1104 papers:
- CBSE-2015-MouelhiACM #behaviour #component #contract #design #object-oriented #using
- Object-Oriented Component-Based Design using Behavioral Contracts: Application to Railway Systems (SM, KA, SC, HM), pp. 49–58.
- CASE-2015-CarmenateRLBM #analysis #approach #behaviour #energy #modelling #using
- Modeling and analyzing occupant behaviors in building energy analysis using an information space approach (TC, MMR, DL, LB, AM), pp. 425–431.
- CASE-2015-NohAH #assessment #behaviour
- Situation assessment and behavior decision for vehicle/driver cooperative driving in highway environments (SN, KA, WH), pp. 626–633.
- CASE-2015-ParisACAR #behaviour #learning #markov #smarttech #using
- Using Hidden Semi-Markov Model for learning behavior in smarthomes (AP, SA, NC, AEA, NR), pp. 752–757.
- DAC-2015-HuangCZL #behaviour #named #realtime #scheduling
- PASS: priority assignment of real-time tasks with dynamic suspending behavior under fixed-priority scheduling (WHH, JJC, HZ, CL), p. 6.
- DAC-2015-McLaughlin #behaviour #policy
- Blocking unsafe behaviors in control systems through static and dynamic policy enforcement (SM), p. 6.
- DAC-2015-YoonSMC #behaviour #detection #embedded #heatmap #memory management #realtime #using
- Memory heat map: anomaly detection in real-time embedded systems using memory behavior (MKY, LS, SM, JC), p. 6.
- DATE-2015-DuqueDY #adaptation #behaviour #fault #reliability #runtime
- Improving MPSoC reliability through adapting runtime task schedule based on time-correlated fault behavior (LARD, JMMD, CY), pp. 818–823.
- HT-2015-GadirajuSFK #behaviour #categorisation #comprehension
- Breaking Bad: Understanding Behavior of Crowd Workers in Categorization Microtasks (UG, PS, BF, RK), pp. 33–38.
- ESOP-2015-Penninckx0P #behaviour #composition #source code #verification
- Sound, Modular and Compositional Verification of the Input/Output Behavior of Programs (WP, BJ, FP), pp. 158–182.
- ICSME-2015-BiegelLD #behaviour #java
- Live object exploration: Observing and manipulating behavior and state of Java objects (BB, BL, SD), pp. 581–585.
- ICSME-2015-LuciaDGR #automation #behaviour #design pattern #detection #dynamic analysis #towards
- Towards automating dynamic analysis for behavioral design pattern detection (ADL, VD, CG, MR), pp. 161–170.
- ICSME-2015-LuciaDGRP #behaviour #design pattern #detection #named
- ePadEvo: A tool for the detection of behavioral design patterns (ADL, VD, CG, MR, CP), pp. 327–329.
- MSR-2015-AhmedSH #behaviour #development #empirical
- An Empirical Study of the Copy and Paste Behavior during Development (TMA, WS, AEH), pp. 99–110.
- MSR-2015-Marder #approach #behaviour #stack overflow
- Stack Overflow Badges and User Behavior: An Econometric Approach (AM), pp. 450–453.
- FM-2015-Hauck-Stattelmann #behaviour #industrial
- Analyzing the Restart Behavior of Industrial Control Applications (SHS, SB, BS, SK, RJ), pp. 585–588.
- FM-2015-Nakajima #behaviour #energy #maude #realtime #using
- Using Real-Time Maude to Model Check Energy Consumption Behavior (SN), pp. 378–394.
- CHI-2015-AhmedHCCK #behaviour #people #privacy #visual notation
- Privacy Concerns and Behaviors of People with Visual Impairments (TA, RH, KC, DJC, AK), pp. 3523–3532.
- CHI-2015-ChangLKS #behaviour #comprehension #gesture #mobile #scalability
- Understanding Users’ Touch Behavior on Large Mobile Touch-Screens and Assisted Targeting by Tilting Gesture (YC, SL, KK, JS), pp. 1499–1508.
- CHI-2015-ChenBBOH #behaviour #interactive
- The Emergence of Interactive Behavior: A Model of Rational Menu Search (XC, GB, DPB, AO, AH), pp. 4217–4226.
- CHI-2015-EgelmanP #behaviour #scalability #security
- Scaling the Security Wall: Developing a Security Behavior Intentions Scale (SeBIS) (SE, EP), pp. 2873–2882.
- CHI-2015-GadirajuKDD #behaviour #comprehension #crowdsourcing #online
- Understanding Malicious Behavior in Crowdsourcing Platforms: The Case of Online Surveys (UG, RK, SD, GD), pp. 1631–1640.
- CHI-2015-GunaratneN #behaviour #performance #user interface #using
- Informing and Improving Retirement Saving Performance using Behavioral Economics Theory-driven User Interfaces (JG, ON), pp. 917–920.
- CHI-2015-HollisKW #behaviour
- Change of Heart: Emotion Tracking to Promote Behavior Change (VH, AK, SW), pp. 2643–2652.
- CHI-2015-JungSGS #behaviour #experience #nondeterminism
- Displayed Uncertainty Improves Driving Experience and Behavior: The Case of Range Anxiety in an Electric Car (MFJ, DS, TMG, MS), pp. 2201–2210.
- CHI-2015-KwakBH #behaviour #contest #game studies #online
- Exploring Cyberbullying and Other Toxic Behavior in Team Competition Online Games (HK, JB, SH), pp. 3739–3748.
- CHI-2015-LaseckiGLLBD #behaviour #crowdsourcing #privacy #trade-off #video
- Exploring Privacy and Accuracy Trade-Offs in Crowdsourced Behavioral Video Coding (WSL, MG, WL, EL, JPB, SPD), pp. 1945–1954.
- CHI-2015-ParkOSJC #behaviour #image #scalability #web
- A Large-Scale Study of User Image Search Behavior on the Web (JYP, NO, RS, AJ, CWC), pp. 985–994.
- CHI-2015-RedaJPL #behaviour #visual notation
- Effects of Display Size and Resolution on User Behavior and Insight Acquisition in Visual Exploration (KR, AEJ, MEP, JL), pp. 2759–2768.
- CHI-2015-ShayBCCFKMMSU #behaviour #feedback
- A Spoonful of Sugar?: The Impact of Guidance and Feedback on Password-Creation Behavior (RS, LB, NC, LFC, AF, SK, MLM, WM, SMS, BU), pp. 2903–2912.
- CHI-2015-YanHC #behaviour
- Masters of Control: Behavioral Patterns of Simultaneous Unit Group Manipulation in StarCraft 2 (EQY, JH, GKC), pp. 3711–3720.
- CSCW-2015-Erete #behaviour #communication #how #online
- Engaging Around Neighborhood Issues: How Online Communication Affects Offline Behavior (SLE), pp. 1590–1601.
- CSCW-2015-JiaWXRC #behaviour #learning #online #privacy #process
- Risk-taking as a Learning Process for Shaping Teen’s Online Information Privacy Behaviors (HJ, PJW, HX, MBR, JMC), pp. 583–599.
- CSCW-2015-LeeL #behaviour #comprehension #health #multi #social
- Understanding the Roles and Influences of Mediators from Multiple Social Channels for Health Behavior Change (YL, YKL), pp. 1070–1079.
- CSCW-2015-MaddockSASOM #behaviour #multi #online #using
- Characterizing Online Rumoring Behavior Using Multi-Dimensional Signatures (JM, KS, HJAH, DES, MO, RMM), pp. 228–241.
- CSCW-2015-MarlowD #behaviour #process #visualisation
- The Effects of Visualizing Activity History on Attitudes and Behaviors in a Peer Production Context (JM, LAD), pp. 757–764.
- CSCW-2015-SleeperACKMS #behaviour #network #social
- I Would Like To..., I Shouldn’t..., I Wish I...: Exploring Behavior-Change Goals for Social Networking Sites (MS, AA, LFC, PGK, SAM, NMS), pp. 1058–1069.
- CSCW-2015-WisniewskiJXRC #behaviour #how #privacy #quote #social #social media
- “Preventative” vs. “Reactive”: How Parental Mediation Influences Teens’ Social Media Privacy Behaviors (PJW, HJ, HX, MBR, JMC), pp. 302–316.
- CSCW-2015-ZhengRSC #behaviour #comprehension #motivation #student
- Understanding Student Motivation, Behaviors and Perceptions in MOOCs (SZ, MBR, PCS, JMC), pp. 1882–1895.
- CSCW-2015-ZouMP #behaviour
- Strategic Voting Behavior in Doodle Polls (JYZ, RM, DCP), pp. 464–472.
- DHM-EH-2015-LiaoYGOH #behaviour #gesture
- Effect of Care Gesture on Transfer Care Behavior in Elderly Nursing Home in Japan (ML, TY, AG, TO, HH), pp. 174–183.
- DHM-EH-2015-ZhengBISEL #behaviour #monitoring #using
- Driving-Behavior Monitoring Using an Unmanned Aircraft System (UAS) (CZ, AB, WI, IS, EE, KL), pp. 305–312.
- DHM-HM-2015-ShodaYSS #analysis #behaviour #how #people
- Exploring How People Collaborate with a Stranger: — Analyses of Verbal and Nonverbal Behaviors in Abstract Art Reproduction (HS, TY, NS, MS), pp. 379–388.
- DUXU-DD-2015-ChenXNWZS #behaviour #research #semantics
- Semantic Research of Military Icons Based on Behavioral Experiments and Eye-Tracking Experiments (XJC, CX, YN, HW, JZ, JS), pp. 24–31.
- DUXU-DD-2015-FloraB #behaviour #energy #reduction
- Motivators of Energy Reduction Behavioral Intentions: Influences of Technology, Personality Characteristics, Perceptions, and Behavior Barriers (JAF, BB), pp. 436–446.
- DUXU-DD-2015-Marcus #behaviour #mobile #persuasion
- The Marriage Machine: Mobile Persuasion/Behavior Change (AM), pp. 513–523.
- DUXU-IXD-2015-GoncalvesQ #automation #behaviour #case study #interactive
- Drivers and Automation: A Study About Cultural and Behavioral Influence in the Interaction with Driver Assistants (RCG, MQ), pp. 462–472.
- DUXU-IXD-2015-GuYWD #behaviour #design #interactive #network #social #visualisation
- Visualizing Group User Behaviors for Social Network Interaction Design Iteration (ZG, JMY, ZW, ZD), pp. 36–45.
- HCI-DE-2015-Semnani-AzadN #automation #behaviour
- Automatic Interpretation of Negotiators’ Affect and Involvement Based on Their Non-verbal Behavior (ZSA, EN), pp. 520–529.
- HCI-IT-2015-TakedaBSO #behaviour #coordination #named
- COLUMN: Discovering the User Invented Behaviors Through the Interpersonal Coordination (YT, SB, PRSDS, MO), pp. 787–796.
- HIMI-IKC-2015-KosakaN #behaviour #education
- Education Method for Safe Bicycle Riding to Evaluate Actual Cycling Behaviors When Entering an Intersection (HK, MN), pp. 225–232.
- HIMI-IKC-2015-ZhouI #adaptation #behaviour
- Effect of Adaptive Caution on Driver’s Lane-Change Behavior under Cognitively Distracted Condition (HZ, MI), pp. 262–271.
- HIMI-IKD-2015-FujinawaSINHTH #behaviour #induction
- Induction of Human Behavior by Presentation of Environmental Acoustics (EF, SS, MI, TN, OH, TT, MH), pp. 582–594.
- HIMI-IKD-2015-IchiharaHIK #behaviour #metric
- Presentation Method of Walking Sensation Based on Walking Behavior Measurement with Inertial Sensors and Pressure Sensors (KI, KH, YI, MK), pp. 374–385.
- HIMI-IKD-2015-SuzukiNSTH #artificial reality #behaviour #using
- Changing Drinking Behavior and Beverage Consumption Using Augmented Reality (ES, TN, SS, TT, MH), pp. 648–660.
- ICEIS-v1-2015-FolinoGP #behaviour #modelling #on the #process
- On the Discovery of Explainable and Accurate Behavioral Models for Complex Lowly-structured Business Processes (FF, MG, LP), pp. 206–217.
- ECIR-2015-CaoC #analysis #behaviour #detection #social #social media
- Detecting Spam URLs in Social Media via Behavioral Analysis (CC, JC), pp. 703–714.
- ECIR-2015-RavariMGCR #behaviour #mobile
- User Behavior in Location Search on Mobile Devices (YNR, IM, AG, MC, MdR), pp. 728–733.
- KDD-2015-BeutelAF #behaviour #detection #graph #modelling #predict
- Graph-Based User Behavior Modeling: From Prediction to Fraud Detection (AB, LA, CF), pp. 2309–2310.
- RecSys-2015-Geuens #behaviour #hybrid #recommendation
- Factorization Machines for Hybrid Recommendation Systems Based on Behavioral, Product, and Customer Data (SG), pp. 379–382.
- SEKE-2015-LacherWFPNM #behaviour #empirical #metric
- A Behavior Marker tool for measurement of the Non-Technical Skills of Software Professionals: An Empirical Investigation (LLL, GSW, FF, MP, KEN, JM), pp. 409–414.
- SIGIR-2015-ClarkeSY #behaviour #effectiveness #evaluation #information retrieval #modelling
- IR Evaluation: Modeling User Behavior for Measuring Effectiveness (CLAC, MDS, EY), pp. 1117–1120.
- SIGIR-2015-KellyA #behaviour #case study #experience #how #user interface
- How many results per page?: A Study of SERP Size, Search Behavior and User Experience (DK, LA), pp. 183–192.
- SIGIR-2015-Kiseleva #behaviour #information management #using
- Using Contextual Information to Understand Searching and Browsing Behavior (JK), p. 1059.
- SIGIR-2015-LiDDCZB #behaviour #markov #process #query
- Analyzing User’s Sequential Behavior in Query Auto-Completion via Markov Processes (LL, HD, AD, YC, HZ, RABY), pp. 123–132.
- SIGIR-2015-LiKF #behaviour #matrix #predict
- Predicting User Behavior in Display Advertising via Dynamic Collective Matrix Factorization (SL, JK, YF), pp. 875–878.
- SIGIR-2015-WangLWZNM #behaviour #modelling
- Incorporating Non-sequential Behavior into Click Models (CW, YL, MW, KZ, JYN, SM), pp. 283–292.
- AMT-2015-DyckGLSG #automation #behaviour #model transformation #towards #verification
- Towards the Automatic Verification of Behavior Preservation at the Transformation Level for Operational Model Transformations (JD, HG, LL, SS, SG), pp. 36–45.
- MoDELS-2015-LarsenDCM #behaviour #coordination
- A Behavioral Coordination Operator Language (BCOoL) (MEVL, JD, BC, FM), pp. 186–195.
- MoDELS-2015-PrzigodaHWPD #behaviour #concurrent #modelling #ocl #uml
- Checking concurrent behavior in UML/OCL models (NP, CH, RW, JP, RD), pp. 176–185.
- GPCE-2015-RingertRW #behaviour #code generation #tool support
- Composing code generators for C&C ADLs with Application-specific behavior languages (tool demonstration) (JOR, BR, AW), pp. 113–116.
- SAC-2015-0001RMW #approach #behaviour #constraints #process
- Matching of events and activities: an approach based on behavioral constraint satisfaction (TB, ARS, JM, MW), pp. 1225–1230.
- SAC-2015-FonooniH #behaviour #on the #visual notation
- On the similarities between control based and behavior based visual servoing (BF, TH), pp. 320–326.
- SAC-2015-JoshiSIY #architecture #behaviour #design #embedded #functional #modelling
- Mapping functional behavior onto architectural model in a model driven embedded system design (PJ, SKS, JPT, HY), pp. 1624–1630.
- SAC-2015-PaivaBSIJ #behaviour #learning #recommendation #student
- Improving pedagogical recommendations by classifying students according to their interactional behavior in a gamified learning environment (ROAP, IIB, APdS, SI, PAJ), pp. 233–238.
- SAC-2015-RajtmajerGMS #behaviour #game studies #network #online #social
- An evolutionary game model for the spread of non-cooperative behavior in online social networks (SMR, CG, DM, ACS), pp. 1154–1159.
- SAC-2015-RodriguesBM #approach #behaviour #clustering #correlation #energy #using
- Using fractal clustering to explore behavioral correlation: a new approach to reduce energy consumption in WSN (FR, AB, JEBM), pp. 589–591.
- SAC-2015-TambeN #behaviour #game studies #modelling #resource management #robust #security
- Robust resource allocation in security games and ensemble modeling of adversary behavior (AT, TN), pp. 277–282.
- SAC-2015-VilelaCPSCL #behaviour #modelling
- Deriving the behavior of context-sensitive systems from contextual goal models (JV, JBdC, JP, MS, PC, ML), pp. 1397–1400.
- ESEC-FSE-2015-BusanyM #analysis #behaviour #statistics
- Behavioral log analysis with statistical guarantees (NB, SM), pp. 898–901.
- ICSE-v1-2015-YangXALXE #behaviour #mobile #named #using
- AppContext: Differentiating Malicious and Benign Mobile App Behaviors Using Context (WY, XX, BA, SL, TX, WE), pp. 303–313.
- ICSE-v2-2015-BaoLXWZ #behaviour #developer #interactive #modelling #named #using #video
- scvRipper: Video Scraping Tool for Modeling Developers’ Behavior Using Interaction Data (LB, JL, ZX, XW, BZ), pp. 673–676.
- ICSE-v2-2015-RajanNL0 #behaviour #repository #scalability #specification
- Inferring Behavioral Specifications from Large-scale Repositories by Leveraging Collective Intelligence (HR, TNN, GTL, RD), pp. 579–582.
- ICSE-v2-2015-Salgado #behaviour #cpu #gpu #interactive #kernel #profiling
- Profiling Kernels Behavior to Improve CPU / GPU Interactions (RS), pp. 754–756.
- SPLC-2015-RumpeSWRM #behaviour #evolution #maintenance #modelling #product line
- Behavioral compatibility of simulink models for product line maintenance and evolution (BR, CS, MvW, JOR, PM), pp. 141–150.
- HPCA-2015-AroraMPJT #behaviour #benchmark #comprehension #cpu #gpu #metric #power management
- Understanding idle behavior and power gating mechanisms in the context of modern benchmarks on CPU-GPU Integrated systems (MA, SM, IP, NJ, DMT), pp. 366–377.
- HPDC-2015-LuuWGRCHPBY #behaviour #multi
- A Multiplatform Study of I/O Behavior on Petascale Supercomputers (HL, MW, WG, RBR, PHC, KH, P, SB, YY), pp. 33–44.
- HPDC-2015-YangC #behaviour #benchmark #comprehension #graph #metric #robust
- Understanding Graph Computation Behavior to Enable Robust Benchmarking (FY, AAC), pp. 173–178.
- ISMM-2015-LinWBHN #behaviour #comprehension
- Stop and go: understanding yieldpoint behavior (YL, KW, SMB, ALH, MN), pp. 70–80.
- ISSTA-2015-XueWLXSC #behaviour #classification #detection #javascript #modelling
- Detection and classification of malicious JavaScript via attack behavior modelling (YX, JW, YL, HX, JS, MC), pp. 48–59.
- TAP-2015-AichernigNT #behaviour #generative #incremental #modelling #scalability #testing
- Scalable Incremental Test-case Generation from Large Behavior Models (BKA, DN, ST), pp. 1–18.
- ASE-2014-AhmedNWS #behaviour #formal method #integration
- Formalisation of the integration of behavior trees (KA, MAHN, LW, AS), pp. 779–784.
- ASE-2014-OhmannHFHPBB #behaviour #model inference #resource management
- Behavioral resource-aware model inference (TO, MH, SF, AH, MP, IB, YB), pp. 19–30.
- CASE-2014-ChangYLC #behaviour #mining #towards #video
- Toward mining anomalous behavior from big moving trajectories in surveillance video (CWC, MHY, CCL, KTC), pp. 1121–1126.
- CASE-2014-ChenGGLCL #analysis #approach #behaviour #scheduling
- A residential load scheduling approach based on load behavior analysis (SC, FG, XG, TL, YC, YL), pp. 954–959.
- CASE-2014-HungCYDYW #behaviour #data mining #mining
- Data mining for analysing kiosk usage behavior patterns (YSH, KLBC, CTY, GFD, YHY, NCW), pp. 1115–1120.
- CASE-2014-NodaMNKOI #behaviour #maintenance #online #predict
- Online maintaining behavior of high-load and unstable postures based on whole-body load balancing strategy with thermal prediction (SN, MM, SN, YK, KO, MI), pp. 1166–1171.
- CASE-2014-WangGWG #analysis #behaviour #generative #multi
- Analysis of multi-location PEV charging behaviors based on trip chain generation (DW, XG, JW, JG), pp. 151–156.
- DAC-2014-YangHCLRX #behaviour #certification #framework #scalability #synthesis
- Scalable Certification Framework for Behavioral Synthesis Front-End (ZY, KH, KC, LL, SR, FX), p. 6.
- DATE-2014-HaoRX #behaviour #equivalence #pipes and filters #synthesis
- Equivalence checking for function pipelining in behavioral synthesis (KH, SR, FX), pp. 1–6.
- DATE-2014-NepalLBR #approximate #automation #behaviour #named #synthesis
- ABACUS: A technique for automated behavioral synthesis of approximate computing circuits (KN, YL, RIB, SR), pp. 1–6.
- HT-2014-KumarHL #approach #behaviour #identification #twitter
- A behavior analytics approach to identifying tweets from crisis regions (SK, XH, HL), pp. 255–260.
- HT-2014-LehmannMLLK #behaviour #wiki
- Reader preferences and behavior on Wikipedia (JL, CMB, DL, ML, AK), pp. 88–97.
- SIGMOD-2014-LiuWZZK #behaviour #modelling #named #scalability #social
- HYDRA: large-scale social identity linkage via heterogeneous behavior modeling (SL, SW, FZ, JZ, RK), pp. 51–62.
- SIGMOD-2014-YinCCHH #behaviour #modelling #social #social media
- A temporal context-aware model for user behavior modeling in social media systems (HY, BC, LC, ZH, ZH), pp. 1543–1554.
- VLDB-2015-ZhangWWY14 #behaviour #predict #social
- Inferring Continuous Dynamic Social Influence and Personal Preference for Temporal Behavior Prediction (JZ, CW, JW, JXY), pp. 269–280.
- ITiCSE-2014-SchmolitzkyG
- Guess my object: an “objects first” game on objects’ behavior and implementation with bluej (AS, TG), pp. 219–224.
- CSMR-WCRE-2014-XiaFLCW #behaviour #learning #multi #towards
- Towards more accurate multi-label software behavior learning (XX, YF, DL, ZC, XW), pp. 134–143.
- ICPC-2014-NoughiMMC #behaviour #comprehension #database #source code
- Understanding the database manipulation behavior of programs (NN, MM, LM, AC), pp. 64–67.
- ICSME-2014-CachoBAPGCSCFG #behaviour #c# #case study #exception #how #java
- How Does Exception Handling Behavior Evolve? An Exploratory Study in Java and C# Applications (NC, EAB, JA, FP, AFG, TC, ES, AC, TF, IG), pp. 31–40.
- ICSME-2014-KhanIA #approach #behaviour #heuristic #state machine #uml
- A Heuristic-Based Approach to Refactor Crosscutting Behaviors in UML State Machines (MUK, MZI, SA), pp. 557–560.
- AFL-2014-BerglundDM #backtracking #behaviour #regular expression
- Analyzing Catastrophic Backtracking Behavior in Practical Regular Expression Matching (MB, FD, BvdM), pp. 109–123.
- IFM-2014-MellerGY #behaviour #uml #verification
- Verifying Behavioral UML Systems via CEGAR (YM, OG, KY), pp. 139–154.
- ICFP-2014-Findler #behaviour #contract
- Behavioral software contracts (RBF), pp. 137–138.
- CHI-2014-AthukoralaLKJOTJ #behaviour #how #mobile
- How carat affects user behavior: implications for mobile battery awareness applications (KA, EL, MvK, AJ, AJO, ST, GJ), pp. 1029–1038.
- CHI-2014-BrumbyCCF #behaviour #how #question #visual notation #what
- How does knowing what you are looking for change visual search behavior? (DPB, ALC, JC, BF), pp. 3895–3898.
- CHI-2014-HongMD #behaviour #framework
- A smartphone-based sensing platform to model aggressive driving behaviors (JHH, BM, AKD), pp. 4047–4056.
- CHI-2014-HydeKHC #behaviour #elicitation #people #video
- Conversing with children: cartoon and video people elicit similar conversational behaviors (JH, SBK, JKH, EJC), pp. 1787–1796.
- CHI-2014-KobsaKL #behaviour #personalisation #privacy
- Let’s do it at my place instead?: attitudinal and behavioral study of privacy in client-side personalization (AK, BPK, BL), pp. 81–90.
- CHI-2014-ReitbergerSF #behaviour #named
- Nutriflect: reflecting collective shopping behavior and nutrition (WR, WS, GF), pp. 3309–3318.
- CHI-2014-SchildLM #3d #behaviour #design #game studies #using #video
- Altering gameplay behavior using stereoscopic 3D vision-based video game design (JS, JJLJ, MM), pp. 207–216.
- CHI-2014-TanNTNTEW #behaviour #developer #smarttech
- The effect of developer-specified explanations for permission requests on smartphone user behavior (JT, KN, MT, HNA, CT, SE, DW), pp. 91–100.
- CSCW-2014-MejovaGWD #behaviour #comprehension #email
- Giving is caring: understanding donation behavior through email (YM, VRKG, IW, MCD), pp. 1297–1307.
- DHM-2014-LiuTZSLSF #assessment #behaviour #framework #modelling #named #performance
- COMPAss: A Space Cognitive Behavior Modeling and Performance Assessment Platform (YL, ZT, YZ, QS, JL, JS, FF), pp. 630–636.
- DHM-2014-YamadaOFYGKH #behaviour #music #performance #visual notation
- Visual Behavior in a Japanese Drum Performance of Gion Festival Music (KY, MO, TF, HY, AG, NK, HH), pp. 301–310.
- DUXU-DI-2014-Marcus #behaviour #mobile
- The Happiness Machine: Mobile Behavior Change (AM), pp. 258–268.
- DUXU-DP-2014-MiddenH #behaviour #energy #feedback #power of
- The Power of Negative Feedback from an Artificial Agent to Promote Energy Saving Behavior (CJHM, JRCH), pp. 328–338.
- DUXU-ELAS-2014-Abbas #behaviour #case study #challenge #implementation
- Challenges in Implementation of TVM (Ticket Vending Machine) in Developing Countries for Mass Transport System: A Study of Human Behavior while Interacting with Ticket Vending Machine-TVM (MA), pp. 245–254.
- DUXU-ELAS-2014-DesouzartFMM #behaviour #interactive
- Human-Bed Interaction: A Methodology and Tool to Measure Postural Behavior during Sleep of the Air Force Military (GD, EF, FM, RM), pp. 662–674.
- DUXU-ELAS-2014-FloraB #behaviour #energy #feedback #graph
- Energy Graph Feedback: Attention, Cognition and Behavior Intentions (JAF, BB), pp. 520–529.
- DUXU-TMT-2014-CoventryBJM #behaviour #named #security
- SCENE: A Structured Means for Creating and Evaluating Behavioral Nudges in a Cyber Security Environment (LMC, PB, DJ, APAvM), pp. 229–239.
- DUXU-TMT-2014-DoneyEF #behaviour #framework
- Keeping Creative Writing on Track: Co-designing a Framework to Support Behavior Change (PD, RE, MF), pp. 631–642.
- HCI-AIMT-2014-SantosCMJ #behaviour #case study #interactive
- Behavioral Persona for Human-Robot Interaction: A Study Based on Pet Robot (TFdS, DGdC, AAM, PTAJ), pp. 687–696.
- HCI-TMT-2014-CafezeiroGCM #behaviour #collaboration #interactive #roadmap
- A Knowledge-Construction Perspective on Human Computing, Collaborative Behavior and New Trends in System Interactions (IC, CG, VC, IdCM), pp. 58–68.
- HIMI-AS-2014-KometaniTFA #behaviour #education #estimation #student
- An Improved Teaching Behavior Estimation Model from Student Evaluations (YK, TT, TF, TA), pp. 59–68.
- HIMI-AS-2014-MatsuiHKA #behaviour #case study #education #learning
- A Study on Exploration of Relationships between Behaviors and Mental States of Learners for Value Co-creative Education and Learning Environment (TM, YH, KK, TA), pp. 69–79.
- LCT-NLE-2014-MoissaCG #adaptation #behaviour #student #visualisation #web
- A Web Analytics and Visualization Tool to Understand Students’ Behavior in an Adaptive E-Learning System (BM, LSdC, IG), pp. 312–321.
- SCSM-2014-BenteDRA #behaviour #physics
- Emotional Contagion with Artificial Others. Effects of Culture, Physical Appearance, and Nonverbal Behavior on the Perception of Positive/Negative Affect in Avatars (GB, TD, DR, AAI), pp. 411–420.
- SCSM-2014-Biocca #behaviour
- Connected to My Avatar: — Effects of Avatar Embodiments on User Cognitions, Behaviors, and Self Construal (FB), pp. 421–429.
- HILT-2014-AhmadLBZD #behaviour #cyber-physical #hybrid #interactive #modelling
- Hybrid annex: an AADL extension for continuous behavior and cyber-physical interaction modeling (EA, BRL, SCB, NZ, YD), pp. 29–38.
- ICEIS-v1-2014-CruzRFC #behaviour #implementation
- Norm-based Behavior Modification in Reflex Agents — An Implementation in JAMDER 2.0 (FISC, RMRJ, ESSF, MIC), pp. 497–504.
- ICEIS-v1-2014-KaddesASBAB #behaviour #transaction
- Behavioral Study of Nested Transaction Success Ratio (MK, LA, BS, AB, MA, RB), pp. 179–186.
- ICEIS-v3-2014-KubovyAK #behaviour #composition #control flow
- Behavior-based Decomposition of BPMN 2.0 Control Flow (JK, DA, JK), pp. 263–271.
- CIKM-2014-ArguelloC #behaviour #rank
- The Effects of Vertical Rank and Border on Aggregated Search Coherence and Search Behavior (JA, RGC), pp. 539–548.
- CIKM-2014-Deolalikar14a #behaviour #clustering #modelling #parametricity #retrieval
- Parameter Tuning with User Models: Influencing Aggregate User Behavior in Cluster Based Retrieval Systems (VD), pp. 1823–1826.
- CIKM-2014-FangZTSFSDZL #behaviour #game studies #modelling #network #social
- Modeling Paying Behavior in Game Social Networks (ZF, XZ, JT, WS, ACMF, LS, YD, LZ, JL), pp. 411–420.
- CIKM-2014-WenR #behaviour #identification #mining #online
- Identifying Latent Study Habits by Mining Learner Behavior Patterns in Massive Open Online Courses (MW, CPR), pp. 1983–1986.
- ECIR-2014-YounusOP #approach #behaviour #microblog #modelling #personalisation
- A Language Modeling Approach to Personalized Search Based on Users’ Microblog Behavior (AY, CO, GP), pp. 727–732.
- ICML-c2-2014-WuCLY #behaviour #consistency #learning #network #predict #social
- Learning the Consistent Behavior of Common Users for Target Node Prediction across Social Networks (SHW, HHC, KHL, PSY), pp. 298–306.
- ICPR-2014-AlemdarKNME #behaviour #modelling #using
- A Unified Model for Human Behavior Modeling Using a Hierarchy with a Variable Number of States (HÖA, TvK, MEN, AM, CE), pp. 3804–3809.
- ICPR-2014-ChironGM #behaviour #parametricity #using
- Discovering Emergent Behaviors from Tracks Using Hierarchical Non-parametric Bayesian Methods (GC, PGK, MM), pp. 2185–2190.
- ICPR-2014-SengerSMK #behaviour #multi #segmentation
- Velocity-Based Multiple Change-Point Inference for Unsupervised Segmentation of Human Movement Behavior (LS, MS, JHM, EAK), pp. 4564–4569.
- ICPR-2014-YamadaM #approach #behaviour #using
- Estimating Driver Awareness of Crossing Pedestrians While Turning Left Based on Vehicle Behavior Using Bayesian Approach (KY, TM), pp. 1898–1903.
- KDD-2014-JiangCBFY #behaviour #graph #named #scalability
- CatchSync: catching synchronized behavior in large directed graphs (MJ, PC, AB, CF, SY), pp. 941–950.
- KDD-2014-JiangCWXZY #analysis #behaviour #flexibility #multi #named
- FEMA: flexible evolutionary multi-faceted analysis for dynamic behavioral pattern discovery (MJ, PC, FW, XX, WZ, SY), pp. 1186–1195.
- KDD-2014-SongZSS #behaviour #predict #scalability
- Prediction of human emergency behavior and their mobility following large-scale disaster (XS, QZ, YS, RS), pp. 5–14.
- KDD-2014-SunSTLKTY #behaviour #collaboration #network
- Analyzing expert behaviors in collaborative networks (HS, MS, ST, YL, LMK, ST, XY), pp. 1486–1495.
- KDD-2014-XuL #behaviour #learning #problem
- Product selection problem: improve market share by learning consumer behavior (SX, JCSL), pp. 851–860.
- RecSys-2014-KluverK #behaviour #recommendation
- Evaluating recommender behavior for new users (DK, JAK), pp. 121–128.
- SEKE-2014-JaliGH #behaviour #case study #generative #ontology
- Behavioral Model Generation from Use Cases Based on Ontology Mapping and GRASP Patterns (NJ, DG, PH), pp. 324–329.
- SEKE-2014-NetoASFM #architecture #behaviour #data transformation #framework #modelling #named #using
- CoMoVi: a Framework for Data Transformation in Credit Behavioral Scoring Applications Using Model Driven Architecture (RFON, PJLA, ACS, DRdCF, GRM), pp. 286–291.
- SIGIR-2014-ArapakisBC #behaviour #latency #web
- Impact of response latency on user behavior in web search (IA, XB, BBC), pp. 103–112.
- SIGIR-2014-ChengYWL #behaviour #multi #recommendation
- Group latent factor model for recommendation with multiple user behaviors (JC, TY, JW, HL), pp. 995–998.
- SIGIR-2014-JiangHA #behaviour
- Searching, browsing, and clicking in a search session: changes in user behavior by task and over time (JJ, DH, JA), pp. 607–616.
- SIGIR-2014-JiangKCC #behaviour #learning #query
- Learning user reformulation behavior for query auto-completion (JYJ, YYK, PYC, PJC), pp. 445–454.
- SIGIR-2014-LeeTC #behaviour #multi #risk management
- Characterizing multi-click search behavior and the risks and opportunities of changing results during use (CJL, JT, SdlC), pp. 515–524.
- SIGIR-2014-WuKS #behaviour #online #using
- Using information scent and need for cognition to understand online search behavior (WCW, DK, AS), pp. 557–566.
- MoDELS-2014-LangerMK #behaviour #difference #semantics #specification
- Semantic Model Differencing Utilizing Behavioral Semantics Specifications (PL, TM, GK), pp. 116–132.
- MoDELS-2014-Pazzi #behaviour #composition #modelling
- Modeling Systemic Behavior by State-Based Holonic Modular Units (LP), pp. 99–115.
- MoDELS-2014-LangerMK #behaviour #difference #semantics #specification
- Semantic Model Differencing Utilizing Behavioral Semantics Specifications (PL, TM, GK), pp. 116–132.
- MoDELS-2014-Pazzi #behaviour #composition #modelling
- Modeling Systemic Behavior by State-Based Holonic Modular Units (LP), pp. 99–115.
- ECOOP-2014-WeiR #analysis #behaviour #javascript #points-to
- State-Sensitive Points-to Analysis for the Dynamic Behavior of JavaScript Objects (SW, BGR), pp. 1–26.
- OOPSLA-2014-PintoCL #behaviour #comprehension #concurrent #energy #thread
- Understanding energy behaviors of thread management constructs (GP, FC, YDL), pp. 345–360.
- GPCE-2014-MalakutiA #behaviour #composition #representation
- Emergent gummy modules: modular representation of emergent behavior (SM, MA), pp. 15–24.
- SAC-2014-ChangCHKL #analysis #behaviour #mobile
- Application behavior analysis in resource consumption for mobile devices (SWC, SWC, PCH, TWK, CWL), pp. 1469–1474.
- SAC-2014-Chen #analysis #behaviour #coordination #energy #research #scheduling #student
- Student research abstract: demand behavior analysis and coordination scheduling for energy saving in smart building (SC), pp. 569–570.
- SAC-2014-JeongLCHP #android #approach #behaviour #kernel #monitoring
- A kernel-based monitoring approach for analyzing malicious behavior on Android (YJ, HtL, SC, SH, MP), pp. 1737–1738.
- SAC-2014-MaWX #behaviour #commit #developer #empirical #open source
- Dynamics of open-source software developer’s commit behavior: an empirical investigation of subversion (YM, YW, YX), pp. 1171–1173.
- SAC-2014-SaraivaS #behaviour #how
- Choosing my partners based on how they will evaluate my behavior (ECdRCS, VTdS), pp. 781–783.
- ICSE-2014-BeschastnikhBEK #behaviour #concurrent #modelling
- Inferring models of concurrent systems from logs of their behavior with CSight (IB, YB, MDE, AK), pp. 468–479.
- ICSE-2014-GhezziPST #behaviour #mining #modelling #web
- Mining behavior models from user-intensive web applications (CG, MP, MS, GT), pp. 277–287.
- ICSE-2014-GorlaTGZ #behaviour
- Checking app behavior against app descriptions (AG, IT, FG, AZ), pp. 1025–1035.
- ICSE-2014-HuangZTWL #android #behaviour #detection #named #user interface
- AsDroid: detecting stealthy behaviors in Android applications by user interface and program behavior contradiction (JH, XZ, LT, PW, BL), pp. 1036–1046.
- ICSE-2014-LeeJP #behaviour #detection #machine learning #memory management #modelling #using
- Detecting memory leaks through introspective dynamic behavior modelling using machine learning (SL, CJ, SP), pp. 814–824.
- SPLC-2014-Tribastone #algebra #behaviour #process
- Behavioral relations in a process algebra for variants (MT), pp. 82–91.
- HPCA-2014-AwadS #behaviour #memory management #named
- STM: Cloning the spatial and temporal memory access behavior (AA, YS), pp. 237–247.
- TAP-2014-HilkenNGW #behaviour #comparison #modelling #ocl #uml #verification
- Filmstripping and Unrolling: A Comparison of Verification Approaches for UML and OCL Behavioral Models (FH, PN, MG, RW), pp. 99–116.
- ECSA-2013-MorandiWNG #behaviour #concurrent #design pattern #development #object-oriented
- Concurrent Object-Oriented Development with Behavioral Design Patterns (BM, SW, SN, HG), pp. 25–32.
- ASE-2013-ChandramohanTBSP #approach #behaviour #bound #detection #modelling #scalability
- A scalable approach for malware detection through bounded feature space behavior modeling (MC, HBKT, LCB, LKS, BMP), pp. 312–322.
- ASE-2013-Fard #behaviour #detection #distributed #independence #using
- Detecting and fixing emergent behaviors in Distributed Software Systems using a message content independent method (FHF), pp. 746–749.
- CASE-2013-BengtssonL #algorithm #behaviour #identification #modelling #using #visualisation
- Operation behavior modeling using relation identification and visualization algorithms (KB, BL), pp. 368–373.
- CASE-2013-DingHMS #behaviour #collaboration #industrial
- Structured collaborative behavior of industrial robots in mixed human-robot environments (HD, JH, BM, HS), pp. 1101–1106.
- CASE-2013-RoyZR #behaviour #framework #representation
- The information framework for material behavior representation (UR, BZ, DJR), pp. 380–385.
- DAC-2013-Miskov-ZivanovMF #analysis #automation #behaviour #design #network
- Dynamic behavior of cell signaling networks: model design and analysis automation (NMZ, DM, JRF), p. 6.
- DAC-2013-YangRHX #behaviour #design #equivalence #implementation #optimisation #synthesis
- Handling design and implementation optimizations in equivalence checking for behavioral synthesis (ZY, SR, KH, FX), p. 6.
- HT-2013-NasimIRN #behaviour #facebook #on the
- On commenting behavior of Facebook users (MN, MUI, AR, NN), pp. 179–183.
- HT-2013-WeiHGLZW #analysis #behaviour #case study #twitter
- Mainstream media behavior analysis on Twitter: a case study on UK general election (ZW, YH, WG, BL, LZ, KFW), pp. 174–178.
- SIGMOD-2013-ElmoreDPAAY #behaviour #multitenancy
- Characterizing tenant behavior for placement and crisis mitigation in multitenant DBMSs (AJE, SD, AP, DA, AEA, XY), pp. 517–528.
- ESOP-2013-CairesPPT #behaviour #communication #morphism #parametricity #polymorphism
- Behavioral Polymorphism and Parametricity in Session-Based Communication (LC, JAP, FP, BT), pp. 330–349.
- FASE-2013-BouchouchaSL #behaviour #comprehension #modelling #probability #towards #using
- Towards Understanding the Behavior of Classes Using Probabilistic Models of Program Inputs (AB, HAS, PL), pp. 99–113.
- FASE-2013-LinPEHR #analysis #behaviour #requirements #sequence #specification #string
- Augmenting Sequence Enumeration with String-Rewriting for Requirements Analysis and Behavioral Specification (LL, JHP, RE, RMH, CRM), pp. 179–193.
- FASE-2013-ZhongTX #api #behaviour #difference
- Exposing Behavioral Differences in Cross-Language API Mapping Relations (HZ, ST, TX), pp. 130–145.
- ICSM-2013-RoehmBHP #behaviour #identification #specification #towards
- Towards Identification of Software Improvements and Specification Updates by Comparing Monitored and Specified End-User Behavior (TR, BB, TMH, BP), pp. 464–467.
- MSR-2013-FuLLDZX #analysis #behaviour #comprehension
- Contextual analysis of program logs for understanding system behaviors (QF, JGL, QL, RD, DZ, TX), pp. 397–400.
- IFM-2013-Prehofer #behaviour #diagrams #refinement #specification
- Assume-Guarantee Specifications of State Transition Diagrams for Behavioral Refinement (CP), pp. 31–45.
- SEFM-2013-SuryadevaraSMP #behaviour #using #verification
- Verifying MARTE/CCSL Mode Behaviors Using UPPAAL (JS, CCS, FM, PP), pp. 1–15.
- GT-VMT-2013-Giese #behaviour #graph transformation #probability
- Invited Talk: Extensions of Graph Transformation Systems for Timed, Continuous, and Probabilistic Behavior (HG).
- GT-VMT-2013-TeusnerGRK #behaviour #interactive #modelling #validation
- Interactive Strategy-Based Validation of Behavioral Models (RT, GG, SR, SK).
- GT-VMT-2013-WinetzhammerW #behaviour #emf #modelling #rule-based
- ModGraph meets Xcore: Combining Rule-Based and Procedural Behavioral Modeling for EMF (SW, BW).
- CHI-2013-BentleyT #behaviour #mobile #power of
- The power of mobile notifications to increase wellbeing logging behavior (FB, KT), pp. 1095–1098.
- CHI-2013-BeyerKSHB #behaviour #how
- Squaring the circle: how framing influences user behavior around a seamless cylindrical display (GB, FK, MS, IH, AB), pp. 1729–1738.
- CHI-2013-BirnbaumBFDK #behaviour #identification #using
- Using behavioral data to identify interviewer fabrication in surveys (BEB, GB, ADF, BD, ARK), pp. 2911–2920.
- CHI-2013-ChoudhuryCH #behaviour #predict #social #social media
- Predicting postpartum changes in emotion and behavior via social media (MDC, SC, EH), pp. 3267–3276.
- CHI-2013-DeckersWLA #behaviour #design
- Designing for perceptual crossing: designing and comparing three behaviors (ED, SW, PL, RA), pp. 1901–1910.
- CHI-2013-HeklerKFB #behaviour #human-computer #research #using
- Mind the theoretical gap: interpreting, using, and developing behavioral theory in HCI research (EBH, PVK, JF, MPB), pp. 3307–3316.
- CHI-2013-IchinoIHU #behaviour
- Effects of the display angle in museums on user’s cognition, behavior, and subjective responses (JI, KI, AH, TU), pp. 2979–2988.
- CHI-2013-KramerKKWB #behaviour #developer #how #ide #navigation #tool support
- How tools in IDEs shape developers’ navigation behavior (JPK, TK, JK, MW, JOB), pp. 3073–3082.
- CHI-2013-MacveanR #behaviour #comprehension #game studies #motivation #physics #process
- Understanding exergame users’ physical activity, motivation and behavior over time (APM, JR), pp. 1251–1260.
- CHI-2013-MollerKSRD #behaviour #self
- Investigating self-reporting behavior in long-term studies (AM, MK, BS, LR, SD), pp. 2931–2940.
- CHI-2013-RiceTOYWN #behaviour #game studies #interactive
- The dynamics of younger and older adult’s paired behavior when playing an interactive silhouette game (MDR, WPT, JO, LJY, MW, JN), pp. 1081–1090.
- CHI-2013-TanenbaumAR #behaviour #game studies
- Three perspectives on behavior change for serious games (JT, ANA, JR), pp. 3389–3392.
- CSCW-2013-ChoudhuryCH #behaviour #social #social media
- Major life changes and behavioral markers in social media: case of childbirth (MDC, SC, EH), pp. 1431–1442.
- CSCW-2013-LiuJ #behaviour #social
- Factors influencing the response rate in social question and answering behavior (ZL, BJJ), pp. 1263–1274.
- CSCW-2013-Massimi #behaviour #online #social
- Exploring remembrance and social support behavior in an online bereavement support group (MM), pp. 1169–1180.
- CSCW-2013-ReineckeNBNG #behaviour #difference #online #scheduling
- Doodle around the world: online scheduling behavior reflects cultural differences in time perception and group decision-making (KR, MKN, AB, MN, KZG), pp. 45–54.
- CSCW-2013-XuHKC #behaviour #twitter
- Structures of broken ties: exploring unfollow behavior on twitter (BX, YH, HK, NSC), pp. 871–876.
- DHM-HB-2013-NettenDG #behaviour #case study #metric
- Chair Based Measurements of Sitting Behavior a Field Study of Sitting Postures and Sitting Time in Office Work (MPN, LHMvdD, RHMG), pp. 261–268.
- DHM-HB-2013-WangTLCTL #architecture #behaviour #modelling
- Cognitive Behavior Modeling of Manual Rendezvous and Docking Based on the ACT-R Cognitive Architecture (CW, YT, YL, SC, ZT, JL), pp. 143–148.
- DHM-SET-2013-BiegBC #behaviour #bias
- Attentional Biases during Steering Behavior (HJB, HHB, LLC), pp. 21–27.
- DHM-SET-2013-BusogiKSRYK #behaviour #problem
- Bayesian Affordance-Based Agent Model for Wayfinding Behaviors in Evacuation Problems (MB, NK, DS, HBR, AY, DK), pp. 297–306.
- DHM-SET-2013-KongZC #behaviour #predict #risk management
- Personality and Attitudes as Predictors of Risky Driving Behavior: Evidence from Beijing Drivers (JK, KZ, XC), pp. 38–44.
- DHM-SET-2013-LiuZLSFG #behaviour #modelling #towards
- Towards Early Status Warning for Driver’s Fatigue Based on Cognitive Behavior Models (YL, YZ, JL, JS, FF, JG), pp. 55–60.
- DHM-SET-2013-LiuZX #behaviour #simulation
- Effects of Sleep Deprivation on Pilot’s Cognitive Behavior in Flight Simulation (ZQL, QXZ, FX), pp. 45–54.
- DHM-SET-2013-MurataKEH #behaviour #metric #predict #using
- Prediction of Drowsy Driving Using Behavioral Measures of Drivers — Change of Neck Bending Angle and Sitting Pressure Distribution (AM, TK, TE, TH), pp. 78–87.
- DUXU-CXC-2013-MenardKD #behaviour #image #online
- Two Solitudes Revisited: A Cross-Cultural Exploration of Online Image Searcher’s Behaviors (EM, NK, JD), pp. 79–88.
- DUXU-CXC-2013-Stevens #behaviour #gamification #how #social
- How Gamification and Behavior Science Can Drive Social Change One Employee at a Time (SHS), pp. 597–601.
- DUXU-CXC-2013-ThinG #behaviour #case study #experience #game studies #integration #interactive
- Game-Based Interactive Media in Behavioral Medicine: Creating Serious Affective-Cognitive-Environmental-Social Integration Experiences (AGT, MG), pp. 470–479.
- DUXU-NTE-2013-DuarteRTVTN #behaviour
- Sense of Presence in a VR-Based Study on Behavioral Compliance with Warnings (ED, FR, LT, EV, JT, PN), pp. 362–371.
- DUXU-NTE-2013-FabriWT #behaviour #product line
- Changing Eating Behaviors through a Cooking-Based Website for the Whole Family (MF, AW, PT), pp. 484–493.
- DUXU-NTE-2013-KakaraNM #behaviour #database #design #geometry #interactive #using
- Interaction Design Using a Child Behavior-Geometry Database (HK, YN, HM), pp. 95–104.
- DUXU-NTE-2013-MartinsMSA #behaviour #fault
- Human Error in Aviation: The Behavior of Pilots Facing the Modern Technology (ITM, ETM, MMS, LGdSA), pp. 150–159.
- DUXU-NTE-2013-SannaVBBR #approach #behaviour #design
- Engineering AwarenessTM: An e-Service Design Approach for Behavioral Change in Healthcare and Well-Being (AS, SV, SB, IB, AR), pp. 558–567.
- DUXU-NTE-2013-TrevorrowF #behaviour
- Running to Behavior Change (PT, MF), pp. 585–593.
- DUXU-NTE-2013-ViciniBRS #behaviour
- Well-Being on the Go: An IoT Vending Machine Service for the Promotion of Healthy Behaviors and Lifestyles (SV, SB, AR, AS), pp. 594–603.
- DUXU-PMT-2013-LuL13a #behaviour #design
- Innovative Behavioral Intention and Creativity Achievement in Design: Test of an Integrated Model (CCL, DBL), pp. 535–544.
- DUXU-PMT-2013-Silveira #approach #behaviour #design #usability
- Participatory Design and Usability: A Behavioral Approach of Workers’ Attitudes in the Work Environment (DMCdS), pp. 409–416.
- DUXU-WM-2013-MarcusCNY #behaviour #design #mobile #persuasion #user interface
- The Innovation Machine: Mobile UX Design Combining Information and Persuasion Design to Change Behavior (AM, MC, CN, AY), pp. 67–76.
- HCI-AS-2013-BergmansS #behaviour #mobile #persuasion #using
- Reducing Speeding Behavior in Young Drivers Using a Persuasive Mobile Application (AB, SS), pp. 541–550.
- HCI-AS-2013-LekkasGTMS #behaviour #component #experience #how #learning #process
- Personality and Emotion as Determinants of the Learning Experience: How Affective Behavior Interacts with Various Components of the Learning Process (ZL, PG, NT, CM, GS), pp. 418–427.
- HCI-III-2013-Joo #behaviour #reasoning #simulation
- Perception and BDI Reasoning Based Agent Model for Human Behavior Simulation in Complex System (JJ), pp. 62–71.
- HCI-IMT-2013-LiuBCN #behaviour #visual notation
- Behavioral Characteristics of Users with Visual Impairment in Haptically Enhanced Virtual Environments (SL, SB, HC, CSN), pp. 618–625.
- HIMI-D-2013-KobayashiYA #analysis #behaviour
- Analysis of Purchasing Behavior Focusing on the Passage of Time at a Group Buying Site of Coupon (TK, TY, YA), pp. 449–455.
- HIMI-D-2013-LeeY #behaviour #comparison #information management #research
- Research on Website Usage Behavior through Information Search Perspective: A Comparison of Experiential and Goal-Directed Behaviors (JL, MY), pp. 456–464.
- HIMI-D-2013-SusukiTOM #analysis #behaviour
- Cognitive Analysis of Driver’s Behavior with Seamless Display of Back-Monitor and Side-View Mirror (NS, KT, MO, HM), pp. 642–649.
- HIMI-HSM-2013-HiraokaTK #behaviour #parametricity
- Proposal of Non-dimensional Parameter Indices to Evaluate Safe Driving Behavior (TH, ST, HK), pp. 470–479.
- HIMI-HSM-2013-ItohKMYYO #behaviour #comparison
- Comparison of Cognitively Impaired, Healthy Non-Professional and Healthy Professional Driver Behavior on a Small and Low-Fidelity Driving Simulator (MI, MK, KM, KY, SY, MO), pp. 490–496.
- HIMI-HSM-2013-KarashimaN #behaviour #safety
- Influence of the Safety Margin on Behavior that Violates Rules (MK, HN), pp. 497–506.
- HIMI-HSM-2013-KosakaN #behaviour #education
- Pilot Experiments in Education for Safe Bicycle Riding to Evaluate Actual Cycling Behaviors When Entering an Intersection (HK, MN), pp. 515–523.
- HIMI-HSM-2013-SaitoKII #behaviour
- Influence of Deceleration Intention Indicating System of Forward Vehicle on Driver Behavior (YS, SK, MI, TI), pp. 548–557.
- HIMI-HSM-2013-SuzukiMKY #behaviour
- Human Behavior of Prioritizing Right-Turning Vehicles and Traffic Flow at Intersections (HS, YM, TK, YY), pp. 558–567.
- OCSC-2013-Abascal-MenaLZ #analysis #behaviour #mining #twitter
- User Generated Content: An Analysis of User Behavior by Mining Political Tweets (RAM, ÉLO, JSZH), pp. 3–12.
- OCSC-2013-AdnanHAT #analysis #behaviour #eye tracking #network #online #social
- Eye Tracking Analysis of User Behavior in Online Social Networks (WAWA, WNHH, NA, JT), pp. 113–119.
- OCSC-2013-KalwarHP13b #behaviour #comprehension #internet
- Quantifying Cultural Attributes for Understanding Human Behavior on the Internet (SKK, KH, JP), pp. 40–49.
- OCSC-2013-LopezFM #behaviour
- Being Example: A Different Kind of Leadership, Looking for Exemplary Behaviors (SRL, HMF, ASM), pp. 182–190.
- OCSC-2013-StieglitzES #behaviour #education #learning #student
- Influence of Monetary and Non-monetary Incentives on Students’ Behavior in Blended Learning Settings in Higher Education (SS, AE, MS), pp. 104–112.
- VISSOFT-2013-PalepuJ #behaviour #visualisation
- Visualizing constituent behaviors within executions (VKP, JAJ), pp. 1–4.
- VISSOFT-2013-ReissT #automation #behaviour #categorisation #visualisation
- Automatic categorization and visualization of lock behavior (SPR, AT), pp. 1–10.
- HILT-2013-Goodenough #behaviour
- Building confidence in system behavior (JBG), pp. 49–50.
- CIKM-2013-LiaoPPL #behaviour #mining #mobile #on the #predict #smarttech
- On mining mobile apps usage behavior for predicting apps usage in smartphones (ZXL, YCP, WCP, PRL), pp. 609–618.
- ECIR-2013-ChuklinSR #behaviour #using
- Using Intent Information to Model User Behavior in Diversified Search (AC, PS, MdR), pp. 1–13.
- ICML-c3-2013-AlmingolML #behaviour #learning #multi
- Learning Multiple Behaviors from Unlabeled Demonstrations in a Latent Controller Space (JA, LM, ML), pp. 136–144.
- KDD-2013-MukherjeeKLWHCG #behaviour #using
- Spotting opinion spammers using behavioral footprints (AM, AK, BL, JW, MH, MC, RG), pp. 632–640.
- KDD-2013-ZafaraniL #approach #behaviour #social #social media
- Connecting users across social media sites: a behavioral-modeling approach (RZ, HL), pp. 41–49.
- KDIR-KMIS-2013-ChenYTH #behaviour #predict
- The Disulfide Connectivity Prediction with Support Vector Machine and Behavior Knowledge Space (HYC, CBY, KTT, CYH), pp. 112–118.
- KDIR-KMIS-2013-ItalaH #behaviour #diagrams #process #using
- Using Stocks and Flows Diagrams to Understand Business Process Behavior (TI, MH), pp. 552–558.
- SEKE-2013-BazharAJ #behaviour #modelling #named #repository
- BeMoRe: a Repository for Handling Models Behaviors (YB, YAA, SJ), pp. 262–267.
- SEKE-2013-IqbalKH #behaviour #communication #developer #social
- Analyzing Social Behavior of Software Developers Across Different Communication Channels (S) (AI, MK, MH), pp. 113–118.
- SIGIR-2013-AgeevLA #behaviour #summary #using
- Improving search result summaries by using searcher behavior data (MA, DL, EA), pp. 13–22.
- SIGIR-2013-AzzopardiKB #behaviour #how #query
- How query cost affects search behavior (LA, DK, KB), pp. 23–32.
- SIGIR-2013-SavenkovLL #behaviour #detection
- Search engine switching detection based on user personal preferences and behavior patterns (DS, DL, QL), pp. 33–42.
- SIGIR-2013-Wu #behaviour #how #online #predict #using
- How far will you go?: characterizing and predicting online search stopping behavior using information scent and need for cognition (WCW), p. 1149.
- QAPL-2013-BernardoNL #behaviour #nondeterminism #probability #process
- The Spectrum of Strong Behavioral Equivalences for Nondeterministic and Probabilistic Processes (MB, RDN, ML), pp. 81–96.
- POPL-2013-CairesS #behaviour
- The type discipline of behavioral separation (LC, JCS), pp. 275–286.
- RE-2013-KrkaM #behaviour
- Distributing refinements of a system-level partial behavior model (IK, NM), pp. 72–81.
- SAC-2013-GregioFAGMJ #analysis #behaviour #empirical #internet
- An empirical analysis of malicious internet banking software behavior (ARAG, DSFF, VMA, PLdG, VFM, MJ), pp. 1830–1835.
- SAC-2013-NardelliTB #behaviour
- Cross-lattice behavior of general ACO folding for proteins in the HP model (MN, LT, AB), pp. 1320–1327.
- SAC-2013-SchroderN #behaviour #resource management
- Inter cloud capable dynamic resource management with model of behavior (KS, WN), pp. 408–410.
- SAC-2013-UmemotoYNT #behaviour #predict #query
- Predicting query reformulation type from user behavior (KU, TY, SN, KT), pp. 894–901.
- ESEC-FSE-2013-SchurRZ #behaviour #enterprise #mining #modelling #web
- Mining behavior models from enterprise web applications (MS, AR, AZ), pp. 422–432.
- PLEASE-2013-FangLED #behaviour #challenge #variability
- Challenges in managing behavior variability of production control software (MF, GL, CE, JD), pp. 21–24.
- HPCA-2013-NereHLT #behaviour #biology #semantic gap
- Bridging the semantic gap: Emulating biological neuronal behaviors with simple digital neurons (AN, AH, MHL, GT), pp. 472–483.
- SOSP-2013-WangZKS #behaviour #towards
- Towards optimization-safe systems: analyzing the impact of undefined behavior (XW, NZ, MFK, ASL), pp. 260–275.
- LICS-2013-MogaveroMS #behaviour #bound #on the
- On the Boundary of Behavioral Strategies (FM, AM, LS), pp. 263–272.
- CASE-2012-CunhaBC #behaviour #industrial
- Discovery of behavior in industrial plants: A KDD based proposal (MJdC, VLB, GAdPC), pp. 986–991.
- CASE-2012-ParkM #behaviour #bound #clustering #hybrid #linear #performance #tool support
- Performance bounds for hybrid flow lines: Fundamental behavior, practical features and application to linear cluster tools (KP, JRM), pp. 371–376.
- DAC-2012-HaoRX #behaviour #equivalence #pipes and filters
- Equivalence checking for behaviorally synthesized pipelines (KH, SR, FX), pp. 344–349.
- DocEng-2012-SoaresNS #architecture #behaviour #constraints #hypermedia
- Architecture for hypermedia dynamic applications with content and behavior constraints (LFGS, CdSSN, JGS), pp. 217–226.
- HT-2012-CunhaMAGB #behaviour #gender #twitter
- A gender based study of tagging behavior in twitter (EC, GM, VA, MAG, FB), pp. 323–324.
- HT-2012-SchofeggerKSG #behaviour #learning #social
- Learning user characteristics from social tagging behavior (KS, CK, PS, MG), pp. 207–212.
- VLDB-2012-KanagalAPJYP #behaviour #learning #recommendation #taxonomy #using
- Supercharging Recommender Systems using Taxonomies for Learning User Purchase Behavior (BK, AA, SP, VJ, JY, LGP), pp. 956–967.
- ITiCSE-2012-BoyceCPCB #behaviour #game studies #learning
- Maximizing learning and guiding behavior in free play user generated content environments (AKB, AC, SP, DC, TB), pp. 10–15.
- ESOP-2012-DimoulasTF #behaviour #contract #monitoring
- Complete Monitors for Behavioral Contracts (CD, STH, MF), pp. 214–233.
- CSMR-2012-MaezawaWH #behaviour #internet
- Extracting Interaction-Based Stateful Behavior in Rich Internet Applications (YM, HW, SH), pp. 423–428.
- ICSM-2012-RungtaPB #behaviour #evolution #impact analysis
- A change impact analysis to characterize evolving program behaviors (NR, SP, JB), pp. 109–118.
- FM-2012-GrumbergMY #behaviour #model checking #modelling #uml
- Applying Software Model Checking Techniques for Behavioral UML Models (OG, YM, KY), pp. 277–292.
- ICGT-2012-GieseL #automation #behaviour #invariant #model transformation #towards #verification
- Towards Automatic Verification of Behavior Preservation for Model Transformation via Invariant Checking (HG, LL), pp. 249–263.
- CHI-2012-ArroyoBV #behaviour #embedded #interactive
- Embedded interaction in a water fountain for motivating behavior change in public space (EA, LB, NV), pp. 685–688.
- CHI-2012-BatemanTW #behaviour #comparison #how
- The search dashboard: how reflection and comparison impact search behavior (SB, JT, RWW), pp. 1785–1794.
- CHI-2012-BirnholtzBF #behaviour
- Do you see that I see?: effects of perceived visibility on awareness checking behavior (JPB, NB, SRF), pp. 1765–1774.
- CHI-2012-EvansW #behaviour #metric
- Taming wild behavior: the input observer for text entry and mouse pointing measures from everyday computer use (AE, JOW), pp. 1947–1956.
- CHI-2012-KoppelBMW #behaviour
- Chained displays: configurations of public displays can be used to influence actor-, audience-, and passer-by behavior (MTK, GB, JM, RW), pp. 317–326.
- CHI-2012-LeonUSWBC #behaviour #evaluation #online #tool support #usability #why
- Why Johnny can’t opt out: a usability evaluation of tools to limit online behavioral advertising (PGL, BU, RS, YW, RB, LFC), pp. 589–598.
- CHI-2012-NowakN #behaviour #monitoring #online #recommendation
- Effects of behavior monitoring and perceived system benefit in online recommender systems (MN, CN), pp. 2243–2246.
- CHI-2012-OdomZFCMP #behaviour
- Investigating the presence, form and behavior of virtual possessions in the context of a teen bedroom (WO, JZ, JF, HC, SM, AP), pp. 327–336.
- CHI-2012-RaeTM #behaviour #communication
- One of the gang: supporting in-group behavior for embodied mediated communication (IR, LT, BM), pp. 3091–3100.
- CSCW-2012-AntinCN #behaviour #editing
- Technology-mediated contributions: editing behaviors among new wikipedians (JA, CC, ON), pp. 373–382.
- CSCW-2012-MillerPXEKCM #behaviour #game studies #health #pervasive #student
- The work of play: supporting a pervasive health behavior change intervention for us middle school students (ADM, ESP, YX, EE, DK, RC, EDM), pp. 897–900.
- ICEIS-v1-2012-LouatiBDS #behaviour #database #modelling #realtime
- Modeling Structural, Temporal and Behavioral Features of a Real-Time Database (NL, RB, CD, BS), pp. 119–125.
- ICEIS-v2-2012-LelionnaisBDRS #behaviour #modelling #operating system #realtime
- Formal Behavioral Modeling of Real-time Operating Systems (CL, MB, JD, OHR, CS), pp. 407–414.
- CIKM-2012-AhmedADSA #behaviour #feature model #multi
- Web-scale multi-task feature selection for behavioral targeting (AA, MA, AD, AJS, TA), pp. 1737–1741.
- CIKM-2012-ArguelloC #behaviour
- The effect of aggregated search coherence on search behavior (JA, RC), pp. 1293–1302.
- CIKM-2012-AshkanC #analysis #behaviour #modelling
- Modeling browsing behavior for click analysis in sponsored search (AA, CLAC), pp. 2015–2019.
- CIKM-2012-CarteretteKY #behaviour #evaluation #variability
- Incorporating variability in user behavior into systems based evaluation (BC, EK, EY), pp. 135–144.
- CIKM-2012-KimFC #behaviour #comprehension #web
- Understanding book search behavior on the web (JYK, HAF, MAC), pp. 744–753.
- CIKM-2012-WuJZ #behaviour
- Serial position effects of clicking behavior on result pages returned by search engines (MW, SJ, YZ), pp. 2411–2414.
- CIKM-2012-ZhuGCL #behaviour #mining #query #recommendation
- More than relevance: high utility query recommendation by mining users’ search behaviors (XZ, JG, XC, YL), pp. 1814–1818.
- ICML-2012-SheffetMI #behaviour #predict
- Predicting Consumer Behavior in Commerce Search (OS, NM, SI), p. 233.
- ICPR-2012-DeyG #behaviour #consistency #topic #twitter
- Discovering regular and consistent behavioral patterns in topical tweeting (LD, BG), pp. 3464–3467.
- ICPR-2012-MatsuoK #behaviour #monitoring #predict
- Prediction of drowsy driving by monitoring driver’s behavior (HM, AK), pp. 3390–3393.
- ICPR-2012-MinouraW #behaviour
- Driving support by estimating vehicle behavior (KM, TW), pp. 1144–1147.
- ICPR-2012-NakamuraIKB #authentication #behaviour #multi #tablet
- Tablet owner authentication based on behavioral characteristics of multi-touch actions (KN, YI, KK, NB), pp. 3431–3434.
- KDD-2012-SongCWWYD #analysis #behaviour
- Coupled behavior analysis for capturing coupling relationships in group-based market manipulations (YS, LC, XW, GW, WY, WD), pp. 976–984.
- KDD-2012-ZhongFWXL #adaptation #behaviour #named #network #social
- ComSoc: adaptive transfer of user behaviors over composite social network (EZ, WF, JW, LX, YL), pp. 696–704.
- KDD-2012-ZhouQM #behaviour #data analysis #social #social media
- Social media data analysis for revealing collective behaviors (AZ, WQ, HM), p. 1402.
- KDIR-2012-SantosGSK #behaviour #detection #finite
- Finite Belief Fusion Model for Hidden Source Behavior Change Detection (ESJ, QG, EES, JK), pp. 17–24.
- KMIS-2012-LiuAACT #behaviour #modelling
- Modeling Dynamic Behavior of Business Organisations — Extension of BPM with Norms (KL, MAR, ARA, LC, JT), pp. 196–201.
- KMIS-2012-MarsanCE #analysis #behaviour #enterprise #framework #information management #scalability #tool support #using
- Factors Influencing the Behavioral Intention of using Enterprise 2.0 Tools as a Knowledge Management Platform — An Analysis of the UTAUT Model in an Large Real Estate Company (BM, LC, EE), pp. 281–284.
- MLDM-2012-HossainC #behaviour #identification
- Combination of Physiological and Behavioral Biometric for Human Identification (EH, GC), pp. 380–393.
- SEKE-2012-ChenL #approach #behaviour #elicitation #ontology #requirements #security
- Eliciting Security Requirements in the Commanded Behavior Frame: An Ontology based Approach (XC, JL), pp. 61–65.
- SEKE-2012-CourbisLLPUV #agile #behaviour #development #incremental #specification
- A Formal Support for Incremental Behavior Specification In Agile Development (ALC, TL, HVL, TLP, CU, SV), pp. 694–799.
- SEKE-2012-MireslamiMF #behaviour #detection #distributed
- Detecting Emergent Behavior in Distributed Systems Caused by Overgeneralization (SM, MM, BHF), pp. 70–73.
- SIGIR-2012-BennettWCDBBC #behaviour #modelling #personalisation
- Modeling the impact of short- and long-term behavior on search personalization (PNB, RWW, WC, STD, PB, FB, XC), pp. 185–194.
- SIGIR-2012-LiuBC #behaviour #interactive #personalisation #using
- Personalization of search results using interaction behaviors in search sessions (CL, NJB, MJC), pp. 205–214.
- SIGIR-2012-TrevisiolCAJ #behaviour #image #ranking
- Image ranking based on user browsing behavior (MT, LC, LMA, AJ), pp. 445–454.
- SIGIR-2012-TsagkiasB #behaviour #modelling
- Language intent models for inferring user browsing behavior (MT, RB), pp. 335–344.
- SIGIR-2012-XuZWY #behaviour #modelling #social #social media
- Modeling user posting behavior on social media (ZX, YZ, YW, QY), pp. 545–554.
- MoDELS-2012-HamannHG #behaviour #modelling #ocl #on the
- On Integrating Structure and Behavior Modeling with OCL (LH, OH, MG), pp. 235–251.
- MoDELS-2012-HamannHG #behaviour #modelling #ocl #on the
- On Integrating Structure and Behavior Modeling with OCL (LH, OH, MG), pp. 235–251.
- OOPSLA-2012-TamayoABS #behaviour #comprehension #database
- Understanding the behavior of database operations under program control (JMT, AA, NGB, MS), pp. 983–996.
- OOPSLA-2012-WuZSJGS #behaviour #correlation #predict
- Exploiting inter-sequence correlations for program behavior prediction (BW, ZZ, XS, YJ, YG, RS), pp. 851–866.
- TOOLS-EUROPE-2012-SoekenWD #behaviour #development #natural language #using
- Assisted Behavior Driven Development Using Natural Language Processing (MS, RW, RD), pp. 269–287.
- GPCE-2012-SpacekDTF #behaviour #component #inheritance #programming #reuse
- An inheritance system for structural & behavioral reuse in component-based software programming (PS, CD, CT, LF), pp. 60–69.
- SAC-2012-ArpiniA #behaviour #enterprise #modelling #on the
- On the support for the assignment of active structure and behavior in enterprise modeling approaches (RHA, JPAA), pp. 1686–1693.
- SAC-2012-WangTWWG #algorithm #behaviour #empirical #evaluation #mining #process
- An empirical evaluation of process mining algorithms based on structural and behavioral similarities (JW, ST, LW, RKW, QG), pp. 211–213.
- FSE-2012-ChandramohanTS #behaviour #clustering #modelling #scalability
- Scalable malware clustering through coarse-grained behavior modeling (MC, HBKT, LKS), p. 27.
- ICSE-2012-FengC #behaviour #learning #multi
- Multi-label software behavior learning (YF, ZC), pp. 1305–1308.
- ICSE-2012-GhezziM #behaviour #specification #synthesis #validation
- Behavioral validation of JFSL specifications through model synthesis (CG, AM), pp. 936–946.
- ICSE-2012-ZhengT #architecture #behaviour #consistency #implementation
- Enhancing architecture-implementation conformance with change management and support for behavioral mapping (YZ, RNT), pp. 628–638.
- HPCA-2012-BalakrishnanS #behaviour #named #probability #using
- WEST: Cloning data cache behavior using Stochastic Traces (GB, YS), pp. 387–398.
- ICST-2012-DiGiuseppeJ #behaviour #clustering #empirical #fault
- Software Behavior and Failure Clustering: An Empirical Study of Fault Causality (ND, JAJ), pp. 191–200.
- ECSA-2011-HamelGKBG #behaviour #transaction #verification
- Verifying Composite Service Transactional Behavior with EVENT-B (LH, MG, MK, MTB, WG), pp. 67–74.
- ASE-2011-Dwyer #analysis #behaviour #testing
- Unifying testing and analysis through behavioral coverage (MBD), p. 2.
- ASE-2011-RamirezJCK #adaptation #automation #behaviour #how #nondeterminism
- Automatically exploring how uncertainty impacts behavior of dynamically adaptive systems (AJR, ACJ, BHCC, DBK), pp. 568–571.
- CASE-2011-FarautPN #behaviour #equivalence #multi
- Equivalence of behaviors between centralized and multi-model approaches (GF, LP, ÉN), pp. 32–38.
- DAC-2011-BroedersL #behaviour #modelling
- Extracting behavior and dynamically generated hierarchy from SystemC models (HB, RvL), pp. 357–362.
- DAC-2011-ChoiYLA #behaviour #fault #performance
- Matching cache access behavior and bit error pattern for high performance low Vcc L1 cache (YGC, SY, SL, JHA), pp. 978–983.
- DAC-2011-KatzRZS #architecture #behaviour #generative #learning #quality
- Learning microarchitectural behaviors to improve stimuli generation quality (YK, MR, AZ, GS), pp. 848–853.
- HT-2011-PapagelisMZ #behaviour #online #social
- Individual behavior and social influence in online social systems (MP, VM, RvZ), pp. 241–250.
- SIGMOD-2011-DamaggioDZ #behaviour #contract #database #query
- Querying contract databases based on temporal behavior (ED, AD, DZ), pp. 397–408.
- ITiCSE-2011-LeeR #algorithm #behaviour #towards #visualisation
- Toward replicating handmade algorithm visualization behaviors in a digital environment: a pre-study (MHL, GR), pp. 198–202.
- FASE-2011-ErmelGLT #behaviour #consistency #control flow #functional #modelling
- Modeling with Plausibility Checking: Inspecting Favorable and Critical Signs for Consistency between Control Flow and Functional Behavior (CE, JG, LL, GT), pp. 156–170.
- PASTE-2011-Detten #behaviour #detection #execution #generative #symbolic computation #towards
- Towards systematic, comprehensive trace generation for behavioral pattern detection through symbolic execution (MvD), pp. 17–20.
- IFM-J-2009-ColvinH11 #behaviour #csp #semantics #specification #using
- A semantics for Behavior Trees using CSP with specification commands (RC, IJH), pp. 891–914.
- IFM-J-2009-DovlandJOS11 #behaviour #incremental #inheritance #lazy evaluation #multi #reasoning #type system
- Incremental reasoning with lazy behavioral subtyping for multiple inheritance (JD, EBJ, OO, MS), pp. 915–941.
- FM-2011-AlbertGGJST #behaviour #bound #concurrent #simulation #worst-case
- Simulating Concurrent Behaviors with Worst-Case Cost Bounds (EA, SG, MGZ, EBJ, RS, SLTT), pp. 353–368.
- FM-2011-Harel #behaviour #programming
- Some Thoughts on Behavioral Programming (DH), p. 2.
- SFM-2011-ClarkeDHJSSSW #behaviour #modelling #variability
- Modeling Spatial and Temporal Variability with the HATS Abstract Behavioral Modeling Language (DC, ND, RH, EBJ, IS, JS, RS, PYHW), pp. 417–457.
- CHI-2011-BeyerAMSIKSH #behaviour #interactive #scalability
- Audience behavior around large interactive cylindrical screens (GB, FA, JM, AS, KI, SK, MS, IH), pp. 1021–1030.
- CHI-2011-BogunovichS #behaviour #constraints
- The effects of time constraints on user behavior for deferrable interruptions (PB, DDS), pp. 3123–3126.
- CHI-2011-ChoeCWK #behaviour
- Opportunities for computing technologies to support healthy sleep behaviors (EKC, SC, NFW, JAK), pp. 3053–3062.
- CHI-2011-GabrielliSMMM #behaviour #feedback #interface #named
- BeeParking: feedback interfaces for collective behavior change (SG, AS, JM, MM, OM), pp. 2145–2148.
- CHI-2011-KlasnjaCP #behaviour #health #how #human-computer #research
- How to evaluate technologies for health behavior change in HCI research (PVK, SC, WP), pp. 3063–3072.
- CHI-2011-LeeKF #behaviour #design #mining #persuasion
- Mining behavioral economics to design persuasive technology for healthy choices (MKL, SBK, JF), pp. 325–334.
- CHI-2011-PurpuraSWSS #behaviour #design #named #persuasion
- Fit4life: the design of a persuasive technology promoting healthy behavior and ideal weight (SP, VS, KW, WS, PS), pp. 423–432.
- CHI-2011-RomeroVPSA #behaviour #video #visualisation
- Evaluating video visualizations of human behavior (MR, AV, JP, JTS, GDA), pp. 1441–1450.
- CHI-2011-ScissorsSIRS #behaviour #collaboration #distributed #editing #realtime
- Real-time collaborative editing behavior in USA and Japanese distributed teams (LES, NSS, TI, SLR, SS), pp. 1119–1128.
- CSCW-2011-RauLVKS #behaviour
- Different time management behaviors of Germans, Chinese and Japanese (PLPR, JL, SV, TK, CMS), pp. 701–704.
- DHM-2011-LaquaiDR #behaviour #modelling
- Impact and Modeling of Driver Behavior Due to Cooperative Assistance Systems (FL, MD, GR), pp. 473–482.
- DHM-2011-WortelenL #approach #automation #behaviour #estimation
- Less Driving While Driving? An Approach for the Estimation of Effects of Future Vehicle Automation Systems on Driver Behavior (BW, AL), pp. 523–532.
- DUXU-v2-2011-Capra #behaviour #human-computer #web
- HCI Browser: A Tool for Administration and Data Collection for Studies of Web Search Behaviors (RC), pp. 259–268.
- DUXU-v2-2011-KimL11a #behaviour #mobile #research
- Ethnographic Research of User Behavior of Mobile Devices of China, Korea, India, and The Netherlands (DK, KPL), pp. 294–302.
- HCD-2011-HajekPJB #behaviour #multimodal
- Influence of a Multimodal Assistance Supporting Anticipatory Driving on the Driving Behavior and Driver’s Acceptance (HH, DP, MJ, KB), pp. 217–226.
- HCD-2011-WangL11a #analysis #behaviour #design #evaluation
- Task Analysis for Behavioral Factors Evaluation in Work System Design (LW, HYKL), pp. 440–448.
- HCI-DDA-2011-DjamasbiST #behaviour #eye tracking #visual notation
- Visual Hierarchy and Viewing Behavior: An Eye Tracking Study (SD, MS, TT), pp. 331–340.
- HCI-DDA-2011-KalwarHP #behaviour #internet
- Finding a Relationship between Internet Anxiety and Human Behavior (SKK, KH, JP), pp. 359–367.
- HCI-DDA-2011-KimJRWS #behaviour #simulation #using
- Human Behavioral Simulation Using Affordance-Based Agent Model (NK, JJ, LR, RAW, YJS), pp. 368–377.
- HCI-ITE-2011-JohnsonLNY #behaviour
- Analyzing User Behavior within a Haptic System (SLJ, YL, CSN, TY), pp. 62–70.
- HCI-MIIE-2011-AiharaKT #behaviour #cost analysis #recommendation
- Behavioral Cost-Based Recommendation Model for Wanderers in Town (KA, HK, HT), pp. 271–279.
- HCI-MIIE-2011-AoyagiOIS #behaviour #communication
- Proposal of a Method for Promotion of Continuous Pro-Environmental Behavior with Easy Communication (SA, TO, HI, HS), pp. 465–473.
- HCI-MIIE-2011-ChiangT11a #behaviour #mobile #network #smarttech #social #twitter
- The Effort of Social Networking on Social Behavior — Integrating Twitter, Mobile Devices, and Wearable Clothing as an Example (CWC, KT), pp. 30–37.
- HCI-MIIE-2011-KimDCH #behaviour #energy
- Assessing the Effect of a Power-Flow Gauge on Driving Behaviors Affecting Energy Consumption (SHK, HD, EC, HH), pp. 411–417.
- HCI-MIIE-2011-KimHJHMJ #analysis #behaviour #using #video
- Analysis of Low-Floor Bus Passengers’ Behavior Patterns Using Video Observation (JYK, HH, BSJ, BHH, YJM, YGJ), pp. 391–400.
- HCI-MIIE-2011-LimPJK #behaviour #experience
- Driver’s Experience and Behavioral Patterns through the Observation of Commercial Vehicle Driving (YL, SP, ESJ, TK), pp. 426–434.
- HCI-MIIE-2011-WalterSSGHSBLTS #behaviour #classification #multimodal
- Multimodal Emotion Classification in Naturalistic User Behavior (SW, SS, MS, MG, DH, MS, RB, KL, HCT, FS), pp. 603–611.
- HCI-UA-2011-HsuC #approach #behaviour #navigation
- Associating Learners’ Cognitive Style with Their Navigation Behaviors: A Data-Mining Approach (YCH, SYC), pp. 27–34.
- HIMI-v1-2011-Asahi #behaviour #privacy #research #ubiquitous
- Privacy Concern in Ubiquitous Society and Research on Consumer Behavior (YA), pp. 291–300.
- HIMI-v1-2011-NguyenV #behaviour #online #privacy #question
- Does Privacy Information Influence Users’ Online Purchasing Behavior? (JHN, KPLV), pp. 349–358.
- HIMI-v2-2011-BrandonEGFGV #behaviour #feedback #social #visual notation
- The Effects Visual Feedback on Social Behavior during Decision Making Meetings (MB, SE, TdG, TF, BvG, TV), pp. 219–228.
- HIMI-v2-2011-Otsuka #analysis #behaviour #comprehension #multimodal #people
- Multimodal Conversation Scene Analysis for Understanding People’s Communicative Behaviors in Face-to-Face Meetings (KO), pp. 171–179.
- HIMI-v2-2011-ShinCRR #behaviour #interactive #named #visualisation
- VizKid: A Behavior Capture and Visualization System of Adult-Child Interaction (GS, TC, AR, MR), pp. 190–198.
- IDGD-2011-OginoKIK #behaviour #comprehension
- Smart Store Understanding Consumer’s Preference through Behavior Logs (AO, TK, YI, TK), pp. 385–392.
- IDGD-2011-YangLD #behaviour #case study #internet #mobile
- A Case Study: Behavior Study of Chinese Users on the Internet and Mobile Internet (YY, HL, GD), pp. 585–593.
- OCSC-2011-TsaiHT11a #behaviour #difference #metric
- Measurement of Tagging Behavior Differences (LCT, SLH, KHT), pp. 373–377.
- VISSOFT-2011-ChoudhuryR #behaviour #memory management #runtime #visualisation
- Abstract visualization of runtime memory behavior (ANMIC, PR), pp. 1–8.
- VISSOFT-2011-WirthPS #approach #behaviour #multi #visualisation
- A multi-level approach for visualization and exploration of reactive program behavior (CW, HP, RS), pp. 1–4.
- CAiSE-2011-LiaskosLJM #behaviour #information management
- Goal-Based Behavioral Customization of Information Systems (SL, ML, MDJ, JM), pp. 77–92.
- ICEIS-v1-2011-WeiY #analysis #behaviour #game studies #metric #security
- Security Investment Analysis on Gaming Theory with Measurements of Cost and Decision Behavior (WW, RY), pp. 519–523.
- ICEIS-v4-2011-TongYZS #behaviour #bibliography #online #research
- A Review of Online Consumer Behavior Research (LyT, QJY, QJZ, HZS), pp. 170–175.
- ICEIS-v4-2011-ZhangFZ #behaviour #industrial #performance
- An Empericial Study about Franchise Relationship Behaviors’s Impacts on Franchisees’ Performance in Fastfood Industry (YZ, JF, YZ), pp. 695–701.
- CIKM-2011-AielloDOM #behaviour #clustering #query #topic
- Behavior-driven clustering of queries into topics (LMA, DD, UO, FM), pp. 1373–1382.
- CIKM-2011-CarteretteKY #behaviour #effectiveness #evaluation #simulation
- Simulating simple user behavior for system effectiveness evaluation (BC, EK, EY), pp. 611–620.
- CIKM-2011-FeiJYLH #approach #behaviour #learning #multi #predict #social
- Content based social behavior prediction: a multi-task learning approach (HF, RJ, YY, BL, JH), pp. 995–1000.
- CIKM-2011-KimQYL #approach #behaviour
- Advertiser-centric approach to understand user click behavior in sponsored search (SK, TQ, HY, TYL), pp. 2121–2124.
- CIKM-2011-LiuCZZ #behaviour #crawling #web
- User browsing behavior-driven web crawling (ML, RC, MZ, LZ), pp. 87–92.
- CIKM-2011-LiuT #behaviour #scalability #social
- Large-scale behavioral targeting with a social twist (KL, LT), pp. 1815–1824.
- CIKM-2011-PandeyABHCRZ #behaviour #learning #what
- Learning to target: what works for behavioral targeting (SP, MA, AB, AOH, PC, AR, MZ), pp. 1805–1814.
- CIKM-2011-TangLYSGGYZ #behaviour #learning #rank
- Learning to rank audience for behavioral targeting in display ads (JT, NL, JY, YS, SG, BG, SY, MZ), pp. 605–610.
- ECIR-2011-LiuA #behaviour #collaboration #modelling
- Modeling Answerer Behavior in Collaborative Question Answering Systems (QL, EA), pp. 67–79.
- KDD-2011-AhmedLAJS #behaviour #distributed #scalability
- Scalable distributed inference of dynamic user interests for behavioral targeting (AA, YL, MA, VJ, AJS), pp. 114–122.
- KDD-2011-LiL #behaviour #community #detection #framework #generative #modelling #network #simulation #social
- Social flocks: a crowd simulation framework for social network generation, community detection, and collective behavior modeling (CTL, SDL), pp. 765–768.
- KDD-2011-McCloskeyKIKB #behaviour #data mining #mining #using
- From market baskets to mole rats: using data mining techniques to analyze RFID data describing laboratory animal behavior (DPM, MEK, SPI, IK, SBM), pp. 301–306.
- KDD-2011-ZhangCWY #behaviour #comprehension #modelling #predict
- User-click modeling for understanding and predicting search-behavior (YZ, WC, DW, QY), pp. 1388–1396.
- KMIS-2011-JohnMMMB #behaviour #enterprise
- Impact of Behavioral Forces on Knowledge Sharing in an Extended Enterprise System of Systems (LJ, PMM, TM, GRM, JTB), pp. 67–76.
- KMIS-2011-TangPI #behaviour
- Employees’ Innovation Behavior — The Role of External Information Awareness and Proactiveness of Innovation Strategy (JT, LGP, JI), pp. 5–17.
- MLDM-2011-Hasan #behaviour #on the
- On the Temporal Behavior of EEG Recorded during Real Finger Movement (BASH), pp. 335–347.
- RecSys-2011-GorgoglionePT #behaviour #recommendation #trust
- The effect of context-aware recommendations on customer purchasing behavior and trust (MG, UP, AT), pp. 85–92.
- RecSys-2011-LeeL #analysis #behaviour #music #recommendation
- My head is your tail: applying link analysis on long-tailed music listening behavior for music recommendation (KL, KL), pp. 213–220.
- RecSys-2011-SekoYMM #behaviour #recommendation #representation #using
- Group recommendation using feature space representing behavioral tendency and power balance among members (SS, TY, MM, SyM), pp. 101–108.
- SEKE-2011-FerreiraS #behaviour #case study
- Use Case Driven Extension of ProjectIT-RSL to Support Behavioral Concerns (DdAF, ARdS), pp. 740–745.
- SIGIR-2011-Du #behaviour #coordination #multi #web
- Cognitive coordinating behaviors in multitasking web search (JTD), pp. 1117–1118.
- SIGIR-2011-ElsweilerHH #behaviour #comprehension #email #interactive
- Understanding re-finding behavior in naturalistic email interaction logs (DE, MH, MH), pp. 35–44.
- SIGIR-2011-KarimiSCK #behaviour #topic
- Domain expert topic familiarity and search behavior (SK, FS, AC, SK), pp. 1135–1136.
- SIGIR-2011-SinghPS #behaviour #query
- User behavior in zero-recall ecommerce queries (GS, NP, NS), pp. 75–84.
- SIGIR-2011-Tyler #behaviour #multi #persistent #personalisation
- Persistence in the ephemeral: utilizing repeat behaviors for multi-session personalized search (SKT), pp. 1311–1312.
- SIGIR-2011-ZhangCB #behaviour #predict
- Predicting users’ domain knowledge from search behaviors (XZ, MJC, NJB), pp. 1225–1226.
- MoDELS-2011-ClavreulMBF #architecture #behaviour #modelling
- Service-Oriented Architecture Modeling: Bridging the Gap between Structure and Behavior (MC, SM, MBF, RBF), pp. 289–303.
- MoDELS-2011-JensenCGN #behaviour #detection
- A Toolchain for the Detection of Structural and Behavioral Latent System Properties (ACJ, BHCC, HG, ECN), pp. 683–698.
- MoDELS-2011-ClavreulMBF #architecture #behaviour #modelling
- Service-Oriented Architecture Modeling: Bridging the Gap between Structure and Behavior (MC, SM, MBF, RBF), pp. 289–303.
- MoDELS-2011-JensenCGN #behaviour #detection
- A Toolchain for the Detection of Structural and Behavioral Latent System Properties (ACJ, BHCC, HG, ECN), pp. 683–698.
- SAC-2011-BhaskaranNFG #behaviour #detection #learning #online
- Deceit detection via online behavioral learning (NB, IN, MGF, VG), pp. 29–30.
- SAC-2011-KimuraEFYN #behaviour #detection #motivation #named #persuasion #smarttech #using
- iDetective: a persuasive application to motivate healthier behavior using smart phone (HK, JE, YF, AY, TN), pp. 399–404.
- SAC-2011-PorresR #behaviour #interface #modelling #rest #uml #web #web service
- Modeling behavioral RESTful web service interfaces in UML (IP, IR), pp. 1598–1605.
- SAC-2011-SimoesO #behaviour #game studies #learning #modelling
- Leveraging the dynamics of learning by modeling and managing psychosocial relations and behavior by means of game theory and memetics (JCS, NO), pp. 1194–1201.
- ESEC-FSE-2011-BeschastnikhABE #behaviour #modelling #named
- Synoptic: studying logged behavior with inferred models (IB, JA, YB, MDE), pp. 448–451.
- SOSP-2011-HarterDVAA #behaviour #comprehension
- A file is not a file: understanding the I/O behavior of Apple desktop applications (TH, CD, MV, ACAD, RHAD), pp. 71–83.
- CADE-2011-FredriksonCJ #algorithm #analysis #approximate #behaviour #complexity
- Dynamic Behavior Matching: A Complexity Analysis and New Approximation Algorithms (MF, MC, SJ), pp. 252–267.
- CAV-2011-KleinN #automation #behaviour #formal method #rest #verification
- Formalization and Automated Verification of RESTful Behavior (UK, KSN), pp. 541–556.
- CAV-2011-RamanK #behaviour #specification #using
- Analyzing Unsynthesizable Specifications for High-Level Robot Behavior Using LTLMoP (VR, HKG), pp. 663–668.
- TAP-2011-BentakoukPZ #behaviour #consistency #smt #testing #web #web service
- Checking the Behavioral Conformance of Web Services with Symbolic Testing and an SMT Solver (LB, PP, FZ), pp. 33–50.
- ASE-2010-Balint #automation #behaviour #data type
- Automatic inference of abstract type behavior (MB), pp. 499–504.
- ASE-2010-GabrysiakGS #behaviour #interactive #multi #process #requirements #validation
- Deriving behavior of multi-user processes from interactive requirements validation (GG, HG, AS), pp. 355–356.
- ASE-2010-IvanovOSV #analysis #behaviour #embedded #modelling #set #tool support
- REMES tool-chain: a set of integrated tools for behavioral modeling and analysis of embedded systems (DI, MO, CCS, AV), pp. 361–362.
- ASE-2010-LiHG #ajax #behaviour #detection #interactive #web
- Detecting user-visible failures in AJAX web applications by analyzing users’ interaction behaviors (WL, MJH, CG), pp. 155–158.
- CASE-2010-AhnM #analysis #behaviour #clustering #modelling #tool support
- Analysis of circular cluster tools: Transient behavior and semiconductor equipment models (YA, JRM), pp. 39–44.
- CASE-2010-LeeFBSSFS #behaviour #evaluation #framework #modelling
- Product modeling framework and language for behavior evaluation (JHL, SJF, CB, HWS, RS, XF, RDS), pp. 136–143.
- DAC-2010-KuoCTCL #approach #behaviour
- Behavior-level yield enhancement approach for large-scaled analog circuits (CCK, YLC, ICT, LYC, CNJL), pp. 903–908.
- DATE-2010-CongHJ #algorithm #behaviour #pattern matching #pattern recognition #recognition #synthesis
- A generalized control-flow-aware pattern recognition algorithm for behavioral synthesis (JC, HH, WJ), pp. 1255–1260.
- DATE-2010-CongLX #behaviour #coordination #optimisation #synthesis
- Coordinated resource optimization in behavioral synthesis (JC, BL, JX), pp. 1267–1272.
- DATE-2010-EguiaTSPT #behaviour #design #manycore #modelling
- General behavioral thermal modeling and characterization for multi-core microprocessor design (TJAE, SXDT, RS, EHP, MT), pp. 1136–1141.
- DATE-2010-HaoXRY #behaviour #equivalence #optimisation #synthesis
- Optimizing equivalence checking for behavioral synthesis (KH, FX, SR, JY), pp. 1500–1505.
- DATE-2010-YuZQB #behaviour #design #power management
- Behavioral level dual-vth design for reduced leakage power with thermal awareness (JY, QZ, GQ, JB), pp. 1261–1266.
- HT-2010-HuangW #behaviour #parallel #web
- Parallel browsing behavior on the web (JH, RWW), pp. 13–18.
- VLDB-2010-GlavicAMH #behaviour #comprehension #named
- TRAMP: Understanding the Behavior of Schema Mappings through Provenance (BG, GA, RJM, LMH), pp. 1314–1325.
- VLDB-2010-WangSSWCDGW #behaviour #pipes and filters #simulation
- Behavioral Simulations in MapReduce (GW, MAVS, BS, XW, TC, AJD, JG, WMW), pp. 952–963.
- VLDB-2010-YakoutEEOQ #behaviour
- Behavior Based Record Linkage (MY, AKE, HE, MO, AQ), pp. 439–448.
- ITiCSE-2010-Armstrong #behaviour #social
- Robotics and intelligent systems for social and behavioral science undergraduates (TA), pp. 194–198.
- ITiCSE-2010-HowardJN #behaviour #design #learning #online #using
- Reflecting on online learning designs using observed behavior (LH, JJ, CN), pp. 179–183.
- FoSSaCS-2010-AcciaiBZ #behaviour #logic #on the #simulation
- On the Relationship between Spatial Logics and Behavioral Simulations (LA, MB, GZ), pp. 146–160.
- WRLA-2010-RiveraDV #behaviour #domain-specific language #on the #realtime #semantics #visual notation
- On the Behavioral Semantics of Real-Time Domain Specific Visual Languages (JER, FD, AV), pp. 174–190.
- CSMR-2010-CortellessaMP #behaviour #maintenance #reliability #trade-off
- Selecting Optimal Maintenance Plans Based on Cost/Reliability Tradeoffs for Software Subject to Structural and Behavioral Changes (VC, RM, PP), pp. 21–30.
- CSMR-2010-LuciaDGR #behaviour #design pattern #detection #model checking
- Improving Behavioral Design Pattern Detection through Model Checking (ADL, VD, CG, MR), pp. 176–185.
- SCAM-2010-KetterlinC #behaviour #execution #memory management #source code
- Recovering the Memory Behavior of Executable Programs (AK, PC), pp. 189–198.
- WCRE-2010-PerscheidSHGH #analysis #behaviour #online #runtime
- Immediacy through Interactivity: Online Analysis of Run-time Behavior (MP, BS, RH, FG, MH), pp. 77–86.
- WCRE-2010-WongASLM #behaviour #detection #programming #reverse engineering #search-based #using
- Reverse Engineering Utility Functions Using Genetic Programming to Detect Anomalous Behavior in Software (SW, MA, JS, KL, SM), pp. 141–149.
- PLDI-2010-RichardsLBV #analysis #behaviour #javascript #source code
- An analysis of the dynamic behavior of JavaScript programs (GR, SL, BB, JV), pp. 1–12.
- SEFM-2010-Lindsay #behaviour #re-engineering
- Behavior Trees: From Systems Engineering to Software Engineering (PAL), pp. 21–30.
- SEFM-2010-LindsayWY #assessment #behaviour #model checking #safety #using
- Safety Assessment Using Behavior Trees and Model Checking (PAL, KW, NY), pp. 181–190.
- SEFM-2010-Powell #analysis #behaviour #modelling #scalability
- Behavior Engineering — A Scalable Modeling and Analysis Method (DP), pp. 31–40.
- SEFM-2010-WinterHC #behaviour #requirements
- Integrating Requirements: The Behavior Tree Philosophy (KW, IJH, RC), pp. 41–50.
- CHI-2010-AulaKG #behaviour #how #question
- How does search behavior change as search becomes more difficult? (AA, RMK, ZG), pp. 35–44.
- CHI-2010-DixonF #behaviour #implementation #interface #named #reverse engineering #using
- Prefab: implementing advanced behaviors using pixel-based reverse engineering of interface structure (MD, JF), pp. 1525–1534.
- CHI-2010-Kramer #behaviour
- An unobtrusive behavioral model of “gross national happiness” (ADIK), pp. 287–290.
- CHI-2010-MorrisTP #behaviour #bibliography #network #people #social #what #why
- What do people ask their social networks, and why?: a survey study of status message q&a behavior (MRM, JT, KP), pp. 1739–1748.
- CHI-2010-PancieraPET #analysis #behaviour #lifecycle
- Lurking? cyclopaths?: a quantitative lifecycle analysis of user behavior in a geowiki (KAP, RP, TE, LGT), pp. 1917–1926.
- CHI-2010-SaerbeckSBJ #behaviour #education #social
- Expressive robots in education: varying the degree of social supportive behavior of a robotic tutor (MS, TS, CB, MDJ), pp. 1613–1622.
- CHI-2010-StutzmanK #behaviour #facebook #privacy
- Friends only: examining a privacy-enhancing behavior in facebook (FS, JKD), pp. 1553–1562.
- CHI-2010-TsujitaTS #behaviour #communication #evaluation #named
- InPhase: evaluation of a communication system focused on “happy coincidences” of daily behaviors (HT, KT, IS), pp. 2481–2490.
- CHI-2010-Villamarin-SalomonB #behaviour #using
- Using reinforcement to strengthen users’ secure behaviors (RVS, JCB), pp. 363–372.
- CIKM-2010-BethardJ #behaviour #learning #modelling
- Who should I cite: learning literature search models from citation behavior (SB, DJ), pp. 609–618.
- CIKM-2010-KotaN #behaviour #network #social
- Threshold behavior of incentives in social networks (NK, YN), pp. 1461–1464.
- CIKM-2010-LimNJLL #behaviour #bibliography #detection #rating #using
- Detecting product review spammers using rating behaviors (EPL, VAN, NJ, BL, HWL), pp. 939–948.
- CIKM-2010-MoonDJLZ #behaviour #ranking
- User behavior driven ranking without editorial judgments (TM, GD, SJ, CL, ZZ), pp. 1473–1476.
- CIKM-2010-PuneraM #behaviour #information management #modelling #web
- The anatomy of a click: modeling user behavior on web information systems (KP, SM), pp. 989–998.
- CIKM-2010-SushmitaJLV #behaviour #interface
- Factors affecting click-through behavior in aggregated search interfaces (SS, HJ, ML, RV), pp. 519–528.
- CIKM-2010-YangGCTLZS #behaviour #comprehension #network #social #twitter
- Understanding retweeting behaviors in social networks (ZY, JG, KC, JT, JL, LZ, ZS), pp. 1633–1636.
- ICPR-2010-KosmopoulosVV #behaviour #modelling #multi #robust
- Robust Human Behavior Modeling from Multiple Cameras (DIK, AV, TAV), pp. 3575–3578.
- ICPR-2010-Serra-ToroMTHNC #behaviour #monitoring #quality #video
- Assessing Water Quality by Video Monitoring Fish Swimming Behavior (CST, RM, VJT, IMHM, MNR, PC), pp. 428–431.
- ICPR-2010-ZhuHYL #behaviour #learning #metric #prototype #recognition #using
- Prototype Learning Using Metric Learning Based Behavior Recognition (PZ, WH, CY, LL), pp. 2604–2607.
- ICPR-2010-ZwengK #behaviour #image #multi #recognition #sequence #using
- Unexpected Human Behavior Recognition in Image Sequences Using Multiple Features (AZ, MK), pp. 368–371.
- KDD-2010-CaoOYW #behaviour #detection #sequence
- Detecting abnormal coupled sequences and sequence changes in group-based manipulative trading behaviors (LC, YO, PSY, GW), pp. 85–94.
- KDD-2010-LiDHKN #behaviour #mining
- Mining periodic behaviors for moving objects (ZL, BD, JH, RK, PN), pp. 1099–1108.
- KMIS-2010-AlonsoBL #behaviour #incremental #modelling
- Incremental user Modeling with Heterogeneous user Behaviors (RA, PB, HL), pp. 129–134.
- KMIS-2010-LiDFF #behaviour #comprehension
- Understanding Behavioral Intention of e-Learning System Re-use (YL, YD, ZF, WF), pp. 218–223.
- SEKE-2010-MoshirpourMF #behaviour #detection #distributed #specification #using
- Detecting Emergent Behavior in Distributed Systems Using Scenario-Based Specifications (MM, AM, BHF), pp. 349–354.
- SIGIR-2010-DupretP #behaviour #precise
- A user behavior model for average precision and its generalization to graded judgments (GD, BP), pp. 531–538.
- SIGIR-2010-LiuLGB #behaviour #detection
- Can search systems detect users’ task difficulty?: some behavioral signals (JL, CL, JG, NJB), pp. 845–846.
- SIGIR-2010-LiuWD #analysis #behaviour #comprehension #web
- Understanding web browsing behaviors through Weibull analysis of dwell time (CL, RWW, STD), pp. 379–386.
- SIGIR-2010-LiuYSCCL #behaviour #learning #rank
- Learning to rank audience for behavioral targeting (NL, JY, DS, DC, ZC, YL), pp. 719–720.
- SIGIR-2010-ZhongWWCZCW #behaviour
- Incorporating post-click behaviors into a click model (FZ, DW, GW, WC, YZ, ZC, HW), pp. 355–362.
- ECMFA-2010-EllnerADJKP #behaviour #modelling #named
- eSPEM — A SPEM Extension for Enactable Behavior Modeling (RE, SAH, JD, MJ, DK, MP), pp. 116–131.
- MoDELS-v1-2010-GoldsbyC #automation #behaviour #modelling #uml
- Automatically Discovering Properties That Specify the Latent Behavior of UML Models (HG, BHCC), pp. 316–330.
- ECOOP-2010-HarelMW #behaviour #coordination #java #programming
- Programming Coordinated Behavior in Java (DH, AM, GW), pp. 250–274.
- QAPL-2010-Aldini #approximate #behaviour #equivalence #probability #testing
- Approximate Testing Equivalence Based on Time, Probability, and Observed Behavior (AA), pp. 1–15.
- SAC-2010-FotoohiG #approach #behaviour #case study
- A supervisory control approach for safe behavior of service robot case study: FRIEND (LF, AG), pp. 1305–1306.
- SAC-2010-FurukawaOMI #behaviour #predict #social
- Prediction of social bookmarking based on a behavior transition model (TF, SO, YM, MI), pp. 1741–1747.
- FSE-2010-JinOX #behaviour #named #testing
- BERT: a tool for behavioral regression testing (WJ, AO, TX), pp. 361–362.
- FSE-2010-Krka #approach #behaviour #incremental #modelling #refinement #requirements #specification
- From requirements to partial behavior models: an iterative approach to incremental specification refinement (IK), pp. 341–344.
- FSE-2010-Shokry #behaviour #synthesis #towards #using
- Towards behavior elaboration and synthesis using modes (HS), pp. 349–352.
- ICSE-2010-KrkaBPGM #behaviour #execution #invariant #model inference #using
- Using dynamic execution traces and program invariants to enhance behavioral model inference (IK, YB, DP, JG, NM), pp. 179–182.
- ICSE-2010-ReisnerSMFP #behaviour #configuration management #evaluation #symbolic computation #using
- Using symbolic evaluation to understand behavior in configurable software systems (ER, CS, KKM, JSF, AP), pp. 445–454.
- SLE-2010-BandenerSE #behaviour #debugging #execution #specification #visual notation
- Extending DMM Behavior Specifications for Visual Execution and Debugging (NB, CS, GE), pp. 357–376.
- ASPLOS-2010-Mesa-MartinezAR #behaviour
- Characterizing processor thermal behavior (FJMM, EKA, JR), pp. 193–204.
- ASPLOS-2010-Shen #behaviour
- Request behavior variations (KS), pp. 103–116.
- CGO-2010-JiangZTMGSG #behaviour #correlation #predict #statistics
- Exploiting statistical correlations for proactive prediction of program behaviors (YJ, EZZ, KT, FM, MG, XS, YG), pp. 248–256.
- CGO-2010-StephensonRYH #behaviour #statistics
- Statistically regulating program behavior via mainstream computing (MS, RR, EY, EVH), pp. 238–247.
- ICST-2010-JinOX #automation #behaviour #testing
- Automated Behavioral Regression Testing (WJ, AO, TX), pp. 137–146.
- ICTSS-2010-Heitmeyer #approach #behaviour #modelling #testing
- A Model-Based Approach to Testing Software for Critical Behavior and Properties (CLH), p. 15.
- TAP-2010-BueDKB #abstraction #behaviour #using
- Building a Test-Ready Abstraction of a Behavioral Model Using CLP (PCB, FD, ADK, FB), pp. 167–182.
- CBSE-2009-PochP #behaviour #component #legacy #specification
- Extracting Behavior Specification of Components in Legacy Applications (TP, FP), pp. 87–103.
- ASE-2009-DallmeierZM #behaviour #generative
- Generating Fixes from Object Behavior Anomalies (VD, AZ, BM), pp. 550–554.
- CASE-2009-SinghR #behaviour #problem
- The Potluck Problem with consumers’ choice behavior (NS, SR), pp. 328–333.
- DAC-2009-MarcilioSAR #behaviour #novel #verification
- A novel verification technique to uncover out-of-order DUV behaviors (GM, LCVdS, BA, SR), pp. 448–453.
- DATE-2009-KonigBSMNW #behaviour #embedded #evaluation #performance #realtime
- Application specific performance indicators for quantitative evaluation of the timing behavior for embedded real-time systems (FK, DB, FS, UM, MN, GW), pp. 519–523.
- DATE-2009-MukherjeeAPMD #approach #behaviour #formal method #generative
- A formal approach for specification-driven AMS behavioral model generation (SM, AA, SKP, RM, PD), pp. 1512–1517.
- DATE-2009-YangHMP #behaviour #semantics #towards
- Towards a formal semantics for the AADL behavior annex (ZY, KH, DM, LP), pp. 1166–1171.
- DATE-2009-YeoK #behaviour #manycore
- Temperature-aware scheduler based on thermal behavior grouping in multicore systems (IY, EJK), pp. 946–951.
- HT-2009-MeissDGRM #behaviour #web #what
- What’s in a session: tracking individual behavior on the web (MM, JD, BG, JJR, FM), pp. 173–182.
- HT-2009-Santos-NetoCAIR #behaviour #social
- Individual and social behavior in tagging systems (ESN, DC, NA, AI, MR), pp. 183–192.
- VLDB-2009-AliGRSTVWZKALRKSGBCGBLNWMSNG #behaviour #online
- Microsoft CEP Server and Online Behavioral Targeting (MHA, CG, BSR, BS, TT, TV, PW, PZ, AK, AA, ML, AR, RK, RS, TG, SB, BC, JG, SB, YL, VDN, XW, DM, IS, ON, SG), pp. 1558–1561.
- ITiCSE-2009-RodrigoBJADELPST #behaviour #predict
- Affective and behavioral predictors of novice programmer achievement (MMTR, RSB, MCJ, ACMA, TD, MBVEL, SALL, SAMSP, JOS, EST), pp. 156–160.
- ITiCSE-2009-WangHCT #behaviour #collaboration #learning
- The role of collective efficacy and collaborative learning behavior in learning computer science through CSCL (SLW, GHH, JCC, PST), p. 352.
- ICPC-J-2008-DaltonWDH09 #behaviour #embedded #network #runtime #tool support #visualisation
- Visualizing the runtime behavior of embedded network systems: A toolkit for TinyOS (ARD, SKW, SD, JOH), pp. 446–469.
- CSMR-2009-LuciaDGR #behaviour #identification #parsing #visual notation
- Behavioral Pattern Identification through Visual Language Parsing and Code Instrumentation (ADL, VD, CG, MR), pp. 99–108.
- CSMR-2009-MarwedeRHH #automation #behaviour #correlation #distributed #scalability
- Automatic Failure Diagnosis Support in Distributed Large-Scale Software Systems Based on Timing Behavior Anomaly Correlation (NM, MR, AvH, WH), pp. 47–58.
- WCRE-1999-AckermannLC99a #behaviour #interactive
- Recovering Views of Inter-System Interaction Behaviors (CA, ML, RC), pp. 53–61.
- SEFM-2009-HummelT #behaviour #specification #using
- Behavioral Specification of Reactive Systems Using Stream-Based I/O Tables (BH, JT), pp. 137–146.
- CHI-2009-ConsolvoML #behaviour #design
- Theory-driven design strategies for technologies that support behavior change in everyday life (SC, DWM, JAL), pp. 405–414.
- CHI-2009-LeshedPHCBLMG #behaviour #feedback #realtime #visualisation
- Visualizing real-time language-based feedback on teamwork behavior in computer-mediated groups (GL, DP, JTH, DC, JPB, SL, PLM, GG), pp. 537–546.
- CHI-2009-MankowskiBSS #behaviour #canonical #protocol
- Finding canonical behaviors in user protocols (WCM, PB, AS, DDS), pp. 1323–1326.
- DHM-2009-AmantiniC #behaviour #fault #predict #simulation
- A Simple Simulation Predicting Driver Behavior, Attitudes and Errors (AA, PCC), pp. 345–354.
- DHM-2009-BurghardtK #approach #behaviour #modelling #probability #smarttech
- A Probabilistic Approach for Modeling Human Behavior in Smart Environments (CB, TK), pp. 202–210.
- DHM-2009-LudtkeWOW #behaviour #fault #modelling #simulation
- Modeling Pilot and Driver Behavior for Human Error Simulation (AL, LW, JPO, BW), pp. 403–412.
- DHM-2009-PanCL #adaptation #behaviour #mining #online #user interface
- User Behavior Mining for On-Line GUI Adaptation (WP, YC, JL), pp. 275–284.
- DHM-2009-SchwartzeFA #behaviour #smarttech #user interface
- Behavior-Sensitive User Interfaces for Smart Environments (VS, SF, SA), pp. 305–314.
- HCD-2009-KurosuH #analysis #behaviour #communication #development #research
- Culture and Communication Behavior: A Research Based on the Artifact Development Analysis (MK, AH), pp. 468–475.
- HCD-2009-MahouiJZA #behaviour #design #interface #personalisation #web
- Leveraging User Search Behavior to Design Personalized Browsing Interfaces for Healthcare Web Sites (MM, JFJ, DZ, KA), pp. 511–520.
- HCD-2009-ProppF #behaviour #testing #usability
- Defining Expected Behavior for Usability Testing (SP, PF), pp. 110–119.
- HCD-2009-Stephane #analysis #behaviour #predict #simulation
- User Behavior Patterns: Gathering, Analysis, Simulation and Prediction (LS), pp. 322–331.
- HCI-AUII-2009-IizukaAM #behaviour #using
- The Anticipation of Human Behavior Using “Parasitic Humanoid” (HI, HA, TM), pp. 284–293.
- HCI-AUII-2009-ImamuraOK #analysis #behaviour #modelling #ubiquitous
- Modeling Personal Preferences on Commodities by Behavior Log Analysis with Ubiquitous Sensing (NI, AO, TK), pp. 294–303.
- HCI-AUII-2009-YuasaTM #behaviour
- Autonomous Turn-Taking Agent System Based on Behavior Model (MY, HT, NM), pp. 368–373.
- HCI-NIMT-2009-KimKYK #behaviour #design #interactive
- Designing Emotional and Interactive Behaviors for an Entertainment Robot (YCK, HTK, WCY, JCK), pp. 321–330.
- HCI-NIMT-2009-LevendovszkyM #behaviour #domain-specific language #modelling #visual notation
- Tooling the Dynamic Behavior Models of Graphical DSLs (TL, TM), pp. 830–839.
- HCI-NT-2009-HuangLH #behaviour #interactive
- E-Shopping Behavior and User-Web Interaction for Developing a Useful Green Website (FHH, YLL, SLH), pp. 446–454.
- HCI-NT-2009-MiyazakiSY #behaviour #distributed #java #runtime #using #virtual machine
- Investigating the Run Time Behavior of Distributed Applications by Using Tiny Java Virtual Machines with Wireless Communications (TM, TS, FY), pp. 882–889.
- HCI-VAD-2009-KharraziFD #behaviour #design #game studies #modelling
- Healthcare Game Design: Behavioral Modeling of Serious Gaming Design for Children with Chronic Diseases (HK, AF, JD), pp. 335–344.
- HCI-VAD-2009-KiriyamaS #behaviour #interactive
- Analyzing Human Behaviors in an Interactive Art Installation (TK, MS), pp. 345–352.
- HIMI-DIE-2009-KawataO #behaviour #information retrieval #named
- InfoScape: A Browser for User Behavior-Based Information Retrieval System (MK, KO), pp. 419–428.
- HIMI-II-2009-KushiroKNI #behaviour #health #monitoring
- Non-intrusive Human Behavior Monitoring Sensor for Health Care System (NK, MK, MN, YI), pp. 549–558.
- IDGD-2009-EuneL #behaviour #difference #mobile
- Cultural Dimensions in User Preferences and Behaviors of Mobile Phones and Interpretation of National Cultural Differences (JE, KPL), pp. 29–38.
- OCSC-2009-BreitfussPI #automation #behaviour #generative #multimodal
- Automatic Generation of Non-verbal Behavior for Agents in Virtual Worlds: A System for Supporting Multimodal Conversations of Bots and Avatars (WB, HP, MI), pp. 153–161.
- OCSC-2009-DuhC #behaviour #game studies #online
- Cheating Behaviors in Online Gaming (HBLD, VHhC), pp. 567–573.
- OCSC-2009-HaefligerRJK #behaviour #community #rating
- Modding as Rating Behavior in Virtual Communities: The Case of Rooster Teeth Productions (SH, PR, PMJ, GvK), pp. 197–206.
- OCSC-2009-PhillipsGS #approach #behaviour #visualisation
- A Visualization Approach for Group Behaviors, Beliefs and Intentions to Support Critical Decisions (CLP, NDG, JTS), pp. 91–100.
- VISSOFT-2009-OliveiraPHC #behaviour #domain-specific language #source code #visualisation
- Visualization of domain-specific programs’ behavior (NO, MJVP, PRH, DCdC), pp. 37–40.
- CAiSE-2009-PlanasCG #action semantics #behaviour #modelling #semantics #specification #uml #verification
- Verifying Action Semantics Specifications in UML Behavioral Models (EP, JC, CG), pp. 125–140.
- ICEIS-DISI-2009-Geczy #behaviour #interactive #web
- Human Behavior and Interactions in Web Environments (PG), pp. 5–6.
- CIKM-2009-TangL #behaviour #learning #scalability #social
- Scalable learning of collective behavior based on sparse social dimensions (LT, HL), pp. 1107–1116.
- CIKM-2009-WhiteD #behaviour #predict
- Characterizing and predicting search engine switching behavior (RWW, STD), pp. 87–96.
- KDD-2009-AttenbergPS #behaviour #modelling #predict
- Modeling and predicting user behavior in sponsored search (JA, SP, TS), pp. 1067–1076.
- KDD-2009-ChenPC #behaviour #scalability
- Large-scale behavioral targeting (YC, DP, JFC), pp. 209–218.
- KDD-2009-ChuPBMPCZ #analysis #behaviour #case study #exclamation
- A case study of behavior-driven conjoint analysis on Yahoo!: front page today module (WC, STP, TB, NM, AP, SC, JZ), pp. 1097–1104.
- KDD-2009-LoCHKS #approach #behaviour #classification #detection #mining
- Classification of software behaviors for failure detection: a discriminative pattern mining approach (DL, HC, JH, SCK, CS), pp. 557–566.
- KDD-2009-ShiZCZ #behaviour #online
- User grouping behavior in online forums (XS, JZ, RC, LZ), pp. 777–786.
- KDIR-2009-ClementeDCR #behaviour #classification #image
- Behavior of Different Image Classifiers within a Broad Domain (BC, MLD, AC, PGR), pp. 278–283.
- SEKE-2009-LiYJQG #behaviour #consistency #named #testing #web #web service
- WSTester: Testing Web Service for Behavior Conformance (BL, LY, SJ, DQ, XG), pp. 456–459.
- SIGIR-2009-Barabasi #behaviour #network
- From networks to human behavior (ALB), p. 435.
- SIGIR-2009-DostertK #behaviour
- Users’ stopping behaviors and estimates of recall (MD, DK), pp. 820–821.
- SAC-2009-BroyLSSW #adaptation #behaviour #formal method
- Formalizing the notion of adaptive system behavior (MB, CL, WS, BS, SW), pp. 1029–1033.
- SAC-2009-OrdinezDSO #behaviour #resource management #scheduling
- Resource sharing in behavioral based scheduling (LO, DD, RMS, JO), pp. 1972–1978.
- ESEC-FSE-2009-BertolinoIPT #automation #behaviour #composition #protocol #synthesis
- Automatic synthesis of behavior protocols for composable web-services (AB, PI, PP, MT), pp. 141–150.
- ESEC-FSE-2009-HannaBR #automation #automaton #behaviour #composition #independence #verification
- Behavioral automata composition for automatic topology independent verification of parameterized systems (YH, SB, HR), pp. 325–334.
- ESEC-FSE-2009-KrkaBEM #behaviour #component #modelling #specification
- Synthesizing partial component-level behavior models from system specifications (IK, YB, GE, NM), pp. 305–314.
- ESEC-FSE-2009-LoMP #automation #behaviour #model inference
- Automatic steering of behavioral model inference (DL, LM, MP), pp. 345–354.
- ICSE-2009-DamasLRL #behaviour #modelling #process #synthesis
- Analyzing critical process models through behavior model synthesis (CD, BL, FR, AvL), pp. 441–451.
- ICSE-2009-GhezziMM #behaviour #graph transformation #modelling
- Synthesizing intensional behavior models by graph transformation (CG, AM, MM), pp. 430–440.
- ICSE-2009-HenklerGHSAEHLSG #behaviour #realtime #synthesis
- Synthesis of timed behavior from scenarios in the Fujaba Real-Time Tool Suite (SH, JG, MH, WS, KA, TE, CH, RL, AS, HG), pp. 615–618.
- LCTES-2009-HinesPGWT #behaviour #lookahead
- Guaranteeing instruction fetch behavior with a lookahead instruction fetch engine (LIFE) (SRH, YP, PG, DBW, GST), pp. 119–128.
- ICLP-2009-Simari #behaviour #modelling #probability #reasoning
- Stochastic Reasoning with Models of Agent Behavior (GIS), pp. 538–539.
- VMCAI-2009-BentonF #behaviour #java #source code
- Mostly-Functional Behavior in Java Programs (WCB, CNF), pp. 29–43.
- ECSA-2008-KamalA #behaviour #design pattern #modelling #using
- Modeling Architectural Patterns’ Behavior Using Architectural Primitives (AWK, PA), pp. 164–179.
- ECSA-2008-MosserBR #behaviour #evolution #process #web #web service
- Web Services Orchestrations Evolution: A Merge Process for Behavioral Evolution (SM, MBF, MR), pp. 35–49.
- CASE-2008-NieIYTOM #analysis #behaviour #performance #video
- High-speed video analysis of laboratory rats behaviors in forced swim test (YN, II, KY, TT, KO, HM), pp. 206–211.
- DAC-2008-HaubeltSKM #agile #automation #behaviour #design #modelling #named #prototype
- SystemCoDesigner: automatic design space exploration and rapid prototyping from behavioral models (CH, TS, JK, MM), pp. 580–585.
- DAC-2008-PotkonjakK #behaviour
- (Bio)-behavioral CAD (MP, FK), pp. 351–352.
- ITiCSE-2008-LevyB #behaviour #tool support
- Perceived behavior control and its influence on the adoption of software tools (RBBL, MBA), pp. 169–173.
- FASE-2008-AlrajehRU #behaviour #modelling #using
- Deriving Non-zeno Behavior Models from Goal Models Using ILP (DA, AR, SU), pp. 1–15.
- ICPC-2008-DaltonH #behaviour #runtime #tool support #visualisation
- A Toolkit for Visualizing the Runtime Behavior of TinyOS Applications (ARD, JOH), pp. 43–52.
- ICPC-2008-FonsecaCHP #behaviour #how #web
- How to Interconnect Operational and Behavioral Views of Web Applications (RFCdF, DCdC, PRH, MJVP), pp. 263–267.
- SCAM-2008-GondowKI #analysis #approach #automation #behaviour #c #named #preprocessor
- TBCppA: A Tracer Approach for Automatic Accurate Analysis of C Preprocessor’s Behaviors (KG, HK, TI), pp. 35–44.
- FM-2008-DovlandJOS #behaviour #lazy evaluation #type system
- Lazy Behavioral Subtyping (JD, EBJ, OO, MS), pp. 52–67.
- SEFM-2008-Hammal #behaviour #component
- Behavioral Compatibility of Active Components (YH), pp. 372–376.
- GT-VC-2007-ErmelE08 #animation #behaviour
- Behavior-Preserving Simulation-to-Animation Model and Rule Transformations (CE, HE), pp. 55–74.
- ICGT-2008-Dang #behaviour #graph grammar #ocl #validation
- Triple Graph Grammars and OCL for Validating System Behavior (DHD), pp. 481–483.
- ICGT-2008-RangelLKEB #behaviour #refactoring #using
- Behavior Preservation in Model Refactoring Using DPO Transformations with Borrowed Contexts (GR, LL, BK, HE, PB), pp. 242–256.
- CHI-2008-HayesGAT #behaviour #named
- CareLog: a selective archiving tool for behavior management in schools (GRH, LMG, GDA, KNT), pp. 685–694.
- CHI-2008-KramerR #behaviour #modelling #word
- Word usage and posting behaviors: modeling blogs with unobtrusive data collection methods (ADIK, KR), pp. 1125–1128.
- CHI-2008-LawranceBBR #behaviour #maintenance #using
- Using information scent to model the dynamic foraging behavior of programmers in maintenance tasks (JL, RKEB, MMB, KR), pp. 1323–1332.
- CHI-2008-SalminenSLRSRRE #behaviour
- Emotional and behavioral responses to haptic stimulation (KS, VS, JL, JR, RS, RR, JR, GEE), pp. 1555–1562.
- ICEIS-HCI-2008-GeczyIAH #behaviour #enterprise #information management #network
- Complex User Behavioral Networks at Enterprise Information Systems (PG, NI, SA, KH), pp. 233–239.
- ICEIS-ISAS1-2008-LanoC #behaviour #refinement #semantics #state machine
- Semantics and Refinement of Behavior State Machines (KL, DC), pp. 42–49.
- CIKM-2008-ParikhS #behaviour #query #semantics
- Inferring semantic query relations from collective user behavior (NP, NS), pp. 349–358.
- ICPR-2008-AzoughDMH #behaviour #modelling #monitoring #personalisation
- Intuitive event modeling for personalized behavior monitoring (AA, AD, FDM, MSH), pp. 1–4.
- KDD-2008-MeloAL #behaviour #metric #network #predict #question
- Can complex network metrics predict the behavior of NBA teams? (POSVdM, VAFA, AAFL), pp. 695–703.
- KR-2008-SardinaPG #behaviour #composition
- Behavior Composition in the Presence of Failure (SS, FP, GDG), pp. 640–650.
- SEKE-2008-KimBBSA #behaviour #named #using #visualisation
- VisRFID: Visualizing Customer Behavior in Geotemporal Space Using RFID Technology (BK, KB, MB, RS, BA), pp. 422–427.
- SEKE-2008-PengDZ #behaviour #correctness #design pattern #implementation #verification
- Verifying Behavioral Correctness of Design Pattern Implementation (TP, JD, YZ), pp. 454–459.
- SIGIR-2008-Shah #behaviour #collaboration #comprehension #implementation
- Understanding system implementation and user behavior in a collaborative information seeking environment (CS), p. 896.
- MoDELS-2008-GoldsbyC #adaptation #automation #behaviour #generative #modelling #nondeterminism
- Automatically Generating Behavioral Models of Adaptive Systems to Address Uncertainty (HG, BHCC), pp. 568–583.
- MoDELS-2008-JurackLMT #behaviour #consistency #diagrams #modelling #process
- Sufficient Criteria for Consistent Behavior Modeling with Refined Activity Diagrams (SJ, LL, KM, GT), pp. 341–355.
- MoDELS-2008-OberCL #behaviour #composition #modelling #slicing #using
- Behavioral Modelling and Composition of Object Slices Using Event Observation (IO, BC, YL), pp. 219–233.
- MoDELS-2008-GoldsbyC #adaptation #automation #behaviour #generative #modelling #nondeterminism
- Automatically Generating Behavioral Models of Adaptive Systems to Address Uncertainty (HG, BHCC), pp. 568–583.
- MoDELS-2008-JurackLMT #behaviour #consistency #diagrams #modelling #process
- Sufficient Criteria for Consistent Behavior Modeling with Refined Activity Diagrams (SJ, LL, KM, GT), pp. 341–355.
- MoDELS-2008-OberCL #behaviour #composition #modelling #slicing #using
- Behavioral Modelling and Composition of Object Slices Using Event Observation (IO, BC, YL), pp. 219–233.
- SAC-2008-AtallaMAGA #behaviour #peer-to-peer #quality #web
- Analyzing the impact of churn and malicious behavior on the quality of peer-to-peer web search (FA, DM, JMA, MAG, VA), pp. 1137–1144.
- SAC-2008-AtoofianB #behaviour #embedded #latency #memory management
- Exploiting program cyclic behavior to reduce memory latency in embedded processors (EA, AB), pp. 1482–1486.
- SAC-2008-OrdinezDS #approach #behaviour #scheduling
- A behavior priority driven approach for resource reservation scheduling (LO, DD, RMS), pp. 315–319.
- ICSE-2008-KoM #behaviour #debugging #why
- Debugging reinvented: asking and answering why and why not questions about program behavior (AJK, BAM), pp. 301–310.
- ICSE-2008-LorenzoliMP #automation #behaviour #generative #modelling
- Automatic generation of software behavioral models (DL, LM, MP), pp. 501–510.
- SLE-2008-RiveraGLV #behaviour #maude #modelling #rule-based #semantics #visual notation
- Analyzing Rule-Based Behavioral Semantics of Visual Modeling Languages with Maude (JER, EG, JdL, AV), pp. 54–73.
- ASPLOS-2008-BallapuramSL #behaviour #multi #semantics
- Exploiting access semantics and program behavior to reduce snoop power in chip multiprocessors (CSB, AS, HHSL), pp. 60–69.
- ICLP-2008-ArandaPRV #behaviour #concurrent #constraints #probability #programming
- Stochastic Behavior and Explicit Discrete Time in Concurrent Constraint Programming (JA, JAP, CR, FDV), pp. 682–686.
- CBSE-2007-SeryP #behaviour #component #composition #slicing #specification
- Slicing of Component Behavior Specification with Respect to Their Composition (OS, FP), pp. 189–202.
- ASE-2007-MateescuPS #adaptation #algebra #behaviour #component #composition #encoding #process
- Behavioral adaptation of component compositions based on process algebra encodings (RM, PP, GS), pp. 385–388.
- CASE-2007-00010DAR #behaviour #feature model #realtime
- A Micropositioning System with Real-Time Feature Extraction Capability for Quantifying C. elegans Locomotive Behavior (WW, YS, SJD, MA, PJR), pp. 243–248.
- CASE-2007-IshiiNYOM #behaviour #quantifier #realtime
- Real-time and Long-time Quantification of Behavior of Laboratory Mice Scratching (II, YN, KY, KO, HM), pp. 628–633.
- CASE-2007-KobetskiRAF #behaviour
- Minimization of Expected Cycle Time in Manufacturing Cells with Uncontrollable Behavior (AK, JR, KÅ, MF), pp. 14–19.
- CASE-2007-LeungG #behaviour #locality #multi
- Multi-Robot Localization and Mapping Strategy: Utilizing Behavior Based Dynamic Tree Structure and Observer-explorer Routine (KKKL, GG), pp. 881–886.
- DAC-2007-BogdanM #behaviour
- Quantum-Like Effects in Network-on-Chip Buffers Behavior (PB, RM), pp. 266–267.
- DAC-2007-YangHH #automation #behaviour #design #verification
- Automatic Verification of External Interrupt Behaviors for Microprocessor Design (FCY, WKH, IJH), pp. 896–901.
- DATE-2007-BarajasCCMGCBI #behaviour #interactive #modelling #optimisation
- Interactive presentation: Behavioral modeling of delay-locked loops and its application to jitter optimization in ultra wide-band impulse radio systems (EB, RC, DC, DM, JLG, IC, SB, MI), pp. 1430–1435.
- DATE-2007-ChenSN #behaviour #composition #semantics #specification
- Compositional specification of behavioral semantics (KC, JS, SN), pp. 906–911.
- DATE-2007-IndrusiakTG #behaviour #execution #interactive #modelling #specification #uml
- Interactive presentation: Executable system-level specification models containing UML-based behavioral patterns (LSI, AT, MG), pp. 301–306.
- DATE-2007-VermaHR #automation #behaviour #functional #generative #interactive #modelling
- Interactive presentation: Automatic generation of functional coverage models from behavioral verilog descriptions (SV, IGH, KR), pp. 900–905.
- HT-2007-DoerrDD #behaviour #traversal #web
- Simplifying web traversals by recognizing behavior patterns (CD, DvD, AD), pp. 105–114.
- VLDB-2007-RomanK #behaviour #concurrent #logic #reasoning #semantics #transaction #web #web service
- Reasoning about the Behavior of Semantic Web Services with Concurrent Transaction Logic (DR, MK), pp. 627–638.
- CSEET-2007-FrezzaT #behaviour #developer #testing
- Testing as a Mental Discipline: Practical Methods for Affecting Developer Behavior (STF, MHT), pp. 355–356.
- FASE-2007-BurdyHP #behaviour #bytecode #design #interface #java #specification
- Preliminary Design of BML: A Behavioral Interface Specification Language for Java Bytecode (LB, MH, MP), pp. 215–229.
- PEPM-2007-RooverDBND #behaviour #logic #query #similarity #source code #using
- Behavioral similarity matching using concrete source code templates in logic queries (CDR, TD, JB, CN, LD), pp. 92–101.
- PLDI-2007-DingSKTHZ #behaviour #parallel
- Software behavior oriented parallelization (CD, XS, KK, CT, RH, CZ), pp. 223–234.
- ICALP-2007-KobayashiS #behaviour #calculus #type system
- Undecidability of 2-Label BPP Equivalences and Behavioral Type Systems for the π -Calculus (NK, TS), pp. 740–751.
- IFM-2007-ColvinGW #behaviour #probability
- Probabilistic Timed Behavior Trees (RC, LG, KW), pp. 156–175.
- SFM-2007-Bernardo #behaviour #bibliography #markov
- A Survey of Markovian Behavioral Equivalences (MB), pp. 180–219.
- CHI-2007-Baker #behaviour #comprehension #modelling #student
- Modeling and understanding students’ off-task behavior in intelligent tutoring systems (RSJdB), pp. 1059–1068.
- DHM-2007-OhS #behaviour #comprehension #nondeterminism
- Understanding RUTH: Creating Believable Behaviors for a Virtual Human Under Uncertainty (IO, MS), pp. 443–452.
- HCI-AS-2007-KoJK #behaviour #comprehension #internet #mobile
- Understanding Influence of Mobile Internet Services on Life Behavior of Mobile Users (SMK, YGJ, DK), pp. 944–953.
- HCI-AS-2007-LiuLS #behaviour #comprehension #design #game studies #online #what
- What Makes Game Players Want to Play More? A Mathematical and Behavioral Understanding of Online Game Design (DL, XL, RS), pp. 284–293.
- HCI-AS-2007-MorDML #approach #behaviour
- A Three-Level Approach for Analyzing User Behavior in Ongoing Relationships (EM, MGD, JM, SL), pp. 971–980.
- HCI-AS-2007-TanGT #behaviour #online
- An Investigation of Online Group-Buying Institution and Buyer Behavior (CHT, KYG, HHT), pp. 124–131.
- HCI-IDU-2007-GiersichFFKRS #approach #behaviour #modelling #recognition #towards
- Towards an Integrated Approach for Task Modeling and Human Behavior Recognition (MG, PF, GF, TK, DR, HS), pp. 1109–1118.
- HCI-IPT-2007-KimC #behaviour #comprehension
- Understanding Camera Phone Imaging: Motivations, Behaviors and Meanings (GK, WC), pp. 374–383.
- HCI-MIE-2007-LeeP07a #behaviour #generative #speech #synthesis
- Customized Message Generation and Speech Synthesis in Response to Characteristic Behavioral Patterns of Children (HJL, JCP), pp. 114–123.
- HCI-MIE-2007-SerbanTM #behaviour #interface #learning #predict
- A Learning Interface Agent for User Behavior Prediction (GS, AT, GSM), pp. 508–517.
- HCI-MIE-2007-TakashimaT #behaviour #low level #video
- Sharing Video Browsing Style by Associating Browsing Behavior with Low-Level Features of Videos (AT, YT), pp. 518–526.
- HCI-MIE-2007-YecanSBC #behaviour #multimodal
- Tracing Users’ Behaviors in a Multimodal Instructional Material: An Eye-Tracking Study (EY, ES, BB, KÇ), pp. 755–762.
- HIMI-IIE-2007-Liu07a #assessment #behaviour #industrial
- Economic Assessment of Industrial Accidents Caused by Abnormal Behaviors (HL), pp. 1067–1071.
- HIMI-IIE-2007-SatoA #analysis #behaviour
- Analysis of Naturalistic Driving Behavior While Approaching an Intersection and Implications for Route Guidance Presentation (TS, MA), pp. 618–627.
- HIMI-MTT-2007-YooYL #behaviour #design #human-computer
- Information Behaviors of HCI Professionals: Design of Intuitive Reference System for Technologies (EY, MY, YL), pp. 237–246.
- OCSC-2007-YehWH #behaviour #case study #online
- A Study of Emotional and Rational Purchasing Behavior for Online Shopping (LY, EMYW, SLH), pp. 222–227.
- OCSC-2007-ZhouS #behaviour #collaboration #community #towards
- Towards Building a Math Discourse Community: Investigating Collaborative Information Behavior (NZ, GS), pp. 509–518.
- CAiSE-2007-DeckerW #behaviour #consistency #integration #process
- Behavioral Consistency for B2B Process Integration (GD, MW), pp. 81–95.
- CAiSE-2007-LiuBW #behaviour #modelling #using
- Modeling Business Contexture and Behavior Using Business Artifacts (RL, KB, FYW), pp. 324–339.
- EDOC-2007-RiveraV #behaviour #modelling
- Adding Behavior to Models (JER, AV), pp. 169–180.
- ECIR-2007-SandersonD #behaviour
- Examining Repetition in User Search Behavior (MS, STD), pp. 597–604.
- KDD-2007-AsurPU #behaviour #framework #graph #interactive
- An event-based framework for characterizing the evolutionary behavior of interaction graphs (SA, SP, DU), pp. 913–921.
- SIGIR-2007-WhiteM #behaviour #query
- Investigating the querying and browsing behavior of advanced search engine users (RWW, DM), pp. 255–262.
- MoDELS-2007-KienzleDV #behaviour #design #game studies #modelling
- Model-Based Design of Computer-Controlled Game Character Behavior (JK, AD, HV), pp. 650–665.
- MoDELS-2007-KienzleDV #behaviour #design #game studies #modelling
- Model-Based Design of Computer-Controlled Game Character Behavior (JK, AD, HV), pp. 650–665.
- ECOOP-2007-CottenierBE #behaviour #implementation #specification
- Joinpoint Inference from Behavioral Specification to Implementation (TC, AvdB, TE), pp. 476–500.
- SAC-2007-GustafssonTDH #approach #aspect-oriented #behaviour #embedded #evolution #performance
- Engineering active behavior of embedded software to improve performance and evolution: an aspect-oriented approach (TG, AT, YD, JH), pp. 673–679.
- SAC-2007-Kofron #behaviour #component #protocol #using
- Checking software component behavior using behavior protocols and spin (JK), pp. 1513–1517.
- ESEC-FSE-2007-ChristodorescuJK #behaviour #mining #specification
- Mining specifications of malicious behavior (MC, SJ, CK), pp. 5–14.
- ESEC-FSE-2007-KosterK #behaviour #test coverage #testing
- State coverage: a structural test adequacy criterion for behavior checking (KK, DCK), pp. 541–544.
- HPDC-2007-MeeheanL #behaviour #component #distributed #middleware
- Environmentally responsible middleware: : an altruistic behavior model for distributed middleware components (JM, ML), pp. 209–210.
- SOSP-2007-KicimanL #behaviour #framework #monitoring #named #web
- AjaxScope: a platform for remotely monitoring the client-side behavior of web 2.0 applications (EK, VBL), pp. 17–30.
- CAV-2007-LeavensKP #behaviour #composition #functional #java #ml #specification #tutorial #verification
- A JML Tutorial: Modular Specification and Verification of Functional Behavior for Java (GTL, JRK, EP), p. 37.
- CBSE-2006-AttieLPC #behaviour #component #design #explosion #verification
- Behavioral Compatibility Without State Explosion: Design and Verification of a Component-Based Elevator Control System (PCA, DHL, AP, HC), pp. 33–49.
- ASE-2006-TillmannS #behaviour #generative
- Mock-object generation with behavior (NT, WS), pp. 365–368.
- DAC-2006-CongFHJZ #behaviour #communication
- Behavior and communication co-optimization for systems with sequential communication media (JC, YF, GH, WJ, ZZ), pp. 675–678.
- DATE-2006-PatelSB #behaviour #design
- Heterogeneous behavioral hierarchy for system level designs (HDP, SKS, RAB), pp. 565–570.
- HT-2006-TzagarakisVK #behaviour #design
- Supporting the design of behaviors in Callimachus (MT, MV, NK), pp. 115–118.
- CSEET-2006-FrezzaT #behaviour #student #testing
- Testing as a Mental Discipline: Practical Methods for Affecting Student Behavior (STF, MHT), p. 241.
- FASE-2006-DevereuxC #automation #behaviour #modelling
- Automated Support for Building Behavioral Models of Event-Driven Systems (BD, MC), pp. 122–138.
- FASE-2006-SridharH #behaviour
- A Behavioral Model for Software Containers (NS, JOH), pp. 139–154.
- ICPC-2006-KoskinenKS #approach #behaviour #comprehension
- Profile-Based Approach to Support Comprehension of Software Behavior (JK, MK, TS), pp. 212–224.
- ICPC-2006-RooverMGGD #approach #behaviour #documentation #lightweight #verification
- An Approach to High-Level Behavioral Program Documentation Allowing Lightweight Verification (CDR, IM, KG, KG, TD), pp. 202–211.
- SEFM-2006-MarcheR #behaviour #java #transaction #verification
- Verification of JAVA CARD Applets Behavior with Respect to Transactions and Card Tears (CM, NR), pp. 137–146.
- CHI-2006-EngLTCHV #adaptation #automation #behaviour #generative #performance #predict
- Generating automated predictions of behavior strategically adapted to specific performance objectives (KE, RLL, IT, AC, AH, AHV), pp. 621–630.
- CHI-2006-KamvarB #behaviour #case study #mobile #scalability
- A large scale study of wireless search behavior: Google mobile search (MK, SB), pp. 701–709.
- CHI-2006-PearsonHBPN #adaptation #behaviour #how #human-computer #word
- Adaptive language behavior in HCI: how expectations and beliefs about a system affect users’ word choice (JP, JH, HPB, MJP, CN), pp. 1177–1180.
- CHI-2006-RafflePIL #behaviour #game studies
- Beyond record and play: backpacks: tangible modulators for kinetic behavior (HR, AJP, HI, JL), pp. 681–690.
- CSCW-2006-RazaviI #behaviour #information management #learning
- A grounded theory of information sharing behavior in a personal learning space (MNR, LI), pp. 459–468.
- CAiSE-2006-AckermannT #behaviour #component #library #ocl #specification
- A Library of OCL Specification Patterns for Behavioral Specification of Software Components (JA, KT), pp. 255–269.
- ICEIS-ISAS-2006-ChengX #approach #behaviour #concurrent #detection #formal method #online
- A Formal Approach to Detecting Shilling Behaviors in Concurrent Online Auctions (YTC, HX), pp. 375–381.
- ICEIS-ISAS-2006-SubramaniamKG #behaviour #evolution #predict #process
- Business Processes: Behavior Prediction and Capturing Reasons for Evolution (SS, VK, DG), pp. 3–10.
- ICPR-v1-2006-GormanTBH #behaviour #game studies #interactive
- Bayesian Imitation of Human Behavior in Interactive Computer Games (BG, CT, CB, MH), pp. 1244–1247.
- ICPR-v1-2006-GunesP #analysis #automation #behaviour #database #gesture
- A Bimodal Face and Body Gesture Database for Automatic Analysis of Human Nonverbal Affective Behavior (HG, MP), pp. 1148–1153.
- ICPR-v1-2006-LiHWW #behaviour #image #modelling #recognition
- Behavior Modeling and Recognition Based on Space-Time Image Features (HL, ZH, YW, FW), pp. 243–246.
- ICPR-v1-2006-ThurauHB #behaviour #classification #game studies #video
- Classification of Team Behaviors in Sports Video Games (CT, TH, CB), pp. 1188–1191.
- ICPR-v1-2006-XuSL #adaptation #behaviour #detection #monitoring
- Tree Based Behavior Monitoring for Adaptive Fraud Detection (JX, AHS, QL), pp. 1208–1211.
- ICPR-v3-2006-DuongPBV #behaviour #exponential #markov #modelling #product line #recognition
- Human Behavior Recognition with Generic Exponential Family Duration Modeling in the Hidden Semi-Markov Model (TVD, DQP, HHB, SV), pp. 202–207.
- ICPR-v4-2006-YamadaKNT #behaviour #identification
- Hipprint Person Identification and Behavior Analys (MY, MK, HN, JT), pp. 533–536.
- KDD-2006-AgichteinZ #behaviour #identification #mining #web
- Identifying “best bet” web search results by mining past user behavior (EA, ZZ), pp. 902–908.
- SIGIR-2006-AgichteinBD #behaviour #ranking #web
- Improving web search ranking by incorporating user behavior information (EA, EB, STD), pp. 19–26.
- SIGIR-2006-MurrayLC #behaviour #modelling #predict #query
- Action modeling: language models that predict query behavior (GCM, JJL, AC), pp. 681–682.
- MoDELS-2006-GarousiBL #analysis #behaviour #dependence #distributed #modelling #uml #visualisation
- Analysis and Visualization of Behavioral Dependencies Among Distributed Objects Based on UML Models (VG, LCB, YL), pp. 365–379.
- MoDELS-2006-GarousiBL #analysis #behaviour #dependence #distributed #modelling #uml #visualisation
- Analysis and Visualization of Behavioral Dependencies Among Distributed Objects Based on UML Models (VG, LCB, YL), pp. 365–379.
- ECOOP-2006-MitchellSS #behaviour #modelling #runtime
- Modeling Runtime Behavior in Framework-Based Applications (NM, GS, HS), pp. 429–451.
- PPDP-2006-RooverBD #behaviour #fuzzy #logic #similarity #strict #validation
- Combining fuzzy logic and behavioral similarity for non-strict program validation (CDR, JB, TD), pp. 15–26.
- SAC-2006-ColletOR #behaviour #component #on the
- On contracting different behavioral properties in component-based systems (PC, AO, NR), pp. 1798–1799.
- SAC-2006-OsorioK #analysis #behaviour
- An initial analysis and presentation of malware exhibiting swarm-like behavior (FCCO, ZK), pp. 323–329.
- ICSE-2006-NakamichiSSM #behaviour #detection #usability #using #web
- Detecting low usability web pages using quantitative data of users’ behavior (NN, KS, MS, KiM), pp. 569–576.
- ICSE-2006-PettitG #behaviour #concurrent #design pattern #modelling
- Modeling behavioral design patterns of concurrent objects (RGPI, HG), pp. 202–211.
- SPLC-2006-BrownGBSKG #behaviour #embedded #feature model #modelling #product line #weaving
- Weaving Behavior into Feature Models for Embedded System Families (TJB, RG, RB, ITAS, PK, CG), pp. 52–64.
- HPCA-2006-ChungCMMCKO #behaviour #parallel #source code #thread #transaction
- The common case transactional behavior of multithreaded programs (JC, HC, CCM, AM, BDC, CK, KO), pp. 266–277.
- ISMM-2006-BhatiaCL #behaviour #co-evolution #design #optimisation
- Memory-manager/scheduler co-design: optimizing event-driven servers to improve cache behavior (SB, CC, JLL), pp. 104–114.
- AMOST-J-2005-AugustonMS06 #assessment #automation #behaviour #modelling #safety #testing
- Environment behavior models for automation of testing and assessment of system safety (MA, JBM, MtS), pp. 971–980.
- ISSTA-2006-KiviluomaKM #architecture #aspect-oriented #behaviour #monitoring #runtime #using
- Run-time monitoring of architecturally significant behaviors using behavioral profiles and aspects (KK, JK, TM), pp. 181–190.
- CASE-2005-Hwang #approach #automation #behaviour #configuration management #finite #generative
- Generating finite-state global behavior of reconfigurable automation systems: DEVS approach (MHH), pp. 254–260.
- CASE-2005-LeeK #behaviour #distributed #multi
- Estimating global stress environment by observing local behavior in distributed multiagent systems (SL, SRTK), pp. 215–219.
- DAC-2005-GuWDZ #behaviour #design #incremental #physics
- Incremental exploration of the combined physical and behavioral design space (Z(G, JW, RPD, HZ), pp. 208–213.
- DAC-2005-WeiD #behaviour #development #megamodelling
- Systematic development of analog circuit structural macromodels through behavioral model decoupling (YW, AD), pp. 57–62.
- DATE-2005-ForzanP #analysis #behaviour #library #modelling
- Modeling the Non-Linear Behavior of Library Cells for an Accurate Static Noise Analysis (CF, DP), pp. 982–983.
- ITiCSE-2005-GomesSVG #behaviour #multi #named
- SoundSpaces: behavior based control system for multimedia systems (RG, RS, JV, NG), p. 407.
- ITiCSE-2005-Walls #behaviour
- Integrating views on ethical behavior for computer professionals in an interdisciplinary environment (DCW), p. 414.
- FoSSaCS-2005-DengP #axiom #behaviour #finite #probability
- Axiomatizations for Probabilistic Finite-State Behaviors (YD, CP), pp. 110–124.
- CSMR-2005-Hamou-LhadjBAL #behaviour #design #execution #modelling
- Recovering Behavioral Design Models from Execution Traces (AHL, EB, DA, TCL), pp. 112–121.
- IWPC-2005-DuxIDFK #behaviour #visualisation
- Visualizing the Behavior of Dynamically Modifiable Code (BD, AI, SKD, DF, SGK), pp. 337–340.
- IFM-2005-GrunskeLYW #analysis #automation #behaviour #design #specification
- An Automated Failure Mode and Effect Analysis Based on High-Level Design Specification with Behavior Trees (LG, PAL, NY, KW), pp. 129–149.
- CHI-2005-KaurH #behaviour #comparison #predict
- A comparison of LSA, wordNet and PMI-IR for predicting user click behavior (IK, AJH), pp. 51–60.
- KDD-2005-SongLTS #behaviour #modelling #predict
- Modeling and predicting personal information dissemination behavior (XS, CYL, BLT, MTS), pp. 479–488.
- SEKE-2005-LiW #approach #behaviour #implementation #web
- Web Search Based on Ant Behavior: Approach and Implementation in Case of Interlegis (WL, MQW), pp. 572–577.
- MoDELS-2005-PretschnerP #behaviour #modelling #refactoring
- Computing Refactorings of Behavior Models (AP, WP), pp. 126–141.
- MoDELS-2005-PretschnerP #behaviour #modelling #refactoring
- Computing Refactorings of Behavior Models (AP, WP), pp. 126–141.
- SAC-2005-DiazLPCV #approach #behaviour #e-commerce #probability #protocol #realtime #set #validation
- An approach to handle real time and probabilistic behaviors in e-commerce: validating the SET protocol (GD, KGL, JJP, FC, VV), pp. 815–820.
- AMOST-2005-AugustonMS #automation #behaviour #generative #modelling #testing
- Environment behavior models for scenario generation and testing automation (MA, JBM, MtS).
- WICSA-2004-PettitG #architecture #behaviour #concurrent #modelling #petri net #using
- Modeling Behavioral Patterns of Concurrent Software Architectures Using Petri Nets (RGPI, HG), pp. 57–68.
- ASE-2004-HallZ #behaviour #requirements #validation
- Validating Personal Requirements by Assisted Symbolic Behavior Browsing (RJH, AZ), pp. 56–66.
- ASE-2004-MehtaMSA #architecture #behaviour #composition #modelling
- Modeling Behavior in Compositions of Software Architectural Primitives (NRM, NM, MS, FA), pp. 371–374.
- DAC-2004-KappS #automation #behaviour #control flow #scheduling #synthesis
- Automatic correct scheduling of control flow intensive behavioral descriptions in formal synthesis (KK, VKS), pp. 61–66.
- DAC-2004-OzturkKDCI #behaviour
- Data compression for improving SPM behavior (ÖÖ, MTK, ID, GC, MJI), pp. 401–406.
- DATE-v1-2004-BriereCMMOG #behaviour #design #modelling #tool support
- Design and Behavioral Modeling Tools for Optical Network-on-Chip (MB, LC, TM, FM, IO, FG), pp. 738–739.
- DATE-v1-2004-HuangM #behaviour #identification #modelling
- Identification and Modeling of Nonlinear Dynamic Behavior in Analog Circuits (XH, HAM), pp. 460–467.
- DATE-v1-2004-NathkeBHB #automation #behaviour #generative
- Hierarchical Automatic Behavioral Model Generation of Nonlinear Analog Circuits Based on Nonlinear Symbolic Techniques (LN, VB, LH, EB), pp. 442–447.
- DocEng-2004-KingST #animation #behaviour #functional #programming #realtime #xml
- Behavioral reactivity and real time programming in XML: functional programming meets SMIL animation (PRK, PS, SJT), pp. 57–66.
- HT-2004-LepthienA #behaviour
- Unifying structure, behavior, and data with themis types and templates (WVL, KMA), pp. 256–265.
- FoSSaCS-2004-Caires #behaviour #logic #π-calculus
- Behavioral and Spatial Observations in a Logic for the π-Calculus (LC), pp. 72–89.
- FoSSaCS-2004-GiambiagiSV #behaviour #calculus #infinity #on the #process
- On the Expressiveness of Infinite Behavior and Name Scoping in Process Calculi (PG, GS, FDV), pp. 226–240.
- IWPC-2004-Kelsen #behaviour #comprehension #source code
- A Simple Static Model for Understanding the Dynamic Behavior of Programs (PK), pp. 46–51.
- WCRE-2004-ParkKWY #analysis #behaviour #design pattern
- A Static Reference Flow Analysis to Understand Design Pattern Behavior (CP, YK, CW, KY), pp. 300–301.
- SEFM-2004-MoisanRR #behaviour #component #formal method #framework #towards
- Towards Formalizing Behavioral Substitutability in Component Frameworks (SM, AR, JPR), pp. 122–131.
- SEFM-2004-RouffVHTR #behaviour #formal method #predict
- Properties of a Formal Method for Prediction of Emergent Behaviors in Swarm-Based Systems (CR, AV, MGH, WT, JLR), pp. 24–33.
- CHI-2004-BakerCKW #behaviour #game studies #student
- Off-task behavior in the cognitive tutor classroom: when students “game the system” (RSB, ATC, KRK, AZW), pp. 383–390.
- CHI-2004-HancockTR #behaviour #communication #design
- Deception and design: the impact of communication technology on lying behavior (JTH, JTS, TR), pp. 129–134.
- CHI-2004-KoM #behaviour #debugging #design #interface
- Designing the whyline: a debugging interface for asking questions about program behavior (AJK, BAM), pp. 151–158.
- CHI-2004-TeevanAAK #behaviour #case study
- The perfect search engine is not enough: a study of orienteering behavior in directed search (JT, CA, MSA, DRK), pp. 415–422.
- EDOC-2004-KathBBEFH #behaviour #corba #execution #modelling #towards
- Towards Executable Models: Transforming EDOC Behavior Models to CORBA and BPEL (OK, AB, MB, KPE, MF, CH), pp. 267–274.
- ICEIS-v1-2004-EstevesP #behaviour #enterprise #implementation
- Organizational and Technological Critical Success Factors Behavior Along the ERP Implementation Phases (JE, JAP), pp. 45–53.
- ICPR-v4-2004-KamTEYW #automation #behaviour #recognition
- Automated Recognition of Highly Complex Human Behavior (AHK, KAT, HLE, WYY, JW), pp. 327–330.
- SIGIR-2004-GrankaJG #analysis #behaviour
- Eye-tracking analysis of user behavior in WWW search (LAG, TJ, GG), pp. 478–479.
- UML-2004-Reinhartz-BergerS #analysis #approach #behaviour #domain model #modelling
- Behavioral Domain Analysis — The Application-Based Domain Modeling Approach (IRB, AS), pp. 410–424.
- OOPSLA-2004-GeorgesBEB #behaviour #java
- Method-level phase behavior in java workloads (AG, DB, LE, KDB), pp. 270–287.
- OOPSLA-2004-HauswirthSDH #behaviour #comprehension #profiling
- Vertical profiling: understanding the behavior of object-priented applications (MH, PFS, AD, MH), pp. 251–269.
- PADL-2004-WangRYC #behaviour #execution #requirements #symbolic computation
- Symbolic Execution of Behavioral Requirements (TW, AR, RHCY, SCC), pp. 178–192.
- SAC-J-2003-Dong04 #behaviour #diagrams
- Adding pattern related information in structural and behavioral diagrams (JD), pp. 293–300.
- ICSE-2004-BirmanRV #behaviour #web #web service
- Adding High Availability and Autonomic Behavior to Web Services (KPB, RvR, WV), pp. 17–26.
- ICSE-2004-Mariani #behaviour #component #evolution #verification
- Behavior Capture and Test for Verifying Evolving Component-Based Systems (LM), pp. 78–80.
- ASE-2003-BunusF #automation #behaviour #fault #locality #modelling #physics #simulation #verification
- Semi-Automatic Fault Localization and Behavior Verification for Physical System Simulation Models (PB, PF), pp. 253–258.
- DAC-2003-ClarkeKY #behaviour #bound #c #consistency #model checking #source code #using
- Behavioral consistency of C and verilog programs using bounded model checking (EMC, DK, KY), pp. 368–371.
- DAC-2003-KiranJRN #behaviour #communication #complexity #effectiveness #modelling
- A complexity effective communication model for behavioral modeling of signal processing applications (MNVSK, MNJ, PR, SKN), pp. 412–415.
- DAC-2003-RootWT #behaviour #metric #modelling #simulation
- New techniques for non-linear behavioral modeling of microwave/RF ICs from simulation and nonlinear microwave measurements (DER, JW, NT), pp. 85–90.
- DAC-2003-SoDH #behaviour #design #synthesis #tool support #using
- Using estimates from behavioral synthesis tools in compiler-directed design space exploration (BS, PCD, MWH), pp. 514–519.
- DATE-2003-BruschiF #behaviour #modelling #synthesis
- Synthesis of Complex Control Structures from Behavioral SystemC Models (FB, FF), pp. 20112–20119.
- DATE-2003-EberleVWDGM #automation #behaviour #modelling #simulation
- Behavioral Modeling and Simulation of a Mixed Analog/Digital Automatic Gain Control Loop in a 5 GHz WLAN Receiver (WE, GV, PW, SD, GGEG, HDM), pp. 10642–10649.
- DATE-2003-LuzKKS #behaviour #data transformation
- Generalized Data Transformations for Enhancing Cache Behavior (VDLL, MTK, IK, US), pp. 10906–10911.
- DATE-2003-MemikKCK #approach #behaviour
- An Integrated Approach for Improving Cache Behavior (GM, MTK, ANC, IK), pp. 10796–10801.
- DATE-2003-SaputraVKIBKZ #behaviour #encryption #energy
- Masking the Energy Behavior of DES Encryption (HS, NV, MTK, MJI, RRB, SK, WZ), pp. 10084–10089.
- HT-2003-AndersonSL #behaviour
- Structure and behavior awareness in themis (KMA, SAS, WVL), pp. 138–147.
- ITiCSE-2003-DannDCDRP #behaviour #named #visualisation
- Objects: visualization of behavior and state (WD, TD, SC, KD, KR, RP), pp. 84–88.
- FASE-2003-ZhaoR #aspectj #behaviour #interface #named #specification
- Pipa: A Behavioral Interface Specification Language for AspectJ (JZ, MCR), pp. 150–165.
- STOC-2003-Ajtai #algorithm #approximate #behaviour #worst-case
- The worst-case behavior of schnorr’s algorithm approximating the shortest nonzero vector in a lattice (MA), pp. 396–406.
- STOC-2003-GilbertK #behaviour #on the
- On the fractal behavior of TCP (ACG, HJK), pp. 297–306.
- SEFM-2003-LitvakTY #behaviour #consistency #diagrams #uml #validation
- Behavioral Consistency Validation of UML Diagrams (BL, SST, AY), pp. 118–125.
- AGTIVE-2003-MarburgerW #analysis #behaviour #graph transformation
- Behavioral Analysis of Telecommunication Systems by Graph Transformations (AM, BW), pp. 202–219.
- ICEIS-v2-2003-ReBB #behaviour #identification
- The Use of Neurofuzzy Computable System to Identify Prominent Behavior Characteristics in Successful Entrepreneurs (AR, RB, LB), pp. 522–528.
- KDD-2003-GunduzO #behaviour #modelling #predict #representation #web
- A Web page prediction model based on click-stream tree representation of user behavior (SG, MTÖ), pp. 535–540.
- KDD-2003-Weigend #behaviour
- Analyzing customer behavior at Amazon.com (ASW), p. 5.
- UML-2003-PilskalnsAGF #behaviour #testing #uml
- Rigorous Testing by Merging Structural and Behavioral UML Representations (OP, AAA, SG, RBF), pp. 234–248.
- OOPSLA-2003-TanterNCC #behaviour
- Partial behavioral reflection: spatial and temporal selection of reification (ÉT, JN, DC, PC), pp. 27–46.
- REFSQ-J-2002-AntonEC03 #behaviour #policy #privacy #requirements #security
- Precluding incongruous behavior by aligning software requirements with security and privacy policies (AIA, JBE, RAC), pp. 967–977.
- SAC-2003-CasteleynTB #adaptation #behaviour #design #web
- Design Time Support for Adaptive Behavior in Web Sites (SC, ODT, SB), pp. 1222–1228.
- SAC-2003-LanzenbergerMOP #behaviour #visualisation
- Applying Information Visualization Techniques to Capture and Explore the Course of Cognitive Behavioral Therapy (ML, SM, SO, CP), pp. 268–274.
- ICSE-2003-MarburgerW #behaviour #comprehension #tool support
- Tools for Understanding the Behavior of Telecommunication Systems (AM, BW), pp. 430–443.
- HPCA-2003-KarlssonMHW #behaviour #memory management #middleware
- Memory System Behavior of Java-Based Middleware (MK, KEM, EH, DAW), pp. 217–228.
- FATES-2003-TylerS #behaviour #black box #testing
- Black-Box Testing of Grey-Box Behavior (BT, NS), pp. 1–14.
- VMCAI-2003-SteffenH #behaviour
- Behavior-Based Model Construction (BS, HH), pp. 5–19.
- CBSE-2002-VecellioTS #behaviour #component #predict
- Containers for Predictable Behavior of Component-based Software (GJV, WMT, RMS), p. 2.
- DAC-2002-DrinicK #behaviour #synthesis
- Behavioral synthesis via engineering change (MD, DK), pp. 18–21.
- DAC-2002-Perrott #behaviour #performance #simulation
- Fast and accurate behavioral simulation of fractional-N frequency synthesizers and other PLL/DLL circuits (MHP), pp. 498–503.
- DAC-2002-VanasscheGS #behaviour #modelling
- Behavioral modeling of (coupled) harmonic oscillators (PV, GGEG, WMCS), pp. 536–541.
- DATE-2002-VanasscheGS #behaviour #matrix #modelling #using
- Constructing Symbolic Models for the Input/Output Behavior of Periodically Time-Varying Systems Using Harmonic Transfer Matrices (PV, GGEG, WMCS), pp. 279–284.
- ITiCSE-2002-DagdilelisSE #behaviour #what
- What they really do?: attempting (once again) to model novice programmers’ behavior (VD, MS, GE), p. 244.
- SCAM-J-2001-SchuppGML02 #behaviour #library #semantics
- Semantic and behavioral library transformations (SS, DG, DRM, SML), pp. 797–810.
- SAS-2002-Hymans #abstract interpretation #behaviour #safety
- Checking Safety Properties of Behavioral VHDL Descriptions by Abstract Interpretation (CH), pp. 444–460.
- ICGT-2002-Harel #behaviour #requirements #why
- Can Behavioral Requirements Be Executed? (And Why Would We Want to Do So?) (DH), pp. 6–7.
- CHI-2002-FioreTS #behaviour
- Observed behavior and perceived value of authors in usenet newsgroups: bridging the gap (ATF, SLT, MAS), pp. 323–330.
- ICML-2002-LaudD #behaviour #learning
- Reinforcement Learning and Shaping: Encouraging Intended Behaviors (AL, GD), pp. 355–362.
- ICML-2002-Zhang #behaviour #consistency #statistics
- Statistical Behavior and Consistency of Support Vector Machines, Boosting, and Beyond (TZ0), pp. 690–700.
- ICPR-v1-2002-NguyenVWB #behaviour #monitoring #multi #people #using
- Hierarchical Monitoring of People’s Behaviors in Complex Environments Using Multiple Cameras (NTN, SV, GAWW, HHB), pp. 13–16.
- ICPR-v1-2002-RahmanNI #behaviour #using
- Recognizing Human Behavior Using Universal Eigenspace (MMR, KN, SI), pp. 295–298.
- ICPR-v4-2002-MoriyamaKCXAGI #automation #behaviour #recognition
- Automatic Recognition of Eye Blinking in Spontaneously Occurring Behavior (TM, TK, JFC, JX, ZA, JG, HI), p. 78–?.
- KDD-2002-El-RamlySS #approach #behaviour #mining #runtime
- From run-time behavior to usage scenarios: an interaction-pattern mining approach (MER, ES, PGS), pp. 315–324.
- SEKE-2002-XuVIY #behaviour #modelling #multi #using #verification
- Modeling and verifying multi-agent behaviors using predicate/transition nets (DX, RAV, TRI, JY), pp. 193–200.
- ECOOP-2002-AlagicK #behaviour #self
- Behavioral Compatibility of Self-Typed Theories (SA, SK), pp. 585–608.
- TOOLS-USA-2002-SoundarajanT #behaviour #polymorphism #testing
- Testing Polymorphic Behavior (NS, BT), pp. 173–188.
- SAC-2002-El-Ansary #analysis #behaviour #representation #requirements #towards
- Behavioral Pattern Analysis: towards a new representation of systems requirements based on actions and events (AEA), pp. 984–991.
- SAC-2002-GarcesF #analysis #behaviour #distributed
- Analysis of Distributed Routing Balancing behavior (IG, DF), pp. 817–824.
- ASPLOS-2002-SherwoodPHC #automation #behaviour #scalability
- Automatically characterizing large scale program behavior (TS, EP, GH, BC), pp. 45–57.
- HPCA-2002-SairSC #behaviour
- Quantifying Load Stream Behavior (SS, TS, BC), pp. 197–208.
- HPDC-2002-AllcockBBFGILP #behaviour #distributed #named #scalability #visualisation
- GridMapper: A Tool for Visualizing the Behavior of Large-Scale Distributed Systems (WEA, JB, JB, ITF, JG, JAI, JML, MEP), pp. 179–187.
- CAV-2002-AlurMY #behaviour #model checking #performance
- Exploiting Behavioral Hierarchy for Efficient Model Checking (RA, MM, ZY), pp. 338–342.
- SAT-2002-SlaneyW #behaviour #optimisation
- Phase Transition Behavior: From Decision to Optimization (JS, TW), p. 4.
- ASE-2001-LedangS #behaviour #diagrams #modelling #uml
- Modeling Class Operations in B: Application to UML Behavioral Diagrams (HL, JS), pp. 289–296.
- ASE-2001-PavlovicS #behaviour #composition #refinement #specification
- Composition and Refinement of Behavioral Specifications (DP, DRS), pp. 157–165.
- DAC-2001-GanesanV #behaviour #clustering #synthesis
- Behavioral Partitioning in the Synthesis of Mixed Analog-Digital Systems (SG, RV), pp. 133–138.
- DAC-2001-KohnoM #behaviour #pipes and filters #verification
- A New Verification Methodology for Complex Pipeline Behavior (KK, NM), pp. 816–821.
- DATE-2001-Al-ArsG #array #behaviour #embedded #memory management
- Static and dynamic behavior of memory cell array opens and shorts in embedded DRAMs (ZAA, AJvdG), pp. 496–503.
- DATE-2001-BekooijEWB #behaviour #functional
- Functional units with conditional input/output behavior in VLIW processors (MB, LJME, AvdW, NGB), p. 822.
- DATE-2001-EconomakosOPPP #behaviour #synthesis
- Behavioral synthesis with systemC (GE, PO, IP, IP, GKP), pp. 21–25.
- DATE-2001-FerrandiFSFF #behaviour #functional #generative #modelling #testing
- Functional test generation for behaviorally sequential models (FF, GF, DS, AF, FF), pp. 403–410.
- DATE-2001-HajjarCMAB #behaviour #quality #statistics #using #verification
- High quality behavioral verification using statistical stopping criteria (AH, TC, IM, AAA, MB), pp. 411–419.
- VLDB-2001-AnSVKIG #behaviour #data access #energy
- Analyzing energy behavior of spatial access methods for memory-resident data (NA, AS, NV, MTK, MJI, SG), pp. 411–420.
- ICSM-2001-CookHM #behaviour #concurrent
- Measuring Behavioral Correspondence to a Timed Concurrent Model (JEC, CH, CM), pp. 332–341.
- ICSM-2001-SchauerK #behaviour #metric
- The Method Replacement Indicator: A Metric for Analyzing Behavioral Substitution (RS, RKK), pp. 754–764.
- IWPC-2001-StrouliaS #behaviour #comprehension
- Structure-Behavior-Function Program Understanding (ES, TS), p. 120.
- PLDI-2001-ChatterjeePHL #analysis #behaviour
- Exact Analysis of the Cache Behavior of Nested Loops (SC, EP, PJH, ARL), pp. 286–297.
- SAS-2001-RajamaniR #behaviour #π-calculus
- A Behavioral Module System for the π-Calculus (SKR, JR), pp. 375–394.
- FME-2001-HelkeS #analysis #behaviour #consistency #eiffel #library
- Mechanized Analysis of Behavioral Conformance in the Eiffel Base Libraries (SH, TS), pp. 20–42.
- IFL-2001-Minamide #behaviour #runtime #type system
- Runtime Behavior of Conversion Interpretation of Subtyping (YM), pp. 155–167.
- CHI-2001-CardPWMRSB #analysis #behaviour #graph #protocol #usability #web
- Information scent as a driver of Web behavior graphs: results of a protocol analysis method for Web usability (SKC, PP, MMVDW, JBM, RWR, PKS, JB), pp. 498–505.
- ICML-2001-ChajewskaKO #behaviour #learning
- Learning an Agent’s Utility Function by Observing Behavior (UC, DK, DO), pp. 35–42.
- KDD-2001-AdderleyM #behaviour #case study #commit #data mining #mining #modelling
- Data mining case study: modeling the behavior of offenders who commit serious sexual assaults (RA, PBM), pp. 215–220.
- UML-2001-EngelsHK #behaviour #consistency #metamodelling #rule-based #specification #uml
- Rule-Based Specification of Behavioral Consistency Based on the UML Meta-model (GE, RH, JMK), pp. 272–286.
- UML-2001-SendallS #behaviour #concurrent #constraints #ocl #specification #uml #using
- Specifying Concurrent System Behavior and Timing Constraints Using OCL and UML (SS, AS), pp. 391–405.
- SAC-2001-Dozier #behaviour #evolution #interactive #simulation
- Evolving robot behavior via interactive evolutionary computation: from real-world to simulation (GVD), pp. 340–344.
- SAC-2001-XiangFY #approach #behaviour #component #fuzzy #network #prototype
- A fuzzy neural network approach to model component behavior for virtual prototyping of hydraulic system (WX, SCF, FFY), pp. 482–483.
- ESEC-FSE-2001-EngelsKHG #behaviour #consistency #modelling #object-oriented #specification
- A methodology for specifying and analyzing consistency of object-oriented behavioral models (GE, JMK, RH, LG), pp. 186–195.
- ESEC-FSE-2001-FindlerLF #behaviour #contract #type system
- Behavioral contracts and behavioral subtyping (RBF, ML, MF), pp. 229–236.
- ICSE-2001-MakinenS #behaviour #interactive #modelling #named #uml
- MAS — An Interactive Synthesizer to Support Behavioral Modeling in UML (EM, TS), pp. 15–24.
- SOSP-2001-EnglerCC #approach #behaviour #consistency #debugging #fault
- Bugs as Inconsistent Behavior: A General Approach to Inferring Errors in Systems Code (DRE, DYC, AC), pp. 57–72.
- DAC-2000-DoughertyT #behaviour #design #physics #synthesis
- Unifying behavioral synthesis and physical design (WED, DET), pp. 756–761.
- DATE-2000-SemeriaSM #behaviour #c #memory management #pointer #synthesis
- Resolution of Dynamic Memory Allocation and Pointers for the Behavioral Synthesis from C (LS, KS, GDM), pp. 312–319.
- WRLA-2000-GoguenLR #behaviour #induction
- Behavioral and Coinductive Rewriting (JAG, KL, GR), pp. 2–23.
- WCRE-2000-AntoniolCC #behaviour #modelling #traceability
- Traceability Recovery by Modeling Programmer Behavior (GA, GC, AC), pp. 240–247.
- WCRE-2000-Systa #behaviour #comprehension #java #source code
- Understanding the Behavior of Java Programs (TS), pp. 214–223.
- ICALP-2000-BravettiG #axiom #behaviour #congruence #finite
- A Complete Axiomatization for Observational Congruence of Prioritized Finite-State Behaviors (MB, RG), pp. 744–755.
- IFM-2000-MeyerS #approach #behaviour #consistency #uml #using #verification
- Behavioral Conformance Verification in an Integrated Approach Using UML and B (EM, TS), pp. 358–379.
- CSCW-2000-PalenSY #behaviour #mobile
- Going wireless: behavior & practice of new mobile phone users (LP, MCS, EY), pp. 201–210.
- AdaEurope-2000-DeshpandeCT #behaviour #object-oriented #reliability #simulation
- Improving the Reliability of Object-Oriented Software through Object-Level Behavioral Simulation (MD, FPC, JT), pp. 266–279.
- CAiSE-2000-BehrensR #behaviour #code generation #model transformation #named
- StateLator — Behavioral Code Generation as an Instance of a Model Transformation (TB, SR), pp. 401–416.
- ICML-2000-AndersonDP #behaviour #composition #network #student
- Behavioral Cloning of Student Pilots with Modular Neural Networks (CWA, BAD, DAP), pp. 25–32.
- ICML-2000-MorimotoD #behaviour #learning #using
- Acquisition of Stand-up Behavior by a Real Robot using Hierarchical Reinforcement Learning (JM, KD), pp. 623–630.
- ICPR-v1-2000-SherrahGHB #behaviour #interactive #visual notation
- Interpretation of Group Behavior in Visually Mediated Interaction (JS, SG, AJH, HB), pp. 1266–1269.
- ICPR-v3-2000-ValdesME #analysis #behaviour #case study #image
- Behavior Analysis of Fractal Features for Texture Description in Digital Images: An Experimental Study (JJV, LCM, SE), pp. 3917–3920.
- ICPR-v4-2000-IskeRMS #behaviour #learning #navigation
- A Bootstrapping Method for Autonomous and in Site Learning of Generic Navigation Behavior (BI, UR, KM, JS), pp. 4656–4659.
- ICPR-v4-2000-KojimaITF #behaviour #generative #image #natural language #video
- Generating Natural Language Description of Human Behavior from Video Images (AK, MI, TT, KF), pp. 4728–4731.
- ICPR-v4-2000-SanchezM00a #behaviour #programming #using #visual notation
- Robot-Arm Pick and Place Behavior Programming System Using Visual Perception (AJS, JMM), pp. 4507–4510.
- KDD-2000-PenaFL #behaviour #data mining #detection #mining
- Data mining to detect abnormal behavior in aerospace data (JMP, FF, SL), pp. 390–397.
- SIGIR-2000-EfthimiadisF #behaviour #case study #database #image #query
- The effect of query type on subject searching behavior of image databases: an exploratory study (ENE, RF), pp. 328–330.
- UML-2000-EngelsHHS #approach #behaviour #diagrams #metamodelling #modelling #semantics #uml #visual notation
- Dynamic Meta Modeling: A Graphical Approach to the Operational Semantics of Behavioral Diagrams in UML (GE, JHH, RH, SS), pp. 323–337.
- UML-2000-Pazzi #behaviour #representation
- Part-Whole Statecharts for the Explicit Representation of Compound Behaviors (LP), pp. 541–555.
- ECOOP-2000-KellomakiM #behaviour #design
- Design Templates for Collective Behavior (PK, TM), pp. 277–295.
- TOOLS-EUROPE-2000-LakosL #behaviour #inheritance #lifecycle
- Behavior Inheritance for Object Lifecycles (CL, GL), p. 262–?.
- TOOLS-USA-2000-HarelK #behaviour #inheritance #on the
- On the Behavioral Inheritance of State-Based Objects (DH, OK), pp. 83–94.
- TOOLS-USA-2000-SoundarajanF #behaviour #multi #type system
- Behavioral Subtyping and Behavioral Enrichment of Multimethods (NS, SF), p. 105–?.
- ICRE-2000-KnottMP #analysis #behaviour #modelling #object-oriented #process #using
- Process Modeling for Object Oriented Analysis Using BORM Object Behavioral Analysis (RPK, VM, JP), pp. 7–16.
- SAC-2000-PiresBM #behaviour #communication #database #object-oriented #specification
- Mechanisms for Specifying Communication Behavior in Object Oriented Database (PFP, MRFB, MM), pp. 389–397.
- SAC-2000-SrinivasaS #behaviour #transaction
- Discerning Behavioral Properties by Analyzing Transaction Logs (SS, MS), pp. 281–282.
- ICSE-2000-MageePGK #animation #behaviour #modelling #visual notation
- Graphical animation of behavior models (JM, NP, DG, JK), pp. 499–508.
- ASPLOS-2000-RedstoneEL #analysis #architecture #behaviour #operating system #parallel #thread
- An Analysis of Operating System Behavior on a Simultaneous Multithreaded Architecture (JR, SJE, HML), pp. 245–256.
- HPCA-2000-WongB #behaviour #policy
- Modified LRU Policies for Improving Second-Level Cache Behavior (WAW, JLB), pp. 49–60.
- ASE-1999-CazzolaSST #architecture #behaviour #rule-based
- Rule-Based Strategic Reflection: Observing and Modifying Behavior at the Architectural Level (WC, AS, AS, FT), pp. 263–266.
- DAC-1999-Bergamaschi #behaviour #graph #logic #network #synthesis
- Behavioral Network Graph: Unifying the Domains of High-Level and Logic Synthesis (RAB), pp. 213–218.
- DAC-1999-DoboliNDGV #behaviour #design #synthesis #using
- Behavioral Synthesis of Analog Systems Using Two-layered Design Space Exploration (AD, ANA, NRD, SG, RV), pp. 951–957.
- DAC-1999-ErcegovacKP #behaviour #multi #optimisation #power management #precise #synthesis #using
- Low-Power Behavioral Synthesis Optimization Using Multiple Precision Arithmetic (MDE, DK, MP), pp. 568–573.
- DAC-1999-HongP #behaviour #synthesis
- Behavioral Synthesis Techniques for Intellectual Property Protection (IH, MP), pp. 849–854.
- DAC-1999-KirovskiP #behaviour #synthesis
- Engineering Change: Methodology and Applications to Behavioral and System Synthesis (DK, MP), pp. 604–609.
- DAC-1999-MoussaSSDPCGJ #behaviour #design
- Comparing RTL and Behavioral Design Methodologies in the Case of a 2M-Transistor ATM Shaper (IM, ZS, RS, MDN, MP, SC, LG, AAJ), pp. 598–603.
- DAC-1999-SchaumontCVEB #behaviour #hardware #reuse
- Hardware Reuse at the Behavioral Level (PS, RC, SV, ME, IB), pp. 784–789.
- DATE-1999-DoboliV #architecture #behaviour #compilation #generative #synthesis
- A VHDL-AMS Compiler and Architecture Generator for Behavioral Synthesis of Analog Systems (AD, RV), pp. 338–345.
- DATE-1999-MakrisO #behaviour #reachability #synthesis
- Channel-Based Behavioral Test Synthesis for Improved Module Reachability (YM, AO), pp. 283–288.
- DATE-1999-Wakabayashi #behaviour #case study #experience #synthesis
- C-based Synthesis Experiences with a Behavior Synthesizer, “Cyber” (KW), p. 390–?.
- ICSM-1999-LiuAQ #behaviour #legacy #modelling #requirements
- Requirements Recovery from Legacy Systems by Analyzing and Modelling Behavior (KL, AA, ZQ), pp. 3–12.
- FM-v2-1999-Jifeng #behaviour #co-evolution #design
- A Behavioral Model for Co-design (JH), pp. 1420–1438.
- CHI-1999-KunoINS #behaviour #human-computer #interactive
- Combining Observations of Intentional and Unintentional Behaviors for Human-Computer Interaction (YK, TI, SN, YS), pp. 238–245.
- HCI-CCAD-1999-KlobasM #behaviour
- A planned behavior in context model of networked information resource use (JEK, DM), pp. 823–827.
- HCI-CCAD-1999-MoriKSO #behaviour
- A computer-augmented office environment: integrating virtual and real world objects and behavior (HM, TK, ES, YO), pp. 1065–1069.
- HCI-CCAD-1999-TakanoSS #behaviour #simulation
- Intellectual simulation of operating team behavior in coping with anomalies occurring at commercial nuclear power plants (KT, WS, KS), pp. 1201–1205.
- CIKM-1999-RadevPMP #approach #behaviour #graph #multi #object-oriented #representation
- Graph-Based Object-Oriented Approach for Structural and Behavioral Representation of Multimedia Data (IR, NP, KM, EKP), pp. 522–530.
- ICML-1999-IijimaYYK #adaptation #behaviour #distributed #learning
- Distributed Robotic Learning: Adaptive Behavior Acquisition for Distributed Autonomous Swimming Robot in Real World (DI, WY, HY, YK), pp. 191–199.
- KDD-1999-FawcettP #behaviour #monitoring #process
- Activity Monitoring: Noticing Interesting Changes in Behavior (TF, FJP), pp. 53–62.
- SIGIR-1999-FidelE #behaviour #web
- Web Searching Behavior of Aerospace Engineers (poster abstract) (RF, ENE), pp. 319–320.
- UML-1999-GieseGW #behaviour #modelling #object-oriented
- Closing the Gap Between Object-Oriented Modeling of Structure and Behavior (HG, JG, GW), pp. 534–549.
- UML-1999-SoundarajanF #behaviour #modelling
- Modeling Exceptional Behavior (NS, SF), pp. 691–705.
- UML-1999-Sourrouille #behaviour #implementation #inheritance #object-oriented #uml
- UML Behavior: Inheritance and Implementation in Current Object-Oriented Languages (JLS), pp. 457–472.
- ECOOP-1999-DieckmannH #behaviour #benchmark #case study #java #metric
- A Study of the Allocation Behavior of the SPECjvm98 Java Benchmark (SD, UH), pp. 92–115.
- TOOLS-ASIA-1999-FanXZ #behaviour #inheritance #reasoning
- Reasoning about Inheritance and Cloning Behaviors of Software Agents (XF, DX, GZ), pp. 77–82.
- TOOLS-USA-1999-PlasilBV #behaviour #bound #component #protocol
- Bounding Component Behavior via Protocols (FP, MB, SV), pp. 387–398.
- SAC-1999-DasBHHZ #behaviour #knowledge base
- A Knowledge Based Model of Traffic Behavior in Freeways (SD, BAB, CRH, SJH, YZ), pp. 14–18.
- SAC-1999-MocellinM #aspect-oriented #behaviour #modelling #multi #using
- Modelling Behavioral Aspects of Multimedia Presentations Using an Active Object DBMS (FM, HM), pp. 450–454.
- ICSE-1999-Magee #analysis #architecture #behaviour #using
- Behavioral Analysis of Software Architectures Using LTSA (JM), pp. 634–637.
- LCTES-1999-SchneiderF #abstract interpretation #behaviour #pipes and filters #predict
- Pipeline Behavior Prediction for Superscalar Processors by Abstract Interpretation (JS, CF), pp. 35–44.
- DAC-1998-GuerraPR #behaviour #optimisation
- A Methodology for Guided Behavioral-Level Optimization (LMG, MP, JMR), pp. 309–314.
- DAC-1998-LakshminarayanaJ #behaviour #control flow #framework #named #optimisation #throughput
- FACT: A Framework for the Application of Throughput and Power Optimizing Transformations to Control-Flow Intensive Behavioral Descriptions (GL, NKJ), pp. 102–107.
- DAC-1998-LakshminarayanaJ98a #behaviour #power management #synthesis
- Synthesis of Power-Optimized and Area-Optimized Circuits from Hierarchical Behavioral Descriptions (GL, NKJ), pp. 439–444.
- DAC-1998-LakshminarayanaRJ #behaviour #control flow #execution #scheduling
- Incorporating Speculative Execution into Scheduling of Control-Flow Intensive Behavioral Descriptions (GL, AR, NKJ), pp. 108–113.
- DAC-1998-ParulkarGB #behaviour
- Introducing Redundant Computations in a Behavior for Reducing BIST Resources (IP, SKG, MAB), pp. 548–553.
- DATE-1998-BoglioloBM #behaviour #modelling
- Characterization-Free Behavioral Power Modeling (AB, LB, GDM), pp. 767–773.
- DATE-1998-FerrandiFMP #behaviour #estimation
- Power Estimation of Behavioral Descriptions (FF, FF, EM, MP), pp. 762–766.
- DATE-1998-JemaiKJ #architecture #behaviour #simulation #synthesis
- Architectural Simulation in the Context of Behavioral Synthesis (AJ, PK, AAJ), pp. 590–595.
- DATE-1998-LiG #algorithm #behaviour
- An Algorithm To Determine Mutually Exclusive Operations In Behavioral Descriptions (JL, RKG), pp. 457–463.
- DATE-1998-Nicoli #behaviour #semantics #set
- Denotational Semantics of a Behavioral Subset of VHDL (FN), pp. 975–976.
- DATE-1998-YiCPHK #behaviour #multi #synthesis
- Multiple Behavior Module Synthesis Based on Selective Groupings (JHY, HC, ICP, SHH, CMK), pp. 384–388.
- IWPC-1998-MayrhauserV #adaptation #behaviour #comprehension #scalability
- Program Understanding Behavior During Adaptation of Large Scale Software (AvM, AMV), pp. 164–172.
- KR-1998-Sandewall #behaviour #logic #modelling
- Logic Based Modelling of Goal-Directed Behavior (ES), pp. 304–315.
- TOOLS-ASIA-1998-VieiraT #approach #behaviour #object-oriented #testing
- An Approach to Perform Behavior Testing in Object-Oriented Systems (MERV, GHT), pp. 318–327.
- TOOLS-USA-1998-Mellor98a #behaviour #how #modelling #question
- Modeling Complex Behavior Simply or How Much is Too Much? (SJM), p. 444.
- TOOLS-USA-1998-SoundarajanF #behaviour #polymorphism #reasoning
- Reasoning About Polymorphic Behavior (NS, SF), p. 346–?.
- SAC-1998-BillardL #automaton #behaviour #distributed #learning #simulation
- Simulation of period-doubling behavior in distributed learning automata (EB, SL), pp. 690–695.
- SAC-1998-HuangE #behaviour #scheduling
- Scheduling control mechanisms for managing indeterminate object behavior (EHH, TE), pp. 650–654.
- ASPLOS-1998-PeirLH #adaptation #behaviour #memory management
- Capturing Dynamic Memory Reference Behavior with Adaptive Cache Topology (JKP, YL, WWH), pp. 240–250.
- ASPLOS-1998-SeidlZ #behaviour
- Segregating Heap Objects by Reference Behavior and Lifetime (MLS, BGZ), pp. 12–23.
- LCTES-1998-FerdinandW #behaviour #on the #predict #realtime
- On Predicting Data Cache Behavior for Real-Time Systems (CF, RW), pp. 16–30.
- LICS-1998-Alfaro #behaviour #how #probability #verification
- How to Specify and Verify the Long-Run Average Behavior of Probabilistic Systems (LdA), pp. 454–465.
- DAC-1997-AgrawalG #behaviour #clustering #data flow #embedded
- Data-Flow Assisted Behavioral Partitioning for Embedded Systems (SA, RKG), pp. 709–712.
- DAC-1997-PotkonjakKK #behaviour #case study #design
- Methodology for Behavioral Synthesis-Based Algorithm-Level Design Space Exploration: DCT Case Study (MP, KK, RK), pp. 252–257.
- DAC-1997-SambandamH #architecture #behaviour #design #embedded #predict #realtime
- Predicting Timing Behavior in Architectural Design Exploration of Real-Time Embedded Systems (RSS, XH), pp. 157–160.
- EDTC-1997-BoglioloBM #adaptation #behaviour #modelling
- Adaptive least mean square behavioral power modeling (AB, LB, GDM), pp. 404–410.
- EDTC-1997-FlottesPR #behaviour #testing
- Analyzing testability from behavioral to RT level (MLF, RP, BR), pp. 158–165.
- EDTC-1997-NouraniP #analysis #behaviour #using
- Structural BIST insertion using behavioral test analysis (MN, CAP), pp. 64–68.
- EDTC-1997-ShojiHSKN #behaviour #simulation
- Acceleration of behavioral simulation on simulation specific machines (MS, FH, SS, SK, HN), pp. 373–377.
- ICDAR-1997-NagasakiYN #behaviour #recognition
- The Behavior of Dynamic Relaxation in an Elastic Stroke Model for Character Recognition (TN, TY, MN), pp. 16–22.
- WIA-1997-BrzozowskiN #automaton #behaviour
- Automata of Asynchronous Behaviors (JAB, RN), pp. 29–45.
- HCI-CC-1997-Dabija #behaviour #communication
- Communicating about Reactive Behaviors (VGD), pp. 31–34.
- HCI-CC-1997-ItohMGA #behaviour #process
- Analyzing Qualitative Data with SPROT (Structural Process Chart of a Task Oriented Behavior) (MI, YM, SG, TA), pp. 541–544.
- CAiSE-1997-TryfonaPH #behaviour #experience #modelling
- Modeling Behavior of Geographic Objects: An Experience with the Object Modeling Technique (NT, DP, TH), pp. 347–359.
- KDD-1997-DeCoste #behaviour #mining #multi
- Mining Multivariate Time-Series Sensor Data to Discover Behavior Envelopes (DD), pp. 151–154.
- TOOLS-USA-1997-MagnanVO #behaviour #specification
- From Specification to Management of Composite Object Behavior (MM, SV, MCO), p. 132–?.
- TOOLS-USA-1997-SoundarajanF #behaviour
- Inheriting and Modifying Behavior (NS, SF), pp. 148–162.
- POPL-1997-PierceS #behaviour #equivalence #polymorphism #π-calculus
- Behavioral Equivalence in the Polymorphic π-calculus (BCP, DS), pp. 242–255.
- DAC-1996-BorchersHB #behaviour #equation #generative
- Equation-Based Behavioral Model Generation for Nonlinear Analog Circuits (CB, LH, EB), pp. 236–239.
- DAC-1996-Camposano #behaviour #synthesis
- Behavioral Synthesis (RC), pp. 33–34.
- KBSE-1996-HoweP #behaviour #modelling
- Constructing Transition Models of AI Planner Behavior (AEH, LDP), p. 8.
- WPC-1996-LuciaFM #behaviour #comprehension #slicing
- Understanding Function Behaviors through Program Slicing (ADL, ARF, MM), pp. 9–10.
- SAS-1996-AltFMW #abstract interpretation #behaviour #predict
- Cache Behavior Prediction by Abstract Interpretation (MA, CF, FM, RW), pp. 52–66.
- CHI-1996-DarkenS #behaviour #scalability
- Wayfinding Strategies and Behaviors in Large Virtual Worlds (RPD, JLS), pp. 142–149.
- CHI-1996-Ishizaki #behaviour #design #multi #visualisation
- Multiagent Model of Dynamic Design: Visualization as an Emergent Behavior of Active Design Agents (SI), pp. 347–354.
- CHI-1996-KoenemannB #behaviour #case study #effectiveness #information retrieval #interactive
- A Case for Interaction: A Study of Interactive Information Retrieval Behavior and Effectiveness (JK, NJB), pp. 205–212.
- CSCW-1996-FinholtOO #behaviour #evaluation #tutorial
- Behavioral Evaluation of CSCW Technologies (Tutorial) (TAF, GMO, JSO), p. 5.
- ICPR-1996-ChenJ #behaviour #network #on the
- On the small sample behavior of the class-sensitive neural network (CHC, AJ), pp. 209–213.
- ECOOP-1996-KristensenM #abstraction #behaviour #named #process
- Activities: Abstractions for Collective Behavior (BBK, DCMM), pp. 472–501.
- SAC-1996-ChungLLD #behaviour #comparison #using
- A comparison of variational data assimilation and nudging using a simple dynamical system with chaotic behavior (WC, JML, SL, SKD), pp. 454–462.
- FSE-1996-SeiterPL #behaviour #evolution #using
- Evolution of Object Behavior Using Context Relations (LMS, JP, KJL), pp. 46–57.
- ICSE-1996-DharaL #behaviour #inheritance #specification #type system
- Forcing Behavioral Subtyping through Specification Inheritance (KKD, GTL), pp. 258–267.
- HPDC-1996-AlmerothA #behaviour #modelling #multi
- Collecting and Modeling the Join/Leave Behavior of Multicast Group Members in the MBone (KCA, MHA), pp. 209–216.
- DAC-1995-KnappLMM #behaviour #specification #synthesis #validation
- Behavioral Synthesis Methodology for HDL-Based Specification and Validation (DK, TL, DM, RM), pp. 286–291.
- DAC-1995-LyKMM #behaviour #scheduling #using
- Scheduling Using Behavioral Templates (TL, DK, RM, DM), pp. 101–106.
- DAC-1995-MartinK #behaviour #named #optimisation #power management
- Power-Profiler: Optimizing ASICs Power Consumption at the Behavioral Level (RSM, JPK), pp. 42–47.
- DAC-1995-StollonP #behaviour #complexity #metric #modelling
- Measures of Syntactic Complexity for Modeling Behavioral VHDL (NSS, JDP), pp. 684–689.
- CHI-1995-LiebermanF #behaviour #programming
- Bridging the Gulf Between Code and Behavior in Programming (HL, CF), pp. 480–486.
- SEKE-1995-JainSK #behaviour #reuse #towards
- Towards Reusability Based Upon Similar Computational Behavior (AJ, LS, MK), pp. 197–203.
- ILPS-1995-JamilL #behaviour #declarative #inheritance #semantics
- A Declarative Semantics for Behavioral Inheritance and Conflict Resolution (HMJ, LVSL), pp. 130–144.
- LICS-1995-Wang #analysis #behaviour #realtime
- Timing Behavior Analysis for Real-Time Systems (FW), pp. 112–122.
- DAC-1994-ArnsteinT #abstraction #behaviour #synthesis #tool support
- The Attributed-Behavior Abstraction and Synthesis Tools (LFA, DET), pp. 557–561.
- EDAC-1994-BalboniCFS #architecture #array #behaviour
- From Behavioral Description to Systolic Array Based Architectures (AB, CC, FF, DS), p. 657.
- EDAC-1994-BhatiaJ #behaviour #named #synthesis #testing
- Genesis: A Behavioral Synthesis System for Hierarchical Testability (SB, NKJ), pp. 272–276.
- EDAC-1994-HolmesG #algorithm #behaviour #generative
- An Algorithm for Generation of Behavioral Shape Functions (NDH, DG), pp. 314–318.
- EDAC-1994-HuangR #behaviour #performance #throughput #using
- Maximizing the Throughput of High Performance DSP Applications Using Behavioral Transformations (SHH, JMR), pp. 25–30.
- EDAC-1994-WuTWL #behaviour #synthesis
- A Synthesis Method for Mixed Synchronous / Asynchronous Behavior (TYW, TCT, ACHW, YLL), pp. 277–281.
- ESOP-1994-BerthomieuS #behaviour #framework #ml #programming #semantics #syntax
- Programming with Behaviors in an ML Framework — The Syntax and Semantics of LCS (BB, TLS), pp. 89–104.
- ICSM-1994-BelkhatirM #behaviour #evolution #process
- Evolving Software Processes by Tailoring the Behavior of Software Objects (NB, WLM), pp. 212–221.
- SAS-1994-MuellerW #analysis #behaviour #on the fly #performance #simulation
- Efficient On-the-fly Analysis of Program Behavior and Static Cache Simulation (FM, DBW), pp. 101–115.
- CHI-1994-ChaseSHH94a #behaviour #development #evaluation #representation
- Development and evaluation of a taxonomical model of behavioral representation techniques (JDC, RSS, HRH, DH), pp. 159–165.
- CAiSE-1994-Keszenheimer #abstraction #behaviour #evolution #maintenance
- Utilizing Behavioral Abstractions to Facilitate Maintenance During Class Evolution (LMK), pp. 325–338.
- CIKM-1994-Al-AnziS #behaviour #concurrent #modelling #towards
- Modeling Behavior, A Step Towards Defining Functionally Correct Views of Complex Objects in Concurrent Engineering (FSAA, DLS), pp. 1–9.
- SEKE-1994-AtchanE #behaviour #empirical #functional #modelling #requirements #specification
- An experiment in eliminating the separation between data, functional, and behavioral models during requirements specification (HMA, GCE), pp. 2–9.
- SEKE-1994-SuzukiT #abstraction #behaviour #retrieval #using
- Associative program retrieval using partially-ordered behavioral abstractions of a program (HS, NT), pp. 395–404.
- SAC-1994-HoskinsHH #behaviour #interactive #multi
- An interactive multimedia system for fire behavior training (JAH, WDH, KGH), pp. 379–382.
- DAC-1993-LeeJW #behaviour #synthesis
- Behavioral Synthesis of Highly Testable Data Paths under the Non-Scan and Partial Scan Environments (TCL, NKJ, WW), pp. 292–297.
- DAC-1993-LiuCS #behaviour #simulation #using #verification
- Analog System Verification in the Presence of Parasitics Using Behavioral Simulation (EWYL, HCC, ALSV), pp. 159–163.
- DAC-1993-SantucciCG #behaviour #heuristic #using
- Speed up of Behavioral A.T.P.G. using a Heuristic Criterion (JFS, ALC, NG), pp. 92–96.
- CSM-1993-Keszenheimer #adaptation #behaviour #evolution #specification
- Specifying and Adapting Object Behavior During System Evolution (LMK), pp. 254–261.
- HCI-ACS-1993-HoonhoutZ #behaviour #industrial #process
- Operator Behavior and Supervisory Control Systems in the Chemical Process Industry (HCMH, HJGZ), pp. 109–114.
- HCI-SHI-1993-ChaseHHSB #behaviour #design #representation #user interface
- A Model of Behavioral Techniques for Representing User Interface Designs (JDC, HRH, DH, RSS, JLB), pp. 861–866.
- INTERCHI-1993-DiGianoBO #behaviour #monitoring #named #programming
- LogoMedia: a sound-enhanced programming environment for monitoring program behavior (CD, RMB, RNO), pp. 301–302.
- CIKM-1993-PetersLOS #behaviour #query
- An Extensible Query Model and Its Languages for a Uniform Behavioral Object Management System (RJP, AL, MTÖ, DS), pp. 403–412.
- SEKE-1993-DingK #behaviour #specification #state machine
- Attributed State Machines For Behavior Specification of Reactive Systems (SD, TK), pp. 695–702.
- ECOOP-1993-GangopadhyayM #behaviour #named #specification
- ObjChart: Tangible Specification of Reactive Object Behavior (DG, SM), pp. 432–457.
- OOPSLA-1993-PauwHKV #behaviour #object-oriented #visualisation
- Visualizing the Behavior of Object-Oriented Systems (WDP, RH, DK, JMV), pp. 326–337.
- ICSE-1993-Hall #behaviour #retrieval
- Generalized Behavior-Based Retrieval (RJH), pp. 371–380.
- CAV-1993-ProbstL #automaton #behaviour #verification
- Verifying Timed Behavior Automata with Input/Output Critical Races (DKP, HFL), pp. 424–437.
- DAC-1992-BergamaschiLK #behaviour #optimisation #synthesis #using
- Control Optimization in High-Level Synthesis Using Behavioral Don’t Cares (RAB, DAL, AK), pp. 657–661.
- DAC-1992-SantucciDGB #behaviour #generative
- A Methodology to Reduce the Computational Cost of Behavioral Test Pattern Generation (JFS, GD, NG, MB), pp. 267–272.
- DAC-1992-WolfTHMW #behaviour #synthesis
- The Princeton University Behavioral Synthesis System (WW, AT, CYH, RM, EW), pp. 182–187.
- HT-ECHT-1992-BuchananZ #behaviour #documentation #hypermedia #specification
- Specifying Temporal Behavior in Hypermedia Documents (MCB, PZ), pp. 262–271.
- SIGMOD-1992-AikenWH #behaviour #confluence #database #termination
- Behavior of Database Production Rules: Termination, Confluence, and Observable Determinism (AA, JW, JMH), pp. 59–68.
- VLDB-1992-LiuM #approach #behaviour #communication #database #declarative #object-oriented #process
- Activity Model: A Declarative Approach for Capturing Communication Behavior in Object-Oriented Databases (LL, RM), pp. 481–493.
- TRI-Ada-C-1992-Cherry #ada #behaviour
- Stimulus Response Machines: An Ada-based Graphic Formalism for Describing Class and Object Behavior (GWC), pp. 321–332.
- TRI-Ada-C-1992-Crespi-ReghizziMP #ada #behaviour #concept #experience #implementation #inheritance
- Behavioral Inheritance: Concepts, Ada Implementation and Experience (SCR, MDM, SP), pp. 200–210.
- CIKM-1992-MartinAD #approach #behaviour #consistency #database #object-oriented
- Consistency Checking in Object Oriented Databases: a Behavioral Approach (HM, MEA, BD), pp. 53–68.
- TOOLS-EUROPE-1992-Rubin #analysis #behaviour
- Object Behavior Analysis (KSR), p. 407.
- ICSE-1992-PodgurskiP #automation #behaviour #component #retrieval #reuse
- Behavior Sampling: A Technique for Automated Retrieval of Reusable Components (AP, LP), pp. 349–360.
- CAV-1992-CelikkanC #behaviour #generative
- Generating Diagnostic Information for Behavioral Preorders (UC, RC), pp. 370–383.
- CAV-1992-ProbstL #automaton #behaviour #constraints #verification
- Verifying Timed Behavior Automata with Nonbinary Delay Constraints (DKP, HFL), pp. 123–136.
- DAC-1991-AmonB #behaviour #named
- OEsim: A Simulator for Timing Behavior (TA, GB), pp. 656–661.
- PLDI-1991-Wall #behaviour #predict #using
- Predicting Program Behavior Using Real or Estimated Profiles (DWW), pp. 59–70.
- Best-of-PLDI-1991-Wall91a #behaviour #predict #using
- Predicting program behavior using real or estimated profiles (with retrospective) (DWW), pp. 429–441.
- ML-1991-Ring #behaviour #development #incremental
- Incremental Development of Complex Behaviors (MBR), pp. 343–347.
- CAV-1991-Mutz #behaviour #correctness #proving #term rewriting #using
- Using the HOL Prove Assistant for proving the Correctness of term Rewriting Rules reducing Terms of Sequential Behavior (MM), pp. 277–287.
- CSL-1991-HeuschS #aspect-oriented #behaviour #probability
- Some Aspects of the Probabilistic Behavior of Variants of Resolution (PH, ES), pp. 164–172.
- DAC-1990-ChenG #behaviour #component #database #synthesis
- An Intelligent Component Database for Behavioral Synthesis (GDC, DG), pp. 150–155.
- DAC-1990-DuttHG #behaviour #representation #synthesis
- An Intermediate Representation for Behavioral Synthesis (NDD, TH, DG), pp. 14–19.
- DAC-1990-IshiuraYY #behaviour #design #hardware #named #semantics
- NES: The Behavioral Model for the Formal Semantics of a Hardware Design Language UDL/I (NI, HY, SY), pp. 8–13.
- DAC-1990-ScheichenzuberGLM #behaviour #data flow #hardware #synthesis
- Global Hardware Synthesis from Behavioral Dataflow Descriptions (JS, WG, UL, SM), pp. 456–461.
- DAC-1990-WardA #behaviour #fault #simulation
- Behavioral Fault Simulation in VHDL (PCW, JRA), pp. 587–593.
- DAC-1990-Wolf #automaton #behaviour #network #synthesis
- The FSM Network Model for Behavioral Synthesis of Control-Dominated Machines (WW), pp. 692–697.
- SIGMOD-1990-ChrysanthisR #behaviour #framework #named #reasoning #specification #transaction
- ACTA: A Framework for Specifying and Reasoning about Transaction Structure and Behavior (PKC, KR), pp. 194–203.
- ICSE-1990-Robinson #behaviour #requirements #specification
- Negotiation Behavior During Requirements Specification (WNR), pp. 268–276.
- DAC-1989-BlaauwSMAR #automation #behaviour #generative #modelling
- Automatic Generation of Behavioral Models from Switch-Level Descriptions (DB, DGS, RBMT, JAA, JTR), pp. 179–184.
- DAC-1989-DuttG #behaviour #design #synthesis
- Designer Controlled Behavioral Synthesis (NDD, DG), pp. 754–757.
- DAC-1989-HayatiP #automation #behaviour #specification
- Automatic Production of Controller Specifications from Control and Timing Behavioral Descriptions (SH, AP), pp. 75–80.
- DAC-1989-IshiuraTY #behaviour #logic #simulation #verification
- Time-Symbolic Simulation for Accurate Timing Verification of Asynchronous Behavior of Logic Circuits (NI, MT, SY), pp. 497–502.
- DAC-1989-KumarKKG #automation #behaviour #synthesis
- Automatic Synthesis of Microprogrammed Control Units from Behavioral Descriptions (AK, SK, PK, SG), pp. 147–154.
- DAC-1989-Leung #behaviour #modelling
- Behavioral Modeling of Transmission Gates in VHDL (SSL), pp. 746–749.
- DAC-1989-TrickD #behaviour #layout #named #synthesis #tool support
- LASSIE: Structure to Layout for Behavioral Synthesis Tools (MTT, SWD), pp. 104–109.
- DAC-1989-YuZYL #algorithm #behaviour #convergence #novel
- A Novel Algorithm for Improving Convergence Behavior of Circuit Simulators (ZY, WZ, ZY, YEL), pp. 626–629.
- PODS-1989-KedemT #behaviour #database #modelling #relational
- Relational Database Behavior: Utilizing Relational Discrete Event Systems and Models (ZMK, AT), pp. 336–346.
- FPCA-1989-Burton #behaviour #parallel #semantics #source code
- Indeterminate Behavior with Determinate Semantics in Parallel Programs (FWB), pp. 340–346.
- CHI-1989-DeSoiLS #abstraction #behaviour #specification #user interface #visual notation
- Graphical specification of user interfaces with behavior abstraction (JFD, WML, SVS), pp. 139–144.
- CHI-1989-EganRLLG #analysis #behaviour #evaluation #hypermedia
- Behavioral evaluation and analysis of a hypertext browser (DEE, JRR, TKL, CCL, LMG), pp. 205–210.
- CHI-1989-Myers #behaviour #encapsulation #interactive
- Encapsulating interactive behaviors (BAM), pp. 319–324.
- ML-1989-LeviSP #behaviour #identification #knowledge base
- Identifying Knowledge Base Deficiencies by Observing User Behavior (KRL, VLS, DLP), pp. 296–301.
- ML-1989-Paredis #behaviour #learning
- Learning the Behavior of Dynamical Systems form Examples (JP), pp. 137–140.
- ICSE-1989-Curtis #behaviour #development #modelling #problem #process
- Three Problems Overcome with Behavioral Models of the Software Development Process (BC), pp. 398–399.
- DAC-1988-BlackburnTK #behaviour #design
- CORAL II: Linking Behavior and Structure in an IC Design System (RLB, DET, PMK), pp. 529–535.
- DAC-1988-TsengWRTB #behaviour #named #synthesis
- Bridge: A Versatile Behavioral Synthesis System (CJT, RSW, SGR, MMT, AKB), pp. 415–420.
- DAC-1988-WeiRJ #behaviour #named #synthesis
- BECOME: Behavior Level Circuit Synthesis Based on Structure Mapping (RSW, SGR, JYJ), pp. 409–414.
- ICSE-1988-Williams #approach #behaviour #modelling #process
- Software Process Modeling: A Behavioral Approach (LGW), pp. 174–186.
- PPEALS-1988-DavisH #behaviour #parallel #source code
- Characterizing the Synchronization Behavior of Parallel Programs (HD, JLH), pp. 198–211.
- DAC-1987-WuHHYY #behaviour
- Function Search from Behavioral Description of a Digital System (JGW, WPCH, YHH, DYYY, HJY), pp. 574–579.
- HCI-CE-1987-Meister #behaviour #evaluation
- Behavioral Test and Evaluation of Expert Systems (DM), pp. 539–549.
- ECOOP-1987-MaruichiUT #behaviour #simulation
- Behavioral Simulation Based on Knowledge Objects (TM, TU, MT), pp. 213–222.
- SLP-1987-DiszL87 #behaviour #logic programming #parallel #source code #visual notation
- A Graphical Tool for Observing the Behavior of Parallel Logic Programs (TD, ELL), pp. 46–53.
- DAC-1986-McFarland #behaviour #bottom-up #design #hardware #synthesis #using
- Using bottom-up design techniques in the synthesis of digital hardware from abstract behavioral descriptions (MCM), pp. 474–480.
- OOPSLA-1986-Lieberman #behaviour #object-oriented #prototype #using
- Using Prototypical Objects to Implement Shared Behavior in Object Oriented Systems (HL), pp. 214–223.
- DAC-1985-AlthoffS #behaviour #compilation #modelling
- A behavioral modeling system for cell compilers (JCA, RDS), pp. 468–474.
- DAC-1985-BlackburnT #behaviour #representation #synthesis
- Linking the behavioral and structural dominis of representation in a synthesis system (RLB, DET), pp. 374–380.
- ICALP-1985-LubyR #algorithm #behaviour #bidirectional
- A Bidirectional Shortest-Path Algorithm With Good Average-Case Behavior (Preliminary Version) (ML, PR), pp. 394–403.
- STOC-1984-BentleyJLMM #behaviour
- Some Unexpected Expected Behavior Results for Bin Packing (JLB, DSJ, FTL, CCM, LAM), pp. 279–288.
- DAC-1983-McFarland #behaviour #clustering #hardware
- Computer-aided partitioning of behavioral hardware descriptions (MCM), pp. 472–478.
- DAC-1983-WalkerT #behaviour
- Behavioral level transformation in the CMU-DA system (RAW, DET), pp. 788–789.
- SIGIR-1983-Borgman #behaviour #information retrieval #monitoring #online
- End User Behavior on an Online Information Retrieval System: A Computer Monitoring Study (CLB), pp. 162–176.
- ICSE-1982-Abu-SufahLMY #behaviour #source code
- Experimental Results on the Paging Behavior of Numerical Programs (WAAS, RL, MM, PY), pp. 110–119.
- DAC-1981-Glasser #behaviour
- The analog behavior of digital integrated circuits (LAG), pp. 603–612.
- DAC-1980-LeinwandL #algebra #analysis #behaviour #nondeterminism
- Algebraic analysis of nondeterministic behavior (SML, TL), pp. 483–493.
- DAC-1979-Johnson #behaviour #development
- Behavioral-level test development (WAJ), pp. 171–179.
- ICALP-1979-Selman #behaviour #polynomial #set
- P-Selective Sets, Tally Languages, and the Behavior of Polynomial Time Reducibilities on NP (ALS), pp. 546–555.
- SOSP-1979-AimesL #behaviour #communication #network
- The Behavior of Ethernet-Like Computer Communication Networks (GTA, EDL), pp. 66–81.
- ICSE-1978-Brooks #behaviour #comprehension #re-engineering #using
- Using a Behavioral Theory of Program Comprehension in Software Engineering (REB), pp. 196–201.
- ICSE-1978-RiddleWSSS #behaviour #design #modelling
- Behavior Modelling During Software Design (WER, JCW, JHS, ARS, AMS), pp. 13–22.
- STOC-1976-Yao #algorithm #behaviour #on the #set
- On the Average Behavior of Set Merging Algorithms (Extended Abstract) (ACCY), pp. 192–195.
- ICSE-1976-PimontR #analysis #assessment #behaviour #reliability #source code
- A Software Reliability Assessment Based on a Structural and Behavioral Analysis of Programs (SP, JCR), pp. 486–491.
- VLDB-1975-Chin #analysis #behaviour
- Analysis of VSAM’s Free-Space Behavior (YHC), pp. 514–515.
- SOSP-1971-Rodriguez-Rosell #behaviour #how #parametricity
- Experimental Data on How Program Behavior Affects the Choice of Scheduler Parameters (JRR), pp. 156–163.