155 papers:
- CASE-2015-FeiAR #bound #clustering #resource management #symbolic computation #using
- Symbolic computation of boundary unsafe states in complex resource allocation systems using partitioning techniques (ZF, KÅ, SAR), pp. 799–806.
- CASE-2015-Michalek #bound #standard
- Motion control with minimization of a boundary off-track for non-Standard N-trailers along forward-followed paths (MMM), pp. 1564–1569.
- CIAA-J-2013-JirasekJ15 #bound #on the #regular expression
- On the boundary of regular languages (JJ, GJ), pp. 42–57.
- DLT-2015-JirasekJ #bound
- The Boundary of Prefix-Free Languages (JJ, GJ), pp. 300–312.
- CHI-2015-BlomkvistPA #agile #bound #communication #distributed
- Communication through Boundary Objects in Distributed Agile Teams (JKB, JP, JÅ), pp. 1875–1884.
- CHI-2015-CecchinatoCB #bound #difference #email
- Working 9-5?: Professional Differences in Email and Boundary Management Practices (MEC, ALC, JB), pp. 3989–3998.
- CHI-2015-FleckCR #bound #multi #using
- Balancing Boundaries: Using Multiple Devices to Manage Work-Life Balance (RF, ALC, RAVR), pp. 3985–3988.
- CHI-2015-YerousisARRRW #bound
- Computer-Enabled Project Spaces: Connecting with Palestinian Refugees across Camp Boundaries (GPY, KA, TvR, DWR, MR, VW), pp. 3749–3758.
- DUXU-UI-2015-GomezFD #bound #education
- Transcending Disciplinary, Cultural and National Boundaries: Emergent Technologies, New Education Landscape and the Cloud Workshop Project (RG, PF, RD), pp. 631–642.
- HCI-IT-2015-HakodaKSST #bound #gesture #mobile #named #using
- AirFlip: A Double Crossing In-Air Gesture Using Boundary Surfaces of Hover Zone for Mobile Devices (HH, TK, KS, BS, JT), pp. 44–53.
- KDD-2015-YuW0PSIW #bound #markov #multi
- Tornado Forecasting with Multiple Markov Boundaries (KY, DW, WD, JP, DLS, SI, XW), pp. 2237–2246.
- GPCE-2015-ReyndersDP #api #bound #generative
- Generating safe boundary APIs between typed EDSLs and their environments (BR, DD, FP), pp. 31–34.
- WICSA-2014-BiancoMKR #bound #case study #ecosystem #framework
- The Role of Platform Boundary Resources in Software Ecosystems: A Case Study (VdB, VM, MK, MR), pp. 11–20.
- CASE-2014-ChiuC #bound #detection #image
- A variance-reduction method for thyroid nodule boundary detection on ultrasound images (LYC, AC), pp. 681–685.
- ICFP-2014-SchoepeHS #bound #named
- SeLINQ: tracking information across application-database boundaries (DS, DH, AS), pp. 25–38.
- CHI-2014-LeeSS #analysis #bound #design #research
- Stay on the boundary: artifact analysis exploring researcher and user framing of robot design (HRL, SS, ES), pp. 1471–1474.
- CHI-2014-WaycottDVMGOK #bound
- Captioned photographs in psychosocial aged care: relationship building and boundary work (JW, HD, FV, AM, AG, EO, LK), pp. 4167–4176.
- CSCW-2014-GavilanesMQ #bound #communication #social #twitter
- Twitter ain’t without frontiers: economic, social, and cultural boundaries in international communication (ROGG, YM, DQ), pp. 1511–1522.
- ASPLOS-2014-SaniBQZ #bound
- I/o paravirtualization at the device file boundary (AAS, KB, SQ, LZ), pp. 319–332.
- CASE-2013-OFlahertyE #bound #learning #sequence
- Learning to locomote: Action sequences and switching boundaries (RO, ME), pp. 7–12.
- DocEng-2013-VielMPT #bound
- Go beyond boundaries of iTV applications (CCV, ELM, MdGCP, CACT), pp. 263–272.
- ICDAR-2013-HePXSN #3d #bound #re-engineering
- A Book Dewarping System by Boundary-Based 3D Surface Reconstruction (YH, PP, SX, JS, SN), pp. 403–407.
- ITiCSE-2013-QureshiEP #bound #student
- Students organizing against pollution: computational thinking across boundaries (SQ, FE, SMP), p. 356.
- CIAA-2013-JirasekJ #bound #on the #regular expression
- On the Boundary of Regular Languages (JJ, GJ), pp. 208–219.
- CHI-2013-ShiXC #bound #network #social #using
- Using contextual integrity to examine interpersonal information boundary on social network sites (PS, HX, YC), pp. 35–38.
- CSCW-2013-HalpernEFG #bound #collaboration #design
- Designing collaboration: comparing cases exploring cultural probes as boundary-negotiating objects (MKH, IE, LF, GKG), pp. 1093–1102.
- CSCW-2013-HuangDLLG #bound
- Meanings and boundaries of scientific software sharing (XH, XD, CPL, TL, NG), pp. 423–434.
- REFSQ-2013-RempelMKP #bibliography #bound #requirements #taxonomy #traceability
- Requirements Traceability across Organizational Boundaries — A Survey and Taxonomy (PR, PM, TK, IP), pp. 125–140.
- LICS-2013-MogaveroMS #behaviour #bound #on the
- On the Boundary of Behavioral Strategies (FM, AM, LS), pp. 263–272.
- VLDB-2012-SelkeLB #bound #database
- Pushing the Boundaries of Crowd-enabled Databases with Query-driven Schema Expansion (JS, CL, WTB), pp. 538–549.
- SEFM-2012-ColomboFMP #bound #configuration management #monitoring #named #resource management #runtime #verification
- polyLarva: Runtime Verification with Configurable Resource-Aware Monitoring Boundaries (CC, AF, RM, GJP), pp. 218–232.
- CHI-2012-WisniewskiLW #bound
- Fighting for my space: coping mechanisms for sns boundary regulation (PJW, HRL, DW), pp. 609–618.
- CSCW-2012-FredericW #bound #social #social media
- Boundary regulation in social media (SF, HW), pp. 769–778.
- ICPR-2012-ChenYZZ #bound #detection #network
- Detecting occlusion boundaries via saliency network (DC, ZY, GZ, NZ), pp. 2569–2572.
- ICPR-2012-LiuSZWBCT #bound #detection
- Joint shot boundary detection and key frame extraction (XL, MS, LZ, SW, JB, CC, DT), pp. 2565–2568.
- ICPR-2012-SuYLW #bound #classification #editing #using
- Local color editing using color classification and boundary inpainting (ZS, XY, XL, DW), pp. 3196–3199.
- ICPR-2012-WangHB #bound #locality
- Glass object localization by joint inference of boundary and depth (TW, XH, NB), pp. 3783–3786.
- ICPR-2012-ZhangXY #bound #detection #modelling
- An improved surround suppression model based on orientation contrast for boundary detection (HZ, BX, JY), pp. 3086–3089.
- ICST-2012-CadavidBS #bound #metamodelling #modelling
- Searching the Boundaries of a Modeling Space to Test Metamodels (JJC, BB, HAS), pp. 131–140.
- DAC-2011-HsiaoD #bound #parallel #scalability
- A highly scalable parallel boundary element method for capacitance extraction (YCH, LD), pp. 552–557.
- DATE-2011-TsaiLCKCK #bound #on the
- On routing fixed escaped boundary pins for high speed boards (TYT, RJL, CYC, CYK, HMC, YK), pp. 461–466.
- ITiCSE-2011-MarkhamB #bound #twitter #using
- Collaborating across international boundaries: using twitter as a tool in the classroom (SM, SB), p. 382.
- ICSM-2011-YazdanshenasM #bound #component
- Crossing the boundaries while analyzing heterogeneous component-based software systems (ARY, LM), pp. 193–202.
- CHI-2011-KuznetsovTKHPS #bound
- Breaking boundaries: strategies for mentoring through textile computing workshops (SK, LCT, CK, IH, EP, DPS), pp. 2957–2966.
- CHI-2011-ZhouAZ #bound
- CPOE workarounds, boundary objects, and assemblages (XZ, MSA, KZ), pp. 3353–3362.
- CAiSE-2011-Finkelstein #bound #challenge #information management #re-engineering
- Ten Open Challenges at the Boundaries of Software Engineering and Information Systems (AF), p. 1.
- MLDM-2011-AlshukriCZ #bound #detection #incremental #random #using
- Incremental Web-Site Boundary Detection Using Random Walks (AA, FC, MZ), pp. 414–427.
- RE-2011-UbayashiKHT #analysis #bound #embedded
- A context analysis method for embedded systems — Exploring a requirement boundary between a system and its context (NU, YK, MH, TT), pp. 143–152.
- CASE-2010-MacwanNB #approach #bound #multi #novel #online #predict #probability
- On-line target-motion prediction for autonomous multirobot search in realistic terrains with time-expanding boundaries: A novel probabilistic approach (AM, GN, BB), pp. 662–667.
- DAC-2010-LinLHC #bound #constraints
- Performance-driven analog placement considering boundary constraint (CWL, JML, CPH, SJC), pp. 292–297.
- ESOP-2010-NaumannB #bound #first-order #higher-order #information management
- Dynamic Boundaries: Information Hiding by Second Order Framing with First Order Assertions (DAN, AB), pp. 2–22.
- LATA-2010-Neary #bound
- A Boundary between Universality and Non-universality in Extended Spiking Neural P Systems (TN), pp. 475–487.
- CHI-2010-AarhusB #bound
- Negotiating boundaries: managing disease at home (RA, SAB), pp. 1223–1232.
- CHI-2010-DantecE #bound #information management #multi
- Across boundaries of influence and accountability: the multiple scales of public sector information systems (CALD, WKE), pp. 113–122.
- CIKM-2010-XiaoLC #bound #concept
- K-farthest-neighbors-based concept boundary determination for support vector data description (YX, BL, LC), pp. 1701–1704.
- ICPR-2010-BaldacciBD #3d #algorithm #bound #design #framework #graph #segmentation
- Oriented Boundary Graph: A Framework to Design and Implement 3D Segmentation Algorithms (FB, AJPB, JPD), pp. 1116–1119.
- ICPR-2010-BauerEOBKFHN #approach #bound #estimation #graph #performance #robust
- A Fast and Robust Graph-Based Approach for Boundary Estimation of Fiber Bundles Relying on Fractional Anisotropy Maps (MHAB, JE, TO, SB, JK, BF, HKH, CN), pp. 4016–4019.
- ICPR-2010-KhosrowabadiQWA #bound #detection #recognition #self #using
- EEG-based Emotion Recognition Using Self-Organizing Map for Boundary Detection (RK, HCQ, AW, KKA), pp. 4242–4245.
- ICPR-2010-ZhangK #analysis #bound
- Weighted Boundary Points for Shape Analysis (JZ, RK), pp. 1598–1601.
- SIGIR-2010-WangLC #bound #detection #query
- Intent boundary detection in search query logs (CJW, KHYL, HHC), pp. 749–750.
- MoDELS-v2-2010-ParetoEE #architecture #bound #design
- Architectural Descriptions as Boundary Objects in System and Design Work (LP, PE, SE), pp. 406–419.
- SAC-2010-CampanTC #bound
- User-controlled generalization boundaries for p-sensitive k-anonymity (AC, TMT, NC), pp. 1103–1104.
- SPLC-2010-ElsnerULS #bound #consistency #product line
- Consistent Product Line Configuration across File Type and Product Line Boundaries (CE, PU, DL, WSP), pp. 181–195.
- DATE-2009-GuoS #bound #design #distributed #optimisation #using
- Optimizing the HW/SW boundary of an ECC SoC design using control hierarchy and distributed storage (XG, PS), pp. 454–459.
- DRR-2009-TaghvaC #analysis #bound #documentation #using
- Document boundary determination using structural and lexical analysis (KT, MAC), pp. 1–10.
- ICDAR-2009-LiuBMG #bound #detection #fault #sequence
- Improving the Table Boundary Detection in PDFs by Fixing the Sequence Error of the Sparse Lines (YL, KB, PM, CLG), pp. 1006–1010.
- ICDAR-2009-SharmaL #bound
- Form Field Frame Boundary Removal for Form Processing System in Gurmukhi Script (DVS, GSL), pp. 256–260.
- ICDAR-2009-WangC #bound #detection #documentation #image
- Logo Detection in Document Images Based on Boundary Extension of Feature Rectangles (HW, YC), pp. 1335–1339.
- WCRE-1999-PassingSLP99a #bound #named
- NTrace: Function Boundary Tracing for Windows on IA-32 (JP, AS, MvL, AP), pp. 43–52.
- HIMI-DIE-2009-ShinPC #bound #detection
- Virtual Convex Polygon Based Hole Boundary Detection and Time Delay Based Hole Detour Scheme in WSNs (IS, NDP, HC), pp. 619–627.
- SAT-2009-Goldberg #bound
- Boundary Points and Resolution (EG), pp. 147–160.
- WICSA-2008-LagoACK #architecture #bound #community
- Wishes and Boundaries for a Software Architecture Knowledge Community (PL, PA, RC, PK), pp. 271–274.
- CIKM-2008-LiuMG #bound #detection #documentation #identification
- Identifying table boundaries in digital documents via sparse line detection (YL, PM, CLG), pp. 1311–1320.
- ICPR-2008-AlliliZ #approach #bound #segmentation
- An approach for dynamic combination of region and boundary information in segmentation (MSA, DZ), pp. 1–4.
- ICPR-2008-KadarBS #bound #detection #evolution #image #programming #search-based
- Evolving boundary detectors for natural images via Genetic Programming (IK, OBS, MS), pp. 1–4.
- ICPR-2008-MuraiF #bound #detection #using #video
- Shot boundary detection using co-occurrence of global motion in video stream (YM, HF), pp. 1–4.
- ICPR-2008-WangTHW #bound #using
- Object boundary extraction using Active B-Snake Model (YW, EKT, ZH, JGW), pp. 1–4.
- ICPR-2008-WimmerHS #bound #classification
- Implicit active shape model employing boundary classifier (AW, JH, GS), pp. 1–4.
- SEKE-2008-PatroneR #bound #logic #programming language
- Sharing Application Logic Across Programming Language Boundaries (DSP, BR), pp. 227–231.
- ECOOP-2008-HuangHBR #bound #hardware #object-oriented #programming
- Liquid Metal: Object-Oriented Programming Across the Hardware/Software Boundary (SSH, AH, DFB, RMR), pp. 76–103.
- DAC-2007-ZhouLS #bound #embedded #hybrid #multi #performance #using
- Fast Capacitance Extraction in Multilayer, Conformal and Embedded Dielectric using Hybrid Boundary Element Method (NYZ, ZL, WS), pp. 835–840.
- VLDB-2007-RastogiHS #bound #privacy
- The Boundary Between Privacy and Utility in Data Publishing (VR, SH, DS), pp. 531–542.
- HCI-MIE-2007-DerakhshiK #bound #fuzzy #network #predict #sequence #using #word
- Using Recurrent Fuzzy Neural Networks for Predicting Word Boundaries in a Phoneme Sequence in Persian Language (MRFD, MRK), pp. 50–59.
- CAV-2007-ChakiSV #bound #verification
- Verification Across Intellectual Property Boundaries (SC, CS, HV), pp. 82–94.
- ICSM-2006-GoldHLM #approach #bound #concept #source code #using
- Allowing Overlapping Boundaries in Source Code using a Search Based Approach to Concept Binding (NG, MH, ZL, KM), pp. 310–319.
- FM-2006-BouquetDL #automation #bound #generative #ml #specification #testing
- Automated Boundary Test Generation from JML Specifications (FB, FD, BL), pp. 428–443.
- ICML-2006-PandaCW #bound #concept #detection
- Concept boundary detection for speeding up SVMs (NP, EYC, GW), pp. 681–688.
- ICPR-v1-2006-KatsoulasK #bound #image
- Box-like Superquadric Recovery in Range Images by Fusing Region and Boundary Information (DK, DIK), pp. 719–722.
- ICPR-v1-2006-LiHS #approach #bound #image #machine learning
- A Machine Learning Approach for Locating Boundaries of Liver Tumors in CT Images (YL, SH, KS), pp. 400–403.
- ICPR-v2-2006-ChenH #bound #composition #image #segmentation
- Boundary correction for total variation regularized L^1 function with applications to image decomposition and segmentation (TC, TSH), pp. 316–319.
- SAC-2006-FangG #bound #dataset
- Boundary surface extraction and rendering for volume datasets (SF, PG), pp. 1356–1360.
- CASE-2005-ChengY #bound #using
- Virtual object deformations using attributed boundary model (TMC, CCY), pp. 295–300.
- SAC-2005-ReddyC #bound #using
- Finding saddle points using stability boundaries (CKR, HDC), pp. 212–213.
- ICLP-2005-Saidi #bound #mining #process #using
- Using CLP to Characterise Linguistic Lattice Boundaries in a Text Mining Process (ASS), pp. 418–420.
- ICPR-v3-2004-ZhuHT #bound
- Comparing Decision Boundary Curvature (HZ, JH, XT), pp. 450–453.
- ICPR-v4-2004-KimPL #bound #using
- Object Boundary Edge Selection Using Normal Direction Derivatives of a Contour in a Complex Scene (TYK, JP, SWL), pp. 755–758.
- ICPR-v4-2004-SungLPL #bound #locality #recognition #using
- Iris Recognition Using Collarette Boundary Localization (HS, JL, JhP, YL), pp. 857–860.
- SAC-2004-ZhouLA #bound #image
- Boundary extraction in thermal images by edge map (QZ, ZL, JKA), pp. 254–258.
- CGO-2004-TallamZG #bound #profiling
- Extending Path Profiling across Loop Backedges and Procedure Boundaries (ST, XZ, RG), pp. 251–264.
- CSL-2004-ImmermanRRSY #bound #decidability #logic #transitive
- The Boundary Between Decidability and Undecidability for Transitive-Closure Logics (NI, AMR, TWR, SS, GY), pp. 160–174.
- DAC-2003-StehrGA #analysis #bound #performance #trade-off
- Performance trade-off analysis of analog circuits by normal-boundary intersection (GS, HEG, KA), pp. 958–963.
- DATE-2003-SmedtG #bound #design #named
- HOLMES: Capturing the Yield-Optimized Design Space Boundaries of Analog and RF Integrated Circuits (BDS, GGEG), pp. 10256–10263.
- TACAS-2003-BraghinCFFLP #analysis #bound #named
- BANANA — A Tool for Boundary Ambients Nesting ANAlysis (CB, AC, SF, RF, FLL, CP), pp. 437–441.
- ICEIS-v3-2003-GustasG #approach #bound #enterprise #information management #modelling #towards
- Towards the Enterprise Engineering Approach for Information System Modelling Across Organisational and Technical Boundaries (RG, PG), pp. 77–88.
- MLDM-2003-ImiyaTOH #bound #detection #random #set
- Detecting the Boundary Curve of Planar Random Point Set (AI, KT, HO, VH), pp. 413–424.
- MLDM-2003-MiteranBB #approximate #bound #classification #image #realtime #segmentation #using
- Classification Boundary Approximation by Using Combination of Training Steps for Real-Time Image Segmentation (JM, SB, EBB), pp. 141–155.
- FME-2002-LegeardPU #automation #bound #testing
- Automated Boundary Testing from Z and B (BL, FP, MU), pp. 21–40.
- CSCW-2002-LuttersA #bound #case study #safety
- Achieving safety: a field study of boundary objects in aircraft technical support (WGL, MSA), pp. 266–275.
- CSCW-2002-StevensW #bound #data access #maintenance
- A new dimension in access control: studying maintenance engineering across organizational boundaries (GS, VW), pp. 196–205.
- ICPR-v2-2002-EcabertT #bound #image #segmentation
- Variational Image Segmentation by Unifying Region and Boundary Information (OE, JPT), pp. 885–888.
- ICPR-v3-2002-Ishii #bound #design #people
- Tangible Bits: Designing the Boundary between People, Bits, and Atoms (HI), p. 277.
- ICPR-v3-2002-KimKKK #bound #sequence
- Usefulness of Boundary Sequences in Computing Shape Features for Arbitrary Shaped Regions (SK, SK, JK, MK), pp. 355–358.
- ICPR-v3-2002-SilvestreL #bound #classification #optimisation
- Optimization of Neural Classifiers Based on Bayesian Decision Boundaries and Idle Neurons Pruning (MRS, LLL), pp. 387–390.
- WICSA-2001-Shaw #architecture #bound #communication #research #ubiquitous
- When System Boundaries Dissolve: Research Opportunities in Software Architectures for Ubiquitous Computing and Communication (MS), p. 99–?.
- DAC-2001-YangPT #bound
- Improving Bus Test Via IDDT and Boundary Scan (SYY, CAP, MTA), pp. 307–312.
- DATE-2000-ParkK #bound #design #detection #fault
- A New IEEE 1149.1 Boundary Scan Design for the Detection of Delay Defects (SP, TK), pp. 458–462.
- DATE-2000-SchwenckerSGA #automation #bound #design
- The Generalized Boundary Curve-A Common Method for Automatic Nominal Design and Design Centering of Analog Circuits (RS, FS, HEG, KA), pp. 42–47.
- ICML-2000-Reynolds #adaptation #bound #clustering #learning
- Adaptive Resolution Model-Free Reinforcement Learning: Decision Boundary Partitioning (SIR), pp. 783–790.
- ICPR-v1-2000-HoogsM #approach #bound
- An Integrated Boundary and Region Approach to Perceptual Grouping (AH, JLM), pp. 1284–1290.
- ICPR-v1-2000-TasdizenC #algebra #bound #estimation #image #modelling
- Boundary Estimation from Intensity/Color Images with Algebraic Curve Models (TT, DBC), pp. 1225–1228.
- ICPR-v2-2000-LingC #bound #feature model #performance
- Fast and Efficient Feature Extraction Based on Bayesian Decision Boundaries (LLL, HMC), pp. 2390–2393.
- ICPR-v3-2000-CamilleriP #bound #refinement
- Spectral Unmixing of Mixed Pixels for Texture Boundary Refinement (KPC, MP), pp. 7096–7099.
- ICPR-v3-2000-KwanCG #approach #automation #bound #using
- Automatic Extraction of Bone Boundaries from CT Scans Using an Intelligence-Based Approach (FYK, KCC, IG), pp. 3441–3444.
- ICPR-v3-2000-RittscherS #bound #detection
- An Integral Criterion for Detecting Boundary Edges and Textured Regions (JR, JS), pp. 7076–7079.
- ICPR-v4-2000-LeungCKC #bound #detection #fuzzy
- Thyroid Cancer Cells Boundary Location by a Fuzzy Edge Detection Method (CCL, FHYC, PCKK, WFC), pp. 4360–4363.
- DATE-1999-ShinKK #bound #multi #testing
- At-Speed Boundary-Scan Interconnect Testing in a Board with Multiple System Clocks (JS, HK, SK), p. 473–?.
- SIGMOD-1999-EmbleyJN #bound #documentation #web
- Record-Boundary Discovery in Web Documents (DWE, YSJ, YKN), pp. 467–478.
- DAC-1998-DengiR #2d #bound #megamodelling
- Boundary Element Method Macromodels for 2-D Hierachical Capacitance Extraction (EAD, RAR), pp. 218–223.
- ITiCSE-1998-Wolfer #bound #re-engineering
- Graduate software engineering across international boundaries (poster): the first courses (JW), p. 311.
- ICPR-1998-Claridge #algorithm #bound #consistency #locality #visual notation
- A boundary localisation algorithm consistent with human visual perception (EC), pp. 300–304.
- ICPR-1998-FlorebySS #bound #fourier #image #order #using
- Boundary finding using Fourier surfaces of increasing order [simulated medical images] (LF, LS, KS), pp. 465–467.
- ICPR-1998-Heikkila #bound #detection
- Moment and curvature preserving technique for accurate ellipse boundary detection (JH), pp. 734–737.
- ICPR-1998-LeeHSL #analysis #automation #bound #detection #parsing #using #video
- Automatic video parsing using shot boundary detection and camera operation analysis (MSL, BWH, SS, SWL), pp. 1481–1483.
- ICPR-1998-SuriHS #automation #bound #classification #polynomial
- Automatic quadratic calibration for correction of pixel classification boundaries to an accuracy of 2.5 millimeters: an application in cardiac imaging (JSS, RMH, FHS), pp. 30–33.
- EDTC-1997-ChakrabortyM #bound #functional #parallel #programmable #testing
- A programmable boundary scan technique for board-level, parallel functional duplex march testing of word-oriented multiport static RAMs (KC, PM), pp. 330–334.
- EDTC-1997-Kristof #architecture #bound #effectiveness #idea #self #testing
- Extension of the boundary-scan architecture and new idea of BIST for more effective testing and self-testing of interconnections (AK), p. 630.
- ICDAR-1997-Nishida #bound #documentation #feature model #image
- Boundary Feature Extraction from Gray-Scale Document Images (HN), pp. 132–141.
- ICDAR-1997-Szmurlo #bound #normalisation #recognition
- Boundary Normalization for Recognition of Non-Touching Non-Degraded Characters (MS), pp. 463–466.
- ICPR-1996-GunnN #bound #energy #using
- Snake head boundary extraction using global and local energy minimisation (SRG, MSN), pp. 581–585.
- ICPR-1996-SuriHS #automation #bound #fault
- Correction of systematic errors in automatically produced boundaries from low-contrast ventriculograms (JSS, RMH, FHS), pp. 361–365.
- KR-1996-Hendler #bound #implementation #research
- Implementations and Research: Discussions at the Boundary (JAH), pp. 659–660.
- KR-1996-MacGregor #bound #implementation #research
- Implementations and Research: Discussions at the Boundary (RMM), pp. 657–658.
- KR-1996-Schubert #bound #implementation #research
- Implementations and Research: Discussions at the Boundary (LKS), pp. 661–662.
- KR-1996-Shapiro #bound #implementation #research
- Implementations and Research: Discussions at the Boundary (SCS), pp. 663–664.
- PLDI-1995-BarrettZ #bound #garbage collection #using
- Garbage Collection Using a Dynamic Threatening Boundary (DAB, BGZ), pp. 301–314.
- EDAC-1994-KarkkainenTW #bound #monitoring #power management #testing
- Boundary Scan Testing Combined with Power Supply Current Monitoring (MK, KT, MW), pp. 232–235.
- EDAC-1994-Su #bound #random testing #testing
- Random Testing of Interconnects in A Boundary Scan Environment (CS), pp. 226–231.
- DAC-1992-LingKW #3d #approach #bound #simulation
- A Boundary-Element Approach to Transient simulation of Three-Dimensional Integrated Circuit Interconnect (DDL, SK, JW), pp. 93–98.
- ML-1991-YooF #bound #effectiveness #identification
- Identifying Cost Effective Boundaries of Operationality (JPY, DHF), pp. 569–573.
- RTA-1991-Brandenburg #bound #confluence #equivalence #graph grammar
- The Equivalence of Boundary and Confluent Graph Grammars on Graph Languages of Bounded Degree (FJB), pp. 312–322.
- PLDI-1990-SanthanamO #bound
- Register Allocation Across Procedure and Module Boundaries (VS, DO), pp. 28–39.
- ML-1988-BravermanR #bound
- Boundaries of Operationality (MSB, SJR), pp. 221–234.
- GG-1986-Welzl #bound #graph grammar
- Boundary NlC and partition controlled graph grammars (EW), pp. 593–609.
- OOPSLA-1986-MittalBK #bound
- Virtual Copies — At the Boundary Between Classes and Instances (SM, DGB, KMK), pp. 159–166.
- ICALP-1982-GoralcikovaGK #bound #morphism #pseudo
- A Boundary of Isomorphism Completeness in the Lattice of Semigroup Pseudovarieties (AG, PG, VK), pp. 292–299.