-2009-MarcusK #analysis #network #social
Cross-Cultural Analysis of Social Network Services in Japan, Korea, and the USA (AM, NK), pp. 59–68.
HCIOCSC-2009-AoyagiFISSYS #analysis #collaboration
A Discussion System for Knowledge Sharing and Collaborative Analysis of Incidents in Nuclear Power Plants (SA, HF, HI, HS, HS, HY, TS), pp. 3–12.
HCIOCSC-2009-PetersonS #analysis #network #social
Analysis of Information Disclosure on a Social Networking Site (KP, KAS), pp. 256–264.
HCIOCSC-2009-TaylorT #analysis #game studies #multi #online
A Content Analysis of Interviews with Players of Massively Multiplayer Online Role-Play Games (MMORPGs): Motivating Factors and the Impact on Relationships (JT, JT), pp. 613–621.
HCIOCSC-2009-ZhaoYGL #analysis #modelling #topic
Propagation Modeling and Analysis of Incidental Topics in Blogosphere (LZ, RY, XG, ML), pp. 401–410.
VISSOFTVISSOFT-2009-HassaineDSP #analysis #generative #maintenance #visualisation
Generating visualization-based analysis scenarios from maintenance task descriptions (SH, KD, HAS, PP), pp. 41–44.
AdaEuropeAdaEurope-2009-BurnsWZ #ada #analysis #implementation #scheduling
Combining EDF and FP Scheduling: Analysis and Implementation in Ada 2005 (AB, AJW, FZ), pp. 119–133.
AdaEuropeAdaEurope-2009-LasnierZPH #analysis #automation #code generation #modelling
Ocarina : An Environment for AADL Models Analysis and Automatic Code Generation for High Integrity Applications (GL, BZ, LP, JH), pp. 237–250.
AdaEuropeAdaEurope-2009-MarrefB #analysis #worst-case
Predicated Worst-Case Execution-Time Analysis (AM, GB), pp. 134–148.
AdaSIGAda-2009-Gluch #analysis #embedded #modelling
Embedded systems engineering with the AADL: modeling & analysis (DPG), pp. 7–8.
AdaSIGAda-2009-Lathrop #ada #branch #dynamic analysis #predict
Dynamic analysis of branch mispredictions in Ada (SML), pp. 79–84.
CAiSECAiSE-2009-EspanaGP #analysis #communication #information management #requirements
Communication Analysis: A Requirements Engineering Method for Information Systems (SE, AG, OP), pp. 530–545.
CAiSECAiSE-2009-GuermoucheG #analysis #web #web service
Asynchronous Timed Web Service-Aware Choreography Analysis (NG, CG), pp. 364–378.
CAiSECAiSE-2009-KaiyaTSSK #analysis #quality #requirements #using
Spectrum Analysis for Quality Requirements by Using a Term-Characteristics Map (HK, MT, SS, TS, KK), pp. 546–560.
CAiSECAiSE-2009-LiuLYWH #analysis #constraints #using #verification #workflow
ETL Workflow Analysis and Verification Using Backwards Constraint Propagation (JL, SL, DY, JW, TH), pp. 455–469.
EDOCEDOC-2009-NarmanJECK #analysis #architecture #enterprise
Enterprise Architecture Analysis for Data Accuracy Assessments (PN, PJ, ME, MC, JK), pp. 24–33.
ICEISICEIS-AIDSS-2009-AlbusacCLVL #analysis #detection
Intelligent Surveillance for Trajectory Analysis — Detecting Anomalous Situations in Monitored Environments (JA, JJCS, LJL, DV, LMLL), pp. 102–107.
ICEISICEIS-AIDSS-2009-ElzingaPVD #concept analysis #detection
Detecting Domestic Violence — Showcasing a Knowledge Browser based on Formal Concept Analysis and Emergent Self Organizing Maps (PE, JP, SV, GD), pp. 11–18.
ICEISICEIS-DISI-2009-GustienePH #analysis #design #framework #integration #semantics #using
Semantic Framework for Information Integration — Using Service-oriented Analysis and Design (PG, IP, HH), pp. 64–69.
ICEISICEIS-DISI-2009-PoelmansR #analysis #evaluation #workflow
Assessing Workflow Management Systems — A Quantitative Analysis of a Worfklow Evaluation Model (SP, HAR), pp. 183–189.
ICEISICEIS-ISAS-2009-BifflFHM #analysis #automation #evaluation #open source #process #tool support
Evaluation of Case Tool Methods and Processes — An Analysis of Eight Open-source CASE Tools (SB, CF, CH, TM), pp. 41–48.
ICEISICEIS-ISAS-2009-GruhnK #analysis #mobile #modelling #process
Modelling, Analysis and Improvement of Mobile Business Processes with the MPL Method (VG, AK), pp. 89–94.
ICEISICEIS-ISAS-2009-LauITR #analysis #modelling #process
Discovery and Analysis of Activity Pattern Co-occurrences in Business Process Models (JML, CI, LHT, MR), pp. 83–88.
ICEISICEIS-ISAS-2009-LeiteG #analysis #multi #process #requirements
A Process for Multi-agent Domain and Application Engineering — The Domain Analysis and Application Requirements Engineering Phases (AL, RG), pp. 156–161.
ICEISICEIS-ISAS-2009-OussenaB #analysis #implementation #modelling #process #using
Layered Process Models — Analysis and Implementation (using MDA Principles) (SO, BSB), pp. 168–175.
ICEISICEIS-ISAS-2009-SunyaevKMK #analysis #health #security
Security Analysis of the German Electronic Health Card’s Peripheral Parts (AS, AK, CM, HK), pp. 19–26.
ICEISICEIS-J-2009-ChangS #analysis #classification #performance
Fast Unsupervised Classification for Handwritten Stroke Analysis (WDC, JS), pp. 918–927.
ICEISICEIS-J-2009-FritzscheML #analysis #concept #data mining #design #industrial #interactive #mining #quality
Interactive Quality Analysis in the Automotive Industry: Concept and Design of an Interactive, Web-Based Data Mining Application (SF, MM, CL), pp. 402–414.
ICEISICEIS-J-2009-MartinoBBF #analysis #multi #tool support
Integrating Google Earth within OLAP Tools for Multidimensional Exploration and Analysis of Spatial Data (SDM, SB, MB, FF), pp. 940–951.
ICEISICEIS-J-2009-MohebiS #ambiguity #analysis #clustering #detection #hybrid #network #using
An Optimized Hybrid Kohonen Neural Network for Ambiguity Detection in Cluster Analysis Using Simulated Annealing (EM, MNMS), pp. 389–401.
ICEISICEIS-J-2009-NunesKNLC #analysis #approach #multi #product line
A Domain Analysis Approach for Multi-agent Systems Product Lines (IN, UK, CN, CJPdL, EC), pp. 716–727.
ICEISICEIS-J-2009-SpahnW #analysis #development #information management #problem
End-User Development for Individualized Information Management: Analysis of Problem Domains and Solution Approaches (MS, VW), pp. 843–857.
ICEISICEIS-J-2009-YamamotoIVCB #analysis #framework
Actor Relationship Analysis for the i* Framework (SY, KI, JMV, KC, SJB), pp. 491–500.
ICEISICEIS-SAIC-2009-DronavajjalaNS #analysis #enterprise #identification #process #project management #relational
Identification of Critical Success Factors to ERP Project Management — An Application of Grey Relational Analysis and Analytic Hierarchy Process (CSD, SN, RS), pp. 187–192.
ICEISICEIS-SAIC-2009-PetersA #analysis #on the #trust
On the Helpfulness of Product Reviews — An Analysis of Customer-to-Customer Trust on eShop-Platforms (GP, VA), pp. 41–46.
CIKMCIKM-2009-ChenR #analysis #detection
Event detection from flickr data through wavelet-based spatial analysis (LC, AR), pp. 523–532.
CIKMCIKM-2009-JiaYM #analysis #effectiveness #retrieval #sentiment
The effect of negation on sentiment analysis and retrieval effectiveness (LJ, CTY, WM), pp. 1827–1830.
CIKMCIKM-2009-KobayakawaKTOKT #analysis #classification #kernel #using
Opinion classification with tree kernel SVM using linguistic modality analysis (TSK, TK, HT, NO, JDK, JT), pp. 1791–1794.
CIKMCIKM-2009-LiBS #analysis #predict
Blog cascade affinity: analysis and prediction (HL, SSB, AS), pp. 1117–1126.
CIKMCIKM-2009-LinH #analysis #sentiment #topic
Joint sentiment/topic model for sentiment analysis (CL, YH), pp. 375–384.
CIKMCIKM-2009-LiuZPQCL #analysis #interactive #summary #topic #visual notation
Interactive, topic-based visual text summarization and analysis (SL, MXZ, SP, WQ, WC, XL), pp. 543–552.
CIKMCIKM-2009-LiuZY #analysis #collaboration #probability
Probabilistic latent preference analysis for collaborative filtering (NNL, MZ, QY), pp. 759–766.
CIKMCIKM-2009-MasadaFTHSO #analysis #optimisation #topic
Dynamic hyperparameter optimization for bayesian topical trend analysis (TM, DF, AT, TH, YS, KO), pp. 1831–1834.
CIKMCIKM-2009-MeiKKT #analysis #framework #sequence
An analysis framework for search sequences (QM, KLK, RK, AT), pp. 1991–1994.
CIKMCIKM-2009-MohammedFD #analysis
Walking in the crowd: anonymizing trajectory data for pattern analysis (NM, BCMF, MD), pp. 1441–1444.
CIKMCIKM-2009-ParkR #analysis #information retrieval #kernel #semantics #using
Kernel latent semantic analysis using an information retrieval based kernel (LAFP, KR), pp. 1721–1724.
CIKMCIKM-2009-SayeedSDHMR #analysis #documentation #metric #similarity
Characteristics of document similarity measures for compliance analysis (ABS, SS, YD, RH, RM, NR), pp. 1207–1216.
CIKMCIKM-2009-Wan #analysis #multi #summary #topic
Topic analysis for topic-focused multi-document summarization (XW), pp. 1609–1612.
CIKMCIKM-2009-ZhuM #analysis #identification #multi
Multidimensional political spectrum identification and analysis (LZ, PM), pp. 2045–2048.
ECIRECIR-2009-TanCWX #adaptation #analysis #naive bayes #sentiment
Adapting Naive Bayes to Domain Adaptation for Sentiment Analysis (ST, XC, YW, HX), pp. 337–349.
ECIRECIR-2009-Wang #analysis #documentation #information retrieval #ranking
Mean-Variance Analysis: A New Document Ranking Theory in Information Retrieval (JW0), pp. 4–16.
ICMLICML-2009-BaillyDR #analysis #component #grammar inference #problem
Grammatical inference as a principal component analysis problem (RB, FD, LR), pp. 33–40.
ICMLICML-2009-CaiWH #consistency #data analysis #probability
Probabilistic dyadic data analysis with local and global consistency (DC, XW, XH), pp. 105–112.
ICMLICML-2009-ChaudhuriKLS #analysis #canonical #clustering #correlation #multi
Multi-view clustering via canonical correlation analysis (KC, SMK, KL, KS), pp. 129–136.
ICMLICML-2009-ChoS #analysis #learning #modelling
Learning dictionaries of stable autoregressive models for audio scene analysis (YC, LKS), pp. 169–176.
ICMLICML-2009-GomesK #dynamic analysis #multi
Dynamic analysis of multiagent Q-learning with ε-greedy exploration (ERG, RK), pp. 369–376.
ICMLICML-2009-LanLML #algorithm #analysis #ranking
Generalization analysis of listwise learning-to-rank algorithms (YL, TYL, ZM, HL), pp. 577–584.
ICMLICML-2009-PaisleyC #analysis #parametricity #process
Nonparametric factor analysis with beta process priors (JWP, LC), pp. 777–784.
ICMLICML-2009-Sutskever #analysis
A simpler unified analysis of budget perceptrons (IS), pp. 985–992.
KDDKDD-2009-AsurP #analysis #approach #graph #interactive
A viewpoint-based approach for interaction graph analysis (SA, SP), pp. 79–88.
KDDKDD-2009-BerlingerioPNG #data analysis #interactive #mining #workflow
Temporal mining for interactive workflow data analysis (MB, FP, MN, FG), pp. 109–118.
KDDKDD-2009-ChuPBMPCZ #analysis #behaviour #case study #exclamation
A case study of behavior-driven conjoint analysis on Yahoo!: front page today module (WC, STP, TB, NM, AP, SC, JZ), pp. 1097–1104.
KDDKDD-2009-HasanSGA #analysis #named #novel
COA: finding novel patents through text analysis (MAH, WSS, TDG, AA), pp. 1175–1184.
KDDKDD-2009-MelvilleGL #analysis #classification #sentiment
Sentiment analysis of blogs by combining lexical knowledge with text classification (PM, WG, RDL), pp. 1275–1284.
KDDKDD-2009-PandeyASMK #analysis #approach #clustering
An association analysis approach to biclustering (GP, GA, MS, CLM, VK), pp. 677–686.
KDDKDD-2009-ScrippsTE #analysis #network #preprocessor
Measuring the effects of preprocessing decisions and network forces in dynamic network analysis (JS, PNT, AHE), pp. 747–756.
KDDKDD-2009-TangSWY #analysis #network #scalability #social
Social influence analysis in large-scale networks (JT, JS, CW, ZY), pp. 807–816.
KEODKEOD-2009-DolsakN #analysis #design #process
Intelligent Analytical Aids in Design — Decision Support to Engineering Analysis Process (BD, MN), pp. 129–134.
KEODKEOD-2009-NovakD #design #process
Intelligent Support to Analysis-based Design Improvement PROCESS — Propose: An Intelligent Consultative Advisory System (MN, BD), pp. 135–140.
KMISKMIS-2009-Bolisani #analysis #modelling #transaction
Modelling Cognitive Transactions for Economic and Accounting Analysis (EB), pp. 242–247.
KMISKMIS-2009-BounhasS #analysis #approach #documentation #social
A Social Approach for Document Analysis (IB, YS), pp. 95–102.
KMISKMIS-2009-BuchnerMN #analysis #concept #enterprise #open source #tool support
A Concept and Service based Analysis of Commercial and Open Source Enterprise 2.0 Tools (TB, FM, CN), pp. 37–45.
KMISKMIS-2009-Kume #analysis #using #visual notation #web
Application of Cusp Surface Analysis using Web Application to Visual Perception (YK), pp. 251–257.
KMISKMIS-2009-RadeschutzM #analysis #optimisation #process
Extended Analysis Techniques for a Comprehensive Business Process Optimization (SR, BM), pp. 77–82.
MLDMMLDM-2009-DereliogluGO #analysis #approach
A Neural Approach for SME’s Credit Risk Analysis in Turkey (GD, FSG, NO), pp. 749–759.
MLDMMLDM-2009-DuangsoithongW #analysis #classification
Relevance and Redundancy Analysis for Ensemble Classifiers (RD, TW), pp. 206–220.
RecSysRecSys-2009-CremonesiT #analysis #recommendation
Analysis of cold-start recommendations in IPTV systems (PC, RT), pp. 233–236.
RecSysRecSys-2009-TsatsouMKD #analysis #framework #personalisation #recommendation #semantics
A semantic framework for personalized ad recommendation based on advanced textual analysis (DT, FM, IK, PCD), pp. 217–220.
SEKESEKE-2009-AtkinsonD #analysis #modelling #re-engineering #social
Analysis of Agent Oriented Software Engineering Methodologies for Social Causal Models (MA, SD), pp. 157–163.
SEKESEKE-2009-ConejeroHJCR #analysis #composition #product line
Early Analysis of Modularity in Software Product Lines (JMC, JH, EJ, PJC, RR), pp. 721–736.
SEKESEKE-2009-GarlanCSBC #analysis #architecture #using
Using Service-oriented Architectures for Socio-Cultural Analysis (DG, KMC, BRS, MWB, OC), pp. 370–375.
SEKESEKE-2009-IlievaO #analysis #design #object-oriented #representation
Nested NL Representation for OO Analysis and Design (MI, OO), pp. 49–54.
SEKESEKE-2009-JiCXZ #analysis #clustering #novel
A Novel Method of Mutation Clustering Based on Domain Analysis (CJ, ZC, BX, ZZ), pp. 422–425.
SEKESEKE-2009-KocaguneliTBTC #analysis #fault #metric #named #predict
Prest: An Intelligent Software Metrics Extraction, Analysis and Defect Prediction Tool (EK, AT, ABB, BT, BC), pp. 637–642.
SEKESEKE-2009-LiuC #analysis #composition #data flow #testing #web #web service
Data Flow Analysis and Testing for Web Service Compositions Based on WS-BPEL (CHL, SLC), pp. 306–311.
SEKESEKE-2009-LudwigTA #analysis #concept #database #deduction #performance #reasoning #semantics #web
Performance Analysis of a Deductive Database with a Semantic Web Reasoning Engine: ConceptBase and Racer (SAL, CT, KA), pp. 688–693.
SIGIRSIGIR-2009-AlonsoM #analysis #e-commerce
Relevance criteria for e-commerce: a crowdsourcing-based experimental analysis (OA, SM), pp. 760–761.
SIGIRSIGIR-2009-AshkanC #analysis
Term-based commercial intent analysis (AA, CLAC), pp. 800–801.
SIGIRSIGIR-2009-Azzopardi #analysis #effectiveness #empirical #evaluation #query
Query side evaluation: an empirical analysis of effectiveness and effort (LA), pp. 556–563.
SIGIRSIGIR-2009-Peng #analysis #equivalence #probability #semantics
Equivalence between nonnegative tensor factorization and tensorial probabilistic latent semantic analysis (WP), pp. 668–669.
SIGIRSIGIR-2009-SakaiN #analysis #query #wiki
Serendipitous search via wikipedia: a query log analysis (TS, KN), pp. 780–781.
SIGIRSIGIR-2009-SakumaK #analysis #graph
Link analysis for private weighted graphs (JS, SK), pp. 235–242.
SIGIRSIGIR-2009-TomsF #analysis #behaviour #predict
Predicting stopping behaviour: a preliminary analysis (EGT, LF), pp. 750–751.
ECMFAECMDA-FA-2009-AmeedeenBA #analysis #approach #modelling
A Model Driven Approach to the Analysis of Timeliness Properties (MAA, BB, RA), pp. 221–236.
ECMFAECMDA-FA-2009-KoudriCAS #analysis #design #process
MoPCoM/MARTE Process Applied to a Cognitive Radio System Design and Analysis (AK, JC, DA, PS), pp. 277–288.
MODELSMoDELS-2009-LloydJ #analysis #authentication #ml #security #using
Security Analysis of a Biometric Authentication System Using UMLsec and JML (JL, JJ), pp. 77–91.
MODELSMoDELS-2009-ShoushaBL #analysis #concurrent #detection #uml
A UML/MARTE Model Analysis Method for Detection of Data Races in Concurrent Systems (MS, LCB, YL), pp. 47–61.
MODELSMoDELS-2009-YueBL #analysis #approach #case study #concept #empirical #evaluation #modelling #towards
A Use Case Modeling Approach to Facilitate the Transition towards Analysis Models: Concepts and Empirical Evaluation (TY, LCB, YL), pp. 484–498.
MODELSMoDELS-2009-LloydJ #analysis #authentication #ml #security #using
Security Analysis of a Biometric Authentication System Using UMLsec and JML (JL, JJ), pp. 77–91.
MODELSMoDELS-2009-ShoushaBL #analysis #concurrent #detection #uml
A UML/MARTE Model Analysis Method for Detection of Data Races in Concurrent Systems (MS, LCB, YL), pp. 47–61.
MODELSMoDELS-2009-YueBL #analysis #approach #case study #concept #empirical #evaluation #modelling #towards
A Use Case Modeling Approach to Facilitate the Transition towards Analysis Models: Concepts and Empirical Evaluation (TY, LCB, YL), pp. 484–498.
ECOOPECOOP-2009-XuRS #alias #analysis #points-to #scalability #using
Scaling CFL-Reachability-Based Points-To Analysis Using Context-Sensitive Must-Not-Alias Analysis (G(X, AR, MS), pp. 98–122.
OOPSLAOOPSLA-2009-Abi-AntounA #analysis #architecture #consistency #runtime #using
Static extraction and conformance analysis of hierarchical runtime architectural structure using annotations (MAA, JA), pp. 321–340.
OOPSLAOOPSLA-2009-HaABM #concurrent #dynamic analysis #framework #hardware #manycore
A concurrent dynamic analysis framework for multicore hardware (JH, MA, SMB, KSM), pp. 155–174.
PPDPPPDP-2009-PhanJ #analysis #source code
Path-sensitive region analysis for mercury programs (QP, GJ), pp. 161–170.
PADLPADL-2009-MaldeO #analysis #haskell #scalability #sequence #using
Using Bloom Filters for Large Scale Gene Sequence Analysis in Haskell (KM, BO), pp. 183–194.
PADLPADL-2009-TranNPS #consistency #declarative #performance #specification #static analysis
Improving Performance of Conformant Planners: Static Analysis of Declarative Planning Domain Specifications (DVT, HKN, EP, TCS), pp. 239–253.
POPLPOPL-2009-CalcagnoDOY #analysis #composition
Compositional shape analysis by means of bi-abduction (CC, DD, PWO, HY), pp. 289–300.
POPLPOPL-2009-HardekopfL #analysis #pointer
Semi-sparse flow-sensitive pointer analysis (BH, CL), pp. 226–238.
RERE-2009-ClassenHH #analysis #feature model #workflow
Analysis of Feature Configuration Workflows (AC, AH, PH), pp. 381–382.
RERE-2009-ElahiY #analysis #requirements #security #trade-off #trust
Trust Trade-off Analysis for Security Requirements Engineering (GE, ESKY), pp. 243–248.
RERE-2009-GhanavatiAP #analysis #evaluation
Compliance Analysis Based on a Goal-oriented Requirement Language Evaluation Methodology (SG, DA, LP), pp. 133–142.
RERE-2009-JuretaMF #analysis #multi #requirements #validation
Analysis of Multi-Party Agreement in Requirements Validation (IJ, JM, SF), pp. 57–66.
RERE-2009-MussbacherGA #analysis #modelling
Modeling and Analysis of URN Goals and Scenarios with jUCMNav (GM, SG, DA), pp. 383–384.
SACSAC-2009-DaiMSZ #concept analysis #towards #using
Towards “WYDIWYS” for MIMI using concept analysis (JD, RM, JS, GQZ), pp. 91–97.
SACSAC-2009-FahmyRJ #analysis #distributed #realtime #transaction
Response time analysis of software transactional memory-based distributed real-time systems (SFF, BR, EDJ), pp. 334–338.
SACSAC-2009-GohKCC #analysis #performance #scalability #video
Fast mode decision for scalable video coding based on neighboring macroblock analysis (GG, JK, MC, KC), pp. 1845–1846.
SACSAC-2009-HijikataHON #algorithm #analysis #using
HITS algorithm improvement using anchor-related text extracted by DOM structure analysis (YH, BQH, MO, SN), pp. 1691–1698.
SACSAC-2009-JangC #analysis #javascript #points-to
Points-to analysis for JavaScript (DJ, KMC), pp. 1930–1937.
SACSAC-2009-OliveiraLG #analysis #development #framework #usability
Development of a biosignals framework for usability analysis (IO, RL, NG), pp. 156–157.
SACSAC-2009-PassitoMM #analysis #network #protocol #using
Analysis of the secure RTP protocol on voice over wireless networks using extended MedQoS (AP, EdSM, EM), pp. 86–87.
SACSAC-2009-PopovaS #analysis #constraints #modelling
Constraint-based modelling and analysis of organisations (VP, AS), pp. 283–284.
SACSAC-2009-SmileyHKD #analysis #architecture #evaluation #requirements
Architectural requirements prioritization and analysis applied to software technology evaluation (KS, QH, EK, AD), pp. 397–398.
ESEC-FSEESEC-FSE-2009-ArbabMMKQ #analysis #coordination #modelling #named #performance
Reo2MC: a tool chain for performance analysis of coordination models (FA, SM, YJM, MZK, HQ), pp. 287–288.
ESEC-FSEESEC-FSE-2009-CataldoN #analysis #empirical #maturity #on the #process #quality
On the relationship between process maturity and geographic distribution: an empirical analysis of their impact on software quality (MC, SN), pp. 101–110.
ESEC-FSEESEC-FSE-2009-PaveseBU #analysis #behaviour #modelling #probability
Probabilistic environments in the quantitative analysis of (non-probabilistic) behaviour models (EP, VAB, SU), pp. 335–344.
ICSEICSE-2009-CalinescuK #analysis #using
Using quantitative analysis to implement autonomic IT systems (RC, MZK), pp. 100–110.
ICSEICSE-2009-ComanSS #analysis #automation #case study #industrial #metric #re-engineering #using
A case-study on using an Automated In-process Software Engineering Measurement and Analysis system in an industrial environment (IDC, AS, GS), pp. 89–99.
ICSEICSE-2009-DagenaisR #analysis #api #evolution #named #recommendation
SemDiff: Analysis and recommendation support for API evolution (BD, MPR), pp. 599–602.
ICSEICSE-2009-GeayPTRD #analysis #composition #precise #string
Modular string-sensitive permission analysis with demand-driven precision (EG, MP, TT, BGR, JD), pp. 177–187.
ICSEICSE-2009-MarianiPP #analysis #automation #tool support
A toolset for automated failure analysis (LM, FP, MP), pp. 563–566.
ICSEICSE-2009-NandaS #analysis #interprocedural #java
Accurate Interprocedural Null-Dereference Analysis for Java (MGN, SS), pp. 133–143.
ICSEICSE-2009-RamasubbuB #analysis #empirical #maturity #process
The impact of process choice in high maturity environments: An empirical analysis (NR, RKB), pp. 529–539.
ICSEICSE-2009-SentillesPNNPC #analysis #component #design #embedded #implementation #named
Save-IDE — A tool for design, analysis and implementation of component-based embedded systems (SS, AP, DN, TN, PP, IC), pp. 607–610.
ICSEICSE-2009-WlokaRTR #analysis #development
Safe-commit analysis to facilitate team software development (JW, BGR, FT, XR), pp. 507–517.
ICSEICSE-2009-WolfSDN #analysis #communication #developer #network #predict #social #using
Predicting build failures using social network analysis on developer communication (TW, AS, DD, THDN), pp. 1–11.
LDTALDTA-2008-Nilsson-NymanHME09 #analysis #declarative #java #source code
Declarative Intraprocedural Flow Analysis of Java Source Code (ENN, GH, EM, TE), pp. 155–171.
SPLCSPLC-2009-KastnerARRBS #analysis #case study #on the #problem
On the impact of the optional feature problem: analysis and case studies (CK, SA, SSuR, MR, DSB, GS), pp. 181–190.
SPLCSPLC-2009-MendoncaWC #analysis #feature model #modelling #satisfiability
SAT-based analysis of feature models is easy (MM, AW, KC), pp. 231–240.
ASPLOSASPLOS-2009-AleenC #analysis #commutative #parallel #program transformation
Commutativity analysis for software parallelization: letting program transformations see the big picture (FA, NC), pp. 241–252.
CCCC-2009-VasudevanTDE #analysis #concurrent #source code
Compile-Time Analysis and Specialization of Clocks in Concurrent Programs (NV, OT, JD, SAE), pp. 48–62.
CGOCGO-2009-CordesFM #abstract interpretation #analysis #modelling #performance #precise #slicing
A Fast and Precise Static Loop Analysis Based on Abstract Interpretation, Program Slicing and Polytope Models (PL, DC, HF, PM), pp. 136–146.
CGOCGO-2009-PereiraB #analysis #pointer
Wave Propagation and Deep Propagation for Pointer Analysis (FMQP, DB), pp. 126–135.
ISMMISMM-2009-AlbertGG #analysis #garbage collection
Live heap space analysis for languages with garbage collection (EA, SG, MGZ), pp. 129–138.
ISMMISMM-2009-JumpM #analysis #metric
Dynamic shape analysis via degree metrics (MJ, KSM), pp. 119–128.
ISMMISMM-2009-NaeemL #alias #analysis #performance #set #using
Efficient alias set analysis using SSA form (NAN, OL), pp. 79–88.
ISMMISMM-2009-UnnikrishnanS #analysis #functional #parametricity #source code
Parametric heap usage analysis for functional programs (LU, SDS), pp. 139–148.
ISMMISMM-2009-Vengerov #analysis #garbage collection #modelling #optimisation #throughput
Modeling, analysis and throughput optimization of a generational garbage collector (DV), pp. 1–9.
PPoPPPPoPP-2009-KejariwalC #analysis #concurrent #parallel #source code #thread
Parallelization spectroscopy: analysis of thread-level parallelism in hpc programs (AK, CC), pp. 293–294.
PPoPPPPoPP-2009-TallentM #analysis #effectiveness #metric #parallel #performance #thread
Effective performance measurement and analysis of multithreaded applications (NRT, JMMC), pp. 229–240.
CADECADE-2009-FalkeK #analysis #approach #automation #imperative #source code #term rewriting #termination
A Term Rewriting Approach to the Automated Termination Analysis of Imperative Programs (SF, DK), pp. 277–293.
CADECADE-2009-SebastianiV #analysis #axiom #encoding #lightweight #logic
Axiom Pinpointing in Lightweight Description Logics via Horn-SAT Encoding and Conflict Analysis (RS, MV), pp. 84–99.
CADECADE-2009-SwiderskiPGFS #analysis #dependence #induction #proving #termination #theorem proving
Termination Analysis by Dependency Pairs and Inductive Theorem Proving (SS, MP, JG, CF, PSK), pp. 322–338.
CAVCAV-2009-CernyA #analysis #automation #java
Automated Analysis of Java Methods for Confidentiality (PC, RA), pp. 173–187.
CAVCAV-2009-FarzanMS
Meta-analysis for Atomicity Violations under Nested Locking (AF, PM, FS), pp. 248–262.
CAVCAV-2009-GuernicG #analysis #hybrid #reachability #using
Reachability Analysis of Hybrid Systems Using Support Functions (CLG, AG), pp. 540–554.
CAVCAV-2009-Gulwani #analysis #bound #complexity #named
SPEED: Symbolic Complexity Bound Analysis (SG), pp. 51–62.
CAVCAV-2009-JeannetM #abstract domain #library #named #static analysis
Apron: A Library of Numerical Abstract Domains for Static Analysis (BJ, AM), pp. 661–667.
CSLCSL-2009-AlurCW #algorithm #analysis #source code
Algorithmic Analysis of Array-Accessing Programs (RA, PC, SW), pp. 86–101.
CSLCSL-2009-HofmannR #analysis #performance
Efficient Type-Checking for Amortised Heap-Space Analysis (MH, DR), pp. 317–331.
ICLPICLP-2009-ChristiansenL #analysis #modelling #optimisation #preprocessor #sequence
Preprocessing for Optimization of Probabilistic-Logic Models for Sequence Analysis (HC, OTL), pp. 70–83.
ICLPICLP-2009-Have #analysis #biology #constraints #modelling #sequence #statistics
Logic-Statistic Models with Constraints for Biological Sequence Analysis (CTH), pp. 549–550.
ICLPICLP-2009-Voets #analysis #logic programming #research #source code #summary
Research Summary: Non-termination Analysis of Logic Programs (DV), pp. 553–554.
ICLPICLP-2009-VoetsS #analysis #approach #logic programming #source code
A New Approach to Non-termination Analysis of Logic Programs (DV, DDS), pp. 220–234.
ICSTICST-2009-AngelettiGNPS #analysis #automation #generative #testing
Automatic Test Generation for Coverage Analysis of ERTMS Software (DA, EG, MN, AP, SS), pp. 303–306.
ICSTICST-2009-HeckmanW #identification #process #static analysis
A Model Building Process for Identifying Actionable Static Analysis Alerts (SSH, LAW), pp. 161–170.
ICSTICST-2009-WedyanAB #automation #detection #effectiveness #fault #predict #refactoring #static analysis #tool support
The Effectiveness of Automated Static Analysis Tools for Fault Detection and Refactoring Prediction (FW, DA, JMB), pp. 141–150.
ISSTAISSTA-2009-AdlerFKPRSUZ #analysis #string #test coverage #using
Advanced code coverage analysis using substring holes (YA, EF, MK, DP, OR, MS, SU, AZ), pp. 37–46.
ISSTAISSTA-2009-BravenboerS #analysis #exception #points-to
Exception analysis and points-to analysis: better together (MB, YS), pp. 1–12.
ISSTAISSTA-2009-HalfondAO #analysis #identification #interface #precise #testing #web
Precise interface identification to improve testing and analysis of web applications (WGJH, SA, AO), pp. 285–296.
ISSTAISSTA-2009-PecheurRB #analysis #formal method #testing
A formal analysis of requirements-based testing (CP, FR, GB), pp. 47–56.
LICSLICS-2009-Ghica #game studies #hardware #program analysis #semantics #synthesis
Applications of Game Semantics: From Program Analysis to Hardware Synthesis (DRG), pp. 17–26.
LICSLICS-2009-RougemontT #analysis #probability #process #statistics
Statistic Analysis for Probabilistic Processes (MdR, MT), pp. 299–308.
RTARTA-2009-TiuG #analysis #proving
A Proof Theoretic Analysis of Intruder Theories (AT, RG), pp. 103–117.
ICSTSAT-2009-Skvortsov #analysis
A Theoretical Analysis of Search in GSAT (ESS), pp. 265–275.
FATESTestCom-FATES-2009-Szabados #analysis #scalability
Structural Analysis of Large TTCN-3 Projects (KS), pp. 241–246.
VMCAIVMCAI-2009-AmjadB #analysis #automation #proving #towards
Towards Automatic Stability Analysis for Rely-Guarantee Proofs (HA, RB), pp. 14–28.
VMCAIVMCAI-2009-Sagiv #analysis #thread
Thread-Modular Shape Analysis (MS), p. 3.
CBSECBSE-2008-Tolosana-CalasanzRB #analysis #automation #performance #workflow
Automating Performance Analysis from Taverna Workflows (RTC, OFR, JAB), pp. 1–15.
ECSAECSA-2008-LosavioMR #analysis #quality #standard #web #web service
Web Services Domain Analysis Based on Quality Standards (FL, AM, RR), pp. 354–358.
QoSAQoSA-2008-CortellessaPSV #analysis #architecture #framework #modelling #named #performance #uml
MOSES: MOdeling Software and platform architEcture in UML 2 for Simulation-based performance analysis (VC, PP, RS, AV), pp. 86–102.
QoSAQoSA-2008-JansenVAV #analysis #architecture
Sharing the Architectural Knowledge of Quantitative Analysis (AJ, TdV, PA, MvV), pp. 220–234.
QoSAQoSA-2008-MalletR #analysis #distributed #model transformation
Style-Based Model Transformation for Early Extrafunctional Analysis of Distributed Systems (JM, SR), pp. 55–70.
QoSAQoSA-2008-MorenoM #analysis #modelling #performance
Model-Driven Performance Analysis (GAM, PM), pp. 135–151.
WICSAWICSA-2008-HarrisonA #analysis #design pattern #documentation #legacy
Analysis of Architecture Pattern Usage in Legacy System Architecture Documentation (NBH, PA), pp. 147–156.
WICSAWICSA-2008-MolesiniGCB #analysis #architecture #on the
On the Quantitative Analysis of Architecture Stability in Aspectual Decompositions (AM, AFG, CvFGC, TVB), pp. 29–38.
WICSAWICSA-2008-MucciniP #analysis #architecture #functional #simulation
Simulating Software Architectures for Functional Analysis (HM, PP), pp. 289–292.
ASEASE-2008-AdnanGDZ #analysis #clustering #component #design #interface #using
Using Cluster Analysis to Improve the Design of Component Interfaces (RA, BG, AvD, JZ), pp. 383–386.
ASEASE-2008-BeyerHT #precise #program analysis
Program Analysis with Dynamic Precision Adjustment (DB, TAH, GT), pp. 29–38.
ASEASE-2008-Frisby #analysis #tool support
Unifying Analysis Tools with Rosetta (NF), pp. 505–508.
ASEASE-2008-KollmannG #specification #static analysis #student
A Specification Language for Static Analysis of Student Exercises (CK, MG), pp. 355–358.
ASEASE-2008-MooreS #analysis #design #layout
Combining the Analysis of Spatial Layout and Text to Support Design Exploration (JMM, FMSI), pp. 379–382.
ASEASE-2008-Pinzger #analysis #automation #performance #web
Automated Web Performance Analysis (MP), pp. 513–516.
ASEASE-2008-RakamaricH #automation #axiom #static analysis #using
Automatic Inference of Frame Axioms Using Static Analysis (ZR, AJH), pp. 89–98.
ASEASE-2008-SchumannGPMB #analysis #parametricity #scalability #simulation #tool support
Tool Support for Parametric Analysis of Large Software Simulation Systems (JS, KGB, CSP, TM, TB), pp. 497–498.
ASEASE-2008-ZhangGC #analysis #automation #clustering #recommendation
Automated Aspect Recommendation through Clustering-Based Fan-in Analysis (DZ, YG, XC), pp. 278–287.
CASECASE-2008-EconomopoulosK #analysis
Analysis of a simple CONWIP system with impatient customers (AAE, VSK), pp. 291–296.
CASECASE-2008-FanKJAB #analysis #architecture #design
Integrated fixture design and analysis system based on service-oriented architecture (LF, ASK, BNJ, SA, SHB), pp. 656–661.
CASECASE-2008-GarciaJMM #analysis #distributed #effectiveness #modelling
A procedure for modeling and analysis of service-oriented and distributed productive systems (JIG, FJ, RAGM, PEM), pp. 941–946.
CASECASE-2008-HuangK #analysis #assembly #design #evaluation #multi #process
Process capability sensitivity analysis for design evaluation of multi station assembly systems (WH, ZK), pp. 400–405.
CASECASE-2008-LeeCAG #analysis #automation #evaluation #image #quality
Color quantization and image analysis for automated fruit quality evaluation (DJL, YC, JKA, CRG), pp. 194–199.
CASECASE-2008-LiuL #analysis #interactive #mobile
Track-stair and vehicle-manipulator interaction analysis for tracked mobile manipulators climbing stairs (YL, GL), pp. 157–162.
CASECASE-2008-MatsumotoUOI #analysis #empirical #process
Business process analysis to obtain empirical lot sizing rule in printing process (SM, NU, KO, HI), pp. 591–596.
CASECASE-2008-MitaniH #analysis #metric #symmetry #using
Analysis of contact between feeder surface and microparts based on measurements for microparts feeder using an asymmetric surface (AM, SH), pp. 720–725.
CASECASE-2008-NieIYTOM #analysis #behaviour #performance #video
High-speed video analysis of laboratory rats behaviors in forced swim test (YN, II, KY, TT, KO, HM), pp. 206–211.
CASECASE-2008-SunEHMMMBLM #analysis #automation #biology #integration #multi #user interface
Integration of user interface, device control, data acquisition and analysis for automated multi-spectral imaging of single biological cells (CSS, JRE, MH, TWM, SKM, SM, LWB, MEL, DRM), pp. 1013–1018.
CASECASE-2008-WangLABH #analysis #flexibility #quality
Quality analysis in flexible manufacturing systems with batch productions (JW, JL, JA, SB, NH), pp. 460–465.
DACDAC-2008-AhmadiZ #analysis #approach #hardware #optimisation
Symbolic noise analysis approach to computational hardware optimization (AA, MZ), pp. 391–396.
DACDAC-2008-FeldmannASSBG #analysis #modelling #multi
Driver waveform computation for timing analysis with multiple voltage threshold driver models (PF, SA, DS, GS, RB, HG), pp. 425–428.
DACDAC-2008-GandikotaBS #analysis #modelling #statistics
Modeling crosstalk in statistical static timing analysis (RG, DB, DS), pp. 974–979.
DACDAC-2008-GoelV #analysis #modelling #standard #statistics
Statistical waveform and current source based standard cell models for accurate timing analysis (AG, SBKV), pp. 227–230.
DACDAC-2008-GuzeyWLF #analysis #functional #testing
Functional test selection based on unsupervised support vector analysis (OG, LCW, JRL, HF), pp. 262–267.
DACDAC-2008-HeloueN #analysis #modelling
Parameterized timing analysis with general delay models and arbitrary variation sources (KRH, FNN), pp. 403–408.
DACDAC-2008-ImaiSNM #analysis #framework #parametricity #statistics
Non-parametric statistical static timing analysis: an SSTA framework for arbitrary distribution (MI, TS, NN, KM), pp. 698–701.
DACDAC-2008-KshirsagarEB #analysis #performance
Analysis and implications of parasitic and screening effects on the high-frequency/RF performance of tunneling-carbon nanotube FETs (CK, MNEZ, KB), pp. 250–255.
DACDAC-2008-KumarKS #analysis #framework
A framework for block-based timing sensitivity analysis (SVK, CVK, SSS), pp. 688–693.
DACDAC-2008-LiangM #analysis #execution #modelling #probability
Cache modeling in probabilistic execution time analysis (YL, TM), pp. 319–324.
DACDAC-2008-LiZY #analysis #verification
Full-chip leakage analysis in nano-scale technologies: mechanisms, variation sources, and verification (TL, WZ, ZY), pp. 594–599.
DACDAC-2008-MohalikRDRSPJ #analysis #embedded #latency #model checking #realtime
Model checking based analysis of end-to-end latency in embedded, real-time systems with clock drifts (SM, ACR, MGD, SR, PVS, PKP, SJ), pp. 296–299.
DACDAC-2008-ParkM #analysis #debugging #locality #named
IFRA: instruction footprint recording and analysis for post-silicon bug localization in processors (SBP, SM), pp. 373–378.
DACDAC-2008-RajaVBG #analysis #modelling #performance
Transistor level gate modeling for accurate and fast timing, noise, and power analysis (SR, FV, MRB, JG), pp. 456–461.
DACDAC-2008-TamPB #analysis #automation #layout #locality #precise #using
Precise failure localization using automated layout analysis of diagnosis candidates (WCT, OP, RD(B), pp. 367–372.
DACDAC-2008-VeetilSB #analysis #incremental #monte carlo #performance #statistics
Efficient Monte Carlo based incremental statistical timing analysis (VV, DS, DB), pp. 676–681.
DACDAC-2008-YeZP #analysis #equation #linear #multi
Generalized Krylov recycling methods for solution of multiple related linear equation systems in electromagnetic analysis (ZY, ZZ, JRP), pp. 682–687.
DATEDATE-2008-DasMJZMC #analysis #component #detection #implementation #network #performance
An Efficient FPGA Implementation of Principle Component Analysis based Network Intrusion Detection System (AD, SM, SJ, JZ, GM, ANC), pp. 1160–1165.
DATEDATE-2008-DubrovaTT #analysis #feedback #on the #synthesis
On Analysis and Synthesis of (n, k)-Non-Linear Feedback Shift Registers (ED, MT, HT), pp. 1286–1291.
DATEDATE-2008-ElmqvistN #analysis #component #incremental #tool support
Tool Support for Incremental Failure Mode and Effects Analysis of Component-Based Systems (JE, SNT), pp. 921–927.
DATEDATE-2008-ErnstJSBC #analysis #formal method #optimisation #performance
Formal Methods in System and MpSoC Performance Analysis and Optimisation (RE, MJ, HS, MB, SC).
DATEDATE-2008-FrankWESN #analysis #architecture #design #evaluation #standard #tool support
Methods, Tools and Standards for the Analysis, Evaluation and Design of Modern Automotive Architectures (EF, RW, RE, ALSV, MDN), pp. 659–663.
DATEDATE-2008-FrenkilCU #analysis #design #physics #power management
Power Gating for Ultra-low Leakage: Physics, Design, and Analysis (JF, KC, KU).
DATEDATE-2008-GhamarianGBS #analysis #data flow #graph #parametricity #throughput
Parametric Throughput Analysis of Synchronous Data Flow Graphs (AHG, MG, TB, SS), pp. 116–121.
DATEDATE-2008-GlassLRHT #analysis #network #optimisation #reliability
Symbolic Reliability Analysis and Optimization of ECU Networks (MG, ML, FR, CH, JT), pp. 158–163.
DATEDATE-2008-GoelV #analysis #standard
Current source based standard cell model for accurate signal integrity and timing analysis (AG, SBKV), pp. 574–579.
DATEDATE-2008-GouraryRUZMG #analysis #injection
Analysis of Oscillator Injection Locking by Harmonic Balance Method (MMG, SGR, SLU, MMZ, BJM, KKG), pp. 318–323.
DATEDATE-2008-HauslerPHHN #analysis #design
Qalitative and Quantitative Analysis of IC Designs (SH, FP, KH, AH, WN), pp. 935–936.
DATEDATE-2008-Katoen #analysis #design #embedded #evaluation #modelling #roadmap
Quantitative Evaluation in Embedded System Design: Trends in Modeling and Analysis Techniques (JPK), pp. 86–87.
DATEDATE-2008-LiTM #analysis #grid #named #network #power management
ETBR: Extended Truncated Balanced Realization Method for On-Chip Power Grid Network Analysis (DL, SXDT, BM), pp. 432–437.
DATEDATE-2008-Liu #analysis #probability #statistics
Signal Probability Based Statistical Timing Analysis (BL), pp. 562–567.
DATEDATE-2008-RealCCDV #analysis #hardware
Defeating classical Hardware Countermeasures: a new processing for Side Channel Analysis (DR, CC, JC, MD, FV), pp. 1274–1279.
DATEDATE-2008-Rimolo-DonadioSGKR #analysis #metric #optimisation
Analysis and Optimization of the Recessed Probe Launch for High Frequency Measurements of PCB Interconnects (RRD, CS, XG, YHK, MBR), pp. 252–255.
DATEDATE-2008-ShiRWP #analysis #modelling #statistics
Latch Modeling for Statistical Timing Analysis (SXS, AR, DW, DZP), pp. 1136–1141.
DATEDATE-2008-SilvaPS #analysis #performance #power management #representation
Efficient Representation and Analysis of Power Grids (JMSS, JRP, LMS), pp. 420–425.
DATEDATE-2008-SinanogluM #analysis #composition #reduction #testing
Analysis of The Test Data Volume Reduction Benefit of Modular SOC Testing (OS, EJM), pp. 182–187.
DATEDATE-2008-VersenSSD #analysis #locality
Test Instrumentation for a Laser Scanning Localization Technique for Analysis of High Speed DRAM devices (MV, AS, JS, DD), pp. 776–779.
DATEDATE-2008-VinkBW #analysis #architecture #performance
Performance Analysis of SoC Architectures Based on Latency-Rate Servers (JPV, KvB, PvdW), pp. 200–205.
DATEDATE-2008-VytyazHMM #analysis #constraints #design #similarity
Periodic Steady-State Analysis Augmented with Design Equality Constraints (IV, PKH, UKM, KM), pp. 312–317.
DATEDATE-2008-WolffPBC #analysis #detection #problem #towards
Towards Trojan-Free Trusted ICs: Problem Analysis and Detection Scheme (FGW, CAP, SB, RSC), pp. 1362–1365.
DATEDATE-2008-ZengC #analysis #polynomial #random
Deep Submicron Interconnect Timing Model with Quadratic Random Variable Analysis (JKZ, CPC), pp. 1091–1094.
DATEDATE-2008-ZhouPB #analysis #generative #metric #modelling #using
Harvesting Wasted Heat in a Microprocessor Using Thermoelectric Generators: Modeling, Analysis and Measurement (YZ, SP, SB), pp. 98–103.
DATEDATE-2008-ZjajoG #analysis #fault #multi
Diagnostic Analysis of Static Errors in Multi-Step Analog to Digital Converters (AZ, JPdG), pp. 74–79.
DRRDRR-2008-DejeanM #analysis
Versatile page numbering analysis (HD, JLM), p. 68150.
DRRDRR-2008-FumeI #analysis #categorisation #clustering #documentation #modelling #semantics
Model-based document categorization employing semantic pattern analysis and local structure clustering (KF, YI), p. 68150.
DRRDRR-2008-Lopresti #fault #impact analysis #recognition
Measuring the impact of character recognition errors on downstream text analysis (DPL), p. 68150.
HTHT-2008-Yalcin #analysis
Writing on the blog: an assemblage analysis (STY), pp. 253–254.
PODSPODS-2008-AbiteboulSV #static analysis #xml
Static analysis of active XML systems (SA, LS, VV), pp. 221–230.
SIGMODSIGMOD-2008-XiaoT #analysis #privacy #statistics
Dynamic anonymization: accurate statistical analysis with privacy preservation (XX, YT), pp. 107–120.
VLDBVLDB-2008-AntonellisGC #analysis #graph #query
Simrank++: query rewriting through link analysis of the click graph (IA, HGM, CCC), pp. 408–421.
VLDBVLDB-2008-BalminCCLOSV #analysis #named #xml
SEDA: a system for search, exploration, discovery, and analysis of XML Data (AB, LSC, EC, QL, , SS, ZV), pp. 1408–1411.
VLDBVLDB-2008-PoessN #analysis #challenge #energy #power management
Energy cost, the key challenge of today’s data centers: a power consumption analysis of TPC-C results (MP, RON), pp. 1229–1240.
VLDBVLDB-2008-WeigelPRGC #analysis #collaboration #scalability #web
Large-scale collaborative analysis and extraction of web data (FW, BP, MR, JG, MC), pp. 1476–1479.
ITiCSEITiCSE-2008-Hoo #data analysis #self
Self-organized maps in scientific data analysis (JTSH), p. 372.
ITiCSEITiCSE-2008-KiesmullerB #algorithm #analysis #how #problem
How do 7th graders solve algorithmic problems?: a tool-based analysis (UK, TB), p. 353.
ITiCSEITiCSE-2008-Leach #analysis #process
Analysis of ABET accreditation as a software process (RJL), p. 356.
FASEFASE-2008-JurjensSY #analysis #automation #security #using
Automated Analysis of Permission-Based Security Using UMLsec (JJ, JS, YY), pp. 292–295.
FASEFASE-2008-LaraV #analysis #modelling
Translating Model Simulators to Analysis Models (JdL, HV), pp. 77–92.
FASEFASE-2008-MohaGMD #algorithm #analysis #design #detection #fault
A Domain Analysis to Specify Design Defects and Generate Detection Algorithms (NM, YGG, AFLM, LD), pp. 276–291.
FoSSaCSFoSSaCS-2008-BouyerMR #analysis #automaton #robust
Robust Analysis of Timed Automata via Channel Machines (PB, NM, PAR), pp. 157–171.
TACASTACAS-2008-BlancKS #analysis #modelling #named
Scoot: A Tool for the Analysis of SystemC Models (NB, DK, NS), pp. 467–470.
TACASTACAS-2008-LalTKR #analysis #bound #concurrent #interprocedural #source code
Interprocedural Analysis of Concurrent Programs Under a Context Bound (AL, TT, NK, TWR), pp. 282–298.
TACASTACAS-2008-TorreMP #analysis #bound #concurrent #queue
Context-Bounded Analysis of Concurrent Queue Systems (SLT, PM, GP), pp. 299–314.
CSMRCSMR-2008-DAmbrosL #analysis #collaboration #evolution #flexibility #framework
A Flexible Framework to Support Collaborative Software Evolution Analysis (MD, ML), pp. 3–12.
CSMRCSMR-2008-GlorieZHD #case study #concept analysis #evolution #experience #industrial #scalability #using
Splitting a Large Software Archive for Easing Future Software Evolution — An Industrial Experience Report using Formal Concept Analysis (MG, AZ, LH, AvD), pp. 153–162.
CSMRCSMR-2008-KenmeiAP #analysis #open source #predict #scalability
Trend Analysis and Issue Prediction in Large-Scale Open Source Systems (BK, GA, MDP), pp. 73–82.
CSMRCSMR-2008-PapastefanatosAVV #analysis #database #evolution #named
Hecataeus: A What-If Analysis Tool for Database Schema Evolution (GP, FA, YV, PV), pp. 326–328.
ICPCICPC-2008-EaddyAAG #dynamic analysis #information retrieval #named #program analysis #requirements #source code #using
CERBERUS: Tracing Requirements to Source Code Using Information Retrieval, Dynamic Analysis, and Program Analysis (ME, AVA, GA, YGG), pp. 53–62.
ICPCICPC-2008-RohatgiHR #approach #dynamic analysis
An Approach for Mapping Features to Code Based on Static and Dynamic Analysis (AR, AHL, JR), pp. 236–241.
ICSMEICSM-2008-DAmbros #analysis #dependence #evolution #fault
Supporting software evolution analysis with historical dependencies and defect information (MD), pp. 412–415.
ICSMEICSM-2008-Kamiya #analysis #identifier
Variation analysis of context-sharing identifiers with code clones (TK), pp. 464–465.
ICSMEICSM-2008-YangLLW #analysis #empirical #maintenance
An empirical analysis on distribution patterns of software maintenance effort (YY, QL, ML, QW), pp. 456–459.
ICSMEICSM-2008-ZhangBJAL #analysis #generative #visual notation
Query-based filtering and graphical view generation for clone analysis (YZ, HAB, SJ, DA, ML), pp. 376–385.
ICSMEICSM-2008-ZhangGLZ #aspectj #impact analysis #source code
Change impact analysis for AspectJ programs (SZ, ZG, YL, JZ), pp. 87–96.
ICSMEICSM-2008-Zhu #analysis #fault
Goal trees and fault trees for root cause analysis (QZ), pp. 436–439.
MSRMSR-2008-LaymanNGBB #analysis #mining #visual notation
Mining software effort data: preliminary analysis of visual studio team system data (LL, NN, SG, JB, AB), pp. 43–46.
MSRMSR-2008-YoshimuraNHK #analysis #approach #detection #named #product line #variability
FAVE: factor analysis based approach for detecting product line variability from change history (KY, FN, KH, TK), pp. 11–18.
PASTEPASTE-2008-JashkiZB #impact analysis #performance #towards
Towards a more efficient static software change impact analysis method (MAJ, RZ, EB), pp. 84–90.
PASTEPASTE-2008-KhooFHS #static analysis #tool support
Path projection for user-centered static analysis tools (YPK, JSF, MH, VS), pp. 57–63.
PASTEPASTE-2008-LiuM #data flow #static analysis
Static analysis for inference of explicit information flow (YL, AM), pp. 50–56.
PASTEPASTE-2008-MarronMHSK #analysis #array #recursion
Sharing analysis of arrays, collections, and recursive structures (MM, MML, MVH, DS, DK), pp. 43–49.
PASTEPASTE-2008-ZaksP #compilation #program analysis #validation
Program analysis for compiler validation (AZ, AP), pp. 1–7.
SCAMSCAM-2008-Anderson #industrial #static analysis
90% Perspiration: Engineering Static Analysis Techniques for Industrial Applications (PA), pp. 3–12.
SCAMSCAM-2008-BinkleyGHLM #analysis
Evaluating Key Statements Analysis (DB, NG, MH, ZL, KM), pp. 121–130.
SCAMSCAM-2008-BoogerdM #analysis #data flow #on the #profiling
On the Use of Data Flow Analysis in Static Profiling (CB, LM), pp. 79–88.
SCAMSCAM-2008-FehnkerHRS #assembly #embedded #program analysis
Some Assembly Required — Program Analysis of Embedded System Code (AF, RH, FR, SS), pp. 15–24.
SCAMSCAM-2008-GiffhornH #analysis #java #precise #source code #using
Precise Analysis of Java Programs Using JOANA (DG, CH), pp. 267–268.
SCAMSCAM-2008-GondowKI #analysis #approach #automation #behaviour #c #named #preprocessor
TBCppA: A Tracer Approach for Automatic Accurate Analysis of C Preprocessor’s Behaviors (KG, HK, TI), pp. 35–44.
SCAMSCAM-2008-GorbovitskiTRSL #analysis #debugging #performance
Analysis and Transformations for Efficient Query-Based Debugging (MG, KTT, TR, SDS, YAL), pp. 174–183.
SCAMSCAM-2008-LundbergGL #analysis #performance #points-to #precise
Fast and Precise Points-to Analysis (JL, TG, WL), pp. 133–142.
SCAMSCAM-2008-ScholzZC #analysis #dependence #graph #reachability
User-Input Dependence Analysis via Graph Reachability (BS, CZ, CC), pp. 25–34.
SCAMSCAM-2008-StoneSB #analysis #automation #data flow #set
Automatic Determination of May/Must Set Usage in Data-Flow Analysis (AS, MS, SB), pp. 153–162.
SCAMSCAM-2008-SunZ #analysis #points-to
Aspect-Aware Points-to Analysis (QS, JZ), pp. 143–152.
SCAMSCAM-2008-WangZZ #automation #detection #model checking #program analysis
Automated Detection of Code Vulnerabilities Based on Program Analysis and Model Checking (LW, QZ, PZ), pp. 165–173.
WCREWCRE-2008-CleveH #data-driven #dynamic analysis #reverse engineering #sql
Dynamic Analysis of SQL Statements for Data-Intensive Applications Reverse Engineering (AC, JLH), pp. 192–196.
WCREWCRE-2008-GhanbariCA #analysis #aspectj #hybrid #java #query #source code
A Hybrid Query Engine for the Structural Analysis of Java and AspectJ Programs (HG, CC, VA), pp. 133–137.
WCREWCRE-2008-GrantCS #analysis #automation #component #concept #independence #using
Automated Concept Location Using Independent Component Analysis (SG, JRC, DBS), pp. 138–142.
WCREWCRE-2008-HashimotoM #analysis #fine-grained #named
Diff/TS: A Tool for Fine-Grained Structural Change Analysis (MH, AM), pp. 279–288.
WCREWCRE-2008-HayesAG #analysis #clustering #named
PREREQIR: Recovering Pre-Requirements via Cluster Analysis (JHH, GA, YGG), pp. 165–174.
WCREWCRE-2008-JiangHH #analysis
Analysis of Procedure Splitability (TJ, MH, YH), pp. 247–256.
WCREWCRE-2008-SobreiraM #analysis #comprehension #visual notation
A Visual Trace Analysis Tool for Understanding Feature Scattering (VS, MdAM), pp. 337–338.
PEPMPEPM-2008-PietrzakCPH #analysis #composition #prolog #source code #verification
A practical type analysis for verification of modular prolog programs (PP, JC, GP, MVH), pp. 61–70.
PLDIPLDI-2008-ChughVJL #analysis #concurrent #data flow #detection #source code #using
Dataflow analysis for concurrent programs using datarace detection (RC, JWV, RJ, SL), pp. 316–326.
PLDIPLDI-2008-DilligDA #analysis #scalability
Sound, complete and scalable path-sensitive analysis (ID, TD, AA), pp. 270–280.
PLDIPLDI-2008-GulwaniSV #constraints #program analysis #theorem proving
Program analysis as constraint solving (SG, SS, RV), pp. 281–292.
PLDIPLDI-2008-Kahlon #alias #analysis #named #pointer #scalability
Bootstrapping: a technique for scalable flow and context-sensitive pointer alias analysis (VK), pp. 249–259.
PLDIPLDI-2008-WangXLGWZ #analysis #correlation #memory management
Conditional correlation analysis for safe region-based memory management (XW, ZX, XL, ZG, XW, ZZ), pp. 45–55.
SASSAS-2008-AlbertAGP #automation #bound #cost analysis
Automatic Inference of Upper Bounds for Recurrence Relations in Cost Analysis (EA, PA, SG, GP), pp. 221–237.
SASSAS-2008-BalakrishnanSIWG #analysis #detection #named #refinement
SLR: Path-Sensitive Analysis through Infeasible-Path Detection and Syntactic Language Refinement (GB, SS, FI, OW, AG), pp. 238–254.
SASSAS-2008-BauerNNP #analysis #correlation #relational
Relational Analysis of Correlation (JB, FN, HRN, HP), pp. 32–46.
SASSAS-2008-ConwayDNB #analysis #fault #pointer #proving
Pointer Analysis, Conditional Soundness, and Proving the Absence of Errors (CLC, DD, KSN, CB), pp. 62–77.
SASSAS-2008-HornM #analysis
Flow Analysis, Linearity, and PTIME (DVH, HGM), pp. 255–269.
SASSAS-2008-LammichM #analysis #concurrent #monitoring #source code #thread
Conflict Analysis of Programs with Procedures, Dynamic Thread Creation, and Monitors (PL, MMO), pp. 205–220.
SASSAS-2008-Liblit #debugging #static analysis
Reflections on the Role of Static Analysis in Cooperative Bug Isolation (BL), pp. 18–31.
SASSAS-2008-ManevichLSRB #analysis #composition #concurrent
Heap Decomposition for Concurrent Shape Analysis (RM, TLA, MS, GR, JB), pp. 363–377.
SASSAS-2008-MidtgaardJ #abstract interpretation #analysis #approach #control flow
A Calculational Approach to Control-Flow Analysis by Abstract Interpretation (JM, TPJ), pp. 347–362.
SASSAS-2008-Perdrix #abstract interpretation #analysis #quantum
Quantum Entanglement Analysis Based on Abstract Interpretation (SP), pp. 270–282.
SASSAS-2008-PrabhuS #analysis #array #java #pointer #using
Field Flow Sensitive Pointer and Escape Analysis for Java Using Heap Array SSA (PP, PS), pp. 110–127.
STOCSTOC-2008-ODonnell #analysis #topic
Some topics in analysis of boolean functions (RO), pp. 569–578.
FLOPSFLOPS-2008-AvanziniM #analysis #complexity
Complexity Analysis by Rewriting (MA, GM), pp. 130–146.
FLOPSFLOPS-2008-Kobayashi #program analysis #type system
Substructural Type Systems for Program Analysis (NK), p. 14.
FLOPSFLOPS-2008-Yokouchi #algorithm #analysis #difference #lazy evaluation #strict
Strictness Analysis Algorithms Based on an Inequality System for Lazy Types (HY), pp. 255–271.
CIAACIAA-2008-DixonES #analysis
Automata-Theoretic Analysis of Bit-Split Languages for Packet Scanning (RD, ÖE, TS), pp. 141–150.
DLTDLT-2008-EsparzaKL #analysis #fixpoint
Derivation Tree Analysis for Accelerated Fixed-Point Computation (JE, SK, ML), pp. 301–313.
DLTDLT-2008-KarhumakiS #analysis #theorem
An Analysis and a Reproof of Hmelevskii’s Theorem (JK, AS), pp. 467–478.
ICALPICALP-B-2008-Canetti #analysis #composition #performance #security
Composable Formal Security Analysis: Juggling Soundness, Simplicity and Efficiency (RC), pp. 1–13.
LATALATA-2008-RegnaultST #2d #analysis #automaton #on the #probability
On the Analysis of “Simple” 2D Stochastic Cellular Automata (DR, NS, ET), pp. 452–463.
FMFM-2008-GawlitzaS #analysis #game studies #precise
Precise Interval Analysis vs. Parity Games (TG, HS), pp. 342–357.
FMFM-2008-UzuncaovaK #analysis #constraints #declarative #modelling #performance
Constraint Prioritization for Efficient Analysis of Declarative Models (EU, SK), pp. 310–325.
FMFM-2008-ZaksP #compilation #named #program analysis #validation
CoVaC: Compiler Validation by Program Analysis of the Cross-Product (AZ, AP), pp. 35–51.
SEFMSEFM-2008-Ferrara #parallel #source code #static analysis #thread
Static Analysis of the Determinism of Multithreaded Programs (PF), pp. 41–50.
SEFMSEFM-2008-Spoto #analysis
Nullness Analysis in Boolean Form (FS), pp. 21–30.
SFMSFM-2008-DegasperiG #analysis #modelling #probability
Sensitivity Analysis of Stochastic Models of Bistable Biochemical Reactions (AD, SG), pp. 1–20.
GT-VMTGT-VMT-2006-KonigK08 #analysis #graph transformation
Augur 2 — A New Version of a Tool for the Analysis of Graph Transformation Systems (BK, VK), pp. 201–210.
GT-VMTGT-VMT-2006-KovacsG08 #analysis #formal method #modelling #simulation #workflow
Simulation and Formal Analysis of Workflow Models (MK, LG), pp. 221–230.
GT-VMTGT-VMT-2008-BiermannM #analysis #configuration management #independence #rule-based
Independence Analysis of Firing and Rule-based Net Transformations in Reconfigurable Object Nets (EB, TM).
GT-VMTGT-VMT-2008-BrielerM #ambiguity #analysis #diagrams #graph grammar #sketching #syntax
Ambiguity Resolution for Sketched Diagrams by Syntax Analysis Based on Graph Grammars (FB, MM).
ICGTICGT-2008-EhrigP #analysis #formal method #graph #kernel #model transformation
Formal Analysis of Model Transformations Based on Triple Graph Rules with Kernels (HE, UP), pp. 178–193.
ICGTICGT-2008-Hermann #analysis #process #workflow
Process Construction and Analysis for Workflows Modelled by Adhesive HLR Systems with Application Conditions (FH), pp. 496–498.
ICGTICGT-2008-Khan #analysis #configuration management #graph transformation #modelling #network #using
Model-Based Analysis of Network Reconfigurations Using Graph Transformation Systems (AK), pp. 502–504.
CHICHI-2008-AdarTD #analysis #scalability #web
Large scale analysis of web revisitation patterns (EA, JT, STD), pp. 1197–1206.
CHICHI-2008-GilbertKS #analysis #empirical #network #social #social media
The network in the garden: an empirical analysis of social media in rural life (EG, KK, CS), pp. 1603–1612.
CHICHI-2008-IsenbergTC #analysis #case study #visual notation
An exploratory study of visual information analysis (PI, AT, MSTC), pp. 1217–1226.
CHICHI-2008-KatsanosTA #analysis #architecture #design #named #semantics #using #web
AutoCardSorter: designing the information architecture of a web site using latent semantic analysis (CK, NKT, NMA), pp. 875–878.
CHICHI-2008-MiaskiewiczSK #analysis #identification #semantics
A latent semantic analysis methodology for the identification and creation of personas (TM, TS, KAK), pp. 1501–1510.
CHICHI-2008-OConnellC #analysis #interactive #metric #visualisation
Metrics for measuring human interaction with interactive visualizations for information analysis (TAO, YYC), pp. 1493–1496.
CHICHI-2008-PererS #case study #data analysis #statistics #visualisation
Integrating statistics and visualization: case studies of gaining clarity during exploratory data analysis (AP, BS), pp. 265–274.
CSCWCSCW-2008-SteptoeWMGRSRS #analysis #collaboration
Eye-tracking for avatar eye-gaze and interactional analysis in immersive collaborative virtual environments (WS, RW, AM, EG, JR, PMS, DJR, AS), pp. 197–200.
SOFTVISSOFTVIS-2008-DietrichYMJD #analysis #clustering #dependence #graph #java
Cluster analysis of Java dependency graphs (JD, VY, CM, GJ, MD), pp. 91–94.
SOFTVISSOFTVIS-2008-PichNR #analysis #dependence #graph #visual notation
Visual analysis of importance and grouping in software dependency graphs (CP, LN, GGR), pp. 29–32.
SOFTVISSOFTVIS-2008-Stasko #analysis #visualisation
Visualization for information exploration and analysis: keynote presentation (JTS), pp. 7–8.
AdaEuropeAdaEurope-2008-FecheteKB #ada #framework #program analysis #source code
A Framework for CFG-Based Static Program Analysis of Ada Programs (RF, GK, JB), pp. 130–143.
AdaEuropeAdaEurope-2008-Pettit #analysis #architecture #concurrent
Increasing Confidence in Concurrent Software through Architectural Analysis (RGPI), pp. 199–210.
AdaSIGAda-2008-Safari-SharifabadiC #ada #comprehension #dynamic analysis #metric #quality #source code
Dynamic analysis of Ada programs for comprehension and quality measurement (ESS, CC), pp. 15–38.
CAiSECAiSE-2008-KongdenfhaBSC #analysis #interactive #named
SpreadMash: A Spreadsheet-Based Interactive Browsing and Analysis Tool for Data Services (WK, BB, RSP, FC), pp. 343–358.
CAiSECAiSE-2008-NiknafsR #analysis
Computer-Aided Method Engineering: An Analysis of Existing Environments (AN, RR), pp. 525–540.
CAiSECAiSE-2008-SpiessNWMB #analysis #modelling #performance #process #simulation #ubiquitous
Modelling, Simulation, and Performance Analysis of Business Processes Involving Ubiquitous Systems (PS, DKN, IW, IM, MB), pp. 579–582.
CAiSECAiSE-2008-VaraSP #analysis #information management #modelling #process #requirements
Business Process Modelling and Purpose Analysis for Requirements Analysis of Information Systems (JLdlV, JS, OP), pp. 213–227.
EDOCEDOC-2008-NarmanSJEC #analysis #architecture #enterprise #modelling #quality #using
Using Enterprise Architecture Models for System Quality Analysis (PN, MS, PJ, ME, MC), pp. 14–23.
EDOCEDOC-2008-SommestadEJ #analysis #architecture #enterprise #graph #modelling #security
Combining Defense Graphs and Enterprise Architecture Models for Security Analysis (TS, ME, PJ), pp. 349–355.
ICEISICEIS-AIDSS-2008-SharpanskykhSB #analysis #modelling #safety
Organizational Modeling and Analysis of Safety Occurrence Reporting in Air Traffic (AS, SHS, HAPB), pp. 225–230.
ICEISICEIS-AIDSS-2008-VolkelA #analysis #design #information management
Cost-Benefit Analysis for the Design of Personal Knowledge Management Systems (MV, AA), pp. 95–105.
ICEISICEIS-ISAS2-2008-AgostinhoMMABFRKRC #analysis #approach #aspect-oriented #requirements
A Metadata-Driven Approach for Aspect-Oriented Requirements Analysis (SA, AMDM, AM, JA, ISB, RF, RR, JK, RAR, PC), pp. 129–136.
ICEISICEIS-ISAS2-2008-BoukhebouzeAB #analysis #framework #modelling #named #process
BP-FAMA: Business Process Framework for Agility of Modelling and Analysis (MB, YA, ANB), pp. 368–373.
ICEISICEIS-ISAS2-2008-BrockeSC #analysis #framework #process #re-engineering #specification #towards
ECM Systems Analysis and Specification — Towards a Framework for Business Process Re-Engineering (JvB, AS, AC), pp. 345–350.
ICEISICEIS-ISAS2-2008-GustieneG #analysis #design
Introducing Service-Orientation into System Analysis and Design (PG, RG), pp. 189–194.
ICEISICEIS-ISAS2-2008-HuberSK #analysis #framework #health #security
Security Analysis of the Health Care Telematics Infrastructure in Germany (MJH, AS, HK), pp. 144–153.
ICEISICEIS-ISAS2-2008-LeL #analysis #web
Realizing Web Application Vulnerability Analysis via AVDL (HTL, PKKL), pp. 259–265.
ICEISICEIS-ISAS2-2008-MonteiroFBM #analysis #information management #mobile #towards
An Analysis Pattern for Mobile Geographic Information Systems toward Municipal Urban Administration (BRM, JLF, JLB, WSM), pp. 311–318.
ICEISICEIS-ISAS2-2008-ParvathyVB #analysis #case study #comparative #correlation #documentation #traceability
A Comparative Study of Document Correlation Techniques for Traceability Analysis (AGP, BGV, RB), pp. 64–69.
ICEISICEIS-ISAS2-2008-SantosBBR #analysis #architecture #modelling #semantics
A Model Driven Architecture Tool Based on Semantic Analysis Method (TMdS, RB, MCCB, MAR), pp. 305–310.
ICEISICEIS-ISAS2-2008-Venable #analysis #problem #requirements
Improving Requirements Analysis — Rigourous Problem Analysis and Formulation with Coloured Cognitive Maps (JRV), pp. 466–470.
ICEISICEIS-SAIC-2008-Bachlechner #analysis #architecture #integration #semantics #web #web service
Integration Architectures Based on Semantic Web Services: Fad or Model for the Future? — Findings of a Comprehensive SWOT Analysis (DB), pp. 45–52.
CIKMCIKM-2008-AcharyyaG #analysis #product line
A spam resistant family of concavo-convex ranks for link analysis (SA, JG), pp. 1505–1506.
CIKMCIKM-2008-DashRMAL #analysis
Dynamic faceted search for discovery-driven analysis (DD, JR, NM, AA, GML), pp. 3–12.
CIKMCIKM-2008-ItoNHN #analysis #wiki
Association thesaurus construction methods based on link co-occurrence analysis for wikipedia (MI, KN, TH, SN), pp. 817–826.
CIKMCIKM-2008-NajorkC #analysis #effectiveness #performance
Efficient and effective link analysis with precomputed salsa maps (MN, NC), pp. 53–62.
CIKMCIKM-2008-NguyenS #analysis #correlation #dataset #performance
Fast correlation analysis on time series datasets (PN, NS), pp. 787–796.
ECIRECIR-2008-HannahMO #analysis #graph
Analysis of Link Graph Compression Techniques (DH, CM, IO), pp. 596–601.
ECIRECIR-2008-LangWJLX #ad hoc #analysis #dependence #evaluation #retrieval
An Evaluation and Analysis of Incorporating Term Dependency for Ad-Hoc Retrieval (HL, BW, GJFJ, JL, YX), pp. 602–606.
ECIRECIR-2008-MohdCR #analysis #comparison
A Comparison of Named Entity Patterns from a User Analysis and a System Analysis (MM, FC, IR), pp. 679–683.
ICMLICML-2008-AnWSWCD #analysis #image #kernel #multi #process
Hierarchical kernel stick-breaking process for multi-task image analysis (QA, CW, IS, EW, LC, DBD), pp. 17–24.
ICMLICML-2008-HamL #analysis #learning
Grassmann discriminant analysis: a unifying view on subspace-based learning (JH, DDL), pp. 376–383.
ICMLICML-2008-LiangJ #analysis #generative #pseudo
An asymptotic analysis of generative, discriminative, and pseudolikelihood estimators (PL, MIJ), pp. 584–591.
ICMLICML-2008-LuPV #analysis #component #multi
Uncorrelated multilinear principal component analysis through successive variance maximization (HL, KNP, ANV), pp. 616–623.
ICMLICML-2008-MeloMR #analysis #approximate #learning
An analysis of reinforcement learning with function approximation (FSM, SPM, MIR), pp. 664–671.
ICMLICML-2008-ParrLTPL #analysis #approximate #feature model #learning #linear #modelling
An analysis of linear models, linear value-function approximation, and feature selection for reinforcement learning (RP, LL, GT, CPW, MLL), pp. 752–759.
ICMLICML-2008-SalakhutdinovM #analysis #network #on the
On the quantitative analysis of deep belief networks (RS, IM), pp. 872–879.
ICMLICML-2008-SunJY #analysis #canonical #correlation
A least squares formulation for canonical correlation analysis (LS, SJ, JY), pp. 1024–1031.
ICMLICML-2008-WangM #analysis #using
Manifold alignment using Procrustes analysis (CW, SM), pp. 1120–1127.
ICMLICML-2008-WangYQZ #analysis #component #composition #feature model
Dirichlet component analysis: feature extraction for compositional data (HYW, QY, HQ, HZ), pp. 1128–1135.
ICMLICML-2008-ZhangTK #analysis #approximate #fault #rank
Improved Nyström low-rank approximation and error analysis (KZ, IWT, JTK), pp. 1232–1239.
ICPRICPR-2008-Boccignone #analysis #parametricity #video
Nonparametric Bayesian attentive video analysis (GB), pp. 1–4.
ICPRICPR-2008-BridsonA #analysis #approach #evaluation #geometry #layout #performance
A geometric approach for accurate and efficient performance evaluation of layout analysis methods (DB, AA), pp. 1–4.
ICPRICPR-2008-ChoiGCC #analysis #independence #kernel
Kernel oriented discriminant analysis for speaker-independent phoneme spaces (HC, RGO, SC, YC), pp. 1–4.
ICPRICPR-2008-ChoiMSH #analysis #using
Quantitative analysis of Iaido proficiency by using motion data (WC, SM, HS, KH), pp. 1–4.
ICPRICPR-2008-ChuangLL #analysis #process #representation
Human activity analysis based on a torso-less representation (JHC, CWL, KHL), pp. 1–4.
ICPRICPR-2008-DingB #adaptation #analysis
Adaptive Laplacian eigenfunctions as bases for regression analysis (LD, XB), pp. 1–4.
ICPRICPR-2008-El-BazCGMSVM #3d #analysis #matter
Dyslexia diagnostics by 3D texture analysis of cerebral white matter gyrifications (AEB, MC, GLG, MM, AES, EV, RM), pp. 1–4.
ICPRICPR-2008-El-BazGFE #3d #analysis #approach #automation #detection #image #monitoring
A new approach for automatic analysis of 3D low dose CT images for accurate monitoring the detected lung nodules (AEB, GLG, RF, MAEG), pp. 1–4.
ICPRICPR-2008-HardingE #2d #analysis #fourier #gesture #recognition
The Fourier Analysis of 2DT movement with particular reference to hand gesture recognition (PRGH, TJE), pp. 1–4.
ICPRICPR-2008-HouLLCWY #analysis #modelling
Fingerprint orientation analysis with topological modeling (ZH, JL, HKL, TPC, HLW, WYY), pp. 1–4.
ICPRICPR-2008-IhaddadeneD #analysis #realtime
Real-time crowd motion analysis (NI, CD), pp. 1–4.
ICPRICPR-2008-KaholV #analysis #modelling #process #using
Hand motion expertise analysis using dynamic hierarchical activity modeling and isomap (KK, MV), pp. 1–4.
ICPRICPR-2008-KaiserH #analysis #detection
Qualitative analysis of spatio-temporal event detectors (BK, GH), pp. 1–4.
ICPRICPR-2008-KleberSGM #analysis #documentation
Ancient document analysis based on text line extraction (FK, RS, MG, HM), pp. 1–4.
ICPRICPR-2008-LablackD #analysis #behaviour
Analysis of human behaviour in front of a target scene (AL, CD), pp. 1–4.
ICPRICPR-2008-LiuS #analysis #correlation
Recovering audio-to-video synchronization by audiovisual correlation analysis (YL, YS), pp. 1–4.
ICPRICPR-2008-LiZWH #analysis #clustering #multi
Multiclass spectral clustering based on discriminant analysis (XL, ZZ, YW, WH), pp. 1–4.
ICPRICPR-2008-LuCC #analysis #image #multi #recognition
Multilinear analysis based on image texture for face recognition (HL, HC, YWC), pp. 1–4.
ICPRICPR-2008-MorrisT #adaptation #analysis #process #video
An adaptive scene description for activity analysis in surveillance video (BM, MMT), pp. 1–4.
ICPRICPR-2008-NedzvedABMD #analysis #image
The structure analysis of ultra thin magnetic film images (AN, SA, AB, AM, WD), pp. 1–4.
ICPRICPR-2008-NohHL #analysis #invariant #recognition
Regularized discriminant analysis for transformation-invariant object recognition (YKN, JH, DDL), pp. 1–5.
ICPRICPR-2008-OjansivuRH #analysis #invariant
Rotation invariant local phase quantization for blur insensitive texture analysis (VO, ER, JH), pp. 1–4.
ICPRICPR-2008-PaclikLND #analysis #estimation #multi #using
Variance estimation for two-class and multi-class ROC analysis using operating point averaging (PP, CL, JN, RPWD), pp. 1–4.
ICPRICPR-2008-ParkCDK #analysis #clustering #linear
Linear discriminant analysis for data with subcluster structure (HP, JC, BLD, JK), pp. 1–4.
ICPRICPR-2008-ParkSK #analysis
Facial expression analysis with facial expression deformation (SP, JS, DK), pp. 1–4.
ICPRICPR-2008-SaitohMK #analysis #performance
Analysis of efficient lip reading method for various languages (TS, KM, RK), pp. 1–4.
ICPRICPR-2008-ShafaitBKB #analysis #layout #modelling #statistics #variability
Background variability modeling for statistical layout analysis (FS, JvB, DK, TMB), pp. 1–4.
ICPRICPR-2008-ThomasRCB #analysis #comparative
Comparative analysis of registration based and registration free methods for cancelable fingerprint biometrics (AOT, NKR, JHC, RMB), pp. 1–4.
ICPRICPR-2008-VillS #analysis #automation #classification
Automated stroke ending analysis for drawing tool classification (MCV, RS), pp. 1–4.
ICPRICPR-2008-WangYY #analysis #fuzzy #recognition
Fuzzy maximum scatter discriminant analysis and its application to face recognition (JW, WY, JY), pp. 1–4.
ICPRICPR-2008-XiaDG #analysis #invariant
Locally invariant texture analysis from the topographic map (GSX, JD, YG), pp. 1–4.
ICPRICPR-2008-YangQ #analysis #component #detection #independence #network #using
A network intrusion detection method using independent component analysis (DY, HQ), pp. 1–4.
ICPRICPR-2008-ZengLH #analysis
Analysis on two fishermethods and a synthesized discriminant projection (ZZ, CL, LH), pp. 1–4.
KDDKDD-2008-BoutsidisMD #analysis #component #feature model
Unsupervised feature selection for principal components analysis (CB, MWM, PD), pp. 61–69.
KDDKDD-2008-GodboleR #analysis #automation #classification #industrial
Text classification, business intelligence, and interactivity: automating C-Sat analysis for services industry (SG, SR), pp. 911–919.
KDDKDD-2008-GodboleR08a #analysis #automation #industrial
An integrated system for automatic customer satisfaction analysis in the services industry (SG, SR), pp. 1073–1076.
KDDKDD-2008-GraepelH #data analysis #modelling #online #scalability
Large scale data analysis and modelling in online services and advertising (TG, RH), p. 2.
KDDKDD-2008-KoenigsteinST #analysis #query #string #using
Spotting out emerging artists using geo-aware analysis of P2P query strings (NK, YS, TT), pp. 937–945.
KDDKDD-2008-YuFRKRDL #analysis #privacy
Privacy-preserving cox regression for survival analysis (SY, GF, RR, SK, RBR, CDO, PL), pp. 1034–1042.
KDDKDD-2008-ZengMLBM #analysis #predict #using
Using predictive analysis to improve invoice-to-cash collection (SZ, PM, CAL, IMBM, CM), pp. 1043–1050.
KRKR-2008-Balbiani #analysis #reasoning #representation #standard
Time Representation and Temporal Reasoning from the Perspective of Non-Standard Analysis (PB), pp. 695–704.
RecSysRecSys-2008-Domingues #adaptation #analysis #framework #independence #monitoring #web
An independent platform for the monitoring, analysis and adaptation of web sites (MAD), pp. 299–302.
RecSysRecSys-2008-LakiotakiTM #analysis #multi #named #recommendation
UTA-Rec: a recommender system based on multiple criteria analysis (KL, ST, NFM), pp. 219–226.
RecSysRecSys-2008-WuWC #analysis #automation #incremental #probability #recommendation #semantics
Incremental probabilistic latent semantic analysis for automatic question recommendation (HW, YW, XC), pp. 99–106.
SEKESEKE-2008-AltahatET #analysis #detection #diagrams #graph transformation #interactive #uml
Applying Critical Pair Analysis in Graph Transformation Systems to Detect Syntactic Aspect Interaction in UML State Diagrams (ZA, TE, LT), pp. 905–911.
SEKESEKE-2008-DrumondGS #analysis #information management #semantics #similarity #web
A Similarity Analysis Model for Semantic Web Information Filtering Applications (LD, RG, FS), pp. 638–642.
SEKESEKE-2008-DuZR #concept analysis #release planning #using
Explaining Product Release Planning Results Using Concept Analysis (GD, TZ, GR), pp. 137–142.
SEKESEKE-2008-EmerVJ #analysis #database #relational #testing
Testing Relational Database Schemas with Alternative Instance Analysis (MCFPE, SRV, MJ), pp. 357–362.
SEKESEKE-2008-GaoKF #analysis #complexity #modelling #testing
Model-based Test Complexity Analysis for Software Installation Testing (JG, KK, TF), pp. 631–637.
SEKESEKE-2008-HuS #design pattern #detection #dynamic analysis #java #source code
Dynamic Analysis and Design Pattern Detection in Java Programs (LH, KS), pp. 842–846.
SEKESEKE-2008-LiuCH #analysis #named
PSPCAT: A PSP Data Collection and Analysis Tool (CHL, SLC, YCH), pp. 33–37.
SEKESEKE-2008-MatalongaG #analysis #fault
Linking Return on Training Investment with Defects Causal Analysis (SM, TSFG), pp. 42–47.
SEKESEKE-2008-ParveenATMF #analysis #detection #probability #towards
Towards the Detection of Emulated Environments via Analysis of the Stochastic Nature of System Calls (TP, WHA, SRT, GAM, RF), pp. 802–807.
SEKESEKE-2008-Shaffer #domain model #security #source code #static analysis #verification
A Security Domain Model for Static Analysis and Verification of Software Programs (ABS), pp. 673–678.
SEKESEKE-2008-WuC #analysis #data transformation
A Wed-based data Management and Analysis System for CO2 Capture (YW, CWC), pp. 857–860.
SIGIRSIGIR-2008-JiangA #analysis #categorisation
Exploiting subjectivity analysis in blogs to improve political leaning categorization (MJ, SA), pp. 725–726.
SIGIRSIGIR-2008-PengL #analysis #evolution #topic #using
Author-topic evolution analysis using three-way non-negative Paratucker (WP, TL), pp. 819–820.
SIGIRSIGIR-2008-WangLZD #analysis #matrix #multi #semantics #summary #symmetry
Multi-document summarization via sentence-level semantic analysis and symmetric matrix factorization (DW, TL, SZ, CHQD), pp. 307–314.
SIGIRSIGIR-2008-WanY #analysis #clustering #multi #summary #using
Multi-document summarization using cluster-based link analysis (XW, JY), pp. 299–306.
SIGIRSIGIR-2008-XuZL #analysis #image #named #novel #semantics #web
WISA: a novel web image semantic analysis system (HX, XZ, LL), pp. 777–778.
ECMFAECMDA-FA-2008-FritzscheGFSKB #analysis #modelling #performance #towards
Towards Utilizing Model-Driven Engineering of Composite Applications for Business Performance Analysis (MF, WG, CF, ITAS, PK, TJB), pp. 369–380.
ECMFAECMDA-FA-2008-WaheedIM #action semantics #analysis #data flow #execution #modelling #semantics #uml
Data Flow Analysis of UML Action Semantics for Executable Models (TW, MZZI, ZIM), pp. 79–93.
MODELSMoDELS-2008-BernardiMP #analysis #dependence
Adding Dependability Analysis Capabilities to the MARTE Profile (SB, JM, DCP), pp. 736–750.
MODELSMoDELS-2008-CabotCGL #analysis #declarative #invariant #model transformation
An Invariant-Based Method for the Analysis of Declarative Model-to-Model Transformations (JC, RC, EG, JdL), pp. 37–52.
MODELSMoDELS-2008-NugrohoFC #analysis #empirical #fault #modelling #uml
Empirical Analysis of the Relation between Level of Detail in UML Models and Defect Density (AN, BF, MRVC), pp. 600–614.
MODELSMoDELS-2008-ShoushaBL #algorithm #analysis #concurrent #search-based #uml
A UML/SPT Model Analysis Methodology for Concurrent Systems Based on Genetic Algorithms (MS, LCB, YL), pp. 475–489.
MODELSMoDELS-2008-TawhidP #analysis #development #modelling #performance #product line
Integrating Performance Analysis in the Model Driven Development of Software Product Lines (RT, DCP), pp. 490–504.
MODELSMoDELS-2008-YuFR #modelling #static analysis #uml
Scenario-Based Static Analysis of UML Class Models (LY, RBF, IR), pp. 234–248.
MODELSMoDELS-2008-BernardiMP #analysis #dependence
Adding Dependability Analysis Capabilities to the MARTE Profile (SB, JM, DCP), pp. 736–750.
MODELSMoDELS-2008-CabotCGL #analysis #declarative #invariant #model transformation
An Invariant-Based Method for the Analysis of Declarative Model-to-Model Transformations (JC, RC, EG, JdL), pp. 37–52.
MODELSMoDELS-2008-NugrohoFC #analysis #empirical #fault #modelling #uml
Empirical Analysis of the Relation between Level of Detail in UML Models and Defect Density (AN, BF, MRVC), pp. 600–614.
MODELSMoDELS-2008-ShoushaBL #algorithm #analysis #concurrent #search-based #uml
A UML/SPT Model Analysis Methodology for Concurrent Systems Based on Genetic Algorithms (MS, LCB, YL), pp. 475–489.
MODELSMoDELS-2008-TawhidP #analysis #development #modelling #performance #product line
Integrating Performance Analysis in the Model Driven Development of Software Product Lines (RT, DCP), pp. 490–504.
MODELSMoDELS-2008-YuFR #modelling #static analysis #uml
Scenario-Based Static Analysis of UML Class Models (LY, RBF, IR), pp. 234–248.
ECOOPECOOP-2008-HessellundS #analysis
Flow Analysis of Code Customizations (AH, PS), pp. 285–308.
OOPSLAOOPSLA-2008-DagenaisH #java #source code #static analysis
Enabling static analysis for partial java programs (BD, LJH), pp. 313–328.
OOPSLAOOPSLA-2008-GopinathanR #analysis #protocol #runtime
Enforcing object protocols by combining static and runtime analysis (MG, SKR), pp. 245–260.
OOPSLAOOPSLA-2008-KawachiyaOO #analysis #java #memory management #reduction #string
Analysis and reduction of memory inefficiencies in Java strings (KK, KO, TO), pp. 385–402.
OOPSLAOOPSLA-2008-NaeemL #analysis #multi
Typestate-like analysis of multiple interacting objects (NAN, OL), pp. 347–366.
OOPSLAOOPSLA-2008-ShankarAB #dynamic analysis #lightweight #named
Jolt: lightweight dynamic analysis and removal of object churn (AS, MA, RB), pp. 127–142.
LOPSTRLOPSTR-2008-BandaG #analysis #hybrid #linear
Analysis of Linear Hybrid Systems in CLP (GB, JPG), pp. 55–70.
LOPSTRLOPSTR-2008-LeuschelLOST #csp #specification #static analysis
The MEB and CEB Static Analysis for CSP Specifications (ML, ML, JO, JS, ST), pp. 103–118.
PPDPPPDP-2008-Hanus #analysis #functional #logic programming #source code
Call pattern analysis for functional logic programs (MH), pp. 67–78.
QAPLQAPL-2008-PierroSW #abstract interpretation #analysis #precise #probability #relational
Relational Analysis and Precision via Probabilistic Abstract Interpretation (ADP, PS, HW), pp. 23–42.
PADLPADL-2008-EshkevariAC #analysis #aspect-oriented #comprehension #declarative #dependence #reasoning #source code
Comprehension and Dependency Analysis of Aspect-Oriented Programs through Declarative Reasoning (LME, VA, CC), pp. 35–52.
POPLPOPL-2008-ChangR #analysis #induction #relational
Relational inductive shape analysis (BYEC, XR), pp. 247–260.
POPLPOPL-2008-Danielsson #analysis #complexity #data type #functional #lightweight
Lightweight semiformal time complexity analysis for purely functional data structures (NAD), pp. 133–144.
POPLPOPL-2008-McMillan #heuristic #program analysis
Relevance heuristics for program analysis (KLM), pp. 145–146.
POPLPOPL-2008-ZhengR #alias #analysis #c
Demand-driven alias analysis for C (XZ, RR), pp. 197–208.
RERE-2008-FeatherHMU #analysis #deployment #requirements #using
Guiding Technology Deployment Decisions using a Quantitative Requirements Analysis Technique (MSF, KAH, RMM, SU), pp. 271–276.
RERE-2008-FinkelsteinHMRZ #analysis #requirements
“Fairness Analysis” in Requirements Assignments (AF, MH, SAM, JR, YZ), pp. 115–124.
RERE-2008-GlorioPMT #analysis #eclipse #named #plugin
DaWaRA: An Eclipse Plugin for Usingi* on Data Warehouse Requirement Analysis (OG, JP, JNM, JT), pp. 317–318.
RERE-2008-TanabeUAYKS #analysis #requirements
Supporting Requirements Change Management in Goal Oriented Analysis (DT, KU, KA, TY, HK, MS), pp. 3–12.
SACSAC-2008-AbedMS #analysis #graph #multi #proving #reachability #theorem proving #using
Reachability analysis using multiway decision graphs in the HOL theorem prover (SA, OAM, GAS), pp. 333–338.
SACSAC-2008-AlbertAGPZ #bytecode #cost analysis #java
Removing useless variables in cost analysis of Java bytecode (EA, PA, SG, GP, DZ), pp. 368–375.
SACSAC-2008-AmatoCCMTVGLGM #analysis #detection
A web-based system for the collection and analysis of spectra signals for early detection of voice alterations (FA, MC, CC, FM, GT, PV, AG, NL, SG, CM), pp. 1405–1409.
SACSAC-2008-AraujoSF #algebra #analysis #process
HIV drug resistance analysis tool based on process algebra (LVdA, ECS, JEF), pp. 1358–1363.
SACSAC-2008-AvolaC #analysis #image
Encephalic NMR image analysis by textural interpretation (DA, LC), pp. 1338–1342.
SACSAC-2008-BallabrigaCS #analysis #approach
An improved approach for set-associative instruction cache partial analysis (CB, HC, PS), pp. 360–367.
SACSAC-2008-BaveraB #analysis #bytecode #data flow #policy #type system
Type-based information flow analysis for bytecode languages with variable object field policies (FB, EB), pp. 347–351.
SACSAC-2008-BelohlavekV #concept analysis #dependence
Adding background knowledge to formal concept analysis via attribute dependency formulas (RB, VV), pp. 938–943.
SACSAC-2008-BussBSE #analysis #flexibility #graph #pointer #using
Flexible pointer analysis using assign-fetch graphs (MB, DB, VCS, SAE), pp. 234–239.
SACSAC-2008-CernuzziZ #analysis #comparative #evaluation
Profile based comparative analysis for AOSE methodologies evaluation (LC, FZ), pp. 60–65.
SACSAC-2008-ChenXN #analysis #detection #fault #specification
A detectability analysis of fault classes for Boolean specifications (ZC, BX, CN), pp. 826–830.
SACSAC-2008-CorreaIZF #analysis #image #mobile #using
Medical image analysis using mobile devices (BC, EI, AZ, MF), pp. 1380–1384.
SACSAC-2008-CostaNFC #analysis #assessment #parametricity
Parametric cepstral analysis for pathological voice assessment (SCC, BGAN, JMF, SC), pp. 1410–1414.
SACSAC-2008-Denner-Broser #algorithm #analysis #problem #using
An algorithm for the tracing problem using interval analysis (BDB), pp. 1832–1837.
SACSAC-2008-GarciaH #analysis #functional #metric #using
Integrating functional metrics, COCOMO II and earned value analysis for software projects using PMBoK (CALG, CMH), pp. 820–825.
SACSAC-2008-KaiyaSOKK #analysis #quality #requirements #towards
Toward quality requirements analysis based on domain specific quality spectrum (HK, TS, AO, NK, KK), pp. 596–601.
SACSAC-2008-OliveiraMWS #analysis #locality
Brain registration and subtraction — improved localization for SPECT analysis (B.R.A.S.I.L.): a computer-aided diagnosis in epilepsy tool kit (LFdO, PMdAM, LWA, ACS), pp. 1390–1394.
SACSAC-2008-Papadopoulos #analysis #retrieval #semantics
Trajectory retrieval with latent semantic analysis (ANP), pp. 1089–1094.
SACSAC-2008-Schneider #analysis #hybrid #reachability
Reachability analysis of generalized polygonal hybrid systems (GS), pp. 327–332.
SACSAC-2008-SilvaDSSM #analysis #automation #component #segmentation
Automated segmentation and volumetric analysis of brain components on MR imaging (MPS, JRD, FLS, ASdS, DCMS), pp. 1422–1423.
SACSAC-2008-TakasuA #analysis #documentation #information management #layout #probability
Information extraction from scanned documents by stochastic page layout analysis (AT, KA), pp. 447–448.
SACSAC-2008-WendtGSWNM #analysis #mobile #optimisation #smarttech
System level power profile analysis and optimization for smart cards and mobile devices (MW, MG, CS, RW, UN, AM), pp. 1884–1888.
FSEFSE-2008-JiangS #analysis #effectiveness #testing
Profile-guided program simplification for effective testing and analysis (LJ, ZS), pp. 48–58.
FSEFSE-2008-MeneelyWSO #analysis #developer #network #predict #social
Predicting failures with developer networks and social network analysis (AM, LW, WS, JAO), pp. 13–23.
ICSEICSE-2008-ChenSR #analysis #java #named #predict #runtime
jPredictor: a predictive runtime analysis tool for java (FC, TFS, GR), pp. 221–230.
ICSEICSE-2008-JurjensSB #analysis #mobile #modelling #security
Model-based security analysis for mobile communications (JJ, JS, PB), pp. 683–692.
ICSEICSE-2008-MauleER #database #impact analysis
Impact analysis of database schema changes (AM, WE, DSR), pp. 451–460.
ICSEICSE-2008-MoserPS #analysis #comparative #fault #metric #performance #predict
A comparative analysis of the efficiency of change metrics and static code attributes for defect prediction (RM, WP, GS), pp. 181–190.
ICSEICSE-2008-ReichertKSMH #analysis #network #protocol
A language for advanced protocol analysis in automotive networks (TR, EK, WS, AM, DH), pp. 593–602.
ICSEICSE-2008-RuthruffPMER #approach #predict #static analysis
Predicting accurate and actionable static analysis warnings: an experimental approach (JRR, JP, JDM, SGE, GR), pp. 341–350.
ICSEICSE-2008-ZimmermannN #analysis #dependence #fault #graph #network #predict #using
Predicting defects using network analysis on dependency graphs (TZ, NN), pp. 531–540.
ATEMATEM-J-2006-MiguelBSA #analysis #development #integration #modelling #safety
Integration of safety analysis in model-driven software development (MAdM, JFB, JPS, AA), pp. 260–280.
SLESLE-2008-HageK #analysis #library #named
Neon: A Library for Language Usage Analysis (JH, PvK), pp. 35–53.
SLESLE-2008-MoodyH #analysis #diagrams #effectiveness #syntax #uml #visual notation
Evaluating the Visual Syntax of UML: An Analysis of the Cognitive Effectiveness of the UMLFamily of Diagrams (DLM, JvH), pp. 16–34.
SPLCSPLC-2008-AlvesSBRSRPR #analysis #case study #information retrieval
An Exploratory Study of Information Retrieval Techniques in Domain Analysis (VA, CS, LB, AR, PS, PR, CP, AR), pp. 67–76.
SPLCSPLC-2008-HarhurinH #analysis
Service-Oriented Commonality Analysis Across Existing Systems (AH, JH), pp. 255–264.
SPLCSPLC-2008-NiuE #analysis #clustering #functional #on-demand #product line #requirements
On-Demand Cluster Analysis for Product Line Functional Requirements (NN, SME), pp. 87–96.
ASPLOSASPLOS-2008-TuckACT #analysis #hardware #named #optimisation
SoftSig: software-exposed hardware signatures for code analysis and optimization (JT, WA, LC, JT), pp. 145–156.
CCCC-2008-KhedkerK #analysis #data flow #interprocedural #performance #precise #string
Efficiency, Precision, Simplicity, and Generality in Interprocedural Data Flow Analysis: Resurrecting the Classical Call Strings Method (UPK, BK), pp. 213–228.
CCCC-2008-LogozzoF #analysis #bytecode #on the #source code
On the Relative Completeness of Bytecode Analysis Versus Source Code Analysis (FL, MF), pp. 197–212.
CCCC-2008-MarronHKS #analysis #graph #modelling #performance
Efficient Context-Sensitive Shape Analysis with Graph Based Heap Models (MM, MVH, DK, DS), pp. 245–259.
CCCC-2008-RepsB #analysis #bytecode
Improved Memory-Access Analysis for x86 Executables (TWR, GB), pp. 16–35.
CCCC-2008-RountevSX #analysis #data flow #ide #library #object-oriented #scalability
IDE Dataflow Analysis in the Presence of Large Object-Oriented Libraries (AR, MS, G(X), pp. 53–68.
CGOCGO-2008-Griesemer #data analysis #design #parallel
Parallelism by design: data analysis with sawzall (RG), p. 3.
CGOCGO-2008-ThakurG #analysis #data flow
Comprehensive path-sensitive data-flow analysis (AVT, RG), pp. 55–63.
CGOCGO-2008-ZhaoCW #analysis #manycore #named #pipes and filters #profiling
Pipa: pipelined profiling and analysis on multi-core systems (QZ, IC, WFW), pp. 185–194.
CGOCGO-2008-ZhuangKSC #analysis #difference #framework #named #performance #virtual machine
Perfdiff: a framework for performance difference analysis in a virtual machine environment (XZ, SK, MJS, JDC), pp. 4–13.
HPCAHPCA-2008-KimGWB #analysis #performance #using
System level analysis of fast, per-core DVFS using on-chip switching regulators (WK, MSG, GYW, DMB), pp. 123–134.
LCTESLCTES-2008-AnandL #analysis #embedded #robust #scheduling
Robust and sustainable schedulability analysis of embedded software (MA, IL), pp. 61–70.
LCTESLCTES-2008-ReinekeG #analysis #policy
Relative competitive analysis of cache replacement policies (JR, DG), pp. 51–60.
PPoPPPPoPP-2008-ChandraSSB #analysis #data type #distributed #locality #type inference
Type inference for locality analysis of distributed data structures (SC, VAS, VS, RB), pp. 11–22.
PPoPPPPoPP-2008-PraunBC #analysis #concurrent #dependence #modelling #using
Modeling optimistic concurrency using quantitative dependence analysis (CvP, RB, CC), pp. 185–196.
PPoPPPPoPP-2008-WangYFDWJ #analysis #automation #source code
Automated application-level checkpointing based on live-variable analysis in MPI programs (PW, XY, HF, YD, ZW, JJ), pp. 273–274.
CAVCAV-2008-BackesLMP #abstraction #analysis #protocol #security
The CASPA Tool: Causality-Based Abstraction for Security Protocol Analysis (MB, SL, MM, KP), pp. 419–422.
CAVCAV-2008-BerdineLMRS #analysis #concurrent #quantifier #thread
Thread Quantification for Concurrent Shape Analysis (JB, TLA, RM, GR, SS), pp. 399–413.
CAVCAV-2008-Cremers #analysis #protocol #security #verification
The Scyther Tool: Verification, Falsification, and Analysis of Security Protocols (CJFC), pp. 414–418.
CAVCAV-2008-GulavaniG #abstract domain #abstraction #analysis
A Numerical Abstract Domain Based on Expression Abstraction and Max Operator with Application in Timing Analysis (BSG, SG), pp. 370–384.
CAVCAV-2008-GulwaniT #analysis #approach #constraints #hybrid
Constraint-Based Approach for Analysis of Hybrid Systems (SG, AT), pp. 190–203.
CAVCAV-2008-HolzerSTV #dynamic analysis #generative #metric #named #testing
FShell: Systematic Test Case Generation for Dynamic Analysis and Measurement (AH, CS, MT, HV), pp. 209–213.
CAVCAV-2008-KimJRSPKS #analysis #random #simulation
Application of Formal Word-Level Analysis to Constrained Random Simulation (HK, HJ, KR, PS, JP, RPK, FS), pp. 487–490.
CAVCAV-2008-KinderV #framework #named #static analysis
Jakstab: A Static Analysis Platform for Binaries (JK, HV), pp. 423–427.
CAVCAV-2008-LalR #analysis #bound #concurrent
Reducing Concurrent Analysis Under a Context Bound to Sequential Analysis (AL, TWR), pp. 37–51.
CAVCAV-2008-YangLBCCDO #analysis #scalability
Scalable Shape Analysis for Systems Code (HY, OL, JB, CC, BC, DD, PWO), pp. 385–398.
ICLPICLP-2008-Lassen #analysis #sequence
Biosequence Analysis in PRISM (OTL), pp. 809–810.
ICLPICLP-2008-PilozziS #analysis #revisited #termination
Termination Analysis of CHR Revisited (PP, DDS), pp. 501–515.
ICLPICLP-2008-SchulteS #bound #dynamic analysis
Dynamic Analysis of Bounds Versus Domain Propagation (CS, PJS), pp. 332–346.
ICLPICLP-2008-Vidal #analysis #effectiveness #partial evaluation #predict
Trace Analysis for Predicting the Effectiveness of Partial Evaluation (GV), pp. 790–794.
ICSTICST-2008-McQuillanP #alloy #analysis #metamodelling #metric #object-oriented #using
A Metamodel for the Measurement of Object-Oriented Systems: An Analysis using Alloy (JAM, JFP), pp. 288–297.
ICSTICST-2008-SherriffW #composition #empirical #impact analysis #using
Empirical Software Change Impact Analysis using Singular Value Decomposition (MS, LW), pp. 268–277.
IJCARIJCAR-2008-AvanziniMS #analysis #automation #complexity
Automated Implicit Computational Complexity Analysis (System Description) (MA, GM, AS), pp. 132–138.
IJCARIJCAR-2008-HirokawaM #analysis #automation #complexity #dependence
Automated Complexity Analysis Based on the Dependency Pair Method (NH, GM), pp. 364–379.
ISSTAISSTA-2008-DoR #analysis #modelling #testing #using
Using sensitivity analysis to create simplified economic models for regression testing (HD, GR), pp. 51–62.
ISSTAISSTA-2008-DorLLSW #enterprise #impact analysis #slicing
Customization change impact analysis for erp professionals via program slicing (ND, TLA, SL, MS, DW), pp. 97–108.
ISSTAISSTA-2008-LoginovYCFRN #analysis #safety #verification
Verifying dereference safety via expanding-scope analysis (AL, EY, SC, SF, NR, MGN), pp. 213–224.
ISSTAISSTA-2008-XuR #analysis #points-to #scalability
Merging equivalent contexts for scalable heap-cloning-based context-sensitive points-to analysis (G(X, AR), pp. 225–236.
LICSLICS-2008-Kahlon #abstraction #analysis #approach #concurrent #data flow #source code
Parameterization as Abstraction: A Tractable Approach to the Dataflow Analysis of Concurrent Programs (VK), pp. 181–192.
ICSTSAT-2008-AudemardBHJS #analysis #framework
A Generalized Framework for Conflict Analysis (GA, LB, YH, SJ, LS), pp. 21–27.
TAPTAP-2008-DunetsSR #analysis #bound #data type #relational
Bounded Relational Analysis of Free Data Types (AD, GS, WR), pp. 99–115.
TAPTAP-2008-Ferrara #abstract interpretation #memory management #static analysis
Static Analysis Via Abstract Interpretation of the Happens-Before Memory Model (PF), pp. 116–133.
FATESTestCom-FATES-2008-GrozLPS #analysis #composition #reachability #testing #verification
Modular System Verification by Inference, Testing and Reachability Analysis (RG, KL, AP, MS), pp. 216–233.
FATESTestCom-FATES-2008-WangH #analysis #concurrent #generative #realtime #testing
Test Plan Generation for Concurrent Real-Time Systems Based on Zone Coverage Analysis (FW, GDH), pp. 234–249.
VMCAIVMCAI-2008-GroceJ #dynamic analysis #model checking
Extending Model Checking with Dynamic Analysis (AG, RJ), pp. 142–156.
VMCAIVMCAI-2008-Mendez-LojoH #analysis #precise #set #source code
Precise Set Sharing Analysis for Java-Style Programs (MML, MVH), pp. 172–187.
VMCAIVMCAI-2008-Pistoia #program analysis #programming language #security
Program Analysis and Programming Languages for Security (MP), p. 7.
ECSAECSA-2007-Zalewski #analysis #architecture #development #scalability
Beyond ATAM: Architecture Analysis in the Development of Large Scale Software Systems (AZ), pp. 92–105.
WICSAWICSA-2007-Apte #analysis #distributed #performance
Performance Analysis of Distributed Software Systems: Approaches Based on Queueing Theory (VA), p. 39.
WICSAWICSA-2007-Florentz #analysis #architecture #evaluation #optimisation #representation
Inside Architecture Evaluation: Analysis and Representation of Optimization Potential (BF), p. 3.
WICSAWICSA-2007-SangwanH #analysis #architecture #design #object-oriented
Integrating Architecture-Centric Methods into Object-Oriented Analysis and Design (RSS, ZEH), p. 32.
ASEASE-2007-ArtziKGE #analysis
Combined static and dynamic mutability analysis (SA, AK, DG, MDE), pp. 104–113.
ASEASE-2007-DwyerP #cost analysis #dynamic analysis #static analysis #type system
Residual dynamic typestate analysis exploiting static analysis: results to reformulate and reduce the cost of dynamic analysis (MBD, RP), pp. 124–133.
ASEASE-2007-ShiriHR #analysis #feature model #interactive #maintenance #perspective
Feature interaction analysis: a maintenance perspective (MS, JH, JR), pp. 437–440.
ASEASE-2007-ZaraketAK #program analysis
Sequential circuits for program analysis (FAZ, AA, SK), pp. 114–123.
CASECASE-2007-BogdanKFD #analysis #design #fuzzy
Fuzzy Arithmetic-based Stability Analysis and Design of Fuzzy Controller (SB, ZK, IF, ID), pp. 968–973.
CASECASE-2007-BraunP #analysis
Analysis of the Effects of Truncation on the EWMA Observer (MWB, NSP), pp. 472–477.
CASECASE-2007-ChandrashekarN #analysis #coordination #network
A Shapley Value Analysis to Coordinate the Formation of Procurement Networks (TSC, YN), pp. 664–669.
CASECASE-2007-LiW #analysis #approach #reliability
An Importance Sampling Based Approach for Reliability Analysis (FL, TW), pp. 956–961.
CASECASE-2007-MitaniYH #analysis #using
Feeding of Submillimeter-sized Microparts along a Saw-tooth Surface Using Only Horizontal Vibration: Analysis of Convexities on the Surface of Microparts (AM, TY, SH), pp. 69–76.
CASECASE-2007-PanH #analysis
Diagnosability Analysis and Sensor Selection in Discrete-Event Systems with Permanent Failures (JP, SHZ), pp. 869–874.
CASECASE-2007-SunFSFCD #analysis #bibliography #paradigm
Decision Paradigms in the Semiconductor Supply Chain: A Survey and Analysis (YS, ALF, DLS, JWF, TEC, BMD), pp. 106–110.
CASECASE-2007-WangL #analysis #approximate #modelling #reliability
Approximate Analysis of Re-Entrant Lines with Bernoulli Reliability Models (CW, JL), pp. 398–403.
CASECASE-2007-YiDZ0 #analysis #clustering #linear #throughput #tool support
Throughput Analysis of Linear Cluster Tools (JY, SD, MTZ, PvdM), pp. 1063–1068.
CASECASE-2007-YooG #analysis #network #process
Intruder Activity Analysis under Unreliable Sensor Networks (TSY, HEG), pp. 578–584.
DACDAC-2007-AmbroseRP #analysis #injection #named #random
RIJID: Random Code Injection to Mask Power Analysis based Side Channel Attacks (JAA, RGR, SP), pp. 489–492.
DACDAC-2007-BurnsKMBTD #analysis #comparative #design #statistics
Comparative Analysis of Conventional and Statistical Design Techniques (SMB, MK, NM, KAB, JT, VD), pp. 238–243.
DACDAC-2007-ChengXH #analysis #statistics
Non-Linear Statistical Static Timing Analysis for Non-Gaussian Variation Sources (LC, JX, LH), pp. 250–255.
DACDAC-2007-DadgourB #analysis #design #hybrid #power management
Design and Analysis of Hybrid NEMS-CMOS Circuits for Ultra Low-Power Applications (HFD, KB), pp. 306–311.
DACDAC-2007-FengLZ #analysis #higher-order #parametricity #performance #reduction #statistics #using
Fast Second-Order Statistical Static Timing Analysis Using Parameter Dimension Reduction (ZF, PL, YZ), pp. 244–249.
DACDAC-2007-GandikotaCBSB #analysis #set
Top-k Aggressors Sets in Delay Noise Analysis (RG, KC, DB, DS, MRB), pp. 174–179.
DACDAC-2007-GhodratLR #analysis #estimation #hybrid #using
Accelerating System-on-Chip Power Analysis Using Hybrid Power Estimation (MAG, KL, AR), pp. 883–886.
DACDAC-2007-HagiescuBCSGR #analysis #network #performance
Performance Analysis of FlexRay-based ECU Networks (AH, UDB, SC, PS, PVVG, SR), pp. 284–289.
DACDAC-2007-HariziHOB #analysis #modelling #performance
Efficient Modeling Techniques for Dynamic Voltage Drop Analysis (HH, RH, MO, EB), pp. 706–711.
DACDAC-2007-HuangTKC #analysis #case study #flexibility #reliability
Reliability Analysis for Flexible Electronics: Case Study of Integrated a-Si: H TFT Scan Driver (TCH, HYT, CPK, KTC), pp. 966–969.
DACDAC-2007-KirnerS #analysis #execution #modelling #worst-case
Modeling the Function Cache for Worst-Case Execution Time Analysis (RK, MS), pp. 471–476.
DACDAC-2007-LiY #analysis #power management #statistics
Statistical Analysis of Full-Chip Leakage Power Considering Junction Tunneling Leakage (TL, ZY), pp. 99–102.
DACDAC-2007-Natale #analysis #challenge
Virtual Platforms and Timing Analysis: Status, Challenges and Future Directions (MDN), pp. 551–555.
DACDAC-2007-PimentelP #analysis
Experimental Jitter Analysis in a FlexCAN Based Drive-by-Wire Automotive Application (JRP, JP), pp. 290–293.
DACDAC-2007-RamalingamSNOP #analysis #composition #modelling #using
Accurate Waveform Modeling using Singular Value Decomposition with Applications to Timing Analysis (AR, AKS, SRN, MO, DZP), pp. 148–153.
DACDAC-2007-SeokHSB #analysis #design #optimisation
Analysis and Optimization of Sleep Modes in Subthreshold Circuit Design (MS, SH, DS, DB), pp. 694–699.
DACDAC-2007-SinghalBSLNC #analysis #modelling #simulation
Modeling and Analysis of Non-Rectangular Gate for Post-Lithography Circuit Simulation (RS, AB, ARS, FL, SRN, YC), pp. 823–828.
DACDAC-2007-SundaresanM #analysis #distributed
An Analysis of Timing Violations Due to Spatially Distributed Thermal Effects in Global Wires (KS, NRM), pp. 515–520.
DACDAC-2007-VenkataramaniBCG #analysis
Global Critical Path: A Tool for System-Level Timing Analysis (GV, MB, TC, SCG), pp. 783–786.
DACDAC-2007-YuDFL #analysis #framework #nondeterminism #process #statistics
A Framework for Accounting for Process Model Uncertainty in Statistical Static Timing Analysis (GY, WD, ZF, PL), pp. 829–834.
DATEDATE-2007-0004XJ #analysis #novel #statistics
A novel criticality computation method in statistical timing analysis (FW, YX, HJ), pp. 1611–1616.
DATEDATE-2007-AarajRRJ #analysis #energy #execution #framework
Energy and execution time analysis of a software-based trusted platform module (NA, AR, SR, NKJ), pp. 1128–1133.
DATEDATE-2007-BauerPT #analysis #hybrid #modelling
Tool-support for the analysis of hybrid systems and models (AB, MP, MT), pp. 924–929.
DATEDATE-2007-BondarevCW #analysis #component #design #embedded #named #performance #tool support
CARAT: a toolkit for design and performance analysis of component-based embedded systems (ERVB, MRVC, PHNdW), pp. 1024–1029.
DATEDATE-2007-BorremansLWR #analysis #multi #using
Nonlinearity analysis of Analog/RF circuits using combined multisine and volterra analysis (JB, LDL, PW, YR), pp. 261–266.
DATEDATE-2007-BronckersSPVR #analysis #interactive #simulation #verification
Interactive presentation: Simulation methodology and experimental verification for the analysis of substrate noise on LC-VCO’s (SB, CS, GVdP, GV, YR), pp. 1520–1525.
DATEDATE-2007-ChenZLC #analysis #performance #statistics
Fast statistical circuit analysis with finite-point based transistor model (MC, WZ, FL, YC), pp. 1391–1396.
DATEDATE-2007-ChoudhuryM #analysis #logic #reliability #scalability
Accurate and scalable reliability analysis of logic circuits (MRC, KM), pp. 1454–1459.
DATEDATE-2007-DasM #analysis
Sensitivity analysis for fault-analysis and tolerance in RF front-end circuitry (TD, PRM), pp. 1277–1282.
DATEDATE-2007-DuboisMAWLW #analysis #embedded #quality
Test quality analysis and improvement for an embedded asynchronous FIFO (TD, EJM, MA, PW, EL, CW), pp. 859–864.
DATEDATE-2007-ErdoganO #analysis #using
An ADC-BiST scheme using sequential code analysis (ESE, SO), pp. 713–718.
DATEDATE-2007-GargM #analysis #design #interactive #multi #process #throughput
Interactive presentation: System-level process variation driven throughput analysis for single and multiple voltage-frequency island designs (SG, DM), pp. 403–408.
DATEDATE-2007-HuangT #analysis #correlation #multi #performance #using
Performance analysis of multimedia applications using correlated streams (KH, LT), pp. 912–917.
DATEDATE-2007-JuCR #analysis #scheduling
Accounting for cache-related preemption delay in dynamic priority schedulability analysis (LJ, SC, AR), pp. 1623–1628.
DATEDATE-2007-LasbouyguesWAM #analysis
Temperature and voltage aware timing analysis: application to voltage drops (BL, RW, NA, PM), pp. 1012–1017.
DATEDATE-2007-Miskov-ZivanovM #analysis #fault
Soft error rate analysis for sequential circuits (NMZ, DM), pp. 1436–1441.
DATEDATE-2007-NardiTNAGLS #analysis #design #statistics
Use of statistical timing analysis on real designs (AN, ET, SN, AA, SG, TL, JS), pp. 1605–1610.
DATEDATE-2007-NeyGLPVB #analysis #fault
Slow write driver faults in 65nm SRAM technology: analysis and March test solution (AN, PG, CL, SP, AV, MB), pp. 528–533.
DATEDATE-2007-OgrasM #analysis #modelling #performance
Analytical router modeling for networks-on-chip performance analysis (ÜYO, RM), pp. 1096–1101.
DATEDATE-2007-PanC #analysis #component #fault #framework #quality #reliability
A framework for system reliability analysis considering both system error tolerance and component test quality (SJ(RP, KTC), pp. 1581–1586.
DATEDATE-2007-SchlieckerSE #analysis #composition #data flow #graph #integration #performance
Performance analysis of complex systems by integration of dataflow graphs and compositional performance analysis (SS, SS, RE), pp. 273–278.
DATEDATE-2007-TadesseSLBG #analysis #modelling #satisfiability #using
Accurate timing analysis using SAT and pattern-dependent delay models (DT, DS, EL, RIB, JG), pp. 1018–1023.
DATEDATE-2007-TannirK #analysis #performance
Efficient nonlinear distortion analysis of RF circuits (DT, RK), pp. 255–260.
DATEDATE-2007-TiwaryP #analysis #named
WAVSTAN: waveform based variational static timing analysis (SKT, JRP), pp. 1000–1005.
DATEDATE-2007-XuRC #analysis #interactive #pipes and filters #power management
Interactive presentation: Analysis of power consumption and BER of flip-flop based interconnect pipelining (JX, AR, MHC), pp. 1218–1223.
DATEDATE-2007-ZhangOSFKB #analysis #approach #named #parametricity #process
CMCal: an accurate analytical approach for the analysis of process variations with non-gaussian parameters and nonlinear functions (MZ, MO, DS, MF, HK, EB), pp. 243–248.
DocEngDocEng-2007-ZouLT #analysis #approach #html #markov
Structure and content analysis for html medical articles: a hidden markov model approach (JZ, DXL, GRT), pp. 199–201.
DRRDRR-2007-ZouLT #analysis #layout #online
Online medical journal article layout analysis (JZ, DXL, GRT).
HTHT-2007-HalveyK #analysis #online #video
Analysis of online video search and sharing (MH, MTK), pp. 217–226.
ICDARICDAR-2007-AntonacopoulosB #analysis #framework #layout #performance
Performance Analysis Framework for Layout Analysis Methods (AA, DB), pp. 1258–1262.
ICDARICDAR-2007-BelaidRF #analysis #data transformation #documentation #image #representation #xml
XML Data Representation in Document Image Analysis (AB, YR, IF), pp. 78–82.
ICDARICDAR-2007-BoussellaaZTAB #analysis #documentation #named #preprocessor
PRAAD: Preprocessing and Analysis Tool for Arabic Ancient Documents (WB, AZ, BT, AMA, AB), pp. 1058–1062.
ICDARICDAR-2007-BulacuKSZ #analysis #documentation #layout
Layout Analysis of Handwritten Historical Documents for Searching the Archive of the Cabinet of the Dutch Queen (MB, RvK, LS, TvdZ), pp. 357–361.
ICDARICDAR-2007-GazzahA #analysis #identification #using
Arabic Handwriting Texture Analysis for Writer Identification Using the DWT-Lifting Scheme (SG, NEBA), pp. 1133–1137.
ICDARICDAR-2007-HerouxBAT #analysis #automation #comprehension #documentation #generative #image
Automatic Ground-truth Generation for Document Image Analysis and Understanding (PH, EB, SA, ÉT), pp. 476–480.
ICDARICDAR-2007-HiranoOOY #analysis #documentation #information management #layout
Text and Layout Information Extraction from Document Files of Various Formats Based on the Analysis of Page Description Language (TH, YO, YO, FY), pp. 262–266.
ICDARICDAR-2007-KoklaPK #analysis #image
Ink Discrimination Based on Co-occurrence Analysis of Visible and Infrared Images (VK, AP, VK), pp. 1148–1152.
ICDARICDAR-2007-KwonP #analysis #implementation #recognition
Implementation of Content Analysis System for Recognition of Journals_ Table of Contents (YBK, JP), pp. 1018–1022.
ICDARICDAR-2007-LemaitreGP #2d #analysis #approach #layout #markov
Preliminary experiments in layout analysis of handwritten letters based on textural and spatial information and a 2D Markovian approach (ML, EG, FJP), pp. 1023–1027.
ICDARICDAR-2007-MinagawaFTF #analysis #image #layout #logic
Logical Structure Analysis for Form Images with Arbitrary Layout by Belief Propagation (AM, YF, HT, KF), pp. 714–718.
ICDARICDAR-2007-SekiFNSM #analysis #documentation #information management #using
Information Management System Using Structure Analysis of Paper/Electronic Documents and Its Applications (MS, MF, TN, HS, KM), pp. 689–693.
ICDARICDAR-2007-Silva #analysis #documentation #metric #performance
New Metrics for Evaluating Performance in Document Analysis Tasks_Application to the Table Case (ACeS), pp. 481–485.
ICDARICDAR-2007-SmirnovaW #analysis #aspect-oriented
Aspects of Mathematical Expression Analysis in Arabic Handwriting (ESS, SMW), pp. 1183–1187.
ICDARICDAR-2007-TerradesTV #analysis #bibliography #documentation
A Review of Shape Descriptors for Document Analysis (ORT, ST, EV), pp. 227–231.
SIGMODSIGMOD-2007-RusuD #analysis #sketching #statistics
Statistical analysis of sketch estimators (FR, AD), pp. 187–198.
SIGMODSIGMOD-2007-StahlbergML #analysis #database #forensics #privacy
Threats to privacy in the forensic analysis of database systems (PS, GM, BNL), pp. 91–102.
VLDBVLDB-2007-BansalK #analysis #named #online
BlogScope: A System for Online Analysis of High Volume Text Streams (NB, NK), pp. 1410–1413.
VLDBVLDB-2007-ParreiraMBCW #analysis #community #social
P2P Authority Analysis for Social Communities (JXP, SM, MB, TC, GW), pp. 1398–1401.
VLDBVLDB-2007-PossNW #analysis #why
Why You Should Run TPC-DS: A Workload Analysis (MP, RON, DW), pp. 1138–1149.
CSEETCSEET-2007-SobelC #analysis #design #formal method
Supporting the Formal Analysis of Software Designs (AEKS, SC), pp. 123–132.
CSEETCSEET-2007-Staron #analysis #learning #student #using
Using Students as Subjects in Experiments--A Quantitative Analysis of the Influence of Experimentation on Students’ Learning Proces (MS), pp. 221–228.
CSEETCSEET-2007-TakemuraNHM #analysis #education #motivation #programming
Analysis of the Relation between the Teaching Materials and Motivation in Programming Education (YT, HN, KLH, KiM), pp. 317–326.
ITiCSEITiCSE-2007-Bower #analysis #concept #independence #online
Independent, synchronous and asynchronous an analysis of approaches to online concept formation (MB), pp. 141–145.
WRLAWRLA-J-2004-MeseguerT07 #analysis #encryption #protocol #reachability #using #verification
Symbolic reachability analysis using narrowing and its application to verification of cryptographic protocols (JM, PT), pp. 123–160.
WRLAWRLA-2006-KatelmanM07 #analysis #co-evolution #design #hardware #semantics
A Rewriting Semantics for ABEL with Applications to Hardware/Software Co-Design and Analysis (MK, JM), pp. 47–60.
ESOPESOP-2007-AlbertAGPZ #bytecode #cost analysis #java
Cost Analysis of Java Bytecode (EA, PA, SG, GP, DZ), pp. 157–172.
ESOPESOP-2007-GaubertGTZ #policy #relational #static analysis
Static Analysis by Policy Iteration on Relational Domains (SG, EG, AT, SZ), pp. 237–252.
ESOPESOP-2007-GulwaniT #analysis #interprocedural #summary
Computing Procedure Summaries for Interprocedural Analysis (SG, AT), pp. 253–267.
ESOPESOP-2007-RinetzkyPRSY #analysis #composition #encapsulation #source code
Modular Shape Analysis for Dynamically Encapsulated Programs (NR, APH, GR, MS, EY), pp. 220–236.
ESOPESOP-2007-SuenagaK #analysis #calculus #concurrent #type system
Type-Based Analysis of Deadlock for a Concurrent Calculus with Interrupts (KS, NK), pp. 490–504.
ESOPESOP-2007-Versari #analysis #calculus #comparative
A Core Calculus for a Comparative Analysis of Bio-inspired Calculi (CV), pp. 411–425.
FASEFASE-2007-CortellessaMI #analysis #framework #non-functional #performance #reliability
Integrating Performance and Reliability Analysis in a Non-Functional MDA Framework (VC, ADM, PI), pp. 57–71.
FASEFASE-2007-EdwardsMM #architecture #distributed #dynamic analysis
Scenario-Driven Dynamic Analysis of Distributed Architectures (GE, SM, NM), pp. 125–139.
FoSSaCSFoSSaCS-2007-BartolettiDFZ #analysis #resource management
Types and Effects for Resource Usage Analysis (MB, PD, GLF, RZ), pp. 32–47.
FoSSaCSFoSSaCS-2007-HagueO #analysis #automaton #higher-order
Symbolic Backwards-Reachability Analysis for Higher-Order Pushdown Systems (MH, CHLO), pp. 213–227.
TACASTACAS-2007-AnandOH #analysis #execution #program transformation #symbolic computation
Type-Dependence Analysis and Program Transformation for Symbolic Execution (SA, AO, MJH), pp. 117–133.
TACASTACAS-2007-BlomCLOPPDW #analysis #case study #distributed
Distributed Analysis with µCRL: A Compendium of Case Studies (SB, JRC, BL, SO, JP, JvdP, MTD, AW), pp. 683–689.
TACASTACAS-2007-CortierKS #analysis #automation #security
Automatic Analysis of the Security of XOR-Based Key Management Schemes (VC, GK, GS), pp. 538–552.
TACASTACAS-2007-FarzanM #analysis #concurrent #data flow #source code
Causal Dataflow Analysis for Concurrent Programs (AF, PM), pp. 102–116.
TACASTACAS-2007-FriasPM #alloy #analysis #specification #verification
Alloy Analyzer+PVS in the Analysis and Verification of Alloy Specifications (MFF, CLP, MMM), pp. 587–601.
TACASTACAS-2007-ManevichBCRS #analysis #composition #graph
Shape Analysis by Graph Decomposition (RM, JB, BC, GR, MS), pp. 3–18.
CSMRCSMR-2007-Boogerd #evolution #program analysis #reliability
Supporting Reliable Software Evolution through Program Analysis (CB), pp. 341–344.
CSMRCSMR-2007-LoeschP #concept analysis #product line #using #variability
Restructuring Variability in Software Product Lines using Concept Analysis of Product Configurations (FL, EP), pp. 159–170.
CSMRCSMR-2007-Staiger #source code #static analysis #user interface #visual notation
Static Analysis of Programs with Graphical User Interface (SS), pp. 252–264.
CSMRCSMR-2007-Stoermer #analysis #architecture #quality #re-engineering
Software Quality Attribute Analysis by Architecture Reconstruction (SQUA3RE) (CS), pp. 361–364.
ICPCICPC-2007-PoshyvanykM #concept analysis #information retrieval #source code
Combining Formal Concept Analysis with Information Retrieval for Concept Location in Source Code (DP, AM), pp. 37–48.
ICPCICPC-2007-ZhangI #analysis #fault
Error Report Driven Post-Mortem Analysis (YZ, SPI), pp. 208–220.
ICSMEICSM-2007-BrandBS #analysis #debugging #detection
Evidence-Based Analysis and Inferring Preconditions for Bug Detection (DB, MB, VCS), pp. 44–53.
ICSMEICSM-2007-Bruntink #analysis #legacy
Analysis and Transformation of Idiomatic Crosscutting Concerns in Legacy Software Systems (MB), pp. 499–500.
ICSMEICSM-2007-CapraFM #analysis #empirical #maintenance #open source
The Economics of Open Source Software: An Empirical Analysis of Maintenance Costs (EC, CF, FM), pp. 395–404.
ICSMEICSM-2007-Chaabane #analysis #detection
Poor Performing Patterns of Code: Analysis and Detection (RC), pp. 501–502.
ICSMEICSM-2007-CossetteW #analysis #dependence #evaluation #semiparsing #using
Polylingual Dependency Analysis Using Island Grammars: A Cost Versus Accuracy Evaluation (BC, RJW), pp. 214–223.
ICSMEICSM-2007-DongG #analysis #dependence #object-oriented
System-level Usage Dependency Analysis of Object-Oriented Systems (XD, MWG), pp. 375–384.
ICSMEICSM-2007-LuccaFT #classification #concept analysis #using #web
Web Pages Classification using Concept Analysis (GADL, ARF, PT), pp. 385–394.
ICSMEICSM-2007-McMasterM #analysis #detection #fault #probability #reduction #testing
Fault Detection Probability Analysis for Coverage-Based Test Suite Reduction (SM, AMM), pp. 335–344.
MSRMSR-2007-HerraizGR07a #analysis #eclipse #using
Forecasting the Number of Changes in Eclipse Using Time Series Analysis (IH, JMGB, GR), p. 32.
MSRMSR-2007-LivieriHMI #analysis #evolution #kernel #linux #using
Analysis of the Linux Kernel Evolution Using Code Clone Coverage (SL, YH, MM, KI), p. 22.
MSRMSR-2007-MorisakiMMTM #data analysis #fault #mining
Defect Data Analysis Based on Extended Association Rule Mining (SM, AM, TM, HT, KiM), p. 3.
MSRMSR-2007-RigbyH #analysis #developer #what
What Can OSS Mailing Lists Tell Us? A Preliminary Psychometric Text Analysis of the Apache Developer Mailing List (PCR, AEH), p. 23.
PASTEPASTE-2007-AyewahPMPZ #fault #static analysis
Evaluating static analysis defect warnings on production software (NA, WP, JDM, JP, YZ), pp. 1–8.
PASTEPASTE-2007-Brown #analysis #composition #integration #named
AWE: improving software analysis through modular integration of static and dynamic analyses (REB), pp. 69–74.
PASTEPASTE-2007-FosterHP #quality #static analysis
Improving software quality with static analysis (JSF, MWH, WP), pp. 83–84.
PASTEPASTE-2007-LeS #analysis #detection
Refining buffer overflow detection via demand-driven path-sensitive analysis (WL, MLS), pp. 63–68.
PASTEPASTE-2007-MarronSHK #analysis #library
Heap analysis in the presence of collection libraries (MM, DS, MVH, DK), pp. 31–36.
PASTEPASTE-2007-Milanova #analysis #java #points-to
Light context-sensitive points-to analysis for java (AM), pp. 25–30.
PASTEPASTE-2007-PollockVSHFM #natural language #program analysis
Introducing natural language program analysis (LLP, KVS, DCS, EH, ZPF, KM), pp. 15–16.
PASTEPASTE-2007-QianXM #alias #analysis #data flow #dependence
Interstatement must aliases for data dependence analysis of heap locations (JQ, BX, HM), pp. 17–24.
PASTEPASTE-2007-ShepherdPV #case study #natural language #program analysis #reverse engineering
Case study: supplementing program analysis with natural language analysis to improve a reverse engineering task (DCS, LLP, KVS), pp. 49–54.
PASTEPASTE-2007-XuPV #analysis #java #source code
Dynamic purity analysis for java programs (HX, CJFP, CV), pp. 75–82.
SCAMSCAM-2007-GutzmannLL #analysis #points-to #towards
Towards Path-Sensitive Points-to Analysis (TG, JL, WL), pp. 59–68.
SCAMSCAM-2007-Marinescu #analysis #design #enterprise #named
DATES: Design Analysis Tool for Enterprise Systems (CM), pp. 157–158.
SCAMSCAM-2007-MoorVHAEOST #analysis #source code
Keynote Address: .QL for Source Code Analysis (OdM, MV, EH, PA, TE, NO, DS, JT), pp. 3–16.
WCREWCRE-2007-Cornelissen #architecture #dynamic analysis #re-engineering
Dynamic Analysis Techniques for the Reconstruction of Architectural Views (BC), pp. 281–284.
PEPMPEPM-2007-MollerS #graph #program analysis #xml
XML graphs in program analysis (AM, MIS), pp. 1–10.
PLDIPLDI-2007-CheremPR #analysis #detection #memory management #using
Practical memory leak detection using guarded value-flow analysis (SC, LP, RR), pp. 480–491.
PLDIPLDI-2007-GenevesLS #performance #static analysis #xml
Efficient static analysis of XML paths and types (PG, NL, AS), pp. 342–351.
PLDIPLDI-2007-GotsmanBCS #analysis #thread
Thread-modular shape analysis (AG, JB, BC, MS), pp. 266–277.
PLDIPLDI-2007-GuoVA #analysis #induction #recursion #synthesis
Shape analysis with inductive recursion synthesis (BG, NV, DIA), pp. 256–265.
PLDIPLDI-2007-HardekopfL #analysis #performance #pointer
The ant and the grasshopper: fast and accurate pointer analysis for millions of lines of code (BH, CL), pp. 290–299.
PLDIPLDI-2007-LattnerLA #analysis #points-to
Making context-sensitive points-to analysis with heap cloning practical for the real world (CL, AL, VSA), pp. 278–289.
PLDIPLDI-2007-NarayanasamyWTEC #analysis #automation
Automatically classifying benign and harmful data racesallusing replay analysis (SN, ZW, JT, AE, BC), pp. 22–31.
PLDIPLDI-2007-WassermannS #analysis #injection #precise #web
Sound and precise analysis of web applications for injection vulnerabilities (GW, ZS), pp. 32–41.
SASSAS-2007-BauerW #abstraction #communication #static analysis
Static Analysis of Dynamic Communication Systems by Partner Abstraction (JB, RW), pp. 249–264.
SASSAS-2007-CalcagnoDOY #analysis
Footprint Analysis: A Shape Analysis That Discovers Preconditions (CC, DD, PWO, HY), pp. 402–418.
SASSAS-2007-ChangRN #analysis #invariant
Shape Analysis with Structural Invariant Checkers (BYEC, XR, GCN), pp. 384–401.
SASSAS-2007-GopanR #static analysis
Guided Static Analysis (DG, TWR), pp. 349–365.
SASSAS-2007-HardekopfL #analysis #equivalence #pointer
Exploiting Pointer and Location Equivalence to Optimize Pointer Analysis (BH, CL), pp. 265–280.
SASSAS-2007-KamilY #analysis #distributed #pointer #source code
Hierarchical Pointer Analysis for Distributed Programs (AK, KAY), pp. 281–297.
SASSAS-2007-LerouxS #analysis #data flow
Accelerated Data-Flow Analysis (JL, GS), pp. 184–199.
SASSAS-2007-MagillBCC #analysis
Arithmetic Strengthening for Shape Analysis (SM, JB, EMC, BC), pp. 419–436.
SASSAS-2007-Mycroft #analysis #design #evolution #hardware #motivation #programming language
Programming Language Design and Analysis Motivated by Hardware Evolution (AM), pp. 18–33.
SASSAS-2007-PayetS #analysis #bytecode #java
Magic-Sets Transformation for the Analysis of Java Bytecode (ÉP, FS), pp. 452–467.
SASSAS-2007-SankaranarayananIG #program analysis #using
Program Analysis Using Symbolic Ranges (SS, FI, AG), pp. 366–383.
STOCSTOC-2007-BorgsCDR #analysis
First to market is not everything: an analysis of preferential attachment with fitness (CB, JTC, CD, SR), pp. 135–144.
STOCSTOC-2007-NissimRS #data analysis
Smooth sensitivity and sampling in private data analysis (KN, SR, AS), pp. 75–84.
IFMIFM-2007-KongOF #algebra #analysis #formal method
Algebraic Approaches to Formal Analysis of the Mondex Electronic Purse System (WK, KO, KF), pp. 393–412.
IFMIFM-2007-PostK #linux #static analysis #verification
Integrated Static Analysis for Linux Device Driver Verification (HP, WK), pp. 518–537.
SFMSFM-2007-GribaudoT #analysis #modelling #performance
Fluid Models in Performance Analysis (MG, MT), pp. 271–317.
ICFPICFP-2007-HageHM #analysis
A generic usage analysis with subeffect qualifiers (JH, SH, AM), pp. 235–246.
ICFPICFP-2007-HornM #analysis #complexity #control flow #precise
Relating complexity and precision in control flow analysis (DVH, HGM), pp. 85–96.
ICFPICFP-2007-Sereni #analysis #functional #graph #higher-order #source code #termination
Termination analysis and call graph construction for higher-order functional programs (DS), pp. 71–84.
LISPILC-2007-GencerGT #analysis #lisp #named #network #social
CL-SNA: social network analysis with Lisp (MG, CG, VST), p. 17.
LISPILC-2007-Harmon #analysis #lisp #tool support
Computational tools for the analysis of spatial patterns of gene expression in Common Lisp (CLH), p. 18.
AGTIVEAGTIVE-2007-BauerDTW #analysis #constraints #ocl #synthesis #verification
Verification and Synthesis of OCL Constraints Via Topology Analysis (JB, WD, TT, BW), pp. 361–376.
AGTIVEAGTIVE-2007-ErmelE #analysis #configuration management #simulation #visualisation
Visualization, Simulation and Analysis of Reconfigurable Systems (CE, KE), pp. 265–280.
CHICHI-2007-GuimbretiereDH #analysis #interactive #named
ExperiScope: an analysis tool for interaction data (FG, MD, KH), pp. 1333–1342.
CHICHI-2007-HornbaekL #correlation #metric #usability
Meta-analysis of correlations among usability measures (KH, ELCL), pp. 617–626.
CHICHI-2007-IqbalH #analysis #case study
Disruption and recovery of computing tasks: field study, analysis, and directions (STI, EH), pp. 677–686.
CHICHI-2007-KunoSKYYK #analysis #interactive
Museum guide robot based on sociological interaction analysis (YK, KS, MK, KY, AY, HK), pp. 1191–1194.
CHICHI-2007-YeeBR #case study #experience #user interface
A meta-analysis of the impact of the inclusion and realism of human-like faces on user experiences in interfaces (NY, JNB, KR), pp. 1–10.
HCIDHM-2007-Godil #analysis #representation
Advanced Human Body and Head Shape Representation and Analysis (AG), pp. 92–100.
HCIDHM-2007-HaoJZZ #3d #analysis #finite
A Finite Element 3D Model of in Vivo Human Knee Joint Based on MRI for the Tibiofemoral Joint Contact Analysis (ZH, DJ, YZ, JZ), pp. 616–622.
HCIDHM-2007-HuWWJJZCZ #analysis #component #finite
Finite Element Analysis of a Six-Component Force Sensor for the Trans-Femoral Prosthesis (XH, RW, FW, DJ, XJ, JZ, FC, SZ), pp. 633–639.
HCIDHM-2007-JiangSZLL #analysis
Shape Analysis of Human Brain with Cognitive Disorders (TJ, FS, WZ, SL, XL), pp. 409–414.
HCIDHM-2007-MariasDSZGMMT #analysis #information management #modelling #multi #validation
Multi-level Analysis and Information Extraction Considerations for Validating 4D Models of Human Function (KM, DDD, GSS, FZ, ECG, TM, TGM, IGT), pp. 703–709.
HCIDHM-2007-MeulenS #analysis #named
Ramsis — The Leading Cad Tool for Ergonomic Analysis of Vehicles (PvdM, AS), pp. 1008–1017.
HCIDHM-2007-NiuLS #3d #analysis #bibliography #comparison #perspective
Mathematical Methods for Shape Analysis and form Comparison in 3D Anthropometry: A Literature Review (JN, ZL, GS), pp. 161–170.
HCIDHM-2007-TianDM #analysis #design #interactive
Effecting Validity of Ergonomics Analysis During Virtual Interactive Design (RT, VGD, JM), pp. 988–997.
HCIDHM-2007-WertherMR #analysis #petri net #process #simulation
Colored Petri Net Based Formal Airport Control Model for Simulation and Analysis of Airport Control Processes (BW, CM, MR), pp. 1027–1036.
HCIDHM-2007-YangWZJW #analysis
Redundant Muscular Force Analysis of Human Lower Limbs During Rising from a Squat (YY, RW, MZ, DJ, FW), pp. 259–267.
HCIDHM-2007-YangWZJW07a #analysis
Optimal Control and Synergic Pattern Analysis of Upper Limb Reaching-Grasping Movements (YY, RW, MZ, DJ, FW), pp. 268–275.
HCIDHM-2007-ZhangZPY #analysis #linear #multi
Estimating Mental Fatigue Based on Multichannel Linear Descriptors Analysis (CZ, CZ, XmP, XY), pp. 521–529.
HCIHCI-AS-2007-ChoiLU #analysis #internet #user interface
Analysis of Internet Users’ Interests Based on Windows GUI Messages (JC, GL, YU), pp. 881–888.
HCIHCI-AS-2007-HeHDZM #analysis #bibliography #design #optimisation #reliability
A Review of Possibilistic Approaches to Reliability Analysis and Optimization in Engineering Design (LPH, HZH, LD, XDZ, QM), pp. 1075–1084.
HCIHCI-AS-2007-HosonoGIT #analysis
ATM Advertisement and Financial Preferences with Sensory Analysis (NH, SG, HI, YT), pp. 42–47.
HCIHCI-AS-2007-KimuraTHTAOT #analysis #approach #using
The Analysis of Near-Miss Cases Using Data-Mining Approach (MK, KT, TH, YT, TA, MO, FT), pp. 474–483.
HCIHCI-AS-2007-Song #analysis #complexity #segmentation #visual notation #web
Analysis of Web Page Complexity Through Visual Segmentation (GS), pp. 114–123.
HCIHCI-AS-2007-YiJ #analysis #approach #online #protocol
The Antecedents of Online Consumers’ Perceived Usefulness of Website: A Protocol Analysis Approach (CY, ZJ), pp. 142–149.
HCIHCI-IDU-2007-AnastassovaMB #analysis #design #evaluation #prototype
Prototype Evaluation and User-Needs Analysis in the Early Design of Emerging Technologies (MA, CM, JMB), pp. 383–392.
HCIHCI-IDU-2007-Cox #analysis #usability
Task Analysis, Usability and Engagement (DC), pp. 1072–1081.
HCIHCI-IDU-2007-HuangLC #analysis #usability
The Practices of Usability Analysis to Wireless Facility Controller for Conference Room (DHH, YZL, WKC), pp. 490–498.
HCIHCI-IDU-2007-HwangS #detection #problem #usability #what
What Makes Evaluators to Find More Usability Problems?: A Meta-analysis for Individual Detection Rates (WH, GS), pp. 499–507.
HCIHCI-IDU-2007-Karjalainen #analysis #why
Why It Is Difficult to Use a Simple Device: An Analysis of a Room Thermostat (SK), pp. 544–548.
HCIHCI-IDU-2007-Nguyen-Ngoc #analysis #design #process
Activity Theoretical Analysis and Design Model for Web-Based Experimentation (AVNN), pp. 204–213.
HCIHCI-IDU-2007-YinC #analysis #automation #metric #speech #towards
Towards Automatic Cognitive Load Measurement from Speech Analysis (BY, FC), pp. 1011–1020.
HCIHCI-IPT-2007-CowellHBFBJDJF #analysis #framework #validation
Construction and Validation of a Neurophysio-technological Framework for Imagery Analysis (AJC, KSH, CB, SF, AB, DJ, GD, RJ, RF), pp. 1096–1105.
HCIHCI-IPT-2007-NishimuraRDCSPDD #analysis #functional
Functional Brain Imaging for Analysis of Reading Effort for Computer-Generated Text (EMN, EDR, BAD, JPC, JS, DP, THD, JHD), pp. 1183–1192.
HCIHCI-MIE-2007-HanYYJ #analysis #automation #image #mobile #semantics #using
Automatic Mobile Content Conversion Using Semantic Image Analysis (EH, JY, HY, KJ), pp. 298–307.
HCIHCI-MIE-2007-HilligesKPBK #analysis #automation #classification #image #quality #sorting #using
Browsing and Sorting Digital Pictures Using Automatic Image Classification and Quality Analysis (OH, PK, AP, AB, HPK), pp. 882–891.
HCIHCI-MIE-2007-JenkinsCCS #analysis #interactive
Analysis of User Interaction with Service Oriented Chatbot Systems (MCJ, RC, SJC, DS), pp. 76–83.
HCIHCI-MIE-2007-KimLRHH #analysis #design #network #performance #quality #speech
Performance Analysis of Perceptual Speech Quality and Modules Design for Management over IP Network (JK, HWL, WR, SHH, MH), pp. 84–93.
HCIHIMI-IIE-2007-HsuCSWY #analysis #assessment #game studies #interface #online #using
Function Interfaces Assessment of Online Game Websites in Great China Area Using Content Analysis (CIH, CC, CHS, PJW, YJY), pp. 337–346.
HCIHIMI-IIE-2007-KanekoNATT #analysis #generative #mining #using
A Method for Generating Plans for Retail Store Improvements Using Text Mining and Conjoint Analysis (TK, YN, MA, TT, YT), pp. 910–917.
HCIHIMI-IIE-2007-MaungK #data analysis #web
Web Application for Data Analysis by Means of Evidential Dominance (ZAHM, YK), pp. 749–758.
HCIHIMI-IIE-2007-ParkZ #analysis #distributed
Requirement Analysis of the Portal Site Serving Distributed Climate Data for e-Science (TP, LZ), pp. 450–456.
HCIHIMI-IIE-2007-SatoA #analysis #behaviour
Analysis of Naturalistic Driving Behavior While Approaching an Intersection and Implications for Route Guidance Presentation (TS, MA), pp. 618–627.
HCIHIMI-IIE-2007-TaguchiAT #analysis
Information on the Causal Relationship Between Store kaizen and Store Features That Attract Customers by Covariance Structural Analysis (YT, YA, TT), pp. 973–982.
HCIHIMI-IIE-2007-ZhangC #analysis #behaviour #collaboration
A Communicative Behaviour Analysis of Art-Technology Collaboration (YZ, LC), pp. 212–221.
HCIHIMI-IIE-2007-ZhangYIS #analysis #case study #development #energy
A Study on Analysis Support System of Energy and Environmental System for Sustainable Development Based on MFM and GIS (QZ, HY, HI, HS), pp. 1148–1157.
HCIHIMI-MTT-2007-BalasuriyaMWO #analysis #ubiquitous
Kansei Analysis for Robotic Motions in Ubiquitous Environments (JCB, CAM, KW, MO), pp. 804–813.
HCIHIMI-MTT-2007-KieliszewskiCBLH #analysis #identification #visualisation
A Visualization Solution for the Analysis and Identification of Workforce Expertise (CAK, JC, AB, AL, TH), pp. 317–326.
HCIHIMI-MTT-2007-KumeM #analysis #web
Construction of Web Application for Cusp Surface Analysis (YK, ZAHM), pp. 669–676.
HCIHIMI-MTT-2007-LeeLKC #analysis #correlation #human-computer #mobile
Correlation Analysis of Available Bandwidth Estimators for Mobile HCI (DL, CL, JK, JWC), pp. 687–696.
HCIHIMI-MTT-2007-LehtoPPL #analysis
Text Analysis of Consumer Reviews: The Case of Virtual Travel Firms (XL, JKP, OP, MRL), pp. 490–499.
HCIHIMI-MTT-2007-LinL #analysis #automation
A Bayesian Methodology for Semi-automated Task Analysis (SCL, MRL), pp. 697–704.
HCIHIMI-MTT-2007-NakayasuNH #analysis #communication #metric #performance
Measurement and Analysis of Performance of Human Perception for Information Communication Technology (HN, MN, HH), pp. 126–135.
HCIHIMI-MTT-2007-OrimoKMT #analysis #evaluation #recommendation
Analysis and Evaluation of Recommendation Systems (EO, HK, TM, AT), pp. 144–152.
HCIHIMI-MTT-2007-ShinyashikiMHKUN #analysis #embedded
A Suggestion for Analysis of Unexpected Obstacles in Embedded System (YS, TM, MH, KK, NU, TN), pp. 755–768.
HCIHIMI-MTT-2007-YonemuraYTO #analysis #communication #visual notation
Communication Analysis of Visual Support System That Uses Line Drawing Expression (SY, TY, YT, JO), pp. 359–365.
HCIOCSC-2007-CetinVF #analysis #development #distributed #human-computer
An Analysis of Involvement of HCI Experts in Distributed Software Development: Practical Issues (, DV, SF), pp. 32–40.
HCIOCSC-2007-DayF #analysis #community #concept #named #network #research
CNA2 — Communications and Community; Neighborhoods and Networks; Action and Analysis: Concepts and Methods for Community Technology Research (PD, CF), pp. 301–314.
VISSOFTVISSOFT-2007-BohnerGHM #analysis #source code #uml #using #visual notation #visualisation
Evolutional Insights from UML and Source Code Versions using Information Visualization and Visual Analysis (SAB, DG, TH, KM), pp. 145–148.
VISSOFTVISSOFT-2007-KienleMM #analysis #challenge #dependence
Dependencies Analysis of Azureus with Rigi: Tool Demo Challenge (HMK, HAM, JM), pp. 159–160.
VISSOFTVISSOFT-2007-LangelierD #analysis #using #visual notation
Visual Analysis of Azureus using VERSO (GL, KD), pp. 163–164.
AdaEuropeAdaEurope-2007-PanunzioV #analysis #metamodelling #modelling #process
A Metamodel-Driven Process Featuring Advanced Model-Based Timing Analysis (MP, TV), pp. 128–141.
AdaSIGAda-2007-Black #static analysis
Static analysis summit II (PEB), pp. 101–107.
AdaSIGAda-2007-Dewar #compilation #static analysis
The compiler as a static analysis tool (RBKD), pp. 83–88.
AdaSIGAda-2007-SinghoffP #analysis #modelling
AADL modeling and analysis of hierarchical schedulers (FS, AP), pp. 41–50.
EDOCEDOC-2007-BaudryNT #analysis #modelling #requirements
Model-Driven Engineering for Requirements Analysis (BB, CN, YLT), pp. 459–466.
EDOCEDOC-2007-GruhnK #analysis #automation #framework #mobile
An Analysis Framework for Mobile Workforce Automation (VG, AK), pp. 193–201.
EDOCEDOC-2007-JohnsonJSU #analysis #architecture #enterprise
A Tool for Enterprise Architecture Analysis (PJ, EJ, TS, JU), pp. 142–156.
EDOCEDOC-2007-NarmanJN #analysis #architecture #enterprise #framework #quality
Enterprise Architecture: A Framework Supporting System Quality Analysis (PN, PJ, LN), pp. 130–141.
ICEISICEIS-AIDSS-2007-Aalst #analysis #mining #process #roadmap #verification
Trends in business process analysis — from verification to process mining (WMPvdA), pp. 5–9.
ICEISICEIS-AIDSS-2007-BecksH #analysis #industrial #mining
Trend Analysis Based on Explorative Data and Text Mining: A Decision Support System for the European Home Textile Industry (AB, JH), pp. 253–258.
ICEISICEIS-AIDSS-2007-Rodriguez-EliasMFVS #analysis #approach #design #identification #information management
Knowledge Flow Analysis to Identify Knowledge Needs for the Design of Knowledge Management Systems and Strategies — A Methodological Approach (OMRE, AIMG, JF, AV, JPS), pp. 492–497.
ICEISICEIS-AIDSS-2007-SohniusJME #analysis #approach #assessment #design #performance #simulation
An Approach for Assessing Design Systems: Design System Simulation and Analysis for Performance Assessment (RS, EJ, WEM, VE), pp. 231–236.
ICEISICEIS-DISI-2007-Aalst #analysis #mining #process #roadmap #verification
Trends in business process analysis — from verification to process mining (WMPvdA), pp. 5–9.
ICEISICEIS-DISI-2007-MatiasM #data analysis #interactive
Revisiting the olap interaction to cope with spatial data and spatial data analysis (RM, JMP), pp. 157–163.
ICEISICEIS-EIS-2007-Aalst #analysis #mining #process #roadmap #verification
Trends in business process analysis — from verification to process mining (WMPvdA), pp. 5–9.
ICEISICEIS-EIS-2007-HuangZZ #analysis #approach #process #workflow
A New Approach for Workflow Process Delta Analysis Based on SYN-NET (XQH, WZ, SZ), pp. 480–488.
ICEISICEIS-EIS-2007-MarquesRFRAAM #analysis #aspect-oriented
Aspect-Oriented Analysis Applied to the Space Domain (AM, RR, RF, RAR, SA, JA, AMDM), pp. 71–79.
ICEISICEIS-HCI-2007-Aalst #analysis #mining #process #roadmap #verification
Trends in business process analysis — from verification to process mining (WMPvdA), pp. 5–9.
ICEISICEIS-HCI-2007-Godet-BarRDJ #analysis #human-computer
Interactional Objects: HCI Concerns in the Analysis Phase of the Symphony Method (GGB, DR, SDC, DJ), pp. 37–44.
ICEISICEIS-J-2007-Aalst07a #analysis #challenge #process
Challenges in Business Process Analysis (WMPvdA), pp. 27–42.
ICEISICEIS-SAIC-2007-Aalst #analysis #mining #process #roadmap #verification
Trends in business process analysis — from verification to process mining (WMPvdA), pp. 5–9.
ICEISICEIS-SAIC-2007-KirikovaSGO #abstraction #analysis #flexibility #process
Analysis of Business Process Flexibility at Different Levels of Abstraction (MK, RS, JG, JO), pp. 389–396.
CIKMCIKM-2007-FortunaRM #analysis #classification #network #social
Improving the classification of newsgroup messages through social network analysis (BF, EMR, NMF), pp. 877–880.
CIKMCIKM-2007-JurczykA #analysis #community #using
Discovering authorities in question answer communities by using link analysis (PJ, EA), pp. 919–922.
CIKMCIKM-2007-RaoCFB #analysis #network #peer-to-peer
Optimal proactive caching in peer-to-peer network: analysis and application (WR, LC, AWCF, YB), pp. 663–672.
CIKMCIKM-2007-TanWTC #analysis #novel #problem #sentiment
A novel scheme for domain-transfer problem in the context of sentiment analysis (ST, GW, HT, XC), pp. 979–982.
CIKMCIKM-2007-YangQZGL #analysis #graph #using #web
Link analysis using time series of web graphs (LY, LQ, YPZ, BG, TYL), pp. 1011–1014.
CIKMCIKM-2007-ZhangYGY #adaptation #analysis #correlation #representation
Boolean representation based data-adaptive correlation analysis over time series streams (TZ, DY, YG, GY), pp. 203–212.
ECIRECIR-2007-MeenaP #analysis #sentiment #using
Sentence Level Sentiment Analysis in the Presence of Conjuncts Using Linguistic Analysis (AM, TVP), pp. 573–580.
ICMLICML-2007-BusseOB #analysis #clustering #rank
Cluster analysis of heterogeneous rank data (LMB, PO, JMB), pp. 113–120.
ICMLICML-2007-CazzantiG #analysis #similarity
Local similarity discriminant analysis (LC, MRG), pp. 137–144.
ICMLICML-2007-dAspremontBG #analysis #component
Full regularization path for sparse principal component analysis (Ad, FRB, LEG), pp. 177–184.
ICMLICML-2007-DingL #adaptation #analysis #clustering #reduction #using
Adaptive dimension reduction using discriminant analysis and K-means clustering (CHQD, TL), pp. 521–528.
ICMLICML-2007-DollarRB #algorithm #analysis #learning
Non-isometric manifold learning: analysis and an algorithm (PD, VR, SJB), pp. 241–248.
ICMLICML-2007-MaLTK #analysis #correlation #similarity
Discriminant analysis in correlation similarity measure space (YM, SL, ET, MK), pp. 577–584.
ICMLICML-2007-Ye #analysis #linear
Least squares linear discriminant analysis (JY), pp. 1087–1093.
ICMLICML-2007-ZhangC #analysis #component #independence
Nonlinear independent component analysis with minimal nonlinear distortion (KZ, LC), pp. 1127–1134.
KDDKDD-2007-CastanoWCST #analysis
On-board analysis of uncalibrated data for a spacecraft at mars (RC, KW, SAC, TMS, BT), pp. 922–930.
KDDKDD-2007-ChiZSTT #analysis #community
Structural and temporal analysis of the blogosphere through community factorization (YC, SZ, XS, JT, BLT), pp. 163–172.
KDDKDD-2007-JanssensGM #analysis #clustering #hybrid #mining
Dynamic hybrid clustering of bioinformatics by incorporating text mining and citation analysis (FALJ, WG, BDM), pp. 360–369.
KDDKDD-2007-MoserGE #analysis #clustering #specification
Joint cluster analysis of attribute and relationship data withouta-priori specification of the number of clusters (FM, RG, ME), pp. 510–519.
KDDKDD-2007-PandeySGGK #case study #interactive #network #predict
Association analysis-based transformations for protein interaction networks: a function prediction case study (GP, MS, RG, TG, VK), pp. 540–549.
KDDKDD-2007-Sandler #analysis #modelling #probability
Hierarchical mixture models: a probabilistic analysis (MS), pp. 580–589.
KDDKDD-2007-WangPM #analysis #component
Generalized component analysis for text with heterogeneous attributes (XW, CP, AM), pp. 794–803.
KDDKDD-2007-WuWCX #analysis #composition
Local decomposition for rare class analysis (JW, HX, PW, JC), pp. 814–823.
KDDKDD-2007-YeJC #analysis #kernel #learning #matrix #polynomial #programming
Learning the kernel matrix in discriminant analysis via quadratically constrained quadratic programming (JY, SJ, JC), pp. 854–863.
MLDMMLDM-2007-GrimH #analysis #category theory #clustering
Minimum Information Loss Cluster Analysis for Categorical Data (JG, JH), pp. 233–247.
SEKESEKE-2007-GaoTHCCF #analysis #modelling #testing #towards
Toward Modeling and Analysis for Software Installation Testing (JZG, ST, CPH, YC, AC, TF), pp. 111–116.
SEKESEKE-2007-KanaskarSR #analysis #approach #detection #using
A Dynamical System Approach to Intrusion Detection Using System Call Analysis (NK, RS, SR), pp. 710–717.
SEKESEKE-2007-ShiN #component #java #named #security #static analysis
SAFES: A Static Analysis for Field Security in Java Components (AS, GN), pp. 302–307.
SEKESEKE-2007-TagliatiJR #analysis #evolution
Requirement Analysis Evolution through Patterns (LVT, RJ, GR), pp. 197–202.
SEKESEKE-2007-VandalGG #analysis #middleware #performance
Performance Analysis of the Active Object Pattern in Middleware (PJV, SSG, ASG), pp. 730–735.
SEKESEKE-2007-VasileB #cost analysis #multi
Cost-based Analysis of Multiple Counter-Examples (FV, SB), pp. 33–38.
SEKESEKE-2007-ZhangHLM #cost analysis #deployment
Pattern-based J2EE Application Deployment with Cost Analysis (NZ, GH, LL, HM), pp. 462–466.
SIGIRSIGIR-2007-AzzopardiRB #analysis #query #topic #using
Building simulated queries for known-item topics: an analysis using six european languages (LA, MdR, KB), pp. 455–462.
SIGIRSIGIR-2007-BozzonCFN #analysis #modelling #query #web
Lexical analysis for modeling web query reformulation (AB, PAC, CSF, WN), pp. 739–740.
SIGIRSIGIR-2007-FernandezL #analysis #detection #using
Novelty detection using local context analysis (RTF, DEL), pp. 725–726.
SIGIRSIGIR-2007-Fujii #analysis #retrieval
Enhancing patent retrieval by citation analysis (AF), pp. 793–794.
SIGIRSIGIR-2007-JurczykA #analysis #ranking
Hits on question answer portals: exploration of link analysis for author ranking (PJ, EA), pp. 845–846.
SIGIRSIGIR-2007-MizzaroR #analysis #evaluation #information retrieval #network
Hits hits TREC: exploring IR evaluation results with network analysis (SM, SR), pp. 479–486.
SIGIRSIGIR-2007-NguyenJYF #analysis #peer-to-peer #query
An analysis of peer-to-peer file-sharing system queries (LTN, DJ, WGY, OF), pp. 855–856.
MODELSMoDELS-2007-JayaramanWEG #analysis #composition #detection #feature model #interactive #product line #using
Model Composition in Product Lines and Feature Interaction Detection Using Critical Pair Analysis (PKJ, JW, AME, HG), pp. 151–165.
MODELSMoDELS-2007-KonradGC #analysis #incremental #modelling #process
i2MAP : An Incremental and Iterative Modeling and Analysis Process (SK, HG, BHCC), pp. 451–466.
MODELSMoDELS-2007-WeilMNDB #analysis #automation #design #modelling #semantics
Automated Semantic Analysis of Design Models (FW, BEM, DN, PD, AvdB), pp. 166–180.
MODELSMoDELS-2007-JayaramanWEG #analysis #composition #detection #feature model #interactive #product line #using
Model Composition in Product Lines and Feature Interaction Detection Using Critical Pair Analysis (PKJ, JW, AME, HG), pp. 151–165.
MODELSMoDELS-2007-KonradGC #analysis #incremental #modelling #process
i2MAP : An Incremental and Iterative Modeling and Analysis Process (SK, HG, BHCC), pp. 451–466.
MODELSMoDELS-2007-WeilMNDB #analysis #automation #design #modelling #semantics
Automated Semantic Analysis of Design Models (FW, BEM, DN, PD, AvdB), pp. 166–180.
ECOOPECOOP-2007-BoddenHL #monitoring #performance #program analysis #runtime #staged
A Staged Static Program Analysis to Improve the Performance of Runtime Monitoring (EB, LJH, OL), pp. 525–549.
OOPSLAOOPSLA-2007-ElkarabliehKVM #named #performance #static analysis
Starc: static analysis for efficient repair of complex data (BE, SK, DV, KSM), pp. 387–404.
OOPSLAOOPSLA-2007-TanM #analysis #c #java #named
Ilea: inter-language analysis across java and c (GT, GM), pp. 39–56.
TOOLSTOOLS-EUROPE-2007-SteimannM #analysis #design #interface #towards
Type Access Analysis: Towards Informed Interface Design (FS, PM), pp. 147–164.
LOPSTRLOPSTR-2007-Mendez-LojoNH #analysis #approach #flexibility #object-oriented #source code
A Flexible, (C)LP-Based Approach to the Analysis of Object-Oriented Programs (MML, JAN, MVH), pp. 154–168.
LOPSTRLOPSTR-2007-NguyenGSS #analysis #dependence #graph #logic programming #source code #termination
Termination Analysis of Logic Programs Based on Dependency Graphs (MTN, JG, PSK, DDS), pp. 8–22.
PPDPPPDP-2007-BentonF #declarative #implementation #interactive #program analysis #prototype #scalability
Interactive, scalable, declarative program analysis: from prototype to implementation (WCB, CNF), pp. 13–24.
PPDPPPDP-2007-HristovaTL #analysis #performance #policy #trust
Efficient trust management policy analysis from rules (KH, KTT, YAL), pp. 211–220.
PPDPPPDP-2007-Sagonas #detection #erlang #fault #source code #static analysis #using
Detecting defects in Erlang programs using static analysis (KFS), p. 37.
QAPLQAPL-2007-PierroHW #analysis #data flow #on the #probability
On Probabilistic Techniques for Data Flow Analysis (ADP, CH, HW), pp. 59–77.
PADLPADL-2007-AlbertGHP #analysis #bytecode #java #logic programming #source code #using #verification
Verification of Java Bytecode Using Analysis and Transformation of Logic Programs (EA, MGZ, LH, GP), pp. 124–139.
PADLPADL-2007-MeraLPCH #execution #profiling #static analysis
Combining Static Analysis and Profiling for Estimating Execution Times (EM, PLG, GP, MC, MVH), pp. 140–154.
POPLPOPL-2007-JhalaM #analysis #interprocedural #source code
Interprocedural analysis of asynchronous programs (RJ, RM), pp. 339–350.
POPLPOPL-2007-KahlonG #analysis #automaton #on the
On the analysis of interacting pushdown systems (VK, AG), pp. 303–314.
POPLPOPL-2007-Might #analysis #higher-order #source code
Logic-flow analysis of higher-order programs (MM), pp. 185–198.
POPLPOPL-2007-WiedermannC #persistent #query #static analysis
Extracting queries by static analysis of transparent persistence (BW, WRC), pp. 199–210.
RERE-2007-MetzgerHPSS #analysis #automation #documentation #formal method #product line #variability
Disambiguating the Documentation of Variability in Software Product Lines: A Separation of Concerns, Formalization and Automated Analysis (AM, PH, KP, PYS, GS), pp. 243–253.
REFSQREFSQ-2007-GuelfiP #analysis #approach #flexibility #product line #requirements
A Flexible Requirements Analysis Approach for Software Product Lines (NG, GP), pp. 78–92.
REFSQREFSQ-2007-RegnellHB #analysis #mobile #non-functional #performance #quality #requirements
A Quality Performance Model for Cost-Benefit Analysis of Non-functional Requirements Applied to the Mobile Handset Domain (BR, MH, RBS), pp. 277–291.
SACSAC-2007-DistanteRC #analysis #framework #modelling #process #web
Modeling business processes in web applications: an analysis framework (DD, GR, GC), pp. 1677–1682.
SACSAC-2007-HwangPJ #analysis #implementation #performance
An implementation and performance analysis of slave-side arbitration schemes for the ML-AHB BusMatrix (SYH, HJP, KSJ), pp. 1545–1551.
SACSAC-2007-KassabL #analysis #effectiveness #personalisation #towards
Towards a synthetic analysis of user’s information need for more effective personalized filtering services (RK, JCL), pp. 852–859.
SACSAC-2007-Liebrock #analysis #integration #re-engineering
Integration of well posedness analysis in software engineering (LML), pp. 1479–1483.
SACSAC-2007-LiebrockMBPCSU #analysis #design #forensics #set
A preliminary design for digital forensics analysis of terabyte size data sets (LML, NM, DPB, RP, EC, MS, VU), pp. 190–191.
SACSAC-2007-PloegerS #analysis #automation #documentation #verification
Analysis and verification of an automatic document feeder (BP, LJS), pp. 1499–1505.
SACSAC-2007-Varma #program analysis #program transformation #recognition
Generalizing recognition of an individual dialect in program analysis and transformation (PV), pp. 1432–1439.
SACSAC-2007-YangWK #analysis #modelling #partial order
General dominant relationship analysis based on partial order models (ZY, BW, MK), pp. 470–474.
SACSAC-2007-ZengWN #analysis #classification
Text classification based on partial least square analysis (XQZ, MWW, JYN), pp. 834–838.
ESEC-FSEESEC-FSE-2007-Coman #analysis #automation #developer #low level #using
An analysis of developers’ tasks using low-level, automatically collected data (IDC), pp. 579–582.
ESEC-FSEESEC-FSE-2007-Diep #analysis
Analysis of a deployed software (MD), pp. 595–598.
ESEC-FSEESEC-FSE-2007-DubocRW #analysis #framework #scalability
A framework for characterization and analysis of software system scalability (LD, DSR, TW), pp. 375–384.
ESEC-FSEESEC-FSE-2007-KumarSCP #analysis #design #framework #optimisation #realtime #statistics
A profile-driven statistical analysis framework for the design optimization of soft real-time applications (TK, JS, RC, SP), pp. 529–532.
ESEC-FSEESEC-FSE-2007-LarssonME #analysis #integration #statistics
Product integration improvement based on analysis of build statistics (SL, PM, FE), pp. 505–508.
ESEC-FSEESEC-FSE-2007-RamasubbuB #analysis #development #distributed #empirical #performance
Globally distributed software development project performance: an empirical analysis (NR, RKB), pp. 125–134.
ESEC-FSEESEC-FSE-2007-SherriffHLW #identification #static analysis #using
Using groupings of static analysis alerts to identify files likely to contain field failures (MS, SSH, JML, LAW), pp. 565–568.
ESEC-FSEESEC-FSE-2007-YuBP #analysis #automation #ocl
Automated size analysis for OCL (FY, TB, EP), pp. 331–340.
GTTSEGTTSE-2007-WykM #analysis #composition #java
Adding Dimension Analysis to Java as a Composable Language Extension (EVW, YM), pp. 442–456.
ICSEICSE-2007-DwyerKE #adaptation #online #program analysis
Adaptive Online Program Analysis (MBD, AK, SGE), pp. 220–229.
ICSEICSE-2007-FuR #analysis #architecture #exception #java
Exception-Chain Analysis: Revealing Exception Handling Architecture in Java Server Applications (CF, BGR), pp. 230–239.
ICSEICSE-2007-GanapathyKJJ #concept analysis #legacy #mining #using
Mining Security-Sensitive Operations in Legacy Code Using Concept Analysis (VG, DK, TJ, SJ), pp. 458–467.
ICSEICSE-2007-Jones #analysis #case study #design #implementation #re-engineering
Bringing the Systems Analysis and Design Course into 21^st Century: A Case Study in Implementing Modern Software Engineering Principles (CGJ), pp. 744–747.
ICSEICSE-2007-LivieriHMI #analysis #distributed #open source #source code #using #visualisation
Very-Large Scale Code Clone Analysis and Visualization of Open Source Programs Using Distributed CCFinder: D-CCFinder (SL, YH, MM, KI), pp. 106–115.
ICSEICSE-2007-RajapakseJ #analysis #trade-off #using #web
Using Server Pages to Unify Clones in Web Applications: A Trade-Off Analysis (DCR, SJ), pp. 116–126.
ICSEICSE-2007-ZaraketAK #analysis #relational
Sequential Circuits for Relational Analysis (FAZ, AA, SK), pp. 13–22.
SPLCSPLC-2007-Jensen #analysis #case study #development #experience #multi #product line
Experiences with Product Line Development of Multi-Discipline Analysis Software at Overwatch Textron Systems (PJ), pp. 35–43.
SPLCSPLC-2007-SchirmeierS #analysis #framework #product line
Tailoring Infrastructure Software Product Lines by Static Application Analysis (HS, OS), pp. 255–260.
CCCC-2007-CheremR #analysis #lightweight #summary
A Practical Escape and Effect Analysis for Building Lightweight Method Summaries (SC, RR), pp. 172–186.
CCCC-2007-FalconerKIMFB #analysis #declarative #framework #optimisation
A Declarative Framework for Analysis and Optimization (HF, PHJK, DMI, MRM, TF, OB), pp. 218–232.
CCCC-2007-ScholzB #analysis #composition #data flow #framework #using
A New Elimination-Based Data Flow Analysis Framework Using Annotated Decomposition Trees (BS, JB), pp. 202–217.
CGOCGO-2007-KotzmannM #analysis #optimisation #runtime
Run-Time Support for Optimizations Based on Escape Analysis (TK, HM), pp. 49–60.
COCVCOCV-2007-GallardoJM #analysis #data flow #on the fly #verification
On-the-Fly Data Flow Analysis Based on Verification Technology (MdMG, CJ, PM), pp. 33–48.
HPDCHPDC-2007-LeeS #analysis #performance #precise
Precise and realistic utility functions for user-centric performance analysis of schedulers (CBL, AS), pp. 107–116.
ISMMISMM-2007-AlbertGG #analysis #bytecode #java
Heap space analysis for java bytecode (EA, SG, MGZ), pp. 105–116.
LCTESLCTES-2007-CoffmanHMW #analysis #parametricity
Generalizing parametric timing analysis (JC, CAH, FM, DBW), pp. 152–154.
LCTESLCTES-2007-Kastner #abstract interpretation #analysis #execution #worst-case
Safe worst-case execution time analysis by abstract interpretation of executable code (DK), p. 135.
LCTESLCTES-2007-YanZ #analysis
WCET analysis of instruction caches with prefetching (JY, WZ), pp. 175–184.
PPoPPPPoPP-2007-AgarwalBSS #analysis #source code
May-happen-in-parallel analysis of X10 programs (SA, RB, VS, RKS), pp. 183–193.
PPoPPPPoPP-2007-KejariwalTGLKBNVP #analysis #concurrent #cpu #performance #specification #thread #using
Tight analysis of the performance potential of thread speculation using spec CPU 2006 (AK, XT, MG, WL, SK, UB, AN, AVV, CDP), pp. 215–225.
SOSPSOSP-2007-SuAF #analysis #configuration management #named #operating system
AutoBash: improving configuration management with operating system causality analysis (YYS, MA, JF), pp. 237–250.
AMOSTAMOST-2007-ChenPU #analysis #dependence #generative #modelling #testing #using
Model-based regression test suite generation using dependence analysis (YC, RLP, HU), pp. 54–62.
CADECADE-2007-TiwariG #logic #program analysis #proving #theorem proving #using
Logical Interpretation: Static Program Analysis Using Theorem Proving (AT, SG), pp. 147–166.
CAVCAV-2007-BerdineCCDOWY #analysis #data type
Shape Analysis for Composite Data Structures (JB, CC, BC, DD, PWO, TW, HY), pp. 178–192.
CAVCAV-2007-BeyerHT #configuration management #convergence #model checking #program analysis #verification
Configurable Software Verification: Concretizing the Convergence of Model Checking and Program Analysis (DB, TAH, GT), pp. 504–518.
CAVCAV-2007-BloemCPRT #analysis #formal method #named #requirements
RAT: A Tool for the Formal Analysis of Requirements (RB, RC, IP, MR, AT), pp. 263–267.
CAVCAV-2007-BogudlovLRS #analysis #parametricity
Revamping TVLA: Making Parametric Shape Analysis Competitive (IB, TLA, TWR, MS), pp. 221–225.
CAVCAV-2007-BouajjaniFQ #analysis #bound #parallel #source code #thread
Context-Bounded Analysis of Multithreaded Programs with Dynamic Linked Structures (AB, SF, SQ), pp. 207–220.
CAVCAV-2007-CharltonH #analysis #model checking #named #plugin
Hector: Software Model Checking with Cooperating Analysis Plugins (NC, MH), pp. 168–172.
CAVCAV-2007-GaravelMLS #analysis #distributed #process
CADP 2006: A Toolbox for the Construction and Analysis of Distributed Processes (HG, RM, FL, WS), pp. 158–163.
CAVCAV-2007-GopanR #analysis #library #low level #summary
Low-Level Library Analysis and Summarization (DG, TWR), pp. 68–81.
CAVCAV-2007-ManoliosSV #analysis #named
BAT: The Bit-Level Analysis Tool (PM, SKS, DV), pp. 303–306.
ICLPICLP-2007-Morozov #analysis #design #logic programming #visual notation
Visual Logic Programming Method Based on Structural Analysis and Design Technique (AAM), pp. 436–437.
ICLPICLP-2007-Naish #analysis #concurrent
Resource-Oriented Deadlock Analysis (LN), pp. 302–316.
ICLPICLP-2007-NavasMLH #analysis #bound #logic programming #source code
User-Definable Resource Bounds Analysis for Logic Programs (JAN, EM, PLG, MVH), pp. 348–363.
ICLPICLP-2007-PhanJ #analysis
Static Region Analysis for Mercury (QP, GJ), pp. 317–332.
ISSTAISSTA-2007-ClauseLO #analysis #framework #named
Dytan: a generic dynamic taint analysis framework (JAC, WL, AO), pp. 196–206.
ISSTAISSTA-2007-DufourRS #analysis #comprehension #performance
Blended analysis for performance understanding of framework-based applications (BD, BGR, GS), pp. 118–128.
ISSTAISSTA-2007-TombBV #detection #fault #interprocedural #program analysis #runtime
Variably interprocedural program analysis for runtime error detection (AT, GPB, WV), pp. 97–107.
RTARTA-2007-HillsR #analysis #logic #named #prototype
KOOL: An Application of Rewriting Logic to Language Prototyping and Analysis (MH, GR), pp. 246–256.
ICSTSAT-2007-FuhsGMSTZ #analysis #polynomial #satisfiability #termination
SAT Solving for Termination Analysis with Polynomial Interpretations (CF, JG, AM, PSK, RT, HZ), pp. 340–354.
TLCATLCA-2007-Marion #analysis
Predicative Analysis of Feasibility and Diagonalization (JYM), pp. 290–304.
TLCATLCA-2007-ShkaravskaKE #analysis #first-order #polynomial
Polynomial Size Analysis of First-Order Functions (OS, RvK, MCJDvE), pp. 351–365.
VMCAIVMCAI-2007-BalabanPZ #analysis
Shape Analysis of Single-Parent Heaps (IB, AP, LDZ), pp. 91–105.
VMCAIVMCAI-2007-CheremR #analysis #invariant #maintenance #reasoning
Maintaining Doubly-Linked List Invariants in Shape Analysis with Local Reasoning (SC, RR), pp. 234–250.
VMCAIVMCAI-2007-Logozzo #abstract interpretation #analysis #composition #java #named #verification
Cibai: An Abstract Interpretation-Based Static Analyzer for Modular Analysis and Verification of Java Classes (FL), pp. 283–298.
VMCAIVMCAI-2007-Namjoshi #analysis #symmetry
Symmetry and Completeness in the Analysis of Parameterized Systems (KSN), pp. 299–313.
VMCAIVMCAI-2007-Yang #analysis #towards
Towards Shape Analysis for Device Drivers (HY), p. 267.
CBSECBSE-2006-GrassiMS #analysis #approach #component #model transformation #performance #reliability
A Model Transformation Approach for the Early Performance and Reliability Analysis of Component-Based Systems (VG, RM, AS), pp. 270–284.
QoSAQoSA-2006-BucchiaroneMP #analysis #architecture #process
A Practical Architecture-Centric Analysis Process (AB, HM, PP), pp. 127–144.
QoSAQoSA-2006-FlorentzH #analysis #architecture #embedded #evaluation
Embedded Systems Architecture: Evaluation and Analysis (BF, MH), pp. 145–162.
QoSAQoSA-2006-ZullighovenLB #analysis #architecture #evaluation
Software Architecture Analysis and Evaluation (HZ, CL, MB), pp. 7–8.
ASEASE-2006-AcharyaSXX #effectiveness #generative #interface #robust #static analysis
Effective Generation of Interface Robustness Properties for Static Analysis (MA, TS, JX, TX), pp. 293–296.
ASEASE-2006-CaiS #analysis #composition #design #logic #modelling
Modularity Analysis of Logical Design Models (YC, KJS), pp. 91–102.
ASEASE-2006-Jurjens #analysis #automation #java #proving #security #source code #theorem proving #using
Security Analysis of Crypto-based Java Programs using Automated Theorem Provers (JJ), pp. 167–176.
CASECASE-2006-Bahrami-SamaniAM #analysis #design
Design and Analysis of a Welding Robot (MBS, MA, SAAM), pp. 454–459.
CASECASE-2006-BiggsM #analysis #evaluation
Evaluation of Dimensional Analysis in Robotics (GB, BAM), pp. 286–291.
CASECASE-2006-ChaoSZJM #analysis #automation #information management #using
Single-cell information extraction and viability analysis using automated microscopy (ShC, TJS, SZ, KAJI, DRM), pp. 33–38.
CASECASE-2006-CheungC #analysis #capacity
Analysis of Capacity Overflow for Manufacturing Systems (KSC, KOC), pp. 331–335.
CASECASE-2006-LengC #analysis #implementation #mobile
Velocity Analysis of Omnidirectional Mobile Robot and System Implementation (CL, QC), pp. 81–86.
CASECASE-2006-LiZYC #algorithm #analysis #locality #network #novel
A Novel Algorithm for Node Localization and Motion Analysis in Wireless Sensor Networks (SL, DZ, ZY, NC), pp. 574–579.
CASECASE-2006-RecaldeMS #analysis #petri net #simulation
Improving analysis and simulation of continuous Petri Nets (LR, CM, MS), pp. 9–14.
CASECASE-2006-RenWJXY #analysis #fault
A Methodology to Model Human and Organisational Errors on Offshore Risk Analysis (JR, JW, IJ, DLX, JBY), pp. 144–149.
CASECASE-2006-SenanayakeSCS #analysis
Instrumented Orthopaedics Analysis System (SMNAS, CYS, JC, RGS), pp. 194–199.
CASECASE-2006-ShaoHM #algorithm #analysis #component #linear #multi #using
Quantitative Analysis Using NIR by Building Principal Component- Multiple Linear Regression-BP Algorithm (YS, YH, JM), pp. 161–164.
CASECASE-2006-WuD #analysis #multi #network #performance
Performance analysis of complex supply chain networks with multi-product (YW, MD), pp. 630–635.
CASECASE-2006-Zhang #analysis #enterprise #modelling #process
Modeling and Analysis of Enterprise Processes (LZ), pp. 393–398.
DACDAC-2006-AgarwalN #analysis #statistics
Statistical analysis of SRAM cell stability (KA, SRN), pp. 57–62.
DACDAC-2006-BhardwajVGC #analysis #modelling #optimisation #process
Modeling of intra-die process variations for accurate analysis and optimization of nano-scale circuits (SB, SBKV, PG, YC), pp. 791–796.
DACDAC-2006-ChaoCWCW #analysis #using
Unknown-tolerance analysis and test-quality control for test response compaction using space compactors (MCTC, KTC, SW, STC, WW), pp. 1083–1088.
DACDAC-2006-FatemiNP #analysis #logic #statistics #using
Statistical logic cell delay analysis using a current-based model (HF, SN, MP), pp. 253–256.
DACDAC-2006-GhantaVBP #analysis #correlation #power management #probability #scalability
Stochastic variational analysis of large power grids considering intra-die correlations (PG, SBKV, SB, RP), pp. 211–216.
DACDAC-2006-IsseninBDD #analysis #memory management #multi #reuse
Multiprocessor system-on-chip data reuse analysis for exploring customized memory hierarchies (II, EB, BD, ND), pp. 49–52.
DACDAC-2006-KanjJN #analysis #design
Mixture importance sampling and its application to the analysis of SRAM designs in the presence of rare failure events (RK, RVJ, SRN), pp. 69–72.
DACDAC-2006-KhatibPBBBKJN #analysis #architecture #design #monitoring #multi #realtime
A multiprocessor system-on-chip for real-time biomedical monitoring and analysis: architectural design space exploration (IAK, FP, DB, LB, MB, HK, AJ, RN), pp. 125–130.
DACDAC-2006-LeeWA #analysis #statistics
Refined statistical static timing analysis through (BNL, LCW, MSA), pp. 149–154.
DACDAC-2006-LiLP #analysis #power management #statistics
Projection-based statistical analysis of full-chip leakage power with non-log-normal distributions (XL, JL, LTP), pp. 103–108.
DACDAC-2006-LiuMM #analysis #design #reliability #tool support
Design tools for reliability analysis (ZL, BM, JZM), pp. 182–187.
DACDAC-2006-LoiASLSB #3d #analysis #performance
A thermally-aware performance analysis of vertically integrated (3-D) processor-memory hierarchy (GLL, BA, NS, SCL, TS, KB), pp. 991–996.
DACDAC-2006-MajumdarCG #analysis #validation
Hold time validation on silicon and the relevance of hazards in timing analysis (AM, WYC, JG), pp. 326–331.
DACDAC-2006-MandrekarBSES #analysis
System level signal and power integrity analysis methodology for system-in-package applications (RM, KB, KS, EE, MS), pp. 1009–1012.
DACDAC-2006-NassifPRSBR #analysis #question
Variation-aware analysis: savior of the nanometer era? (SRN, VP, NR, DS, CB, RR), pp. 411–412.
DACDAC-2006-PakbazniaFP #analysis #concept
Charge recycling in MTCMOS circuits: concept and analysis (EP, FF, MP), pp. 97–102.
DACDAC-2006-PaulFOL #analysis #modelling #performance
Modeling and analysis of circuit performance of ballistic CNFET (BCP, SF, MO, TL), pp. 717–722.
DACDAC-2006-PillSCRBC #analysis #formal method #hardware #requirements
Formal analysis of hardware requirements (IP, SS, RC, MR, RB, AC), pp. 821–826.
DACDAC-2006-PomplSHNS #analysis #aspect-oriented #design #reliability
Practical aspects of reliability analysis for IC designs (TP, CS, MH, HN, JS), pp. 193–198.
DACDAC-2006-SinghS #analysis #component #correlation #independence #parametricity #statistics #using
Statistical timing analysis with correlated non-gaussian parameters using independent component analysis (JS, SSS), pp. 155–160.
DACDAC-2006-SuhendraMRC #analysis #detection #performance
Efficient detection and exploitation of infeasible paths for software timing analysis (VS, TM, AR, TC), pp. 358–363.
DACDAC-2006-YuSH #analysis #grid #order #performance #power management #reduction
Fast analysis of structured power grid by triangularization based structure preserving model order reduction (HY, YS, LH), pp. 205–210.
DATEDATE-2006-AbbaspourFP #analysis #statistics
Non-gaussian statistical interconnect timing analysis (SA, HF, MP), pp. 533–538.
DATEDATE-2006-AbdollahiP #analysis #diagrams #quantum #synthesis #using
Analysis and synthesis of quantum circuits by using quantum decision diagrams (AA, MP), pp. 317–322.
DATEDATE-2006-AsadiSTK #analysis
Vulnerability analysis of L2 cache elements to single event upsets (HA, VS, MBT, DRK), pp. 1276–1281.
DATEDATE-2006-BalachandranBCWRNB #analysis #grid #modelling #power management
Analysis and modeling of power grid transmission lines (JB, SB, GC, TW, WDR, BN, EB), pp. 33–38.
DATEDATE-2006-BhaduriSCTGG #analysis #architecture #design #fault tolerance #framework #hybrid
A hybrid framework for design and analysis of fault-tolerant architectures (DB, SKS, DC, VET, PSG, MG), pp. 335–336.
DATEDATE-2006-DensmoreDS #analysis #architecture #performance
FPGA architecture characterization for system level performance analysis (DD, AD, ALSV), pp. 734–739.
DATEDATE-2006-GillPW #analysis #fault #logic
Soft delay error analysis in logic circuits (BSG, CAP, FGW), pp. 47–52.
DATEDATE-2006-HeniaE #multi #using
Improved offset-analysis using multiple timing-references (RH, RE), pp. 450–455.
DATEDATE-2006-IgnatNSN #classification #impact analysis #operating system #realtime
Soft-error classification and impact analysis on real-time operating systems (NI, BN, YS, GN), pp. 182–187.
DATEDATE-2006-JinS #analysis #satisfiability
Strong conflict analysis for propositional satisfiability (HJ, FS), pp. 818–823.
DATEDATE-2006-Kundu #analysis #design
A design for failure analysis (DFFA) technique to ensure incorruptible signatures (SK), pp. 309–310.
DATEDATE-2006-KunzliPBT #analysis #formal method #performance #simulation
Combining simulation and formal methods for system-level performance analysis (SK, FP, LB, LT), pp. 236–241.
DATEDATE-2006-MeiR #analysis #performance #using
Efficient AC analysis of oscillators using least-squares methods (TM, JSR), pp. 263–268.
DATEDATE-2006-MochockiLC #3d #analysis #mobile
Power analysis of mobile 3D graphics (BM, KL, SC), pp. 502–507.
DATEDATE-2006-NazarianP #analysis
Cell delay analysis based on rate-of-current change (SN, MP), pp. 539–544.
DATEDATE-2006-RossiSM #analysis
Analysis of the impact of bus implemented EDCs on on-chip SSN (DR, CS, CM), pp. 59–64.
DATEDATE-2006-SchirnerD #analysis #modelling #transaction
Quantitative analysis of transaction level models for the AMBA bus (GS, RD), pp. 230–235.
DATEDATE-2006-SoffkeZMG #analysis #approach #combinator #statistics
A signal theory based approach to the statistical analysis of combinatorial nanoelectronic circuits (OS, PZ, TM, MG), pp. 632–637.
DATEDATE-2006-TanjiWKA #analysis #scalability #using
Large scale RLC circuit analysis using RLCG-MNA formulation (YT, TW, HK, HA), pp. 45–46.
DATEDATE-2006-TsengLC #2d #using
A built-in redundancy-analysis scheme for RAMs with 2D redundancy using 1D local bitmap (TWT, JFL, DMC), pp. 53–58.
DATEDATE-2006-VandersteenBDR
Systematic stability-analysis method for analog circuits (GV, SB, PD, YR), pp. 150–155.
DATEDATE-2006-ViehlSBR #analysis #design #modelling #performance #simulation #uml
Formal performance analysis and simulation of UML/SysML models for ESL design (AV, TS, OB, WR), pp. 242–247.
DATEDATE-2006-WandelerMT #analysis #performance #realtime
Performance analysis of greedy shapers in real-time systems (EW, AM, LT), pp. 444–449.
DATEDATE-2006-WangM #algorithm #analysis #multi
A logarithmic full-chip thermal analysis algorithm based on multi-layer Green’s function (BW, PM), pp. 39–44.
DATEDATE-2006-WangXVI #analysis #optimisation
On-chip bus thermal analysis and optimization (FW, YX, NV, MJI), pp. 850–855.
DATEDATE-2006-YangGZSD #adaptation #analysis #design #synthesis
Adaptive chip-package thermal analysis for synthesis and design (YY, Z(G, CZ, LS, RPD), pp. 844–849.
DATEDATE-2006-YangV #analysis #evaluation #performance #synthesis
Efficient temperature-dependent symbolic sensitivity analysis and symbolic performance evaluation in analog circuit synthesis (HY, RV), pp. 283–284.
DATEDATE-2006-ZhangHC #analysis #correlation #statistics
Statistical timing analysis with path reconvergence and spatial correlations (LZ, YH, CCPC), pp. 528–532.
DATEDATE-2006-ZhouSMS #analysis #composition #grid #power management #scalability #using
Large power grid analysis using domain decomposition (QZ, KS, KM, DCS), pp. 27–32.
DATEDATE-DF-2006-BononiC #2d #analysis #architecture #network #simulation
Simulation and analysis of network on chip architectures: ring, spidergon and 2D mesh (LB, NC), pp. 154–159.
DocEngDocEng-2006-Chao #analysis #geometry
Text block geometric shape analysis (HC), pp. 22–24.
HTHT-2006-QiC #analysis #development #named #segmentation
CUTS: CUrvature-based development pattern analysis and segmentation for blogs and other Text Streams (YQ, KSC), pp. 1–10.
SIGMODSIGMOD-2006-ChidlovskiiRB #analysis #performance #self
Documentum ECI self-repairing wrappers: performance analysis (BC, BR, MB), pp. 708–717.
SIGMODSIGMOD-2006-Hanrahan #analysis #named #query #visualisation
VizQL: a language for query, analysis and visualization (PH), p. 721.
SIGMODSIGMOD-2006-LiOTW #analysis #named
DADA: a data cube for dominant relationship analysis (CL, BCO, AKHT, SW), pp. 659–670.
SIGMODSIGMOD-2006-PavlouS #analysis #database #forensics
Forensic analysis of database tampering (KEP, RTS), pp. 109–120.
VLDBVLDB-2006-ChenRST #analysis #predict
Bellwether Analysis: Predicting Global Aggregates from Local Regions (BCC, RR, JWS, PT), pp. 655–666.
VLDBVLDB-2006-GonzalezHL #analysis #multi #named
FlowCube: Constructuing RFID FlowCubes for Multi-Dimensional Analysis of Commodity Flows (HG, JH, XL), pp. 834–845.
VLDBVLDB-2006-MoerkotteN #algorithm #analysis #generative #programming
Analysis of Two Existing and One New Dynamic Programming Algorithm for the Generation of Optimal Bushy Join Trees without Cross Products (GM, TN), pp. 930–941.
CSEETCSEET-2006-Layman #analysis #collaboration #development #student
Changing Students’ Perceptions: An Analysis of the Supplementary Benefits of Collaborative Software Development (LL), pp. 159–166.
CSEETCSEET-2006-WallaceWB #analysis #problem
Instruction in Problem Structuring and Analysis Through Problem Frames (CW, XW, VB), pp. 185–186.
ESOPESOP-2006-CodishLSS #analysis #termination
Size-Change Termination Analysis in k-Bits (MC, VL, PS, PJS), pp. 230–245.
ESOPESOP-2006-HofmannJ #analysis #type system
Type-Based Amortised Heap-Space Analysis (MH, SJ), pp. 22–37.
FASEFASE-2006-OlveczkyC #algorithm #analysis #maude #realtime #scheduling #simulation
Formal Simulation and Analysis of the CASH Scheduling Algorithm in Real-Time Maude (PCÖ, MC), pp. 357–372.
FoSSaCSFoSSaCS-2006-BackesMPV #analysis #encryption
Symbolic and Cryptographic Analysis of the Secure WS-ReliableMessaging Scenario (MB, SM, BP, LV), pp. 428–445.
FoSSaCSFoSSaCS-2006-ZuninoD #analysis #protocol
Handling exp, × (and Timestamps) in Protocol Analysis (RZ, PD), pp. 413–427.
TACASTACAS-2006-DistefanoOY #analysis #logic
A Local Shape Analysis Based on Separation Logic (DD, PWO, HY), pp. 287–302.
TACASTACAS-2006-GroceJ #program analysis
Exploiting Traces in Program Analysis (AG, RJ), pp. 379–393.
TACASTACAS-2006-KonigK #abstraction #analysis #graph transformation #refinement
Counterexample-Guided Abstraction Refinement for the Analysis of Graph Transformation Systems (BK, VK), pp. 197–211.
SCAMSCAM-J-2005-AntoniolKT06 #analysis #source code
Special issue on Source code analysis and manipulation (GA, JK, PT), pp. 205–208.
CSMRCSMR-2006-CanforaC #eclipse #impact analysis #named #plugin
Jimpa: An Eclipse Plug-in for Impact Analysis (GC, LC), pp. 341–342.
CSMRCSMR-2006-HerraizRG #analysis #comparison #evolution #metric
Comparison between SLOCs and number of files as size metrics for software evolution analysis (IH, GR, JMGB), pp. 206–213.
CSMRCSMR-2006-SalahMAP #dynamic analysis #scalability
Scenario-Driven Dynamic Analysis for Comprehending Large Software Systems (MS, SM, GA, MDP), pp. 71–80.
CSMRCSMR-2006-Zaidman #comprehension #dynamic analysis #scalability
Scalability Solutions for Program Comprehension through Dynamic Analysis (AZ), pp. 327–330.
CSMRCSMR-2006-ZaidmanDASHR #dynamic analysis
Regaining Lost Knowledge through Dynamic Analysis and Aspect Orientation (AZ, SD, BA, KDS, GH, BDR), pp. 91–102.
ICPCICPC-2006-JetleyZI #analysis #slicing #using
Using Abstraction-driven Slicing for Postmortem Analysis of Software (RPJ, YZ, SPI), pp. 107–116.
ICPCICPC-2006-KellyB #analysis #taxonomy
A Context-Aware Analysis Scheme for Bloom’s Taxonomy (TK, JB), pp. 275–284.
ICPCICPC-2006-PhengV #analysis #data type #java #source code
Dynamic Data Structure Analysis for Java Programs (SP, CV), pp. 191–201.
ICPCICPC-2006-SafyallahS #dynamic analysis #execution #mining #using
Dynamic Analysis of Software Systems using Execution Pattern Mining (HS, KS), pp. 84–88.
ICSMEICSM-2006-AlsmadiM #analysis #evolution #open source
Open Source Evolution Analysis (IA, KM), pp. 276–278.
ICSMEICSM-2006-BreechTP #impact analysis #precise
Integrating Influence Mechanisms into Impact Analysis for Increased Precision (BB, MT, LLP), pp. 55–65.
ICSMEICSM-2006-StreinLLL #metamodelling #program analysis
An Extensible Meta-Model for Program Analysis (DS, RL, JL, WL), pp. 380–390.
ICSMEICSM-2006-ZalewskiS #impact analysis #library
Change Impact Analysis for Generic Libraries (MZ, SS), pp. 35–44.
MSRMSR-2006-CanforaC #fine-grained #impact analysis #repository
Fine grained indexing of software repositories to support impact analysis (GC, LC), pp. 105–111.
MSRMSR-2006-TsunodaMYKM #analysis #development #enterprise
Productivity analysis of Japanese enterprise software development projects (MT, AM, HY, NK, KiM), pp. 14–17.
MSRMSR-2006-VoineaT #analysis #cvs #framework #query #repository #visualisation
An open framework for CVS repository querying, analysis and visualization (LV, ACT), pp. 33–39.
MSRMSR-2006-WalkerHHKS #approach #estimation #impact analysis #lightweight #probability
A lightweight approach to technical risk estimation via probabilistic impact analysis (RJW, RH, IH, PK, AS), pp. 98–104.
SCAMSCAM-2006-BinkleyHK #animation #approximate #static analysis
Characterising, Explaining, and Exploiting the Approximate Nature of Static Analysis through Animation (DB, MH, JK), pp. 43–52.
SCAMSCAM-2006-Bruntink #analysis #tool support
Linking Analysis and Transformation Tools with Source-Based Mappings (MB), pp. 107–116.
SCAMSCAM-2006-StreinKL #program analysis #refactoring
Cross-Language Program Analysis and Refactoring (DS, HK, WL), pp. 207–216.
WCREWCRE-2006-FischerG #analysis #approach #lightweight #named #scalability
EvoGraph: A Lightweight Approach to Evolutionary and Structural Analysis of Large Software Systems (MF, HG), pp. 179–188.
WCREWCRE-2006-KnieselB #analysis #aspect-oriented #correctness #weaving
An Analysis of the Correctness and Completeness of Aspect Weaving (GK, UB), pp. 324–333.
WCREWCRE-2006-MerloLA #analysis #injection #php #sql
Insider and Ousider Threat-Sensitive SQL Injection Vulnerability Analysis in PHP (EM, DL, GA), pp. 147–156.
WCREWCRE-2006-ZaidmanGH #comprehension #dynamic analysis
Program COmprehension through Dynamic Analysis (AZ, OG, AHL), p. 315.
PEPMPEPM-2006-Cordy #analysis #generative #txl
Source transformation, analysis and generation in TXL (JRC), pp. 1–11.
PEPMPEPM-2006-IwamaIK #analysis #exception #functional #resource management
Resource usage analysis for a functional language with exceptions (FI, AI, NK), pp. 38–47.
PEPMPEPM-2006-LewisJ #analysis #model checking
A dead variable analysis for explicit model checking (ML, MJ), pp. 48–57.
PLDIPLDI-2006-AcarBBT #analysis #self
An experimental analysis of self-adjusting computation (UAA, GEB, MB, KT), pp. 96–107.
PLDIPLDI-2006-DhurjatiKA #alias #analysis #named
SAFECode: enforcing alias analysis for weakly typed languages (DD, SK, VSA), pp. 144–157.
PLDIPLDI-2006-GuyerMF #automation #named #static analysis
Free-Me: a static analysis for automatic individual object reclamation (SZG, KSM, DF), pp. 364–375.
PLDIPLDI-2006-PratikakisFH #analysis #concurrent #correlation #detection #named
LOCKSMITH: context-sensitive correlation analysis for race detection (PP, JSF, MWH), pp. 320–331.
PLDIPLDI-2006-SridharanB #analysis #java #points-to
Refinement-based context-sensitive points-to analysis for Java (MS, RB), pp. 387–400.
SASSAS-2006-AllamigeonGH #c #embedded #source code #static analysis #string
Static Analysis of String Manipulations in Critical Embedded C Programs (XA, WG, CH), pp. 35–51.
SASSAS-2006-Arnold #analysis #logic #refinement #using
Specialized 3-Valued Logic Shape Analysis Using Structure-Based Refinement and Loose Embedding (GA), pp. 204–220.
SASSAS-2006-ChangHN #analysis #low level #using
Analysis of Low-Level Code Using Cooperating Decompilers (BYEC, MH, GCN), pp. 318–335.
SASSAS-2006-Das #power of #static analysis
Unleashing the Power of Static Analysis (MD), pp. 1–2.
SASSAS-2006-DhurjatiDY #analysis #data flow #refinement
Path-Sensitive Dataflow Analysis with Iterative Refinement (DD, MD, YY), pp. 425–442.
SASSAS-2006-GonnordH #analysis #linear
Combining Widening and Acceleration in Linear Relation Analysis (LG, NH), pp. 144–160.
SASSAS-2006-GotsmanBC #abstraction #analysis #interprocedural
Interprocedural Shape Analysis with Separated Heap Abstractions (AG, JB, BC), pp. 240–260.
SASSAS-2006-GoubaultP #algorithm #static analysis
Static Analysis of Numerical Algorithms (EG, SP), pp. 18–34.
SASSAS-2006-KirkegaardM #java #static analysis
Static Analysis for Java Servlets and JSP (CK, AM), pp. 336–352.
SASSAS-2006-OHearn #logic #program analysis
Separation Logic and Program Analysis (PWO), p. 181.
SASSAS-2006-OrlovichR #analysis #memory management
Memory Leak Analysis by Contradiction (MO, RR), pp. 405–424.
SASSAS-2006-SankaranarayananISG #static analysis
Static Analysis in Disjunctive Numerical Domains (SS, FI, IS, AG), pp. 3–17.
SASSAS-2006-Yang #analysis #low level
Shape Analysis for Low-Level Code (HY), p. 280.
FLOPSFLOPS-2006-Avery #analysis #bound #termination
Size-Change Termination and Bound Analysis (JA), pp. 192–207.
FLOPSFLOPS-2006-LiKL #analysis #lazy evaluation
Lazy Set-Sharing Analysis (XL, AK, LL), pp. 177–191.
FLOPSFLOPS-2006-MarionP #analysis
Resource Analysis by Sup-interpretation (JYM, RP), pp. 163–176.
CIAACIAA-2006-ChengWC #analysis #bisimulation #branch #composition #on the fly
On-the-Fly Branching Bisimulation Minimization for Compositional Analysis (YPC, HYW, YRC), pp. 219–229.
CIAACIAA-2006-Luttenberger #analysis #integer #reachability #source code
Reachability Analysis of Procedural Programs with Affine Integer Arithmetic (ML), pp. 281–282.
ICALPICALP-v2-2006-DelauneLLT #analysis #morphism #protocol
Symbolic Protocol Analysis in Presence of a Homomorphism Operator and Exclusive Or (SD, PL, DL, RT), pp. 132–143.
FMFM-2006-AiguierBG #interactive #specification #static analysis
Feature Specification and Static Analysis for Interaction Resolution (MA, KB, PLG), pp. 364–379.
FMFM-2006-McIver #analysis #model checking #probability #refinement
Quantitative Refinement and Model Checking for the Analysis of Probabilistic Systems (AM), pp. 131–146.
SEFMSEFM-2006-Khedker #perspective #source code #static analysis
Static Analysis of Programs: A Heap Centric View (UPK), p. 261.
SEFMSEFM-2006-SampathK #analysis
Composing Context Sensitive Analysis (PS, SK), pp. 186–195.
ICFPICFP-2006-FisherS #static analysis #syntax
Static analysis for syntax objects (DF, OS), pp. 111–121.
ICGTICGT-2006-EdelkampJL #analysis #graph #heuristic
Heuristic Search for the Analysis of Graph Transition Systems (SE, SJ, ALL), pp. 414–429.
ICGTICGT-2006-EhrigHL #analysis #graph transformation
Molecular Analysis of Metabolic Pathway with Graph Transformation (KE, RH, GL), pp. 107–121.
ICGTICGT-2006-MendizabalD #analysis #distributed #graph grammar #non-functional #probability #using
Non-functional Analysis of Distributed Systems in Unreliable Environments Using Stochastic Object Based Graph Grammars (OMM, FLD), pp. 275–290.
ICGTICGT-2006-VarroVEPT #analysis #model transformation #petri net #termination
Termination Analysis of Model Transformations by Petri Nets (DV, SVG, HE, UP, GT), pp. 260–274.
CHICHI-2006-LiWL #analysis #design #testing
Design and experimental analysis of continuous location tracking techniques for Wizard of Oz testing (YL, EW, JAL), pp. 1019–1022.
CHICHI-2006-MedynskiyDF #analysis #community #development #hybrid #network #online #using
Using hybrid networks for the analysis of online software development communities (YEM, ND, AF), pp. 513–516.
CHICHI-2006-WrightSPSC #analysis #concept
The sandbox for analysis: concepts and Eevaluation (WW, DS, PP, AWS, BC), pp. 801–810.
CSCWCSCW-2006-DabbishK #analysis #email
Email overload at work: an analysis of factors associated with email strain (LAD, REK), pp. 431–440.
CSCWCSCW-2006-JacoviSGUSM #analysis #graph
The chasms of CSCW: a citation graph analysis of the CSCW conference (MJ, VS, GGF, SU, ES, NM), pp. 289–298.
CSCWCSCW-2006-Lee #analysis #social #what
What goes around comes around: an analysis of del.icio.us as social space (KJL), pp. 191–194.
CSCWCSCW-2006-RanjanBB #analysis #collaboration
An exploratory analysis of partner action and camera control in a video-mediated collaborative task (AR, JPB, RB), pp. 403–412.
CSCWCSCW-2006-VoidaM #analysis #challenge #multimodal
Challenges in the analysis of multimodal messaging (AV, EDM), pp. 427–430.
CSCWCSCW-2006-WeisethMTL #analysis #collaboration #framework #tool support
The wheel of collaboration tools: a typology for analysis within a holistic framework (PEW, BEM, BT, SL), pp. 239–248.
AdaEuropeAdaEurope-2006-BreuerP #fault #kernel #linux #source code #static analysis
One Million (LOC) and Counting: Static Analysis for Errors and Vulnerabilities in the Linux Kernel Source Code (PTB, SP), pp. 56–70.
AdaEuropeAdaEurope-2006-RazaVP #named #program analysis #reverse engineering
Bauhaus — A Tool Suite for Program Analysis and Reverse Engineering (AR, GV, EP), pp. 71–82.
CAiSECAiSE-2006-Franch #analysis #modelling #on the
On the Quantitative Analysis of Agent-Oriented Models (XF), pp. 495–509.
CAiSECAiSE-2006-HaggmarkA #analysis #logic #principle #why
Why Software Engineers Do Not Keep to the Principle of Separating Business Logic from Display: A Method Rationale Analysis (MH, PJÅ), pp. 399–413.
EDOCEDOC-2006-HauserFKV #analysis #workflow
Combining Analysis of Unstructured Workflows with Transformation to Structured Workflows (RH, MF, JMK, JV), pp. 129–140.
EDOCEDOC-2006-JohnsonLNS #analysis #architecture #diagrams #enterprise
Extended Influence Diagrams for Enterprise Architecture Analysis (PJ, RL, PN, MS), pp. 3–12.
ICEISICEIS-HCI-2006-BadjioP #analysis #data mining #mining #process #visual notation
Context of Use Analysis — Activity Checklist for Visual Data Mining (EPFB, FP), pp. 45–50.
ICEISICEIS-ISAS-2006-DubinskyHTK #agile #analysis #design #development #scalability
System Analysis and Design in a Large-Scale Software Project: The Case of Transition to Agile Development (YD, OH, DT, AK), pp. 11–18.
ICEISICEIS-J-2006-DubinskyHTK06a #agile #analysis #design
Agile System Analysis and Design (YD, OH, DT, AK), pp. 281–292.
CIKMCIKM-2006-ChiTT #analysis #named
Eigen-trend: trend analysis in the blogosphere based on singular value decompositions (YC, BLT, JT), pp. 68–77.
CIKMCIKM-2006-LiuCLS #analysis #visual notation
The visual funding navigator: analysis of the NSF funding information (SL, NC, HL, HS), pp. 882–883.
CIKMCIKM-2006-YeXLJBCK #analysis #linear #performance
Efficient model selection for regularized linear discriminant analysis (JY, TX, QL, RJ, JB, VC, CK), pp. 532–539.
ICMLICML-2006-DingZHZ #analysis #component #invariant #named #robust
R1-PCA: rotational invariant L1-norm principal component analysis for robust subspace factorization (CHQD, DZ, XH, HZ), pp. 281–288.
ICMLICML-2006-Hanneke #analysis #graph #learning
An analysis of graph cut size for transductive learning (SH), pp. 393–399.
ICMLICML-2006-KimMB #analysis #kernel
Optimal kernel selection in Kernel Fisher discriminant analysis (SJK, AM, SPB), pp. 465–472.
ICMLICML-2006-MaggioniM #analysis #evaluation #markov #multi #performance #policy #process #using
Fast direct policy evaluation using multiscale analysis of Markov diffusion processes (MM, SM), pp. 601–608.
ICMLICML-2006-Sugiyama #analysis #reduction
Local Fisher discriminant analysis for supervised dimensionality reduction (MS), pp. 905–912.
ICMLICML-2006-TorreK #analysis #clustering
Discriminative cluster analysis (FDlT, TK), pp. 241–248.
ICMLICML-2006-YeX #analysis #linear #null #orthogonal
Null space versus orthogonal linear discriminant analysis (JY, TX), pp. 1073–1080.
ICPRICPR-v1-2006-AndradeBF06a #analysis #markov #modelling
Hidden Markov Models for Optical Flow Analysis in Crowds (ELA, SB, RBF), pp. 460–463.
ICPRICPR-v1-2006-GunesP #analysis #automation #behaviour #database #gesture
A Bimodal Face and Body Gesture Database for Automatic Analysis of Human Nonverbal Affective Behavior (HG, MP), pp. 1148–1153.
ICPRICPR-v1-2006-HansenMT #analysis #clustering #re-engineering #sorting
Cluster Analysis and Priority Sorting in Huge Point Clouds for Building Reconstruction (WvH, EM, UT), pp. 23–26.
ICPRICPR-v1-2006-LeeE #analysis #modelling #synthesis
Nonlinear Shape and Appearance Models for Facial Expression Analysis and Synthesis (CSL, AME), pp. 497–502.
ICPRICPR-v1-2006-LiuD #analysis #linear #performance #recognition
Improve Handwritten Character Recognition Performance by Heteroscedastic Linear Discriminant Analysis (HL, XD), pp. 880–883.
ICPRICPR-v1-2006-MillerW #analysis #semantics #word
Word Completion with Latent Semantic Analysis (TM, EW), pp. 1252–1255.
ICPRICPR-v1-2006-OnoMKI #analysis #image
Space-time Analysis of Spherical Projection Image (SO, TM, HK, KI), pp. 975–979.
ICPRICPR-v1-2006-QiDZ #analysis #case study #image #semantics
Semantic Analysis on Medical Images: A Case Study (DQ, ERED, RZ), pp. 1260–1263.
ICPRICPR-v1-2006-ReiterDLB #3d #analysis #canonical #correlation #re-engineering #using
3D and Infrared Face Reconstruction from RGB data using Canonical Correlation Analysis (MR, RD, GL, HB), pp. 425–428.
ICPRICPR-v1-2006-SchrotterZ #analysis #image #modelling #multi #robust
Robust Model Driven Matching Method for Face Analysis with Multi Image Photogrammetry (GS, LZ), pp. 480–483.
ICPRICPR-v1-2006-ShimanukiKW #analysis #sketching
Analysis of Overlapping Faces for Constructing Paper-made Objects from Sketches (HS, JK, TW), pp. 247–250.
ICPRICPR-v1-2006-SibiryakovB #analysis #multi #realtime
Real-Time Multi-Frame Analysis of Dominant Translation (AS, MB), pp. 55–58.
ICPRICPR-v1-2006-Solem #analysis
Geodesic Curves for Analysis of Continuous Implicit Shapes (JES), pp. 43–46.
ICPRICPR-v1-2006-Solem06a #analysis
Geodesic Curves for Analysis of Continuous Implicit Shapes (JES), pp. 852–855.
ICPRICPR-v1-2006-StorkJ #analysis #image
Estimating the location of illuminants in realist master paintings Computer image analysis addresses a debate in art history of the Baroque (DGS, MKJ), pp. 255–258.
ICPRICPR-v1-2006-WangKY #2d #analysis #linear #recognition
Bilateral Two Dimensional Linear Discriminant Analysis for Stereo Face Recognition (JGW, HK, WYY), pp. 429–432.
ICPRICPR-v1-2006-WeiB #data analysis #segmentation #statistics #using
Unsupervised Segmentation Using Gabor Wavelets and Statistical Features in LIDAR Data Analysis (HW, MB), pp. 667–670.
ICPRICPR-v1-2006-YangZJY #analysis #feature model
Unsupervised Discriminant Projection Analysis for Feature Extraction (JY, DZ, ZJ, JYY), pp. 904–907.
ICPRICPR-v2-2006-ChenW #analysis #component #independence #segmentation #using
Texture Segmentation Using Independent Component Analysis of Gabor Features (YC, RW), pp. 147–150.
ICPRICPR-v2-2006-GanLY #analysis #detection
Detecting Periodically Expressed Genes based on Time-frequency Analysis and L-curve Method (XG, AWCL, HY), pp. 654–657.
ICPRICPR-v2-2006-HuDG #analysis #performance #retrieval
Improving Retrieval Performance by Global Analysis (JH, WD, JG), pp. 703–706.
ICPRICPR-v2-2006-InoueNK #analysis #feature model #kernel #recognition #string #using
Historical Hand-Written String Recognition by Non-linear Discriminant Analysis using Kernel Feature Selection (RI, HN, NK), pp. 1094–1097.
ICPRICPR-v2-2006-InoueU #2d #analysis #linear
Non-Iterative Two-Dimensional Linear Discriminant Analysis (KI, KU), pp. 540–543.
ICPRICPR-v2-2006-Liang #analysis #image
High-dimensional discriminant analysis and its application to color face images (ZL), pp. 917–920.
ICPRICPR-v2-2006-LiuCC #analysis #image #layout
Latent Layout Analysis for Discovering Objects in Images (DL, DC, TC), pp. 468–471.
ICPRICPR-v2-2006-Loog #analysis #linear
Conditional Linear Discriminant Analysis (ML), pp. 387–390.
ICPRICPR-v2-2006-LuPV #analysis #component #multi #recognition
Multilinear Principal Component Analysis of Tensor Objects for Recognition (HL, KNP, ANV), pp. 776–779.
ICPRICPR-v2-2006-PungprasertyingCK #analysis #approach #learning #migration #performance
Migration Analysis: An Alternative Approach for Analyzing Learning Performance (PP, RC, BK), pp. 837–840.
ICPRICPR-v2-2006-QuanHXLL #analysis #online #verification
Spectrum Analysis Based onWindows with Variable Widths for Online Signature Verification (ZHQ, DSH, XLX, MRL, TML), pp. 1122–1125.
ICPRICPR-v2-2006-SanguansatAJM #2d #analysis #component #recognition
Class-Specific Subspace-Based Two-Dimensional Principal Component Analysis for Face Recognition (PS, WA, SJ, SM), pp. 1246–1249.
ICPRICPR-v2-2006-SenerU #analysis #component #independence #invariant #normalisation #using
A New Affine Invariant Curve Normalization Technique Using Independent Component Analysis (SS, MU), p. 48.
ICPRICPR-v2-2006-TangT #analysis #linear #performance #using
Fast Linear Discriminant Analysis Using Binary Bases (FT, HT), pp. 52–55.
ICPRICPR-v2-2006-TongDXTL #analysis #recognition #video
Local Motion Analysis and Its Application in Video based Swimming Style Recognition (XT, LYD, CX, QT, HL), pp. 1258–1261.
ICPRICPR-v2-2006-TsaiTCY #analysis #component #design #detection #fault #image #independence
Independent component analysis based filter design for defect detection in low-contrast textured images (DMT, YHT, SMC, CHY), pp. 231–234.
ICPRICPR-v2-2006-UekiHK #2d #analysis #classification #linear
Two-dimensional Heteroscedastic Linear Discriminant Analysis for Age-group Classification (KU, TH, TK), pp. 585–588.
ICPRICPR-v2-2006-YangL #analysis #automation #component
Automatic Physiognomic Analysis by Classifying Facial Component Feature (HDY, SWL), pp. 1212–1215.
ICPRICPR-v2-2006-ZhengL #analysis #component #kernel #learning #locality #problem
Regularized Locality Preserving Learning of Pre-Image Problem in Kernel Principal Component Analysis (WSZ, JHL), pp. 456–459.
ICPRICPR-v3-2006-ChenWTG #analysis #empirical #image #matrix #statistics
Blind Image Steganalysis Based on Statistical Analysis of Empirical Matrix (XC, YW, TT, LG), pp. 1107–1110.
ICPRICPR-v3-2006-El-BazFRYEE #analysis #detection #image
Image Analysis of Renal DCE MRI for the Detection of Acute Renal Rejection (AEB, AAF, RF, SEY, MAEG, TE), pp. 822–825.
ICPRICPR-v3-2006-GokberkA #3d #algorithm #analysis #comparative #recognition
Comparative Analysis of Decision-level Fusion Algorithms for 3D Face Recognition (BG, LA), pp. 1018–1021.
ICPRICPR-v3-2006-GutmanWLCT #analysis #using
Hippocampal Surface Analysis Using Spherical Harmonic Function Applied to Surface Conformal Mapping (BG, YW, LML, TFC, PMT), pp. 964–967.
ICPRICPR-v3-2006-HaiESYSHAY #adaptation #analysis #image #video
Adaptive Control of Video Display for Diagnostic Assistance by Analysis of Capsule Endoscopic Images (HV, TE, RS, KY, MS, KH, TA, YY), pp. 980–983.
ICPRICPR-v3-2006-JaberAM #analysis #approach #information retrieval #metric #novel
A Novel Approach for Lexical Noise Analysis and Measurement in Intelligent Information Retrieval (TJ, AA, PM), pp. 370–373.
ICPRICPR-v3-2006-KitasakaNMSMTN #analysis #recognition
Recognition of lung lobes and its application to the bronchial structure analysis (TK, YN, KM, YS, MM, HT, HN), pp. 288–291.
ICPRICPR-v3-2006-Levitt #analysis #component
Component Analysis of Torah Code Phrases (AL), pp. 412–416.
ICPRICPR-v3-2006-LiuW #algorithm #analysis #component #feature model #recognition #search-based
Feature Extraction with Genetic Algorithms Based Nonlinear Principal Component Analysis for Face Recognition (NL, HW), pp. 461–464.
ICPRICPR-v3-2006-LiZSCG #analysis #kernel #performance #recognition
Bagging Based Efficient Kernel Fisher Discriminant Analysis for Face Recognition (YL, BZ, SS, XC, WG), pp. 523–526.
ICPRICPR-v3-2006-LoogR #analysis
Local Discriminant Analysis (ML, DdR), pp. 328–331.
ICPRICPR-v3-2006-QinSL #analysis #feature model #performance
Efficient Feature Extraction Based on Regularized Uncorrelated Chernoff Discriminant Analysis (AKQ, PNS, ML), pp. 125–128.
ICPRICPR-v3-2006-TangkuampienS #analysis #component #kernel
Human Motion De-noising via Greedy Kernel Principal Component Analysis Filtering (TT, DS), pp. 457–460.
ICPRICPR-v3-2006-VlietF #analysis #clustering #multi
Multi-orientation analysis by decomposing the structure tensor and clustering (LJvV, FGAF), pp. 856–860.
ICPRICPR-v3-2006-Wang06a #analysis #using
Abnormal Walking Gait Analysis Using Silhouette-Masked Flow Histograms (LW0), pp. 473–476.
ICPRICPR-v3-2006-WangG #analysis #recognition
Tensor Discriminant Analysis for View-based Object Recognition (YW, SG), pp. 33–36.
ICPRICPR-v3-2006-XuanCZYHSF #analysis #classification #component #novel
A Novel Pattern Classification Scheme: Classwise Non-Principal Component Analysis (CNPCA) (GX, PC, XZ, QY, CH, YQS, DF), pp. 320–323.
ICPRICPR-v3-2006-YamazakiCX #analysis #component #image #independence #kernel #using
Separating Reflections from Images Using Kernel Independent Component Analysis (MY, YWC, GX), pp. 194–197.
ICPRICPR-v3-2006-YouCBLT #analysis #speech
Emotional Speech Analysis on Nonlinear Manifold (MY, CC, JB, JL, JT), pp. 91–94.
ICPRICPR-v3-2006-ZhangDC #analysis #detection #game studies
Ball Hit Detection in Table Tennis Games Based on Audio Analysis (BZ, WD, LC), pp. 220–223.
ICPRICPR-v4-2006-AroraA #analysis #image #multi #segmentation
Analysis of Ramp Discontinuity Model for Multiscale Image Segmentation (HA, NA), pp. 99–103.
ICPRICPR-v4-2006-DhandraHHM #analysis #image #segmentation #using
Analysis of Abnormality in Endoscopic images using Combined HSI Color Space and Watershed Segmentation (BVD, RH, MH, VSM), pp. 695–698.
ICPRICPR-v4-2006-GhoshB06a #adaptation #analysis #video
A Psychological Adaptive Model For Video Analysis (NG, BB), pp. 346–349.
ICPRICPR-v4-2006-GurevichKMSV #analysis #automation
Technology for Automated Morphologic Analysis of Cytological Slides. Methods and Results (IBG, DK, DM, OS, IV), pp. 711–714.
ICPRICPR-v4-2006-LiZZB #analysis #approach #automation #multi #segmentation #using
A New Approach to Automated Retinal Vessel Segmentation Using Multiscale Analysis (QL, LZ, DZ, PB), pp. 77–80.
ICPRICPR-v4-2006-LuC06a #3d #analysis #metric #using
Practical 3-D Shape Measurement Using Optimal Intensity-Modulated Projection and Intensity-Phase Analysis Techniques (CL, GC), pp. 870–873.
ICPRICPR-v4-2006-MitaniTKF #analysis #mobile #recognition
Environment Recognition Based on Analysis of Human Actions for Mobile Robot (MM, MT, AK, KF), pp. 782–786.
ICPRICPR-v4-2006-WangR #analysis #kernel #recognition
Kernel Fisher Discriminant Analysis for Palmprint Recognition (YW, QR), pp. 457–460.
ICPRICPR-v4-2006-WangWLJK #analysis #classification #component #independence #using
Content-Based Audio Classification Using Support Vector Machines and Independent Component Analysis (JCW, JFW, CBL, KTJ, WHK), pp. 157–160.
ICPRICPR-v4-2006-YaoLYZL #algorithm #analysis #identification
Analysis and Improvement of An Iris Identification Algorithm (PY, JL, XY, ZZ, BL), pp. 362–365.
KDDKDD-2006-Berger-WolfS #analysis #framework #network #social
A framework for analysis of dynamic social networks (TYBW, JS), pp. 523–528.
KDDKDD-2006-LiuCHY #analysis #dependence #detection #graph #named
GPLAG: detection of software plagiarism by program dependence graph analysis (CL, CC, JH, PSY), pp. 872–881.
KDDKDD-2006-LiuZBX #analysis #using
Rule interestingness analysis using OLAP operations (BL, KZ, JB, WX), pp. 297–306.
KDDKDD-2006-MeiXCHZ #analysis #generative #semantics
Generating semantic annotations for frequent patterns with context analysis (QM, DX, HC, JH, CZ), pp. 337–346.
KDDKDD-2006-MessaoudBR #analysis #data transformation #multi #performance
Efficient multidimensional data representations based on multiple correspondence analysis (RBM, OB, SLR), pp. 662–667.
KDDKDD-2006-SuchanekIW #analysis #documentation #statistics #web
Combining linguistic and statistical analysis to extract relations from web documents (FMS, GI, GW), pp. 712–717.
KDDKDD-2006-SunTF #analysis #graph
Beyond streams and graphs: dynamic tensor analysis (JS, DT, CF), pp. 374–383.
KDDKDD-2006-WedigM #analysis #personalisation #query #scalability
A large-scale analysis of query logs for assessing personalization opportunities (SW, OM), pp. 742–747.
KDDKDD-2006-YeW #analysis
Regularized discriminant analysis for high dimensional, low sample size data (JY, TW), pp. 454–463.
KDDKDD-2006-YuYTKW #analysis #component #probability
Supervised probabilistic principal component analysis (SY, KY, VT, HPK, MW), pp. 464–473.
SEKESEKE-2006-BokhariP #analysis #modelling #petri net #uml
Translation of UML Models to Object Coloured Petri Nets with a view to Analysis (AB, WFSP), pp. 568–571.
SEKESEKE-2006-GaaloulG #analysis #mining #statistics #workflow
A Workflow Mining Tool based on Logs Statistical Analysis (WG, CG), pp. 595–600.
SEKESEKE-2006-GokhaleY #analysis #architecture #pipes and filters #reliability
Reliability Analysis of Pipe and Filter Architecture Style (SSG, SMY), pp. 625–630.
SEKESEKE-2006-GrauCFN #analysis #comparative #modelling
A Comparative Analysis of i*Agent-Oriented Modelling Techniques (GG, CC, XF, FN), pp. 657–663.
SEKESEKE-2006-PiaoWCC #analysis #diagrams #process #uml
An Analysis Model of Activity Diagram in UML 2.0 (WCP, CHW, WCC, LPC), pp. 562–567.
SEKESEKE-2006-SartipiS #analysis #concept #evaluation #execution #mining
Application of Execution Pattern Mining and Concept Lattice Analysis on Software Structure Evaluation (KS, HS), pp. 302–308.
SEKESEKE-2006-SteinmacherLH #analysis #process #simulation #using #workflow
Task Anticipation: A Quantitative Analysis Using Workflow Process Simulation (IS, JVdL, EHMH), pp. 601–606.
SEKESEKE-2006-SunSADH #analysis #design #formal method #middleware #modelling
Achieving a Better Middleware Design through Formal Modeling and Analysis (WS, TS, GAG, YD, XH), pp. 463–468.
SEKESEKE-2006-ZhangKY #concept analysis #modelling #uml #web
UML Modelling Web Applications via Formal Concept Analysis (ZZ, JK, HY), pp. 532–535.
SIGIRSIGIR-2006-CaiHH #analysis #documentation
Tensor space model for document analysis (DC, XH, JH), pp. 625–626.
SIGIRSIGIR-2006-JinFM #analysis #consistency #feedback #nondeterminism #performance
Quantative analysis of the impact of judging inconsistency on the performance of relevance feedback (XJ, JCF, JM), pp. 655–656.
SIGIRSIGIR-2006-JordanHK #analysis #approach #named
Swordfish: an unsupervised Ngram based approach to morphological analysis (CJ, JH, VK), pp. 657–658.
SIGIRSIGIR-2006-NieDQ #analysis #topic #web
Topical link analysis for web search (LN, BDD, XQ), pp. 91–98.
SIGIRSIGIR-2006-Olsson #analysis #classification #set
An analysis of the coupling between training set and neighborhood sizes for the kNN classifier (JSO), pp. 685–686.
SIGIRSIGIR-2006-WangSCZ #analysis #multi #semantics
Latent semantic analysis for multiple-type interrelated data objects (XW, JTS, ZC, CZ), pp. 236–243.
SIGIRSIGIR-2006-YanH #analysis #multi #probability #query #retrieval
Probabilistic latent query analysis for combining multiple retrieval sources (RY, AGH), pp. 324–331.
SIGIRSIGIR-2006-ZhangOFM #analysis #linear #recommendation
Analysis of a low-dimensional linear model under recommendation attacks (SZ, YO, JF, FM), pp. 517–524.
ECMFAECMDA-FA-2006-MottuBT #analysis #model transformation #mutation testing #testing
Mutation Analysis Testing for Model Transformations (JMM, BB, YLT), pp. 376–390.
ECMFAECMDA-FA-2006-Perez-MartinezS #analysis #architecture
From Analysis Model to Software Architecture: A PIM2PIM Mapping (JEPM, ASA), pp. 25–39.
MODELSMoDELS-2006-ArevaloFHN #abstraction #approach #concept analysis #modelling
Building Abstractions in Class Models: Formal Concept Analysis in a Model-Driven Approach (GA, JRF, MH, CN), pp. 513–527.
MODELSMoDELS-2006-BruckerDW #analysis #model transformation #semantics
A Model Transformation Semantics and Analysis Methodology for SecureUML (ADB, JD, BW), pp. 306–320.
MODELSMoDELS-2006-GarousiBL #analysis #behaviour #dependence #distributed #modelling #uml #visualisation
Analysis and Visualization of Behavioral Dependencies Among Distributed Objects Based on UML Models (VG, LCB, YL), pp. 365–379.
MODELSMoDELS-2006-GoldsbyCKK #analysis #assurance #formal method #framework #modelling #visualisation
A Visualization Framework for the Modeling and Formal Analysis of High Assurance Systems (HG, BHCC, SK, SK), pp. 707–721.
MODELSMoDELS-2006-LundellLPM #analysis #uml #xmi
UML Model Interchange in Heterogeneous Tool Environments: An Analysis of Adoptions of XMI 2 (BL, BL, AP, AM), pp. 619–630.
MODELSMoDELS-2006-MensSD #analysis #consistency #dependence #detection #nondeterminism #using
Detecting and Resolving Model Inconsistencies Using Transformation Dependency Analysis (TM, RVDS, MD), pp. 200–214.
MODELSMoDELS-2006-MullerFFHSGJ #analysis #modelling #syntax #synthesis
Model-Driven Analysis and Synthesis of Concrete Syntax (PAM, FF, FF, MH, RS, SG, JMJ), pp. 98–110.
MODELSMoDELS-2006-ArevaloFHN #abstraction #approach #concept analysis #modelling
Building Abstractions in Class Models: Formal Concept Analysis in a Model-Driven Approach (GA, JRF, MH, CN), pp. 513–527.
MODELSMoDELS-2006-BruckerDW #analysis #model transformation #semantics
A Model Transformation Semantics and Analysis Methodology for SecureUML (ADB, JD, BW), pp. 306–320.
MODELSMoDELS-2006-GarousiBL #analysis #behaviour #dependence #distributed #modelling #uml #visualisation
Analysis and Visualization of Behavioral Dependencies Among Distributed Objects Based on UML Models (VG, LCB, YL), pp. 365–379.
MODELSMoDELS-2006-GoldsbyCKK #analysis #assurance #formal method #framework #modelling #visualisation
A Visualization Framework for the Modeling and Formal Analysis of High Assurance Systems (HG, BHCC, SK, SK), pp. 707–721.
MODELSMoDELS-2006-LundellLPM #analysis #uml #xmi
UML Model Interchange in Heterogeneous Tool Environments: An Analysis of Adoptions of XMI 2 (BL, BL, AP, AM), pp. 619–630.
MODELSMoDELS-2006-MensSD #analysis #consistency #dependence #detection #nondeterminism #using
Detecting and Resolving Model Inconsistencies Using Transformation Dependency Analysis (TM, RVDS, MD), pp. 200–214.
MODELSMoDELS-2006-MullerFFHSGJ #analysis #modelling #syntax #synthesis
Model-Driven Analysis and Synthesis of Concrete Syntax (PAM, FF, FF, MH, RS, SG, JMJ), pp. 98–110.
ECOOPECOOP-2006-SiekT #analysis #c++ #semantics
A Semantic Analysis of C++ Templates (JGS, WT), pp. 304–327.
OOPSLAOOPSLA-2006-BlackburnGHKMBDFFGHHJLMPSVDW #analysis #benchmark #development #java #metric
The DaCapo benchmarks: java benchmarking development and analysis (SMB, RG, CH, AMK, KSM, RB, AD, DF, DF, SZG, MH, ALH, MJ, HBL, JEBM, AP, DS, TV, DvD, BW), pp. 169–190.
OOPSLAOOPSLA-2006-KitMB #analysis #requirements #semantics #using
Isolating and relating concerns in requirements using latent semantic analysis (LKK, CKM, ELAB), pp. 383–396.
OOPSLAOOPSLA-2006-MaebeBEB #java #named #program analysis #tool support
Javana: a system for building customized Java program analysis tools (JM, DB, LE, KDB), pp. 153–168.
QAPLQAPL-2005-KwiatkowskaNP06 #analysis #model checking #probability
Quantitative Analysis With the Probabilistic Model Checker PRISM (MZK, GN, DP), pp. 5–31.
GPCEGPCE-2006-VieraP #analysis #multi
A multi-stage language with intensional analysis (MV, AP), pp. 11–20.
LOPSTRLOPSTR-2006-Schneider-KampGST #analysis #automation #logic programming #source code #term rewriting #termination
Automated Termination Analysis for Logic Programs by Term Rewriting (PSK, JG, AS, RT), pp. 177–193.
PPDPPPDP-2006-Miller #analysis #horn clause #source code
Collection analysis for Horn clause programs (DM), pp. 179–188.
QAPLQAPL-2006-AdaoMRV #analysis #protocol #security #towards
Towards a Quantitative Analysis of Security Protocols (PA, PM, TR, LV), pp. 3–25.
QAPLQAPL-2006-SotinCJ #behaviour #java #static analysis
Quantitative Static Analysis Over Semirings: Analysing Cache Behaviour for Java Card (PS, DC, TPJ), pp. 153–167.
QAPLQAPL-2006-ZhangH #analysis #formal method #protocol #streaming
Formal Analysis of Streaming Downloading Protocol for System Upgrading (MZ, DVH), pp. 205–224.
PADLPADL-2006-NavasBH #analysis #clique #performance #top-down #using
Efficient Top-Down Set-Sharing Analysis Using Cliques (JAN, FB, MVH), pp. 183–198.
POPLPOPL-2006-MeunierFF #analysis #composition #contract
Modular set-based analysis from contracts (PM, RBF, MF), pp. 218–231.
POPLPOPL-2006-MightS #analysis
Environment analysis via Delta CFA (MM, OS), pp. 127–140.
RERE-2006-ChenZZM #analysis #dependence #identification #requirements
Identification of Crosscutting Requirements Based on Feature Dependency Analysis (KC, HZ, WZ, HM), pp. 300–303.
RERE-2006-CornfordFHJ #analysis #modelling #requirements
Fusing Quantitative Requirements Analysis with Model-based Systems Engineering (SLC, MSF, VAH, JSJ), pp. 272–277.
RERE-2006-EbnenasirCK #analysis #case study #fault tolerance #modelling
Use Case-Based Modeling and Analysis of Failsafe Fault-Tolerance (AE, BHCC, SK), pp. 336–337.
RERE-2006-JiangTBM #analysis #biology #case study #data transformation #database #design
Incorporating Goal Analysis in Database Design: A Case Study from Biological Data Management (LJ, TT, AB, JM), pp. 196–204.
RERE-2006-LiaskosLYYM #analysis #on the #variability
On Goal-based Variability Acquisition and Analysis (SL, AL, YY, ESKY, JM), pp. 76–85.
RERE-2006-LiuJ #analysis #problem #requirements
Integrating Goals and Problem Frames in Requirements Analysis (LL, ZJ), pp. 342–343.
RERE-2006-MehnerMT #analysis #aspect-oriented #interactive #modelling
Interaction Analysis in Aspect-Oriented Models (KM, MM, GT), pp. 66–75.
SACSAC-2006-AgostaCPS #analysis #bytecode #compilation #performance
Selective compilation via fast code analysis and bytecode tracing (GA, SCR, PP, MS), pp. 906–911.
SACSAC-2006-BelguidoumD #analysis #component #dependence #deployment
Analysis of deployment dependencies in software components (MB, FD), pp. 735–736.
SACSAC-2006-BiermanMPS #analysis #array #image #named
MACE: lossless compression and analysis of microarray images (RB, NM, CP, RS), pp. 167–172.
SACSAC-2006-Capron #bound #static analysis
Static analysis of time bounded reactive properties of Boolean symbols (GC), pp. 1827–1834.
SACSAC-2006-ChengCW #analysis #composition #named #scalability
ARCATS: a scalable compositional analysis tool suite (YPC, YRC, HYW), pp. 1852–1853.
SACSAC-2006-CutelloNO #algorithm #analysis #heuristic
Analysis of an evolutionary algorithm with HyperMacromutation and stop at first constructive mutation heuristic for solving trap functions (VC, GN, PSO), pp. 945–949.
SACSAC-2006-DattaE #analysis #requirements #workflow
Effects of changing requirements: a tracking mechanism for the analysis workflow (SD, RvE), pp. 1739–1744.
SACSAC-2006-DextersPG #algorithm #analysis #probability
A probability analysis for candidate-based frequent itemset algorithms (ND, PWP, DVG), pp. 541–545.
SACSAC-2006-FangFHT #analysis #geometry #image
Digital geometry image analysis for medical diagnosis (JF, SF, JH, MT), pp. 217–221.
SACSAC-2006-GotoC #analysis #logic
A quantitative analysis of implicational paradoxes in classical mathematical logic (YG, JC), pp. 42–43.
SACSAC-2006-HeatherS #analysis #infinity #protocol #security
To infinity and beyond or, avoiding the infinite in security protocol analysis (JH, SS), pp. 346–353.
SACSAC-2006-LangstonPSSV #data analysis
Innovative computational methods for transcriptomic data analysis (MAL, ADP, AMS, JAS, BHV), pp. 190–194.
SACSAC-2006-NorguetZS #analysis #semantics #web
Semantic analysis of web site audience (JPN, EZ, RS), pp. 525–529.
SACSAC-2006-OrshanskyWCX #analysis #robust #statistics
Interval-based robust statistical techniques for non-negative convex functions, with application to timing analysis of computer chips (MO, WSW, MC, GX), pp. 1645–1649.
SACSAC-2006-OsorioK #analysis #behaviour
An initial analysis and presentation of malware exhibiting swarm-like behavior (FCCO, ZK), pp. 323–329.
SACSAC-2006-RuizCCP #algebra #analysis #concurrent #e-commerce #process #protocol #set #using
Analysis of the SET e-commerce protocol using a true concurrency process algebra (MCR, DC, FC, JJP), pp. 879–886.
SACSAC-2006-WangS #analysis
Escape analysis for synchronization removal (LW, XS), pp. 1419–1423.
SACSAC-2006-WuGL #analysis #database #modelling #towards
Towards value disclosure analysis in modeling general databases (XW, SG, YL), pp. 617–621.
FSEFSE-2006-YeCCX #analysis #collaboration
Local analysis of atomicity sphere for B2B collaboration (CY, SCC, WKC, CX), pp. 186–196.
ICSEICSE-2006-CeballosG #analysis #performance
P2P file sharing analysis for a better performance (MRC, JLG), pp. 941–944.
ICSEICSE-2006-DubocRW #analysis #framework #modelling #scalability
A framework for modelling and analysis of software systems scalability (LD, DSR, TW), pp. 949–952.
ICSEICSE-2006-FurusawaCW #analysis #bibliography #design #modelling #performance
Efficiency analysis of model-based review in actual software design (HF, EHC, HW), pp. 604–607.
ICSEICSE-2006-GallL #analysis #evolution #visualisation
Software evolution: analysis and visualization (HG, ML), pp. 1055–1056.
ICSEICSE-2006-KitchenhamKJC #analysis #database #lessons learnt #scalability
Lessons learnt from the analysis of large-scale corporate databases (BK, CK, DRJ, CC), pp. 439–444.
ICSEICSE-2006-KobayashiKSP #agile #analysis #effectiveness #interactive
Analysis of the interaction between practices for introducing XP effectively (OK, MK, MS, EP), pp. 544–550.
ICSEICSE-2006-ManoliosV #proving #static analysis #termination #theorem proving
Integrating static analysis and general-purpose theorem proving for termination analysis (PM, DV), pp. 873–876.
ICSEICSE-2006-MartinX #analysis #comprehension #interface #string
Understanding software application interfaces via string analysis (EM, TX), pp. 901–904.
ICSEICSE-2006-NakagawaKH #analysis #modelling #multi
Analysis of multi-agent systems based on KAOS modeling (HN, TK, SH), pp. 926–929.
ICSEICSE-2006-Ruthruff #paradigm #program analysis
Experimental program analysis: a new paradigm for program analysis (JRR), pp. 977–980.
ICSEICSE-2006-VerlekarA #analysis #distributed #performance
A methodology and tool for performance analysis of distributed server systems (RPV, VA), pp. 913–916.
ICSEICSE-2006-Zhao #analysis #approach #testing
A new approach for software testability analysis (LZ), pp. 985–988.
LDTALDTA-2006-EichbergKKMS #analysis #incremental
Incremental Confined Types Analysis (ME, SK, SK, MM, TS), pp. 81–96.
SPLCSPLC-2006-LeeKKP #analysis #aspect-oriented #development #feature model #product line #programming
Combining Feature-Oriented Analysis and Aspect-Oriented Programming for Product Line Asset Development (KL, KCK, MK, SP), pp. 103–112.
ASPLOSASPLOS-2006-SilvaS #analysis #optimisation #pointer #probability
A probabilistic pointer analysis for speculative optimizations (JDS, JGS), pp. 416–425.
CCCC-2006-BaconCFGHR #analysis #named #online #realtime #visualisation
Demonstration: On-Line Visualization and Analysis of Real-Time Systems with TuningFork (DFB, PC, DF, DG, MH, VTR), pp. 96–100.
CCCC-2006-FangCOW #analysis #distance #reuse
Path-Based Reuse Distance Analysis (CF, SC, , ZW), pp. 32–46.
CCCC-2006-LamprechtMS #analysis #data flow #model checking
Data-Flow Analysis as Model Checking Within the jABC (ALL, TMS, BS), pp. 101–104.
CCCC-2006-LhotakH #analysis #points-to #question
Context-Sensitive Points-to Analysis: Is It Worth It? (OL, LJH), pp. 47–64.
CCCC-2006-RountevKM #analysis #data flow #interprocedural #library #scalability
Interprocedural Dataflow Analysis in the Presence of Large Libraries (AR, SK, TJM), pp. 2–16.
CCCC-2006-TokGL #analysis #data flow #interprocedural #performance #pointer
Efficient Flow-Sensitive Interprocedural Data-Flow Analysis in the Presence of Pointers (TBT, SZG, CL), pp. 17–31.
CGOCGO-2006-ChakrabartiL #analysis #heuristic
Inline Analysis: Beyond Selection Heuristics (DRC, SML), pp. 221–232.
CGOCGO-2006-LauPC #analysis
Selecting Software Phase Markers with Code Structure Analysis (JL, EP, BC), pp. 135–146.
HPCAHPCA-2006-JosephVT #analysis #linear #modelling #performance
Construction and use of linear regression models for processor performance analysis (PJJ, KV, MJT), pp. 99–108.
LCTESLCTES-2006-Mine #analysis #c #embedded #pointer #source code
Field-sensitive value analysis of embedded C programs with union types and pointer arithmetics (AM), pp. 54–63.
LCTESLCTES-2006-SandbergEGL #analysis #performance #slicing
Faster WCET flow analysis by program slicing (CS, AE, JG, BL), pp. 103–112.
LCTESLCTES-2006-ZhuangP #analysis #compilation #concurrent #effectiveness #network #thread
Effective thread management on network processors with compiler analysis (XZ, SP), pp. 72–82.
OSDIOSDI-2006-JoukovTIWZ #analysis #latency #operating system #profiling
Operating System Profiling via Latency Analysis (NJ, AT, RI, CPW, EZ), pp. 89–102.
CAVCAV-2006-BeyerHT #analysis #lazy evaluation
Lazy Shape Analysis (DB, TAH, GT), pp. 532–546.
CAVCAV-2006-Lev-AmiIS #abstraction #analysis #performance #precise
Abstraction for Shape Analysis with Fast and Precise Transformers (TLA, NI, SS), pp. 547–561.
CAVCAV-2006-ManoliosV #analysis #graph #termination
Termination Analysis with Calling Context Graphs (PM, DV), pp. 401–414.
ICLPICLP-2006-MeraLPCH #estimation #execution #logic programming #profiling #static analysis #using
Using Combined Static Analysis and Profiling for Logic Program Execution Time Estimation (EM, PLG, GP, MC, MVH), pp. 431–432.
ISSTAISSTA-2006-CsallnerS #analysis #debugging #hybrid #named
DSD-Crasher: a hybrid analysis tool for bug finding (CC, YS), pp. 245–254.
ISSTAISSTA-2006-RuthruffER #paradigm #program analysis
Experimental program analysis: a new program analysis paradigm (JRR, SGE, GR), pp. 49–60.
ISSTAISSTA-2006-Wagner #analysis #detection #quality
A model and sensitivity analysis of the quality economics of defect-detection techniques (SW0), pp. 73–84.
ISSTAISSTA-2006-ZhangKPWJMZ #analysis
The case for analysis preserving language transformation (XZ, LK, MP, SW, TJ, GM, LZ), pp. 191–202.
RTARTA-2006-GieslSST #analysis #automation #haskell #programming language #term rewriting #termination
Automated Termination Analysis for Haskell: From Term Rewriting to Programming Languages (JG, SS, PSK, RT), pp. 297–312.
ICSTSAT-2006-ChaviraD #analysis #component #encoding
Encoding CNFs to Empower Component Analysis (MC, AD), pp. 61–74.
ICSTSAT-2006-WatanabeY #analysis #problem #satisfiability
Average-Case Analysis for the MAX-2SAT Problem (OW, MY), pp. 277–282.
ICTSSTestCom-2006-CsorbaPDC #analysis #concurrent #performance
Performance Analysis of Concurrent PCOs in TTCN-3 (MJC, SP, SD, GC), pp. 149–160.
VMCAIVMCAI-2006-ChangCN #framework #program analysis #safety
A Framework for Certified Program Analysis and Its Applications to Mobile-Code Safety (BYEC, AC, GCN), pp. 174–189.
VMCAIVMCAI-2006-KobayashiSW #analysis #resource management #π-calculus
Resource Usage Analysis for the pi-Calculus (NK, KS, LW), pp. 298–312.
VMCAIVMCAI-2006-SankaranarayananCSM #analysis #performance #relational
Efficient Strongly Relational Polyhedral Analysis (SS, MC, HBS, ZM), pp. 111–125.
VMCAIVMCAI-2006-WiesKLPR #analysis #constraints
Field Constraint Analysis (TW, VK, PL, AP, MCR), pp. 157–173.
CBSECBSE-2005-Rountev #analysis #component #data flow
Component-Level Dataflow Analysis (AR), pp. 82–89.
WICSAWICSA-2005-Garlan #analysis #architecture #evaluation
Software Architecture Evaluation and Analysis Session Report (DG), pp. 227–228.
WICSAWICSA-2005-SmithS #analysis #architecture #automation
Extending SPQR to Architectural Analysis by Semi-Automated Training (JMS, PDS), pp. 239–242.
WICSAWICSA-2005-TekinerdoganSA #analysis #architecture #reliability #using
Software Architecture Reliability Analysis Using Failure Scenarios (BT, HS, MA), pp. 203–204.
WICSAWICSA-2005-WangSM #analysis #architecture #named
ACCA: An Architecture-Centric Concern Analysis Method (ZW, KS, NHM), pp. 99–108.
ASEASE-2005-CaiS #analysis #design #modelling #named
Simon: modeling and analysis of design space structures (YC, KJS), pp. 329–332.
ASEASE-2005-FredrikssonTC #analysis #component #design #development #framework #non-functional
A component-based development framework for supporting functional and non-functional analysis in control system design (JF, MT, IC), pp. 368–371.
ASEASE-2005-FriasGSB #analysis #performance #relational #specification #verification
A strategy for efficient verification of relational specifications, based on monotonicity analysis (MFF, RG, GS, LB), pp. 305–308.
ASEASE-2005-HalfondO #analysis #injection #monitoring #named
AMNESIA: analysis and monitoring for NEutralizing SQL-injection attacks (WGJH, AO), pp. 174–183.
ASEASE-2005-HennessyP #analysis #generative #grammarware #testing
An analysis of rule coverage as a criterion in generating minimal test suites for grammar-based software (MH, JFP), pp. 104–113.
ASEASE-2005-JurjensY #analysis #security
Code security analysis with assertions (JJ, MY), pp. 392–395.
ASEASE-2005-LangelierSP #analysis #quality #scalability #visualisation
Visualization-based analysis of quality for large-scale software systems (GL, HAS, PP), pp. 214–223.
ASEASE-2005-LienhardDA #concept analysis #identification
Identifying traits with formal concept analysis (AL, SD, GA), pp. 66–75.
CASECASE-2005-JainR #analysis #modelling #using
Analysis of base-stock controlled production-inventory system using discrete-time queueing models (SJ, NRSR), pp. 37–42.
CASECASE-2005-KoschwanezHCMGM #analysis #automation
Automated lifetime analysis of a single yeast cell (JK, MH, RHC, MM, DG, DRM), pp. 13–18.
CASECASE-2005-LeeH #analysis #array #design
An integrated system of microcantilever arrays with carbon nanotube tips for bio/nano analysis: design and control (EL, HSH), pp. 113–117.
CASECASE-2005-LeeP #analysis #constraints #graph
Steady state analysis of a timed event graph with time window constraints (TEL, SHP), pp. 404–409.
CASECASE-2005-MillerSSLM #analysis #using
Biopsy preparation for flow analysis using microfabricated disaggregation blades (AKM, MLS, CAS, XL, SM), pp. 1–6.
DACDAC-2005-AgarwalCBZ #analysis #optimisation #statistics #using
Circuit optimization using statistical static timing analysis (AA, KC, DB, VZ), pp. 321–324.
DACDAC-2005-AminMKDCHI #analysis #how #question #statistics
Statistical static timing analysis: how simple can we get? (CSA, NM, KK, FD, UC, NH, YII), pp. 652–657.
DACDAC-2005-ChangS #analysis #correlation #power management #process
Full-chip analysis of leakage power under process variations, including spatial correlations (HC, SSS), pp. 523–528.
DACDAC-2005-ChangZNV #analysis #parametricity #statistics
Parameterized block-based statistical timing analysis with non-gaussian parameters, nonlinear delay functions (HC, VZ, SN, CV), pp. 71–76.
DACDAC-2005-ChenDHSW #analysis #concurrent #design #simulation
Simulation based deadlock analysis for system level designs (XC, AD, HH, ALSV, YW), pp. 260–265.
DACDAC-2005-DililloGPVB #analysis #comparison #fault #injection
Resistive-open defect injection in SRAM core-cell: analysis and comparison between 0.13 µm and 90 nm technologies (LD, PG, SP, AV, MB), pp. 857–862.
DACDAC-2005-GuptaKKS #analysis
Advanced Timing Analysis Based on Post-OPC Extraction of Critical Dimensions (PG, ABK, YK, DS), pp. 365–368.
DACDAC-2005-HuLWD #analysis #integration #novel #using
Analysis of full-wave conductor system impedance over substrate using novel integration techniques (XH, JHL, JW, LD), pp. 147–152.
DACDAC-2005-KhandelwalS #analysis #correlation #framework #statistics
A general framework for accurate statistical timing analysis considering correlations (VK, AS), pp. 89–94.
DACDAC-2005-Li #analysis #grid #performance #power management #simulation
Power grid simulation via efficient sampling-based sensitivity analysis and hierarchical symbolic relaxation (PL), pp. 664–669.
DACDAC-2005-Najm #analysis #on the #statistics
On the need for statistical timing analysis (FNN), pp. 764–765.
DACDAC-2005-SuWKLK #analysis #effectiveness #embedded #functional #performance
A noise-driven effective capacitance method with fast embedded noise rule calculation for functional noise analysis (HS, DW, CVK, FL, BK), pp. 186–189.
DACDAC-2005-YangCS #analysis
Advanced timing analysis based on post-OPC extraction of critical dimensions (JY, LC, DS), pp. 359–364.
DACDAC-2005-ZhangCHGC #analysis #polynomial #statistics
Correlation-preserved non-gaussian statistical timing analysis with quadratic timing model (LZ, WC, YH, JAG, CCPC), pp. 83–88.
DACDAC-2005-ZhanSLPNS #analysis #statistics
Correlation-aware statistical timing analysis with non-gaussian delay distributions (YZ, AJS, XL, LTP, DN, MS), pp. 77–82.
DACDAC-2005-Zhu #analysis #pointer #scalability #towards
Towards scalable flow and context sensitive pointer analysis (JZ), pp. 831–836.
DATEDATE-2005-Al-ArsHMG #analysis #fault #framework #generative #testing
Framework for Fault Analysis and Test Generation in DRAMs (ZAA, SH, GM, AJvdG), pp. 1020–1021.
DATEDATE-2005-AlbersS #analysis #performance #realtime #scheduling
Efficient Feasibility Analysis for Real-Time Systems with EDF Scheduling (KA, FS), pp. 492–497.
DATEDATE-2005-BurguiereR #branch #modelling #predict
A Contribution to Branch Prediction Modeling in WCET Analysi (CB, CR), pp. 612–617.
DATEDATE-2005-ChakrabortyT #analysis #scheduling #streaming
A New Task Model for Streaming Applications and Its Schedulability Analysis (SC, LT), pp. 486–491.
DATEDATE-2005-Conti #analysis #architecture #power management
SystemC Analysis of a New Dynamic Power Management Architectur (MC), pp. 177–178.
DATEDATE-2005-ContiM #analysis #standard
System Level Analysis of the Bluetooth Standard (MC, DM), pp. 118–123.
DATEDATE-2005-DhillonDC #analysis #optimisation
Soft-Error Tolerance Analysis and Optimization of Nanometer Circuits (YSD, AUD, AC), pp. 288–293.
DATEDATE-2005-ForzanP #analysis #behaviour #library #modelling
Modeling the Non-Linear Behavior of Library Cells for an Accurate Static Noise Analysis (CF, DP), pp. 982–983.
DATEDATE-2005-GhantaVPW #analysis #grid #power management #probability #process
Stochastic Power Grid Analysis Considering Process Variations (PG, SBKV, RP, JMW), pp. 964–969.
DATEDATE-2005-HeniaE #analysis #distributed #scheduling
Context-Aware Scheduling Analysis of Distributed Systems with Tree-Shaped Task-Dependencies (RH, RE), pp. 480–485.
DATEDATE-2005-KangPR #analysis #statistics #using
Statistical Timing Analysis using Levelized Covariance Propagation (KK, BCP, KR), pp. 764–769.
DATEDATE-2005-LiC #analysis #clustering #hybrid #sequence
Hybrid BIST Based on Repeating Sequences and Cluster Analysis (LL, KC), pp. 1142–1147.
DATEDATE-2005-LiuFYO #analysis #correlation #graph #modelling
Hierarchical Variance Analysis for Analog Circuits Based on Graph Modelling and Correlation Loop Tracing (FL, JJF, DVY, SO), pp. 126–131.
DATEDATE-2005-MangassarianA #analysis #on the #statistics
On Statistical Timing Analysis with Inter- and Intra-Die Variations (HM, MA), pp. 132–137.
DATEDATE-2005-MilevB #analysis
A Tool and Methodology for AC-Stability Analysis of Continuous-Time Closed-Loop Systems (MM, RB), pp. 204–208.
DATEDATE-2005-MukhopadhyayBR #analysis #logic #modelling
Modeling and Analysis of Loading Effect in Leakage of Nano-Scaled Bulk-CMOS Logic Circuits (SM, SB, KR), pp. 224–229.
DATEDATE-2005-NazarianPTLA #analysis #modelling
Modeling and Propagation of Noisy Waveforms in Static Timing Analysis (SN, MP, ET, TL, AHA), pp. 776–777.
DATEDATE-2005-PomeranzR #analysis #detection #testing #worst-case
Worst-Case and Average-Case Analysis of n-Detection Test Sets (IP, SMR), pp. 444–449.
DATEDATE-2005-SchianoOLPS #analysis #fault #on the #reliability
On the Analysis of Reed Solomon Coding for Resilience to Transient/Permanent Faults in Highly Reliable Memories (LS, MO, FL, SP, AS), pp. 580–585.
DATEDATE-2005-ShenQL #algorithm #analysis #performance
A Faster Counterexample Minimization Algorithm Based on Refutation Analysis (SS, YQ, SL), pp. 672–677.
DATEDATE-2005-SoensPWD #analysis #simulation
Simulation Methodology for Analysis of Substrate Noise Impact on Analog / RF Circuits Including Interconnect Resistance (CS, GVdP, PW, SD), pp. 270–275.
DATEDATE-2005-StaschulatESW #analysis #performance
Context Sensitive Performance Analysis of Automotive Applications (JS, RE, AS, FW), pp. 165–170.
DATEDATE-2005-VargheseCY #analysis #using
Systematic Analysis of Active Clock Deskewing Systems Using Control Theory (VV, TC, PMY), pp. 820–825.
DATEDATE-2005-WangMDCM #analysis #embedded #energy #process #variability
Systematic Analysis of Energy and Delay Impact of Very Deep Submicron Process Variability Effects in Embedded SRAM Modules (HW, MM, WD, FC, KM), pp. 914–919.
DATEDATE-2005-ZhangCHC #analysis #pseudo #statistics
Statistical Timing Analysis with Extended Pseudo-Canonical Timing Model (LZ, WC, YH, CCPC), pp. 952–957.
HTHT-2005-Henzinger #analysis #web
Hyperlink analysis on the world wide web (MRH), pp. 1–3.
HTHT-2005-HorieYK #analysis #higher-order #rank #web
Higher-order rank analysis for web structure (IH, KY, KK), pp. 98–106.
HTHT-2005-MantratzisOC #analysis #html #navigation #using
Separating XHTML content from navigation clutter using DOM-structure block analysis (CM, MAO, SC), pp. 145–147.
ICDARICDAR-2005-AradhyeMH #analysis #categorisation #email #image #performance
Image Analysis for Efficient Categorization of Image-based Spam E-mail (HBA, GKM, JAH), pp. 914–918.
ICDARICDAR-2005-BerardiACM #analysis #layout #process
A color-based layout analysis to process censorship cards of film archives (MB, OA, MC, DM), pp. 1110–1114.
ICDARICDAR-2005-ChenL #algorithm #analysis #component #independence #segmentation
Independent Component Analysis Segmentation Algorithm (YC, GL), pp. 680–684.
ICDARICDAR-2005-GarainC #analysis #approach #multi #segmentation
Segmentation of Touching Symbols for OCR of Printed Mathematical Expressions: An Approach based on Multifactorial Analysis (UG, BBC), pp. 177–181.
ICDARICDAR-2005-IshitaniFS #analysis #classification #documentation #xml
Table Structure Analysis Based on Cell Classification and Cell Modification for XML Document Transformation (YI, KF, KS), pp. 1247–1252.
ICDARICDAR-2005-LavenLR #analysis #approach #documentation #image #learning #statistics
A Statistical Learning Approach To Document Image Analysis (KL, SL, STR), pp. 357–361.
ICDARICDAR-2005-LiSC #analysis #matrix #multi
A Threshlod Selection Method Based on Multiscale and Graylevel Co-occurrence Matrix Analysis (YL, CYS, MC), pp. 575–579.
ICDARICDAR-2005-NakamuraK #analysis #online
Individuality Analysis of Online Kanji Handwriting (YN, MK), pp. 620–624.
ICDARICDAR-2005-SclaroffBKAALMT #analysis #gesture #recognition #video
Tracking, Analysis, and Recognition of Human Gestures in Video (SS, MB, GK, JA, VA, RL, JJM, TPT), pp. 806–810.
ICDARICDAR-2005-SextonS #analysis #matrix #semantics
Semantic Analysis of Matrix Structures (APS, VS), pp. 1141–1145.
ICDARICDAR-2005-YingsaereeK #analysis #detection #documentation #layout #rule-based
Rule-based Middle-level Character Detection for Simplifying Thai Document Layout Analysis (CY, AK), pp. 888–892.
PODSPODS-2005-AbadiW #analysis #documentation #encryption #security #xml
Security analysis of cryptographically controlled access to XML documents (MA, BW), pp. 108–117.
PODSPODS-2005-Gehrke #analysis #modelling #privacy #tutorial
Models and methods for privacy-preserving data publishing and analysis: invited tutorial (JG), p. 316.
PODSPODS-2005-LamWLMACU #database #program analysis #query
Context-sensitive program analysis as database queries (MSL, JW, VBL, MCM, DA, MC, CU), pp. 1–12.
SIGMODSIGMOD-2005-JahangiriS #data analysis #named
ProDA: a suite of web-services for progressive data analysis (MJ, CS), pp. 894–896.
CSEETCSEET-2005-WangS #analysis #architecture #student #using
Using Post Mortem Analysis to Evaluate Software Architecture Student Projects (AIW, TS), pp. 43–50.
ITiCSEITiCSE-2005-AhmadzadehEH #analysis #debugging #student
An analysis of patterns of debugging among novice computer science students (MA, DE, CH), pp. 84–88.
ITiCSEITiCSE-2005-Dick #analysis #assessment #design #learning #student
Student interviews as a tool for assessment and learning in a systems analysis and design course (MD), pp. 24–28.
ITiCSEITiCSE-2005-Hamza #analysis #approach #design #object-oriented
Introducing object-oriented analysis and design in lower-level undergraduate courses: a pattern-based approach (HSH), p. 350.
ITiCSEITiCSE-2005-NodelmanH #analysis
Complex analysis in computer graphics course (VN, BH), p. 381.
WRLAWRLA-2004-MeseguerT05 #analysis #encryption #protocol #reachability #using #verification
Symbolic Reachability Analysis Using Narrowing and its Application to Verification of Cryptographic Protocols (JM, PT), pp. 153–182.
ESOPESOP-2005-KremerR #analysis #protocol #π-calculus
Analysis of an Electronic Voting Protocol in the Applied π Calculus (SK, MR), pp. 186–200.
ESOPESOP-2005-LeeYY #analysis #automation #grammarware #pointer #source code #using #verification
Automatic Verification of Pointer Programs Using Grammar-Based Shape Analysis (OL, HY, KY), pp. 124–140.
ESOPESOP-2005-Muller-OlmS #analysis #composition
Analysis of Modular Arithmetic (MMO, HS), pp. 46–60.
FASEFASE-2005-JakobacEM #analysis #comprehension #interactive #source code
Improving System Understanding via Interactive, Tailorable, Source Code Analysis (VJ, AE, NM), pp. 253–268.
FASEFASE-2005-JurjensS #analysis #development #security #tool support #uml
Tools for Secure Systems Development with UML: Security Analysis with ATPs (JJ, PS), pp. 305–309.
FASEFASE-2005-LeicherS #analysis #composition #modelling #uml
Augmenting UML Models for Composition Conflict Analysis (AL, JGS), pp. 127–140.
TACASTACAS-2005-JeannetJRZ #analysis #approximate #testing
Symbolic Test Selection Based on Approximate Analysis (BJ, TJ, VR, EZ), pp. 349–364.
TACASTACAS-2005-JinHS #analysis #performance
Efficient Conflict Analysis for Finding All Satisfying Assignments of a Boolean Circuit (HJ, HH, FS), pp. 287–300.
TACASTACAS-2005-PnueliPR #analysis
Separating Fairness and Well-Foundedness for the Analysis of Fair Discrete Systems (AP, AP, AR), pp. 124–139.
CSMRCSMR-2005-Al-EkramK #analysis #framework #representation #xml
An XML-Based Framework for Language Neutral Program Representation and Generic Analysis (RAE, KK), pp. 42–51.
CSMRCSMR-2005-BodhuinT #impact analysis
A Tool for Static and Dynamic Model Extraction and Impact Analysis (TB, MT), p. 193.
CSMRCSMR-2005-BreechTP #algorithm #comparison #impact analysis #online
A Comparison of Online and Dynamic Impact Analysis Algorithms (BB, MT, LLP), pp. 143–152.
CSMRCSMR-2005-GreevyD #analysis #approach #correlation #using
Correlating Features and Code Using a Compact Two-Sided Trace Analysis Approach (OG, SD), pp. 314–323.
CSMRCSMR-2005-JiangLSS #analysis #comparison #uml #web #web service
UML-Level Analysis and Comparison of Web Service Descriptions (JJ, JL, PS, TS), pp. 236–240.
CSMRCSMR-2005-KarailaS #analysis #case study #industrial #maintenance #source code #visual notation
Maintenance and Analysis of Visual Programs — An Industrial Case (MK, TS), pp. 158–167.
ICSMEICSM-2005-AlvesCVSDBR #analysis #comparative #game studies #migration
Comparative Analysis of Porting Strategies in J2ME Games (VA, IC, HV, PHMS, ALGD, PB, GR), pp. 123–132.
ICSMEICSM-2005-GreevyDG #analysis #evolution #semantics
Analyzing Feature Traces to Incorporate the Semantics of Change in Software Evolution Analysis (OG, SD, TG), pp. 347–356.
ICSMEICSM-2005-HayesZ #analysis #evolution #maintenance #metric #predict
Maintainability Prediction: A Regression Analysis of Measures of Evolving Systems (JHH, LZ), pp. 601–604.
ICSMEICSM-2005-JinC #analysis #integration #ontology #re-engineering #tool support
Ontology-Based Software Analysis and Reengineering Tool Integration: The OASIS Service-Sharing Methodology (DJ, JRC), pp. 613–616.
ICSMEICSM-2005-Lock #analysis #modelling #named
Strider: Configuration Modelling and Analysis of Complex Systems (SL), pp. 495–504.
ICSMEICSM-2005-MilanovaR #analysis #constraints #precise
Annotated Inclusion Constraints for Precise Flow Analysis (AM, BGR), pp. 187–196.
ICSMEICSM-2005-SalahMAP #dynamic analysis #towards
Towards Employing Use-Cases and Dynamic Analysis to Comprehend Mozilla (MS, SM, GA, MDP), pp. 639–642.
ICSMEICSM-2005-SharpR #java #static analysis
Static Analysis of Object References in RMI-Based Java Software (MS, AR), pp. 101–110.
ICSMEICSM-2005-ShinomiT #aspect-oriented #impact analysis #programming #weaving
Impact Analysis of Weaving in Aspect-Oriented Programming (HS, TT), pp. 657–660.
ICSMEICSM-2005-StorzerG #analysis #aspect-oriented #evolution #using
Using Pointcut Delta Analysis to Support Evolution of Aspect-Oriented Software (MS, JG), pp. 653–656.
ICSMEICSM-IT-2005-Pacione #abstraction #analysis #named #network #visualisation
VANESSA: Visualisation Abstraction NEtwork for Software Systems Analysis (MJP), pp. 85–88.
IWPCIWPC-2005-FischerOGG #analysis #evolution #execution
System Evolution Tracking through Execution Trace Analysis (MF, JO, HCG, TG), pp. 237–246.
IWPCIWPC-2005-Hamou-LhadjLF #analysis #named
SEAT: A Usable Trace Analysis Tool (AHL, TCL, LF), pp. 157–160.
MSRMSR-2005-KimWB #analysis
Analysis of signature change patterns (SK, EJWJ, JB), pp. 16–20.
PASTEPASTE-2005-BradburyCD #analysis #effectiveness #empirical #formal method #framework #testing
An empirical framework for comparing effectiveness of testing and property-based formal analysis (JSB, JRC, JD), pp. 2–5.
PASTEPASTE-2005-ChristodorescuKG #analysis #string
String analysis for x86 binaries (MC, NK, WHG), pp. 88–95.
PASTEPASTE-2005-HampapuramYD #analysis #data flow #simulation
Symbolic path simulation in path-sensitive dataflow analysis (HH, YY, MD), pp. 52–58.
PASTEPASTE-2005-HovemeyerSP #debugging #null #pointer #static analysis
Evaluating and tuning a static analysis to find null pointer bugs (DH, JS, WP), pp. 13–19.
PASTEPASTE-2005-Myers #distributed #program analysis #program transformation
Making distributed systems secure with program analysis and transformation (ACM), p. 47.
PASTEPASTE-2005-PrivatD #compilation #object-oriented #performance #static analysis
Link-time static analysis for efficient separate compilation of object-oriented languages (JP, RD), pp. 20–27.
PASTEPASTE-2005-RountevVR #analysis #control flow #diagrams #reverse engineering #sequence chart #uml
Static control-flow analysis for reverse engineering of UML sequence diagrams (AR, OV, MR), pp. 96–102.
PASTEPASTE-2005-StroutMH #independence #program analysis
Representation-independent program analysis (MMS, JMMC, PDH), pp. 67–74.
PASTEPASTE-2005-TallamG #algorithm #concept analysis #testing
A concept analysis inspired greedy algorithm for test suite minimization (ST, NG), pp. 35–42.
SCAMSCAM-2005-BussEYW #analysis #pointer #text-to-text
Pointer Analysis for Source-to-Source Transformations (MB, SAE, BY, DGW), pp. 139–150.
SCAMSCAM-2005-FluriGP #analysis #fine-grained
Fine-Grained Analysis of Change Couplings (BF, HG, MP), pp. 66–74.
SCAMSCAM-2005-JonesK #analysis #garbage collection #performance #thread
A Fast Analysis for Thread-Local Garbage Collection with Dynamic Class Loading (REJ, ACK), pp. 129–138.
SCAMSCAM-2005-ShiN #component #java #static analysis
Static Analysis for Computing Escapability and Mutability for Java Components (AS, GN), pp. 119–128.
PLDIPLDI-2005-LukCMPKLWRH #named #program analysis #tool support
Pin: building customized program analysis tools with dynamic instrumentation (CKL, RSC, RM, HP, AK, PGL, SW, VJR, KMH), pp. 190–200.
SASSAS-2005-Abramsky #algorithm #game studies #semantics #static analysis
Algorithmic Game Semantics and Static Analysis (SA), p. 1.
SASSAS-2005-BruynoogheGH #analysis #logic programming #source code #termination
Inference of Well-Typings for Logic Programs with Application to Termination Analysis (MB, JPG, WVH), pp. 35–51.
SASSAS-2005-JungKSY #analysis #c #statistics
Taming False Alarms from a Domain-Unaware C Analyzer by a Bayesian Statistical Post Analysis (YJ, JK, JS, KY), pp. 203–217.
SASSAS-2005-KodumalA #analysis #constraints #named #scalability #tool support
Banshee: A Scalable Constraint-Based Analysis Toolkit (JK, AA), pp. 218–234.
SASSAS-2005-Muller-OlmS #analysis #framework #interprocedural
A Generic Framework for Interprocedural Analysis of Numerical Properties (MMO, HS), pp. 235–250.
SASSAS-2005-RinetzkySY #analysis #interprocedural #source code
Interprocedural Shape Analysis for Cutpoint-Free Programs (NR, MS, EY), pp. 284–302.
SASSAS-2005-SecciS #analysis #object-oriented #source code
Pair-Sharing Analysis of Object-Oriented Programs (SS, FS), pp. 320–335.
SASSAS-2005-SimonK #analysis
Exploiting Sparsity in Polyhedral Analysis (AS, AK), pp. 336–351.
ICALPICALP-2005-DonatoLT #algorithm #analysis #ranking #similarity
Stability and Similarity of Link Analysis Ranking Algorithms (DD, SL, PT), pp. 717–729.
FMFM-2005-BuchholtzGHM #analysis #framework #performance #security
End-to-End Integrated Security and Performance Analysis on the DEGAS Choreographer Platform (MB, SG, VH, CM), pp. 286–301.
FMFM-2005-CacheraJPS #analysis #memory management
Certified Memory Usage Analysis (DC, TPJ, DP, GS), pp. 91–106.
FMFM-2005-CelikuM #composition #cost analysis #probability #source code #specification
Compositional Specification and Analysis of Cost-Based Properties in Probabilistic Programs (OC, AM), pp. 107–122.
FMFM-2005-SharyginaCCS #analysis #component
Dynamic Component Substitutability Analysis (NS, SC, EMC, NS), pp. 512–528.
IFMIFM-2005-GrunskeLYW #analysis #automation #behaviour #design #specification
An Automated Failure Mode and Effect Analysis Based on High-Level Design Specification with Behavior Trees (LG, PAL, NY, KW), pp. 129–149.
SEFMSEFM-2005-BarthePS #analysis #logic #memory management #precise #using
Precise Analysis of Memory Consumption using Program Logics (GB, MP, GS), pp. 86–95.
SEFMSEFM-2005-CeroneLC #analysis #formal method #human-computer #interactive #model checking #using
Formal Analysis of Human-computer Interaction using Model-checking (AC, PAL, SC), pp. 352–362.
SEFMSEFM-2005-GeorgievaM #analysis #logic
Description Logics for Shape Analysis (LG, PM), pp. 321–331.
SEFMSEFM-2005-LanotteMT #analysis #automaton #data type #design #distributed
Timed Automata with Data Structures for Distributed Systems Design and Analysis (RL, AMS, AT), pp. 44–53.
SEFMSEFM-2005-WandelerJLT #automaton #interface #modelling #static analysis
Counting Interface Automata and their Application in Static Analysis of Actor Models (EW, JWJ, EAL, LT), pp. 106–116.
SFMSFM-2005-Grassi #analysis #mobile #performance
Performance Analysis of Mobile Systems (VG), pp. 107–154.
ICFPICFP-2005-BergerHY #alias #analysis #higher-order #imperative #logic
A logical analysis of aliasing in imperative higher-order functions (MB, KH, NY), pp. 280–293.
IFLIFL-2005-BradyH #execution #framework #static analysis
A Dependently Typed Framework for Static Analysis of Program Execution Costs (EB, KH), pp. 74–90.
IFLIFL-2005-GrelckSS #analysis #array #source code
A Binding Scope Analysis for Generic Programs on Arrays (CG, SBS, AVS), pp. 212–230.
CHICHI-2005-HinckleyBRG #analysis #design #gesture
Design and analysis of delimiters for selection-action pen gesture phrases in scriboli (KH, PB, GR, FG), pp. 451–460.
CHICHI-2005-LiHGL #analysis #user interface
Experimental analysis of mode switching techniques in pen-based user interfaces (YL, KH, ZG, JAL), pp. 461–470.
SOFTVISSOFTVIS-2005-JohannesSW #algorithm #analysis #animation #using #visualisation
Algorithm animation using shape analysis: visualising abstract executions (DJ, RS, RW), pp. 17–26.
SOFTVISSOFTVIS-2005-KholkarKSV #analysis #case study #specification #visual notation
Visual specification and analysis of use cases (DK, GMK, US, RV), pp. 77–85.
VISSOFTVISSOFT-2005-ClearyGEB #eclipse #plugin #static analysis #visualisation
A Combined Software Reconnaissance & Static Analysis Eclipse Visualisation Plug-in (BC, ALG, CE, JB), pp. 121–122.
VISSOFTVISSOFT-2005-RillingN #3d #analysis #comprehension #design pattern
Applying Code Analysis and 3D Design Pattern Grouping to Facilitate Program Comprehension (JR, VLN), pp. 123–124.
AdaSIGAda-2005-AlexandrID #ada #analysis #clustering #performance #source code
Experimental performance analysis of ada programs in cluster system (KA, SI, KD), pp. 31–36.
AdaSIGAda-2005-SinghoffLNM #analysis #memory management #requirements #scheduling
Scheduling and memory requirements analysis with AADL (FS, JL, LN, LM), pp. 1–10.
CAiSECAiSE-2005-Evermann #analysis #concept #modelling #ontology #using
The Association Construct in Conceptual Modelling — An Analysis Using the Bunge Ontological Model (JE), pp. 33–47.
EDOCEDOC-2005-JonkersILS #analysis #aspect-oriented #development #integration #modelling #non-functional
Integration and Analysis of Functional and Non-Functional Aspects in Model-Driven E-Service Development (HJ, MEI, MML, PS), pp. 229–238.
ICEISICEIS-v1-2005-AndreouL #analysis #parametricity #reliability
Nonparametric Analysis of Software Reliability: Revealing the Nature of Software Failure Dataseries (ASA, CL), pp. 138–145.
ICEISICEIS-v2-2005-MezaNMGC #analysis #modelling
Free Software for Decision Analysis: A Software Package for Data Envelopment Models (LAM, LBN, JCCBSdM, EGG, PHGC), pp. 207–212.
ICEISICEIS-v3-2005-Boulanger #analysis #named #safety
BRAIL — Safety Requirement Analysis (JLB), pp. 108–111.
ICEISICEIS-v3-2005-Liang #analysis #information management #modelling #specification
Dialogue Act Modelling for Analysis and Specification of Web-Based Information Systems (YL), pp. 89–97.
ICEISICEIS-v3-2005-MenkhausA #analysis #embedded #metric
Metric Suite Directing the Failure Mode Analysis of Embedded Software Systems (GM, BA), pp. 266–273.
ICEISICEIS-v3-2005-MisraKK #analysis #modelling
Modeling Strategic Actor Relationships to Support Risk Analysis and Control in Software Projects (SCM, VK, UK), pp. 288–293.
ICEISICEIS-v3-2005-PereiraTS #analysis #development
Sustainable Development and Investment in Information Technologies: A Socio-Economic Analysis (MJP, LVT, RS), pp. 81–88.
ICEISICEIS-v3-2005-YangLZ #analysis #performance #process
A Theoretical Performance Analysis Method for Business Process Model (LY, YL, XZ), pp. 73–80.
ICEISICEIS-v5-2005-RuschelIRF #analysis #concept #design #framework #process
Designing Geographic Analysis Processes on the Basis of the Conceptual Framework Geoframe (CR, CI, LVdR, JLF), pp. 91–97.
CIKMCIKM-2005-AlonsoL #analysis
Model-guided information discovery for intelligence analysis (RA, HL), pp. 269–270.
CIKMCIKM-2005-AslamY #analysis #geometry
A geometric interpretation and analysis of R-precision (JAA, EY), pp. 664–671.
CIKMCIKM-2005-MishneCHRS #analysis #automation
Automatic analysis of call-center conversations (GM, DC, RH, AR, AS), pp. 453–459.
CIKMCIKM-2005-WhitelawGA #analysis #sentiment #using
Using appraisal groups for sentiment analysis (CW, NG, SA), pp. 625–631.
ECIRECIR-2005-BalfeS #analysis #collaboration #query #similarity #web
An Analysis of Query Similarity in Collaborative Web Search (EB, BS), pp. 330–344.
ECIRECIR-2005-CachedaCPO #analysis #architecture #distributed #information retrieval #network
Network Analysis for Distributed Information Retrieval Architectures (FC, VC, VP, IO), pp. 527–529.
ECIRECIR-2005-DingCZ #analysis #clustering #concept #detection #video
Temporal Shot Clustering Analysis for Video Concept Detection (DD, LC, BZ), pp. 558–560.
ECIRECIR-2005-HauffA #analysis #documentation
Age Dependent Document Priors in Link Structure Analysis (CH, LA), pp. 552–554.
ICMLICML-2005-HeCM #analysis #locality #statistics
Statistical and computational analysis of locality preserving projection (XH, DC, WM), pp. 281–288.
ICMLICML-2005-Pietraszek #analysis #classification #optimisation #using
Optimizing abstaining classifiers using ROC analysis (TP), pp. 665–672.
ICMLICML-2005-PoczosL #analysis #independence #using
Independent subspace analysis using geodesic spanning trees (BP, AL), pp. 673–680.
ICMLICML-2005-ShaS #analysis #reduction
Analysis and extension of spectral methods for nonlinear dimensionality reduction (FS, LKS), pp. 784–791.
ICMLICML-2005-SinghPGBB #analysis #learning
Active learning for sampling in time-series experiments with application to gene expression analysis (RS, NP, DKG, BB, ZBJ), pp. 832–839.
ICMLICML-2005-StrehlL #analysis #estimation #modelling
A theoretical analysis of Model-Based Interval Estimation (ALS, MLL), pp. 856–863.
ICMLICML-2005-TorreK #analysis #multimodal
Multimodal oriented discriminant analysis (FDlT, TK), pp. 177–184.
KDDKDD-2005-ChenH #analysis #classification #image #network
A Bayesian network classifier with inverse tree structure for voxelwise magnetic resonance image analysis (RC, EH), pp. 4–12.
KDDKDD-2005-ItoSKM #analysis #kernel
Application of kernels to link analysis (TI, MS, TK, YM), pp. 586–592.
MLDMMLDM-2005-BunkeDIK #analysis #graph #learning #predict
Analysis of Time Series of Graphs: Prediction of Node Presence by Means of Decision Tree Learning (HB, PJD, CI, MK), pp. 366–375.
MLDMMLDM-2005-GhoshGYB #algorithm #analysis #comparative #network #search-based
Comparative Analysis of Genetic Algorithm, Simulated Annealing and Cutting Angle Method for Artificial Neural Networks (RG, MG, JY, AMB), pp. 62–70.
MLDMMLDM-2005-GuptaKB #classification #concept analysis #incremental #using
Incremental Classification Rules Based on Association Rules Using Formal Concept Analysis (AG, NK, VB), pp. 11–20.
MLDMMLDM-2005-HamanoS #analysis #semantics
Semantic Analysis of Association Rules via Item Response Theory (SH, MS), pp. 641–650.
MLDMMLDM-2005-HanCY #analysis #component #feature model #image #independence #using
Aquaculture Feature Extraction from Satellite Image Using Independent Component Analysis (JGH, KHC, YKY), pp. 660–666.
MLDMMLDM-2005-OhnishiI #analysis #component #detection #independence #using
Dominant Plane Detection Using Optical Flow and Independent Component Analysis (NO, AI), pp. 497–506.
MLDMMLDM-2005-XiaWZL #data mining #mining #modelling #random
Mixture Random Effect Model Based Meta-analysis for Medical Data Mining (YX, SW, CZ, SL), pp. 630–640.
SEKESEKE-2005-AyalaCCGHSFMQ #analysis #comparative #modelling
A Comparative Analysis of i*-Based Agent-Oriented Modeling Languages (CPA, CC, JPC, GG, MH, GS, XF, EM, CQ), pp. 43–50.
SEKESEKE-2005-JonssonW #comprehension #empirical #impact analysis
Understanding Impact Analysis: An Empirical Study to Capture Knowledge on Different Organisational Level (PJ, CW), pp. 707–712.
SEKESEKE-2005-KongOF #analysis #formal method #security #workflow
Formal Analysis of Workflow Systems with Security Considerations (WK, KO, KF), pp. 531–536.
SEKESEKE-2005-LiCLY #analysis #design #evolution #feature model #legacy #using
Using Feature-Oriented Analysis to Recover Legacy Software Design for Software Evolution (SL, FC, ZL, HY), pp. 336–341.
SEKESEKE-2005-LiuCBGROA #analysis #approach #component #composition #quality #requirements #two-level grammar
Quality of Service-Driven Requirements Analysis for Component Composition: A Two-Level Grammar+Approach (SHL, FC, BRB, JGG, RRR, AMO, MA), pp. 731–734.
SEKESEKE-2005-LungZ #analysis #architecture #combinator #design
Application of Design Combinatorial Theory to Scenario-Based Software Architecture Analysis (CHL, MZ), pp. 418–423.
SEKESEKE-2005-YuLYH #analysis #aspect-oriented #modelling
Formal Aspect-Oriented Modeling and Analysis by Aspect (HY, DL, LY, XH), pp. 169–174.
SIGIRSIGIR-2005-AgichteinCB #analysis #effectiveness
Analysis of factoid questions for effective relation extraction (EA, SC, EB), pp. 567–568.
SIGIRSIGIR-2005-LiY #analysis #recursion
Analysis of recursive feature elimination methods (FL, YY), pp. 633–634.
SIGIRSIGIR-2005-TeevanDH #analysis #automation #personalisation #process
Personalizing search via automated analysis of interests and activities (JT, STD, EH), pp. 449–456.
SIGIRSIGIR-2005-XueYZYC #analysis
Exploiting the hierarchical structure for link analysis (GRX, QY, HJZ, YY, ZC), pp. 186–193.
SIGIRSIGIR-2005-XuSMK #analysis #automation #music #summary #video
Automatic music video summarization based on audio-visual-text analysis and alignment (CX, XS, NCM, MSK), pp. 361–368.
ECMFAECMDA-FA-2005-GarousiBL #analysis #control flow #diagrams #sequence chart #uml
Control Flow Analysis of UML 2.0 Sequence Diagrams (VG, LCB, YL), pp. 160–174.
ECMFAECMDA-FA-2005-TabuchiSN #algebra #analysis #design #modelling #performance #probability #process #uml
Model-Driven Performance Analysis of UML Design Models Based on Stochastic Process Algebra (NT, NS, HN), pp. 41–58.
MODELSMoDELS-2005-ChengSB #analysis #automation #case study #experience #industrial #lessons learnt #modelling #uml
Lessons Learned from Automated Analysis of Industrial UML Class Models (An Experience Report) (BHCC, RS, BB), pp. 324–338.
MODELSMoDELS-2005-ShenP #analysis #aspect-oriented #modelling #performance #uml #using
Performance Analysis of UML Models Using Aspect-Oriented Modeling Techniques (HS, DCP), pp. 156–170.
MODELSMoDELS-2005-ChengSB #analysis #automation #case study #experience #industrial #lessons learnt #modelling #uml
Lessons Learned from Automated Analysis of Industrial UML Class Models (An Experience Report) (BHCC, RS, BB), pp. 324–338.
MODELSMoDELS-2005-ShenP #analysis #aspect-oriented #modelling #performance #uml #using
Performance Analysis of UML Models Using Aspect-Oriented Modeling Techniques (HS, DCP), pp. 156–170.
ECOOPECOOP-2005-PistoiaFKS #analysis #detection #interprocedural
Interprocedural Analysis for Privileged Code Placement and Tainted Variable Detection (MP, RJF, LK, VCS), pp. 362–386.
OOPSLAOOPSLA-2005-ShankarSBS #analysis #runtime
Runtime specialization with optimistic heap analysis (AS, SSS, RB, JES), pp. 327–343.
OOPSLAOOPSLA-2005-SridharanGSB #analysis #java #points-to
Demand-driven points-to analysis for Java (MS, DG, LS, RB), pp. 59–76.
QAPLQAPL-2004-AldiniP05 #analysis #on the #probability #protocol
On Quantitative Analysis of Probabilistic Protocols (AA, ADP), pp. 131–148.
QAPLQAPL-2004-HankinW05 #program analysis #λ-calculus
λ-calculus and Quantitative Program Analysis: (Extended Abstract) (CH, HW), pp. 5–18.
QAPLQAPL-2004-LanotteMT05 #analysis #automation #protocol
Automatic Analysis of a Non-Repudiation Protocol (RL, AMS, AT), pp. 113–129.
LOPSTRLOPSTR-2005-CorreasPHB #analysis #composition #source code
Experiments in Context-Sensitive Analysis of Modular Programs (JC, GP, MVH, FB), pp. 163–178.
PPDPPPDP-2005-Mitchell #analysis #logic #network #protocol #security
Security analysis of network protocols: logical and computational methods (JCM), pp. 151–152.
PPDPPPDP-2005-SahaR #analysis #incremental #logic programming #points-to #using
Incremental and demand-driven points-to analysis using logic programming (DS, CRR), pp. 117–128.
POPLPOPL-2005-GopanRS #analysis #array #framework
A framework for numeric analysis of array operations (DG, TWR, SS), pp. 338–350.
POPLPOPL-2005-GulwaniN #analysis #interprocedural #precise #random #using
Precise interprocedural analysis using random interpretation (SG, GCN), pp. 324–337.
POPLPOPL-2005-HackettR #analysis
Region-based shape analysis with tracked locations (BH, RR), pp. 310–323.
RERE-2005-BucchiaroneGP #analysis #case study #industrial #quality #requirements
Quality Analysis of NL Requirements: An Industrial Case Study (AB, SG, PP), pp. 390–394.
RERE-2005-CoheneE #analysis #design
Contextual Risk Analysis for Interview Design (TC, SME), pp. 95–104.
RERE-2005-Fuji #analysis #education #requirements
Finding Competitive Advantage in Requirements Analysis Education (TF), pp. 493–494.
RERE-2005-GrauFM #analysis #architecture #named
REDEPEND-REACT: an Architecture Analysis Tool (GG, XF, NAMM), pp. 455–456.
RERE-2005-LutzNPFT #analysis #identification #requirements #using
Identifying Contingency Requirements Using Obstacle Analysis (RRL, SN, APH, CRF, DT), pp. 263–272.
RERE-2005-Nakamura #analysis #integration #project management
Analysis of Project Management Reports of 49 System Integration Projects (TN), pp. 485–486.
RERE-2005-RobinsonWW #analysis #design #probability #requirements #using
Risk Mitigation of Design Requirements Using a Probabilistic Analysis (MCR, SEW, DCW), pp. 231–239.
RERE-2005-SvetinovicBG #analysis #concept #identification #object-oriented #student #why
Concept Identification in Object-Oriented Domain Analysis: Why Some Students Just Don’t Get It (DS, DMB, MWG), pp. 189–198.
SACSAC-2005-AbbasMG #analysis
Temporal analysis of infectious diseases: influenza (KA, ARM, RG), pp. 267–271.
SACSAC-2005-AversanoBT #assessment #impact analysis #process
Assessment and impact analysis for aligning business processes and software systems (LA, TB, MT), pp. 1338–1343.
SACSAC-2005-BleisteinCV #analysis #approach #requirements
Strategic alignment in requirements analysis for organizational IT: an integrated approach (SJB, KC, JMV), pp. 1300–1307.
SACSAC-2005-Casale #analysis #mining #network #performance #web
Combining queueing networks and web usage mining techniques for web performance analysis (GC), pp. 1699–1703.
SACSAC-2005-ChenA #analysis #approach #comparative #predict #sequence #using
A new approach for gene prediction using comparative sequence analysis (RC, HHA), pp. 177–184.
SACSAC-2005-CuiK #analysis #documentation #topic
Topic activation analysis for document streams based on document arrival rate and relevance (CC, HK), pp. 1089–1095.
SACSAC-2005-DalkilicS #analysis #design #evaluation
Design and evaluation of CATPA: curation and alignment tool for protein analysis (MMD, AS), pp. 190–194.
SACSAC-2005-DaoudM #analysis #mobile #reliability
Reliability analysis of mobile agent-based systems (MD, QHM), pp. 92–93.
SACSAC-2005-FernandezS #analysis #modelling
An analysis of modeling flaws in HL7 and JAHIS (EBF, TS), pp. 216–223.
SACSAC-2005-HouD #analysis #design #detection #search-based
Immunity-based intrusion detection system design, vulnerability analysis, and GENERTIA’s genetic arms race (HH, GVD), pp. 952–956.
SACSAC-2005-JiJC #adaptation #analysis #migration
Adaptation point analysis for computation migration/checkpointing (YJ, HJ, VC), pp. 750–751.
SACSAC-2005-NicolaLM #analysis #formal method #mobile #modelling
Formal modeling and quantitative analysis of KLAIM-based mobile systems (RDN, DL, MM), pp. 428–435.
SACSAC-2005-PervouchineLM #analysis #documentation #forensics
Handwritten character skeletonisation for forensic document analysis (VP, GL, KM), pp. 754–758.
SACSAC-2005-Rosso #analysis #framework #message passing #paradigm #performance #scalability
Performance analysis framework for large software-intensive systems with a message passing paradigm (CDR), pp. 885–889.
SACSAC-2005-ZhangP #analysis
Effort and accuracy analysis of choice strategies for electronic product catalogs (JZ, PP), pp. 808–814.
ESEC-FSEESEC-FSE-2005-InverardiMP #analysis #architecture #named
CHARMY: an extensible tool for architectural analysis (PI, HM, PP), pp. 111–114.
ESEC-FSEESEC-FSE-2005-KuncakJ #algebra #analysis #data type #relational
Relational analysis of algebraic datatypes (VK, DJ), pp. 207–216.
GTTSEGTTSE-2005-EkmanH #analysis #composition #jastadd #java #using
Modular Name Analysis for Java Using JastAdd (TE, GH), pp. 422–436.
ICSEICSE-2005-ApiwattanapongOH #impact analysis #performance #precise #sequence #using
Efficient and precise dynamic impact analysis using execute-after sequences (TA, AO, MJH), pp. 432–441.
ICSEICSE-2005-AvotsDLL #analysis #c #pointer #security
Improving software security with a C pointer analysis (DA, MD, VBL, MSL), pp. 332–341.
ICSEICSE-2005-FislerKMT #impact analysis #policy #verification
Verification and change-impact analysis of access-control policies (KF, SK, LAM, MCT), pp. 196–205.
ICSEICSE-2005-LetierKMU #analysis #monitoring #requirements
Monitoring and control in scenario-based requirements analysis (EL, JK, JM, SU), pp. 382–391.
ICSEICSE-2005-NagappanB05a #fault #static analysis #tool support
Static analysis tools as early indicators of pre-release defect density (NN, TB), pp. 580–586.
ICSEICSE-2005-RenRST #impact analysis #java #named #source code
Chianti: a change impact analysis tool for java programs (XR, BGR, MS, FT), pp. 664–665.
ICSEICSE-2005-RountevC #analysis #diagrams #sequence chart
Object naming analysis for reverse-engineered sequence diagrams (AR, BHC), pp. 254–263.
LDTALDTA-2005-CassidyCDD #analysis #concurrent
Source Transformation for Concurrency Analysis (TC, JRC, TRD, JD), pp. 57–75.
CCCC-2005-QianH #analysis #case study #jit
A Study of Type Analysis for Speculative Method Inlining in a JIT Environment (FQ, LJH), pp. 255–270.
CCCC-2005-XueN #analysis #object-oriented #source code
Completeness Analysis for Incomplete Object-Oriented Programs (JX, PHN), pp. 271–286.
CGOCGO-2005-GuoBTORA #analysis #low level #pointer
Practical and Accurate Low-Level Pointer Analysis (BG, MJB, ST, GO, ER, DIA), pp. 291–302.
HPDCHPDC-2005-BaudCLN #analysis #grid #performance
Performance analysis of a file catalog for the LHC computing grid (JPB, JC, SL, CN), pp. 91–99.
LCTESLCTES-2005-StaschulatE #analysis #precise #scalability #scheduling
Scalable precision cache analysis for preemptive scheduling (JS, RE), pp. 157–165.
LCTESLCTES-2005-TanM #analysis
WCRT analysis for a uniprocessor with a unified prioritized cache (YT, VJMI), pp. 175–182.
PPoPPPPoPP-2005-SasturkarAWS #analysis #automation #type system
Automated type-based analysis of data races and atomicity (AS, RA, LW, SDS), pp. 83–94.
PPoPPPPoPP-2005-WangS #source code #static analysis
Static analysis of atomicity for programs with non-blocking synchronization (LW, SDS), pp. 61–71.
ICSTSAT-J-2004-TangYRM05 #algorithm #analysis #problem #quantifier #satisfiability
Analysis of Search Based Algorithms for Satisfiability of Propositional and Quantified Boolean Formulas Arising from Circuit State Space Diameter Problems (DT, YY, DR, SM), pp. 292–305.
CAVCAV-2005-ConwayNDE #algorithm #analysis #incremental #interprocedural #safety
Incremental Algorithms for Inter-procedural Analysis of Safety Properties (CLC, KSN, DD, SAE), pp. 449–461.
CAVCAV-2005-CostanGGMP #algorithm #fixpoint #policy #source code #static analysis
A Policy Iteration Algorithm for Computing Fixed Points in Static Analysis of Programs (AC, SG, EG, MM, SP), pp. 462–475.
CAVCAV-2005-Monniaux #analysis #composition #float #linear
Compositional Analysis of Floating-Point Linear Numerical Filters (DM), pp. 199–212.
CAVCAV-2005-NeculaG #algorithm #program analysis #random #verification
Randomized Algorithms for Program Analysis and Verification (GCN, SG), p. 1.
CSLCSL-2005-Lambov #analysis #complexity #framework
Complexity and Intensionality in a Type-1 Framework for Computable Analysis (BL), pp. 442–461.
ICLPICLP-2005-BrasselH #analysis #functional #logic programming #nondeterminism #source code
Nondeterminism Analysis of Functional Logic Programs (BB, MH), pp. 265–279.
ICLPICLP-2005-CorinSE #analysis #constraints #protocol #security
PS-LTL for Constraint-Based Security Protocol Analysis (RC, AS, SE), pp. 439–440.
ICLPICLP-2005-Fruhwirth #analysis #confluence #constraints #using
Parallelizing Union-Find in Constraint Handling Rules Using Confluence Analysis (TWF), pp. 113–127.
ICLPICLP-2005-NguyenS #analysis #logic programming #polynomial #source code #termination
Polynomial Interpretations as a Basis for Termination Analysis of Logic Programs (MTN, DDS), pp. 311–325.
ICLPICLP-2005-PueblaAH #analysis #framework #logic programming #source code
A Generic Framework for the Analysis and Specialization of Logic Programs (GP, EA, MVH), pp. 407–409.
ICLPICLP-2005-Sneyers #analysis #optimisation #source code
Analysis and Optimization of CHR Programs (JS), pp. 450–451.
LICSLICS-2005-EsparzaKM #analysis #automaton #probability
Quantitative Analysis of Probabilistic Pushdown Automata: Expectations and Variances (JE, AK, RM), pp. 117–126.
LICSLICS-2005-Hillston #algebra #analysis #process
Process Algebras for Quantitative Analysis (JH), pp. 239–248.
ICTSSTestCom-2005-LeeJL #analysis #detection #smarttech #using
Detecting Trapdoors in Smart Cards Using Timing and Power Analysis (JYL, SWJ, JL), pp. 275–288.
VMCAIVMCAI-2005-BalabanPZ #abstraction #analysis
Shape Analysis by Predicate Abstraction (IB, AP, LDZ), pp. 164–180.
VMCAIVMCAI-2005-Bertrane #abstract interpretation #composition #source code #static analysis
Static Analysis by Abstract Interpretation of the Quasi-synchronous Composition of Synchronous Programs (JB), pp. 97–112.
VMCAIVMCAI-2005-GenaimS #analysis #bytecode #data flow #java
Information Flow Analysis for Java Bytecode (SG, FS), pp. 346–362.
VMCAIVMCAI-2005-Goubault-LarrecqP #analysis #c #encryption #protocol
Cryptographic Protocol Analysis on Real C Code (JGL, FP), pp. 363–379.
VMCAIVMCAI-2005-SalcianuR #analysis #java #source code
Purity and Side Effect Analysis for Java Programs (AS, MCR), pp. 199–215.
VMCAIVMCAI-2005-SankaranarayananSM #analysis #linear #programming #scalability #using
Scalable Analysis of Linear Systems Using Mathematical Programming (SS, HBS, ZM), pp. 25–41.
CBSECBSE-2004-Maydl #analysis #component #design #embedded
Design Accompanying Analysis of Component-Based Embedded Software (WM), pp. 178–193.
WICSAWICSA-2004-IonitaAHOT #approach #architecture #cost analysis
A Scenario-Driven Approach for Value, Risk, and Cost Analysis in System Architecting for Innovation (MTI, PA, DKH, JHO, JJMT), pp. 277–280.
WICSAWICSA-2004-MeisterRR #analysis #architecture #product line #statistics
Applying Patterns to Develop a Product Line Architecture for Statistical Analysis Software (JM, RHR, MR), pp. 291–294.
WICSAWICSA-2004-Perez-MartinezS #analysis #architecture #heuristic
Heuristics for the Transition from Analysis to Software Architecture (JEPM, ASA), pp. 311–314.
WICSAWICSA-2004-Tekinerdogan #analysis #architecture #named
ASAAM: Aspectual Software Architecture Analysis Method (BT), pp. 5–14.
ASEASE-2004-Alzamil #analysis #named #performance
RCAT: A Performance Analysis Tool (ZA), pp. 366–370.
ASEASE-2004-Haydar #analysis #automation #framework #verification
Formal Framework for Automated Analysis and Verification of Web-Based Applications (MH), pp. 410–413.
ASEASE-2004-KhorG #algorithm #automation #branch #concept analysis #search-based #testing #using
Using a Genetic Algorithm and Formal Concept Analysis to Generate Branch Coverage Test Data Automatically (SK, PG), pp. 346–349.
ASEASE-2004-KonradCC #analysis #automation #diagrams #uml
Automated Analysis of Timing Information in UML Diagrams (SK, LAC, BHCC), pp. 350–353.
ASEASE-2004-SampathMSP #approach #concept analysis #scalability #testing #web
Scalable Approach to User-Session based Testing of Web Applications through Concept Analysis (SS, VM, ALS, LLP), pp. 132–141.
DACDAC-2004-AgarwalSBLNV #analysis #metric
Variational delay metrics for interconnect timing analysis (KA, DS, DB, FL, SRN, SBKV), pp. 381–384.
DACDAC-2004-AsafMZ #analysis #functional
Defining coverage views to improve functional coverage analysis (SA, EM, AZ), pp. 41–44.
DACDAC-2004-ContiCVOT #algorithm #analysis #performance
Performance analysis of different arbitration algorithms of the AMBA AHB bus (MC, MC, GBV, SO, CT), pp. 618–621.
DACDAC-2004-HungSYYP #analysis #logic #quantum #reachability #synthesis
Quantum logic synthesis by symbolic reachability analysis (WNNH, XS, GY, JY, MAP), pp. 838–841.
DACDAC-2004-LeeZB #analysis #using
Static timing analysis using backward signal propagation (DL, VZ, DB), pp. 664–669.
DACDAC-2004-LeLP #analysis #correlation #named #statistics
STAC: statistical timing analysis with correlation (JL, XL, LTP), pp. 343–348.
DACDAC-2004-MangH #abstraction #analysis #refinement
Abstraction refinement by controllability and cooperativeness analysis (FYCM, PHH), pp. 224–229.
DACDAC-2004-NajmM #analysis #statistics
Statistical timing analysis based on a timing yield model (FNN, NM), pp. 460–465.
DACDAC-2004-OrshanskyB #analysis #correlation #performance #statistics
Fast statistical timing analysis handling arbitrary delay correlations (MO, AB), pp. 337–342.
DACDAC-2004-PantBZSP #analysis #approach #grid #power management #probability
A stochastic approach To power grid analysis (SP, DB, VZ, SS, RP), pp. 171–176.
DACDAC-2004-SchueleS #abstraction #analysis #assembly #execution #source code
Abstraction of assembler programs for symbolic worst case execution time analysis (TS, KS), pp. 107–112.
DACDAC-2004-TanGQ #analysis #approach #scalability
Hierarchical approach to exact symbolic analysis of large analog circuits (SXDT, WG, ZQ), pp. 860–863.
DACDAC-2004-TanjiA #analysis #distributed
Closed-form expressions of distributed RLC interconnects for analysis of on-chip inductance effects (YT, HA), pp. 810–813.
DACDAC-2004-VisweswariahRKWN #analysis #first-order #incremental #statistics
First-order incremental block-based statistical timing analysis (CV, KR, KK, SGW, SN), pp. 331–336.
DACDAC-2004-WuC #analysis #design #network #performance
Efficient power/ground network analysis for power integrity-driven design methodology (SWW, YWC), pp. 177–180.
DACDAC-2004-ZhangHC #analysis #pipes and filters #statistics
Statistical timing analysis in sequential circuit for on-chip global interconnect pipelining (LZ, YH, CCPC), pp. 904–907.
DACDAC-2004-ZhaoBD #analysis #scalability
A scalable soft spot analysis methodology for compound noise effects in nano-meter circuits (CZ, XB, SD), pp. 894–899.
DATEDATE-DF-2004-BrandoleseFSS #analysis #energy #modelling #program transformation #source code
Analysis and Modeling of Energy Reducing Source Code Transformations (CB, WF, FS, DS), pp. 306–311.
DATEDATE-DF-2004-FummiMMPP #analysis #architecture #industrial #modelling #network
Modeling and Analysis of Heterogeneous Industrial Networks Architectures (FF, SM, MM, GP, MP), pp. 342–344.
DATEDATE-v1-2004-BhuniaRR #analysis #using
Trim Bit Setting of Analog Filters Using Wavelet-Based Supply Current Analysis (SB, AR, KR), pp. 704–705.
DATEDATE-v1-2004-IsseninBMD #analysis #memory management #reuse
Data Reuse Analysis Technique for Software-Controlled Memory Hierarchies (II, EB, MM, ND), pp. 202–207.
DATEDATE-v1-2004-LaurentJSM #analysis #approach #functional #modelling #performance #power management
Functional Level Power Analysis: An Efficient Approach for Modeling the Power Consumption of Complex Processors (JL, NJ, ES, EM), pp. 666–667.
DATEDATE-v1-2004-MurgaiRMHT #analysis #modelling
Sensitivity-Based Modeling and Methodology for Full-Chip Substrate Noise Analysis (RM, SMR, TM, TH, MBT), pp. 610–615.
DATEDATE-v1-2004-PosadasHSVB #analysis #performance
System-Level Performance Analysis in SystemC (HP, FH, PS, EV, FB), pp. 378–383.
DATEDATE-v1-2004-SiebenbornBR #analysis #communication #design
Communication Analysis for System-On-Chip Design (AS, OB, WR), pp. 648–655.
DATEDATE-v2-2004-FengZCZF #analysis #order #reduction
Direct Nonlinear Order Reduction with Variational Analysis (LF, XZ, CC, DZ, QF), pp. 1316–1321.
DATEDATE-v2-2004-GlebovGZOPB #analysis
False-Noise Analysis for Domino Circuits (AG, SG, VZ, CO, RP, MRB), pp. 784–789.
DATEDATE-v2-2004-HuangCHTHH #analysis #fault #probability
Intermittent Scan Chain Fault Diagnosis Based on Signal Probability Analysis (YH, WTC, CJH, HYT, AH, YTH), pp. 1072–1077.
DATEDATE-v2-2004-JersakHE #analysis #design #embedded #performance
Context-Aware Performance Analysis for Efficient Embedded System Design (MJ, RH, RE), pp. 1046–1051.
DATEDATE-v2-2004-KumarBK #algorithm #analysis #array #embedded #memory management #named #reduction #using
MemMap: Technology Mapping Algorithm for Area Reduction in FPGAs with Embedded Memory Arrays Using Reconvergence Analysis (AMK, JB, VK), pp. 922–929.
DATEDATE-v2-2004-LanD #analysis #modelling #synthesis
Synthesized Compact Models (SCM) of Substrate Noise Coupling Analysis and Synthesis in Mixed-Signal ICs (HL, RWD), pp. 836–843.
DATEDATE-v2-2004-MondalCM #analysis #approach #logic #using
A New Approach to Timing Analysis Using Event Propagation and Temporal Logic (AM, PPC, CAM), pp. 1198–1203.
DATEDATE-v2-2004-RanKWM #analysis
Eliminating False Positives in Crosstalk Noise Analysis (YR, AK, YW, MMS), pp. 1192–1197.
DATEDATE-v2-2004-TanM #analysis #multi #realtime
Timing Analysis for Preemptive Multi-Tasking Real-Time Systems with Caches (YT, VJMI), pp. 1034–1039.
DATEDATE-v2-2004-ZhangC #analysis #embedded #fault tolerance #realtime #scalability
Task Feasibility Analysis and Dynamic Voltage Scaling in Fault-Tolerant Real-Time Embedded Systems (YZ, KC), pp. 1170–1175.
DATEDATE-v2-2004-ZhouZLLZC #analysis #using
Steady-State Analysis of Nonlinear Circuits Using Discrete Singular Convolution Method (XZ, DZ, JL, RL, XZ, CC), pp. 1322–1326.
DRRDRR-2004-Nishida #adaptation #analysis #documentation #image #multi
Adaptive inverse halftoning for scanned document images through multiresolution and multiscale analysis (HN), pp. 192–203.
HTHT-2004-HorieY #analysis #documentation #set #using #web
Structural analysis for web documentation using the non-well-founded set (IH, KY), pp. 42–43.
SIGMODSIGMOD-2004-MiklauS #analysis #formal method
A Formal Analysis of Information Disclosure in Data Exchange (GM, DS), pp. 575–586.
VLDBVLDB-2004-XuCOTH #analysis #mining #semantics
Semantic Mining and Analysis of Gene Expression Data (XX, GC, BCO, KLT, AKHT), pp. 1261–1264.
ITiCSEITiCSE-2004-BlumensteinGNM #analysis #automation #game studies
An experimental analysis of GAME: a generic automated marking environment (MB, SG, AN, VM), pp. 67–71.
ESOPESOP-2004-BugliesiFM #analysis #authentication #composition #protocol
Compositional Analysis of Authentication Protocols (MB, RF, MM), pp. 140–154.
ESOPESOP-2004-Feret #static analysis
Static Analysis of Digital Filters (JF), pp. 33–48.
ESOPESOP-2004-Ghica #analysis #approach #logic #semantics #specification
Semantical Analysis of Specification Logic, 3: An Operational Approach (DRG), pp. 264–278.
ESOPESOP-2004-LeviB #analysis #control flow
A Control Flow Analysis for Safe and Boxed Ambients (FL, CB), pp. 188–203.
ESOPESOP-2004-Shmatikov #analysis #composition #decidability #encryption #protocol
Decidable Analysis of Cryptographic Protocols with Products and Modular Exponentiation (VS), pp. 355–369.
FASEFASE-2004-ChildsGRDDHJSS #analysis #component #development #ide #named #synthesis #verification
Cadena: An Integrated Development Environment for Analysis, Synthesis, and Verification of Component-Based Systems (AC, JG, VPR, XD, MBD, JH, GJ, PS, GS), pp. 160–164.
FASEFASE-2004-GhezziMP #static analysis #type system
Enhancing Remote Method Invocation through Type-Based Static Analysis (CG, VM, GPP), pp. 339–353.
FASEFASE-2004-OlveczkyM #analysis #maude #realtime #specification #using
Specification and Analysis of Real-Time Systems Using Real-Time Maude (PCÖ, JM), pp. 354–358.
FoSSaCSFoSSaCS-2004-RamanathanMST #analysis #bisimulation #equivalence #network #probability #protocol #security
Probabilistic Bisimulation and Equivalence for Security Analysis of Network Protocols (AR, JCM, AS, VT), pp. 468–483.
TACASTACAS-2004-KrcalY #analysis #automaton #decidability #problem #scheduling #using
Decidable and Undecidable Problems in Schedulability Analysis Using Timed Automata (PK, WY), pp. 236–250.
TACASTACAS-2004-LingerS #analysis #constraints #ml #theorem proving #type inference
Binding-Time Analysis for MetaML via Type Inference and Constraint Solving (NL, TS), pp. 266–279.
TACASTACAS-2004-SenRA #analysis #online #parallel #performance #predict #safety #source code #thread
Online Efficient Predictive Safety Analysis of Multithreaded Programs (KS, GR, GA), pp. 123–138.
TACASTACAS-2004-SuW #analysis #constraints
A Class of Polynomially Solvable Range Constraints for Interval Analysis without Widenings and Narrowings (ZS, DW), pp. 280–295.
TACASTACAS-2004-YorshRS #analysis
Symbolically Computing Most-Precise Abstract Operations for Shape Analysis (GY, TWR, SS), pp. 530–545.
CSMRCSMR-2004-ItkonenHL #analysis #java
Application of Relation Analysis to a Small Java Software (JI, MH, VL), pp. 233–242.
ICSMEICSM-2004-BreechDSP #compilation #impact analysis #online
Online Impact Analysis via Dynamic Compilation Technology (BB, AD, SAS, LLP), pp. 453–457.
ICSMEICSM-2004-Granja-Alvarez #analysis #case study #maintenance #specification
Software Maintenance: Analysis of Estimates Based on Requirement Specification in the Context of New Technologies, a Case Study (JCGA), p. 531.
ICSMEICSM-2004-LuoJZMS #analysis #case study #component #graph #object-oriented
An Experimental Study of Two Graph Analysis Based Component Capture Methods for Object-Oriented Systems (JL, RJ, LZ, HM, JS), pp. 390–398.
ICSMEICSM-2004-MaleticC #analysis #difference #source code
Supporting Source Code Difference Analysis (JIM, MLC), pp. 210–219.
ICSMEICSM-2004-Marcus #program analysis #semantics
Semantic Driven Program Analysis (AM), pp. 469–473.
ICSMEICSM-2004-Ricca #analysis #testing #web
Analysis, Testing and Re-Structuring of Web Applications (FR), pp. 474–478.
ICSMEICSM-2004-RivaSSX #analysis #architecture #maintenance #reverse engineering #uml
UML-Based Reverse Engineering and Model Analysis Approaches for Software Architecture Maintenance (CR, PS, TS, JX), pp. 50–59.
ICSMEICSM-2004-SatpathySR #analysis #case study #maintenance #object-oriented
Assertions in Object Oriented Software Maintenance: Analysis and a Case Study (MS, NTS, DR), pp. 124–135.
ICSMEICSM-2004-WhiteR #analysis #industrial #realtime #testing #using
Industrial Real-Time Regression Testing and Analysis Using Firewalls (LJW, BR), pp. 18–27.
IWPCIWPC-2004-AntoniolPZ #comprehension #dynamic analysis #web
Understanding Web Applications through Dynamic Analysis (GA, MDP, MZ), pp. 120–131.
IWPCIWPC-2004-LuciaFST #analysis #re-engineering #web
Reengineering Web Applications Based on Cloned Pattern Analysis (ADL, RF, GS, GT), pp. 132–141.
PASTEPASTE-2004-Ernst #dynamic analysis
Invited Talk Static and dynamic analysis: synergy and duality (MDE), p. 35.
PASTEPASTE-2004-NystromKH #analysis #pointer
Importance of heap specialization in pointer analysis (EMN, HSK, WmWH), pp. 43–48.
PASTEPASTE-2004-PearceKH #analysis #c #performance #pointer
Efficient field-sensitive pointer analysis for C (DJP, PHJK, CH), pp. 37–42.
PASTEPASTE-2004-RountevKG #static analysis
Evaluating the imprecision of static analysis (AR, SK, MG), pp. 14–16.
SCAMSCAM-2004-RoblesG #analysis #execution #source code
Executable Source Code and Non-Executable Source Code: Analysis and Relationships (GR, JMGB), pp. 149–157.
SCAMSCAM-2004-Rothermel #analysis #source code #using
Using Source-Code Analysis to Help End-User Programmers Create Dependable Software (GR), p. 3.
SCAMSCAM-2004-TourweM #concept analysis #mining #using
Mining Aspectual Views using Formal Concept Analysis (TT, KM), pp. 97–106.
WCREWCRE-2004-KarailaS #analysis #case study #industrial #maintenance #source code #visual notation
Maintenance and Analysis of Visual Programs — An Industrial Case (MK, TS), pp. 294–295.
WCREWCRE-2004-LakhotiaP #analysis #research #tool support
Virus Analysis: Techniques, Tools, and Research Issues (AL, PP), p. 2.
WCREWCRE-2004-MarinDM #analysis #aspect-oriented #identification #using
Identifying Aspects Using Fan-In Analysis (MM, AvD, LM), pp. 132–141.
WCREWCRE-2004-ParkKWY #analysis #behaviour #design pattern
A Static Reference Flow Analysis to Understand Design Pattern Behavior (CP, YK, CW, KY), pp. 300–301.
WCREWCRE-2004-TonellaC #concept analysis #execution #mining
Aspect Mining through the Formal Concept Analysis of Execution Traces (PT, MC), pp. 112–121.
PLDIPLDI-2004-WangL #adaptation #analysis #parametricity
Parametric analysis for adaptive computation offloading (CW, ZL), pp. 119–130.
PLDIPLDI-2004-WhaleyL #alias #analysis #diagrams #pointer #using
Cloning-based context-sensitive pointer alias analysis using binary decision diagrams (JW, MSL), pp. 131–144.
PLDIPLDI-2004-ZhuC #analysis #pointer #revisited
Symbolic pointer analysis revisited (JZ, SC), pp. 145–157.
SASSAS-2004-AmtoftB #analysis #data flow #logic
Information Flow Analysis in Logical Form (TA, AB), pp. 100–115.
SASSAS-2004-GulwaniN04a #analysis #linear
Path-Sensitive Analysis for Linear Arithmetic and Uninterpreted Functions (SG, GCN), pp. 328–343.
SASSAS-2004-HymansU #data flow #dependence #graph #static analysis
Static Analysis of Gated Data Dependence Graphs (CH, EU), pp. 197–211.
SASSAS-2004-JeannetLRS #analysis #approach #interprocedural #relational
A Relational Approach to Interprocedural Shape Analysis (BJ, AL, TWR, SS), pp. 246–264.
SASSAS-2004-NielsonNP #analysis
Spatial Analysis of BioAmbients (HRN, FN, HP), pp. 69–83.
SASSAS-2004-NystromKH #analysis #bottom-up #pointer #top-down
Bottom-Up and Top-Down Context-Sensitive Summary-Based Pointer Analysis (EMN, HSK, WmWH), pp. 165–180.
SASSAS-2004-Rugina #analysis
Shape Analysis Quantitative Shape Analysis (RR), pp. 228–245.
SASSAS-2004-SankaranarayananSM #analysis #constraints
Constraint-Based Linear-Relations Analysis (SS, HBS, ZM), pp. 53–68.
SASSAS-2004-Venet #analysis #embedded #pointer #scalability #source code
A Scalable Nonuniform Pointer Analysis for Embedded Programs (AV), pp. 149–164.
SASSAS-2004-YongH #analysis
Pointer-Range Analysis (SHY, SH), pp. 133–148.
STOCSTOC-2004-KempeM #algorithm #analysis #distributed
A decentralized algorithm for spectral analysis (DK, FM), pp. 561–568.
FLOPSFLOPS-2004-BuenoLH #abstract interpretation #analysis #multi #standard
Multivariant Non-failure Analysis via Standard Abstract Interpretation (FB, PLG, MVH), pp. 100–116.
FLOPSFLOPS-2004-HagiyaTYS #abstraction #analysis #automaton #logic #using
Analysis of Synchronous and Asynchronous Cellular Automata Using Abstraction by Temporal Logic (MH, KT, MY, TS), pp. 7–21.
FLOPSFLOPS-2004-LuK #analysis
Backward Pair Sharing Analysis (LL, AK), pp. 132–146.
ICALPICALP-2004-Toftdal #analysis #effectiveness #logic #theorem
A Calibration of Ineffective Theorems of Analysis in a Hierarchy of Semi-classical Logical Principles: (Extended Abstract) (MT), pp. 1188–1200.
IFMIFM-2004-EllisI #automation #integration #program analysis #proving #theorem proving
An Integration of Program Analysis and Automated Theorem Proving (BJE, AI), pp. 67–86.
SEFMSEFM-2004-BertoliniFFO #analysis #automaton #generative #network #probability #testing #using
Test Case Generation Using Stochastic Automata Networks: Quantitative Analysis (CB, AGF, PF, FMO), pp. 251–260.
SEFMSEFM-2004-Fronk #algebra #analysis #approach #automation #petri net #using
Using Relation Algebra for the Analysis of Petri Nets in a CASE Tool Based Approach (AF), pp. 396–405.
SEFMSEFM-2004-NguyenM #analysis #consistency
A Formalism for Conformance Analysis and Its Applications (TNN, EVM), pp. 330–339.
SFMSFM-2004-KatoenBKH #analysis #embedded
Embedded Software Analysis with MOTOR (JPK, HCB, RK, HH), pp. 268–294.
ICFPICFP-2004-HermanM #embedded #partial evaluation #static analysis
Improving the static analysis of embedded languages via partial evaluation (DH, PM), pp. 16–27.
ICGTICGT-2004-RosselloV #analysis #graph transformation
Analysis of Metabolic Pathways by Graph Transformation (FR, GV), pp. 70–82.
CHICHI-2004-LawH #analysis #combinator #testing #usability
Analysis of combinatorial user effect in international usability tests (ELCL, EÞH), pp. 9–16.
CSCWCSCW-2004-BarrettKMHTP #analysis #tool support
Field studies of computer system administrators: analysis of system management tools and practices (RB, EK, PPM, EMH, LT, MP), pp. 388–395.
CSCWCSCW-2004-HornFBMJ #analysis #evolution #network #research #social
Six degrees of jonathan grudin: a social network analysis of the evolution and impact of CSCW research (DBH, TAF, JPB, DM, SJ), pp. 582–591.
CSCWCSCW-2004-SorokaJ #analysis #collaboration #framework
The diffusion of reachOut: analysis and framework for the successful diffusion of collaboration technologies (VS, MJ), pp. 314–323.
AdaSIGAda-2004-ChapmanH #analysis #data flow #modelling #safety #security
Enforcing security and safety models with an information flow analysis tool (RC, AH), pp. 39–46.
AdaSIGAda-2004-SoriconeN #algorithm #analysis #comparative #implementation #search-based
Comparative analysis of genetic algorithm implementations (RS, MN), pp. 35–38.
CAiSECAiSE-2004-GePL #analysis #database
Secure Databases: An Analysis of Clark-Wilson Model in a Database Environment (XG, FP, RL), pp. 234–247.
CAiSECAiSE-2004-SofferW #analysis #process
Goal-Driven Analysis of Process Model Validity (PS, YW), pp. 521–535.
ICEISICEIS-v1-2004-Lyytinen #analysis #functional #requirements #scalability #source code
Large Scale Requirements Engineering in Action: An Ethnographic Analysis of Functional and Political Ecologies in Situ in Space Mission Programs (KL), p. V.
ICEISICEIS-v2-2004-CamponovoBP #analysis
Strategic Analysis of the Environment: A DSS for Assessing Technology Environments (GC, SB, YP), pp. 122–129.
ICEISICEIS-v2-2004-DhoteMR #analysis #detection #development #fault
Development of an Expert System for Detecting Incipient Fault in Transformer by Dissolved Gas Analysis (NKD, DMH, MRR), pp. 210–215.
ICEISICEIS-v2-2004-Martinez-OtzetaS #algorithm #analysis #nearest neighbour #probability
Analysis of the Iterated Probabilistic Weighted K Nearest Neighbor Method, a new Distance-Based Algorithm (JMMO, BS), pp. 233–240.
ICEISICEIS-v2-2004-Turowska #analysis #nondeterminism
Application of Uncertain Variables to Stability Analysis and Stabilization for ATM ABR Congestion Control Systems (MT), pp. 523–526.
ICEISICEIS-v3-2004-BonacinBL #analysis #design #diagrams #ontology #semantics
From Ontology Charts to Class Diagrams: Semantic Analysis Aiding Systems Design (RB, MCCB, KL), pp. 389–395.
ICEISICEIS-v3-2004-Douglas #analysis #enterprise #performance
Founding Enterprise Systems on Enterprise Performance Analysis (ID), pp. 588–591.
ICEISICEIS-v3-2004-Hair #analysis #concept #design #named #process
U_VBOOM: Unified Analysis and Design Process Based on the Viewpoint Concept (AH), pp. 217–224.
ICEISICEIS-v3-2004-Martens #analysis #re-engineering #web #web service
Analysis and Re-Engineering of Web Services (AM), pp. 419–426.
ICEISICEIS-v3-2004-Ohki #analysis #formal method
Formalization of Class Structure Extraction through Lifetime Analysis (MO), pp. 635–642.
ICEISICEIS-v3-2004-PanedaMGGN #analysis #monitoring #predict #video
Analysis and Configuration Methodology for Video on Demand Services Based on Monitoring Information and Prediction (XGP, DM, RG, VGG, ÁN), pp. 289–294.
ICEISICEIS-v4-2004-HislopE #analysis #education #online
An Analysis of Variation in Teaching Effort Across Tasks in Online and Traditional Courses (GWH, HJCE), pp. 202–207.
ICEISICEIS-v5-2004-MarzalBMC #analysis #documentation #perspective #topic
Verbs & Topic Maps: A Proposal for Legal Documentation from the Document Content Analysis Perspective (MÁM, CB, JM, FC), pp. 63–68.
CIKMCIKM-2004-FradkinK #adaptation #analysis #approach #design #information retrieval
A design space approach to analysis of information retrieval adaptive filtering systems (DF, PBK), pp. 251–260.
CIKMCIKM-2004-GollapudiS #algorithm #analysis #framework #set
Framework and algorithms for trend analysis in massive temporal data sets (SG, DS), pp. 168–177.
CIKMCIKM-2004-LynamBCC #analysis #documentation #feedback #multi
A multi-system analysis of document and term selection for blind feedback (TRL, CB, CLAC, GVC), pp. 261–269.
CIKMCIKM-2004-MegalooikonomouLW #analysis #database #performance #reduction #similarity
A dimensionality reduction technique for efficient similarity analysis of time series databases (VM, GL, QW), pp. 160–161.
CIKMCIKM-2004-SanoE #analysis #categorisation #information management
Circumstance-based categorization analysis of knowledge management systems for the japanese market (MS, DAE), pp. 507–514.
CIKMCIKM-2004-SrinivasanADZ #analysis #grammarware #web
Grammar-based task analysis of web logs (SS, AA, PMD, VZ), pp. 244–245.
CIKMCIKM-2004-TakakiFI #analysis #documentation #query #retrieval #topic
Associative document retrieval by query subtopic analysis and its application to invalidity patent search (TT, AF, TI), pp. 399–405.
ECIRECIR-2004-CachedaPO #analysis #architecture #distributed #performance
Performance Analysis of Distributed Architectures to Index One Terabyte of Text (FC, VP, IO), pp. 394–408.
ECIRECIR-2004-StokesNCS #analysis #using
Broadcast News Gisting Using Lexical Cohesion Analysis (NS, EN, JC, AFS), pp. 209–222.
ICMLICML-2004-BanerjeeDGM #analysis #estimation #exponential #product line
An information theoretic analysis of maximum likelihood mixture estimation for exponential families (AB, ISD, JG, SM).
ICMLICML-2004-DingH04a #analysis #clustering #component
K-means clustering via principal component analysis (CHQD, XH).
ICMLICML-2004-EspositoS #analysis #classification #monte carlo
A Monte Carlo analysis of ensemble classification (RE, LS).
ICMLICML-2004-YeJLP #analysis #feature model #linear
Feature extraction via generalized uncorrelated linear discriminant analysis (JY, RJ, QL, HP).
ICPRICPR-v1-2004-BelaidB #analysis #approach #documentation
Morphological Tagging Approach in Document Analysis of Invoices (YB, AB), pp. 469–472.
ICPRICPR-v1-2004-Bruce #analysis #image #information management #metric
Image Analysis Through Local Information Measures (NB), pp. 616–619.
ICPRICPR-v1-2004-ChengLLC #classification #component #independence #kernel #using
Texture Classification Using Kernel Independent Component Analysi (JC, QL, HL, YWC), pp. 620–623.
ICPRICPR-v1-2004-KeysersN #analysis #linear #modelling
Linear Discriminant Analysis and Discriminative Log-linear Modeling (DK, HN), pp. 156–159.
ICPRICPR-v1-2004-MiasnikovH #analysis #rank
Regression Analysis and Automorphic Orbits in Free Groups of Rank 2 (ADM, RMH), pp. 180–183.
ICPRICPR-v1-2004-ShenB #analysis #kernel #recognition
Gabor Wavelets and Kernel Direct Discriminant Analysis for Face Recognition (LS, LB), pp. 284–287.
ICPRICPR-v1-2004-SoaresM #analysis
Watershed Lines Suppression by Waterfall Marker Improvement and Line-Neighbourhood Analysis (FS, FM), pp. 604–607.
ICPRICPR-v1-2004-VaswaniC #analysis #classification #component #null #probability
Classification Probability Analysis of Principal Component Null Space Analysis (NV, RC), pp. 240–243.
ICPRICPR-v1-2004-ZhouT #analysis #clustering #coordination #documentation #geometry #re-engineering #visual notation
Coordinate Systems Reconstruction for Graphical Documents by Hough-feature Clustering and Geometric Analysis (YPZ, CLT), pp. 376–379.
ICPRICPR-v2-2004-BevilacquaG #analysis #image
Age-related Skin Analysis by Capacitance Images (AB, AG), pp. 703–706.
ICPRICPR-v2-2004-BriassouliA #analysis
Fusion of Frequency and Spatial Domain Information for Motion Analysis (AB, NA), pp. 175–178.
ICPRICPR-v2-2004-DaiQJ #analysis #kernel #pattern matching #pattern recognition #recognition
A Kernel Fractional-Step Nonlinear Discriminant Analysis for Pattern Recognition (GD, YQ, SJ), pp. 431–434.
ICPRICPR-v2-2004-DeepuMR #analysis #component #online #recognition
Principal Component Analysis for Online Handwritten Character Recognition (VD, SM, AGR), pp. 327–330.
ICPRICPR-v2-2004-ErikssonC #2d #analysis
Maximizing Validity in 2D Motion Analysis (ME, SC), pp. 179–183.
ICPRICPR-v2-2004-GaoHBW #analysis #markov #process #using
Dining Activity Analysis Using a Hidden Markov Model (JG, AGH, AB, HDW), pp. 915–918.
ICPRICPR-v2-2004-GritaiSS #analysis #invariant #on the
On the use of Anthropometry in the Invariant Analysis of Human Actions (AG, YS, MS), pp. 923–926.
ICPRICPR-v2-2004-ImiyaY #analysis
Principal Curve Analysis for Temporal Data (AI, NY), pp. 475–478.
ICPRICPR-v2-2004-LinYL #analysis #incremental #using
Object Tracking Using Incremental Fisher Discriminant Analysis (RSL, MHY, SEL), pp. 757–760.
ICPRICPR-v2-2004-LiuTLM #analysis #kernel #recognition
Kernel Scatter-Difference Based Discriminant Analysis For Face Recognition (QL, XT, HL, SM), pp. 419–422.
ICPRICPR-v2-2004-PlotzF #analysis #biology #feature model #sequence
Feature Extraction for Improved Profile HMM based Biological Sequence Analysis (TP, GAF), pp. 315–318.
ICPRICPR-v2-2004-SaadiTC #analysis #kernel
Optimally Regularised Kernel Fisher Discriminant Analysis (KS, NLCT, GCC), pp. 427–430.
ICPRICPR-v2-2004-SantamariaBS #analysis #statistics #using
Texture Analysis using Level-crossing Statistics (CS, MB, WS), pp. 712–715.
ICPRICPR-v2-2004-SenerG #analysis #component #independence #using
Blind Audio Watermark Decoding Using Independent Component Analysis (SS, BG), pp. 875–878.
ICPRICPR-v2-2004-ShihL #analysis #detection #using #video
Face Detection Using Discriminating Feature Analysis and Support Vector Machine in Video (PS, CL), pp. 407–410.
ICPRICPR-v2-2004-SoiferKK #analysis #fuzzy
Fuzzy Direction Field Method for Fringe and Tree-like Patterns Analysis (VAS, AGK, AOK), pp. 779–782.
ICPRICPR-v2-2004-TaoT #analysis #feedback #image #parametricity #retrieval
Nonparametric Discriminant Analysis in Relevance Feedback for Content-Based Image Retrieval (DT, XT), pp. 1013–1016.
ICPRICPR-v2-2004-ZiouB #analysis #finite #image #learning #using
Unsupervised Learning of a Finite Gamma Mixture Using MML: Application to SAR Image Analysis (DZ, NB), pp. 68–71.
ICPRICPR-v3-2004-AiLZ #analysis #automation
Combination of Wavelet Analysis and Color Applied to Automatic Color Grading of Ceramic Tiles (JA, DL, XZ), pp. 235–238.
ICPRICPR-v3-2004-GurevichM #analysis #image
Method for Early Diagnostics of Lymphatic System Tumors on the Basis of the Analysis of Chromatin Constitution in Cell Nucleus Images (IBG, DM), pp. 806–809.
ICPRICPR-v3-2004-KaholTP #analysis #gesture
Computational Analysis of Mannerism Gestures (KK, PT, SP), pp. 946–949.
ICPRICPR-v3-2004-KolschT #analysis #detection #robust
Analysis of Rotational Robustness of Hand Detection with a Viola-Jones Detector (MK, MT), pp. 107–110.
ICPRICPR-v3-2004-McCallT #analysis #invariant #using
Pose Invariant Affect Analysis using Thin-Plate Splines (JCM, MMT), pp. 958–964.
ICPRICPR-v3-2004-NaganumaTMM #analysis #using
Simultaneous Determination of Object Shape and Color by Moire Analysis Using a Reflection Model (SN, NT, AM, TM), pp. 202–205.
ICPRICPR-v3-2004-NishiF #analysis #using #video
Object-Based Video Coding Using Pixel State Analysis (TN, HF), pp. 306–309.
ICPRICPR-v3-2004-NovakLCMAHA #analysis #markov #modelling #using
Morphology Analysis of Physiological Signals Using Hidden Markov Models (DN, LL, DCF, PM, TAA, YH, MA), pp. 754–757.
ICPRICPR-v3-2004-TsujiZHK #analysis #correlation
Levels of Detail Control Based on Correlation Analysis Between Surface Position and Direction (TT, HZ, TH, RK), pp. 622–625.
ICPRICPR-v3-2004-WangLL #analysis #towards
Tensor Voting Toward Feature Space Analysis (JW, HL, QL), pp. 462–465.
ICPRICPR-v3-2004-YapCLHP #analysis #detection
Detecting Femur Fractures by Texture Analysis of Trabeculae (DWHY, YC, WKL, TSH, MAP), pp. 730–733.
ICPRICPR-v4-2004-HagaSY #analysis #detection #using
Human Detection in Outdoor Scene using Spatio-Temporal Motion Analysis (TH, KS, YY), pp. 331–334.
ICPRICPR-v4-2004-HsiehYCH #analysis
A Shadow Elimination Method for Vehicle Analysis (JWH, SHY, YSC, WFH), pp. 372–375.
ICPRICPR-v4-2004-OtsukaM #analysis #multi
A Particle Filter for Tracking Densely Populated Objects Based on Explicit Multiview Occlusion Analysis (KO, NM), pp. 745–750.
ICPRICPR-v4-2004-QinandS #algorithm #analysis #clustering #kernel
Kernel Neural Gas Algorithms with Application to Cluster Analysis (AKQ, PNS), pp. 617–620.
ICPRICPR-v4-2004-SangiHS #analysis #difference #metric #using
Motion Analysis Using Frame Differences with Spatial Gradient Measures (PS, JH, OS), pp. 733–736.
ICPRICPR-v4-2004-SelmaouiRLA #analysis #detection #image
Image Analysis for Core Geological Descriptions : Strata and Granulometry Detection (NS, BR, CLM, MA), pp. 305–310.
ICPRICPR-v4-2004-ShihKG #analysis #bound #fault #image
An Error Bound of Relative Image Blur Analysis (SWS, PSK, WSG), pp. 100–103.
ICPRICPR-v4-2004-XieHTP #analysis #multi #video
A Multi-Object Tracking System for Surveillance Video Analysis (DX, WH, TT, JP), pp. 767–770.
ICPRICPR-v4-2004-YazdiAB #analysis #process #segmentation
Morphological Analysis of Spatio-Temporal Patterns for the Segmentation of Cyclic Human Activities (MY, ABA, RB), pp. 240–243.
ICPRICPR-v4-2004-ZhangLT #analysis #image #recognition #using #word
Italic Font Recognition Using Stroke Pattern Analysis on Wavelet Decomposed Word Images (LZ, YL, CLT), pp. 835–838.
ICPRICPR-v4-2004-ZhouC #analysis #multi #recognition
Multiple-Exemplar Discriminant Analysis for Face Recognition (SKZ, RC), pp. 191–194.
KDDKDD-2004-CaruanaN #analysis #data mining #empirical #learning #metric #mining #performance
Data mining in metric space: an empirical analysis of supervised learning performance criteria (RC, ANM), pp. 69–78.
KDDKDD-2004-JinZM #analysis #mining #probability #semantics #web
Web usage mining based on probabilistic latent semantic analysis (XJ, YZ, BM), pp. 197–205.
KRKR-2004-BenferhatBN #analysis #reasoning
An Experimental Analysis of Possibilistic Default Reasoning (SB, JFB, RDSN), pp. 130–140.
KRKR-2004-Denecker #analysis #logic programming #what
What’s in a Model? Epistemological Analysis of Logic Programming (MD), pp. 106–113.
KRKR-2004-FriedlandAWMSMASICPBC #analysis #independence #towards
Towards a Quantitative, Platform-Independent Analysis of Knowledge Systems (NSF, PGA, MJW, GM, NS, PM, JA, SS, DJI, VKC, BWP, KB, PC), pp. 507–515.
KRKR-2004-GrootTH #analysis #approximate #case study #classification #problem #towards
Towards a Structured Analysis of Approximate Problem Solving: A Case Study in Classification (PG, AtT, FvH), pp. 399–406.
SEKESEKE-2004-CaiGHD #analysis #architecture #modelling #performance
Software Architecture Modelling and Performance Analysis with Argo/MTE (YC, JCG, JGH, XD), pp. 276–281.
SEKESEKE-2004-JarzabekSZZ #analysis #case study #metaprogramming
Analysis of meta-programs: a case study (SJ, RS, HZ, ZS), pp. 68–73.
SEKESEKE-2004-SmithC #analysis #generative #requirements
Commonality and Requirements Analysis for Mesh Generating Software (SS, CHC), pp. 384–387.
SIGIRSIGIR-2004-BeitzelJCGF #analysis #query #scalability #topic #web
Hourly analysis of a very large topically categorized web query log (SMB, ECJ, AC, DAG, OF), pp. 321–328.
SIGIRSIGIR-2004-CaiHWM #analysis
Block-level link analysis (DC, XH, JRW, WYM), pp. 440–447.
SIGIRSIGIR-2004-GrankaJG #analysis #behaviour
Eye-tracking analysis of user behavior in WWW search (LAG, TJ, GG), pp. 478–479.
SIGIRSIGIR-2004-MontgomerySCE #analysis #documentation #empirical #feedback
Effect of varying number of documents in blind feedback: analysis of the 2003 NRRC RIA workshop “bf_numdocs” experiment suite (JM, LS, JC, DAE), pp. 476–477.
SIGIRSIGIR-2004-XuU #analysis #mining #ranking #web
A unified model of literal mining and link analysis for ranking web resources (YX, KU), pp. 546–547.
UMLUML-2004-Reinhartz-BergerS #analysis #approach #behaviour #domain model #modelling
Behavioral Domain Analysis — The Application-Based Domain Modeling Approach (IRB, AS), pp. 410–424.
TOOLSTOOLS-USA-2003-EnselmeFL04 #analysis #component #contract #dependence #design
Design by Contract: analysis of hidden dependencies in component based application (DE, GF, FLA), pp. 23–45.
TOOLSTOOLS-USA-2003-HamzaE04 #analysis #problem
Applying Analysis Patterns Through Analogy: Problems and Solutions (HSH, MEF), pp. 197–208.
ECOOPECOOP-2004-BeersSF #analysis
Efficiently Verifiable Escape Analysis (MQB, CHS, MF), pp. 75–95.
ECOOPECOOP-2004-HirzelDH #analysis #pointer
Pointer Analysis in the Presence of Dynamic Class Loading (MH, AD, MH), pp. 96–122.
ECOOPECOOP-2004-VitenbergKS #concurrent #database #program analysis #using
Increasing Concurrency in Databases Using Program Analysis (RV, KK, AKS), pp. 341–363.
OOPSLAOOPSLA-2004-GuyerM #static analysis
Finding your cronies: static analysis for dynamic object colocation (SZG, KSM), pp. 237–250.
OOPSLAOOPSLA-2004-RenSTRC #impact analysis #java #named #source code
Chianti: a tool for change impact analysis of java programs (XR, FS, FT, BGR, OCC), pp. 432–448.
LOPSTRLOPSTR-2004-CraigGLH #analysis #automation #prolog
Fully Automatic Binding-Time Analysis for Prolog (SJC, JPG, ML, KSH), pp. 53–68.
LOPSTRLOPSTR-2004-Lopez-GarciaBH #analysis #logic programming #source code #using
Determinacy Analysis for Logic Programs Using Mode and Type Information (PLG, FB, MVH), pp. 19–35.
LOPSTRPDCL-2004-PueblaCHBBMS #analysis #composition #framework #source code
A Generic Framework for Context-Sensitive Analysis of Modular Programs (GP, JC, MVH, FB, MJGdlB, KM, PJS), pp. 233–260.
LOPSTRPDCL-2004-VanhoofBL #analysis
Binding-Time Analysis for Mercury (WV, MB, ML), pp. 189–232.
POPLPOPL-2004-Muller-OlmS #algebra #analysis #interprocedural #linear #precise
Precise interprocedural analysis through linear algebra (MMO, HS), pp. 330–341.
RERE-2004-Gonzalez-BaixauliLM #analysis #modelling #variability #visual notation
Visual Variability Analysis for Goal Models (BGB, JCSdPL, JM), pp. 198–207.
SACSAC-2004-DincovP #analysis #multi
Computational analysis of microwave heating patterns in resonant multimode cavities (DDD, KAP), pp. 215–219.
SACSAC-2004-Granmo #analysis #parallel #video
Parallel hypothesis driven video content analysis (OCG), pp. 642–648.
SACSAC-2004-Kavakli #analysis #modelling
Modeling organizational goals: analysis of current methods (EK), pp. 1339–1343.
SACSAC-2004-Kincaid #analysis #array #interactive #named #visualisation
VistaClara: an interactive visualization for exploratory analysis of DNA microarrays (RK), pp. 167–174.
SACSAC-2004-MengC #analysis #scalability
Bio-sequence analysis with cradle’s 3SoCTM software scalable system on chip (XM, VC), pp. 202–206.
SACSAC-2004-OBrienH #analysis #authoring
Training Needs Analysis: the first step in authoring e-learning content (EO, TH), pp. 935–939.
SACSAC-2004-VincentR #analysis #framework #using
A framework and analysis for cooperative search using UAV swarms (PV, IR), pp. 79–86.
SACSAC-2004-WebbW #analysis #biology #synthesis
Combining analysis and synthesis in a model of a biological cell (KW, TW), pp. 185–190.
FSEFSE-2004-DingelL #analysis #automation #concurrent #safety #source code #txl #using
Automating comprehensive safety analysis of concurrent programs using verisoft and TXL (JD, HL), pp. 13–22.
FSEFSE-2004-Egyed #analysis #nondeterminism
Resolving uncertainties during trace analysis (AE), pp. 3–12.
FSEFSE-2004-ManevichSA #named #static analysis
PSE: explaining program failures via postmortem static analysis (RM, MS, SA, MD, ZY), pp. 63–72.
FSEFSE-2004-RinardSB #analysis #aspect-oriented #classification #source code
A classification system and analysis for aspect-oriented programs (MCR, AS, SB), pp. 147–158.
FSEFSE-2004-ZhangYF #analysis
Refining code-design mapping with flow analysis (XZ, MY, JHEFL), pp. 231–240.
FSEFSE-2004-ZitserLL #open source #source code #static analysis #testing #tool support #using
Testing static analysis tools using exploitable buffer overflows from open source code (MZ, RL, TL), pp. 97–106.
ICSEICSE-2004-BaniassadC #analysis #approach #aspect-oriented #design #named
Theme: An Approach for Aspect-Oriented Analysis and Design (ELAB, SC), pp. 158–167.
ICSEICSE-2004-Berenbach #analysis #design #evaluation #scalability #uml
The Evaluation of Large, Complex UML Analysis and Design Model (BB), pp. 232–241.
ICSEICSE-2004-ChatzigeorgiouXS #analysis #design #object-oriented
Evaluating Object-Oriented Designs with Link Analysis (AC, SX, GS), pp. 656–665.
ICSEICSE-2004-GouldSD04a #sql #static analysis
JDBC Checker: A Static Analysis Tool for SQL/JDBC Applications (CG, ZS, PTD), pp. 697–698.
ICSEICSE-2004-Kang #analysis #approximate #embedded #parametricity #realtime
Parametric Analysis of Real-Time Embedded Systems with Abstract Approximation Interpretation (EYK), pp. 39–41.
ICSEICSE-2004-Keenan #agile #analysis #problem #process
Agile Process Tailoring and probLem analYsis (APTLY) (FK), pp. 45–47.
ICSEICSE-2004-OrsoALRH #algorithm #comparison #empirical #impact analysis
An Empirical Comparison of Dynamic Impact Analysis Algorithms (AO, TA, JL, GR, MJH), pp. 491–500.
ICSEICSE-2004-Roshandel #analysis #architecture #modelling #reliability
Calculating Architectural Reliability via Modeling and Analysis (RR), pp. 69–71.
ICSEICSE-2004-Tonella #concept analysis #re-engineering
Formal Concept Analysis in Software Engineering (PT), pp. 743–744.
ATEMATEM-2003-NaikB04 #analysis #framework #programmable #reverse engineering
A Programmable Analysis and Transformation Framework for Reverse Engineering (RN, AB), pp. 39–49.
LDTALDTA-2004-BegelG #ambiguity #analysis #tool support
Language Analysis and Tools for Ambiguous Input Streams (AB, SLG), pp. 75–96.
SPLCSPLC-2004-ChastekD #analysis #product line
Product Line Analysis (GJC, PD), p. 310.
SPLCSPLC-2004-FritschH #analysis #product line
Product Line Potential Analysis (CF, RH), pp. 228–237.
SPLCSPLC-2004-JohnS04a #analysis #modelling #product line
Starting Product Lines (II) — Product Line Analysis and Modeling (IJ, KS), p. 320.
ASPLOSASPLOS-2004-CherHV #analysis #garbage collection #hardware
Software prefetching for mark-sweep garbage collection: hardware analysis and software redesign (CYC, ALH, TNV), pp. 199–210.
CCCC-2004-ChowdhuryDCBM #alias #analysis #optimisation
The Limits of Alias Analysis for Scalar Optimizations (RAC, PD, BC, JHB, KSM), pp. 24–38.
CCCC-2004-ClaussT #approach #optimisation #program analysis
A Symbolic Approach to Bernstein Expansion for Program Analysis and Optimization (PC, IT), pp. 120–133.
CGOCGO-2004-LattnerA #compilation #framework #named #program analysis
LLVM: A Compilation Framework for Lifelong Program Analysis & Transformation (CL, VSA), pp. 75–88.
HPCAHPCA-2004-JosephHM #analysis #case study #design #experience
Wavelet Analysis for Microprocessor Design: Experiences with Wavelet-Based dI/dt Characterization (RJ, ZH, MM), pp. 36–47.
ISMMISMM-2004-ChenKVI #analysis #embedded #java #optimisation
Field level analysis for heap space optimization in embedded java environments (GC, MTK, NV, MJI), pp. 131–142.
ISMMISMM-2004-CheremR #analysis #java #source code
Region analysis and transformation for Java programs (SC, RR), pp. 85–96.
ISMMISMM-2004-SagonasW #concurrent #garbage collection #incremental
Message analysis-guided allocation and low-pause incremental garbage collection in a concurrent language (KFS, JW), pp. 1–12.
CAVCAV-2004-ArthoSBEBZ #dynamic analysis #java #named #performance
JNuke: Efficient Dynamic Analysis for Java (CA, VS, AB, PE, MB, BZ), pp. 462–465.
CAVCAV-2004-FarzanCMR #analysis #formal method #java #source code
Formal Analysis of Java Programs in JavaFAN (AF, FC, JM, GR), pp. 501–505.
CAVCAV-2004-FuBS #analysis #formal method #named #web #web service
WSAT: A Tool for Formal Analysis of Web Services (XF, TB, JS), pp. 510–514.
CAVCAV-2004-Metzner #analysis #model checking #why
Why Model Checking Can Improve WCET Analysis (AM), pp. 334–347.
CAVCAV-2004-RepsSW #logic #program analysis
Static Program Analysis via 3-Valued Logic (TWR, SS, RW), pp. 15–30.
CAVCAV-2004-Wang #analysis #hybrid #linear #parametricity #safety
Symbolic Parametric Safety Analysis of Linear Hybrid Systems with BDD-Like Data-Structures (FW), pp. 295–307.
FATESFATES-2004-YoonKSC #analysis #component #empirical #fault #injection #mutation testing #testing #using
Testing COM Components Using Software Fault Injection and Mutation Analysis, and Its Empirical Study (HY, EK, JS, BC), pp. 210–224.
IJCARIJCAR-2004-MeseguerR #analysis #formal method #logic #semantics #specification #tool support
Rewriting Logic Semantics: From Language Specifications to Formal Analysis Tools (JM, GR), pp. 1–44.
RTARTA-2004-JonesB #analysis #calculus #termination
Termination Analysis of the Untyped lamba-Calculus (NDJ, NB), pp. 1–23.
SATSAT-2004-TangYRM #algorithm #analysis #problem #quantifier #satisfiability
Analysis of Search Based Algorithms for Satisfiability of Quantified Boolean Formulas Arising from Circuit State Space Diameter Problems (DT, YY, DR, SM), pp. 214–223.
VMCAIVMCAI-2004-EnglerM #debugging #model checking #static analysis
Static Analysis versus Software Model Checking for Bug Finding (DRE, MM), pp. 191–210.
VMCAIVMCAI-2004-Etessami #analysis #data flow #equation #game studies #graph #recursion #using
Analysis of Recursive Game Graphs Using Data Flow Equations (KE), pp. 282–296.
VMCAIVMCAI-2004-KuncakR #algebra #analysis #constraints
Boolean Algebra of Shape Analysis Constraints (VK, MCR), pp. 59–72.
ASEASE-2003-FischerS #analysis #image
Applying AutoBayes to the Analysis of Planetary Nebulae Images (BF, JS), pp. 337–342.
ASEASE-2003-SabetzadehE #analysis #approach #consistency #graph #nondeterminism
Analysis of Inconsistency in Graph-Based Viewpoints: A Category-Theoretic Approach (MS, SME), pp. 12–21.
ASEASE-2003-SkeneE #analysis #approach #architecture #modelling #non-functional
A Model-Driven Approach to Non-Functional Analysis of Software Architectures (JS, WE), pp. 236–239.
DACDAC-2003-AgostaBS #modelling #static analysis #transaction
Static analysis of transaction-level models (GA, FB, DS), pp. 448–453.
DACDAC-2003-BeniniMMOPP #analysis #design #difference #energy
Energy-aware design techniques for differential power analysis protection (LB, AM, EM, EO, FP, MP), pp. 36–41.
DACDAC-2003-BergamaschiJ #analysis
State-based power analysis for systems-on-chip (RAB, YJ), pp. 638–641.
DACDAC-2003-ChaiKRTWM #analysis
Temporofunctional crosstalk noise analysis (DC, AK, YR, KHT, YW, MMS), pp. 860–863.
DACDAC-2003-ChenHBW #analysis #automation #constraints #logic
Automatic trace analysis for logic of constraints (XC, HH, FB, YW), pp. 460–465.
DACDAC-2003-CroixW #analysis #modelling #using
Blade and razor: cell and interconnect delay analysis using current-based models (JFC, DFW), pp. 386–389.
DACDAC-2003-FangRPC #modelling #performance #static analysis #towards
Toward efficient static analysis of finite-precision effects in DSP applications via affine arithmetic modeling (CFF, RAR, MP, TC), pp. 496–501.
DACDAC-2003-JersakE #analysis #dependence #multi #scheduling
Enabling scheduling analysis of heterogeneous systems with multi-rate data dependencies and rate intervals (MJ, RE), pp. 454–459.
DACDAC-2003-LeeKBS #analysis
Analysis and minimization techniques for total leakage considering gate oxide leakage (DL, WK, DB, DS), pp. 175–180.
DACDAC-2003-LiLXP #analysis #megamodelling
Analog and RF circuit macromodels for system-level analysis (XL, PL, YX, LTP), pp. 478–483.
DACDAC-2003-LiMR #analysis #interactive #modelling
Accurate timing analysis by modeling caches, speculation and their interaction (XL, TM, AR), pp. 466–471.
DACDAC-2003-MaHDCCCG #analysis #optimisation
Dynamic global buffer planning optimization based on detail block locating and congestion analysis (YM, XH, SD, SC, YC, CKC, JG), pp. 806–811.
DACDAC-2003-MantheLS #analysis
Symbolic analysis of analog circuits with hard nonlinearity (AM, ZL, CJRS), pp. 542–545.
DACDAC-2003-StehrGA #analysis #bound #performance #trade-off
Performance trade-off analysis of analog circuits by normal-boundary intersection (GS, HEG, KA), pp. 958–963.
DACDAC-2003-TsengK #analysis
Static noise analysis with noise windows (KT, VK), pp. 864–868.
DACDAC-2003-ZhuYC #adaptation #algebra #analysis #approach #multi #network #using
Power network analysis using an adaptive algebraic multigrid approach (ZZ, BY, CKC), pp. 105–108.
DATEDATE-2003-AgarwalBZV #analysis #bound #statistics #using
Statistical Timing Analysis Using Bounds (AA, DB, VZ, SBKV), pp. 10062–10067.
DATEDATE-2003-BrandoleseFSS #analysis #library
Library Functions Timing Characterization for Source-Level Analysis (CB, WF, FS, DS), pp. 11132–11133.
DATEDATE-2003-CaldariCCCOPT #analysis
System-Level Power Analysis Methodology Applied to the AMBA AHB Bus (MC, MC, MC, PC, SO, LP, CT), pp. 20032–20039.
DATEDATE-2003-ChoLYCZ #analysis #communication #design #scheduling
Scheduling and Timing Analysis of HW/SW On-Chip Communication in MP SoC Design (YC, GL, SY, KC, NEZ), pp. 20132–20137.
DATEDATE-2003-DebOJ #analysis #embedded #simulation #using
Simulation and Analysis of Embedded DSP Systems Using MASIC Methodology (AKD, , AJ), pp. 11100–11101.
DATEDATE-2003-DobrovolnyVWD #analysis #modelling
Analysis and White-Box Modeling of Weakly Nonlinear Time-Varying Circuits (PD, GV, PW, SD), pp. 10624–10629.
DATEDATE-2003-GoelB #analysis #functional #reachability #set
Set Manipulation with Boolean Functional Vectors for Symbolic Reachability Analysis (AG, REB), pp. 10816–10821.
DATEDATE-2003-GouraryRUZM #analysis #simulation
A New Simulation Technique for Periodic Small-Signal Analysis (MMG, SGR, SLU, MMZ, BJM), pp. 10244–10249.
DATEDATE-2003-LogothetisS #analysis #source code
Exact High Level WCET Analysis of Synchronous Programs by Symbolic State Space Exploration (GL, KS), pp. 10196–10203.
DATEDATE-2003-LupeaPJ #analysis #named
RF-BIST: Loopback Spectral Signature Analysis (DL, UP, HJJ), pp. 10478–10483.
DATEDATE-2003-MantheLSM #analysis
Symbolic Analysis of Nonlinear Analog Circuits (AM, ZL, CJRS, KM), pp. 11108–11109.
DATEDATE-2003-PanBKK #analysis #architecture #design #programmable
Design and Analysis of a Programmable Single-Chip Architecture for DVB-T Base-Band Receiver (CP, NB, AHK, AK), pp. 10468–10475.
DATEDATE-2003-PopEP #analysis #clustering #distributed #embedded #multi #optimisation #scheduling #synthesis
Schedulability Analysis and Optimization for the Synthesis of Multi-Cluster Distributed Embedded Systems (PP, PE, ZP), pp. 10184–10189.
DATEDATE-2003-RapakaM #analysis #embedded #performance
Pre-Characterization Free, Efficient Power/Performance Analysis of Embedded and General Purpose Software Applications (VSPR, DM), pp. 10504–10509.
DATEDATE-2003-RebaudengoRV #analysis #fault #pipes and filters
An Accurate Analysis of the Effects of Soft Errors in the Instruction and Data Caches of a Pipelined Microprocessor (MR, MSR, MV), pp. 10602–10607.
DATEDATE-2003-VanasscheGS #analysis #detection #domain model #modelling
Time-Varying, Frequency-Domain Modeling and Analysis of Phase-Locked Loops with Sampling Phase-Frequency Detectors (PV, GGEG, WMCS), pp. 10238–10243.
DATEDATE-2003-WangZ #analysis #polynomial
Transistor-Level Static Timing Analysis by Piecewise Quadratic Waveform Matching (ZW, JZ), pp. 11026–11031.
DATEDATE-2003-YeBM #analysis #communication
Packetized On-Chip Interconnect Communication Analysis for MPSoC (TTY, LB, GDM), pp. 10344–10349.
DocEngDocEng-2003-BayerlLGWN #analysis #documentation #semantics
Methods for the semantic analysis of document markup (PSB, HL, DG, AW, DN), pp. 161–170.
DocEngDocEng-2003-SimskeA #analysis #image
User-directed analysis of scanned images (SJS, JA), pp. 212–221.
DRRDRR-2003-AradhyeHM #analysis #detection #recognition
Syntax-directed content analysis of videotext: application to a map detection recognition system (HBA, JAH, GKM), pp. 57–66.
DRRDRR-2003-MaoRK #algorithm #analysis #bibliography #documentation
Document structure analysis algorithms: a literature survey (SM, AR, TK), pp. 197–207.
HTHT-2003-WuGDB #analysis #collaboration
Link analysis for collaborative knowledge building (HW, MDG, KD, NB), pp. 216–217.
ICDARICDAR-2003-AmanoA #analysis #documentation #grammarware #graph grammar
Graph Grammar Based Analysis System of Complex Table Form Document (AA, NA), pp. 916–920.
ICDARICDAR-2003-Baird #analysis #documentation #image #library
Digital Libraries and Document Image Analysis (HSB), p. 2–?.
ICDARICDAR-2003-Breuel #algorithm #analysis #documentation #layout
An Algorithm for Finding Maximal Whitespace Rectangles at Arbitrary Orientations for Document Layout Analysis (TMB), pp. 66–70.
ICDARICDAR-2003-DoermannLL #analysis #documentation #image
Progress in Camera-Based Document Image Analysis (DSD, JL, HL), p. 606–?.
ICDARICDAR-2003-FutrelleSCG #analysis #classification #diagrams #documentation #layout
Extraction, layout analysis and classification of diagrams in PDF documents (RPF, MS, CC, AEG), pp. 1007–1014.
ICDARICDAR-2003-GattaniMG #analysis #approach #documentation #image #multi #performance
A Fast Multifunctional Approach for Document Image Analysis (AG, MM, HG), pp. 1178–1182.
ICDARICDAR-2003-GuestCFP #analysis #automation #classification #geometry #sequence #using
Automatic Classification of Hand Drawn Geometric Shapes using Constructional Sequence Analysis (RMG, SC, MCF, JMP), pp. 990–994.
ICDARICDAR-2003-HeD #analysis #documentation #image #library
User-Assisted Archive Document Image Analysis for Digital Library Construction (JH, ACD), pp. 498–502.
ICDARICDAR-2003-HendersonS #analysis #approach
Symbolic Pruning in a Structural Approach to Engineering Drawing Analysis (TH, LS), pp. 180–184.
ICDARICDAR-2003-KleinAB #analysis #comprehension #documentation #modelling
Understanding Document Analysis and Understanding (through Modeling) (BK, SA, ADB), pp. 1218–1222.
ICDARICDAR-2003-SimardSP #analysis #documentation #network #visual notation
Best Practices for Convolutional Neural Networks Applied to Visual Document Analysis (PYS, DS, JCP), pp. 958–962.
ICDARICDAR-2003-SuenMKL #analysis #recognition #state of the art
Analysis and Recognition of Asian Scripts — the State of the Art (CYS, SM, SHK, CHL), p. 866–?.
ICDARICDAR-2003-SutantoLP #analysis #consistency #documentation
Study of the Consistency of Some Discriminatory Features Used by Document Examiners in the Analysis of Handwritten Letter “a” (PJS, GL, VP), pp. 1091–1095.
ICDARICDAR-2003-ZhangS #analysis #using #word
Analysis of Handwriting Individuality Using Word Features (BZ, SNS), pp. 1142–1146.
ICDARICDAR-2003-ZouTLL #analysis #online #using #verification
On-line Signature Verification Using Local Shape Analysis (MZ, JT, CL, ZL), pp. 314–318.
SIGMODSIGMOD-2003-Bierman #analysis #query #semantics
Formal semantics and analysis of object queries (GMB), pp. 407–418.
VLDBVLDB-2003-ShiSZ #approach #data analysis #multi
A Shrinking-Based Approach for Multi-Dimensional Data Analysis (YS, YS, AZ), pp. 440–451.
VLDBVLDB-2003-SrinivasaK #analysis #framework #multi
A Platform Based on the Multi-dimensional Data Model for Analysis of Bio-Molecular Structures (SS, SK), pp. 975–986.
ITiCSEITiCSE-2003-MoodyS #analysis #assurance #education #process #quality #requirements
Incorporating quality assurance processes into requirements analysis education (DLM, GS), pp. 74–78.
ITiCSEITiCSE-2003-Trakhtenbrot #analysis #concept #how
Analysis of typical misconceptions in a theoretical CS course, and how to address them in e-learning (MBT), p. 241.
ESOPESOP-2003-GenaimK #analysis #independence #logic programming #scheduling #source code
Goal-Independent Suspension Analysis for Logic Programs with Dynamic Scheduling (SG, AK), pp. 84–98.
ESOPESOP-2003-GorrieriLM #analysis #encryption #protocol #realtime
A Simple Language for Real-Time Cryptographic Protocol Analysis (RG, EL, FM), pp. 114–128.
ESOPESOP-2003-Laud #analysis #data flow #encryption
Handling Encryption in an Analysis for Secure Information Flow (PL), pp. 159–173.
ESOPESOP-2003-Leroy #perspective #programming language #security #static analysis
Computer Security from a Programming Language and Static Analysis Perspective (XL), pp. 1–9.
ESOPESOP-2003-Meadows #analysis #encryption #evolution #protocol #requirements #specification #what
What Makes a Cryptographic Protocol Secure? The Evolution of Requirements Specification in Formal Cryptographic Protocol Analysis (CM), pp. 10–21.
ESOPESOP-2003-RepsSL #difference #finite #logic #static analysis
Finite Differencing of Logical Formulas for Static Analysis (TWR, SS, AL), pp. 380–398.
FASEFASE-2003-JinELJ #analysis #composition #data flow #network #process
Modular Analysis of Dataflow Process Networks (YJ, RE, CL, JWJ), pp. 184–199.
FASEFASE-2003-Young #static analysis #testing
Symbiosis of Static Analysis and Program Testing (MY), pp. 1–5.
TACASTACAS-2003-AmlaKMM #analysis #bound #model checking
Experimental Analysis of Different Techniques for Bounded Model Checking (NA, RPK, KLM, RM), pp. 34–48.
TACASTACAS-2003-BasuR #analysis #composition #verification
Compositional Analysis for Verification of Parameterized Systems (SB, CRR), pp. 315–330.
TACASTACAS-2003-BDSV #analysis #encryption #information management #protocol #representation
A New Knowledge Representation Strategy for Cryptographic Protocol Analysis (ICB, LD, RS, AV), pp. 284–298.
TACASTACAS-2003-BehrmannBFL #analysis #automaton #verification
Static Guard Analysis in Timed Automata Verification (GB, PB, EF, KGL), pp. 254–277.
TACASTACAS-2003-BerthomieuV #analysis #branch #petri net
State Class Constructions for Branching Analysis of Time Petri Nets (BB, FV), pp. 442–457.
TACASTACAS-2003-FersmanMPY #analysis #scheduling #using
Schedulability Analysis Using Two Clocks (EF, LM, PP, WY), pp. 224–239.
TACASTACAS-2003-HermannsJ #analysis #component #dependence #performance #set
A Set of Performance and Dependability Analysis Components for CADP (HH, CJ), pp. 425–430.
TACASTACAS-2003-SokolskyPLC #analysis #modelling #power management
Modeling and Analysis of Power-Aware Systems (OS, AP, IL, KC), pp. 409–425.
TACASTACAS-2003-ZhangCS #analysis #concurrent #functional #performance #verification
The Integrated CWB-NC/PIOATool for Functional Verification and Performance Analysis of Concurrent Systems (DZ, RC, EWS), pp. 431–436.
CSMRCSMR-2003-GschwindO #aspect-oriented #data analysis #programming
Improving Dynamic Data Analysis with Aspect-Oriented Programming (TG, JO), p. 259–?.
CSMRCSMR-2003-MerloAB #analysis #fuzzy #performance
Fast Flow Analysis to Compute Fuzzy Estimates of Risk Levels (EM, GA, PLB), p. 351–?.
ICSMEICSM-2003-BriandLO #impact analysis #modelling #uml
Impact Analysis and Change Management of UML Models (LCB, YL, LO), pp. 256–265.
ICSMEICSM-2003-Klusener #analysis #source code
Source Code Based Function Point Analysis for Enhancement Projects (SK), pp. 373–376.
ICSMEICSM-2003-KnethenG #automation #impact analysis #named
QuaTrace: A Tool Environment for (Semi-) Automatic Impact Analysis Based on Traces (AvK, MG), pp. 246–255.
ICSMEICSM-2003-LandC #analysis #architecture #case study #integration
Software Systems Integration and Architectural Analysis — A Case Study (RL, IC), pp. 338–347.
ICSMEICSM-2003-OhstWK #analysis #design #difference #documentation #tool support
Difference Tools for Analysis and Design Documents (DO, MW, UK), pp. 13–22.
IWPCIWPC-2003-BeyerL #analysis #named #object-oriented #performance #source code
CrocoPat: Efficient Pattern Analysis in Object-Oriented Programs (DB, CL), pp. 294–295.
IWPCIWPC-2003-CoxC #analysis #approximate #semiparsing #using
Syntactic Approximation Using Iterative Lexical Analysis (AC, CLAC), pp. 154–164.
IWPCIWPC-2003-MarcusFM #3d #analysis #comprehension #using #visualisation
Comprehension of Software Analysis Data Using 3D Visualization (AM, LF, JIM), pp. 105–114.
IWPCIWPC-2003-Reiss #analysis #performance
Event-Based Performance Analysis (SPR), pp. 74–83.
SCAMSCAM-2003-AntoniolPMV #abstract syntax tree #analysis #named #xml
XOgastan: XML-Oriented gcc AST Analysis and Transformations (GA, MDP, GM, UV), pp. 173–182.
SCAMSCAM-2003-Martel #clustering #static analysis
Improving the Static Analysis of Loops by Dynamic Partitioning Techniques (MM), pp. 13–21.
SCAMSCAM-2003-PearceKH #analysis #detection #difference #online #pointer
Online Cycle Detection and Difference Propagation for Pointer Analysis (DJP, PHJK, CH), pp. 3–12.
SCAMSCAM-2003-Verhoef #analysis #multi #source code #using
Managing Multi-Billion Dollar IT Budgets using Source Code Analysis (CV), p. 77–?.
WCREWCRE-2003-AliasB #algorithm #analysis #data flow #recognition
Algorithm Recognition based on Demand-Driven Data-flow Analysis (CA, DB), pp. 296–305.
WCREWCRE-2003-ZouG #analysis #detection #using
Detecting Merging and Splitting using Origin Analysis (LZ, MWG), pp. 146–154.
PEPMPEPM-2003-ChinKX #analysis
Extending sized type with collection analysis (WNC, SCK, DNX), pp. 75–84.
PLDIPLDI-2003-AmmonsMBL #concept analysis #debugging #specification
Debugging temporal specifications with concept analysis (GA, DM, RB, JRL), pp. 182–195.
PLDIPLDI-2003-BerndlLQHU #analysis #points-to #using
Points-to analysis using BDDs (MB, OL, FQ, LJH, NU), pp. 103–114.
PLDIPLDI-2003-DingZ #analysis #distance #locality #predict #reuse
Predicting whole-program locality through reuse distance analysis (CD, YZ), pp. 245–257.
PLDIPLDI-2003-LambTA #analysis #linear #optimisation #source code
Linear analysis and optimization of stream programs (AAL, WT, SPA), pp. 12–25.
PLDIPLDI-2003-LinCHYJNC #analysis #compilation #framework #optimisation
A compiler framework for speculative analysis and optimizations (JL, TC, WCH, PCY, RDCJ, TFN, SC), pp. 289–299.
PLDIPLDI-2003-PraunG #analysis #concurrent #multi #object-oriented #source code #thread
Static conflict analysis for multi-threaded object-oriented programs (CvP, TRG), pp. 115–128.
SASSAS-2003-BessonJ #analysis #composition #datalog
Modular Class Analysis with DATALOG (FB, TPJ), pp. 19–36.
SASSAS-2003-CarlssonSW #analysis #concurrent
Message Analysis for Concurrent Languages (RC, KFS, JW), pp. 73–90.
SASSAS-2003-ChatterjeeMMZHP #analysis #source code #stack
Stack Size Analysis for Interrupt-Driven Programs (KC, DM, RM, TZ, TAH, JP), pp. 109–126.
SASSAS-2003-ChongR #data type #recursion #static analysis
Static Analysis of Accessed Regions in Recursive Data Structures (SC, RR), pp. 463–482.
SASSAS-2003-ChristensenMS #analysis #precise #string
Precise Analysis of String Expressions (ASC, AM, MIS), pp. 1–18.
SASSAS-2003-GuyerL #analysis #pointer
Client-Driven Pointer Analysis (SZG, CL), pp. 214–236.
SASSAS-2003-HalbwachsMP #analysis #linear
Cartesian Factoring of Polyhedra in Linear Relation Analysis (NH, DM, CPV), pp. 355–365.
SASSAS-2003-KremenekE #approximate #named #static analysis #statistics #using
Z-Ranking: Using Statistical Analysis to Counter the Impact of Static Analysis Approximations (TK, DRE), pp. 295–315.
SASSAS-2003-Logozzo #analysis #composition #object-oriented
Class-Level Modular Analysis for Object Oriented Languages (FL), pp. 37–54.
SASSAS-2003-McMillan #analysis #reachability
Craig Interpolation and Reachability Analysis (KLM), p. 336.
SASSAS-2003-RepsSJ #analysis #automaton #data flow #interprocedural
Weighted Pushdown Systems and Their Application to Interprocedural Dataflow Analysis (TWR, SS, SJ), pp. 189–213.
CIAACIAA-2003-WangHY #analysis
TCTL Inevitability Analysis of Dense-Time Systems (FW, GDH, FY), pp. 176–187.
ICALPICALP-2003-Jagerskupper #algorithm #analysis
Analysis of a Simple Evolutionary Algorithm for Minimization in Euclidean Spaces (JJ), pp. 1068–1079.
ICALPICALP-2003-Rabinovich #analysis #probability
Quantitative Analysis of Probabilistic Lossy Channel Systems (AMR), pp. 1008–1021.
FMFME-2003-ArmandoCG #analysis #graph #model checking #protocol #satisfiability #security #using
SAT-Based Model-Checking of Security Protocols Using Planning Graph Analysis (AA, LC, PG), pp. 875–893.
FMFME-2003-CompareIPS #analysis #architecture #lifecycle #model checking #validation
Integrating Model-Checking Architectural Analysis and Validation in a Real Software Life-Cycle (DC, PI, PP, AS), pp. 114–132.
FMFME-2003-Schafer #analysis #fault #model checking #realtime
Combining Real-Time Model-Checking and Fault Tree Analysis (AS), pp. 522–541.
SEFMSEFM-2003-JinLE #analysis #case study #component #design
Component-Based Design and Analysis: A Case Study (YJ, CL, RE), p. 126–?.
SFMSFM-2003-Garlan #analysis #architecture #component #formal method #modelling
Formal Modeling and Analysis of Software Architecture: Components, Connectors, and Events (DG), pp. 1–24.
SFMSFM-2003-KramerMU #analysis #approach #architecture #modelling
Software Architecture Modeling & Analysis: A Rigorous Approach (JK, JM, SU), pp. 44–51.
SFMSFM-2003-StaffordWC #analysis #architecture #dependence
The Application of Dependence Analysis to Software Architecture Descriptions (JAS, ALW, MC), pp. 52–62.
ICFPICFP-2003-Mairson #analysis #game studies #semantics
From Hilbert space to Dilbert space: context semantics as a language for games and flow analysis (HGM), p. 125.
ICFPICFP-2003-OgawaHS #program analysis
Iterative-free program analysis (MO, ZH, IS), pp. 111–123.
AGTIVEAGTIVE-2003-DottiRS #analysis #behaviour #fault #graph grammar #specification #using
Specification and Analysis of Fault Behaviours Using Graph Grammars (FLD, LR, OMdS), pp. 120–133.
AGTIVEAGTIVE-2003-LaraGV #analysis #graph transformation #hybrid #metamodelling #model checking
Meta-Modelling, Graph Transformation and Model Checking for the Analysis of Hybrid Systems (JdL, EG, HV), pp. 292–298.
AGTIVEAGTIVE-2003-MarburgerW #analysis #behaviour #graph transformation
Behavioral Analysis of Telecommunication Systems by Graph Transformations (AM, BW), pp. 202–219.
SOFTVISSOFTVIS-2003-ZhouSC #analysis #graph #visualisation
Graph Visualization for the Analysis of the Structure and Dynamics of Extreme-Scale Supercomputers (CZ, KLS, TPC), pp. 143–149.
VISSOFTVISSOFT-2003-MarcusFM #3d #analysis #multi #visualisation
Source Viewer 3D (sv3D): A System for Visualizing Multi Dimensional Software Analysis Data (AM, LF, JIM), pp. 62–63.
AdaEuropeAdaEurope-2003-BliebergerBS #analysis
Busy Wait Analysis (JB, BB, BS), pp. 142–152.
AdaEuropeAdaEurope-2003-EvangelistaKPR #ada #analysis #concurrent #named #source code
Quasar: A New Tool for Concurrent Ada Programs Analysis (SE, CK, JFPP, PR), pp. 168–181.
CAiSECAiSE-2003-KolpGM #analysis #requirements
Organizational Patterns for Early Requirements Analysis (MK, PG, JM), pp. 617–632.
ICEISICEIS-v2-2003-AzevedoM #analysis #capacity #enterprise #network #requirements
Requirements of a Decision Support System for Capacity Analysis and Planning in Enterprise Networks (ALA, AM), pp. 177–184.
ICEISICEIS-v2-2003-NetoCMG #analysis #network #simulation #using
Simulating Data Envelopment Analysis Using Neural Networks (LBN, PHGC, JCCBSdM, EGG), pp. 244–249.
ICEISICEIS-v2-2003-SilvaIE #analysis #database #identification #information management #using
Using Knowledge Discovery to Identify Analysis Patterns for Geographic Database (CS, CI, PME), pp. 359–364.
ICEISICEIS-v2-2003-TolbaMGA #algorithm #analysis #image #multi #segmentation #using
MR-Brain Image Segmentation Using Gaussian Multiresolution Analysis and the EM Algorithm (MFT, MGM, TFG, MAMS), pp. 165–170.
ICEISICEIS-v3-2003-AgerfalkW #analysis #concept #development #framework
Systems Development Method Rationale: A Conceptual Framework for Analysis (PJÅ, KW), pp. 185–190.
ICEISICEIS-v3-2003-AkatsuKK #analysis #parametricity
Analysis on Relation Between Service Parameters for Service Level Management and System Utilization (MA, SK, NK), pp. 191–196.
ICEISICEIS-v3-2003-NahouraiiWD #analysis #information management
Information System Failure: Analysis and Commentary (AN, JAW, AD), pp. 566–572.
ICEISICEIS-v3-2003-SaeedA #analysis
Analysis of Level of Involvement of Six Best Practices of RUP in OOSP (MS, FA), pp. 523–526.
ICEISICEIS-v3-2003-SerraoNT #analysis #open source #operating system #security
Open Source Security Analysis — Evaluating Security of Open Source vs. Closed Source Operating Systems (CS, DN, PT), pp. 433–440.
ICEISICEIS-v3-2003-TyrvainenP #analysis #communication #how #metric
How Digital Is Communication in Your Organization? a Metrics and an Analysis Method (PT, TP), pp. 156–166.
ICEISICEIS-v3-2003-WohedPDH #analysis #modelling
Pattern Based Analysis of Eai Languages — The Case of the Business Modeling Language (PW, EP, MD, AHMtH), pp. 174–184.
ICEISICEIS-v4-2003-CamponovoP #analysis #mobile
Business Model Analysis Applied to Mobile Business (GC, YP), pp. 173–183.
ICEISICEIS-v4-2003-Oriogun #analysis #case study #online #re-engineering #reliability #using
Content Analysis of Online Interrater Reliability Using the Transcript Reliability Cleaning Percentage (Trcp): A Software Engineering Case Study (PKO), pp. 296–307.
ICEISICEIS-v4-2003-PierozziGAC #analysis #towards #web
Towards Web Site User’s Profile: Log File Analysis (IPJ, EGG, MdCFA, CAdC), pp. 395–398.
ICEISICEIS-v4-2003-Zhao #analysis
Analysis of Business to Business Electronic Markets in China: Theoretical and Practical Perspectives (JZ), pp. 377–385.
CIKMCIKM-2003-GloorLDZ #analysis #collaboration #communication #network #visualisation
Visualization of Communication Patterns in Collaborative Innovation Networks — Analysis of Some W3C Working Groups (PAG, RL, SBCD, YZ), pp. 56–60.
CIKMCIKM-2003-JiangC #analysis #data type #relational
Queueing analysis of relational operators for continuous data streams (QJ, SC), pp. 271–278.
CIKMCIKM-2003-LiZO #analysis #categorisation #multi #performance
Efficient multi-way text categorization via generalized discriminant analysis (TL, SZ, MO), pp. 317–324.
ICMLICML-2003-BerardiCEM #analysis #layout #learning #logic programming #source code
Learning Logic Programs for Layout Analysis Correction (MB, MC, FE, DM), pp. 27–34.
ICMLICML-2003-FurnkranzF #analysis #evaluation #metric
An Analysis of Rule Evaluation Metrics (JF, PAF), pp. 202–209.
ICMLICML-2003-KaskiP #analysis
Informative Discriminant Analysis (SK, JP), pp. 329–336.
ICMLICML-2003-KubicaMCS #analysis #collaboration #graph #performance #query
Finding Underlying Connections: A Fast Graph-Based Method for Link Analysis and Collaboration Queries (JK, AWM, DC, JGS), pp. 392–399.
ICMLICML-2003-LaudD #analysis #learning
The Influence of Reward on the Speed of Reinforcement Learning: An Analysis of Shaping (AL, GD), pp. 440–447.
ICMLICML-2003-LiY #analysis #categorisation #classification
A Loss Function Analysis for Classification Methods in Text Categorization (FL, YY), pp. 472–479.
ICMLICML-2003-Mamitsuka #analysis
Hierarchical Latent Knowledge Analysis for Co-occurrence Data (HM), pp. 504–511.
KDDKDD-2003-LauLW #analysis #similarity
Similarity analysis on government regulations (GTL, KHL, GW), pp. 711–716.
KDDKDD-2003-Piatetsky-ShapiroKR #array #data analysis
Capturing best practice for microarray gene expression data analysis (GPS, TK, SR), pp. 407–415.
KDDKDD-2003-RaoSNGR #analysis
Clinical and financial outcomes analysis with existing hospital patient records (RBR, SS, RSN, CG, HR), pp. 416–425.
MLDMMLDM-2003-KostersPP #analysis #complexity #implementation
Complexity Analysis of Depth First and FP-Growth Implementations of APRIORI (WAK, WP, VP), pp. 284–292.
MLDMMLDM-2003-RodriguesDFVC #algorithm #analysis #clustering #comparative #profiling
A Comparative Analysis of Clustering Algorithms Applied to Load Profiling (FR, FJFD, VF, ZAV, MC), pp. 73–85.
MLDMMLDM-2003-TanakaU #analysis #component #multi #principle #using
Discover Motifs in Multi-dimensional Time-Series Using the Principal Component Analysis and the MDL Principle (YT, KU), pp. 252–265.
SEKESEKE-2003-BeaverS #data analysis #modelling #quality
Spatial Data Analysis as a Software Quality Modeling Technique (JMB, GAS), pp. 74–77.
SEKESEKE-2003-CaoLZD #analysis #design #information management
Open Giant Intelligent Information Systems and Its Agent-Oriented Analysis and Design (LC, CL, CZ, RD), pp. 85–89.
SEKESEKE-2003-ColeT #analysis #concept
Conceptual Analysis of Software Structure (RC, TT), pp. 726–733.
SEKESEKE-2003-MenziesLM #analysis #fault
Better Analysis of Defect Data at NASA (TM, RRL, ICM), pp. 607–611.
SIGIRSIGIR-2003-Davison #analysis #towards #unification
Toward a unification of text and link analysis (BDD0), pp. 367–368.
SIGIRSIGIR-2003-Dupret #analysis #concept #orthogonal #semantics
Latent concepts and the number orthogonal factors in latent semantic analysis (GD), pp. 221–226.
SIGIRSIGIR-2003-EironM #analysis #web
Analysis of anchor text for web search (NE, KSM), pp. 459–460.
SIGIRSIGIR-2003-Hofmann #analysis #collaboration #probability #semantics
Collaborative filtering via gaussian probabilistic latent semantic analysis (TH), pp. 259–266.
SIGIRSIGIR-2003-HuBZ #analysis #fault #topic
Error analysis of difficult TREC topics (XH, SB, CZ), pp. 407–408.
SIGIRSIGIR-2003-TeevanK #analysis #development #empirical #exponential #probability #retrieval #using
Empirical development of an exponential probabilistic model for text retrieval: using textual analysis to build a better model (JT, DRK), pp. 18–25.
SIGIRSIGIR-2003-WesterveldV #analysis #generative #image #probability #retrieval
Experimental result analysis for a generative probabilistic image retrieval model (TW, APdV), pp. 135–142.
SIGIRSIGIR-2003-XueZCMZL #analysis #web
Implicit link analysis for small web search (GRX, HJZ, ZC, WYM, HZ, CJL), pp. 56–63.
SIGIRSIGIR-2003-YangZK #analysis #categorisation #classification #scalability
A scalability analysis of classifiers in text categorization (YY, JZ, BK), pp. 96–103.
ECOOPECOOP-2003-LamR #analysis #automation #design #type system
A Type System and Analysis for the Automatic Extraction and Enforcement of Design Information (PL, MCR), pp. 275–302.
LOPSTRLOPSTR-2003-Gallagher #analysis #logic programming #program transformation #source code
A Program Transformation for Backwards Analysis of Logic Programs (JPG), pp. 92–105.
LOPSTRLOPSTR-2003-MurakamiHKT #algorithm #analysis #performance #staging
An Efficient Staging Algorithm for Binding-Time Analysis (TM, ZH, KK, MT), pp. 106–107.
PADLPADL-2003-FerreiraD #analysis
WAM Local Analysis (MF, LD), pp. 286–303.
POPLPOPL-2003-BouajjaniET #approach #concurrent #source code #static analysis
A generic approach to the static analysis of concurrent programs with procedures (AB, JE, TT), pp. 62–73.
POPLPOPL-2003-Chakaravarthy #analysis #complexity
New results on the computability and complexity of points — to analysis (VTC), pp. 115–125.
POPLPOPL-2003-GheorghioiuSR #analysis #interprocedural
Interprocedural compatibility analysis for static object preallocation (OG, AS, MCR), pp. 273–284.
RERE-2003-AlspaughA #analysis #case study
Contrasting Use Case, Goal, and Scenario Analysis of the Euronet System (TAA, AIA), pp. 355–356.
RERE-2003-BergmanM #analysis #requirements
In Situ Requirements Analysis: A Deeper Examination of the Relationship between Requirements Determination and Project Selection (MB, GM), pp. 11–22.
RERE-2003-BolchiniPR #analysis #hypermedia #requirements
Adding Hypermedia Requirements to Goal-Driven Analysis (DB, PP, GR), pp. 127–137.
RERE-2003-HuiLM #analysis #framework #requirements
Requirements Analysis for Customizable Software Goals-Skills-Preferences Framework (BH, SL, JM), pp. 117–126.
RERE-2003-KaiyaSMK #analysis #java #mobile #policy #requirements #security #trade-off
Trade-off Analysis between Security Policies for Java Mobile Codes and Requirements for Java Application (HK, KS, YM, KK), pp. 357–358.
RERE-2003-LiuYM #analysis #privacy #requirements #security #social
Security and Privacy Requirements Analysis within a Social Setting (LL, ESKY, JM), pp. 151–161.
RERE-2003-RifautMMPSLV #analysis #formal method #named #specification #tool support #using
FAUST: Formal Analysis Using Specification Tools (AR, PM, JFM, CP, PS, AvL, HTV), p. 350.
RERE-2003-SutcliffeCN #analysis #requirements
Evolutionary Requirements Analysis (AGS, WCC, RN), p. 264–?.
SACSAC-2003-BeitzelJCFGG #analysis #data fusion #effectiveness #information retrieval
Disproving the Fusion Hypothesis: An Analysis of Data Fusion via Effective Information Retrieval Strategies (SMB, ECJ, AC, OF, DAG, NG), pp. 823–827.
SACSAC-2003-BreeseSMGE #analysis #array #framework #information management
Labrat LIMS: An Extensible Framework for Developing Laboratory Information Management, Analysis, and Bioinformatics Solutions for Microarrays (MRB, MJS, JNM, MWG, HJE), pp. 103–108.
SACSAC-2003-FurhtGHM #3d #adaptation #analysis
An Adaptive Three-Dimensional DCT Compression Based on Motion Analysis (BF, KG, HH, OM), pp. 765–768.
SACSAC-2003-HuaJVT #algebra #analysis #approach #data mining #mining #named #performance #using
ADMiRe: An Algebraic Approach to System Performance Analysis Using Data Mining Techniques (KAH, NJ, RV, DAT), pp. 490–496.
SACSAC-2003-NandaK #analysis #web #web service
Synchronization Analysis for Decentralizing Composite Web Services (MGN, NMK), pp. 407–414.
SACSAC-2003-NandaR #analysis #java #parallel #pointer #source code #thread
Pointer Analysis of Multithreaded Java Programs (MGN, SR), pp. 1068–1075.
ESEC-FSEESEC-FSE-2003-BradburyD #analysis #automation
Evaluating and improving the automatic analysis of implicit invocation systems (JSB, JD), pp. 78–87.
ESEC-FSEESEC-FSE-2003-BrylowP #analysis
Deadline analysis of interrupt-driven software (DB, JP), pp. 198–207.
ESEC-FSEESEC-FSE-2003-ChengYHP #analysis #composition #design #modelling #refactoring #scalability #towards
Towards scalable compositional analysis by refactoring design models (YPC, MY, CLH, CYP), pp. 247–256.
ESEC-FSEESEC-FSE-2003-OrsoAH #impact analysis #testing
Leveraging field data for impact analysis and regression testing (AO, TA, MJH), pp. 128–137.
ESEC-FSEESEC-FSE-2003-SenRA #analysis #parallel #runtime #safety #source code #thread
Runtime safety analysis of multithreaded programs (KS, GR, GA), pp. 337–346.
ESEC-FSEESEC-FSE-2003-TkachukD #adaptation #analysis #composition #model checking
Adapting side effects analysis for modular program model checking (OT, MBD), pp. 188–197.
ESEC-FSEESEC-FSE-2003-XieCE #analysis #detection #fault #memory management #named #using
ARCHER: using symbolic, path-sensitive analysis to detect memory access errors (YX, AC, DRE), pp. 327–336.
ICSEICSE-2003-AbrahamssonWSR #agile #analysis #comparative
New Directions on Agile Methods: A Comparative Analysis (PA, JW, MTS, JR), pp. 244–254.
ICSEICSE-2003-CoppitS #analysis #effectiveness #modelling #tool support
Sound Methods and Effective Tools for Engineering Modeling and Analysis (DC, KJS), pp. 198–209.
ICSEICSE-2003-HatcliffDDJR #analysis #component #development #named #verification
Cadena: An Integrated Development, Analysis, and Verification Environment for Component-based Systems (JH, XD, MBD, GJ, VPR), pp. 160–173.
ICSEICSE-2003-JohnsonKACMMZD #analysis #metric #process
Beyond the Personal Software Process: Metrics collection and analysis for the differently disciplined (PMJ, HK, JA, CC, CAM, JM, SZ, WEJD), pp. 641–646.
ICSEICSE-2003-LawR #impact analysis
Whole Program Path-Based Dynamic Impact Analysis (JL, GR), pp. 308–318.
ICSEICSE-2003-RountevMR #analysis #java #morphism #polymorphism #testing
Fragment Class Analysis for Testing of Polymorphism in Java Software (AR, AM, BGR), pp. 210–220.
ICSEICSE-2003-YokomoriIYMKI #component #java #program analysis #slicing
Java Program Analysis Projects in Osaka University: Aspect-Based Slicing System ADAS and Ranked-Component Search System SPARS-J (RY, TI, TY, MM, SK, KI), pp. 828–829.
ICSEICSE-2003-ZageZ #analysis #fault #process #scalability
An Analysis of the Fault Correction Process in a Large-Scale SDL Production Model (DMZ, WMZ), pp. 570–577.
LDTALDTA-2003-CostagliolaDFG #analysis #development #visual notation
Exploiting XPG for Visual Languages: Definition, Analysis and Development (GC, VD, FF, CG), pp. 612–627.
CCCC-2003-LhotakH #analysis #java #points-to #scalability #using
Scaling Java Points-to Analysis Using SPARK (OL, LJH), pp. 153–169.
CCCC-2003-Ryder #analysis #object-oriented #precise #programming language
Dimensions of Precision in Reference Analysis of Object-Oriented Programming Languages (BGR), pp. 126–137.
HPCAHPCA-2003-SakamotoKIAUMK #analysis #architecture #enterprise #performance
Microarchitecture and Performance Analysis of a SPARC-V9 Microprocessor for Enterprise Server Systems (MS, AK, AI, TA, HU, KM, YK), pp. 141–152.
HPDCHPDC-2003-TakefusaTMM #algorithm #analysis #architecture #energy #grid #performance #physics #replication #scheduling
Performance Analysis of Scheduling and Replication Algorithms on Grid Datafarm Architecture for High-Energy Physics Applications (AT, OT, SM, YM), pp. 34–47.
LCTESLCTES-2003-AmeurBBPW #analysis #embedded #robust
Robustness analysis of avionics embedded systems (YAA, GB, FB, SP, VW), pp. 123–132.
PPoPPPPoPP-2003-ChenHHJL #analysis #architecture #compilation #multi #points-to #probability #thread
Compiler support for speculative multithreading architecture with probabilistic points-to analysis (PSC, MYH, YSH, RDCJ, JKL), pp. 25–36.
SOSPSOSP-2003-GummadiDSGLZ #analysis #metric #modelling #peer-to-peer
Measurement, modeling, and analysis of a peer-to-peer file-sharing workload (PKG, RJD, SS, SDG, HML, JZ), pp. 314–329.
CAVCAV-2003-GrumbergHS #algorithm #analysis #distributed #reachability
A Work-Efficient Distributed Algorithm for Reachability Analysis (OG, TH, AS), pp. 54–66.
CSLCSL-2003-Gerhardy #analysis #complexity
Refined Complexity Analysis of Cut Elimination (PG), pp. 212–225.
ICLPICLP-2003-LagoonMS #analysis #termination
Termination Analysis with Types Is More Accurate (VL, FM, PJS), pp. 254–268.
ICLPICLP-2003-Serebrenik #analysis #logic programming #source code #termination
Termination Analysis of Logic Programs: Extended Abstract (AS), pp. 507–508.
RTARTA-2003-ChenRV #analysis #rule-based #safety
Rule-Based Analysis of Dimensional Safety (FC, GR, RPV), pp. 197–207.
ICSTSAT-2003-ArmandoC #analysis #protocol #satisfiability #security
Abstraction-Driven SAT-based Analysis of Security Protocols (AA, LC), pp. 257–271.
VMCAIVMCAI-2003-BraghinCFLP #analysis #complexity #mobile
Complexity of Nesting Analysis in Mobile Ambients (CB, AC, RF, FLL, CP), pp. 86–101.
VMCAIVMCAI-2003-DamsN #abstraction #analysis #model checking
Shape Analysis through Predicate Abstraction and Model Checking (DD, KSN), pp. 310–324.
VMCAIVMCAI-2003-Masse #abstract interpretation #static analysis
Property Checking Driven Abstract Interpretation-Based Static Analysis (DM), pp. 56–69.
VMCAIVMCAI-2003-UnnikrishnanSL #analysis #bound
Optimized Live Heap Bound Analysis (LU, SDS, YAL), pp. 70–85.
CBSECBSE-2002-Mason #analysis #component #composition #probability #reliability
Probabilistic Analysis for Component Reliability Composition (DM), p. 8.
WICSAWICSA-2002-Ramdane-CherifLL #analysis #architecture #configuration management #evaluation
Dynamic Reconfigurable Software Architecture: Analysis and Evaluation (ARC, NL, FL), pp. 79–93.
CBSECBSE-2003-BaresiHTV #analysis #architecture #graph transformation #modelling
Modeling and Analysis of Architectural Styles Based on Graph Transformation (LB, RH, ST, DV), p. 12.
ASEASE-2002-GueheneucDJ #dynamic analysis #java #source code
No Java without Caffeine: A Tool for Dynamic Analysis of Java Programs (YGG, RD, NJ), p. 117–?.
ASEASE-2002-HeimdahlCW #analysis #model checking
Deviation Analysis Through Model Checking (MPEH, YC, MWW), pp. 37–46.
ASEASE-2002-LoerH #analysis #interactive #model checking #towards
Towards Usable and Relevant Model Checking Techniques for the Analysis of Dependable Interactive Systems (KL, MDH), pp. 223–226.
DACDAC-2002-AttarhaN #analysis #fault #modelling #using
Signal integrity fault analysis using reduced-order modeling (AA, MN), pp. 367–370.
DACDAC-2002-BhuniaRS #analysis #detection #fault #locality #novel
A novel wavelet transform based transient current analysis for fault detection and localization (SB, KR, JS), pp. 361–366.
DACDAC-2002-BodapatiN #analysis #megamodelling
High-level current macro-model for power-grid analysis (SB, FNN), pp. 385–390.
DACDAC-2002-Casinovi #algorithm #analysis
An algorithm for frequency-domain noise analysis in nonlinear systems (GC), pp. 514–517.
DACDAC-2002-KoukabDD #analysis #named #performance
HSpeedEx: a high-speed extractor for substrate noise analysis in complex mixed signal SOC (AK, CD, MJD), pp. 767–770.
DACDAC-2002-KrauterW #analysis
Variable frequency crosstalk noise analysis: : a methodology to guarantee functionality from dc to fmax (BK, DW), pp. 665–668.
DACDAC-2002-LachishMUZ #analysis #functional
Hole analysis for functional coverage data (OL, EM, SU, AZ), pp. 807–812.
DACDAC-2002-LeeP #analysis #design #embedded #performance #simulation
Timed compiled-code simulation of embedded software for performance analysis of SOC design (JYL, ICP), pp. 293–298.
DACDAC-2002-LiouKWC #analysis #performance #statistics #testing #validation
False-path-aware statistical timing analysis and efficient path selection for delay testing and timing validation (JJL, AK, LCW, KTC), pp. 566–569.
DACDAC-2002-OrshanskyK #analysis #framework #probability
A general probabilistic framework for worst case timing analysis (MO, KK), pp. 556–561.
DACDAC-2002-RichterZJE #analysis #composition #design #framework #scheduling
Model composition for scheduling analysis in platform design (KR, DZ, MJ, RE), pp. 287–292.
DACDAC-2002-VaratkarM #analysis #design #multi #network
Traffic analysis for on-chip networks design of multimedia applications (GV, RM), pp. 795–800.
DACDAC-2002-WolfSE #analysis #formal method
Associative caches in formal software timing analysis (FW, JS, RE), pp. 622–627.
DACDAC-2002-YeMB #analysis #network #power management
Analysis of power consumption on switch fabrics in network routers (TTY, GDM, LB), pp. 524–529.
DACDAC-2002-ZhengP #analysis #modelling #network #symmetry
Modeling and analysis of regular symmetrically structured power/ground distribution networks (HZ, LTP), pp. 395–398.
DATEDATE-2002-BecerZBPH #analysis #using
Analysis of Noise Avoidance Techniques in DSM Interconnects Using a Complete Crosstalk Noise Model (MRB, VZ, DB, RP, INH), pp. 456–463.
DATEDATE-2002-BhuniaR #analysis #detection #fault #using
Fault Detection and Diagnosis Using Wavelet Based Transient Current Analysis (SB, KR), p. 1118.
DATEDATE-2002-BontempiK #data analysis #performance #predict
A Data Analysis Method for Software Performance Prediction (GB, WK), pp. 971–976.
DATEDATE-2002-GoffioulWVD #analysis #approach #architecture #using
Analysis of Nonlinearities in RF Front-End Architectures Using a Modified Volterra Series Approach (MG, PW, GV, SD), pp. 352–356.
DATEDATE-2002-Hieu #analysis #design #feedback #linear #optimisation
Optimization Techniques for Design of General and Feedback Linear Analog Amplifier with Symbolic Analysis (TcH), p. 1104.
DATEDATE-2002-IndrusiakGR #analysis #comparative #design #distributed #framework #repository
Comparative Analysis and Application of Data Repository Infrastructure for Collaboration-Enabled Distributed Design Environments (LSI, MG, RAdLR), p. 1130.
DATEDATE-2002-IraniGS #analysis #multi #power management
Competitive Analysis of Dynamic Power Management Strategies for Systems with Multiple Power Savings States (SI, RKG, SKS), pp. 117–123.
DATEDATE-2002-JerkeL #analysis #verification
Hierarchical Current Density Verification for Electromigration Analysis in Arbitrary Shaped Metallization Patterns of Analog Circuits (GJ, JL), pp. 464–469.
DATEDATE-2002-KimKM #algorithm #analysis #realtime #scalability #using
A Dynamic Voltage Scaling Algorithm for Dynamic-Priority Hard Real-Time Systems Using Slack Time Analysis (WK, JK, SLM), pp. 788–794.
DATEDATE-2002-LiP #analysis #approach #modelling
A Linear-Centric Modeling Approach to Harmonic Balance Analysis (PL, LTP), pp. 634–639.
DATEDATE-2002-PoppOHB #analysis #automation #parametricity
Parameter Controlled Automatic Symbolic Analysis of Nonlinear Analog Circuits (RP, JO, LH, EB), pp. 274–278.
DATEDATE-2002-RichterE #analysis #interface
Event Model Interfaces for Heterogeneous System Analysis (KR, RE), pp. 506–513.
DATEDATE-2002-VedulaA #analysis #functional #generative #named #testing
FACTOR: A Hierarchical Methodology for Functional Test Generation and Testability Analysis (VMV, JAA), pp. 730–734.
SIGMODSIGMOD-2002-PhanN #analysis #named #tool support
GEA: a toolkit for gene expression analysis (JMP, RTN), p. 628.
VLDBVLDB-2002-ChenHWW #analysis #data type #multi
Multi-Dimensional Regression Analysis of Time-Series Data Streams (YC, GD, JH, BWW, JW), pp. 323–334.
VLDBVLDB-2002-Faloutsos #analysis #data mining #mining #similarity
Sensor Data Mining: Similarity Search and Pattern Analysis (CF).
VLDBVLDB-2002-SantiniG #analysis #geometry #named
GeMBASE: A Geometric Mediator for Brain Analysis with Surface Ensembles (SS, AG), pp. 1075–1078.
ESOPESOP-2002-Feret #analysis #dependence #mobile
Dependency Analysis of Mobile Systems (JF), pp. 314–330.
ESOPESOP-2002-NielsonNS #analysis #automation #complexity
Automatic Complexity Analysis (FN, HRN, HS), pp. 243–261.
ESOPESOP-2002-Weirich #analysis #higher-order
Higher-Order Intensional Type Analysis (SW), pp. 98–114.
TACASTACAS-2002-JinKS #analysis #reachability #scheduling
Fine-Grain Conjunction Scheduling for Symbolic Reachability Analysis (HJ, AK, FS), pp. 312–326.
TACASTACAS-2002-Lowry #analysis #tool support
Software Construction and Analysis Tools for Future Space Missions (MRL), pp. 1–19.
TACASTACAS-2002-Subramani #analysis #scheduling
An Analysis of Zero-Clairvoyant Scheduling (KS), pp. 98–112.
CSMRCSMR-2002-LuciaPSP #analysis #empirical #maintenance #process
Empirical Analysis of Massive Maintenance Processes (ADL, AP, SS, EP), pp. 5–14.
CSMRCSMR-2002-RaysideK #algorithm #graph #problem #program analysis #reachability
A Generic Worklist Algorithm for Graph Reachability Problems in Program Analysis (DR, KK), pp. 67–76.
ICSMEICSM-2002-Barry #analysis #evolution #lifecycle #maintenance
Software Evolution, Volatility and Lifecycle Maintenance Patterns: A Longitudinal Analysis (EJB), pp. 474–477.
ICSMEICSM-2002-BinhDR #analysis #component #testing
Testability Analysis for Software Components (TBN, MD, CR), pp. 422–429.
ICSMEICSM-2002-BriandLS #automation #design #impact analysis #testing #uml
Automating Impact Analysis and Regression Test Selection Based on UML Designs (LCB, YL, GS), pp. 252–261.
ICSMEICSM-2002-ChenZBZY #analysis #approach #dependence #novel
A Novel Approach to Measuring Class Cohesion Based on Dependence Analysis (ZC, YZ, BX, JZ, HY), pp. 377–384.
ICSMEICSM-2002-KorelTV #analysis #dependence #modelling #reduction #testing #using
Model Based Regression Test Reduction Using Dependence Analysis (BK, LHT, BV), pp. 214–223.
ICSMEICSM-2002-LawR #impact analysis
Path Profile-Based Dynamic Impact Analysis (JL, GR), p. 262.
ICSMEICSM-2002-OhstK #analysis #design #fine-grained
A Fine-Grained Version and Configuration Model in Analysis and Design (DO, UK), pp. 521–527.
ICSMEICSM-2002-RotschkeK #analysis #architecture #evolution #industrial #scalability #tool support
Architecture Analysis Tools to Support Evolution of Large Industrial Systems (TR, RLK), pp. 182–191.
ICSMEICSM-2002-SouterP #analysis #testing
Putting Escape Analysis to Work for Software Testing (ALS, LLP), pp. 430–439.
ICSMEICSM-2002-TonellaP #analysis #c++ #diagrams
Static and Dynamic C++ Code Analysis for the Recovery of the Object Diagram (PT, AP), pp. 54–63.
IWPCIWPC-2002-Hamou-LhadjL #analysis #execution #scalability
Compression Techniques to Simplify the Analysis of Large Execution Traces (AHL, TCL), pp. 159–168.
IWPCIWPC-2002-Moonen #impact analysis #lightweight #semiparsing #using
Lightweight Impact Analysis using Island Grammars (LM), pp. 219–228.
IWPCIWPC-2002-Walenstein #analysis #comprehension #tool support
Theory-based Analysis of Cognitive Support in Software Comprehension Tools (AW), pp. 75–84.
PASTEPASTE-2002-Morrisett #analysis
Analysis issues for cyclone (JGM), p. 26.
PASTEPASTE-2002-Notkin #program analysis
Longitudinal program analysis (DN), p. 1.
SCAMSCAM-2002-Baxter #analysis #parallel #source code
Parallel Support for Source Code Analysis and Modification (IDB), p. 3–?.
SCAMSCAM-2002-ChangJH #exception #java #static analysis #using #visualisation
Visualization of Exception Propagation for Java Using Static Analysis (BMC, JWJ, SHH), p. 173–?.
SCAMSCAM-2002-HarmanFHHDW #analysis #dependence #named
VADA: A Transformation-Based System for Variable Dependence Analysis (MH, CF, RMH, LH, SD, JW), pp. 55–64.
WCREWCRE-2002-ProbstKS #analysis #liveness #optimisation
Register Liveness Analysis for Optimizing Dynamic Binary Translation (MP, AK, BS), pp. 35–44.
WCREWCRE-2002-RillingM #3d #analysis #on the #source code #visual notation
On the Use of Metaballs to Visually Map Source Code Structures and Analysis Results onto 3D Space (JR, SPM), pp. 299–308.
WCREWCRE-2002-TanT #fault #program analysis #transaction #verification
Verifying Provisions for Post-Transaction User Input Error Correction through Static Program Analysis (HBKT, NLT), p. 233–?.
WCREWCRE-2002-TrogerC #analysis
Analysis of Virtual Method Invocation for Binary Translation (JT, CC), p. 65–?.
PEPMASIA-PEPM-2002-Heintze #alias #analysis #c
Aliasing analysis for a million lines of C (NH), pp. 47–49.
PEPMASIA-PEPM-2002-SheardL #analysis #search-based #using
Search-based binding time analysis using type-directed pruning (TS, NL), pp. 20–31.
PEPMPEPM-2002-GomezL #analysis #automation #bound #higher-order
Automatic time-bound analysis for a higher-order language (GG, YAL), pp. 75–86.
PEPMPEPM-2002-Lu #analysis #logic programming #source code
Path dependent analysis of logic programs (LL), pp. 63–74.
SASSAS-2002-AdamsBDLRSW #analysis #data flow #pointer #using
Speeding Up Dataflow Analysis Using Flow-Insensitive Pointer Analysis (SA, TB, MD, SL, SKR, MS, WW), pp. 230–246.
SASSAS-2002-BruynoogheCGV #analysis #logic programming #reuse #source code #termination
Reuse of Results in Termination Analysis of Typed Logic Programs (MB, MC, SG, WV), pp. 477–492.
SASSAS-2002-Esparza #algebra #approach #concurrent #static analysis
An Algebraic Approach to the Static Analysis of Concurrent Software (JE), p. 3.
SASSAS-2002-Faxen #analysis #representation
Representation Analysis for Coercion Placement (KFF), pp. 278–293.
SASSAS-2002-LangenbachTH #analysis #modelling #pipes and filters
Pipeline Modeling for Timing Analysis (ML, ST, RH), pp. 294–309.
SASSAS-2002-Lee #analysis #polynomial
Finiteness Analysis in Polynomial Time (CSL), pp. 493–508.
SASSAS-2002-ManevichRFGS #first-order #representation #static analysis
Compactly Representing First-Order Structures for Static Analysis (RM, GR, JF, DG, SS), pp. 196–212.
SASSAS-2002-Martel #static analysis
Static Analysis of the Numerical Stability of Loops (MM), pp. 133–150.
SASSAS-2002-Probst #analysis #composition #control flow #library
Modular Control Flow Analysis for Libraries (CWP), pp. 165–179.
SASSAS-2002-Reps #logic #program analysis
Static Program Analysis via 3-Valued Logic (TWR), p. 1.
SASSAS-2002-Venet #alias #analysis #array #data type #recursion
Nonuniform Alias Analysis of Recursive Data Structures and Arrays (AV), pp. 36–51.
SASSAS-2002-WhaleyL #analysis #performance #points-to #strict
An Efficient Inclusion-Based Points-To Analysis for Strictly-Typed Languages (JW, MSL), pp. 180–195.
STOCSTOC-2002-Bachmat #analysis #scheduling #sequence
Average case analysis for batched disk scheduling and increasing subsequences (EB), pp. 277–286.
STOCSTOC-2002-ChanLTW #analysis #video
A unified analysis of hot video schedulers (WTC, TWL, HFT, PWHW), pp. 179–188.
STOCSTOC-2002-ScharbrodtSS #analysis #scheduling
A new average case analysis for completion time scheduling (MS, TS, AS), pp. 170–178.
FMFME-2002-Fidge #analysis #assembly #control flow
Timing Analysis of Assembler Code Control-Flow Paths (CJF), pp. 370–389.
FMFME-2002-Pahl #abstraction #analysis #refinement #using
Interference Analysis for Dependable Systems Using Refinement and Abstraction (CP), pp. 330–349.
FMFME-2002-RatsabySU #analysis
Improvements in Coverability Analysis (GR, BS, SU), pp. 41–56.
ICFPICFP-2002-DubeF #adaptation #analysis
A demand-driven adaptive type analysis (DD, MF), pp. 84–97.
ICFPICFP-2002-GlynnSSS #analysis #exception #strict
Exception analysis for non-strict languages (KG, PJS, MS, HS), pp. 98–109.
ICFPICFP-2002-JonesG #analysis #generative #termination
Program generation, termination, and binding-time analysis (NDJ, AJG), p. 283.
IFLIFL-2002-PortilloHLV #automation #cost analysis #using
Cost Analysis Using Automatic Size and Time Inference (ÁJRP, KH, HWL, PBV), pp. 232–248.
CHICHI-2002-HinckleyCBM #analysis
Quantitative analysis of scrolling techniques (KH, EC, SB, TM), pp. 65–72.
CHICHI-2002-PiperRI #3d #analysis #interface
Illuminating clay: a 3-D tangible interface for landscape analysis (BP, CR, HI), pp. 355–362.
VISSOFTVISSOFT-2002-RillingSB #analysis #complexity #concept #source code #visualisation
The CONCEPT Project — Applying Source Code Analysis to Reduce Information Complexity of Static and Dynamic Visualization Techniques (JR, AS, CB), p. 90.
AdaEuropeAdaEurope-2002-Amey #analysis #design
Closing the Loop: The Influence of Code Analysis on Design (PA), pp. 151–162.
AdaEuropeAdaEurope-2002-ChenBZY #ada #analysis #concurrent #dependence #source code
Static Dependency Analysis for Concurrent Ada 95 Programs (ZC, BX, JZ, HY), pp. 219–230.
AdaEuropeAdaEurope-2002-CzarneckiHRVR #ada #analysis #approach #data flow #named
DataFAN: A Practical Approach to Data Flow Analysis for Ada 95 (KC, MH, ER, FV, AR), pp. 231–244.
AdaEuropeAdaEurope-2002-MedinaGDH #ada #analysis #component #distributed #modelling #realtime #scheduling
Modeling and Schedulability Analysis of Hard Real-Time Distributed Systems Based on Ada Components (JLM, JJG, JMD, MGH), pp. 282–296.
AdaSIGAda-2002-KorochkinK #ada #analysis #java #parallel #performance
Experimental performance analysis of the Ada95 and Java parallel program on SMP systems (DK, SK), pp. 53–56.
CAiSECAiSE-2002-CostalST #analysis #comprehension #modelling #object-oriented #uml
Understanding Redundancy in UML Models for Object-Oriented Analysis (DC, MRS, ET), pp. 659–674.
ICEISICEIS-2002-Abe #analysis #domain model #information management #modelling
Applying Domain Modeling and SECI Theory in Knowledge Management for Information Systems Analysis (AA), pp. 725–731.
ICEISICEIS-2002-Audy #analysis #information management
Analysis of the Relation between the Prescriptive and Descriptive Approaches of the Information System Planning (JLNA), pp. 553–561.
ICEISICEIS-2002-BarjisC #analysis #database #design #modelling #semantics #using
Data Modeling for the Purpose of Database Design Using Entity-Relationship Model and Semantic Analysis (JB, SC), pp. 235–243.
ICEISICEIS-2002-CastelaTGL #analysis #bibliography #modelling #process #validation
Survey, Analysis and Validation of Information for Business Process Modeling (NC, JMT, AG, ERL), pp. 803–806.
ICEISICEIS-2002-IochpeT #analysis #aspect-oriented #process #workflow
Inferring Aspects of the Organizational Structure through Workflow Process Analysis (CI, LHT), pp. 758–763.
ICEISICEIS-2002-LiuL #analysis #object-oriented #throughput
A Knowledge Object Oriented System for High Throughput Collection and Analysis of Data (HL, TL), pp. 764–769.
ICEISICEIS-2002-SalimifardW #analysis #modelling #performance #petri net #using #workflow
Modelling and Performance Analysis of Workflow Management Systems Using Timed Hierarchical Coloured Petri Nets (KS, MW), pp. 843–846.
ICEISICEIS-2002-SalterL #analysis #semantics #using
Using Semantic Analysis and Norm Analysis to Model Organisations (AS, KL), pp. 847–850.
ICEISICEIS-2002-Vellido #analysis #e-commerce #network
Neural Networks for B2C E-Commerce Analysis: Some Elements of Best Practice (AV), pp. 439–445.
CIKMCIKM-2002-BrantsCT #analysis #documentation #probability #segmentation #semantics #topic
Topic-based document segmentation with probabilistic latent semantic analysis (TB, FC, IT), pp. 211–218.
CIKMCIKM-2002-KaoCLH #analysis #mining #web
Entropy-based link analysis for mining web informative structures (HYK, MSC, SHL, JMH), pp. 574–581.
CIKMCIKM-2002-LohLAL #analysis #query
Analysis of pre-computed partition top method for range top-k queries in OLAP data cubes (ZXL, TWL, CHA, SYL), pp. 60–67.
ECIRECIR-2002-BenammarHM #analysis #automation #documentation #using
Automatic Profile Reformulation Using a Local Document Analysis (AB, GH, JM), pp. 124–134.
ICMLICML-2002-Gama #analysis #functional
An Analysis of Functional Trees (JG), pp. 155–162.
ICMLICML-2002-GlobersonT #analysis #novel #reduction
Sufficient Dimensionality Reduction — A novel Analysis Method (AG, NT), pp. 203–210.
ICMLICML-2002-LangfordZK #analysis #trade-off
Competitive Analysis of the Explore/Exploit Tradeoff (JL, MZ, SK), pp. 339–346.
ICPRICPR-v1-2002-BagdanovW #analysis #documentation #image
Granulometric Analysis of Document Images (ADB, MW), pp. 468–471.
ICPRICPR-v1-2002-CarcassoniRH #analysis #recognition
Texture Recognition through Modal Analysis of Spectral Peak Patterns (MC, ER, ERH), pp. 243–246.
ICPRICPR-v1-2002-DavisT #analysis #recognition
Analysis and Recognition of Walking Movements (JWD, SRT), pp. 315–318.
ICPRICPR-v1-2002-DockstaderBT #analysis #feature model
Feature Extraction for the Analysis of Gait and Human Motion (SLD, KAB, AMT), pp. 5–8.
ICPRICPR-v1-2002-HadidKP #analysis #learning #linear #using
Unsupervised Learning Using Locally Linear Embedding: Experiments with Face Pose Analysis (AH, OK, MP), pp. 111–114.
ICPRICPR-v1-2002-KovalevKC #3d #analysis #image #symmetry
Structural Brain Asymmetry as Revealed by 3D Texture Analysis of Anatomical MR Images (VAK, FK, DYvC), p. 808–?.
ICPRICPR-v1-2002-Meas-YedidTO #analysis #clustering #image #markov #random #segmentation
Color Image Segmentation Based on Markov Random Field Clustering for Histological Image Analysis (VMY, ST, JCOM), pp. 796–799.
ICPRICPR-v1-2002-MoreauCP #analysis #estimation #using
Estimation and Analysis of the Deformation of the Cardiac Wall Using Doppler Tissue Imaging (VM, LDC, DP), pp. 784–787.
ICPRICPR-v1-2002-OjalaMPVKH #algorithm #analysis #empirical #evaluation #framework
Outex- New Framework for Empirical Evaluation of Texture Analysis Algorithms (TO, TM, MP, JV, JK, SH), pp. 701–706.
ICPRICPR-v1-2002-RellierDZF #analysis
A Gauss-Markov Model for Hyperspectral Texture Analysis of Urban Areas (GR, XD, JZ, FF), pp. 692–695.
ICPRICPR-v1-2002-SinghMS #analysis #dependence #image
Colour Image Texture Analysis: Dependence on Colour Spaces (MS, MM, SS), pp. 672–675.
ICPRICPR-v1-2002-SinghS #analysis #case study #comparative
Spatial Texture Analysis: A Comparative Study (MS, SS), pp. 676–679.
ICPRICPR-v1-2002-VegaS #analysis
Experiments on Gait Analysis by Exploiting Nonstationarity in the Distribution of Feature Relationships (IRV, SS), pp. 1–4.
ICPRICPR-v1-2002-WollnyTK #analysis #segmentation
Segmentation of Vector Fields by Critical Point Analysis: Application to Brain Deformation (GW, MT, FK), pp. 524–527.
ICPRICPR-v2-2002-BaekD #analysis
Factor Analysis or Background Suppression (KB, BAD), pp. 643–646.
ICPRICPR-v2-2002-Duncan #analysis #geometry #image #modelling #physics
Geometrical and Physical Models for the Recovery of Quantitative Information from Medical Image Analysis (JSD), p. 277.
ICPRICPR-v2-2002-Fasel #analysis #network #robust #using
Robust Face Analysis using Convolutional Neural Networks (BF), pp. 40–43.
ICPRICPR-v2-2002-Ho #analysis #proximity
Exploratory Analysis of Point Proximity in Subspaces (TKH), pp. 196–199.
ICPRICPR-v2-2002-KumanoAAUST #analysis #editing #video
Video Editing Support System Based on Video Grammar and Content Analysis (MK, YA, MA, KU, KS, KT), pp. 1031–1036.
ICPRICPR-v2-2002-LiuHLM #analysis #kernel #recognition
Kernel-Based Optimized Feature Vectors Selection and Discriminant Analysis for Face Recognition (QL, RH, HL, SM), pp. 362–365.
ICPRICPR-v2-2002-Maloof #analysis #machine learning #on the #statistics #testing
On Machine Learning, ROC Analysis, and Statistical Tests of Significance (MAM), pp. 204–207.
ICPRICPR-v2-2002-MiyauchiHBK #analysis #collaboration #detection #multi #semantics #video
Collaborative Multimedia Analysis for Detecting Semantical Events from Broadcasted Sports Video (SM, AH, NB, TK), pp. 1009–1012.
ICPRICPR-v2-2002-MoghaddamZ #analysis #linear #online #pattern matching #pattern recognition #performance #recognition
Fast Linear Discriminant Analysis for On-Line Pattern Recognition Applications (HAM, KAZ), pp. 64–67.
ICPRICPR-v2-2002-PhungDV #analysis #education
Narrative Structure Analysis with Education and Training Videos for E-Learning (DQP, CD, SV), p. 835–?.
ICPRICPR-v2-2002-RoliFV #analysis #classification #trade-off
Analysis of Error-Reject Trade-off in Linearly Combined Classifiers (FR, GF, GV), pp. 120–125.
ICPRICPR-v2-2002-SeokL #algorithm #analysis #approach #difference #learning #probability
The Analysis of a Stochastic Differential Approach for Langevine Comepetitive Learning Algorithm (JS, JWL), pp. 80–83.
ICPRICPR-v2-2002-TweedM #analysis #automation #detection
Automatic Detection of Regions of Interest in Mammographies Based on a Combined Analysis of Texture and Histogram (TT, SM), pp. 448–452.
ICPRICPR-v2-2002-VasilescuT #analysis #image #multi #recognition
Multilinear Image Analysis for Facial Recognition (MAOV, DT), pp. 511–514.
ICPRICPR-v2-2002-WachsmuthS #analysis #image #probability #process #speech
Integrated Analysis of Speech and Images as a Probabilistic Decoding Process (SW, GS), pp. 588–592.
ICPRICPR-v2-2002-YeungB #analysis #mobile #towards
Towards Log-Polar Fixation for Mobile Robots — Analysis of Corner Tracking on the Log-Polar Camera (AY, NB), pp. 300–303.
ICPRICPR-v3-2002-BhanuH #analysis #recognition
Individual Recognition by Kinematic-Based Gait Analysis (BB, JH), pp. 343–346.
ICPRICPR-v3-2002-BoomgaardW #analysis #equivalence #estimation #on the #robust
On the Equivalence of Local-Mode Finding, Robust Estimation and Mean-Shift Analysis as Used in Early Vision Tasks (RvdB, JvdW), pp. 927–930.
ICPRICPR-v3-2002-ChenZL #analysis #component #detection #independence #segmentation
Edge Detection and Texture Segmentation Based on Independent Component Analysis (YWC, XYZ, HL), pp. 351–354.
ICPRICPR-v3-2002-DuongEC #analysis #documentation #image
Features for Printed Document Image Analysis (JD, HE, MC), pp. 245–248.
ICPRICPR-v3-2002-FataichaCNS #analysis #approach #documentation #image
Content Analysis in Document Images: A Scale Space Approach (YF, MC, JYN, CYS), pp. 335–338.
ICPRICPR-v3-2002-GuestF #analysis #approach #clustering #image
A Clustering Approach to Corner Point Analysis in Hand Drawn Images (RMG, MCF), pp. 940–943.
ICPRICPR-v3-2002-KatzMDK #analysis #automation #linear #robust #speech
Robustness of Linear Discriminant Analysis in Automatic Speech Recognitio (MK, HGM, HD, DK), pp. 371–374.
ICPRICPR-v3-2002-Kitamoto #analysis #component
Fractional Component Analysis (FCA) for Mixed Signals (AK), pp. 383–386.
ICPRICPR-v3-2002-KongZ #analysis #authentication #image
Palmprint Texture Analysis Based on Low-Resolution Images for Personal Authentication (AWKK, DZ), pp. 807–810.
ICPRICPR-v3-2002-LuT #analysis #documentation #image #layout #word
Word Spotting in Chinese Document Images without Layout Analysis (YL, CLT), pp. 57–60.
ICPRICPR-v3-2002-NishidaS #analysis #documentation #image #multi
Correcting Show-Through Effects on Document Images by Multiscale Analysis (HN, TS), pp. 65–68.
ICPRICPR-v3-2002-Vasilescu #analysis #recognition #synthesis
Human Motion Signatures: Analysis, Synthesis, Recognition (MAOV), pp. 456–460.
ICPRICPR-v4-2002-FengWP #agile #analysis #case study #comparative #modelling
A Comparative Study of Two Velocity ProfIle Models for Rapid Stroke Analysis (CF, AW, RP), p. 52–?.
ICPRICPR-v4-2002-IbrahimovSD #analysis #clustering #performance #similarity #topic
The Performance Analysis of a Chi-square Similarity Measure for Topic Related Clustering of Noisy Transcripts (OI, IKS, ND), pp. 285–288.
ICPRICPR-v4-2002-NgoPZ #analysis #retrieval #slicing
Motion Retrieval by Temporal Slices Analysis (CWN, TCP, HZ), pp. 64–67.
ICPRICPR-v4-2002-SocolinskyS #analysis #comparative #performance #recognition
A Comparative Analysis of Face Recognition Performance with Visible and Thermal Infrared Imagery (DAS, AS), p. 217–?.
ICPRICPR-v4-2002-ZhuS #adaptation #analysis #detection #feature model #statistics
Discriminant Analysis and Adaptive Wavelet Feature Selection for Statistical Object Detection (YZ, SCS), pp. 86–89.
KDDKDD-2002-RidgewayM #analysis #dataset
Bayesian analysis of massive datasets via particle filters (GR, DM), pp. 5–13.
KDDKDD-2002-StolteTH #analysis #query #using #visualisation
Query, analysis, and visualization of hierarchically structured data using Polaris (CS, DT, PH), pp. 112–122.
KDDKDD-2002-TuzhilinA #analysis #array #scalability
Handling very large numbers of association rules in the analysis of microarray data (AT, GA), pp. 396–404.
KRKR-2002-Fruhwirth #analysis #automation #complexity
As Time Goes by: Automatic Complexity Analysis of Simplified Rules (TWF), pp. 547–557.
SEKESEKE-2002-Fernandez-CondeG #analysis #framework #object-oriented
Domain analysis of object-oriented frameworks in FrameDoc (CFC, PAGC), pp. 27–33.
SEKESEKE-2002-RiescoSPPJ #analysis #metamodelling #uml
Al analysis patterns as UML meta-model constructs (AMR, GS, DP, SP, JMJ), pp. 237–238.
SEKESEKE-2002-RusBH #analysis #development #empirical #process #simulation
Systematically combining process simulation and empirical data in support of decision analysis in software development (IR, SB, MH), pp. 827–833.
SIGIRSIGIR-2002-BinghamKL #analysis #documentation
ICA and SOM in text document analysis (EB, JK, KL), pp. 361–362.
SIGIRSIGIR-2002-Canny #analysis #collaboration #privacy
Collaborative filtering with privacy via factor analysis (JFC), pp. 238–245.
SIGIRSIGIR-2002-DingHHZS #analysis #framework #rank
PageRank, HITS and a unified framework for link analysis (CHQD, XH, PH, HZ, HDS), pp. 353–354.
SIGIRSIGIR-2002-JonesG #analysis #development #topic #visualisation
A visualisation tool for topic tracking analysis and development (GJFJ, SMG), pp. 389–390.
SIGIRSIGIR-2002-LarkeyBC #analysis #information retrieval
Improving stemming for Arabic information retrieval: light stemming and co-occurrence analysis (LSL, LB, MEC), pp. 275–282.
SIGIRSIGIR-2002-ParkPGK #analysis #documentation
Analysis of lexical signatures for finding lost or related documents (STP, DMP, CLG, RK), pp. 11–18.
UMLUML-2002-GogollaH #analysis #metamodelling #uml
Analysis of UML Stereotypes within the UML Metamodel (MG, BHS), pp. 84–99.
OOPSLAOOPSLA-2002-KovedPK #analysis #java
Access rights analysis for Java (LK, MP, AK), pp. 359–372.
OOPSLAOOPSLA-2002-ZeeR #static analysis
Write barrier removal by static analysis (KZ, MCR), pp. 191–210.
GPCEGPCE-2002-JonesG #analysis #generative #termination
Program Generation, Termination, and Binding-Time Analysis (NDJ, AJG), pp. 1–31.
GPCEGPCE-2002-Lee #analysis #polynomial #termination
Program Termination Analysis in Polynomial Time (CSL), pp. 218–235.
PPDPPPDP-2002-Fiore #analysis #evaluation #normalisation #semantics #λ-calculus
Semantic analysis of normalisation by evaluation for typed λ calculus (MPF), pp. 26–37.
PPDPPPDP-2002-JonesG #analysis #generative #termination
Abstract and conclusions of PLI invited paper: program generation, termination, and binding-time analysis (NDJ, AJG), p. 1.
PPDPPPDP-2002-LagoonS #analysis #logic programming #precise #source code
Precise pair-sharing analysis of logic programs (VL, PJS), pp. 99–108.
PPDPPPDP-2002-OvertonSS #analysis #constraints
Constraint-based mode analysis of mercury (DO, ZS, PJS), pp. 109–120.
PPDPPPDP-2002-SchrijversD #analysis
Combining an improvement to PARMA trailing with trailing analysis (TS, BD), pp. 88–98.
PADLPADL-2002-GallagherP #abstract interpretation #analysis #automaton #finite #logic programming #nondeterminism #source code
Abstract Interpretation over Non-deterministic Finite Tree Automata for Set-Based Analysis of Logic Programs (JPG, GP), pp. 243–261.
PADLPADL-2002-Meadows #analysis #declarative #using
Using a Declarative Language to Build an Experimental Analysis Tool (CM), pp. 1–2.
POPLPOPL-2002-BallR #debugging #static analysis
The SLAM project: debugging system software via static analysis (TB, SKR), pp. 1–3.
POPLPOPL-2002-IgarashiK #analysis #resource management
Resource usage analysis (AI, NK), pp. 331–342.
POPLPOPL-2002-KuncakLR #analysis
Role analysis (VK, PL, MCR), pp. 17–32.
POPLPOPL-2002-RubinBC #framework #optimisation #performance
An efficient profile-analysis framework for data-layout optimizations (SR, RB, TMC), pp. 140–153.
RERE-2002-Alexander #analysis #case study #experience #industrial #trade-off
Initial Industrial Experience of Misuse Cases in Trade-Off Analysis (IFA), pp. 61–70.
RERE-2002-BergmanM #analysis #empirical #requirements
Exploring the Relationship between Project Selection and Requirements Analysis: An Empirical Study of the New Millennium Program (MB, GM), pp. 247–254.
RERE-2002-FantechiGLM #analysis #case study
Application of Linguistic Techniques for Use Case Analysis (AF, SG, GL, AM), pp. 157–164.
RERE-2002-Garcia-DuquePB #requirements #specification #using
An Analysis-Revision Cycle to Evolve Requirements Specifications by Using the SCTL-MUS Methodology (JGD, JJPA, ABBM), pp. 282–288.
RERE-2002-JohnMST #analysis #evolution #performance
Efficient and Systematic Software Evolution through Domain Analysis (IJ, DM, PS, ET), pp. 237–246.
RERE-2002-KaiyaHS #analysis #named #requirements
AGORA: Attributed Goal-Oriented Requirements Analysis Method (HK, HH, MS), pp. 13–22.
RERE-2002-StutzSKK #analysis #uml
Analysis beyond UML (CS, JS, DK, WK), pp. 215–218.
SACSAC-2002-BorealeB #analysis #automation #protocol #security
Experimenting with STA, a tool for automatic analysis of security protocols (MB, MGB), pp. 281–285.
SACSAC-2002-El-Ansary #analysis #behaviour #representation #requirements #towards
Behavioral Pattern Analysis: towards a new representation of systems requirements based on actions and events (AEA), pp. 984–991.
SACSAC-2002-GarcesF #analysis #behaviour #distributed
Analysis of Distributed Routing Balancing behavior (IG, DF), pp. 817–824.
SACSAC-2002-HauglidM #analysis #metadata #named
SESAM: searching supported by analysis of metadata (JOH, RM), pp. 418–425.
SACSAC-2002-SmithH #analysis #design #reliability
Augmenting descriptive scenario analysis for improvements in human reliability design (SPS, MDH), pp. 739–743.
SACSAC-2002-TourinoBDG #analysis #clustering #performance
Performance analysis of MPI-I/O primitives on a PC cluster (JT, JB, RD, VMG), pp. 907–912.
FSEFSE-2002-BrunsC #analysis #points-to
Searching for points-to analysis (GB, SC), pp. 61–70.
ICSEICSE-2002-HausmannHT #approach #case study #detection #functional #graph transformation #requirements #static analysis
Detection of conflicting functional requirements in a use case-driven approach: a static analysis technique based on graph transformation (JHH, RH, GT), pp. 105–115.
SPLCSPLC-2002-SmithBB #analysis #component #mining #product line #re-engineering #using
Using the Options Analysis for Reengineering (OAR) Method for Mining Components for a Product Line (DBS, LO, JB), pp. 316–327.
SPLCSPLC-2002-Yacoub #analysis #component #performance
Performance Analysis of Component-Based Applications (SMY), pp. 299–315.
CCCC-2002-CousotC #composition #program analysis
Modular Static Program Analysis (PC, RC), pp. 159–178.
CCCC-2002-GuptaMZ #analysis #optimisation #representation
A Representation for Bit Section Based Analysis and Optimization (RG, EM, YZ), pp. 62–77.
CCCC-2002-Mohnen #analysis #approach #data flow
A Graph-Free Approach to Data-Flow Analysis (MM), pp. 46–61.
CCCC-2002-NeculaMRW #analysis #c #named #source code #tool support
CIL: Intermediate Language and Tools for Analysis and Transformation of C Programs (GCN, SM, SPR, WW), pp. 213–228.
HPCAHPCA-2002-KampeSD #analysis #branch #fourier #predict #using
The FAB Predictor: Using Fourier Analysis to Predict the Outcome of Conditional Branches (MK, PS, MD), pp. 223–232.
OSDIOSDI-2002-DunlapKCBC #analysis #named
ReVirt: Enabling Intrusion Analysis Through Virtual-Machine Logging and Replay (GWD, STK, SC, MAB, PMC), pp. 211–224.
OSDIOSDI-2002-SaroiuGDGL #analysis #internet
An Analysis of Internet Content Delivery Systems (SS, PKG, RJD, SDG, HML), pp. 315–327.
CADECADE-2002-Baaz #analysis #proving
Proof Analysis by Resolution (MB), pp. 517–532.
CAVCAV-2002-ArmandoBBCCMRTVV #analysis #protocol #security
The AVISS Security Protocol Analysis Tool (AA, DAB, MB, YC, LC, SM, MR, MT, LV, LV), pp. 349–353.
CAVCAV-2002-BaumgartnerKA #analysis
Property Checking via Structural Analysis (JB, AK, JAA), pp. 151–165.
CAVCAV-2002-Holzmann #analysis #model checking
Software Analysis and Model Checking (GJH), pp. 1–16.
CAVCAV-2002-YonedaKM #analysis #automation #constraints
Automatic Derivation of Timing Constraints by Failure Analysis (TY, TK, CJM), pp. 195–208.
ICLPICLP-2002-DucasseL #analysis #automation #execution
Automated Analysis of CLP(FD) Program Execution Traces (MD, LL), pp. 470–471.
ICLPICLP-2002-SchrijversBD #analysis
Trailing Analysis for HAL (TS, MJGdlB, BD), pp. 38–53.
ISSTAISSTA-2002-BriandLS #analysis #contract #fault #object-oriented
Investigating the use of analysis contracts to support fault isolation in object oriented code (LCB, YL, HS), pp. 70–80.
ISSTAISSTA-2002-LiangPH #analysis #precise #profiling #using
Evaluating the precision of static reference analysis using profiling (DL, MP, MJH), pp. 22–32.
ISSTAISSTA-2002-VaysburgTK #analysis #dependence #reduction #testing
Dependence analysis in reduction of requirement based test suites (BV, LHT, BK), pp. 107–111.
RTARTA-2002-KennawayKP #composition #static analysis #λ-calculus
Static Analysis of Modularity of β-Reduction in the Hyperbalanced λ-Calculus (RK, ZK, AP), pp. 51–65.
RTARTA-2002-Mitchell #analysis #multi #protocol #security
Multiset Rewriting and Security Protocol Analysis (JCM), pp. 19–22.
SATSAT-2002-KaporisKL #algorithm #analysis #probability #satisfiability
The Probabilistic Analysis of a Greedy Satisfiability Algorithm (ACK, LMK, EGL), p. 5.
SATSAT-2002-MonassonC #algorithm #analysis #exponential #random #satisfiability #scalability
Restart method and exponential acceleration of random 3-SAT instances resolutions: A large deviation analysis of the Davis-Putnam-Loveland-Logemann algorithm (RM, SC), p. 11.
ICTSSTestCom-2002-CastanetR #analysis #proving #reachability #testing #theorem proving
Generate Certified Test Cases by Combining Theorem Proving and Reachability Analysis (RC, DR), pp. 249–266.
VMCAIVMCAI-2002-CharatonikMP #analysis #composition #termination
Compositional Termination Analysis of Symbolic Forward Analysis (WC, SM, AP), pp. 109–125.
VMCAIVMCAI-2002-MurawskiY #analysis
Static Monotonicity Analysis for lambda-definable Functions over Lattices (ASM, KY), pp. 139–153.
CBSECBSE-2001-Mason #probability #program analysis
Probability Density Functions in Program Analysis (DM), p. 13.
ASEASE-2001-BratV #model checking #static analysis
Combining Static Analysis and Model Checking for Software Analysis (GPB, WV), p. 262–?.
ASEASE-2001-GarcezRNK #requirements #specification
An Analysis-Revision Cycle to Evolve Requirements Specifications (ASdG, AR, BN, JK), pp. 354–358.
ASEASE-2001-ZarrasI #analysis #automation #enterprise #information management #performance #reliability
Automating the Performance and Reliability Analysis of Enterprise Information Systems (AZ, VI), pp. 350–353.
DACDAC-2001-AjamiBPG #analysis #performance
Analysis of Non-Uniform Temperature-Dependent Interconnect Performance in High Performance ICs (AHA, KB, MP, LPPPvG), pp. 567–572.
DACDAC-2001-ArunachalamBP #analysis #interactive
False Coupling Interactions in Static Timing Analysis (RA, RDB, LTP), pp. 726–731.
DACDAC-2001-BaiBH #analysis #power management
Static Timing Analysis Including Power Supply Noise Effect on Propagation Delay in VLSI Circuits (GB, SB, INH), pp. 295–300.
DACDAC-2001-BanerjeeM #analysis #distributed #novel #optimisation #performance #using
Analysis of On-Chip Inductance Effects using a Novel Performance Optimization Methodology for Distributed RLC Interconnects (KB, AM), pp. 798–803.
DACDAC-2001-ChenC #analysis #grid #performance #power management #scalability
Efficient Large-Scale Power Grid Analysis Based on Preconditioned Krylov-Subspace Iterative Methods (THC, CCPC), pp. 559–562.
DACDAC-2001-DanielSW #analysis #performance #using
Using Conduction Modes Basis Functions for Efficient Electromagnetic Analysis of On-Chip and Off-Chip Interconnect (LD, ALSV, JW), pp. 563–566.
DACDAC-2001-GalaBWZZ #analysis #design
Inductance 101: Analysis and Design Issues (KG, DB, JW, VZ, MZ), pp. 329–334.
DACDAC-2001-GorenSW #analysis #novel #pipes and filters #probability
A Novel Method for Stochastic Nonlinearity Analysis of a CMOS Pipeline ADC (DG, ES, IAW), pp. 127–132.
DACDAC-2001-LiouCKK #analysis #performance #probability #statistics
Fast Statistical Timing Analysis By Probabilistic Event Propagation (JJL, KTC, SK, AK), pp. 661–666.
DACDAC-2001-MassoudKMW #analysis #difference #induction #modelling
Modeling and Analysis of Differential Signaling for Minimizing Inductive Cross-Talk (YM, JK, DM, JW), pp. 804–809.
DACDAC-2001-MathurS #analysis #precise #using
Improved Merging of Datapath Operators using Information Content and Required Precision Analysis (AM, SS), pp. 462–467.
DACDAC-2001-McDonaldB #analysis #simulation #using
Computing Logic-Stage Delays Using Circuit Simulation and Symbolic Elmore Analysis (CBM, REB), pp. 283–288.
DACDAC-2001-NandiM #analysis #design #embedded #performance
System-Level Power/Performance Analysis for Embedded Systems Design (AN, RM), pp. 599–604.
DACDAC-2001-SchenkelPZSGA #analysis #optimisation
Mismatch Analysis and Direct Yield Optimization by Spec-Wise Linearization and Feasibility-Guided Search (FS, MP, SZ, RS, HEG, KA), pp. 858–863.
DACDAC-2001-ShinKL #analysis #energy #scheduling #using
Low-Energy Intra-Task Voltage Scheduling Using Static Timing Analysis (DS, JK, SL), pp. 438–443.
DACDAC-2001-VerhaegenG #analysis #linear #performance #scalability
Efficient DDD-based Symbolic Analysis of Large Linear Analog Circuits (WV, GGEG), pp. 139–144.
DACDAC-2001-XiaoM #analysis #correlation #functional #identification
Functional Correlation Analysis in Crosstalk Induced Critical Paths Identification (TX, MMS), pp. 653–656.
DACDAC-2001-ZhouSN #analysis #fixpoint
Timing Analysis with Crosstalk as Fixpoints on Complete Lattice (HZ, NVS, WN), pp. 714–719.
DATEDATE-2001-BensoCNP #analysis #distributed #fault #injection #open source
SEU effect analysis in an open-source router via a distributed fault injection environment (AB, SDC, GDN, PP), pp. 219–225.
DATEDATE-2001-DoboliV #analysis #network #scalability
A regularity-based hierarchical symbolic analysis method for large-scale analog networks (AD, RV), p. 806.
DATEDATE-2001-FioriM #analysis
Analysis of EME produced by a microcontroller operation (FF, FM), pp. 341–347.
DATEDATE-2001-HsiehCP #analysis #simulation
Microprocessor power analysis by labeled simulation (CTH, LC, MP), pp. 182–189.
DATEDATE-2001-JungYC #analysis #multi #performance
Performance improvement of multi-processor systems cosimulation based on SW analysis (JJ, SY, KC), pp. 749–753.
DATEDATE-2001-KoranneG #analysis #automation #geometry #layout #on the
On automatic analysis of geometrically proximate nets in VSLI layout (SK, OPG), p. 818.
DATEDATE-2001-KralicekJG #analysis #modelling
Modeling electromagnetic emission of integrated circuits for system analysis (PK, WJ, HG), pp. 336–340.
DATEDATE-2001-MarculescuN #analysis #modelling #probability
Probabilistic application modeling for system-level perfromance analysis (RM, AN), pp. 572–579.
DATEDATE-2001-NayakHCB #analysis #automation #fault #hardware #matlab #precise #synthesis
Precision and error analysis of MATLAB applications during automated hardware synthesis for FPGAs (AN, MH, ANC, PB), pp. 722–728.
DATEDATE-2001-OlbrichRB #algorithm #analysis #classification
An improved hierarchical classification algorithm for structural analysis of integrated circuits (MO, AR, EB), p. 807.
DATEDATE-2001-Zhu01a #analysis #memory management #pointer
Static memory allocation by pointer analysis and coloring (JZ), pp. 785–790.
DocEngDocEng-2001-NaF #analysis #authoring #documentation #hypermedia #petri net #using
Dynamic documents: authoring, browsing, and analysis using a high-level petri net-based hypermedia system (JCN, RF), pp. 38–47.
ICDARICDAR-2001-AmanoAMSS #analysis #documentation #grammarware #synthesis
Table Form Document Synthesis by Grammar-Based Structure Analysis (AA, NA, TM, TS, KS), pp. 533–539.
ICDARICDAR-2001-BlumensteinV #analysis #benchmark #database #metric #performance #segmentation
Analysis of Segmentation Performance on the CEDAR Benchmark Database (MB, BV), pp. 1142–1146.
ICDARICDAR-2001-ChaS #algorithm #analysis #classification
Apriori Algorithm for Sub-category Classification Analysis of Handwriting (SHC, SNS), pp. 1022–1025.
ICDARICDAR-2001-DaWM #analysis #classification #fuzzy
Character Preclassification Based on Fuzzy Typographical Analysis (LD, PW, BM), pp. 74–78.
ICDARICDAR-2001-GarainC #analysis #fuzzy #multi #segmentation #using
Segmentation of Touching Characters in Printed Devnagari and Bangla Scripts Using Fuzzy Multifactorial Analysis (UG, BBC), pp. 805–809.
ICDARICDAR-2001-HaritCGVJ #analysis #documentation #image
A Model Guided Document Image Analysis Scheme (GH, SC, PG, NV, SDJ), pp. 1137–1141.
ICDARICDAR-2001-KimLSN #analysis #encoding #performance
Analysis of Postal Address Fields for Efficient Encoding of Korean Mail Pieces (GK, SL, MS, YSN), pp. 675–679.
ICDARICDAR-2001-LiuLHY #algorithm #analysis #component #layout
A New Component Based Algorithm for Newspaper Layout Analysis (FL, YL, DH, MY), pp. 1176–1180.
ICDARICDAR-2001-LoprestiW #analysis #documentation #graph
Evaluating Document Analysis Results via Graph Probing (DPL, GTW), pp. 116–120.
ICDARICDAR-2001-MatsumotoFN #analysis #online
Collection and Analysis of On-line Handwritten Japanese Character Patterns (KM, TF, MN), pp. 496–500.
ICDARICDAR-2001-MitchellY #analysis #documentation #segmentation
Newspaper Document Analysis Featuring Connected Line Segmentation (PEM, HY), pp. 1181–1185.
ICDARICDAR-2001-PennHLM #analysis #documentation #flexibility #web
Flexible Web Document Analysis for Delivery to Narrow-Bandwidth Devices (GP, JH, HL, RTM), pp. 1074–1078.
ICDARICDAR-2001-ShinjoHMSS #analysis #recognition #recursion
A Recursive Analysis for Form Cell Recognition (HS, EH, KM, YS, HS), pp. 694–698.
ICDARICDAR-2001-WangHP #automation #generative
Automatic Table Ground Truth Generation and a Background-Analysis-Based Table Structure Extraction Method (YW, RMH, ITP), pp. 528–532.
ICDARICDAR-2001-WongSA01a #analysis #layout
Use of Colour in Form Layout Analysis (WSW, NS, TA), pp. 942–946.
ICDARICDAR-2001-YangZ #analysis #html #visual notation
HTML Page Analysis Based on Visual Cues (YY, HZ), pp. 859–864.
ICDARICDAR-2001-ZanibbiBC #analysis
Baseline Structure Analysis of Handwritten Mathematics Notation (RZ, DB, JRC), pp. 768–773.
ICDARICDAR-2001-ZhouT #analysis #documentation #image #recognition
Chart Analysis and Recognition in Document Images (YPZ, CLT), pp. 1055–1058.
ESOPESOP-2001-GenaimC #analysis #approach #dependence
The Def-inite Approach to Dependency Analysis (SG, MC), pp. 417–432.
ESOPESOP-2001-HuthJS #program analysis
Modal Transition Systems: A Foundation for Three-Valued Program Analysis (MH, RJ, DAS), pp. 155–169.
ESOPESOP-2001-Laud #data flow #program analysis #semantics
Semantics and Program Analysis of Computationally Secure Information Flow (PL), pp. 77–91.
ESOPESOP-2001-Mitchell #analysis #calculus #polynomial #probability #process #protocol #security
Probabilistic Polynomial-Time Process Calculus and Security Protocol Analysis (JCM), pp. 23–29.
ESOPESOP-2001-NielsonS #analysis #control flow #polynomial
Control-Flow Analysis in Cubic Time (FN, HS), pp. 252–268.
ESOPESOP-2001-Weirich #analysis #encoding
Encoding Intensional Type Analysis (SW), pp. 92–106.
FASEFASE-2001-OlveczkyKMTZ #analysis #maude #network #protocol #realtime #specification
Specification and Analysis of the AER/NCA Active Network Protocol Suite in Real-Time Maude (PCÖ, MK, JM, CLT, SZ), pp. 333–348.
FASEFASE-2001-SharyginaBK #analysis #design #object-oriented #reliability #verification
A Formal Object-Oriented Analysis for Software Reliability: Design for Verification (NS, JCB, RPK), pp. 318–332.
FoSSaCSFoSSaCS-2001-JensenS #abstract interpretation #analysis #object-oriented #source code
Class Analysis of Object-Oriented Programs through Abstract Interpretation (TPJ, FS), pp. 261–275.
TACASTACAS-2001-Castillo #analysis #modelling #state machine #tool support #validation
The ASM Workbench — A Tool Environment for Computer-Aided Analysis and Validation of Abstract State Machine Models Tool Demonstration (GDC), pp. 578–581.
TACASTACAS-2001-RiccaT #analysis #problem #testing #web
Building a Tool for the Analysis and Testing of Web Applications: Problems and Solutions (FR, PT), pp. 373–388.
TACASTACAS-2001-RuysLKLM #algebra #analysis #partial order #probability #process #using
First Passage Time Analysis of Stochastic Process Algebra Using Partial Orders (TCR, RL, JPK, DL, MM), pp. 220–235.
TACASTACAS-2001-SouterWSP #analysis #named #testing
TATOO: Testing and Analysis Tool for Object- Oriented Software (ALS, TMW, SAS, LLP), pp. 389–403.
IWPCIWPC-J-1999-MartinoMMV01 #communication #detection #interactive #parallel #program analysis
Parallel program analysis and restructuring by detection of point-to-point interaction patterns and their transformation into collective communication constructs (BDM, AM, NM, UV), pp. 235–263.
CSMRCSMR-2001-EisenbarthKS #component #concept analysis
Derivation of Feature Component Maps by Means of Concept Analysis (TE, RK, DS), pp. 176–179.
CSMRCSMR-2001-PodnarM #analysis #maintenance #process #simulation #using
Software Maintenance Process Analysis Using Discrete-Event Simulation (IP, BM), pp. 192–195.
CSMRCSMR-2001-Villavicencion #automation #detection #program analysis #programming #slicing
Program Analysis for the Automatic Detection of Programming Plans Applying Slicing (GV), pp. 188–191.
ICSMEICSM-2001-AtkinsonG #analysis #data flow #implementation #performance #scalability #source code
Implementation Techniques for Efficient Data-Flow Analysis of Large Programs (DCA, WGG), pp. 52–61.
ICSMEICSM-2001-Chulani #analysis #modelling #quality
Bayesian Analysis of Software Cost and Quality Models (SC), p. 565–?.
ICSMEICSM-2001-EisenbarthKS #analysis #comprehension
Aiding Program Comprehension by Static and Dynamic Feature Analysis (TE, RK, DS), pp. 602–611.
ICSMEICSM-2001-KrishnaCKCWBR #empirical #impact analysis #incremental #maintenance #spreadsheet #validation
Incorporating Incremental Validation and Impact Analysis into Spreadsheet Maintenance: An Empirical Study (VBK, CRC, DK, JC, CSW, MMB, GR), pp. 72–81.
ICSMEICSM-2001-MalenfantAMD #analysis #detection
Flow Analysis to Detect Blocked Statements (BM, GA, EM, MD), p. 62–?.
ICSMEICSM-2001-RotschkeKH #analysis #architecture #multi
Multi-View Architecture Trend Analysis for Medical Imaging (TR, RLK, DH), p. 107.
ICSMEICSM-2001-Sneed01a #distributed #impact analysis #maintenance #object-oriented
Impact Analysis of Maintenance Tasks for a Distributed Object-Oriented System (HMS), pp. 180–189.
IWPCIWPC-2001-AndritsosM #data analysis #reverse engineering
Reverse Engineering Meets Data Analysis (PA, RJM), pp. 157–166.
IWPCIWPC-2001-AntoniolDCM #concept analysis #legacy
A Method to Re-Organize Legacy Systems via Concept Analysis (GA, MDP, GC, EM), pp. 281–290.
IWPCIWPC-2001-BassilK #analysis #bibliography #tool support #visualisation
Software Visualization Tools: Survey and Analysis (SB, RKK), pp. 7–17.
IWPCIWPC-2001-EisenbarthKS #comprehension #concept analysis #execution #using
Feature-Driven Program Understanding Using Concept Analysis of Execution Traces (TE, RK, DS), pp. 300–309.
IWPCIWPC-2001-Stewart #analysis #automation #semantics
Automated Analysis of Scientific and Engineering Semantics (MEMS), pp. 113–114.
PASTEPASTE-2001-Hind #analysis #pointer #problem #question
Pointer analysis: haven’t we solved this problem yet? (MH), pp. 54–61.
PASTEPASTE-2001-MaessenSG #java #program analysis #safety #virtual machine
Program analysis for safety guarantees in a Java virtual machine written in Java (JWM, VS, DG), pp. 62–65.
PASTEPASTE-2001-Palsberg #analysis #type system
Type-based analysis and applications (JP), pp. 20–27.
PASTEPASTE-2001-RyderT #impact analysis #object-oriented #source code
Change impact analysis for object-oriented programs (BGR, FT), pp. 46–53.
SCAMSCAM-2001-BurdR #analysis #automation #evolution #source code #using
Using Automated Source Code Analysis for Software Evolution (LB, SR), pp. 206–212.
SCAMSCAM-2001-DeruelleMBB #analysis #distributed #multi
Analysis and Manipulation of Distributed Multi-Language Software Code (LD, NM, MB, HB), pp. 45–56.
SCAMSCAM-2001-HorganPW #analysis #java #metric #profiling #runtime #source code
Measurement and Analysis of Runtime Profiling Data for Java Programs (JH, JFP, JW), pp. 124–132.
SCAMSCAM-2001-Knight #analysis #exclamation #java #smell
Smell the Coffee! Uncovering Java Analysis Issues (CK), pp. 163–169.
SCAMSCAM-2001-MaggiS #analysis #bytecode #data flow #java #using
Using Data Flow Analysis to Infer Type Information in Java Bytecode (PM, RS), p. 213–?.
SCAMSCAM-2001-Ward #analysis #approach #source code
The Formal Transformation Approach to Source Code Analysis and Manipulation (MPW), pp. 187–195.
WCREWCRE-2001-CifuentesWE #analysis #debugging #decompiler #security
Computer Security Analysis through Decompilation and High-Level Debugging (CC, TW, MVE), pp. 375–380.
PLDIPLDI-2001-AggarwalR #analysis
Related Field Analysis (AA, KHR), pp. 214–220.
PLDIPLDI-2001-ChatterjeePHL #analysis #behaviour
Exact Analysis of the Cache Behavior of Nested Loops (SC, EP, PJH, ARL), pp. 286–297.
PLDIPLDI-2001-GhiyaLS #ambiguity #analysis #c #memory management #on the #points-to #source code
On the Importance of Points-to Analysis and Other Memory Disambiguation Methods for C Programs (RG, DML, DCS), pp. 47–58.
PLDIPLDI-2001-HeintzeT #analysis #pointer
Demand-Driven Pointer Analysis (NH, OT), pp. 24–34.
PLDIPLDI-2001-HeintzeT01a #alias #analysis #c #using
Ultra-fast Aliasing Analysis using CLA: A Million Lines of C Code in a Second (NH, OT), pp. 254–263.
PLDIPLDI-2001-VivienR #analysis #pointer
Incrementalized Pointer and Escape Analysis (FV, MCR), pp. 35–46.
SASSAS-2001-BagnaraGHZ #analysis #constraints
Finite-Tree Analysis for Constraint Logic-Based Languages (RB, RG, PMH, EZ), pp. 165–184.
SASSAS-2001-DasLFR #impact analysis #optimisation #pointer #scalability
Estimating the Impact of Scalable Pointer Analysis on Optimization (MD, BL, MF, JR), pp. 260–278.
SASSAS-2001-DorRS #analysis #c #integer #source code #string
Cleanness Checking of String Manipulations in C Programs via Integer Analysis (ND, MR, SS), pp. 194–212.
SASSAS-2001-Feret #abstract interpretation #mobile #static analysis
Abstract Interpretation-Based Static Analysis of Mobile Ambients (JF), pp. 412–430.
SASSAS-2001-GlynnSS #analysis #constraints #effectiveness #strict
Effective Strictness Analysis with HORN Constraints (KG, PJS, MS), pp. 73–92.
SASSAS-2001-GordonJ #analysis #protocol #security
A Type and Effect Analysis of Security Protocols (ADG, AJ), p. 432.
SASSAS-2001-Lu #analysis #logic programming #source code
Parameterizing a Groundness Analysis of Logic Programs (LL), pp. 146–164.
SASSAS-2001-MesnardN #logic programming #source code #static analysis #termination
Applying Static Analysis Techniques for Inferring Termination Conditions of Logic Programs (FM, UN), pp. 93–110.
SASSAS-2001-Monniaux #analysis #probability #source code #termination
An Abstract Analysis of the Probabilistic Termination of Programs (DM), pp. 111–126.
SASSAS-2001-Rinard #analysis #parallel #source code #thread
Analysis of Multithreaded Programs (MCR), pp. 1–19.
SASSAS-2001-Wagner #assurance #static analysis
Static Analysis and Software Assurance (DW), p. 431.
STOCSTOC-2001-AzarFKMS #analysis
Spectral analysis of data (YA, AF, ARK, FM, JS), pp. 619–626.
STOCSTOC-2001-SpielmanT #algorithm #analysis #polynomial #why
Smoothed analysis of algorithms: why the simplex algorithm usually takes polynomial time (DAS, SHT), pp. 296–305.
FLOPSFLOPS-2001-AmatoS #analysis #compilation
Abstract Compilation for Sharing Analysis (GA, FS), pp. 311–325.
FLOPSFLOPS-2001-LagoonS #analysis #framework #logic programming #source code
A Framework for Analysis of Typed Logic Programs (VL, PJS), pp. 296–310.
ICALPICALP-2001-Boreale #analysis #encryption #protocol
Symbolic Trace Analysis of Cryptographic Protocols (MB), pp. 667–681.
FMFME-2001-Beyer #analysis #automaton #reachability
Improvements in BDD-Based Reachability Analysis of Timed Automata (DB0), pp. 318–343.
FMFME-2001-HelkeS #analysis #behaviour #consistency #eiffel #library
Mechanized Analysis of Behavioral Conformance in the Eiffel Base Libraries (SH, TS), pp. 20–42.
ICFPICFP-2001-NeubauerS #analysis #emacs #lisp
Down with Emacs Lisp: Dynamic Scope Analysis (MN, MS), pp. 38–49.
IFLIFL-2001-PenaS01a #analysis #nondeterminism
A Polynomial-Cost Non-determinism Analysis (RP, CS), pp. 121–137.
CHICHI-2001-CardPWMRSB #analysis #behaviour #graph #protocol #usability #web
Information scent as a driver of Web behavior graphs: results of a protocol analysis method for Web usability (SKC, PP, MMVDW, JBM, RWR, PKS, JB), pp. 498–505.
CHICHI-2001-Muller #analysis
Layered participatory analysis: new developments in the CARD technique (MJM), pp. 90–97.
AdaSIGAda-2001-WhiteW #ada #dynamic analysis
Dynamic analysis for locating product features in Ada code (LJW, NW), pp. 99–106.
ICEISICEIS-v1-2001-CounsellLSTM #data analysis #email #optimisation #using
Optimising the Grouping of Email Users to Servers Using Intelligent Data Analysis (SC, XL, SS, AT, JM), pp. 489–496.
ICEISICEIS-v1-2001-SierraRLG #analysis #image #machine learning #mobile #order #recognition
Machine Learning Approaches for Image Analysis: Recognition of Hand Orders by a Mobile Robot (BS, IR, EL, UG), pp. 330–335.
ICEISICEIS-v2-2001-ArevaloCQAV #analysis #corba #design #framework #industrial #web
A CORBA and Web Technology Based Framework for the Analysis and Optimal Design of Complex Systems in the Oil Industry (CJA, JAC, NVQ, NA, JV), pp. 953–961.
ICEISICEIS-v2-2001-BohnackerDFR #analysis #automation #feedback
Automatic Analysis of Customer Feedback and Inquiries (UB, LD, JF, IR), pp. 1162–1165.
ICEISICEIS-v2-2001-FerreiraL #analysis #effectiveness #reuse
Organization of Analysis Patterns for Effective Reuse (MJF, PL), pp. 766–773.
ICEISICEIS-v2-2001-MorilloFD #analysis #named
RSHP: A Scheme to Classify Information in a Domain Analysis Environment (JLM, JMF, ID), pp. 686–690.
ICEISICEIS-v2-2001-OmelayenkoF #analysis #integration #problem
An Analysis of B2B Catalogue Integration Problems (BO, DF), pp. 945–952.
ICEISICEIS-v2-2001-ShishkovD #analysis #case study #diagrams #modelling #process
Analysis of Suitability, Appropriateness and Adequacy of Use Cases Combined with Activity Diagram for Business Systems Modelling (BS, JLGD), pp. 854–858.
CIKMCIKM-2001-Couchot #analysis #composition #set #termination
Termination Analysis of Active Rules Modular Sets (AC), pp. 326–333.
KDDKDD-2001-BerkhinBR #analysis #interactive #web
Interactive path analysis of web site traffic (PB, JDB, DJR), pp. 414–419.
KDDKDD-2001-HotzGHNW #analysis #detection #industrial
REVI-MINER, a KDD-environment for deviation detection and analysis of warranty and goodwill cost statements in automotive industry (EH, UG, WH, GN, MW), pp. 432–437.
KDDKDD-2001-SpanglerK #analysis #knowledge base #maintenance #using
Knowledge base maintenance using knowledge gap analysis (WSS, JTK), pp. 462–466.
MLDMMLDM-2001-SyG #analysis #approach #data mining #mining #statistics
Data Mining Approach Based on Information-Statistical Analysis: Application to Temporal-Spatial Data (BKS, AKG), pp. 128–140.
SEKESEKE-2001-BarrosWT #analysis #process #project management #reuse
Scenario Oriented Project Management Knowledge Reuse within a Risk Analysis Process (MdOB, CMLW, GHT), pp. 37–44.
SEKESEKE-2001-GruerHKC #analysis #design #framework #multi
A Formal Framework for Multi-Agent Systems Analysis and Design (PG, VH, AK, KC), pp. 276–282.
SEKESEKE-2001-JarzabekZ #abstraction #analysis #component #control flow #reuse
Enhacing component reuse with control flow abstraction analysis (SJ, HZ), pp. 171–178.
SEKESEKE-2001-Lopez #analysis #architecture #evaluation #framework #trade-off
Application of an Evaluation Framework for Analyzing the Architecture Tradeoff Analysis Method (ML), pp. 397–404.
SIGIRSIGIR-2001-AndoL #analysis
Iterative Residual Rescaling: An Analysis and Generalization of LSI (RKA, LL), pp. 154–162.
SIGIRSIGIR-2001-GongL #analysis #semantics #summary #using
Generic Text Summarization Using Relevance Measure and Latent Semantic Analysis (YG, XL), pp. 19–25.
SIGIRSIGIR-2001-ZhengNJ #algorithm #analysis
Stable Algorithms for Link Analysis (AXZ, AYN, MIJ), pp. 258–266.
UMLUML-2001-DevosS #analysis #object-oriented #paradigm
The Message Paradigm in Object-Oriented Analysis (FD, ES), pp. 182–193.
UMLUML-2001-GrassiM #analysis #architecture #mobile #modelling #performance #uml
UML Modelling and Performance Analysis of Mobile Software Architectures (VG, RM), pp. 209–224.
UMLUML-2001-XuandongMYJG #analysis #diagrams #process #uml
Timing Analysis of UML Activity Diagrams (XL, CM, YP, JZ, GZ), pp. 62–75.
ECOOPECOOP-2001-PolletCC #java #source code #static analysis
Distinctness and Sharing Domains for Static Analysis of Java Programs (IP, BLC, AC), pp. 77–98.
OOPSLAOOPSLA-2001-PechtchanskiS #analysis #framework #interprocedural
Dynamic Optimistic Interprocedural Analysis: A Framework and an Application (IP, VS), pp. 195–210.
OOPSLAOOPSLA-2001-RountevMR #analysis #constraints #java #points-to #using
Points-To Analysis for Java using Annotated Constraints (AR, AM, BGR), pp. 43–55.
TOOLSTOOLS-EUROPE-2001-SevitskyPK #analysis #java #performance #source code
An Information Exploration Tool for Performance Analysis of Java Programs (GS, WDP, RK), pp. 85–101.
LOPSTRLOPSTR-2001-Shankar #functional #static analysis
Static Analysis for Safe Destructive Updates in a Functional Language (NS), pp. 1–24.
PPDPPPDP-2001-ChangJ #analysis #constraints #java
Granularity of Constraint-Based Analysis for Java (BMC, JWJ), pp. 94–102.
QAPLQAPL-2001-ClarkHM #analysis
Quantitative Analysis of the Leakage of Confidential Data (DC, SH, PM), pp. 238–251.
QAPLQAPL-2001-Fruhwirth #analysis #automation #complexity #concurrent #source code
As Time Goes By II: More Automatic Complexity Analysis of Concurrent Rule Programs (TWF), pp. 185–206.
PADLPADL-2001-BellaB #analysis #constraints #protocol #security
Soft Constraints for Security Protocol Analysis: Confidentiality (GB, SB), pp. 108–122.
POPLPOPL-2001-Ganzinger #deduction #performance #program analysis
Efficient deductive methods for program analysis (HG), pp. 102–103.
POPLPOPL-2001-Monniaux #analysis #monte carlo #probability #source code
An abstract Monte-Carlo method for the analysis of probabilistic programs (DM), pp. 93–101.
POPLPOPL-2001-RehofF #analysis #polymorphism #type system
Type-base flow analysis: from polymorphic subtyping to CFL-reachability (JR, MF), pp. 54–66.
RERE-2001-ChengC #analysis #formal method #modelling #requirements
Integrating Informal and Formal Approaches to Requirements Modeling and Analysis (BHCC, LAC), pp. 294–295.
RERE-2001-FarbeyF #analysis
Software Acquisition: A Business Strategy Analysis (BF, AF), pp. 76–83.
RERE-2001-InOR #analysis #modelling #multi #requirements
A Requirements Negotiation Model Based on Multi-Criteria Analysis (HI, DO, TR), pp. 312–313.
SACSAC-2001-BaroneBVM #algorithm #analysis #approximate #problem
An approximation algorithm for the shortest common supersequence problem: an experimental analysis (PB, PB, GDV, GM), pp. 56–60.
SACSAC-2001-ChangJYC #analysis #exception #interprocedural #java
Interprocedural exception analysis for Java (BMC, JWJ, KY, KMC), pp. 620–625.
SACSAC-2001-GuPH #analysis #data type #database #design #image #query
Design and analysis of data structures for querying image databases (YG, BP, KAH), pp. 236–241.
SACSAC-2001-LiPJ #analysis
Analysis of dynamic movement-based location update scheme (JL, YP, XJ), pp. 368–372.
SACSAC-2001-MinFO #adaptation #analysis #network
Analysis of adaptive wormhole-routed torus networks with IPP input traffic (GM, JDF, MOK), pp. 494–498.
SACSAC-2001-ShahrabiOM #adaptation #analysis
Unicast-based broadcast: an analysis for the hypercube with adaptive routing (AS, MOK, LMM), pp. 489–493.
FSEESEC-FSE-2001-EdvardssonK #analysis #constraints #generative #testing #theorem proving
Analysis of the constraint solver in UNA based test data generation (JE, MK), pp. 237–245.
ICSEICSE-2001-Campbell #analysis #diagrams #uml #visualisation
Visualizaiton an Interpretation of Analysis Results within the Context of Formalized UML Diagrams (LAC), pp. 785–786.
ICSEICSE-2001-CobleighCO #algorithm #analysis #data flow #finite #verification
The Right Algorithm at the Right Time: Comparing Data Flow Analysis Algorithms for Finite State Verification (JMC, LAC, LJO), pp. 37–46.
ICSEICSE-2001-DickinsonLP #analysis #clustering #execution
Finding Failures by Cluster Analysis of Execution Profiles (WD, DL, AP), pp. 339–348.
ICSEICSE-2001-DillonS #analysis #graph #specification #using
Leightweight Analysis of Operational Specifications Using Inference Graphs (LKD, KS), pp. 57–67.
ICSEICSE-2001-FioravantiMN #analysis #object-oriented #re-engineering
Reengineering Analysis of Object-Oriented Systems via Duplication (FF, GM, PN), pp. 577–586.
ICSEICSE-2001-JhaW #analysis #network
Survivability Analysis of Network Systems (SJ, JMW), pp. 307–317.
ICSEICSE-2001-MenziesPH #analysis #diagrams #formal method #performance #requirements
Fast Formal Analysis of Requirements via “Topoi Diagrams” (TM, JDP, MEH), pp. 391–400.
ICSEICSE-2001-NordPSH #analysis #architecture #design #effectiveness #uml
Effective Software Architecture Design: From Global Analysis to UML Descriptions (RLN, DJP, DS, CH), pp. 741–742.
ICSEICSE-2001-OvermyerLR #analysis #concept #modelling #using
Conceptual Modeling through Linguistic Analysis Using LIDA (SPO, BL, OR), pp. 401–410.
ICSEICSE-2001-RiccaT #analysis #testing #web
Analysis and Testing of Web Applications (FR, PT), pp. 25–34.
ICSEICSE-2001-SmithOB #analysis #architecture #component #mining #product line #re-engineering
Mining Components for a Software Architecture and a Product Line: the Options Analysis for Reengineering (OAR) Method (DBS, LO, JB), p. 728.
ICSEICSE-2001-StirewaltD #analysis #approach #component #formal method #tool support
A Component-Based Approach to Building Formal Analysis Tools (KS, LKD), pp. 167–176.
CCCC-2001-Engelen #analysis #compilation #optimisation #performance
Efficient Symbolic Analysis for Optimizing Compilers (RvE), pp. 118–132.
CCCC-2001-MartenaP #alias #analysis #model checking
Alias Analysis by Means of a Model Checker (VM, PSP), pp. 3–19.
CCCC-2001-RinetzkyS #analysis #interprocedural #recursion #source code
Interprocedural Shape Analysis for Recursive Programs (NR, SS), pp. 133–149.
HPDCHPDC-2001-WuB #analysis #architecture #parallel
Parallel Retrograde Analysis on Different Architecture (RW, DFB), pp. 356–362.
LCTESLCTES-OM-2001-UnnikrishnanSL #analysis #automation #garbage collection #memory management
Automatic Accurate Live Memory Analysis for Garbage-Collected Languages (LU, SDS, YAL), pp. 102–111.
LCTESLCTES-OM-2001-VivancosHMW #analysis #parametricity
Parametric Timing Analysis (EV, CAH, FM, DBW), pp. 88–93.
LCTESLCTES-OM-2001-ZiegenbeinWRJE #analysis #process
Interval-Based Analysis of Software Processes (DZ, FW, KR, MJ, RE), pp. 94–101.
PPoPPPPoPP-2001-InoFH #analysis #named #parallel
LogGPS: a parallel computational model for synchronization analysis (FI, NF, KH), pp. 133–142.
PPoPPPPoPP-2001-KimOEFV #analysis #execution #framework #optimisation
Reference idempotency analysis: a framework for optimizing speculative execution (SWK, ClO, RE, BF, TNV), pp. 2–11.
PPoPPPPoPP-2001-SalcianuR #analysis #parallel #pointer #source code #thread
Pointer and escape analysis for multithreaded programs (AS, MCR), pp. 12–23.
PPoPPPPoPP-2001-VetterM #analysis #communication #distributed #scalability #statistics
Statistical scalability analysis of communication operations in distributed applications (JSV, MOM), pp. 123–132.
CAVCAV-2001-AlurEY #analysis #recursion #state machine
Analysis of Recursive State Machines (RA, KE, MY), pp. 207–220.
CAVCAV-2001-AnnichiniBS #analysis #named #reachability
TReX: A Tool for Reachability Analysis of Complex Systems (AA, AB, MS), pp. 368–372.
CAVCAV-2001-Dang #analysis #automaton #reachability
Binary Reachability Analysis of Pushdown Timed Automata with Dense Clocks (ZD), pp. 506–518.
ICLPICLP-2001-CodishGSS #analysis
Higher-Precision Groundness Analysis (MC, SG, HS, PJS), pp. 135–149.
IJCARIJCAR-2001-Jones #analysis #graph #termination
Program Termination Analysis by Size-Change Graphs (Abstract) (NDJ), pp. 1–4.
LICSLICS-2001-MitchellRST #analysis #calculus #probability #process #protocol #security
Probabilistic Polynominal-Time Process Calculus and Security Protocol Analysis (JCM, AR, AS, VT), pp. 3–5.
ICSTSAT-2001-CoccoM #analysis #backtracking #physics #random #satisfiability #statistics
Statistical physics analysis of the backtrack resolution of random 3-SAT instances (SC, RM), pp. 36–47.
ASEASE-2000-HillL #analysis
Non-Interference Analysis for Mixed Criticality Code in Avionics Systems (MGH, TWL), pp. 257–260.
ASEASE-2000-MorisioTS #analysis #uml
Extending UML to Support Domain Analysis (MM, GT, MES), pp. 321–324.
ASEASE-2000-SouzaFGW #analysis #design #object-oriented
A Group Critic System for Object-Oriented Analysis and Design (CRBdS, JSFJ, KMG, JW), pp. 313–316.
DACDAC-2000-ArunachalamRP #analysis #named
TACO: timing analysis with coupling (RA, KR, LTP), pp. 266–269.
DACDAC-2000-CarloniS #analysis #latency #optimisation #performance
Performance analysis and optimization of latency insensitive systems (LPC, ALSV), pp. 361–367.
DACDAC-2000-ChaudhryBPE #analysis
Current signature compression for IR-drop analysis (RC, DB, RP, TE), pp. 162–167.
DACDAC-2000-DickLRJ #analysis #embedded #operating system
Power analysis of embedded operating systems (RPD, GL, AR, NKJ), pp. 312–315.
DACDAC-2000-FinF #analysis #simulation
A Web-CAD methodology for IP-core analysis and simulation (AF, FF), pp. 597–600.
DACDAC-2000-GalaZPYWB #analysis #modelling
On-chip inductance modeling and analysis (KG, VZ, RP, BY, JW, DB), pp. 63–68.
DACDAC-2000-Hassoun #analysis #bound #using
Critical path analysis using a dynamically bounded delay model (SH), pp. 260–265.
DACDAC-2000-JainMMWL #analysis #canonical #complexity #composition #graph #how
Analysis of composition complexity and how to obtain smaller canonical graphs (JJ, KM, DM, IW, YL), pp. 681–686.
DACDAC-2000-KahngMS #analysis #on the
On switch factor based analysis of coupled RC interconnects (ABK, SM, ES), pp. 79–84.
DACDAC-2000-LevyBBDGOOSZ #analysis #design #named
ClariNet: a noise analysis tool for deep submicron design (RL, DB, GB, AD, AG, CO, BO, SS, VZ), pp. 233–238.
DACDAC-2000-LevySMW #analysis #performance
A rank-one update method for efficient processing of interconnect parasitics in timing analysis (HL, WS, DM, JW), pp. 75–78.
DACDAC-2000-PiS #analysis #approach #diagrams #multi
Multi-terminal determinant decision diagrams: a new approach to semi-symbolic analysis of analog integrated circuits (TP, CJRS), pp. 19–22.
DACDAC-2000-ShepardK #analysis
Static noise analysis for digital integrated circuits in partially-depleted silicon-on-insulator technology (KLS, DJK), pp. 239–242.
DACDAC-2000-ShinKC #analysis #embedded #multi #performance #realtime
Schedulability-driven performance analysis of multiple mode embedded real-time systems (YS, DK, KC), pp. 495–500.
DACDAC-2000-SomasekharCRYD #analysis
Dynamic noise analysis in precharge-evaluate circuits (DS, SHC, KR, YY, VD), p. 243.
DACDAC-2000-SouriBMS #analysis #design #motivation #multi #performance
Multiple Si layer ICs: motivation, performance analysis, and design implications (SJS, KB, AM, KS), pp. 213–220.
DACDAC-2000-WangN #analysis #linear #multi #order
Extended Krylov subspace method for reduced order analysis of linear circuits with multiple sources (JMW, TVN), pp. 247–252.
DACDAC-2000-ZhaoPSECB #analysis #network
Hierarchical analysis of power distribution networks (MZ, RP, SSS, TE, RC, DB), pp. 150–155.
DATEDATE-2000-Balarin #abstraction #analysis #automation #worst-case
Automatic Abstraction for Worst-Case Analysis of Discrete Systems (FB), pp. 494–501.
DATEDATE-2000-CarlettaPN #analysis #detection #fault #using
Detecting Undetectable Controller Faults Using Power Analysis (JC, CAP, MN), pp. 723–728.
DATEDATE-2000-GuerraRFR #analysis #approach #scalability
A Hierarchical Approach for the Symbolic Analysis of Large Analog Integrated Circuits (OG, ER, FVF, ÁRV), pp. 48–52.
DATEDATE-2000-GuptaGMC #analysis #program transformation #programmable
Analysis of High-Level Address Code Transformations for Programmable Processors (SG, RKG, MM, FC), pp. 9–13.
DATEDATE-2000-HergenhanR #analysis #architecture #embedded
Static Timing Analysis of Embedded Software on Advanced Processor Architectures (AH, WR), pp. 552–559.
DATEDATE-2000-PopEP #analysis #distributed #embedded #optimisation #scheduling
Bus Access Optimization for Distributed Embedded Systems Based on Schedulability Analysis (PP, PE, ZP), pp. 567–574.
DATEDATE-2000-RingeLB #analysis
Static Timing Analysis Taking Crosstalk into Account (MR, TL, EB), pp. 451–455.
DATEDATE-2000-SugiharaYD #analysis #approach
Analysis and Minimization of Test Time in a Combined BIST and External Test Approach (MS, HY, HD), pp. 134–140.
HTHT-2000-Neumuller #analysis #tool support
A semiotic analysis of iMarketing tools (MN), pp. 238–239.
HTHT-2000-PohlP #analysis #authoring #documentation #hypermedia #process
Analysis of the authoring process of hypertext documents (MP, PP), pp. 240–241.
HTHT-2000-YooB #analysis
Finding linking opportunities through relationship-based analysis (JY, MB), pp. 181–190.
PODSPODS-2000-Lynch #adaptation #analysis
Analysis and Application of Adaptive Sampling (JFL), pp. 260–267.
VLDBVLDB-2000-CarusoCGLM #analysis #database #quality
Telcordia’s Database Reconciliation and Data Quality Analysis Tool (FC, MC, UG, GL, PM), pp. 615–618.
CSEETCSEET-2000-CybulskiL #analysis #design #education #multi #using
Teaching Systems Analysis and Design Using Multimedia and Patterns (JLC, TL), pp. 113–122.
ITiCSEITiCSE-2000-Abi-Raad #analysis #exclamation
Systems analysis with attitude! (MAR), pp. 57–60.
ITiCSEITiCSE-2000-Chang #analysis #concept #learning #web
Discovering learning patterns from Web logs by concept transformation analysis (poster session) (CKC), pp. 186–187.
ESOPESOP-2000-HoweK #analysis #implementation
Implementing Groundness Analysis with Definite Boolean Functions (JMH, AK), pp. 200–214.
ESOPESOP-2000-NielsonNS #analysis #mobile
A Kleene Analysis of Mobile Ambients (FN, HRN, SS), pp. 305–319.
ESOPESOP-2000-SeidlS #analysis #constraints #interprocedural #parallel #source code
Constraint-Based Inter-Procedural Analysis of Parallel Programs (HS, BS), pp. 351–365.
ESOPESOP-2000-SmithW #analysis
Polyvariant Flow Analysis with Constrained Types (SFS, TW), pp. 382–396.
TACASTACAS-2000-AbdullaBE #analysis #reachability
Symbolic Reachability Analysis Based on SAT-Solvers (PAA, PB, NE), pp. 411–425.
TACASTACAS-2000-BozgaFG #automation #generative #static analysis #testing #using
Using Static Analysis to Improve Automatic Test Generation (MB, JCF, LG), pp. 235–250.
TACASTACAS-2000-Schmidt #analysis #low level #reachability #symmetry
Integrating Low Level Symmetries into Reachability Analysis (KS0), pp. 315–330.
WRLAWRLA-2000-BasinD #analysis #comparison #haskell #maude #protocol #security
Maude versus Haskell: an Experimental Comparison in Security Protocol Analysis (DAB, GD), pp. 235–256.
WRLAWRLA-2000-Millen #analysis #bibliography #encryption #protocol #term rewriting
Applications of Term Rewriting to Cryptographic Protocol Analysis overview of the invited talk (JKM), pp. 229–234.
WRLAWRLA-2000-Rodriguez #analysis #case study #maude #protocol #specification
Case Studies in the Specification and Analysis of Protocols in Maude (DER), pp. 257–273.
CSMRCSMR-2000-AbreuPS #analysis #approach #clustering #composition #object-oriented
A Coupling-Guided Cluster Analysis Approach to Reengineer the Modularity of Object-Oriented Systems (FBeA, GP, PMAS), pp. 13–22.
ICSMEICSM-2000-HuMDL #analysis #c #c++ #compilation #execution #symbolic computation #using
C/C++ Conditional Compilation Analysis using Symbolic Execution (YH, EM, MD, BL), pp. 196–206.
ICSMEICSM-2000-KimbleW #analysis #source code
An Alternative Source Code Analysis (JEKJ, LJW), pp. 64–75.
ICSMEICSM-2000-RiccaT #analysis #evolution #web
Web Site Analysis: Structure and Evolution (FR, PT), p. 76–?.
IWPCIWPC-2000-JahnkeNW #analysis #automation #component #embedded #quality
Automated Quality Analysis of Component Software for Embedded Systems (JHJ, JN, JPW), pp. 18–26.
IWPCIWPC-2000-KuipersM #concept analysis #legacy
Types and Concept Analysis for Legacy Systems (TK, LM), pp. 221–230.
IWPCIWPC-2000-PowerM #analysis #context-free grammar
Metric-Based Analysis of Context-Free Grammars (JFP, BAM), pp. 171–178.
WCREWCRE-2000-BalazinskaMDLK #object-oriented #refactoring
Advanced Clone-Analysis to Support Object-Oriented System Refactoring (MB, EM, MD, BL, KK), pp. 98–107.
WCREWCRE-2000-BurdBD #analysis #evolution #process
Studying the Process of Software Change: An Analysis of Software Evolution (EB, SB, JD), pp. 232–239.
PEPMPEPM-2000-Das #case study #experience #scalability #source code #static analysis
Static Analysis of Large Programs: Some Experiences (Abstract of Invited Talk) (MD), p. 1.
PEPMPEPM-2000-LeviS #analysis #linear #refinement
Non Pair-Sharing and Freeness Analysis Through Linear Refinement (GL, FS), pp. 52–61.
PEPMPEPM-2000-MurphyL #program analysis
Program Analysis with Partial Transfer Functions (BRM, MSL), pp. 94–103.
PEPMPEPM-2000-ScholzBF #analysis #detection #memory management #pointer
Symbolic Pointer Analysis for Detecting Memory Leaks (BS, JB, TF), pp. 104–113.
PLDIPLDI-2000-ChengH #analysis #composition #design #evaluation #implementation #interprocedural #pointer #using
Modular interprocedural pointer analysis using access paths: design, implementation, and evaluation (BCC, WmWH), pp. 57–69.
PLDIPLDI-2000-Das #analysis #pointer
Unification-based pointer analysis with directional assignments (MD), pp. 35–46.
PLDIPLDI-2000-FahndrichRD #analysis #constraints #scalability #using
Scalable context-sensitive flow analysis using instantiation constraints (MF, JR, MD), pp. 253–263.
PLDIPLDI-2000-GhemawatRS #analysis #interprocedural #low cost
Field analysis: getting useful and low-cost interprocedural information (SG, KHR, DJS), pp. 334–344.
PLDIPLDI-2000-LinP #analysis #compilation #memory management
Compiler analysis of irregular memory accesses (YL, DAP), pp. 157–168.
PLDIPLDI-2000-RouhtevC #analysis #points-to #scalability
Off-line variable substitution for scaling points-to analysis (AR, SC), pp. 47–56.
PLDIPLDI-2000-RuginaR #analysis #array #bound #memory management #pointer
Symbolic bounds analysis of pointers, array indices, and accessed memory regions (RR, MCR), pp. 182–195.
PLDIPLDI-2000-StephensonBA #analysis #compilation
Bitwidth analysis with application to silicon compilation (MS, JB, SPA), pp. 108–120.
SASSAS-2000-ClarkHH #analysis #graph grammar #safety #strict
Safety of Strictness Analysis via Term Graph Rewriting (DC, CH, SH), pp. 95–114.
SASSAS-2000-Feret #analysis #mobile
Confidentiality Analysis of Mobile Systems (JF), pp. 135–154.
SASSAS-2000-FinkKS #analysis #array
Unified Analysis of Array and Object References in Strongly Typed Languages (SJF, KK, VS), pp. 155–174.
SASSAS-2000-FosterFA #analysis #c #points-to #polymorphism
Polymorphic versus Monomorphic Flow-Insensitive Points-to Analysis for C (JSF, MF, AA), pp. 175–198.
SASSAS-2000-Saidi #abstraction #analysis #model checking
Model Checking Guided Abstraction and Analysis (HS), pp. 377–396.
SASSAS-2000-Scozzari #abstract domain #analysis #semantics
Abstract Domains for Sharing Analysis by Optimal Semantics (FS), pp. 397–412.
SASSAS-2000-UngureanuJ #analysis #concurrent #java
Concurrency Analysis for Java (CU, SJ), pp. 413–432.
ICALPICALP-2000-FocardiGM #analysis #encryption #protocol
Non Interference for the Analysis of Cryptographic Protocols (RF, RG, FM), pp. 354–372.
IFMIFM-2000-BryansBBD #analysis #design #specification
Specification and Analysis of Automata-Based Designs (JB, LB, HB, JD), pp. 176–193.
ICFPICFP-2000-DamianD #continuation #program analysis
Syntactic accidents in program analysis: on the impact of the CPS transformation (DD, OD), pp. 209–220.
ICFPICFP-2000-TrifonovSS #analysis #reflexive
Fully reflexive intensional type analysis (VT, BS, ZS), pp. 82–93.
IFLIFL-2000-GustavssonS #analysis #bound #morphism #polymorphism #type system
A Usage Analysis with Bounded Usage Polymorphism and Subtyping (JG, JS), pp. 140–157.
IFLIFL-2000-PenaS #analysis #nondeterminism
Non-determinism Analysis in a Parallel-Functional Language (RP, CS), pp. 1–18.
CHICHI-2000-Balter #analysis #email
Keystroke level analysis of email message organization (OB), pp. 105–112.
AdaEuropeAdaEurope-2000-BliebergerBS #ada #analysis #data flow #detection #source code
Symbolic Data Flow Analysis for Detecting Deadlocks in Ada Tasking Programs (JB, BB, BS), pp. 225–237.
AdaEuropeAdaEurope-2000-MauriS #analysis #embedded #reliability #safety #using
Constructing Reliable Embedded Systems Using the Results of System Safety Analysis (GM, SS), pp. 173–184.
AdaEuropeAdaEurope-2000-Ringler #analysis #execution #source code #worst-case
Static Worst-Case Execution Time Analysis of Synchronous Programs (TR), pp. 56–68.
AdaEuropeAdaEurope-2000-Schmitt #ada #analysis #design #framework #implementation #object-oriented
Analysis, Design and Implementation of an Object-Oriented Framework in Ada95 (DS), pp. 196–210.
CAiSECAiSE-2000-Wohed #analysis #concept #information management #reuse
Conceptual Patterns for Reuse in Information Systems Analysis (PW), pp. 157–175.
ICEISICEIS-2000-DawsonA #case study #requirements
Facilitating a User Performed Requirements Analysis-A Case Study (RD, AAZ), pp. 525–526.
ICEISICEIS-2000-Feng #analysis
The Need for an “Information Analysis” Stage for ISD (JF), pp. 275–281.
ICEISICEIS-2000-OFlahertyW #analysis #bibliography #intranet
Intranet Adoption: A Survey Analysis (BO, HW), pp. 429–434.
ICEISICEIS-2000-SarmentoM #workflow
The Adoption of Workflow Systems: Proposal of a Model for a Methodology to Analysis-The Impact of Workflow Systems in Organisations (AS, AM), pp. 349–354.
ICEISICEIS-2000-Wagner00a #analysis #design #enterprise #information management
Agent-Oriented Analysis and Design of Enterprise Information Systems (GW), pp. 85–89.
CIKMCIKM-2000-StojanovicDS #analysis #framework #query #visual notation
Visual Query and Analysis Tool of the Object-Relational GIS Framework (ZS, SDK, DS), pp. 328–335.
ICMLICML-2000-NomotoM #analysis #automation
Comparing the Minimum Description Length Principle and Boosting in the Automatic Analysis of Discourse (TN, YM), pp. 687–694.
ICPRICPR-v1-2000-Abrantes #algorithm #analysis #clustering #multi
A Constrained Clustering Algorithm for Shape Analysis with Multiple Features (AJA), pp. 1912–1919.
ICPRICPR-v1-2000-BasuS #analysis
Analysis of Cylindrical Stereo Imaging (AB, HS), pp. 1366–1369.
ICPRICPR-v1-2000-FontaineMP #analysis #segmentation
Unsupervised Segmentation Based on Connectivity Analysis (MF, LM, JGP), pp. 1660–1663.
ICPRICPR-v1-2000-Kanatani #3d #analysis #re-engineering #reliability
Gauge-Based Reliability Analysis of 3-D Reconstruction from Two Uncalibrated Perspective Views (KiK), pp. 1076–1079.
ICPRICPR-v1-2000-KawasakiIS #analysis #image
EPI Analysis of Omni-Camera Image (HK, KI, MS), pp. 1379–1383.
ICPRICPR-v1-2000-KornDH #analysis #approach #image #independence
Weather Independent Flight Guidance: Analysis of MMW Radar Images for Approach and Landing (BK, HUD, PH), pp. 1350–1353.
ICPRICPR-v1-2000-KruizingaP #analysis
A Nonlinear Texture Operator Specialized in the Analysis of Dot-Patterns (PK, NP), pp. 1197–1201.
ICPRICPR-v1-2000-KuboNEKKMOKNMY #analysis #image
Extraction of Pulmonary Fissures from HRCT Images Based on Surface Curvatures Analysis and Morphology Filters (MK, NN, KE, MK, MK, NM, HO, RK, HN, KM, AY), pp. 1490–1493.
ICPRICPR-v1-2000-Louchet #analysis #evolution #using
Stereo Analysis Using Individual Evolution Strategy (JL), pp. 1908–1911.
ICPRICPR-v1-2000-Mitchell #analysis #documentation #layout #segmentation #using
Document Page Segmentation and Layout Analysis Using Soft Ordering (PEM, HY), pp. 1458–1461.
ICPRICPR-v1-2000-PalettaPP #analysis #learning #recognition #using
Learning Temporal Context in Active Object Recognition Using Bayesian Analysis (LP, MP, AP), pp. 1695–1699.
ICPRICPR-v1-2000-SuzukiSAO #analysis #image
Dynamic Shadow Compensation of Aerial Images Based on Color and Spatial Analysis (AS, AS, HA, SO), pp. 1317–1320.
ICPRICPR-v2-2000-ChenW #analysis #segmentation #string #using
Segmentation of Handwritten Connected Numeral String Using Background and Foreground Analysis (YKC, JFW), pp. 2598–2601.
ICPRICPR-v2-2000-FyfeL #analysis #canonical #correlation #network
Canonical Correlation Analysis Neural Networks (CF, PLL), pp. 2977–2980.
ICPRICPR-v2-2000-GhaderiW #analysis
Circular ECOC: A Theoretical and Experimental Analysis (RG, TW), pp. 2203–2206.
ICPRICPR-v2-2000-HiraokaHHMMY #algorithm #analysis #learning #linear
Successive Learning of Linear Discriminant Analysis: Sanger-Type Algorithm (KH, KiH, MH, HM, TM, SY), pp. 2664–2667.
ICPRICPR-v2-2000-LiLT #analysis #cumulative #image
Image Analysis by Accumulative Hopfield Matching (WJL, TL, HTT), pp. 2442–2445.
ICPRICPR-v2-2000-MenardDC #ambiguity #analysis #distance #modelling #using
Switching Regression Models Using Ambiguity and Distance Rejects: Application to Ionogram Analysis (MM, PAD, VC), pp. 2688–2691.
ICPRICPR-v2-2000-PerantonisPV #analysis #classification #component #paradigm #using
Supervised Principal Component Analysis Using a Smooth Classifier Paradigm (SJP, SP, VV), pp. 2109–2112.
ICPRICPR-v2-2000-Schulerud #analysis #bias #fault #feature model #linear
Bias of Error Rates in Linear Discriminant Analysis Caused by Feature Selection and Sample Size (HS), pp. 2372–2377.
ICPRICPR-v2-2000-SmitsA #cost analysis #image #interactive #set
Cost-Based Feature Subset Selection for Interactive Image Analysis (PCS, AA), pp. 2386–2389.
ICPRICPR-v2-2000-UnsalanE #analysis #linear
Shapes of Features and a Modified Measure for Linear Discriminant Analysis (, AE), pp. 2410–2413.
ICPRICPR-v2-2000-Zhao00a #analysis #performance
Performance Perturbation Analysis of Eigen-Systems (WYZ), pp. 2105–2108.
ICPRICPR-v2-2000-Zhao00b #analysis #component #recognition
Discriminant Component Analysis for Face Recognition (WYZ), pp. 2818–2821.
ICPRICPR-v3-2000-ChoiL #analysis #distance
Stability Analysis of Medial Axis Transform under Relative Hausdorff Distance (SWC, SWL), pp. 3139–3142.
ICPRICPR-v3-2000-DoelVHVYGK #analysis #metric
Nanometer-Scale Height Measurements in Micromachined Picoliter Vials Based on Interference Fringe Analysis (LRVdD, LJvV, KTH, MJV, ITY, FG, JGK), pp. 3057–3062.
ICPRICPR-v3-2000-FukuiIIW #analysis #component #using
Sign of Gaussian Curvature from Eigen Plane Using Principal Components Analysis (SF, YI, AI, RJW), pp. 3807–3810.
ICPRICPR-v3-2000-Garcia-SevillaP #analysis #case study #comparative
Analysis of Irregularly Shaped Texture Regions: A Comparative Study (PGS, MP), pp. 7080–7083.
ICPRICPR-v3-2000-HuangCH00a #2d #analysis #pseudo
Local Spectra Features Extraction Based-On 2D Pseudo-Wigner Distribution for Texture Analysis (ZH, KLC, YH), pp. 3925–3928.
ICPRICPR-v3-2000-LiK #ambiguity #analysis #detection
Detection of Cognitive Binding During Ambiguous Figure Tasks by Wavelet Coherence Analysis of EEG Signals (THL, WRK), pp. 3098–3101.
ICPRICPR-v3-2000-LuM #analysis #symmetry
Computer Analysis of Rotational Symmetry in CBED Patterns (QY, HL, SM), pp. 3754–3757.
ICPRICPR-v3-2000-PagetL #analysis #markov #parametricity #random #testing
Nonparametric Markov Random Field Model Analysis of the MeasTex Test Suite (RP, IDL), pp. 3939–3942.
ICPRICPR-v3-2000-Rahmann #analysis #geometry #image
Polarization Images: A Geometric Interpretation for Shape Analysis (SR), pp. 3542–3546.
ICPRICPR-v3-2000-ValdesME #analysis #behaviour #case study #image
Behavior Analysis of Fractal Features for Texture Description in Digital Images: An Experimental Study (JJV, LCM, SE), pp. 3917–3920.
ICPRICPR-v3-2000-VassZ #analysis #component #fault #image #performance
Enhanced Significance-Linked Connected Component Analysis for High Performance Error Resilient Wavelet Image Coding (JV, XZ), pp. 3075–3078.
ICPRICPR-v3-2000-WilkinsonRDB #analysis #using
Diatom Contour Analysis Using Morphological Curvature Scale Spaces (MHFW, JBTMR, SD, MB), pp. 3656–3659.
ICPRICPR-v3-2000-ZhangGST #adaptation #analysis #modelling #using
Model-Based Nonrigid Motion Analysis Using Natural Feature Adaptive Mesh (YZ, DBG, SS, LVT), pp. 3839–3843.
ICPRICPR-v4-2000-KawataNOKKKMMNE #analysis
Computerized Analysis of Pulmonary Nodules in Topological and Histogram Feature Spaces (YK, NN, HO, RK, MK, MK, NM, KM, HN, KE), pp. 4332–4335.
ICPRICPR-v4-2000-KopilovicVS #analysis #detection #lens
Application of Panoramic Annular Lens for Motion Analysis Tasks: Surveillance and Smoke Detection (IK, BV, TS), pp. 4714–4717.
ICPRICPR-v4-2000-Leavers #analysis #using
Analysis of Wear Particles Using the Radon Transform (VFL), pp. 4764–4766.
ICPRICPR-v4-2000-OkunP #analysis #automation #documentation #evaluation #generative #layout
Automatic Ground-Truth Generation for Skew-Tolerance Evaluation of Document Layout Analysis Methods (OO, MP), pp. 4376–4379.
ICPRICPR-v4-2000-RyuLK #analysis #documentation #geometry #independence #layout
Parameter-Independent Geometric Document Layout Analysis (DSR, SWL, SMK), pp. 4397–4400.
ICPRICPR-v4-2000-WatanabeOIK #analysis #video
Discourse Structure Analysis for News Video by Checking Surface Information in the Transcript (YW, YO, EI, SK), pp. 4242–4245.
ICPRICPR-v4-2000-WatanabeS #analysis #documentation #layout
Layout Analysis of Complex Documents (TW, TS), pp. 4447–4450.
ICPRICPR-v4-2000-XuGMC #analysis #performance #retrieval
Performance Analysis in Content-Based Retrieval with Textures (KX, BG, PM, DC), pp. 4275–4278.
ICPRICPR-v4-2000-Zheng #analysis #flexibility
A Flexible Laser Range Sensor Based on Spatial-temporal Analysis (JYZ), pp. 4740–4743.
KDDKDD-2000-BecherBF #automation #data analysis #data mining #mining #performance
Automating exploratory data analysis for efficient data mining (JDB, PB, EF), pp. 424–429.
KDDKDD-2000-TalbertF #analysis #empirical
An empirical analysis of techniques for constructing and searching k-dimensional trees (DAT, DHF), pp. 26–33.
UMLUML-2000-PickinM #analysis #uml
Describing AI Analysis Patterns with UML (SP, AMR), pp. 466–481.
OOPSLAOOPSLA-2000-LujanFG #algebra #analysis #design #linear #named #object-oriented
OoLALA: an object oriented analysis and design of numerical linear algebra (ML, TLF, JRG), pp. 229–252.
TOOLSTOOLS-ASIA-2000-YeDD #analysis #design #development #object-oriented
Application of Object-Oriented Analysis and Design in CDMA BSS Development (WY, YD, WD), pp. 73–80.
TOOLSTOOLS-ASIA-2000-YuSYM #analysis #object-oriented
Improving Object Oriented Analysis by Explicit Change Analysis (LY, CKS, XY, YM), pp. 2–7.
TOOLSTOOLS-PACIFIC-2000-SkevoulisJ #detection #fault #invariant #java #runtime #source code #static analysis
Generic Invariant-Based Static Analysis Tool for Detection of Runtime Errors in Java Programs (SS, XJ), pp. 36–44.
TOOLSTOOLS-USA-2000-HindP #case study #experience #object-oriented #program analysis
Traveling Through Dakota: Experiences with an Object-Oriented Program Analysis System (MH, AP), pp. 49–60.
TOOLSTOOLS-USA-2000-LeeOA #algorithm #analysis #object-oriented
Algorithmic Analysis of the Impacts of Changes to Object-Oriented Software (ML, AJO, RTA), pp. 61–70.
TOOLSTOOLS-USA-2000-YacoubA #analysis #approach #composition #design pattern
Pattern-Oriented Analysis and Design (POAD): A Structural Composition Approach to Glue Design Patterns (SMY, HHA), p. 273–?.
GPCEGCSE-2000-Bruin #analysis #component #composition
Scenario-Based Analysis of Component Compositions (HdB), pp. 129–146.
LOPSTRLOPSTR-2000-BuenoBHMPS #analysis #compilation #optimisation
A model for inter-module analysis and optimizing compilation (FB, MJGdlB, MVH, KM, GP, PJS).
LOPSTRLOPSTR-2000-SerebrenikS #analysis #logic programming #source code #termination
Non-tranformational termination analysis of logic programs, based on general term-orderings (AS, DDS).
LOPSTRLOPSTR-2000-VanhoofB #analysis #composition #higher-order #towards
Towards a modular binding-time analysis for higher-order Mercury (WV, MB).
LOPSTRLOPSTR-J-2000-BuenoBHMPS #analysis #compilation #optimisation
A Model for Inter-module Analysis and Optimizing Compilation (FB, MJGdlB, MVH, KM, GP, PJS), pp. 86–102.
LOPSTRLOPSTR-J-2000-SerebrenikS #analysis #logic programming #source code #termination
Non-transformational Termination Analysis of Logic Programs, Based on General Term-Orderings (AS, DDS), pp. 69–85.
PPDPPPDP-2000-BagnaraZH #analysis #evaluation
Enhanced sharing analysis techniques: a comprehensive evaluation (RB, EZ, PMH), pp. 103–114.
PPDPPPDP-2000-CalcagnoIO #alias #analysis #hoare #logic #pointer #semantics
Semantic analysis of pointer aliasing, allocation and disposal in Hoare logic351292 (CC, SSI, PWO), pp. 190–201.
PPDPPPDP-2000-Lu #analysis #logic programming #precise #source code
A precise type analysis of logic programs (LL), pp. 214–225.
GPCESAIG-2000-FischerSP #data analysis #generative #modelling #source code #statistics
Generating Data Analysis Programs from Statistical Models (BF, JS, TP), pp. 212–229.
PADLPADL-2000-HuCT #algorithm #analysis #data mining #mining
Calculating a New Data Mining Algorithm for Market Basket Analysis (ZH, WNC, MT), pp. 169–184.
PADLPADL-2000-MarinoM #functional #logic programming #source code #static analysis #using
Using Static Analysis to Compile Non-sequential Functional Logic Programs (JM, JJMN), pp. 63–80.
POPLPOPL-2000-CharatonikPT #program analysis
Paths vs. Trees in Set-Based Program Analysis (WC, AP, JMT), pp. 330–337.
POPLPOPL-2000-HeintzeJV #analysis #framework #verification
A Framework for Combining Analysis and Verification (NH, JJ, RV), pp. 26–39.
POPLPOPL-2000-NielsonN #analysis #mobile
Shape Analysis for Mobile Ambients (HRN, FN), pp. 142–154.
REICRE-2000-AlcazarM #analysis #framework #process #requirements #specification
A Process Framework for Requirements Analysis and Specification (EGA, AM), p. 27–?.
REICRE-2000-DayJ #analysis #framework #multi #requirements #specification
A Framework for Multi-Notation Requirements Specification and Analysis (NAD, JJJ), pp. 39–48.
REICRE-2000-KnottMP #analysis #behaviour #modelling #object-oriented #process #using
Process Modeling for Object Oriented Analysis Using BORM Object Behavioral Analysis (RPK, VM, JP), pp. 7–16.
SACSAC-2000-AlhamedL #analysis #approach #clustering #multi #using
A Clustering Approach to Multi-Model Ensemble Analysis Using SAMEX Data (AA, SL), pp. 111–116.
SACSAC-2000-BaldwinMP #analysis #feature model #semantics
Semantic Discrimination Analysis for Feature Selection (JFB, TPM, CP), pp. 519–523.
SACSAC-2000-BodlaenderRS #analysis #design #named
TRAnD: Temporal Requirement Analysis and Design Tool (MPB, AHLR, PDVvdS), pp. 882–886.
SACSAC-2000-BoujarwahSA #analysis #data flow #java #source code #testing #using
Testing Java Programs Using Dynamic Data Flow Analysis (ASB, KS, JAD), pp. 725–727.
SACSAC-2000-LenartSG #analysis #constant
SSA-based Flow-sensitive Type Analysis: Combining Constant and Type Propagation (AL, CS, SKSG), pp. 813–817.
ICSEFoSE-2000-JacksonR #analysis #roadmap
Software analysis: a roadmap (DJ, MCR), pp. 133–145.
ICSEICSE-2000-AndrewsZ #analysis
Broad-spectrum studies of log file analysis (JHA, YZ), pp. 105–114.
ICSEICSE-2000-GannodL #analysis #approach #architecture #product line
An approach to architectural analysis of product lines (GCG, RRL), pp. 548–557.
ICSEICSE-2000-HayesGM #component #design #program analysis #reuse #tool support
Component design of retargetable program analysis tools that reuse intermediate representations (JH, WGG, SM), pp. 356–365.
ICSEICSE-2000-LeszakPS #analysis #case study #fault
A case study in root cause defect analysis (ML, DEP, DS), pp. 428–437.
SPLCSPLC-2000-KishiN #analysis #architecture #aspect-oriented #product line
Aspect-oriented analysis for product line architecture (TK, NN), pp. 135–146.
ASPLOSASPLOS-2000-RedstoneEL #analysis #architecture #behaviour #operating system #parallel #thread
An Analysis of Operating System Behavior on a Simultaneous Multithreaded Architecture (JR, SJE, HML), pp. 245–256.
CCCC-2000-GayS #analysis #performance #source code #stack
Fast Escape Analysis and Stack Allocation for Object-Based Programs (DG, BS), pp. 82–93.
CCCC-2000-LinP #analysis #array #compilation #optimisation
Analysis of Irregular Single-Indexed Array Accesses and Its Applications in Compiler Optimizations (YL, DAP), pp. 202–218.
CCCC-2000-WilhelmSR #analysis
Shape Analysis (RW, SS, TWR), pp. 1–17.
HPCAHPCA-2000-BoschSSRH #analysis #case study #parallel #performance #using #visualisation
Performance Analysis and Visualization of Parallel Systems Using SimOS and Rivet: A Case Study (RB, CS, GS, MR, PH), pp. 360–371.
HPCAHPCA-2000-HaungsSF #analysis #branch #classification #metric
Branch Transition Rate: A New Metric for Improved Branch Classification Analysis (MH, PS, MKF), pp. 241–250.
CAVCAV-2000-AlurGM #analysis #performance #reachability
Efficient Reachability Analysis of Hierarchical Reactive Machines (RA, RG, MM), pp. 280–295.
CAVCAV-2000-BaierHHK #analysis #markov #model checking
Model Checking Continuous-Time Markov Chains by Transient Analysis (CB, BRH, HH, JPK), pp. 358–372.
CAVCAV-2000-DangIBKS #analysis #automaton #reachability
Binary Reachability Analysis of Discrete Pushdown Timed Automata (ZD, OHI, TB, RAK, JS), pp. 69–84.
CAVCAV-2000-FraerKZVF #analysis #performance #reachability #traversal #verification
Prioritized Traversal: Efficient Reachability Analysis for Verification and Falsification (RF, GK, BZ, MYV, LF), pp. 389–402.
CAVCAV-2000-HeymanGGS #analysis #parallel #reachability #scalability
Achieving Scalability in Parallel Reachability Analysis of Very Large Circuits (TH, DG, OG, AS), pp. 20–35.
CAVCAV-2000-Meadows #analysis #encryption #formal method #protocol
Invited Address: Applying Formal Methods to Cryptographic Protocol Analysis (CM), p. 2.
ICLPCL-2000-BraileyPN #analysis #approach #database #termination
A Dynamic Approach to Termination Analysis for Active Database Rules (JB, AP, PN), pp. 1106–1120.
ICLPCL-2000-DebrayH #analysis #constraints #database #termination
Constraint-Based Termination Analysis for Cyclic Active Database Rules (SKD, TJH), pp. 1121–1136.
ICLPCL-2000-FerreR #concept analysis #file system
A File System Based on Concept Analysis (SF, OR), pp. 1033–1047.
ICLPCL-2000-Gervas #analysis #logic programming
A Logic Programming Application for the Analysis of Spanish Verse (PG), pp. 1330–1344.
ICLPCL-2000-MancarellaNRT #analysis #declarative #named
MuTACLP: A Language for Declarative GIS Analysis (PM, GN, AR, FT), pp. 1002–1016.
ICLPCL-2000-MazurJB #analysis #memory management #reuse
A Module Based Analysis for Memory Reuse in Mercury (NM, GJ, MB), pp. 1255–1269.
CSLCSL-2000-Schuster #analysis
Elementary Choiceless Constructive Analysis (PS), pp. 512–526.
ISSTAISSTA-2000-BhargavanGKLOSV #analysis #formal method #named #network #simulation
Verisim: Formal analysis of network simulations (KB, CAG, MK, IL, DO, OS, MV), pp. 2–13.
ISSTAISSTA-2000-HindP #analysis #pointer #question
Which pointer analysis should I use? (MH, AP), pp. 113–123.
ISSTAISSTA-2000-KolanoK #analysis #classification #realtime
Classification schemes to aid in the analysis of real-time systems (PZK, RAK), pp. 86–95.
ISSTAISSTA-2000-Lev-AmiRSW #case study #static analysis #verification
Putting static analysis to work for verification: A case study (TLA, TWR, SS, RW), pp. 26–38.
ISSTAISSTA-2000-Pincus #analysis #case study #developer #experience #tool support
Analysis is necessary, but far from sufficient: Experiences building and deploying successful tools for developers and testers (abstract only) (JDP), p. 1.
ISSTAISSTA-2000-SchroederK #analysis #black box #reduction #using
Black-box test reduction using input-output analysis (PJS, BK), pp. 173–177.
LICSLICS-2000-AehligS #analysis #polynomial
A Syntactical Analysis of Non-Size-Increasing Polynomial Time Computation (KA, HS), pp. 84–91.
RTARTA-2000-OhlebuschCM #analysis #logic programming #named #source code #termination
TALP: A Tool for the Termination Analysis of Logic Programs (EO, CC, CM), pp. 270–273.
WICSAWICSA-1999-JaktmanLL #analysis #architecture #assessment #case study #maintenance
Structural Analysis of the Software Architecture — A Maintenance Assessment Case Study (CBJ, JL, ML), pp. 455–470.
WICSAWICSA-1999-MageeKG #analysis #architecture #behaviour
Behaviour Analysis of Software Architectures (JM, JK, DG), pp. 35–50.
ASEASE-1999-Brackin #analysis #automation #effectiveness #encryption #implementation #protocol
Implementing Effective Automatic Cryptographic Protocol Analysis (SHB), pp. 319–322.
ASEASE-1999-MaleticV #analysis #automation #clustering #semantics
Automatic Software Clustering via Latent Semantic Analysis (JIM, NV), pp. 251–254.
ASEASE-1999-Saidi #analysis #composition #concurrent #incremental
Modular and Incremental Analysis of Concurrent Software Systems (HS), pp. 92–101.
ASEASE-1999-WatersRA #architecture #concept analysis #using
Architectural Element Matching Using Concept Analysis (RW, SR, GDA), pp. 291–294.
DACDAC-1999-DaemsGS #analysis #complexity #reduction
Circuit Complexity Reduction for Symbolic Analysis of Analog Integrated Circuits (WD, GGEG, WMCS), pp. 958–963.
DACDAC-1999-JiangC #analysis #performance #power management
Analysis of Performance Impact Caused by Power Supply Noise in Deep Submicron Devices (YMJ, KTC), pp. 760–765.
DACDAC-1999-KamonMMSW #3d #analysis #modelling
Interconnect Analysis: From 3-D Structures to Circuit Models (MK, NAM, YM, LMS, JW), pp. 910–914.
DACDAC-1999-LiuPS #analysis
Model Order-Reduction of RC(L) Interconnect Including Variational Analysis (YL, LTP, AJS), pp. 201–206.
DACDAC-1999-YalcinMPBS #analysis #functional
Functional Timing Analysis for IP Characterization (HY, MM, RP, CB, KAS), pp. 731–736.
DATEDATE-1999-Holzheuer #analysis #how #process
How to use Knowledge in an Analysis Process (HH), pp. 498–502.
DATEDATE-1999-HongB #analysis #finite #reachability #scalability #state machine #using
Symbolic Reachability Analysis of Large Finite State Machines Using Don’t Cares (YH, PAB), p. 13–?.
DATEDATE-1999-JantschKH #analysis #case study #concept #modelling #synthesis
The Rugby Model: A Conceptual Frame for the Study of Modelling, Analysis and Synthesis Concepts of Electronic Systems (AJ, SK, AH), pp. 256–262.
DATEDATE-1999-NovakHK #analysis #on the
On Analog Signature Analysis (FN, BH, SK), p. 249–?.
DATEDATE-1999-RadetzkiSPN #analysis #data type #hardware #modelling #object-oriented #synthesis
Data Type Analysis for Hardware Synthesis from Object-Oriented Models (MR, AS, WPR, WN), p. 491–?.
HTHT-1999-ChenC #analysis #hypermedia
Trailblazing the Literature of Hypertext: Author Co-Citation Analysis (1989-1998) (CC, LC), pp. 51–60.
HTHT-1999-Lange #analysis #hypermedia #tool support
Hypermedia Potentials for Analysis Support Tools (DSL), pp. 165–166.
HTHT-1999-Rety #analysis #hypermedia
Structure Analysis for Hypertext with Conditional Linkage (JHR), pp. 135–136.
ICDARICDAR-1999-AltamuraEM #adaptation #analysis #documentation #interactive
WISDOM++: An Interactive and Adaptive Document Analysis System (OA, FE, DM), pp. 366–369.
ICDARICDAR-1999-AntonacopoulosB #algorithm #analysis #flexibility #performance #segmentation
Methodology for Flexible and Efficient Analysis of the Performance of Page Segmentation Algorithms (AA, AB), pp. 451–454.
ICDARICDAR-1999-AntonacopoulosC #analysis #comparative #representation #using
Region Description and Comparative Analysis using a Tesseral Representation (AA, FC), pp. 193–196.
ICDARICDAR-1999-ChangLTH #analysis #documentation #image #multi #using
Binarization of Document Images using Hadamard Multiresolution Analysis (FC, KHL, TMT, WLH), pp. 157–160.
ICDARICDAR-1999-ChaSS #algorithm #analysis #approximate #recognition #sequence #string
Approximate Stroke Sequence String Matching Algorithm for Character Recognition and Analysis (SHC, YCS, SNS), pp. 53–56.
ICDARICDAR-1999-CracknellD #agile #analysis #comprehension #documentation #prototype #research
A Handwriting Understanding Environment (HUE) for Rapid Prototyping in Handwriting and Document Analysis Research (CC, ACD), pp. 362–365.
ICDARICDAR-1999-Faure #analysis #documentation #image
Preattentive Reading and Selective Attention for Document Image Analysis (CF), pp. 577–580.
ICDARICDAR-1999-FukudaSTXS #analysis
A Technique of Mathematical Expression Structure Analysis for the Handwriting Input System (RF, IS, FT, MX, MS), pp. 131–134.
ICDARICDAR-1999-HitzRI #analysis #documentation #image
Analysis of Synthetic Document Images (OH, LR, RI), pp. 374–377.
ICDARICDAR-1999-Ishitani #analysis #documentation #image #logic
Logical Structure Analysis of Document Images based on Emergent Computation (YI), pp. 189–192.
ICDARICDAR-1999-JunkerDH #analysis #component #documentation #evaluation #on the #precise
On the Evaluation of Document Analysis Components by Recall, Precision, and Accuracy (MJ, AD, RH), pp. 713–716.
ICDARICDAR-1999-LebourgeoisE #analysis #documentation #using
Document Analysis in Gray Level and Typography Extraction using Character Pattern Redundancies (FL, HE), pp. 177–180.
ICDARICDAR-1999-SrihariYG #analysis #automation
Information Theoretic Analysis of Postal Address Fields for Automatic Address Interpretation (SNS, WjY, VG), pp. 309–312.
ICDARICDAR-1999-SteinherzIR #analysis #component #detection
Skew Detection via Principal Components Analysis (TS, NI, ER), pp. 153–156.
ICDARICDAR-1999-Thoma #analysis #automation #database #documentation #image #online
Automating Data Entry for an On-line Biomedical Database: A Document Image Analysis Application (GRT), pp. 370–373.
ICDARICDAR-1999-XingyuanGDO #analysis #robust
A Robust Method for Unknown Forms Analysis (XL, WG, DSD, WGO), pp. 531–534.
ICDARICDAR-1999-ZhuTW #analysis #recognition
Font Recognition based on Global Texture Analysis (YZ, TT, YW), pp. 349–352.
PODSPODS-1999-KleinbergT #algebra #analysis #hypermedia #information retrieval #linear
Applications of Linear Algebra in Information Retrieval and Hypertext Analysis (JMK, AT), pp. 185–193.
CSEETCSEET-1999-Hislop #analysis #online
An Online Systems Analysis Course (GWH), pp. 138–144.
CSEETCSEET-1999-MengelU #analysis #case study #source code #student
A Case Study of the Analysis of Novice Student Programs (SAM, JVU), pp. 40–49.
ESOPESOP-1999-KingSH #analysis #dependence
Quotienting Share for Dependency Analysis (AK, JGS, PMH), pp. 59–73.
ESOPESOP-1999-NielsonN #analysis #control flow #interprocedural
Interprocedural Control Flow Analysis (FN, HRN), pp. 20–39.
ESOPESOP-1999-PodelskiCM #analysis #concurrent #constraints #logic programming #source code
Set-Based Failure Analysis for Logic Programs and Concurrent Constraint Programs (AP, WC, MM), pp. 177–192.
FoSSaCSFoSSaCS-1999-BodeiDNN #process #static analysis
Static Analysis of Processes for No and Read-Up and No Write-Down (CB, PD, FN, HRN), pp. 120–134.
FoSSaCSFoSSaCS-1999-EsparzaK #analysis #approach #data flow #interprocedural
An Automata-Theoretic Approach to Interprocedural Data-Flow Analysis (JE, JK), pp. 14–30.
TACASTACAS-1999-BakhmurovKS #analysis #design #embedded #named
DYANA: An Environment for Embedded System Design and Analysis (AGB, APK, RLS), pp. 390–404.
TACASTACAS-1999-BergeronM #analysis #automation #email #interactive
An Automated Analysis of Ping-Pong Interactions in E-mail Services (AB, JCM), pp. 134–147.
TACASTACAS-1999-BuchholzK #analysis #composition #distributed #tool support
Modular State Level Analysis of Distributed Systems Techniques and Tool Support (PB, PK), pp. 420–434.
TACASTACAS-1999-MarchignoliM #analysis #automation #composition #encryption #protocol #verification
Automatic Verification of Cryptographic Protocols through Compositional Analysis Techniques (DM, FM), pp. 148–162.
TACASTACAS-1999-RusuS #abstraction #on the #proving #safety #static analysis #theorem proving
On Proving Safety Properties by Integrating Static Analysis, Theorem Proving and Abstraction (VR, ES), pp. 178–192.
TACASTACAS-1999-SpeltE #analysis #database #object-oriented #theorem proving
A Theorem Prover-Based Analysis Tool for Object-Oriented Databases (DS, SE), pp. 375–389.
CSMRCSMR-1999-JahnkeW #analysis #information management #integration #process #re-engineering
Integration of Analysis and Redesign Activities in Information System Reengineering (JHJ, JPW), pp. 160–168.
ICSMEICSM-1999-Agrawal #analysis #data flow #graph
Simultaneous Demand-Driven Data-Flow and Call Graph Analysis (GA), pp. 453–462.
ICSMEICSM-1999-BriandWL #impact analysis #metric #object-oriented #using
Using Coupling Measurement for Impact Analysis in Object-Oriented Systems (LCB, JW, HL), pp. 475–482.
ICSMEICSM-1999-LiF #impact analysis #realtime
Impact Analysis in Real-Time Control Systems (JL, PHF), pp. 443–452.
IWPCIWPC-1999-MayrhauserL #maintenance #on the #static analysis
On the Role of Static Analysis during Software Maintenance (AvM, SL), pp. 170–177.
PASTEPASTE-1999-ChoiGHS #analysis #exception #java #modelling #performance #precise #source code
Efficient and Precise Modeling of Exceptions for the Analysis of Java Programs (JDC, DG, MH, VS), pp. 21–31.
PASTEPASTE-1999-LiangH #analysis #data flow #equivalence #performance #pointer
Equivalence Analysis: A General Technique to Improve the Efficiency of Data-flow Analyses in the Presence of Pointers (DL, MJH), pp. 39–46.
PASTEPASTE-1999-NaumovichCC #analysis #data flow #partial order #performance #using #verification
Using Partial Order Techniques to Improve Performance of Data Flow Analysis Based Verification (GN, LAC, JMC), pp. 57–65.
PASTEPASTE-1999-SouterPH #analysis
Inter-Class Def-Use Analysis with Partial Class Representations (ALS, LLP, DH), pp. 47–56.
PASTEPASTE-1999-WhitingH #analysis #monitoring #safety
Safety Analysis of Hawk in Flight Monitor (LW, MH), pp. 32–38.
WCREWCRE-1999-BalazinskaMDLK #analysis #java
Partial Redesign of Java Software Systems Based on Clone Analysis (MB, EM, MD, BL, KK), pp. 326–336.
WCREWCRE-1999-CimitileFV #empirical #impact analysis #validation
A Software Model for Impact Analysis: A Validation Experiment (AC, ARF, GV), p. 212–?.
PLDIPLDI-1999-BodikGS #analysis #design #evaluation
Load-Reuse Analysis: Design and Evaluation (RB, RG, MLS), pp. 64–76.
PLDIPLDI-1999-RuginaR #analysis #parallel #pointer #source code #thread
Pointer Analysis for Multithreaded Programs (RR, MCR), pp. 77–90.
PLDIPLDI-1999-YongHR #analysis #pointer #source code
Pointer Analysis for Programs with Structures and Casting (SHY, SH, TWR), pp. 91–103.
SASSAS-1999-Asai #analysis
Binding-Time Analysis for Both Static and Dynamic Expressions (KA), pp. 117–133.
SASSAS-1999-BessonJT #analysis
Polyhedral Analysis for Synchronous Languages (FB, TPJ, JPT), pp. 51–68.
SASSAS-1999-BozgaFG #analysis #reduction
State Space Reduction Based on Live Variables Analysis (MB, JCF, LG), pp. 164–178.
SASSAS-1999-HillS #analysis #linear #refinement
Freeness Analysis Through Linear Refinement (PMH, FS), pp. 85–100.
SASSAS-1999-McAllester #analysis #complexity #on the
On the Complexity Analysis of Static Analyses (DAM), pp. 312–329.
SASSAS-1999-Soffa #analysis #data flow #named #precise #scalability #tutorial
Tutorial: Techniques to Improve the Scalability and Precision of Data Flow Analysis (MLS), pp. 355–356.
SASSAS-1999-Weise #static analysis
Static Analysis of Mega-Programs (DW), pp. 300–302.
FLOPSFLOPS-1999-HanusL #functional #logic #program analysis #semantics
A Semantics for Program Analysis in Narrowing-Based Functional Logic Languages (MH, SL), pp. 353–368.
FLOPSFLOPS-1999-RidouxBM #prolog #static analysis
Typed Static Analysis: Application to Groundness Analysis of PROLOG and λ-PROLOG (OR, PB, FM), pp. 267–283.
FLOPSFLOPS-1999-VerbaetenS #analysis #logic programming #source code #termination #using
Termination Analysis of Tabled Logic Programs Using Mode and Type Information (SV, DDS), pp. 163–178.
CIAAWIA-1999-BergeronC #analysis
Analysis of Reactive Systems with n Timers (AB, RC), pp. 27–38.
CIAAWIA-1999-CaludeSY #analysis #metric
Metric Lexical Analysis (CC, KS, SY), pp. 48–59.
FMFM-v1-1999-AlurEKKL #analysis #case study #coordination #formal method #hybrid #modelling #multi
Formal Modeling and Analysis of Hybrid Systems: A Case Study in Multi-robot Coordination (RA, JME, MK, VK, IL), pp. 212–232.
FMFM-v1-1999-KestenKPR #analysis #deduction #model checking #verification
A Perfect Verification: Combining Model Checking with Deductive Analysis to Verify Real-Life Software (YK, AK, AP, GR), pp. 173–194.
FMFM-v1-1999-LincolnMMS #analysis #equivalence #polynomial #probability #security
Probabilistic Polynomial-Time Equivalence and Security Analysis (PL, JCM, MM, AS), pp. 776–793.
FMFM-v1-1999-ZhouC #analysis #communication #formal method #protocol
Formal Analysis of a Secure Communication Channel: Secure Core-Email Protocol (DZ, SKC), pp. 758–775.
FMFM-v2-1999-SereT #analysis #safety #specification
Safety Analysis in Formal Specification (KS, ET), pp. 1564–1583.
ICFPICFP-1999-CraryW #analysis #flexibility
Flexible Type Analysis (KC, SW), pp. 233–248.
AGTIVEAGTIVE-1999-BaresiP #analysis #graph grammar #programmable
A Formal Definition of Stuctured Analysis with Programmable Graph Grammars (LB, MP), pp. 193–208.
CHICHI-1999-BruckmanE #analysis #fault #programming language
Should we Leverage Natural-Language Knowledge? An Analysis of User Errors in a Natural-Language-Style Programming Language (AB, EE), pp. 207–214.
CHICHI-1999-QuintanaECWS #analysis #case study #design #named #process
Symphony: A Case Study in Extending Learner-Centered Design through Process Space Analysis (CQ, JE, AC, HKW, ES), pp. 473–480.
CHICHI-1999-Soto #analysis #learning #quality #semantics
Learning and Performing by Exploration: Label Quality Measured by Latent Semantic Analysis (RS), pp. 418–425.
HCIHCI-CCAD-1999-Callantine #analysis #performance #visualisation
Visualization and analysis of flight crew procedure performance (TJC), pp. 1281–1285.
HCIHCI-CCAD-1999-MajoeH #analysis #gesture #recognition
Human gesture analysis and recognition for medical and dance applications (DM, NH), pp. 818–822.
HCIHCI-CCAD-1999-McNeese #analysis #learning #metric #performance #process #protocol
Making sense of teamwork: the use of protocol analysis / performance measures to reveal cooperative work processes in a situated learning environment (MDM), pp. 502–506.
HCIHCI-CCAD-1999-WatanabeO #analysis #communication #interactive #synthesis
Virtual face-to-face communication system for human interaction analysis by synthesis (TW, MO), pp. 182–186.
HCIHCI-EI-1999-KuzniarzP #analysis #design #object-oriented #towards
Towards Complex Object Oriented Analysis and Design (LK, MP), pp. 1257–1261.
HCIHCI-EI-1999-NoldusKHD #analysis #tool support
Software Tools for Collection and Analysis of Observational Data (LN, AK, WtH, RD), pp. 1114–1118.
HCIHCI-EI-1999-TokudaMTL #analysis #development #requirements #user interface
A New Integrated Support Environment for Requirements Analysis of User Interface Development (YT, TM, YT, ESL), pp. 895–899.
HCIHCI-EI-1999-Urokohara #analysis #design #usability #user interface #using
Method to Build Good Usability: Task Analysis and User Interface Design Using Operation Flowcharts (HU), pp. 928–932.
AdaSIGAda-1999-Colket #analysis #realtime #using
Code analysis of saftey-critical and real-time software using ASIS (WCC), pp. 67–76.
CAiSECAiSE-1999-GreenR #analysis #modelling #ontology #process
An Ontological Analysis of Integrated Process Modelling (PFG, MR), pp. 225–240.
CAiSECAiSE-1999-Wietek #data analysis #modelling #multi #visual notation
Modelling Multidimensional Data in a Dataflow-Based Visual Data Analysis Environment (FW), pp. 149–163.
ICEISICEIS-1999-AbeT #analysis #development #process #scheduling
IDEFO-Based Software Process Analysis for Scheduling Systems Development (AA, TT), pp. 361–370.
ICEISICEIS-1999-BarjisD #analysis #modelling #network #process #using
Business Process Modelling and Analysis Using GERT Networks (JB, JLGD), pp. 748–758.
ICEISICEIS-1999-Cheng #analysis #realtime #verification
Analysis and Verification of Real-Time Systems (AMKC), p. X.
ICEISICEIS-1999-Gustas #analysis #approach #enterprise #information management
Integrated Approach for Information System Analysis at the Enterprise Level (RG), pp. 435–442.
ICEISICEIS-1999-KiniSJ #analysis #visualisation
A System for Analysis & Visualization of Domain Specific Data (SNK, S, KPJ), pp. 82–90.
ICEISICEIS-1999-LiHCHN #analysis #automation #comprehension #documentation
Automatic Document Analysis and Understanding System (XL, JH, ZC, DCDH, PAN), pp. 91–100.
ICEISICEIS-1999-RodriguesRH #analysis
An Intelligent Retail Analysis System (MdFR, CR, PRH), pp. 140–147.
ICEISICEIS-1999-Stamper #analysis #design #paradigm
Information-Field Paradigm and New Directions for Systems Analysis and Design (RKS), p. VI.
ICMLICML-1999-LangleyS #analysis #classification #naive bayes
Tractable Average-Case Analysis of Naive Bayesian Classifiers (PL, SS), pp. 220–228.
ICMLICML-1999-SchefferJ #analysis #fault
Expected Error Analysis for Model Selection (TS, TJ), pp. 361–370.
KDDKDD-1999-BarbaraW #approximate #data analysis #using
Using Approximations to Scale Exploratory Data Analysis in Datacubes (DB, XW), pp. 382–386.
MLDMMLDM-1999-PengB #analysis #image #independence #retrieval
Independent Feature Analysis for Image Retrieval (JP, BB), pp. 103–115.
UMLUML-1999-FirleyHDGG #analysis #case study #diagrams #sequence chart
Timed Sequence Diagrams and Tool-Based Analysis — A Case Study (TF, MH, KD, TG, UG), pp. 645–660.
UMLUML-1999-LiL #analysis #diagrams #sequence chart #uml
Timing Analysis of UML Sequence Diagrams (XL, JL), pp. 661–674.
UMLUML-1999-SendallS #analysis #case study #uml
UML Based Fusion Analysis Applied to a Bank Case Study (SS, AS), pp. 278–291.
OOPSLAOOPSLA-1999-Blanchet #analysis #java #object-oriented
Escape Analysis for Object-Oriented Languages: Application to Java (BB), pp. 20–34.
OOPSLAOOPSLA-1999-ChoiGSSM #analysis #java
Escape Analysis for Java (JDC, MG, MJS, VCS, SPM), pp. 1–19.
OOPSLAOOPSLA-1999-France #analysis #concept #modelling #problem #requirements #uml
A Problem-Oriented Analysis of Basic UML Static Requirements Modeling Concepts (RBF), pp. 57–69.
OOPSLAOOPSLA-1999-Madsen #analysis #semantics
Semantic Analysis of Virtual Classes and Tested Classes (OLM), pp. 114–131.
OOPSLAOOPSLA-1999-WhaleyR #analysis #composition #java #pointer #source code
Compositional Pointer and Escape Analysis for Java Programs (JW, MCR), pp. 187–206.
TOOLSTOOLS-ASIA-1999-Zhou #analysis #assessment #object-oriented #using
Risk Analysis and Assessment Using Object-Oriented Techniques (BZ), pp. 142–145.
TOOLSTOOLS-EUROPE-1999-Collins-Cope #analysis #approach #case study #interface #requirements
The Requirements/Service/Interface (RSI) Approach to Use Case Analysis (MCC), pp. 172–183.
TOOLSTOOLS-EUROPE-1999-MayerH #analysis #metric #object-oriented
Measuring OO Systems: A Critical Analysis of the MOOD Metrics (TM, TH), pp. 108–117.
TOOLSTOOLS-EUROPE-1999-Mitchell99a #analysis #contract #exclamation #uml
Analysis by Contract: UML with Attitude! (RM), p. 407.
TOOLSTOOLS-USA-1999-AlexanderO #analysis #polymorphism #testing
Analysis Techniques for Testing Polymorphic Relationships (RTA, AJO), p. 104–?.
TOOLSTOOLS-USA-1999-Arsanjani #analysis #design #distributed #framework #implementation #java #using
Analysis, Design and Implementation of Distributed Java Business Frameworks Using Domain Patterns (AA), pp. 490–500.
TOOLSTOOLS-USA-1999-Mitchell #analysis #contract #uml
Analysis by Contract or UML with Attitude (RM), p. 465–?.
TOOLSTOOLS-USA-1999-Parnas #analysis #component #documentation #testing #tool support
Tools for Component Documentation, Analysis and Testing (DLP), p. 2.
TOOLSTOOLS-USA-1999-PloschP #analysis #c++ #contract #implementation #named
Contracts: From Analysis to C++ Implementation (RP, JP), pp. 248–257.
GPCEGCSE-1999-BayerMW #analysis
Customizable Domain Analysis (JB, DM, TW), pp. 178–194.
LOPSTRLOPSTR-1999-SmausHK #analysis #logic programming #source code
Mode Analysis Domains for Typed Logic Programs (JGS, PMH, AK), pp. 82–101.
POPLPOPL-1999-PessauxL #analysis #exception #type system
Type-Based Analysis of Uncaught Exceptions (FP, XL), pp. 276–290.
POPLPOPL-1999-RamalingamFT #identification #program analysis
Aggregate Structure Identification and Its Application to Program Analysis (GR, JF, FT), pp. 119–132.
POPLPOPL-1999-SagivRW #analysis #logic #parametricity
Parametric Shape Analysis via 3-Valued Logic (SS, TWR, RW), pp. 105–118.
RERE-1999-VillerS #analysis #process #requirements #social
Social Analysis in the Requirements Engineering Process: From Ethnography to Method (SV, IS), pp. 6–13.
ESECESEC-FSE-1999-Ball #concept #dynamic analysis
The Concept of Dynamic Analysis (TB), pp. 216–234.
ESECESEC-FSE-1999-LiangH #performance #points-to #program analysis
Efficient Points-to Analysis for Whole-Program Analysis (DL, MJH), pp. 199–215.
ESECESEC-FSE-1999-RountevRL #analysis #data flow
Data-Flow Analysis of Program Fragments (AR, BGR, WL), pp. 235–252.
ICSEICSE-1999-ArdisC #analysis #product line
Defining Families — Commonality Analysis (MAA, DAC), pp. 671–672.
ICSEICSE-1999-DeursenK #clustering #concept analysis #identification #using
Identifying Objects Using Cluster and Concept Analysis (AvD, TK), pp. 246–255.
ICSEICSE-1999-KazmanBKCW #analysis #architecture #experience #trade-off
Experience with Performing Architecture Tradeoff Analysis (RK, MB, MK, SJC, SGW), pp. 54–63.
ICSEICSE-1999-KeyesDC #analysis #framework
Analysis of a Scheduler for a CAD Framework (DSK, LKD, MJC), pp. 152–161.
ICSEICSE-1999-Magee #analysis #architecture #behaviour #using
Behavioral Analysis of Software Architectures Using LTSA (JM), pp. 634–637.
ICSEICSE-1999-Mascolo #analysis #mobile #prototype #specification
Specification, Analysis, and Prototyping of Mobile Systems (CM), pp. 724–725.
ICSEICSE-1999-NaumovichAC #analysis #concurrent #data flow #java #source code
Data Flow Analysis for Checking Properties of Concurrent Java Programs (GN, GSA, LAC), pp. 399–410.
ICSEICSE-1999-YurRL #alias #analysis #incremental #pointer
An Incremental Flow- and Context-Sensitive Pointer Aliasing Analysis (JSY, BGR, WL), pp. 442–451.
CCCC-1999-Martin #analysis #comparison #functional #interprocedural #string
Experimental Comparison of call string and functional Approaches to Interprocedural Analysis (FM), pp. 63–75.
HPDCHPDC-1999-LeighJDBG #analysis #collaboration #set
A Methodology for Supporting Collaborative Exploratory Analysis of Massive Data Sets in Tele-Immersive Environments (JL, AEJ, TAD, SB, RLG), pp. 62–69.
LCTESLCTES-1999-Persson #analysis #embedded #garbage collection #memory management
Live Memory Analysis for Garbage Collection in Embedded Systems (PP), pp. 45–54.
PPoPPPPoPP-1999-MoonH #analysis #array #automation #data flow #evaluation #parallel
Evaluation of Predicated Array Data-Flow Analysis for Automatic Parallelization (SM, MWH), pp. 84–95.
PPoPPPPoPP-1999-Sundaram-StukelV #analysis #predict #using
Predictive Analysis of a Wavefront Application using LogGP (DSS, MKV), pp. 141–150.
CADECADE-1999-Weidenbach #analysis #automation #first-order #logic #protocol #security #towards
Towards an Automatic Analysis of Security Protocols in First-Order Logic (CW), pp. 314–328.
CAVCAV-1999-AbdullaABBHL #abstraction #analysis #infinity #reachability #verification
Verification of Infinite-State Systems by Combining Abstraction and Reachability Analysis (PAA, AA, SB, AB, PH, YL), pp. 146–159.
CAVCAV-1999-BehrmannLPWY #analysis #diagrams #difference #performance #reachability #using
Efficient Timed Reachability Analysis Using Clock Difference Diagrams (GB, KGL, JP, CW, WY), pp. 341–353.
CAVCAV-1999-BuchholzK #analysis
A Toolbox for the Analysis of Discrete Event Dynamic Systems (PB, PK), pp. 483–486.
CAVCAV-1999-HermannsMS #analysis #composition #markov #modelling #named #performance #specification
TIPPtool: Compositional Specification and Analysis of Markovian Performance Models (HH, VM, MS), pp. 487–490.
CAVCAV-1999-NamjoshiK #analysis #performance
Efficient Analysis of Cyclic Definitions (KSN, RPK), pp. 394–405.
CAVCAV-1999-Schumann #analysis #authentication #automation #named #protocol
PIL/SETHEO: A Tool for the Automatic Analysis of Authentication Protocols (JS), pp. 500–504.
CSLCSL-1999-DelzannoEP #analysis #constraints #protocol
Constraint-Based Analysis of Broadcast Protocols (GD, JE, AP), pp. 50–66.
CSLCSL-1999-Franzle #analysis #hybrid #infinity
Analysis of Hybrid Systems: An Ounce of Realism Can Save an Infinity of States (MF), pp. 126–140.
ICLPICLP-1999-HermenegildoBPL #debugging #optimisation #preprocessor #program analysis #using
Program Analysis, Debugging, and Optimization Using the Ciao System Preprocessor (MVH, FB, GP, PLG), pp. 52–66.
ICLPICLP-1999-KangT #linear #logic programming #programming language #static analysis
A Static Analysis for Classical Linear Logic Programming Language (KSK, NT), p. 610.
ICLPICLP-1999-LuC #analysis #logic programming #source code
A Regular Type Analysis of Logic Programs (LL, JGC), p. 613.
ICLPICLP-1999-MarinoM #functional #logic programming #source code #static analysis #using
Using Static Analysis to Compile Non-sequential Functional Logic Programs (JM, JJMN), p. 614.
ICLPICLP-1999-VanhoofB #analysis
Binding-time Analysis for Mercury (WV, MB), pp. 500–514.
ICLPICLP-1999-Verbaeten #abduction #analysis #logic programming #source code #termination
Termination Analysis for Abductive General Logic Programs (SV), pp. 365–379.
LICSLICS-1999-BanerjeeHR #analysis #polymorphism #λ-calculus
Region Analysis and the Polymorphic λ Calculus (AB, NH, JGR), pp. 88–97.
LICSLICS-1999-Hofmann #analysis #higher-order #semantics #syntax
Semantical Analysis of Higher-Order Abstract Syntax (MH0), pp. 204–213.
LICSLICS-1999-MalacariaH #game studies #nondeterminism #program analysis #security
Non-Deterministic Games and Program Analysis: An Application to Security (PM, CH), pp. 443–452.
ASEASE-1998-Andrews #analysis #testing #tool support #using
Testing using Log File Analysis: Tools, Methods, and Issues (JHA), p. 157–?.
ASEASE-1998-CzernyH #analysis #automation #requirements
Automated Integrative Analysis of State-based Requirements (BJC, MPEH), p. 125–?.
ASEASE-1998-MorzentiPM #analysis #automation #composition #specification
A Tool for Automated System Analysis based on Modular Specifications (AM, PSP, SM), pp. 2–11.
DACDAC-1998-ChenOIB #analysis #architecture #validation
Validation of an Architectural Level Power Analysis Technique (RYC, RMO, MJI, RSB), pp. 242–245.
DACDAC-1998-DartuP #analysis #named
TETA: Transistor-Level Engine for Timing Analysis (FD, LTP), pp. 595–598.
DACDAC-1998-DharchoudhuryPBVTB #analysis #design #network
Design and Analysis of Power Distribution Networks in PowerPC Microprocessors (AD, RP, DB, RV, BT, DB), pp. 738–743.
DACDAC-1998-GhoshJB #analysis #testing
A BIST Scheme for RTL Controller-Data Paths Based on Symbolic Testability Analysis (IG, NKJ, SB), pp. 554–559.
DACDAC-1998-KishinevskyCK #analysis #interface #specification #synthesis
Asynchronous Interface Specification, Analysis and Synthesis (MK, JC, AK), pp. 2–7.
DACDAC-1998-KrauterM #analysis #layout
Layout Based Frequency Dependent Inductance and Resistance Extraction for On-Chip Interconnect Timing Analysis (BK, SM), pp. 303–308.
DACDAC-1998-KukimotoB #analysis #functional
Hierarchical Functional Timing Analysis (YK, RKB), pp. 580–585.
DACDAC-1998-MalkaZ #analysis #debugging #design #estimation #reliability #statistics
Design Reliability — Estimation through Statistical Analysis of Bug Discovery Data (YM, AZ), pp. 644–649.
DACDAC-1998-NagarajCHY #analysis #approach
A Practical Approach to Static Signal Electromigration Analysis (NSN, FC, HH, DY), pp. 572–577.
DATEDATE-1998-AllaraFSS #analysis #profiling
A Model for System-Level Timed Analysis and Profiling (AA, WF, FS, DS), pp. 204–210.
DATEDATE-1998-BolchiniSS #analysis #concurrent #detection #fault #network
Fault Analysis in Networks with Concurrent Error Detection Properties (CB, FS, DS), pp. 957–958.
DATEDATE-1998-ChandramouliWS #analysis #functional #named
AFTA: A Formal Delay Model for Functional Timing Analysis (VC, JW, KAS), pp. 350–355.
DATEDATE-1998-CoppensAR #analysis #fault #modelling
VHDL Modelling and Analysis of Fault Secure Systems (JC, DAK, CR), pp. 148–152.
DATEDATE-1998-FassnachtS #analysis #optimisation
Timing Analysis and Optimization of a High-Performance CMOS Processor Chipset (UF, JS), pp. 325–331.
DATEDATE-1998-KassabCAK #analysis #constraints
Propagation of Last-Transition-Time Constraints in Gate-Level Timing Analysis (MK, EC, SA, THK), pp. 796–802.
DATEDATE-1998-KimuraI #analysis #design
A Unified Technique for PCB/MCM Design by Combining Electromagnetic Field Analysis with Circuit Simulator (HK, NI), pp. 951–952.
DATEDATE-1998-KoegstGCW #analysis #design #reuse
A Systematic Analysis of Reuse Strategies for Design of Electronic Circuits (MK, DG, PC, MGW), pp. 292–296.
DATEDATE-1998-MirRVH #analysis #fault
Switch-Level Fault Coverage Analysis for Switched-Capacitor Systems (SM, AR, DV, JLH), pp. 810–814.
DATEDATE-1998-OlcozCGG #static analysis #tool support
Static Analysis Tools for Soft-Core Reviews and Audits (SO, AC, MG, JAG), pp. 935–936.
DATEDATE-1998-PastorC #analysis #encoding #performance #petri net
Efficient Encoding Schemes for Symbolic Analysis of Petri Nets (EP, JC), pp. 790–795.
DATEDATE-1998-SzekelyR #performance #static analysis
Fast Field Solvers for Thermal and Electrostatic Analysis (VS, MR), pp. 518–523.
DATEDATE-1998-VercauterenVJL #analysis #partial order #performance #using #verification
Efficient Verification using Generalized Partial Order Analysis (SV, DV, GGdJ, BL), pp. 782–789.
PODSPODS-1998-DavulcuKRR #analysis #logic #modelling #workflow
Logic Based Modeling and Analysis of Workflows (HD, MK, CRR, IVR), pp. 25–33.
PODSPODS-1998-PapadimitriouRTV #analysis #probability #semantics
Latent Semantic Indexing: A Probabilistic Analysis (CHP, PR, HT, SV), pp. 159–168.
SIGMODSIGMOD-1998-ChaudhuriN #analysis
AutoAdmin “What-if” Index Analysis Utility (SC, VRN), pp. 367–378.
VLDBVLDB-1998-Ganguly #algorithm #analysis #design #optimisation #parametricity #query
Design and Analysis of Parametric Query Optimization Algorithms (SG), pp. 228–238.
VLDBVLDB-1998-Mihalisin #analysis #interactive
A Single Pass Computing Engine for Interactive Analysis of VLDBs (TM), p. 707.
VLDBVLDB-1998-WeberSB #analysis #performance
A Quantitative Analysis and Performance Study for Similarity-Search Methods in High-Dimensional Spaces (RW, HJS, SB), pp. 194–205.
CSEETCSEET-1998-Cowling98a #analysis #education #experience #re-engineering #student
Teaching Systems Analysis to Software Engineering Students: Experience with a Structured Methodology (AJC), pp. 102–113.
ESOPESOP-1998-BruynoogheLS #analysis #deduction
A Polyvariant Binding-Time Analysis for Off-line Partial Deduction (MB, ML, KFS), pp. 27–41.
ESOPESOP-1998-ChinKL #analysis
Synchronisation Analysis to Stop Tulping (WNC, SCK, TWL), pp. 75–89.
FASEFASE-1998-NielsonAN #analysis #behaviour #case study #safety
Behaviour Analysis and Safety Conditions: A Case Study in CML (HRN, TA, FN), pp. 255–269.
FASEFASE-1998-ReedJDR #analysis #automation #formal method #modelling #network
Automated Formal Analysis of Networks: FDR Models of Arbitrary Topologies and Flow-Control Mechanisms (JNR, DMJ, BD, GMR), pp. 239–254.
FoSSaCSFoSSaCS-1998-AmadioC #analysis #type system
Analysis of a Guard Condition in Type Theory (Extended Abstract) (RMA, SCG), pp. 48–62.
TACASTACAS-1998-CharatonikP #analysis #infinity
Set-Based Analysis of Reactive Infinite-State Systems (WC, AP), pp. 358–375.
TACASTACAS-1998-Lind-NielsenABHKL #analysis #composition #dependence #scalability #using #verification
Verification of Large State/Event Systems Using Compositionality and Dependency Analysis (JLN, HRA, GB, HH, KJK, KGL), pp. 201–216.
TACASTACAS-1998-LindahlPY #analysis #design
Formal Design and Analysis of a Gear Controller (ML, PP, WY), pp. 281–297.
CSMRCSMR-1998-BorneRS #analysis #object-oriented #towards
Towards a Systematic Object-Oriented transformation of a Mrise Analysis (IB, AR, FS), pp. 213–215.
CSMRCSMR-1998-YehL #analysis #data flow #metric #testing
Software Testability Measurements Derived from Data Flow Analysis (PLY, JCL), pp. 96–103.
ICSMEICSM-1998-CherinkaOR #maintenance #off the shelf #programming #question #static analysis
Maintaining a COTS Integrated Solution — Are Traditional Static Analysis Techniques Sufficient for this New Programming Methodology? (RC, CMO, JR), pp. 160–169.
ICSMEICSM-1998-HarmanSD #analysis #memory management #slicing #using
Analysis of Dynamic Memory Access Using Amorphous Slicing (MH, YS, SD), p. 336–?.
ICSMEICSM-1998-HutchinsG #impact analysis #visual notation
Improving Visual Impact Analysis (MAH, KG), pp. 294–303.
ICSMEICSM-1998-SinhaH #analysis #source code
Analysis of Programs with Exception-Handling Constructs (SS, MJH), pp. 348–357.
IWPCIWPC-1998-BechiniT #concurrent #design #dynamic analysis #java #tool support
Design of a Toolset for Dynamic Analysis of Concurrent Java Program (AB, KCT), pp. 190–197.
IWPCIWPC-1998-LagueLBMD #analysis #architecture #comprehension #framework
An Analysis Framework for Understanding Layered Software Architectures (BL, CL, ALB, EM, MD), pp. 37–44.
IWPCIWPC-1998-MartinoMMV #automation #detection #development #interactive #parallel #program analysis
Automatic Detection of Interaction Patterns for Parallel Program Analysis and Development (BDM, AM, NM, UV), pp. 206–213.
PASTEPASTE-1998-DorRS #analysis #detection #experience #fault #memory management #pointer
Detecting Memory Errors via Static Pointer Analysis (Preliminary Experience) (ND, MR, SS), pp. 27–34.
PASTEPASTE-1998-NaumovichCO #analysis #concurrent #data flow #performance #source code
Efficient Composite Data Flow Analysis Applied to Concurrent Programs (GN, LAC, LJO), pp. 51–58.
PASTEPASTE-1998-Snelting #comprehension #concept analysis #framework
Concept Analysis — A New Framework for Program Understanding (GS), pp. 1–10.
PASTEPASTE-1998-ZhangRL #alias #analysis #pointer
Experiments with Combined Analysis for Pointer Aliasing (SZ, BGR, WL), pp. 11–18.
WCREWCRE-1998-CimitileCL #analysis #data flow #incremental #migration
Incremental Migration Strategies: Data Flow Analysis For Wrapping (AC, UdC, ADL), pp. 59–68.
PLDIPLDI-1998-AdveM #integer #optimisation #program analysis #set #using
Using Integer Sets for Data-Parallel Program Analysis and Optimization (VSA, JMMC), pp. 186–198.
PLDIPLDI-1998-AmmonsL #analysis #data flow
Improving Data-flow Analysis with Path Profiles (GA, JRL), pp. 72–84.
PLDIPLDI-1998-DiwanMM #alias #analysis #type system
Type-Based Alias Analysis (AD, KSM, JEBM), pp. 106–117.
PLDIPLDI-1998-HastiH #analysis #pointer #using
Using Static Single Assignment Form to Improve Flow-Insensitive Pointer Analysis (RH, SH), pp. 97–105.
SASSAS-1998-FagesG #analysis #logic programming #source code
Analysis of Normal Logic Programs (FF, RG), pp. 82–98.
SASSAS-1998-HagiyaT #analysis #data flow #java #on the #virtual machine
On a New Method for Dataflow Analysis of Java Virtual Machine Subroutines (MH, AT), pp. 17–32.
SASSAS-1998-PeraltaGS #analysis #constraints #imperative #logic programming #source code
Analysis of Imperative Programs through Analysis of Constraint Logic Programs (JCP, JPG, HS), pp. 246–261.
SASSAS-1998-Ruthing #analysis #bidirectional #data flow
Bidirectional Data Flow Analysis in Code Motion: Myth and Reality (OR), pp. 1–16.
SASSAS-1998-SchmidtS #abstract interpretation #model checking #program analysis
Program Analysis as Model Checking of Abstract Interpretations (DAS, BS), pp. 351–380.
SASSAS-1998-TadjouddineEF #automation #difference #program analysis
Sparse Jacobian Computation in Automatic Differentiation by Static Program Analysis (MT, FE, CF), pp. 311–326.
STOCSTOC-1998-BellareCK #analysis #approach #authentication #composition #design #protocol
A Modular Approach to the Design and Analysis of Authentication and Key Exchange Protocols (Extended Abstract) (MB, RC, HK), pp. 419–428.
STOCSTOC-1998-LubyMSS #analysis #design #graph #using
Analysis of Low Density Codes and Improved Designs Using Irregular Graphs (ML, MM, MAS, DAS), pp. 249–258.
PLDIBest-of-PLDI-1998-AmmonsL98a #analysis #data flow
Improving data-flow analysis with path profiles (with retrospective) (GA, JRL), pp. 568–582.
FMFM-1998-Borger #analysis #design #state machine #using
High Level System Design and Analysis Using Abstract State Machines (EB), pp. 1–43.
ICFPICFP-1998-Gustavsson #analysis #optimisation
A Type Based Sharing Analysis for Update Avoidance and Optimisation (JG), pp. 39–50.
ICFPICFP-1998-Russell #analysis #design #functional #named
MAP: A Functional Analysis and Design Method (DR), p. 342.
CHICHI-1998-Boy #analysis #automation #safety
Cognitive Function Analysis for Human-Centered Automation of Safety-Critical Systems (GAB), pp. 265–272.
CHICHI-1998-MackayB #data analysis #multi #named
DIVA: Exploratory Data Analysis with Multimedia Streams (WEM, MBL), pp. 416–423.
AdaEuropeAdaEurope-1998-BliebergerB #ada #analysis #source code
Symbolic Reaching Definitions Analysis of Ada Programs (JB, BB), pp. 238–250.
AdaSIGAda-1998-LaskiSH #ada #analysis #dependence #source code
Dependency Analysis of Ada Programs (JWL, WS, JH), pp. 263–275.
AdaSIGAda-1998-MillsP #ada #analysis #co-evolution #design #hardware #migration
Hardware/Software Co-Design: VHDL and Ada 95 Code Migration and Integrated Analysis (MM, GP), pp. 18–27.
AdaSIGAda-1998-PritchettR #static analysis
An ASIS-Based Static Analysis Tool for High-Integrity Systems (WWPI, JDR), pp. 12–17.
CAiSECAiSE-1998-KavakliL #analysis #process
Goal-Driven Business Process Analysis — Application in Electricity Deregulation (VK, PL), pp. 305–324.
CAiSECAiSE-1998-Lam #analysis #development #reuse
Change Analysis and Management in a Reuse-Oriented Software Development Setting (WL), pp. 219–236.
EDOCEDOC-1998-SyrbeP #analysis
An enterprise-level analysis of customer-provider relationships and implications for QoS enforcement (JHS, TP), pp. 208–217.
CIKMCIKM-1998-DulleaS #analysis #modelling
An Analysis of the Structural Validity of Ternary Relatinships in Entity Relationship Modeling (JD, IYS), pp. 331–339.
ICMLICML-1998-GarciaN #algorithm #analysis #learning
A Learning Rate Analysis of Reinforcement Learning Algorithms in Finite-Horizon (FG, SMN), pp. 215–223.
ICMLICML-1998-KimuraK #algorithm #analysis #learning #using
An Analysis of Actor/Critic Algorithms Using Eligibility Traces: Reinforcement Learning with Imperfect Value Function (HK, SK), pp. 278–286.
ICMLICML-1998-PendrithM #analysis #learning #markov
An Analysis of Direct Reinforcement Learning in Non-Markovian Domains (MDP, MM), pp. 421–429.
ICPRICPR-1998-AdigaC98a #analysis #image #industrial
Analysis of volumetric images of filamentous bacteria in industrial sludge (PSUA, BBC), pp. 1735–1737.
ICPRICPR-1998-Ayache #analysis #challenge #image #research
Medical image analysis a challenge for computer vision research (NA), pp. 1255–1256.
ICPRICPR-1998-BamfordL #analysis #segmentation
Bayesian analysis of cell nucleus segmentation by a Viterbi search based active contour (PB, BCL), pp. 133–135.
ICPRICPR-1998-ChenHS #analysis #email
E-mail signature block analysis (HC, JH, RS), pp. 1153–1156.
ICPRICPR-1998-CutlerD #analysis #detection
View-based detection and analysis of periodic motion (RC, LSD), pp. 495–500.
ICPRICPR-1998-Duin #analysis #problem #relational #scalability
Relational discriminant analysis and its large sample size problem (RPWD), pp. 445–449.
ICPRICPR-1998-Garcia-SevillaP #analysis #image
The use of Boolean model for texture analysis of grey images (PGS, MP), pp. 811–813.
ICPRICPR-1998-GovindanDKP #analysis #classification #component #independence
Independent component analysis applied to electrogram classification during atrial fibrillation (AG, GD, JK, JP), pp. 1662–1664.
ICPRICPR-1998-GuoYM #analysis #game studies #multi #robust #segmentation #statistics
Unsupervised segmentation based on multi-resolution analysis, robust statistics and majority game theory (GG, SY, SM), pp. 799–801.
ICPRICPR-1998-HatteryL #analysis #image #physics
Depth from physics: physics-based image analysis and feature definition (DH, MHL), pp. 711–713.
ICPRICPR-1998-HofmanJ #analysis #approach #clustering #performance #robust #using
Robust and efficient cluster analysis using a shared near neighbours approach (IH, RAJ), pp. 243–247.
ICPRICPR-1998-HontaniD #analysis #component #detection #image #multi
Multi-scale image analysis for detection of characteristic component figure shapes and sizes (HH, KD), pp. 1470–1472.
ICPRICPR-1998-Huynh #analysis #image #re-engineering
Euclidean reconstruction from an image triplet: a sensitivity analysis (DQH), pp. 835–837.
ICPRICPR-1998-HyvarinenOHH #analysis #component #feature model #image #independence
Image feature extraction by sparse coding and independent component analysis (AH, EO, POH, JH), pp. 1268–1273.
ICPRICPR-1998-KangTH #analysis #architecture #image #pattern matching #pattern recognition #recognition
An IRAM architecture for image analysis and pattern recognition (YK, JT, TSH), pp. 1561–1564.
ICPRICPR-1998-KawataNOKMEKM #analysis #image #using
Curvature based analysis of pulmonary nodules using thin-section CT images (YK, NN, HO, RK, KM, KE, MK, NM), pp. 361–363.
ICPRICPR-1998-KogaKSF #analysis #segmentation #using
Segmentation of Japanese handwritten characters using peripheral feature analysis (MK, TK, HS, HF), pp. 1137–1141.
ICPRICPR-1998-LeeHSL #analysis #automation #bound #detection #parsing #using #video
Automatic video parsing using shot boundary detection and camera operation analysis (MSL, BWH, SS, SWL), pp. 1481–1483.
ICPRICPR-1998-LuYI #analysis
Intensity modulated moire and its intensity-phase analysis (CL, AY, SI), pp. 1791–1793.
ICPRICPR-1998-MaedaKIZ #analysis #multi #using
Surface recovery by using regularization theory and its application to multiresolution analysis (MM, KK, KI, HZ), pp. 19–23.
ICPRICPR-1998-MottlBKKM #analysis #image
Variational methods in signal and image analysis (VM, AB, AK, AK, IBM), pp. 525–527.
ICPRICPR-1998-NakaiMI #analysis #simulation
Simulation and analysis of spectral distributions of human skin (HN, YM, SI), pp. 1065–1067.
ICPRICPR-1998-OhLS #analysis #using
Using class separation for feature analysis and combination of class-dependent features (ISO, JSL, CYS), pp. 453–455.
ICPRICPR-1998-OzdemirBMEE #algorithm #analysis #comparative #evaluation #fault
Comparative evaluation of texture analysis algorithms for defect inspection of textile products (, AB, RM, AE, AE), pp. 1738–1740.
ICPRICPR-1998-Perner #analysis #classification #image
Image analysis and classification of HEp-2 cells in fluorescent images (PP), pp. 1677–1679.
ICPRICPR-1998-Shevlin #analysis #problem #using
Analysis of orientation problems using Plucker lines (FS), pp. 685–689.
ICPRICPR-1998-SimonB #analysis #clustering #image
WaveStat-cluster analysis of image data and wavelet coefficients (US, MB), pp. 1622–1625.
ICPRICPR-1998-Takasu #analysis #documentation #image #probability
Probabilistic interpage analysis for article extraction from document images (AT), pp. 932–935.
ICPRICPR-1998-Tayeb-beySE #analysis #documentation
Analysis and conversion of documents (STb, ASS, HE), pp. 1089–1091.
ICPRICPR-1998-WatanabeT #2d #analysis #image
An analysis system for two-dimensional gel electrophoresis images of genomic DNA (YW, KT), pp. 368–371.
ICPRICPR-1998-YogesanEB #analysis #image
Texture analysis of retinal images to determine nerve fibre loss (KY, RHE, CJB), pp. 1665–1667.
ICPRICPR-1998-ZhaoN #analysis #linear #recognition
Linear discriminant analysis of MPF for face recognition (WZ, NN), pp. 185–188.
ICPRICPR-1998-ZhugeTLHD #analysis #image #interactive #programming #segmentation
An interactive image segmentation method based on dynamic programming and its application in medical image analysis (YZ, JT, NL, ZH, RD), pp. 1558–1560.
SIGIRSIGIR-1998-Greiff #data analysis #formal method
A Theory of Term Weighting Based on Exploratory Data Analysis (WRG), pp. 11–19.
UMLUML-1998-BourdeauLR #analysis #case study #diagrams #experience #uml
Hierarchical Context Diagrams with UML: An Experience Report on Satellite Ground System Analysis (EB, PL, PR), pp. 227–239.
ECOOPECOOP-1998-GilI #analysis #complexity #object-oriented #source code
The Complexity of Type Analysis of Object Oriented Programs (JYG, AI), pp. 601–634.
TOOLSTOOLS-ASIA-1998-YuanCXMY #analysis #c++ #database #information management #tool support
C++ Program Information Database for Analysis Tools (WY, XC, TX, HM, FY), pp. 173–180.
TOOLSTOOLS-USA-1998-Mitchell #analysis #constraints #contract #ocl #uml
Analysis by Contract: An Introduction to UML’s Object Constraint Language (OCL) (RM), p. 448–?.
TOOLSTOOLS-USA-1998-Walden #analysis #contract #design #named
BON: Seamless, Reversible, Contract-Based Analysis and Design (KW), p. 445.
PPDPALP-PLILP-1998-CodishS #analysis #logic #set
The Boolean Logic of Set Sharing Analysis (MC, HS), pp. 89–101.
PPDPALP-PLILP-1998-Hannan #program analysis #prolog
Program Analysis in λ-Prolog (JH), pp. 353–354.
LOPSTRLOPSTR-1998-GabricGS #analysis #constraints #strict #theorem proving
Strictness Analysis as Finite-Domain Constraint Solving (TG, KG, HS), pp. 255–270.
POPLPOPL-1998-Blanchet #analysis #correctness #implementation #proving
Escape Analysis: Correctness Proof, Implementation and Experimental Results (BB), pp. 25–37.
POPLPOPL-1998-BodikA #analysis
Path-Sensitive Value-Flow Analysis (RB, SA), pp. 237–251.
POPLPOPL-1998-DebrayMW #alias #analysis #execution
Alias Analysis of Executable Code (SKD, RM, MW), pp. 12–24.
POPLPOPL-1998-DeFouwGC #analysis #interprocedural #performance
Fast Interprocedural Class Analysis (GD, DG, CC), pp. 222–236.
POPLPOPL-1998-GhiyaH #analysis #pointer
Putting Pointer Analysis to Work (RG, LJH), pp. 121–133.
POPLPOPL-1998-JagannathanTWW #alias #analysis #higher-order
Single and Loving It: Must-Alias Analysis for Higher-Order Languages (SJ, PT, SW, AKW), pp. 329–341.
POPLPOPL-1998-Schmidt #abstract interpretation #analysis #data flow #model checking
Data Flow Analysis is Model Checking of Abstract Interpretations (DAS), pp. 38–48.
REICRE-1998-HaglindJR #analysis #case study #empirical #experience #requirements
Experiences Integrating Requirements Engineering and Business Analysis An Empirical Study of Operations & Management System Procurement Projects (MH, LJ, MR), pp. 108–117.
REICRE-1998-LutzHMST #analysis #product line #requirements #safety
Safety Analysis of Requirements for a Product Family (RRL, GGH, MMM, DES, SRT), p. 24–?.
REICRE-1998-SutcliffeR #analysis #experience #requirements
Experience with SCRAM, a SCenario Requirements Analysis Method (AGS, MR), p. 164–?.
REFSQREFSQ-1998-SutcliffeM #analysis #non-functional #requirements
Scenario-based Analysis of Non-Functional Requirements (AGS, SM), pp. 219–233.
SACSAC-1998-KimYL #analysis #policy
Analysis of buffer replacement policies for WWW proxy (IK, HYY, JL), pp. 98–103.
SACSAC-1998-Marchiori #analysis
Light analysis of complex systems (MM), pp. 18–22.
FSEFSE-1998-AllenG #analysis #component #formal method #integration #modelling #standard
Formal Modeling and Analysis of the HLA Component Integration Standard (RA, DG), pp. 70–79.
FSEFSE-1998-AtkinsonG #effectiveness #pointer #program analysis
Effective Whole-Program Analysis in the Presence of Pointers (DCA, WGG), pp. 46–55.
FSEFSE-1998-Jackson #analysis #design
An Intermedicate Design Language and Its Analysis (DJ), pp. 121–130.
FSEFSE-1998-SneltingT #concept analysis #re-engineering #using
Reengineering Class Hierarchies Using Concept Analysis (GS, FT), pp. 99–110.
ICSEICSE-1998-ChanBS #analysis #named #specification
Promises: Limited Specifications for Analysis and Manipulation (ECC, JB, WLS), pp. 167–176.
ICSEICSE-1998-MascarenhasKBK #analysis #artificial reality #modelling #petri net
Modeling and Analysis of a Virtual Reality System with Time Petri Nets (RM, DK, UAB, RVK), pp. 33–42.
ICSEICSE-1998-TanakaAOY #analysis #metric #process #quality
Software Quality Analysis & Measurement Service Activity in the Company (TT, MA, HO, AY), pp. 426–429.
ICSEICSE-1998-YokoyamaK #analysis #quality #statistics
Software Cost and Quality Analysis by Statistical Approaches (YY, MK), pp. 465–467.
ASPLOSASPLOS-1998-GhoshMM #analysis #precise #program transformation
Precise Miss Analysis for Program Transformations with Caches of Arbitrary Associativity (SG, MM, SM), pp. 228–239.
ASPLOSASPLOS-1998-SodaniS #analysis #empirical
An Empirical Analysis of Instruction Repetition (AS, GSS), pp. 35–45.
CCCC-1998-BraunKK #analysis #control flow #generative #named
Cool: A Control-Flow Generator for System Analysis (VB, JK, DK), pp. 306–309.
CCCC-1998-BrouwerGP #analysis #automaton #finite #implementation #performance
Myths and Facts about the Efficient Implementation of Finite Automata and Lexical Analysis (KB, WG, EP), pp. 1–15.
CCCC-1998-MalacariaH #analysis #approach #control flow
A New Approach to Control Flow Analysis (PM, CH), pp. 95–108.
CCCC-1998-MartinAWF #analysis
Analysis of Loops (FM, MA, RW, CF), pp. 80–94.
CCCC-1998-NielsonN #analysis #constraints #logic
Flow Logics for Constraint Based Analysis (HRN, FN), pp. 109–127.
HPDCHPDC-1998-TierneyJCHBG #analysis #distributed #performance
The NetLogger Methodology for High Performance Distributed Systems Performance Analysis (BT, WEJ, BC, GH, CXB, DG), pp. 260–267.
LCTESLCTES-1998-LiuG #analysis #automation #bound
Automatic Accurate Time-Bound Analysis for High-Level Languages (YAL, GG), pp. 31–40.
LCTESLCTES-1998-LundqvistS #analysis #simulation #using
Integrating Path and Timing Analysis Using Instruction-Level Simulation Techniques (TL, PS), pp. 1–15.
CADECADE-1998-BrauburgerG #analysis #evaluation #induction #termination
Termination Analysis by Inductive Evaluation (JB, JG), pp. 254–269.
CADECADE-1998-FleuriotP #analysis #geometry #proving #standard #theorem proving
A Combination of Nonstandard Analysis and Geometry Theorem Proving, with Application to Newton’s Principia (JDF, LCP), pp. 3–16.
CAVCAV-1998-AbdullaBJ #analysis #bound #on the fly
On-the-Fly Analysis of Systems with Unbounded, Lossy FIFO Channels (PAA, AB, BJ), pp. 305–318.
CAVCAV-1998-ComonJ #analysis #automaton #multi #safety
Multiple Counters Automata, Safety Analysis and Presburger Arithmetic (HC, YJ), pp. 268–279.
CAVCAV-1998-Mitchell #analysis #finite #protocol #security
Finite-State Analysis of Security Protocols (JCM), pp. 71–76.
ISSTAISSTA-1998-Ball #analysis #control flow #on the #testing
On the Limit of Control Flow Analysis for Regression Test Selection (TB), pp. 134–142.
ISSTAISSTA-1998-GodefroidHJ #analysis #model checking #monitoring #using
Model Checking Without a Model: An Analysis of the Heart-Beat Monitor of a Telephone Switch Using VeriSoft (PG, RSH, LJJ), pp. 124–133.
ICLPJICSLP-1998-DecorteS #analysis #termination
Termination Analysis: Some Practical Properties of the Norm and Level Mapping Space (SD, DDS), pp. 235–249.
LICSLICS-1998-StarkS #analysis #automaton #composition #network #probability
Compositional Analysis of Expected Delays in Networks of Probabilistic I/O Automata (EWS, SAS), pp. 466–477.
ASEASE-1997-Ameur #comprehension #program analysis #source code
A Contribution to Program Comprehension by Program Analysis: Application to Numerical Programs (YAA), pp. 134–142.
ASEASE-1997-Dwyer #analysis #composition #concurrent
Modular Flow Analysis for Concurrent Software (MBD), pp. 264–273.
ASEASE-1997-Gaugne #comprehension #debugging #static analysis
A Static Analysis for Program Understanding and Debugging (RG), pp. 297–298.
ASEASE-1997-HarrisonB #analysis #data flow #design #information management
Data Flow Analysis within the ITOC Information System Design Recovery Tool (JVH, AB), p. 227–?.
ASEASE-1997-LamJ #analysis #requirements #reuse
Mechanising Requirements Engineering: Reuse and the Application of Domain Analysis Technology (WL, SJ), pp. 303–304.
DACDAC-1997-ChenL #analysis #design #power management
Power Supply Noise Analysis Methodology for Deep-Submicron VLSI Chip Design (HHC, DDL), pp. 638–643.
DACDAC-1997-CongHKNSY #2d #analysis
Analysis and Justification of a Simple, Practical 2 1/2-D Capacitance Extraction Methodology (JC, LH, ABK, DN, NS, SHCY), pp. 627–632.
DACDAC-1997-KlenkeMAJRG #analysis #dependence #design #performance
An Integrated Design Environment for Performance and Dependability Analysis (RHK, MM, JHA, BWJ, RR, AG), pp. 184–189.
DACDAC-1997-KukimotoB #analysis #detection
Exact Required Time Analysis via False Path Detection (YK, RKB), pp. 220–225.
DACDAC-1997-MalikML #analysis #embedded
Static Timing Analysis of Embedded Software (SM, MM, YTSL), pp. 147–152.
DACDAC-1997-MarculescuMP #analysis #finite #probability #sequence #state machine
Sequence Compaction for Probabilistic Analysis of Finite-State Machines (DM, RM, MP), pp. 12–15.
DACDAC-1997-PasseroneLCS #analysis #hardware #performance #prototype #trade-off
Fast Hardware/Software Co-Simulation for Virtual Prototyping and Trade-Off Analysis (CP, LL, MC, ALSV), pp. 389–394.
DACDAC-1997-SudarsanamLD #analysis #architecture #evaluation
Analysis and Evaluation of Address Arithmetic Capabilities in Custom DSP Architectures (AS, SYL, SD), pp. 287–292.
DATEEDTC-1997-DasdanMG #analysis #constraints #debugging #embedded #named
RATAN: A tool for rate analysis and rate constraint debugging for embedded systems (AD, AM, RKG), pp. 2–6.
DATEEDTC-1997-FradinMD #3d #analysis
Analysis of 3D conjugate heat transfers in electronics (JPF, LM, BD), pp. 190–194.
DATEEDTC-1997-Garcia-VargasGFR #algorithm #analysis #generative #scalability
An algorithm for numerical reference generation in symbolic analysis of large analog circuits (IGV, MG, FVF, ÁRV), pp. 395–399.
DATEEDTC-1997-GuLKP #analysis #testing
A controller testability analysis and enhancement technique (XG, EL, KK, ZP), pp. 153–157.
DATEEDTC-1997-KunduG #analysis
Inductance analysis of on-chip interconnects [deep submicron CMOS] (SK, UG), pp. 252–255.
DATEEDTC-1997-NouraniP #analysis #behaviour #using
Structural BIST insertion using behavioral test analysis (MN, CAP), pp. 64–68.
DATEEDTC-1997-WalrathVB #analysis #partial evaluation #performance #using #verification
Performance verification using partial evaluation and interval analysis (JW, RV, WB), p. 622.
HTHT-1997-Chen #analysis #similarity #visualisation
Structuring and Visualising the WWW by Generalised Similarity Analysis (CC), pp. 177–186.
ICDARICDAR-1997-Ah-SoonT #analysis #architecture
Variations on the Analysis of Architectural Drawing (CAS, KT), pp. 347–351.
ICDARICDAR-1997-AraiO #analysis
Form Processing based on Background Region Analysis (HA, KO), pp. 164–169.
ICDARICDAR-1997-BlasiusGJK #analysis #documentation #knowledge-based
Knowledge-based Document Analysis (KHB, BG, IJ, NK), pp. 728–731.
ICDARICDAR-1997-ChangCCLLSTWY #analysis #documentation #recognition
A Document Analysis and Recognition System (FC, TFC, TRC, MCL, YCL, TYS, TMT, JJW, CSY), pp. 736–739.
ICDARICDAR-1997-ChangLP #algorithm #analysis
Line sweep thinning algorithm for feature analysis (FC, YCL, TP), pp. 123–127.
ICDARICDAR-1997-CracknellDD97a #analysis #comprehension #documentation #framework #image #named
TABS — A New Software Framework for Document Image Processing, Analysis, and Understanding (CC, ACD, LD), pp. 1001–1005.
ICDARICDAR-1997-CullenHH #analysis #database #documentation #image #retrieval #using
Document image database retrieval and browsing using texture analysis (JFC, JJH, PEH), pp. 718–721.
ICDARICDAR-1997-Ishitani #analysis #documentation #layout
Document Layout Analysis Based on Emergent Computation (YI), pp. 45–50.
ICDARICDAR-1997-JingboXT #analysis #segmentation
Segmentation of Stick Text Based on Sub Connected Area Analysis (JG, XL, ZT), p. 417–?.
ICDARICDAR-1997-Kim #analysis #documentation #problem
Problems and Approaches for Oriental Document Analysis (JHK), p. 1111.
ICDARICDAR-1997-KoppenLN #analysis #documentation #framework #image #internet
An Image Consulting Framework for Document Analysis of Internet Graphics (MK, LL, BN), p. 819–?.
ICDARICDAR-1997-LiangRHP #analysis #documentation #image
UW-ISL Document Image Analysis Toolbox: An Experimental Environment (JL, RR, RMH, ITP), pp. 984–988.
ICDARICDAR-1997-LinNN #analysis #documentation #image #logic #using
Logical Structure Analysis of Book Document Images Using Contents Information (CL, YN, SN), pp. 1048–1054.
ICDARICDAR-1997-MaergnerKP #analysis #benchmark #documentation #metric #on the
On Benchmarking of Document Analysis Systems (VFM, PK, AKP), p. 331–?.
ICDARICDAR-1997-MiyamotoISNT #analysis #documentation #requirements
Analysis of required elements for next-generation document reader on the basis of user requirements (TM, YI, KS, TN, YT), pp. 428–432.
ICDARICDAR-1997-OgierMLL #analysis #image #reliability #semantics
An Image Interpretation Device cannot be Reliable without any Semantic Coherency Analysis of the Interpretated Objects — Application to French Cadastral Maps (JMO, RM, JL, YL), pp. 532–535.
ICDARICDAR-1997-SauvolaHKSPD #algorithm #analysis #distributed #documentation #image #testing
A distributed management system for testing document image analysis algorithms (JJS, SH, HK, TS, MP, DSD), pp. 989–995.
PODSPODS-1997-HellersteinKP #analysis #on the
On the Analysis of Indexing Schemes (JMH, EK, CHP), pp. 249–256.
CSEETCSEET-1997-LethbridgeIMG #analysis #re-engineering
An Undergraduate Option in Software Engineering: Analysis and Rationale (TCL, DI, AM, DG), pp. 120–131.
TACASTACAS-1997-ParashkevovY #analysis #performance #pseudo #reachability
Space Efficient Reachability Analysis Through Use of Pseudo-Root States (ANP, JY), pp. 50–64.
TACASTACAS-1997-Tofts #analysis #composition #performance
Compositional Performance Analysis (CMNT), pp. 290–305.
CSMRCSMR-1997-ClassenHMS #migration #static analysis #user interface
CUI to GUI Migration: Static Analysis of Character-Based Panels (IC, KH, IM, MS), pp. 144–149.
CSMRCSMR-1997-FantechiNS #analysis #cobol #object-oriented
Object-Oriented Analysis of COBOL (AF, PN, ES), pp. 157–164.
CSMRCSMR-1997-MendoncaK #analysis #architecture
A Quality-Based Analysis of Architecture Recovery Environments (NCM, JK), pp. 54–59.
CSMRCSMR-1997-TonellaAFM #analysis #maintenance #precise
Variable Precision Reaching Definitions Analysis for Software Maintenance (PT, GA, RF, EM), pp. 60–67.
ICSMEICSM-1997-SiffR #concept analysis #identification
Identifying modules via concept analysis (MS, TWR), pp. 170–179.
WCREWCRE-1997-MooreR #analysis #reuse
Domain Analysis for Transformational Reuse (MMM, SR), pp. 156–163.
WPCWPC-1997-TonellaAFM #analysis #comprehension #points-to
Points-to Analysis for Program Understanding (PT, GA, RF, EM), pp. 90–99.
ICSMEICSM-2000-Basili #analysis #maintenance #reuse
Analysis for Reuse and Maintenance: A Program for Experimentation (VRB), p. 296–?.
ICSMEICSM-2000-EmamHM #analysis #process #requirements #scalability
Causal Analysis of the Requirements Change Process for a Large System (KEE, DH, NHM), pp. 214–221.
ICSMEICSM-2000-IioFA #analysis #maintenance #process
Experimental Analysis of the Cognitive Processes of Program Maintainers during Software Maintenance (KI, TF, YA), pp. 242–249.
PEPMPEPM-1997-HornofN #analysis #imperative
Accurate Binding-Time Analysis For Imperative Languages: Flow, Context, and Return Sensitivity (LH, JN), pp. 63–73.
PLDIPLDI-1997-Collberg #analysis #automation #mutation testing
Reverse Interpretation + Mutation Analysis = Automatic Retargeting (CSC), pp. 57–70.
PLDIPLDI-1997-FlanaganF #analysis #component
Componential Set-Based Analysis (CF, MF), pp. 235–248.
PLDIPLDI-1997-Goodwin #analysis #data flow #execution #interprocedural
Interprocedural Dataflow Analysis in an Executable Optimizer (DWG), pp. 122–133.
PLDIPLDI-1997-HeintzeM #analysis #control flow #linear #transitive
Linear-time Subtransitive Control Flow Analysis (NH, DAM), pp. 261–272.
PLDIPLDI-1997-WagnerG #analysis #incremental #programming language
Incremental Analysis of real Programming Languages (TAW, SLG), pp. 31–43.
PLDIPLDI-1997-Webber #program analysis #using
Program Analysis Using Binary Relations (ABW), pp. 249–260.
SASSAS-1997-Braunburger #analysis #automation #order #polynomial #termination #using
Automatic Termination Analysis for Partial Functions Using Polynomial Orderings (JB), pp. 330–344.
SASSAS-1997-CodishLB #algebra #analysis #approach #logic programming #source code
An Algebraic Approach to Sharing Analysis of Logic Programs (MC, VL, FB), pp. 68–82.
SASSAS-1997-Cousot #abstract interpretation #semantics #static analysis
Abstract Interpretation Based Static Analysis Parameterized by Semantics (PC), pp. 388–394.
SASSAS-1997-FahndrichA #constraints #program analysis #set #using
Program Analysis Using Mixed Term and Set Constraints (MF, AA), pp. 114–126.
SASSAS-1997-IgarashiK #analysis #communication #concurrent #programming language #type system
Type-Based Analysis of Communication for Concurrent Programming Languages (AI, NK), pp. 187–201.
SASSAS-1997-JagannathanWW #analysis
Type-Directed Flow Analysis for Typed Intermediate Languages (SJ, SW, AKW), pp. 232–249.
SASSAS-1997-Mackie #distributed #implementation #interactive #static analysis
Static Analysis of Interaction Nets for Distributed Implementations (IM), pp. 217–231.
SASSAS-1997-Mossin #analysis
Exact Flow Analysis (CM), pp. 250–264.
SASSAS-1997-Ryder #analysis
Practical Compile-Time Analysis (BGR), pp. 406–412.
SASSAS-1997-Scozzari #analysis #logic
Logical Optimality of Groundness Analysis (FS), pp. 83–97.
SASSAS-1997-ShapiroH #analysis #pointer #precise
The Effects of the Precision of Pointer Analysis (MS, SH), pp. 16–34.
SASSAS-1997-SpeirsSS #analysis #termination
Termination Analysis for Mercury (CS, ZS, HS), pp. 160–171.
SASSAS-1997-TalbotTD #analysis #automaton #logic programming
Set-Based Analysis for Logic Programming and Tree Automata (JMT, ST, PD), pp. 127–140.
ICALPICALP-1997-BouajjaniH #analysis #reachability #set
Symbolic Reachability Analysis of FIFO Channel Systems with Nonregular Sets of Configurations (Extended Abstract) (AB, PH), pp. 560–570.
ICALPICALP-1997-HemaspaandraHR #analysis #parallel
Exact Analysis of Dodgson Elections: Lewis Carroll’s 1876 Voting System is Complete for Parallel Access to NP (EH, LAH, JR), pp. 214–224.
ICALPICALP-1997-HondaY #analysis #call-by #game studies
Game Theoretic Analysis of Call-by-Value Computation (KH, NY), pp. 225–236.
FMFME-1997-MartinJ #analysis #concurrent #network #performance #process #scalability
An Efficient Technique for Deadlock Analysis of Large Scale Process Networks (JMRM, SAJ), pp. 418–441.
FMFME-1997-YoungB #analysis #memory management #modelling
Mathematical Modeling and Analysis of an External Memory Manager (WDY, WRB), pp. 237–257.
ICFPICFP-1997-Ashley #analysis #effectiveness
The Effectiveness of Flow Analysis for Inlining (JMA), pp. 99–111.
ICFPICFP-1997-Banerjee #analysis #composition #type system
A Modular, Polyvariant, and Type-Based Closure Analysis (AB), pp. 1–10.
ICFPICFP-1997-HeintzeM #analysis #complexity #on the
On the Complexity of Set-Based Analysis (NH, DAM), pp. 150–163.
ICFPICFP-1997-SabelfeldS #analysis #functional #problem #semantics #source code
Simple Semantic Analysis Problems for Functional Programs (VKS, AS), p. 319.
ICFPICFP-1997-Shao #analysis #flexibility #representation
Flexible Representation Analysis (ZS), pp. 85–98.
CHICHI-1997-BhavnaniJ #analysis #performance
From Sufficient to Efficient Usage: An Analysis of Strategic Knowledge (SKB, BEJ), pp. 91–98.
CHICHI-1997-ChinRC #analysis #development #requirements
Participatory Analysis: Shared Development of Requirements from Scenarios (GCJ, MBR, JMC), pp. 162–169.
CHICHI-1997-Muller #analysis #collaboration #human-computer
Translation in HCI: Formal Representations for Work Analysis and Collaboration (MJM), pp. 544–545.
CHICHI-1997-Ramsay #analysis
A Factor Analysis of User Cognition and Emotion (JR), pp. 546–547.
HCIHCI-CC-1997-Angehrn #analysis #framework
An Agent-Centered Framework for the Analysis and Diagnosis of Organizational Groupware Platforms (AAA), pp. 289–292.
HCIHCI-CC-1997-FunadaYIN #analysis #effectiveness #evaluation #how #human-computer #performance
How Efficient are Combined Tasks for Effective HCI?: An Objective Evaluation Through AR Analysis of EEG (MFF, YY, KI, SPN), pp. 579–582.
HCIHCI-CC-1997-KazumaSNGOS #analysis #evaluation #process
Evaluation of Mental Stress During Tracking Tasks Based on the Analysis of Electrodermal Activity, Blinks and Blood Pressure (HK, MS, YN, HG, YO, MS), pp. 567–570.
HCIHCI-CC-1997-LeporeMMPTCT #analysis
Computer-Aided Analysis in Ophthalmological Imaging (DL, FM, GM, MMP, ST, GC, MT), pp. 753–756.
HCIHCI-CC-1997-StrohmU #analysis #concept #people
Sociotechnical Analysis According to the Concept of People, Technology, Organization (OS, EU), pp. 241–244.
HCIHCI-CC-1997-Suzuki #analysis #development #evaluation #variability
The Application of Heart Rate Variability Analysis on the Evaluation of Mental Strain and its Future Development (KS), pp. 559–562.
HCIHCI-CC-1997-Venda #analysis #communication #performance #predict
Ergodynamics in Analysis and Prediction of Communication Efficiency (VFV), pp. 833–836.
HCIHCI-CC-1997-WhisenandE #analysis
Analysis of Cursor Movements with a Mouse (TGW, HHE), pp. 533–536.
HCIHCI-SEC-1997-Brath #3d #analysis #experience #guidelines #interactive #visualisation
3D Interactive Information Visualization: Guidelines from Experience and Analysis of Applications (RB), pp. 865–868.
HCIHCI-SEC-1997-EarlYMK #analysis #case study #design #usability
The Contribution of Usability Analysis to the Design of Medical Devices: A Case Study (SE, MY, BM, RJK), pp. 601–604.
HCIHCI-SEC-1997-HolstCG #analysis #constraints #interface
Transporting Honey Bears: A Cognitive Analysis of the Effects of Interface Manipulation Style on a Constraint-Based Planning Task (SJH, EFC, DJG), pp. 169–172.
HCIHCI-SEC-1997-JackoD #analysis #interface #requirements
Interface Requirements: An Analysis of Technologies Designed for Individual and Group Work (JAJ, VGD), pp. 347–350.
HCIHCI-SEC-1997-JungY #analysis
Managing Information by a New Compound Noun Analysis (IHJ, SYY), pp. 299–302.
HCIHCI-SEC-1997-MacLeodMK #analysis #comprehension #human-computer #requirements
Understanding HCI Requirements: Expertise and Assistance to Imagery Analysis (ISM, AJM, EK), pp. 559–562.
HCIHCI-SEC-1997-Mizuno #analysis
Conjoint Analysis of Consumer Preferences in Cyber Space (MM), pp. 475–478.
HCIHCI-SEC-1997-PedraliB #analysis #process #question
Can We Trace Back Cognitive Processes in Root Cause Analysis? (MP, RB), pp. 59–62.
HCIHCI-SEC-1997-WatanabeO #analysis #communication
Physiological Analysis of Entrainment in Face-to-Face Communication (TW, MO), pp. 411–414.
AdaEuropeAdaEurope-1997-Bell #ada #analysis #source code #tool support
An Alternative Toolset for Analysis of Ada Programs (AEB), pp. 112–124.
AdaEuropeAdaEurope-1997-Thornley #case study #development #experience #static analysis
Static Analysis and Diversity in the Software Development Process- Experiences with the Use of SPARK (JPT), pp. 266–277.
AdaTRI-Ada-1997-Conn #analysis #source code
The Source Code Analysis Tool Construction Project (RLC), pp. 141–148.
AdaTRI-Ada-1997-RileyDP #analysis #implementation #verification
An Instance of the Application Download Pattern: The SPAIDS Software Loader/Verifier Domain Analysis and Implementation (JDR, SD, WP), pp. 273–278.
CAiSECAiSE-1997-CarricoG #analysis
Facilitating Analysis and Diagnosis in Organisations (LC, NG), pp. 131–144.
CAiSECAiSE-1997-CastanoA #analysis #framework #information management #legacy #multi
A Multi-Perspective Framework for the Analysis of Legacy Information Systems (SC, VDA), pp. 117–130.
CIKMCIKM-1997-DulleaS #analysis #constraints
An Analysis of Cardinality Constraints in Redundant Relationships (JD, IYS), pp. 270–277.
CIKMCIKM-1997-GauchW #analysis #approach #automation #corpus #query
A Corpus Analysis Approach for Automatic Query Expansion (SG, JW), pp. 278–284.
CIKMCIKM-1997-KimC #approach #database #execution #static analysis
A Practical Approach to Static Analysis and Execution of Rules in Active Databases (SKK, SC), pp. 161–168.
CIKMCIKM-1997-ZarkeshASSS #analysis #design
Analysis and Design of Server Informative WWW-Sites (AMZ, JA, CS, RS, VS), pp. 254–261.
ICMLICML-1997-Joachims #algorithm #analysis #categorisation #probability
A Probabilistic Analysis of the Rocchio Algorithm with TFIDF for Text Categorization (TJ), pp. 143–151.
KDDKDD-1997-BergstenSS #analysis #data mining #machine learning #mining
Applying Data Mining and Machine Learning Techniques to Submarine Intelligence Analysis (UB, JS, PS), pp. 127–130.
KDDKDD-1997-ChienFMLG #data analysis #database #image #scalability #using
Using Artificial Intelligence Planning to Automate Science Data Analysis for Large Image Databases (SAC, FF, HM, EL, RG), pp. 147–150.
KDDKDD-1997-ProvostF #analysis #classification #comparison #performance #visualisation
Analysis and Visualization of Classifier Performance: Comparison under Imprecise Class and Cost Distributions (FJP, TF), pp. 43–48.
KDDKDD-1997-SmythW #data analysis #set
Anytime Exploratory Data Analysis for Massive Data Sets (PS, DW), pp. 54–60.
SIGIRSIGIR-1997-Stairmand #analysis #information retrieval
Textual Context Analysis for Information Retrieval (MAS), pp. 140–147.
OOPSLAOOPSLA-1997-Haines #analysis #design #implementation #lightweight #thread
An Open Implementation Analysis and Design for Lightweight Threads (MH), pp. 229–242.
TOOLSTOOLS-ASIA-1997-Mitchell97a #analysis #contract
Analysis by Contract (RM), p. 421.
TOOLSTOOLS-ASIA-1997-PengCC #analysis #morphism #multi #performance #polymorphism
The Implement Mechanism and Efficiency Analysis of Multiinheritance and Polymorphism (RP, JC, SC), pp. 389–392.
TOOLSTOOLS-PACIFIC-1997-FrohlichS #analysis #architecture #interactive
Interactive Analysis of Object Architectures (JHF, TS), pp. 252–266.
TOOLSTOOLS-PACIFIC-1997-Hoffman #analysis #object-oriented
A Practical Notation for Object Oriented Analysis with a Formal Meaning (JH), pp. 225–237.
TOOLSTOOLS-USA-1997-FetckeAN #analysis #approach
Mapping the OO-Jacobson Approach into Function Point Analysis (TF, AA, THN), pp. 192–202.
TOOLSTOOLS-USA-1997-Mitchell #analysis #contract
Analysis by Contract (RM), p. 372.
TOOLSTOOLS-USA-1997-Walden #analysis #design #reuse
The BON Method: Analysis and Design for Reusability (KW), p. 372.
PPDPALP-1997-CodishT #analysis #constraints #logic programming #semantics #source code #termination #using
A Semantic Basis for Termination Analysis of Logic Programs and Its Realization Using Symbolic Norm Constraints (MC, CT), pp. 31–45.
LOPSTRLOPSTR-1997-DecorteSLMS #analysis #logic programming #termination
Termination Analysis for Tabled Logic Programming (SD, DDS, ML, BM, KFS), pp. 111–127.
LOPSTRLOPSTR-1997-HeatonHK #analysis #logic programming #source code
Analysis of Logic Programs with Delay (AH, PMH, AK), pp. 148–167.
POPLPOPL-1997-Biswas #analysis
A Demand-Driven Set-Based Analysis (SKB), pp. 372–385.
POPLPOPL-1997-Deutsch #analysis #complexity #on the
On the Complexity of Escape Analysis (AD), pp. 358–371.
POPLPOPL-1997-NielsonN #analysis #control flow #semantics
Infinitary Control Flow Analysis: a Collecting Semantics for Closure Analysis (HRN, FN), pp. 332–345.
POPLPOPL-1997-ShapiroH #analysis #performance #points-to
Fast and Accurate Flow-Insensitive Points-To Analysis (MS, SH), pp. 1–14.
RERE-1997-Ben-AbdallahLK #analysis #functional #requirements #specification
Integrated Specification and Analysis of Functional, Temporal, and Resource Requirements (HBA, IL, YSK), pp. 198–209.
RERE-1997-DarimontDML #analysis #integration #layout #named #requirements
GRAIL/KAOS: An Environment for Goal-Driven Requirements Analysis, Integration and Layout (RD, ED, PM, AvL), p. 140.
RERE-1997-FaulkH #analysis #approach #requirements #specification
The SCR Approach to Requirements Specification and Analysis (SRF, CLH), p. 263.
RERE-1997-ModugnoLRPS #analysis #requirements #safety #specification
Integrated Safety Analysis of Requirements Specifications (FM, NGL, JDR, KP, SDS), pp. 148–159.
RERE-1997-YenT #analysis #requirements #trade-off
A Systematic Tradeoff Analysis for Conflicting Imprecise Requirements (JY, WAT), p. 87–?.
SACSAC-1997-DamianiT #analysis #clustering
Dynamic clustering for technology-based domain analysis (TDA) (ED, ADT), pp. 204–206.
SACSAC-1997-LinXY #analysis #parallel #performance #problem
Performance analysis for parallel solutions to generic search problems (WML, WX, BY), pp. 422–430.
ESECESEC-FSE-1997-AlborghettiGM #analysis #automation #deduction
Providing Automated Support to Deductive Analysis of Time Critical Systems (AA, AG, AM), pp. 211–226.
ESECESEC-FSE-1997-ChenGK #analysis #c++ #detection #reachability
A C++ Data Model Supporting Reachability Analysis and Dead Code Detection (YFC, ERG, EK), pp. 414–431.
ESECESEC-FSE-1997-CheungGK #analysis #composition #liveness #reachability #using #verification
Verification of Liveness Properties Using Compositional Reachability Analysis (SCC, DG, JK), pp. 227–243.
ESECESEC-FSE-1997-NaumovichACO #architecture #static analysis
Applying Static Analysis to Software Architectures (GN, GSA, LAC, LJO), pp. 77–93.
ESECESEC-FSE-1997-Obbink #analysis #architecture #case study #experience #industrial
Analysis of Software Architectures in High and Low Volume Electronic Systems, Industrial Experience Report (JHO), pp. 523–524.
ICSEICSE-1997-ArdisW #analysis #product line #tutorial
Defining Families: The Commonality Analysis (Tutorial) (MAA, DMW), pp. 649–650.
ICSEICSE-1997-Damon #analysis #design #interactive #named
Nitpick: A Tool for Interactive Design Analysis (CD), pp. 596–597.
ICSEICSE-1997-Fowler #analysis #bibliography #design #object-oriented #tutorial
A Survey of Object Oriented Analysis and Design Methods (Tutorial) (MF), pp. 653–654.
ICSEICSE-1997-GoelS #data analysis #re-engineering #tutorial
Software Engineering Data Analysis Techniques (Tutorial) (ALG, MS), pp. 667–668.
ICSEICSE-1997-LindigS #composition #concept analysis #legacy
Assessing Modular Structure of Legacy Code Based on Mathematical Concept Analysis (CL, GS), pp. 349–359.
ICSEICSE-1997-PezzeY #analysis #modelling #multi #semantics #tool support #using
Constructing Multi-Formalism State-Space Analysis Tools: Using Rules to Specify Dynamic Semantics of Models (MP, MY), pp. 239–249.
ICSEICSE-1997-PighinZ #analysis #metric #predict #statistics
A Predictive Metric Based on Discriminant Statistical Analysis (MP, RZ), pp. 262–270.
ICSEICSE-1997-ReeseL #analysis
Software Deviation Analysis (JDR, NGL), pp. 250–260.
ICSEICSE-1997-TonellaAFM #analysis #c++ #morphism #pointer #polymorphism #slicing
Flow Insensitive C++ Pointers and Polymorphism Analysis and its Application to Slicing (PT, GA, RF, EM), pp. 433–443.
ICSEICSE-1997-WilsonRH #analysis #automation #specification
Automated Analysis of Requirement Specifications (WMW, LHR, LEH), pp. 161–171.
ICSEICSE-1997-YurRLS #analysis #c #incremental
Incremental Analysis of Side Effects for C Software System (JSY, BGR, WL, PS), pp. 422–432.
ASF+SDFASF+SDF-1997-Moonen #analysis #architecture #data flow #reverse engineering
A generic architecture for data flow analysis to support reverse engineering (LM), p. 10.
PPoPPPPoPP-1997-GuLL #analysis #array #data flow #experience #performance
Experience with Efficient Array Data-Flow Analysis for Array Privatization (JG, ZL, GL), pp. 157–167.
CAVCAV-1997-BoigelotBR #analysis #hybrid #linear #reachability
An Improved Reachability Analysis Method for Strongly Linear Hybrid Systems (Extended Abstract) (BB, LB, SR), pp. 167–178.
CAVCAV-1997-Godefroid #analysis #automation #concurrent #named
VeriSoft: A Tool for the Automatic Analysis of Concurrent Reactive Software (PG), pp. 476–479.
CAVCAV-1997-VarpaaniemiHL #analysis #performance #reachability
prod 3.2: An Advanced Tool for Efficient Reachability Analysis (KV, KH, JL), pp. 472–475.
ICLPICLP-1997-BruynoogheJK #analysis #logic programming #programming language
Live-Structure Analysis for Logic Programming Languages with Declarations (MB, GJ, AK), pp. 33–47.
ICLPICLP-1997-BuenoCL #analysis #logic programming #set #source code #using
Sharing Analysis Using Set Logic Programs (FB, MC, VL), p. 417.
ICLPICLP-1997-CodishDS #program analysis
XSB as the Natural Habitat for General Purpose Program Analysis (MC, BD, KFS), p. 416.
ICLPICLP-1997-DebrayGH #analysis #logic programming #source code
Non-Failure Analysis for Logic Programs (SKD, PLG, MVH), pp. 48–62.
ICLPICLP-1997-DecorteS #analysis #automation #constraints #logic programming #source code
Demand-Driven and Constraint-Based Automatic Left-Termination Analysis for Logic Programs (SD, DDS), pp. 78–92.
ICLPICLP-1997-LindenstraussS #analysis #automation #logic programming #source code #termination
Automatic Termination Analysis of Logic Programs (NL, YS), pp. 63–77.
ICLPICLP-1997-SmausHK #analysis #logic programming #source code
Domain Construction for Mode Analysis of Typed Logic Programs (JGS, PMH, AK), p. 418.
ICLPILPS-1997-Hermenegildo #analysis #programming
Programming with Global Analysis (Abstract) (MVH), pp. 49–50.
ICLPILPS-1997-KingSB #analysis #bound #logic programming #source code
Lower-bound Time-complexity Analysis of Logic Programs (AK, KS, FB), pp. 261–275.
ICLPILPS-1997-Podelski #analysis #logic programming #source code
Set-Based Analysis of Logic Programs and Reactive Logic Programs (Abstract) (AP), pp. 35–36.
ICLPILPS-1997-Reps #graph #program analysis #reachability
Program Analysis via Graph Reachability (TWR), pp. 5–19.
ICLPILPS-1997-TanL #analysis #logic programming #precise #recursion #source code
Recursive Modes for Precise Analysis of Logic Programs (JT, IPL), pp. 277–290.
LICSLICS-1997-HeintzeM #analysis #on the #polynomial #type system
On the Cubic Bottleneck in Subtyping and Flow Analysis (NH, DAM), pp. 342–351.
LICSLICS-1997-HuthK #analysis #model checking
Quantitative Analysis and Model Checking (MH, MZK), pp. 111–122.
TLCATLCA-1997-BelleM #analysis
Typed Intermediate Languages for Shape Analysis (GB, EM), pp. 11–29.
DACDAC-1996-AluruNW #analysis #parallel
A Parallel Precorrected FFT Based Capacitance Extraction Program for Signal Integrity Analysis (NRA, VBN, JW), pp. 363–366.
DACDAC-1996-Bryant #analysis
Bit-Level Analysis of an SRT Divider Circuit (REB), pp. 661–665.
DACDAC-1996-Gupta #analysis #constraints #embedded #execution
Analysis of Operation Delay and Execution Rate Constraints for Embedded Systems (RKG), pp. 601–604.
DACDAC-1996-HosseiniMK #analysis #code generation #functional #verification
Code Generation and Analysis for the Functional Verification of Microprocessors (AH, DM, PK), pp. 305–310.
DACDAC-1996-KahngM #analysis
Analysis of RC Interconnections Under Ramp Input (ABK, SM), pp. 533–538.
DACDAC-1996-KantrowitzN #analysis #correctness #simulation #verification #what
I’m Done Simulating: Now What? Verification Coverage Analysis and Correctness Checking of the DECchip 21164 Alpha Microprocessor (MK, LMN), pp. 325–330.
DACDAC-1996-KernsY #analysis #congruence #multi #network #performance #reduction #scalability
Stable and Efficient Reduction of Large, Multiport RC Networks by Pole Analysis via Congruence Transformations (KJK, ATY), pp. 280–285.
DACDAC-1996-MonahanB #analysis #concurrent #optimisation
Concurrent Analysis Techniques for Data Path Timing Optimization (CM, FB), pp. 47–50.
DACDAC-1996-PhilippsCL #analysis #performance #reduction
Efficient Full-Wave Electromagnetic Analysis via Model-Order Reduction of Fast Integral Transforms (JRP, EC, DDL), pp. 377–382.
DACDAC-1996-RaghunathanDJ #analysis #reduction
Glitch Analysis and Reduction in Register Transfer Level (AR, SD, NKJ), pp. 331–336.
DACDAC-1996-SatyanarayanaP #analysis #energy #named
HEAT: Hierarchical Energy Analysis Tool (JHS, KKP), pp. 9–14.
DACDAC-1996-TelicheveskyKW #analysis #performance
Efficient AC and Noise Analysis of Two-Tone RF Circuits (RT, KSK, JW), pp. 292–297.
DACDAC-1996-VerlindJL #analysis #performance
Efficient Partial Enumeration for Timing Analysis of Asynchronous Systems (EV, GGdJ, BL), pp. 55–58.
PODSPODS-1996-BertinoC #database #static analysis
Static Analysis of Intensional Databases in U-Datalog (EB, BC), pp. 202–212.
SIGMODSIGMOD-1996-SelfridgeSW #data analysis #idea #interactive #named
IDEA: Interactive Data Exploration and Analysis (PGS, DS, LOW), pp. 24–34.
VLDBVLDB-1996-Cuppens #analysis #database #logic #multi #query
Querying a Multilevel Database: A Logical Analysis (FC), pp. 484–494.
VLDBVLDB-1996-FaloutsosG #analysis #using
Analysis of n-Dimensional Quadtrees using the Hausdorff Fractal Dimension (CF, VG), pp. 40–50.
VLDBVLDB-1996-Suciu96a #analysis #implementation #parallel #query
Implementation and Analysis of a Parallel Collection Query Language (DS), pp. 366–377.
VLDBVLDB-1996-Sullivan #analysis #database #named #network
Tribeca: A Stream Database Manager for Network Traffic Analysis (MS), p. 594.
ITiCSEITiCSE-1996-Krone #algorithm #analysis #data type #education #symbolic computation #using
Using symbolic computation for teaching data structures and algorithm analysis (JK), p. 230.
ITiCSEITiCSE-1996-MarsdenO #analysis #education #framework #modelling #multi #named #process #tool support
MuPMoTT: a multimedia based tool supporting the teaching of process modelling within a framework of structured system analysis (PM, MO), pp. 116–118.
ITiCSEITiCSE-1996-SanchezV #analysis #education #image #lisp
ViLi (Vision LISP): a software environment for teaching image processing and analysis (JS, JV), p. 234.
ESOPESOP-1996-BuenoGHP #analysis #prolog #source code #standard
Global Analysis of Standard Prolog Programs (FB, DCG, MVH, GP), pp. 108–124.
ESOPESOP-1996-JensenM #analysis #geometry #interactive
Flow Analysis in the Geometry of Interaction (TPJ, IM), pp. 188–203.
TACASTACAS-1996-BerghammerKU #algebra #analysis #perspective #petri net
Realtion-Algebraic Analysis of Petri Nets with RELVIEW (RB, BvK, CU), pp. 49–69.
TACASTACAS-1996-HermannsMR #algebra #analysis #probability #process
A Construction and Analysis Tool Based on the Stochastic Process Algebra TIPP (HH, VM, MR), pp. 427–430.
TACASTACAS-1996-KleinKKS #automaton #program analysis
DFA&OPT-METAFrame: A Tool Kit for Program Analysis and Optimazation (MK, JK, DK, BS), pp. 422–426.
TACASTACAS-1996-Rauzy #analysis #constraints #reduction #specification #using
Using the Constraint Language Toupie for “Software Cost Reduction” Specification Analysis (Abstract) (AR), p. 417.
ICSMEICSM-1996-Bohner #impact analysis #perspective #process
Impact analysis in the software change process: a year 2000 perspective (SAB), pp. 42–51.
ICSMEICSM-1996-CanforaCL #analysis #specification #tool support
Specifying code analysis tools (GC, AC, ADL), pp. 95–103.
ICSMEICSM-1996-Gallagher #impact analysis #visual notation
Visual Impact Analysis (KG), pp. 52–58.
ICSMEICSM-1996-LiO #algorithm #impact analysis #object-oriented
Algorithmic Analysis of the Impact of Changes to Object-Oriented Software (LL, AJO), pp. 171–184.
ICSMEICSM-1996-YoungerLBB #analysis #concurrent #formal method #modelling #reverse engineering #source code #using
Reverse Engineering Concurrent Programs using Formal Modelling and Analysis (EJY, ZL, KHB, TMB), pp. 255–264.
WCREWCRE-1996-ChaseHRY #analysis #architecture
Analysis and Presentation of Recovered Software Architectures (MPC, DRH, SNR, ASY), pp. 153–162.
WCREWCRE-1996-TonellaFAM #analysis #architecture #case study
Augmenting Pattern-Based Architectural Recovery with Flow Analysis: Mosaic — A Case Study (PT, RF, GA, EM), pp. 198–207.
WCREWCRE-1996-YoungerLBB #analysis #concurrent #formal method #modelling #reverse engineering #source code #using
Reverse Engineering Concurrent Programs Using Formal Modelling and Analysis (EJY, ZL, KHB, TMB), pp. 239–248.
WPCWPC-1996-BlazyF #analysis #comprehension #interprocedural
Interprocedural analysis for program comprehension by specialization (SB, PF), p. 133–?.
WPCWPC-1996-Sullivan #agile #development #program analysis #tool support
Rapid Development of Simple, Custom Program Analysis Tools (KJS), pp. 40–44.
PLDIPLDI-1996-ChakrabartiGC #analysis #communication #optimisation
Global Communication Analysis and Optimization (SC, MG, JDC), pp. 68–78.
PLDIPLDI-1996-DawsonRW #case study #logic programming #program analysis #using
Practical Program Analysis Using General Purpose Logic Programming Systems — A Case Study (SD, CRR, DSW), pp. 117–126.
PLDIPLDI-1996-Ramalingam #analysis #data flow
Data Flow Frequency Analysis (GR), pp. 267–277.
PLDIPLDI-1996-RinardD #analysis #commutative #compilation #framework
Commutativity Analysis: A New Analysis Framework for Parallelizing Compilers (MCR, PCD), pp. 54–67.
PLDIPLDI-1996-SreedharGL #analysis #data flow #framework #graph #incremental #using
A New Framework for Exhaustive and Incremental Data Flow Analysis Using DJ Graphs (VCS, GRG, YFL), pp. 278–290.
SASSAS-1996-Aiken #constraints #program analysis
Constraint-Based Program Analysis (Abstract) (AA), p. 1.
SASSAS-1996-AndersenH #analysis #functional #higher-order #partial evaluation #termination
Termination Analysis for Offline Partial Evaluation of a Higher Order Functional Language (PHA, CKH), pp. 67–82.
SASSAS-1996-BrauburgerG #analysis #termination
Termination Analysis for Partial Functions (JB, JG), pp. 113–127.
SASSAS-1996-BruynoogheDBDM #analysis #logic programming #source code
A Freeness and Sharing Analysis of Logic Programs Based on a Pre-interpretation (MB, BD, DB, MD, AM), pp. 128–142.
SASSAS-1996-CoppoDG #program analysis #refinement
Refinement Types for Program Analysis (MC, FD, PG), pp. 143–158.
SASSAS-1996-Emeljanov #analysis #similarity
Analysis of the Equality Relations for the Program Terms (PGE), pp. 174–188.
SASSAS-1996-KellyMSS #analysis #constraints #incremental #logic programming #source code
Two Applications of an Incremental Analysis Engine for (Constraint) Logic Programs (ADK, KM, HS, PJS), pp. 385–386.
SASSAS-1996-Nielson #perspective #program analysis #semantics
Semantics-Directed Program Analysis: A Tool-Maker’s Perspective (FN), pp. 2–21.
SASSAS-1996-PueblaH #algorithm #analysis #incremental #logic programming #source code
Optimized Algorithms for Incremental Analysis of Logic Programs (GP, MVH), pp. 270–284.
SASSAS-1996-Venet #alias #analysis #source code
Abstract Cofibered Domains: Application to the Alias Analysis of Untyped Programs (AV), pp. 366–382.
STOCSTOC-1996-DimitriouI #algorithm #analysis #optimisation #towards
Towards an Analysis of Local Optimization Algorithms (TD, RI), pp. 304–313.
STOCSTOC-1996-Slavik #algorithm #analysis #set
A Tight Analysis of the Greedy Algorithm for Set Cover (PS), pp. 435–441.
FMFME-1996-BicarreguiDW #analysis #formal method
Quantitative Analysis of an Application of Formal Methods (JB, JD, EW), pp. 60–73.
FMFME-1996-BoigelotG #analysis #model checking #protocol #using
Model Checking in Practice: An Analysis of the ACCESS.bus Protocol using SPIN (BB, PG), pp. 465–478.
ICFPICFP-1996-AbadiLL #analysis #dependence
Analysis and Caching of Dependencies (MA, BWL, JJL), pp. 83–91.
ICFPICFP-1996-SerranoF #analysis
Storage Use Analysis and its Applications (MS, MF), pp. 50–61.
IFLIFL-1996-DebbabiFT #algorithm #analysis #concurrent #control flow #higher-order #source code #type system
A Type-Based Algorithm for the Control-Flow Analysis of Higher-Order Concurrent Programs (MD, AF, NT), pp. 247–266.
CHICHI-1996-Erickson #analysis #design
The Design and Long-Term Use of a Personal Electronic Notebook: A Teflective Analysis (TE), pp. 11–18.
CHICHI-1996-WeisbandK
Self Disclosure on Computer Forms: Meta-Analysis and Implications (SPW, SBK), pp. 3–10.
AdaEuropeAdaEurope-1996-Rosskopf #ada #assessment #safety #static analysis
Use of a Static Analysis Tool for Safety-Critical Ada Applications: A Critical Assessment (AR), pp. 183–197.
CAiSECAiSE-1996-BatesBFL #analysis #formal method #guidelines #object-oriented
Guidelines for Formalizing Fusion Object-Oriented Analysis Methods (BWB, JMB, RBF, MMLP), pp. 222–233.
CAiSECAiSE-1996-CastanoA #analysis #process #unification
Techniques for Process Analysis and Unification (SC, VDA), pp. 234–254.
KDDAKDDM-1996-FayyadDW #analysis #automation
Automating the Analysis and Cataloging of Sky Surveys (UMF, SGD, NW), pp. 471–493.
ICMLICML-1996-OkamotoY #analysis #classification #nearest neighbour
Theoretical Analysis of the Nearest Neighbor Classifier in Noisy Domains (SO, NY), pp. 355–363.
ICPRICPR-1996-AstromH #analysis #detection #modelling #probability
Stochastic modelling and analysis of sub-pixel edge detection (, AH), pp. 86–90.
ICPRICPR-1996-AstromH96a #analysis #probability
Stochastic analysis of scale-space smoothing (, AH), pp. 305–309.
ICPRICPR-1996-BatistaAA #analysis
Pose view stability analysis for camera look angles computation (JB, HA, ATdA), pp. 171–175.
ICPRICPR-1996-BelloK #analysis #using
Co-occurrence-based texture analysis using irregular tessellations (FB, RIK), pp. 780–784.
ICPRICPR-1996-BiancardiM #analysis #component #image #source code
Connected component support for image analysis programs (AB, AM), pp. 620–624.
ICPRICPR-1996-ChangH #analysis
Ribbon-based motion analysis of human body movements (ICC, CLH), pp. 436–440.
ICPRICPR-1996-ChenL96a #analysis #multi
A multiresolution wavelet analysis of digital mammograms (CHC, GGL), pp. 710–714.
ICPRICPR-1996-ChenLC #analysis #classification #sequence #using
Handwritten Chinese character analysis and preclassification using stroke structural sequence (ZC, CWL, RHC), pp. 89–93.
ICPRICPR-1996-Dzemyda #analysis #set #visual notation
Visual analysis of a set of function values (GD), pp. 700–704.
ICPRICPR-1996-GunselT #analysis #retrieval #similarity
Similarity analysis for shape retrieval by example (BG, AMT), pp. 330–334.
ICPRICPR-1996-HancockP #analysis #correlation #exponential #memory management
An analysis of the exponential correlation associative memory (ERH, MP), pp. 291–295.
ICPRICPR-1996-Hauta-KasariPJL #analysis #matrix #multi
Generalized co-occurrence matrix for multispectral texture analysis (MHK, JP, TJ, RL), pp. 785–789.
ICPRICPR-1996-HotterMM #analysis #detection #estimation #fault #robust #statistics #using
Detection of moving objects using a robust displacement estimation including a statistical error analysis (MH, RM, MM), pp. 249–255.
ICPRICPR-1996-HusseinNO #analysis #using
Analysis of detailed patterns of contour shapes using wavelet local extrema (EH, YN, YO), pp. 335–339.
ICPRICPR-1996-KashinoH #analysis #integration #music
A music scene analysis system with the MRF-based information integration scheme (KK, NH), pp. 725–729.
ICPRICPR-1996-KasprzakC #analysis #component #image #independence
Hidden image separation from incomplete image mixtures by independent component analysis (WK, AC), pp. 394–398.
ICPRICPR-1996-KiaD #analysis #documentation
Structural compression for document analysis (OEK, DSD), pp. 664–668.
ICPRICPR-1996-KosibaK #analysis #automation
Automatic invoice interpretation: invoice structure analysis (DAK, RK), pp. 721–725.
ICPRICPR-1996-KotcheffRTH #analysis
Shape model analysis of THR radiographs (ACWK, ALR, CJT, DWLH), pp. 391–395.
ICPRICPR-1996-KrotkovKZ #analysis #invariant #synthesis
Analysis and synthesis of the sounds of impact based on shape-invariant properties of materials (EK, RLK, NBZ), pp. 115–119.
ICPRICPR-1996-LasakulAK #analysis #formal method #image #linear #multi #using
A theory of image restoration for linear spatial degradation using multiresolution analysis (AL, KA, SK), pp. 422–426.
ICPRICPR-1996-Marchand-MailletS #analysis #approach #image
A minimum spanning tree approach to line image analysis (SMM, YMS), pp. 225–230.
ICPRICPR-1996-MozefWJT #analysis #architecture #component #parallel
Parallel architecture dedicated to connected component analysis (EM, SW, JJ, ET), pp. 699–703.
ICPRICPR-1996-NakajimaTKY #analysis #layout #process #verification
Analysis of address layout on Japanese handwritten mail-a hierarchical process of hypothesis verification (NN, TT, TK, KY), pp. 726–731.
ICPRICPR-1996-Nishida #analysis #modelling #synthesis
Analysis and synthesis of deformed patterns based on structural models (HN), pp. 315–319.
ICPRICPR-1996-OkadaS #analysis
A morphological subtraction scheme for form analysis (MO, MS), pp. 190–194.
ICPRICPR-1996-Polikarpova #analysis #on the
On the fractal features in fingerprint analysis (NP), pp. 591–595.
ICPRICPR-1996-Roberts #analysis #clustering
Scale-space unsupervised cluster analysis (SJR), pp. 106–110.
ICPRICPR-1996-Sablatnig #analysis #automation #detection #flexibility #visual notation
Flexible automatic visual inspection based on the separation of detection and analysis (RS), pp. 944–948.
ICPRICPR-1996-SakanoKM #algorithm #image #search-based
Seeing the character images that an OCR system sees-analysis by genetic algorithm (HS, HK, NM), pp. 411–416.
ICPRICPR-1996-SawasakiMU #analysis #design #implementation #performance #realtime #visual notation
Design and implementation of high-speed visual tracking system for real-time motion analysis (NS, TM, TU), pp. 478–483.
ICPRICPR-1996-ShihHL #analysis #estimation #parametricity
Accuracy analysis on the estimation of camera parameters for active vision systems (SWS, YPH, WSL), pp. 930–935.
ICPRICPR-1996-ShiniK #3d #analysis #metric
3D measurement strategy based on a projection invariance motion analysis with an artificial retina sensor (CWS, KIK), pp. 369–373.
ICPRICPR-1996-Sinclair96a #analysis #clustering
Cluster-based texture analysis (DS), pp. 825–829.
ICPRICPR-1996-Solberg #analysis #classification #flexibility
Texture fusion and classification based on flexible discriminant analysis (AHSS), pp. 596–600.
ICPRICPR-1996-SugiyamaA #analysis #multi
Edge feature analysis by a vectorized feature extractor and in multiple edges (TS, KA), pp. 280–284.
ICPRICPR-1996-TatsunoSYIT #analysis #image #synthesis #using
Analysis and synthesis of six primary facial expressions using range images (YT, SS, NY, HI, HT), pp. 489–493.
ICPRICPR-1996-TozakiKNOEM #3d #analysis #image #using
Three-dimensional analysis of lung areas using thin-slice CT images (TT, YK, NN, HO, KE, NM), pp. 548–552.
ICPRICPR-1996-UhlF #analysis #recognition
Spatiotemporal signal analysis: recognition of interacting modes (CU, RF), pp. 55–59.
ICPRICPR-1996-WalkerJ #analysis #geometry #statistics
Statistical geometric features-extensions for cytological texture analysis (RFW, PTJ), pp. 790–794.
ICPRICPR-1996-WangF #algorithm #analysis #bibliography #pattern matching #pattern recognition #recognition #search-based
Applying genetic algorithms on pattern recognition: an analysis and survey (YKW, KCF), pp. 740–744.
ICPRICPR-1996-WatanabeTO #analysis #recognition
A moving object recognition method by optical flow analysis (MW, NT, KO), pp. 528–533.
ICPRICPR-1996-WilsonCH #analysis
Sensitivity analysis for structural matching (RCW, ADJC, ERH), pp. 62–66.
ICPRICPR-1996-WorringW #analysis #using
Analysis of complex motion patterns using region-based curve analysis (MW, AdW), pp. 388–392.
ICPRICPR-1996-WouwerSD #analysis #classification #speech
Wavelet-FILVQ classifier for speech analysis (GVdW, PS, DVD), pp. 214–218.
ICPRICPR-1996-Young #analysis #image
Sampling density for image analysis (ITY), pp. 840–843.
ICPRICPR-1996-ZribiFG #3d #analysis #invariant #set
Set of invariant features for three-dimensional gray-level objects by harmonic analysis (MZ, HF, FG), pp. 549–553.
KDDKDD-1996-FayyadHS #data analysis
KDD for Science Data Analysis: Issues and Examples (UMF, DH, PES), pp. 50–56.
SEKESEKE-1996-CiancariniCM #analysis #requirements #testing
Engineering Formal Requirements: Analysis and Testing (PC, SC, CM), pp. 385–392.
SEKESEKE-1996-Starks #analysis #architecture #development
Development of a Software Architecture for the Analysis of Geographic and Image-Based Data (SAS), pp. 116–120.
SEKESEKE-1996-SunM #automation #named #program analysis
Wheels: An Automated Program Analysis Tool (AYS, BMM), pp. 269–276.
SEKESEKE-1996-WangTCR #analysis #slicing
The Role of Program Slicing in Ripple Effect Analysis (YW, WTT, XC, SR), pp. 369–376.
SEKESEKE-1996-XuZ #analysis #automation #problem #requirements #specification
Requirements Analysis and Specification as a Problem of Software Automation (JX, HZ), pp. 457–464.
SIGIRSIGIR-1996-XuC #analysis #documentation #query #using
Query Expansion Using Local and Global Document Analysis (JX, WBC), pp. 4–11.
OOPSLAOOPSLA-1996-BaconS #c++ #performance #static analysis
Fast Static Analysis of C++ Virtual Function Calls (DFB, PFS), pp. 324–341.
OOPSLAOOPSLA-1996-DiwanMM #analysis #effectiveness #object-oriented #source code #static typing
Simple and Effective Analysis of Statically Typed Object-Oriented Programs (AD, JEBM, KSM), pp. 292–305.
PPDPPLILP-1996-WeyerW #analysis #graph #prolog
Annotated Structure Shape Graphs for Abstract Analysis of Prolog (GW, WHW), pp. 92–106.
POPLPOPL-1996-Ashley #analysis #flexibility #higher-order
A Practical and Flexible Flow Analysis for Higher-Order Languages (JMA), pp. 184–194.
POPLPOPL-1996-ColbyL #program analysis
Trace-Based Program Analysis (CC, PL), pp. 195–207.
POPLPOPL-1996-DaviesP #analysis #staged
A Modal Analysis of Staged Computation (RD, FP), pp. 258–270.
POPLPOPL-1996-GhiyaH #analysis #c #graph #pointer
Is it a Tree, a DAG, or a Cyclic Graph? A Shape Analysis for Heap-Directed Pointers in C (RG, LJH), pp. 1–15.
POPLPOPL-1996-GuptaS #source code #static analysis
Static Analysis to Reduce Synchronization Costs in Data-Parallel Programs (MG, ES), pp. 322–332.
POPLPOPL-1996-SagivRW #problem
Solving Shape-Analysis Problems in Languages with Destructive Updating (SS, TWR, RW), pp. 16–31.
POPLPOPL-1996-Steensgaard #analysis #linear #points-to
Points-to Analysis in Almost Linear Time (BS), pp. 32–41.
REICRE-1996-Anton #analysis #requirements
Goal-Based Requirements Analysis (AIA), pp. 136–144.
REICRE-1996-BustardDC #analysis #object-oriented
Integrating Soft Systems and Object-Oriented Analysis (DWB, TJD, BNC), pp. 52–59.
REICRE-1996-ChampionM #analysis #enterprise #requirements
Exploiting an enterprise model during systems’ requirements capture and analysis (REMC, TTM), pp. 208–216.
REICRE-1996-KoestersPS #analysis #information management #named #object-oriented
GeoOOA: Object-Oriented Analysis for Geographic Information Systems (GK, BUP, HWS), pp. 245–254.
REICRE-1996-KostersSV #analysis #requirements #user interface
Combined Analysis of User Interface and Domain Requirements (GK, HWS, JV), pp. 199–207.
REICRE-1996-LutzW #analysis #case study #experience #requirements
Experience Report: Contributions of SFMEA to Requirements Analysis (RRL, RMW), pp. 44–51.
REICRE-1996-NissenJJZH #analysis #case study #concept #experience #modelling #multi #requirements
Requirements Analysis from Multiple Perspectives: Experiences with Conceptual Modeling Technology (HWN, MAJ, MJ, GVZ, HH), p. 217.
REICRE-1996-SantosC #analysis #assessment #development #information management #object-oriented
An assessment of the applicability of object-oriented analysis to the development of information systems (IS, JAC), pp. 238–244.
REICRE-1996-TakahashiPKOS #analysis #collaboration #hypermedia #requirements
Hypermedia Support for Collaboration in Requirements Analysis (KT, CP, VK, KO, JDS), pp. 31–41.
REICRE-1996-Vanwelkenhuysen #analysis #development #quality #requirements
Quality Requirements Analysis in Customer-Centered Software Development (JV), pp. 117–125.
SACSAC-1996-Asgharzadeh #analysis #fuzzy #image #rule-based #using
Image analysis and enhancement using fuzzy rule based expert system (AA), pp. 529–531.
SACSAC-1996-RajePG #analysis #named #object-oriented #source code
OFFERS — a tool for hierarchical implicit analysis of sequential object-oriented programs (RRR, DP, ETG), pp. 437–441.
FSEFSE-1996-NaumovichCO #analysis #communication #data flow #protocol #using #verification
Verification of Communication Protocols Using Data Flow Analysis (GN, LAC, LJO), pp. 93–105.
ICSEICSE-1996-AtkinsonG #design #program analysis #tool support
The Design of Whole-Program Analysis Tools (DCA, WGG), pp. 16–27.
ICSEICSE-1996-CheungK #analysis #composition #reachability #safety
Checking Subsystem Safety Properties in Compositional Reachability Analysis (SCC, JK), pp. 144–154.
ICSEICSE-1996-Forgacs #analysis #array #data flow #testing
An Exact Array Reference Analysis for Data Flow Testing (IF), pp. 565–574.
ICSEICSE-1996-WoodsY #analysis #approach #comprehension #heuristic #problem
The Program Understanding Problem: Analysis and a Heuristic Approach (SGW, QY), pp. 6–15.
ASPLOSASPLOS-1996-ChenCM #analysis #branch #predict
Analysis of Branch Prediction Via Data Compression (ICKC, JTC, TNM), pp. 128–137.
ASPLOSASPLOS-1996-McKinleyT #analysis #locality
A Quantitative Analysis of Loop Nest Locality (KSM, OT), pp. 94–104.
CCCC-1996-Assmann #graph grammar #how #program analysis #program transformation #term rewriting
How to Uniformly Specify Program Analysis and Transformation with Graph Rewrite Systems (UA), pp. 121–135.
CCCC-1996-BoucherF #compilation #implementation #paradigm #static analysis
Abstract Compilation: A New Implementation Paradigm for Static Analysis (DB, MF), pp. 192–207.
CCCC-1996-Steensgaard #analysis #points-to #source code #type inference
Points-to Analysis by Type Inference of Programs with Structures and Unions (BS), pp. 136–150.
CAVCAV-1996-CamposG #analysis #model checking #verification
Selective Quantitative Analysis and Interval Model Checking: Verifying Different Facets of a System (SVAC, OG), pp. 257–268.
CAVCAV-1996-ClarkeBLXS #analysis #bound #named #realtime #specification #tool support #visual notation
XVERSA: An Integrated Graphical and Textual Toolset for the Specification and Analysis of Resource-Bound Real-Time Sytems (DC, HBA, IL, HlX, OS), pp. 402–405.
CAVCAV-1996-MerinoT #analysis #communication #integration #named #protocol #verification
EVP: Integration of FDTs for the Analysis and Verification of Communication Protocols (PM, JMT), pp. 406–410.
CAVCAV-1996-TripakisY #analysis #bisimulation
Analysis of Timed Systems Based on Time-Abstracting Bisimulation (ST, SY), pp. 232–243.
ISSTAISSTA-1996-ChamillardC #analysis #concurrent #petri net #source code
Improving the Accuracy of Petri Net-Based Analysis of Concurrent Programs (ATC, LAC), pp. 24–38.
ISSTAISSTA-1996-DaranT #analysis #case study #fault
Software Error Analysis: A Real Case Study Involving Real Faults and Mutations (MD, PTF), pp. 158–171.
ISSTAISSTA-1996-Heimdahl #analysis #case study #experience #lessons learnt
Experiences and Lessons from the Analysis of TCAS II (MPEH), pp. 79–83.
ISSTAISSTA-1996-HowdenS #analysis #linear #sequence
Linear and Structural Event Sequence Analysis (WEH, GMS), pp. 98–106.
ISSTAISSTA-1996-KangL #analysis #generative #performance #realtime
An Efficient State Space Generation for Analysis of Real-Time Systems (IK, IL), pp. 4–13.
ISSTAISSTA-1996-MorellM #analysis #testing #using
Using Perturbation Analysis to Measure Variation in the Information Content of Test Sets (LJM, BWM), pp. 92–97.
ISSTAISSTA-1996-PezzeY #analysis #generative #multi #tool support
Generation of Multi-Formalism State-Space Analysis Tools (MP, MY), pp. 172–179.
ISSTAISSTA-1996-PomakisA #analysis #feature model #interactive #reachability
Reachability Analysis of Feature Interactions: A Progress Report (KPP, JMA), pp. 216–223.
ISSTAISSTA-1996-Tracz #analysis #architecture
Test and Analysis of Software Architectures (WT), pp. 1–3.
ICLPJICSLP-1996-FalaschiHW #analysis #concurrent #constraints #source code
Demand Transformation Analysis for Concurrent Constraint Programs (MF, PH, WHW), pp. 333–347.
LICSLICS-1996-BasinG #analysis #complexity #order
Complexity Analysis Based on Ordered Resolution (DAB, HG), pp. 456–465.
LICSLICS-1996-Davies #analysis #approach
A Temporal-Logic Approach to Binding-Time Analysis (RD), pp. 184–195.
DACDAC-1995-LeeT #algorithm #analysis #incremental
An Algorithm for Incremental Timing Analysis (JfL, DTT), pp. 696–701.
DACDAC-1995-LiM #analysis #embedded #performance #using
Performance Analysis of Embedded Software Using Implicit Path Enumeration (YTSL, SM), pp. 456–461.
DACDAC-1995-Rao #analysis #distributed
Delay Analysis of the Distributed RC Line (VBR), pp. 370–375.
DACDAC-1995-Ribas-XirgoC #analysis #fault #simulation
Analysis of Switch-Level Faults by Symbolic Simulation (LR, JC), pp. 352–357.
DACDAC-1995-RohfleischWA #analysis #logic #optimisation
Logic Clause Analysis for Delay Optimization (BR, BW, KA), pp. 668–672.
DACDAC-1995-TelicheveskyKW #analysis #performance
Efficient Steady-State Analysis Based on Matrix-Free Krylov-Subspace Methods (RT, KSK, JW), pp. 480–484.
DACDAC-1995-TremblayMIK #analysis #architecture #flexibility #performance #trade-off
A Fast and Flexible Performance Simulator for Micro-Architecture Trade-off Analysis on UltraSPARC-I (MT, GM, AI, LK), pp. 2–6.
DACDAC-1995-WempleY #analysis #megamodelling #using
Mixed-Signal Switching Noise Analysis Using Voronoi-Tessellated Substrate Macromodels (ILW, ATY), pp. 439–444.
ICDARICDAR-v1-1995-EspositoMS #analysis #approach #knowledge-based #layout
A knowledge-based approach to the layout analysis (FE, DM, GS), pp. 466–471.
ICDARICDAR-v1-1995-GarciaDPC #analysis #detection #fault #pseudo #recognition #using
Error detection in character recognition using pseudosyllable analysis (RGG, YAD, FMP, JLC), pp. 446–449.
ICDARICDAR-v1-1995-GreenK #analysis #modelling
Model-based analysis of printed tables (EAG, MSK), pp. 214–217.
ICDARICDAR-v1-1995-HoriD #analysis #reasoning #robust
Robust table-form structure analysis based on box-driven reasoning (OH, DSD), pp. 218–221.
ICDARICDAR-v1-1995-LeTW #analysis #documentation #image #using
Document image analysis using integrated image and neural processing (DXL, GRT, HW), pp. 327–330.
ICDARICDAR-v1-1995-TwaakyondoO #analysis #recognition
Structure analysis and recognition of mathematical expressions (HMT, MO), pp. 430–437.
ICDARICDAR-v2-1995-AlimiG #analysis #fault #online #recognition
The analysis of error in an on-line recognition system of Arabic handwritten characters (AMA, OAG), pp. 890–893.
ICDARICDAR-v2-1995-CouasnonC #analysis #documentation #music #recognition
A way to separate knowledge from program in structured document analysis: application to optical music recognition (BC, JC), pp. 1092–1097.
ICDARICDAR-v2-1995-FutrelleN #analysis #constraints #diagrams #parsing #performance #using
Efficient analysis of complex diagrams using constraint-based parsing (RPF, NN), pp. 782–790.
ICDARICDAR-v2-1995-Hirayama #analysis #using
A method for table structure analysis using DP matching (YH), pp. 583–586.
ICDARICDAR-v2-1995-Hoch #analysis #documentation #named #recognition
READLEX: a lexicon for the recognition and analysis of structured documents (RH), pp. 549–552.
ICDARICDAR-v2-1995-Liu-GongDP #analysis #documentation #layout #recognition
A general analysis system for document’s layout structure recognition (YHLG, BD, HNP), pp. 597–600.
ICDARICDAR-v2-1995-LuLC #analysis #documentation #named #retrieval
TheSys — A comprehensive thesaurus system for intelligent document analysis and text retrieval (CL, KHL, HYC), pp. 1169–1173.
ICDARICDAR-v2-1995-PavlidisSS #analysis #graph
Matching graph embeddings for shape analysis (TP, WJS, HS), pp. 729–733.
ICDARICDAR-v2-1995-SauvolaP #analysis #classification #feature model #performance #segmentation #using
Page segmentation and classification using fast feature extraction and connectivity analysis (JJS, MP), pp. 1127–1131.
ICDARICDAR-v2-1995-TangMMLS #analysis #approach #documentation
A new approach to document analysis based on modified fractal signature (YYT, HM, XM, DL, CYS), pp. 567–570.
ICDARICDAR-v2-1995-TrierTJ #analysis
Data capture from maps based on gray scale topographic analysis (ØDT, TT, AKJ), pp. 923–926.
ESOPESOP-J-1994-HankinM95 #lazy evaluation #program analysis #type inference
Lazy Type Inference and Program Analysis (CH, DLM), pp. 219–249.
ICSMEICSM-1995-BarrosBEQV #automation #impact analysis
Supporting impact analysis: a semi-automated technique and associated tool (SB, TB, AE, JPQ, JFV), pp. 42–51.
ICSMEICSM-1995-Williams #analysis #case study #design #experience #object-oriented #using
Using object oriented analysis and design in a non-object oriented environment experience report (KW), p. 109–?.
WCREWCRE-1995-LeiteC #analysis #specification
Recovering Business Rules from Structured Analysis Specifications (JCSdPL, PMC), pp. 13–21.
PEPMPEPM-1995-Cridlig #analysis #concurrent #model checking #semantics #using
Semantic Analysis of Shared-Memory Concurrent Languages using Abstract Model-Checking (RC), pp. 214–225.
PEPMPEPM-1995-DasRH #analysis #imperative #semantics #source code
Semantic Foundations of Binding Time Analysis for Imperative Programs (MD, TWR, PVH), pp. 100–110.
PEPMPEPM-1995-Jensen #analysis #data flow #source code
Clock Analysis of Synchronous Dataflow Programs (TPJ), pp. 156–167.
PEPMPEPM-1995-Lu #analysis #logic programming #source code
Type Analysis of Logic Programs in the Presence of Type Definitions (LL), pp. 241–252.
PEPMPEPM-1995-RamakrishnanRS #analysis #constraints #framework #logic programming #source code #theorem proving
A Symbolic Constraint Solving Framework for Analysis of Logic Programs (CRR, IVR, RCS), pp. 12–23.
PEPMPEPM-1995-Reps #analysis #problem
Shape Analysis as a Generalized Path Problem (TWR), pp. 1–11.
PLDIPLDI-1995-AikenFL #analysis #higher-order #memory management
Better Static Memory Management: Improving Region-Based Analysis of Higher-Order Languages (AA, MF, RL), pp. 174–185.
PLDIPLDI-1995-Ruf #alias #analysis
Context-Insensitive Alias Analysis Reconsidered (ER), pp. 13–22.
PLDIPLDI-1995-WilsonL #analysis #c #performance #pointer #source code
Efficient Context-Sensitive Pointer Analysis for C Programs (RPW, MSL), p. 1–?.
SASSAS-1995-DussartHM #analysis #polymorphism #polynomial #recursion #type system
Polymorphic Recursion and Subtype Qualifications: Polymorphic Binding-Time Analysis in Polynomial Time (DD, FH, CM), pp. 118–135.
SASSAS-1995-Giesl #analysis #functional #order #source code #termination #using
Termination Analysis for Functional Programs using Term Orderings (JG), pp. 154–171.
SASSAS-1995-Hannan #analysis #functional #stack #type system
A Type-based Analysis for Stack Allocation in Functional Languages (JH), pp. 172–188.
SASSAS-1995-Heintze #analysis #control flow #type system
Control-Flow Analysis and Type Systems (NH), pp. 189–206.
SASSAS-1995-JagannathanW #analysis #effectiveness #runtime
Effective Flow Analysis for Avoiding Run-Time Checks (SJ, AKW), pp. 207–224.
SASSAS-1995-KobayashiNY #communication #concurrent #programming language #static analysis
Static Analysis of Communication for Asynchronous Concurrent Programming Languages (NK, MN, AY), pp. 225–242.
SASSAS-1995-Mohnen #analysis #higher-order #inheritance #performance
Efficient Closure Utilisation by Higher-Order Inheritance Analysis (MM), pp. 261–278.
SASSAS-1995-Seward #analysis #haskell #implementation #polymorphism #prototype
Beyond Prototype Implementations: Polymorphic Projection Analysis for Glasgow Haskell (JS), pp. 382–399.
SASSAS-1995-Vedrine #abstract interpretation #analysis #strict
Binding-Time Analysis and Strictness Analysis by Abstract Interpretation (FV), pp. 400–417.
FPCAFPCA-1995-CousotC #abstract interpretation #constraints #formal method #program analysis
Formal Language, Grammar and Set-Constraint-Based Program Analysis by Abstract Interpretation (PC, RC), pp. 170–181.
FPCAFPCA-1995-JeuringS #analysis #functional #problem #source code
Constructing Functional Programs for Grammar Analysis Problems (JJ, SDS), pp. 259–269.
CHICHI-1995-AalstCM #analysis #design #framework #learning #user interface
Design Space Analysis as “Training Wheels” in a Framework for Learning User Interface Design (JWvA, TTC, DLM), pp. 154–161.
AdaEuropeAdaEurope-1995-SchneeweissAV #ada #analysis #modelling #object-oriented
Translating Shlaer/Mellor Object-Oriented Analysis Models into Ada 95 (HS, VA, OV), pp. 249–270.
AdaEuropeAdaEurope-1995-Simoens #analysis #design #development #lifecycle #metric #object-oriented
The Introduction of an Object-Oriented Analysis/Design Method and Object-Oriented Metrics in the Software Development Life-Cycle (RS), pp. 271–283.
AdaTRI-Ada-1995-Shumate95b #analysis #design #functional #object-oriented #requirements
BATCES Solution #1: An Object-Oriented Design from Functional Requirements Analysis (KS), pp. 737–739.
CAiSECAiSE-1995-DuffyMMM #analysis #automation #framework #reasoning #requirements #using
A Framework for Requirements Analysis Using Automated Reasoning (DAD, CM, JAM, PM), pp. 68–81.
CAiSECAiSE-1995-Herbst #analysis #metamodelling
A Meta-Model for Business Rules in Systems Analysis (HH), pp. 186–199.
CAiSECAiSE-1995-OpdahlS #analysis #modelling #problem
Facet Models for Problem Analysis (ALO, GS), pp. 54–67.
ICMLICML-1995-Cussens #algorithm #analysis #finite #learning
A Bayesian Analysis of Algorithms for Learning Finite Functions (JC), pp. 142–149.
SEKESEKE-1995-Debenham #analysis #approach #design #knowledge-based #requirements #specification
A Unified Approach to Requirements Specification and System Analysis in the Design of Knowledge-Based Systems (JKD), p. 144.
SEKESEKE-1995-LuD #analysis #distributed #object-oriented #simulation #specification
An Environment for Specification, Simulation and Analysis of Distributed Object-Oriented Systems (SL, YD), pp. 402–410.
SIGIRSIGIR-1995-Dubin #analysis #documentation #visualisation
Document Analysis for Visualization (DD), pp. 199–204.
SIGIRSIGIR-1995-Ornager #analysis #clustering #database #empirical #image #word
The Newspaper Image Database: Empirical Supported Analysis of Users’ Typology and Word Association Clusters (SO), pp. 212–218.
ECOOPECOOP-1995-DeanGC #analysis #object-oriented #optimisation #source code #using
Optimization of Object-Oriented Programs Using Static Class Hierarchy Analysis (JD, DG, CC), pp. 77–101.
LOPSTRLOPSTR-1995-GallardoT #abstract interpretation #cost analysis #framework #logic
Studying the Cost of Logic Languages in an Abstract Interpretation Framework for Granularity Analysis (MdMG, JMT), pp. 91–105.
LOPSTRLOPSTR-1995-VasconcelosF #approach #logic programming #optimisation #program analysis #using
An Opportunistic Approach for Logic Program Analysis and Optimisation Using Enhanced Schema-Based Transformations (WWV, NEF), pp. 174–188.
LOPSTRLOPSTR-1995-WaalT #deduction #problem #program analysis #program transformation #using
Solving Deductive Planning Problems Using Program Analysis and Transformation (DAdW, MT), pp. 189–203.
PPDPPLILP-1995-MasseyT #analysis #array #comprehension
Modes of Comprehension: Mode Analysis of Arrays and Array Comprehensions (BCM, ET), pp. 207–222.
PPDPPLILP-1995-MycroftS #analysis
Uniform PERs and Comportment Analysis (AM, KLS), pp. 169–187.
POPLPOPL-1995-AltucherL #alias #analysis
An Extended Form of Must Alias Analysis for Dynamic Allocation (RA, WL), pp. 74–84.
POPLPOPL-1995-HarperM #analysis #compilation #morphism #polymorphism #using
Compiling Polymorphism Using Intensional Type Analysis (RH, JGM), pp. 130–141.
POPLPOPL-1995-JagannathanW #analysis #higher-order
A Unified Treatment of Flow Analysis in Higher-Order Languages (SJ, SW), pp. 393–407.
POPLPOPL-1995-PalsbergO #analysis #type system
A Type System Equivalent to Flow Analysis (JP, PO), pp. 367–378.
POPLPOPL-1995-RepsHS #analysis #data flow #graph #interprocedural #precise #reachability
Precise Interprocedural Dataflow Analysis via Graph Reachability (TWR, SH, SS), pp. 49–61.
RERE-1995-AtleeM #analysis #requirements #safety
Integrating requirements analysis and safety analysis (JMA, JAM), pp. 158–159.
RERE-1995-BustardL #analysis #formal method #modelling
Enhancing soft systems analysis with formal modelling (DWB, PJL), pp. 164–171.
RERE-1995-PottsTSO #analysis #evaluation #internet #requirements
An evaluation of inquiry-based requirements analysis for an Internet service (CP, KT, JDS, KO), pp. 172–180.
SACSAC-1995-ChenH #algorithm #analysis #concurrent #database #performance
Performance analysis of a periodic data reorganization algorithm for concurrent B-trees in database systems (IRC, SH), pp. 40–45.
SACSAC-1995-PandaP #cost analysis #execution #query
Query execution in prism and seaview: a cost analysis (BP, WP), pp. 65–70.
SACSAC-1995-Serrano #analysis #compilation #control flow #functional #paradigm
Control flow analysis: a functional languages compilation paradigm (MS), pp. 118–122.
SACSAC-1995-SmithPN #analysis #network #performance
Performance analysis of small FDDI networks (JS, LDP, TN), pp. 401–405.
SACSAC-1995-WongP #analysis #design
Design and analysis of fractals in an individual computing environment (KWW, JP), pp. 431–433.
ESECESEC-1995-Chamillard #analysis #case study #metric #performance #predict #reachability
An Exploratory Study of Program Metrics as Predictors of Reachability Analysis Performance (ATC), pp. 343–361.
ESECESEC-1995-GaskellP #ambiguity #analysis #execution #semantics
A Structured Analysis Formalism with Execution Semantics to Allow Unambiguous Model Interpretation (CG, RP), pp. 235–253.
ESECESEC-1995-WagnerG #analysis #incremental
Integrating Incremental Analysis with Version Management (TAW, SLG), pp. 205–218.
FSEFSE-1995-CheungK #analysis #composition #constraints #distributed #finite #reachability
Compositional Reachability Analysis of Finite-State Distributed Systems with User-Specified Constraints (SCC, JK), pp. 140–150.
FSEFSE-1995-HorwitzRS #analysis #data flow #interprocedural
Demand Interprocedural Dataflow Analysis (SH, TWR, SS), pp. 104–115.
ICSEICSE-1995-CookW #automation #data analysis #process
Automating Process Discovery Through Event-Data Analysis (JEC, ALW), pp. 73–82.
ICSEICSE-1995-HeimdahlL #analysis #consistency #requirements
Completeness and Consistency Analysis of State-Based Requirements (MPEH, NGL), pp. 3–14.
ICSEICSE-1995-HenningerLR #analysis #approach #learning
An Organizational Learning Approach to Domain Analysis (SH, KL, AR), pp. 95–104.
ISMMIWMM-1995-Wadler #static analysis
Static Analysis Refuses to Stay Still: Prospects of Static Analysis for Dynamic Allocation (Abstract) (PW), p. 117.
LCTESLCT-RTS-1995-CamposCMM #analysis #finite #named #realtime
Verus: A Tool for Quantitative Analysis of Finite-State Real-Time Systems (SVAC, EMC, WRM, MM), pp. 70–78.
LCTESLCT-RTS-1995-JourdanM #analysis #realtime
Static Timing Analysis of Real-Time Systems (MJ, FM), pp. 79–87.
LCTESLCT-RTS-1995-KoWH #analysis #constraints
Supporting User-Friendly Analysis of Timing Constraints (LK, DBW, MGH), pp. 99–107.
LCTESLCT-RTS-1995-LiM #analysis #embedded #performance #using
Performance Analysis of Embedded Software Using Implicit Path Enumeration (YTSL, SM), pp. 88–98.
LCTESLCT-RTS-1995-NilsenR #analysis #execution #worst-case
Worst-Case Execution Time Analysis on Modern Processors (KDN, BR), pp. 20–30.
PPoPPPPoPP-1995-CollardBF #analysis #array #data flow #fuzzy
Fuzzy Array Dataflow Analysis (JFC, DB, PF), pp. 92–101.
CAVCAV-1995-EirikssonM #analysis #case study #design #using #verification
Using Formal Verification/Analysis Methods on the Critical Path in System Design: A Case Study (ÁTE, KLM), pp. 367–380.
CAVCAV-1995-HenzingerH #algorithm #analysis #hybrid
Algorithmic Analysis of Nonlinear Hybrid Systems (TAH, PHH), pp. 225–238.
CAVCAV-1995-HoW #analysis #automation #protocol
Automated Analysis of an Audio Control Protocol (PHH, HWT), pp. 381–394.
CAVCAV-1995-HulgaardB #analysis #performance #petri net
Efficient Timing Analysis of a Class of Petri Nets (HH, SMB), pp. 423–436.
ICLPICLP-1995-HeintzeJ #algorithm #analysis
A Generic Algorithm for CLP Analysis (NH, JJ), pp. 49–63.
ICLPICLP-1995-HermenegildoPMS #analysis #incremental #logic programming #source code
Incremental Analysis of Logic Programs (MVH, GP, KM, PJS), pp. 797–811.
ICLPICLP-1995-ZhaoCU #analysis #concurrent #dependence #logic programming #source code
Program Dependence Analysis of Concurrent Logic Programs and Its Applications (JZ, JC, KU), p. 825.
ICLPILPS-1995-BandaMS #analysis #logic programming #performance #scheduling #source code
Efficient Analysis of Logic Programs with Dynamic Scheduling (MJGdlB, KM, PJS), pp. 417–431.
ICLPILPS-1995-GallagherBS #logic programming #modelling #source code #static analysis
Practical Model-Based Static Analysis for Definite Logic Programs (JPG, DB, HS), pp. 351–365.
ICLPILPS-1995-Lindgren #analysis #control flow #prolog
Control Flow Analysis of Prolog (TL), pp. 432–446.
LICSLICS-1995-Wang #analysis #behaviour #realtime
Timing Behavior Analysis for Real-Time Systems (FW), pp. 112–122.
DACDAC-1994-BhattacharyaDB94a #analysis #optimisation #performance #specification
Performance Analysis and Optimization of Schedules for Conditional and Loop-Intensive Specifications (SB, SD, FB), pp. 491–496.
DACDAC-1994-ChenF #analysis #using
Transient Sensitivity Computation of MOSFET Circuits Using Iterated Timing Analysis and Selective-Tracing Waveform Eelaxation (CJC, WSF), pp. 581–585.
DACDAC-1994-HachtelMPS #analysis #finite #probability #scalability #state machine
Probabilistic Analysis of Large Finite State Machines (GDH, EM, AP, FS), pp. 270–275.
DACDAC-1994-KahngM #analysis #equation #using
Delay Analysis of VLSI Interconnections Using the Diffusion Equation Model (ABK, SM), pp. 563–569.
DACDAC-1994-LeviaMR #analysis #design
Lessons in Language Design: Cost/Benefit analysis of VHDL Features (OL, SM, JR), pp. 447–453.
DACDAC-1994-NielsenK #analysis #performance #simulation
Performance Analysis Based on Timing Simulation (CDN, MK), pp. 70–76.
DATEEDAC-1994-BaharCHMS #analysis #using
Timing Analysis of Combinational Circuits using ADD’s (RIB, HC, GDH, EM, FS), pp. 625–629.
DATEEDAC-1994-BrashearMOPM #analysis #performance #predict #statistics #using
Predicting Circuit Performance Using Circuit-level Statistical Timing Analysis (RBB, NM, CO, LTP, MRM), pp. 332–337.
DATEEDAC-1994-Rodriguez-MontanesF #analysis #fault #testing
Analysis of Bridging Defects in Sequential CMOS Circuits and their Current Testability (RRM, JF), pp. 356–360.
DATEEDAC-1994-SafiniaLS #analysis #functional #modelling
Taking Advantage of High Level Functional Information to Refine Timing Analysis and Timing Modeling (CS, RL, GS), pp. 349–353.
DATEEDAC-1994-SivaramanS #analysis #parametricity #towards
Towards Incorporating Device Parameter Variations in Timing Analysis (MS, AJS), pp. 338–342.
DATEEDAC-1994-Stroele #analysis
Signature Analysis for Sequential Circuits with Reset (APS), pp. 113–118.
DATEEDAC-1994-XueDJ #analysis #fault #float #probability
Probability Analysis for CMOS Floating Gate Faults (HX, CD, JAGJ), pp. 443–448.
ASEKBSE-1994-ChilenskiN #analysis #specification #test coverage #tool support
Formal Specification Tools for Test Coverage Analysis (JC, PN), pp. 59–68.
PODSPODS-1994-FaloutsosK #analysis #concept #independence #using
Beyond Uniformity and Independence: Analysis of R-trees Using the Concept of Fractal Dimension (CF, IK), pp. 4–13.
VLDBVLDB-1994-BaralisW #algebra #analysis #approach #database
An Algebraic Approach to Rule Analysis in Expert Database Systems (EB, JW), pp. 475–486.
CSEETCSEE-1994-HartrumB #analysis #education #object-oriented
Teaching Formal Extensions of Informal-Based Object-Oriented Analysis Methodologies (TCH, PDB), pp. 389–409.
ESOPESOP-J-1992-NielsonN94 #analysis
The Tensor Product in Wadler’s Analysis of Lists (FN, HRN), pp. 327–354.
ESOPESOP-1994-HankinM #analysis #lazy evaluation #strict #type inference
Lazy Type Inference for the Strictness Analysis of Lists (CH, DLM), pp. 257–271.
ESOPESOP-1994-HengleinM #analysis #polymorphism
Polymorphic Binding-Time Analysis (FH, CM), pp. 287–301.
ESOPESOP-1994-JeuringS #analysis #bottom-up #functional
Bottom-up Grammar Analysis — A Functional Formulation (JJ, SDS), pp. 317–332.
ESOPESOP-1994-King #analysis
A Synergistic Analysis for Sharing and Groundness with Traces Linearity (AK), pp. 363–378.
ICSMEICSM-1994-AbbattistaLMV #design #empirical #impact analysis
An Experiment on the Effect of Design Recording on Impact Analysis (FA, FL, GM, GV), pp. 253–259.
ICSMEICSM-1994-AngerRY #concurrent #dynamic analysis #source code
Combining Static and Dynamic Analysis of Concurrent Programs (FDA, RVR, MY), pp. 89–98.
ICSMEICSM-1994-BriandBKS #analysis #maintenance #process
A Change Analysis Process to Characterize Software Maintenance Projects (LCB, VRB, YMK, DRS), pp. 38–49.
ICSMEICSM-1994-DeBaudMR #analysis #reverse engineering
Domain Analysis and Reverse Engineering (JMD, BM, SR), pp. 326–335.
ICSMEICSM-1994-GuptaS #analysis #data flow #framework
A Framework for Partial Data Flow Analysis (RG, MLS), pp. 4–13.
ICSMEICSM-1994-MatwinA #analysis #automation #composition #reuse
Reuse of Modular Software with Automated Comment Analysis (SM, AA), pp. 222–231.
ICSMEICSM-1994-QueilleVWM #case study #impact analysis #maintenance
The Impact Analysis Task in Software Maintenance: A Model and a Case Study (JPQ, JFV, NW, MM), pp. 234–242.
PEPMPEPM-1994-Baker-Finch #higher-order #static analysis #type system
Type Theory and Projections for Higher-Order Static Analysis (CABF), pp. 43–52.
PEPMPEPM-1994-BirkedalW #analysis #ml #standard
Binding-Time Analysis for Standard ML (LB, MW), pp. 61–71.
PEPMPEPM-1994-Davis #analysis
PERs from Projections for Binding-Time Analysis (KD), pp. 53–60.
PLDIPLDI-1994-Deutsch #alias #analysis #interprocedural #pointer
Interprocedural May-Alias Analysis for Pointers: Beyond k-limiting (AD), pp. 230–241.
PLDIPLDI-1994-EmamiGH #analysis #interprocedural #pointer #points-to
Context-Sensitive Interprocedural Points-to Analysis in the Presence of Function Pointers (ME, RG, LJH), pp. 242–256.
PLDIPLDI-1994-HentenryckCC #analysis #graph #prolog #using
Type Analysis of Prolog Using Type Graphs (PVH, AC, BLC), pp. 337–348.
PLDIPLDI-1994-SabryF #analysis #continuation #data flow #question
Is Continuation-Passing Useful for Data Flow Analysis? (AS, MF), pp. 1–12.
PLDIPLDI-1994-SrivastavaE #named #program analysis #tool support
ATOM — A System for Building Customized Program Analysis Tools (AS, AE), pp. 196–205.
PLDIPLDI-1994-Wismuller #analysis #data flow #debugging #source code #using
Debugging of Globally Optimized Programs Using Data Flow Analysis (RW), pp. 278–289.
SASSAS-1994-ArmstrongMSS #algebra #analysis #dependence #performance #representation
Boolean Functions for Dependency Analysis: Algebraic Properties and Efficient Representation (TA, KM, PS, HS), pp. 266–280.
SASSAS-1994-Consel #analysis #fixpoint #performance #strict
Fast Strictness Analysis Via Symbolic Fixpoint Iteration (CC), pp. 423–431.
SASSAS-1994-Garza-SalazarB #analysis #array
Uniqueness and Completeness Analysis of Array Comprehensions (DAGS, APWB), pp. 193–207.
SASSAS-1994-HankinM #framework #program analysis #type system
A Type-based Framework for Program Analysis (CH, DLM), pp. 380–394.
SASSAS-1994-HanusZ #analysis #functional #logic programming #source code
Mode Analysis of Functional Logic Programs (MH, FZ), pp. 26–42.
SASSAS-1994-Henglein #analysis #fixpoint #strict #type system
Iterative Fixed Point Computation for Type-Based Strictness Analysis (FH), pp. 395–407.
SASSAS-1994-JensenHR #analysis #haskell #performance #strict
Efficient Strictness Analysis of Haskell (KDJ, PH, MR), pp. 246–362.
SASSAS-1994-Jorgensen #analysis #finite #fixpoint #using
Finding Fixpoints in Finite Function Spaces Using Neddedness Analysis and Chaotic Iteration (NJ), pp. 329–345.
SASSAS-1994-LisperC #analysis
Extended Analysis of Data Fields (BL, JFC), pp. 208–222.
SASSAS-1994-MuellerW #analysis #behaviour #on the fly #performance #simulation
Efficient On-the-fly Analysis of Program Behavior and Static Cache Simulation (FM, DBW), pp. 101–115.
SASSAS-1994-Solberg #analysis #strict
Strictness and Totality Analysis (KLS), pp. 408–422.
STOCSTOC-1994-BlumFJKMR #analysis #fourier #learning #query #statistics #using
Weakly learning DNF and characterizing statistical query learning using Fourier analysis (AB, MLF, JCJ, MJK, YM, SR), pp. 253–262.
STOCSTOC-1994-JacquetS #algorithm #analysis #equation #functional
A functional equation often arising in the analysis of algorithms (extended abstract) (PJ, WS), pp. 780–789.
PLDIBest-of-PLDI-1994-SrivastavaE94a #named #program analysis #tool support
ATOM: a system for building customized program analysis tools (with retrospective) (AS, AE), pp. 528–539.
ICALPICALP-1994-HoftingW #analysis #graph #polynomial
Polynomial Time Analysis of Torodial Periodic Graphs (FH, EW), pp. 544–555.
ICALPICALP-1994-HotzP #analysis #context-free grammar #performance
Fast Uniform Analysis of Coupled-Context-Free Languages (GH, GP), pp. 412–423.
ICALPICALP-1994-KanellakisHM #analysis #re-engineering
An Analysis of the Core-ML Language: Expressive Power and Type Reconstruction (PCK, GGH, HGM), pp. 83–105.
ICALPICALP-1994-Sanchez-CousoF #analysis #pattern matching #probability
Average-Case Analysis of Pattern-Matching in Trees under the BST Probability Model (JRSC, MIFC), pp. 178–190.
FMFME-1994-Cherkaoui #analysis #security #specification
Specification and Analysis of a Security Management System (OC), pp. 66–82.
LISPLFP-1994-Heintze #analysis #ml #source code
Set-Based Analysis of ML Programs (NH), pp. 306–317.
LISPLFP-1994-StefanescuZ #analysis #equation #framework #functional #higher-order #source code
An Equational Framework for the Flow Analysis of Higher Order Functional Programs (DCS, YZ), pp. 318–327.
ICGTTAGT-1994-Assmann #on the #program analysis #term rewriting
On Edge Addition Rewrite Systems and their Relevance to Program Analysis (UA), pp. 321–335.
CHICHI-1994-HaunoldK94a #analysis
A keystroke level analysis of a graphics application: manual map digitizing (PH, WK), pp. 337–343.
CHICHI-1994-IrvingPI94a #analysis #automation
A GOMS analysis of the advanced automated cockpit (SI, PGP, JEI), pp. 344–350.
CHICHI-1994-Newman94a #analysis #human-computer #research #using
A Preliminary Analysis of the Products of HCI Research, Using Pro Forma Abstracts (WN), pp. 278–284.
AdaEuropeAdaEurope-1994-Anderson94a #analysis #case study #development #experience #object-oriented
Experiences Integrating Object-Oriented Analysis with Joint Application Development (JAD) (JAA), pp. 509–521.
AdaEuropeAdaEurope-1994-Noseck #analysis #reuse
Cost-Benefit Analysis for Software-Reuse — A Decision Procedure (HN), pp. 397–405.
AdaEuropeAdaEurope-1994-ObermayerSSKKL #ada #analysis #realtime
Portability Effort Estimates for Real Time Applications Written in Ada Through Static Code Analysis (PEO, JS, GS, AK, PK, RL), pp. 483–488.
CAiSECAiSE-1994-AntonMP #analysis #composition #process #re-engineering
Goal Decomposition and Scenario Analysis in Business Process Reengineering (AIA, WMM, CP), pp. 94–104.
CAiSECAiSE-1994-Kurbel #analysis #automation #case study #code generation #experience #using
From Analysis to Code Generation: Experiences from an Information Engineering Project Using I-CASE Technology (KK), pp. 214–227.
ICMLICML-1994-SchapireW #algorithm #analysis #learning #on the #worst-case
On the Worst-Case Analysis of Temporal-Difference Learning Algorithms (RES, MKW), pp. 266–274.
KDDKDD-1994-BhandariB #data analysis #on the #statistics
On the Role of Statistical Significance in Exploratory Data Analysis (ISB, SB), pp. 61–72.
KDDKDD-1994-MatheusPM #analysis
An Application of KEFM to the Analysis of Healthcare Information (CJM, GPS, DM), pp. 441–452.
SEKESEKE-1994-AbranDMMS #analysis #hypermedia #learning #using
Structured hypertext for using and learning function point analysis (AA, JMD, DM, MM, DSP), pp. 164–171.
SEKESEKE-1994-FigueiredoPC #analysis #fuzzy #petri net #realtime #using
Timing analysis of real-time software systems using fuzzy time Petri nets (JCAdF, AP, SKC), pp. 257–266.
SEKESEKE-1994-LuqiG #analysis #certification #synthesis
Suggestions for progress in software analysis, synthesis and certification (L, JAG), pp. 501–507.
SEKESEKE-1994-Meskens #analysis #knowledge-based #quality
A knowledge-based system for software quality analysis (NM), pp. 180–187.
SIGIRSIGIR-1994-Hoch #analysis #classification #documentation #information retrieval #using
Using IR Techniques for Text Classification in Document Analysis (RH), pp. 31–40.
SIGIRSIGIR-1994-MoritaS #analysis #behaviour #information management #retrieval
Information Filtering Based on User Behaviour Analysis and Best Match Text Retrieval (MM, YS), pp. 272–281.
SIGIRSIGIR-1994-ShoensTG #analysis #incremental #performance
Synthetic Workload Performance Analysis of Incremental Updates (KAS, AT, HGM), pp. 329–338.
ECOOPECOOP-1994-BriggsW #analysis #design #object-oriented #specification
A Specification Language for Object-Oriented Analysis and Design (TLB, JW), pp. 365–385.
ECOOPECOOP-1994-MoreiraC #analysis #object-oriented
Combining Object-Oriented Analysis and Formal Description Techniques (AMDM, RGC), pp. 344–364.
TOOLSTOOLS-EUROPE-1994-BaelenLS #analysis #constraints #design #object-oriented
Constraints in Object-Oriented Analysis and Design (SVB, JL, ES), pp. 185–199.
TOOLSTOOLS-EUROPE-1994-Firesmith #analysis #design #logic #requirements
O-O Requirements Analysis and Logical Design (DF), p. 513.
TOOLSTOOLS-EUROPE-1994-Fowler #analysis #comparison #design
Comparison of Analysis and Design Methods (MF), p. 517.
TOOLSTOOLS-EUROPE-1994-Goldberg #analysis #c++ #design #object-oriented
Object-Oriented Analysis and Design with C++ (MG), p. 531.
TOOLSTOOLS-EUROPE-1994-Graham #analysis #case study #object-oriented #process #re-engineering #requirements
Beyond the Use Case: Combining Task Analysis and Scripts in Object-Oriented Requirements Capture and Business Process Re-engineering (IMG), pp. 203–215.
PPDPALP-1994-AlpuenteFV #analysis #composition #equation #source code
Compositional Analysis for Equational Horn Programs (MA, MF, GV), pp. 77–94.
PPDPALP-1994-FerreiraZ #analysis #termination
Syntactical Analysis of Total Termination (MCFF, HZ), pp. 204–222.
LOPSTRLOPSTR-1994-BoulangerB #analysis #logic programming #program transformation #using
Using Call/Exit Analysis for Logic Program Transformation (DB, MB), pp. 36–50.
LOPSTRLOPSTR-1994-CookG #analysis #source code #termination
A Transformation System for Definite Programs Based on Termination Analysis (JC, JPG), pp. 51–68.
PPDPPLILP-1994-Serrano #analysis #compilation #control flow #functional #higher-order #using
Using Higher-Order Control Flow Analysis When Compiling Functional Languages (MS), pp. 447–448.
POPLPOPL-1994-HankinM #algorithm #analysis #strict #type inference
Deriving Algorithms From Type Inference Systems: Application to Strictness Analysis (CH, DLM), pp. 202–212.
POPLPOPL-1994-Maslov #analysis #array #data flow #dependence #lazy evaluation
Lazy Array Data-Flow Dependence Analysis (VM), pp. 311–325.
REICRE-1994-DrakeT #analysis #bound
System bounding issues for analysis (JMD, WTT), pp. 24–31.
REICRE-1994-Eckert #analysis #object-oriented
Types, classes and collections in object-oriented analysis (GE), pp. 32–39.
REICRE-1994-GotelF #analysis #problem #requirements #traceability
An analysis of the requirements traceability problem (OCZG, AF), pp. 94–101.
REICRE-1994-HollandSCC #analysis #case study #information management
The directorate information system at St Thomas’ hospital: a study in domain analysis (JH, PHS, ERC, BC), pp. 102–109.
REICRE-1994-HughesRS #analysis #requirements #taxonomy
Taxonomy for requirements analysis (KJH, RMR, CTS), pp. 176–179.
REICRE-1994-White #analysis #comparative #embedded #requirements
Comparative analysis of embedded computer system requirements methods (SMW), pp. 126–134.
SACSAC-1994-Arango #analysis
A brief introduction to domain analysis (GA), pp. 42–46.
SACSAC-1994-ChenB #analysis #concurrent #database #detection #performance #petri net #transaction
A Petri net model for the performance analysis of transaction database systems with continuous deadlock detection (IRC, RB), pp. 539–544.
SACSAC-1994-Foster #analysis #education #named #using
FRA: using a goal-based scenario to teach financial statement analysis (DAF), pp. 568–572.
SACSAC-1994-GabbrielliG #analysis #logic programming #source code
Goal independency and call patterns in the analysis of logic programs (MG, RG), pp. 394–399.
SACSAC-1994-LiMC #analysis #fuzzy #performance
Performance analysis of fuzzy proportional-derivative control systems (HL, HAM, GC), pp. 115–119.
SACSAC-1994-MerkleL #algorithm #analysis #parallel #performance #search-based
An initial analysis of data parallelism in the fast messy genetic algorithm (LDM, GBL), pp. 488–492.
SACSAC-1994-OsborneH #analysis #development #interactive
Development of an interactive weather analysis and display system to support agricultural planning (LFO, BCH), pp. 346–350.
FSEFSE-1994-CorbettA #analysis #composition #scalability #towards
Towards Scalable Compositional Analysis (JCC, GSA), pp. 53–61.
FSEFSE-1994-DwyerC #analysis #concurrent #data flow #source code #verification
Data Flow Analysis for Verifying Properties of Concurrent Programs (MBD, LAC), pp. 62–75.
FSEFSE-1994-VandevoordeG #analysis #composition #runtime #using
Using Specialized Procedures and Specification-Based Analysis to Reduce the Runtime Costs of Modularity (MTV, JVG), pp. 121–127.
ICSEICSE-1994-CheungK #analysis #behaviour #distributed #effectiveness
An Integrated Method for Effective Behaviour Analysis of Distributed Systems (SCC, JK), pp. 309–320.
ICSEICSE-1994-DevanbuRW #analysis #automation #testing #tool support
Automated Construction of Testing and Analysis Tools (PTD, DSR, ALW), pp. 241–250.
ICSEICSE-1994-YuM #analysis #comprehension #design #modelling #process #why
Understanding “Why” in Software Process Modelling, Analysis, and Design (ESKY, JM), pp. 159–168.
CCCC-1994-CheathamGS #analysis #interpreter #tool support
A Suite of Analysis Tools Based on a General Purpose Abstract Interpreter (TC, HG, DCS), pp. 188–202.
CCCC-1994-DuesterwaldGS #clustering #congruence #cost analysis #data flow
Reducing the Cost of Data Flow Analysis By Congruence Partitioning (ED, RG, MLS), pp. 357–373.
CCCC-1994-Reps #analysis #interprocedural #problem
Solving Demand Versions of Interprocedural Analysis Problems (TWR), pp. 389–403.
CCCC-1994-UhlH #analysis
Flow Grammars — a Flow Analysis Methodology (JSU, RNH), pp. 203–217.
HPDCHPDC-1994-BurrellMP #analysis #capacity #implementation #multi #network #performance #protocol
Performance Analysis of a New Implementation Efficient Capacity Allocation Protocol for Multimedia Traffic in ATM Networks (AB, DM, PPK), pp. 51–60.
HPDCHPDC-1994-LiHW #performance #program analysis #program transformation
Program Analysis and Transformations for Fast Data Sharing (AL, GH, LDW), pp. 131–138.
CADECADE-1994-WaalG #logic programming #program analysis #program transformation #proving #theorem proving
The Applicability of Logic Program Analysis and Transformation to Theorem Proving (DAdW, JPG), pp. 207–221.
CADECADE-1994-WangG #automation #named #program analysis
KITP-93: An Automated Inference System for Program Analysis (TCW, AG), pp. 831–835.
ICLPICLP-1994-Kagedal #analysis #data flow #prolog
A Dataflow Analysis Method for Ground Prolog (AK), p. 746.
ICLPICLP-1994-Silcrat #algebra #logic #static analysis
Logic, Algebra and Static Analysis in DM Systems, the IE Way (EDS), p. 744.
ICLPILPS-1994-BraemCMH #analysis #prolog
Cardinality Analysis of Prolog (CB, BLC, SM, PVH), pp. 457–471.
ICLPILPS-1994-BuenoBH #analysis #automation #effectiveness #parallel #strict
Effectiveness of Global Analysis in Strict Independence-Based Automatic Parallelization (FB, MJGdlB, MVH), pp. 320–336.
ICLPILPS-1994-Giacobazzi #abduction #analysis #composition #logic programming #source code
Abductive Analysis of Modular Logic Programs (RG), pp. 377–391.
ICLPILPS-1994-SwiftW #analysis #evaluation #source code
Analysis of SLG-WAM Evaluation of Definite Programs (TS, DSW), pp. 219–235.
ISSTAISSTA-1994-BuyS #analysis #petri net #realtime #source code
Analysis of Real-Time Programs with Simple Time Petri Nets (UAB, RHS), pp. 228–239.
ISSTAISSTA-1994-Corbett #ada #analysis #concurrent #empirical #evaluation #source code
An Empirical Evaluation of Three Methods for Deadlock Analysis of Ada Tasking Programs (JCC), pp. 204–215.
ISSTAISSTA-1994-FleyshgakkerW #analysis #approach #mutation testing #performance
Efficient Mutation Analysis: A New Approach (VNF, SNW), pp. 185–195.
ISSTAISSTA-1994-GoldbergWZ #analysis #testing
Applications of Feasible Path Analysis to Program Testing (AG, TCW, DZ), pp. 80–94.
ISSTAISSTA-1994-JasperBWCZ #analysis #generative #testing
Test Data Generation and Feasible Path Analysis (RJ, MB, KEW, BC, DZ), pp. 95–107.
ISSTAISSTA-1994-Richardson #analysis #named #testing
TAOS: Testing with Analysis and Oracle Support (DJR), pp. 138–153.
ISSTAISSTA-1994-Young #analysis #testing
State-Space Analysis as an Aid to Testing (Abstract) (MY), p. 203.
DACDAC-1993-GraebWA #analysis #optimisation #worst-case
Improved Methods for Worst-Case Analysis and Optimization Incorporating Operating Tolerances (HEG, CUW, KA), pp. 142–147.
DACDAC-1993-HaqueC #analysis #design #distributed #reliability
Analysis and Reliable Design of ECL Circuits with Distributed RLC Interconnections (MH, SC), pp. 697–701.
ICDARICDAR-1993-Bayer #analysis #comprehension #documentation #modelling
Understanding structured text documents by a model based document analysis system (TAB), pp. 448–453.
ICDARICDAR-1993-CollinTV #analysis #documentation
Don’t tell mom I’m doing document analysis; she believes I’m in the computer vision field (SC, KT, PV), pp. 619–622.
ICDARICDAR-1993-Dengel93a #analysis #comprehension #documentation #information management #multi
The role of document analysis and understanding in multi-media information systems (AD), pp. 385–390.
ICDARICDAR-1993-DoermannF #analysis #documentation #image
Image based typographic analysis of documents (DSD, RF), pp. 769–773.
ICDARICDAR-1993-Hamada #analysis #diagrams
A new system for the analysis of schematic diagrams (AHH), pp. 369–372.
ICDARICDAR-1993-HaoWN #analysis #approach #classification #documentation #layout #segmentation
Nested segmentation: an approach for layout analysis in document classification (XH, JTLW, PAN), pp. 319–322.
ICDARICDAR-1993-ItoTFHU #analysis #evaluation
Pattern analysis and evaluation of printed circuit boards (MI, YT, IF, MH, TU), pp. 798–801.
ICDARICDAR-1993-IttnerB #analysis #layout
Language-free layout analysis (DJI, HSB), pp. 336–340.
ICDARICDAR-1993-IwaneYI #analysis #approach #classification #documentation #functional #image #layout
A functional classification approach to layout analysis of document images (KI, MY, OI), pp. 778–781.
ICDARICDAR-1993-JainC #analysis #locality #using
Bar code localization using texture analysis (AKJ, YC), pp. 41–44.
ICDARICDAR-1993-MadejS #analysis #automation #evaluation #statistics #towards
Towards automatic evaluation of drawing analysis performance-A statistical model of cadastral map (DM, AS), pp. 890–893.
ICDARICDAR-1993-RoseE #analysis #recognition #scalability #semantics
Semantic analysis for large vocabulary cursive script recognition (TGR, LJE), pp. 236–239.
ICDARICDAR-1993-TungCL #analysis #generative #performance
Performance analysis of an OCR system via an artificial handwritten Chinese character generator (CHT, YJC, HJL), pp. 315–318.
ICDARICDAR-1993-Wang #analysis #comprehension #documentation #visualisation
Machine visualization, understanding and interpretation of polyhedral line-drawings in document analysis (PSPW), pp. 882–885.
ICDARICDAR-1993-WieserP #analysis #image #layout
Layout and analysis: Finding text, titles, and photos in digital images of newspaper pages (JW, AP), pp. 774–777.
PODSPODS-1993-PagelSTW #analysis #data type #performance #query #towards
Towards an Analysis of Range Query Performance in Spatial Data Structures (BUP, HWS, HT, PW), pp. 214–221.
VLDBVLDB-1993-AmatoGM #abstract interpretation #analysis #database #programming
Data Sharing Analysis for a Database Programming Lanaguage via Abstract Interpretation (GA, FG, GM), pp. 405–415.
VLDBVLDB-1993-RahmM #analysis #database #parallel
Analysis of Dynamic Load Balancing Strategies for Parallel Shared Nothing Database Systems (ER, RM), pp. 182–193.
ICSMECSM-1993-ArnoldB #comparison #framework #impact analysis #towards
Impact Analysis — Towards a Framework for Comparison (RSA, SAB), pp. 292–301.
ICSMECSM-1993-KurishimaONAF #analysis #fault
Quantitative Analysis of Errors in Telecommunications Software (NK, HO, JiN, KA, MF), pp. 190–198.
ICSMECSM-1993-LoyallM #analysis #dependence #maintenance #process #using
Using Dependence Analysis to Support the Software Maintenance Process (JPL, SAM), pp. 282–291.
WCREWCRE-1993-ReubensteinPR #analysis #parsing #reverse engineering #tool support
Separating Parsing and Analysis in Reverse Engineering Tools (HBR, RLP, SNR), pp. 117–125.
WCREWCRE-1993-RitschS #dynamic analysis #reverse engineering #source code
Reverse Engineering Programs via Dynamic Analysis (HR, HMS), pp. 192–201.
PEPMPEPM-1993-Andersen #analysis #c #pointer
Binding-Time Analysis and the Taming of C Pointers (LOA), pp. 47–58.
PEPMPEPM-1993-Bulyonkov #analysis
Extracting Polyvariant Binding Time Analysis from Polyvariant Specializer (MAB), pp. 59–65.
PEPMPEPM-1993-CharlierH #analysis #evaluation #implementation #prolog
Groundness Analysis for PROLOG: Implementation and Evaluation of the Domain Prop (BLC, PVH), pp. 99–110.
PEPMPEPM-1993-Consel #analysis
Polyvariant Binding-Time Analysis For Applicative Languages (CC), pp. 66–77.
PEPMPEPM-1993-Davis #analysis #higher-order
Higher-order Binding-time Analysis (KD), pp. 78–87.
PEPMPEPM-1993-Seward #analysis #polymorphism #strict #using
Polymorphic Strictness Analysis using Frontiers (JS), pp. 186–193.
PEPMPEPM-1993-Thiemann #analysis #functional #safety #source code
A Safety Analysis for Functional Programs (PT), pp. 133–144.
PLDIPLDI-1993-BoydW #analysis #fault #optimisation
Isolation and Analysis of Optimization Errors (MRB, DBW), pp. 26–35.
PLDIPLDI-1993-DuesterwaldGS #analysis #array #data flow #framework #optimisation
A Practical Data Flow Framework for Array Reference Analysis and its Use in Optimizations (ED, RG, MLS), pp. 68–77.
PLDIPLDI-1993-JohnsonP #dependence #program analysis
Dependence-Based Program Analysis (RJ, KP), pp. 78–89.
PLDIPLDI-1993-KolteH #analysis
Load/Store Range Analysis for Global Register Allocation (PK, MJH), pp. 268–277.
PLDIPLDI-1993-LandiRZ #alias #analysis #interprocedural #pointer
Interprocedural Side Effect Analysis With Pointer Aliasing (WL, BGR, SZ), pp. 56–67.
STOCSTOC-1993-CoffmanJSW #analysis #markov #proving
Markov chains, computer proofs, and average-case analysis of best fit bin packing (EGCJ, DSJ, PWS, RRW), pp. 412–421.
STOCSTOC-1993-RackoffS #analysis #encryption
Cryptographic defense against traffic analysis (CR, DRS), pp. 672–681.
SASWSA-1993-CridligG #analysis #semantics
Semantics and Analysis of Linda-Based Languages (RC, EG), pp. 72–86.
SASWSA-1993-KatoSI #abduction #performance #program analysis #reasoning
An Efficient Abductive Reasoning System Based on Program Analysis (SK, HS, HI), pp. 230–241.
SASWSA-1993-NielsonN #analysis #strict
Finiteness Conditions for Strictness Analysis (FN, HRN), pp. 194–205.
SASWSA-1993-Roy #challenge #logic programming #source code #static analysis
Challenges in Developing Useful and Practical Static Analysis for Logic Programs (PVR), p. 111.
SASWSA-1993-SahlinS #named #static analysis
Demonstration: Static Analysis of AKL (DS, TS), pp. 282–283.
SASWSA-1993-WrightB #analysis #reduction
Usage Analysis with Natural Reduction Types (DAW, CABF), pp. 254–266.
ICALPICALP-1993-CodishFMW #analysis #concurrent #constraints #logic programming #performance #source code
Efficient Analysis of Concurrent Constraint Logic Programs (MC, MF, KM, WHW), pp. 633–644.
FMFME-1993-ValmariKCL #analysis #reachability
Putting Advanced Reachability Analysis Techniques Together: the “ARA” Tool (AV, JK, MC, ML), pp. 597–616.
FPCAFPCA-1993-Nocker #analysis #reduction #strict #using
Strictness Analysis using Abstract Reduction (EN), pp. 255–265.
FPCAFPCA-1993-SastryCA #analysis #functional #strict
Order-of-evaluation Analysis for Destructive Updates in Strict Functional Languages with Flat Aggregates (AVSS, WDC, ZMA), pp. 266–275.
HCIHCI-ACS-1993-BextenHM #analysis #named #simulation
AUCA: A Tool for Presentation and Analysis of Simulation Results (EMzB, DH, CM), pp. 267–272.
HCIHCI-ACS-1993-BrinkmanS #analysis #fault
Analysis and Support of Fault Diagnosis Strategies (JAB, TWvdS), pp. 115–120.
HCIHCI-ACS-1993-CarstensenS #analysis #requirements
Work Analysis — Perspectives on and Requirements for a Methodology (PHC, KS), pp. 575–580.
HCIHCI-ACS-1993-TakedaHS93a #analysis
Analysis of Uric Properties for Stress Caused by VDT Work and Relationship Among CFF, HRV and VEP (MT, YH, KS), pp. 903–908.
HCIHCI-ACS-1993-TsujiMND #analysis
New Analysis of HRV Through Wavelet Transform (HT, HM, TN, TD), pp. 920–924.
HCIHCI-ACS-1993-VendaH #analysis #complexity
Qualitative and Quantitative Analysis of Human Decision-Making Complexity (VFV, HWH), pp. 636–641.
HCIHCI-SHI-1993-FrascinaS #analysis #design #human-computer #interface
Task Analysis in Design of a Human-Computer Interface for a Ward Based System (TF, RAS), pp. 226–230.
HCIHCI-SHI-1993-Gautsch #analysis #architecture #difference #hypermedia
An Analysis of Hypermedia Program Architecture with Individual Differences of Learners (SG), pp. 482–487.
HCIHCI-SHI-1993-KatoO #analysis #using
Task Analysis Method using the GOMS Model with Grouping (KK, KO), pp. 891–896.
HCIHCI-SHI-1993-KirbyH #analysis #design
An Analysis Technique for User Centered Design (JK, HH), pp. 991–996.
HCIHCI-SHI-1993-MorganHCHQMO #analysis #design #implementation #interactive #knowledge base #multi #perspective
Implementation and Design Issues in Interactive Multi-Media Knowledge Based Systems for Criminal Intelligence Analysis: The Mycroft Perspective (KM, PH, JC, LH, TQ, RM, RO), pp. 513–518.
HCIHCI-SHI-1993-TakeguchiTO #analysis #information management #representation #scalability
A Knowledge Representation for Large Scale Integrated Circuit Failure Analysis (YT, TT, SO), pp. 92–97.
HCIHCI-SHI-1993-UjitaKIK #analysis
Cooperative Work Analysis of Plant Operator Crew (HU, RK, KI, RK), pp. 955–960.
CHIINTERCHI-1993-HillLSW #analysis #multi
Planning for multiple task work: an analysis of a medical reception worksystem (BH, JL, WS, AW), pp. 314–320.
CHIINTERCHI-1993-MacleodB #analysis #metric #music #tool support #usability #video
MUSiC video analysis and context tools for usability measurement (MM, NB), p. 55.
CHIINTERCHI-1993-StaskoBL #algorithm #analysis #animation #empirical #learning
Do algorithm animations assist learning?: an empirical study and analysis (JTS, ANB, CL), pp. 61–66.
CAiSECAiSE-1993-BrunetCMS #analysis #object-oriented
Object-Oriented Analysis in Practice (JB, CC, DM, FS), pp. 293–308.
CIKMCIKM-1993-FayyadWD #analysis #automation #bibliography #database #image
Automated Cataloging and Analysis of Sky Survey Image Databases: The SKICAT System (UMF, NW, SGD), pp. 527–536.
CIKMCIKM-1993-PearceN #analysis #generative #hypermedia #n-gram
Generating a Dynamic Hypertext Environment with n-gram Analysis (CP, CKN), pp. 148–153.
CIKMCIKM-1993-QianFF #analysis #database #metric #object-oriented
An Object-Oriented Database for the Display Measurement and Analysis System (YQ, EAF, WWF), pp. 384–392.
ICMLICML-1993-CohenCBA #analysis #automation #modelling
Automating Path Analysis for Building Causal Models from Data (PRC, AC, LB, ASA), pp. 57–64.
SEKESEKE-1993-BiebowS #analysis #requirements #validation
Acquisition, Analysis and Validation of Informal Requirements (BB, SS), pp. 109–116.
SEKESEKE-1993-BombanaBCFSZ #analysis #functional #testing
An Expert Solution to Functional Testability Analysis of VLSI Circuits (MB, GB, PC, FF, DS, GZ), pp. 263–265.
SEKESEKE-1993-JaegerP #analysis #information management #named #specification
BIZSPEC: A Business-Oriented Model for Specification and Analysis of Office Information Systems (TJ, AP), pp. 191–198.
SEKESEKE-1993-KomiyaSHKOHOO #analysis #process #specification
An Experimental Analysis for Classifying Specification Processes (SK, MS, SH, JK, AO, HH, SO, KO), pp. 231–234.
SIGIRSIGIR-1993-AktugC #analysis #multi #query
Analysis of Multiterm Queries in a Dynamic Signature File Organization (DA, FC), pp. 96–105.
SIGIRSIGIR-1993-Botafogo #analysis #clustering #hypermedia
Cluster Analysis for Hypertext Systems (RAB), pp. 116–125.
ECOOPECOOP-1993-DuboisBP #analysis #perspective #requirements
O-O Requirements Analysis: an Agent Perspective (ED, PDB, MP), pp. 458–481.
OOPSLAOOPSLA-1993-Civello #analysis #design #object-oriented
Roles for Composite Objects in Object-Oriented Analysis and Design (FC), pp. 376–393.
OOPSLAOOPSLA-1993-GodinM #maintenance #using
Building and Maintaining Analysis-Level Class Hierarchies Using Galois Lattices (RG, HM), pp. 394–410.
OOPSLAOOPSLA-1993-HoydalsvikS #analysis #object-oriented #on the
On the Purpose of Object-Oriented Analysis (GMH, GS), pp. 240–255.
TOOLSTOOLS-EUROPE-1993-CattaneoCLZ #analysis #bibliography #database #evolution #object-oriented
Overview and Progress Report of the ESSE Project: Supporting Object-Oriented Database Schema Analysis and Evolution (FC, ACP, LL, RZ), pp. 63–74.
TOOLSTOOLS-EUROPE-1993-KetabchiS #analysis #automation #documentation #generative #maintenance #using
Automated Generation of Software Documentation Using an O.O. Analysis and Maintenance System (MAK, ESLB), pp. 167–179.
TOOLSTOOLS-EUROPE-1993-LeeS #analysis #object-oriented
Object-Oriented Analysis in the Real World (MML, LS), pp. 127–149.
TOOLSTOOLS-EUROPE-1993-Walden #analysis #design #object-oriented
Object-Oriented Analysis & Design (KW), p. 291.
TOOLSTOOLS-PACIFIC-1993-Firesmith93c #analysis #design #logic #object-oriented #requirements
Object-Oriented Requirements Analysis and Logical Design (DF), p. 319.
TOOLSTOOLS-PACIFIC-1993-McEwinR #analysis #design #object-oriented
Semiotics, Ethnomethodology, and Object-Oriented Analysis and Design Notations (JM, SR), pp. 143–151.
TOOLSTOOLS-USA-1993-Fowler #analysis #comparison #design #object-oriented
A Comparison of Object-Oriented Analysis and Design Methods (MF), p. 527.
TOOLSTOOLS-USA-1993-MinginsDS #analysis #eiffel #metric
Collection and Analysis of Software Metrics from the Eiffel Class Hierarchy (CM, BD, GS), pp. 427–435.
TOOLSTOOLS-USA-1993-MorabitoS #analysis #approach #design #object-oriented
A New Approach to Object-Oriented Analysis and Design (JM, MSS), pp. 45–55.
TOOLSTOOLS-USA-1993-Roberts #analysis #design #object-oriented
Object-Oriented Analysis and Design (TR), pp. 509–522.
LOPSTRLOPSTR-1993-Neugebauer #analysis #reachability
Reachability Analysis for the Extension Procedure — A Topological Result (GN), pp. 32–44.
PPDPPLILP-1993-BurnM #analysis #compilation #correctness #optimisation #proving #strict
Proving the Correctness of Compiler Optimizations Based on Strictness Analysis (GLB, DLM), pp. 346–364.
PPDPPLILP-1993-Kagedal #analysis #prolog
Improvements in Compile-Time Analysis for Ground Prolog (AK), pp. 92–107.
PPDPPLILP-1993-Moreno-NavarroKMWH #analysis #lazy evaluation #performance #using
Efficient Lazy Narrowing using Demandedness Analysis (JJMN, HK, JMC, SW, WH), pp. 167–183.
POPLPOPL-1993-CodishDG #analysis #composition #logic programming #source code
Compositional Analysis of Modular Logic Programs (MC, SKD, RG), pp. 451–464.
POPLPOPL-1993-DhamdhereK #analysis #bidirectional #complexity #data flow
Complexity of Bidirectional Data Flow Analysis (DMD, UPK), pp. 397–408.
POPLPOPL-1993-MaydanAL #analysis #array #data flow
Array Data-Flow Analysis and its Use in Array Privatization (DEM, SPA, MSL), pp. 2–15.
POPLPOPL-1993-Wand #analysis #correctness #specification
Specifying the Correctness of Binding-Time Analysis (MW), pp. 137–143.
REICRE-1993-Beeck #analysis #execution #precise #realtime #specification
Improving Structured Analysis — Achieving Preciseness, Executability, and Real-Time Specification (MvdB), pp. 227–245.
REICRE-1993-FenselAS #analysis #semantics
Giving Structured Analysis Techniques a Formal and Operational Semantics with KARL (DF, JA, RS), pp. 267–286.
RERE-1993-TakedaSKO #analysis #editing
Requirement analysis by the KJ editor (NT, AS, KK, HO), pp. 98–101.
SACSAC-1993-AcreeCUGS #adaptation #algorithm #analysis #linear #parallel
Parallelization and Analysis of a Linear Adaptive Filtering Algorithm (RKA, DTC, NU, MJG, DMS), pp. 165–172.
SACSAC-1993-HitzW #analysis #development #information management #multi
Development and Analysis of a Wide Area Multimedia Information System (MH, HW), pp. 238–246.
SACSAC-1993-Konstam #algorithm #analysis #linear #search-based #using
Linear Discriminant Analysis Using Genetic Algorithms (AHK), pp. 152–156.
SACSAC-1993-LungU #analysis #approach #integration #reuse
Integration of Domain Analysis and Analogical Approach for Software Reuse (CHL, JEU), pp. 48–53.
SACSAC-1993-VaidyanathanL #analysis #bound #learning
Analysis of Upper Bound in Valiant’s Model for Learning Bounded CNF Expressions (SV, SL), pp. 754–761.
ESECESEC-1993-Beeck #analysis #concurrent #integration #realtime #specification
Integration of Structured Analysis and Timed Statecharts for Real-Time and Concurrency Specification (MvdB), pp. 313–328.
ESECESEC-1993-CheungK #analysis #detection #distributed #source code
Tractable Flow Analysis for Anomaly Detection in Distributed Programs (SCC, JK), pp. 283–300.
FSEFSE-1993-CheungK #analysis #composition #constraints #reachability
Enhancing Compositional Reachability Analysis with Context Constraints (SCC, JK), pp. 115–125.
FSEFSE-1993-Lutz #analysis #fault #requirements
Targeting Safety-Related Errors During Software Requirements Analysis (RRL), pp. 99–106.
FSEFSE-1993-PodgurskiY #analysis #clustering #testing
Partition testing, stratified sampling, and cluster analysis (AP, CY), pp. 169–181.
ICSEICSE-1993-DrakeXTZ #analysis #approach #case study
Approach and Case Study of Requirement Analysis Where End Users Take an Active Role (JMD, WWX, WTT, IAZ), pp. 177–186.
ICSEICSE-1993-KitsonM #analysis #assessment #process
An Analysis of SEI Software Process Assessment Results: 1987-1991 (DHK, SMM), pp. 68–77.
ICSEICSE-1993-LaskiSL #analysis #mutation testing #testing
Dynamic Mutation Testing in Integrated Regression Analysis (JWL, WS, PL), pp. 108–117.
ICSEICSE-1993-TamaiI #analysis #backtracking #design #development #process #requirements #scalability
Requirements and Design Change in Large-Scale Software Development: Analysis From the Viewpoint of Process Backtracking (TT, AI), pp. 167–176.
HPDCHPDC-1993-BiswasRTK #analysis #distributed #file system #performance
Performance Analysis of Distributed File Systems with Non-Volatile Caches (PB, KKR, DFT, CMK), pp. 252–262.
HPDCHPDC-1993-Coddington #analysis #distributed #hardware #physics
An Analysis of Distributed Computing Software and Hardware for Applications in Computational Physics (PDC), pp. 179–186.
HPDCHPDC-1993-DowdBAP #analysis #architecture #design #scalability
Design and Analysis of a Hierarchical Scalable Photonic Architecture (PWD, KB, KAA, JAP), pp. 289–296.
PPoPPPPoPP-1993-MasticolaR #analysis
Non-concurrency Analysis (SPM, BGR), pp. 129–138.
PPoPPPPoPP-1993-SarukkaiM #analysis #source code
Perturbation Analysis of High Level Instrumentation for SPMD Programs (SRS, ADM), pp. 44–53.
CAVCAV-1993-Halbwachs #analysis #source code
Delay Analysis in Synchronous Programs (NH), pp. 333–346.
CAVCAV-1993-MalerP #analysis #multi #reachability
Reachability Analysis of Planar Multi-limear Systems (OM, AP), pp. 194–209.
CSLCSL-1993-Coquand #analysis #semantics
From Semantics to Rules: A Machine Assisted Analysis (CC), pp. 91–105.
ICLPICLP-1993-CodishDFB #analysis #correctness #logic programming #question #source code
Freeness Analysis for Logic Programs — And Correctness? (MC, DD, GF, MB), pp. 116–131.
ICLPICLP-1993-CorsiniR #analysis #fault #safety
Safety Analysis by Means of Fault Trees: An Application for Open Boolean Solvers (MMC, AR), p. 834.
ICLPICLP-1993-DumortierJBC #analysis #constraints
Freeness Analysis in the Presence of Numerical Constraints (VD, GJ, MB, MC), pp. 100–115.
ICLPICLP-1993-Hanus #analysis #constraints
Analysis of Nonlinear Constraints in CLP(R) (MH), pp. 83–99.
ICLPICLP-1993-KempS #analysis #constraints #optimisation #query
Analysis Based Constraint Query Optimization (DBK, PJS), pp. 666–682.
ICLPILPS-1993-BandaH #analysis #approach #source code
A Practical Approach to the Global Analysis of CLP Programs (MJGdlB, MVH), pp. 437–455.
ICLPILPS-1993-Debray #logic programming #source code #static analysis
Static Analysis of Logic Programs (SKD), pp. 43–44.
ICLPILPS-1993-DecorteSF #analysis #automation #termination
Automatic Inference of Norms: A Missing Link in Automatic Termination Analysis (SD, DDS, MF), pp. 420–436.
ICLPILPS-1993-Sohn #analysis #logic programming #relational #source code
Relational Groundness Analysis for Logic Programs (KS), p. 635.
ISSTAISSTA-1993-BelliJ #analysis #prolog #source code #testing
Implementation-Based Analysis and Testing of Prolog Programs (FB, OJ), pp. 70–80.
ISSTAISSTA-1993-DuriBDS #ada #analysis #concurrent #reduction #using
Using State Space Reduction Methods for Deadlock Analysis in Ada Tasking (SD, UAB, RD, SMS), pp. 51–60.
ISSTAISSTA-1993-Goradia #effectiveness #impact analysis
Dynamic Impact Analysis: A Cost-Effective Technique to Enforce Error-Propagation (TG), pp. 171–181.
ISSTAISSTA-1993-Jackson #analysis
Abstract Analysis with Aspect (DJ), pp. 19–27.
ISSTAISSTA-1993-LevineT #analysis #concurrent #metric #re-engineering
Metric-Driven Reengineering for Static Concurrency Analysis (DLL, RNT), pp. 40–50.
ISSTAISSTA-1993-UntchOH #analysis #mutation testing #using
Mutation Analysis Using Mutant Schemata (RHU, AJO, MJH), pp. 139–148.
ISSTAISSTA-1993-WeissF #algorithm #analysis #mutation testing
Improved Serial Algorithms for Mutation Analysis (SNW, VNF), pp. 149–158.
DACDAC-1992-ChiproutN #analysis #network
Generalized Moment-Matching Methods for Transient Analysis of Interconnect Networks (EC, MSN), pp. 201–206.
DACDAC-1992-LeeR #analysis #evaluation #linear #named #using
AWEsymbolic: Compiled Analysis of Linear(ized) Circuits using Asymptotic Waveform Evaluation (JYL, RAR), pp. 213–218.
DACDAC-1992-RuehliH #analysis #challenge
Challenges and Advances in Electrical Interconnect Analysis (AER, HH), pp. 460–465.
PODSPODS-1992-Rotem #analysis #scalability
Analysis of Disk Arm Movement for Large Sequential Reads (DR), pp. 47–54.
SIGMODSIGMOD-1992-DanY #analysis #performance #policy
Performance Analysis of Coherency Control Policies through Lock Retention (AD, PSY), pp. 114–123.
SIGMODSIGMOD-1992-GhandeharizadehDQ #analysis #clustering #multi #performance
A Performance Analysis of Alternative Multi-Attribute Declustering Strategies (SG, DJD, WQ), pp. 29–38.
SIGMODSIGMOD-1992-JhingranK #analysis #database #protocol #using
Analysis of Recovery in a Database System Using a Write-Ahead Log Protocol (AJ, PK), pp. 175–184.
ESOPESOP-1992-NielsonN #analysis
The Tensor Product in Wadler’s Analysis of Lists (FN, HRN), pp. 351–370.
PEPMPEPM-1992-AndersenG #analysis #partial evaluation
Speedup Analysis in Partial Evaluation: Preliminary Results (LOA, CKG), pp. 1–7.
PEPMPEPM-1992-DehboneiJ #analysis #evaluation #interprocedural #semantics #symbolic computation
Semantical Interprocedural Analysis by Partial Symbolic Evaluation (BD, PJ), pp. 14–20.
PEPMPEPM-1992-Field #imperative #program analysis #semantics #source code
A Simple Rewriting Semantics for Realistic Imperative Programs and its Application to Program Analysis (JF), pp. 98–107.
PEPMPEPM-1992-RufW #analysis #control flow #higher-order #using
Improving the Accuracy of Higher-Order Specialization using Control Flow Analysis (ER, DW), pp. 67–74.
PEPMPEPM-1992-RytzG #analysis
A Polyvariant Binding Time Analysis (BR, MG), pp. 21–28.
PLDIPLDI-1992-HendrenHN #abstraction #analysis #data type #imperative #pointer #recursion #source code
Abstractions for Recursive Pointer Data Structures: Improving the Analysis of Imperative Programs (LJH, JH, AN), pp. 249–260.
PLDIPLDI-1992-ParkG #analysis
Escape Analysis on Lists (YGP, BG), pp. 116–127.
PLDIPLDI-1992-TanL #analysis #compilation #data flow #logic programming #source code
Compiling Dataflow Analysis of Logic Programs (JT, IPL), pp. 106–115.
SASWSA-1992-AmatoGM #analysis #concurrent #database #functional #programming language #transaction
Analysis of Concurrent Transactions in a Functional Database Programming Language (GA, FG, GM), pp. 174–184.
SASWSA-1992-Ayers #analysis #performance #reachability
Efficient Closure Analysis with Reachability (AEA), pp. 126–134.
SASWSA-1992-BagnaraGL #source code #static analysis
Static Analysis of CLP Programs over Numeric Domains (RB, RG, GL), pp. 43–50.
SASWSA-1992-Baker-Finch #analysis #logic #strict
Relevant Logic and Strictness Analysis (CABF), pp. 221–228.
SASWSA-1992-CodishFMW #analysis #concurrent #constraints #logic programming #performance #source code
Efficient Analysis of Reactive Properties of Concurrent Constraint Logic Programs (MC, MF, KM, WHW), pp. 35–42.
SASWSA-1992-Gallagher #logic programming #specification #static analysis
Static Analysis for Logic Program Specification (JPG), pp. 285–294.
SASWSA-1992-GenglerR #analysis
A Polyvariant Binding Time Analysis Handling Partially Known Values (MG, MR), pp. 322–330.
SASWSA-1992-Hamilton #analysis #first-order #functional #lazy evaluation #source code
Sharing Analysis of Lazy First-Order Functional Programs (GWH), pp. 68–78.
SASWSA-1992-ParkG #analysis #lazy evaluation
Order-of-Demand Analysis for Lazy Languages (YGP, BG), pp. 91–101.
SASWSA-1992-SolbergNN #analysis
Inference Systems for Binding Time Analysis (KLS, HRN, FN), pp. 247–254.
SASWSA-1992-TangJ #analysis #control flow
Control-Flow Effects for Escape Analysis (YMT, PJ), pp. 313–321.
ICALPICALP-1992-Debray #analysis #complexity #data flow #logic programming #on the #source code
On the Complexity of Dataflow Analysis of Logic Programs (SKD), pp. 509–520.
ICALPICALP-1992-Flajolet #algorithm #analysis
Analytic Analysis of Algorithms (PF), pp. 186–210.
ICALPICALP-1992-KirschenhoferPS #analysis #how #probability #problem
How to Count Quickly and Accurately: A Unified Analysis of Probabilistic Counting and Other Related Problems (PK, HP, WS), pp. 211–222.
LISPLFP-1992-NeubergerM #analysis #deduction #power of #precise #strict
A Precise Relationship Between the Deductive Power of Forward and Backward Strictness Analysis (MN, PM), pp. 127–138.
LISPLFP-1992-TraubCS #analysis #clustering #source code #strict #thread
Global Analysis for Partitioning Non-Strict Programs into Sequential Threads (KRT, DEC, KES), pp. 324–334.
LISPLFP-1992-WangH #analysis #recursion
Analysis of Recursive Types in Lisp-Like Languages (EW, PNH), pp. 216–225.
CHICHI-1992-HammontreeHH #analysis #research #testing #tool support #user interface #visual notation
Integrated data capture and analysis tools for research and testing on graphical user interfaces (MLH, JJH, BWH), pp. 431–432.
CHICHI-1992-JohnV #analysis #interactive
A GOMS Analysis of a Graphic Machine-Paced, Highly Interactive Task (BEJ, AHV), pp. 251–258.
AdaTRI-Ada-C-1992-Frankel #analysis #architecture #modelling
Analysis/Architecture Models to ASG Models: Enabling the Transition (MIF), pp. 220–231.
AdaTRI-Ada-C-1992-SeligPM #ada #data analysis #realtime
Data Analysis and Reporting for Real-Time Ada Systems (TS, DBP, BDM), pp. 469–476.
AdaTRI-Ada-T1-1992-Roseman #analysis
Rate Monotonic Analysis (TR), pp. 261–376.
CAiSECAiSE-1992-Dewal #analysis #evaluation #requirements
A Methodology for Requirements Analysis and Evaluation of SDEs (SD), pp. 394–409.
CAiSECAiSE-1992-FouqueV #analysis #approach #machine learning
Building a Tool for Software Code Analysis: A Machine Learning Approach (GF, CV), pp. 278–289.
CAiSECAiSE-1992-MacGinnes #analysis #how #object-oriented #question
How Objective is Object-Oriented Analysis? (SM), pp. 1–16.
KRKR-1992-BaaderHNPF #analysis #empirical #optimisation #representation
An Empirical Analysis of Optimization Techniques for Terminological Representation Systems, or Making KRIS Get a Move On (FB, BH, BN, HJP, EF), pp. 270–281.
ICMLML-1992-Etzioni #analysis #learning
An Asymptotic Analysis of Speedup Learning (OE), pp. 129–136.
ICMLML-1992-GratchD #analysis #learning #problem
An Analysis of Learning to Plan as a Search Problem (JG, GD), pp. 179–188.
ICMLML-1992-HirschbergP #analysis #concept #learning
Average Case Analysis of Learning κ-CNF Concepts (DSH, MJP), pp. 206–211.
SEKESEKE-1992-AbateDNP #analysis #query #specification
Querying and Analysis of Software Specifications (AFA, CD, GN, GP), pp. 470–478.
SEKESEKE-1992-Olson #analysis #interface #object-oriented
An Object-Oriented Analysis Model of an Iconic Interface to Macsyma (AMO), pp. 253–260.
SEKESEKE-1992-Schaschinger #analysis #information management #object-oriented
Expert-Supported Object-Oriented Analysis in Knowledge Engineering (HS), pp. 116–122.
SEKESEKE-1992-TuS #approach #linear #petri net #programming #static analysis
Linear Programming Supporting Ada-Tasking Static Analysis: A Petri Net Approach (ST, WS), pp. 222–226.
SEKESEKE-1992-WatsonN #analysis #development #named
ProTest: A Knowledge Analysis Tool for the Development of Expert Systems (IW, MN), pp. 206–212.
SIGIRSIGIR-1992-BlossevilleHMP #analysis #automation #classification #documentation #natural language #statistics
Automatic Document Classification: Natural Language Processing, Statistical Analysis, and Expert System Techniques used together (MJB, GH, MGM, NP), pp. 51–58.
SIGIRSIGIR-1992-WangWY #analysis #geometry #modelling
An Analysis of Vector Space Models Based on Computational Geometry (ZW, SKMW, YY), pp. 152–160.
OOPSLAOOPSLA-1992-ClydeEW #analysis #object-oriented
Tunable Formalism in Object-Oriented Systems Analysis: Meeting the Needs of Both Theoreticians and Practitioners (SWC, DWE, SNW), pp. 452–465.
TOOLSTOOLS-EUROPE-1992-BuddeCSZ #analysis #design #tool support
Tools and Materials: an Analysis and Design Metaphor (RB, MLCN, KHS, HZ), pp. 135–146.
TOOLSTOOLS-EUROPE-1992-FritzsonVHF #algebra #analysis #industrial #modelling #object-oriented
Industrial Application of OO Mathematical Modeling and Computer Algebra in Mechanical Analysis (PF, LV, JH, DF), pp. 167–181.
TOOLSTOOLS-EUROPE-1992-Nerson #analysis #design #object-oriented
Object-Oriented Analysis and Design (JMN), p. 405.
TOOLSTOOLS-EUROPE-1992-Rubin #analysis #behaviour
Object Behavior Analysis (KSR), p. 407.
TOOLSTOOLS-PACIFIC-1992-Henderson-Sellers92a #analysis #design
Techniques and Notation for Analysis and Design (BHS), p. 236.
TOOLSTOOLS-PACIFIC-1992-KotakaKH #analysis #modelling #object-oriented #process #specification
Specification Process Modelling in Object-Oriented Analysis (NK, YK, SH), pp. 67–81.
TOOLSTOOLS-PACIFIC-1992-Miller #analysis #architecture #finite #interactive
A Class Architecture for Interactive Finite Element Analysis (GRM), pp. 101–108.
TOOLSTOOLS-USA-1992-Walden #analysis #design #object-oriented
Object-Oriented Analysis and Design (KW), p. 255.
PPDPALP-1992-BundgenE #algorithm #analysis #normalisation #performance
A Fast Algorithm for Ground Normal Form Analysis (RB, HE), pp. 291–305.
PPDPALP-1992-KingS #analysis #concurrent #logic programming #source code
Serialisation Analysis of Concurrent Logic Programs (AK, PS), pp. 322–334.
LOPSTRLOPSTR-1992-VerschaetseDS #analysis #automation #termination
Automatic Termination Analysis (KV, SD, DDS), pp. 168–183.
PPDPPLILP-1992-GomardS #analysis #data type #lazy evaluation
Path Analysis for Lazy Data Structures (CKG, PS), pp. 54–68.
PPDPPLILP-1992-Rosendahl #analysis #attribute grammar #strict
Strictness Analysis for Attribute Grammars (MR), pp. 145–157.
POPLPOPL-1992-ChowH #analysis #memory management #parallel #source code
Compile-Time Analysis of Parallel Programs that Share Memory (JHC, WLHI), pp. 130–141.
ICSEICSE-1992-LubarsMPR #analysis #evolution #object-oriented
Object-Oriented Analysis for Evolving Systems (MDL, GM, CP, CR), pp. 173–185.
ICSEICSE-1992-MargonoR #ada #analysis #reuse #scalability
Software Reuse Economics: Cost-Benefit Analysis on a Large-Scale Ada Project (JM, TER), pp. 338–348.
ICSEICSE-1992-TsudaMTT #analysis #automation #development
Productivity Analysis of Software Development with an Integrated CASE Tool (MT, YM, MT, MT), pp. 49–58.
CCCC-1992-Knopp #analysis #lisp #parallel #performance
Improving the Performance of Parallel LISP by Compile Time Analysis (JK), pp. 271–277.
CCCC-1992-SudholtS #analysis #data flow #interprocedural #object-oriented #on the
On Interprocedural Data Flow Analysis for Object Oriented Languages (MS, CS), pp. 156–162.
CCCC-1992-VitekHU #analysis #object-oriented #source code
Compile-Time Analysis of Object-Oriented Programs (JV, RNH, JSU), pp. 236–250.
HPDCHPDC-1992-ParasharHMF #analysis #distributed #performance
A Requirement Analysis for High Performance Distributed Computing over LANs (MP, SH, AGM, GF), pp. 142–151.
CADECADE-1992-Ammon #analysis #automation #logic #proving
Automatic Proofs in Mathematical Logic and Analysis (KA), pp. 4–19.
CADECADE-1992-Sutcliffe #analysis #set
Linear-Input Subset Analysis (GS), pp. 268–280.
ICLPJICSLP-1992-BigotDM #abstract interpretation #analysis #comprehension #using
Understanding Finiteness Analysis Using Abstract Interpretation (PAB, SKD, KM), pp. 735–749.
ICLPJICSLP-1992-Heintze #analysis #aspect-oriented #set
Practical Aspects of Set Based Analysis (NH), pp. 765–779.
ICLPJICSLP-1992-KingS #analysis #concurrent #logic programming #source code
Schedule Analysis of Concurrent Logic programs (AK, PS), pp. 478–492.
ICLPJICSLP-1992-Overbeek #analysis #logic programming #search-based #sequence #tutorial
Logic Programming and Genetic Sequence Analysis: a Tutorial (RAO), pp. 32–34.
ICLPJICSLP-1992-SundararajanST #analysis #concurrent #logic programming #source code #thread
Variable Threadedness Analysis for Concurrent Logic Programs (RS, AVSS, ET), pp. 493–508.
LICSLICS-1992-HeintzeJ #logic programming #program analysis
An Engine for Logic Program Analysis (NH, JJ), pp. 318–328.
LICSLICS-1992-Jensen #analysis #strict
Disjunctive Strictness Analysis (TPJ), pp. 174–185.
LICSLICS-1992-Murthy #analysis
A Computational Analysis of Girard’s Translation and LC (CRM), pp. 90–101.
DACDAC-1991-BergamaschiCP #analysis #synthesis #using
Data-Path Synthesis Using Path Analysis (RAB, RC, MP), pp. 591–596.
DACDAC-1991-DeguchiIY #analysis #fault #logic #probability
Probabilistic CTSS: Analysis of Timing Error Probability in Asynchronous Logic Circuits (YD, NI, SY), pp. 650–655.
DACDAC-1991-Hwang #analysis #named
REX — A VLSI Parasitic Extraction Tool for Electromigration and Signal Analysis (JPH), pp. 717–722.
DACDAC-1991-RaghavanR #analysis
A New Nonlinear Driver Model for Interconnect Analysis (VR, RAR), pp. 561–566.
DACDAC-1991-SastryM #analysis #branch #process
A Branching Process Model for Observability Analysis of Combinational Circuits (SS, AM), pp. 452–457.
HTHT-1991-SamuelsonG #analysis #hypermedia #library
Intellectual Property Rights for Digital Library and Hypertext Publishing Systems: An Analysis of Xanadu (PS, RJG), pp. 39–50.
PODSPODS-1991-Matsliach #analysis #multi #performance
Performance Analysis of File Organizations that Use Multi-Bucket Data Leaves with Partial Expansions (GM), pp. 164–180.
SIGMODSIGMOD-1991-IoannidisK #analysis #optimisation #query
Left-Deep vs. Bushy Trees: An Analysis of Strategy Spaces and its Implications for Query Optimization (YEI, YCK), pp. 168–177.
PEPMPEPM-1991-CortesiF #abstract domain #abstract interpretation #analysis #logic programming #source code
Abstract Interpretation of Logic Programs: An Abstract Domain for Groundness, Sharing, Freeness and Compoundness Analysis (AC, GF), pp. 52–61.
PEPMPEPM-1991-HuntS #analysis #perspective
Binding Time Analysis: A New PERspective (SH, DS), pp. 154–165.
PEPMPEPM-1991-ParkG #analysis #optimisation
Reference Escape Analysis: Optimizing Reference Counting based on the Lifetime of References (YGP, BG), pp. 178–189.
PEPMPEPM-1991-Sahlin #analysis #prolog
Determinacy Analysis for Full Prolog (DS), pp. 23–30.
PEPMPEPM-1991-Shivers #analysis #control flow #semantics
The Semantics of Scheme Control-Flow Analysis (OS), pp. 190–198.
PLDIPLDI-1991-MaydanHL #analysis #data flow #dependence #performance
Efficient and Exact Data Dependence Analysis (DEM, JLH, MSL), pp. 1–14.
SASWSA-1991-BoeckC #analysis #automation #prolog #type checking
Automatic Construction of Prolog Primitives for Type Checking Analysis (PDB, BLC), pp. 165–172.
SASWSA-1991-Breuer #analysis #learning #synthesis
An Analysis/Synthesis Language with Learning Strategies (PTB), pp. 202–209.
ICALPICALP-1991-ErnoultM #analysis #strict
Uniform Ideals and Strictness Analysis (CE, AM), pp. 47–59.
FMVDME-1991-1-PlatKP #analysis #design
A Case for Structured Analysis/Formal Design (NP, JvK, KP), pp. 81–105.
FPCAFPCA-1991-Henglein #analysis #higher-order #performance #type inference
Efficient Type Inference for Higher-Order Binding-Time Analysis (FH), pp. 448–472.
FPCAFPCA-1991-Holst #analysis
Finiteness Analysis (CKH), pp. 473–495.
FPCAFPCA-1991-Jensen #analysis #logic #strict
Strictness Analysis in Logical Form (TPJ), pp. 352–366.
CHICHI-1991-SiochiH #analysis #case study #evaluation #user interface #using
A study of computer-supported user interface evaluation using maximal repeating pattern analysis (ACS, DH), pp. 301–305.
CHICHI-1991-WhittakerBC #analysis #interactive #process
Co-ordinating activity: an analysis of interaction in computer-supported co-operative work (SW, SEB, HHC), pp. 361–367.
AdaEuropeAdaEurope-1991-DelisT #ada #assessment #design #static analysis #using
Design Assessment of Ada Systems Using Static Analysis (AD, WMT), pp. 227–250.
KDDKDD-1991-Piatetsky #analysis
Discovery, Analysis, and Presentation of Strong Rules (GPS), pp. 229–248.
KDDKDD-1991-Ziarko #analysis #database #dependence #representation
The Discovery, Analysis, and Representation of Data Dependencies in Databases (WZ), pp. 195–212.
ICMLML-1991-BiswasWYK #clustering #concept #data analysis
Conceptual Clustering and Exploratory Data Analysis (GB, JBW, QY, GRK), pp. 591–595.
SIGIRSIGIR-1991-Swanson #analysis
Analysis of Unintended Connections Between Disjoint Science Literatures (DRS), pp. 280–289.
SIGIRSIGIR-1991-WendlandtD #analysis #documentation #retrieval #semantics
Incorporating a Semantic Analysis into a Document Retrieval Strategy (EBW, JRD), pp. 270–279.
ECOOPECOOP-1991-Champeaux #analysis #development #object-oriented #top-down
Object-Oriented Analysis and Top-Down Software Development (DdC), pp. 360–376.
OOPSLAOOPSLA-1991-HayesC #analysis #modelling #object-oriented
Coherent Models for Object-Oriented Analysis (FH, DC), pp. 171–183.
TOOLSTOOLS-USA-1991-Henderson-Sellers #analysis #design
Techniques and Notation for Analysis and Design (BHS), pp. 403–404.
TOOLSTOOLS-USA-1991-Murphy #analysis #case study #experience #object-oriented
Experiences in Applying Object-Oriented Analysis (GCM), pp. 249–264.
TOOLSTOOLS-USA-1991-Nerson #analysis #design
Analysis and Design Methodologies (JMN), pp. 375–376.
TOOLSTOOLS-USA-1991-Nerson91a #analysis #design #eiffel #towards
Associated Paper: Extending Eiffel Toward O-O Analysis and Design (JMN), pp. 377–392.
POPLPOPL-1991-AbramskyJ #analysis #approach #higher-order #polymorphism #relational #strict
A Relational Approach to Strictness Analysis for Higher-Order Polymorphic Functions (SA, TPJ), pp. 49–54.
POPLPOPL-1991-SekarMR #abstract interpretation #analysis #on the #strict
On the Power and Limitation of Strictness Analysis Based on Abstract Interpretation (RCS, PM, IVR), pp. 37–48.
ESECESEC-1991-RozmanGD #analysis #metric #source code
Relation Between Source Code Metrics and Structure Analysis Metrics (IR, JG, TD), pp. 332–342.
ESECESEC-1991-SelbyM #analysis #classification #metric
Metric-Driven Classification Analysis (RWS, RKM), pp. 290–307.
ICSEICSE-1991-GorlickR #analysis #using
Using Weaves for Software Construction and Analysis (MMG, RRR), pp. 23–34.
ICSEICSE-1991-SelbyPSB #analysis #development #empirical #feedback #metric
Metric-Driven Analysis and Feedback Systems for Enabling Empirically Guided Software Development (RWS, AAP, DCS, JB), pp. 288–298.
ASPLOSASPLOS-1991-CmelikKDK #analysis #benchmark #metric #set #specification
An Analysis of SPARC and MIPS Instruction Set Utilization on the SPEC Benchmarks (RFC, SIK, DRD, EJK), pp. 290–302.
CAVCAV-1991-AvruninBC #analysis #concurrent #integer #programming
Integer Programming in the Analysis of Concurrent Systems (GSA, UAB, JCC), pp. 92–102.
ICLPICLP-1991-CharlierMH #abstract interpretation #algorithm #analysis #complexity
A Generic Abstract Interpretation Algorithm and its Complexity Analysis (BLC, KM, PVH), pp. 64–78.
ICLPICLP-1991-CodishDY #algorithm #alias #analysis #safety #unification
Derivation and Safety of an Abstract Unification Algorithm for Groundness and Aliasing Analysis (MC, DD, EY), pp. 79–93.
ICLPICLP-1991-CodishFM #analysis #concurrent #logic programming #source code
Suspension Analysis for Concurrent Logic Programs (MC, MF, KM), pp. 331–345.
ICLPICLP-1991-DebrayL #analysis #automation #complexity #logic programming #source code
Automatic Complexity Analysis of Logic Programs (SKD, NWL), pp. 599–613.
ICLPISLP-1991-FosterW #analysis #reuse
Copy Avoidance through Compile-Time Analysis and Local Reuse (ITF, WHW), pp. 455–469.
LICSLICS-1991-CortesiFW #abstract domain #analysis
Prop revisited: Propositional Formula as Abstract Domain for Groundness Analysis (AC, GF, WHW), pp. 322–327.
ISSTATAV-1991-DuesterwaldS #analysis #concurrent #data flow #framework #using
Concurrency Analysis in the Presence of Procedures Using a Data-Flow Framework (ED, MLS), pp. 36–48.
ISSTATAV-1991-LongC #analysis #concurrent #data flow
Data Flow Analysis of Concurrent Systems that Use the Rendezvous Model of Synchronization (DLL, LAC), pp. 21–35.
ISSTATAV-1991-OstrandW #analysis #data flow #pointer #test coverage #testing
Data Flow-Based Test Adequacy Analysis for Languages with Pointers (TJO, EJW), pp. 74–86.
ISSTATAV-1991-YehY #algebra #analysis #composition #process #reachability #using
Compositional Reachability Analysis Using Process Algebra (WJY, MY), pp. 49–59.
DACDAC-1990-KuoLW #analysis #fault
A Fault Analysis Method for Synchronous Sequential Circuits (TYK, JYL, JFW), pp. 732–735.
DACDAC-1990-McCormickA #analysis
Waveform Moment Methods for Improved Interconnection Analysis (SPM, JA), pp. 406–412.
DACDAC-1990-McGeerB #analysis #network
Timing Analysis in Precharge/Unate Networks (PCM, RKB), pp. 124–129.
DACDAC-1990-SakallahMO #analysis #design
Analysis and Design of Latch-Controlled Synchronous Digital Circuits (KAS, TNM, KO), pp. 111–117.
PODSPODS-1990-JohnsonS #algorithm #analysis #concurrent #framework #performance
A Framework for the Performance Analysis of Concurrent B-tree Algorithms (TJ, DS), pp. 273–287.
VLDBVLDB-1990-MuntzL #analysis #array #performance
Performance Analysis of Disk Arrays under Failure (RRM, JCSL), pp. 162–173.
ESOPESOP-1990-GoldbergP #analysis #functional #higher-order #implementation #optimisation #stack
Higher Order Escape Analysis: Optimizing Stack Allocation in Functional Program Implementations (BG, YGP), pp. 152–160.
ESOPESOP-1990-JensenM #analysis #garbage collection
A Backwards Analysis for Compile-time Garbage Collection (TPJ, TÆM), pp. 227–239.
ESOPESOP-1990-JourdanP #analysis
Techniques for Improving Grammar Flow Analysis (MJ, DP), pp. 240–255.
ESOPESOP-1990-Sands #analysis #complexity #higher-order #lazy evaluation
Complexity Analysis for a Lazy Higher-Order Language (DS), pp. 361–376.
PLDIPLDI-1990-ChambersU #analysis #dynamic typing #object-oriented #optimisation #source code
Iterative Type Analysis and Extended Message Splitting: Optimizing Dynamically-Typed Object-Oriented Programs (CC, DU), pp. 150–164.
PLDIPLDI-1990-ChaseWZ #analysis #pointer
Analysis of Pointers and Structures (DRC, MNW, FKZ), pp. 296–310.
PLDIPLDI-1990-DebrayLH #analysis #logic programming #source code
Task Granularity Analysis in Logic Programs (SKD, NWL, MVH), pp. 174–188.
STOCSTOC-1990-SchmidtS #analysis
The Analysis of Closed Hashing under Limited Randomness (Extended Abstract) (JPS, AS), pp. 224–234.
PLDIBest-of-PLDI-1990-ChaseWZ90a #analysis #pointer
Analysis of pointers and structures (with retrospective) (DRC, MNW, FKZ), pp. 343–359.
LISPLFP-1990-Burn #analysis #using
Using Projection Analysis of Evaluation-Order and Its Application (GLB), pp. 227–240.
LISPLFP-1990-Consel #analysis #functional #higher-order
Binding Time Analysis for High Order Untyped Functional Languages (CC), pp. 264–272.
LISPLFP-1990-DraghicescuP #analysis #composition
A Compositional Analysis of Evaluation-Order and Its Application (MD, SP), pp. 242–250.
CHICHI-1990-Campbell #analysis #programming #smalltalk
Developmental scenario analysis of Smalltalk programming (RLC), pp. 269–276.
CHICHI-1990-GeorgeVN #analysis #implementation #process
The organizational implementation of an electronic meeting system: an analysis of the innovation process (JFG, JSV, JFNJ), pp. 361–368.
CHICHI-1990-HowesP #analysis #learning #semantics
Semantic analysis during exploratory learning (AH, SJP), pp. 399–406.
CHICHI-1990-SmithBG #data analysis #generative
Stereophonic and surface sound generation for exploratory data analysis (SS, RDB, GGG), pp. 125–132.
CHICHI-1990-YoungW #analysis #concept #fault #predict #using
Using a knowledge analysis to predict conceptual errors in text-editor usage (RMY, JW), pp. 91–98.
ICMLML-1990-AndersonM #analysis #categorisation
A Rational Analysis of Categorization (JRA, MM), pp. 76–84.
ICMLML-1990-ChanW #analysis #induction #learning #performance #probability
Performance Analysis of a Probabilistic Inductive Learning System (KCCC, AKCW), pp. 16–23.
ICMLML-1990-Cohen #analysis #concept #learning #representation
An Analysis of Representation Shift in Concept Learning (WWC), pp. 104–112.
ICMLML-1990-PazzaniS #algorithm #analysis #learning
Average Case Analysis of Conjunctive Learning Algorithms (MJP, WS), pp. 339–347.
SIGIRSIGIR-1990-Sacks-DavisW #analysis #documentation #retrieval #using
Using Syntactic Analysis in a Document Retrieval System that uses Signature Files (RSD, PW), pp. 179–192.
PPDPPLILP-1990-BoeckC #analysis #correctness #prolog #static typing
Static Type Analysis of Prolog Procedures for Ensuring Correctness (PDB, BLC), pp. 222–237.
PPDPPLILP-1990-SagivFRW #analysis #approach #data flow #problem
A Logic-Based Approach to Data Flow Analysis Problem (SS, NF, MR, RW), pp. 277–292.
POPLPOPL-1990-Burn #abstract interpretation #analysis
A Relationship Between Abstract Interpretation and Projection Analysis (GLB), pp. 151–156.
POPLPOPL-1990-Field #analysis #lazy evaluation #on the #specification #tool support
On Laziness and Optimality in λ Interpreters: Tools for Specification and Analysis (JF), pp. 1–15.
POPLPOPL-1990-MarloweR #algorithm #analysis #data flow #hybrid #incremental #performance
An Efficient Hybrid Algorithm for Incremental Data Flow Analysis (TJM, BGR), pp. 184–196.
POPLPOPL-1990-SekarPR #analysis #performance #strict
Small Domains Spell Fast Strictness Analysis (RCS, SP, IVR), pp. 169–183.
PPoPPPPoPP-1990-CallahanKS #analysis #parallel #programming
Analysis of Event Synchronization in A Parallel Programming Tool (DC, KK, JS), pp. 21–30.
PPoPPPPoPP-1990-Nicol #analysis #parallel
Analysis of Synchronization in Massively Parallel Discrete-Event Sumulations (DMN), pp. 89–98.
CAVCAV-1990-BerthelotJP #analysis #named #petri net
PAPETRI: Environment for the Analysis of Petri Nets (GB, CJ, LP), pp. 13–22.
CAVCAV-1990-Ness #analysis
Issues Arising in the Analysis of L.0 (LAN), pp. 106–115.
ICLPCLP-1990-MulkersWB90 #analysis #data type
Analysis of Shared Data Structures for Compile-Time Garbage (AM, WHW, MB), pp. 747–762.
ICLPNACLP-1990-MarriottS #analysis #constraints #logic programming #source code
Analysis of Constraint Logic Programs (KM, HS), pp. 531–547.
ICLPNACLP-1990-Pereira #analysis #prolog
Prolog and Natural-Language Analysis: Into the Third Decade (FCNP), pp. 813–832.
ICLPNACLP-1990-RoyD #analysis #compilation #data flow #optimisation #prolog
The Benefits of Global Dataflow Analysis for an Optimizing Prolog Compiler (PVR, AMD), pp. 501–515.
DACDAC-1989-BolsensRCM #analysis #behaviour #debugging #logic
Electrical Debugging of Synchronous MOS VLSI Circuits Exploiting Analysis of the Intended Logic Behaviour (IB, WDR, LJMC, HDM), pp. 513–518.
DACDAC-1989-Coppola #algorithm #analysis #logic
New Methods in the Analysis of Logic Minimization Data and Algorithms (AJC), pp. 226–231.
DACDAC-1989-DuYG #analysis #on the #problem
On the General False Path Problem in Timing Analysis (DHCD, SHY, SG), pp. 555–560.
DACDAC-1989-PerremansCM #analysis
Static Timing Analysis of Dynamically Sensitizable Paths (SP, LJMC, HDM), pp. 568–573.
DACDAC-1989-PillageHR #analysis #evaluation #named
AWEsim: Asymptotic Waveform Evaluation for Timing Analysis (LTP, XH, RAR), pp. 634–637.
DACDAC-1989-WeinerS #analysis #logic #synthesis
Timing Analysis in a Logic Synthesis Environment (NW, ALSV), pp. 655–661.
DACDAC-1989-YenDG #algorithm #analysis #performance
Efficient Algorithms for Extracting the K most Critical Paths in Timing Analysis (SHY, DHCD, SG), pp. 649–654.
PLDIPLDI-1989-HorwitzPR #analysis #dependence #pointer
Dependence Analysis for Pointer Variables (SH, PP, TWR), pp. 28–40.
PLDIPLDI-1989-Venkatesh #evaluation #framework #program analysis #specification
A Framework for Construction and Evaluation of High-Level Specifications for Program Analysis Techniques (GAV), pp. 1–12.
STOCSTOC-1989-Motwani #algorithm #analysis #graph #problem
Expanding Graphs and the Average-case Analysis of Algorithms for Matchings and Related Problems (RM), pp. 550–561.
ICALPICALP-1989-Kenyon-MathieuV #analysis #data type
General Methods for the Analysis of the Maximum Size of Dynamic Data Structures (Extended Abstract) (CKM, JSV), pp. 473–487.
ICALPICALP-1989-LouchardRS #algorithm #analysis #probability
Dynamic Algorithms in D. E. Knuth’s Model: A Probabilistic Analysis (GL, BR, RS), pp. 521–533.
FPCAFPCA-1989-BjernerH #analysis #approach #composition #first-order #functional #lazy evaluation #source code
A Composition Approach to Time Analysis of First Order Lazy Functional Programs (BB, SH), pp. 157–165.
FPCAFPCA-1989-Bloss #analysis #functional #implementation #performance
Update Analysis and the Efficient Implementation of Functional Aggregates (AGB), pp. 26–38.
FPCAFPCA-1989-JonesM #analysis #garbage collection
Computer-Time Garbage Collection by Sharing Analysis (SBJ, DLM), pp. 54–74.
FPCAFPCA-1989-KuoM #analysis #strict #type inference
Strictness Analysis: A New Perspective Based on Type Inference (TMK, PM), pp. 260–272.
FPCAFPCA-1989-Rosendahl #analysis #automation #complexity
Automatic Complexity Analysis (MR), pp. 144–156.
CHICHI-1989-EganRLLG #analysis #behaviour #evaluation #hypermedia
Behavioral evaluation and analysis of a hypertext browser (DEE, JRR, TKL, CCL, LMG), pp. 205–210.
CAiSECAiSE-1989-HakkarainenIO #analysis #embedded #knowledge-based
A Knowledge-Based Support System for Embedded Computer Software Analysis (KH, TI, MO).
CAiSECAiSE-1989-HernbackL #analysis #automation #classification #framework #implementation #tool support
A Framework for Use and Classification of CASE Tools in Systems Analysis and a Strategy for Implementation (JH, IL).
KRKR-1989-Nebel #analysis
A Knowledge Level Analysis of Belief Revision (BN), pp. 301–311.
ICMLML-1989-Greiner #analysis #formal method #towards
Towards a Formal Analysis of EBL (RG), pp. 450–453.
ICMLML-1989-Hsu #analysis
A Knowledge-Level Analysis of Informing (JYjH), pp. 485–488.
ICMLML-1989-Schaffer #data analysis
Bacon, Data Analysis and Artificial Intelligence (CS), pp. 174–179.
ICMLML-1989-Shavlik #analysis #empirical #learning
An Empirical Analysis of EBL Approaches for Learning Plan Schemata (JWS), pp. 183–187.
SEKESEKE-1989-TsaiYLCH #analysis #specification
Knowledge-oriented Specification Analysis and Transformation (STT, CCY, CCL, STC, CHH), pp. 110–115.
SIGIRSIGIR-1989-Pejtersen #analysis #information retrieval #interface #library
A Library System for Information Retrieval Based on a Cognitive Task Analysis and Supported by an Icon-Based Interface (AMP), pp. 40–47.
SIGIRSIGIR-1989-SaltonS #analysis #automation #on the
On the Application of Syntactic Methodologies in Automatic Text Analysis (GS, MS), pp. 137–150.
POPLPOPL-1989-CooperK #alias #analysis #interprocedural #performance
Fast Interprocedural Alias Analysis (KDC, KK), pp. 49–59.
POPLPOPL-1989-SagivEFR #analysis #attribute grammar #data flow
Resolving Circularity in Attribute Grammars with Applications to Data Flow Analysis (SS, OE, NF, MR), pp. 36–48.
ESECESEC-1989-FranceD #analysis #specification #using
Formal Specification Using Structured Systems Analysis (RBF, TWGD), pp. 293–310.
ESECESEC-1989-Ince #analysis #data flow #design #empirical #metric
Martin J. Shepperd: An Empirical and Theoretical Analysis of an Information Flow-Based System Design Metric (DCI), pp. 86–99.
ESECESEC-1989-ManfrediOT #analysis #approach #object-oriented
An Object-oriented Approach to the System Analysis (FM, GO, PT), pp. 395–410.
ESECESEC-1989-Shutt #development #program analysis #specification #tool support #using
A Rigorous Development Strategy Using the OBJ Specification Language and the MALPAS Program Analysis Tools (RNS), pp. 260–291.
ICSEICSE-1989-BendifallahS #analysis #empirical #specification
Work Structures and Shifts: An Empirical Analysis of Software Specification Teamwork (SB, WS), pp. 260–270.
ICSEICSE-1989-Hsieh #analysis #concurrent #source code
Timing Analysis of Cyclic Concurrent Programs (CSH), pp. 312–318.
ICSEICSE-1989-LongC #analysis #concurrent #graph #interactive
Task Interaction Graphs for Concurrency Analysis (DLL, LAC), pp. 44–52.
ICSEICSE-1989-VernerTJH #analysis #bibliography #case study #dependence #perspective
Technology Dependence in Function Point Analysis: A Case Study and Critical Review (JMV, GT, BJ, RGH), pp. 375–382.
ICSEICSE-1989-Yue #composition #dynamic analysis #functional #requirements #validation
Validating System Requirements by Functional Decomposition and Dynamic Analysis (KY), pp. 188–196.
ASPLOSASPLOS-1989-AdamsZ #analysis #set #source code
An Analysis of 8086 Instruction Set Usage in MS DOS Programs (TLA, REZ), pp. 152–160.
ASPLOSASPLOS-1989-WeberG #analysis #multi
Analysis of Cache Invalidation Patterns in Multiprocessors (WDW, AG), pp. 243–256.
SOSPSOSP-1989-Duchamp #analysis #performance #transaction
Analysis of Transaction Management Performance (DD), pp. 177–190.
ICLPNACLP-1989-Mudambi #analysis #multi #performance
Performance Analysis of Aurora on a Switch-Based Multiprocessor (SM), pp. 697–712.
ICLPNACLP-1989-Szeredi #analysis #performance #prolog
Performance Analysis of the Aurora Or-Parallel Prolog System (PS), pp. 713–732.
ICLPNACLP-1989-Winsborough #analysis #multi #reachability
Path-Dependent Reachability Analysis for Multiple Specialization (WHW), pp. 133–153.
ISSTATAV-1989-AvruninWD #analysis #automation #concurrent
Experiments in Automated Analysis of Concurrent Software Systems (GSA, JCW, LKD), pp. 124–130.
ISSTATAV-1989-KotikM #analysis #automation #program transformation #testing #using
Automating Software Analysis and Testing Using a Program Transformation System (GK, LM), pp. 75–84.
ISSTATAV-1989-YoungTFB #analysis #concurrent #development
Integrated Concurrency Analysis in a Software Development Enviornment (MY, RNT, KF, DB), pp. 200–209.
DACDAC-1988-BeattyB #analysis #incremental #performance #using
Fast Incremental Circuit Analysis Using Extracted Hierarchy (DLB, REB), pp. 495–500.
DACDAC-1988-BurchNYH #analysis #estimation #independence #reliability
Pattern-Independent Current Estimation for Reliability Analysis of CMOS Circuits (RB, FNN, PY, DEH), pp. 294–299.
DACDAC-1988-ChiangNL #algorithm #analysis #performance
Time Efficient VLSI Artwork Analysis Algorithms in GOALIE2 (KWC, SN, CYL), pp. 471–475.
DACDAC-1988-Cirit #analysis #random #testing
Switch Level Random Pattern Testability Analysis (MAC), pp. 587–590.
DACDAC-1988-Sherman #algorithm #analysis #generative
Algorithms for Timing Requirement Analysis and Generation (SKS), pp. 724–727.
DACDAC-1988-YenGD #algorithm #analysis
A Path Selection Algorithm for Timing Analysis (HCY, SG, DHCD), pp. 720–723.
PODSPODS-1988-RamakrishnaM #analysis #bound
Analysis of Bounded Disorder File Organization (MVR, PM), pp. 117–125.
SIGMODSIGMOD-1988-ChristodoulakisF #analysis #performance
Performance Analysis and Fundamental Performance Trade Offs for CLV Optical Disks (SC, DAF), pp. 286–294.
SIGMODSIGMOD-1988-DeWittGS #analysis #database #performance
A Performance Analysis of the Gamma Database Machine (DJD, SG, DAS), pp. 350–360.
SIGMODSIGMOD-1988-Hanson #analysis #database #performance #query
Processing Queries Against Database Procedures: A Performance Analysis (ENH), pp. 295–302.
SIGMODSIGMOD-1988-Ramakrishna #analysis
Hashing in Practive, Analysis of Hashing and Universal Hashing (MVR), pp. 191–199.
VLDBVLDB-1988-Bhide #analysis #architecture #transaction
An Analysis of Three Transaction Processing Architectures (AB), pp. 339–350.
CSEETSEI-1988-LaviW #analysis #embedded #industrial #requirements #specification
Embedded Computer Systems. Requirements Analysis & Specification — An Industrial Course (JZL, MW), pp. 81–105.
ESOPESOP-1988-Takayama #analysis #compilation #named #proving
QPC: QJ-based Proof Compiler — Simple Examples and Analysis (YT), pp. 49–63.
PLDIPLDI-1988-BallanceBG #abstraction #analysis #editing #incremental #syntax
Grammatical Abstraction and Incremental Syntax Analysis in a Language-Based Editor (RAB, JB, SLG), pp. 185–198.
PLDIPLDI-1988-Callahan #analysis #data flow #graph #interprocedural #summary
The Program Summary Graph and Flow-Sensitive Interprocedural Data Flow Analysis (DC), pp. 47–56.
PLDIPLDI-1988-CooperK #analysis #interprocedural #linear
Interprocedural Side-Effect Analysis in Linear Time (KDC, KK), pp. 57–66.
PLDIPLDI-1988-JainT #analysis #approach #data flow #multi #performance
An Efficient Approach to Data Flow Analysis in a Multi Pass Global Optimizer (SJ, CLT), pp. 154–163.
PLDIPLDI-1988-SeshadriWJWYS #analysis #compilation #concurrent #semantics
Semantic Analysis in a Concurrent Compiler (VS, DBW, MDJ, SW, CPY, IS), pp. 233–240.
PLDIPLDI-1988-Shivers #analysis #control flow
Control-Flow Analysis in Scheme (OS), pp. 164–174.
STOCSTOC-1988-HalpernMT #analysis #knowledge-based
A Knowledge-Based Analysis of Zero Knowledge (Preliminary Report) (JYH, YM, MRT), pp. 132–147.
STOCSTOC-1988-LuekerM #analysis
More Analysis of Double Hashing (GSL, MM), pp. 354–359.
STOCSTOC-1988-PapadimitriouY88b #algorithm #analysis #architecture #independence #parallel #towards
Towards an Architecture-Independent Analysis of Parallel Algorithms (Extended Abstract) (CHP, MY), pp. 510–513.
PLDIBest-of-PLDI-1988-CooperK88a #analysis #interprocedural #linear
Interprocedural side-effect analysis in linear time (with retrospective) (KDC, KK), pp. 217–228.
PLDIBest-of-PLDI-1988-Shivers88a #analysis #control flow #higher-order #lessons learnt
Higher-order control-flow analysis in retrospect: lessons learned, lessons abandoned (with retrospective) (OS), pp. 257–269.
ICALPICALP-1988-AlbertF #algorithm #analysis #complexity #multi
Average Case Complexity Analysis of the Rete Multi-Pattern Match Algorithm (LA, FF), pp. 18–37.
ICALPICALP-1988-LengauerW #analysis #graph #performance
Efficient Analysis of Graph Properties on Context-free Graph Languages (Extended Abstract) (TL, EW), pp. 379–393.
CSCWCSCW-1988-Greenbaum #analysis
In Search of Cooperation: An Historical Analysis of Work Organization and Management Strategies (JG), pp. 102–114.
SIGIRSIGIR-1988-BollmannR #analysis
A Utility-Theoretic Analysis of Expected Search Length (PB, VVR), pp. 245–256.
OOPSLAOOPSLA-1988-Alabiso #analysis #data flow #design #modelling #object-oriented
Transformation of Data Flow Analysis Models to Object-Oriented Design (BA), pp. 335–354.
PPDPPLILP-1988-Lindstrom #functional #logic #source code #static analysis
Static Analysis Of Functional Programs With Logic Variables (GL), pp. 1–19.
POPLPOPL-1988-CarrollR #analysis #data flow #incremental
Incremental Data Flow Analysis via Dominator and Attribute Updates (MDC, BGR), pp. 274–284.
POPLPOPL-1988-Debray #analysis #data flow #logic programming #performance #source code
Efficient Dataflow Analysis of Logic Programs (SKD), pp. 260–273.
POPLPOPL-1988-MontenyohlW #analysis #continuation #semantics
Correct Flow Analysis in Continuation Semantics (MM, MW), pp. 204–218.
POPLPOPL-1988-NielsonN #analysis #automation #λ-calculus
Automatic Binding Time Analysis for a Typed λ-Calculus (HRN, FN), pp. 98–106.
POPLPOPL-1988-RuggieriM #analysis
Lifetime Analysis of Dynamically Allocated Objects (CR, TPM), pp. 285–293.
POPLPOPL-1988-Wadler #analysis #strict
Strictness Analysis Aids Time Analysis (PW), pp. 119–132.
ICSEICSE-1988-ChaLS #analysis #fault #safety #using #verification
Safety Verification in Murphy Using Fault Tree Analysis (SSC, NGL, TJS), pp. 377–387.
ICSEICSE-1988-Hagemann #analysis #automation #realtime #requirements
Requirements Analysis for Real-Time Automation Projects (MH), pp. 122–129.
ICSEICSE-1988-Narayanaswamy #evolution #framework #lisp #static analysis
Static Analysis-Based Program Evolution Support in the Common Lisp Framework (KN), pp. 222–230.
PPoPPPPEALS-1988-LiY #analysis #interprocedural #parallel #performance
Efficient Interprocedural Analysis for Program Parallelization and Restructuring (ZL, PCY), pp. 85–99.
ICLPJICSCP-1988-Debray88 #logic programming #parallel #source code #static analysis
Static Analysis of Parallel Logic Programs (SKD), pp. 711–732.
ICLPJICSCP-1988-Docker88 #analysis #implementation #named #prolog
SAME — A Structured Analysis Tool and its Implementation in Prolog (TWGD), pp. 82–95.
ICLPJICSCP-1988-GorlickK88 #analysis #logic programming #named #performance #source code
Gauge: A Workbench for the Performance Analysis of Logic Programs (MMG, CK), pp. 548–561.
ICLPJICSCP-1988-HuynhL88 #analysis
A CLP(R) Options Trading Analysis System (TH, CL), pp. 59–69.
ICLPJICSCP-1988-WarrenHD88 #analysis #logic programming #on the #source code
On the Practicality of Global Flow Analysis of Logic Programs (RW, MVH, SKD), pp. 684–699.
DACDAC-1987-KoukaS #data analysis #design
An Application of Exploratory Data Analysis Techniques to Floorplan Design (EFMK, GS), pp. 654–658.
DACDAC-1987-Parks #analysis #design #named #tutorial
Tutorial: Reading and Reviewing the Common Schema for Electrical Design and Analysis (CHP), pp. 479–483.
PODSPODS-1987-Hadzilacos #analysis #protocol
A Knowledge Theoretic Analysis of Atomic Commitment Protocols (VH), pp. 129–134.
PODSPODS-1987-Marchetti-SpaccamelaPS #analysis #complexity #implementation #logic #query #worst-case
Worst-case Complexity Analysis of Methods for Logic Query Implementation (AMS, AP, DS), pp. 294–301.
SIGMODSIGMOD-1987-FaloutsosSR #analysis #data access #object-oriented
Analysis of Object Oriented Spatial Access Methods (CF, TKS, NR), pp. 426–439.
SIGMODSIGMOD-1987-Hanson #analysis #performance
A Performance Analysis of View Materialization Strategies (ENH), pp. 440–453.
SIGMODSIGMOD-1987-NelsonS #analysis #data type
A Population Analysis for Hierarchical Data Structures (RCN, HS), pp. 270–277.
VLDBVLDB-1987-DiasIRY #analysis #design
Design and Analysis of Integrated Concurrency-Coherence Controls (DMD, BRI, JTR, PSY), pp. 463–471.
PLDIPLDI-1987-OffuttK #analysis #fortran #interpreter #mutation testing
A Fortran 77 interpreter for mutation analysis (AJO, KNK), pp. 177–188.
STOCSTOC-1987-Bach #algorithm #analysis #random
Realistic Analysis of Some Randomized Algorithms (EB), pp. 453–461.
STOCSTOC-1987-HastadLR #analysis #multi #protocol
Analysis of Backoff Protocols for Multiple Access Channels (Extended Abstract) (JH, FTL, BR), pp. 241–253.
ICALPICALP-1987-Dybjer #analysis #image
Inverse Image Analysis (PD), pp. 21–30.
FPCAFPCA-1987-WadlerH #analysis #strict
Projections for strictness analysis (PW, RJMH), pp. 385–407.
HCIHCI-CE-1987-LuekePB #analysis #protocol #requirements
User Requirements Gathering Through Verbal Protocol Analysis (EEL, PDP, CRB), pp. 523–528.
HCIHCI-SES-1987-Malt #analysis #approach #human-computer #interface
Skills Analysis in Human-Computer Interface: A Holistic Approach (LGM), pp. 319–326.
HCIHCI-SES-1987-Saito #analysis #evaluation #eye tracking
Quantitative Evaluation of VDT Operations Through the Analysis of Spatio-Temporal Characteristics of Eye Movement (SS), pp. 197–202.
SIGIRSIGIR-1987-Harman #analysis #online
A Failure Analysis on the Limitations of Suffixing in an Online Environment (DH), pp. 102–107.
SIGIRSIGIR-1987-SmithWF #analysis #named #retrieval
MICROARRAS: An Advanced Full-Text Retrieval and Analysis System (JBS, SFW, GJF), pp. 187–195.
OOPSLAOOPSLA-1987-KerrP #analysis #object-oriented #programming
Use of Object-Oriented Programming in a Time Series Analysis System (RKK, DBP), pp. 1–10.
POPLPOPL-1987-KuoM #analysis #on the #strict
On Strictness and its Analysis (TMK, PM), pp. 144–155.
POPLPOPL-1987-Nielson #abstract interpretation #analysis #strict
Strictness Analysis and Denotational Abstract Interpretation (FN), pp. 120–131.
ESECESEC-1987-RobinsonE #analysis #database #requirements
Requirements Analysis for a Database Administration Support Environment (HMR, JME), pp. 377–386.
ICLPSLP-1987-Debray87 #analysis #logic programming #source code
Flow Analysis of a Simple Class of Dynamic Logic Programs (SKD), pp. 307–316.
ICLPSLP-1987-MannilaU87 #analysis #prolog #source code
Flow Analysis of Prolog Programs (HM, EU), pp. 205–214.
DACDAC-1986-BarzilaiBHIS #analysis #fault #named #performance #verification
SLS — a fast switch level simulator for verification and fault coverage analysis (ZB, DKB, LMH, VSI, GMS), pp. 164–170.
DACDAC-1986-Hartoog #analysis #layout #standard
Analysis of placement procedures for VLSI standard cell layout (MRH), pp. 314–319.
DACDAC-1986-JacobNP #analysis #empirical #multi #performance
An empirical analysis of the performance of a multiprocessor-based circuit simulator (GKJ, ARN, DOP), pp. 588–593.
DACDAC-1986-Larsen #analysis #clustering #data type #synthesis
Rules-based object clustering: a data structure for symbolic VLSI synthesis and analysis (RPL), pp. 768–777.
DACDAC-1986-ToyoshimaTMHHKT #analysis #design #effectiveness #scalability
An effective delay analysis system for a large scale computer design (RT, YT, KM, HH, MH, RK, KT), pp. 398–403.
DACDAC-1986-VidigalND #analysis #integration #named #network
CINNAMON: coupled integration and nodal analysis of MOS networks (LMV, SRN, SWD), pp. 179–185.
ESOPESOP-1986-KastensS #analysis #parametricity
Lifetime Analysis for Procedure Parameters (UK, MS), pp. 53–69.
STOCSTOC-1986-LeightonS #algorithm #analysis #bound #grid
Tight Bounds for Minimax Grid Matching, With Applications to the Average Case Analysis of Algorithms (FTL, PWS), pp. 91–103.
PLDIBest-of-PLDI-1986-BurkeC #analysis #dependence #interprocedural #parallel
Interprocedural dependence analysis and parallelization (with retrospective) (MGB, RC), pp. 139–154.
ICALPICALP-1986-BrzozowskiS #analysis #network #simulation #summary
Correspondence between Ternary Simulation and Binary Race Analysis in Gate Networks (Extended Summary) (JAB, CJHS), pp. 69–78.
LISPLFP-1986-BlossH #analysis #strict
Variations on Strictness Analysis (AGB, PH), pp. 132–142.
ICGTGG-1986-MoldovanP #analysis #graph grammar #parallel #rule-based #using
Parallelism analysis in rule-based systems using graph grammars (DIM, FPP), pp. 427–439.
CSCWCSCW-1986-ApplegateKN #analysis #generative #idea
A group decision support system for idea generation and issue analysis in organization planning (LMA, BRK, JFN), pp. 16–34.
CSCWCSCW-1986-BegemanCEGRS #analysis
Project Nick: meetings augmentation and analysis (MLB, PC, CAE, MG, GLR, TS), pp. 1–6.
SIGIRSIGIR-1986-TruckenmullerR #analysis #design #perspective #topic
Methodological Issues for the Design of an Office Information Server — Focal Topics for the Analysis from an Office System Perspective (TWT, MR), pp. 39–48.
POPLPOPL-1986-Coutant #alias #analysis
Retargetable High-Level Alias Analysis (DSC), pp. 110–118.
POPLPOPL-1986-HudakY #analysis #higher-order #strict #λ-calculus
Higher-Order Strictness Analysis in Untyped λ Calculus (PH, JY), pp. 97–109.
POPLPOPL-1986-JonesM #analysis #data flow #graph #source code #using
Data Flow Analysis of Applicative Programs Using Minimal Function Graphs (NDJ, AM), pp. 296–306.
POPLPOPL-1986-SneltingH #algebra #analysis #incremental #semantics #unification
Unification in Many-Sorted Algebras as a Device for Incremental Semantic Analysis (GS, WH), pp. 229–235.
CADECADE-1986-Jager #analysis #logic
Some Contributions to the Logical Analysis of Circumscrition (GJ), pp. 154–171.
ICLPICLP-1986-Matsumoto86 #analysis #natural language #parallel #parsing
A Parallel Parsing System for Natural Language Analysis (YM), pp. 396–409.
LICSLICS-1986-Coquand #analysis
An Analysis of Girard’s Paradox (TC), pp. 227–236.
DACDAC-1985-Chan #analysis #development #multi #network
Development of a timing analysis program for multiple clocked network (EC), pp. 816–819.
DACDAC-1985-MuraokaIKMH #analysis #named
ACTAS: an accurate timing analysis system for VLSI (MM, HI, HK, MM, KH), pp. 152–158.
DACDAC-1985-PerryMP #analysis #modelling
Yield analysis modeling (SP, MM, DJP), pp. 425–428.
DACDAC-1985-PierroD #analysis #design #integration
Mechanical design/analysis integration on Apollo workstations (JAP, GFD), pp. 96–101.
DACDAC-1985-RoseBT #analysis #design #performance #probability #tool support
Integrating stochastic performance analysis with system design tools (CWR, MB, YT), pp. 482–488.
DACDAC-1985-SchefferS #abstraction #analysis
Hierarchical analysis of IC artwork with user defined abstraction rules (LS, RS), pp. 293–298.
DACDAC-1985-Tendolkar #analysis #fault #random
Analysis of timing failures due to random AC defects in VLSI modules (NNT), pp. 709–714.
DACDAC-1985-Wunderlich #analysis #named #probability #testing
PROTEST: a tool for probabilistic testability analysis (HJW), pp. 204–211.
SIGMODSIGMOD-1985-DemoK #analysis #database #dependence
Analysis of the Context Dependency of CODASYL Find-Statements with Application to Database Program Conversion (GBD, SK), pp. 354–361.
SIGMODSIGMOD-1985-KamelK #analysis
A Model of Data Distribution Based on Texture Analysis (NK, RK), pp. 319–325.
VLDBVLDB-1985-LausenSW #concurrent #policy
Pre-Analysis Locking: A Safe and Deadlock Free Locking Policy (GL, ESS, PW), pp. 270–281.
ICALPICALP-1985-KurtzM #algorithm #analysis #distributed #probability #set
A Probabilistic Distributed Algorithm for Set Intersection and Its Analysis (Preliminary Version) (TGK, UM), pp. 356–362.
FPCAFPCA-1985-ClackJ85 #analysis #approach #strict
Strictness Analysis — A Practical Approach (CDC, SLPJ), pp. 35–49.
FPCAFPCA-1985-PatelSE85 #algorithm #analysis #hardware #multi #named #specification #synthesis
vFP: An Environment for the Multi-level Specification, Analysis, and Synthesis of Hardware Algorithms (DP, MDFS, MDE), pp. 238–255.
ICSEICSE-1985-GirgisW #analysis #data flow #testing #using
An Integrated System for Program Testing Using Weak Mutation and Data Flow Analysis (MRG, MRW), pp. 313–319.
ICSEICSE-1985-StephensW #analysis #design
The Analyst — A Workstation for Analysis and Design (MS, KW), pp. 364–371.
SOSPSOSP-1985-OusterhoutCHKKT #analysis #file system
A Trace-Driven Analysis of the UNIX 4.2 BSD File System (JKO, HDC, DH, JAK, MDK, JGT), pp. 15–24.
ICLPSLP-1985-ChangD85 #analysis #backtracking #dependence #prolog
Semi-Intelligent Backtracking of Prolog Based on Static Data Dependency Analysis (JHC, AMD), pp. 10–21.
DACDAC-1984-GeusRRW #analysis #named
IDA: Interconnect delay analysis for integrated circuits (AJdG, JBR, MR, GW), pp. 536–541.
DACDAC-1984-JhonK #analysis #concurrent #data flow #design
Deadlock analysis in the design of data-flow circuits (CSJ, RMK), pp. 705–707.
VLDBVLDB-1984-BennR #analysis #image #relational #retrieval #sequence
Retrieval of Relational Structures for Image Sequence Analysis (WB, BR), pp. 533–536.
VLDBVLDB-1984-JooPM #data analysis #database #design #logic #named
Datadict — A Data Analysis and Logical Database Design Tool (TTJ, TKP, GAM), pp. 71–77.
PLDISCC-1984-Koskimies #analysis #semantics #specification
A specification language for one-pass semantic analysis (KK), pp. 179–189.
PLDISCC-1984-Zadeck #analysis #data flow #editing #incremental
Incremental data flow analysis in a structured program editor (FKZ), pp. 132–143.
STOCSTOC-1984-KarpLM #analysis #multi #probability #problem
A Probabilistic Analysis of Multidimensional Bin Packing Problems (RMK, ML, AMS), pp. 289–298.
ICALPICALP-1984-KirschenhoferP #algorithm #analysis #recursion #traversal
Recursion Depth Analysis for Special Tree Traversal Algorithms (PK, HP), pp. 303–311.
ICALPICALP-1984-Lagarias #analysis #performance
Performance Analysis of Shamir’s Attack on the Basic Merkle-Hellman Knapsack Cryptosystem (JCL), pp. 312–323.
SIGIRSIGIR-1984-NiedermairTB #analysis #named #retrieval
MARS: A Retrieval Tool on the Basis of Morphological Analysis (GTN, GT, IB), pp. 369–381.
SIGIRSIGIR-1984-Tolle #analysis #evaluation #information management #monitoring #transaction
Monitoring and Evaluation of Information Systems Via Transaction Log Analysis (JT), pp. 247–258.
ICSEICSE-1984-ToriiMSK #analysis #functional #logic #problem #programming
Functional Programming and Logical Programming for the Telegram Analysis Problem (KT, YM, YS, TK), pp. 463–472.
CADECADE-1984-Plaisted #analysis #dependence #graph #proving #theorem proving #using
Using Examples, Case Analysis, and Dependency Graphs in Theorem Proving (DAP), pp. 356–374.
DACDAC-1983-Jouppi #analysis
Timing analysis for nMOS VLSI (NPJ), pp. 411–418.
DACDAC-1983-SzymanskiW #algorithm #analysis #performance
Space efficient algorithms for VLSI artwork analysis (TGS, CJVW), pp. 734–739.
DACDAC-1983-TamuraON #analysis #layout
Path delay analysis for hierarchical building block layout system (ET, KO, TN), pp. 403–410.
VLDBVLDB-1983-Demo #database #interface #navigation #program analysis #specification
Program Analysis for Conversion from a Navigation to a Specification Database Interface (GBD), pp. 387–398.
STOCSTOC-1983-Turner #algorithm #analysis #probability
Probabilistic Analysis of Bandwidth Minimization Algorithms (JST), pp. 467–476.
SIGIRSIGIR-1983-BrooksB #analysis #design #information retrieval #interactive #using
Using Discourse Analysis for The Design of Information Retrieval Interaction Mechanisms (HMB, NJB), pp. 31–47.
SIGIRSIGIR-1983-Somers #analysis #file system #recommendation #user interface
The User View of File Management: Recommendations for a User Interface Based in an Analysis of UNIX File System Use (PS), p. 161.
SIGIRSIGIR-1983-Tolle #analysis #online #transaction
Transactional Log Analysis: Online Catalogs (JT), pp. 147–160.
POPLPOPL-1983-Ryder #analysis #data flow #incremental
Incremental Data Flow Analysis (BGR), pp. 167–176.
DACDAC-1982-Agrawal #analysis
Synchronous path analysis in MOS circuit simulator (VDA), pp. 629–635.
DACDAC-1982-BeningLAS #analysis #logic #network
Developments in logic network path delay analysis (LB, TAL, CRA, JES), pp. 605–615.
DACDAC-1982-GoelM82a #analysis #interactive #testing
An interactive testability analysis program — ITTAP (DKG, RMM), pp. 581–586.
DACDAC-1982-Sr #analysis #verification
Timing Verification and the Timing Analysis program (RBHS), pp. 594–604.
SIGMODSIGMOD-1982-BatesBD #analysis #database #framework #research #statistics
A Framework for Research in Database Management for Statistical Analysis (DMB, HB, DJD), pp. 69–78.
SIGMODSIGMOD-1982-Cooper #analysis #commit #distributed #protocol
Analysis of Distributed Commit Protocols (ECC), pp. 175–183.
SIGMODSIGMOD-1982-Finkelstein #analysis #database
Common Subexpression Analysis in Database Applications (SJF), pp. 235–245.
POPLPOPL-1982-JonesM #analysis #approach #data flow #data type #flexibility #interprocedural #recursion #source code
A Flexible Approach to Interprocedural Data Flow Analysis and Programs with Recursive Data Structures (NDJ, SSM), pp. 66–74.
POPLPOPL-1982-Reps #analysis #editing #incremental #semantics
Optimal-Time Incremental Semantic Analysis for Syntax-Directed Editors (TWR), pp. 169–176.
ICSEICSE-1982-Forman #analysis #composition #data flow
Global Data Flow Analysis by Decomposition into Primes (IRF), pp. 386–392.
ICSEICSE-1982-RappsW #analysis #data flow #testing
Data Flow Analysis Techniques for Test Data Selection (SR, EJW), pp. 272–278.
ASPLOSASPLOS-1982-McDaniel #analysis #set #using
An Analysis of a Mesa Instruction Set Using Dynamic Instruction Frequencies (GM), pp. 167–176.
ASPLOSASPLOS-1982-SweetS #analysis #empirical #set
Empirical Analysis of the Mesa Instruction Set (RES, JGSJ), pp. 158–166.
DACDAC-1981-DewhirstH #analysis #design #modelling
Application of volumetric modeling to mechanical design and analysis (DLD, RCH), pp. 171–178.
DACDAC-1981-HaferP #analysis #design #formal method #logic #specification
A formal method for the specification, analysis, and design of register-transfer level digital logic (LJH, ACP), pp. 846–853.
DACDAC-1981-McDermott #analysis #fault #random
Random fault analysis (RMM), pp. 360–364.
DACDAC-1981-Ruehli #analysis #bibliography #logic #modelling #scalability #simulation
Survey of analysis, simulation and modeling for large scale logic circuits (AER), pp. 124–129.
VLDBVLDB-1981-MenonH #analysis #design #relational
Design and Analysis of a Relational Join Operation for VLSI (JM, DKH), pp. 44–55.
VLDBVLDB-1981-MontgomeryR #analysis #data-driven #information management
The Active Information System: A Data-Driven System for the Analysis of Imprecise Data (CAM, EHR), pp. 376–384.
STOCSTOC-1981-GonnetM #analysis #linear
A Linear Probing Sort and its Analysis (Preliminary Draft) (GHG, JIM), pp. 90–95.
ICALPICALP-1981-Jones #analysis
Flow Analysis of λ Expressions (Preliminary Version) (NDJ), pp. 114–128.
ICALPICALP-1981-Schnorr #algorithm #analysis
Refined Analysis and Improvements on Some Factoring Algorithms (CPS), pp. 1–15.
ICALPICALP-1981-Sharir #analysis #data flow #source code
Data Flow Analysis of Applicative Programs (MS), pp. 98–113.
SIGIRSIGIR-1981-Carroll #analysis
Content Analysis as a Word-Processing Option (JMC), pp. 126–131.
ICSEICSE-1981-BasiliW #analysis #documentation #evaluation #requirements
Evaluation of a Software Requirements Document by Analysis of Change Data (VRB, DMW), pp. 314–324.
ICSEICSE-1981-ChenZ #analysis #clustering #re-engineering
Use of Cluster Analysis to Evaluate Software Engineering Methodologies (EC, MVZ), pp. 117–124.
ICSEICSE-1981-FutamuraKHT #analysis #development #diagrams #problem #source code
Development of Computer Programs by Problem Analysis Diagram (PAD) (YF, TK, HH, MT), pp. 325–332.
ICSEICSE-1981-KomodaHKS #analysis #approach #modelling #requirements #using
An Innovative Approach to System Requirements Analysis by Using Structural Modeling Method (NK, KH, HK, HS), pp. 305–313.
ICSEICSE-1981-RichardsonC #analysis #reliability
A Partition Analysis Method to Increase Program Reliability (DJR, LAC), pp. 244–253.
ICSEICSE-1981-ZeilW #analysis #testing
Sufficient Tset Sets for Path Analysis Testing Strategies (SJZ, LJW), pp. 184–194.
DACDAC-1980-AbramoviciB #analysis #fault
Fault diagnosis based on effect-cause analysis: An introduction (MA, MAB), pp. 69–76.
DACDAC-1980-AltmanP #analysis #design
The SLIDE simulator: A facility for the design and analysis of computer interconnections (AHA, ACP), pp. 148–155.
DACDAC-1980-Goel #analysis #generative #testing
Test generation costs analysis and projections (PG), pp. 77–84.
DACDAC-1980-GoldsteinT #analysis #named
SCOAP: Sandia controllability/observability analysis program (LHG, ELT), pp. 190–196.
DACDAC-1980-LeinwandL #algebra #analysis #behaviour #nondeterminism
Algebraic analysis of nondeterministic behavior (SML, TL), pp. 483–493.
DACDAC-1980-MitsuhashiCTY #analysis
An integrated mask artwork analysis system (TM, TC, MT, KY), pp. 277–284.
DACDAC-1980-Powell #analysis
Justification and financial analysis for CAD (REP), pp. 564–571.
DACDAC-1980-Yates #analysis #design #metric #process
Design process analysis: A measurement and analysis technique (KDY), pp. 420–421.
VLDBVLDB-1980-Badal #analysis #concurrent #database #distributed #performance
The Analysis of the Effects of Concurrency Control on Distributed Database System Performance (DZB), pp. 376–383.
VLDBVLDB-1980-EpsteinS #analysis #database #distributed
Analysis of Distributed Data Base Processing Strategies (RSE, MS), pp. 92–101.
ICALPICALP-1980-CousotC #analysis #communication #csp #process #semantics
Semantic Analysis of Communicating Sequential Processes (Shortened Version) (PC, RC), pp. 119–133.
ICALPICALP-1980-FlajoletS #algorithm #analysis #on the
On the Analysis of Tree-Matching Algorithms (PF, JMS), pp. 208–219.
ICALPICALP-1980-PapadimitriouB #analysis #nearest neighbour #worst-case
A Worst-Case Analysis of Nearest Neighbor Searching by Projection (CHP, JLB), pp. 470–482.
SIGIRSIGIR-1980-KracsonyKM #analysis #comparative #hardware
Comparative Analysis of Hardware Versus Software Text Search (PK, GJK, AM), pp. 268–279.
POPLPOPL-1980-Kfoury #analysis #set #source code
Analysis of Simple Programs Over Different Sets of Primitives (AJK), pp. 56–61.
POPLPOPL-1980-Suzuki #analysis #pointer
Analysis of Pointer Rotation (NS), pp. 1–11.
POPLPOPL-1980-Weihl #analysis #data flow #interprocedural #pointer
Interprocedural Data Flow Analysis in the Presence of Pointers, Procedure Variables and Label Variables (WEW), pp. 83–94.
CADECADE-1980-Bruynooghe #analysis #behaviour #dependence #logic programming #source code
Analysis of Dependencies to Improve the Behaviour of Logic Programs (MB), pp. 293–305.
DACDAC-1979-LoslebenT #analysis
Topological analysis for VLSI circuits (PL, KT), pp. 461–473.
SIGMODSIGMOD-1979-BadalP #analysis #performance #semantics #validation
Cost and Performance Analysis of Semantic Integrity Validation Methods (DZB, GJP), pp. 109–115.
SIGMODSIGMOD-1979-HawthornS #analysis #database #performance #relational
Performance Analysis of a Relational Data Base Management System (PBH, MS), pp. 1–12.
SIGMODSIGMOD-1979-YuLSO #analysis #performance #problem
Performance Analysis of three Related Assignment Problems (CTY, KL, MKS, ZMÖ), pp. 82–92.
ICALPICALP-1979-Karp #algorithm #analysis #graph #probability
Recent Advances in the Probabilistic Analysis of Graph-Theoretic Algorithms (Abstract) (RMK), pp. 338–339.
SIGIRSIGIR-1979-DominickP #analysis #automation #evaluation #information management #monitoring
Automated Monitoring to Support the Analysis and Evaluation of Information Systems (WDD, WDP), pp. 2–9.
POPLPOPL-1979-CousotC #design #framework #program analysis
Systematic Design of Program Analysis Frameworks (PC, RC), pp. 269–282.
POPLPOPL-1979-JonesM #analysis #optimisation
Flow Analysis and Optimization of Lisp-Like Structures (NDJ, SSM), pp. 244–256.
POPLPOPL-1979-Reif #analysis #communication #data flow #process
Data Flow Analysis of Communicating Processes (JHR), pp. 257–268.
ICSEICSE-1979-AbeSA #analysis
An Analysis of Software Project Failure (JA, KS, HA), pp. 378–385.
ICSEICSE-1979-Cohen #source code
Computer-Aided Micro-Analysis of Programs (JC), pp. 79–84.
ICSEICSE-1979-Ploedereder #program analysis #verification
Pragmatic Techniques for Program Analysis and Verification (EP), pp. 63–72.
SOSPSOSP-1979-KumarG #analysis #distributed #modelling
Modelling and Analysis of Distributed Software Systems (BK, TAG), pp. 2–8.
DACDAC-1978-Gianfagna #approach #data analysis #testing
A unified approach to test data analysis (MAG), pp. 117–124.
DACDAC-1978-ShahY #cost analysis #design
A practical technique for benefit-cost analysis of Computer-Aided Design and Drafting Systems (RRS, GYY).
DACDAC-1978-Weste #analysis #design
A color graphics system for I.C. mask design and analysis (NW), pp. 199–205.
DACDAC-1978-Willis #analysis #automation #design #named
DAS: An automated system to support design analysis (RRW), pp. 359–365.
DACDAC-1978-Wold #analysis #design #performance #verification
Design verification and performance analysis (MAW), pp. 264–270.
SIGMODSIGMOD-1978-NationsS #program analysis #sequence
Some DML Instruction Sequences for Application Program Analysis and Conversion (JN, SYWS), pp. 120–131.
VLDBVLDB-1978-Ashany #analysis #classification #database #matrix #retrieval #scalability
Application of Sparse Matrix Techniques to Search, Retrieval, Classification and Relationship Analysis in Large Data Base Systems — SPARCOM (RA), pp. 499–516.
VLDBVLDB-1978-Mason #analysis #architecture
A DBMS Architecture to Support Information Analysis (Abstract) (PJM), p. 332.
VLDBVLDB-1978-NakamuraM #analysis
An Analysis of Storage Utilization Factor in Block Split Data Structuring Scheme (TN, TM), pp. 489–495.
STOCSTOC-1978-Baudet #algorithm #analysis
An Analysis of the Full αβ Pruning Algorithm (GMB), pp. 296–313.
ICGTGG-1978-RosendahlM #analysis #reduction #source code
Analysis of Programs by Reduction of Their Structure (MR, KPM), pp. 409–417.
ICGTGG-1978-Wileden #analysis #concurrent #design #graph grammar
Relationships Between Graph Grammars and the Design and Analysis of Concurrent Software (JCW), pp. 456–463.
SIGIRSIGIR-1978-Hill #analysis #database
Analysis of An Inverted Data Base Structure (EHJ), pp. 37–64.
POPLPOPL-1978-Reif #analysis #linear #programming
Symbolic Programming Analysis in Almost Linear Time (JHR), pp. 76–83.
POPLPOPL-1978-Rosen #agile #analysis #data flow #monad
Monoids for Rapid Data Flow Analysis (BKR), pp. 47–59.
ICSEICSE-1978-BrowneJ #generative #named #performance #program analysis
FAST: A Second Generation Program Analysis System (JCB, DBJ), pp. 142–148.
ICSEICSE-1978-HerndonK #analysis #fault #validation
Analysis of Error Remediation Expenditures During Validation (MAH, APK), pp. 202–206.
ICSEICSE-1978-McClure #analysis #complexity
A Model for Program Complexity Analysis (CLM), pp. 149–157.
ICSEICSE-1978-Willis #analysis #automation #design #named
DAS: An Automated System to Support Design Analysis (RRW), pp. 109–115.
DACDAC-1977-Baird #algorithm #analysis #performance
Fast algorithms for LSI artwork analysis (HSB), pp. 303–311.
DACDAC-1977-Domaszewicz #analysis
Flight test analysis of missile control systems (MD), pp. 101–108.
SIGMODSIGMOD-1977-Merrett #approach #cost analysis #database #top-down
Database Cost Analysis: a Top-Down Approach (THM), pp. 135–143.
SIGMODSIGMOD-1977-SuL #database #program analysis #semantics
A Methodology of Application Program Analysis and Conversion Based on Database Semantics (SYWS, BJL), pp. 75–87.
VLDBVLDB-1977-HultenS #analysis #database #performance #scalability #simulation
A Simulation Model for Performance Analysis of Large Shared Data Bases (CH, LS), pp. 524–532.
VLDBVLDB-1977-Navathe #analysis #database
Schema Analysis for Database Restructuring (SBN), p. 326.
STOCSTOC-1977-GonnetM #analysis
The Analysis of an Improved Hashing Technique (GHG, JIM), pp. 113–121.
POPLPOPL-1977-Barth #algorithm #analysis #data flow #interprocedural
An Interprocedural Data Flow Analysis Algorithm (JMB), pp. 119–131.
POPLPOPL-1977-CousotC #abstract interpretation #approximate #fixpoint #source code #static analysis
Abstract Interpretation: A Unified Lattice Model for Static Analysis of Programs by Construction or Approximation of Fixpoints (PC, RC), pp. 238–252.
POPLPOPL-1977-KennedyZ #analysis #control flow #graph grammar
Applications of Graph Grammar for Program Control Flow Analysis (KK, LZ), pp. 72–85.
SOSPSOSP-1977-Potier #analysis #policy #set
Analysis of Demand Paging Policies with Swapped Working Sets (DP), pp. 125–131.
SOSPSOSP-1977-Snyder #analysis #on the #synthesis
On the Synthesis and Analysis of Protection Systems (LS), pp. 141–150.
DACDAC-1976-BuntineP #analysis #design
Design rule checking and analysis of IC mask designs (WLB, BP), pp. 301–308.
DACDAC-1976-Case #analysis #fault #logic
Analysis of actual fault mechanisms in CMOS logic gates (GRC), pp. 265–270.
DACDAC-1976-Ho #analysis #preprocessor #source code
A preprocessor for structural analysis programs (PKH), pp. 17–24.
DACDAC-1976-PreasBG #analysis #automation
Automatic circuit analysis based on mask information (BP, WLB, CWG), pp. 309–317.
STOCSTOC-1976-GuibasS #analysis
The Analysis of Double Hashing (Extended Abstract) (LJG, ES), pp. 187–191.
POPLPOPL-1976-Franck #2d #analysis #graph grammar #named #precedence
PLAN2D — Syntactic Analysis of Precedence Graph Grammars (RF), pp. 134–139.
ICSEICSE-1976-EhrenbergerRO #program analysis #verification
Program Analysis — A Method for the Verification of Software for the Control of a Nuclear Reactor (WDE, GR, KO), pp. 611–616.
ICSEICSE-1976-GoudaM #analysis #design #modelling #on the #protocol
On the Modelling, Analysis and Design of Protocols — A Special Class of Software Structures (MGG, EGM), pp. 256–262.
ICSEICSE-1976-PimontR #analysis #assessment #behaviour #reliability #source code
A Software Reliability Assessment Based on a Structural and Behavioral Analysis of Programs (SP, JCR), pp. 486–491.
ICSEICSE-1976-RossS #analysis #requirements
Structured Analysis for Requirements Definition (Abstract) (DTR, KESJ), p. 1.
ICSEICSE-1976-Stephenson #analysis #development
An Analysis of the Resources Used in the SAFEGUARD System Software Development (WES), pp. 312–321.
ICSEICSE-1976-TeichroewH #analysis #documentation #information management #named
PSL/PSA: A Computer-Aided Technique for Structured Documentation and Analysis of Information Processing Systems (Abstract) (DT, EAHI), p. 2.
ICSEICSE-1976-WensleyGLS #analysis #design #fault tolerance #verification
The Design, Analysis, and Verification of the SIFT Fault-Tolerant System (JHW, MWG, KNL, RES), pp. 458–469.
ICSEICSE-1976-Zelkowitz #automation #evaluation #program analysis
Automatic Program Analysis and Evaluation (MVZ), pp. 158–163.
SOSPSOSP-J-1975-ChuO76 #algorithm #analysis #markov
Analysis of the PFF Replacement Algorithm via a Semi-Markov Model (WWC, HO), pp. 298–304.
DACDAC-1975-Foster #analysis #source code
Prerouting analysis programs (JCF), pp. 306–310.
VLDBVLDB-1975-Chin #analysis #behaviour
Analysis of VSAM’s Free-Space Behavior (YHC), pp. 514–515.
VLDBVLDB-1975-HofferS #analysis #clustering #database #design #physics
The Use of Cluster Analysis in Physical Data Base Design (JAH, DGS), pp. 69–86.
VLDBVLDB-1975-Miyamoto #analysis #database #modelling #performance
Hierarchical Performance Analysis Models for Data Base Systems (IM), pp. 322–352.
STOCSTOC-1975-Pratt #analysis #modelling #optimisation
Four Models for the Analysis of Optimization of Program Control Structures (TWP), pp. 167–176.
POPLPOPL-1975-GrahamW #algorithm #analysis #linear #performance
A Fast and Usually Linear Algorithm for Global Flow Analysis (SLG, MNW), pp. 22–34.
POPLPOPL-1975-Kennedy #analysis #data flow
Node Listings Applied to Data Flow Analysis (KK), pp. 10–21.
SOSPSOSP-1975-LamS #algorithm #analysis #scheduling
Analysis of a Level Algorithm for Preemptive Scheduling (SL, RS), pp. 178–186.
SOSPSOSP-1975-Sadeh #algorithm #analysis #fault #performance
An Analysis of the Performance of the Page Fault Frequency (PFF) Replacement Algorithm (ES), pp. 6–13.
DACDAC-1974-Garrett #analysis #modelling
Transmission line models for transient analysis (SJG), pp. 209–219.
DACDAC-1974-MitchellG #analysis #automation #named
MAP: A user-controlled automated Mask Analysis Program (CLM, JMG), pp. 107–118.
DACDAC-1974-ThompsonSBP #analysis #fault #simulation #using
Timing analysis for digital fault simulation using assignable delays (EWT, SAS, NB, RP), pp. 266–272.
SIGMODSIGFIDET-1974-BehymerOM #analysis
Analysis of Indexed Sequential and Direct Access File Organizations (JAB, RAO, AGM), pp. 389–417.
STOCSTOC-1973-GentlemanJ #algorithm #analysis #case study
Analysis of Algorithms, a Case Study: Determinants of Polynomials (WMG, SCJ), pp. 135–141.
STOCSTOC-1973-Kosaraju #analysis #source code
Analysis of Structured Programs (SRK), pp. 240–252.
STOCSTOC-1973-Teitelbaum #algebra #analysis #evaluation #fault
Context-Free Error Analysis by Evaluation of Algebraic Power Series (RT), pp. 196–199.
SIGIRSIGIR-1973-MartinP #analysis #comparative #interactive #retrieval
Comparative Analysis of Interactive Retrieval Systems (THM, EBP), pp. 75–85.
POPLPOPL-1973-HechtU #algorithm #analysis #problem
Analysis of a Simple Algorithm for Global Flow Problems (MSH, JDU), pp. 207–217.
DACDAC-1972-ChangDE #analysis #fault #logic #self #simulation
Logic simulation and fault analysis of a self-checking switching processor (HYC, RCD, RAE), pp. 128–137.
DACDAC-1972-UlrichBW #analysis #logic #simulation
Fault-test analysis techniques based on logic simulation (EGU, TEB, LRW), pp. 111–115.
STOCSTOC-1972-GareyGU #algorithm #analysis #memory management #worst-case
Worst-Case Analysis of Memory Allocation Algorithms (MRG, RLG, JDU), pp. 143–150.
SOSPSOSP-J-1973-TeoreyP72 #analysis #comparative #policy #scheduling
A Comparative Analysis of Disk Scheduling Policies (TJT, TBP), pp. 177–184.
DACDAC-1971-HarrisonO #analysis #logic #simulation
Race analysis of digital systems without logic simulation (RAH, DJO), pp. 82–94.
DACDAC-1971-TsudaKGN #analysis #named #network #simulation
NONLISA: Nonlinear network simulation and analysis program (TT, TK, SG, TN), pp. 347–357.
DACDAC-1971-VishnubhotlaC #analysis #approach
A path analysis approach to the diagnosis of combinational circuits (SRV, YHC), pp. 222–230.
SIGMODSIGFIDET-1971-Engles #analysis #database
An Analysis of the April 1971 Data Base Task Group Report (RWE), pp. 69–91.
SOSPSOSP-1971-TeoreyP #analysis #comparative #policy #scheduling
A Comparative Analysis of Disk Scheduling Policies (Abstract) (TJT, TBP), pp. 114–121.
DACDAC-1970-Chace #dynamic analysis #named #network #prototype
DAMN — a prototype program for the Dynamic Analysis of Mechanical Networks (MAC), pp. 158–172.
DACDAC-1970-MitchellG #analysis #design #monte carlo #simulation
A simulation program for monte carlo analysis and design (EELM, DG), pp. 265–270.
DACDAC-1970-RockwellP #analysis #finite
Computer aided input/output for use with the finite element method of structural analysis (RDR, DSP), pp. 315–334.
DACDAC-1970-Sr #analysis #clustering #graph #logic #reduction
Partitioning of logic graphs: A theoretical analysis of pin reduction (RBHS), pp. 54–63.
STOCSTOC-1970-Chang #2d #analysis #using
The Analysis of Two-Dimensional Patterns using Picture Processing Grammars (SKC), pp. 206–216.
DACDAC-1969-BoehmLMR #analysis #interactive
Interactive trajectory analysis: the graphic rocket system (BWB, VRL, RLM, JER), pp. 205–232.
STOCSTOC-1969-PetersR #analysis #context-free grammar #revisited
Context-Sensitive Immediate Constituent Analysis — Context-Free Languages Revisited (PSPJ, RWR), pp. 1–8.
SOSPSOSP-1969-BryanS #analysis #performance
The UTS time-sharing system: performance analysis and instrumentation (GEB, JES), pp. 147–158.
DACDAC-1968-Anstiss #analysis #named
MDELTA — a digital program for control system analysis (BHA).
DACDAC-1968-Bernstein #analysis #graph #online
Electronic circuit analysis with on-line graphs via a time-sharing terminal (SB).
DACDAC-1968-GarrettV #analysis #worst-case
Circuit frequency response analysis program with worst-case capabilities (FRWC) (SJG, THV).
DACDAC-1968-Murray-LassoK #analysis #online #optimisation
On-line circuit analysis and optimization with commercially available time-shared computer systems (MAML, FJK).
DACDAC-1967-Branin #analysis #network
Computer methods of network analysis (FHBJ).
DACDAC-1967-CalvinCEM #analysis #design
Design and analysis of electronic circuits (ELC, LCC, JRE, RSM).
DACDAC-1967-Malakoff #analysis
Coupling graphics and circuit analysis techniques (JLM).
DACDAC-1967-Pritchard #analysis #bibliography #source code
A survey of transient circuit analysis programs (GKP).
DACDAC-1967-WilliamsMCE #analysis
A package of computer subprograms for control system analysis (GJW, RSM, LCC, JPE).
DACSHARE-1965-BitontiCFH #analysis
A computer-aided linkage analysis system (FB, DWC, DNF, HHH).
DACSHARE-1964-Branin #analysis #network #using
D-C and transient analysis of networks using a digital computer (FHBJ).
DACSHARE-1964-SimpsonA #analysis
Space frame analysis and applications to other types of structures (HS, JA).
LISPLISP-1963-Yates #analysis #compilation #lisp #source code #word
LISP. Group Analysis programs. Λ LISP Compiler for a variable word machine (Gamma 30 Scientific) (RY), p. 15.

Bibliography of Software Language Engineering in Generated Hypertext (BibSLEIGH) is created and maintained by Dr. Vadim Zaytsev.
Hosted as a part of SLEBOK on GitHub.