612 papers:
- CASE-2015-CarmenateRLBM #analysis #approach #behaviour #energy #modelling #using
- Modeling and analyzing occupant behaviors in building energy analysis using an information space approach (TC, MMR, DL, LB, AM), pp. 425–431.
- HT-2015-JangHL #process
- No Reciprocity in “Liking” Photos: Analyzing Like Activities in Instagram (JYJ, KH, DL), pp. 273–282.
- HT-2015-PeraN #recommendation
- Analyzing Book-Related Features to Recommend Books for Emergent Readers (MSP, YKN), pp. 221–230.
- FASE-2015-BornAHT #dependence #rule-based
- Analyzing Conflicts and Dependencies of Rule-Based Transformations in Henshin (KB, TA, FH, GT), pp. 165–168.
- ICPC-2015-SohTAW #android #detection #user interface
- Detecting clones in Android applications through analyzing user interfaces (CS, HBKT, YLA, LW), pp. 163–173.
- ICSME-2015-AggarwalHS #energy #evolution #named
- GreenAdvisor: A tool for analyzing the impact of software evolution on energy consumption (KA, AH, ES), pp. 311–320.
- SANER-2015-HashimotoMI #fine-grained #scalability #source code
- A comprehensive and scalable method for analyzing fine-grained source code change patterns (MH, AM, TI), pp. 351–360.
- SANER-2015-IzquierdoCRBC #git #named
- GiLA: GitHub label analyzer (JLCI, VC, BR, AB, JC), pp. 479–483.
- SANER-2015-SinghGN #data type #graph #memory management
- MG++: Memory graphs for analyzing dynamic data structures (VS, RG, IN), pp. 291–300.
- FM-2015-Hauck-Stattelmann #behaviour #industrial
- Analyzing the Restart Behavior of Industrial Control Applications (SHS, SB, BS, SK, RJ), pp. 585–588.
- DHM-EH-2015-MeryS #modelling #requirements #using
- Analyzing Requirements Using Environment Modelling (DM, NKS), pp. 345–357.
- SCSM-2015-PervinPDTT #hashtag #multi #twitter
- Hashtag Popularity on Twitter: Analyzing Co-occurrence of Multiple Hashtags (NP, TQP, AD, HT, FT), pp. 169–182.
- ICEIS-v1-2015-ZhengLL #contest
- A Game-theory based Model for Analyzing E-marketplace Competition (JZ, WL, DLL), pp. 650–657.
- ICEIS-v2-2015-FariasNOCM #case study #commit #email #mining #repository
- Analyzing Distributions of Emails and Commits from OSS Contributors through Mining Software Repositories — An Exploratory Study (MAdFF, RLN, PO, MCJ, MGM), pp. 303–310.
- ICEIS-v2-2015-MagnavitaNM #evolution #using
- Using EVOWAVE to Analyze Software Evolution (RCM, RLN, MGM), pp. 126–136.
- ICEIS-v2-2015-SarmientoALS #modelling #petri net
- Mapping Textual Scenarios to Analyzable Petri-Net Models (ES, EA, JCSdPL, GS), pp. 494–501.
- ICEIS-v3-2015-BhatRM #architecture #enterprise #evolution #metric #tool support
- Tool Support for Analyzing the Evolution of Enterprise Architecture Metrics (MB, TR, FM), pp. 154–161.
- KDD-2015-DhurandharGRME #big data #risk management
- Big Data System for Analyzing Risky Procurement Entities (AD, BG, RKR, GM, ME), pp. 1741–1750.
- KDD-2015-MomtazpourZRSR #cyber-physical #invariant #using
- Analyzing Invariants in Cyber-Physical Systems using Latent Factor Regression (MM, JZ, SR, RKS, NR), pp. 2009–2018.
- SEKE-2015-DingZ #modelling #petri net #using
- Modeling and Analyzing Publish Subscribe Architcture using Petri Nets (JD, DZ), pp. 589–594.
- SEKE-2015-ElerDE #exception #execution #generative #symbolic computation #testing
- Analyzing Exceptions in the Context of Test Data Generation Based on Symbolic Execution (MME, VHSD, ATE), pp. 346–351.
- SEKE-2015-FanYC #adaptation #composition #energy #modelling
- Modeling and Analyzing Adaptive Energy Consumption for Service Composition (GF, HY, LC), pp. 585–588.
- SEKE-2015-LiuH #petri net #pipes and filters #verification
- PIPE+Verifier — A Tool for Analyzing High Level Petri Nets (SL, XH), pp. 575–580.
- SIGIR-2015-LiDDCZB #behaviour #markov #process #query
- Analyzing User’s Sequential Behavior in Query Auto-Completion via Markov Processes (LL, HD, AD, YC, HZ, RABY), pp. 123–132.
- POPL-2015-GiacobazziLR #analysis #metaprogramming
- Analyzing Program Analyses (RG, FL, FR), pp. 261–273.
- POPL-2015-JourdanLBLP #c
- A Formally-Verified C Static Analyzer (JHJ, VL, SB, XL, DP), pp. 247–259.
- REFSQ-2015-LiHM #requirements #security #specification
- Analyzing and Enforcing Security Mechanisms on Requirements Specifications (TL, JH, JM), pp. 115–131.
- SAC-2015-CruzPQSSOBO #algorithm #game studies #named #probability #using
- Amê: an environment to learn and analyze adversarial search algorithms using stochastic card games (ABC, LP, JQ, US, SS, AO, EB, ESO), pp. 208–213.
- SAC-2015-JuniorSPM #developer
- Developers assignment for analyzing pull requests (MLdLJ, DMS, AP, LM), pp. 1567–1572.
- ESEC-FSE-2015-BarikJM #research #social
- I heart hacker news: expanding qualitative research findings by analyzing social news websites (TB, BJ, ERMH), pp. 882–885.
- ICSE-v2-2015-MenziesMP #data analysis
- The Art and Science of Analyzing Software Data; Quantitative Methods (TM, LLM, FP), pp. 959–960.
- ICLP-2015-Nys #deduction #roadmap
- Advances in Analyzing Coroutines by Abstract Conjunctive Partial Deduction (VN).
- VMCAI-2015-Christakis0W #evaluation
- An Experimental Evaluation of Deliberate Unsoundness in a Static Program Analyzer (MC, PM, VW), pp. 336–354.
- ASE-2014-ArifulinaWBP #composition #modelling #named
- SeSAME: modeling and analyzing high-quality service compositions (SA, SW, MB, MCP), pp. 839–842.
- ASE-2014-HigoK #consistency #named #nondeterminism #source code
- MPAnalyzer: a tool for finding unintended inconsistencies in program source code (YH, SK), pp. 843–846.
- ASE-2014-ZuddasJPMO #comprehension #debugging #named
- MIMIC: locating and understanding bugs by analyzing mimicked executions (DZ, WJ, FP, LM, AO), pp. 815–826.
- DATE-2014-GhalatyAS #analysis #fault
- Analyzing and eliminating the causes of fault sensitivity analysis (NFG, AA, PS), pp. 1–6.
- HT-2014-AbbasiZTL #network #social
- Am i more similar to my followers or followees?: analyzing homophily effect in directed social networks (MAA, RZ, JT, HL), pp. 200–205.
- HT-2014-SquicciariniCB #image #privacy #web
- Analyzing images’ privacy for the modern web (ACS, CC, RB), pp. 136–147.
- SIGMOD-2014-SimitsisWBW #named #query
- VQA: vertica query analyzer (AS, KW, JB, JW), pp. 701–704.
- TACAS-2014-AlbertAFGGMPR #concurrent #named
- SACO: Static Analyzer for Concurrent Objects (EA, PA, AFM, SG, MGZ, EMM, GP, GRD), pp. 562–567.
- TACAS-2014-DudkaPV #contest #graph #memory management #named
- Predator: A Shape Analyzer Based on Symbolic Memory Graphs — (Competition Contribution) (KD, PP, TV), pp. 412–414.
- TACAS-2014-EssenG #generative
- Analyzing the Next Generation Airborne Collision Avoidance System (CvE, DG), pp. 620–635.
- TACAS-2014-MullerV #contest #named
- CPAlien: Shape Analyzer for CPAChecker — (Competition Contribution) (PM, TV), pp. 395–397.
- CSMR-WCRE-2014-HillSK #php #rascal
- PHP AiR: Analyzing PHP systems with Rascal (MH, PK), pp. 454–457.
- CSMR-WCRE-2014-KlammerP #legacy #tool support #towards
- Towards tool support for analyzing legacy systems in technical domains (CK, JP), pp. 371–374.
- CSMR-WCRE-2014-MeuriceC #database #evolution #named #visual notation
- DAHLIA: A visual analyzer of database schema evolution (LM, AC), pp. 464–468.
- ICPC-2014-ThungLOC #classification #design #diagrams #metric #network #using
- Condensing class diagrams by analyzing design and network metrics using optimistic classification (FT, DL, MHO, MRVC), pp. 110–121.
- ICSME-2014-BiazziniMB #commit #distributed #on the #version control
- On Analyzing the Topology of Commit Histories in Decentralized Version Control Systems (MB, MM, BB), pp. 261–270.
- ICSME-2014-ThongtanunamYYKCFI #bibliography #code review #dataset #named #visualisation
- ReDA: A Web-Based Visualization Tool for Analyzing Modern Code Review Dataset (PT, XY, NY, RGK, AECC, KF, HI), pp. 605–608.
- ICSME-2014-ZouH #modelling #topic
- LDA Analyzer: A Tool for Exploring Topic Models (CZ, DH), pp. 593–596.
- SCAM-2014-CaraccioloCSL #corpus #multi #named
- Pangea: A Workbench for Statically Analyzing Multi-language Software Corpora (AC, AC, BS, ML), pp. 71–76.
- SAS-2014-ChenHTWW #recursion #source code #using #verification
- Verifying Recursive Programs Using Intraprocedural Analyzers (YFC, CH, MHT, BYW, FW), pp. 118–133.
- SAS-2014-LeeOY
- A Progress Bar for Static Analyzers (WL, HO, KY), pp. 184–200.
- STOC-2014-DworkTT0 #analysis #bound #component #privacy
- Analyze gauss: optimal bounds for privacy-preserving principal component analysis (CD, KT, AT, LZ), pp. 11–20.
- AFL-2014-BerglundDM #backtracking #behaviour #regular expression
- Analyzing Catastrophic Backtracking Behavior in Practical Regular Expression Matching (MB, FD, BvdM), pp. 109–123.
- FM-2014-SanatiMM #decidability #guidelines #logic #metric #using
- Analyzing Clinical Practice Guidelines Using a Decidable Metric Interval-Based Temporal Logic (MYS, WM, TSEM), pp. 611–626.
- CHI-2014-RoudautRHS #assembly #design #named
- Changibles: analyzing and designing shape changing constructive assembly (AR, RR, TH, SS), pp. 2593–2596.
- DHM-2014-Kull #using
- Using the Critical Path Method in Analyzing the Interdependencies of Critical Services — Feasibility Study (AK), pp. 620–629.
- DUXU-TMT-2014-FaroughiM #design #idea #on the
- On the Idea of Design: Analyzing the Ideal Form of Cars (AF, SM), pp. 64–73.
- DUXU-TMT-2014-InoueSNTMHKWK #physics #process
- Attempts to Quantitative Analyze for the Change of Human Brain Activity with Physical and Psychological Load (HI, SS, HN, TT, FM, NH, SK, EW, SK), pp. 240–249.
- HCI-TMT-2014-FangZ #approach #online
- A Revised Lexical Approach for Analyzing Online Reviews (XF, FZ), pp. 69–76.
- HIMI-DE-2014-BoscarioliVTR #clustering #human-computer #tool support
- Analyzing HCI Issues in Data Clustering Tools (CB, JV, MFT, VHR), pp. 22–33.
- HIMI-DE-2014-SuzukiSI #interactive #multi
- Analyzing Structure of Multiparty Interaction: Group Size Effect in Story-Retelling Task (NS, MS, NI), pp. 261–270.
- LCT-NLE-2014-RotheSG #video
- Analyzing Interactivity in Asynchronous Video Discussions (HR, JS, MG), pp. 226–237.
- SCSM-2014-Fu #microblog #network #social
- Can Network Help Chinese Microblogs Diffuse? Analyzing 118 Networks of Reposts About Social Issues in China (KwF), pp. 331–341.
- CAiSE-2014-Reinhartz-BergerIW #ontology #product line #semantics #using #variability
- Analyzing Variability of Software Product Lines Using Semantic and Ontological Considerations (IRB, NI, YW), pp. 150–164.
- ICEIS-v1-2014-MezghaniPZAS #detection #social
- Analyzing Tagged Resources for Social Interests Detection (MM, AP, CAZ, IA, FS), pp. 340–345.
- CIKM-2014-ZhangLLW #graph #multi #named
- PatentDom: Analyzing Patent Relationships on Multi-View Patent Graphs (LZ, LL, TL, DW), pp. 1369–1378.
- ECIR-2014-KapteinBL #case study #twitter
- Analyzing Discussions on Twitter: Case Study on HPV Vaccinations (RK, EB, DL), pp. 474–480.
- ECIR-2014-KasterenUSN #twitter
- Analyzing Tweets to Aid Situational Awareness (TvK, BU, VS, MEN), pp. 700–705.
- KDD-2014-BiKWC #resource management #topic
- Who are experts specializing in landscape photography?: analyzing topic-specific authority on content sharing services (BB, BK, CW, JC), pp. 1506–1515.
- KDD-2014-SunSTLKTY #behaviour #collaboration #network
- Analyzing expert behaviors in collaborative networks (HS, MS, ST, YL, LMK, ST, XY), pp. 1486–1495.
- KR-2014-StrassW #approximate #complexity #fixpoint #framework
- Analyzing the Computational Complexity of Abstract Dialectical Frameworks via Approximation Fixpoint Theory (HS, JPW).
- RecSys-2014-KrishnanPFG #bias #learning #recommendation #social
- A methodology for learning, analyzing, and mitigating social influence bias in recommender systems (SK, JP, MJF, KG), pp. 137–144.
- SEKE-2014-SantosBSC #game studies #learning #programming #semantics #source code
- A Semantic Analyzer for Simple Games Source Codes to Programming Learning (ECOdS, GBB, VHVdS, EC), pp. 522–527.
- SIGIR-2014-AlamD #web
- Analyzing the content emphasis of web search engines (MAA, DD), pp. 1083–1086.
- SIGIR-2014-YeniterziC #bias #testing
- Analyzing bias in CQA-based expert finding test sets (RY, JC), pp. 967–970.
- SIGIR-2014-ZhangLLZ #evolution #graph #multi #named
- PatentLine: analyzing technology evolution on multi-view patent graphs (LZ, LL, TL, QZ), pp. 1095–1098.
- OOPSLA-2014-PradelSNS #generative #latency #named #testing #user interface
- EventBreak: analyzing the responsiveness of user interfaces through performance-guided test generation (MP, PS, GCN, KS), pp. 33–47.
- LOPSTR-2014-CornishGNSSS #array #program transformation #source code
- Analyzing Array Manipulating Programs by Program Transformation (JRMC, GG, JAN, PS, HS, PJS), pp. 3–20.
- REFSQ-2014-Condori-FernandezESDG #collaboration #interactive #performance #requirements #validation
- Analyzing the Effect of the Collaborative Interactions on Performance of Requirements Validation (NCF, SE, KS, MD, AG), pp. 216–231.
- SAC-2014-BaeLKWP #network #privacy #social
- Analyzing network privacy preserving methods: a perspective of social network characteristics (DHB, JML, SWK, YW, YP), pp. 331–332.
- SAC-2014-JeongLCHP #android #approach #behaviour #kernel #monitoring
- A kernel-based monitoring approach for analyzing malicious behavior on Android (YJ, HtL, SC, SH, MP), pp. 1737–1738.
- ICSE-2014-BegelZ #exclamation #re-engineering
- Analyze this! 145 questions for data scientists in software engineering (AB, TZ), pp. 12–13.
- PPoPP-2014-LiuM #architecture #parallel #performance #source code #thread
- A tool to analyze the performance of multithreaded programs on NUMA architectures (XL, JMMC), pp. 259–272.
- CAV-2014-PaolettiYHWK #logic
- Analyzing and Synthesizing Genomic Logic Functions (NP, BY, YH, CMW, HK), pp. 343–357.
- LICS-CSL-2014-FredriksonJ #approach #privacy #satisfiability
- Satisfiability modulo counting: a new approach for analyzing privacy properties (MF, SJ), p. 10.
- VMCAI-2014-Fu #abstract domain #analysis #java #points-to #scalability
- Modularly Combining Numeric Abstract Domains with Points-to Analysis, and a Scalable Static Numeric Analyzer for Java (ZF), pp. 282–301.
- CASE-2013-KernschmidtV #approach #modelling
- An interdisciplinary SysML based modeling approach for analyzing change influences in production plants to support the engineering (KK, BVH), pp. 1113–1118.
- DocEng-2013-WuDLMG #documentation #online
- Searching online book documents and analyzing book citations (ZW, SD, ZL, PM, CLG), pp. 81–90.
- ICDAR-2013-GotoIFU #graph #scalability #set #using
- Analyzing the Distribution of a Large-Scale Character Pattern Set Using Relative Neighborhood Graph (MG, RI, YF, SU), pp. 3–7.
- SIGMOD-2013-ChengBK #named #twitter
- Peckalytics: analyzing experts and interests on Twitter (AC, NB, NK), pp. 973–976.
- SIGMOD-2013-GoasdoueKKLMZ #web
- Fact checking and analyzing the web (FG, KK, YK, JL, IM, SZ), pp. 997–1000.
- CSEET-2013-MacKellar #coordination #re-engineering #student
- Analyzing coordination among students in a software engineering project course (BM), pp. 279–283.
- CSMR-2013-BergerSK #architecture #security
- Extracting and Analyzing the Implemented Security Architecture of Business Applications (BJB, KS, RK), pp. 285–294.
- CSMR-2013-BorgPR #network
- Analyzing Networks of Issue Reports (MB, DP, PR), pp. 79–88.
- CSMR-2013-BusingeSB #api #developer #eclipse
- Analyzing the Eclipse API Usage: Putting the Developer in the Loop (JB, AS, MvdB), pp. 37–46.
- CSMR-2013-ForsterKKB #component #dependence
- Recovering Component Dependencies Hidden by Frameworks-Experiences from Analyzing OSGi and Qt (TF, TK, JK, MCB), pp. 295–304.
- MSR-2013-AllamanisS #stack overflow #topic #what #why
- Why, when, and what: analyzing stack overflow questions by topic, type, and code (MA, CAS), pp. 53–56.
- MSR-2013-IacobH #feature model #mobile #online
- Retrieving and analyzing mobile apps feature requests from online reviews (CI, RH), pp. 41–44.
- SCAM-2013-MattsenCS #bound
- Driving a sound static software analyzer with branch-and-bound (SM, PC, SS), pp. 63–68.
- WCRE-2013-AeschlimannLNW #case study #ecosystem #experience #legacy #pl-i
- Analyzing PL/1 legacy ecosystems: An experience report (EA, ML, ON, CFW), pp. 441–448.
- PLDI-2013-BoddenTRBBM #named #product line
- SPLLIFT: statically analyzing software product lines in minutes instead of years (EB, TT, MR, CB, PB, MM), pp. 355–364.
- LATA-2013-Etessami #algorithm #infinity #probability #recursion #verification
- Algorithms for Analyzing and Verifying Infinite-State Recursive Probabilistic Systems (KE), p. 12.
- CHI-2013-AndersenGP #education #framework
- A trace-based framework for analyzing and synthesizing educational progressions (EA, SG, ZP), pp. 773–782.
- CHI-2013-AnthonyKF #people
- Analyzing user-generated youtube videos to understand touchscreen use by people with motor impairments (LA, YK, LF), pp. 1223–1232.
- CHI-2013-LeeKYSG #mobile
- Analyzing crowd workers in mobile pay-for-answer q&a (UL, JK, EY, JS, MG), pp. 533–542.
- CHI-2013-SchildBLM #3d #game studies #user interface #visual notation
- Creating and analyzing stereoscopic 3D graphical user interfaces in digital games (JS, LB, JJLJ, MM), pp. 169–178.
- CHI-2013-TuchTH #experience #interactive
- Analyzing users’ narratives to understand experience with interactive products (ANT, RT, KH), pp. 2079–2088.
- CSCW-2013-IntroneD
- Analyzing the flow of knowledge in computer mediated teams (JI, MD), pp. 341–356.
- CSCW-2013-NicholsZYKS #quality #social #social media
- Analyzing the quality of information solicited from targeted strangers on social media (JN, MXZ, HY, JHK, XS), pp. 967–976.
- DUXU-PMT-2013-KimKK #experience #usability #user interface
- System for Evaluating Usability and User Experience by Analyzing Repeated Patterns (YBK, SJK, CHK), pp. 322–329.
- HCI-AMTE-2013-ColetiMN #automation #evaluation #recognition #speech #usability
- Analyzing Face and Speech Recognition to Create Automatic Information for Usability Evaluation (TAC, MM, FdLdSN), pp. 184–192.
- HCI-AMTE-2013-HoroldMK
- Analyzing Varying Environmental Contexts in Public Transport (SH, CM, HK), pp. 85–94.
- HIMI-LCCB-2013-HayashiON #collaboration #interactive #learning
- An Experimental Environment for Analyzing Collaborative Learning Interaction (YH, YO, YIN), pp. 43–52.
- OCSC-2013-LeeKS #case study #experience #social
- Assessing the Possibility of a Social e-Book by Analyzing Reader Experiences (SL, JIK, CS), pp. 50–57.
- VISSOFT-2013-WallerWFDH #3d #concurrent #monitoring #named #visualisation
- Synchrovis: 3D visualization of monitoring traces in the city metaphor for analyzing concurrency (JW, CW, FF, PD, WH), pp. 1–4.
- CAiSE-2013-Eid-SabbaghW #architecture #process
- Analyzing Business Process Architectures (RHES, MW), pp. 208–223.
- CAiSE-2013-FahlandG #design #enterprise #integration #middleware #petri net #using
- Analyzing and Completing Middleware Designs for Enterprise Integration Using Coloured Petri Nets (DF, CG), pp. 400–416.
- ICEIS-J-2013-BevacquaCFGP13a #data-driven #framework #monitoring #predict #process
- A Data-Driven Prediction Framework for Analyzing and Monitoring Business Process Performances (AB, MC, FF, MG, LP), pp. 100–117.
- ICEIS-v2-2013-ToureSA #enterprise #modelling #source code #validation
- A2MO and ETREOSys — Analyzing, Modeling and Validation of Enterprise Training Programs (FT, MS, EA), pp. 310–316.
- ICML-c3-2013-TangSH
- Tensor Analyzers (YT, RS, GEH), pp. 163–171.
- SEKE-2013-AdamE #approach #multi
- A multi-dimensional approach for analyzing software artifacts (SA, GEB), pp. 650–655.
- SEKE-2013-DingXG #approach #petri net #specification
- An Approach for Analyzing Software Specifications in Petri Nets (JD, DX, JG), pp. 411–416.
- SEKE-2013-IqbalKH #behaviour #communication #developer #social
- Analyzing Social Behavior of Software Developers Across Different Communication Channels (S) (AI, MK, MH), pp. 113–118.
- SEKE-2013-NetoMGA #effectiveness #product line #testing
- Analyzing the Effectiveness of a System Testing Tool for Software Product Line Engineering (S) (CRLN, IdCM, VCG, ESdA), pp. 584–588.
- SEKE-2013-SilvaVMA #approach #product line
- Scrum-based Approach for Analyzing Commonalities and Variabilities in Software Product Lines (IFdS, TV, SRLM, ESdA), pp. 238–243.
- SEKE-2013-YuFCL #in the cloud #modelling
- Modeling and Analyzing Attack-Defense Strategy of Resource Service in Cloud Computing (HY, GF, LC, DL), pp. 77–82.
- MoDELS-2013-FariasGWL #case study #design #industrial #modelling #scalability
- Analyzing the Effort of Composing Design Models of Large-Scale Software in Industrial Case Studies (KF, AG, JW, CJPdL), pp. 639–655.
- MoDELS-2013-SunkleKR #architecture #enterprise #modelling #ontology #using
- Analyzing Enterprise Models Using Enterprise Architecture-Based Ontology (SS, VK, SR), pp. 622–638.
- MoDELS-2013-FariasGWL #case study #design #industrial #modelling #scalability
- Analyzing the Effort of Composing Design Models of Large-Scale Software in Industrial Case Studies (KF, AG, JW, CJPdL), pp. 639–655.
- MoDELS-2013-SunkleKR #architecture #enterprise #modelling #ontology #using
- Analyzing Enterprise Models Using Enterprise Architecture-Based Ontology (SS, VK, SR), pp. 622–638.
- PADL-2013-LiangK #automation #logic programming #named #scalability #source code
- Terminyzer: An Automatic Non-termination Analyzer for Large Logic Programs (SL, MK), pp. 173–189.
- REFSQ-2013-DelaterP #development #perspective #requirements #research #source code
- Analyzing the Tracing of Requirements and Source Code during Software Development — A Research Preview (AD, BP), pp. 308–314.
- REFSQ-2013-Zorn-PauliPBKR #case study #industrial #process #release planning
- Analyzing an Industrial Strategic Release Planning Process — A Case Study at Roche Diagnostics (GZP, BP, TB, HK, GR), pp. 269–284.
- SAC-2013-BusseSDMR #architecture #manycore #scheduling
- Analyzing resource interdependencies in multi-core architectures to improve scheduling decisions (AB, JHS, MD, GM, JR), pp. 1595–1602.
- ICSE-2013-DyerNRN #framework #named #repository #scalability
- Boa: a language and infrastructure for analyzing ultra-large-scale software repositories (RD, HAN, HR, TNN), pp. 422–431.
- ICSE-2013-PintoSO #evolution #named #testing
- TestEvol: a tool for analyzing test-suite evolution (LSP, SS, AO), pp. 1303–1306.
- ICSE-2013-Romano #industrial #perspective
- Analyzing the change-proneness of service-oriented systems from an industrial perspective (DR), pp. 1365–1368.
- ISMM-2013-RavitchL #c #library #memory management
- Analyzing memory ownership patterns in C libraries (TR, BL), pp. 97–108.
- SOSP-2013-WangZKS #behaviour #towards
- Towards optimization-safe systems: analyzing the impact of undefined behavior (XW, NZ, MFK, ASL), pp. 260–275.
- CAV-2013-BiondiLTW #imperative #named #security
- QUAIL: A Quantitative Security Analyzer for Imperative Code (FB, AL, LMT, AW), pp. 702–707.
- CAV-2013-ChenAS #hybrid
- Flow*: An Analyzer for Non-linear Hybrid Systems (XC, EÁ, SS), pp. 258–263.
- ICTSS-2013-PellegrinoCM #developer #protocol #security
- A Tool for Supporting Developers in Analyzing the Security of Web-Based Security Protocols (GP, LC, TM), pp. 277–282.
- HT-2012-KontopoulouPKG #graph #matrix #metric
- Graph and matrix metrics to analyze ergodic literature for children (EMK, MP, TK, EG), pp. 133–142.
- VLDB-2012-MartensNNS
- Developing and Analyzing XSDs through BonXai (WM, FN, MN, TS), pp. 1994–1997.
- WRLA-2012-BruniCGLV #adaptation #maude #modelling #self
- Modelling and Analyzing Adaptive Self-assembly Strategies with Maude (RB, AC, FG, ALL, AV), pp. 118–138.
- CSMR-2012-DavisGHMM #assembly #experience #industrial
- Analyzing Assembler to Eliminate Dead Functions: An Industrial Experience (IJD, MWG, RCH, SM, NM), pp. 467–470.
- ICSM-2012-HmoodEKR #open source #predict
- Applying technical stock market indicators to analyze and predict the evolvability of open source projects (AH, ME, IK, JR), pp. 613–616.
- WCRE-2012-KimF #android #named #query
- AQUA: Android QUery Analyzer (CJK, PF), pp. 395–404.
- WCRE-2012-RomanoRPK #fine-grained #source code #using
- Analyzing the Impact of Antipatterns on Change-Proneness Using Fine-Grained Source Code Changes (DR, PR, MP, FK), pp. 437–446.
- PEPM-2012-AlbertAGGP #named #termination
- COSTABS: a cost and termination analyzer for ABS (EA, PA, SG, MGZ, GP), pp. 151–154.
- FM-2012-AndreFKS #problem #robust #scheduling
- IMITATOR 2.5: A Tool for Analyzing Robustness in Scheduling Problems (ÉA, LF, UK, RS), pp. 33–36.
- CHI-2012-DunneRLMR #multi #named #network #scalability
- GraphTrail: analyzing large multivariate, heterogeneous networks while supporting exploration history (CD, NHR, BL, RAM, GGR), pp. 1663–1672.
- CHI-2012-HourcadeB #how #visual notation
- How small can you go?: analyzing the effect of visual angle in pointing tasks (JPH, NEBR), pp. 213–216.
- CHI-2012-PedroS #exclamation #social
- Your opinion counts!: leveraging social comments for analyzing aesthetic perception of photographs (JSP, PS), pp. 2519–2522.
- CSCW-2012-SuzukiKUII #collaboration #multi
- Analyzing the structure of the emergent division of labor in multiparty collaboration (NS, TK, IU, SI, SI), pp. 1233–1236.
- CAiSE-2012-BinderDDDFGGHHRRW #case study #clustering #experience #on the #process
- On Analyzing Process Compliance in Skin Cancer Treatment: An Experience Report from the Evidence-Based Medical Compliance Cluster (EBMC2) (MB, WD, GD, RD, KAF, WG, WG, KH, MH, SRM, CR, SW), pp. 398–413.
- CIKM-2012-BiyaniCSM #exclamation #online #thread #what
- I want what i need!: analyzing subjectivity of online forum threads (PB, CC, AS, PM), pp. 2495–2498.
- CIKM-2012-HerschelE #comprehension #data transformation #debugging
- The nautilus analyzer: understanding and debugging data transformations (MH, HE), pp. 2731–2733.
- CIKM-2012-MukherjeeMRB #multi #named #sentiment #twitter
- TwiSent: a multistage system for analyzing sentiment in twitter (SM, AM, BAR, PB), pp. 2531–2534.
- ECIR-2012-ChelaruAS #query
- Analyzing the Polarity of Opinionated Queries (SC, ISA, SS), pp. 463–467.
- ICML-2012-LiuW #modelling #multi #probability
- TrueLabel + Confusions: A Spectrum of Probabilistic Models in Analyzing Multiple Ratings (CL, YMW), p. 6.
- ICPR-2012-JiangDPL #word
- Analyzing the information entropy of states to optimize the number of states in an HMM-based off-line handwritten Arabic word recognizer (ZJ, XD, LP, CL), pp. 697–700.
- ICPR-2012-KhalifaBGE #image #novel
- A novel CAD system for analyzing cardiac first-pass MR images (FK, GMB, GLG, AEB), pp. 77–80.
- ICPR-2012-MartinTT #gesture
- Optical flow based Head Movement and Gesture Analyzer (OHMeGA) (SM, CT, MMT), pp. 605–608.
- KDD-2012-SchifanellaCCA #dependence #named #web
- D-INDEX: a web environment for analyzing dependences among scientific collaborators (CS, LDC, MC, MAA), pp. 1520–1523.
- KDD-2012-YangGRP #framework #twitter
- A framework for summarizing and analyzing twitter feeds (XY, AG, YR, SP), pp. 370–378.
- SEKE-2012-CuiWLBZL #aspect-oriented #diagrams #petri net #process #verification
- Verifying Aspect-Oriented Activity Diagrams Against Crosscutting Properties with Petri Net Analyzer (ZC, LW, XL, LB, JZ, XL), pp. 369–374.
- SIGIR-2012-TranF #information retrieval #interactive #using
- Using eye-tracking with dynamic areas of interest for analyzing interactive information retrieval (VTT, NF), pp. 1165–1166.
- ECMFA-2012-QureshiCT #constraints #specification
- A Timed Automata-Based Method to Analyze EAST-ADL Timing Constraint Specifications (TNQ, DJC, MT), pp. 303–318.
- PLATEAU-2012-MeyerovichR12a #bibliography #case study #developer #experience #how #repository
- How not to survey developers and repositories: experiences analyzing language adoption (LAM, ASR), pp. 7–16.
- TOOLS-EUROPE-2012-CorralSSSV #development #mobile #named #process #proximity
- DroidSense: A Mobile Tool to Analyze Software Development Processes by Measuring Team Proximity (LC, AS, GS, JS, JV), pp. 17–33.
- LOPSTR-2012-GieslSSEF #evaluation #graph #logic programming #source code #symbolic computation #term rewriting
- Symbolic Evaluation Graphs and Term Rewriting — A General Methodology for Analyzing Logic Programs (JG, TS, PSK, FE, CF), p. 1.
- PPDP-2012-GieslSSEF #evaluation #graph #logic programming #source code #symbolic computation #term rewriting
- Symbolic evaluation graphs and term rewriting: a general methodology for analyzing logic programs (JG, TS, PSK, FE, CF), pp. 1–12.
- REFSQ-2012-BeckersFKS #identification
- A Pattern-Based Method for Identifying and Analyzing Laws (KB, SF, JCK, HS), pp. 256–262.
- SAC-2012-DayehH #biology #network #using
- Analyzing incomplete biological pathways using network motifs (MED, MH), pp. 1355–1360.
- SAC-2012-GocicS #paradigm #process
- Service-oriented paradigm for analyzing hydrological processes (MG, DS), pp. 1994–1995.
- SAC-2012-SaidJA #collaboration
- Analyzing weighting schemes in collaborative filtering: cold start, post cold start and power users (AS, BJJ, SA), pp. 2035–2040.
- FSE-2012-AlbertFG #concurrent #named
- MayPar: a may-happen-in-parallel analyzer for concurrent objects (EA, AFM, SG), p. 14.
- FSE-2012-KwonS #component #detection
- Detecting and analyzing insecure component usage (TK, ZS), p. 5.
- ICSE-2012-SongHLSLD #approach #model checking #multi #probability
- Analyzing multi-agent systems with probabilistic model checking approach (SS, JH, YL, JS, HfL, JSD), pp. 1337–1340.
- SPLC-2012-HeiderRGL #impact analysis #modelling #testing #using #variability
- Using regression testing to analyze the impact of changes to variability models on products (WH, RR, PG, DL), pp. 196–205.
- ASPLOS-2012-HariANR #equivalence #fault #named
- Relyzer: exploiting application-level fault equivalence to analyze application resiliency to transient faults (SKSH, SVA, HN, PR), pp. 123–134.
- CAV-2012-BenqueBCCFIPTV #biology #modelling #named #network #visual notation
- Bma: Visual Tool for Modeling and Analyzing Biological Networks (DB, SB, CC, BC, JF, SI, NP, AST, MYV), pp. 686–692.
- CAV-2012-KieferMOWW #named #probability #source code
- APEX: An Analyzer for Open Probabilistic Programs (SK, ASM, JO, BW, JW), pp. 693–698.
- ICST-2012-GrooteOW #formal method #using
- Analyzing a Controller of a Power Distribution Unit Using Formal Methods (JFG, AO, JHW), pp. 420–428.
- WICSA-2011-BouwersCDV #architecture
- Quantifying the Analyzability of Software Architectures (EB, JPC, AvD, JV), pp. 83–92.
- ASE-2011-UddinDR #api
- Analyzing temporal API usage patterns (GU, BD, MPR), pp. 456–459.
- ASE-2011-Vakili #modelling
- Analyzing temporal properties of abstract models (AV), pp. 656–659.
- ASE-2011-VakiliD #declarative #model checking #modelling #using
- Using model checking to analyze static properties of declarative models (AV, NAD), pp. 428–431.
- ASE-2011-XingXJ #difference #named
- CloneDifferentiator: Analyzing clones by differentiation (ZX, YX, SJ), pp. 576–579.
- DAC-2011-KimS #data access #memory management #named
- CuMAPz: a tool to analyze memory access patterns in CUDA (YK, AS), pp. 128–133.
- DRR-2011-MaronezeCL #documentation #image #recognition #statistics
- Introduction of statistical information in a syntactic analyzer for document image recognition (AOM, BC, AL), pp. 1–10.
- FASE-2011-GharaibehRC #framework #question
- Analyzing Software Updates: Should You Build a Dynamic Updating Infrastructure? (BG, HR, JMC), pp. 371–385.
- CSMR-2011-AnquetilL #legacy
- Legacy Software Restructuring: Analyzing a Concrete Case (NA, JL), pp. 279–286.
- CSMR-2011-SiddiqueM #clustering
- Analyzing Term Weighting Schemes for Labeling Software Clusters (FS, OM), pp. 85–88.
- ICSM-2011-GrooteOW #development #formal method #industrial
- Analyzing the effects of formal methods on the development of industrial control software (JFG, AO, JHW), pp. 467–472.
- ICSM-2011-YazdanshenasM #bound #component
- Crossing the boundaries while analyzing heterogeneous component-based software systems (ARY, LM), pp. 193–202.
- SCAM-2011-SchulzeJF #preprocessor
- Analyzing the Effect of Preprocessor Annotations on Code Clones (SS, EJ, JF), pp. 115–124.
- WCRE-2011-DuszynskiKB #multi #reuse #source code
- Analyzing the Source Code of Multiple Software Variants for Reuse Potential (SD, JK, MB), pp. 303–307.
- WCRE-2011-ZhuWPXZ #composition #evolution #monitoring #quality #roadmap
- Monitoring Software Quality Evolution by Analyzing Deviation Trends of Modularity Views (TZ, YW, XP, ZX, WZ), pp. 229–238.
- STOC-2011-Haeupler #network
- Analyzing network coding gossip made easy (BH), pp. 293–302.
- ICALP-v2-2011-Cord-LandwehrDFHKKKKMHRSWWW #algorithm #approach #convergence #mobile
- A New Approach for Analyzing Convergence Algorithms for Mobile Robots (ACL, BD, MF, MH, BK, AK, PK, SK, MM, FMadH, CR, KS, DW, CW, DW), pp. 650–661.
- AGTIVE-2011-RungeET #algebra #graph transformation #specification
- AGG 2.0 — New Features for Specifying and Analyzing Algebraic Graph Transformations (OR, CE, GT), pp. 81–88.
- CHI-2011-MedlerJL #game studies #online #visual notation
- Data cracker: developing a visual game analytic tool for analyzing online gameplay (BM, MJ, JL), pp. 2365–2374.
- CSCW-2011-BardramD #analysis #process
- Activity analysis: applying activity theory to analyze complex work in hospitals (JB, AD), pp. 455–464.
- CSCW-2011-Bouz-AsalII #education #web
- Analyzing patterns in composing teaching materials from the web (NBA, RI, TI), pp. 605–608.
- HCD-2011-NazemiBPBK #adaptation #user interface #visualisation
- Adapting User Interfaces by Analyzing Data Characteristics for Determining Adequate Visualizations (KN, DB, AP, MB, AK), pp. 566–575.
- HCI-ITE-2011-JohnsonLNY #behaviour
- Analyzing User Behavior within a Haptic System (SLJ, YL, CSN, TY), pp. 62–70.
- HIMI-v1-2011-YamamotoSYNW #development #interactive
- Development of an Eye-Tracking Pen Display for Analyzing Embodied Interaction (MY, HS, KY, TN, TW), pp. 651–658.
- VISSOFT-2011-NovaisLCPM #approach #difference #evolution #interactive #visual notation
- An interactive differential and temporal approach to visually analyze software evolution (RLN, CANL, GdFC, RMSP, MGM), pp. 1–4.
- ICEIS-J-2011-NovaisCJM11a #approach #difference #evolution #interactive #on the #visualisation
- On the Use of Software Visualization to Analyze Software Evolution: An Interactive Differential Approach (RLN, GdFC, PRMSJ, MGM), pp. 241–255.
- ICEIS-v2-2011-YeL #theory and practice
- Analyzing Data from AVL/APC System for Improving Transit Management — Theory and Practice (YY, JL), pp. 267–274.
- ICEIS-v3-2011-NovaisCJM #approach #difference #evolution #interactive #on the #visualisation
- On the Use of Software Visualization to Analyze Software Evolution — An Interactive Differential Approach (RLN, GdFC, PRMSJ, MGdMN), pp. 15–24.
- ICEIS-v3-2011-WangWWL #modelling #using #workflow
- Formally Modeling and Analyzing Data-centric Workflow using WFCP-net and ASK-CTL (ZW, JW, LW, GL), pp. 139–144.
- ICEIS-v4-2011-XieH #approach #architecture #quality
- An Architectural Approach to Analyze Information Quality for Inter-organizational Service (SX, MH), pp. 438–443.
- KDD-2011-McCloskeyKIKB #behaviour #data mining #mining #using
- From market baskets to mole rats: using data mining techniques to analyze RFID data describing laboratory animal behavior (DPM, MEK, SPI, IK, SBM), pp. 301–306.
- SEKE-2011-YuLFC #composition #testing
- A Regression Test Technique for Analyzing the Functionalities of Service Composition (HY, DL, GF, LC), pp. 578–582.
- SIGIR-2011-HuggettR #generative
- The Meta-Dex Suite: generating and analyzing indexes and meta-indexes (MH, ER), pp. 1285–1286.
- ECMFA-2011-SvendsenHM #semantics #variability
- Analyzing Variability: Capturing Semantic Ripple Effects (AS, ØH, BMP), pp. 253–269.
- PLATEAU-2011-YoonM #editing #low level
- Capturing and analyzing low-level events from the code editor (YY, BAM), pp. 25–30.
- SAC-2011-FragidisT
- Analyzing value co-creation in service systems: contribution from GORE (GF, KAT), pp. 705–707.
- SAC-2011-FreitasHCFPWL
- Analyzing different levels of geographic context awareness in agent ferrying over VANETs (EPdF, TH, LAGC, AMF, CEP, FRW, TL), pp. 413–418.
- SAC-2011-HaBKBJ #analysis #network #perspective #social
- Analyzing a Korean blogosphere: a social network analysis perspective (JH, DHB, SWK, SCB, BSJ), pp. 773–777.
- SAC-2011-HorkoffY #how #modelling
- Analyzing goal models: different approaches and how to choose among them (JH, ESKY), pp. 675–682.
- SAC-2011-SingerNVKL
- Search-logger analyzing exploratory search tasks (GS, UN, EV, HK, DL), pp. 751–756.
- LDTA-2011-JorgensenEF #generative #named #tool support #visualisation
- VLex: visualizing a lexical analyzer generator — tool demonstration (AJ, GRE, BF), p. 12.
- PLEASE-2011-Li #evolution #identification #product line
- Identifying best practice by analyzing the evolution of the FISCAN MTMSIS software product line (DL), pp. 40–44.
- CAV-2011-RamanK #behaviour #specification #using
- Analyzing Unsynthesizable Specifications for High-Level Robot Behavior Using LTLMoP (VR, HKG), pp. 663–668.
- SAT-2011-ArgelichLMP #evaluation #satisfiability
- Analyzing the Instances of the MaxSAT Evaluation (JA, CML, FM, JP), pp. 360–361.
- ECSA-2010-SuYZ #architecture #specification
- An ADL-Approach to Specifying and Analyzing Centralized-Mode Architectural Connection (GS, MY, CZ), pp. 8–23.
- ASE-2010-Abi-AntounB #architecture #security
- Analyzing security architectures (MAA, JMB), pp. 3–12.
- ASE-2010-LiHG #ajax #behaviour #detection #interactive #web
- Detecting user-visible failures in AJAX web applications by analyzing users’ interaction behaviors (WL, MJH, CG), pp. 155–158.
- ASE-2010-RederE #design #detection #fault #named #uml #visualisation
- Model/analyzer: a tool for detecting, visualizing and fixing design errors in UML (AR, AE), pp. 347–348.
- DAC-2010-ThalmaierNWSBK #induction #invariant #satisfiability
- Analyzing k-step induction to compute invariants for SAT-based property checking (MT, MDN, MW, DS, JB, WK), pp. 176–181.
- DRR-2010-ChazalonC #definite clause grammar #documentation #using
- Using definite clause grammars to build a global system for analyzing collections of documents (JC, BC), pp. 1–10.
- SIGMOD-2010-ChuiKLC #named #sequence
- S-OLAP: an OLAP system for analyzing sequence data (CKC, BK, EL, DWC), pp. 1131–1134.
- SIGMOD-2010-TsirogiannisHS #database #energy #performance
- Analyzing the energy efficiency of a database server (DT, SH, MAS), pp. 231–242.
- VLDB-2010-CormodeLLS
- Minimizing Minimality and Maximizing Utility: Analyzing Method-based attacks on Anonymized Data (GC, NL, TL, DS), pp. 1045–1056.
- VLDB-2010-SchadDQ #in the cloud #metric #runtime
- Runtime Measurements in the Cloud: Observing, Analyzing, and Reducing Variance (JS, JD, JAQR), pp. 460–471.
- FASE-2010-ChatterjeeARS #concurrent #multi #source code #thread
- Analyzing the Impact of Change in Multi-threaded Programs (KC, LdA, VR, CS), pp. 293–307.
- FASE-2010-HashimotoM #evolution
- A Method for Analyzing Code Homology in Genealogy of Evolving Software (MH, AM), pp. 91–106.
- TACAS-2010-BuchsHMR #algebra #named #petri net
- AlPiNA: An Algebraic Petri Net Analyzer (DB, SH, AM, MR), pp. 349–352.
- ICSM-2010-HasanSBA #process
- Analyzing natural-language artifacts of the software process (MH, ES, DB, MHA), pp. 1–5.
- WCRE-2010-DavisG #assembly #detection #source code
- From Whence It Came: Detecting Source Code Clones by Analyzing Assembler (IJD, MWG), pp. 242–246.
- WCRE-2010-RupakhetiH #approach #java #similarity
- An Abstraction-Oriented, Path-Based Approach for Analyzing Object Equality in Java (CRR, DH), pp. 205–214.
- CHI-2010-HourcadeNPD
- Pointassist for older adults: analyzing sub-movement characteristics to aid in pointing tasks (JPH, CMN, KBP, NLD), pp. 1115–1124.
- CAiSE-2010-HolmesZDD #internet #monitoring
- Monitoring and Analyzing Service-Based Internet Systems through a Model-Aware Service Environment (TH, UZ, FD, SD), pp. 98–112.
- ICEIS-HCI-2010-KisilevichKR #framework #named
- GEO-SPADE — A Generic Google Earth-based Framework for Analyzing and Exploring Spatio-temporal Data (SK, DAK, LR), pp. 13–20.
- ECIR-2010-Martinez-RomoA #information retrieval #web
- Analyzing Information Retrieval Methods to Recover Broken Web Links (JMR, LA), pp. 26–37.
- ICPR-2010-JiangZWZ
- Distinguishing Patients with Gastritis and Cholecystitis from the Healthy by Analyzing Wrist Radial Arterial Doppler Blood Flow Signals (XJ, DZ, KW, WZ), pp. 2492–2495.
- ICPR-2010-LiaoH #detection #energy
- Slip and Fall Events Detection by Analyzing the Integrated Spatiotemporal Energy Map (TL, CLH), pp. 1718–1721.
- SEKE-2010-GuedesV #multi #requirements #uml
- A UML Profile Oriented to the Requirements Collecting and Analyzing for the Multi-Agent Systems Project (GTAG, RMV), p. 2833.
- SEKE-2010-MauczkaBG #case study #classification #metric #process
- Analyzing the Relationship of Process Metrics And Classified Changes — A Pilot Study (AM, MB, TG), pp. 269–272.
- ECOOP-2010-HeideggerT #scripting language
- Recency Types for Analyzing Scripting Languages (PH, PT), pp. 200–224.
- SAC-2010-HansenI #alloy #architecture #modelling
- Modeling and analyzing architectural change with alloy (KMH, MI), pp. 2257–2264.
- SAC-2010-LuNB #dependence #execution
- Timing analyzing for systems with execution dependencies between tasks (YL, TN, IB), pp. 357–358.
- FSE-2010-KneussSK #named #php
- Phantm: PHP analyzer for type mismatch (EK, PS, VK), pp. 373–374.
- FSE-2010-LiuSD #realtime
- Analyzing hierarchical complex real-time systems (YL, JS, JSD), pp. 365–366.
- SPLC-2010-BelategiSE #embedded #product line #variability
- MARTE Mechanisms to Model Variability When Analyzing Embedded Software Product Lines (LB, GS, LE), pp. 466–470.
- SPLC-2010-Duszynski #diagrams #matrix #variability #visualisation
- Visualizing and Analyzing Software Variability with Bar Diagrams and Occurrence Matrices (SD), pp. 481–485.
- ASPLOS-2010-WeeratungeZJ #concurrent #debugging #manycore
- Analyzing multicore dumps to facilitate concurrency bug reproduction (DW, XZ, SJ), pp. 155–166.
- PPoPP-2010-TallentMP #parallel #thread
- Analyzing lock contention in multithreaded applications (NRT, JMMC, AP), pp. 269–280.
- CAV-2010-RepsLTBL #verification
- There’s Plenty of Room at the Bottom: Analyzing and Verifying Machine Code (TWR, JL, AVT, GB, AL), pp. 41–56.
- ISSTA-2010-WeeratungeZSJ #concurrent #debugging #slicing #using
- Analyzing concurrency bugs using dual slicing (DW, XZ, WNS, SJ), pp. 253–264.
- WICSA-ECSA-2009-AngelovGG #architecture #classification #effectiveness
- A classification of software reference architectures: Analyzing their success and effectiveness (SA, PWPJG, DG), pp. 141–150.
- WICSA-ECSA-2009-BielG #architecture #towards #usability
- Towards a Method for Analyzing Architectural Support Levels of Usability (BB, VG), pp. 273–276.
- ASE-2009-KroeningSTTW #named #source code
- Loopfrog: A Static Analyzer for ANSI-C Programs (DK, NS, ST, AT, CMW), pp. 668–670.
- ASE-2009-SardinhaCWGR #aspect-oriented #automation #detection #named #requirements
- EA-Analyzer: Automating Conflict Detection in Aspect-Oriented Requirements (AS, RC, NW, PG, AR), pp. 530–534.
- CASE-2009-GoswamiSBC
- A DECOMSYS based tool-chain for analyzing FlexRay based automotive control applications (DG, PS, UDB, SC), pp. 403–408.
- DAC-2009-BurnhamYH #probability
- A stochastic jitter model for analyzing digital timing-recovery circuits (JRB, CKKY, HAH), pp. 116–121.
- DAC-2009-TsaiH
- A false-path aware formal static timing analyzer considering simultaneous input transitions (ST, CYH), pp. 25–30.
- DATE-2009-RedaN #metric #modelling #novel #parametricity #process
- Analyzing the impact of process variations on parametric measurements: Novel models and applications (SR, SRN), pp. 375–380.
- ICDAR-2009-WangSY #comprehension #online
- The Understanding and Structure Analyzing for Online Handwritten Chemical Formulas (XW, GS, JY), pp. 1056–1060.
- VLDB-2009-HerschelHT #named
- Artemis: A System for Analyzing Missing Answers (MH, MAH, WCT), pp. 1550–1553.
- ITiCSE-2009-AhoniemiK
- Analyzing the use of a rubric-based grading tool (TA, VK), pp. 333–337.
- ITiCSE-2009-BrabrandD #taxonomy #using
- Analyzing CS competencies using the SOLO taxonomy (CB, BD), p. 1.
- WRLA-2008-RiescoV09 #implementation #maude #protocol
- Implementing and analyzing in Maude the Enhanced Interior Gateway Routing Protocol (AR, AV), pp. 249–266.
- FASE-2009-AguirreFMMW #alloy #behaviour #specification #using
- Describing and Analyzing Behaviours over Tabular Specifications Using (Dyn)Alloy (NA, MFF, MMM, TSEM, AW), pp. 155–170.
- CSMR-2009-AbebeHMTA #evolution #source code
- Analyzing the Evolution of the Source Code Vocabulary (SLA, SH, AM, PT, GA), pp. 189–198.
- CSMR-2009-Laitila #analysis #comprehension #named
- SymAnalyzer: A Symbolic Analysis Tool for Program Comprehension (EL), pp. 325–326.
- ICSM-2009-HouW #case study #eclipse #evolution
- Analyzing the evolution of user-visible features: A case study with Eclipse (DH, YW), pp. 479–482.
- ICSM-2009-KnabFGP #interactive #problem
- Interactive views for analyzing problem reports (PK, BF, HG, MP), pp. 527–530.
- MSR-2009-OssherBLBL #java #named #open source #repository
- SourcererDB: An aggregated repository of statically analyzed and cross-linked open source Java projects (JO, SKB, EL, PB, CVL), pp. 183–186.
- PLDI-2009-TorreMP #calculus #fixpoint #recursion #source code #using
- Analyzing recursive programs using a fixed-point calculus (SLT, PM, GP), pp. 211–222.
- SAS-2009-NiedzielskiRGP #bound #constraints #control flow
- A Verifiable, Control Flow Aware Constraint Analyzer for Bounds Check Elimination (DN, JvR, AG, KP), pp. 137–153.
- SEFM-2009-Ferrara #java #named #parallel #source code #thread
- Checkmate: A Generic Static Analyzer of Java Multithreaded Programs (PF), pp. 169–178.
- CHI-2009-SuhmP #experience
- Call browser: a system to improve the caller experience by analyzing live calls end-to-end (BS, PP), pp. 1313–1322.
- DHM-2009-Butler #3d #using
- Using 3D Head and Respirator Shapes to Analyze Respirator Fit (KMB), pp. 483–491.
- DHM-2009-YucelHDR #communication #coordination
- Analyzing the Effects of a BCMA in Inter-Provider Communication, Coordination and Cooperation (GY, BH, VGD, MR), pp. 744–753.
- HCI-AUII-2009-Heimgartner #identification #interactive
- Identification of the User by Analyzing Human Computer Interaction (RH), pp. 275–283.
- HCI-VAD-2009-KiriyamaS #behaviour #interactive
- Analyzing Human Behaviors in an Interactive Art Installation (TK, MS), pp. 345–352.
- HIMI-DIE-2009-FuchigamiOT #process
- Brain Activities Supporting Finger Operations, Analyzed by Neuro-NIRS (MF, AO, HT), pp. 495–504.
- HIMI-II-2009-BehalGKCLCQ #monitoring #named #visualisation
- COBRA — A Visualization Solution to Monitor and Analyze Consumer Generated Medias (AB, JG, LK, YC, SL, WC, WQ), pp. 229–238.
- HIMI-II-2009-ShiraishiMT #category theory #representation #visual notation
- A Tool for Analyzing Categorical Data Visually with Granular Representation (KS, KM, JT), pp. 342–351.
- CAiSE-2009-MutschlerR #cost analysis #enterprise #evaluation #information management
- Evaluation Patterns for Analyzing the Costs of Enterprise Information Systems (BM, MR), pp. 379–394.
- EDOC-2009-WetzsteinLRBDL #monitoring #performance #process
- Monitoring and Analyzing Influential Factors of Business Process Performance (BW, PL, FR, IB, SD, FL), pp. 141–150.
- CIKM-2009-DriesNR #network #query
- A query language for analyzing networks (AD, SN, LDR), pp. 485–494.
- CIKM-2009-HuangE #query #web
- Analyzing and evaluating query reformulation strategies in web search logs (JH, ENE), pp. 77–86.
- ICML-2009-RamanFWDR
- The Bayesian group-Lasso for analyzing contingency tables (SR, TJF, PJW, ED, VR), pp. 881–888.
- KDD-2009-GuoTCZZ #generative #network #online #social
- Analyzing patterns of user content generation in online social networks (LG, ET, SC, XZ, YEZ), pp. 369–378.
- KDD-2009-ZhangFPGS #streaming #towards
- Toward autonomic grids: analyzing the job flow with affinity streaming (XZ, CF, JP, CGR, MS), pp. 987–996.
- KEOD-2009-Aussenac-GillesK #documentation #learning #ontology #xml
- Ontology Learning by Analyzing XML Document Structure and Content (NAG, MK), pp. 159–165.
- SEKE-2009-BiancoSS #development #process
- Analyzing the Software Development Process with SyQL and Lagrein (MB, AS, GS), pp. 682–687.
- SAC-2009-KobayashiOOT #bibliography #modelling #web
- Modeling and analyzing review information on the web focusing on credibility (TK, HO, SO, KT), pp. 1316–1317.
- SAC-2009-SinghB #identification #multi #web
- Information-theoretic identification of content pages for analyzing user information needs and actions on the multimedia web (RS, BDB), pp. 1806–1810.
- ESEC-FSE-2009-KnabKP #problem
- Smart views for analyzing problem reports: tool demo (PK, HG, MP), pp. 289–290.
- ESEC-FSE-2009-ShaoKP #named #parallel #semantics
- SCA: a semantic conflict analyzer for parallel changes (DS, SK, DEP), pp. 291–292.
- ICSE-2009-DamasLRL #behaviour #modelling #process #synthesis
- Analyzing critical process models through behavior model synthesis (CD, BL, FR, AvL), pp. 441–451.
- CAV-2009-BouissouGPTV #named #source code
- HybridFluctuat: A Static Analyzer of Numerical Programs within a Continuous Environment (OB, EG, SP, KT, FV), pp. 620–626.
- CAV-2009-KanadeAIRSS #generative #modelling
- Generating and Analyzing Symbolic Traces of Simulink/Stateflow Models (AK, RA, FI, SR, SS, KCS), pp. 430–445.
- CAV-2009-PanBL #named #specification
- TASS: Timing Analyzer of Scenario-Based Specifications (MP, LB, XL), pp. 689–695.
- ISSTA-2009-StengelB #contract
- Analyzing singularity channel contracts (ZS, TB), pp. 13–24.
- TestCom-FATES-2009-ZeissG #consistency #nondeterminism #testing
- Analyzing Response Inconsistencies in Test Suites (BZ, JG), pp. 195–210.
- WICSA-2008-LaMantiaCMR #design #evolution #matrix #scalability #using
- Analyzing the Evolution of Large-Scale Software Systems Using Design Structure Matrices and Design Rule Theory: Two Exploratory Cases (MJL, YC, AM, JR), pp. 83–92.
- WICSA-2008-SozerT #modelling
- Introducing Recovery Style for Modeling and Analyzing System Recovery (HS, BT), pp. 167–176.
- CASE-2008-DuanZPWYA
- Analyzing human skill through control trajectories and motion capture data (FD, YZ, NP, KW, HY, TA), pp. 454–459.
- DATE-2008-AsianVR #implementation #network
- Practical Implementation of a Network Analyzer for Analog BIST Applications (MJBA, DV, AR), pp. 80–85.
- DATE-2008-TcheghoMS
- Optimal High-Resolution Spectral Analyzer (AT, HM, SS), pp. 62–67.
- DATE-2008-Young #design #metric
- Capturing and Analyzing IC Design Productivity Metrics (JY), pp. 936–937.
- VLDB-2008-ChaiSDRS #integration
- Analyzing and revising data integration schemas to improve their matchability (XC, MS, AD, AR, LS), pp. 773–784.
- ITiCSE-2008-GunawardenaBO #comprehension
- A method for analyzing reading comprehension in computer science courses (AG, JB, AO), p. 348.
- TACAS-2008-BalakrishnanR #bytecode
- Analyzing Stripped Device-Driver Executables (GB, TWR), pp. 124–140.
- ICPC-2008-Kothari #comprehension #fault #scalability
- Scalable Program Comprehension for Analyzing Complex Defects (SCK), pp. 3–4.
- MSR-2008-WermelingerY #eclipse #evolution #plugin
- Analyzing the evolution of eclipse plugins (MW, YY), pp. 133–136.
- WCRE-2008-AriasAA #dependence #execution #scalability
- Analyzing the Actual Execution of a Large Software-Intensive System for Determining Dependencies (TBCA, PA, PA), pp. 49–58.
- ICALP-B-2008-AxelssonHL #context-free grammar #incremental #satisfiability #using
- Analyzing Context-Free Grammars Using an Incremental SAT Solver (RA, KH, ML), pp. 410–422.
- SOFTVIS-2008-ZeckzerKSHK #3d #clustering #communication #graph #reliability #using #visualisation
- Analyzing the reliability of communication between software entities using a 3D visualization of clustered graphs (DZ, RK, LS, HH, TK), pp. 37–46.
- CAiSE-2008-MutschlerR #information management #modelling #on the
- On Modeling and Analyzing Cost Factors in Information Systems Engineering (BM, MR), pp. 510–524.
- SEKE-2008-BaratK #approach #enterprise #integration #modelling #process #tool support
- A Model-driven Toolset to Support an Approach for Analyzing Integration of Business Process Aspect of Enterprise Application Integration (SB, VK), pp. 625–630.
- SEKE-2008-Chavarria-BaezL #approach #confluence #petri net #termination
- Analyzing Termination and Confluence in Active Rule Base via a Petri Net Approach (LCB, XL), pp. 363–366.
- SEKE-2008-FollecoKB #classification #quality
- Analyzing the Impact of Attribute Noise on Software Quality Classification (AF, TMK, LAB), pp. 73–78.
- SEKE-2008-LiuLZL #logic #protocol #security
- Supremum of Agent Number Needed in Analyzing Security Protocols Based on Horn Logic (FL, ZL, TZ, ML), pp. 795–801.
- SEKE-2008-Rodriguez-EliasMLV #process
- Analyzing Manufacturing Process Knowledge Flows with KoFI (OMRE, ALM, JIL, AV), pp. 428–433.
- SIGIR-2008-WeiPD #query #web
- Analyzing web text association to disambiguate abbreviation in queries (XW, FP, BD), pp. 751–752.
- OOPSLA-2008-ProkopskiV #performance #virtual machine
- Analyzing the performance of code-copying virtual machines (GBP, CV), pp. 403–422.
- SAC-2008-AtallaMAGA #behaviour #peer-to-peer #quality #web
- Analyzing the impact of churn and malicious behavior on the quality of peer-to-peer web search (FA, DM, JMA, MAG, VA), pp. 1137–1144.
- ICSE-2008-ChenAHCOH #process
- Analyzing medical processes (BC, GSA, EAH, LAC, LJO, PLH), pp. 623–632.
- ICSE-2008-WenzelK #evolution
- Analyzing model evolution (SW, UK), pp. 831–834.
- SLE-2008-RiveraGLV #behaviour #maude #modelling #rule-based #semantics #visual notation
- Analyzing Rule-Based Behavioral Semantics of Visual Modeling Languages with Maude (JER, EG, JdL, AV), pp. 54–73.
- CC-2008-LimR #bytecode #generative
- A System for Generating Static Analyzers for Machine Instructions (JL, TWR), pp. 36–52.
- ICST-2008-RamirezC #adaptation #logic #modelling #uml #verification
- Verifying and Analyzing Adaptive Logic through UML State Models (AJR, BHCC), pp. 529–532.
- CBSE-2007-CortellessaG #approach #component #fault #modelling #reliability
- A Modeling Approach to Analyze the Impact of Error Propagation on Reliability of Component-Based Systems (VC, VG), pp. 140–156.
- ECSA-2007-CorderoS #architecture #composition #perspective
- Analyzing Styles of the Modular Software Architecture View (RNLC, IRS), pp. 275–278.
- DAC-2007-KaoHL #embedded #integration #multi
- An Embedded Multi-resolution AMBA Trace Analyzer for Microprocessor-based SoC Integration (CFK, IJH, CHL), pp. 477–482.
- ITiCSE-2007-MyllerLK #algorithm #collaboration #taxonomy #visualisation
- Analyzing engagement taxonomy in collaborative algorithm visualization (NM, ML, AK), pp. 251–255.
- TACAS-2007-ChatterjeeLQR #bytecode #low level #reachability
- A Reachability Predicate for Analyzing Low-Level Software (SC, SKL, SQ, ZR), pp. 19–33.
- TACAS-2007-FriasPM #alloy #analysis #specification #verification
- Alloy Analyzer+PVS in the Analysis and Verification of Alloy Specifications (MFF, CLP, MMM), pp. 587–601.
- TACAS-2007-WojtczakE
- PReMo : An Analyzer for P robabilistic Re cursive Mo dels (DW, KE), pp. 66–71.
- MSR-2007-KimE #category theory
- Prioritizing Warning Categories by Analyzing Software History (SK, MDE), p. 27.
- CIAA-2007-BrabrandGM #ambiguity #context-free grammar
- Analyzing Ambiguity of Context-Free Grammars (CB, RG, AM), pp. 214–225.
- IFM-2007-PodorozhnyKPZ #alloy #multi #using #verification
- Verification of Multi-agent Negotiations Using the Alloy Analyzer (RMP, SK, DEP, XZ), pp. 501–517.
- SEFM-2007-DengRH #algorithm #execution #object-oriented #source code #symbolic computation #towards
- Towards A Case-Optimal Symbolic Execution Algorithm for Analyzing Strong Properties of Object-Oriented Programs (XD, R, JH), pp. 273–282.
- DHM-2007-ZhangCZZFD
- A New Virtual Dynamic Dentomaxillofacial System for Analyzing Mandibular Movement, Occlusal Contact, and TMJ Condition (CZ, LC, FZ, HZ, HF, GD), pp. 747–756.
- HCI-AS-2007-MorDML #approach #behaviour
- A Three-Level Approach for Analyzing User Behavior in Ongoing Relationships (EM, MGD, JM, SL), pp. 971–980.
- HCI-MIE-2007-BaranDC #approach #eye tracking #how #problem
- How Do Adults Solve Digital Tangram Problems? Analyzing Cognitive Strategies Through Eye Tracking Approach (BB, BD, KÇ), pp. 555–563.
- HIMI-IIE-2007-CollinsNMRBCPFHP #collaboration #dataset
- The Karst Collaborative Workspace for Analyzing and Annotating Scientific Datasets (LMC, DEN, MLBM, JVR, MAB, CRC, JEP, BFS, SKH, JCP), pp. 3–12.
- VISSOFT-2007-BohnetD07a #compilation #comprehension #graph
- CGA Call Graph Analyzer — Locating and Understanding Functionality within the Gnu Compiler Collection’s Million Lines of Code (JB, JD), pp. 161–162.
- CAiSE-2007-MutschlerRR #approach #information management #modelling
- Analyzing the Dynamic Cost Factors of Process-Aware Information Systems: A Model-Based Approach (BM, MR, SR), pp. 589–603.
- CAiSE-2007-PijpersG #comprehension #named
- e3forces: Understanding Strategies of Networked e 3 value Constellations by Analyzing Environmental Forces (VP, JG), pp. 188–202.
- ICEIS-EIS-2007-GmatiN #framework #information management #requirements
- A Framework for Analyzing Business/Information System Alignment Requirements (IG, SN), pp. 401–409.
- ICML-2007-ParrPLL #approximate #generative
- Analyzing feature generation for value-function approximation (RP, CPW, LL, MLL), pp. 737–744.
- MLDM-2007-MendezCGRD #performance
- Analyzing the Performance of Spam Filtering Methods When Dimensionality of Input Vector Changes (JRM, BC, DGP, FFR, FD), pp. 364–378.
- SEKE-2007-Condori-FernandezP #evaluation #functional #metric
- Analyzing the Applicability of a Theoretical Model in the Evaluation of Functional Size Measurement Procedures (NCF, OP), pp. 736–739.
- SEKE-2007-HuangL #configuration management #process #repository
- Analyzing Configuration Management Repository Data for Software Process Improvement (SH, CL), p. 67–?.
- SIGIR-2007-HeCL #detection
- Analyzing feature trajectories for event detection (QH, KC, EPL), pp. 207–214.
- MoDELS-2007-BasinCDE #approach #metamodelling #modelling
- A Metamodel-Based Approach for Analyzing Security-Design Models (DAB, MC, JD, ME), pp. 420–435.
- MoDELS-2007-BasinCDE #approach #metamodelling #modelling
- A Metamodel-Based Approach for Analyzing Security-Design Models (DAB, MC, JD, ME), pp. 420–435.
- SAC-2007-SoleimaniADDBA #detection #named #reliability
- RAAS: a reliable analyzer and archiver for snort intrusion detection system (MS, EKA, MD, MD, AB, MA), pp. 259–263.
- ICSE-2007-Egyed07a #consistency #modelling #named #uml
- UML/Analyzer: A Tool for the Instant Consistency Checking of UML Models (AE), pp. 793–796.
- LCTES-2007-WaltherHN #behaviour #embedded #realtime
- Analyzing the real-time behaviour of deeply embedded event driven systems (KW, RH, JN), pp. 149–151.
- CAV-2007-GulwaniT #abstract domain #bytecode #low level
- An Abstract Domain for Analyzing Heap-Manipulating Low-Level Software (SG, AT), pp. 379–392.
- RTA-2007-BoichutGJR #approximate #performance #prototype
- Rewriting Approximations for Fast Prototyping of Static Analyzers (YB, TG, TPJ, LLR), pp. 48–62.
- VMCAI-2007-Logozzo #abstract interpretation #analysis #composition #java #named #verification
- Cibai: An Abstract Interpretation-Based Static Analyzer for Modular Analysis and Verification of Java Classes (FL), pp. 283–298.
- DATE-2006-ReddyWM #architecture #nondeterminism
- Analyzing timing uncertainty in mesh-based clock architectures (SMR, GRW, RM), pp. 1097–1102.
- HT-2006-Ruddle #hypermedia #navigation #string #using
- Using string-matching to analyze hypertext navigation (RAR), pp. 49–52.
- PODS-2006-CaldersDHP #workflow
- Analyzing workflows implied by instance-dependent access rules (TC, SD, JH, JP), pp. 100–109.
- TACAS-2006-BolligKSS #named #specification
- MSCan — A Tool for Analyzing MSC Specifications (BB, CK, MS, VS), pp. 455–458.
- CSMR-2006-LewisMS #architecture #component #legacy #migration #reuse
- Analyzing the Reuse Potential of Migrating Legacy Components to a Service-Oriented Architecture (GAL, EJM, DBS), pp. 15–23.
- MSR-2006-TsunodaMKKM #developer #using
- Analyzing OSS developers’ working time using mailing lists archives (MT, AM, TK, YK, KiM), pp. 181–182.
- ICGT-2006-BaresiS #alloy #graph transformation #on the
- On the Use of Alloy to Analyze Graph Transformation Systems (LB, PS), pp. 306–320.
- CSCW-2006-AokiSPTWY #multi
- Where’s the “party” in “multi-party”?: analyzing the structure of small-group sociable talk (PMA, MHS, LDP, JDT, AW, WY), pp. 393–402.
- EDOC-2006-MiaoSC #architecture #formal method
- Formalizing and analyzing service oriented software architecture style (HM, JS, XC), pp. 387–390.
- EDOC-2006-MutschlerBR06a #approach #evaluation #perspective #workflow
- An Evaluation Approach for Analyzing Workflow Management Systems from a Value-based Perspective (BM, JB, MR), pp. 477–482.
- ICPR-v1-2006-YinWLB #3d #interactive #using
- Analyzing Facial Expressions Using Intensity-Variant 3D Data For Human Computer Interaction (LY, XW, PL, AB), pp. 1248–1251.
- ICPR-v2-2006-PungprasertyingCK #analysis #approach #learning #migration #performance
- Migration Analysis: An Alternative Approach for Analyzing Learning Performance (PP, RC, BK), pp. 837–840.
- LOPSTR-2006-BagnaraDHMZ #named
- Grids: A Domain for Analyzing the Distribution of Numerical Values (RB, KD, PMH, MM, EZ), pp. 219–235.
- SAC-2006-Wang #case study #domain-specific language #modelling
- Modeling and analyzing applications with domain-specific languages by reflective rewriting: a case study (BYW), pp. 1773–1778.
- SAC-2006-WuH #interactive #mining #network
- Mining and analyzing the topological structure of protein-protein interaction networks (DDW, XH), pp. 185–189.
- ICSE-2006-MoriISI #detection #mobile
- A tool for analyzing and detecting malicious mobile code (AM, TI, TS, TI), pp. 831–834.
- LDTA-2006-LiSWKM #modelling
- Analyzing the Uses of a Software Modeling Tool (XL, DS, JW, SK, DM), pp. 3–18.
- LDTA-2006-ZengME #data flow #domain-specific language #generative
- A Domain-Specific Language for Generating Dataflow Analyzers (JZ, CM, SAE), pp. 103–119.
- LCTES-2006-CoopriderR #abstract domain #embedded
- Pluggable abstract domains for analyzing embedded software (NC, JR), pp. 44–53.
- LCTES-2006-RegehrD #embedded
- Deriving abstract transfer functions for analyzing embedded software (JR, UD), pp. 34–43.
- ICLP-2006-Lam #datalog #question #source code #why
- Why Use Datalog to Analyze Programs? (MSL), p. 1.
- ICLP-2006-SzaboS #prolog #standard
- Improving the ISO Prolog Standard by Analyzing Compliance Test Results (PS, PS), pp. 257–269.
- TestCom-2006-SubramaniamP #protocol #testing
- Analyzing the Impact of Protocol Changes on Tests (MS, ZP), pp. 197–212.
- VMCAI-2006-GhafariT
- Piecewise FIFO Channels Are Analyzable (NG, RJT), pp. 252–266.
- HT-2005-DavisMP #hypermedia
- Analyzing history in hypermedia collections (PD, AM, SP), pp. 171–173.
- HT-2005-ToyodaK #evolution #graph #visualisation #web
- A system for visualizing and analyzing the evolution of the web with a time series of graphs (MT, MK), pp. 151–160.
- ICDAR-2005-ZhangBZ #fuzzy #logic #using
- Using Fuzzy Logic to Analyze Superscript and Subscript Relations in Handwritten Mathematical Expressions (LZ, DB, RZ), pp. 972–976.
- SIGMOD-2005-LiuZWM #database
- A system for analyzing and indexing human-motion databases (GL, JZ, WW, LM), pp. 924–926.
- VLDB-2005-ReddyH #database #diagrams #query
- Analyzing Plan Diagrams of Database Query Optimizers (NR, JRH), pp. 1228–1240.
- ITiCSE-2005-BassL #education #using
- Teaching to analyze solutions using FGA (IB, DL), p. 360.
- ITiCSE-2005-SohSPNL #process
- Analyzing relationships between closed labs and course activities in CS1 (LKS, AS, SP, GN, JL), pp. 183–187.
- ESOP-2005-CousotCFMMMR
- The ASTREÉ Analyzer (PC, RC, JF, LM, AM, DM, XR), pp. 21–30.
- ESOP-2005-MauborgneR #abstract interpretation #clustering
- Trace Partitioning in Abstract Interpretation Based Static Analyzers (LM, XR), pp. 5–20.
- ESOP-2005-Thiemann #javascript #source code #towards #type system
- Towards a Type System for Analyzing JavaScript Programs (PT), pp. 408–422.
- FASE-2005-Martens #process #web #web service
- Analyzing Web Service Based Business Processes (AM), pp. 19–33.
- ICSM-2005-GarridoJ #c #multi
- Analyzing Multiple Configurations of a C Program (AG, REJ), pp. 379–388.
- ICSM-2005-GreevyDG #analysis #evolution #semantics
- Analyzing Feature Traces to Incorporate the Semantics of Change in Software Evolution Analysis (OG, SD, TG), pp. 347–356.
- WCRE-2005-CanforaP #architecture #testing
- Architecting, Analyzing and Testing Service-Oriented Systems (GC, MDP), p. 237.
- SAS-2005-JungKSY #analysis #c #statistics
- Taming False Alarms from a Domain-Unaware C Analyzer by a Bayesian Statistical Post Analysis (YJ, JK, JS, KY), pp. 203–217.
- ICALP-2005-AbadiW #encryption
- Password-Based Encryption Analyzed (MA, BW), pp. 664–676.
- CIKM-2005-HaradaH #order #using
- Order checking in a CPOE using event analyzer (LH, YH), pp. 549–555.
- SIGIR-2005-AslamYP #metric #retrieval
- The maximum entropy method for analyzing retrieval measures (JAA, EY, VP), pp. 27–34.
- RE-2005-BreauxA #semantics
- Analyzing Goal Semantics for Rights, Permissions, and Obligations (TDB, AIA), pp. 177–188.
- SAC-2005-WangPSV #ranking
- Variable selection and ranking for analyzing automobile traffic accident data (HW, ASP, RKS, SVV), pp. 32–37.
- CC-2005-BalakrishnanGRT #bytecode #framework #named
- CodeSurfer/x86 — A Platform for Analyzing x86 Executables (GB, RG, TWR, TT), pp. 250–254.
- CAV-2005-GardeyLMR #named #petri net
- Romeo: A Tool for Analyzing Time Petri Nets (GG, DL, MM, OHR), pp. 418–423.
- SAT-2005-DurairajK #constraints #dependence #performance #satisfiability
- Variable Ordering for Efficient SAT Search by Analyzing Constraint-Variable Dependencies (VD, PK), pp. 415–422.
- ASE-2004-DwyerRTV #interactive #model checking #order
- Analyzing Interaction Orderings with Model Checking (MBD, R, OT, WV), pp. 154–163.
- DATE-v2-2004-LoghiABBZ #communication
- Analyzing On-Chip Communication in a MPSoC Environment (ML, FA, DB, LB, RZ), pp. 752–757.
- DRR-2004-HeDP #documentation #logic
- Hierarchical logical structure extraction of book documents by analyzing tables of contents (FH, XD, LP), pp. 6–13.
- VLDB-2004-SharifzadehSNPR #adaptation #named
- AIDA: an Adaptive Immersive Data Analyzer (MS, CS, BN, FP, AAR), pp. 1369–1372.
- CSMR-2004-PashovRP #architecture #feature model #modelling
- Supporting Architectural Restructuring by Analyzing Feature Models (IP, MR, IP), pp. 25–36.
- PASTE-2004-Martel #assembly #source code #validation
- Validation of assembler programs for DSPs: a static analyzer (MM), pp. 8–13.
- WCRE-2004-GschwindPG #c++ #named
- TUAnalyzer — Analyzing Templates in C++ Code (TG, MP, HG), pp. 48–57.
- CIAA-2004-Ibarra #infinity
- Automata-Theoretic Techniques for Analyzing Infinite-State Systems (OHI), p. 1.
- ICEIS-v4-2004-LohGLBRSAP #chat #library #recommendation #web
- Analyzing Web Chat Messages for Recommending Items from a Digital Library (SL, RSG, DL, TB, RR, GS, LA, TP), pp. 41–48.
- ICEIS-v4-2004-LokeL #behaviour #workflow
- Analyzing Observable Behaviours of Device Ecology Workflows (SWL, SL), pp. 78–83.
- CIKM-2004-ZhangLPY #enterprise #named #taxonomy
- InfoAnalyzer: a computer-aided tool for building enterprise taxonomies (LZ, SL, YP, LY), pp. 477–483.
- ICML-2004-SuD #automation #component #probability
- Automated hierarchical mixtures of probabilistic principal component analyzers (TS, JGD).
- ICPR-v2-2004-WeiXMJS #hybrid
- A Hybrid SOM-SVM Method for Analyzing Zebra Fish Gene Expression (WW, LX, XM, PJ, RS), pp. 323–326.
- ICPR-v2-2004-ZhangN
- Surface Tortuosity and its Application to Analyzing Cracks in Concrete (TZ, GN), pp. 851–854.
- ICPR-v3-2004-MaoSCA #3d
- Constructing Dense Correspondences to Analyze 3D Facial Change (ZM, JPS, WPC, AFA), pp. 144–148.
- SEKE-2004-SetiadiNKM #invariant #java
- Analyzing Invariant Condition of Running Java Program (TES, KN, YK, MM), pp. 350–353.
- GPCE-2004-McDirmidH #aspect-oriented #named #source code
- Splice: Aspects That Analyze Programs (SM, WCH), pp. 19–38.
- ASPLOS-2004-RegehrR #automation #embedded #named
- HOIST: a system for automatically deriving static analyzers for embedded systems (JR, AR), pp. 133–143.
- CC-2004-BalakrishnanR #bytecode #memory management
- Analyzing Memory Accesses in x86 Executables (GB, TWR), pp. 5–23.
- IJCAR-2004-Subramani #integer #quantifier #source code
- Analyzing Selected Quantified Integer Programs (KS), pp. 342–356.
- ITiCSE-2003-Fone #education #performance #using
- Using semiotics to analyze the efficiency of a model in teaching (WF), p. 232.
- FASE-2003-Muccini #branch #detection
- Detecting Implied Scenarios Analyzing Non-local Branching Choices (HM), pp. 372–386.
- IWPC-2003-PinzgerOG #architecture #component #comprehension
- Analyzing and Understanding Architectural Characteristics of COM+ Components (MP, JO, HCG), pp. 54–63.
- WCRE-2003-Clermont #scalability #source code #spreadsheet
- Analyzing Large Spreadsheet Programs (MC), pp. 306–315.
- WCRE-2003-FischerPG #debugging
- Analyzing and Relating Bug Report Data for Feature Tracking (MF, MP, HG), pp. 90–101.
- PLDI-2003-BlanchetCCFMMMR #safety #scalability
- A static analyzer for large safety-critical software (BB, PC, RC, JF, LM, AM, DM, XR), pp. 196–207.
- SAS-2003-BaldanKK #abstraction #graph transformation #logic
- A Logic for Analyzing Abstractions of Graph Transformation Systems (PB, BK, BK), pp. 255–272.
- EDOC-2003-JengSC #architecture #enterprise #process #realtime
- An Agent-based Architecture for Analyzing Business Processes of Real-Time Enterprises (JJJ, JS, HC), pp. 86–97.
- ICEIS-v1-2003-TsengVC #enterprise
- Planning for Enterprise Computing Services: Issues and Necessities Analyzed (JT, EV, TC), pp. 414–420.
- CIKM-2003-HaradaHAKOT
- Event analyzer: a tool for sequential data processing (LH, YH, NA, KK, TO, RT), pp. 172–174.
- KDD-2003-AliK #clustering #divide and conquer #using #web
- Golden Path Analyzer: using divide-and-conquer to cluster Web clickstreams (KA, SPK), pp. 349–358.
- KDD-2003-KoyuturkG #dataset #framework #named
- PROXIMUS: a framework for analyzing very high dimensional discrete-attributed datasets (MK, AG), pp. 147–156.
- KDD-2003-Weigend #behaviour
- Analyzing customer behavior at Amazon.com (ASW), p. 5.
- MLDM-2003-KimJ #network #using
- Using Bayesian Networks to Analyze Medical Data (ICK, YGJ), pp. 317–327.
- SEKE-2003-BarberL #architecture #framework #specification #using
- Specifying and Analyzing Agent Architectures using the Agent Competency Framework (KSB, DNL), pp. 232–239.
- UML-2003-HaugenS #interactive #named #refinement #semantics
- STAIRS — Steps to Analyze Interactions with Refinement Semantics (ØH, KS), pp. 388–402.
- RE-2003-FuxmanLPRM #requirements #specification
- Specifying and Analyzing Early Requirements: Some Experimental Results (AF, LL, MP, MR, JM), p. 105–?.
- ICSE-2003-RobillardM #source code
- FEAT. A Tool for Locating, Describing, and Analyzing Concerns in Source Code (MPR, GCM), pp. 822–823.
- CSL-2003-ChevalierKRTV #bound
- Extending the Dolev-Yao Intruder for Analyzing an Unbounded Number of Sessions (YC, RK, MR, MT, LV), pp. 128–141.
- RTA-2003-KapurNW #algorithm #composition #protocol
- An E-unification Algorithm for Analyzing Protocols That Use Modular Exponentiation (DK, PN, LW), pp. 165–179.
- WICSA-2002-BruinVB #design
- Documenting and Analyzing a Context-Sensitive Design Space (HdB, HvV, ZB), pp. 127–141.
- WICSA-2002-DePrinceH #component #modelling
- Analyzing Commercial Component Models (WDJ, CH), pp. 205–219.
- WICSA-2002-ShiH #architecture #communication #modelling #protocol #using
- Modeling and Analyzing the Software Architecture of a Communication Protocol Using SAM (TS, XH), pp. 63–77.
- ASE-2002-VieiraR #component #dependence #scalability
- Analyzing Dependencies in Large Component-Based Systems (MERV, DJR), pp. 241–244.
- SCAM-J-2001-AntoniolVMP02 #evolution #kernel #linux
- Analyzing cloning evolution in the Linux kernel (GA, UV, EM, MDP), pp. 755–765.
- SAS-2002-Masse #abstract interpretation #semantics
- Semantics for Abstract Interpretation-Based Static Analyzes of Temporal Properties (DM), pp. 428–443.
- ICGT-2002-PadbergE #graph transformation #invariant #safety
- Rule Invariants in Graph Transformation Systems for Analyzing Safety-Critical Systems (JP, BE), pp. 334–350.
- CSCW-2002-BegoleTSY #distributed #visualisation
- Work rhythms: analyzing visualizations of awareness histories of distributed groups (JB, JCT, RBS, NY), pp. 334–343.
- CAiSE-2002-AalstHV #graph #workflow
- An Alternative Way to Analyze Workflow Graphs (WMPvdA, AH, EV), pp. 535–552.
- ICEIS-2002-SanchezSVACD #data mining #mining #using
- Using Data Mining Techniques to Analyze Correspondences between Partitions (DS, JMS, MAVM, VA, JC, GD), pp. 179–186.
- ICPR-v2-2002-GuillametSV #classification #image #matrix
- Analyzing Non-Negative Matrix Factorization for Image Classification (DG, BS, JV), pp. 116–119.
- ICPR-v2-2002-TaoIS
- Extracting Fractal Features for Analyzing Protein Structure (YT, TRI, JCS), pp. 482–485.
- OOPSLA-2002-KhurshidMJ
- An analyzable annotation language (SK, DM, DJ), pp. 231–245.
- POPL-2002-AbadiB #logic programming #protocol #security #source code
- Analyzing security protocols with secrecy types and logic programs (MA, BB), pp. 33–44.
- RE-2002-AntonER #privacy #requirements #taxonomy #using
- Analyzing Website Privacy Requirements Using a Privacy Goal Taxonomy (AIA, JBE, AR), pp. 23–31.
- ICSE-2002-Robillard #representation #source code
- A representation for describing and analyzing concerns in source code (MPR), pp. 721–722.
- VMCAI-2002-Shyamasundar #encryption #framework #protocol
- Analyzing Cryptographic Protocols in a Reactive Framework (RKS), pp. 46–64.
- ASE-2001-GannodG #automation #petri net #using
- An Automated Tool for Analyzing Petri Nets Using SPIN (GCG, SG), pp. 404–407.
- VLDB-2001-AmirKN #database #image
- Analyzing Quantitative Databases: Image is Everything (AA, RK, NSN), pp. 89–98.
- VLDB-2001-AnSVKIG #behaviour #data access #energy
- Analyzing energy behavior of spatial access methods for memory-resident data (NA, AS, NV, MTK, MJI, SG), pp. 411–420.
- ICSM-2001-ONealC #requirements
- Analyzing the Impact of Changing Requirements (JSO, DLC), p. 190–?.
- ICSM-2001-SchauerK #behaviour #metric
- The Method Replacement Indicator: A Metric for Analyzing Behavioral Substitution (RS, RKK), pp. 754–764.
- SAS-2001-BouajjaniCLS #automaton #parametricity
- Analyzing Fair Parametric Extended Automata (AB, ACA, YL, MS), pp. 335–355.
- FME-2001-AlagarX #approach #architecture #e-commerce #modelling
- A Rigorous Approach to Modeling and Analyzing E-Commerce Architectures (VSA, ZX), pp. 173–196.
- AdaEurope-2001-KuchumovRS #ada #library #named #object-oriented
- OASIS — An ASIS Secondary Library for Analyzing Object-Oriented Ada Code (AK, SR, AS), pp. 113–122.
- LSO-2001-LewerentzRS #development #feedback #metric
- A Model for Analyzing Measurement Based Feedback Loops in Software Development Projects (CL, HR, FS), pp. 135–151.
- SEKE-2001-Lopez #analysis #architecture #evaluation #framework #trade-off
- Application of an Evaluation Framework for Analyzing the Architecture Tradeoff Analysis Method (ML), pp. 397–404.
- TOOLS-EUROPE-2001-TranG #corba #scalability #transaction
- Analyzing the Scalability of Transactional CORBA Applications (PT, IG), pp. 102–110.
- ESEC-FSE-2001-EngelsKHG #behaviour #consistency #modelling #object-oriented #specification
- A methodology for specifying and analyzing consistency of object-oriented behavioral models (GE, JMK, RH, LG), pp. 186–195.
- ASE-2000-KhurshidJ #automation #constraints #design
- Exploring the Design of an Intentional Naming Scheme with an Automatic Constraint Analyzer (SK, DJ), pp. 13–22.
- ASE-2000-MartinWTG #kernel
- Formal Construction of the Mathematically Analyzed Separation Kernel (WM, PW, FST, AG), pp. 133–142.
- DATE-2000-RufK #realtime
- Analyzing Real-Time Systems (JR, TK), pp. 243–248.
- ITiCSE-2000-Odekirk #source code #student
- Analyzing student programs (poster session) (EO), p. 191.
- FASE-2000-FradetIR #mobile #non-functional
- Analyzing Non-functional Properties of Mobile Agents (PF, VI, SR), pp. 319–333.
- WRLA-2000-OlveczkyM #hybrid #maude #realtime #simulation
- Real-Time Maude: A Tool for Simulating and Analyzing Real-Time and Hybrid Systems (PCÖ, JM), pp. 361–382.
- CSMR-2000-SystaYM #java #metric #visualisation
- Analyzing Java Software by Combining Metrics and Program Visualization (TS, PY, HAM), pp. 199–208.
- WCRE-2000-CzeranskiEKKS #tool support #using
- Analyzing xfig Using the Bauhaus Tools (JC, TE, HMK, RK, DS), pp. 197–199.
- WCRE-2000-MartinWWM #using
- Analyzing xfig Using the Rigi Tool Suite (JM, KW, BW, HAM), pp. 207–209.
- WCRE-2000-Riediger
- Analyzing XFIG with GUPRO (VR), pp. 194–196.
- CHI-2000-ChiPP #predict #usability #web
- The scent of a site: a system for analyzing and predicting information scent, usage, and usability of a Web site (EHhC, PP, JEP), pp. 161–168.
- CIKM-2000-LawrenceCFPKNKG #persistent #research #web
- Persistence of information on the web: Analyzing citations contained in research articles (SL, FC, GWF, DMP, RK, FÅN, AK, CLG), pp. 235–242.
- CIKM-2000-NigamG #effectiveness
- Analyzing the Effectiveness and Applicability of Co-training (KN, RG), pp. 86–93.
- ICML-2000-GiordanaSSB #framework #learning #relational
- Analyzing Relational Learning in the Phase Transition Framework (AG, LS, MS, MB), pp. 311–318.
- ICML-2000-McLachlanP
- Mixtures of Factor Analyzers (GJM, DP), pp. 599–606.
- ICPR-v4-2000-GuestFPD #aspect-oriented
- Analyzing Constructional Aspects of Figure Completion for the Diagnosis of Visuospatial Neglect (RMG, MCF, JMP, ND), pp. 4316–4319.
- ICPR-v4-2000-NakamuraOO #process
- Structuring Personal Activity Records Based on Attention — Analyzing Videos from Head-Mounted Camera (YN, YO, JO), pp. 4222–4225.
- ICPR-v4-2000-YamadaIN #documentation #image
- A Method of Analyzing the Handling of Paper Documents in Motion Images (KY, KI, NN), pp. 4413–4416.
- SAC-2000-Caraca-ValenteLM #modelling
- Functions, Rules and Models: Three Complementary Techniques for Analyzing Strength Data (JPCV, ILC, CM), pp. 60–64.
- SAC-2000-KohleM #detection
- Analyzing Human Gait Patterns for Malfunction Detection (MK, DM), pp. 41–45.
- SAC-2000-SrinivasaS #behaviour #transaction
- Discerning Behavioral Properties by Analyzing Transaction Logs (SS, MS), pp. 281–282.
- ICSE-2000-JacksonSS #alloy #constraints #named
- Alcoa: the alloy constraint analyzer (DJ, IS, IS), pp. 730–733.
- ICSE-2000-KazmanK #architecture #design #tutorial #using
- Designing and analyzing software architectures using ABASs (tutorial session) (RK, MK), p. 820.
- ICSE-2000-VieiraDR #architecture
- Analyzing software architectures with Argus-I (MERV, MSD, DJR), pp. 758–761.
- HPDC-2000-WuTGLLSHJ #distributed #framework #modelling #named #parallel #performance
- Prophesy: An Infrastructure for Analyzing and Modeling the Performance of Parallel and Distributed Applications (XW, VET, JG, XL, ZL, RLS, MH, IRJ), pp. 302–303.
- ICDAR-1999-HaffnerBHL #documentation #internet #named
- DjVu: Analyzing and Compressing Scanned Documents for Internet Distribution (PH, LB, PGH, YL), pp. 625–628.
- TACAS-1999-GardnerL #probability #realtime
- Analyzing Stochastic Fixed-Priority Real-Time Systems (MKG, JWSL), pp. 44–58.
- ICSM-1999-LiuAQ #behaviour #legacy #modelling #requirements
- Requirements Recovery from Legacy Systems by Analyzing and Modelling Behavior (KL, AA, ZQ), pp. 3–12.
- WCRE-1999-CaprileT #identifier
- Nomen Est Omen: Analyzing the Language of Function Identifiers (BC, PT), pp. 112–122.
- FM-v2-1999-Droschl #data access #requirements #using
- Analyzing the Requirements of an Access Control Using VDMTools and PVS (GD), p. 1870.
- HCI-CCAD-1999-OhyaOUIS #communication #image #towards
- Towards the realization of non-verbal communication — computer vision based technologies for analyzing human images (JO, TO, AU, SI, TS), pp. 172–176.
- HCI-EI-1999-ChenL #development #interface #multi
- Development of an Interface for Computing and Analyzing Multidimensional Perceptual Space (LLC, JWL), pp. 621–625.
- ICEIS-1999-BouneffaBD #source code
- Analyzing the Impact of Schema Change on Application Programs (MB, HB, LD), pp. 37–44.
- TOOLS-USA-1999-MeziniPDB #detection #evolution #java
- Detecting Evolution Incompatibilities by Analyzing Java Binaries (MM, JUP, TD, WB), pp. 126–135.
- ESEC-FSE-1999-RobillardM #exception #java #source code
- Analyzing Exception Flow in Java Programs (MPR, GCM), pp. 322–327.
- ICSE-1999-DangK #mobile #model checking #using
- Using the ASTRAL Model Checker to Analyze Mobile IP (ZD, RAK), pp. 132–142.
- ICSE-1999-Monroe #architecture #modelling
- Modeling and Analyzing software Architectures (RTM), pp. 690–691.
- FASE-1998-AllenDG #architecture #specification
- Specifying and Analyzing Dynamic Software Architectures (RA, RD, DG), pp. 21–37.
- TACAS-1998-ShermanM #automation #named
- Factotum: Automatic and Systematic Sharing Support for Systems Analyzers (DJS, NM), pp. 249–262.
- ICPR-1998-HiranoHOMTE #3d #image
- Three dimensional concentration index-a local feature for analyzing three dimensional digital line patterns and its application to chest X-ray CT images (YH, JiH, HO, YM, JiT, KE), pp. 1040–1043.
- SIGIR-1998-KornfeldW #automation
- Automatically Locating, Extracting and Analyzing Tabular Data (WK, JW), pp. 347–348.
- ICSE-1998-MizunoKITS #estimation #quality
- Analyzing Effects of Cost Estimation Accuracy on Quality and Productivity (OM, TK, KI, YT, KS), pp. 410–419.
- CC-1998-Boyland #attribute grammar #dependence
- Analyzing Direct Non-local Dependencies in Attribute Grammars (JB), pp. 31–49.
- LCTES-1998-KollochF #case study #embedded #network #realtime #specification
- Mapping an Embedded Hard Real-Time Systems SDL Specification to an Analyzable Task Network — A Case Study (TK, GF), pp. 156–165.
- CAV-1998-HeitmeyerKLB #requirements #specification #tool support
- SCR*: A Toolset for Specifying and Analyzing Software Requirements (CLH, JK, BGL, RB), pp. 526–531.
- IWTCS-1998-OgishiIKS #exception #protocol
- Intelligent Protocol Analyzer for WWW Server Accesses with Exception Handling Function (TO, AI, TK, KS), pp. 49–64.
- EDTC-1997-FlottesPR #behaviour #testing
- Analyzing testability from behavioral to RT level (MLF, RP, BR), pp. 158–165.
- ICDAR-1997-MenierL #self
- Lexical Analyzer based on a Self-Organizing Feature Map (GM, GL), pp. 1067–1071.
- SAS-1997-EmelianovB #semantics
- Semantic Analyzer of Modula-Programs (PGE, DEB), pp. 361–363.
- HCI-CC-1997-ItohMGA #behaviour #process
- Analyzing Qualitative Data with SPROT (Structural Process Chart of a Task Oriented Behavior) (MI, YM, SG, TA), pp. 541–544.
- HCI-SEC-1997-RauterbergF #human-computer #interactive #modelling
- An Analyzing and Modelling Tool Kit for Human-Computer Interaction (MR, MF), pp. 589–592.
- HCI-SEC-1997-SawaY #architecture #modelling #simulation
- New Modeling/Analyzing Architecture and Simulation Mechanism for Complex Structure (TS, MY), pp. 363–366.
- KDD-1997-LiuHC #classification #using
- Using General Impressions to Analyze Discovered Classification Rules (BL, WH, SC), pp. 31–36.
- OOPSLA-1997-PriceD #design #object-oriented #reuse
- Analyzing and Measuring Reusability in Object-Oriented Designs (MWP, SAD), pp. 22–33.
- TOOLS-USA-1997-GolubskiP #named #object-oriented
- SOLAT — A Simple Object-Oriented Language Analyzing Tool (WG, BP), p. 99–?.
- RE-1997-HunterN #consistency #specification
- Analyzing Inconsistent Specifications (AH, BN), pp. 78–86.
- SAC-1997-Li97a #execution #parallel #source code
- Analyzing the expected execution times of parallel programs (KL), pp. 488–495.
- ICSE-1997-AvruninCD #realtime
- Analyzing Partially-Implemented Real-Time Systems (GSA, JCC, LKD), pp. 228–238.
- TACAS-1996-MoserM #automaton #probability #realtime
- Probabilistic Duration Automata for Analyzing Real-Time Systems (LEM, PMMS), pp. 369–390.
- SAS-1996-Handjieva #abstract interpretation #named
- STAN: A Static Analyzer for CLP(R) Based on Abstract Interpretation (MH), pp. 383–384.
- SAS-1996-MullerGS96a #named #prolog
- PAN — The Prolog Analyzer (MM, TG, KS), pp. 387–388.
- CSCW-1996-HalversonR #design #distributed #implementation #social #tutorial
- An Introduction to Distributed Cognition: Analyzing the Organizational, the Social and the Cognitive for Designing and Implementing CSCW Applications (Tutorial) (CH, YR), p. 4.
- CSCW-1996-McDanielOM #identification #multi #thread
- Identifying and Analyzing Multiple Threads in Computer-Mediated and Face-to-Face Conversations (SEM, GMO, JCM), pp. 39–47.
- ICPR-1996-Hirayama #image #using
- Analyzing form images by using line-shared-adjacent cell relations (YH), pp. 768–772.
- SAC-1996-MengelA #network #protocol #tutorial
- A network protocol analyzer with tutorial (SM, SA), pp. 115–119.
- ICSE-1996-DuesterwaldGS #data flow #integration #testing
- A Demand-Driven Analyzer for Data Flow Testing at the Integration Level (ED, RG, MLS), pp. 575–584.
- ICSE-1996-DwyerC #architecture #data flow #flexibility
- A Flexible Architecture for Building Data Flow Analyzers (MBD, LAC), pp. 554–564.
- ICSE-1996-LiuY #framework #requirements #specification
- An Analytic Framework for Specifying and Analyzing Imprecise Requirements (XFL, JY), pp. 60–69.
- ASPLOS-1996-ErlichsonNCH #clustering #distributed #memory management #named #performance
- SoftFLASH: Analyzing the Performance of Clustered Distributed Virtual Shared Memory (AE, NN, GC, JLH), pp. 210–220.
- ISSTA-1996-JacksonD #design #detection
- Elements of Style: Analyzing a Software Design Feature with a Counterexample Detector (DJ, CD), pp. 239–249.
- ICDAR-v2-1995-ButlerGST #data flow #diagrams #documentation #logic
- Analyzing the logical structure of data flow diagrams in software documents (GB, PG, RS, IAT), pp. 575–578.
- WCRE-1995-FioreLV #empirical #reverse engineering
- Analyzing Empirical Data from a Reverse Engineering Project (PF, FL, GV).
- PEPM-1995-Colby #communication #concurrent #source code
- Analyzing the Communication Topology of Concurrent Programs (CC), pp. 202–213.
- SAS-1995-AltM #generative #interprocedural #performance
- Generation of Efficient Interprocedural Analyzers with PAG (MA, FM), pp. 33–50.
- SAS-1995-Fecht #generative #named #prolog #specification
- GENA — A Tool for Generating Prolog Analyzers from Specifications (CF), pp. 418–419.
- SAS-1995-NordinLM #data flow #named #prolog
- IGOR: A Tool for Developing Prolog Dataflow Analyzers (MN, TL, HM), pp. 420–421.
- KDD-1995-DjokoCH
- Analyzing the Benefits of Domain Knowledge in Substructure Discovery (SD, DJC, LBH), pp. 75–80.
- ICLP-1995-SahlinS #concurrent #constraints
- An Analyzer for a Concurrent Constraint Language (DS, TS), p. 828.
- LFP-1994-JagannathanW #parallel
- Analyzing Stores and References in a Parallel Symbolic Language (SJ, SW), pp. 294–305.
- KR-1994-Kambhampati #algorithm #framework #refinement
- Refinement Search as a Unifying Framework for Analyzing Planning Algorithms (SK), pp. 329–340.
- POPL-1994-MarriottBH #logic programming #scheduling #source code
- Analyzing Logic Programs with Dynamic Scheduling (KM, MJGdlB, MVH), pp. 240–253.
- ICSE-1994-KazmanBWA #architecture #named
- SAAM: A Method for Analyzing the Properties of Software Architectures (RK, LJB, MW, GDA), pp. 81–90.
- ISSTA-1994-Kapur #automation #equation #specification
- An Automated Tool for Analyzing Completeness of Equational Specifications (DK), pp. 28–43.
- ISSTA-1994-MurrillM #approach #fault #semantics #using
- An Experimental Approach to Analyzing Software Semantics Using Error Flow Information (Abstract) (BWM, LJM), p. 200.
- HCI-ACS-1993-SuzukiH #effectiveness #on the #variability
- On a Simple and Effective Method to Analyze Heart Rate Variability (KS, YH), pp. 914–919.
- TRI-Ada-1993-CommonsG #architecture #reuse
- A Model for Analyzing Megaprogramming, Reuse and Domain Specific Software Architectures (JCC, MG), pp. 58–64.
- TRI-Ada-1993-LeifSBKLD #ada #development
- The Development of Software in the Ada Language for a Mid-Range Hematology Analyzer (RCL, JS, IB, MK, SBL, TD), pp. 340–346.
- SEKE-1993-Porter #classification #component #predict
- Developing and Analyzing Classification Rules for Predicting Faulty Software Components (AAP), pp. 453–461.
- OOPSLA-1993-BrueggeGL #framework
- A Framework for Dynamic Program Analyzers (BB, TG, BL), pp. 65–82.
- RE-1993-Lutz #embedded #fault #requirements #safety
- Analyzing software requirements errors in safety-critical, embedded systems (RRL), pp. 126–133.
- SAC-1993-Yaung #process
- A Linkage Analyzer for Process Management (ATY), pp. 215–221.
- ISSTA-1993-AtleeG #requirements
- Analyzing Timing Requirements (JMA, JDG), pp. 117–127.
- ISSTA-1993-FelderGP #specification
- Analyzing Refinements of State Based Specifications: The Case of TB Nets (MF, CG, MP), pp. 28–39.
- DAC-1992-LinLE
- Analyzing Cycle Stealing on Synchronous Circuits with Level-Sensitive Latches (IL, JAL, KE), pp. 393–398.
- PLDI-1992-DhamdhereRZ #how #scalability #source code
- How to Analyze Large Programs Efficiently and Informatively (DMD, BKR, FKZ), pp. 212–223.
- ICSE-1992-Devanbu #independence #named
- GENOA: A Customizable Language- and Front-End Independent Code Analyzer (PTD), pp. 307–317.
- AdaEurope-1991-ChengU #ada #petri net #using
- Analyzing Ada Tasking Deadlocks and Livelocks Using Extended Petri Nets (JC, KU), pp. 125–146.
- GG-1990-Wanke #graph grammar #named #tool support
- PLEXUS: Tools for Analyzing Graph Grammars (EW), pp. 68–69.
- CAV-1990-BuyM #liveness #proving
- A Proof Lattice-Based Technique for Analyzing Liveness of Resource Controllers (UAB, RM), pp. 292–301.
- ML-1989-Chien #learning
- Learning by Analyzing Fortuitous Occurrences (SAC), pp. 249–251.
- ML-1989-Rendell #induction
- Comparing Systems and analyzing Functions to Improve Constructive Induction (LAR), pp. 461–464.
- TAV-1989-OlenderO #constraints #named
- Cesar: A Static Sequencing Constraint Analyzer (KMO, LJO), pp. 66–74.
- DAC-1988-Cherry #named
- Pearl: A CMOS Timing Analyzer (JJC), pp. 148–153.
- DAC-1988-StarkH #network #power management #using
- Analyzing CMOS Power Supply Networks Using Ariel (DS, MH), pp. 460–464.
- JICSCP-1988-Hemmendinger88 #compilation #semantics
- A Compiler and Semantic Analyzer Based on Categorial Grammar (DH), pp. 1474–1489.
- DAC-1987-CanrightH #logic
- Reflections of High Speed Signals Analyzed as a Delay in Timing for Clocked Logic (REC, ARH), pp. 133–139.
- HCI-CE-1987-Williges87a #human-computer #interface
- Analyzing Human-Computer Dialogue Interfaces (BHW), pp. 67–74.
- ESEC-1987-Selby #design #reuse
- Analyzing Software Reuse at the Project and Module Design Levels (RWS), pp. 212–220.
- POPL-1985-Cooper #alias #parametricity
- Analyzing Aliases of Reference Formal Parameters (KDC), pp. 281–290.
- ICSE-1985-RamseyB #process #testing #using
- Analyzing the Test Process Using Structural Coverage (JR, VRB), pp. 306–312.
- ICSE-1985-StavelyBOT #concurrent #design #tool support
- A Collection of Software Tools for Analyzing Design of Concurrent Software Systems (AMS, DCB, SPO, GBT), pp. 111–118.
- SCC-1984-FraserMW #assembly
- Analyzing and compressing assembly code (CWF, EWM, ALW), pp. 117–121.
- SCC-1982-ChowR #data flow #design
- The Design of a Data Flow Analyzer (ALC, AR), pp. 106–113.
- SCC-1982-MorganR #code generation
- Analyzing Exotic Instructions for a Retargetable Code Generator (TMM, LAR), pp. 197–204.
- ICALP-1982-GuttagKM #term rewriting #tool support
- Derived Pairs, Overlap Closures, and Rewrite Dominoes: New Tools for Analyzing Term rewriting Systems (JVG, DK, DRM), pp. 300–312.
- ICSE-1978-BasiliRZ #development
- Analyzing Medium-Scale Software Development (VRB, MVZ), pp. 116–123.
- VLDB-1975-Hackathorn #database #empirical #process #scalability #transaction
- Analyzing Transaction Activity to a Large Data Base: An Empirical Study (RDH), pp. 502–504.
- POPL-1975-JonesM #source code
- Even Simple Programs are Hard to Analyze (NDJ, SSM), pp. 106–118.
- DAC-1971-Bening #fault #logic #maintenance
- Application of a logic fault analyzer to the manufacture and maintenance of the CONTROL DATA 7600 computer (LCBJ), pp. 231–235.
- DAC-1971-Veit #named
- Analyze — Compose — Display computer aided space planning (FSV), pp. 180–192.