2990 papers:
- ECSA-2015-HansenM #automation #community #composition #detection #using
- (Automated) Software Modularization Using Community Detection (KMH, KM), pp. 95–102.
- WICSA-2015-BangM #design #detection #higher-order
- Proactive Detection of Higher-Order Software Design Conflicts (JYB, NM), pp. 155–164.
- WICSA-2015-MoCKX #architecture #automation #detection #smell
- Hotspot Patterns: The Formal Definition and Automatic Detection of Architecture Smells (RM, YC, RK, LX), pp. 51–60.
- CASE-2015-AntonelloGM #detection #fault
- Autonomous robotic system for thermographic detection of defects in upper layers of carbon fiber reinforced polymers (MA, SG, EM), pp. 634–639.
- CASE-2015-BrisimiAZCP #detection
- Sensing and classifying roadway obstacles: The street bump anomaly detection and decision support system (TSB, SA, YZ, CGC, ICP), pp. 1288–1293.
- CASE-2015-ButtersGS #detection #network
- Detecting and reducing redundancy in alarm networks (TDB, SG, JLS), pp. 1224–1229.
- CASE-2015-DamesK #automation #detection #locality #multi #smarttech
- Automated detection, localization, and registration of smart devices with multiple robots (PD, VK), pp. 564–571.
- CASE-2015-KreutzerRREL #automation #detection #metric #using
- Automatically detecting fluid intake using conductivity measurements of beverages in a cup (JFK, SR, SMFR, KE, TCL), pp. 1546–1551.
- CASE-2015-SathishRB #approach #detection #industrial #simulation
- A simulation based approach to detect wear in industrial robots (VS, SR, SB), pp. 1570–1575.
- CASE-2015-SundarkumarRNG #api #detection #machine learning #modelling #topic
- Malware detection via API calls, topic models and machine learning (GGS, VR, IN, VG), pp. 1212–1217.
- CASE-2015-WuDZW #detection
- Kalman filter based DNS cache poisoning attack detection (HW, XD, LZ, LW), pp. 1594–1600.
- CASE-2015-ZhangHZ #detection #fault #metric
- Fault detection for wireless networked systems with compressed measurements (JZ, XH, DHZ), pp. 356–361.
- CASE-2015-ZonEHJVSB #detection #multi #realtime #using
- Real-time collision detection for multiple packaging robots using monotonicity of configuration subspaces (RvZ, DE, DH, IJ, RV, RIS, KB), pp. 1638–1643.
- DAC-2015-CampbellLMC #debugging #detection #fault #hybrid #synthesis #using #validation
- Hybrid quick error detection (H-QED): accelerator validation and debug using high-level synthesis principles (KAC, DL, SM, DC), p. 6.
- DAC-2015-CampbellVPC #detection #fault #low cost #synthesis
- High-level synthesis of error detecting cores through low-cost modulo-3 shadow datapaths (KAC, PV, DZP, DC), p. 6.
- DAC-2015-LiuHWSJHL #assessment #detection #smarttech
- Impact assessment of net metering on smart home cyberattack detection (YL, SH, JW, YS, YJ, YH, XL), p. 6.
- DAC-2015-RajendranVK #detection
- Detecting malicious modifications of data in third-party intellectual property cores (JR, VV, RK), p. 6.
- DAC-2015-YoonSMC #behaviour #detection #embedded #heatmap #memory management #realtime #using
- Memory heat map: anomaly detection in real-time embedded systems using memory behavior (MKY, LS, SM, JC), p. 6.
- DAC-2015-ZhouAZYUGUJ #detection #embedded #hardware #using
- Detecting hardware trojans using backside optical imaging of embedded watermarks (BZ, RA, MZ, TY, AU, BBG, MSÜ, AJ), p. 6.
- DATE-2015-CakirM #clustering #correlation #detection #hardware #using
- Hardware Trojan detection for gate-level ICs using signal correlation based clustering (BÇ, SM), pp. 471–476.
- DATE-2015-CornaFNS #android #detection
- Occupancy detection via iBeacon on Android devices for smart building management (AC, LF, AAN, DS), pp. 629–632.
- DATE-2015-CourbonLFT #detection #hardware #performance
- A high efficiency hardware trojan detection technique based on fast SEM imaging (FC, PLM, JJAF, AT), pp. 788–793.
- DATE-2015-FrancqF #detection #hardware
- Introduction to hardware trojan detection methods (JF, FF), pp. 770–775.
- DATE-2015-HollerKRRK #compilation #detection #evaluation
- Evaluation of diverse compiling for software-fault detection (AH, NK, TR, KR, CK), pp. 531–536.
- DATE-2015-KanounS #big data #concept #data type #detection #learning #online #scheduling #streaming
- Big-data streaming applications scheduling with online learning and concept drift detection (KK, MvdS), pp. 1547–1550.
- DATE-2015-KumarAL #detection #fault #monitoring
- Operational fault detection and monitoring of a memristor-based LUT (TNK, HAFA, FL), pp. 429–434.
- DATE-2015-LiaperdosAT #detection #estimation #fault #probability #testing
- A method for the estimation of defect detection probability of analog/RF defect-oriented tests (JL, AA, YT), pp. 1395–1400.
- DATE-2015-LinSKRM #debugging #detection #effectiveness #fault #performance #testing #validation
- Quick error detection tests with fast runtimes for effective post-silicon validation and debug (DL, ES, SK, ER, SM), pp. 1168–1173.
- DATE-2015-NgoEBDGNRR #detection #hardware #metric
- Hardware trojan detection by delay and electromagnetic measurements (XTN, IE, SB, JLD, SG, ZN, JBR, BR), pp. 782–787.
- DATE-2015-RenTB #detection #learning #statistics
- Detection of illegitimate access to JTAG via statistical learning in chip (XR, VGT, RD(B), pp. 109–114.
- DATE-2015-ZwergerG #detection #symmetry
- Detection of asymmetric aging-critical voltage conditions in analog power-down mode (MZ, HEG), pp. 1269–1272.
- DocEng-2015-BarabucciBIMM #detection #documentation #modelling #visualisation
- Document Changes: Modeling, Detection, Storage and Visualization (DChanges 2015) (GB, UMB, ADI, SM, EVM), pp. 227–228.
- DocEng-2015-WuS #detection #evolution
- Detecting XSLT Rules Affected by Schema Evolution (YW, NS), pp. 143–146.
- DRR-2015-DeMDC #detection #documentation #image
- Detection of electrical circuit elements from documents images (PD, SM, AKD, BC).
- HT-2015-KumarDCC #detection #social #social media
- Detecting Changes in Suicide Content Manifested in Social Media Following Celebrity Suicides (MK, MD, GC, MDC), pp. 85–94.
- HT-2015-SchulzSS #detection
- Small-Scale Incident Detection based on Microposts (AS, BS, TS), pp. 3–12.
- SIGMOD-2015-YanZHSMZM #detection #distributed #using
- Distributed Outlier Detection using Compressive Sensing (YY, JZ, BH, XS, JM, ZZ, TM), pp. 3–16.
- VLDB-2015-ChuWLHP #clustering #detection #named #scalability
- ALID: Scalable Dominant Cluster Detection (LC, SW, SL, QH, JP), pp. 826–837.
- VLDB-2015-PotharajuCHNWZJ #automation #detection #knowledge base #named
- ConfSeer: Leveraging Customer Support Knowledge Bases for Automated Misconfiguration Detection (RP, JC, LH, CNR, MW, LZ, NJ), pp. 1828–1839.
- VLDB-2015-WangWYZ #benchmark #community #detection #framework #metric #network #social
- Community Detection in Social Networks: An In-depth Benchmarking Study with a Procedure-Oriented Framework (MW, CW, JXY, JZ), pp. 998–1009.
- VLDB-2015-WuJLZ #community #detection #robust
- Robust Local Community Detection: On Free Rider Effect and Its Elimination (YW, RJ, JL, XZ), pp. 798–809.
- ESOP-2015-CalzavaraBCS #detection #fine-grained
- Fine-Grained Detection of Privilege Escalation Attacks on Browser Extensions (SC, MB, SC, ES), pp. 510–534.
- ESOP-2015-ChengR #detection #spreadsheet #static analysis
- Static Analysis of Spreadsheet Applications for Type-Unsafe Operations Detection (TC, XR), pp. 26–52.
- FASE-2015-FedyukovichDHS #bound #dependence #detection #model checking
- Symbolic Detection of Assertion Dependencies for Bounded Model Checking (GF, ACD, AEJH, NS), pp. 186–201.
- SCAM-J-2013-CeruloPBCC15 #detection #markov #named
- Irish: A Hidden Markov Model to detect coded information islands in free text (LC, MDP, AB, MC, GC), pp. 26–43.
- ICPC-2015-BenomarASPS #detection #development #evolution #process
- Detection of software evolution phases based on development activities (OB, HA, HAS, PP, MAS), pp. 15–24.
- ICPC-2015-SohTAW #android #detection #user interface
- Detecting clones in Android applications through analyzing user interfaces (CS, HBKT, YLA, LW), pp. 163–173.
- ICSME-2015-Aniche #detection #development #smell #web
- Detection strategies of smells in web software development (MFA), pp. 598–601.
- ICSME-2015-LuciaDGR #automation #behaviour #design pattern #detection #dynamic analysis #towards
- Towards automating dynamic analysis for behavioral design pattern detection (ADL, VD, CG, MR), pp. 161–170.
- ICSME-2015-LuciaDGRP #behaviour #design pattern #detection #named
- ePadEvo: A tool for the detection of behavioral design patterns (ADL, VD, CG, MR, CP), pp. 327–329.
- ICSME-2015-PoluriR #concurrent #detection
- Deterministic dynamic race detection across program versions (SVP, MKR), pp. 181–190.
- ICSME-2015-SvajlenkoR #clone detection #detection #tool support
- Evaluating clone detection tools with BigCloneBench (JS, CKR), pp. 131–140.
- ICSME-2015-VasquezVLP #android #detection #developer #how #performance
- How developers detect and fix performance bottlenecks in Android apps (MLV, CV, QL, DP), pp. 352–361.
- MSR-2015-SinhaSDPM #detection #repository #source code
- Detecting and Mitigating Secret-Key Leaks in Source Code Repositories (VSS, DS, PD, RP, SM), pp. 396–400.
- MSR-2015-WuMKGI #consistency #detection #nondeterminism #open source #scalability
- A Method to Detect License Inconsistencies in Large-Scale Open Source Projects (YW, YM, TK, DMG, KI), pp. 324–333.
- SANER-2015-AggarwalRTHGS #debugging #detection #re-engineering
- Detecting duplicate bug reports with software engineering domain knowledge (KA, TR, FT, AH, RG, ES), pp. 211–220.
- SANER-2015-HeroldEBCC #detection #modelling
- Detection of violation causes in reflexion models (SH, ME, JB, SC, MÓC), pp. 565–569.
- SANER-2015-Keivanloo0Z #clone detection #detection #java #repository #scalability
- Threshold-free code clone detection for a large-scale heterogeneous Java repository (IK, FZ, YZ), pp. 201–210.
- SANER-2015-SassoML #detection #problem
- Misery loves company: CrowdStacking traces to aid problem detection (TDS, AM, ML), pp. 131–140.
- SANER-2015-YangMT #design pattern #detection #quality
- Measuring the quality of design pattern detection results (SY, AM, VT), pp. 53–62.
- SCAM-2015-FenskeSMS #detection #smell #variability
- When code smells twice as much: Metric-based detection of variability-aware code smells (WF, SS, DM, GS), pp. 171–180.
- SCAM-2015-NicolayNRM #detection #javascript
- Detecting function purity in JavaScript (JN, CN, CDR, WDM), pp. 101–110.
- PLDI-2015-OlivoDL #debugging #detection #performance #static analysis #traversal
- Static detection of asymptotic performance bugs in collection traversals (OO, ID, CL), pp. 369–378.
- FM-2015-BagheriKMJ #android #bound #design #detection #protocol #verification
- Detection of Design Flaws in the Android Permission Protocol Through Bounded Verification (HB, EK, SM, DJ), pp. 73–89.
- GaM-2015-KulcsarDLVS #detection #graph transformation
- Improved Conflict Detection for Graph Transformation with Attributes (GK, FD, ML, GV, AS), pp. 97–112.
- GaM-2015-RadwanH #detection #refactoring #smell
- Detecting and Refactoring Operational Smells within the Domain Name System (MR, RH), pp. 113–128.
- GaM-2015-Wijs #confluence #detection #lts
- Confluence Detection for Transformations of Labelled Transition Systems (AW), pp. 1–15.
- CHI-2015-GoelZVP #detection #flexibility #gesture #named #using
- Tongue-in-Cheek: Using Wireless Signals to Enable Non-Intrusive and Flexible Facial Gestures Detection (MG, CZ, RV, SNP), pp. 255–258.
- CHI-2015-HuberLP #detection
- Detecting User Intention at Public Displays from Foot Positions (BH, JHL, JHP), pp. 3899–3902.
- CHI-2015-KimCD #detection #interactive #monitoring
- Sensors Know When to Interrupt You in the Car: Detecting Driver Interruptibility Through Monitoring of Peripheral Interactions (SK, JC, AKD), pp. 487–496.
- CHI-2015-LiYS #detection #interactive #named
- IDSense: A Human Object Interaction Detection System Based on Passive UHF RFID (HL, CY, APS), pp. 2555–2564.
- CHI-2015-ManciniHAG #detection #interface #multi
- Re-Centering Multispecies Practices: A Canine Interface for Cancer Detection Dogs (CM, RH, BA, CG), pp. 2673–2682.
- CHI-2015-OhCKL #detection #documentation #named
- ScanShot: Detecting Document Capture Moments and Correcting Device Orientation (JO, WC, JK, UL), pp. 953–956.
- CSCW-2015-AzariaRK #detection
- An Agent for Deception Detection in Discussion Based Environments (AA, AR, SK), pp. 218–227.
- CSCW-2015-FreitasD15a #detection #multi #using
- Using Multiple Contexts to Detect and Form Opportunistic Groups (AAdF, AKD), pp. 1612–1621.
- HCI-IT-2015-BrahnamRNSB #design #detection
- Design of a Bullying Detection/Alert System for School-Wide Intervention (SB, JJR, LN, CLS, SLB), pp. 695–705.
- HCI-IT-2015-FukumotoTE #detection #using
- Improvement of Accuracy in Remote Gaze Detection for User Wearing Eyeglasses Using Relative Position Between Centers of Pupil and Corneal Sphere (KF, TT, YE), pp. 13–23.
- HCI-UC-2015-SanchezA #automation #detection #interface #internet
- Automatic Deformations Detection in Internet Interfaces: ADDII (LS, PTAJ), pp. 43–53.
- LCT-2015-Ai #automation #detection #fault #feedback #generative
- Automatic Pronunciation Error Detection and Feedback Generation for CALL Applications (RA), pp. 175–186.
- LCT-2015-CastilloDSTC #detection #student
- Model for Detecting Student Difficulties in Solving Formative Assessments (CC, NDD, AS, VT, DAOC), pp. 199–207.
- SCSM-2015-Kanawati #community #detection #network
- Ensemble Selection for Community Detection in Complex Networks (RK), pp. 138–147.
- CAiSE-2015-KhelladiHBRG #detection #evolution #metamodelling
- Detecting Complex Changes During Metamodel Evolution (DEK, RH, RB, JR, MPG), pp. 263–278.
- CAiSE-2015-WeilerGS #detection #performance #runtime #twitter
- Run-Time and Task-Based Performance of Event Detection Techniques for Twitter (AW, MG, MHS), pp. 35–49.
- ICEIS-v1-2015-BedoBOCCRTT #detection #effectiveness #image #performance #social #social media
- Techniques for Effective and Efficient Fire Detection from Social Media Images (MVNB, GB, WDO, MTC, AFC, JFRJ, AJMT, CTJ), pp. 34–45.
- ICEIS-v1-2015-Xylogiannopoulos #detection #roadmap
- Discretization Method for the Detection of Local Extrema and Trends in Non-discrete Time Series (KFX, PK, RA), pp. 346–352.
- ICEIS-v2-2015-AlahmadiLN #detection #internet #process #profiling #using
- Using Internet Activity Profiling for Insider-threat Detection (BAA, PAL, JRCN), pp. 709–720.
- ICEIS-v2-2015-CostaMAO #automation #consistency #detection #named #nondeterminism
- Fixture — A Tool for Automatic Inconsistencies Detection in Context-aware SPL (PAdSC, FGM, RMdCA, TO), pp. 114–125.
- ECIR-2015-BuitinckATR #detection #multi
- Multi-emotion Detection in User-Generated Reviews (LB, JvA, ET, MdR), pp. 43–48.
- ECIR-2015-CaoC #analysis #behaviour #detection #social #social media
- Detecting Spam URLs in Social Media via Behavioral Analysis (CC, JC), pp. 703–714.
- ECIR-2015-Dori-HacohenA #automation #detection #web
- Automated Controversy Detection on the Web (SDH, JA), pp. 423–434.
- ECIR-2015-HagenPBS #classification #detection #sentiment #twitter #using
- Twitter Sentiment Detection via Ensemble Classification Using Averaged Confidence Scores (MH, MP, MB, BS), pp. 741–754.
- ECIR-2015-LiangCC #approach #detection #social #social media
- A Noise-Filtering Approach for Spatio-temporal Event Detection in Social Media (YL, JC, CC), pp. 233–244.
- ECIR-2015-LimCLK #community #constraints #detection #using
- Detecting Location-Centric Communities Using Social-Spatial Links with Temporal Constraints (KHL, JC, CL, SK), pp. 489–494.
- ECIR-2015-YangLW #detection
- Detecting the Eureka Effect in Complex Search (HY, JL, CW), pp. 734–740.
- ICML-2015-AvronH #community #detection #personalisation #rank #using
- Community Detection Using Time-Dependent Personalized PageRank (HA, LH), pp. 1795–1803.
- ICML-2015-ChangYXY #detection #semantics #using
- Complex Event Detection using Semantic Saliency and Nearly-Isotonic SVM (XC, YY, EPX, YY), pp. 1348–1357.
- ICML-2015-GornitzBK #detection #markov
- Hidden Markov Anomaly Detection (NG, MLB, MK), pp. 1833–1842.
- ICML-2015-HockingRB #detection #learning #named #segmentation
- PeakSeg: constrained optimal segmentation and supervised penalty learning for peak detection in count data (TH, GR, GB), pp. 324–332.
- KDD-2015-BeutelAF #behaviour #detection #graph #modelling #predict
- Graph-Based User Behavior Modeling: From Prediction to Fraud Detection (AB, LA, CF), pp. 2309–2310.
- KDD-2015-FakhraeiFSG #detection #evolution #multi #network #social
- Collective Spammer Detection in Evolving Multi-Relational Social Networks (SF, JRF, MVSS, LG), pp. 1769–1778.
- KDD-2015-HayashiMTK #detection #realtime #topic #twitter
- Real-Time Top-R Topic Detection on Twitter with Topic Hijack Filtering (KH, TM, MT, KiK), pp. 417–426.
- KDD-2015-LaptevAF #automation #detection #framework #scalability
- Generic and Scalable Framework for Automated Time-series Anomaly Detection (NL, SA, IF), pp. 1939–1947.
- KDD-2015-LiuC #challenge #detection #social #social media
- Social Media Anomaly Detection: Challenges and Solutions (YL, SC), pp. 2317–2318.
- KDD-2015-MitzenmacherPPT #clique #detection #network #scalability
- Scalable Large Near-Clique Detection in Large-Scale Networks via Sampling (MM, JP, RP, CET, SCX), pp. 815–824.
- KDD-2015-NairRKBSKHD #detection #learning #monitoring
- Learning a Hierarchical Monitoring System for Detecting and Diagnosing Service Issues (VN, AR, SK, VB, SS, SSK, SH, SD), pp. 2029–2038.
- KDD-2015-QahtanAWZ #data type #detection #framework #multi
- A PCA-Based Change Detection Framework for Multidimensional Data Streams: Change Detection in Multidimensional Data Streams (AAQ, BA, SW, XZ), pp. 935–944.
- KDD-2015-RayanaA #bibliography #detection #metadata #network
- Collective Opinion Spam Detection: Bridging Review Networks and Metadata (SR, LA), pp. 985–994.
- KDD-2015-ShaoHYZ #community #detection #distance
- Community Detection based on Distance Dynamics (JS, ZH, QY, TZ), pp. 1075–1084.
- KDD-2015-TsengYHKC #detection #framework #named
- FrauDetector: A Graph-Mining-based Framework for Fraudulent Phone Call Detection (VST, JCY, CWH, YK, KTC), pp. 2157–2166.
- SEKE-2015-HughesDH #detection #streaming
- Detecting Reporting Anomalies in Streaming Sensing Systems (SH, YD, JOH), pp. 427–432.
- SEKE-2015-LinYX #automation #detection #generative #parametricity #testing
- Automatic Detection of Parameter Shielding for Test Case Generation (JL, JY, JX), pp. 571–574.
- SEKE-2015-SaharAA #approach #case study #detection #image #modelling #prototype
- A Case Study Approach: Iterative Prototyping Model Based Detection of Macular Edema in Retinal OCT Images (SS, SA, MUA), pp. 266–271.
- SEKE-2015-SalehianF #detection #embedded #monitoring #realtime
- Embedded Real Time Blink Detection System for Driver Fatigue Monitoring (SS, BF), pp. 188–194.
- SEKE-2015-SunSWZ #analysis #data flow #detection #fault #integer #using
- Improving the Accuracy of Integer Signedness Error Detection Using Data Flow Analysis (HS, CS, YW, QZ), pp. 601–606.
- SEKE-2015-WanderleyP #detection #folksonomy #learning
- Learning Folksonomies for Trend Detection in Task-Oriented Dialogues (GW, ECP), pp. 483–488.
- SEKE-2015-WangSZ #detection #execution #symbolic computation
- Statically-Guided Fork-based Symbolic Execution for Vulnerability Detection (YW, HS, QZ), pp. 536–539.
- SIGIR-2015-ChenC #detection #web
- Opinion Spammer Detection in Web Forum (YRC, HHC), pp. 759–762.
- SIGIR-2015-DijkTR #community #detection #topic
- Early Detection of Topical Expertise in Community Question Answering (DvD, MT, MdR), pp. 995–998.
- SIGIR-2015-Dori-Hacohen #analysis #detection
- Controversy Detection and Stance Analysis (SDH), p. 1057.
- SIGIR-2015-HeindorfPSE #analysis #corpus #detection #knowledge base #towards
- Towards Vandalism Detection in Knowledge Bases: Corpus Construction and Analysis (SH, MP, BS, GE), pp. 831–834.
- MoDELS-2015-StephanC #clone detection #detection #identification #using
- Identification of Simulink model antipattern instances using model clone detection (MS, JRC), pp. 276–285.
- ECOOP-2015-FangDX #detection #named #performance #problem
- PerfBlower: Quickly Detecting Memory-Related Performance Problems via Amplification (LF, LD, G(X), pp. 296–320.
- OOPSLA-2015-AchourR #approximate #detection
- Approximate computation with outlier detection in Topaz (SA, MCR), pp. 711–730.
- OOPSLA-2015-BielikRV #android #concurrent #detection #scalability
- Scalable race detection for Android applications (PB, VR, MTV), pp. 332–348.
- OOPSLA-2015-HagueLO #approach #css #detection #html
- Detecting redundant CSS rules in HTML5 applications: a tree rewriting approach (MH, AWL, CHLO), pp. 1–19.
- PPDP-2015-StievenartNMR #abstract interpretation #concurrent #debugging #detection #higher-order #source code
- Detecting concurrency bugs in higher-order programs through abstract interpretation (QS, JN, WDM, CDR), pp. 232–243.
- REFSQ-2015-DaunWP #detection #embedded #requirements
- Detecting and Correcting Outdated Requirements in Function-Centered Engineering of Embedded Systems (MD, TW, KP), pp. 65–80.
- SAC-2015-AlvesMM #case study #detection #fault #impact analysis #refactoring #test coverage
- Test coverage and impact analysis for detecting refactoring faults: a study on the extract method refactoring (ELGA, TM, PDdLM), pp. 1534–1540.
- SAC-2015-AttiaTHKTC #detection
- On-device anomaly detection for resource-limited systems (MBA, CT, AHL, BK, VT, MC), pp. 548–554.
- SAC-2015-AwadBESAS #anti #approach #detection #process #runtime
- Runtime detection of business process compliance violations: an approach based on anti patterns (AA, AB, AE, RES, AA, SS), pp. 1203–1210.
- SAC-2015-BezuBRVVF #component #detection #multi #similarity #web
- Multi-component similarity method for web product duplicate detection (RvB, SB, RR, JV, DV, FF), pp. 761–768.
- SAC-2015-ColantonioPPS #bibliography #detection #visual notation
- Visual detection of singularities in review platforms (AC, RDP, MP, AS), pp. 1294–1295.
- SAC-2015-DabainMT #design pattern #detection #using
- Design pattern detection using FINDER (HD, AM, VT), pp. 1586–1593.
- SAC-2015-FernandesPCRP #detection #metaheuristic #network #statistics
- Statistical, forecasting and metaheuristic techniques for network anomaly detection (GF, EHMP, LFC, JJPCR, MLPJ), pp. 701–707.
- SAC-2015-GotoT #communication #detection #network #visual notation
- Anomalous network communication detection system by visual pattern on a client computer (HG, TT), pp. 1263–1269.
- SAC-2015-HozanoFSFC #detection #developer #feedback #smell #using
- Using developers’ feedback to improve code smell detection (MH, HF, ICLS, BF, EC), pp. 1661–1663.
- SAC-2015-KrutzMS #analysis #detection #effectiveness #using
- Examining the effectiveness of using concolic analysis to detect code clones (DEK, SAM, ES), pp. 1610–1615.
- SAC-2015-MongioviGFPT #analysis #approach #data flow #detection #hybrid #java
- Combining static and dynamic data flow analysis: a hybrid approach for detecting data leaks in java applications (MM, GG, AF, GP, ET), pp. 1573–1579.
- SAC-2015-OliveiraQMM #community #complexity #detection #using
- Community detection, with lower time complexity, using coupled Kuramoto oscillators (JEMdO, MGQ, MDNM, EENM), pp. 1160–1166.
- SAC-2015-RegoMP #approach #detection #folksonomy #learning
- A supervised learning approach to detect subsumption relations between tags in folksonomies (ASdCR, LBM, CESP), pp. 409–415.
- SAC-2015-Rekha #big data #detection #performance #using
- A fast support vector data description system for anomaly detection using big data (AGR), pp. 931–932.
- SAC-2015-SantiagoPH #approach #detection #modelling
- A modeling approach for credit card fraud detection in electronic payment services (GPS, AMP, RHJ), pp. 2328–2331.
- SAC-2015-SantosM #detection
- Exploring decision drivers on god class detection in three controlled experiments (JAMS, MGM), pp. 1472–1479.
- ESEC-FSE-2015-BellKMD #dependence #detection #java #performance
- Efficient dependency detection for safe Java test acceleration (JB, GEK, EM, MD), pp. 770–781.
- ESEC-FSE-2015-CaiC #detection #effectiveness #java #precise #source code
- Effective and precise dynamic detection of hidden races for Java programs (YC, LC), pp. 450–461.
- ESEC-FSE-2015-MutluTL #detection #javascript #matter
- Detecting JavaScript races that matter (EM, ST, BL), pp. 381–392.
- ESEC-FSE-2015-NguyenNDKN #detection #execution #semantics #variability
- Detecting semantic merge conflicts with variability-aware execution (HVN, MHN, SCD, CK, TNN), pp. 926–929.
- ESEC-FSE-2015-RajagopalanH #concurrent #detection #named
- RDIT: race detection from incomplete traces (AKR, JH), pp. 914–917.
- ESEC-FSE-2015-SafiSHM #detection
- Detecting event anomalies in event-based systems (GS, AS, WGJH, NM), pp. 25–37.
- ESEC-FSE-2015-SamakR #detection #testing
- Synthesizing tests for detecting atomicity violations (MS, MKR), pp. 131–142.
- ICSE-v1-2015-LiBBKTARBOM #android #component #detection #named #privacy
- IccTA: Detecting Inter-Component Privacy Leaks in Android Apps (LL, AB, TFB, JK, YLT, SA, SR, EB, DO, PM), pp. 280–291.
- ICSE-v1-2015-NistorCRL #detection #named #performance #problem
- CARAMEL: Detecting and Fixing Performance Problems That Have Non-Intrusive Fixes (AN, PCC, CR, SL), pp. 902–912.
- ICSE-v1-2015-OcarizaP0 #consistency #detection #javascript #mvc #nondeterminism
- Detecting Inconsistencies in JavaScript MVC Applications (FSOJ, KP, AM), pp. 325–335.
- ICSE-v1-2015-PapadakisJHT #compilation #detection #effectiveness #empirical #equivalence #performance #scalability
- Trivial Compiler Equivalence: A Large Scale Empirical Study of a Simple, Fast and Effective Equivalent Mutant Detection Technique (MP, YJ, MH, YLT), pp. 936–946.
- ICSE-v1-2015-PastoreM #detection #named
- ZoomIn: Discovering Failures by Detecting Wrong Assertions (FP, LM), pp. 66–76.
- ICSE-v1-2015-ZouWXZSM #algorithm #detection #float #search-based
- A Genetic Algorithm for Detecting Significant Floating-Point Inaccuracies (DZ, RW, YX, LZ, ZS, HM), pp. 529–539.
- ICSE-v2-2015-FooJAHZF #automation #case study #detection #industrial #performance
- An Industrial Case Study on the Automated Detection of Performance Regressions in Heterogeneous Environments (KCF, ZMJ, BA, AEH, YZ, PF), pp. 159–168.
- ICSE-v2-2015-Hecht #android #approach #detection
- An Approach to Detect Android Antipatterns (GH), pp. 766–768.
- ICSE-v2-2015-HerzigN #detection #empirical #using
- Empirically Detecting False Test Alarms Using Association Rules (KH, NN), pp. 39–48.
- ICSE-v2-2015-HollandDKMR #android #detection #novel #security
- Security Toolbox for Detecting Novel and Sophisticated Android Malware (BH, TD, SK, JM, NR), pp. 733–736.
- ICSE-v2-2015-Palomba #analysis #detection #smell
- Textual Analysis for Code Smell Detection (FP), pp. 769–771.
- SPLC-2015-SoutoGdMKB #debugging #detection #feature model #modelling #performance #product line
- Faster bug detection for software product lines with incomplete feature models (SS, DG, Md, DM, SK, DSB), pp. 151–160.
- HPCA-2015-OzsoyDGAP #detection #framework #online #performance
- Malware-aware processors: A framework for efficient online malware detection (MO, CD, IG, NBAG, DVP), pp. 651–661.
- HPDC-2015-BerrocalBDLC #data analysis #detection #lightweight #runtime
- Lightweight Silent Data Corruption Detection Based on Runtime Data Analysis for HPC Applications (EB, LABG, SD, ZL, FC), pp. 275–278.
- PPoPP-2015-DasSR #communication #concurrent #detection #program analysis #thread
- Section based program analysis to reduce overhead of detecting unsynchronized thread communication (MD, GS, JR), pp. 283–284.
- PPoPP-2015-McPhersonNSC #detection #legacy #source code
- Fence placement for legacy data-race-free programs via synchronization read detection (AJM, VN, SS, MC), pp. 249–250.
- ICST-2015-ArcainiGV #detection #fault #feature model #generative #modelling #testing
- Generating Tests for Detecting Faults in Feature Models (PA, AG, PV), pp. 1–10.
- ICST-2015-BardinDDKPTM #detection #requirements
- Sound and Quasi-Complete Detection of Infeasible Test Requirements (SB, MD, RD, NK, MP, YLT, JYM), pp. 1–10.
- ICST-2015-MahajanH #detection #html #locality #using
- Detection and Localization of HTML Presentation Failures Using Computer Vision-Based Techniques (SM, WGJH), pp. 1–10.
- ICST-2015-WanJLH #android #detection #energy
- Detecting Display Energy Hotspots in Android Apps (MW, YJ, DL, WGJH), pp. 1–10.
- ICST-2015-XuLCK #approach #bound #detection #lightweight #thread
- A Lightweight, Static Approach to Detecting Unbounded Thread-Instantiation Loops (JX, YL, RHC, DCK), pp. 1–10.
- ISSTA-2015-GyoriSHM #dependence #detection #reliability #testing
- Reliable testing: detecting state-polluting tests to prevent test dependency (AG, AS, FH, DM), pp. 223–233.
- ISSTA-2015-HayTP #android #communication #detection
- Dynamic detection of inter-application communication vulnerabilities in Android (RH, OT, MP), pp. 118–128.
- ISSTA-2015-ShenLPG #automation #detection #performance #profiling #search-based #using
- Automating performance bottleneck detection using search-based application profiling (DS, QL, DP, MG), pp. 270–281.
- ISSTA-2015-WangGMC #android #approach #clone detection #detection #named #scalability
- WuKong: a scalable and accurate two-phase approach to Android app clone detection (HW, YG, ZM, XC), pp. 71–82.
- ISSTA-2015-XueWLXSC #behaviour #classification #detection #javascript #modelling
- Detection and classification of malicious JavaScript via attack behavior modelling (YX, JW, YL, HX, JS, MC), pp. 48–59.
- ISSTA-2015-ZhangE #detection #fault
- Proactive detection of inadequate diagnostic messages for software configuration errors (SZ, MDE), pp. 12–23.
- SAT-2015-AnsoteguiGLS #community #detection #using
- Using Community Structure to Detect Relevant Learnt Clauses (CA, JGC, JL, LS), pp. 238–254.
- CBSE-2014-DidierM #approach #component #detection
- A new approach to detect potential race conditions in component-based systems (JYD, MM), pp. 97–106.
- ECSA-2014-PalmaMTG #detection #specification #web #web service
- Specification and Detection of SOA Antipatterns in Web Services (FP, NM, GT, YGG), pp. 58–73.
- QoSA-2014-WertOHF #anti #automation #component #detection #performance
- Automatic detection of performance anti-patterns in inter-component communications (AW, MO, CH, RF), pp. 3–12.
- ASE-2014-LiuSLZWDW #automation #case study #detection #documentation #fault
- Automatic early defects detection in use case documents (SL, JS, YL, YZ, BW, JSD, XW), pp. 785–790.
- ASE-2014-ThungKL #debugging #detection #named #tool support
- DupFinder: integrated tool support for duplicate bug report detection (FT, PSK, DL), pp. 871–874.
- CASE-2014-CanaliCCSEC #assembly #automation #detection #industrial
- An automatic assembly parts detection and grasping system for industrial manufacturing (CC, FC, FC, GS, AE, DGC), pp. 215–220.
- CASE-2014-ChiuC #bound #detection #image
- A variance-reduction method for thyroid nodule boundary detection on ultrasound images (LYC, AC), pp. 681–685.
- CASE-2014-KuoSLW #3d #detection #estimation #image
- 3D object detection and pose estimation from depth image for robotic bin picking (HYK, HRS, SHL, CCW), pp. 1264–1269.
- CASE-2014-YuM #approach #data-driven #detection #statistics
- Data-driven bottleneck detection in manufacturing systems: A statistical approach (CY, AM), pp. 710–715.
- DAC-2014-CuiMSW #detection #hardware #runtime #synthesis
- High-Level Synthesis for Run-Time Hardware Trojan Detection and Recovery (XC, KM, LS, KW), p. 6.
- DAC-2014-HernandezA #detection #fault #named #safety
- LiVe: Timely Error Detection in Light-Lockstep Safety Critical Systems (CH, JA), p. 6.
- DAC-2014-LiuHM #detection #hardware #statistics
- Hardware Trojan Detection through Golden Chip-Free Statistical Side-Channel Fingerprinting (YL, KH, YM), p. 6.
- DAC-2014-RaiHST #detection #fault #framework #performance #realtime
- An Efficient Real Time Fault Detection and Tolerance Framework Validated on the Intel SCC Processor (DR, PH, NS, LT), p. 6.
- DAC-2014-VaidyanathanDP #detection #reliability #stack #using
- Detecting Reliability Attacks during Split Fabrication using Test-only BEOL Stack (KV, BPD, LP), p. 6.
- DAC-2014-XiaCK #algorithm #automation #detection #development
- An Automobile Detection Algorithm Development for Automated Emergency Braking System (LX, TDC, KAAK), p. 6.
- DATE-2014-AndradesRC #design #detection
- Signature indexing of design layouts for hotspot detection (CA, MAR, CCC), pp. 1–6.
- DATE-2014-BardizbanyanSWL #data flow #dependence #detection #energy
- Reducing set-associative L1 data cache energy by early load data dependence detection (ELD3) (AB, MS, DBW, PLE), pp. 1–4.
- DATE-2014-Fu0PJZ #data flow #detection #fault #parallel #thread
- A fault detection mechanism in a Data-flow scheduled Multithreaded processor (JF, QY, RP, CRJ, CZ), pp. 1–4.
- DATE-2014-JunsangsriLH #concurrent #detection #hybrid
- A hybrid non-volatile SRAM cell with concurrent SEU detection and correction (PJ, FL, JH), pp. 1–4.
- DATE-2014-KordesVDW #detection #fault #hybrid #network #robust
- Startup error detection and containment to improve the robustness of hybrid FlexRay networks (AK, BV, AKD, MGW), pp. 1–6.
- DATE-2014-Maurer #algorithm #detection #symmetry
- A universal symmetry detection algorithm (PMM), pp. 1–4.
- DATE-2014-MurilloWCLA #automation #concurrent #constraints #debugging #detection
- Automatic detection of concurrency bugs through event ordering constraints (LGM, SW, JC, RL, GA), pp. 1–6.
- DATE-2014-NathanS #detection #fault #low cost #named
- Nostradamus: Low-cost hardware-only error detection for processor cores (RN, DJS), pp. 1–6.
- DocEng-2014-BarabucciBIMM #detection #documentation #modelling #visualisation
- Document changes: modeling, detection, storage and visualization (DChanges 2014) (GB, UMB, ADI, SM, EVM), pp. 207–208.
- DocEng-2014-DohrnR #detection #documentation #fine-grained
- Fine-grained change detection in structured text documents (HD, DR), pp. 87–96.
- DocEng-2014-FerilliGRE #detection #order
- Abstract argumentation for reading order detection (SF, DG, DR, FE), pp. 45–48.
- HT-2014-HerzigMR #detection #social #social media #topic
- An author-reader influence model for detecting topic-based influencers in social media (JH, YM, HR), pp. 46–55.
- SIGMOD-2014-Dev #algorithm #community #detection #interactive #network #online #social
- A user interaction based community detection algorithm for online social networks (HD), pp. 1607–1608.
- SIGMOD-2014-Dev14a #community #detection #graph #precise #privacy #social
- Privacy preserving social graphs for high precision community detection (HD), pp. 1615–1616.
- SIGMOD-2014-ShaoCC #detection #parallel #performance
- Efficient cohesive subgraphs detection in parallel (YS, LC, BC), pp. 613–624.
- VLDB-2014-ChenNC #detection #performance #sql
- Fast Foreign-Key Detection in Microsoft SQL Server PowerPivot for Excel (ZC, VRN, SC), pp. 1417–1428.
- VLDB-2014-GuptaSGGZLL #detection #graph #online #realtime #recommendation #scalability #twitter
- Real-Time Twitter Recommendation: Online Motif Detection in Large Dynamic Graphs (PG, VS, AG, SG, VZ, QL, JL), pp. 1379–1380.
- VLDB-2014-LondheGZNS #community #detection
- Matching Titles with Cross Title Web-Search Enrichment and Community Detection (NL, VG, AZ, HQN, RKS), pp. 1167–1178.
- VLDB-2014-YuYWLC #big data #classification #design #detection #power management
- Big Data Small Footprint: The Design of A Low-Power Classifier for Detecting Transportation Modes (MCY, TY, SCW, CJL, EYC), pp. 1429–1440.
- TACAS-2014-BozzanoCGT #component #design #detection #fault #identification #logic #using
- Formal Design of Fault Detection and Identification Components Using Temporal Epistemic Logic (MB, AC, MG, ST), pp. 326–340.
- TACAS-2014-FinkbeinerT #detection #distributed #specification
- Detecting Unrealizable Specifications of Distributed Systems (BF, LT), pp. 78–92.
- CSMR-WCRE-2014-DingZT #branch #detection
- Detecting infeasible branches based on code patterns (SD, HZ, HBKT), pp. 74–83.
- CSMR-WCRE-2014-MondalRS14a #detection
- Improving the detection accuracy of evolutionary coupling by measuring change correspondence (MM, CKR, KAS), pp. 358–362.
- CSMR-WCRE-2014-UjhelyiHVCSVF #comparison #detection #query
- Anti-pattern detection with model queries: A comparison of approaches (ZU, ÁH, DV, NIC, GS, LV, RF), pp. 293–302.
- CSMR-WCRE-2014-VidacsBTSG #approach #detection #fault #locality #reduction #testing
- Test suite reduction for fault detection and localization: A combined approach (LV, ÁB, DT, IS, TG), pp. 204–213.
- ICPC-2014-TianZLFZY #detection #parallel #thread
- Plagiarism detection for multithreaded software based on thread-aware software birthmarks (ZT, QZ, TL, MF, XZ, ZY), pp. 304–313.
- ICSME-2014-AbreuCFMPS14a #detection #fault #locality #smell
- FaultySheet Detective: When Smells Meet Fault Localization (RA, JC, JPF, PM, AP, JS), pp. 625–628.
- ICSME-2014-BauerVJ #approach #detection #novel
- A Novel Approach to Detect Unintentional Re-implementations (VB, TV, EJ), pp. 491–495.
- ICSME-2014-Kumar #collaboration #detection #source code
- Detecting Collaborative Patterns in Programs (KK), p. 664.
- ICSME-2014-Palma #detection #specification
- Specification and Detection of SOA Antipatterns (FP), p. 670.
- ICSME-2014-PonzanelliMBLF #detection #quality #stack overflow
- Improving Low Quality Stack Overflow Post Detection (LP, AM, AB, ML, DF), pp. 541–544.
- ICSME-2014-SvajlenkoR #clone detection #detection #tool support
- Evaluating Modern Clone Detection Tools (JS, CKR), pp. 321–330.
- MSR-2014-KleinCK #debugging #detection
- New features for duplicate bug detection (NK, CSC, NAK), pp. 324–327.
- MSR-2014-LazarRS #debugging #detection #metric #similarity #using
- Improving the accuracy of duplicate bug report detection using textual similarity measures (AL, SR, BS), pp. 308–311.
- SCAM-2014-MurtazaHKC #automation #detection
- Total ADS: Automated Software Anomaly Detection System (SSM, AHL, WK, MC), pp. 83–88.
- PEPM-2014-0008E #c++ #detection #fault
- Early detection of type errors in C++ templates (SC, ME), pp. 133–144.
- PLDI-2014-DimitrovRVK #commutative #concurrent #detection
- Commutativity race detection (DD, VR, MTV, EK), p. 33.
- PLDI-2014-HsiaoPYPNCKF #concurrent #detection #mobile
- Race detection for event-driven mobile applications (CHH, CP, JY, GP, SN, PMC, ZK, JF), p. 35.
- PLDI-2014-HuangMR #abstraction #concurrent #control flow #detection #predict
- Maximal sound predictive race detection with control flow abstraction (JH, POM, GR), p. 36.
- PLDI-2014-MaiyaKM #android #concurrent #detection
- Race detection for Android applications (PM, AK, RM), p. 34.
- PLDI-2014-TavarageriKS #detection #fault #memory management
- Compiler-assisted detection of transient memory errors (ST, SK, PS), p. 24.
- STOC-2014-Massoulie #community #detection
- Community detection thresholds and the weak Ramanujan property (LM), pp. 694–703.
- SEFM-2014-AlrajehC #automation #composition #detection #specification
- Automated Error-Detection and Repair for Compositional Software Specifications (DA, RC), pp. 111–127.
- SEFM-2014-ChristakisMW #detection #invariant #testing
- Synthesizing Parameterized Unit Tests to Detect Object Invariant Violations (MC, PM, VW), pp. 65–80.
- SFM-2014-GiachinoL #concurrent #detection #linear #recursion #source code
- Deadlock Detection in Linear Recursive Programs (EG, CL), pp. 26–64.
- CHI-2014-HautasaariYG #communication #detection #quote
- “Maybe it was a joke”: emotion detection in text-only communication by non-native english speakers (AMJH, NY, GG), pp. 3715–3724.
- CHI-2014-SunPC #detection #named
- MouStress: detecting stress from mouse motion (DS, PP, JC), pp. 61–70.
- DUXU-DI-2014-Al-SalhieAA #detection #multi
- Multimedia Surveillance in Event Detection: Crowd Analytics in Hajj (LAS, MAZ, AAW), pp. 383–392.
- DUXU-DI-2014-GencerBZV #detection #machine learning #mobile
- Detection of Churned and Retained Users with Machine Learning Methods for Mobile Applications (MG, GB, ÖZ, TV), pp. 234–245.
- DUXU-DI-2014-HeZL #detection #fault #feature model #image #segmentation
- Aluminum CT Image Defect Detection Based on Segmentation and Feature Extraction (NH, LZ, KL), pp. 446–454.
- HCI-AIMT-2014-HottaHOK #detection #estimation #fault #multi
- Detecting Address Estimation Errors from Users’ Reactions in Multi-user Agent Conversation (RH, HHH, SO, KK), pp. 245–253.
- HCI-AIMT-2014-RoyC #artificial reality #detection #invariant #markov #using
- View-Invariant Human Detection from RGB-D Data of Kinect Using Continuous Hidden Markov Model (SR, TC), pp. 325–336.
- HCI-AIMT-2014-TewsOFK #detection #interface #research
- Current and New Research Perspectives on Dynamic Facial Emotion Detection in Emotional Interface (TKT, MO, HF, TK), pp. 779–787.
- LCT-TRE-2014-YamaguchiSYNSM #collaboration #detection #distance #learning
- Posture and Face Detection with Dynamic Thumbnail Views for Collaborative Distance Learning (TY, HS, MY, YN, HS, TM), pp. 227–236.
- SCSM-2014-Ahangama #detection #realtime #social #social media #twitter
- Use of Twitter Stream Data for Trend Detection of Various Social Media Sites in Real Time (SA), pp. 151–159.
- SCSM-2014-Kanawati #community #detection #network
- Seed-Centric Approaches for Community Detection in Complex Networks (RK), pp. 197–208.
- CAiSE-2014-PadilhaPFAGS #detection #effectiveness #empirical #metric #on the #smell
- On the Effectiveness of Concern Metrics to Detect Code Smells: An Empirical Study (JP, JAP, EF, JMA, AG, CS), pp. 656–671.
- ICEIS-v1-2014-Lenz #detection
- Data Fraud Detection (HJL), p. XV.
- ICEIS-v1-2014-MezghaniPZAS #detection #social
- Analyzing Tagged Resources for Social Interests Detection (MM, AP, CAZ, IA, FS), pp. 340–345.
- ICEIS-v1-2014-SilvaNMFMM #algorithm #detection #distributed #performance #pipes and filters #using
- Efficient and Distributed DBScan Algorithm Using MapReduce to Detect Density Areas on Traffic Data (TLCdS, ACAN, RPM, VAEdF, JAFdM, JCM), pp. 52–59.
- ICEIS-v2-2014-GippMBPN #detection #semantics #similarity #using #visualisation
- Web-based Demonstration of Semantic Similarity Detection Using Citation Pattern Visualization for a Cross Language Plagiarism Case (BG, NM, CB, JP, AN), pp. 677–683.
- ICEIS-v2-2014-JulianoTS #detection #metric #object-oriented #using
- Detection of Software Anomalies Using Object-oriented Metrics (RCJ, BANT, MSS), pp. 241–248.
- ICEIS-v2-2014-ThorntonCPHM #detection #health
- Outlier-based Health Insurance Fraud Detection for U.S. Medicaid Data (DT, GvC, MP, JvH, RMM), pp. 684–694.
- CIKM-2014-AnchuriSS #architecture #detection
- Hotspot Detection in a Service-Oriented Architecture (PA, RS, SS), pp. 1749–1758.
- CIKM-2014-KiselevaCBD #detection #modelling #user satisfaction
- Modelling and Detecting Changes in User Satisfaction (JK, EC, RB, RD), pp. 1449–1458.
- CIKM-2014-LefortierSR #detection #online
- Online Exploration for Detecting Shifts in Fresh Intent (DL, PS, MdR), pp. 589–598.
- CIKM-2014-OuyangSTN #crowdsourcing #detection
- Truth Discovery in Crowdsourced Detection of Spatial Events (WRO, MBS, AT, TJN), pp. 461–470.
- CIKM-2014-ShihKRCGSP #component #detection #network
- Component Detection in Directed Networks (YKS, SK, YR, JC, AG, TS, SP), pp. 1729–1738.
- CIKM-2014-ShuLLYT #detection
- Deal or deceit: detecting cheating in distribution channels (KS, PL, WL, PY, LT), pp. 1419–1428.
- CIKM-2014-TakayamaTIOFC #detection #probability
- A Word-Scale Probabilistic Latent Variable Model for Detecting Human Values (YT, YT, EI, DWO, KRF, ASC), pp. 1489–1498.
- CIKM-2014-TangWPTL #approach #detection
- An Appliance-Driven Approach to Detection of Corrupted Load Curve Data (GT, KW, JP, JT, JL), pp. 1429–1438.
- CIKM-2014-WangWC #community #detection #named #network #social
- CoDEM: An Ingenious Tool of Insight into Community Detection in Social Networks (MW, CW, JC), pp. 2006–2008.
- CIKM-2014-YangLLLH #automation #clustering #detection #multi #social #using
- Automatic Social Circle Detection Using Multi-View Clustering (YY, CL, XL, BL, JH), pp. 1019–1028.
- ECIR-2014-CorneyMG #detection #twitter
- Spot the Ball: Detecting Sports Events on Twitter (DC, CJM, AG), pp. 449–454.
- ECIR-2014-GalleR #detection
- Boilerplate Detection and Recoding (MG, JMR), pp. 462–467.
- ECIR-2014-PanemBGV #detection #realtime #topic #twitter #using
- Entity Tracking in Real-Time Using Sub-topic Detection on Twitter (SP, RB, MG, VV), pp. 528–533.
- ECIR-2014-SchallerHE #detection #smarttech
- Detecting Event Visits in Urban Areas via Smartphone GPS Data (RS, MH, DE), pp. 681–686.
- ECIR-2014-ThumaRO #detection #query #retrieval
- Detecting Missing Content Queries in an SMS-Based HIV/AIDS FAQ Retrieval System (ET, SR, IO), pp. 247–259.
- ICML-c1-2014-ChenSMKWK #adaptation #detection
- Active Detection via Adaptive Submodularity (YC, HS, CFM, LPK, SW, AK), pp. 55–63.
- ICML-c2-2014-AhmedTBZDKB #detection #random
- Hierarchical Conditional Random Fields for Outlier Detection: An Application to Detecting Epileptogenic Cortical Malformations (BA, TT, KB, YZ, OD, RK, CEB), pp. 1080–1088.
- ICML-c2-2014-HarelMEC #concept #detection
- Concept Drift Detection Through Resampling (MH, SM, REY, KC), pp. 1009–1017.
- ICPR-2014-0005ZTS #detection #segmentation
- Human Hair Segmentation and Length Detection for Human Appearance Model (YW, ZZ, EKT, BS), pp. 450–454.
- ICPR-2014-AkinM #detection #learning #online
- Online Learning and Detection with Part-Based, Circulant Structure (OA, KM), pp. 4229–4233.
- ICPR-2014-AlyuzGA #3d #detection #recognition #robust
- Detection of Realistic Facial Occlusions for Robust 3D Face Recognition (NA, BG, LA), pp. 375–380.
- ICPR-2014-BalntasTM #detection
- Improving Object Tracking with Voting from False Positive Detections (VB, LT, KM), pp. 1928–1933.
- ICPR-2014-BartoliLKBB #adaptation #detection #multi #performance
- Unsupervised Scene Adaptation for Faster Multi-scale Pedestrian Detection (FB, GL, SK, ADB, ADB), pp. 3534–3539.
- ICPR-2014-BayramogluKEANKH #approach #detection #image #machine learning #using
- Detection of Tumor Cell Spheroids from Co-cultures Using Phase Contrast Images and Machine Learning Approach (NB, MK, LE, MA, MN, JK, JH), pp. 3345–3350.
- ICPR-2014-BiswasZLMV #analysis #detection #image #using
- Lesion Detection in Breast Ultrasound Images Using Tissue Transition Analysis (SB, FZ, XL, RM, VV), pp. 1185–1188.
- ICPR-2014-BougueliaBB #classification #data type #detection #novel #performance
- Efficient Active Novel Class Detection for Data Stream Classification (MRB, YB, AB), pp. 2826–2831.
- ICPR-2014-BrownFP #detection #self #using
- Temporal Non-maximum Suppression for Pedestrian Detection Using Self-Calibration (LMGB, RSF, SP), pp. 2239–2244.
- ICPR-2014-BuiNLYK #detection #order #statistics #using
- Boosted Stable Path for Staff-Line Detection Using Order Statistic Downscaling and Coarse-to-Fine Technique (HNB, ISN, GL, HJY, SHK), pp. 522–526.
- ICPR-2014-CechFM #3d #approach #detection #refinement
- A 3D Approach to Facial Landmarks: Detection, Refinement, and Tracking (JC, VF, JM), pp. 2173–2178.
- ICPR-2014-ChenH #composition #detection
- Implicit Rank-Sparsity Decomposition: Applications to Saliency/Co-saliency Detection (YLC, CTH), pp. 2305–2310.
- ICPR-2014-ChenLHLLH #detection #using
- Vision-Based Road Bump Detection Using a Front-Mounted Car Camcorder (HTC, CYL, CCH, SYL, BSPL, CPH), pp. 4537–4542.
- ICPR-2014-ChenSPS #detection #energy #statistics
- Statistical Anomaly Detection in Mean and Variation of Energy Consumption (BC, MS, JP, AS), pp. 3570–3575.
- ICPR-2014-ChenWCN #detection #fault #modelling #network
- Confusion Network Based Recurrent Neural Network Language Modeling for Chinese OCR Error Detection (JC, YW, HC, PN), pp. 1266–1271.
- ICPR-2014-Climent-PerezMR #detection #multi #using
- Multi-view Event Detection in Crowded Scenes Using Tracklet Plots (PCP, DNM, PR), pp. 4370–4375.
- ICPR-2014-ContiFAAMCT #detection #distance #evaluation
- Evaluation of Time Series Distance Functions in the Task of Detecting Remote Phenology Patterns (JCC, FAF, JA, BA, LPCM, LC, RdST), pp. 3126–3131.
- ICPR-2014-DingM #approach #detection #image
- An Accurate Approach for Microaneurysm Detection in Digital Fundus Images (SD, WM), pp. 1846–1851.
- ICPR-2014-ElmikatyS #detection #image #multi #using
- Car Detection in High-Resolution Urban Scenes Using Multiple Image Descriptors (ME, TS), pp. 4299–4304.
- ICPR-2014-FerisBPS #detection
- Appearance-Based Object Detection Under Varying Environmental Conditions (RF, LMGB, SP, MTS), pp. 166–171.
- ICPR-2014-FiratCV #detection #learning #representation
- Representation Learning for Contextual Object and Region Detection in Remote Sensing (OF, GC, FTYV), pp. 3708–3713.
- ICPR-2014-FradiD #detection #recognition
- Sparse Feature Tracking for Crowd Change Detection and Event Recognition (HF, JLD), pp. 4116–4121.
- ICPR-2014-FuGYGY #detection #graph
- Graph Construction for Salient Object Detection in Videos (KF, IYHG, YY, CG, JY), pp. 2371–2376.
- ICPR-2014-GomezK #detection #realtime
- MSER-Based Real-Time Text Detection and Tracking (LG, DK), pp. 3110–3115.
- ICPR-2014-HedjamCK #detection #documentation #energy #image #multi #self
- Constrained Energy Maximization and Self-Referencing Method for Invisible Ink Detection from Multispectral Historical Document Images (RH, MC, MK), pp. 3026–3031.
- ICPR-2014-HuWSC #detection #framework #robust #using
- Robust Head-Shoulder Detection Using a Two-Stage Cascade Framework (RH, RW, SS, XC), pp. 2796–2801.
- ICPR-2014-JhuoL #detection #learning #multi #video
- Video Event Detection via Multi-modality Deep Learning (IHJ, DTL), pp. 666–671.
- ICPR-2014-KamberovBKK #detection #video
- Unsupervised Detection of Video Sub-scenes (GK, MB, LK, OK), pp. 1934–1939.
- ICPR-2014-KawarabukiO #detection
- Snowfall Detection in a Foggy Scene (HK, KO), pp. 877–882.
- ICPR-2014-LablackDBD #approach #detection
- A Local Approach for Negative Emotion Detection (AL, TD, IMB, CD), pp. 417–420.
- ICPR-2014-LemesSBS #authentication #detection
- Dynamic Pore Filtering for Keypoint Detection Applied to Newborn Authentication (RdPL, MPS, ORPB, LS), pp. 1698–1703.
- ICPR-2014-LiangLLFL #detection #modelling
- Accurate Facial Landmarks Detection for Frontal Faces with Extended Tree-Structured Models (AL, WL, LL, MRF, VL), pp. 538–543.
- ICPR-2014-LiewY #detection #feature model #novel #performance #robust
- Generalized BRIEF: A Novel Fast Feature Extraction Method for Robust Hand Detection (CFL, TY), pp. 3014–3019.
- ICPR-2014-LimKLC #detection #similarity
- Crowd Saliency Detection via Global Similarity Structure (MKL, VJK, CCL, CSC), pp. 3957–3962.
- ICPR-2014-LinCCLH #analysis #detection
- Left-Luggage Detection from Finite-State-Machine Analysis in Static-Camera Videos (KL, SCC, CSC, DTL, YPH), pp. 4600–4605.
- ICPR-2014-LiuCL #detection #segmentation
- Exploring Depth Information for Object Segmentation and Detection (TLL, KYC, SHL), pp. 4340–4345.
- ICPR-2014-LiuZZL #detection #realtime
- Real-Time Scene Text Detection Based on Stroke Model (YL, DZ, YZ, SL), pp. 3116–3120.
- ICPR-2014-LuWMST #detection #modelling
- Anomaly Detection through Spatio-temporal Context Modeling in Crowded Scenes (TL, LW, XM, PS, CLT), pp. 2203–2208.
- ICPR-2014-LuWW #detection #summary
- Audiotory Movie Summarization by Detecting Scene Changes and Sound Events (TL, YW, GW), pp. 756–760.
- ICPR-2014-MaB #detection #incremental #random
- Compound Exemplar Based Object Detection by Incremental Random Forest (KM, JBA), pp. 2407–2412.
- ICPR-2014-MatsuoSY #detection #image #using
- Vehicle Driver Face Detection in Various Sunlight Environments Using Composed Face Images (HM, TS, NY), pp. 1687–1691.
- ICPR-2014-MatveevG #approximate #detection #segmentation
- Iris Segmentation System Based on Approximate Feature Detection with Subsequent Refinements (IM, KG), pp. 1704–1709.
- ICPR-2014-MekonnenLHB #detection #optimisation #people
- People Detection with Heterogeneous Features and Explicit Optimization on Computation Time (AAM, FL, AH, CB), pp. 4322–4327.
- ICPR-2014-MeloLMS #approach #detection
- An Optimized Sliding Window Approach to Pedestrian Detection (VHCdM, SL, DM, WRS), pp. 4346–4351.
- ICPR-2014-MolderCCH #automation #detection #reduction #using
- Automatic Detection of Embryo Location in Medical Imaging Using Trigonometric Rotation for Noise Reduction (ALM, SC, NC, GH), pp. 3239–3244.
- ICPR-2014-MoriKNK #detection #using #video
- Video Content Detection with Single Frame Level Accuracy Using Dynamic Thresholding Technique (MM, TK, HN, KK), pp. 2560–2565.
- ICPR-2014-MuddamsettySTM #detection #using
- Spatio-temporal Saliency Detection in Dynamic Scenes Using Local Binary Patterns (SMM, DS, AT, FM), pp. 2353–2358.
- ICPR-2014-NilssonAGF #detection #using
- Pedestrian Detection Using Augmented Training Data (JN, PA, IYHG, JF), pp. 4548–4553.
- ICPR-2014-NilufarP #detection #learning #programming
- Learning to Detect Contours with Dynamic Programming Snakes (SN, TJP), pp. 984–989.
- ICPR-2014-OzkanEA #detection #video #visual notation
- Visual Group Binary Signature for Video Copy Detection (SÖ, EE, GBA), pp. 3945–3950.
- ICPR-2014-PakKA #detection #probability
- Improvement of Benign and Malignant Probability Detection Based on Non-subsample Contourlet Transform and Super-resolution (FP, HRK, AA), pp. 895–899.
- ICPR-2014-PanagiotakisK #automation #detection #fault
- Automatic Enhancement and Detection of Active Sea Faults from Bathymetry (CP, EK), pp. 855–860.
- ICPR-2014-PedagadiOB #detection
- Integral Line Scan Features for Pedestrian Detection (SP, JO, BAB), pp. 2383–2388.
- ICPR-2014-PistocchiCBFC #3d #classification #detection #kernel
- Kernelized Structural Classification for 3D Dogs Body Parts Detection (SP, SC, SB, NF, RC), pp. 1993–1998.
- ICPR-2014-RahmanHZ #detection
- Information Divergence Based Saliency Detection with a Global Center-Surround Mechanism (IMHR, CH, MZ), pp. 3428–3433.
- ICPR-2014-RamirezOT #detection #multi
- Go with the Flow: Improving Multi-view Vehicle Detection with Motion Cues (AR, EOB, MMT), pp. 4140–4145.
- ICPR-2014-RazakarivonyJ #detection
- Discriminative Autoencoders for Small Targets Detection (SR, FJ), pp. 3528–3533.
- ICPR-2014-RiabchenkoKC14a #detection
- Density-Aware Part-Based Object Detection with Positive Examples (ER, JKK, KC), pp. 2814–2819.
- ICPR-2014-SantoshWAT #detection #image #scalability
- Scalable Arrow Detection in Biomedical Images (KCS, LW, SA, GRT), pp. 3257–3262.
- ICPR-2014-SariE #analysis #detection #fault #independence #using
- Texture Defect Detection Using Independent Vector Analysis in Wavelet Domain (LS, AE), pp. 1639–1644.
- ICPR-2014-SchubertM #detection #robust
- Robust Registration and Filtering for Moving Object Detection in Aerial Videos (FS, KM), pp. 2808–2813.
- ICPR-2014-SinghKZ #detection #difference #image #markov #multi #scalability
- A Multilayer Markovian Model for Change Detection in Aerial Image Pairs with Large Time Differences (PS, ZK, JZ), pp. 924–929.
- ICPR-2014-SongSLZZC #detection #image
- Corner Detection in Images Under Different Noise Levels (YS, YS, SL, CZ, JZ, HC), pp. 906–911.
- ICPR-2014-SuL #detection
- High-Stakes Deception Detection Based on Facial Expressions (LS, MDL), pp. 2519–2524.
- ICPR-2014-SunHJC #detection #image #network #robust
- Robust Text Detection in Natural Scene Images by Generalized Color-Enhanced Contrasting Extremal Region and Neural Networks (LS, QH, WJ, KC), pp. 2715–2720.
- ICPR-2014-SunZL #adaptation #detection
- An Adaptive-Profile Active Shape Model for Facial-Feature Detection (KS, HZ, KML), pp. 2849–2854.
- ICPR-2014-TaniH #detection #robust #using
- Robust Human Detection to Pose and Occlusion Using Bag-of-Words (YT, KH), pp. 4376–4381.
- ICPR-2014-TavanaiSGCH #detection
- Context Aware Detection and Tracking (AT, MS, FG, AGC, DCH), pp. 2197–2202.
- ICPR-2014-TuXN #analysis #detection #process
- Computational Auditory Scene Analysis Based Voice Activity Detection (MT, XX, XN), pp. 797–802.
- ICPR-2014-UbukataSTMKMU #detection #image #performance #segmentation
- Fast Human Detection Combining Range Image Segmentation and Local Feature Based Detection (TU, MS, KT, AM, TK, GM, KU), pp. 4281–4286.
- ICPR-2014-WangFC #detection
- Traffic Camera Anomaly Detection (YKW, CTF, JFC), pp. 4642–4647.
- ICPR-2014-WangFH0KH #detection #image #performance
- Fast and Accurate Text Detection in Natural Scene Images with User-Intention (LW, WF, YH, JS, YK, YH), pp. 2920–2925.
- ICPR-2014-WangLSSC #detection #evaluation
- Evaluation of Feature Detectors and Descriptors for Motion Detection from Aerial Videos (CW, SL, YS, YS, HC), pp. 2596–2601.
- ICPR-2014-WuJ #detection #learning
- Learning the Deep Features for Eye Detection in Uncontrolled Conditions (YW, QJ), pp. 455–459.
- ICPR-2014-YunJKHC #detection #modelling #performance #self
- Self-Organizing Cascaded Structure of Deformable Part Models for Fast Object Detection (SY, HJ, WSK, BH, JYC), pp. 4246–4250.
- ICPR-2014-YunJYKC #detection #interactive #video
- Motion Interaction Field for Accident Detection in Traffic Surveillance Video (KY, HJ, KMY, SWK, JYC), pp. 3062–3067.
- ICPR-2014-YuSZ #artificial reality #detection #image #realtime #sequence
- Real Time Fingertip Detection with Kinect Depth Image Sequences (YY, YS, YZ), pp. 550–555.
- ICPR-2014-ZhangKBC #detection
- Center-Surround Contrast Features for Pedestrian Detection (SZ, DAK, CB, ABC), pp. 2293–2298.
- ICPR-2014-ZhangLYQWTZ #detection #statistics
- Sufficient Statistics Feature Mapping over Deep Boltzmann Machine for Detection (CZ, XL, JY, SQ, YW, CT, YZ), pp. 827–832.
- ICPR-2014-ZhangM14a #detection #learning #multi
- Simultaneous Detection of Multiple Facial Action Units via Hierarchical Task Structure Learning (XZ, MHM), pp. 1863–1868.
- KDD-2014-BabaieCA #detection #online
- Sleep analytics and online selective anomaly detection (TB, SC, RGA), pp. 362–371.
- KDD-2014-ChenN #detection #graph #parametricity #social #social media #statistics
- Non-parametric scan statistics for event detection and forecasting in heterogeneous social media graphs (FC, DBN), pp. 1166–1175.
- KDD-2014-DuanSLL #community #correlation #detection #graph
- Community detection in graphs through correlation (LD, WNS, YL, HL), pp. 1376–1385.
- KDD-2014-FortunySMMPM #detection
- Corporate residence fraud detection (EJdF, MS, JM, BM, FJP, DM), pp. 1650–1659.
- KDD-2014-GunnemannGF #detection #evolution #probability #rating #robust
- Detecting anomalies in dynamic rating data: a robust probabilistic model for rating evolution (SG, NG, CF), pp. 841–850.
- KDD-2014-KlosterG #community #detection #kernel
- Heat kernel based community detection (KK, DFG), pp. 1386–1395.
- KDD-2014-PerozziASM #clustering #detection #graph #scalability
- Focused clustering and outlier detection in large attributed graphs (BP, LA, PIS, EM), pp. 1346–1355.
- KDD-2014-RozenshteinAGT #detection #network #process
- Event detection in activity networks (PR, AA, AG, NT), pp. 1176–1185.
- KDD-2014-SchubertWK #detection #named #scalability #topic
- SigniTrend: scalable detection of emerging topics in textual streams by hashed significance thresholds (ES, MW, HPK), pp. 871–880.
- KDD-2014-TamersoyRC #detection #graph #mining #scalability
- Guilt by association: large scale malware detection by mining file-relation graphs (AT, KAR, DHC), pp. 1524–1533.
- KDD-2014-YuCRW #detection
- Detecting moving object outliers in massive-scale trajectory streams (YY, LC, EAR, QW), pp. 422–431.
- KDD-2014-YuH0 #analysis #detection #named #social #social media
- GLAD: group anomaly detection in social media analysis (QRY, XH, YL), pp. 372–381.
- KDIR-2014-NagwanshiM #detection #semantics #sentiment #using
- Sarcasm Detection using Sentiment and Semantic Features (PN, CEVM), pp. 418–424.
- KDIR-2014-PassonneauRX #detection #mining #scalability
- Company Mention Detection for Large Scale Text Mining (RJP, TR, BX), pp. 512–520.
- MLDM-2014-AndreaSVU #detection #performance
- A New Measure of Outlier Detection Performance (KA, GS, NV, AU), pp. 190–197.
- MLDM-2014-KhasnabishSDS #detection #learning #programming language #source code #using
- Detecting Programming Language from Source Code Using Bayesian Learning Techniques (JNK, MS, JD, GS), pp. 513–522.
- MLDM-2014-YuST #detection #modelling #realtime
- Semi-supervised Time Series Modeling for Real-Time Flux Domain Detection on Passive DNS Traffic (BY, LS, MT), pp. 258–271.
- RecSys-2014-TavakolB #detection #topic
- Factored MDPs for detecting topics of user sessions (MT, UB), pp. 33–40.
- SEKE-2014-CostaMM #detection #diagrams #equivalence #semantics #uml
- Detecting Semantic Equivalence in UML Class Diagrams (VOC, RM, LM), pp. 318–323.
- SEKE-2014-LiuTA #database #detection
- Detecting Anomaly in the Usage of Database Attribute (KL, HBKT, YA), pp. 705–710.
- SEKE-2014-Otunba0 #approximate #detection #named
- APT: Approximate Period Detection in Time Series (RO, JL), pp. 490–494.
- SEKE-2014-SantosM #detection #identification
- Identifying strategies on god class detection in two controlled experiments (JAMS, MGM), pp. 244–249.
- SIGIR-2014-HuTL #detection #microblog
- Leveraging knowledge across media for spammer detection in microblogging (XH, JT, HL), pp. 547–556.
- SIGIR-2014-KumarJF #detection #twitter #using
- Where not to go?: detecting road hazards using twitter (AK, MJ, YF), pp. 1223–1226.
- SIGIR-2014-ParkS #detection #higher-order #modelling #probability
- Second order probabilistic models for within-document novelty detection in academic articles (LAFP, SS), pp. 1103–1106.
- SIGIR-2014-SpinaGA #detection #learning #monitoring #online #similarity #topic
- Learning similarity functions for topic detection in online reputation monitoring (DS, JG, EA), pp. 527–536.
- SIGIR-2014-ZhangKQH #detection #semantics #word
- Continuous word embeddings for detecting local text reuses at the semantic level (QZ, JK, JQ, XH), pp. 797–806.
- SIGIR-2014-ZhouKWAD #detection #recommendation
- Detection of abnormal profiles on group attacks in recommender systems (WZ, YSK, JW, SA, GD), pp. 955–958.
- MoDELS-2014-ChavarriagaNCJ #detection #multi #process
- Propagating Decisions to Detect and Explain Conflicts in a Multi-step Configuration Process (JC, CN, RC, VJ), pp. 337–352.
- MoDELS-2014-ChavarriagaNCJ #detection #multi #process
- Propagating Decisions to Detect and Explain Conflicts in a Multi-step Configuration Process (JC, CN, RC, VJ), pp. 337–352.
- OOPSLA-2014-SamakR #concurrent #detection #parallel #synthesis #thread
- Multithreaded test synthesis for deadlock detection (MS, MKR), pp. 473–489.
- PLATEAU-2014-SadowskiY #concurrent #detection #developer #how #tool support
- How Developers Use Data Race Detection Tools (CS, JY), pp. 43–51.
- LOPSTR-2014-SinghK #detection #java #partial evaluation
- Partial Evaluation for Java Malware Detection (RS, AK), pp. 133–147.
- RE-2014-AdedjoumaSB #approach #automation #case study #detection
- Automated detection and resolution of legal cross references: Approach and a study of Luxembourg’s legislation (MA, MS, LCB), pp. 63–72.
- SAC-2014-ChenLFCCK #algorithm #design #detection #effectiveness #health #implementation #monitoring
- Design and implementation of a personal health monitoring system with an effective SVM-based PVC detection algorithm in cardiology (HC, GTL, YCF, BCC, CMC, TCK), pp. 33–35.
- SAC-2014-ChenZW #detection #named #testing
- Crashmaker: an improved binary concolic testing tool for vulnerability detection (BC, QZ, WW), pp. 1257–1263.
- SAC-2014-Cooper #android #detection #research #student
- Student research abstract: android malware detection based on Kullback-Leibler divergence (VNC), pp. 1695–1696.
- SAC-2014-FerreiraBBAG #architecture #case study #detection #effectiveness
- Detecting architecturally-relevant code anomalies: a case study of effectiveness and effort (MF, EAB, IMB, RA, AG), pp. 1158–1163.
- SAC-2014-FreitasVHBV #detection #twitter
- Pathways for irony detection in tweets (LAdF, AAV, DNH, MNB, RV), pp. 628–633.
- SAC-2014-IencoBPP #category theory #data type #detection #evolution
- Change detection in categorical evolving data streams (DI, AB, BP, PP), pp. 792–797.
- SAC-2014-JunAK #detection #using
- DDoS attack detection by using packet sampling and flow features (JHJ, CWA, SHK), pp. 711–712.
- SAC-2014-KawsarAL #detection #multimodal #process #smarttech #using
- Smartphone based multimodal activity detection system using plantar pressure sensors (FAK, SIA, RL), pp. 468–469.
- SAC-2014-KimK #community #detection #mobile #network #social
- A detection of overlapping community in mobile social network (PK, SK), pp. 175–179.
- SAC-2014-NabeezathP #algorithm #detection #performance
- Global value numbering for redundancy detection: a simple and efficient algorithm (SN, VP), pp. 1609–1611.
- SAC-2014-PalVCS #detection #smarttech #using
- Improved heart rate detection using smart phone (AP, AV, ADC, AS), pp. 8–13.
- SAC-2014-PengYYHKH #3d #detection #multi #using
- 3D cloud detection and tracking for solar forecast using multiple sky imagers (ZP, SY, DY, DH, PK, JH), pp. 512–517.
- SAC-2014-ZandVYK #detection
- Extracting probable command and control signatures for detecting botnets (AZ, GV, XY, CK), pp. 1657–1662.
- FSE-2014-BanerjeeC0R #debugging #detection #energy #mobile
- Detecting energy bugs and hotspots in mobile apps (AB, LKC, SC, AR), pp. 588–598.
- FSE-2014-Bell #dependence #detection #testing
- Detecting, isolating, and enforcing dependencies among and within test cases (JB), pp. 799–802.
- FSE-2014-EslamimehrP #concurrent #detection #named #scalability #source code
- Sherlock: scalable deadlock detection for concurrent programs (ME, JP), pp. 353–365.
- FSE-2014-FengADA #android #detection #named #semantics #static analysis
- Apposcopy: semantics-based detection of Android malware through static analysis (YF, SA, ID, AA), pp. 576–587.
- FSE-2014-HuoC #detection #quality #testing
- Improving oracle quality by detecting brittle assertions and unused inputs in tests (CH, JC), pp. 621–631.
- FSE-2014-Kasi #detection #scheduling
- Minimizing software conflicts through proactive detection of conflicts and task scheduling (BKK), pp. 807–810.
- FSE-2014-LuoMW0Z #comparison #detection #obfuscation #semantics #similarity
- Semantics-based obfuscation-resilient binary code similarity comparison with applications to software plagiarism detection (LL, JM, DW, PL, SZ), pp. 389–400.
- FSE-2014-MileaJK #abstraction #detection #refactoring #scalability
- Vector abstraction and concretization for scalable detection of refactorings (NAM, LJ, SCK), pp. 86–97.
- FSE-2014-MirakhorliFGWC #architecture #detection #monitoring #named
- Archie: a tool for detecting, monitoring, and preserving architecturally significant code (MM, AF, AG, MW, JCH), pp. 739–742.
- FSE-2014-Xiao #architecture #debugging #detection
- Detecting and preventing the architectural roots of bugs (LX), pp. 811–813.
- ICSE-2014-ChenLZ #android #detection #scalability
- Achieving accuracy and scalability simultaneously in detecting application clones on Android markets (KC, PL, YZ), pp. 175–186.
- ICSE-2014-ChenSJHNF #anti #detection #performance #using
- Detecting performance anti-patterns for applications developed using object-relational mapping (THC, WS, ZMJ, AEH, MNN, PF), pp. 1001–1012.
- ICSE-2014-DouCW #ambiguity #detection #smell #spreadsheet
- Is spreadsheet ambiguity harmful? detecting and repairing spreadsheet smells due to ambiguous computation (WD, SCC, JW), pp. 848–858.
- ICSE-2014-HuangZTWL #android #behaviour #detection #named #user interface
- AsDroid: detecting stealthy behaviors in Android applications by user interface and program behavior contradiction (JH, XZ, LT, PW, BL), pp. 1036–1046.
- ICSE-2014-JungLRP #automation #detection #memory management
- Automated memory leak detection for production use (CJ, SL, ER, SP), pp. 825–836.
- ICSE-2014-LeeJP #behaviour #detection #machine learning #memory management #modelling #using
- Detecting memory leaks through introspective dynamic behavior modelling using machine learning (SL, CJ, SP), pp. 814–824.
- ICSE-2014-LinXXLPSZ #detection #difference #multi
- Detecting differences across multiple instances of code clones (YL, ZX, YX, YL, XP, JS, WZ), pp. 164–174.
- ICSE-2014-LiuXC #debugging #detection #performance #smarttech
- Characterizing and detecting performance bugs for smartphone applications (YL, CX, SCC), pp. 1013–1024.
- ICSE-2014-NegaraCDJ #detection #fine-grained #mining
- Mining fine-grained code changes to detect unknown change patterns (SN, MC, DD, REJ), pp. 803–813.
- ASPLOS-2014-WoodCG #detection #low level
- Low-level detection of language-level data races with LARD (BPW, LC, DG), pp. 671–686.
- ASPLOS-2014-ZhangRZGBXZ #correlation #detection #named
- EnCore: exploiting system environment and correlation information for misconfiguration detection (JZ, LR, XZ, NG, VB, TX, YZ), pp. 687–700.
- CGO-2014-SureshS #algorithm #automation #detection #fault #grid #problem
- Automated Algorithmic Error Resilience for Structured Grid Problems Based on Outlier Detection (AS, JS), p. 240.
- CGO-2014-YanXYR #detection #memory management #named
- LeakChecker: Practical Static Memory Leak Detection for Managed Languages (DY, G(X, SY, AR), p. 87.
- CGO-2014-YeSX #analysis #detection
- Accelerating Dynamic Detection of Uses of Undefined Values with Static Value-Flow Analysis (DY, YS, JX), p. 154.
- HPCA-2014-HuangHFS #concurrent #data transformation #detection #metadata #runtime
- Low-overhead and high coverage run-time race detection through selective meta-data management (RCH, EH, AF, GES), pp. 96–107.
- HPCA-2014-QiMAT #detection
- Dynamically detecting and tolerating IF-Condition Data Races (SQ, AM, WA, JT), pp. 120–131.
- OSDI-2014-ChenMXHPSZ #detection
- Detecting Covert Timing Channels with Time-Deterministic Replay (AC, WBM, HX, AH, LTXP, MS, WZ), pp. 541–554.
- PPoPP-2014-Bautista-GomezC #detection #monitoring
- Detecting silent data corruption through data dynamic monitoring for scientific applications (LABG, FC), pp. 381–382.
- PPoPP-2014-LiuTHB #detection #named #predict
- PREDATOR: predictive false sharing detection (TL, CT, ZH, EDB), pp. 3–14.
- PPoPP-2014-SamakR #concurrent #detection
- Trace driven dynamic deadlock detection and reproduction (MS, MKR), pp. 29–42.
- ICST-2014-HongPK #concurrent #detection #fault #java #web
- Detecting Concurrency Errors in Client-Side Java Script Web Applications (SH, YP, MK), pp. 61–70.
- ICTSS-2014-Bures #automation #detection #maintenance #testing
- Change Detection System for the Maintenance of Automated Testing (MB), pp. 192–197.
- ISSTA-2014-AlshahwanH #detection #fault #testing
- Coverage and fault detection of the output-uniqueness test selection criteria (NA, MH), pp. 181–192.
- ISSTA-2014-ChoudharyPO14a #consistency #detection #named #nondeterminism #testing #web
- X-PERT: a web application testing tool for cross-browser inconsistency detection (SRC, MRP, AO), pp. 417–420.
- ISSTA-2014-MileaJK #detection #refactoring #scalability
- Scalable detection of missed cross-function refactorings (NAM, LJ, SCK), pp. 138–148.
- ISSTA-2014-ZhangC #automation #detection #exception #information management #lightweight
- Lightweight automated detection of unsafe information leakage via exceptions (BZ, JC), pp. 327–338.
- SAT-2014-BiereBLM #constraints #detection
- Detecting Cardinality Constraints in CNF (AB, DLB, EL, NM), pp. 285–301.
- ASE-2013-ChandramohanTBSP #approach #behaviour #bound #detection #modelling #scalability
- A scalable approach for malware detection through bounded feature space behavior modeling (MC, HBKT, LCB, LKS, BMP), pp. 312–322.
- ASE-2013-Fard #behaviour #detection #distributed #independence #using
- Detecting and fixing emergent behaviors in Distributed Software Systems using a message content independent method (FHF), pp. 746–749.
- ASE-2013-GhaisasMA #case study #detection #documentation
- Detecting system use cases and validations from documents (SG, MM, PRA), pp. 568–573.
- ASE-2013-GuoZYZZ #android #detection
- Characterizing and detecting resource leaks in Android applications (CG, JZ, JY, ZZ, YZ), pp. 389–398.
- ASE-2013-MoritzVPGMG #api #detection #named #repository #scalability #source code #visualisation
- ExPort: Detecting and visualizing API usages in large source code repositories (EM, MLV, DP, MG, CM, MG), pp. 646–651.
- ASE-2013-PalombaBPOLP #detection #smell #source code #using
- Detecting bad smells in source code using change history information (FP, GB, MDP, RO, ADL, DP), pp. 268–278.
- ASE-2013-RayKPR #consistency #detection #nondeterminism #semantics
- Detecting and characterizing semantic inconsistencies in ported code (BR, MK, SP, NR), pp. 367–377.
- ASE-2013-Zhang0SLMD #automation #constraints #detection #symmetry
- Constraint-based automatic symmetry detection (SJZ, JS, CS, YL, JM, JSD), pp. 15–25.
- CASE-2013-LanzaKPSS #analysis #automation #detection #fault #using
- Automated optical detection of particles and defects on a Li-Ion-cell surface using a single-point analysis (GL, AK, SP, AS, SS), pp. 675–680.
- CASE-2013-LinG #detection #framework #network #optimisation #synthesis
- Synthesis and optimization of a Bayesian belief network based observation platform for anomaly detection under partial and unreliable observations (WCL, HEG), pp. 51–58.
- CASE-2013-WeeklyRZBNS #detection #low cost #matter
- Low-cost coarse airborne particulate matter sensing for indoor occupancy detection (KW, DR, LZ, AMB, WWN, CJS), pp. 32–37.
- CASE-2013-YanLS #detection #fault #process #statistics
- Fault detection of cooling coils based on unscented Kalman filters and statistical process control (YY, PBL, BS), pp. 237–242.
- CASE-2013-ZhouL #detection #realtime #throughput
- Real time electricity demand response for sustainable manufacturing systems considering throughput bottleneck detection (ZZ, LL), pp. 640–644.
- DAC-2013-LiaoHL #detection #fault
- GPU-based n-detect transition fault ATPG (KYL, SCH, JCML), p. 8.
- DAC-2013-LinCLWC #detection #fuzzy #novel
- A novel fuzzy matching model for lithography hotspot detection (SYL, JYC, JCL, WYW, SCC), p. 6.
- DAC-2013-WangK #control flow #detection #hardware #kernel #named #performance #using
- NumChecker: detecting kernel control-flow modifying rootkits by using hardware performance counters (XW, RK), p. 7.
- DAC-2013-YuLJC #classification #detection #feature model #using
- Machine-learning-based hotspot detection using topological classification and critical feature extraction (YTY, GHL, IHRJ, CC), p. 6.
- DATE-2013-AnanthanarayananGP #detection #fault #low cost #set #using
- Low cost permanent fault detection using ultra-reduced instruction set co-processors (SA, SG, HDP), pp. 933–938.
- DATE-2013-ChaG #approach #detection #effectiveness #metric
- Trojan detection via delay measurements: a new approach to select paths and vectors to maximize effectiveness and minimize cost (BC, SKG), pp. 1265–1270.
- DATE-2013-DeOrioLBB #debugging #detection #machine learning
- Machine learning-based anomaly detection for post-silicon bug diagnosis (AD, QL, MB, VB), pp. 491–496.
- DATE-2013-HuHMCF #detection #fault #realtime
- Fault detection, real-time error recovery, and experimental demonstration for digital microfluidic biochips (KH, BNH, AM, KC, RBF), pp. 559–564.
- DATE-2013-HuNRK #detection #hardware #multimodal #using
- High-sensitivity hardware trojan detection using multimodal characterization (KH, ANN, SR, FK), pp. 1271–1276.
- DATE-2013-KocBKE #detection #fault
- Exploiting replicated checkpoints for soft error detection and correction (FK, KB, BK, OE), pp. 1494–1497.
- DATE-2013-LinHLFGHM #challenge #detection #fault #validation
- Overcoming post-silicon validation challenges through quick error detection (QED) (DL, TH, YL, FF, DSG, NH, SM), pp. 320–325.
- DATE-2013-PontarelliOEW #detection #fault #using
- Error detection in ternary CAMs using bloom filters (SP, MO, AE, SJW), pp. 1474–1479.
- DATE-2013-SarrazinENBG #concurrent #design #detection #fault #performance
- Scan design with shadow flip-flops for low performance overhead and concurrent delay fault detection (SS, SE, LAdBN, YB, VG), pp. 1077–1082.
- DATE-2013-YalcinUC #detection #fault #hardware #memory management #named #transaction #using
- FaulTM: error detection and recovery using hardware transactional memory (GY, OSÜ, AC), pp. 220–225.
- DATE-2013-ZhaoLBT #detection #manycore #probability #runtime
- Run-time probabilistic detection of miscalibrated thermal sensors in many-core systems (JZ, S(L, WB, RT), pp. 1395–1398.
- DocEng-2013-BarabucciBIM #detection #documentation #modelling #visualisation
- Document changes: modeling; detection; storing and visualization (DChanges) (GB, UMB, ADI, SM), pp. 281–282.
- DocEng-2013-NevesZM #adaptation #algorithm #detection #documentation #image
- An adaptive thresholding algorithm based on edge detection and morphological operations for document images (RFdPN, CZ, CABM), pp. 107–110.
- DocEng-2013-WilliamsG #detection #library
- Near duplicate detection in an academic digital library (KW, CLG), pp. 91–94.
- DRR-2013-LiWTL #comprehension #detection #image
- Comic image understanding based on polygon detection (LL, YW, ZT, DL).
- DRR-2013-RazaAS #detection #image #multi
- Multilingual artificial text detection and extraction from still images (AR, AA, IS).
- DRR-2013-SalahRP #adaptation #assessment #automation #detection #quality
- Adaptive detection of missed text areas in OCR outputs: application to the automatic assessment of OCR quality in mass digitization projects (ABS, NR, TP).
- HT-2013-JarukasemratanaML #algorithm #community #detection #distance #network
- Community detection algorithm based on centrality and node distance in scale-free networks (SJ, TM, XL), pp. 258–262.
- ICDAR-2013-AlaeiDG #detection #probability #representation #using
- Logo Detection Using Painting Based Representation and Probability Features (AA, MD, NG), pp. 1235–1239.
- ICDAR-2013-BertrandGTFO #detection #documentation
- A System Based on Intrinsic Features for Fraudulent Document Detection (RB, PGK, ORT, PF, JMO), pp. 106–110.
- ICDAR-2013-ChenPCN #detection
- Detecting OOV Names in Arabic Handwritten Data (JC, RP, HC, PN), pp. 994–998.
- ICDAR-2013-DiamantatosVK #detection #documentation #image
- Detecting Main Body Size in Document Images (DP, VV, EK), pp. 1160–1164.
- ICDAR-2013-DiemKS #detection #documentation
- Text Line Detection for Heterogeneous Documents (MD, FK, RS), pp. 743–747.
- ICDAR-2013-FernandezT #algorithm #detection
- Handwritten Line Detection via an EM Algorithm (FCF, ORT), pp. 718–722.
- ICDAR-2013-GandhiJ #detection #documentation #image
- Detection of Cut-and-Paste in Document Images (AG, CVJ), pp. 653–657.
- ICDAR-2013-GaoRKLSIK #detection #documentation #image #retrieval
- Key-Region Detection for Document Images — Application to Administrative Document Retrieval (HG, MR, DK, JL, TS, MI, KK), pp. 230–234.
- ICDAR-2013-GaoWXSZLS #adaptation #detection
- Adaptive Scene Text Detection Based on Transferring Adaboost (SG, CW, BX, CS, YZ, ZL, YS), pp. 388–392.
- ICDAR-2013-GebhardtGSD #authentication #detection #documentation #using
- Document Authentication Using Printing Technique Features and Unsupervised Anomaly Detection (JG, MG, FS, AD), pp. 479–483.
- ICDAR-2013-HaoGZXPSK #automation #detection #fault #finite #transducer
- Automated Error Detection and Correction of Chinese Characters in Written Essays Based on Weighted Finite-State Transducer (SH, ZG, MZ, YX, HP, KS, DK), pp. 763–767.
- ICDAR-2013-HuangSU #detection
- Scene Character Detection by an Edge-Ray Filter (RH, PS, SU), pp. 462–466.
- ICDAR-2013-IdikaPV #detection
- Achieving Linguistic Provenance via Plagiarism Detection (NCI, HP, MV), pp. 648–652.
- ICDAR-2013-JainD #detection #documentation #image #named #verification
- VisualDiff: Document Image Verification and Change Detection (RJ, DSD), pp. 40–44.
- ICDAR-2013-KasarBACP #detection #documentation #image #learning #using
- Learning to Detect Tables in Scanned Document Images Using Line Information (TK, PB, SA, CC, TP), pp. 1185–1189.
- ICDAR-2013-KessentiniCP #detection #documentation #regular expression #word
- Word Spotting and Regular Expression Detection in Handwritten Documents (YK, CC, TP), pp. 516–520.
- ICDAR-2013-KhanSM13a #detection
- Hyperspectral Imaging for Ink Mismatch Detection (ZK, FS, ASM), pp. 877–881.
- ICDAR-2013-KunzeSIK #detection #documentation #off the shelf #process #recognition #using
- Reading Activity Recognition Using an Off-the-Shelf EEG — Detecting Reading Activities and Distinguishing Genres of Documents (KK, YS, SI, KK), pp. 96–100.
- ICDAR-2013-LiLLLFT #detection #geometry
- Detection of Overlapped Quadrangles in Plane Geometric Figures (KL, XL, HL, LL, TF, ZT), pp. 260–264.
- ICDAR-2013-LinGTBAS #detection #recognition
- A Text Line Detection Method for Mathematical Formula Recognition (XL, LG, ZT, JBB, MA, VS), pp. 339–343.
- ICDAR-2013-MoyssetK #algorithm #detection #evaluation #on the
- On the Evaluation of Handwritten Text Line Detection Algorithms (BM, CK), pp. 185–189.
- ICDAR-2013-NassuMO #detection #documentation #image #towards
- Text Line Detection in Document Images: Towards a Support System for the Blind (BTN, RM, LESdO), pp. 638–642.
- ICDAR-2013-RabaevBEKD #detection
- Text Line Detection in Corrupted and Damaged Historical Manuscripts (IR, OB, JES, KK, ID), pp. 812–816.
- ICDAR-2013-RazaSDE #detection #multi #using
- Multilingual Artificial Text Detection Using a Cascade of Transforms (AR, IS, CD, AE), pp. 309–313.
- ICDAR-2013-RebeloC #detection
- Staff Line Detection and Removal in the Grayscale Domain (AR, JSC), pp. 57–61.
- ICDAR-2013-RigaudBOKW #detection #speech
- An Active Contour Model for Speech Balloon Detection in Comics (CR, JCB, JMO, DK, JvdW), pp. 1240–1244.
- ICDAR-2013-SankaranJ #detection #fault
- Error Detection in Highly Inflectional Languages (NS, CVJ), pp. 1135–1139.
- ICDAR-2013-ShivakumaraBGT #detection #video
- Detection of Curved Text in Video: Quad Tree Based Method (PS, HTB, DSG, CLT), pp. 594–598.
- ICDAR-2013-SunBOK #detection #using
- Specific Comic Character Detection Using Local Feature Matching (WS, JCB, JMO, KK), pp. 275–279.
- ICDAR-2013-TuarobBMG #automation #detection #documentation #machine learning #pseudo #using
- Automatic Detection of Pseudocodes in Scholarly Documents Using Machine Learning (ST, SB, PM, CLG), pp. 738–742.
- ICDAR-2013-WangSZ #component #detection #multi #segmentation
- Natural Scene Text Detection with Multi-channel Connected Component Segmentation (XW, YS, YZ), pp. 1375–1379.
- ICDAR-2013-YinLS #analysis #detection #documentation #framework #image #multi #novel
- A Novel Multi-view Object Class Detection Framework for Document Image Content Analysis (WY, TL, FS), pp. 1095–1099.
- ICDAR-2013-ZagorisP #detection #image #modelling #using
- Text Detection in Natural Images Using Bio-inspired Models (KZ, IP), pp. 1370–1374.
- ICDAR-2013-ZhuZ #detection #image #recognition #using
- Label Detection and Recognition for USPTO Images Using Convolutional K-Means Feature Quantization and Ada-Boost (SZ, RZ), pp. 633–637.
- SIGMOD-2013-GeorgiadisKGPTM #algorithm #data type #detection #framework #state of the art
- Continuous outlier detection in data streams: an extensible framework and state-of-the-art algorithms (DG, MK, AG, ANP, KT, YM), pp. 1061–1064.
- VLDB-2013-AbdelhaqSG #detection #locality #named #online #twitter
- EvenTweet: Online Localized Event Detection from Twitter (HA, CS, MG), pp. 1326–1329.
- VLDB-2013-DuttaNB #approach #approximate #data type #detection #streaming
- Streaming Quotient Filter: A Near Optimal Approximate Duplicate Detection Approach for Data Streams (SD, AN, SKB), pp. 589–600.
- VLDB-2014-BudakGAA13 #detection #named #network #online #roadmap #social
- GeoScope: Online Detection of Geo-Correlated Information Trends in Social Networks (CB, TG, DA, AEA), pp. 229–240.
- VLDB-2014-LiDWLKC13 #detection
- Attraction and Avoidance Detection from Movements (ZL, BD, FW, TKHL, RK, MC), pp. 157–168.
- TACAS-2013-SongT #detection #ltl #model checking
- LTL Model-Checking for Malware Detection (FS, TT), pp. 416–431.
- CSMR-2013-BertranGCS #architecture #detection
- Enhancing the Detection of Code Anomalies with Architecture-Sensitive Strategies (IMB, AG, CC, AvS), pp. 177–186.
- CSMR-2013-GhaithWPM #analysis #detection #independence #performance #testing
- Profile-Based, Load-Independent Anomaly Detection and Analysis in Performance Regression Testing of Software Systems (SG, MW, PP, JM), pp. 379–383.
- CSMR-2013-NegaraTS #detection #web
- Feature Detection in Ajax-Enabled Web Applications (NN, NT, ES), pp. 154–163.
- CSMR-2013-PolychniatisHJBV #dependence #detection
- Detecting Cross-Language Dependencies Generically (TP, JH, SJ, EB, JV), pp. 349–352.
- CSMR-2013-StevensRNJ #detection #multi #query #refactoring
- A History Querying Tool and Its Application to Detect Multi-version Refactorings (RS, CDR, CN, VJ), pp. 335–338.
- ICPC-2013-Kamiya #clone detection #detection #named #semantics
- Agec: An execution-semantic clone detection tool (TK), pp. 227–229.
- ICPC-2013-MondalRS13a #detection
- Improving the detection accuracy of evolutionary coupling (MM, CKR, KAS), pp. 223–226.
- ICPC-2013-MurakamiHHIK #analysis #clone detection #detection #lightweight #source code
- Gapped code clone detection with lightweight source code analysis (HM, KH, YH, HI, SK), pp. 93–102.
- ICPC-2013-UddinRS #clone detection #detection #named #performance #scalability
- SimCad: An extensible and faster clone detection tool for large scale software systems (MSU, CKR, KAS), pp. 236–238.
- ICSM-2013-FontanaZMM #approach #detection #machine learning #smell #towards
- Code Smell Detection: Towards a Machine Learning-Based Approach (FAF, MZ, AM, MM), pp. 396–399.
- ICSM-2013-SorOTS #approach #detection #machine learning #memory management #statistics #using
- Improving Statistical Approach for Memory Leak Detection Using Machine Learning (VS, PO, TT, SNS), pp. 544–547.
- MSR-2013-AlaliBNM #detection #distance #metric #using
- A preliminary investigation of using age and distance measures in the detection of evolutionary couplings (AA, BB, CDN, JIM), pp. 169–172.
- MSR-2013-AlipourHS #approach #debugging #detection #towards
- A contextual approach towards more accurate duplicate bug report detection (AA, AH, ES), pp. 183–192.
- MSR-2013-AmouiKATLL #detection #experience #fault #industrial #search-based
- Search-based duplicate defect detection: an industrial experience (MA, NK, AAD, LT, SL, WL), pp. 173–182.
- MSR-2013-CampbellZXHM #analysis #detection #documentation #topic #using
- Deficient documentation detection: a methodology to locate deficient project documentation using topic analysis (JCC, CZ, ZX, AH, JM), pp. 57–60.
- MSR-2013-WangG #android #api #case study #detection #developer
- Detecting API usage obstacles: a study of iOS and Android developer questions (WW, MWG), pp. 61–64.
- SCAM-2013-CeruloCPC #detection #markov
- A Hidden Markov Model to detect coded information islands in free text (LC, MC, MDP, GC), pp. 157–166.
- SCAM-2013-FardM #detection #javascript #named #smell
- JSNOSE: Detecting JavaScript Code Smells (AMF, AM), pp. 116–125.
- WCRE-2013-AntonyAC #approach #behaviour #clone detection #detection #modelling
- An approach to clone detection in behavioural models (EPA, MHA, JRC), pp. 472–476.
- WCRE-2013-BernardiCL #approach #design pattern #detection #graph #modelling
- A model-driven graph-matching approach for design pattern detection (MLB, MC, GADL), pp. 172–181.
- WCRE-2013-ChenSB #c #detection #memory management
- Who allocated my memory? Detecting custom memory allocators in C binaries (XC, AS, HB), pp. 22–31.
- WCRE-2013-ChenSB13a #c #detection #memory management #named
- MemBrush: A practical tool to detect custom memory allocators in C binaries (XC, AS, HB), pp. 477–478.
- WCRE-2013-DucheneRRG #black box #data flow #detection #modelling #named
- LigRE: Reverse-engineering of control and data flow models for black-box XSS detection (FD, SR, JLR, RG), pp. 252–261.
- WCRE-2013-HallerSB #c #c++ #data type #detection #named
- MemPick: High-level data structure detection in C/C++ binaries (IH, AS, HB), pp. 32–41.
- WCRE-2013-HallerSB13a #data type #detection #named
- MemPick: A tool for data structure detection (IH, AS, HB), pp. 479–480.
- WCRE-2013-KrutzS #clone detection #detection #named
- CCCD: Concolic code clone detection (DEK, ES), pp. 489–490.
- WCRE-2013-NayrollesMV #detection #execution #mining
- Improving SOA antipatterns detection in Service Based Systems by mining execution traces (MN, NM, PV), pp. 321–330.
- WCRE-2013-SutiiRS #dependence #detection #enterprise #java
- Detecting dependencies in Enterprise JavaBeans with SQuAVisiT (AS, SAR, AS), pp. 485–486.
- PLDI-2013-ElwazeerAKSB #data type #detection #scalability
- Scalable variable and data type detection in a binary rewriter (KE, KA, AK, MS, RB), pp. 51–60.
- STOC-2013-FeldmanGRVX #algorithm #bound #clique #detection #statistics
- Statistical algorithms and a lower bound for detecting planted cliques (VF, EG, LR, SV, YX), pp. 655–664.
- IFM-2013-SavaryFL #bytecode #detection #modelling #testing #using #verification
- Detecting Vulnerabilities in Java-Card Bytecode Verifiers Using Model-Based Testing (AS, MF, JLL), pp. 223–237.
- SEFM-2013-KeshishzadehMM #automation #debugging #detection #domain-specific language #fault #smt #using
- Early Fault Detection in DSLs Using SMT Solving and Automated Debugging (SK, AJM, MRM), pp. 182–196.
- SEFM-2013-SalehKBW #detection #fault #implementation #specification #static analysis #using
- Static Detection of Implementation Errors Using Formal Code Specification (IS, GK, MBB, YW), pp. 197–211.
- GT-VMT-2013-MicallefC #case study #detection #modelling #risk management #visual notation
- A Case Study on Graphically Modelling and Detecting Knowledge Mobility Risks (MM, CC).
- CHI-2013-WisemanCBGO #detection #fault #using
- Using redundancy to detect human error (SW, ALC, DPB, SG, SO), pp. 2403–2406.
- CSCW-2013-AgustinaS #3d #collaboration #design #detection #realtime
- Dependency-conflict detection in real-time collaborative 3D design systems (A, CS), pp. 715–728.
- CSCW-2013-BrooksKTPRSAZHA #chat #collaboration #detection #statistics
- Statistical affect detection in collaborative chat (MB, KK, MKT, DP, JJR, TJS, OA, AZ, PH, CRA), pp. 317–328.
- DUXU-PMT-2013-Breiner #detection #forensics #interactive
- User Interaction Forensics — Detecting and Interpreting the User’s Footprints during Touch Interaction (KB), pp. 193–202.
- HCI-III-2013-StorzRMLE #analysis #detection #machine learning #visualisation #workflow
- Annotate. Train. Evaluate. A Unified Tool for the Analysis and Visualization of Workflows in Machine Learning Applied to Object Detection (MS, MR, RM, HL, ME), pp. 196–205.
- HCI-III-2013-WangLDHY #detection #set
- A Coastline Detection Method Based on Level Set (QW, KL, FD, NH, LY), pp. 216–226.
- HCI-III-2013-YangZZJXW #detection #multi #realtime #using
- Depth Camera Based Real-Time Fingertip Detection Using Multi-view Projection (WY, ZZ, XZ, LJ, CX, PW), pp. 254–261.
- HCI-IMT-2013-EbisawaF #detection #using #video
- Head-Free, Remote Gaze Detection System Based on Pupil-Corneal Reflection Method with Using Two Video Cameras — One-Point and Nonlinear Calibrations (YE, KF), pp. 205–214.
- HIMI-D-2013-IshiiW #communication #detection #evaluation #self #video
- Evaluation of Superimposed Self-character Based on the Detection of Talkers’ Face Angles in Video Communication (YI, TW), pp. 431–438.
- HIMI-HSM-2013-SaitohI #detection #learning #using #visualisation
- Visualization of Anomaly Data Using Peculiarity Detection on Learning Vector Quantization (FS, SI), pp. 181–188.
- HIMI-LCCB-2013-SuzukiKUIISS #collaboration #detection #multi
- Detection of Division of Labor in Multiparty Collaboration (NS, TK, IU, SI, SI, MS, KS), pp. 362–371.
- CAiSE-2013-BakkerFV #approach #detection #hybrid #web
- A Hybrid Model Words-Driven Approach for Web Product Duplicate Detection (MdB, FF, DV), pp. 149–161.
- ICEIS-v1-2013-LiuDH #assessment #detection #exception #risk management
- Detecting and Explaining Business Exceptions for Risk Assessment (LL, HAMD, WH), pp. 530–535.
- CIKM-2013-FinisRABKF #detection #flexibility #named #performance
- RWS-Diff: flexible and efficient change detection in hierarchical data (JPF, MR, NA, RB, AK, FF), pp. 339–348.
- CIKM-2013-KeikhaCC #detection #retrieval
- Generalizing diversity detection in blog feed retrieval (MK, FC, WBC), pp. 1201–1204.
- CIKM-2013-McMinnMJ #corpus #detection #scalability #twitter
- Building a large-scale corpus for evaluating event detection on twitter (AJM, YM, JMJ), pp. 409–418.
- CIKM-2013-TanGC0Z #detection #named #network #social
- UNIK: unsupervised social network spam detection (ET, LG, SC, XZ, YEZ), pp. 479–488.
- CIKM-2013-XieSYPZ #correlation #detection #streaming
- Local correlation detection with linearity enhancement in streaming data (QX, SS, BY, CP, XZ), pp. 309–318.
- CIKM-2013-ZhangJSCDZ #classification #detection
- Short text classification by detecting information path (SZ, XJ, DS, BC, XD, XZ), pp. 727–732.
- CIKM-2013-ZhuXGC #detection #mobile #perspective #ranking
- Ranking fraud detection for mobile apps: a holistic view (HZ, HX, YG, EC), pp. 619–628.
- ECIR-2013-DadvarTOJ #detection
- Improving Cyberbullying Detection with User Context (MD, DT, RO, FdJ), pp. 693–696.
- ECIR-2013-Franco-SalvadorGR #detection #multi #network #semantics #using
- Cross-Language Plagiarism Detection Using a Multilingual Semantic Network (MFS, PG, PR), pp. 710–713.
- ECIR-2013-IgnatovKC #approach #detection
- Near-Duplicate Detection for Online-Shops Owners: An FCA-Based Approach (DII, AVK, YC), pp. 722–725.
- ECIR-2013-McParlaneMW #detection #recommendation #semantics
- Detecting Friday Night Party Photos: Semantics for Tag Recommendation (PJM, YM, IW), pp. 756–759.
- ECIR-2013-PanchenkoBNF #categorisation #detection #towards
- Towards Detection of Child Sexual Abuse Media: Categorization of the Associated Filenames (AP, RB, HN, CF), pp. 776–779.
- ECIR-2013-WaltherK #detection #twitter
- Geo-spatial Event Detection in the Twitter Stream (MW, MK), pp. 356–367.
- ECIR-2013-YatesG #detection #named #social #social media
- ADRTrace: Detecting Expected and Unexpected Adverse Drug Reactions from User Reviews on Social Media Sites (AY, NG), pp. 816–819.
- ICML-c1-2013-BuhlerRSH #clustering #community #detection #set #source code
- Constrained fractional set programs and their application in local clustering and community detection (TB, SSR, SS, MH), pp. 624–632.
- ICML-c3-2013-FriedlandJL #detection #social
- Copy or Coincidence? A Model for Detecting Social Influence and Duplication Events (LF, DJ, ML), pp. 1175–1183.
- ICML-c3-2013-HockingRVB #detection #learning #using
- Learning Sparse Penalties for Change-point Detection using Max Margin Interval Regression (TH, GR, JPV, FRB), pp. 172–180.
- ICML-c3-2013-KoppulaS #detection #learning #process
- Learning Spatio-Temporal Structure from RGB-D Videos for Human Activity Detection and Anticipation (HSK, AS), pp. 792–800.
- KDD-2013-CiglanLN #community #detection #network #on the
- On community detection in real-world networks and the importance of degree assortativity (MC, ML, KN), pp. 1007–1015.
- KDD-2013-FeiKSNMH #detection #learning
- Heat pump detection from coarse grained smart meter data with positive and unlabeled learning (HF, YK, SS, MRN, SKM, JH), pp. 1330–1338.
- KDD-2013-SenatorGMYRPHRBCEJBCGKZBMMWDFWDEILKFCFGJ #database #detection #process
- Detecting insider threats in a real corporate database of computer usage activity (TES, HGG, AM, WTY, BR, RP, DH, MR, DAB, EC, IAE, JJ, VB, DHC, OG, OK, AZ, EB, RLMI, RM, LW, TGD, AF, WKW, SD, AE, JI, JYL, DK, CF, DDC, LF, AG, DJ), pp. 1393–1401.
- KDD-2013-StitelmanPDHRP #detection #network #online #scalability #using
- Using co-visitation networks for detecting large scale online display advertising exchange fraud (OS, CP, BD, RH, TR, FJP), pp. 1240–1248.
- KDD-2013-ZhaoH #detection #learning #online
- Cost-sensitive online active learning with application to malicious URL detection (PZ, SCHH), pp. 919–927.
- KDD-2013-ZimekGCS #detection #effectiveness #performance
- Subsampling for efficient and effective unsupervised outlier detection ensembles (AZ, MG, RJGBC, JS), pp. 428–436.
- MLDM-2013-AmalamanER #detection #using
- Using Turning Point Detection to Obtain Better Regression Trees (PKA, CFE, NJR), pp. 325–339.
- MLDM-2013-KokkulaM #classification #detection #synthesis #topic
- Classification and Outlier Detection Based on Topic Based Pattern Synthesis (SK, NMM), pp. 99–114.
- MLDM-2013-MaziluCGRHT #detection #learning #predict
- Feature Learning for Detection and Prediction of Freezing of Gait in Parkinson’s Disease (SM, AC, EG, DR, JMH, GT), pp. 144–158.
- MLDM-2013-NikovskiWESSMT #data analysis #detection
- Smart Meter Data Analysis for Power Theft Detection (DNN, ZW, AE, HS, KS, TM, KT), pp. 379–389.
- MLDM-2013-SharmaG #detection
- Optimal Time Segments for Stress Detection (NS, TG), pp. 421–433.
- SEKE-2013-Al-JamimiA #design pattern #detection #prolog #using
- Using Prolog Rules to Detect Software Design Patterns: Strengths and Weaknesses (S) (HAAJ, MAA), pp. 727–730.
- SEKE-2013-CostaJM #detection #modelling #semantics
- Semantic Conflicts Detection in Model-driven Engineering (VOC, JMBOJ, LGPM), pp. 656–661.
- SEKE-2013-LenhardW #detection #modelling
- Detecting Portability Issues in Model-Driven BPEL Mappings (S) (JL, GW), pp. 18–21.
- SEKE-2013-LiuWL #analysis #detection #named #online #performance #pointer
- ELCD: an efficient online cycle detection technique for pointer analysis (FL, LW, BL), pp. 606–611.
- SEKE-2013-OliveiraBVC #detection
- Metrics-based Detection of Similar Software (S) (PO, HB, MTV, HAXC), pp. 447–450.
- SEKE-2013-ThommazoOORWF #detection #network #traceability
- Detecting traceability links through neural networks (ADT, TRdO, GO, RR, VW, SF), pp. 36–41.
- SIGIR-2013-BonnefoyBB #detection #documentation
- A weakly-supervised detection of entity central documents in a stream (LB, VB, PB), pp. 769–772.
- SIGIR-2013-ChenALC #detection #microblog #topic
- Emerging topic detection for organizations from microblogs (YC, HA, ZL, TSC), pp. 43–52.
- SIGIR-2013-GippMBLN #analysis #detection
- Demonstration of citation pattern analysis for plagiarism detection (BG, NM, CB, ML, AN), pp. 1119–1120.
- SIGIR-2013-SavenkovLL #behaviour #detection
- Search engine switching detection based on user personal preferences and behavior patterns (DS, DL, QL), pp. 33–42.
- SIGIR-2013-YinYHH #detection #image #retrieval #robust
- Accurate and robust text detection: a step-in for text retrieval in natural scene images (XCY, XY, KH, HWH), pp. 1091–1092.
- AMT-2013-TichyKL #detection #model transformation #performance #smell
- Detecting Performance Bad Smells for Henshin Model Transformations (MT, CK, GL), pp. 82–91.
- MoDELS-2013-RajbhojR #approach #detection #metamodelling #version control
- A Graph-Pattern Based Approach for Meta-Model Specific Conflict Detection in a General-Purpose Model Versioning System (AR, SR), pp. 422–435.
- MoDELS-2013-RajbhojR #approach #detection #metamodelling #version control
- A Graph-Pattern Based Approach for Meta-Model Specific Conflict Detection in a General-Purpose Model Versioning System (AR, SR), pp. 422–435.
- ECOOP-2013-ShomratF #detection
- Detecting Refactored Clones (MS, YAF), pp. 502–526.
- OOPSLA-2013-BaoZ #detection #execution #float #on the fly #problem
- On-the-fly detection of instability problems in floating-point program execution (TB, XZ), pp. 817–832.
- OOPSLA-2013-BhattacharyaGN #detection #program analysis
- Combining concern input with program analysis for bloat detection (SB, KG, MGN), pp. 745–764.
- OOPSLA-2013-Deng0L #detection #performance
- Efficient concurrency-bug detection across inputs (DD, WZ, SL), pp. 785–802.
- OOPSLA-2013-RaychevVS #concurrent #detection #effectiveness #source code
- Effective race detection for event-driven programs (VR, MTV, MS), pp. 151–166.
- OOPSLA-2013-ZhongS #api #detection #documentation #fault
- Detecting API documentation errors (HZ, ZS), pp. 803–816.
- PPDP-2013-CalauttiGT #decidability #detection #logic programming #source code
- Detecting decidable classes of finitely ground logic programs with function symbols (MC, SG, IT), pp. 239–250.
- POPL-2013-BarrVLS #automation #detection #exception #float
- Automatic detection of floating-point exceptions (ETB, TV, VL, ZS), pp. 549–560.
- SAC-2013-BakkerVFK #detection #web
- Model words-driven approaches for duplicate detection on the web (MdB, DV, FF, UK), pp. 717–723.
- SAC-2013-BanerjeeSS #detection #monitoring #using
- Participatory sensing based traffic condition monitoring using horn detection (RB, AS, AS), pp. 567–569.
- SAC-2013-ChaeKHLW #api #detection
- Software plagiarism detection via the static API call frequency birthmark (DKC, SWK, JH, SCL, GW), pp. 1639–1643.
- SAC-2013-CostaBM #detection #network #social
- Detecting tip spam in location-based social networks (HC, FB, LHdCM), pp. 724–729.
- SAC-2013-DietrichRP #clustering #detection #visual notation
- Exploiting visual appearance to cluster and detect rogue software (CJD, CR, NP), pp. 1776–1783.
- SAC-2013-FariaGC #algorithm #data type #detection #multi #problem
- Novelty detection algorithm for data streams multi-class problems (ERF, JG, ACPLFC), pp. 795–800.
- SAC-2013-HassanzadehN #algorithm #detection #graph
- A semi-supervised graph-based algorithm for detecting outliers in online-social-networks (RH, RN), pp. 577–582.
- SAC-2013-HuangXCL #adaptation #algorithm #analysis #detection #implementation #parallel #random testing #testing
- Failure-detection capability analysis of implementing parallelism in adaptive random testing algorithms (RH, XX, JC, YL), pp. 1049–1054.
- SAC-2013-KimM #algorithm #detection #hybrid #search-based #using
- Disguised malware script detection system using hybrid genetic algorithm (JK, BRM), pp. 182–187.
- SAC-2013-LeitaoC #adaptation #detection #optimisation #performance #using #xml
- Efficient XML duplicate detection using an adaptive two-level optimization (LL, PC), pp. 832–837.
- SAC-2013-PerkusichAP #detection #development #problem
- A model to detect problems on scrum-based software development projects (MP, HOdA, AP), pp. 1037–1042.
- SAC-2013-RieckerBH #detection #energy #lightweight #network
- Lightweight energy consumption based intrusion detection system for wireless sensor networks (MR, SB, MH), pp. 1784–1791.
- ESEC-FSE-2013-LiangWXM #debugging #detection
- Inferring project-specific bug patterns for detecting sibling bugs (GL, QW, TX, HM), pp. 565–575.
- ESEC-FSE-2013-McPeakGR #debugging #detection #incremental #scalability
- Scalable and incremental software bug detection (SM, CHG, MKR), pp. 554–564.
- ESEC-FSE-2013-NguyenX #detection #named
- Cachetor: detecting cacheable data to remove bloat (KN, G(X), pp. 268–278.
- ESEC-FSE-2013-PetkeYCH #combinator #detection #fault #interactive #performance #testing
- Efficiency and early fault detection with lower and higher strength combinatorial interaction testing (JP, SY, MBC, MH), pp. 26–36.
- ESEC-FSE-2013-SongT #automaton #detection #model checking #named
- PoMMaDe: pushdown model-checking for malware detection (FS, TT), pp. 607–610.
- ESEC-FSE-2013-WuHTY #alias #analysis #detection #effectiveness #fault
- Effective dynamic detection of alias analysis errors (JW, GH, YT, JY), pp. 279–289.
- ICSE-2013-FemmerGLM #case study #consistency #detection #nondeterminism
- Detecting inconsistencies in wrappers: a case study (HF, DG, ML, DM), pp. 1022–1031.
- ICSE-2013-HermansSPD #clone detection #detection #spreadsheet #visualisation
- Data clone detection and visualization in spreadsheets (FH, BS, MP, AvD), pp. 292–301.
- ICSE-2013-MalikHH #automation #detection #performance #scalability #testing
- Automatic detection of performance deviations in the load testing of large scale systems (HM, HH, AEH), pp. 1012–1021.
- ICSE-2013-MarinoHDVTV #concurrent #detection #source code
- Detecting deadlock in programs with data-centric synchronization (DM, CH, JD, MV, FT, JV), pp. 322–331.
- ICSE-2013-NguyenNNN #detection #named #web
- DRC: a detection tool for dangling references in PHP-based web applications (HVN, HAN, TTN, TNN), pp. 1299–1302.
- ICSE-2013-NistorSML #data access #detection #named #performance #problem
- Toddler: detecting performance problems via similar memory-access patterns (AN, LS, DM, SL), pp. 562–571.
- ICSE-2013-Simpson #communication #detection #developer
- Changeset based developer communication to detect software failures (BS), pp. 1468–1470.
- ICSE-2013-TianD #detection #model checking
- Detecting spurious counterexamples efficiently in abstract model checking (CT, ZD), pp. 202–211.
- ICSE-2013-ZhengZ #detection #execution #static analysis #web
- Path sensitive static analysis of web applications for remote code execution vulnerability detection (YZ, XZ), pp. 652–661.
- SLE-2013-VasudevanT #ambiguity #detection #programming language
- Detecting Ambiguity in Programming Language Grammars (NV, LT), pp. 157–176.
- ASPLOS-2013-QianTSQ #consistency #detection #named #precise #scalability
- Volition: scalable and precise sequential consistency violation detection (XQ, JT, BS, DQ), pp. 535–548.
- ASPLOS-2013-WesterDCFN #concurrent #detection
- Parallelizing data race detection (BW, DD, PMC, JF, SN), pp. 27–38.
- CGO-2013-TanFG #detection #fault #lightweight #source code
- Lightweight fault detection in parallelized programs (LT, MF, RG), p. 11.
- HPDC-2013-HeBTGGMS #detection
- I/O acceleration with pattern detection (JH, JB, AT, GG, GAG, CM, XHS), pp. 25–36.
- HPDC-2013-ZhouTKB #automation #debugging #detection #named #scalability
- WuKong: automatically detecting and localizing bugs that manifest at large system scales (BZ, JT, MK, SB), pp. 131–142.
- LCTES-2013-ChenY #comparison #detection #fault #performance
- Boosting efficiency of fault detection and recovery throughapplication-specific comparison and checkpointing (HC, CY), pp. 13–20.
- PPoPP-2013-CaiZWC #detection #named #parallel #source code #thread
- TeamWork: synchronizing threads globally to detect real deadlocks for multithreaded programs (YC, KZ, SW, WKC), pp. 311–312.
- PPoPP-2013-Chen #algorithm #detection #fault #fault tolerance #named #online
- Online-ABFT: an online algorithm based fault tolerance scheme for soft error detection in iterative methods (ZC), pp. 167–176.
- PPoPP-2013-LifflanderMK #detection #fault tolerance #protocol #termination
- Adoption protocols for fanout-optimal fault-tolerant termination detection (JL, PM, LVK), pp. 13–22.
- PPoPP-2013-ParkSI #concurrent #detection #scalability #source code
- Scalable data race detection for partitioned global address space programs (CSP, KS, CI), pp. 305–306.
- SOSP-2013-KasikciZC #concurrent #crowdsourcing #detection #named
- RaceMob: crowdsourced data race detection (BK, CZ, GC), pp. 406–422.
- CAV-2013-KroeningLW #approximate #c #detection #performance #source code
- Under-Approximating Loops in C Programs for Fast Counterexample Detection (DK, ML, GW), pp. 381–396.
- ICLP-J-2013-CatB #dependence #detection #functional #generative
- Detection and exploitation of functional dependencies for model generation (BdC, MB), pp. 471–485.
- ICST-2013-ChristakisGS #concurrent #detection #erlang #fault #source code #testing
- Systematic Testing for Detecting Concurrency Errors in Erlang Programs (MC, AG, KFS), pp. 154–163.
- ICST-2013-GreilerDS #automation #detection #smell
- Automated Detection of Test Fixture Strategies and Smells (MG, AvD, MADS), pp. 322–331.
- ISSTA-2013-RadoiD #concurrent #detection #java #parallel
- Practical static race detection for Java parallel loops (CR, DD), pp. 178–190.
- SAT-2013-MisraORS #bound #detection #set
- Upper and Lower Bounds for Weak Backdoor Set Detection (NM, SO, VR, SS), pp. 394–402.
- WICSA-ECSA-2012-AstekinS #analysis #clone detection #detection #simulation
- Utilizing Clone Detection for Domain Analysis of Simulation Systems (MA, HS), pp. 287–291.
- ASE-2012-MaigaABSGAA #anti #detection
- Support vector machines for anti-pattern detection (AM, NA, NB, AS, YGG, GA, EA), pp. 278–281.
- ASE-2012-NguyenNNLS #debugging #detection #information retrieval #modelling #topic
- Duplicate bug report detection with a combination of information retrieval and topic modeling (ATN, TTN, TNN, DL, CS), pp. 70–79.
- ASE-2012-NguyenNNNN #detection #embedded #smell #web
- Detection of embedded code smells in dynamic web applications (HVN, HAN, TTN, ATN, TNN), pp. 282–285.
- ASE-2012-ThungLLJRD #debugging #detection #empirical #fault #tool support #what
- To what extent could we detect field defects? an empirical study of false negatives in static bug finding tools (FT, L, DL, LJ, FR, PTD), pp. 50–59.
- ASE-2012-YuanG #approach #clone detection #detection #named #scalability
- Boreas: an accurate and scalable token-based approach to code clone detection (YY, YG), pp. 286–289.
- CASE-2012-Chang #detection #fault #feature model #process #using
- Fault detection for plasma-enhanced chemical vapor deposition process using feature extraction (YJC), pp. 491–496.
- CASE-2012-DinhamF #detection #using
- Weld seam detection using computer vision for robotic Arc Welding (MD, GF), pp. 771–776.
- CASE-2012-IdenP #algorithm #aspect-oriented #detection #functional #safety
- Functional safety aspects of pattern detection algorithms (JI, CIP), pp. 747–752.
- CASE-2012-JungCKM #detection #using
- Collision detection using band designed Disturbance Observer (BjJ, HRC, JK, HM), pp. 1080–1085.
- CASE-2012-KanY #detection
- Dynamic spatiotemporal warping for the detection and location of myocardial infarctions (CK, HY), pp. 1046–1051.
- CASE-2012-KimKS #algorithm #detection #recognition #using
- Hole detection algorithm for square peg-in-hole using force-based shape recognition (YLK, BSK, JBS), pp. 1074–1079.
- CASE-2012-KimSCKY #automation #detection #image
- Image and sensor los-based automatic horizontal line detection and tracking for infrared search and track (SK, MSS, BC, JK, YY), pp. 718–723.
- CASE-2012-KimYSP #detection #using #visual notation
- Window detection for gondola robot using a visual camera (DYK, JY, HS, CWP), pp. 998–1003.
- CASE-2012-WeiZW #detection #recognition #research
- Research on a detection and recognition method of tactile-slip sensation used to control the Elderly-assistant & Walking-assistant Robot (XW, XZ, YW), pp. 1040–1045.
- DAC-2012-CropPC #detection #logic #throughput #using
- Regaining throughput using completion detection for error-resilient, near-threshold logic (JC, RP, PC), pp. 974–979.
- DAC-2012-GuoK #concurrent #detection #encryption #fault #standard
- Invariance-based concurrent error detection for advanced encryption standard (XG, RK), pp. 573–578.
- DAC-2012-HuangHRBK #detection #embedded #fault tolerance #towards
- Towards fault-tolerant embedded systems with imperfect fault detection (JH, KH, AR, CB, AK), pp. 188–196.
- DAC-2012-LinHFHM #debugging #detection #effectiveness #validation
- Quick detection of difficult bugs for effective post-silicon validation (DL, TH, FF, NH, SM), pp. 561–566.
- DAC-2012-YuCSJC #design #detection #using
- Accurate process-hotspot detection using critical design rule extraction (YTY, YCC, SS, IHRJ, CC), pp. 1167–1172.
- DATE-2012-CampagnaV #architecture #detection #fault #hybrid #validation
- An hybrid architecture to detect transient faults in microprocessors: An experimental validation (SC, MV), pp. 1433–1438.
- DATE-2012-LiDT #authentication #detection #framework #hardware #self
- A sensor-assisted self-authentication framework for hardware trojan detection (ML, AD, MT), pp. 1331–1336.
- DATE-2012-MarinissenVGHRMB #detection #process
- EDA solutions to new-defect detection in advanced process technologies (EJM, GV, SKG, FH, JR, NM, SB), pp. 123–128.
- DRR-2012-FengY #component #composition #detection #documentation #using
- Using connected component decomposition to detect straight line segments in documents (XF, AY).
- DRR-2012-Silva #algorithm #detection #evaluation #using
- Using specific evaluation for comparing and combining competing algorithms: applying it to table column detection (ACeS).
- HT-2012-ChakrabortyGG #community #detection #folksonomy
- Detecting overlapping communities in folksonomies (AC, SG, NG), pp. 213–218.
- HT-2012-FlockVS #detection #wiki
- Revisiting reverts: accurate revert detection in wikipedia (FF, DV, ES), pp. 3–12.
- HT-2012-JainHVYS #detection #linked data #open data
- Moving beyond SameAs with PLATO: partonomy detection for linked data (PJ, PH, KV, PZY, APS), pp. 33–42.
- HT-2012-LimD #community #detection #twitter
- Following the follower: detecting communities with common interests on twitter (KHL, AD), pp. 317–318.
- HT-2012-NakajimaZIN #analysis #detection #scalability
- Early detection of buzzwords based on large-scale time-series analysis of blog entries (SN, JZ, YI, RYN), pp. 275–284.
- HT-2012-SofeanS #architecture #design #detection #evaluation #implementation #network #realtime #social #using
- A real-time architecture for detection of diseases using social networks: design, implementation and evaluation (MS, MS), pp. 309–310.
- VLDB-2012-Bidoit-TolluCU #detection #independence #type system #xml
- Type-Based Detection of XML Query-Update Independence (NBT, DC, FU), pp. 872–883.
- VLDB-2012-GraefeK #database #detection
- Definition, Detection, and Recovery of Single-Page Failures, a Fourth Class of Database Failures (GG, HAK), pp. 646–655.
- ITiCSE-2012-PoonSTK #corpus #detection #source code
- Instructor-centric source code plagiarism detection and plagiarism corpus (JYHP, KS, YFT, MYK), pp. 122–127.
- FASE-2012-MahouachiKG #classification #design #detection #fault
- A New Design Defects Classification: Marrying Detection and Correction (RM, MK, KG), pp. 455–470.
- TACAS-2012-SongT #automaton #detection #model checking
- Pushdown Model Checking for Malware Detection (FS, TT), pp. 110–125.
- CSMR-2012-BinunK #design pattern #detection #named
- DPJF — Design Pattern Detection with High Accuracy (AB, GK), pp. 245–254.
- CSMR-2012-DeissenboeckHHW #challenge #detection
- Challenges of the Dynamic Detection of Functionally Similar Code Fragments (FD, LH, BH, SW), pp. 299–308.
- CSMR-2012-FontanaCZ #benchmark #design pattern #detection #metric #named #tool support
- DPB: A Benchmark for Design Pattern Detection Tools (FAF, AC, MZ), pp. 235–244.
- CSMR-2012-KaushikT #case study #comparative #debugging #detection #information retrieval #modelling #performance
- A Comparative Study of the Performance of IR Models on Duplicate Bug Detection (NK, LT), pp. 159–168.
- CSMR-2012-Koschke #clone detection #detection #scalability #using
- Large-Scale Inter-System Clone Detection Using Suffix Trees (RK), pp. 309–318.
- CSMR-2012-NadiH #detection #linux #mining #variability
- Mining Kbuild to Detect Variability Anomalies in Linux (SN, RCH), pp. 107–116.
- ICPC-2012-HauptmannJEJV #clone detection #comprehension #detection #question
- Can clone detection support test comprehension? (BH, MJ, SE, EJ, RV), pp. 209–218.
- ICPC-2012-Keivanloo #clone detection #code search #detection #source code
- Leveraging clone detection for Internet-scale source code search (IK), pp. 277–280.
- ICPC-2012-KeivanlooRR #clone detection #detection #named #semantics
- SeByte: A semantic clone detection tool for intermediate languages (IK, CKR, JR), pp. 247–249.
- ICPC-2012-SajnaniOL #clone detection #detection #parallel #pipes and filters #using
- Parallel code clone detection using MapReduce (HS, JO, CVL), pp. 261–262.
- ICSM-2012-Al-KofahiNNNN #detection #semantics
- Detecting semantic changes in Makefile build code (JMAK, HVN, ATN, TTN, TNN), pp. 150–159.
- ICSM-2012-AlalfiCDSS #clone detection #detection #modelling
- Models are code too: Near-miss clone detection for Simulink models (MHA, JRC, TRD, MS, AS), pp. 295–304.
- ICSM-2012-FadhelKLW #detection #search-based
- Search-based detection of high-level model changes (AbF, MK, PL, MW), pp. 212–221.
- ICSM-2012-HermansPD #detection #smell #spreadsheet
- Detecting code smells in spreadsheet formulas (FH, MP, AvD), pp. 409–418.
- ICSM-2012-HigoK #consistency #detection #how #nondeterminism
- How often do unintended inconsistencies happen? Deriving modification patterns and detecting overlooked code fragments (YH, SK), pp. 222–231.
- ICSM-2012-RamaKVP #detection #source code #version control
- Version history based source code plagiarism detection in proprietary systems (GMR, DK, SAV, SP), pp. 609–612.
- ICSM-2012-TangWZL #detection #maintenance
- Time-leverage point detection for time sensitive software maintenance (ET, LW, JZ, XL), pp. 567–570.
- ICSM-2012-ThungLJ #collaboration #detection
- Detecting similar applications with collaborative tagging (FT, DL, LJ), pp. 600–603.
- ICSM-2012-ZouG #algorithm #automation #case study #detection #industrial #what #why
- An industrial case study of Coman’s automated task detection algorithm: What Worked, What Didn’t, and Why (LZ, MWG), pp. 6–14.
- MSR-2012-Breckel #comparison #database #debugging #detection #fault #mining #scalability
- Error mining: Bug detection through comparison with large code databases (AB), pp. 175–178.
- SCAM-2012-GethersAP #concept #database #dependence #detection
- Combining Conceptual and Domain-Based Couplings to Detect Database and Code Dependencies (MG, AA, DP), pp. 144–153.
- SCAM-2012-MurakamiHHIK #clone detection #detection
- Folding Repeated Instructions for Improving Token-Based Code Clone Detection (HM, KH, YH, HI, SK), pp. 64–73.
- WCRE-2012-Al-OmariKRR #detection #dot-net #programming language
- Detecting Clones Across Microsoft .NET Programming Languages (FAO, IK, CKR, JR), pp. 405–414.
- WCRE-2012-DurfinaKZK #decompiler #detection
- Detection and Recovery of Functions and their Arguments in a Retargetable Decompiler (LD, JK, PZ, BK), pp. 51–60.
- WCRE-2012-GauthierM #data access #detection #performance #php
- Fast Detection of Access Control Vulnerabilities in PHP Applications (FG, EM), pp. 247–256.
- WCRE-2012-HemelK #case study #clone detection #detection #linux #reverse engineering #source code #using #variability
- Reverse Engineering Variability in Source Code Using Clone Detection: A Case Study for Linux Variants of Consumer Electronic Devices (AH, RK), pp. 357–366.
- WCRE-2012-IshiharaHHIK #clone detection #detection #empirical #functional #library #towards
- Inter-Project Functional Clone Detection Toward Building Libraries — An Empirical Study on 13, 000 Projects (TI, KH, YH, HI, SK), pp. 387–391.
- WCRE-2012-JanaN #detection #dynamic analysis #precise #using
- Precise Detection of Uninitialized Variables Using Dynamic Analysis — Extending to Aggregate and Vector Types (AJ, RN), pp. 197–201.
- WCRE-2012-LavoieKMZ #clone detection #detection #nearest neighbour #repository #using
- Inferring Repository File Structure Modifications Using Nearest-Neighbor Clone Detection (TL, FK, EM, YZ), pp. 325–334.
- WCRE-2012-MaigaABSGA #anti #approach #detection #incremental #named
- SMURF: A SVM-based Incremental Anti-pattern Detection Approach (AM, NA, NB, AS, YGG, EA), pp. 466–475.
- PLDI-2012-JinSSSL #comprehension #debugging #detection #performance
- Understanding and detecting real-world performance bugs (GJ, LS, XS, JS, SL), pp. 77–88.
- PLDI-2012-NagarakatteBMM #concurrent #debugging #detection #manycore
- Multicore acceleration of priority-based schedulers for concurrency bug detection (SN, SB, MMKM, MM), pp. 543–554.
- PLDI-2012-PetrovVSD #concurrent #detection #web
- Race detection for web applications (BP, MTV, MS, JD), pp. 251–262.
- PLDI-2012-PradelG #automation #concurrent #detection #precise #safety #thread
- Fully automatic and precise detection of thread safety violations (MP, TRG), pp. 521–530.
- PLDI-2012-RamanZSVY #concurrent #detection #parallel #precise #scalability
- Scalable and precise dynamic datarace detection for structured parallelism (RR, JZ, VS, MTV, EY), pp. 531–542.
- FM-2012-SongT #detection #model checking #performance #using
- Efficient Malware Detection Using Model-Checking (FS, TT), pp. 418–433.
- IFM-2012-HoomanMW #abstraction #detection #fault #industrial #modelling #using
- Early Fault Detection in Industry Using Models at Various Abstraction Levels (JH, AJM, HvW), pp. 268–282.
- IFM-2012-TianBB #behaviour #detection #game studies #multi
- Behaviour-Based Cheat Detection in Multiplayer Games with Event-B (HT, PJB, AGB), pp. 206–220.
- CHI-2012-HollandKT #algorithm #detection #identification #usability #visual notation
- Identifying usability issues via algorithmic detection of excessive visual search (CH, OK, DET), pp. 2943–2952.
- CHI-2012-ViS #design #detection #interactive
- Detecting error-related negativity for interaction design (CV, SS), pp. 493–502.
- CSCW-2012-LiuBS #collaboration #design #detection #product line
- Conflict detection and resolution for product line design in a collaborative decision making environment (X(L, ECB, JES), pp. 1327–1336.
- EDOC-2012-CostaMPA #approach #detection #modelling #rule-based
- A Model-Driven Approach to Situations: Situation Modeling and Rule-Based Situation Detection (PDC, ITM, IP, JPAA), pp. 154–163.
- EDOC-2012-HarrisonBADN #detection #framework #identification
- A Framework for Detecting Malware in Cloud by Identifying Symptoms (KH, BB, STTA, CID, APN), pp. 164–172.
- ICEIS-v3-2012-WangWZLW #detection #modelling #process
- Detecting Infeasible Traces in Process Models (ZW, LW, XZ, YL, JW), pp. 212–217.
- CIKM-2012-AkogluTVF #category theory #detection #performance #reliability
- Fast and reliable anomaly detection in categorical data (LA, HT, JV, CF), pp. 415–424.
- CIKM-2012-BaeJKL #detection #using
- Outlier detection using centrality and center-proximity (DHB, SJ, SWK, ML), pp. 2251–2254.
- CIKM-2012-CaballeroBA #detection #topic
- The generalized dirichlet distribution in enhanced topic detection (KLCE, JB, RA), pp. 773–782.
- CIKM-2012-ComarLSNT #detection #kernel #linear
- Weighted linear kernel with tree transformed features for malware detection (PMC, LL, SS, AN, PNT), pp. 2287–2290.
- CIKM-2012-HuangQYY #algorithm #detection #robust
- Local anomaly descriptor: a robust unsupervised algorithm for anomaly detection based on diffusion space (HH, HQ, SY, DY), pp. 405–414.
- CIKM-2012-LiSD #detection #named #twitter
- Twevent: segment-based event detection from tweets (CL, AS, AD), pp. 155–164.
- CIKM-2012-QahtanZW #detection #estimation #performance
- Efficient estimation of dynamic density functions with an application to outlier detection (AAQ, XZ, SW), pp. 2159–2163.
- CIKM-2012-TangY #detection #named #roadmap #social #social media #statistics #topic
- TUT: a statistical model for detecting trends, topics and user interests in social media (XT, CCY), pp. 972–981.
- CIKM-2012-XiangFWHR #corpus #detection #scalability #topic #twitter
- Detecting offensive tweets via topical feature discovery over a large scale twitter corpus (GX, BF, LW, JIH, CPR), pp. 1980–1984.
- ECIR-2012-BosmaMW #detection #framework #network #social
- A Framework for Unsupervised Spam Detection in Social Networking Sites (MB, EM, WW), pp. 364–375.
- ECIR-2012-PolajnarGA #detection
- Detection of News Feeds Items Appropriate for Children (TP, RG, LA), pp. 63–72.
- ICML-2012-BiessmannPBH #canonical #detection #roadmap #web
- Canonical Trends: Detecting Trend Setters in Web Data (FB, JMP, MLB, AH), p. 170.
- ICML-2012-MalisiewiczSGE #detection #image #retrieval #visual notation
- Exemplar-SVMs for Visual Ob ject Detection, Label Transfer and Image Retrieval (TM, AS, AG, AAE), p. 4.
- ICPR-2012-AjmeraD #analysis #detection #word
- Combining text and prosodic analysis for prominent word detection (JA, ODD), pp. 1534–1537.
- ICPR-2012-BagdanovBLM #detection #multi
- Multi-pose face detection for accurate face logging (ADB, ADB, GL, IM), pp. 2448–2451.
- ICPR-2012-BaiZX #detection #linear #multi
- Multi scale multi structuring element top-hat transform for linear feature detection (XB, FZ, BX), pp. 1920–1923.
- ICPR-2012-BurghoutsS #correlation #detection
- Correlations between 48 human actions improve their detection (GJB, KS), pp. 3815–3818.
- ICPR-2012-ChengLWTCBWS #detection
- Peripapillary atrophy detection by biologically inspired feature (JC, JL, DWKW, NMT, CYlC, MB, TYW, SMS), pp. 53–56.
- ICPR-2012-ChenYZZ #bound #detection #network
- Detecting occlusion boundaries via saliency network (DC, ZY, GZ, NZ), pp. 2569–2572.
- ICPR-2012-CheungP #detection #using
- Salient region detection using local and global saliency (YmC, QP), pp. 210–213.
- ICPR-2012-ChowdhuryBP #detection #using
- Scene text detection using sparse stroke information and MLP (ARC, UB, SKP), pp. 294–297.
- ICPR-2012-DahmBCG #detection #morphism
- Topological features and iterative node elimination for speeding up subgraph isomorphism detection (ND, HB, TC, YG), pp. 1164–1167.
- ICPR-2012-DaiFZ #detection #mining
- Mining sub-categories for object detection (JD, JF, JZ), pp. 3260–3263.
- ICPR-2012-DeshmukhRSL #detection
- Vocalization patterns of dairy animals to detect animal state (OD, NR, YS, SL), pp. 254–257.
- ICPR-2012-DinhLLRD #detection #image #multi
- Training data selection for cancer detection in multispectral endoscopy images (VCD, ML, RL, OR, RPWD), pp. 161–164.
- ICPR-2012-FelhiBT #detection #image
- A skeleton based descriptor for detecting text in real scene images (MF, NB, ST), pp. 282–285.
- ICPR-2012-FengB #concept #detection #image #semantics
- Utilizing co-occurrence patterns for semantic concept detection in images (LF, BB), pp. 2918–2921.
- ICPR-2012-GaoM #analysis #canonical #correlation #detection #kernel #multi #using
- Multi-modality movie scene detection using Kernel Canonical Correlation Analysis (GG, HM), pp. 3074–3077.
- ICPR-2012-GerogiannisNL #detection #image #performance
- Fast and efficient vanishing point detection in indoor images (DG, CN, AL), pp. 3244–3247.
- ICPR-2012-GhianiMR #detection #liveness
- Fingerprint liveness detection by local phase quantization (LG, GLM, FR), pp. 537–540.
- ICPR-2012-GlazerLM #detection
- Feature shift detection (AG, ML, SM), pp. 1383–1386.
- ICPR-2012-Goldstein #algorithm #detection #named
- FastLOF: An Expectation-Maximization based Local Outlier detection algorithm (MG), pp. 2282–2285.
- ICPR-2012-GuermaziVB #detection #image #multi
- Matching of multi-resolution image for remote sensing glacier detection (AG, LV, PB), pp. 3406–3410.
- ICPR-2012-GuR #detection
- Shadow detection via Rayleigh scattering and Mie theory (LG, ARK), pp. 2165–2168.
- ICPR-2012-GuyonBZ #constraints #detection #matrix #rank #robust
- Foreground detection via robust low rank matrix factorization including spatial constraint with Iterative reweighted regression (CG, TB, EHZ), pp. 2805–2808.
- ICPR-2012-HardingHCLC #automation #detection #image
- Automated detection of skeletal muscle twitches from B-mode ultrasound images: An application to motor neuron disease (PJH, EFHT, RC, IL, NC), pp. 2630–2633.
- ICPR-2012-Ho #approach #detection #effectiveness
- An effective vortex detection approach for velocity vector field (SSH), pp. 2643–2646.
- ICPR-2012-HuangA #analysis #detection #perspective
- Saliency detection via divergence analysis: A unified perspective (JBH, NA), pp. 2748–2751.
- ICPR-2012-HuangL #analysis #automation #component #detection #independence
- Automated mitosis detection based on eXclusive Independent Component Analysis (CHH, HKL), pp. 1856–1859.
- ICPR-2012-HuangLW #clustering #detection #incremental
- Incremental support vector clustering with outlier detection (DH, JHL, CDW), pp. 2339–2342.
- ICPR-2012-HuangOSU #detection #framework #multi #recognition
- Scene character detection and recognition based on multiple hypotheses framework (RH, SO, PS, SU), pp. 717–720.
- ICPR-2012-IkemuraF #detection #using
- Human detection by Haar-like filtering using depth information (SI, HF), pp. 813–816.
- ICPR-2012-ItoOWK #detection
- Detection of eyes by circular Hough transform and histogram of gradient (YI, WO, TW, FK), pp. 1795–1798.
- ICPR-2012-JiangES #detection #estimation #integration #performance #robust
- Efficient and robust integration of face detection and head pose estimation (FJ, HKE, BES), pp. 1578–1581.
- ICPR-2012-JiangFZT #detection #random
- Active Shape Model with random forest for facial features detection (WJ, YF, ZZ, YT), pp. 593–596.
- ICPR-2012-KataokaSM #detection #using
- Region of Interest detection using indoor structure and saliency map (KK, KS, MM), pp. 3329–3332.
- ICPR-2012-KennardBS #2d #approach #detection #geometry #using #verification
- Offline signature verification and forgery detection using a 2-D geometric warping approach (DJK, WAB, TWS), pp. 3733–3736.
- ICPR-2012-KhanER #detection #image
- A Gamma-Gaussian mixture model for detection of mitotic cells in breast cancer histopathology images (AMK, HED, NMR), pp. 149–152.
- ICPR-2012-KunchevaF #detection #feature model #multi #streaming
- PCA feature extraction for change detection in multidimensional unlabelled streaming data (LIK, WJF), pp. 1140–1143.
- ICPR-2012-LeeLM #detection #realtime #smarttech
- Real-time staircase detection from a wearable stereo system (YHL, TSL, GGM), pp. 3770–3773.
- ICPR-2012-LePB #detection #navigation #people
- Pedestrian lane detection for assistive navigation of blind people (MCL, SLP, AB), pp. 2594–2597.
- ICPR-2012-LiL #detection
- Scene text detection via stroke width (YL, HL), pp. 681–684.
- ICPR-2012-LiP #detection
- Anomalous tie plate detection for railroad inspection (YL, SP), pp. 3017–3020.
- ICPR-2012-LiuL #analysis #detection #learning #multi
- Unsupervised multi-target trajectory detection, learning and analysis in complicated environments (HL, JL), pp. 3716–3720.
- ICPR-2012-LiuSZWBCT #bound #detection
- Joint shot boundary detection and key frame extraction (XL, MS, LZ, SW, JB, CC, DT), pp. 2565–2568.
- ICPR-2012-MaB #detection #multi
- Multi-view multi-class object detection via exemplar compounding (KM, JBA), pp. 3256–3259.
- ICPR-2012-MadabusiG #detection #image
- Edge detection for facial images under noisy conditions (SM, SVG), pp. 2689–2693.
- ICPR-2012-MaLXS #detection #image #using
- Anomaly detection with spatio-temporal context using depth images (XM, TL, FX, FS), pp. 2590–2593.
- ICPR-2012-MartelliCBTM #detection #paradigm #similarity
- Joining feature-based and similarity-based pattern description paradigms for object detection (SM, MC, LB, DT, VM), pp. 2702–2705.
- ICPR-2012-McCloskeyD #detection #metadata #process #using #video
- Activity detection in the wild using video metadata (SM, PD), pp. 3140–3143.
- ICPR-2012-MinagawaKTH #automation #detection
- A color chart detection method for automatic color correction (AM, YK, HT, YH), pp. 1912–1915.
- ICPR-2012-MinKCK #approach #detection #higher-order #using
- A superpixel MRF approach using high-order likelihood for moving object detection (JM, HK, JC, ISK), pp. 266–269.
- ICPR-2012-MogelmoseTM #comparative #dataset #detection #evaluation #learning
- Learning to detect traffic signs: Comparative evaluation of synthetic and real-world datasets (AM, MMT, TBM), pp. 3452–3455.
- ICPR-2012-NarayanamN #algorithm #community #detection #distributed #game studies #graph #information management #social
- A game theory inspired, decentralized, local information based algorithm for community detection in social graphs (RN, YN), pp. 1072–1075.
- ICPR-2012-NguyenPRPV #detection #multi #segmentation #video
- Multi-modal abnormality detection in video with unknown data segmentation (TVN, DQP, SR, DSP, SV), pp. 1322–1325.
- ICPR-2012-NiigakiSM #detection #using
- Circular object detection based on separability and uniformity of feature distributions using Bhattacharyya Coefficient (HN, JS, MM), pp. 2009–2012.
- ICPR-2012-Ohtsuka #analysis #detection
- Advanced ridge flux analysis for fingerprint minutiae detection (TO), pp. 1225–1228.
- ICPR-2012-PanZXQ #2d #category theory #detection
- Improved generic categorical object detection fusing depth cue with 2D appearance and shape features (HP, YZ, SX, KQ), pp. 1467–1470.
- ICPR-2012-PhamDBR #detection #image #re-engineering
- Accurate junction detection and reconstruction in line-drawing images (TAP, MD, SB, JYR), pp. 693–696.
- ICPR-2012-PhanST #detection #symmetry #using
- Text detection in natural scenes using Gradient Vector Flow-Guided symmetry (TQP, PS, CLT), pp. 3296–3299.
- ICPR-2012-RadwanDG #detection #estimation
- Correcting pose estimation with implicit occlusion detection and rectification (IR, AD, RG), pp. 3496–3499.
- ICPR-2012-RoyG #detection #framework #image #locality #probability
- A probabilistic framework for logo detection and localization in natural scene images (AR, UG), pp. 2051–2054.
- ICPR-2012-RoyH #classification #component #detection #documentation #image #using
- Text detection on camera acquired document images using supervised classification of connected components in wavelet domain (UR, GH), pp. 270–273.
- ICPR-2012-SakaiKMK #detection #robust
- Robust detection of adventitious lung sounds in electronic auscultation signals (TS, MK, SM, SK), pp. 1993–1996.
- ICPR-2012-SanLH #detection
- Constrained-MSER detection of retinal pathology (GLYS, MLL, WH), pp. 2059–2062.
- ICPR-2012-Schmidt-HackenbergYB #detection #image #visual notation
- Visual cortex inspired features for object detection in X-ray images (LSH, MRY, TMB), pp. 2573–2576.
- ICPR-2012-SharmaHN #classification #detection #incremental #learning #performance
- Efficient incremental learning of boosted classifiers for object detection (PS, CH, RN), pp. 3248–3251.
- ICPR-2012-ShaukatGWB #approach #bottom-up #detection #top-down
- Meeting in the Middle: A top-down and bottom-up approach to detect pedestrians (AS, AG, DW, RB), pp. 874–877.
- ICPR-2012-ShiLBH #detection
- Context-driven moving vehicle detection in wide area motion imagery (XS, HL, EB, WH), pp. 2512–2515.
- ICPR-2012-ShinPJB #detection #using
- Moving objects detection using freely moving depth sensing camera (YDS, JHP, GRJ, MB), pp. 1314–1317.
- ICPR-2012-SiddiquieFDD #detection #invariant
- Unsupervised model selection for view-invariant object detection in surveillance environments (BS, RSF, AD, LSD), pp. 3252–3255.
- ICPR-2012-SimoesSW #detection #image #using
- Using local texture maps of brain MR images to detect Mild Cognitive Impairment (RS, CHS, AMvCvW), pp. 153–156.
- ICPR-2012-SjobergKIL #classification #concept #detection #linear #realtime #scalability #visual notation
- Real-time large-scale visual concept detection with linear classifiers (MS, MK, SI, JL), pp. 421–424.
- ICPR-2012-SommerFHG #detection #image
- Learning-based mitotic cell detection in histopathological images (CS, LF, FAH, DG), pp. 2306–2309.
- ICPR-2012-SoranHLS #detection #using
- Tremor detection using motion filtering and SVM (BS, JNH, SIL, LGS), pp. 178–181.
- ICPR-2012-SpampinatoP #detection #performance
- Enhancing object detection performance by integrating motion objectness and perceptual organization (CS, SP), pp. 3640–3643.
- ICPR-2012-SrikanthaSM #approach #detection #image
- An SVD-based approach for ghost detection and removal in high dynamic range images (AS, DS, FM), pp. 380–383.
- ICPR-2012-StrokinaMELK #detection
- Detection of bubbles as Concentric Circular Arrangements (NS, JM, TE, LL, HK), pp. 2655–2659.
- ICPR-2012-TangHW #detection #multi #recognition
- Hand-dorsa vein recognition based on multi-level keypoint detection and local feature matching (YT, DH, YW), pp. 2837–2840.
- ICPR-2012-TangW #detection #semantics
- Semantic Hough Transform based object detection with Partial Least Squares (JT, HW), pp. 3652–3655.
- ICPR-2012-ThanhMNMY #detection #recognition #robust #using
- Inertial-sensor-based walking action recognition using robust step detection and inter-class relationships (TNT, YM, HN, YM, YY), pp. 3811–3814.
- ICPR-2012-TiribuziPVR #detection #framework #kernel #learning #multi
- A Multiple Kernel Learning framework for detecting altered fingerprints (MT, MP, PV, ER), pp. 3402–3405.
- ICPR-2012-Ugurlu #detection #using
- Head posture detection using skin and hair information (YU), pp. 1–4.
- ICPR-2012-VazquezLP #adaptation #detection
- Unsupervised domain adaptation of virtual and real worlds for pedestrian detection (DV, AML, DP), pp. 3492–3495.
- ICPR-2012-VitaladevuniCPN #detection #documentation #image #using
- Detecting near-duplicate document images using interest point matching (SNPV, FC, RP, PN), pp. 347–350.
- ICPR-2012-WakayamaDDIMT #detection #estimation #performance #visual notation
- Estimation of the human performance for pedestrian detectability based on visual search and motion features (MW, DD, KD, II, HM, YT), pp. 1940–1943.
- ICPR-2012-WangBLST #detection #re-engineering
- Detecting discontinuities for surface reconstruction (YW, JB, NL, MS, PT), pp. 2108–2111.
- ICPR-2012-WangCCP #detection #realtime #using
- Real-time smoke detection using texture and color features (YW, TWC, RC, NTP), pp. 1727–1730.
- ICPR-2012-WangGL #detection #image
- A new depth descriptor for pedestrian detection in RGB-D images (NW, XG, JL), pp. 3688–3691.
- ICPR-2012-WangPLQHJ #detection
- Color Maximal-Dissimilarity Pattern for pedestrian detection (QW, JP, GL, LQ, QH, SJ), pp. 1952–1955.
- ICPR-2012-WechtitschFS #detection #fault #robust
- Robust detection of single-frame defects in archived film (SW, HF, PS), pp. 2647–2650.
- ICPR-2012-WeibelDWR #detection #graph #using
- Contrast-enhancing seam detection and blending using graph cuts (TW, CD, DW, RR), pp. 2732–2735.
- ICPR-2012-WidhalmNB #detection #smarttech
- Transport mode detection with realistic Smartphone sensor data (PW, PN, NB), pp. 573–576.
- ICPR-2012-WongLTYLTCW #automation #detection #image
- Detecting the optic cup excavation in retinal fundus images by automatic detection of vessel kinking (DWKW, JL, NMT, FY, BHL, YCT, CYlC, TYW), pp. 73–76.
- ICPR-2012-XiangL #detection #symmetry
- Symmetric object detection based on symmetry and centripetal-SIFT edge descriptor (YX, SL), pp. 1403–1406.
- ICPR-2012-YamashitaTHNH #detection #representation
- Sparse representation of audio features for sputum detection from lung sounds (TY, ST, KH, YN, SH), pp. 2005–2008.
- ICPR-2012-YuYL #detection #image
- Ulcer detection in wireless capsule endoscopy images (LY, PCY, JHL), pp. 45–48.
- ICPR-2012-ZhangL #detection #using
- Arbitrarily oriented text detection using geodesic distances between corners and skeletons (YZ, JL), pp. 1896–1899.
- ICPR-2012-ZhangLC #analysis #detection #multi #novel
- A novel spatial-temporal multi-scale method for detection and analysis of infrared multiple moving objects (TZ, HL, JC), pp. 1884–1887.
- ICPR-2012-ZhangLM12a #adaptation #automation #clustering #detection #fault
- An adaptive unsupervised clustering of pronunciation errors for automatic pronunciation error detection (LZ, HL, LM), pp. 1521–1525.
- ICPR-2012-ZhangLMA #detection #independence #statistics
- A viewpoint-independent statistical method for fall detection (ZZ, WL, VM, VA), pp. 3626–3630.
- ICPR-2012-ZhangRZY #detection #random
- Contour detection via random forest (CZ, XR, YZ, MHY), pp. 2772–2775.
- ICPR-2012-ZhangWBZCZ #detection #feature model
- Object detection via foreground contour feature selection and part-based shape model (HZ, JW, XB, JZ, JC, HZ), pp. 2524–2527.
- ICPR-2012-ZhangWDP #detection #linear
- Skin detection via linear regression tree (JZ, HW, FD, CP), pp. 1711–1714.
- ICPR-2012-ZhangWN #detection #feature model #student
- Bayesian feature selection and model detection for student’s t-mixture distributions (HZ, QMJW, TMN), pp. 1631–1634.
- ICPR-2012-ZhangWSD #approach #detection #effectiveness
- A simple and effective saliency detection approach (HZ, WW, GS, LD), pp. 186–189.
- ICPR-2012-ZhangXY #bound #detection #modelling
- An improved surround suppression model based on orientation contrast for boundary detection (HZ, BX, JY), pp. 3086–3089.
- ICPR-2012-ZhangZHHT #detection #mining #semantics
- Semantic windows mining in sliding window based object detection (JZ, XZ, YH, KH, TT), pp. 3264–3267.
- ICPR-2012-ZhaoL #3d #detection
- Patch based saliency detection method for 3D surface simplification (YZ, YL), pp. 845–848.
- ICPR-2012-ZhaoZWL #detection #graph #mobile #robust
- Robust mobile spamming detection via graph patterns (YZ, ZZ, YW, JL), pp. 983–986.
- ICPR-2012-ZhouLYCL #detection
- Corner-surround Contrast for saliency detection (QZ, NL, YY, PC, WL), pp. 1423–1426.
- KDD-2012-BatalFHMH #detection #mining #multi
- Mining recent temporal patterns for event detection in multivariate time series data (IB, DF, JH, FM, MH), pp. 280–288.
- KDD-2012-DingKBKC #anti #communication #detection #social
- Intrusion as (anti)social communication: characterization and detection (QD, NK, PB, EDK, MC), pp. 886–894.
- KDD-2012-GuptaGSH #community #detection #mining
- Integrating community matching and outlier detection for mining evolutionary community outliers (MG, JG, YS, JH), pp. 859–867.
- KDD-2012-HiraiY #clustering #detection #normalisation #using
- Detecting changes of clustering structures using normalized maximum likelihood coding (SH, KY), pp. 343–351.
- KDD-2012-PhamP #algorithm #approximate #detection
- A near-linear time approximation algorithm for angle-based outlier detection in high-dimensional data (NP, RP), pp. 877–885.
- KDD-2012-XieWLY #bibliography #detection
- Review spam detection via temporal pattern discovery (SX, GW, SL, PSY), pp. 823–831.
- KDD-2012-XingLHCHLLMZ #behaviour #chat #detection #online #scalability #video
- Scalable misbehavior detection in online video chat services (XX, YLL, SH, HC, RH, QL, XL, SM, YZ), pp. 552–560.
- KDD-2012-ZhangY #bound #community #detection #matrix
- Overlapping community detection via bounded nonnegative matrix tri-factorization (YZ, DYY), pp. 606–614.
- KDIR-2012-HaanR #detection
- Detecting Temporally Related Arithmetical Patterns — An Extension of Complex Event Processing (RdH, MR), pp. 329–332.
- KDIR-2012-LemnaruTCP #case study #classification #detection #hybrid #network #problem
- A Hybrid Solution for Imbalanced Classification Problems — Case Study on Network Intrusion Detection (CL, ATV, AC, RP), pp. 348–352.
- KDIR-2012-SantosGSK #behaviour #detection #finite
- Finite Belief Fusion Model for Hidden Source Behavior Change Detection (ESJ, QG, EES, JK), pp. 17–24.
- KEOD-2012-FukumotoST #detection #multi #summary #topic
- Topic and Subject Detection in News Streams for Multi-document Summarization (FF, YS, AT), pp. 166–171.
- MLDM-2012-GlodekSP #detection #process #recognition
- Detecting Actions by Integrating Sequential Symbolic and Sub-symbolic Information in Human Activity Recognition (MG, FS, GP), pp. 394–404.
- MLDM-2012-MaiorcaGC #detection #pattern matching #pattern recognition #recognition
- A Pattern Recognition System for Malicious PDF Files Detection (DM, GG, IC), pp. 510–524.
- MLDM-2012-SyarifZPW #detection
- Application of Bagging, Boosting and Stacking to Intrusion Detection (IS, EZ, APB, GW), pp. 593–602.
- SEKE-2012-GallegosG #detection #tool support
- Tool Support for Anomaly Detection in Scientific Sensor Data (IG, AQG), pp. 678–683.
- SEKE-2012-MireslamiMF #behaviour #detection #distributed
- Detecting Emergent Behavior in Distributed Systems Caused by Overgeneralization (SM, MM, BHF), pp. 70–73.
- SEKE-2012-WangZWZZ #component #detection #online
- Online Anomaly Detection for Components in OSGi-based Software (TW, WZ, JW, JZ, HZ), pp. 188–193.
- SIGIR-2012-AlasiryLP #detection #query
- Detecting candidate named entities in search queries (AA, ML, AP), pp. 1049–1050.
- SIGIR-2012-JiangWLAW #alias #approach #detection #learning #similarity #string #towards
- Towards alias detection without string similarity: an active learning based approach (LJ, JW, PL, NA, MW), pp. 1155–1156.
- SIGIR-2012-Najork #detection #scalability #web
- Detecting quilted web pages at scale (MN), pp. 385–394.
- SIGIR-2012-NishidaHF #classification #detection #probability #twitter #word
- Improving tweet stream classification by detecting changes in word probability (KN, TH, KF), pp. 971–980.
- SIGIR-2012-ZhangWDH #detection #learning #performance #reuse
- Learning hash codes for efficient content reuse detection (QZ, YW, ZD, XH), pp. 405–414.
- MoDELS-2012-FariasGL #aspect-oriented #consistency #detection #empirical #nondeterminism
- Evaluating the Impact of Aspects on Inconsistency Detection Effort: A Controlled Experiment (KF, AG, CJPdL), pp. 219–234.
- MoDELS-2012-JacksonSB #constraints #declarative #detection #fault #specification
- Detecting Specification Errors in Declarative Languages with Constraints (EKJ, WS, NB), pp. 399–414.
- MoDELS-2012-FariasGL #aspect-oriented #consistency #detection #empirical #nondeterminism
- Evaluating the Impact of Aspects on Inconsistency Detection Effort: A Controlled Experiment (KF, AG, CJPdL), pp. 219–234.
- MoDELS-2012-JacksonSB #constraints #declarative #detection #fault #specification
- Detecting Specification Errors in Declarative Languages with Constraints (EKJ, WS, NB), pp. 399–414.
- ECOOP-2012-XuYR #data type #detection #invariant #static analysis
- Static Detection of Loop-Invariant Data Structures (G(X, DY, AR), pp. 738–763.
- OOPSLA-2012-Effinger-DeanLCGB #concurrent #detection #named
- IFRit: interference-free regions for dynamic data-race detection (LED, BL, LC, DG, HJB), pp. 467–484.
- OOPSLA-2012-LucasER #detection #distributed #problem #sequence
- Detecting problematic message sequences and frequencies in distributed systems (CL, SGE, DSR), pp. 915–926.
- TOOLS-EUROPE-2012-OlszakBJV #detection #quantifier
- Detection of Seed Methods for Quantification of Feature Confinement (AO, EB, BNJ, JV), pp. 252–268.
- POPL-2012-SmaragdakisESYF #concurrent #detection #polynomial #predict
- Sound predictive race detection in polynomial time (YS, JE, CS, JY, CF), pp. 387–400.
- RE-2012-FerrariG #detection #using
- Using collective intelligence to detect pragmatic ambiguities (AF, SG), pp. 191–200.
- RE-2012-KnaussDPC #detection #requirements
- Detecting and classifying patterns of requirements clarifications (EK, DD, GPC, JCH), pp. 251–260.
- RE-2012-YangRGWN #automation #detection #natural language #nondeterminism #requirements
- Speculative requirements: Automatic detection of uncertainty in natural language requirements (HY, ANDR, VG, AW, BN), pp. 11–20.
- SAC-2012-ChengZQ #detection #fine-grained #topic
- Fine-grained topic detection in news search results (JC, JZ, SQ), pp. 912–917.
- SAC-2012-MakanjuZML #clustering #composition #detection #identification
- Spatio-temporal decomposition, clustering and identification for alert detection in system logs (AM, ANZH, EEM, ML), pp. 621–628.
- SAC-2012-MannS #android #detection #framework #privacy #static analysis
- A framework for static detection of privacy leaks in android applications (CM, AS), pp. 1457–1462.
- SAC-2012-MoraisC #ad hoc #detection #distributed #network
- A distributed intrusion detection scheme for wireless ad hoc networks (ANPM, ARC), pp. 556–562.
- SAC-2012-OyamaGCSK #detection
- Detecting malware signatures in a thin hypervisor (YO, TTDG, YC, TS, KK), pp. 1807–1814.
- SAC-2012-Pizzuti #algorithm #community #composition #detection #search-based
- Boosting the detection of modular community structure with genetic algorithms and local search (CP), pp. 226–231.
- SAC-2012-SchluterC #correlation #detection #markov #modelling #predict #using
- Hidden markov model-based time series prediction using motifs for detecting inter-time-serial correlations (TS, SC), pp. 158–164.
- FSE-2012-KwonS #component #detection
- Detecting and analyzing insecure component usage (TK, ZS), p. 5.
- ICSE-2012-Blincoe12a #collaboration #coordination #detection #developer #requirements
- Timely detection of Coordination Requirements to support collaboration among software developers (KB), pp. 1601–1603.
- ICSE-2012-CaiC #concurrent #detection #named #scalability
- MagicFuzzer: Scalable deadlock detection for large-scale applications (YC, WKC), pp. 606–616.
- ICSE-2012-GuimaraesS #detection
- Improving early detection of software merge conflicts (MLG, ARS), pp. 342–352.
- ICSE-2012-HermansPD #detection #smell #spreadsheet #visualisation
- Detecting and visualizing inter-worksheet smells in spreadsheets (FH, MP, AvD), pp. 441–451.
- ICSE-2012-McMillanGP #detection
- Detecting similar software applications (CM, MG, DP), pp. 364–374.
- ICSE-2012-MollerS #automation #detection
- Automated detection of client-state manipulation vulnerabilities (AM, MS), pp. 749–759.
- ICSE-2012-NguyenNNN #detection #named #web
- BabelRef: Detection and renaming tool for cross-language program entities in dynamic web applications (HVN, HAN, TTN, TNN), pp. 1391–1394.
- ICSE-2012-PradelG #automation #debugging #detection #generative #mining #specification #testing
- Leveraging test generation and specification mining for automated bug detection without false positives (MP, TRG), pp. 288–298.
- ICSE-2012-RoehmM #automation #detection #developer #development #problem #process
- Automatically detecting developer activities and problems in software development work (TR, WM), pp. 1261–1264.
- ICSE-2012-SiegmundKKABRS #automation #detection #performance #predict
- Predicting performance via automated feature-interaction detection (NS, SSK, CK, SA, DSB, MR, GS), pp. 167–177.
- ICSE-2012-SongT12a #debugging #detection #metadata #on the fly
- Detecting metadata bugs on the fly (MS, ET), pp. 1455–1456.
- ICSE-2012-ZhengZ #detection #problem #static analysis
- Static detection of resource contention problems in server-side scripts (YZ, XZ), pp. 584–594.
- CC-2012-KwonS #component #detection #static analysis
- Static Detection of Unsafe Component Loadings (TK, ZS), pp. 122–143.
- CGO-2012-ZouR #detection #parallel #source code
- Scan detection and parallelization in “inherently sequential” nested loop programs (YZ, SVR), pp. 74–83.
- PPoPP-2012-HoeflerS #detection #optimisation
- Communication-centric optimizations by dynamically detecting collective operations (TH, TS), pp. 305–306.
- CAV-2012-ArltS #detection #java #named
- Joogie: Infeasible Code Detection for Java (SA, MS), pp. 767–773.
- CAV-2012-AtigBEL #detection #parallel #source code #thread
- Detecting Fair Non-termination in Multithreaded Programs (MFA, AB, ME, AL), pp. 210–226.
- ICST-2012-ChoudharyPO #crawling #detection #difference #named #web
- CrossCheck: Combining Crawling and Differencing to Better Detect Cross-browser Incompatibilities in Web Applications (SRC, MRP, AO), pp. 171–180.
- ICST-2012-DucheneGRR #detection #fuzzing #model inference #using
- XSS Vulnerability Detection Using Model Inference Assisted Evolutionary Fuzzing (FD, RG, SR, JLR), pp. 815–817.
- ICST-2012-Nguyen #comprehension #detection #performance #scalability #using
- Using Control Charts for Detecting and Understanding Performance Regressions in Large Software (THDN), pp. 491–494.
- ICST-2012-TanMTL #consistency #detection #nondeterminism #testing
- @tComment: Testing Javadoc Comments to Detect Comment-Code Inconsistencies (SHT, DM, LT, GTL), pp. 260–269.
- ICTSS-2012-SantosA #automation #detection #fault #lightweight #monitoring
- Lightweight Automatic Error Detection by Monitoring Collar Variables (JS, RA), pp. 215–230.
- ISSTA-2012-AlshahwanH #detection #fault #testing #web
- State aware test case regeneration for improving web application test suite coverage and fault detection (NA, MH), pp. 45–55.
- ISSTA-2012-CaballeroGMN #detection #named #pointer
- Undangle: early detection of dangling pointers in use-after-free and double-free vulnerabilities (JC, GG, MM, AN), pp. 133–143.
- ISSTA-2012-CanaliLBKCK #detection
- A quantitative study of accuracy in system call-based malware detection (DC, AL, DB, CK, MC, EK), pp. 122–132.
- ISSTA-2012-LiRCS #debugging #detection #precise #predict
- Residual investigation: predictive and precise bug detection (KL, CR, CC, YS), pp. 298–308.
- ISSTA-2012-PradelHG #detection #parametricity #static analysis #type system
- Static detection of brittle parameter typing (MP, SH, TRG), pp. 265–275.
- ISSTA-2012-SuiYX #analysis #detection #memory management #using
- Static memory leak detection using full-sparse value-flow analysis (YS, DY, JX), pp. 254–264.
- ISSTA-2012-TombF #analysis #consistency #detection #nondeterminism #reachability
- Detecting inconsistencies via universal reachability analysis (AT, CF), pp. 287–297.
- ISSTA-2012-ZhangJWLZ #algorithm #detection #towards
- A first step towards algorithm plagiarism detection (FZ, YcJ, DW, PL, SZ), pp. 111–121.
- QoSA-ISARCS-2011-DettenB #clustering #component #detection #re-engineering
- Combining clustering and pattern detection for the reengineering of component-based software systems (MvD, SB), pp. 23–32.
- ASE-2011-ApelSWRB #detection #feature model #interactive #using #verification
- Detection of feature interactions using feature-aware verification (SA, HS, PW, AvR, DB), pp. 372–375.
- ASE-2011-Haiduc #automation #concept #detection #quality #query
- Automatically detecting the quality of the query and its implications in IR-based concept location (SH), pp. 637–640.
- ASE-2011-RasoolM #design pattern #detection #flexibility
- Flexible design pattern detection based on feature types (GR, PM), pp. 243–252.
- ASE-2011-YuTN #detection #source code #specification
- Specifying and detecting meaningful changes in programs (YY, TTT, BN), pp. 273–282.
- CASE-2011-BroderickAT #detection #formal method #industrial
- Anomaly detection without a pre-existing formal model: Application to an industrial manufacturing system (JAB, LVA, DMT), pp. 169–174.
- CASE-2011-ColP #detection #performance #recursion
- Fast and accurate object detection by means of recursive monomial feature elimination and cascade of SVM (LDC, FAP), pp. 304–309.
- CASE-2011-JasperF #detection #performance
- Fast focus-based depth detection for manipulation in scanning electron microscopes (DJ, SF), pp. 375–380.
- CASE-2011-RatnakarZ #detection #using
- An ultrasound system for tumor detection in soft tissues using low transient pulse (ARR, MZ), pp. 684–689.
- CASE-2011-SenoussiCDZ #detection #fault #feature model #process
- Feature selection for fault detection systems: Application to the Tennessee Eastman Process (HS, BCM, MD, NZ), pp. 189–194.
- CASE-2011-SunLOS #detection #energy #fault
- Building energy doctors: SPC and Kalman filter-based fault detection (BS, PBL, ZO, FS), pp. 333–340.
- CASE-2011-WanY #detection #fault
- Fault detection of networked control systems utilizing limited possibilities of unknown packet transmission (YW, HY), pp. 619–624.
- DAC-2011-DingGYP #detection #learning #named
- AENEID: a generic lithography-friendly detailed router based on post-RET data learning and hotspot detection (DD, JRG, KY, DZP), pp. 795–800.
- DAC-2011-LifaEP #configuration management #detection #fault #optimisation #performance
- Performance optimization of error detection based on speculative reconfiguration (AAL, PE, ZP), pp. 369–374.
- DAC-2011-SorgenfreiS #detection #using
- Single-molecule electronic detection using nanoscale field-effect devices (SS, KLS), pp. 712–717.
- DAC-2011-YangBC #detection #embedded #energy #fault #using
- Energy-efficient MIMO detection using unequal error protection for embedded joint decoding system (YSY, PB, GC), pp. 579–584.
- DAC-2011-ZhangDWT #composition #detection #self
- Self-aligned double patterning decomposition for overlay minimization and hot spot detection (HZ, YD, MDFW, ROT), pp. 71–76.
- DATE-2011-Al-DujailyMXYP #concurrent #detection #network #runtime #transitive #using
- Run-time deadlock detection in networks-on-chip using coupled transitive closure networks (RAD, TSTM, FX, AY, MP), pp. 497–502.
- DATE-2011-GizopoulosPARHSMBV #architecture #detection #fault #manycore #online
- Architectures for online error detection and recovery in multicore processors (DG, MP, SVA, PR, SKSH, DJS, AM, AB, XV), pp. 533–538.
- DATE-2011-KaraklajicFSV #detection #fault #low cost #using
- Low-cost fault detection method for ECC using Montgomery powering ladder (DK, JF, JMS, IV), pp. 1016–1021.
- DATE-2011-KyrkouTT #detection #hardware
- Depth-directed hardware object detection (CK, CT, TT), pp. 1442–1447.
- DATE-2011-MaW #detection #fault #low cost #named
- LOEDAR: A low cost error detection and recovery scheme for ECC (KM, KW), pp. 1010–1015.
- DATE-2011-MedwedM #detection #fault #logic
- Arithmetic logic units with high error detection rates to counteract fault attacks (MM, SM), pp. 1644–1649.
- DATE-2011-PalframanKL #detection #fault #low cost
- Time redundant parity for low-cost transient error detection (DJP, NSK, MHL), pp. 52–57.
- DATE-2011-ZhangT #detection #hardware #named #network
- RON: An on-chip ring oscillator network for hardware Trojan detection (XZ, MT), pp. 1638–1643.
- DocEng-2011-GippM #algorithm #detection #pattern matching #sequence
- Citation pattern matching algorithms for citation-based plagiarism detection: greedy citation tiling, citation chunking and longest common citation sequence (BG, NM), pp. 249–258.
- DocEng-2011-KarolNKAM #adaptation #aspect-oriented #detection #multi #xml
- Detecting and resolving conflicts between adaptation aspects in multi-staged XML transformations (SK, MN, DK, UA, KM), pp. 229–238.
- DRR-2011-KavallieratouLC #detection
- Ruling line detection and removal (EK, DPL, JC), pp. 1–10.
- DRR-2011-LiuZ11a #detection #documentation #effectiveness
- A simple and effective figure caption detection system for old-style documents (ZL, HZ), pp. 1–10.
- HT-2011-StewartSN #approach #detection #social #social media
- A transfer approach to detecting disease reporting events in blog social media (AS, MS, WN), pp. 271–280.
- ICDAR-2011-ChenL #detection #documentation
- Table Detection in Noisy Off-line Handwritten Documents (JC, DPL), pp. 399–403.
- ICDAR-2011-ChenL11a #algorithm #detection #documentation #modelling
- A Model-Based Ruling Line Detection Algorithm for Noisy Handwritten Documents (JC, DPL), pp. 404–408.
- ICDAR-2011-CoatesCCSSWWN #detection #image #learning #recognition
- Text Detection and Character Recognition in Scene Images with Unsupervised Feature Learning (AC, BC, CC, SS, BS, TW, DJW, AYN), pp. 440–445.
- ICDAR-2011-DuAL #detection #performance
- Dot Text Detection Based on FAST Points (YD, HA, SL), pp. 435–439.
- ICDAR-2011-FangGBQTT #detection #documentation #multi #visual notation
- A Table Detection Method for Multipage PDF Documents via Visual Seperators and Tabular Structures (JF, LG, KB, RQ, XT, ZT), pp. 779–783.
- ICDAR-2011-GhoshC #detection #identification #image
- Composite Script Identification and Orientation Detection for Indian Text Images (SG, BBC), pp. 294–298.
- ICDAR-2011-GleichmanOGMBP #alias #detection #image #segmentation
- Detection and Segmentation of Antialiased Text in Screen Images (SG, BO, AG, MM, EB, EP), pp. 424–428.
- ICDAR-2011-KunishigeFU #detection
- Scenery Character Detection with Environmental Context (YK, YF, SU), pp. 1049–1053.
- ICDAR-2011-LeeLLYK #detection
- AdaBoost for Text Detection in Natural Scene (JJL, PHL, SWL, ALY, CK), pp. 429–434.
- ICDAR-2011-LiuLZL #detection #image #novel
- A Novel Italic Detection and Rectification Method for Chinese Advertising Images (JL, HL, SZ, WL), pp. 698–702.
- ICDAR-2011-MicenkovaB #detection #documentation #image
- Stamp Detection in Color Document Images (BM, JvB), pp. 1125–1129.
- ICDAR-2011-PanZSN11a #adaptation #detection #segmentation #verification
- Improving Scene Text Detection by Scale-Adaptive Segmentation and Weighted CRF Verification (YFP, YZ, JS, SN), pp. 759–763.
- ICDAR-2011-PapandreouG #detection #novel
- A Novel Skew Detection Technique Based on Vertical Projections (AP, BG), pp. 384–388.
- ICDAR-2011-PhamDB #detection
- A Contour-Based Method for Logo Detection (TAP, MD, SB), pp. 718–722.
- ICDAR-2011-UchidaSKF #approach #detection #towards
- A Keypoint-Based Approach toward Scenery Character Detection (SU, YS, YK, YF), pp. 819–823.
- ICDAR-2011-WeberLSSSD #detection #evaluation #interface #multi #online
- MCS for Online Mode Detection: Evaluation on Pen-Enabled Multi-touch Interfaces (MW, ML, YTHS, CS, FS, AD), pp. 957–961.
- ICDAR-2011-YinHSN #detection #documentation #robust
- Robust Vanishing Point Detection for MobileCam-Based Documents (XCY, HWH, JS, SN), pp. 136–140.
- ICDAR-2011-YiT #detection #image #word
- Text Detection in Natural Scene Images by Stroke Gabor Words (CY, YT), pp. 177–181.
- ICDAR-2011-YouADGT #detection #using
- Detecting Figure-Panel Labels in Medical Journal Articles Using MRF (DY, SA, DDF, VG, GRT), pp. 967–971.
- ICDAR-2011-ZhaoLL #detection #independence #robust
- A Robust Color-Independent Text Detection Method from Complex Videos (YZ, TL, WL), pp. 374–378.
- SIGMOD-2011-AlvanakiMRW #detection #named #topic #web
- EnBlogue: emergent topic detection in web 2.0 streams (FA, SM, KR, GW), pp. 1271–1274.
- SIGMOD-2011-DongS #detection #scalability
- Large-scale copy detection (XLD, DS), pp. 1205–1208.
- VLDB-2011-BorisovB #approach #declarative #detection #towards
- Proactive Detection and Repair of Data Corruption: Towards a Hassle-free Declarative Approach with Amulet (NB, SB), pp. 1403–1408.
- VLDB-2011-JinLLH #data mining #detection #named #network #social #social media
- SocialSpamGuard: A Data Mining-Based Spam Detection System for Social Media Networks (XJ, CXL, JL, JH), pp. 1458–1461.
- VLDB-2011-KaushikR #detection #named
- Whodunit: An Auditing Tool for Detecting Data Breaches (RK, RR), pp. 1410–1413.
- FASE-2011-KessentiniSBW #design #detection #fault #search-based
- Search-Based Design Defects Detection by Example (MK, HAS, MB, MW), pp. 401–415.
- FASE-2011-LiT #clone detection #detection #erlang #incremental #source code
- Incremental Clone Detection and Elimination for Erlang Programs (HL, SJT), pp. 356–370.
- SCAM-J-2009-TiarksKF11 #assessment #detection #state of the art #tool support
- An extended assessment of type-3 clones as detected by state-of-the-art tools (RT, RK, RF), pp. 295–331.
- CSMR-2011-FreyH #architecture #constraints #detection #legacy #migration
- An Extensible Architecture for Detecting Violations of a Cloud Environment’s Constraints during Legacy Software System Migration (SF, WH), pp. 269–278.
- CSMR-2011-HigoK #clone detection #dependence #detection #heuristic
- Code Clone Detection on Specialized PDGs with Heuristics (YH, SK), pp. 75–84.
- CSMR-2011-KessentiniSBW #design #detection #fault #generative #music
- Design Defect Detection Rules Generation: A Music Metaphor (MK, HAS, MB, MW), pp. 241–248.
- ICPC-2011-Cordy #clone detection #detection #incremental #scalability #similarity #using
- Exploring Large-Scale System Similarity Using Incremental Clone Detection and Live Scatterplots (JRC), pp. 151–160.
- ICPC-2011-HuangW #detection #monitoring #process
- Anomaly Detection by Monitoring Filesystem Activities (LH, KW), pp. 221–222.
- ICPC-2011-KessentiniKSBO #design #detection #fault
- Design Defects Detection and Correction by Example (MK, WK, HAS, MB, AO), pp. 81–90.
- ICSM-2011-JiresalCN #cobol #detection #precise #scalability #source code
- Precise detection of un-initialized variables in large, real-life COBOL programs in presence of unrealizable paths (RJ, AC, RN), pp. 448–456.
- ICSM-2011-KuhnK #combinator #detection #fault #testing
- Practical combinatorial (t-way) methods for detecting complex faults in regression testing (RK, RK), p. 599.
- ICSM-2011-Roover #detection #logic #metaprogramming #object-oriented #source code
- A logic meta-programming foundation for example-driven pattern detection in object-oriented programs (CDR), pp. 556–561.
- ICSM-2011-SunKZ #api #detection #graph #library
- Graph-based detection of library API imitations (CS, SCK, SJZ), pp. 183–192.
- MSR-2011-BiegelSHDD #comparison #detection #metric #refactoring #similarity
- Comparison of similarity metrics for refactoring detection (BB, QDS, WH, SD, SD), pp. 53–62.
- MSR-2011-HemelKVD #clone detection #detection
- Finding software license violations through binary code clone detection (AH, KTK, RV, ED), pp. 63–72.
- MSR-2011-Zhou #debugging #detection #problem
- Connecting technology with real-world problems — from copy-paste detection to detecting known bugs: (keynote abstract) (YZ), p. 2.
- PASTE-2011-Detten #behaviour #detection #execution #generative #symbolic computation #towards
- Towards systematic, comprehensive trace generation for behavioral pattern detection through symbolic execution (MvD), pp. 17–20.
- WCRE-2011-HigoUNK #approach #clone detection #detection #incremental
- Incremental Code Clone Detection: A PDG-based Approach (YH, YU, MN, SK), pp. 3–12.
- WCRE-2011-UddinRSH #detection #effectiveness #on the #scalability
- On the Effectiveness of Simhash for Detecting Near-Miss Clones in Large Scale Software Systems (MSU, CKR, KAS, AH), pp. 13–22.
- PLDI-2011-SrivastavaBMS #api #detection #implementation #multi #policy #security #using
- A security policy oracle: detecting security holes using multiple API implementations (VS, MDB, KSM, VS), pp. 343–354.
- CIAA-2011-FelscherT #composition #detection
- Compositional Failure Detection in Structured Transition Systems (IF, WT), pp. 130–141.
- CHI-2011-KarueiMFMKE #detection #mobile
- Detecting vibrations across the body in mobile contexts (IK, KEM, ZFF, RM, SK, MEZ), pp. 3267–3276.
- CHI-2011-KoZ #detection #feedback #web
- Feedlack detects missing feedback in web applications (AJK, XZ), pp. 2177–2186.
- DUXU-v2-2011-TamirKMVLJ #detection #usability
- Detection of Software Usability Deficiencies (DET, OVK, CJM, DKDV, GRL, AMJ), pp. 527–536.
- HCI-DDA-2011-MiyazakiNI #detection #image
- A Detection Method of Basic Mouth Shapes from Japanese Utterance Images (TM, TN, NI), pp. 608–617.
- HCI-DDA-2011-ZaragozaRBBMCR #detection
- A User-Friendly Tool for Detecting the Stress Level in a Person’s Daily Life (IZ, BR, CB, RMB, IM, DC, MAR), pp. 423–431.
- HCI-ITE-2011-AbeOO #analysis #detection #image
- Eye-gaze Detection by Image Analysis under Natural Light (KA, SO, MO), pp. 176–184.
- HCI-ITE-2011-KimRH #detection #multi #recognition
- A Method of Multiple Odors Detection and Recognition (DKK, YWR, KSH), pp. 464–473.
- HCI-MIIE-2011-CostaFVCBH #detection #navigation #people #visual notation
- Landmarks Detection to Assist the Navigation of Visually Impaired People (PC, HF, VV, PC, JB, LJH), pp. 293–300.
- HCI-MIIE-2011-OehlSTHP #approach #detection #human-computer #interactive
- Improving Human-Machine Interaction — A Non Invasive Approach to Detect Emotions in Car Drivers (MO, FWS, TKT, RH, HRP), pp. 577–585.
- HIMI-v1-2011-TogawaKY #communication #detection #network #peer-to-peer #using #visualisation
- Peer-to-Peer File Sharing Communication Detection Using Spherical SOM Visualization for Network Management (ST, KK, YY), pp. 259–267.
- AdaEurope-2011-RazaFP #detection #fault #parallel #source code
- Detecting High-Level Synchronization Errors in Parallel Programs (SAR, SF, EP), pp. 17–30.
- ICEIS-v2-2011-BaiW #detection #fuzzy #identification #multi
- Applying Fuzzy Multiple Criteria Decision Making to Evaluate and Identify Optimal Explosive Detection Equipments (YB, DW), pp. 118–124.
- CIKM-2011-AnderkaSL #classification #detection #problem #quality
- Detection of text quality flaws as a one-class classification problem (MA, BS, NL), pp. 2313–2316.
- CIKM-2011-BingLG #detection #segmentation #towards
- Towards a unified solution: data record region detection and segmentation (LB, WL, YG), pp. 1265–1274.
- CIKM-2011-DavisLMR #detection #graph
- Detecting anomalies in graphs with numeric labels (MD, WL, PCM, GR), pp. 1197–1202.
- CIKM-2011-HagenSR #detection #query
- Query session detection as a cascade (MH, BS, TR), pp. 147–152.
- CIKM-2011-KasiviswanathanMBS #detection #learning #taxonomy #topic #using
- Emerging topic detection using dictionary learning (SPK, PM, AB, VS), pp. 745–754.
- CIKM-2011-LeeCCS #detection #social #social media
- Content-driven detection of campaigns in social media (KL, JC, ZC, DZS), pp. 551–556.
- CIKM-2011-LeitaoC #detection #optimisation
- Duplicate detection through structure optimization (LL, PC), pp. 443–452.
- CIKM-2011-ParkL #data type #detection #evaluation #query
- A continuous query evaluation scheme for a detection-only query over data streams (HKP, WSL), pp. 2405–2408.
- CIKM-2011-PillutlaRBSJ #detection #distributed
- LSH based outlier detection and its application in distributed setting (MRP, NR, PB, KS, CVJ), pp. 2289–2292.
- CIKM-2011-ShiYCYW #community #detection #multi #on the
- On selection of objective functions in multi-objective community detection (CS, PSY, YC, ZY, BW), pp. 2301–2304.
- CIKM-2011-SoodL #detection #probability #using
- Probabilistic near-duplicate detection using simhash (SS, DL), pp. 1117–1126.
- CIKM-2011-Stamatatos #detection
- Plagiarism detection based on structural information (ES), pp. 1221–1230.
- CIKM-2011-VarolCAK #corpus #detection #named
- CoDet: sentence-based containment detection in news corpora (EV, FC, CA, OK), pp. 2049–2052.
- CIKM-2011-WatanabeOOO #detection #microblog #named #realtime
- Jasmine: a real-time local-event detection system based on geolocation information propagated to microblogs (KW, MO, MO, RO), pp. 2541–2544.
- CIKM-2011-YalnizCM #detection #scalability
- Partial duplicate detection for large book collections (IZY, EFC, RM), pp. 469–474.
- CIKM-2011-ZhangYCT #detection
- A machine-learned proactive moderation system for auction fraud detection (LZ, JY, WC, BLT), pp. 2501–2504.
- KDD-2011-BhaduriMG #algorithm #detection
- Algorithms for speeding up distance-based outlier detection (KB, BLM, CG), pp. 859–867.
- KDD-2011-ChattopadhyayYPFD #adaptation #detection #multi
- Multi-source domain adaptation and its application to early detection of fatigue (RC, JY, SP, WF, ID), pp. 717–725.
- KDD-2011-ChenRT #adaptation #detection #incremental #learning
- Detecting bots via incremental LS-SVM learning with dynamic feature adaptation (FC, SR, PNT), pp. 386–394.
- KDD-2011-GabburPFT #approach #detection
- A pattern discovery approach to retail fraud detection (PG, SP, QF, HT), pp. 307–315.
- KDD-2011-GhaniK #detection #fault #interactive #learning
- Interactive learning for efficiently detecting errors in insurance claims (RG, MK), pp. 325–333.
- KDD-2011-KaufmanRP #data mining #detection #mining
- Leakage in data mining: formulation, detection, and avoidance (SK, SR, CP), pp. 556–563.
- KDD-2011-LiL #behaviour #community #detection #framework #generative #modelling #network #simulation #social
- Social flocks: a crowd simulation framework for social network generation, community detection, and collective behavior modeling (CTL, SDL), pp. 765–768.
- KDD-2011-SculleyOPSHZ #detection
- Detecting adversarial advertisements in the wild (DS, MEO, MP, BS, JH, YZ), pp. 274–282.
- KDD-2011-YeLZZTGA #detection
- Combining file content and file relations for cloud based malware detection (YY, TL, SZ, WZ, ET, UG, MA), pp. 222–230.
- KDIR-2011-GeraciM #algorithm #detection #multi #web
- A Multi-sequence Alignment Algorithm for Web Template Detection (FG, MM), pp. 121–128.
- KDIR-2011-MallJP #correlation #detection
- Detecting Correlations between Hot Days in News Feeds (RM, NJ, VP), pp. 375–378.
- KDIR-2011-MartelotH #algorithm #community #detection #multi #optimisation #using
- Multi-scale Community Detection using Stability as Optimisation Criterion in a Greedy Algorithm (ELM, CH), pp. 216–225.
- KEOD-2011-HmidaCBN #3d #approach #detection #ontology #semantics
- From 3D Point Clouds to Semantic Objects — An Ontology-based Detection Approach (HBH, CC, FB, CN), pp. 255–260.
- MLDM-2011-AlshukriCZ #bound #detection #incremental #random #using
- Incremental Web-Site Boundary Detection Using Random Walks (AA, FC, MZ), pp. 414–427.
- MLDM-2011-ChenHCS #detection #email #similarity
- Authorship Similarity Detection from Email Messages (XC, PH, RC, KPS), pp. 375–386.
- MLDM-2011-HaoCCCS #adaptation #detection #email #modelling
- Adaptive Context Modeling for Deception Detection in Emails (PH, XC, NC, RC, KPS), pp. 458–468.
- MLDM-2011-PerezR #array #detection #using
- Detection of Phenotypes in Microarray Data Using Force- Directed Placement Transformss (DVP, KAR), pp. 320–334.
- MLDM-2011-SahaDR #community #detection #network
- Detection of Communities and Bridges in Weighted Networks (TS, CD, HR), pp. 584–598.
- MLDM-2011-WuW #category theory #detection
- Parameter-Free Anomaly Detection for Categorical Data (SW, SW), pp. 112–126.
- RecSys-2011-WuCMW #detection #learning #named
- Semi-SAD: applying semi-supervised learning to shilling attack detection (ZW, JC, BM, YW), pp. 289–292.
- SEKE-2011-BragaD #detection #information management #tool support #using
- Fraud Detection in Selection Exams Using Knowledge Engineering Tools (MdMB, MARD), pp. 163–168.
- SEKE-2011-BudiLLJW #architecture #automation #design #detection
- Automated Detection of Likely Design Flaws in N-Tier Architectures (AB, L, DL, LJ, SW), pp. 613–618.
- SEKE-2011-MoserWHB #analysis #automation #detection #empirical #requirements #semantics
- Automating the Detection of Complex Semantic Conflicts between Software Requirements (An empirical study on requirements conflict analysis with semantic technology) (TM, DW, MH, SB), pp. 729–735.
- SEKE-2011-SunHGZWY #detection #novel #petri net #using
- A Novel Method for Formally Detecting RFID Event Using Petri Nets (JS, YH, XG, SZ, LW, CYY), pp. 122–125.
- SEKE-2011-ZhangSSCM #design pattern #detection
- Detecting Architecture Erosion by Design Decision of Architectural Pattern (LZ, YS, HS, FC, HM), pp. 758–763.
- SIGIR-2011-AktolgaRA #detection
- Detecting outlier sections in us congressional legislation (EA, IR, YA), pp. 235–244.
- SIGIR-2011-AminiU #automation #detection #learning #multi #summary
- Transductive learning over automatically detected themes for multi-document summarization (MRA, NU), pp. 1193–1194.
- SIGIR-2011-GuoYA #detection #interactive #mobile
- Detecting success in mobile search from interaction (QG, SY, EA), pp. 1229–1230.
- SIGIR-2011-JijkounR #detection
- Bootstrapping subjectivity detection (VJ, MdR), pp. 1125–1126.
- SIGIR-2011-Shokouhi #analysis #detection #query
- Detecting seasonal queries by time-series analysis (MS), pp. 1171–1172.
- BX-2011-Boronat #consistency #detection #maude #modelling #nondeterminism #specification #using
- Inconsistency detection and resolution in heterogenous model-based specifications using Maude (AB), p. 53.
- ECMFA-2011-BarrettCB #detection
- Table-Driven Detection and Resolution of Operation-Based Merge Conflicts with Mirador (SB, PC, GB), pp. 329–344.
- ECMFA-2011-NoirDESB #case study #consistency #detection #experience #nondeterminism #representation
- Operation Based Model Representation: Experiences on Inconsistency Detection (JLN, OD, DE, MAAdS, XB), pp. 85–96.
- MoDELS-2011-Al-BatranSH #clone detection #detection #development #embedded #modelling #semantics
- Semantic Clone Detection for Model-Based Development of Embedded Systems (BAB, BS, BH), pp. 258–272.
- MoDELS-2011-JensenCGN #behaviour #detection
- A Toolchain for the Detection of Structural and Behavioral Latent System Properties (ACJ, BHCC, HG, ECN), pp. 683–698.
- MoDELS-2011-Al-BatranSH #clone detection #detection #development #embedded #modelling #semantics
- Semantic Clone Detection for Model-Based Development of Embedded Systems (BAB, BS, BH), pp. 258–272.
- MoDELS-2011-JensenCGN #behaviour #detection
- A Toolchain for the Detection of Structural and Behavioral Latent System Properties (ACJ, BHCC, HG, ECN), pp. 683–698.
- ECOOP-2011-CarbinMKR #detection #infinity
- Detecting and Escaping Infinite Loops with Jolt (MC, SM, MK, MCR), pp. 609–633.
- OOPSLA-2011-JovicAH #debugging #detection #performance
- Catch me if you can: performance bug detection in the wild (MJ, AA, MH), pp. 155–170.
- OOPSLA-2011-LiSD #analysis #concurrent #detection #named
- SOS: saving time in dynamic race detection with stationary analysis (DL, WSa, MBD), pp. 35–50.
- OOPSLA-2011-LiuB #automation #detection #named #precise
- SHERIFF: precise detection and automatic mitigation of false sharing (TL, EDB), pp. 3–18.
- LOPSTR-2011-DandoisV #detection #how #logic programming #source code
- Clones in Logic Programs and How to Detect Them (CD, WV), pp. 90–105.
- PADL-2011-ChristakisS #detection #fault #message passing #static analysis #using
- Detection of Asynchronous Message Passing Errors Using Static Analysis (MC, KFS), pp. 5–18.
- PADL-2011-SalgueiroDBA #constraints #detection #using
- Using Constraints for Intrusion Detection: The NeMODe System (PDS, DD, IB, SA), pp. 115–129.
- SAC-2011-BhaskaranNFG #behaviour #detection #learning #online
- Deceit detection via online behavioral learning (NB, IN, MGF, VG), pp. 29–30.
- SAC-2011-FontesNPC #architecture #detection #learning #problem
- An agent-based architecture for supporting the workgroups creation and the detection of out-of-context conversation on problem-based learning in virtual learning environments (LMdOF, FMMN, AÁAP, GALdC), pp. 1175–1180.
- SAC-2011-HuangH #detection #markov #multi #semantics
- Semantic event detection in baseball videos based on a multi-output hidden Markov model (YFH, JJH), pp. 929–936.
- SAC-2011-KaoYYC #detection
- A location-aware rogue AP detection system based on wireless packet sniffing of sensor APs (KFK, THY, WSY, HHC), pp. 32–36.
- SAC-2011-Mammar #approach #bibliography #c #detection
- An overview of a proof-based approach to detecting C vulnerabilities (AM), pp. 1343–1344.
- SAC-2011-WangZ #detection #performance #web
- High-speed web attack detection through extracting exemplars from HTTP traffic (WW, XZ), pp. 1538–1543.
- SAC-2011-ZhangZZZX #detection #learning #web
- Harmonic functions based semi-supervised learning for web spam detection (WZ, DZ, YZ, GZ, BX), pp. 74–75.
- ESEC-FSE-2011-BrunHEN #collaboration #detection
- Proactive detection of collaboration conflicts (YB, RH, MDE, DN), pp. 168–178.
- ICSE-2011-Bertran #architecture #detection #evolution #smell
- Detecting architecturally-relevant code smells in evolving software systems (IMB), pp. 1090–1093.
- ICSE-2011-Choudhary #detection #web
- Detecting cross-browser issues in web applications (SRC), pp. 1146–1148.
- ICSE-2011-GenevesL #consistency #detection #ide #xml
- Inconsistent path detection for XML IDEs (PG, NL), pp. 983–985.
- ICSE-2011-JhiWJZLW #detection
- Value-based program characterization and its application to software plagiarism detection (YcJ, XW, XJ, SZ, PL, DW), pp. 756–765.
- ICSE-2011-MatthijssenZ #ajax #comprehension #detection #interactive #named
- FireDetective: understanding ajax client/server interactions (NM, AZ), pp. 998–1000.
- ICSE-2011-ShengVEHCZ #concurrent #detection #lightweight #named
- RACEZ: a lightweight and non-invasive race detection tool for production applications (TS, NV, SE, RH, WC, WZ), pp. 401–410.
- ICSE-2011-SridharaPV #automation #detection
- Automatically detecting and describing high level actions within methods (GS, LLP, KVS), pp. 101–110.
- ICSE-2011-TanZP #concurrent #debugging #detection #mining #named
- aComment: mining annotations from comments and code to detect interrupt related concurrency bugs (LT, YZ, YP), pp. 11–20.
- ICSE-2011-WongCKD #composition #detection
- Detecting software modularity violations (SW, YC, MK, MD), pp. 411–420.
- SLE-2011-BastenKV #ambiguity #detection #scalability
- Ambiguity Detection: Scaling to Scannerless (BB, PK, JJV), pp. 303–323.
- ASPLOS-2011-ZhangLOSJLR #concurrent #debugging #detection #fault #named
- ConSeq: detecting concurrency bugs through sequential errors (WZ, JL, RO, JS, GJ, SL, TWR), pp. 251–264.
- CGO-2011-XieX #detection #named #performance
- Acculock: Accurate and efficient detection of data races (XX, JX), pp. 201–212.
- HPCA-2011-QureshiSLF #detection #online
- Practical and secure PCM systems by online detection of malicious write streams (MKQ, AS, LL, MF), pp. 478–489.
- HPDC-2011-ZhouKB #debugging #detection #locality #named #parallel #scalability #source code #using
- Vrisha: using scaling properties of parallel programs for bug detection and localization (BZ, MK, SB), pp. 85–96.
- PPoPP-2011-ZhengRQA #detection #gpu #named #source code
- GRace: a low-overhead mechanism for detecting data races in GPU programs (MZ, VTR, FQ, GA), pp. 135–146.
- SOSP-2011-LaadanVTBYN #detection #pervasive #process
- Pervasive detection of process races in deployed systems (OL, NV, CcT, CB, JY, JN), pp. 353–367.
- SOSP-2011-LenersWHAW #detection #distributed #network
- Detecting failures in distributed systems with the Falcon spy network (JBL, HW, WLH, MKA, MW), pp. 279–294.
- SOSP-2011-VeeraraghavanCFN #detection #using
- Detecting and surviving data races using complementary schedules (KV, PMC, JF, SN), pp. 369–384.
- CAV-2011-GaneshKAGHE #analysis #detection #named #string #testing
- HAMPI: A String Solver for Testing, Analysis and Vulnerability Detection (VG, AK, SA, PJG, PH, MDE), pp. 1–19.
- ICST-2011-SmithW #detection #heuristic #sql #using #web
- Using SQL Hotspots in a Prioritization Heuristic for Detecting All Types of Web Application Vulnerabilities (BHS, LW), pp. 220–229.
- ICTSS-2011-MammarCJMO #c #detection #source code #testing #using
- Using Testing Techniques for Vulnerability Detection in C Programs (AM, ARC, WJ, WM, EMdO), pp. 80–96.
- ICTSS-2011-ShinboH #communication #detection #empirical #mobile
- An Empirical Study on Applying Anomaly Detection Technique to Detecting Software and Communication Failures in Mobile Data Communication Services (HS, TH), pp. 195–208.
- ISSTA-2011-LeS #analysis #detection #fault #generative
- Generating analyses for detecting faults in path segments (WL, MLS), pp. 320–330.
- ISSTA-2011-PradelG #detection #order
- Detecting anomalies in the order of equally-typed method arguments (MP, TRG), pp. 232–242.
- SAT-2011-LonsingB #detection
- Failed Literal Detection for QBF (FL, AB), pp. 259–272.
- ECSA-2010-ScandariatoBJ #architecture #automation #detection
- Automated Detection of Least Privilege Violations in Software Architectures (RS, KB, WJ), pp. 150–165.
- ASE-2010-LiHG #ajax #behaviour #detection #interactive #web
- Detecting user-visible failures in AJAX web applications by analyzing users’ interaction behaviors (WL, MJH, CG), pp. 155–158.
- ASE-2010-PhamNNN #detection
- Detection of recurring software vulnerabilities (NHP, TTN, HAN, TNN), pp. 447–456.
- ASE-2010-RederE #design #detection #fault #named #uml #visualisation
- Model/analyzer: a tool for detecting, visualizing and fixing design errors in UML (AR, AE), pp. 347–348.
- ASE-2010-YangWRN #automation #coordination #detection #natural language #requirements
- Automatic detection of nocuous coordination ambiguities in natural language requirements (HY, AW, ANDR, BN), pp. 53–62.
- CASE-2010-AllenT #consistency #detection #fault #industrial #nondeterminism
- Event-based fault detection of manufacturing cell: Data inconsistencies between academic assumptions and industry practice (LVA, DMT), pp. 426–432.
- CASE-2010-BorsuYP #automation #detection
- Automated surface deformations detection and marking on automotive body panels (VB, AY, PP), pp. 551–556.
- CASE-2010-DhupatiKRR #analysis #detection #novel #speech #using #validation
- A novel drowsiness detection scheme based on speech analysis with validation using simultaneous EEG recordings (LSD, SK, AR, AR), pp. 917–921.
- CASE-2010-LeungLECS #detection
- Detection and tracking of low contrast human sperm tail (CL, ZL, NE, RFC, YS), pp. 263–268.
- CASE-2010-RichtsfeldSV #automation #detection #realtime
- Real-time edge detection for automated fibre-mat stitching (MR, AS, MV), pp. 557–562.
- CASE-2010-RodriguezBMRW #analysis #assembly #detection
- Failure detection in assembly: Force signature analysis (AR, DB, MTM, GFR, JW), pp. 210–215.
- CASE-2010-RoutrayRS #clustering #detection #fault #reduction
- Data reduction and clustering techniques for fault detection and diagnosis in automotives (AR, AR, SS), pp. 326–331.
- DAC-2010-CochranR #consistency #detection #predict #runtime
- Consistent runtime thermal prediction and control through workload phase detection (RC, SR), pp. 62–67.
- DAC-2010-JindalAHLNW #detection #logic
- Detecting tangled logic structures in VLSI netlists (TJ, CJA, JH, ZL, GJN, CBW), pp. 603–608.
- DATE-2010-BorodinJ #detection #fault
- Instruction precomputation with memoization for fault detection (DB, BHHJ), pp. 1665–1668.
- DATE-2010-BoydSS #detection #process #trade-off
- Power-accuracy tradeoffs in human activity transition detection (JB, HS, AS), pp. 1524–1529.
- DATE-2010-CutrupiCCG #detection #flexibility
- A flexible UWB Transmitter for breast cancer detection imaging systems (MC, MC, MRC, MG), pp. 1076–1081.
- DATE-2010-DadgourB #architecture #design #detection #novel #pipes and filters #using
- Aging-resilient design of pipelined architectures using novel detection and correction circuits (HFD, KB), pp. 244–249.
- DATE-2010-DasMZC #detection #hardware #information management #memory management
- Detecting/preventing information leakage on the memory bus due to malicious hardware (AD, GM, JZ, ANC), pp. 861–866.
- DATE-2010-DiracoLS #detection #recognition
- An active vision system for fall detection and posture recognition in elderly healthcare (GD, AL, PS), pp. 1536–1541.
- DATE-2010-Scholzel #detection #fault #performance
- HW/SW co-detection of transient and permanent faults with fast recovery in statically scheduled data paths (MS), pp. 723–728.
- DocEng-2010-ChiuCD #detection #documentation #image
- Picture detection in document page images (PC, FC, LD), pp. 211–214.
- DocEng-2010-ThaoM #data type #detection #using #version control #xml
- Using versioned tree data structure, change detection and node identity for three-way XML merging (CT, EVM), pp. 77–86.
- DRR-2010-BeusekomRB #detection #multi
- Trainable multiscript orientation detection (JvB, YR, TMB), pp. 1–10.
- DRR-2010-Dejean #detection #documentation #sequence
- Numbered sequence detection in documents (HD), pp. 1–10.
- DRR-2010-FaureV #detection #metric
- Detection of figure and caption pairs based on disorder measurements (CF, NV), pp. 1–10.
- DRR-2010-LiuZ #detection #documentation #image #learning
- Semi-supervised learning for detecting text-lines in noisy document images (ZL, HZ), pp. 1–10.
- DRR-2010-SankarasubramaniamNVK #approach #detection #documentation
- Detecting modifications in paper documents: a coding approach (YS, BN, KV, AK), pp. 1–10.
- DRR-2010-ShahabKD #detection #web
- The aware toolbox for the detection of law infringements on web pages (AS, TK, AD), pp. 1–10.
- DRR-2010-TerradesSGVJ #detection #predict
- Interactive-predictive detection of handwritten text blocks (ORT, NS, AG, EV, AJ), pp. 1–10.
- HT-2010-GippB #approach #detection #identification #independence
- Citation based plagiarism detection: a new approach to identify plagiarized work language independently (BG, JB), pp. 273–274.
- SIGMOD-2010-CieslewiczRSY #automation #data-driven #detection
- Automatic contention detection and amelioration for data-intensive operations (JC, KAR, KS, YY), pp. 483–494.
- SIGMOD-2010-MathioudakisK #detection #named #twitter
- TwitterMonitor: trend detection over the twitter stream (MM, NK), pp. 1155–1158.
- SIGMOD-2010-WangWLWWLTXL #dataset #detection #named
- MapDupReducer: detecting near duplicates over massive datasets (CW, JW, XL, WW, HW, HL, WT, JX, RL), pp. 1119–1122.
- VLDB-2010-DongBHS #detection
- Global Detection of Complex Copying Relationships Between Sources (XD, LBE, YH, DS), pp. 1358–1369.
- VLDB-2010-DongBHS10a #detection #named
- SOLOMON: Seeking the Truth Via Copying Detection (XD, LBE, YH, DS), pp. 1617–1620.
- VLDB-2010-OrairTWMP #detection
- Distance-Based Outlier Detection: Consolidation and Renewed Bearing (GHO, CHCT, YW, WMJ, SP), pp. 1469–1480.
- VLDB-2010-WoodsTA #detection
- Complex Event Detection at Wire Speed with FPGAs (LW, JT, GA), pp. 660–669.
- VLDB-2010-YiuUST #detection #mobile #performance #policy #proximity #self
- Efficient Proximity Detection among Mobile Users via Self-Tuning Policies (MLY, LHU, SS, KT), pp. 985–996.
- CSEET-2010-SharifM #design pattern #detection #layout
- The Effects of Layout on Detecting the Role of Design Patterns (BS, JIM), pp. 41–48.
- ITiCSE-2010-Kumar #detection #fault #online #testing
- The case for error detection support during online testing (ANK), p. 311.
- FASE-2010-DistefanoF #detection #java #memory management
- Memory Leaks Detection in Java by Bi-abductive Inference (DD, IF), pp. 278–292.
- TACAS-2010-ParizekK #component #detection #fault #java #performance #random #using
- Efficient Detection of Errors in Java Components Using Random Environment and Restarts (PP, TK), pp. 451–465.
- CSMR-2010-KnieselBHFCGT #design pattern #detection #tool support
- DPDX--Towards a Common Result Exchange Format for Design Pattern Detection Tools (GK, AB, PH, LJF, AC, YGG, NT), pp. 232–235.
- CSMR-2010-LuciaDGR #behaviour #design pattern #detection #model checking
- Improving Behavioral Design Pattern Detection through Model Checking (ADL, VD, CG, MR), pp. 176–185.
- CSMR-2010-RoubtsovSB #composition #dependence #detection #injection #java #smell
- Detecting Modularity “Smells” in Dependencies Injected with Java Annotations (SAR, AS, MvdB), pp. 244–247.
- ICPC-2010-BarbourYZ #clone detection #detection #scalability
- A Technique for Just-in-Time Clone Detection in Large Scale Systems (LB, HY, YZ), pp. 76–79.
- ICPC-2010-BeyerF #dependence #detection #low level #named
- DepDigger: A Tool for Detecting Complex Low-Level Dependencies (DB, AF), pp. 40–41.
- ICSM-2010-BernardiL #design pattern #detection #modelling
- Model-driven detection of Design Patterns (MLB, GADL), pp. 1–5.
- ICSM-2010-CanforaCCP #detection #empirical #logic #multi #using
- Using multivariate time series and association rules to detect logical change coupling: An empirical study (GC, MC, LC, MDP), pp. 1–10.
- ICSM-2010-CorazzaMMS #approach #clone detection #detection #kernel
- A Tree Kernel based approach for clone detection (AC, SDM, VM, GS), pp. 1–5.
- ICSM-2010-HummelJHC #clone detection #detection #distributed #incremental #scalability
- Index-based code clone detection: incremental, distributed, scalable (BH, EJ, LH, MC), pp. 1–9.
- ICSM-2010-JalbertB #clone detection #concurrent #debugging #detection #identification #using
- Using clone detection to identify bugs in concurrent software (KJ, JSB), pp. 1–5.
- ICSM-2010-LuciaDGR #design pattern #detection #dynamic analysis #eclipse #plugin
- An Eclipse plug-in for the detection of design pattern instances through static and dynamic analysis (ADL, VD, CG, MR), pp. 1–6.
- PASTE-2010-Schmeelk #benchmark #detection #metric #towards
- Towards a unified fault-detection benchmark (SS), pp. 61–64.
- SCAM-2010-BastenS #ambiguity #detection #named
- AMBIDEXTER: Practical Ambiguity Detection (BB, TvdS), pp. 101–102.
- SCAM-2010-BrixtelFLBR #clone detection #detection #independence
- Language-Independent Clone Detection Applied to Plagiarism Detection (RB, MF, BL, CB, RR), pp. 77–86.
- WCRE-2010-BiegelD #clone detection #configuration management #detection
- Highly Configurable and Extensible Code Clone Detection (BB, SD), pp. 237–241.
- WCRE-2010-DavisG #assembly #detection #source code
- From Whence It Came: Detecting Source Code Clones by Analyzing Assembler (IJD, MWG), pp. 242–246.
- WCRE-2010-SelimFZ #clone detection #detection #representation #using
- Enhancing Source-Based Clone Detection Using Intermediate Representation (GMKS, KCF, YZ), pp. 227–236.
- WCRE-2010-WongASLM #behaviour #detection #programming #reverse engineering #search-based #using
- Reverse Engineering Utility Functions Using Genetic Programming to Detect Anomalous Behavior in Software (SW, MA, JS, KL, SM), pp. 141–149.
- PEPM-2010-BrownT #clone detection #detection #haskell
- Clone detection and elimination for Haskell (CB, SJT), pp. 111–120.
- PEPM-2010-HofmannK #detection #morphism #problem #towards
- I/O guided detection of list catamorphisms: towards problem specific use of program templates in IP (MH, EK), pp. 93–100.
- PLDI-2010-BondBG #analysis #context-sensitive grammar #debugging #detection #named #performance
- Breadcrumbs: efficient context sensitivity for dynamic bug detection analyses (MDB, GZB, SZG), pp. 13–24.
- PLDI-2010-BondCM #detection #named
- PACER: proportional detection of data races (MDB, KEC, KSM), pp. 255–268.
- PLDI-2010-FlanaganF #detection #memory management
- Adversarial memory for detecting destructive races (CF, SNF), pp. 244–254.
- PLDI-2010-XuR #detection
- Detecting inefficiently-used containers to avoid bloat (G(X, AR), pp. 160–173.
- STOC-2010-BhaskaraCCFV #approximate #detection
- Detecting high log-densities: an O(n1/4) approximation for densest k-subgraph (AB, MC, EC, UF, AV), pp. 201–210.
- FLOPS-2010-Sagonas #concurrent #detection #erlang #fault #source code #static analysis #using
- Using Static Analysis to Detect Type Errors and Concurrency Defects in Erlang Programs (KFS), pp. 13–18.
- ICALP-v1-2010-AmirELPS #detection
- Cycle Detection and Correction (AA, EE, AL, EP, NS), pp. 43–54.
- ICALP-v1-2010-KroviMOR #detection #quantum
- Finding Is as Easy as Detecting for Quantum Walks (HK, FM, MO, JR), pp. 540–551.
- SEFM-2010-CristiaAM #detection #framework #testing
- Pruning Testing Trees in the Test Template Framework by Detecting Mathematical Contradictions (MC, PA, PRM), pp. 268–277.
- ILC-2010-Mehnert #detection #fault #type inference #type system
- Extending Dylan’s type system for better type inference and error detection (HM), pp. 1–10.
- ICGT-2010-TaentzerELW #detection #graph #version control
- Conflict Detection for Model Versioning Based on Graph Modifications (GT, CE, PL, MW), pp. 171–186.
- CHI-2010-AppertB #detection #gesture #recognition
- Scale detection for a priori gesture recognition (CA, OB), pp. 879–882.
- CHI-2010-NakatsumaS #2d #communication #detection #network
- High accuracy position and orientation detection in two-dimensional communication network (KN, HS), pp. 2297–2306.
- CHI-2010-WuDM #detection #enterprise #network #social #using
- Detecting professional versus personal closeness using an enterprise social network site (AW, JMD, DRM), pp. 1955–1964.
- AdaEurope-2010-Keul #detection #version control
- Static Versioning of Global State for Race Condition Detection (SK), pp. 111–124.
- CAiSE-2010-BouassidaB #approach #detection #problem
- A New Approach for Pattern Problem Detection (NB, HBA), pp. 150–164.
- ICEIS-AIDSS-2010-PortelaAROG #automation #detection #framework #game studies #performance
- An Intelligent Framework for Automatic Event Detection in Robotic Soccer Games — An Auxiliar Tool to Help Coaches Improve their Teams’ Performance (JP, PA, LPR, ECO, JG), pp. 244–249.
- CIKM-2010-CiglanN #detection #named #personalisation #statistics #wiki
- WikiPop: personalized event detection system based on Wikipedia page view statistics (MC, KN), pp. 1931–1932.
- CIKM-2010-DingSBVWLC #automation #detection #embedded #feature model #framework #image #using
- Automatic detection of craters in planetary images: an embedded framework using feature selection and boosting (WD, TFS, LPCB, RV, YW, ZL, TC), pp. 749–758.
- CIKM-2010-FisichellaSDN #detection #health
- Unsupervised public health event detection for epidemic intelligence (MF, AS, KD, WN), pp. 1881–1884.
- CIKM-2010-GeXZOYL #detection #evolution #named
- Top-Eye: top-k evolving trajectory outlier detection (YG, HX, ZHZ, HTO, JY, KCL), pp. 1733–1736.
- CIKM-2010-HuangSHDSL #algorithm #clustering #community #detection #named #network
- SHRINK: a structural clustering algorithm for detecting hierarchical communities in networks (JH, HS, JH, HD, YS, YL), pp. 219–228.
- CIKM-2010-LimNJLL #behaviour #bibliography #detection #rating #using
- Detecting product review spammers using rating behaviors (EPL, VAN, NJ, BL, HWL), pp. 939–948.
- CIKM-2010-MurataTMKM #detection
- Detecting periodic changes in search intentions in a search engine (MM, HT, YM, RK, TM), pp. 1525–1528.
- CIKM-2010-Nomoto #detection #similarity
- Two-tier similarity model for story link detection (TN), pp. 789–798.
- CIKM-2010-PopescuP #detection #twitter
- Detecting controversial events from twitter (AMP, MP), pp. 1873–1876.
- CIKM-2010-SotoudehA #detection #framework #induction #using
- Partial drift detection using a rule induction framework (DS, AA), pp. 769–778.
- CIKM-2010-TianWWRCM #detection #mobile #topic
- Topic detection and organization of mobile text messages (YT, WW, XW, JR, CC, JM), pp. 1877–1880.
- CIKM-2010-WuIPR #approach #detection #wiki
- Elusive vandalism detection in wikipedia: a text stability-based approach (QW, DI, CP, LR), pp. 1797–1800.
- ECIR-2010-BoudinSN #detection #information retrieval
- Improving Medical Information Retrieval with PICO Element Detection (FB, LS, JYN), pp. 50–61.
- ECIR-2010-KimCLL #detection #effectiveness #image #named #sequence #using
- BASIL: Effective Near-Duplicate Image Detection Using Gene Sequence Alignment (HsK, HWC, JL, DL), pp. 229–240.
- ICML-2010-FelzenszwalbGMR #detection #modelling
- Discriminative Latent Variable Models for Object Detection (PFF, RBG, DAM, DR), pp. 11–12.
- ICML-2010-ShoebG #detection #machine learning
- Application of Machine Learning To Epileptic Seizure Detection (AHS, JVG), pp. 975–982.
- ICML-2010-XuHFPJ #detection #mining #problem #scalability
- Detecting Large-Scale System Problems by Mining Console Logs (WX, LH, AF, DAP, MIJ), pp. 37–46.
- ICPR-2010-AnthimopoulosVG #detection #evaluation #image
- A Pixel-Based Evaluation Method for Text Detection in Color Images (MA, NV, BG), pp. 3264–3267.
- ICPR-2010-AranG #detection #people
- Fusing Audio-Visual Nonverbal Cues to Detect Dominant People in Group Conversations (OA, DGP), pp. 3687–3690.
- ICPR-2010-BanerjeeK #detection #modelling
- Model-Based Detection of Acoustically Dense Objects in Ultrasound (JB, KBK), pp. 4166–4169.
- ICPR-2010-BelaroussiFTSCP #case study #detection #image
- Road Sign Detection in Images: A Case Study (RB, PF, JPT, BS, PC, NP), pp. 484–488.
- ICPR-2010-BenedekDZ #detection #image #process
- Building Detection in a Single Remotely Sensed Image with a Point Process of Rectangles (CB, XD, JZ), pp. 1417–1420.
- ICPR-2010-BimboLMP #detection #geometry #using
- Person Detection Using Temporal and Geometric Context with a Pan Tilt Zoom Camera (ADB, GL, IM, FP), pp. 3886–3889.
- ICPR-2010-BouchrikaCNMT #detection #people #using
- Using Gait Features for Improving Walking People Detection (IB, JNC, MSN, RM, GT), pp. 3097–3100.
- ICPR-2010-BrezovanBGSS #adaptation #detection #image #performance #visual notation
- An Adaptive Method for Efficient Detection of Salient Visual Object from Color Images (MB, DDB, EG, LS, CSS), pp. 2346–2349.
- ICPR-2010-BushraOEO #detection #linear
- QRS Complex Detection by Non Linear Thresholding of Modulus Maxima (BJ, OB, EF, OL), pp. 4500–4503.
- ICPR-2010-CadavidA #automation #detection #modelling #using #visual notation
- Exploiting Visual Quasi-periodicity for Automated Chewing Event Detection Using Active Appearance Models and Support Vector Machines (SC, MAM), pp. 1714–1717.
- ICPR-2010-CandamoGKG #detection #using
- Detecting Wires in Cluttered Urban Scenes Using a Gaussian Model (JC, DBG, RK, SG), pp. 432–435.
- ICPR-2010-ChaoTLC #detection #fault
- A Generalized Anisotropic Diffusion for Defect Detection in Low-Contrast Surfaces (SMC, DMT, WCL, WYC), pp. 4408–4411.
- ICPR-2010-CheongL #case study #clustering #detection #topic #twitter
- A Study on Detecting Patterns in Twitter Intra-topic User and Message Clustering (MC, VCSL), pp. 3125–3128.
- ICPR-2010-ConteFPTV #detection #people
- Counting Moving People in Videos by Salient Points Detection (DC, PF, GP, FT, MV), pp. 1743–1746.
- ICPR-2010-DasKK #detection #multi #optimisation
- Sub-Category Optimization for Multi-view Multi-pose Object Detection (DD, YK, YK), pp. 1405–1408.
- ICPR-2010-DengH #composition #detection #exponential #process
- Voice Activity Detection Based on Complex Exponential Atomic Decomposition and Likelihood Ratio Test (SD, JH), pp. 89–92.
- ICPR-2010-DengSS #detection #network #pattern matching #pattern recognition #recognition
- Applying Error-Correcting Output Coding to Enhance Convolutional Neural Network for Target Detection and Pattern Recognition (HD, GS, CYS), pp. 4291–4294.
- ICPR-2010-DornaikaC #classification #detection #performance #using
- Efficient Object Detection and Matching Using Feature Classification (FD, FC), pp. 3073–3076.
- ICPR-2010-DoshiB #detection
- Detecting Vorticity in Optical Flow of Fluids (AD, AGB), pp. 2118–2121.
- ICPR-2010-DurakN #classification #detection #image
- Principal Contour Extraction and Contour Classification to Detect Coronal Loops from the Solar Images (ND, ON), pp. 2403–2406.
- ICPR-2010-FaragGEF #data-driven #detection #modelling #robust
- Data-Driven Lung Nodule Models for Robust Nodule Detection in Chest CT (AAF, JHG, SE, AAF), pp. 2588–2591.
- ICPR-2010-FengJR #detection
- Detecting Altered Fingerprints (JF, AKJ, AR), pp. 1622–1625.
- ICPR-2010-FengZH #detection #learning #online #self
- Online Learning with Self-Organizing Maps for Anomaly Detection in Crowd Scenes (JF, CZ, PH), pp. 3599–3602.
- ICPR-2010-FouheySB #detection #image #multi #using
- Multiple Plane Detection in Image Pairs Using J-Linkage (DFF, DS, AJB), pp. 336–339.
- ICPR-2010-FujitaHSTS #detection #image #using
- An Improved Method for Cirrhosis Detection Using Liver’s Ultrasound Images (YF, YH, MS, ST, IS), pp. 2294–2297.
- ICPR-2010-GaoHLZW #detection #kernel
- Local Outlier Detection Based on Kernel Regression (JG, WH, WL, Z(Z, OW), pp. 585–588.
- ICPR-2010-Garcia-TubioWS #detection #geometry
- Combining Geometry and Local Appearance for Object Detection (MPGT, HW, LS), pp. 4024–4027.
- ICPR-2010-GiannakopoulosPT #approach #detection #multimodal #video
- A Multimodal Approach to Violence Detection in Video Sharing Sites (TG, AP, ST), pp. 3244–3247.
- ICPR-2010-GuoM #detection #using
- Action Detection in Crowded Videos Using Masks (PG, ZM), pp. 1767–1770.
- ICPR-2010-GuptaD #communication #detection #network #social
- Detection and Characterization of Anomalous Entities in Social Communication Networks (NG, LD), pp. 738–741.
- ICPR-2010-HaberdarS #detection #framework #mobile #refinement #using #video
- Disparity Map Refinement for Video Based Scene Change Detection Using a Mobile Stereo Camera Platform (HH, SKS), pp. 3890–3893.
- ICPR-2010-HamKN #automation #detection #finite #fuzzy
- Fire-Flame Detection Based on Fuzzy Finite Automation (SH, BK, JYN), pp. 3919–3922.
- ICPR-2010-HarirchiRMDG #algorithm #detection #using
- Two-Level Algorithm for MCs Detection in Mammograms Using Diverse-Adaboost-SVM (FH, PR, HAM, FD, MG), pp. 269–272.
- ICPR-2010-HayashiUPS #artificial reality #detection #multi
- An Augmented Reality Setup with an Omnidirectional Camera Based on Multiple Object Detection (TH, HU, JP, HS), pp. 3171–3174.
- ICPR-2010-HeimonenH #detection #framework
- A Human Detection Framework for Heavy Machinery (TAH, JH), pp. 416–419.
- ICPR-2010-HongCCG #detection #set
- Boosted Sigma Set for Pedestrian Detection (XH, HC, XC, WG), pp. 3017–3020.
- ICPR-2010-HuangM #automation #detection #locality #video
- Automatic Detection and Localization of Natural Scene Text in Video (XH, HM), pp. 3216–3219.
- ICPR-2010-IzadiS #automation #detection #image #segmentation #using
- Automatic Building Detection in Aerial Images Using a Hierarchical Feature Based Image Segmentation (MI, PS), pp. 472–475.
- ICPR-2010-JoshiP #adaptation #detection #incremental #learning
- Scene-Adaptive Human Detection with Incremental Active Learning (AJJ, FP), pp. 2760–2763.
- ICPR-2010-JulianDLCBC #automation #detection
- Automatic Hair Detection in the Wild (PJ, CD, FL, VC, AB, AC), pp. 4617–4620.
- ICPR-2010-KalalMM #automation #detection #fault
- Forward-Backward Error: Automatic Detection of Tracking Failures (ZK, KM, JM), pp. 2756–2759.
- ICPR-2010-KamarainenI #canonical #detection #learning
- Learning and Detection of Object Landmarks in Canonical Object Space (JKK, JI), pp. 1409–1412.
- ICPR-2010-KhosrowabadiQWA #bound #detection #recognition #self #using
- EEG-based Emotion Recognition Using Self-Organizing Map for Boundary Detection (RK, HCQ, AW, KKA), pp. 4242–4245.
- ICPR-2010-KontschiederDKBB #detection #image
- Detecting Paper Fibre Cross Sections in Microtomy Images (PK, MD, JK, WB, HB), pp. 316–319.
- ICPR-2010-KonyaES #detection #documentation #image #performance
- Fast Seamless Skew and Orientation Detection in Document Images (IVK, SE, CS), pp. 1924–1928.
- ICPR-2010-KrajewskiBK #case study #classification #detection #multi #self #speech
- Comparing Multiple Classifiers for Speech-Based Detection of Self-Confidence — A Pilot Study (JK, AB, SK), pp. 3716–3719.
- ICPR-2010-KrishnanS #detection #using
- Detecting Group Turn Patterns in Conversations Using Audio-Video Change Scale-Space (RK, SS), pp. 137–140.
- ICPR-2010-Landesa-VazquezA #detection
- The Role of Polarity in Haar-like Features for Face Detection (ILV, JLAC), pp. 412–415.
- ICPR-2010-LathenCKB #detection #linear #robust
- Non-ring Filters for Robust Detection of Linear Structures (GL, OC, HK, MB), pp. 233–236.
- ICPR-2010-LefakisWGS #detection
- Boosted Edge Orientation Histograms for Grasping Point Detection (LL, HW, MPGT, LS), pp. 4072–4076.
- ICPR-2010-Lian #detection #performance #retrieval
- Fast Fingerprint Retrieval with Line Detection (HCL), pp. 3151–3154.
- ICPR-2010-LiaoH #detection #energy
- Slip and Fall Events Detection by Analyzing the Integrated Spatiotemporal Energy Map (TL, CLH), pp. 1718–1721.
- ICPR-2010-LinW #detection #framework #using
- Detecting Moving Objects Using a Camera on a Moving Platform (CCL, MW), pp. 460–463.
- ICPR-2010-LiPG #detection #evaluation #realtime
- Real-Time Traffic Sign Detection: An Evaluation Study (YL, SP, WG), pp. 3033–3036.
- ICPR-2010-LiSN #detection #documentation #image #performance #recognition
- Fast Logo Detection and Recognition in Document Images (ZL, MSA, MN), pp. 2716–2719.
- ICPR-2010-LiuQW #automation #detection
- Automatic Detection of Phishing Target from Phishing Webpage (GL, BQ, LW), pp. 4153–4156.
- ICPR-2010-LiZZ #detection #invariant #using
- Abandoned Objects Detection Using Double Illumination Invariant Foreground Masks (XL, CZ, DZ), pp. 436–439.
- ICPR-2010-LuWD #detection #random
- Part Detection, Description and Selection Based on Hidden Conditional Random Fields (WL, SW, XD), pp. 657–660.
- ICPR-2010-MaHHL #detection
- Context Inspired Pedestrian Detection in Far-Field Videos (WM, PH, LH, CL), pp. 3009–3012.
- ICPR-2010-ManciniFZ #detection #multi
- Road Change Detection from Multi-Spectral Aerial Data (AM, EF, PZ), pp. 448–451.
- ICPR-2010-MarcialisRT #analysis #detection
- Analysis of Fingerprint Pores for Vitality Detection (GLM, FR, AT), pp. 1289–1292.
- ICPR-2010-MehmoodN #detection #kernel #using
- Anomaly Detection for Longwave FLIR Imagery Using Kernel Wavelet-RX (AM, NMN), pp. 1385–1388.
- ICPR-2010-MilitzerHJTH #automation #detection #image #segmentation
- Automatic Detection and Segmentation of Focal Liver Lesions in Contrast Enhanced CT Images (AM, TH, FJ, CT, JH), pp. 2524–2527.
- ICPR-2010-MoroTU #detection #using
- Detection of Moving Objects with Removal of Cast Shadows and Periodic Changes Using Stereo Vision (AM, KT, KU), pp. 328–331.
- ICPR-2010-NguyenFP #detection #towards
- Towards a Generic Feature-Selection Measure for Intrusion Detection (HTN, KF, SP), pp. 1529–1532.
- ICPR-2010-NishioOB #detection
- Hierarchical Anomality Detection Based on Situation (SN, HO, NB), pp. 1108–1111.
- ICPR-2010-OzcanG #detection #fuzzy
- Fuzzy Support Vector Machines for ECG Arrhythmia Detection (NOO, FSG), pp. 2973–2976.
- ICPR-2010-OzturkYA #detection
- Detecting Dominant Motion Flows in Unstructured/Structured Crowd Scenes (OO, TY, KA), pp. 3533–3536.
- ICPR-2010-PaivaT #detection #image #using
- Detection of Salient Image Points Using Principal Subspace Manifold Structure (ARCP, TT), pp. 1389–1392.
- ICPR-2010-PapalazarouRW #detection #estimation #image #multi #using
- Multiple Model Estimation for the Detection of Curvilinear Segments in Medical X-ray Images Using Sparse-plus-dense-RANSAC (CP, PMJR, PHNdW), pp. 2484–2487.
- ICPR-2010-PapariCP #detection #novel #using
- Steerable Filtering Using Novel Circular Harmonic Functions with Application to Edge Detection (GP, PC, NP), pp. 3947–3950.
- ICPR-2010-ParkKS #detection #markov #modelling #recognition #using #visual notation
- Visual Recognition of Types of Structural Corridor Landmarks Using Vanishing Points Detection and Hidden Markov Models (YP, SSK, IHS), pp. 3292–3295.
- ICPR-2010-PoullotS #detection #image #scalability #video
- Detecting Screen Shot Images within Large-Scale Video Archive (SP, SS), pp. 3203–3207.
- ICPR-2010-PrisacariuTZRG #3d #detection #towards
- Integrating Object Detection with 3D Tracking Towards a Better Driver Assistance System (VAP, RT, KZ, IDR, LJVG), pp. 3344–3347.
- ICPR-2010-PutpuekCLS #approach #detection #identification
- Unified Approach to Detection and Identification of Commercial Films by Temporal Occurrence Pattern (NP, NC, CL, SS), pp. 3288–3291.
- ICPR-2010-QinVG #detection #image
- Background Filtering for Improving of Object Detection in Images (GQ, BV, LG), pp. 922–925.
- ICPR-2010-QiuFW #detection #visual notation
- Detect Visual Spoofing in Unicode-Based Text (BQ, NF, LW), pp. 1949–1952.
- ICPR-2010-ReckyL #detection #using
- Windows Detection Using K-means in CIE-Lab Color Space (MR, FL), pp. 356–359.
- ICPR-2010-RenHHLC #detection
- A Sample Pre-mapping Method Enhancing Boosting for Object Detection (HR, XH, CKH, LL, XC), pp. 3005–3008.
- ICPR-2010-RudinacJ #detection #locality
- Saliency Detection and Object Localization in Indoor Environments (MR, PPJ), pp. 404–407.
- ICPR-2010-ScandaliarisVS #analysis #comparative #detection #image #video
- Comparative Analysis for Detecting Objects Under Cast Shadows in Video Images (JS, MV, AS), pp. 4577–4580.
- ICPR-2010-SenechalBP #automation #detection #using
- Automatic Facial Action Detection Using Histogram Variation Between Emotional States (TS, KB, LP), pp. 3752–3755.
- ICPR-2010-Seo #detection #distance #matrix
- Speaker Change Detection Based on the Pairwise Distance Matrix (JSS), pp. 93–96.
- ICPR-2010-SeppkeDH #detection #energy #image #symmetry #using
- Using Snakes with Asymmetric Energy Terms for the Detection of Varying-Contrast Edges in SAR Images (BS, LSDF, NH), pp. 2792–2795.
- ICPR-2010-SertelCLSG #analysis #approach #detection #image
- An Image Analysis Approach for Detecting Malignant Cells in Digitized H&E-stained Histology Images of Follicular Lymphoma (OS, ÜVÇ, GL, AS, MNG), pp. 273–276.
- ICPR-2010-SeverskyY #3d #detection #scalability #set
- Scalable Cage-Driven Feature Detection and Shape Correspondence for 3D Point Sets (LMS, LY), pp. 3557–3560.
- ICPR-2010-ShamiliBA #detection #distributed #machine learning #mobile #using
- Malware Detection on Mobile Devices Using Distributed Machine Learning (ASS, CB, TA), pp. 4348–4351.
- ICPR-2010-ShiGW #detection #realtime
- Real-Time Abnormal Event Detection in Complicated Scenes (YS, YG, RW), pp. 3653–3656.
- ICPR-2010-ShimosakaINSM #detection #process
- Detecting Human Activity Profiles with Dirichlet Enhanced Inhomogeneous Poisson Processes (MS, TI, HN, TS, TM), pp. 4384–4387.
- ICPR-2010-ShivakumaraPT #detection #video
- New Wavelet and Color Features for Text Detection in Video (PS, TQP, CLT), pp. 3996–3999.
- ICPR-2010-SirmacekU #detection #network #using
- Road Network Extraction Using Edge Detection and Spatial Voting (BS, CÜ), pp. 3113–3116.
- ICPR-2010-SongLLJ #detection #representation
- A Discriminative Model for Object Representation and Detection via Sparse Features (XS, PL, LL, YJ), pp. 3077–3080.
- ICPR-2010-StephaniJRH #automation #detection
- Automatically Detecting Peaks in Terahertz Time-Domain Spectroscopy (HS, JJ, CR, BH), pp. 4468–4471.
- ICPR-2010-SuLLT #detection
- An RST-Tolerant Shape Descriptor for Object Detection (CWS, HYML, YML, HRT), pp. 766–769.
- ICPR-2010-SultaniC #detection #using
- Abnormal Traffic Detection Using Intelligent Driver Model (WS, JYC), pp. 324–327.
- ICPR-2010-SunB #3d #detection
- 3D Filtering for Injury Detection in Brain MRI (YS, BB), pp. 2568–2571.
- ICPR-2010-SunHL #data-driven #detection
- Data-Driven Foreground Object Detection from a Non-stationary Camera (SWS, FH, HYML), pp. 3053–3056.
- ICPR-2010-SunVFT #automation #detection
- Automated Detection of Nucleoplasmic Bridges for DNA Damage Scoring in Binucleated Cells (CS, PV, MF, PT), pp. 2480–2483.
- ICPR-2010-SuZSH #2d #detection #image
- Detection of Shapes in 2D Point Clouds Generated from Images (JS, ZZ, AS, FH), pp. 2640–2643.
- ICPR-2010-TahirYBAMK #concept #detection #visual notation
- The University of Surrey Visual Concept Detection System at ImageCLEF@ICPR: Working Notes (MAT, FY, MB, MA, KM, JK), pp. 850–853.
- ICPR-2010-TasdemirC #detection #video
- Motion Vector Based Features for Content Based Video Copy Detection (KT, AEÇ), pp. 3134–3137.
- ICPR-2010-TaxHVP #clustering #concept #detection #learning #multi #using
- The Detection of Concept Frames Using Clustering Multi-instance Learning (DMJT, EH, MFV, MP), pp. 2917–2920.
- ICPR-2010-TopalAG #approach #detection #heuristic #realtime #robust
- Edge Drawing: A Heuristic Approach to Robust Real-Time Edge Detection (CT, CA, YG), pp. 2424–2427.
- ICPR-2010-TorrentPLFSMP #approach #detection #using
- Detecting Faint Compact Sources Using Local Features and a Boosting Approach (AT, MP, XL, JF, JRSS, JM, JMP), pp. 4613–4616.
- ICPR-2010-TosatoFCM #detection
- A Re-evaluation of Pedestrian Detection on Riemannian Manifolds (DT, MF, MC, VM), pp. 3308–3311.
- ICPR-2010-TsaiHTC #detection #pipes and filters #predict #scalability #using
- Learning-Based Vehicle Detection Using Up-Scaling Schemes and Predictive Frame Pipeline Structures (YMT, KYH, CCT, LGC), pp. 3101–3104.
- ICPR-2010-VerschaeR #detection #multi
- Coarse-To-Fine Multiclass Nested Cascades for Object Detection (RV, JRdS), pp. 344–347.
- ICPR-2010-VillamizarMAS #category theory #detection #multi #performance #random
- Shared Random Ferns for Efficient Detection of Multiple Categories (MV, FMN, JAC, AS), pp. 388–391.
- ICPR-2010-Wang #detection #documentation #recognition #using
- Document Logo Detection and Recognition Using Bayesian Model (HW), pp. 1961–1964.
- ICPR-2010-WangY #detection
- Detection Based Low Frame Rate Human Tracking (LW, NHCY), pp. 3529–3532.
- ICPR-2010-WhitelamJB #case study #detection #multi
- Multispectral Eye Detection: A Preliminary Study (CW, ZJ, TB), pp. 209–212.
- ICPR-2010-WijnhovenW #detection #performance #probability #using
- Fast Training of Object Detection Using Stochastic Gradient Descent (RGJW, PHNdW), pp. 424–427.
- ICPR-2010-WuHCCT #detection #interactive #using #visual notation
- Human Smoking Event Detection Using Visual Interaction Clues (PW, JWH, JCC, SCC, SYT), pp. 4344–4347.
- ICPR-2010-XingAL #detection #learning #multi
- Multiple Human Tracking Based on Multi-view Upper-Body Detection and Discriminative Learning (JX, HA, SL), pp. 1698–1701.
- ICPR-2010-YangQ #approach #detection #distributed #effectiveness #parametricity
- An Effective Decentralized Nonparametric Quickest Detection Approach (DY, HQ), pp. 2278–2281.
- ICPR-2010-YukselG #classification #detection
- Variational Mixture of Experts for Classification with Applications to Landmine Detection (SEY, PDG), pp. 2981–2984.
- ICPR-2010-ZengM #detection #multi #people #robust
- Robust Head-Shoulder Detection by PCA-Based Multilevel HOG-LBP Detector for People Counting (CZ, HM), pp. 2069–2072.
- ICPR-2010-ZhangGC #detection #invariant #using
- Water Reflection Detection Using a Flip Invariant Shape Detector (HZ, XG, XC), pp. 633–636.
- ICPR-2010-ZhangK10a #detection #graph #using
- Text Detection Using Edge Gradient and Graph Spectrum (JZ, RK), pp. 3979–3982.
- ICPR-2010-ZhangST10a #detection #lens
- Contact Lens Detection Based on Weighted LBP (HZ, ZS, TT), pp. 4279–4282.
- ICPR-2010-ZhangXL #detection #video
- Extracting Key Sub-trajectory Features for Supervised Tactic Detection in Sports Video (YZ, CX, HL), pp. 125–128.
- ICPR-2010-ZhangXW #data transformation #detection
- Data Transformation of the Histogram Feature in Object Detection (RZ, BX, CW), pp. 2893–2896.
- ICPR-2010-ZhangZYK #classification #detection #learning #representation #taxonomy
- Microaneurysm (MA) Detection via Sparse Representation Classifier with MA and Non-MA Dictionary Learning (BZ, LZ, JY, FK), pp. 277–280.
- ICPR-2010-ZhouNW #approach #detection #novel
- A Novel Approach to Detect Ship-Radiated Signal Based on HMT (YZ, ZN, CW), pp. 4601–4604.
- KDD-2010-CaoOYW #behaviour #detection #sequence
- Detecting abnormal coupled sequences and sequence changes in group-based manipulative trading behaviors (LC, YO, PSY, GW), pp. 85–94.
- KDD-2010-ChenLB #approach #detection #named #statistics
- GLS-SOD: a generalized local statistical approach for spatial outlier detection (FC, CTL, APB), pp. 1069–1078.
- KDD-2010-DasMSO #algorithm #case study #detection #kernel #learning #multi #safety
- Multiple kernel learning for heterogeneous anomaly detection: algorithm and aviation safety case study (SD, BLM, ANS, NCO), pp. 47–56.
- KDD-2010-GaoLFWSH #community #detection #network #on the #performance
- On community outliers and their efficient detection in information networks (JG, FL, WF, CW, YS, JH), pp. 813–822.
- KDIR-2010-BonninBB #detection #modelling #parallel #predict #web
- Detecting Parallel Browsing to Improve Web Predictive Modeling (GB, AB, AB), pp. 504–509.
- KDIR-2010-LieglGSH #automation #detection #sentiment #taxonomy
- Dictionary Extension for Improving Automated Sentiment Detection (JL, SG, AS, AHH), pp. 404–407.
- KDIR-2010-Onem #behaviour #classification #detection #network
- Unwanted Behaviour Detection and Classification in Network Traffic (IMÖ), pp. 122–128.
- SEKE-2010-ArrudaCD #detection #framework #using
- A Framework for Detecting Code Piracy Using Class Structure (PA, PC, DD), pp. 559–564.
- SEKE-2010-ElamyFL #detection #multi
- A Multiagent System for Automate Detection and Diagnosis of Active Tuberculosis on Chest Radiograph and CT Thorax (AHE, BHF, RL), pp. 495–498.
- SEKE-2010-FuL #constraints #detection #string #theorem proving #web
- A String Constraint Solver for Detecting Web Application Vulnerability (XF, CCL), pp. 535–542.
- SEKE-2010-MoshirpourMF #behaviour #detection #distributed #specification #using
- Detecting Emergent Behavior in Distributed Systems Using Scenario-Based Specifications (MM, AM, BHF), pp. 349–354.
- SEKE-2010-ShinPS #detection
- Detection of Malicious Software Engineer Intrusion (MES, NP, SS), pp. 565–570.
- SIGIR-2010-Barron-Cedeno #detection #on the #reuse
- On the mono- and cross-language detection of text reuse and plagiarism (ABC), p. 914.
- SIGIR-2010-ChenMCRH #detection #rank #web
- Web page publication time detection and its application for page rank (ZC, JM, CC, HR, SH), pp. 859–860.
- SIGIR-2010-GuoA #detection #interactive #web
- Ready to buy or just browsing?: detecting web searcher goals from interaction data (QG, EA), pp. 130–137.
- SIGIR-2010-HajishirziYK #adaptation #detection #learning #similarity
- Adaptive near-duplicate detection via similarity learning (HH, WtY, AK), pp. 419–426.
- SIGIR-2010-HeR #approach #automation #detection #generative #ranking
- A ranking approach to target detection for automatic link generation (JH, MdR), pp. 831–832.
- SIGIR-2010-LiuLGB #behaviour #detection
- Can search systems detect users’ task difficulty?: some behavioral signals (JL, CL, JG, NJB), pp. 845–846.
- SIGIR-2010-WangLC #bound #detection #query
- Intent boundary detection in search query logs (CJW, KHYL, HHC), pp. 749–750.
- SIGIR-2010-ZhangZYH #detection #performance #sequence
- Efficient partial-duplicate detection based on sequence matching (QZ, YZ, HY, XH), pp. 675–682.
- ECMFA-2010-Lopez-HerrejonE #consistency #detection #modelling #multi #nondeterminism #variability
- Detecting Inconsistencies in Multi-View Models with Variability (RELH, AE), pp. 217–232.
- MoDELS-v2-2010-GerthKLE #detection #precise #process #using
- Precise Detection of Conflicting Change Operations Using Process Model Terms (CG, JMK, ML, GE), pp. 93–107.
- MoDELS-v2-2010-SilvaBBG #detection #modelling #process
- Early Deviation Detection in Modeling Activities of MDE Processes (MAAdS, RB, XB, MPG), pp. 303–317.
- ECOOP-2010-MonperrusBM #detection #object-oriented
- Detecting Missing Method Calls in Object-Oriented Software (MM, MB, MM), pp. 2–25.
- OOPSLA-2010-GabelYYGS #consistency #detection #nondeterminism #scalability #source code
- Scalable and systematic detection of buggy inconsistencies in source code (MG, JY, YY, MG, ZS), pp. 175–190.
- OOPSLA-2010-ShiPYLZCZ #concurrent #debugging #detection #invariant
- Do I use the wrong definition?: DeFuse: definition-use invariants for detecting concurrency and sequential bugs (YS, SP, ZY, SL, YZ, WC, WZ), pp. 160–174.
- PADL-2010-ChristakisS #detection #erlang #static analysis
- Static Detection of Race Conditions in Erlang (MC, KFS), pp. 119–133.
- PADL-2010-LiT #detection #erlang #source code
- Similar Code Detection and Elimination for Erlang Programs (HL, SJT), pp. 104–118.
- REFSQ-2010-GleichCK #ambiguity #detection #towards
- Ambiguity Detection: Towards a Tool Explaining Ambiguity Sources (BG, OC, LK), pp. 218–232.
- SAC-2010-AnastasiadisSP #detection #multi #performance
- A fast multiplier-less edge detection accelerator for FPGAs (NA, IS, KZP), pp. 510–515.
- SAC-2010-AnelliLHL #detection #towards
- Transport congestion events detection (TCED): towards decorrelating congestion detection from TCP (PA, EL, FH, DMLP), pp. 663–669.
- SAC-2010-BraynerCS #approach #detection #energy #network #quality #query #requirements
- Dealing with application requirements and energy consumption in wireless sensor networks: a novelty detection approach for quality of query services (AB, ALVC, KMdS), pp. 786–790.
- SAC-2010-ChengHR #detection #video
- Advanced motion detection for intelligent video surveillance systems (FCC, SCH, SJR), pp. 983–984.
- SAC-2010-HuangT #detection #semantics #specification
- Semantic scene detection system for baseball videos based on the MPEG-7 specification (YFH, LHT), pp. 941–947.
- SAC-2010-Kavallieratou #detection #segmentation
- Text line detection and segmentation: uneven skew angles and hill-and-dale writing (EK), pp. 59–60.
- SAC-2010-LeeJL #detection #graph #using
- Detecting metamorphic malwares using code graphs (JL, KJ, HL), pp. 1970–1977.
- SAC-2010-LesnerBBB #detection #exclamation #framework #novel #source code #student
- A novel framework to detect source code plagiarism: now, students have to work for real! (BL, RB, CB, GB), pp. 57–58.
- SAC-2010-LinsBT #automation #detection #documentation #image
- Automatically detecting and classifying noises in document images (RDL, SB, MT), pp. 33–39.
- SAC-2010-MaranzatoPLN #detection #using
- Fraud detection in reputation systems in e-markets using logistic regression (RM, AMP, APdL, MN), pp. 1454–1455.
- SAC-2010-MigotinaRF #automation #detection #fuzzy #parametricity #using
- Automatic K-complex detection using Hjorth parameters and fuzzy decision (DM, ACR, ALNF), pp. 979–980.
- SAC-2010-MissenBC #detection #using
- Using passage-based language model for opinion detection in blogs (MMSM, MB, GC), pp. 1821–1822.
- SAC-2010-Mohy-ud-DinM #detection #probability
- Detecting narrow passages in configuration spaces via spectra of probabilistic roadmaps (HMuD, AM), pp. 1294–1298.
- SAC-2010-OliveiraGGD #case study #detection #experience
- Experiences in reading detection with EEG signals (IO, OG, NG, CD), pp. 1236–1237.
- SAC-2010-RieckSLHL #detection #named
- Botzilla: detecting the “phoning home” of malicious software (KR, GS, TL, TH, PL), pp. 1978–1984.
- SAC-2010-RosswogG #clustering #detection #mobile
- Efficiently detecting clusters of mobile objects in the presence of dense noise (JR, KG), pp. 1095–1102.
- SAC-2010-RoyPL #component #detection #documentation #image #using
- Seal object detection in document images using GHT of local component shapes (PPR, UP, JL), pp. 23–27.
- SAC-2010-SamiYPHH #api #detection #mining
- Malware detection based on mining API calls (AS, BY, HR, NP, SH, AH), pp. 1020–1025.
- SAC-2010-TeixeiraM #data type #detection
- Data stream anomaly detection through principal subspace tracking (PHdST, RLM), pp. 1609–1616.
- SAC-2010-WelferSM #approach #detection #image
- A morphologic three-stage approach for detecting exudates in color eye fundus images (DW, JS, DRM), pp. 964–968.
- FSE-2010-EpifaniGT #black box #detection
- Change-point detection for black-box services (IE, CG, GT), pp. 227–236.
- FSE-2010-JoshiNSG #detection #dynamic analysis #effectiveness
- An effective dynamic analysis for detecting generalized deadlocks (PJ, MN, KS, DG), pp. 327–336.
- FSE-2010-LiCK #analysis #detection #effectiveness
- Practical and effective symbolic analysis for buffer overflow detection (LL, CC, NK), pp. 317–326.
- ICSE-2010-Brondum #architecture #concept #detection
- Software architecture for systems of software intensive systems (S3): the concepts and detection of inter-system relationships (JB), pp. 355–356.
- ICSE-2010-DeissenboeckHJ #clone detection #detection
- Code clone detection in practice (FD, BH, EJ), pp. 499–500.
- ICSE-2010-JurgensDFHSWDS #clone detection #detection #quality #question #requirements #specification
- Can clone detection support quality assessments of requirements specifications? (EJ, FD, MF, BH, BS, SW, CD, JS), pp. 79–88.
- ICSE-2010-LaiCC #detection #parallel #random #source code #testing #thread
- Detecting atomic-set serializability violations in multithreaded programs through active randomized testing (ZL, SCC, WKC), pp. 235–244.
- ICSE-2010-PhamNNWNN #detection
- Detecting recurring and similar software vulnerabilities (NHP, TTN, HAN, XW, ATN, TNN), pp. 227–230.
- ICSE-2010-SongWXZM #debugging #detection #named
- JDF: detecting duplicate bug reports in Jazz (YS, XW, TX, LZ, HM), pp. 315–316.
- ICSE-2010-TorlakC #detection #effectiveness #interprocedural
- Effective interprocedural resource leak detection (ET, SC), pp. 535–544.
- LDTA-J-2007-Schmitz #ambiguity #detection
- An experimental ambiguity detection tool (SS), pp. 71–84.
- LDTA-2010-BastenV #ambiguity #detection #performance
- Faster ambiguity detection by grammar filtering (BB, JJV), p. 5.
- ASPLOS-2010-ZhangSL #approach #concurrent #debugging #detection #named
- ConMem: detecting severe concurrency bugs through an effect-oriented approach (WZ, CS, SL), pp. 179–192.
- CGO-2010-MarsVHS #detection #execution #online
- Contention aware execution: online contention detection and response (JM, NV, RH, MLS), pp. 257–265.
- OSDI-2010-EricksonMBO #concurrent #detection #effectiveness #kernel
- Effective Data-Race Detection for the Kernel (JE, MM, SB, KO), pp. 151–162.
- CAV-2010-KahlonW #concurrent #debugging #detection #graph #precise #source code
- Universal Causality Graphs: A Precise Happens-Before Model for Detecting Bugs in Concurrent Programs (VK, CW), pp. 434–449.
- CAV-2010-KaiserKW #concurrent #detection #source code
- Dynamic Cutoff Detection in Parameterized Concurrent Programs (AK, DK, TW), pp. 645–659.
- ICLP-J-2010-OetschPST #detection #source code
- The system Kato: Detecting cases of plagiarism for answer-set programs (JO, JP, MS, HT), pp. 759–775.
- ICST-2010-BelliLBS #detection #fault #sequence #testing
- Fault Detection Likelihood of Test Sequence Length (FB, ML, CJB, HAS), pp. 402–411.
- ICST-2010-SantelicesHO #detection #evolution #interactive #runtime
- Precisely Detecting Runtime Change Interactions for Evolving Software (RAS, MJH, AO), pp. 429–438.
- ISSTA-2010-GruskaWZ #detection #learning #lightweight
- Learning from 6, 000 projects: lightweight cross-project anomaly detection (NG, AW, AZ), pp. 119–130.
- ISSTA-2010-KwonS #automation #component #detection
- Automatic detection of unsafe component loadings (TK, ZS), pp. 107–118.
- WICSA-ECSA-2009-FigueiredoGKGSPMSBRBAZM #architecture #case study #detection
- Detecting architecture instabilities with concern traces: An exploratory study (EF, IG, SSK, AG, CS, AP, ALM, LFdS, TVB, RAR, PvdB, MA, SZ, AMDM), pp. 261–264.
- ASE-2009-BurnimJSS #detection #infinity #lightweight #named #runtime
- Looper: Lightweight Detection of Infinite Loops at Runtime (JB, NJ, CS, KS), pp. 161–169.
- ASE-2009-KawrykowR #api #automation #detection
- Improving API Usage through Automatic Detection of Redundant Code (DK, MPR), pp. 111–122.
- ASE-2009-KimYS #concurrent #detection #heuristic #memory management #model checking #precise #using
- Precise Data Race Detection in a Relaxed Memory Model Using Heuristic-Based Model Checking (KK, TYK, BAS), pp. 495–499.
- ASE-2009-SardinhaCWGR #aspect-oriented #automation #detection #named #requirements
- EA-Analyzer: Automating Conflict Detection in Aspect-Oriented Requirements (AS, RC, NW, PG, AR), pp. 530–534.
- ASE-2009-ThummalapentaX #detection #mining #named
- Alattin: Mining Alternative Patterns for Detecting Neglected Conditions (ST, TX), pp. 283–294.
- CASE-2009-MakkapatiN #detection
- Clump splitting based on detection of dominant points from contours (VM, SKN), pp. 197–201.
- CASE-2009-SenguptaDBMD #detection #fault #modelling #using
- Fault detection of Air Intake Systems of SI gasoline engines using mean value and within cycle models (SS, SD, AKB, SM, AKD), pp. 361–366.
- DAC-2009-PotkonjakNNM #detection #hardware #using
- Hardware Trojan horse detection using gate-level characterization (MP, AN, MN, TM), pp. 688–693.
- DAC-2009-WenCCS #architecture #concurrent #debugging #detection #manycore #named
- NUDA: a non-uniform debugging architecture and non-intrusive race detection for many-core (CNW, SHC, TFC, APS), pp. 148–153.
- DATE-2009-AlvesNDB #detection #fault #multi #using
- Detecting errors using multi-cycle invariance information (NA, KN, JD, RIB), pp. 791–796.
- DATE-2009-BarontiLRS #detection #distributed #metric
- Distributed sensor for steering wheel rip force measurement in driver fatigue detection (FB, FL, RR, RS), pp. 894–897.
- DATE-2009-BhagawatDC #architecture #detection
- Systolic like soft-detection architecture for 4×4 64-QAM MIMO system (PB, RD, GC), pp. 870–873.
- DATE-2009-DSilvaK #detection #fixpoint #multi
- Fixed points for multi-cycle path detection (VD, DK), pp. 1710–1715.
- DATE-2009-GhoseGDAW #architecture #detection #memory management
- Architectural support for low overhead detection of memory violations (SG, LG, PD, AA, CW), pp. 652–657.
- DATE-2009-YanHL #detection #fault #online
- A unified online Fault Detection scheme via checking of Stability Violation (GY, YH, XL), pp. 496–501.
- DATE-2009-YilmazC #detection #fault
- Seed selection in LFSR-reseeding-based test compression for the detection of small-delay defects (MY, KC), pp. 1488–1493.
- DRR-2009-BeusekomSB #detection #documentation #image #independence
- Resolution Independent Skew and Orientation Detection for document images (JvB, FS, TMB), pp. 1–10.
- DRR-2009-FaureV #detection
- Simultaneous detection of vertical and horizontal text lines based on perceptual organisation (CF, NV), pp. 1–10.
- DRR-2009-SmithNL #detection
- Mark Detection from Scanned Ballots (EHBS, GN, DPL), pp. 1–10.
- ICDAR-2009-BodicLAHLK #detection #graph #integer #linear #programming #using
- Symbol Detection Using Region Adjacency Graphs and Integer Linear Programming (PLB, HL, SA, PH, YL, AK), pp. 1320–1324.
- ICDAR-2009-BoubakerKA #algorithm #detection
- New Algorithm of Straight or Curved Baseline Detection for Short Arabic Handwritten Writing (HB, MK, AMA), pp. 778–782.
- ICDAR-2009-FujiyoshiSU #detection
- Syntactic Detection and Correction of Misrecognitions in Mathematical OCR (AF, MS, SU), pp. 1360–1364.
- ICDAR-2009-HanifP #algorithm #detection #image #locality #using
- Text Detection and Localization in Complex Scene Images using Constrained AdaBoost Algorithm (SMH, LP), pp. 1–5.
- ICDAR-2009-LiuBMG #bound #detection #fault #sequence
- Improving the Table Boundary Detection in PDFs by Fixing the Sequence Error of the Sparse Lines (YL, KB, PM, CLG), pp. 1006–1010.
- ICDAR-2009-Martin-ToralAP #corpus #detection #documentation
- Detection of Incoherences in a Document Corpus Based on the Application of a Neuro-Fuzzy System (SMT, VA, GISP), pp. 1101–1105.
- ICDAR-2009-PhanST #detection #video
- A Laplacian Method for Video Text Detection (TQP, PS, CLT), pp. 66–70.
- ICDAR-2009-RoyPL #approach #detection #documentation #recognition
- Seal Detection and Recognition: An Approach for Document Indexing (PPR, UP, JL), pp. 101–105.
- ICDAR-2009-ShivakumaraPT #detection #difference #video
- A Gradient Difference Based Technique for Video Text Detection (PS, TQP, CLT), pp. 156–160.
- ICDAR-2009-ShivakumaraPT09a #detection #robust #video
- A Robust Wavelet Transform Based Technique for Video Text Detection (PS, TQP, CLT), pp. 1285–1289.
- ICDAR-2009-Smith #analysis #detection #hybrid #layout
- Hybrid Page Layout Analysis via Tab-Stop Detection (RWS), pp. 241–245.
- ICDAR-2009-SunK #detection #embedded
- Detecting Printed and Handwritten Partial Copies of Line Drawings Embedded in Complex Backgrounds (WS, KK), pp. 341–345.
- ICDAR-2009-SunNFTH #detection #image #string
- Trinary Image Mosaicing Based Watermark String Detection (JS, SN, YF, HT, YH), pp. 306–310.
- ICDAR-2009-WangC #bound #detection #documentation #image
- Logo Detection in Document Images Based on Boundary Extension of Feature Rectangles (HW, YC), pp. 1335–1339.
- SIGMOD-2009-FrankeG #detection #named #network
- ORDEN: outlier region detection and exploration in sensor networks (CF, MG), pp. 1075–1078.
- SIGMOD-2009-JiangYCC #ad hoc #detection #named #query
- AIDE: ad-hoc intents detection engine over query logs (YJ, HTY, KCCC, YSC), pp. 1091–1094.
- SIGMOD-2009-MeiM #adaptation #cost analysis #detection #named #query
- ZStream: a cost-based query processor for adaptively detecting composite events (YM, SM), pp. 193–206.
- SIGMOD-2009-SunLDC #analysis #detection #workflow
- Detecting and resolving unsound workflow views for correct provenance analysis (PS, ZL, SBD, YC), pp. 549–562.
- VLDB-2009-BeskalesSIB #detection #modelling #query
- Modeling and Querying Possible Repairs in Duplicate Detection (GB, MAS, IFI, SBD), pp. 598–609.
- VLDB-2009-ChandramouliGM #detection #on the fly #query
- On-the-fly Progress Detection in Iterative Stream Queries (BC, JG, DM), pp. 241–252.
- VLDB-2009-DongBS09a #detection
- Truth Discovery and Copying Detection in a Dynamic World (XLD, LBE, DS), pp. 562–573.
- VLDB-2009-HassanzadehCML #algorithm #clustering #detection #framework
- Framework for Evaluating Clustering Algorithms in Duplicate Detection (OH, FC, RJM, HCL), pp. 1282–1293.
- VLDB-2009-SunLNDC #analysis #detection #named #workflow
- WOLVES: Achieving Correct Provenance Analysis by Detecting and Resolving Unsound Workflow Views (PS, ZL, SN, SBD, YC), pp. 1614–1617.
- FASE-2009-ChenWYS #detection #named #static analysis
- HAVE: Detecting Atomicity Violations via Integrated Dynamic and Static Analysis (QC, LW, ZY, SDS), pp. 425–439.
- FASE-2009-NguyenNPAN #clone detection #detection #feature model #performance
- Accurate and Efficient Structural Characteristic Feature Extraction for Clone Detection (HAN, TTN, NHP, JMAK, TNN), pp. 440–455.
- TACAS-2009-SchollDPK #constraints #detection #linear
- Computing Optimized Representations for Non-convex Polyhedra by Detection and Removal of Redundant Linear Constraints (CS, SD, FP, SK), pp. 383–397.
- ICPC-J-2008-RoyCK09 #approach #clone detection #comparison #detection #evaluation #tool support
- Comparison and evaluation of code clone detection techniques and tools: A qualitative approach (CKR, JRC, RK), pp. 470–495.
- CSMR-2009-GodeK #clone detection #detection #incremental
- Incremental Clone Detection (NG, RK), pp. 219–228.
- ICPC-2009-ChilowiczDR #detection #similarity #source code #syntax
- Syntax tree fingerprinting for source code similarity detection (MC, ÉD, GR), pp. 243–247.
- ICPC-2009-KarumuriR #automation #detection
- Automatic detection of internal queues and stages in message processing systems (SK, SPR), pp. 315–316.
- ICPC-2009-KnieselB #approach #data fusion #design pattern #detection
- Standing on the shoulders of giants — A data fusion approach to design pattern detection (GK, AB), pp. 208–217.
- ICSM-2009-FengG #detection
- Detecting virus mutations via dynamic matching (MF, RG), pp. 105–114.
- ICSM-2009-NguyenNAPN #clone detection #detection #evolution #incremental #scalability
- Scalable and incremental clone detection for evolving software (TTN, HAN, JMAK, NHP, TNN), pp. 491–494.
- ICSM-2009-Roy #analysis #detection
- Detection and analysis of near-miss software clones (CKR), pp. 447–450.
- SCAM-2009-TiarksKF #assessment #detection #state of the art #tool support
- An Assessment of Type-3 Clones as Detected by State-of-the-Art Tools (RT, RK, RF), pp. 67–76.
- WCRE-1999-HigoK99a #clone detection #dependence #detection #graph #quality
- Enhancing Quality of Code Clone Detection with Program Dependency Graph (YH, SK), pp. 315–316.
- WCRE-1999-KawaguchiYUFKNI99a #automation #clone detection #detection #ide #named
- SHINOBI: A Tool for Automatic Code Clone Detection in the IDE (SK, TY, HU, KF, YK, MN, HI), pp. 313–314.
- WCRE-1999-KrishnamoorthyDF99a #detection #fault #static analysis
- Static Detection of Disassembly Errors (NK, SKD, KF), pp. 259–268.
- PEPM-2009-CifuentesKLS #debugging #detection #program analysis #using
- Program analysis for bug detection using parfait: invited talk (CC, NK, LL, BS), pp. 7–8.
- PEPM-2009-LiT #clone detection #detection #erlang #refactoring
- Clone detection and removal for Erlang/OTP within a refactoring environment (HL, SJT), pp. 169–178.
- PLDI-2009-FlanaganF #concurrent #detection #named #performance #precise
- FastTrack: efficient and precise dynamic race detection (CF, SNF), pp. 121–133.
- PLDI-2009-JoshiPSN #detection #program analysis #random
- A randomized dynamic program analysis technique for detecting real deadlocks (PJ, CSP, KS, MN), pp. 110–120.
- PLDI-2009-MarinoMN #concurrent #detection #effectiveness #lightweight #named
- LiteRace: effective sampling for lightweight data-race detection (DM, MM, SN), pp. 134–143.
- PLDI-2009-TournavitisWFO #approach #detection #parallel #towards
- Towards a holistic approach to auto-parallelization: integrating profile-driven parallelism detection and machine-learning based mapping (GT, ZW, BF, MFPO), pp. 177–187.
- SAS-2009-SeidlV #analysis #concurrent #detection
- Region Analysis for Race Detection (HS, VV), pp. 171–187.
- STOC-2009-AharonovALV #detection #quantum
- The detectability lemma and quantum gap amplification (DA, IA, ZL, UVV), pp. 417–426.
- FM-2009-LangM #composition #confluence #detection #partial order #reduction #using
- Partial Order Reductions Using Compositional Confluence Detection (FL, RM), pp. 157–172.
- HCI-AUII-2009-GlasnappB #detection
- A Human-Centered Model for Detecting Technology Engagement (JG, OB), pp. 621–630.
- HCI-AUII-2009-SunQPW #case study #detection
- A Study of Fire Information Detection on PDA Device (XS, WQ, TP, LW), pp. 105–113.
- HCI-NT-2009-Rebolledo-MendezDMVFLG #assessment #detection #usability
- Assessing NeuroSky’s Usability to Detect Attention Levels in an Assessment Exercise (GRM, ID, EMM, MDVC, SdF, FL, ARGG), pp. 149–158.
- HCI-NT-2009-TogawaKY #communication #detection #mining #peer-to-peer #visualisation
- Peer-to-Peer File Sharing Communication Detection System with Traffic Mining and Visualization (ST, KK, YY), pp. 900–909.
- HCI-VAD-2009-ChenGSEJ #detection #learning
- Computer-Based Learning to Improve Breast Cancer Detection Skills (YC, AGG, HJS, AE, JJ), pp. 49–57.
- HIMI-DIE-2009-LeeLKC #detection #enterprise #fault #information management #process #statistics #using
- Proactive Fault Detection Schema for Enterprise Information System Using Statistical Process Control (CL, DL, JK, JWC), pp. 113–122.
- HIMI-DIE-2009-ShinPC #bound #detection
- Virtual Convex Polygon Based Hole Boundary Detection and Time Delay Based Hole Detour Scheme in WSNs (IS, NDP, HC), pp. 619–627.
- VISSOFT-2009-Reiss #detection #java #memory management #problem #visualisation
- Visualizing the Java heap to detect memory problems (SPR), pp. 73–80.
- CAiSE-2009-BlancMMM #consistency #detection #incremental #nondeterminism
- Incremental Detection of Model Inconsistencies Based on Model Operations (XB, AM, IM, TM), pp. 32–46.
- ICEIS-AIDSS-2009-AlbusacCLVL #analysis #detection
- Intelligent Surveillance for Trajectory Analysis — Detecting Anomalous Situations in Monitored Environments (JA, JJCS, LJL, DV, LMLL), pp. 102–107.
- ICEIS-AIDSS-2009-BiscarriMLGBM #detection #framework #mining
- A Mining Framework to Detect Non-technical Losses in Power Utilities (FB, IM, CL, JIG, JB, RM), pp. 96–101.
- ICEIS-AIDSS-2009-ElzingaPVD #concept analysis #detection
- Detecting Domestic Violence — Showcasing a Knowledge Browser based on Formal Concept Analysis and Emergent Self Organizing Maps (PE, JP, SV, GD), pp. 11–18.
- ICEIS-ISAS-2009-HidalgoGT #consistency #data type #detection #nondeterminism #performance
- Efficient Data Structures for Local Inconsistency Detection in Firewall ACL Updates (SPH, RMG, FTdlR), pp. 176–181.
- ICEIS-ISAS-2009-SarmientoBC #approach #detection #interactive #requirements
- Applying an Event-based Approach for Detecting Requirements Interaction (ES, MRSB, MLMC), pp. 225–230.
- ICEIS-J-2009-IorioSVM #approach #detection #documentation #multi
- A Natural and Multi-layered Approach to Detect Changes in Tree-Based Textual Documents (ADI, MS, FV, CM), pp. 90–101.
- ICEIS-J-2009-MohebiS #ambiguity #analysis #clustering #detection #hybrid #network #using
- An Optimized Hybrid Kohonen Neural Network for Ambiguity Detection in Cluster Analysis Using Simulated Annealing (EM, MNMS), pp. 389–401.
- CIKM-2009-ChenR #analysis #detection
- Event detection from flickr data through wavelet-based spatial analysis (LC, AR), pp. 523–532.
- CIKM-2009-ChenTJ #classification #detection #framework #social #social media #web
- A co-classification framework for detecting web spam and spammers in social media web sites (FC, PNT, AKJ), pp. 1807–1810.
- CIKM-2009-GardnerX #approach #automation #detection #sequence
- Automatic link detection: a sequence labeling approach (JJG, LX), pp. 1701–1704.
- CIKM-2009-GunnemannMFS #concept #detection #orthogonal
- Detection of orthogonal concepts in subspaces of high dimensional data (SG, EM, IF, TS), pp. 1317–1326.
- CIKM-2009-HeCPQMG #detection #evolution #how #question #topic
- Detecting topic evolution in scientific literature: how can citations help? (QH, BC, JP, BQ, PM, CLG), pp. 957–966.
- CIKM-2009-ViyanonM #database #detection #relational #similarity #using #xml
- A system for detecting xml similarity in content and structure using relational database (WV, SKM), pp. 1197–1206.
- CIKM-2009-ZhangJZZ #bidirectional #detection
- Exploiting bidirectional links: making spamming detection easier (YZ, QJ, LZ, YZ), pp. 1839–1842.
- ECIR-2009-Barron-CedenoR #automation #comparison #detection #n-gram #on the
- On Automatic Plagiarism Detection Based on n-Grams Comparison (ABC, PR), pp. 696–700.
- ECIR-2009-BolelliEG #detection #topic #using
- Topic and Trend Detection in Text Collections Using Latent Dirichlet Allocation (LB, SE, CLG), pp. 776–780.
- ECIR-2009-MissenB #detection #semantics #using
- Using WordNet’s Semantic Relations for Opinion Detection in Blogs (MMSM, MB), pp. 729–733.
- ICML-2009-HaiderS #clustering #detection #email
- Bayesian clustering for email campaign detection (PH, TS), pp. 385–392.
- ICML-2009-PetersJGS #detection
- Detecting the direction of causal time series (JP, DJ, AG, BS), pp. 801–808.
- KDD-2009-AndoS #clustering #detection
- Detection of unique temporal segments by information theoretic meta-clustering (SA, ES), pp. 59–68.
- KDD-2009-BohmHMP #detection #named
- CoCo: coding cost for parameter-free outlier detection (CB, KH, NSM, CP), pp. 149–158.
- KDD-2009-DundarHBRR #case study #dataset #detection #learning #using
- Learning with a non-exhaustive training dataset: a case study: detection of bacteria cultures using optical-scattering technology (MD, EDH, AKB, JPR, BR), pp. 279–288.
- KDD-2009-HiroseYNF #detection #equation #network
- Network anomaly detection based on Eigen equation compression (SH, KY, TN, RF), pp. 1185–1194.
- KDD-2009-LoCHKS #approach #behaviour #classification #detection #mining
- Classification of software behaviors for failure detection: a discriminative pattern mining approach (DL, HC, JH, SCK, CS), pp. 557–566.
- KDD-2009-MaSSV #detection #learning #web
- Beyond blacklists: learning to detect malicious web sites from suspicious URLs (JM, LKS, SS, GMV), pp. 1245–1254.
- KDD-2009-McGlohonBASF #detection #graph #named
- SNARE: a link analytic system for graph labeling and risk detection (MM, SB, MGA, DMS, CF), pp. 1265–1274.
- KDD-2009-VatturiW #detection #using
- Category detection using hierarchical mean shift (PV, WKW), pp. 847–856.
- KDD-2009-WuSJRG #detection #framework #performance
- A LRT framework for fast spatial anomaly detection (MW, XS, CJ, SR, JG), pp. 887–896.
- KDD-2009-YangJCZ #approach #community #detection
- Combining link and content for community detection: a discriminative approach (TY, RJ, YC, SZ), pp. 927–936.
- KDD-2009-YeLJHW #detection
- Intelligent file scoring system for malware detection from the gray list (YY, TL, QJ, ZH, LW), pp. 1385–1394.
- KDD-2009-ZhangWWZ #community #detection #network #parallel #scalability
- Parallel community detection on large networks with propinquity dynamics (YZ, JW, YW, LZ), pp. 997–1006.
- KDIR-2009-Biryukov #database #detection #topic
- Topic Detection in Bibliographic Databases (MB), pp. 236–242.
- MLDM-2009-CeciALCFVM #data type #detection #mining #relational
- Relational Frequent Patterns Mining for Novelty Detection from Data Streams (MC, AA, CL, CC, FF, CV, DM), pp. 427–439.
- MLDM-2009-IsakssonD #algorithm #case study #comparative #detection
- A Comparative Study of Outlier Detection Algorithms (CI, MHD), pp. 440–453.
- MLDM-2009-LiHLG #concept #detection #random #streaming
- Concept Drifting Detection on Noisy Streaming Data in Random Ensemble Decision Trees (PPL, XH, QL, YG), pp. 236–250.
- MLDM-2009-Mejia-LavalleV #detection
- Outlier Detection with Explanation Facility (MML, ASV), pp. 454–464.
- MLDM-2009-NunesSP #detection #image #using
- Detection of Masses in Mammographic Images Using Simpson’s Diversity Index in Circular Regions and SVM (APN, ACS, ACdP), pp. 540–553.
- MLDM-2009-XiongBS #detection
- A Wavelet-Based Method for Detecting Seismic Anomalies in Remote Sensing Satellite Data (PX, YB, XS), pp. 569–581.
- RecSys-2009-HurleyCZ #detection #statistics
- Statistical attack detection (NH, ZC, MZ), pp. 149–156.
- SEKE-2009-AxelssonBFSK #bibliography #code review #detection #fault #interactive #machine learning #visualisation
- Detecting Defects with an Interactive Code Review Tool Based on Visualisation and Machine Learning (SA, DB, RF, DS, DK), pp. 412–417.
- SIGIR-2009-BenevenutoRAAG #detection #network #online #social #video
- Detecting spammers and content promoters in online video social networks (FB, TR, VAFA, JMA, MAG), pp. 620–627.
- SIGIR-2009-CanCGJKRRSSUW #detection #web
- Web derived pronunciations for spoken term detection (DC, EC, AG, MJ, SK, BR, MR, MS, AS, MU, CMW), pp. 83–90.
- SIGIR-2009-ItakuraC #detection #markov #using #wiki
- Using dynamic markov compression to detect vandalism in the wikipedia (KYI, CLAC), pp. 822–823.
- SIGIR-2009-Schanda #detection
- Novelty detection across different source types and languages (JS), p. 854.
- SIGIR-2009-WongLC #adaptation #detection #information management #mining
- Mining employment market via text block detection and adaptive cross-domain information extraction (TLW, WL, BC), pp. 283–290.
- ECMDA-FA-2009-GarcesJCB #adaptation #detection #metamodelling #precise
- Managing Model Adaptation by Precise Detection of Metamodel Changes (KG, FJ, PC, JB), pp. 34–49.
- MoDELS-2009-ShoushaBL #analysis #concurrent #detection #uml
- A UML/MARTE Model Analysis Method for Detection of Data Races in Concurrent Systems (MS, LCB, YL), pp. 47–61.
- MoDELS-2009-ShoushaBL #analysis #concurrent #detection #uml
- A UML/MARTE Model Analysis Method for Detection of Data Races in Concurrent Systems (MS, LCB, YL), pp. 47–61.
- RE-2009-MussbacherWA #aspect-oriented #detection #interactive #semantics
- Semantic-Based Interaction Detection in Aspect-Oriented Scenarios (GM, JW, DA), pp. 203–212.
- REFSQ-2009-PerrouinBBT #consistency #detection #modelling #nondeterminism #perspective #requirements
- Composing Models for Detecting Inconsistencies: A Requirements Engineering Perspective (GP, EB, BB, YLT), pp. 89–103.
- SAC-2009-BrooksI #classification #detection #novel #visual notation
- Visual detection of novel terrain via two-class classification (CAB, KI), pp. 1145–1150.
- SAC-2009-ChavezSL #approach #detection #uml
- An approach to detection of UML-based ownership violation (HMC, WS, SL), pp. 541–542.
- SAC-2009-KarnstedtKPSF #adaptation #detection
- Adaptive burst detection in a stream engine (MK, DK, CP, KUS, CF), pp. 1511–1515.
- SAC-2009-LeS #concept #detection #performance #visual notation
- Efficient concept detection by fusing simple visual features (DDL, SS), pp. 1839–1840.
- SAC-2009-LuYLELW #correlation #data type #detection #incremental #using
- Incremental outlier detection in data streams using local correlation integral (XL, TY, ZL, ME, WL, HW), pp. 1520–1521.
- SAC-2009-MaoLPCH #approach #detection #learning #multi
- Semi-supervised co-training and active learning based approach for multi-view intrusion detection (CHM, HML, DP, TC, SYH), pp. 2042–2048.
- SAC-2009-MarascuM #data type #detection
- Parameterless outlier detection in data streams (AM, FM), pp. 1491–1495.
- SAC-2009-ParkYAMP #algorithm #approach #detection #novel #search-based #segmentation #using
- A novel approach to detect copy number variation using segmentation and genetic algorithm (CP, YY, JA, MM, SP), pp. 788–792.
- SAC-2009-PlattMG #classification #detection #topic
- Improving classification based off-topic search detection via category relationships (AP, SSRM, NG), pp. 869–874.
- SAC-2009-RyuKC #algorithm #detection #documentation #evolution #using
- A detecting and tracing algorithm for unauthorized internet-news plagiarism using spatio-temporal document evolution model (CKR, HJK, HGC), pp. 863–868.
- SAC-2009-Villamarin-SalomonB #detection #similarity
- Bayesian bot detection based on DNS traffic similarity (RVS, JCB), pp. 2035–2041.
- SAC-2009-WanMKJ #communication #detection #email #network
- Link-based event detection in email communication networks (XW, EEM, NK, JJ), pp. 1506–1510.
- ESEC-FSE-2009-FigueiredoWG #detection #named
- ConcernMorph: metrics-based detection of crosscutting patterns (EF, JW, AFG), pp. 299–300.
- ESEC-FSE-2009-KahlonSKZ #concurrent #detection #source code
- Static data race detection for concurrent programs with asynchronous calls (VK, NS, EK, YZ), pp. 13–22.
- ICSE-2009-JurgensDH #clone detection #detection #named #research
- CloneDetective — A workbench for clone detection research (EJ, FD, BH), pp. 603–606.
- ICSE-2009-NaikPSG #concurrent #detection #effectiveness
- Effective static deadlock detection (MN, CSP, KS, DG), pp. 386–396.
- ICSE-2009-PhamNNAN #clone detection #detection #graph #modelling
- Complete and accurate clone detection in graph-based models (NHP, HAN, TTN, JMAK, TNN), pp. 276–286.
- LDTA-2008-Basten09 #ambiguity #context-free grammar #detection #usability
- The Usability of Ambiguity Detection Methods for Context-Free Grammars (BB), pp. 35–46.
- CGO-2009-DuanFWZY #c #c++ #concurrent #consistency #detection #source code
- Detecting and Eliminating Potential Violations of Sequential Consistency for Concurrent C/C++ Programs (YD, XF, LW, CZ, PCY), pp. 25–34.
- PPoPP-2009-RatanaworabhanBKZNP #detection #symmetry
- Detecting and tolerating asymmetric races (PR, MB, DK, BGZ, RN, KP), pp. 173–184.
- SOSP-2009-XuHFPJ #detection #mining #problem #scalability
- Detecting large-scale system problems by mining console logs (WX, LH, AF, DAP, MIJ), pp. 117–132.
- CAV-2009-BensalemBNS #composition #concurrent #detection #named #verification
- D-Finder: A Tool for Compositional Deadlock Detection and Verification (SB, MB, THN, JS), pp. 614–619.
- CAV-2009-LahiriQR #concurrent #detection #fault #precise #smt #using
- Static and Precise Detection of Concurrency Errors in Systems Code Using SMT Solvers (SKL, SQ, ZR), pp. 509–524.
- ICLP-2009-Rosa #detection #distributed #programming
- Locally Distributed Predicates: A Programming Facility for Distributed State Detection (MD), pp. 557–558.
- ICST-2009-KaminskiA #detection #fault #logic #testing #using
- Using Logic Criterion Feasibility to Reduce Test Set Size While Guaranteeing Fault Detection (GKK, PA), pp. 356–365.
- ICST-2009-WedyanAB #automation #detection #effectiveness #fault #predict #refactoring #static analysis #tool support
- The Effectiveness of Automated Static Analysis Tools for Fault Detection and Refactoring Prediction (FW, DA, JMB), pp. 141–150.
- ISSTA-2009-BabenkoMP #automation #detection #named
- AVA: automated interpretation of dynamically detected anomalies (AB, LM, FP), pp. 237–248.
- ISSTA-2009-SaebjornsenWPQS #bytecode #detection
- Detecting code clones in binary executables (AS, JW, TP, DJQ, ZS), pp. 117–128.
- ASE-2008-Dominguez #detection #feature model #interactive
- Feature Interaction Detection in the Automotive Domain (ALJD), pp. 521–524.
- ASE-2008-ThummalapentaX #detection #framework #mining #named #open source #source code #web
- SpotWeb: Detecting Framework Hotspots and Coldspots via Mining Open Source Code on the Web (ST, TX), pp. 327–336.
- CASE-2008-HooverMR #3d #detection #image #matrix #using
- Pose detection of 3-D objects using images sampled on SO(3), spherical harmonics, and wigner-D matrices (RCH, AAM, RGR), pp. 47–52.
- CASE-2008-LiuWZ #detection #multi #network
- Cooperative multipath routing and relay based on noncoherent detection in wireless sensor networks (LL, ZW, MZ), pp. 128–132.
- CASE-2008-SolisT #detection #performance
- Enabling autonomous systems to perceptually detect human performance improvements and their applications (JS, AT), pp. 259–264.
- CASE-2008-WangSF #automation #detection #difference #equation
- Partial differential equation-based GPR signature discrimination for automatic detection of bridge deck delamination (ZWW, GGS, TF), pp. 431–435.
- DAC-2008-KurimotoSAYOTS #detection #fault #optimisation #scalability
- Phase-adjustable error detection flip-flops with 2-stage hold driven optimization and slack based grouping scheme for dynamic voltage scaling (MK, HS, RA, TY, HO, HT, HS), pp. 884–889.
- DAC-2008-ReddyPL #detection #on the #testing
- On tests to detect via opens in digital CMOS circuits (SMR, IP, CL), pp. 840–845.
- DATE-2008-AltCS #algorithm #architecture #detection #hardware #realtime
- Hardware/software architecture of an algorithm for vision-based real-time vehicle detection in dark environments (NA, CC, WS), pp. 176–181.
- DATE-2008-ChoudhuryM #approximate #concurrent #detection #fault #logic
- Approximate logic circuits for low overhead, non-intrusive concurrent error detection (MRC, KM), pp. 903–908.
- DATE-2008-DasMJZMC #analysis #component #detection #implementation #network #performance
- An Efficient FPGA Implementation of Principle Component Analysis based Network Intrusion Detection System (AD, SM, SJ, JZ, GM, ANC), pp. 1160–1165.
- DATE-2008-FeinsteinTM #detection #equivalence #logic #using
- Partially Redundant Logic Detection Using Symbolic Equivalence Checking in Reversible and Irreversible Logic Circuits (DYF, MAT, DMM), pp. 1378–1381.
- DATE-2008-FrechetteL #algorithm #detection #fault #self
- Error Detection/Correction in DNA Algorithmic Self-Assembly (SF, FL), pp. 1079–1082.
- DATE-2008-KleanthousS #detection #named
- CATCH: A Mechanism for Dynamically Detecting Cache-Content-Duplication and its Application to Instruction Caches (MK, YS), pp. 1426–1431.
- DATE-2008-LinPBB #detection
- Physically-Aware N-Detect Test Pattern Selection (YTL, OP, NKB, RDB), pp. 634–639.
- DATE-2008-VemuJAPG #concurrent #detection #fault #logic #low cost
- A low-cost concurrent error detection technique for processor control logic (RV, AJ, JAA, SP, RG), pp. 897–902.
- DATE-2008-WolffPBC #analysis #detection #problem #towards
- Towards Trojan-Free Trusted ICs: Problem Analysis and Detection Scheme (FGW, CAP, SB, RSC), pp. 1362–1365.
- DRR-2008-GaoTQ #approach #detection
- A mixed approach to auto-detection of page body (LG, ZT, RQ), p. 68150.
- VLDB-2008-AkdereCT #detection #distributed
- Plan-based complex event detection across distributed sources (MA, UÇ, NT), pp. 66–77.
- VLDB-2008-KriegelKZ #clustering #correlation #detection
- Detecting clusters in moderate-to-high dimensional data: subspace clustering, pattern-based clustering, and correlation clustering (HPK, PK, AZ), pp. 1528–1529.
- VLDB-2008-MetwallyEAA #correlation #detection #named #using
- SLEUTH: Single-pubLisher attack dEtection Using correlaTion Hunting (AM, FE, DA, AEA), pp. 1217–1228.
- VLDB-2008-WeisNJLS #detection
- Industry-scale duplicate detection (MW, FN, UJ, JL, HS), pp. 1253–1264.
- ITiCSE-2008-JiWC #contest #detection #experience #programming #source code
- An experience of detecting plagiarized source codes in competitive programming contests (JHJ, GW, HGC), p. 369.
- FASE-2008-MohaGMD #algorithm #analysis #design #detection #fault
- A Domain Analysis to Specify Design Defects and Generate Detection Algorithms (NM, YGG, AFLM, LD), pp. 276–291.
- CSMR-2008-DhambriSP #design #detection #visual notation
- Visual Detection of Design Anomalies (KD, HAS, PP), pp. 279–283.
- CSMR-2008-MendeBKM #clone detection #detection #evolution #product line #using
- Supporting the Grow-and-Prune Model in Software Product Lines Evolution Using Clone Detection (TM, FB, RK, GM), pp. 163–172.
- ICPC-2008-RoyC #clone detection #comparison #detection
- Scenario-Based Comparison of Clone Detection Techniques (CKR, JRC), pp. 153–162.
- ICPC-2008-RoyC08a #detection #flexibility #named #normalisation #pretty-printing #using
- NICAD: Accurate Detection of Near-Miss Intentional Clones Using Flexible Pretty-Printing and Code Normalization (CKR, JRC), pp. 172–181.
- ICSM-2008-TallamTG #concurrent #detection #parallel #slicing #source code #thread
- Dynamic slicing of multithreaded programs for race detection (ST, CT, RG), pp. 97–106.
- MSR-2008-ChangM #detection #evaluation #source code
- Evaluation of source code copy detection methods on freebsd (HFC, AM), pp. 61–66.
- MSR-2008-ThummalapentaX #detection #framework #mining #named #open source #repository #web
- SpotWeb: detecting framework hotspots via mining open source repositories on the web (ST, TX), pp. 109–112.
- MSR-2008-YoshimuraNHK #analysis #approach #detection #named #product line #variability
- FAVE: factor analysis based approach for detecting product line variability from change history (KY, FN, KH, TK), pp. 11–18.
- SCAM-2008-PentaCA #detection #evolution #source code
- The Evolution and Decay of Statically Detected Source Code Vulnerabilities (MDP, LC, LA), pp. 101–110.
- SCAM-2008-WangZZ #automation #detection #model checking #program analysis
- Automated Detection of Code Vulnerabilities Based on Program Analysis and Model Checking (LW, QZ, PZ), pp. 165–173.
- WCRE-2008-GuoZ #detection
- Detecting Clones in Business Applications (JG, YZ), pp. 91–100.
- WCRE-2008-IshioDMI #detection #java #mining #source code
- Mining Coding Patterns to Detect Crosscutting Concerns in Java Programs (TI, HD, TM, KI), pp. 123–132.
- PLDI-2008-ChughVJL #analysis #concurrent #data flow #detection #source code #using
- Dataflow analysis for concurrent programs using datarace detection (RC, JWV, RJ, SL), pp. 316–326.
- SAS-2008-BalakrishnanSIWG #analysis #detection #named #refinement
- SLR: Path-Sensitive Analysis through Infeasible-Path Detection and Syntactic Language Refinement (GB, SS, FI, OW, AG), pp. 238–254.
- GT-VMT-2006-LambersEO08 #detection #graph transformation #performance
- Efficient Conflict Detection in Graph Transformation Systems by Essential Critical Pairs (LL, HE, FO), pp. 17–26.
- CHI-2008-Kaneko #detection
- Detecting the direction of listening with the emg signals measured behind ears (NK), pp. 535–538.
- CHI-2008-RanjanBB #detection
- Improving meeting capture by applying television production principles with audio and motion detection (AR, JPB, RB), pp. 227–236.
- AdaEurope-2008-RazaV #detection #flexibility #framework #named #parallel #source code
- RCanalyser: A Flexible Framework for the Detection of Data Races in Parallel Programs (AR, GV), pp. 226–239.
- ICEIS-AIDSS-2008-BezerraW #algorithm #detection #process
- Anomaly Detection Algorithms in Business Process Logs (FdLB, JW), pp. 11–18.
- ICEIS-AIDSS-2008-Martin-ToralSD #corpus #detection #documentation
- Detection of Incoherences in a Technical and Normative Document Corpus (SMT, GISP, YAD), pp. 282–287.
- ICEIS-HCI-2008-ConciNPS #algorithm #detection
- Comparing Color and Texture-Based Algorithms for Human Skin Detection (AC, EN, JJP, ÁS), pp. 166–173.
- CIKM-2008-AlqadahB08a #clustering #detection #set
- Detecting significant distinguishing sets among bi-clusters (FA, RB), pp. 1455–1456.
- CIKM-2008-DuWW #community #detection #network
- Overlapping community structure detection in networks (ND, BW, BW), pp. 1371–1372.
- CIKM-2008-FaruquieNCS #detection #information management
- Exploiting context to detect sensitive information in call center conversations (TAF, SN, AC, LVS), pp. 1513–1514.
- CIKM-2008-HerschelN #detection #graph #scalability
- Scaling up duplicate detection in graph data (MH, FN), pp. 1325–1326.
- CIKM-2008-HuangWL #detection #precise
- Achieving both high precision and high recall in near-duplicate detection (LH, LW, XL), pp. 63–72.
- CIKM-2008-JiaYF #detection #peer-to-peer
- Spam characterization and detection in peer-to-peer file-sharing systems (DJ, WGY, OF), pp. 329–338.
- CIKM-2008-LiuMG #bound #detection #documentation #identification
- Identifying table boundaries in digital documents via sparse line detection (YL, PM, CLG), pp. 1311–1320.
- CIKM-2008-LuoYY #detection #realtime #video
- Real-time new event detection for video streams (GL, RY, PSY), pp. 379–388.
- CIKM-2008-TsengSC #abstraction #detection #email #novel
- A novel email abstraction scheme for spam detection (CYT, PCS, MSC), pp. 1393–1394.
- CIKM-2008-ZhuSC #detection #online
- Online spam-blog detection through blog search (LZ, AS, BC), pp. 1347–1348.
- ECIR-2008-EreraC #detection #email
- Conversation Detection in Email Systems (SE, DC), pp. 498–505.
- ECIR-2008-PotthastSG #automation #detection #wiki
- Automatic Vandalism Detection in Wikipedia (MP, BS, RG), pp. 663–668.
- ICML-2008-DundarWLSR #case study #classification #detection
- Polyhedral classifier for target detection: a case study: colorectal cancer (MD, MW, SL, MS, VCR), pp. 288–295.
- ICML-2008-SorokinaCRF #detection #interactive #statistics
- Detecting statistical interactions with additive groves of trees (DS, RC, MR, DF), pp. 1000–1007.
- ICPR-2008-Abdel-HakimF #detection #novel #quantifier
- A novel stability quantification of detected interest points in scale-space (AEAH, AAF), pp. 1–4.
- ICPR-2008-AnlongH #detection
- Frame-skipping tracking for single object with global motion detection (AM, HM), pp. 1–4.
- ICPR-2008-Bauckhage #classification #detection #probability
- Probabilistic Diffusion Classifiers for Object Detection (CB), pp. 1–4.
- ICPR-2008-BelleDS #detection #random #realtime #recognition
- Randomized trees for real-time one-step face detection and recognition (VB, TD, SS), pp. 1–4.
- ICPR-2008-Bileschi #detection #multi
- Object detection at multiple scales improves accuracy (SMB), pp. 1–5.
- ICPR-2008-CandamoG #detection #video
- Wire detection in low-altitude, urban, and low-quality video frames (JC, DBG), pp. 1–4.
- ICPR-2008-ChaeCY #detection #performance
- Color filtering-based efficient face detection (YNC, JC, HSY), pp. 1–4.
- ICPR-2008-ChangFLI #clustering #detection #kernel #multi
- Clustered Microcalcification detection based on a Multiple Kernel Support Vector Machine with Grouped Features (GF-SVM) (TTC, JF, HWL, HHSI), pp. 1–4.
- ICPR-2008-ChenHCZL #adaptation #detection #markov #random
- Change detection based on adaptive Markov Random Fields (KC, CH, JC, ZZ, HL), pp. 1–4.
- ICPR-2008-ChinGT #2d #detection #image
- Exact integral images at generic angles for 2D barcode detection (TJC, HG, NMT), pp. 1–4.
- ICPR-2008-ChowdhuryYULS #detection #image
- Detection of anatomical landmarks in human colon from computed tomographic colonography images (ASC, JY, RLVUJ, MGL, RMS), pp. 1–4.
- ICPR-2008-ChuangHFH #detection #multi #using
- Monocular multi-human detection using Augmented Histograms of Oriented Gradients (CHC, SSH, LCF, PYH), pp. 1–4.
- ICPR-2008-El-BazGFE #3d #analysis #approach #automation #detection #image #monitoring
- A new approach for automatic analysis of 3D low dose CT images for accurate monitoring the detected lung nodules (AEB, GLG, RF, MAEG), pp. 1–4.
- ICPR-2008-Farmer #detection #framework #image
- Application of the wrapper framework for image object detection (MF), pp. 1–4.
- ICPR-2008-FefilatyevG #detection #video
- Detection and tracking of marine vehicles in video (SF, DBG), pp. 1–4.
- ICPR-2008-GarainD #detection #documentation #empirical #image #word
- Stop word detection in compressed textual images: An experiment on indic script documents (UG, AKD), pp. 1–4.
- ICPR-2008-GuimaraesPP #approach #detection #difference #distance #graph #using #video
- An approach for video cut detection using bipartite graph matching as dissimilarity distance (SJFG, ZKGdPJ, HBdP), pp. 1–4.
- ICPR-2008-GurS #detection #invariant
- Non-Abelian invariant feature detection (YG, NAS), pp. 1–4.
- ICPR-2008-HanifPN #detection #image
- A cascade detector for text detection in natural scene images (SMH, LP, PN), pp. 1–4.
- ICPR-2008-HaqueMP #adaptation #detection #generative #multi #robust
- Improved Gaussian mixtures for robust object detection by adaptive multi-background generation (MH, MMM, MP), pp. 1–4.
- ICPR-2008-HuangLZ #detection
- A method of small object detection and tracking based on particle filters (YH, JL, CZ), pp. 1–4.
- ICPR-2008-HuangST #detection #using #video
- Detecting moving text in video using temporal information (WH, PS, CLT), pp. 1–4.
- ICPR-2008-HuAS #detection
- Detecting global motion patterns in complex videos (MH, SA, MS), pp. 1–5.
- ICPR-2008-HulkkonenH #detection #monitoring
- A minimum description length principle based method for signal change detection in machine condition monitoring (JJH, JVH), pp. 1–4.
- ICPR-2008-HuWJHG #detection #learning #online
- Human reappearance detection based on on-line learning (LH, YW, SJ, QH, WG), pp. 1–4.
- ICPR-2008-KazuiMMF #detection #matrix #using
- Incoherent motion detection using a time-series Gram matrix feature (MK, MM, SM, HF), pp. 1–5.
- ICPR-2008-KimS #consistency #detection #sequence #using #video
- Static text region detection in video sequences using color and orientation consistencies (DK, KS), pp. 1–4.
- ICPR-2008-KiryatiRIR #detection #realtime #video
- Real-time abnormal motion detection in surveillance video (NK, TRR, YI, SR), pp. 1–4.
- ICPR-2008-Kita #case study #detection #image #using
- A study of change detection from satellite images using joint intensity histogram (YK), pp. 1–4.
- ICPR-2008-KonKAT #adaptation #detection #interactive #realtime #using
- Adaptive habituation detection to build human computer interactive systems using a real-time cross-modal computation (MK, TK, KA, HT), pp. 1–4.
- ICPR-2008-KonyaSGE #algorithm #detection #robust #scalability
- A robust front page detection algorithm for large periodical collections (IVK, CS, SG, SE), pp. 1–5.
- ICPR-2008-KuksaHP #detection #kernel #performance
- Fast protein homology and fold detection with sparse spatial sample kernels (PPK, PHH, VP), pp. 1–4.
- ICPR-2008-LampertO #detection #image #linear
- Active contour detection of linear patterns in spectrogram images (TAL, SO), pp. 1–4.
- ICPR-2008-LangerK #approach #detection #image #realtime #robust
- A new hierarchical approach in robust real-time image feature detection and matching (ML, KDK), pp. 1–4.
- ICPR-2008-LeeWN #detection #performance #using
- Very fast ellipse detection using GPU-based RHT (JKL, BAW, TSN), pp. 1–4.
- ICPR-2008-LiuS08a #detection #robust #using
- Robust outdoor text detection using text intensity and shape features (ZL, SS), pp. 1–4.
- ICPR-2008-LiuZDY #detection #learning #sequence #video
- Video attention: Learning to detect a salient object sequence (TL, NZ, WD, ZY), pp. 1–4.
- ICPR-2008-LuJZ #detection #effectiveness #segmentation
- An effective method for detection and segmentation of the body of human in the view of a single stationary camera (HL, CJ, RZ), pp. 1–4.
- ICPR-2008-MaillardLD #detection #image
- Detection of digital processing of images through a realistic model of CCD noise (JBM, DL, FD), pp. 1–4.
- ICPR-2008-MakiKSS #automation #detection #interactive
- Image-based automatic detection of indoor scene events and interactive inquiry (KM, NK, NS, YS), pp. 1–4.
- ICPR-2008-MaL08a #approach #concept #detection #optimisation #performance #semantics
- An efficient gradient computation approach to discriminative fusion optimization in semantic concept detection (CM, CHL), pp. 1–4.
- ICPR-2008-MatsuiCM #automation #detection
- Bayesian sequential face detection with automatic re-initialization (AM, SC, TM), pp. 1–4.
- ICPR-2008-MengLMW #detection
- Directional entropy feature for human detection (LM, LL, SM, WW), pp. 1–4.
- ICPR-2008-MieziankoP #detection #multi
- Detecting changes in multilayered orthoimages with spatiotemporal texture blocks (RM, DP), pp. 1–4.
- ICPR-2008-MohantaSC #detection #multi #using
- Detection of representative frames of a shot using multivariate Wald-Wolfowitz test (PPM, SKS, BC), pp. 1–4.
- ICPR-2008-MuraiF #bound #detection #using #video
- Shot boundary detection using co-occurrence of global motion in video stream (YM, HF), pp. 1–4.
- ICPR-2008-NaturelO #approach #detection #statistics
- Detecting queues at vending machines: A statistical layered approach (XN, JMO), pp. 1–4.
- ICPR-2008-NingXZGH #detection #difference #learning
- Temporal difference learning to detect unsafe system states (HN, WX, YZ, YG, TSH), pp. 1–4.
- ICPR-2008-PanBS #detection #image #representation #using
- Text detection from scene images using sparse representation (WP, TDB, CYS), pp. 1–5.
- ICPR-2008-PiciarelliMF #detection
- Anomalous trajectory patterns detection (CP, CM, GLF), pp. 1–4.
- ICPR-2008-RicharzPF #3d #detection #gesture #realtime
- Real-time detection and interpretation of 3D deictic gestures for interactionwith an intelligent environment (JR, TP, GAF), pp. 1–4.
- ICPR-2008-RognvaldssonPBS #approach #detection #fault #multi #self
- A self-organized approach for unsupervised fault detection in multiple systems (TSR, GP, SB, MS), pp. 1–4.
- ICPR-2008-SezerMAC #detection #markov #named
- NorMaL: Non-compact Markovian Likelihood for change detection (OGS, JLM, YA, DBC), pp. 1–4.
- ICPR-2008-ShenZL #detection #higher-order #programming #using
- Deformable surface stereo tracking-by-detection using Second Order Cone Programming (SS, YZ, YL), pp. 1–4.
- ICPR-2008-ShivakumaraHT #detection #performance #using #video
- Efficient video text detection using edge features (PS, WH, CLT), pp. 1–4.
- ICPR-2008-ShoemakerBHBK #detection #performance
- Detecting and ordering salient regions for efficient browsing (LS, REB, LOH, KWB, WPK), pp. 1–4.
- ICPR-2008-SimonB #detection #estimation #geometry #multi #realtime
- Detection of the intersection lines in multiplanar environments: Application to real-time estimation of the camera-scene geometry (GS, MOB), pp. 1–4.
- ICPR-2008-SmithLN #detection
- Ballot mark detection (EHBS, DPL, GN), pp. 1–4.
- ICPR-2008-SrihariNNL #clique #detection #network
- Detecting hubs and quasi cliques in scale-free networks (SS, HKN, KN, HWL), pp. 1–4.
- ICPR-2008-SudoOTKA #detection #incremental #learning #online
- Online anomal movement detection based on unsupervised incremental learning (KS, TO, HT, HK, KA), pp. 1–4.
- ICPR-2008-VikstenNK #detection
- Point-of-interest detection for range data (FV, KN, MK), pp. 1–4.
- ICPR-2008-VisentiniSF #detection #online
- On-line boosted cascade for object detection (IV, LS, GLF), pp. 1–4.
- ICPR-2008-WangCS #detection
- Detecting shadows of moving vehicles based on HMM (YW, HDC, JS), pp. 1–4.
- ICPR-2008-WetzkerPKBAM #detection #generative #probability #roadmap #social #using
- Detecting trends in social bookmarking systems using a probabilistic generative model and smoothing (RW, TP, AK, CB, TA, FM), pp. 1–4.
- ICPR-2008-WuJP #detection #effectiveness #linear
- Effective features based on normal linear structures for detecting microcalcifications in mammograms (ZQW, JJ, YP), pp. 1–4.
- ICPR-2008-WuZWGL #detection #invariant #video #visual notation
- Invariant visual patterns for video copy detection (XW, YZ, YW, JG, JL), pp. 1–4.
- ICPR-2008-XuZW #detection #feature model #semantics
- Semantic feature extraction for accurate eye corner detection (CX, YZ, ZW), pp. 1–4.
- ICPR-2008-YamaguchiH #detection #image
- Improved percolation-based method for crack detection in concrete surface images (TY, SH), pp. 1–4.
- ICPR-2008-YangQ #analysis #component #detection #independence #network #using
- A network intrusion detection method using independent component analysis (DY, HQ), pp. 1–4.
- ICPR-2008-YingZ #detection #performance #using
- Efficient detection of projected concentric circles using four intersection points on a secant line (XY, HZ), pp. 1–4.
- ICPR-2008-YuLL #detection #recognition #robust #video
- Robust time recognition of video clock based on digit transition detection and digit-sequence recognition (XY, YL, WSL), pp. 1–4.
- ICPR-2008-ZaidiS #algorithm #detection
- Confidence rated boosting algorithm for generic object detection (NAZ, DS), pp. 1–4.
- ICPR-2008-ZareG #detection #process #using
- Endmember detection using the Dirichlet process (AZ, PDG), pp. 1–4.
- ICPR-2008-ZhangGZ #detection #modelling
- Complex background modeling and motion detection based on Texture Pattern Flow (BZ, YG, BZ), pp. 1–4.
- ICPR-2008-ZhangK #automation #detection
- Automatic road sign detection method based on Color Barycenters Hexagon model (QZ, SiK), pp. 1–4.
- ICPR-2008-ZhengW #detection #precise #robust
- Robust and precise eye detection based on locally selective projection (YZ, ZW), pp. 1–4.
- KDD-2008-BoriahKSPK #case study #detection
- Land cover change detection: a case study (SB, VK, MS, CP, SAK), pp. 857–865.
- KDD-2008-ChowGS #detection #privacy #using
- Detecting privacy leaks using corpus-based association rules (RC, PG, JS), pp. 893–901.
- KDD-2008-DasSN #category theory #dataset #detection
- Anomaly pattern detection in categorical datasets (KD, JGS, DBN), pp. 169–176.
- KDD-2008-KriegelSZ #detection
- Angle-based outlier detection in high-dimensional data (HPK, MS, AZ), pp. 444–452.
- KDD-2008-ParikhS #detection #query #realtime #scalability
- Scalable and near real-time burst detection from eCommerce queries (NP, NS), pp. 972–980.
- KDD-2008-YangZYW #detection
- Local peculiarity factor and its application in outlier detection (JY, NZ, YY, JW), pp. 776–784.
- SEKE-2008-AltahatET #analysis #detection #diagrams #graph transformation #interactive #uml
- Applying Critical Pair Analysis in Graph Transformation Systems to Detect Syntactic Aspect Interaction in UML State Diagrams (ZA, TE, LT), pp. 905–911.
- SEKE-2008-CemerlicYK #detection #network
- Network Intrusion Detection Based on Bayesian Networks (AC, LY, JMK), pp. 791–794.
- SEKE-2008-HuS #design pattern #detection #dynamic analysis #java #source code
- Dynamic Analysis and Design Pattern Detection in Java Programs (LH, KS), pp. 842–846.
- SEKE-2008-KraftBS #clone detection #detection
- Cross-language Clone Detection (NAK, BWB, RKS), pp. 54–59.
- SEKE-2008-ParveenATMF #analysis #detection #probability #towards
- Towards the Detection of Emulated Environments via Analysis of the Stochastic Nature of System Calls (TP, WHA, SRT, GAM, RF), pp. 802–807.
- SIGIR-2008-CanKBKOU #detection
- Bilkent news portal: a personalizable system with new event detection and tracking capabilities (FC, SK, OB, SK, HCO, EU), p. 885.
- SIGIR-2008-Chernov #detection
- Task detection for activity-based desktop search (SC), p. 894.
- SIGIR-2008-ClementsVR #detection #retrieval #social
- Detecting synonyms in social tagging systems to improve content retrieval (MC, APdV, MJTR), pp. 739–740.
- SIGIR-2008-GoharianM #detection #documentation #on the
- On document splitting in passage detection (NG, SSRM), pp. 833–834.
- SIGIR-2008-SeoC #detection #reuse
- Local text reuse detection (JS, WBC), pp. 571–578.
- SIGIR-2008-TanWC #detection #sentiment #using
- Combining learn-based and lexicon-based techniques for sentiment detection without using labeled examples (ST, YW, XC), pp. 743–744.
- SIGIR-2008-TheobaldSP #detection #named #performance #robust #scalability #web
- SpotSigs: robust and efficient near duplicate detection in large web collections (MT, JS, AP), pp. 563–570.
- MoDELS-2008-El-BoussaidiM #constraints #design #detection #using
- Detecting Patterns of Poor Design Solutions Using Constraint Propagation (GEB, HM), pp. 189–203.
- MoDELS-2008-El-BoussaidiM #constraints #design #detection #using
- Detecting Patterns of Poor Design Solutions Using Constraint Propagation (GEB, HM), pp. 189–203.
- OOPSLA-2008-ArnoldVY #detection #fault #named #performance #runtime
- QVM: an efficient runtime for detecting defects in deployed systems (MA, MTV, EY), pp. 143–162.
- SAC-2008-AbbesBR #detection
- An inference system for detecting firewall filtering rules anomalies (TA, AB, MR), pp. 2122–2128.
- SAC-2008-AdnaneSBM #behaviour #detection #reasoning #trust
- Autonomic trust reasoning enables misbehavior detection in OLSR (AA, RTdSJ, CB, LM), pp. 2006–2013.
- SAC-2008-AmatoCCMTVGLGM #analysis #detection
- A web-based system for the collection and analysis of spectra signals for early detection of voice alterations (FA, MC, CC, FM, GT, PV, AG, NL, SG, CM), pp. 1405–1409.
- SAC-2008-BezerraW #algorithm #detection #process
- Anomaly detection algorithms in logs of process aware systems (FdLB, JW), pp. 951–952.
- SAC-2008-ChenXN #analysis #detection #fault #specification
- A detectability analysis of fault classes for Boolean specifications (ZC, BX, CN), pp. 826–830.
- SAC-2008-CruzBDSTVCCTM #approach #detection #named #workflow
- OrthoSearch: a scientific workflow approach to detect distant homologies on protozoans (SMSdC, VB, AMRD, ES, FT, CV, MLMC, RRCC, DAT, MM), pp. 1282–1286.
- SAC-2008-DiamantiniP #detection
- Borderline detection by Bayes vector quantizers (CD, DP), pp. 904–908.
- SAC-2008-DongSZ #design pattern #detection
- Design pattern detection by template matching (JD, YS, YZ), pp. 765–769.
- SAC-2008-FonsecaVM #data access #detection #online #using
- Online detection of malicious data access using DBMS auditing (JF, MV, HM), pp. 1013–1020.
- SAC-2008-KemalisT #approach #detection #injection #named
- SQL-IDS: a specification-based approach for SQL-injection detection (KK, TT), pp. 2153–2158.
- SAC-2008-KuangZ #algorithm #detection #using
- An anomaly intrusion detection method using the CSI-KNN algorithm (LK, MZ), pp. 921–926.
- SAC-2008-LiG #detection #network #optimisation #using
- TCM-KNN scheme for network anomaly detection using feature-based optimizations (YL, LG), pp. 2103–2109.
- SAC-2008-LoTP #detection #hardware #implementation #network #regular expression
- Hardware implementation for network intrusion detection rules with regular expression support (CTDL, YGT, KP), pp. 1535–1539.
- SAC-2008-SchiabelSA #detection #image #segmentation
- Segmentation technique for detecting suspect masses in dense breast digitized images as a tool for mammography CAD schemes (HS, VTS, MFA), pp. 1333–1337.
- SAC-2008-SeifertWK #algorithm #detection #divide and conquer #interactive #paradigm
- Application of divide-and-conquer algorithm paradigm to improve the detection speed of high interaction client honeypots (CS, IW, PK), pp. 1426–1432.
- SAC-2008-SpinosaCG #clustering #concept #data type #detection #network #novel
- Cluster-based novel concept detection in data streams applied to intrusion detection in computer networks (EJS, ACPLFdC, JG), pp. 976–980.
- SAC-2008-TanWWC #detection #problem #semantics #using
- Using unlabeled data to handle domain-transfer problem of semantic detection (ST, YW, GW, XC), pp. 896–903.
- SAC-2008-YuB #detection #effectiveness #multi #performance
- A fast and effective method to detect multiple least significant bits steganography (XY, NB), pp. 1443–1447.
- FSE-2008-ParkS #concurrent #detection #random #source code
- Randomized active atomicity violation detection in concurrent programs (CSP, KS), pp. 135–145.
- FSE-2008-SamaRWE #adaptation #detection #fault #modelling
- Model-based fault detection in context-aware adaptive applications (MS, DSR, ZW, SGE), pp. 261–271.
- ICSE-2008-BlancMMM #consistency #detection #nondeterminism
- Detecting model inconsistency through operation-based model construction (XB, IM, AM, TM), pp. 511–520.
- ICSE-2008-DeissenboeckHJSWGT #clone detection #detection #development #modelling
- Clone detection in automotive model-based development (FD, BH, EJ, BS, SW, JFG, ST), pp. 603–612.
- ICSE-2008-GabelJS #detection #scalability #semantics
- Scalable detection of semantic clones (MG, LJ, ZS), pp. 321–330.
- ICSE-2008-HammerDVT #detection
- Dynamic detection of atomic-set-serializability violations (CH, JD, MV, FT), pp. 231–240.
- ICSE-2008-WangZXAS #approach #debugging #detection #execution #natural language #using
- An approach to detecting duplicate bug reports using natural language and execution information (XW, LZ, TX, JA, JS), pp. 461–470.
- ICSE-2008-WassermannS #detection #static analysis
- Static detection of cross-site scripting vulnerabilities (GW, ZS), pp. 171–180.
- ICSE-2008-XuR #detection #java #memory management #precise #profiling #using
- Precise memory leak detection for java software using container profiling (G(X, AR), pp. 151–160.
- LDTA-2007-Schmitz08 #ambiguity #detection
- An Experimental Ambiguity Detection Tool (SS), pp. 69–84.
- SPLC-2008-Dalgarno #clone detection #detection #product line
- Jump-Starting Software Product Lines with Clone Detection (AMD), p. 351.
- HPDC-2008-ShrinivasN #data mining #detection #grid #mining
- Issues in applying data mining to grid job failure detection and diagnosis (LS, JFN), pp. 239–240.
- LCTES-2008-LeeMK #compilation #detection #embedded #heuristic #java
- Enhanced hot spot detection heuristics for embedded java just-in-time compilers (SWL, SMM, SMK), pp. 13–22.
- ICLP-2008-GebserSTUV #biology #consistency #detection #network #nondeterminism #programming #scalability #set
- Detecting Inconsistencies in Large Biological Networks with Answer Set Programming (MG, TS, ST, BU, PV), pp. 130–144.
- ICLP-2008-Tsitovich #detection #model checking #security #using
- Detection of Security Vulnerabilities Using Guided Model Checking (AT), pp. 822–823.
- ICST-2008-KolovosPP #consistency #detection #modelling #nondeterminism
- Detecting and Repairing Inconsistencies across Heterogeneous Models (DSK, RFP, FP), pp. 356–364.
- ICST-2008-StreckerM #detection #fault #testing #user interface
- Relationships between Test Suites, Faults, and Fault Detection in GUI Testing (JS, AMM), pp. 12–21.
- ISSTA-2008-BoddenH #aspectj #concurrent #detection #effectiveness #named #using
- Racer: effective race detection using aspectj (EB, KH), pp. 155–166.
- ISSTA-2008-TianNGT #concurrent #detection #recognition
- Dynamic recognition of synchronization operations for improved data race detection (CT, VN, RG, ST), pp. 143–154.
- ASE-2007-MohaG #design #detection #fault #named
- Decor: a tool for the detection of design defects (NM, YGG), pp. 527–528.
- ASE-2007-TairasGB #clone detection #detection #visualisation
- Visualizing clone detection results (RT, JG, IDB), pp. 549–550.
- ASE-2007-TanejaDX #api #automation #detection #library #refactoring
- Automated detection of api refactorings in libraries (KT, DD, TX), pp. 377–380.
- CASE-2007-AlenljungSLA #detection #fault #implementation #process
- PLC-based Implementation of Process Observation and Fault Detection for Discrete Event Systems (TA, MS, BL, KÅ), pp. 207–212.
- CASE-2007-FagioliniVPDB #detection #distributed #implementation #monitoring #multi
- Local Monitor Implementation for Decentralized Intrusion Detection in Secure Multi-Agent Systems (AF, GV, LP, GD, AB), pp. 454–459.
- DAC-2007-WuW #detection #incremental
- Improving Voltage Assignment by Outlier Detection and Incremental Placement (HW, MDFW), pp. 459–464.
- DATE-2007-FavalliM #detection #fault #interactive
- Interactive presentation: Pulse propagation for the detection of small delay defects (MF, CM), pp. 1295–1300.
- DATE-2007-HashempourL #detection #fault #modelling
- Circuit-level modeling and detection of metallic carbon nanotube defects in carbon nanotube FETs (HH, FL), pp. 841–846.
- DATE-2007-HsiehLB #detection #fault #reduction
- Reduction of detected acceptable faults for yield improvement via error-tolerance (TYH, KJL, MAB), pp. 1599–1604.
- DATE-2007-KokkelerSKK #detection
- Cyclostationary feature detection on a tiled-SoC (ABJK, GJMS, TK, JK), pp. 171–176.
- DocEng-2007-SaccolEGZ #detection #xml
- XML version detection (DdBS, NE, RdMG, CZ), pp. 79–88.
- ICDAR-2007-AradhyeM #detection
- Exploiting Videotext _Events_ for Improved Videotext Detection (HBA, GKM), pp. 894–898.
- ICDAR-2007-CeciBPM #approach #data mining #detection #mining #order
- A Data Mining Approach to Reading Order Detection (MC, MB, GP, DM), pp. 924–928.
- ICDAR-2007-EgoziDCF #algorithm #detection
- An EM Based Algorithm for Skew Detection (AE, ID, JC, MCF), pp. 277–281.
- ICDAR-2007-LamiroyFG #detection #robust
- Robust Circle Detection (BL, LF, OG), pp. 526–530.
- ICDAR-2007-LiwickiIB #detection #online #programming #using
- On-Line Handwritten Text Line Detection Using Dynamic Programming (ML, EI, HB), pp. 447–451.
- ICDAR-2007-LouloudisGH #approach #detection #documentation #using
- Text Line Detection in Unconstrained Handwritten Documents Using a Block-Based Hough Transform Approach (GL, BG, CH), pp. 599–603.
- ICDAR-2007-LuT #automation #detection #documentation
- Automatic Detection of Document Script and Orientation (SJL, CLT), pp. 237–241.
- ICDAR-2007-LuWT #detection #documentation #performance
- Fast and Accurate Detection of Document Skew and Orientation (SJL, JW, CLT), pp. 684–688.
- ICDAR-2007-QuiniouA #detection #fault #network #online #recognition
- Use of a Confusion Network to Detect and Correct Errors in an On-Line Handwritten Sentence Recognition System (SQ, ÉA), pp. 382–386.
- ICDAR-2007-RusinolLD #detection #visual notation
- Camera-Based Graphical Symbol Detection (MR, JL, PD), pp. 884–888.
- ICDAR-2007-SubramanianNDC #detection
- Character-Stroke Detection for Text-Localization and Extraction (KS, PN, MD, DAC), pp. 33–37.
- ICDAR-2007-SuZHZ07a #detection
- Skew Detection for Chinese Handwriting by Horizontal Stroke Histogram (THS, TWZ, HJH, YZ), pp. 899–903.
- ICDAR-2007-WillemsV #approach #detection #interactive #network
- A Bayesian Network Approach to Mode Detection for Interactive Maps (DW, LV), pp. 869–873.
- ICDAR-2007-ZhuD #automation #detection #documentation
- Automatic Document Logo Detection (GZ, DSD), pp. 864–868.
- SIGMOD-2007-LeonardiB #database #detection #named #relational #xml
- XANADUE: a system for detecting changes to XML data in tree-unaware relational databases (EL, SSB), pp. 1137–1140.
- SIGMOD-2007-LuoTY #adaptation #detection #realtime
- Resource-adaptive real-time new event detection (GL, CT, PSY), pp. 497–508.
- VLDB-2007-HaasHM #dependence #detection #feedback #query
- Detecting Attribute Dependencies from Query Feedback (PJH, FH, VM), pp. 830–841.
- VLDB-2007-JorwekarFRS #automation #detection
- Automating the Detection of Snapshot Isolation Anomalies (SJ, AF, KR, SS), pp. 1263–1274.
- VLDB-2007-ShenZHSZ #detection #named #realtime #video
- UQLIPS: A Real-time Near-duplicate Video Clip Detection System (HTS, XZ, ZH, JS, XZ), pp. 1374–1377.
- ITiCSE-2007-JiWC #detection #source code
- A source code linearization technique for detecting plagiarized programs (JHJ, GW, HGC), pp. 73–77.
- TACAS-2007-ElkindGP #detection #sequence chart
- Detecting Races in Ensembles of Message Sequence Charts (EE, BG, DP), pp. 420–434.
- ICPC-2007-LienhardGN #dependence #detection
- Tracking Objects to Detect Feature Dependencies (AL, OG, ON), pp. 59–68.
- ICPC-2007-PetterssonL #approach #design pattern #detection
- A Non-conservative Approach to Software Pattern Detection (NP, WL), pp. 189–198.
- ICPC-2007-ZouGH #detection #interactive
- Detecting Interaction Coupling from Task Interaction Histories (LZ, MWG, AEH), pp. 135–144.
- ICSM-2007-BrandBS #analysis #debugging #detection
- Evidence-Based Analysis and Inferring Preconditions for Bug Detection (DB, MB, VCS), pp. 44–53.
- ICSM-2007-Chaabane #analysis #detection
- Poor Performing Patterns of Code: Analysis and Detection (RC), pp. 501–502.
- ICSM-2007-McMasterM #analysis #detection #fault #probability #reduction #testing
- Fault Detection Probability Analysis for Coverage-Based Test Suite Reduction (SM, AMM), pp. 335–344.
- ICSM-2007-ShaoKP #detection #empirical #evaluation #parallel #semantics
- Evaluation of Semantic Interference Detection in Parallel Changes: an Exploratory Experiment (DS, SK, DEP), pp. 74–83.
- MSR-2007-BirdGD #detection
- Detecting Patch Submission and Acceptance in OSS Projects (CB, AG, PTD), p. 26.
- MSR-2007-WeissgerberPB #data mining #detection #developer #how #mining #visual notation
- Visual Data Mining in Software Archives to Detect How Developers Work Together (PW, MP, MB), p. 9.
- PASTE-2007-LeS #analysis #detection
- Refining buffer overflow detection via demand-driven path-sensitive analysis (WL, MLS), pp. 63–68.
- SCAM-2007-Larson #debugging #detection #framework #named #tool support
- SUDS: An Infrastructure for Creating Bug Detection Tools (EL), pp. 123–132.
- WCRE-2007-EvansFM #abstraction #clone detection #detection
- Clone Detection via Structural Abstraction (WSE, CWF, FM), pp. 150–159.
- WCRE-2007-SousaMUK #detection #execution
- Detecting Implied Scenarios from Execution Traces (FCdS, NCM, SU, JK), pp. 50–59.
- PLDI-2007-CheremPR #analysis #detection #memory management #using
- Practical memory leak detection using guarded value-flow analysis (SC, LP, RR), pp. 480–491.
- PLDI-2007-DilligDA #consistency #detection #fault #nondeterminism #semantics #using
- Static error detection using semantic inconsistency inference (ID, TD, AA), pp. 435–445.
- ICALP-2007-Schmitz #ambiguity #context-free grammar #detection
- Conservative Ambiguity Detection in Context-Free Grammars (SS), pp. 692–703.
- CHI-2007-HurstHM #detection
- Dynamic detection of novice vs. skilled use without a task model (AH, SEH, JM), pp. 271–280.
- CHI-2007-IqbalB #comprehension #detection #interactive #modelling
- Understanding and developing models for detecting and differentiating breakpoints during interactive tasks (STI, BPB), pp. 697–706.
- CHI-2007-ThompsonRYB #detection #interface #visual notation
- Command line or pretty lines?: comparing textual and visual interfaces for intrusion detection (RST, EMR, WY, BPB), p. 1205.
- DHM-2007-Su #detection #performance #precise
- Enhancing Sense of Reality by Efficient and Precise Collision Detection in Virtual Environments (CJS), pp. 969–978.
- DHM-2007-ZhuXYM #detection #novel
- A Novel Method for Cloth-Body Collision Detection (XZ, SX, YY, TM), pp. 1056–1063.
- HCI-AS-2007-SaC07a #detection #learning #ubiquitous
- Detecting Learning Difficulties on Ubiquitous Scenarios (MdS, LC), pp. 235–244.
- HCI-IDU-2007-FujiokaTKO #coordination #detection #problem #usability
- Tool for Detecting Webpage Usability Problems from Mouse Click Coordinate Logs (RF, RT, YK, HO), pp. 438–445.
- HCI-IDU-2007-HwangS #detection #problem #usability #what
- What Makes Evaluators to Find More Usability Problems?: A Meta-analysis for Individual Detection Rates (WH, GS), pp. 499–507.
- HCI-IPT-2007-ParkJ #automation #detection #documentation #image #mobile #using #word
- Automatic Word Detection System for Document Image Using Mobile Devices (AP, KJ), pp. 438–444.
- HCI-MIE-2007-ChanCCHH #detection #multi #using
- A New Method for Multi-finger Detection Using a Regular Diffuser (LWC, YFC, YWC, YPH, JYjH), pp. 573–582.
- HCI-MIE-2007-PeterSVUNJKG #detection #monitoring #performance #usability
- EREC-II in Use — Studies on Usability and Suitability of a Sensor System for Affect Detection and Human Performance Monitoring (CP, RS, JV, BU, NN, HJ, KK, RG), pp. 465–474.
- HIMI-IIE-2007-MoradiKSH #algorithm #detection #navigation #realtime
- A Real-Time GPU-Based Wall Detection Algorithm for Mapping and Navigation in Indoor Environments (HM, EK, DNS, JH), pp. 1072–1077.
- HIMI-MTT-2007-CaoXR #detection
- Moving Object Contour Detection Based on S-T Characteristics in Surveillance (YyC, GX, TR), pp. 575–583.
- HIMI-MTT-2007-TogawaKY #communication #detection #mining #network #peer-to-peer #using
- Peer-to-Peer File Sharing Communication Detection System Using Network Traffic Mining (ST, KK, YY), pp. 769–778.
- AdaEurope-2007-BliebergerBM #ada #detection #multi #source code #static analysis
- Static Detection of Livelocks in Ada Multitasking Programs (JB, BB, RM), pp. 69–83.
- AdaEurope-2007-LauLCY #detection #fault #on the
- On Detecting Double Literal Faults in Boolean Expressions (MFL, YL, TYC, YTY), pp. 55–68.
- CAiSE-2007-EderW #comparison #detection #graph #ontology #using
- Change Detection in Ontologies Using DAG Comparison (JE, KW), pp. 21–35.
- ICEIS-AIDSS-2007-SkaruzSB #approach #detection #network #sql
- Recurrent Neural Networks Approach to The Detection of SQL Attacks (JS, FS, PB), pp. 191–197.
- ICEIS-EIS-2007-AmritH #detection #matrix #problem #process
- Matrix Based Problem Detection in the Application of Software Process Patterns (CA, JvH), pp. 316–320.
- ICEIS-SAIC-2007-ChenC #bottom-up #detection #difference #process
- A Simulation-Based Difference Detection Technique for Bottom-Up Process Reconciliation (XC, PWHC), pp. 72–77.
- ICEIS-SAIC-2007-DandashWLS #detection #internet
- A New Group Key Management Structure for Fraudulent Internet Banking Payments Detection (OD, YW, PDL, BS), pp. 57–62.
- CIKM-2007-AngiulliF07a #detection
- Detecting distance-based outliers in streams of data (FA, FF), pp. 811–820.
- CIKM-2007-BrzeskiIK #detection
- Leveraging context in user-centric entity detection systems (VvB, UI, RK), pp. 691–700.
- CIKM-2007-LeitaoCW #detection #fuzzy #similarity #xml
- Structure-based inference of xml similarity for fuzzy duplicate detection (LL, PC, MW), pp. 293–302.
- ECIR-2007-ShahE #detection #documentation #metric #representation #topic
- Use of Topicality and Information Measures to Improve Document Representation for Story Link Detection (CS, KE), pp. 393–404.
- ICML-2007-HaiderBS #clustering #detection #email #streaming
- Supervised clustering of streaming data for email batch detection (PH, UB, TS), pp. 345–352.
- KDD-2007-CurryGLVB #case study #detection #scalability #set
- Detecting changes in large data sets of payment card data: a case study (CC, RLG, DL, SV, JB), pp. 1018–1022.
- KDD-2007-DasS #category theory #dataset #detection
- Detecting anomalous records in categorical datasets (KD, JGS), pp. 220–229.
- KDD-2007-FastFMTJGK #detection #preprocessor #relational
- Relational data pre-processing techniques for improved securities fraud detection (ASF, LF, MEM, BJT, DJ, HGG, JK), pp. 941–949.
- KDD-2007-JoLG #correlation #detection #graph #research #topic
- Detecting research topics via the correlation between graphs and texts (YJ, CL, CLG), pp. 370–379.
- KDD-2007-LeskovecKGFVG #detection #effectiveness #network
- Cost-effective outbreak detection in networks (JL, AK, CG, CF, JMV, NSG), pp. 420–429.
- KDD-2007-RaoBFSON #detection #machine learning #named
- LungCAD: a clinically approved, machine learning system for lung cancer detection (RBR, JB, GF, MS, NO, DPN), pp. 1033–1037.
- KDD-2007-SongWJR #detection #multi #statistics
- Statistical change detection for multi-dimensional data (XS, MW, CMJ, SR), pp. 667–676.
- KDD-2007-TandonC #detection #network #validation
- Weighting versus pruning in rule validation for detecting network and host anomalies (GT, PKC), pp. 697–706.
- KDD-2007-YankovKMCZ #detection #scalability
- Detecting time series motifs under uniform scaling (DY, EJK, JM, BYcC, VBZ), pp. 844–853.
- KDD-2007-YeWLY #detection #named
- IMDS: intelligent malware detection system (YY, DW, TL, DY), pp. 1043–1047.
- KDD-2007-ZhengSWW #detection #generative #optimisation
- Joint optimization of wrapper generation and template detection (SZ, RS, JRW, DW), pp. 894–902.
- MLDM-2007-LateckiLP #detection #kernel
- Outlier Detection with Kernel Density Functions (LJL, AL, DP), pp. 61–75.
- MLDM-2007-MicarelliS #approach #detection
- A Case-Based Approach to Anomaly Intrusion Detection (AM, GS), pp. 434–448.
- MLDM-2007-SadoddinG #case study #comparative #data mining #detection #machine learning #mining
- A Comparative Study of Unsupervised Machine Learning and Data Mining Techniques for Intrusion Detection (RS, AAG), pp. 404–418.
- SEKE-2007-GokhaleL #detection #multi
- Multi-level Anomaly Detection with Application-Level Data (SSG, JL), p. 718–?.
- SEKE-2007-KanaskarSR #analysis #approach #detection #using
- A Dynamical System Approach to Intrusion Detection Using System Call Analysis (NK, RS, SR), pp. 710–717.
- SEKE-2007-LiangS #aspect-oriented #composition #detection #specification
- Modular Specification of Aspect-oriented Systems and Aspect Conflicts Detection (HL, JS), pp. 77–80.
- SEKE-2007-SantosH #algorithm #detection #semantics #xml
- A Semantical Change Detection Algorithm for XML (RCS, CSH), pp. 438–443.
- SIGIR-2007-CastilloDGMS #detection #using #web
- Know your neighbors: web spam detection using the web topology (CC, DD, AG, VM, FS), pp. 423–430.
- SIGIR-2007-FernandezL #analysis #detection #using
- Novelty detection using local context analysis (RTF, DEL), pp. 725–726.
- SIGIR-2007-HeCL #detection
- Analyzing feature trajectories for event detection (QH, KC, EPL), pp. 207–214.
- SIGIR-2007-HuffmanLSWYR #detection #evaluation #multi
- Multiple-signal duplicate detection for search evaluation (SBH, ARL, APS, HWT, FY, HR), pp. 223–230.
- SIGIR-2007-LiQLY #categorisation #clustering #detection
- Detecting, categorizing and clustering entity mentions in Chinese text (WL, DQ, QL, CY), pp. 647–654.
- SIGIR-2007-MamouRS #detection #independence
- Vocabulary independent spoken term detection (JM, BR, OS), pp. 615–622.
- SIGIR-2007-Potthast #detection #similarity #wiki
- Wikipedia in the pocket: indexing technology for near-duplicate detection and high similarity search (MP), p. 909.
- SIGIR-2007-RoussinovFS #detection #word
- Detecting word substitutions: PMI vs. HMM (DR, SF, DBS), pp. 885–886.
- SIGIR-2007-SunMGYZ #detection #documentation #multi #segmentation #topic
- Topic segmentation with shared topic detection and alignment of multiple documents (BS, PM, CLG, JY, HZ), pp. 199–206.
- SIGIR-2007-ZhangZW #detection
- New event detection based on indexing-tree and named entity (KZ, JZ, LGW), pp. 215–222.
- MoDELS-2007-JayaramanWEG #analysis #composition #detection #feature model #interactive #product line #using
- Model Composition in Product Lines and Feature Interaction Detection Using Critical Pair Analysis (PKJ, JW, AME, HG), pp. 151–165.
- MoDELS-2007-MassicotteCBL #detection #modelling
- Model-Driven, Network-Context Sensitive Intrusion Detection (FM, MC, LCB, YL), pp. 61–75.
- MoDELS-2007-JayaramanWEG #analysis #composition #detection #feature model #interactive #product line #using
- Model Composition in Product Lines and Feature Interaction Detection Using Critical Pair Analysis (PKJ, JW, AME, HG), pp. 151–165.
- MoDELS-2007-MassicotteCBL #detection #modelling
- Model-Driven, Network-Context Sensitive Intrusion Detection (FM, MC, LCB, YL), pp. 61–75.
- PPDP-2007-Sagonas #detection #erlang #fault #source code #static analysis #using
- Detecting defects in Erlang programs using static analysis (KFS), p. 37.
- POPL-2007-JumpM #detection #garbage collection #memory management #named
- Cork: dynamic memory leak detection for garbage-collected languages (MJ, KSM), pp. 31–38.
- POPL-2007-NaikA #alias #concurrent #detection
- Conditional must not aliasing for static race detection (MN, AA), pp. 327–338.
- POPL-2007-PredaCJD #approach #detection #semantics
- A semantics-based approach to malware detection (MDP, MC, SJ, SKD), pp. 377–388.
- SAC-2007-AlbertiniM #detection #network #self
- A self-organizing neural network for detecting novelties (MKA, RFdM), pp. 462–466.
- SAC-2007-CicchettiR #detection #modelling #specification #weaving
- Weaving models in conflict detection specifications (AC, AR), pp. 1035–1036.
- SAC-2007-FangWLYD #assessment #detection #multi #sequence #using
- The detection and assessment of possible RNA secondary structure using multiple sequence alignment (XF, ZW, ZL, BY, FD), pp. 133–137.
- SAC-2007-KoschmiderO #detection #how #process #question #semantics
- How to detect semantic business process model variants? (AK, AO), pp. 1263–1264.
- SAC-2007-MaHA #detection #evaluation
- Evaluation of the QoS of crash-recovery failure detection (TM, JH, SA), pp. 538–542.
- SAC-2007-MeddebDB #detection
- Global intrusion detection and tolerance in networked systems (AM, YD, NB), pp. 188–189.
- SAC-2007-PlattGM #detection #on the #query #sequence #topic #using
- On using user query sequence to detect off-topic search (AP, NG, SSRM), pp. 882–883.
- SAC-2007-SoleimaniADDBA #detection #named #reliability
- RAAS: a reliable analyzer and archiver for snort intrusion detection system (MS, EKA, MD, MD, AB, MA), pp. 259–263.
- SAC-2007-SongJMJXH #detection #programming
- Mass edge detection in mammography based on plane fitting and dynamic programming (ES, LJ, BM, RJ, XX, CCH), pp. 80–81.
- SAC-2007-SpinosaCG #approach #clustering #concept #data type #detection #named
- OLINDDA: a cluster-based approach for detecting novelty and concept drift in data streams (EJS, ACPdLFdC, JG), pp. 448–452.
- SAC-2007-YiKOJKD #detection #hardware #performance
- Memory-efficient content filtering hardware for high-speed intrusion detection systems (SY, BKK, JO, JJ, GK, CRD), pp. 264–269.
- ESEC-FSE-2007-BasitJ #clone detection #detection #flexibility #performance
- Efficient token based clone detection with flexible tokenization (HAB, SJ), pp. 513–516.
- ESEC-FSE-2007-EvansS #approach #detection #difference #testing
- Differential testing: a new approach to change detection (RBE, AS), pp. 549–552.
- ESEC-FSE-2007-JiangSC #debugging #detection
- Context-based detection of clone-related bugs (LJ, ZS, EC), pp. 55–64.
- ESEC-FSE-2007-MizunoK #detection #empirical #fault
- Training on errors experiment to detect fault-prone software modules by spam filter (OM, TK), pp. 405–414.
- ESEC-FSE-2007-NgoT #detection #scalability
- Detecting large number of infeasible paths through recognizing their patterns (MNN, HBKT), pp. 215–224.
- ESEC-FSE-2007-VoungJL #concurrent #detection #named
- RELAY: static race detection on millions of lines of code (JWV, RJ, SL), pp. 205–214.
- ESEC-FSE-2007-WasylkowskiZL #detection
- Detecting object usage anomalies (AW, AZ, CL), pp. 35–44.
- ESEC-FSE-2007-YeCCX #composition #detection
- Detection and resolution of atomicity violation in service composition (CY, SCC, WKC, CX), pp. 235–244.
- ICSE-2007-DammL #detection #fault #implementation #metric
- Company-Wide Implementation of Metrics for Early Software Fault Detection (LOD, LL), pp. 560–570.
- ICSE-2007-JiangMSG #detection #named #scalability
- DECKARD: Scalable and Accurate Tree-Based Detection of Code Clones (LJ, GM, ZS, SG), pp. 96–105.
- ICSE-2007-RunesonAN #detection #fault #natural language #using
- Detection of Duplicate Defect Reports Using Natural Language Processing (PR, MA, ON), pp. 499–510.
- CGO-2007-WangKWY #detection #fault #multi #thread
- Compiler-Managed Software-based Redundant Multi-Threading for Transient Fault Detection (CW, HSK, YW, VY), pp. 244–258.
- HPCA-2007-MeixnerS #detection #fault #online
- Error Detection via Online Checking of Cache Coherence with Token Coherence Signatures (AM, DJS), pp. 145–156.
- HPCA-2007-ZhouTZ #concurrent #detection #named
- HARD: Hardware-Assisted Lockset-based Race Detection (PZ, RT, YZ), pp. 121–132.
- HPDC-2007-LuLJ #adaptation #consistency #detection #framework #idea #named
- IDEA: : an infrastructure for detection-based adaptive consistency control in replicated services (YL, YL, HJ), pp. 223–224.
- ISMM-2007-NguyenR #detection #memory management #using
- Detecting and eliminating memory leaks using cyclic memory allocation (HHN, MCR), pp. 15–30.
- PPoPP-2007-MuhlenfeldW #c++ #concurrent #detection #fault #multi #thread
- Fault detection in multi-threaded c++ server applications (AM, FW), pp. 142–143.
- PPoPP-2007-SchuffCP #detection #network #parallel
- Conservative vs. optimistic parallelization of stateful network intrusion detection (DLS, YRC, VSP), pp. 138–139.
- SOSP-2007-LuPHMJLPZ #automation #concurrent #correlation #debugging #detection #multi #named #semantics
- MUVI: automatically inferring multi-variable access correlations and detecting related semantic and concurrency bugs (SL, SP, CH, XM, WJ, ZL, RAP, YZ), pp. 103–116.
- CAV-2007-BarnatBS #detection #performance
- I/O Efficient Accepting Cycle Detection (JB, LB, PS), pp. 281–293.
- CAV-2007-KahlonYSG #concurrent #detection #performance #source code
- Fast and Accurate Static Data-Race Detection for Concurrent Programs (VK, YY, SS, AG), pp. 226–239.
- ISSTA-2007-TombBV #detection #fault #interprocedural #program analysis #runtime
- Variably interprocedural program analysis for runtime error detection (AT, GPB, WV), pp. 97–107.
- ISSTA-2007-XinZ #dependence #detection #online #performance
- Efficient online detection of dynamic control dependence (BX, XZ), pp. 185–195.
- TAP-2007-Gargantini #detection #fault #model checking #testing #using
- Using Model Checking to Generate Fault Detecting Tests (AG), pp. 189–206.
- TAP-2007-SmaragdakisC #debugging #detection #reasoning
- Combining Static and Dynamic Reasoning for Bug Detection (YS, CC), pp. 1–16.
- TestCom-FATES-2007-NeukirchenB #detection #problem #quality #smell #testing
- Utilising Code Smells to Detect Quality Problems in TTCN-3 Test Suites (HN, MB), pp. 228–243.
- TestCom-FATES-2007-UralX #approach #detection #fault
- An EFSM-Based Passive Fault Detection Approach (HU, ZX), pp. 335–350.
- ASE-2006-MohaGL #algorithm #automation #design #detection #fault #generative
- Automatic Generation of Detection Algorithms for Design Defects (NM, YGG, PL), pp. 297–300.
- ASE-2006-RamanathanGJ #automation #detection #named
- Sieve: A Tool for Automatically Detecting Variations Across Program Versions (MKR, AG, SJ), pp. 241–252.
- ASE-2006-StorzerF #detection
- Detecting Precedence-Related Advice Interference (MS, FF), pp. 317–322.
- CASE-2006-HuCLY #algorithm #detection #robust #statistics
- A Robust Statistical-based Speaker’s Location Detection Algorithm in a Vehicular Environment (JSH, CCC, WHL, CHY), pp. 274–279.
- CASE-2006-LuHLL #detection #image
- Detecting Small Target of Ship at Sea by Infrared Image (JWL, YJH, HYL, FLL), pp. 165–169.
- CASE-2006-QiuMH #design #detection
- The Design of Field Information Detection System Based on Microcomputer (ZQ, JM, YH), pp. 156–160.
- CASE-2006-Shi0 #detection
- Signal Detecting Based on Instantaneous Virtual Power (WS, JL), pp. 270–273.
- CASE-2006-XuWZZ #algorithm #automation #detection #using
- An Automatic EEG Spike Detection Algorithm Using Morphological Filter (GX, JW, QZ, JZ), pp. 170–175.
- DAC-2006-NelsonBDB #detection #multi #physics
- Multiple-detect ATPG based on physical neighborhoods (JEN, JGB, RD, RD(B), pp. 1099–1102.
- DAC-2006-SuhendraMRC #analysis #detection #performance
- Efficient detection and exploitation of infeasible paths for software timing analysis (VS, TM, AR, TC), pp. 358–363.
- DAC-2006-VrankenGGSH #detection #fault
- Fault detection and diagnosis with parity trees for space compaction of test responses (HPEV, SKG, AG, JS, FH), pp. 1095–1098.
- DAC-2006-Wang #detection #symmetry
- Exploiting K-Distance Signature for Boolean Matching and G-Symmetry Detection (KHW), pp. 516–521.
- DAC-2006-ZhangMBC #detection #representation #satisfiability #scalability #simulation #symmetry #using
- Symmetry detection for large Boolean functions using circuit representation, simulation, and satisfiability (JSZ, AM, RKB, MCJ), pp. 510–515.
- DATE-2006-AlmukhaizimM #concurrent #detection #fault
- Berger code-based concurrent error detection in asynchronous burst-mode machines (SA, YM), pp. 71–72.
- DATE-2006-KrautzP0TWV #detection #fault #formal method #logic #using
- Evaluating coverage of error detection logic for soft errors using formal methods (UK, MP, CJ, HWT, KW, HTV), pp. 176–181.
- DATE-2006-KrusemanH #detection #fault #on the
- On test conditions for the detection of open defects (BK, MH), pp. 896–901.
- DATE-2006-PomeranzR #detection #fault #generative #testing
- Generation of broadside transition fault test sets that detect four-way bridging faults (IP, SMR), pp. 907–912.
- DATE-2006-SutharD #detection #fault #multi #online #performance #testing
- Efficient on-line interconnect testing in FPGAs with provable detectability for multiple faults (VS, SD), pp. 1165–1170.
- DATE-DF-2006-RaabeHAZ #detection #prototype
- Space-efficient FPGA-accelerated collision detection for virtual prototyping (AR, SH, JKA, GZ), pp. 206–211.
- DocEng-2006-QeliGF #detection #documentation #using #xml #xpath
- Customizable detection of changes for XML documents using XPath expressions (EQ, JG, BF), pp. 88–90.
- DRR-2006-ZhuJD #detection #documentation #framework #robust
- A robust stamp detection framework on degraded documents (GZ, SJ, DSD).
- SIGMOD-2006-DengR #approximate #detection #streaming #using
- Approximately detecting duplicates for streaming data using stable bloom filters (FD, DR), pp. 25–36.
- SIGMOD-2006-XueLCL #detection #network
- Contour map matching for event detection in sensor networks (WX, QL, LC, YL), pp. 145–156.
- SIGMOD-2006-ZieglerKSDB #detection #ontology #similarity #tool support
- Generic similarity detection in ontologies with the SOQA-SimPack toolkit (PZ, CK, CS, KRD, AB), pp. 751–753.
- VLDB-2006-GyongyiBGP #detection #estimation
- Link Spam Detection Based on Mass Estimation (ZG, PB, HGM, JOP), pp. 439–450.
- VLDB-2006-Luo #detection #performance #query
- Efficient Detection of Empty-Result Queries (GL), pp. 1015–1025.
- VLDB-2006-SubramaniamPPKG #detection #modelling #online #parametricity #using
- Online Outlier Detection in Sensor Data Using Non-Parametric Models (SS, TP, DP, VK, DG), pp. 187–198.
- ITiCSE-2006-GerdtS #automation #detection
- A web-based service for the automatic detection of roles of variables (PG, JS), pp. 178–182.
- FASE-2006-FeiLLM #debugging #detection #named #online #statistics
- Argus: Online Statistical Bug Detection (LF, KL, FL, SPM), pp. 308–323.
- CSMR-2006-RysselbergheRD #detection #version control
- Detecting Move Operations in Versioning Information (FVR, MR, SD), pp. 271–278.
- ICPC-2006-SalehieLT #design #detection #framework #heuristic #object-oriented
- A Metric-Based Heuristic Framework to Detect Object-Oriented Design Flaws (MS, SL, LT), pp. 159–168.
- MSR-2006-SagerBPK #algorithm #detection #java #using
- Detecting similar Java classes using tree algorithms (TS, AB, MP, CK), pp. 65–71.
- WCRE-2006-FontanaRGAS #design pattern #detection #reverse engineering
- Design Pattern Detection for Reverse Engineering (FAF, CR, YGG, GA, JMS), p. 316.
- WCRE-2006-KoschkeFF #clone detection #detection #syntax #using
- Clone Detection Using Abstract Syntax Suffix Trees (RK, RF, PF), pp. 253–262.
- WCRE-2006-XingS #detection #query #refactoring
- Refactoring Detection based on UMLDiff Change-Facts Queries (ZX, ES), pp. 263–274.
- PLDI-2006-NaikAW #concurrent #detection #effectiveness #java
- Effective static race detection for Java (MN, AA, JW), pp. 308–319.
- PLDI-2006-PratikakisFH #analysis #concurrent #correlation #detection #named
- LOCKSMITH: context-sensitive correlation analysis for race detection (PP, JSF, MWH), pp. 320–331.
- ICGT-2006-LambersEO #detection #graph transformation
- Conflict Detection for Graph Transformation with Negative Application Conditions (LL, HE, FO), pp. 61–76.
- AdaEurope-2006-BurgstallerBM #ada #detection #static analysis
- Static Detection of Access Anomalies in Ada95 (BB, JB, RM), pp. 40–55.
- AdaEurope-2006-Cheng #ada #detection #realtime #runtime
- Run-Time Detection of Tasking Deadlocks in Real-Time Systems with the Ada 95 Annex of Real-Time Systems (JC), pp. 167–178.
- ICEIS-ISAS-2006-ChengX #approach #behaviour #concurrent #detection #formal method #online
- A Formal Approach to Detecting Shilling Behaviors in Concurrent Online Auctions (YTC, HX), pp. 375–381.
- CIKM-2006-LiC #detection #topic #using
- Improving novelty detection for general topics using sentence level information patterns (XL, WBC), pp. 238–247.
- CIKM-2006-ParthasarathyMS #algorithm #detection #robust
- Robust periodicity detection algorithms (SP, SM, SS), pp. 874–875.
- CIKM-2006-ShahCJ #detection #documentation #representation
- Representing documents with named entities for story link detection (SLD) (CS, WBC, DJ), pp. 868–869.
- CIKM-2006-VieiraSPMCF #detection #performance #robust #web
- A fast and robust method for web page template detection and removal (KV, ASdS, NP, ESdM, JMBC, JF), pp. 258–267.
- ECIR-2006-EissenS #detection
- Intrinsic Plagiarism Detection (SMzE, BS), pp. 565–569.
- ECIR-2006-ZhangDC #detection
- Combining Short and Long Term Audio Features for TV Sports Highlight Detection (BZ, WD, LC), pp. 472–475.
- ICML-2006-PandaCW #bound #concept #detection
- Concept boundary detection for speeding up SVMs (NP, EYC, GW), pp. 681–688.
- ICML-2006-SilvaBBE #detection #using
- Dealing with non-stationary environments using context detection (BCdS, EWB, ALCB, PME), pp. 217–224.
- ICML-2006-VeeramachaneniOA #detection
- Active sampling for detecting irrelevant features (SV, EO, PA), pp. 961–968.
- ICPR-v1-2006-Amano #correlation #detection #fault #image
- Correlation Based Image Defect Detection (TA), pp. 163–166.
- ICPR-v1-2006-AndradeBF #detection #modelling
- Modelling Crowd Scenes for Event Detection (ELA, SB, RBF), pp. 175–178.
- ICPR-v1-2006-AokiK #3d #detection
- Detection of 3D-Flow by Characteristic of Convex-concave and Color (KA, HK), pp. 75–78.
- ICPR-v1-2006-ArzhaevaGT #classification #detection #distance #image
- Image Classification from Generalized Image Distance Features: Application to Detection of Interstitial Disease in Chest Radiographs (YA, BvG, DMJT), pp. 367–370.
- ICPR-v1-2006-BauckhageK #detection #multi #performance
- Fast, Illumination Insensitive Face Detection Based on Multilinear Techniques and Curvature Features (CB, TK), pp. 507–510.
- ICPR-v1-2006-BenjellounTM #detection #using
- Vertebra Edge Detection Using Polar Signature (MB, HT, SM), pp. 476–479.
- ICPR-v1-2006-BernardinES #adaptation #detection #multi #robust
- Detection-Assisted Initialization, Adaptation and Fusion of Body Region Trackers for Robust Multiperson Tracking (KB, AE, RS), pp. 441–445.
- ICPR-v1-2006-BernierB #detection #multi
- Generic Detection of Multi-Part Objects (JFB, RB), pp. 840–843.
- ICPR-v1-2006-ChaoTTJ #detection #fault #using
- Defect detection in low-contrast glass substrates using anisotropic diffusion (SMC, DMT, YHT, YRJ), pp. 654–657.
- ICPR-v1-2006-ChenCCW #detection
- Nighttime Vehicle Detection for Driver Assistance and Autonomous Vehicles (YLC, YHC, CJC, BFW), pp. 687–690.
- ICPR-v1-2006-ChengZS #detection
- Boosted Gabor Features Applied to Vehicle Detection (HC, NZ, CS), pp. 662–666.
- ICPR-v1-2006-ChowdhuryGWM #detection #feature model
- Note on Feature Selection for Polyp Detection in CT Colonography (TAC, OG, PFW, AAM), pp. 1017–1021.
- ICPR-v1-2006-Czyz #detection #video
- Object Detection in Video via Particle Filters (JC), pp. 820–823.
- ICPR-v1-2006-DijckH #detection
- Onset Detection through Maximal Redundancy Detection (GVD, MMVH), pp. 945–949.
- ICPR-v1-2006-DoYC #detection #estimation #using
- Skin Color Detection through Estimation and Conversion of Illuminant Color using Sclera Region of Eye under Varying Illumination (HCD, JYY, SIC), pp. 327–330.
- ICPR-v1-2006-GayuboGFMP #detection #fault #online #process
- On-line machine vision system for detect split defects in sheet-metal forming processes (FG, JLG, EdlFL, FMT, JRP), pp. 723–726.
- ICPR-v1-2006-HadidP #approach #detection #hybrid
- A Hybrid Approach to Face Detection under Unconstrained Environments (AH, MP), pp. 227–230.
- ICPR-v1-2006-HarasseBD #detection #people
- Human model for people detection in dynamic scenes (SH, LB, MD), pp. 335–354.
- ICPR-v1-2006-HuangM #detection #independence #realtime #towards
- Toward A Speaker-Independent Real-Time Affect Detection System (RH, CM), pp. 1204–1207.
- ICPR-v1-2006-ItoO #detection #invariant #recognition #using
- Detection and Recognition of Moving Objects by Using Motion Invariants (SI, NO), pp. 683–686.
- ICPR-v1-2006-KorzhovaGS #detection #video
- Detection of SpiralWaves in Video (VNK, DBG, GMS), pp. 396–399.
- ICPR-v1-2006-LinCW #detection #multi #queue #realtime
- A Real-Time Multiple-Vehicle Detection and Tracking System with Prior Occlusion Detection and Resolution, and Prior Queue Detection and Resolution (SPL, YHC, BFW), pp. 828–831.
- ICPR-v1-2006-LiuPHCB #clustering #detection
- Detecting Virulent Cells of Cryptococcus Neoformans Yeast: Clustering Experiments (JL, PvdP, FH, XC, TB), pp. 1112–1115.
- ICPR-v1-2006-LiuZH #detection #symmetry
- Fingerprint Reference Point Detection Based on Local Axial Symmetry (TL, CZ, PH), pp. 1050–1053.
- ICPR-v1-2006-LoY #detection #multi
- Shadow Detection by Integrating Multiple Features (KHL, MTY), pp. 743–746.
- ICPR-v1-2006-OgataCKI #detection #multi #process
- Improving human activity detection by combining multi-dimensional motion descriptors with boosting (TO, WJC, JK, SI), pp. 295–298.
- ICPR-v1-2006-ParkAB #detection #metric #performance
- Efficient Measurement of Eye Blinking under Various Illumination Conditions for Drowsiness Detection Systems (IP, JHA, HB), pp. 383–386.
- ICPR-v1-2006-PongC #3d #detection #modelling #using
- Optimal Cascade Construction for Detection using 3D Models (HKP, TJC), pp. 808–811.
- ICPR-v1-2006-TakeshimaIK #detection #self #using
- Object Contour Detection Using Spatio-temporal Self-sim (HT, TI, TK), pp. 613–617.
- ICPR-v1-2006-TavakkoliNB #detection #learning #recursion #robust
- Robust Recursive Learning for Foreground Region Detection in Videos with Quasi-Stationary Backgrounds (AT, MN, GB), pp. 315–318.
- ICPR-v1-2006-ToewsA #detection #invariant
- Detection Over Viewpoint via the Object Class Invariant (MT, TA), pp. 765–768.
- ICPR-v1-2006-TrujilloO #detection #evolution #how #using
- Using Evolution to Learn How to Perform Interest Point Detection (LT, GO), pp. 211–214.
- ICPR-v1-2006-WangS06a #component #constraints #detection #geometry
- Facial Components Detection with Boosting and Geometric Constraints (TW, PS), pp. 446–449.
- ICPR-v1-2006-WenGL #clustering #detection #markov #monte carlo
- Markov Chain Monte Carlo Data Association for Merge and Split Detection in Tracking Protein Clusters (QW, JG, KLP), pp. 1030–1033.
- ICPR-v1-2006-XingmingH #algorithm #detection #independence
- An Illumination Independent Eye Detection Algorithm (XZ, HZ), pp. 392–395.
- ICPR-v1-2006-XuSL #adaptation #behaviour #detection #monitoring
- Tree Based Behavior Monitoring for Adaptive Fraud Detection (JX, AHS, QL), pp. 1208–1211.
- ICPR-v1-2006-YuA #detection #video
- Detection of Fence Climbing from Monocular Video (EY, JKA), pp. 375–378.
- ICPR-v1-2006-ZehnderKG #detection #multi #performance
- Efficient, Simultaneous Detection of Multiple Object Classes (PZ, EKM, LJVG), pp. 797–802.
- ICPR-v1-2006-ZhangFX #detection #image #orthogonal #using
- Detection of moving cast shadows using image orthogonal transform (WZ, XF, YX), pp. 626–629.
- ICPR-v1-2006-ZhuJ #detection #invariant #realtime #robust
- Robust Pose Invariant Facial Feature Detection and Tracking in Real-Time (ZZ, QJ), pp. 1092–1095.
- ICPR-v2-2006-BhuiyanN #classification #detection #image #using
- Anti-personnel Mine Detection and Classification Using GPR Image (AB, BN), pp. 1082–1085.
- ICPR-v2-2006-CorneliusL #detection #symmetry
- Detecting Rotational Symmetry Under Affine Projection (HC, GL), pp. 292–295.
- ICPR-v2-2006-DhandraMHH #approach #detection #documentation #image
- Skew Detection in Binary Image Documents Based on Image Dilation and Region labeling Approach (BVD, VSM, MH, RH), pp. 954–957.
- ICPR-v2-2006-FangC #detection #robust #statistics #using
- Using Statistical Shape Priors in Geodesic Active Contours for Robust Object Detection (WF, KLC), pp. 304–307.
- ICPR-v2-2006-FuHC #detection
- Vision-Based Preceding Vehicle Detection and Tracking (CMF, CLH, YSC), pp. 1070–1073.
- ICPR-v2-2006-GanLY #analysis #detection
- Detecting Periodically Expressed Genes based on Time-frequency Analysis and L-curve Method (XG, AWCL, HY), pp. 654–657.
- ICPR-v2-2006-GranaCPS #detection #network
- Line Detection and Texture Characterization of Network Patterns (CG, RC, GP, SS), pp. 275–278.
- ICPR-v2-2006-GuptaD #detection #multi #using
- Texture Edge Detection using Multi-resolution Features and SOM (LG, SD), pp. 199–202.
- ICPR-v2-2006-HorvathJZK #detection #higher-order
- A Higher-Order Active Contour Model for Tree Detection (PH, IJ, JZ, ZK), pp. 130–133.
- ICPR-v2-2006-Kita #detection #using
- Change detection using joint intensity histogram (YK), pp. 351–356.
- ICPR-v2-2006-LeS #detection #named #robust #using
- Ent-Boost: Boosting Using Entropy Measure for Robust Object Detection (DDL, SS), pp. 602–605.
- ICPR-v2-2006-LiLWH #detection #framework #image #novel #using
- A Novel Framework for Urban Change Detection Using VHR Satellite Images (WL, XL, YW, ZH), pp. 312–315.
- ICPR-v2-2006-LiZD #detection #documentation
- Detecting Text Lines in Handwritten Documents (YL, YZ, DSD), pp. 1030–1033.
- ICPR-v2-2006-MekuzDT #adaptation #detection
- Adaptive Step Size Window Matching for Detection (NM, KGD, JKT), pp. 259–262.
- ICPR-v2-2006-RamalhoM #detection #image #using
- Using Boosting to Improve Oil Spill Detection in SAR Images (GLBR, FNSdM), pp. 1066–1069.
- ICPR-v2-2006-SantoFSPV #algorithm #detection
- An Unsupervised Algorithm for Anchor Shot Detection (MDS, PF, CS, GP, MV), pp. 1238–1241.
- ICPR-v2-2006-SunV #detection #linear #multi #performance #using
- Fast Linear Feature Detection Using Multiple Directional Non-Maximum Suppression (CS, PV), pp. 288–291.
- ICPR-v2-2006-TsaiTCY #analysis #component #design #detection #fault #image #independence
- Independent component analysis based filter design for defect detection in low-contrast textured images (DMT, YHT, SMC, CHY), pp. 231–234.
- ICPR-v2-2006-Wang #component #detection #performance #recognition
- Efficient Facial Component Extraction for Detection and Recognition (JWW), pp. 1208–1211.
- ICPR-v2-2006-YangS #detection #random #using
- Detecting Coarticulation in Sign Language using Conditional Random Fields (RY, SS), pp. 108–112.
- ICPR-v2-2006-YuCMW #detection #markov #monte carlo #multi
- Boosted Markov Chain Monte Carlo Data Association for Multiple Target Detection and Tracking (QY, IC, GGM, BW), pp. 675–678.
- ICPR-v2-2006-ZhangJHW #detection #using
- Learning-Based License Plate Detection Using Global and Local Features (HZ, WJ, XH, QW), pp. 1102–1105.
- ICPR-v2-2006-ZhangZ #detection
- Driver Fatigue Detection Based Intelligent Vehicle Control (ZZ, JZ), pp. 1262–1265.
- ICPR-v3-2006-BeveridgeSR #classification #comparison #detection #naive bayes #using
- A Comparison of Pixel, Edge andWavelet Features for Face Detection using a Semi-Naive Bayesian Classifier (JRB, JS, BR), pp. 1175–1178.
- ICPR-v3-2006-ChenHWJF #detection #network
- The Application of a Convolution Neural Network on Face and License Plate Detection (YNC, CCH, CTW, BSJ, KCF), pp. 552–555.
- ICPR-v3-2006-ChiuLWCC #approach #detection #video
- A Time Warping Based Approach for Video Copy Detection (CYC, CHL, HAW, CSC, LFC), pp. 228–231.
- ICPR-v3-2006-El-BazFRYEE #analysis #detection #image
- Image Analysis of Renal DCE MRI for the Detection of Acute Renal Rejection (AEB, AAF, RF, SEY, MAEG, TE), pp. 822–825.
- ICPR-v3-2006-FujitaMH #detection
- A Method for Crack Detection on a Concrete Structure (YF, YM, YH), pp. 901–904.
- ICPR-v3-2006-KawabataHS #detection #realtime
- Real-Time Detection of Anomalous Objects in Dynamic Scene (SK, SH, KS), pp. 1171–1174.
- ICPR-v3-2006-Law-ToGBB #behaviour #detection #video
- Local Behaviours Labelling for Content Based Video Copy Detection (JLT, VGB, OB, NB), pp. 232–235.
- ICPR-v3-2006-LeeP #classification #detection #robust
- Robust vehicle detection based on shadow classification (DL, YP), pp. 1167–1170.
- ICPR-v3-2006-PeiLX #detection #information retrieval
- A Method For IR Point Target Detection Based on Spatial-temporal Bilateral Filter (JP, ZL, WX), pp. 846–849.
- ICPR-v3-2006-PlotzFHKLMMSSS #automation #detection #modelling #music #probability #using
- Automatic Detection of Song Changes in Music Mixes Using Stochastic Models (TP, GAF, PH, SK, KL, TM, MM, LS, MS, HS), pp. 665–668.
- ICPR-v3-2006-SakaiA #detection #metric #using
- Human and Object Detection in Smoke-filled Space using Millimeter-wave radar based Measurement System (MS, YA), p. 750.
- ICPR-v3-2006-SalmonDW #detection
- A new method to detect arcs and segments from curvature profiles (JPS, IDR, LW), pp. 387–390.
- ICPR-v3-2006-VartiainenSLKK #detection
- Detecting irregularities in regular patterns (JV, AS, LL, JKK, HK), pp. 926–929.
- ICPR-v3-2006-WangCSG #detection #set
- Enhancing Training Set for Face Detection (RW, JC, SS, WG), pp. 477–480.
- ICPR-v3-2006-WillamowskiC #automation #detection #probability
- Probabilistic Automatic Red Eye Detection and Correction (JW, GC), pp. 762–765.
- ICPR-v3-2006-YangB #detection #generative
- A Combination of Generative and Discriminative Approaches to Object Detection (JY, HB), pp. 249–253.
- ICPR-v3-2006-YoshimuraIY #adaptation #correlation #detection
- Object Detection with Adaptive Background Model and Margined Sign Cross Correlation (HY, YI, MY), pp. 19–23.
- ICPR-v3-2006-ZhangDC #analysis #detection #game studies
- Ball Hit Detection in Table Tennis Games Based on Audio Analysis (BZ, WD, LC), pp. 220–223.
- ICPR-v3-2006-ZhongW #detection #markov #random
- Object Detection Based on Combination of Conditional Random Field and Markov Random Field (PZ, RW), pp. 160–163.
- ICPR-v3-2006-ZhouK #detection #mining #multi #video
- Unusual Event Detection via Multi-camera Video Mining (HZ, DK), pp. 1161–1166.
- ICPR-v4-2006-AuSC #detection #video
- Anomaly Detection for Video Surveillance Applications (CEA, SS, JJC), pp. 888–891.
- ICPR-v4-2006-ChenJY06a #detection #distributed #fault
- Fault Detection in Distributed Systems by Representative Subspace Mapping (HC, GJ, KY), pp. 912–915.
- ICPR-v4-2006-HerzogNKMOB #detection #image
- Detection of presynaptic terminals on dendritic spines in double labeling confocal images (AH, RN, GK, BM, WO, KB), pp. 715–718.
- ICPR-v4-2006-JinYSLX #classification #detection #hybrid #precise #robust
- A hybrid classifier for precise and robust eye detection (LJ, XHY, SS, JL, LX), pp. 731–735.
- ICPR-v4-2006-Jun #comparison #dataset #detection
- A Peer Dataset Comparison Outlier Detection Model Applied to Financial Surveillance (TJ), pp. 900–903.
- ICPR-v4-2006-KryszczukD #detection #using
- Singular point detection in fingerprints using quadrant change information (KK, AD), pp. 594–597.
- ICPR-v4-2006-LuoHQ #detection #image #robust
- Robust Detection of Region-Duplication Forgery in Digital Image (WL, JH, GQ), pp. 746–749.
- ICPR-v4-2006-MacenkoCM #detection #segmentation #using
- Lesion Detection Using Morphological Watershed Segmentation and Modelbased Inverse Filtering (MM, MC, LM), pp. 679–682.
- ICPR-v4-2006-Onoguchi #correlation #detection #using
- Moving Object Detection Using a Cross Correlation between a Short Accumulated Histogram and a Long Accumulated Histogram (KO), pp. 896–899.
- ICPR-v4-2006-RohL #detection #gesture #video
- Gesture Detection in Low-Quality Video (MCR, SWL), pp. 791–794.
- ICPR-v4-2006-SatoTIM #coordination #detection #image #sequence
- Change detection in streetscapes from GPS coordinated omni-directional image sequences (JS, TT, II, HM), pp. 935–938.
- ICPR-v4-2006-VilarinoSPVR #automation #detection #video
- Automatic Detection of Intestinal Juices in Wireless Capsule Video Endoscopy (FV, PS, OP, JV, PR), pp. 719–722.
- ICPR-v4-2006-VillamizarSA #detection #image #invariant #realtime #using
- Computation of Rotation Local Invariant Features using the Integral Image for Real Time Object Detection (MV, AS, JAC), pp. 81–85.
- ICPR-v4-2006-WangC #detection #using #video
- Detecting Video Texts Using Spatial-Temporal Wavelet Transform (YKW, JMC), pp. 754–757.
- ICPR-v4-2006-WangLTX #detection #estimation #multi #realtime #video
- Real-Time Multi-View Face Detection and Pose Estimation in Video Stream (YW, YL, LT, GX), pp. 354–357.
- ICPR-v4-2006-YamaguchiKN #detection #estimation #using
- Vehicle Ego-Motion Estimation and Moving Object Detection using a Monocular Camera (KY, TK, YN), pp. 610–613.
- ICPR-v4-2006-YangLPZZ #detection #learning
- Active Learning Based Pedestrian Detection in Real Scenes (TY, JL, QP, CZ, YZ), pp. 904–907.
- ICPR-v4-2006-ZhangFY #detection
- Moving cast shadows detection based on ratio edge (WZ, XF, XY), pp. 73–76.
- ICPR-v4-2006-ZhaoG #detection #robust
- Robust Eye Detection under Active Infrared Illumination (SZ, RRG), pp. 481–484.
- KDD-2006-AbeZL #detection #learning
- Outlier detection by active learning (NA, BZ, JL), pp. 504–509.
- KDD-2006-AbeZL06a #detection
- Outlier detection by sampling with accuracy guarantees (MW, CJ), pp. 767–772.
- KDD-2006-BarbaraDR #detection #statistics #testing #using
- Detecting outliers using transduction and statistical testing (DB, CD, JPR), pp. 55–64.
- KDD-2006-BiPOKFSR #classification #detection #symmetry
- Computer aided detection via asymmetric cascade of sparse hyperplane classifiers (JB, SP, KO, TK, GF, MS, RBR), pp. 837–844.
- KDD-2006-BurkeMWB #classification #collaboration #detection #recommendation
- Classification features for attack detection in collaborative recommender systems (RDB, BM, CW, RB), pp. 542–547.
- KDD-2006-CastanoMTGDCCD #classification #detection
- Onboard classifiers for science event detection on a remote sensing spacecraft (RC, DM, NT, RG, TD, BC, SAC, AD), pp. 845–851.
- KDD-2006-IhlerHS #adaptation #detection #process
- Adaptive event detection with time-varying poisson processes (ATI, JH, PS), pp. 207–216.
- KDD-2006-LiuCHY #analysis #dependence #detection #graph #named
- GPLAG: detection of software plagiarism by program dependence graph analysis (CL, CC, JH, PSY), pp. 872–881.
- KDD-2006-VirdhagriswaranD #detection
- Camouflaged fraud detection in domains with complex relationships (SV, GD), pp. 941–947.
- KDD-2006-ZhangCFM #detection #recommendation
- Attack detection in time series for recommender systems (SZ, AC, JF, FM), pp. 809–814.
- KDD-2006-ZhaoLBM #detection #evolution
- Event detection from evolution of click-through data (QZ, TYL, SSB, WYM), pp. 484–493.
- KDD-2006-ZhuNWZM #detection #web
- Simultaneous record detection and attribute labeling in web data extraction (JZ, ZN, JRW, BZ, WYM), pp. 494–503.
- SEKE-2006-ShinX #component #detection #self
- Enhanced Anomaly Detection in Self-Healing Components (MES, YX), pp. 485–488.
- SEKE-2006-SornilS #detection #using
- Improving Intrusion Detection Systems Using Reference Vectors (OS, PS), pp. 398–403.
- SIGIR-2006-OtterbacherR #detection
- Fact-focused novelty detection: a feasibility study (JO, DRR), pp. 687–688.
- SIGIR-2006-ShenYSC #concurrent #detection #thread
- Thread detection in dynamic text message streams (DS, QY, JTS, ZC), pp. 35–42.
- SIGIR-2006-YangC #clustering #detection
- Near-duplicate detection by instance-level constrained clustering (HY, JPC), pp. 421–428.
- MoDELS-2006-MensSD #analysis #consistency #dependence #detection #nondeterminism #using
- Detecting and Resolving Model Inconsistencies Using Transformation Dependency Analysis (TM, RVDS, MD), pp. 200–214.
- MoDELS-2006-MensSD #analysis #consistency #dependence #detection #nondeterminism #using
- Detecting and Resolving Model Inconsistencies Using Transformation Dependency Analysis (TM, RVDS, MD), pp. 200–214.
- ECOOP-2006-DigCMJ #automation #component #detection #evolution #refactoring
- Automated Detection of Refactorings in Evolving Components (DD, CC, DM, REJ), pp. 404–428.
- LOPSTR-2006-Payet #detection #term rewriting #using
- Detecting Non-termination of Term Rewriting Systems Using an Unfolding Operator (ÉP), pp. 194–209.
- RE-2006-Cleland-HuangSZS #aspect-oriented #classification #detection #non-functional #requirements
- The Detection and Classification of Non-Functional Requirements with Application to Early Aspects (JCH, RS, XZ, PS), pp. 36–45.
- RE-2006-GiorginiMMZ #detection
- Detecting Conflicts of Interest (PG, FM, JM, NZ), pp. 308–311.
- SAC-2006-ChenJH #detection #fault #generative #multi #sequence #testing
- A new method of generating synchronizable test sequences that detect output-shifting faults based on multiple UIO sequences (KC, FJ, CdH), pp. 1791–1797.
- SAC-2006-ChenJUY #detection #distributed #fault #monitoring
- Combining supervised and unsupervised monitoring for fault detection in distributed computing systems (HC, GJ, CU, KY), pp. 705–709.
- SAC-2006-ChenYL #detection #scalability
- Template detection for large scale search engines (LC, SY, XL), pp. 1094–1098.
- SAC-2006-GaoCT #detection
- Semi-supervised outlier detection (JG, HC, PNT), pp. 635–636.
- SAC-2006-MandalCDC #detection #documentation #image #segmentation
- Detection and segmentation of tables and math-zones from document images (SM, SPC, AKD, BC), pp. 841–846.
- SAC-2006-Roth #detection #mobile
- Detecting identifiable areas in mobile environments (JR), pp. 986–991.
- FSE-2006-DwyerPE #detection #fault
- Controlling factors in evaluating path-sensitive error detection techniques (MBD, SP, SGE), pp. 92–104.
- FSE-2006-GirouxR #detection #testing #using
- Detecting increases in feature coupling using regression tests (OG, MPR), pp. 163–174.
- ICSE-2006-HeineL #detection #polymorphism #static analysis
- Static detection of leaks in polymorphic containers (DLH, MSL), pp. 252–261.
- ICSE-2006-MoriISI #detection #mobile
- A tool for analyzing and detecting malicious mobile code (AM, TI, TS, TI), pp. 831–834.
- ICSE-2006-NakamichiSSM #behaviour #detection #usability #using #web
- Detecting low usability web pages using quantitative data of users’ behavior (NN, KS, MS, KiM), pp. 569–576.
- ASPLOS-2006-BondM #detection #encoding #memory management #named #online
- Bell: bit-encoding online memory leak detection (MDB, KSM), pp. 61–72.
- ASPLOS-2006-ChilimbiG #debugging #detection #identification #named #using
- HeapMD: identifying heap-based bugs using anomaly detection (TMC, VG), pp. 219–228.
- ASPLOS-2006-CrandallWOSWC #detection #virtual machine
- Temporal search: detecting hidden malware timebombs with virtual machines (JRC, GW, DASdO, ZS, SFW, FTC), pp. 25–36.
- ASPLOS-2006-LuTQZ #detection #invariant #named
- AVIO: detecting atomicity violations via access interleaving invariants (SL, JT, FQ, YZ), pp. 37–48.
- CGO-2006-BorinWWA #control flow #detection #fault
- Software-Based Transparent and Comprehensive Control-Flow Error Detection (EB, CW, YW, GA), pp. 333–345.
- CGO-2006-DasLH #detection #monitoring #optimisation
- Region Monitoring for Local Phase Detection in Dynamic Optimization Systems (AD, JL, WCH), pp. 124–134.
- CGO-2006-KimSMP #2d #branch #detection #named #set
- 2D-Profiling: Detecting Input-Dependent Branches with a Single Input Data Set (HK, MAS, OM, YNP), pp. 159–172.
- CGO-2006-NagpurkarKHSR #algorithm #detection #online
- Online Phase Detection Algorithms (PN, CK, MH, PFS, VTR), pp. 111–123.
- HPCA-2006-KumarA #concurrent #detection #fault #performance
- Reducing resource redundancy for concurrent error detection techniques in high performance microprocessors (SK, AA), pp. 212–221.
- HPCA-2006-Prvulovic #concurrent #detection #effectiveness #named
- CORD: cost-effective (and nearly overhead-free) order-recording and data race detection (MP), pp. 232–243.
- HPDC-2006-DuanPF #data mining #detection #fault #grid #predict
- Data Mining-based Fault Prediction and Detection on the Grid (RD, RP, TF), pp. 305–308.
- PPoPP-2006-WangS #concurrent #detection #fault #performance #runtime #source code
- Accurate and efficient runtime detection of atomicity errors in concurrent programs (LW, SDS), pp. 137–146.
- AMOST-J-2005-Paradkar06 #case study #detection #effectiveness #fault #generative #modelling #testing
- A quest for appropriate software fault models: Case studies on fault detection effectiveness of model-based test generation techniques (AMP), pp. 949–959.
- CAV-2006-TzorefG #automation #detection #evaluation #refinement
- Automatic Refinement and Vacuity Detection for Symbolic Trajectory Evaluation (RT, OG), pp. 190–204.
- ICLP-2006-KingLG #detection #prolog #source code
- Detecting Determinacy in Prolog Programs (AK, LL, SG), pp. 132–147.
- ISSTA-2006-Wagner #analysis #detection #quality
- A model and sensitivity analysis of the quality economics of defect-detection techniques (SW0), pp. 73–84.
- TestCom-2006-ChenU #detection #distributed #problem #testing
- Detecting Observability Problems in Distributed Testing (JC, HU), pp. 213–226.
- VMCAI-2006-RossignoliS #compilation #detection
- Detecting Non-cyclicity by Abstract Compilation into Boolean Functions (SR, FS), pp. 95–110.
- ASE-2005-AgarwalSWS #concurrent #detection #runtime #using
- Optimized run-time race detection and atomicity checking using partial discovered types (RA, AS, LW, SDS), pp. 233–242.
- ASE-2005-KashyapG #detection #performance #reachability
- Exploiting predicate structure for efficient reachability detection (SK, VKG), pp. 4–13.
- ASE-2005-Kemmerer #design #detection #implementation #product line
- Designing and implementing a family of intrusion detection systems (RAK), p. 3.
- ASE-2005-SprenkleGSP #automation #detection #web
- Automated replay and failure detection for web applications (SS, EG, SS, LLP), pp. 253–262.
- CASE-2005-ChangLJ #detection #fault #network #using
- Using a two-layer competitive Hopfield neural network for semiconductor wafer defect detection (CYC, SYL, MJ), pp. 301–306.
- DAC-2005-GheorghitaSBC #automation #detection #estimation
- Automatic scenario detection for improved WCET estimation (SVG, SS, TB, HC), pp. 101–104.
- DAC-2005-Pomeranz #detection
- N-detection under transparent-scan (IP), pp. 129–134.
- DATE-2005-AlmukhaizimM #concurrent #detection #fault
- Concurrent Error Detection in Asynchronous Burst-Mode Controllers (SA, YM), pp. 1272–1277.
- DATE-2005-Campagnolo #detection #generative
- eMICAM a New Generation of Active DNA Chip with in Situ Electrochemical Detection (RC), pp. 1338–1339.
- DATE-2005-ChiangKSXZ #detection
- Bright-Field AAPSM Conflict Detection and Correction (CC, ABK, SS, XX, AZ), pp. 908–913.
- DATE-2005-FahmyCL #detection #hardware #markov
- Hardware Acceleration of Hidden Markov Model Decoding for Person Detection (SAF, PYKC, WL), pp. 8–13.
- DATE-2005-GillNWPG #design #detection #performance
- An Efficient BICS Design for SEUs Detection and Correction in Semiconductor Memories (BSG, MN, FGW, CAP, SLG), pp. 592–597.
- DATE-2005-HuLDKVI #detection #fault
- Compiler-Directed Instruction Duplication for Soft Error Detection (JSH, FL, VD, MTK, NV, MJI), pp. 1056–1057.
- DATE-2005-PomeranzR #analysis #detection #testing #worst-case
- Worst-Case and Average-Case Analysis of n-Detection Test Sets (IP, SMR), pp. 444–449.
- DATE-2005-PomeranzR05a #detection #fault #heuristic
- The Accidental Detection Index as a Fault Ordering Heuristic for Full-Scan Circuits (IP, SMR), pp. 1008–1013.
- DATE-2005-RaabeBAZ #architecture #detection #hardware #simulation
- Hardware Accelerated Collision Detection — An Architecture and Simulation Results (AR, BB, JKA, GZ), pp. 130–135.
- DATE-2005-SandireddyA #detection #fault #multi
- Diagnostic and Detection Fault Collapsing for Multiple Output Circuits (RKKRS, VDA), pp. 1014–1019.
- DATE-2005-StagniGLBR #design #detection
- Hardware-Software Design of a Smart Sensor for Fully-Electronic DNA Hybridization Detection (CS, CG, ML, LB, BR), pp. 198–203.
- DocEng-2005-AvilaL #algorithm #detection #documentation #image #performance
- A fast orientation and skew detection algorithm for monochromatic document images (BTÁ, RDL), pp. 118–126.
- HT-2005-BlusteinFS #detection #visualisation
- Information visualization for an intrusion detection system (JB, CLF, DLS), pp. 278–279.
- ICDAR-2005-AminW #detection #documentation #robust
- Robust Skew Detection in mixed Text/Graphics Documents (AA, SW), pp. 247–251.
- ICDAR-2005-BargeronVS #detection #learning
- Boosting-based Transductive Learning for Text Detection (DB, PAV, PYS), pp. 1166–1171.
- ICDAR-2005-EzakiKMBS #detection
- Improved Text-Detection Methods for a Camera-based Text Reading System for Blind Persons (NE, KK, BTM, MB, LS), pp. 257–261.
- ICDAR-2005-LiuGI #algorithm #detection #image #robust
- A Robust Algorithm for Text Detection in Color Images (YL, SG, TI), pp. 399–405.
- ICDAR-2005-LiuWD #classification #detection #image
- Text Detection in Images Based on Unsupervised Classification of Edge-based Features (CL, CW, RD), pp. 610–614.
- ICDAR-2005-LongDC #detection #documentation
- A Model for Detecting and Merging Vertically Spanned Table Cells in Plain Text Documents (VL, RD, SC), pp. 1242–1246.
- ICDAR-2005-SaoiGK #clustering #detection #image #multi
- Text Detection in Color Scene Images based on Unsupervised Clustering of Multi-channel Wavelet Features (TS, HG, HK), pp. 690–694.
- ICDAR-2005-WenyinHXDM #detection
- Phishing Webpage Detection (LW, GH, LX, XD, ZM), pp. 560–564.
- ICDAR-2005-WillemsRV #detection #online #recognition
- Mode detection in on-line pen drawing and handwriting recognition (DW, SR, LV), pp. 31–35.
- ICDAR-2005-YingsaereeK #analysis #detection #documentation #layout #rule-based
- Rule-based Middle-level Character Detection for Simplifying Thai Document Layout Analysis (CY, AK), pp. 888–892.
- VLDB-2005-AbadiML #detection #named #network #performance #robust
- REED: Robust, Efficient Filtering and Event Detection in Sensor Networks (DJA, SM, WL), pp. 769–780.
- VLDB-2005-AliABEHKM #data type #detection #framework #named
- NILE-PDT: A Phenomenon Detection and Tracking Framework for Data Stream Management Systems (MHA, WGA, RB, AKE, AH, IK, MFM), pp. 1295–1298.
- VLDB-2005-FungYYL #detection #parametricity
- Parameter Free Bursty Events Detection in Text Streams (GPCF, JXY, PSY, HL), pp. 181–192.
- VLDB-2005-MetwallyAA #detection #network #using #web
- Using Association Rules for Fraud Detection in Web Advertising Networks (AM, DA, AEA), pp. 169–180.
- TACAS-2005-AlurCEM #detection #on the fly #reachability #recursion #state machine
- On-the-Fly Reachability and Cycle Detection for Recursive State Machines (RA, SC, KE, PM), pp. 61–76.
- TACAS-2005-WeimerN #detection #fault #mining #specification
- Mining Temporal Specifications for Error Detection (WW, GCN), pp. 461–476.
- CSMR-2005-MihanceaM #automation #design #detection #object-oriented #optimisation #towards
- Towards the Optimization of Automatic Detection of Design Flaws in Object-Oriented Software Systems (PFM, RM), pp. 92–101.
- CSMR-2005-RiccaT #bibliography #case study #detection #web
- Anomaly Detection in Web Applications: A Review of Already Conducted Case Studies (FR, PT), pp. 385–394.
- IWPC-2005-GorgW #detection #refactoring #visualisation
- Detecting and Visualizing Refactorings from Software Archives (CG, PW), pp. 205–214.
- IWPC-2005-WenT #clustering #detection
- Software Clustering based on Omnipresent Object Detection (ZW, VT), pp. 269–278.
- MSR-2005-GorgW #detection #fault #re-engineering #refactoring
- Error detection by refactoring reconstruction (CG, PW), pp. 86–90.
- WCRE-2005-KimPW #automation #detection
- When Functions Change Their Names: Automatic Detection of Origin Relationships (SK, KP, EJWJ), pp. 143–152.
- WCRE-2005-WangT #design pattern #detection #eiffel
- Design Pattern Detection in Eiffel Systems (WW, VT), pp. 165–174.
- PLDI-2005-ElmasTQ #concurrent #detection #named #runtime #source code #verification
- VYRD: verifYing concurrent programs by runtime refinement-violation detection (TE, ST, SQ), pp. 27–37.
- FM-2005-DonaldsonM #automation #detection #model checking #symmetry #using
- Automatic Symmetry Detection for Model Checking Using Computational Group Theory (AFD, AM), pp. 481–496.
- ICEIS-v1-2005-Chao #detection #maintenance #web #xml
- Change Detection and Maintenance of an XML Web Warehouse (CMC), pp. 52–59.
- ICEIS-v2-2005-Diaz-GomezH #algorithm #detection #search-based #using
- Improved Off-Line Intrusion Detection Using a Genetic Algorithm (PADG, DFH), pp. 66–73.
- ICEIS-v2-2005-ZengG #detection #integration
- Agent-Based Intrusion Detection System for Integration (JZ, DG), pp. 176–181.
- ICEIS-v3-2005-CechichP #case study #detection #functional #off the shelf
- Early Detection of Cots Functional Suitability for an E-Payment Case Study (AC, MP), pp. 11–28.
- ICEIS-v3-2005-EspositoMORS #data mining #detection #mining #novel #realtime
- Real Time Detection of Novel Attacks by Means of Data Mining Techniques (ME, CM, FO, SPR, CS), pp. 120–127.
- ICEIS-v3-2005-SilvaC #detection #non-functional #requirements
- Functional and Non-Functional Application Software Requirements: Early Conflict Detection (PSMS, LC), pp. 343–348.
- ICEIS-v4-2005-YiZZ #ad hoc #architecture #detection #mobile #network #using
- An Architecture for Intrusion Detection and Active Response Using Autonomous Agents in Mobile Ad Hoc Networks (PY, SZ, YZ), pp. 220–226.
- CIKM-2005-ChiritaDN #detection #named #ranking #using
- MailRank: using ranking for spam detection (PAC, JD, WN), pp. 373–380.
- CIKM-2005-GoharianM #detection #information management #on the #topic
- On off-topic access detection in information systems (NG, LM), pp. 353–354.
- CIKM-2005-LeonardiB #approach #database #detection #documentation #relational #using #xml
- Detecting changes on unordered XML documents using relational databases: a schema-conscious approach (EL, SSB), pp. 509–516.
- CIKM-2005-LiC05a #detection
- Novelty detection based on sentence level patterns (XL, WBC), pp. 744–751.
- ECIR-2005-DingCZ #analysis #clustering #concept #detection #video
- Temporal Shot Clustering Analysis for Video Concept Detection (DD, LC, BZ), pp. 558–560.
- ICML-2005-Ho #concept #data type #detection #framework
- A martingale framework for concept change detection in time-varying data streams (SSH), pp. 321–327.
- KDD-2005-ChenCC #adaptation #detection #named
- LIPED: HMM-based life profiles for adaptive event detection (CCC, MCC, MSC), pp. 556–561.
- KDD-2005-ChenJUY #component #detection #locality #online
- Failure detection and localization in component based systems by online tracking (HC, GJ, CU, KY), pp. 750–755.
- KDD-2005-FujimakiYM #approach #detection #kernel #problem #using
- An approach to spacecraft anomaly detection problem using kernel feature space (RF, TY, KM), pp. 401–410.
- KDD-2005-LazarevicK #detection
- Feature bagging for outlier detection (AL, VK), pp. 157–166.
- KDD-2005-LiRGMAEGATJ #automation #detection
- Automated detection of frontal systems from numerical model-generated data (XL, RR, SJG, SM, BA, DE, SG, RA, JT, JCJ), pp. 782–787.
- KDD-2005-NeillMSD #clustering #detection
- Detection of emerging space-time clusters (DBN, AWM, MS, KD), pp. 218–227.
- KDD-2005-NorenOB #database #detection #safety
- A hit-miss model for duplicate detection in the WHO drug safety database (GNN, RO, AB), pp. 459–468.
- MLDM-2005-GiacintoPR #clustering #detection #network
- Alarm Clustering for Intrusion Detection Systems in Computer Networks (GG, RP, FR), pp. 184–193.
- MLDM-2005-LateckiMP #detection #process
- Activity and Motion Detection Based on Measuring Texture Change (LJL, RM, DP), pp. 476–486.
- MLDM-2005-OhnishiI #analysis #component #detection #independence #using
- Dominant Plane Detection Using Optical Flow and Independent Component Analysis (NO, AI), pp. 497–506.
- MLDM-2005-Sy #approach #detection
- Signature-Based Approach for Intrusion Detection (BKS), pp. 526–536.
- SEKE-2005-Chiou #detection
- Knowledge Fusion Based Object Detection In Pulmonary Radiology (YSC), pp. 37–42.
- SIGIR-2005-BennettC #detection #email
- Detecting action-items in e-mail (PNB, JGC), pp. 585–586.
- SIGIR-2005-FetterlyMN #detection #web
- Detecting phrase-level duplication on the world wide web (DF, MM, MN), pp. 170–177.
- SIGIR-2005-KuLWC #detection #summary #topic
- Major topic detection and its application to opinion summarization (LWK, LYL, THW, HHC), pp. 627–628.
- SIGIR-2005-LiWLM #detection #probability
- A probabilistic model for retrospective news event detection (ZL, BW, ML, WYM), pp. 106–113.
- SIGIR-2005-RennieJ #detection #using
- Using term informativeness for named entity detection (JDMR, TSJ), pp. 353–360.
- SIGIR-2005-TrieschniggK #approach #detection #scalability #topic
- Scalable hierarchical topic detection: exploring a sample based approach (DT, WK), pp. 655–656.
- SIGIR-2005-WangWXFLML #detection #query
- Detecting dominant locations from search queries (LW, CW, XX, JF, YL, WYM, YL), pp. 424–431.
- SIGIR-2005-Yom-TovFCD #detection #distributed #information retrieval #learning #query
- Learning to estimate query difficulty: including applications to missing content detection and distributed information retrieval (EYT, SF, DC, AD), pp. 512–519.
- ECOOP-2005-PistoiaFKS #analysis #detection #interprocedural
- Interprocedural Analysis for Privileged Code Placement and Tainted Variable Detection (MP, RJF, LK, VCS), pp. 362–386.
- ECOOP-2005-WilliamsTE #concurrent #detection #java #library
- Static Deadlock Detection for Java Libraries (AW, WT, MDE), pp. 602–629.
- POPL-2005-XieA #detection #fault #satisfiability #scalability #using
- Scalable error detection using boolean satisfiability (YX, AA), pp. 351–363.
- SAC-2005-AngiulliBP #detection #predict
- Detection and prediction of distance-based outliers (FA, SB, CP), pp. 537–542.
- SAC-2005-DuanHW #detection #network
- Enhancing network intrusion detection systems with interval methods (QD, CH, HCW), pp. 1444–1448.
- SAC-2005-ElkhalifaAC #detection #named #specification
- InfoFilter: a system for expressive pattern specification and detection over text streams (LE, RA, SC), pp. 1084–1088.
- SAC-2005-GrunerN #detection #documentation #tool support
- Tool support for plagiarism detection in text documents (SG, SN), pp. 776–781.
- SAC-2005-HouD #analysis #design #detection #search-based
- Immunity-based intrusion detection system design, vulnerability analysis, and GENERTIA’s genetic arms race (HH, GVD), pp. 952–956.
- SAC-2005-HsiehCLT #detection #named #predict #sequence
- EXONSCAN: EXON prediction with Signal detection and Coding region AligNment in homologous sequences (SJH, YSC, CYL, CYT), pp. 202–203.
- SAC-2005-JanejaA #detection #linear #named #semantics #statistics
- LS3: a Linear Semantic Scan Statistic technique for detecting anomalous windows (VPJ, VA), pp. 493–497.
- SAC-2005-MaG #detection #information retrieval #query
- Query length impact on misuse detection in information retrieval systems (LM, NG), pp. 1070–1075.
- ESEC-FSE-2005-BakerBJKTMB #detection #diagrams #semantics #sequence chart #uml
- Detecting and resolving semantic pathologies in UML sequence diagrams (PB, PB, CJ, DJK, RT, BM, SB), pp. 50–59.
- ESEC-FSE-2005-BasitJ #detection #similarity #source code
- Detecting higher-level similarity patterns in programs (HAB, SJ), pp. 156–165.
- ESEC-FSE-2005-LiZ #automation #detection #named #programming #scalability
- PR-Miner: automatically extracting implicit programming rules and detecting violations in large software code (ZL, YZ), pp. 306–315.
- ESEC-FSE-2005-XieA #detection #memory management
- Context- and path-sensitive memory leak detection (YX, AA), pp. 115–125.
- ESEC-FSE-2005-XuC #consistency #detection #middleware #nondeterminism
- Inconsistency detection and resolution for context-aware middleware support (CX, SCC), pp. 336–345.
- LDTA-2005-Kreimer #adaptation #design #detection
- Adaptive Detection of Design Flaws (JK), pp. 117–136.
- HPCA-2005-QinLZ #detection #memory management #named
- SafeMem: Exploiting ECC-Memory for Detecting Memory Leaks and Memory Corruption During Production Runs (FQ, SL, YZ), pp. 291–302.
- HPDC-2005-LuJ05a #consistency #detection #distributed #framework #grid #nondeterminism #performance
- A framework for efficient inconsistency detection in a grid and Internet-scale distributed environment (YL, HJ), pp. 318–319.
- SOSP-2005-JoshiKDC #detection
- Detecting past and present intrusions through vulnerability-specific predicates (AJ, STK, GWD, PMC), pp. 91–104.
- SOSP-2005-YuRC #adaptation #detection #named #performance
- RaceTrack: efficient detection of data race conditions via adaptive tracking (YY, TR, WC), pp. 221–234.
- AMOST-2005-CaiL #detection #fault #test coverage #testing
- The effect of code coverage on fault detection under different testing profiles (XC, MRL).
- AMOST-2005-Paradkar #case study #detection #effectiveness #fault #generative #modelling #testing
- Case studies on fault detection effectiveness of model based test generation techniques (AMP).
- CAV-2005-OlivainG #detection
- The Orchids Intrusion Detection Tool (JO, JGL), pp. 286–290.
- CAV-2005-XieA #debugging #detection #named #satisfiability
- Saturn: A SAT-Based Tool for Bug Detection (YX, AA), pp. 139–143.
- TestCom-2005-ChiH #communication #detection #generative #interactive #testing
- Test Generation for Interaction Detection in Feature-Rich Communication Systems (CC, RH), pp. 242–257.
- TestCom-2005-LeeJL #analysis #detection #smarttech #using
- Detecting Trapdoors in Smart Cards Using Timing and Power Analysis (JYL, SWJ, JL), pp. 275–288.
- TestCom-2005-LiL05a #algorithm #detection #fault #network #probability #testing
- Fault Detection of Hierarchical Networks with Probabilistic Testing Algorithms (KL, DL), pp. 258–274.
- ASE-2004-RysselbergheD #clone detection #detection #perspective #refactoring
- Evaluating Clone Detection Techniques from a Refactoring Perspective (FVR, SD), pp. 336–339.
- ASE-2004-Taghdiri #detection #fault #specification
- Inferring Specifications to Detect Errors in Code (MT), pp. 144–153.
- ASE-2004-XieMN #detection #framework #named #object-oriented #testing
- Rostra: A Framework for Detecting Redundant Object-Oriented Unit Tests (TX, DM, DN), pp. 196–205.
- DAC-2004-DargaLSM #detection #symmetry
- Exploiting structure in symmetry detection for CNF (PTD, MHL, KAS, ILM), pp. 530–534.
- DAC-2004-Iyer #detection #fault
- Hierarchical application aware error detection and recovery (RKI), p. 79.
- DAC-2004-JeongN #detection #performance
- Fast hazard detection in combinational circuits (CJ, SMN), pp. 592–595.
- DAC-2004-WangC #detection #symmetry
- Symmetry detection for incompletely specified functions (KHW, JHC), pp. 434–437.
- DATE-v1-2004-AlmukhaizimDM #bound #concurrent #detection #fault #latency #on the
- On Concurrent Error Detection with Bounded Latency in FSMs (SA, PD, YM), pp. 596–603.
- DATE-v1-2004-PomeranzVRS #detection #fault
- Z-Sets and Z-Detections: Circuit Characteristics that Simplify Fault Diagnosis (IP, SV, SMR, BS), pp. 68–75.
- DATE-v2-2004-DworakCWM #detection #fault
- Balanced Excitation and Its Effect on the Fortuitous Detection of Dynamic Defects (JD, BC, JW, MRM), pp. 1066–1071.
- VLDB-2004-KiferBG #data type #detection
- Detecting Change in Data Streams (DK, SBD, JG), pp. 180–191.
- VLDB-2004-SnodgrassYC #detection
- Tamper Detection in Audit Logs (RTS, S(Y, CSC), pp. 504–515.
- VLDB-2004-ZhangLLW #detection #named
- HOS-Miner: A System for Detecting Outlying Subspaces of High-dimensional Data (JZ, ML, TWL, HHW), pp. 1265–1268.
- ESOP-2004-Mine #abstract domain #detection #fault #float #relational #runtime
- Relational Abstract Domains for the Detection of Floating-Point Run-Time Errors (AM), pp. 3–17.
- CSMR-2004-RatiuDGM #design #detection #using
- Using History Information to Improve Design Flaws Detection (DR, SD, TG, RM), pp. 223–232.
- ICSM-2004-BruntinkDTE #clone detection #detection #evaluation #identification
- An Evaluation of Clone Detection Techniques for Identifying Crosscutting Concerns (MB, AvD, TT, RvE), pp. 200–209.
- ICSM-2004-Marinescu #design #detection
- Detection Strategies: Metrics-Based Rules for Detecting Design Flaws (RM), pp. 350–359.
- ICSM-2004-MemonX #detection #effectiveness #empirical #evaluation #testing
- Empirical Evaluation of the Fault-Detection Effectiveness of Smoke Regression Test Cases for GUI-Based Software (AMM, QX), pp. 8–17.
- ICSM-2004-MerloAPR #analysis #clone detection #complexity #detection #evolution #linear #object-oriented #similarity
- Linear Complexity Object-Oriented Similarity for Clone Detection and Software Evolution Analyses (EM, GA, MDP, VFR), pp. 412–416.
- SCAM-2004-LakhotiaK #detection #obfuscation #stack
- Abstracting Stack to Detect Obfuscated Calls in Binaries (AL, EUK), pp. 17–26.
- SCAM-2004-WahlerSGF #clone detection #detection #source code
- Clone Detection in Source Code by Frequent Itemset Techniques (VW, DS, JWvG, GF), pp. 128–135.
- WCRE-2004-ArevaloBN #collaboration #detection
- Detecting Implicit Collaboration Patterns (GA, FB, ON), pp. 122–131.
- CSCW-2004-GoodallLK #collaboration #detection #network
- I know my network: collaboration and expertise in intrusion detection (JRG, WGL, AK), pp. 342–345.
- AdaEurope-2004-BreuerG #concurrent #detection #kernel #linux
- Static Deadlock Detection in the Linux Kernel (PTB, MGV), pp. 52–64.
- CAiSE-2004-EderKM #detection #slicing
- Analysing Slices of Data Warehouses to Detect Structural Modifications (JE, CK, DM), pp. 492–505.
- ICEIS-v2-2004-BoudjeloudP #detection #visualisation
- Outlier Detection and Visualisation in High Dimensional Data (LB, FP), pp. 485–488.
- ICEIS-v2-2004-DhoteMR #analysis #detection #development #fault
- Development of an Expert System for Detecting Incipient Fault in Transformer by Dissolved Gas Analysis (NKD, DMH, MRR), pp. 210–215.
- ICEIS-v2-2004-MararCPF #adaptation #detection
- Adaptative Techniques for the Human Faces Detection (JFM, DC, OP, EF), pp. 465–468.
- ICEIS-v2-2004-MoutinhoTNC #approach #detection #network #using
- Face Pattern Detection — an Approach Using Neural Networks (AMM, ACGT, LBN, PHGC), pp. 172–177.
- ICEIS-v3-2004-MukkamalaSAR #adaptation #detection #using
- Intrusion Detection Systems Using Adaptive Regression Splines (SM, AHS, AA, VR), pp. 26–33.
- ICEIS-v4-2004-MazhelisP #classification #detection
- Combining One-Class Classifiers for Mobile-User Substitution Detection (OM, SP), pp. 130–137.
- CIKM-2004-MaG #detection #feedback #information retrieval #using
- Using relevance feedback to detect misuse for information retrieval systems (LM, NG), pp. 164–165.
- CIKM-2004-RenRPS #detection
- A vertical distance-based outlier detection method with local pruning (DR, IR, WP, KS), pp. 279–284.
- CIKM-2004-SongB #algorithm #detection #effectiveness #named #performance
- BioDIFF: an effective fast change detection algorithm for genomic and proteomic data (YS, SSB), pp. 146–147.
- ICML-2004-NguyenWJ #classification #detection #distributed #kernel #using
- Decentralized detection and classification using kernel methods (XN, MJW, MIJ).
- ICPR-v1-2004-ArcaCL #detection #performance #recognition
- An Efficient Method to Detect Facial Fiducial Points for Face Recognition (SA, PC, RL), pp. 532–535.
- ICPR-v1-2004-ChenCL #algorithm #detection #robust
- A Robust Algorithm of Principal Curve Detection (MC, ZC, YL), pp. 429–432.
- ICPR-v1-2004-ChienL #3d #detection #multi
- Skin Color Detection in Low Bit-Rate 3-D Multiwavelet-Based Videos (JCC, CCL), pp. 720–723.
- ICPR-v1-2004-GllavataEF #classification #detection #image
- Text Detection in Images Based on Unsupervised Classification of High-Frequency Wavelet Coefficients (JG, RE, BF), pp. 425–428.
- ICPR-v1-2004-HoriSNK #detection #multi #realtime #using
- A Real-Time Multi Face Detection Technique Using Positive-Negative Lines-of-Face Template (YH, KS, YN, TK), pp. 765–768.
- ICPR-v1-2004-IlaGC #algorithm #architecture #detection #parallel
- Proposal of a Parallel Architecture for a Motion Detection Algorithm (VI, RG, FC), pp. 797–800.
- ICPR-v1-2004-JiangLK #detection #recognition
- Reference Point Detection for Fingerprint Recognition (XJ, ML, ACK), pp. 540–543.
- ICPR-v1-2004-KusachiSIA #detection #image #recognition #robust
- Kanji Recognition in Scene Images without Detection of Text Fields — Robust Against Variation of Viewpoint, Contrast, and Background Texture (YK, AS, NI, KA), pp. 457–460.
- ICPR-v1-2004-LoogG #detection #probability
- Static Posterior Probability Fusion for Signal Detection: Applications in the Detection of Interstitial Diseases in Chest Radiographs (ML, BvG), pp. 644–647.
- ICPR-v1-2004-PereraH #detection
- Bayesian Object-Level Change Detection in Grayscale Imagery (AGAP, AH), pp. 71–75.
- ICPR-v1-2004-PopoviciTRM #algorithm #detection #evaluation #locality #on the #performance
- On Performance Evaluation of Face Detection and Localization Algorithms (VP, JPT, YR, SM), pp. 313–317.
- ICPR-v1-2004-TodorovicN #detection #image #using
- Detection of Artificial Structures in Natural-Scene Images Using Dynamic Trees (ST, MCN), pp. 35–39.
- ICPR-v1-2004-WangJW #approach #detection #integration #multi #novel #using #video
- A Novel Video Caption Detection Approach Using Multi-Frame Integration (RW, WJ, LW), pp. 449–452.
- ICPR-v1-2004-WuAL #detection
- Glasses Detection by Boosting Simple Wavelet Features (BW, HA, RL), pp. 292–295.
- ICPR-v1-2004-YangFTH #detection #multi #using
- Skin Color Detection Using Multiple Cues (JY, ZF, TT, WH), pp. 632–635.
- ICPR-v2-2004-BaiH04a #detection #documentation #image #multi #using
- Underline Detection and Removal in a Document Image Using Multiple Strategies (ZLB, QH), pp. 578–581.
- ICPR-v2-2004-BanerjeeKM #detection #using
- Corner Detection Using Support Vector Machines (MB, MKK, PM), pp. 819–822.
- ICPR-v2-2004-BoyerJ #detection #order #robust
- Perceptual Organization in Range Data: Robust Detection of Low Order Surfaces in Heavy Clutter (KLB, KJ), pp. 102–105.
- ICPR-v2-2004-ChennubhotlaJ #detection #distance #normalisation
- Perceptual Distance Normalization for Appearance Detection (CC, ADJ), pp. 23–27.
- ICPR-v2-2004-EngWKY #detection #framework #robust #using
- A Bayesian Framework for Robust Human Detection and Occlusion Handling using Human Shape Model (HLE, JW, AHK, WYY), pp. 257–260.
- ICPR-v2-2004-EwerthF #detection #difference #normalisation
- Improving Cut Detection in MPEG Videos by GOP-Oriented Frame Difference Normalization (RE, BF), pp. 807–810.
- ICPR-v2-2004-EzakiBS #detection #image #towards #visual notation
- Text Detection from Natural Scene Images: Towards a System for Visually Impaired Persons (NE, MB, LS), pp. 683–686.
- ICPR-v2-2004-FangQ #detection #learning
- Learning Sample Subspace with Application to Face Detection (JF, GQ), pp. 423–426.
- ICPR-v2-2004-HuangAWL #detection #multi
- Boosting Nested Cascade Detector for Multi-View Face Detection (CH, HA, BW, SL), pp. 415–418.
- ICPR-v2-2004-KatsoulasW #detection #image
- Edge Detection in Range Images of Piled Box-like Objects (DK, AW), pp. 80–84.
- ICPR-v2-2004-LiYMKG #detection #realtime
- A Real-Time Vehicle Detection and Tracking System in Outdoor Traffic Scenes (XL, XY, YLM, RK, GG), pp. 761–764.
- ICPR-v2-2004-LuoYT #algorithm #automation #detection #performance
- An Efficient Automatic Redeye Detection and Correction Algorithm (HL, JY, DT), pp. 883–886.
- ICPR-v2-2004-PanN #detection #multi #novel
- Novel Seed Selection for Multiple Objects Detection and Tracking (ZP, CWN), pp. 744–747.
- ICPR-v2-2004-RottensteinerTCKL #detection #multi
- Building Detection by Dempster-Shafer Fusion of LIDAR Data and Multispectral Aerial Imagery (FR, JT, SC, KK, BCL), pp. 339–342.
- ICPR-v2-2004-SebeCHG #approach #detection #network
- Skin Detection: A Bayesian Network Approach (NS, IC, TSH, TG), pp. 903–906.
- ICPR-v2-2004-ShihL #analysis #detection #using #video
- Face Detection Using Discriminating Feature Analysis and Support Vector Machine in Video (PS, CL), pp. 407–410.
- ICPR-v2-2004-Sidenbladh #detection
- Detecting Human Motion with Support Vector Machines (HS), pp. 188–191.
- ICPR-v2-2004-TremblaisA #algorithm #detection #multi #performance
- A Fast Multiscale Edge Detection Algorithm Based on a New Edge Preserving PDE Resolution Scheme (BT, BA), pp. 811–814.
- ICPR-v2-2004-YaoKG #detection #performance #robust
- Fast Robust GA-Based Ellipse Detection (JY, NNK, PG), pp. 859–862.
- ICPR-v2-2004-YaoZ #detection
- Systematic Static Shadow Detection (JY, Z(Z), pp. 76–79.
- ICPR-v2-2004-ZhangLG #detection #realtime #using
- Real-Time Face Detection Using Boosting in Hierarchical Feature Spaces (DZ, SZL, DGP), pp. 411–414.
- ICPR-v2-2004-ZhuLHU #detection #integration #multi
- Car Detection Based on Multi-Cues Integration (ZZ, HL, JH, KU), pp. 699–702.
- ICPR-v3-2004-CaoF04a #automation #detection
- Automatic Morphological Detection of Otolith Nucleus (FC, RF), pp. 606–609.
- ICPR-v3-2004-ChenB04a #detection #image
- Human Ear Detection from Side Face Range Images (HC, BB), pp. 574–577.
- ICPR-v3-2004-ChenCG #adaptation #algorithm #detection #search-based #self
- Resampling for Face Detection by Self-Adaptive Genetic Algorithm (JC, XC, WG), pp. 822–825.
- ICPR-v3-2004-DEliaMMPST #classification #clustering #detection #segmentation
- Detection of Microcalcifications Clusters in Mammograms through TS-MRF Segmentation and SVM-based Classification (CD, CM, MM, GP, GS, FT), pp. 742–745.
- ICPR-v3-2004-DOrazioLCD #algorithm #detection #image #realtime
- An Algorithm for Real Time Eye Detection in Face Images (TD, ML, GC, AD), pp. 278–281.
- ICPR-v3-2004-ErikssonA #detection #robust
- Robustness and Specificity in Object Detection (APE, KÅ), pp. 87–90.
- ICPR-v3-2004-FaragEGF #detection #recognition #using
- Detection and Recognition of Lung Abnormalities Using Deformable Templates (AAF, AEB, GLG, RF), pp. 738–741.
- ICPR-v3-2004-FusseneggerOPA #detection #recognition #segmentation #using
- Object Recognition Using Segmentation for Feature Detection (MF, AO, AP, PA), pp. 41–44.
- ICPR-v3-2004-HautamakiKF #detection #graph #nearest neighbour #using
- Outlier Detection Using k-Nearest Neighbour Graph (VH, IK, PF), pp. 430–433.
- ICPR-v3-2004-HuangSK #approach #detection #multi #robust
- A Multi-Expert Approach for Robust Face Detection (LLH, AS, HK), pp. 942–945.
- ICPR-v3-2004-HuangT #detection #estimation #realtime #robust #video
- Robust Real-Time Detection, Tracking, and Pose Estimation of Faces in Video Streams (KSH, MMT), pp. 965–968.
- ICPR-v3-2004-IshiiHYN #detection #realtime
- Face and Head Detection for a Real-Time Surveillance System (YI, HH, KY, YN), pp. 298–301.
- ICPR-v3-2004-JiaMSC #detection #fault #realtime
- An Intelligent Real-time Vision System for Surface Defect Detection (HJ, YLM, JS, TSC), pp. 239–242.
- ICPR-v3-2004-JiaQD #detection #markov #modelling #online
- An Advanced Segmental Semi-Markov Model Based Online Series Pattern Detection (SJ, YQ, GD), pp. 634–637.
- ICPR-v3-2004-KapoorPI #detection #multi #probability
- Probabilistic Combination of Multiple Modalities to Detect Interest (AK, RWP, YI), pp. 969–972.
- ICPR-v3-2004-KellerS #algebra #approach #detection #symmetry
- An Algebraic Approach to Symmetry Detection (YK, YS), pp. 186–189.
- ICPR-v3-2004-KolschT #analysis #detection #robust
- Analysis of Rotational Robustness of Hand Detection with a Viola-Jones Detector (MK, MT), pp. 107–110.
- ICPR-v3-2004-LanMZ #detection #multimodal #using
- Multi-level Anchorperson Detection Using Multimodal Association (DJL, YFM, HZ), pp. 890–893.
- ICPR-v3-2004-LiCKG #classification #detection #image
- Detecting Abnormal Regions in Colonoscopic Images by Patch-based Classifier Ensemble (PL, KLC, SMK, YG), pp. 774–777.
- ICPR-v3-2004-NadimiB #adaptation #detection
- Adaptive Fusion for Diurnal Moving Object Detection (SN, BB), pp. 696–699.
- ICPR-v3-2004-NakaiTHOO #detection
- A Practical Stereo Scheme for Obstacle Detection in Automotive Use (HN, NT, HH, YO, KO), pp. 346–350.
- ICPR-v3-2004-RamstromC #detection #using
- Object Detection using Background Context (OR, HIC), pp. 45–48.
- ICPR-v3-2004-ShimizuYWSTN #detection #mobile
- Moving Object Detection with Mobile Stereo Omni-directional System (SOS) based on Motion Compensatory Inter-frame Depth Subtraction (SS, KY, CW, YS, HT, YN), pp. 248–251.
- ICPR-v3-2004-SugimotoTTO #detection #image #sequence #using #visualisation
- Obstacle Detection Using Millimeter-Wave Radar and Its Visualization on Image Sequence (SS, HT, HT, MO), pp. 342–345.
- ICPR-v3-2004-TerrillonPNY #detection #multi #realtime #recognition #robust #sequence #video
- DRUIDE : A Real-Time System for Robust Multiple Face Detection, Tracking and Hand Posture Recognition in Color Video Sequences (JCT, AP, YN, KY), pp. 302–305.
- ICPR-v3-2004-UnsalanB #detection #image #multi #network
- A System to Detect Houses and Residential Street Networks in Multispectral Satellite Images (CÜ, KLB), pp. 49–52.
- ICPR-v3-2004-YapCLHP #analysis #detection
- Detecting Femur Fractures by Texture Analysis of Trabeculae (DWHY, YC, WKL, TSH, MAP), pp. 730–733.
- ICPR-v4-2004-ChangL #detection #flexibility
- Detecting Deformable Objects with Flexible Shape Priors (TLC, TLL), pp. 155–158.
- ICPR-v4-2004-ChanHSP #detection #semantics #using #video
- Detecting Rare Events in Video Using Semantic Primitives with HMM (MTC, AH, JS, MP), pp. 150–154.
- ICPR-v4-2004-DavisS #detection #people #robust
- Robust Detection of People in Thermal Imagery (JWD, VS), pp. 713–716.
- ICPR-v4-2004-FuYHT #clustering #detection #multi #using
- Mixture Clustering Using Multidimensional Histograms for Skin Detection (ZF, JY, WH, TT), pp. 549–552.
- ICPR-v4-2004-GoniEVC #algorithm #detection #eye tracking #robust
- Robust Algorithm for Pupil-Glint Vector Detection in a Video-oculography Eyetracking System (SG, JE, AV, RC), pp. 941–944.
- ICPR-v4-2004-HagaSY #analysis #detection #using
- Human Detection in Outdoor Scene using Spatio-Temporal Motion Analysis (TH, KS, YY), pp. 331–334.
- ICPR-v4-2004-HeroorC #detection #graph #segmentation
- Affine Layer Segmentation and Adjacency Graphs for Vortex Detection (SH, IC), pp. 223–226.
- ICPR-v4-2004-IwaseS #detection #image #parallel
- Parallel Tracking of All Soccer Players by Integrating Detected Positions in Multiple View Images (SI, HS), pp. 751–754.
- ICPR-v4-2004-JeongKH #detection #image
- Appearance-Based Nude Image Detection (CYJ, JSK, KSH), pp. 467–470.
- ICPR-v4-2004-JinSS #adaptation #algorithm #detection #image #novel
- A Novel Adaptive Image Enhancement Algorithm for Face Detection (LJ, SS, MS), pp. 843–848.
- ICPR-v4-2004-KwonP #detection #image #quality
- Optimum Block Size Detection for Image Quality Measure (YBK, JP), pp. 491–494.
- ICPR-v4-2004-LeeNG #automation #detection
- Automated Detection of Solar Loops by the Oriented Connectivity Method (JKL, TSN, GAG), pp. 315–318.
- ICPR-v4-2004-LiuA #detection
- Vision Based Fire Detection (CBL, NA), pp. 134–137.
- ICPR-v4-2004-Nait-CharifM #detection #process #summary
- Activity Summarisation and Fall Detection in a Supportive Home Environment (HNC, SJM), pp. 323–326.
- ICPR-v4-2004-Orrite-UrunuelaRJR #2d #3d #detection #modelling
- 2D Silhouette and 3D Skeletal Models for Human Detection and Tracking (COU, JMdR, JEHJ, GR), pp. 244–247.
- ICPR-v4-2004-PiriouBY #detection #image #modelling #probability
- Learned Probabilistic Image Motion Models for Event Detection in Videos (GP, PB, JFY), pp. 207–210.
- ICPR-v4-2004-SchloglBWB #detection #evaluation #metric #performance
- Performance Evaluation Metrics for Motion Detection and Tracking (TS, CB, MW, HB), pp. 519–522.
- ICPR-v4-2004-SelmaouiRLA #analysis #detection #image
- Image Analysis for Core Geological Descriptions : Strata and Granulometry Detection (NS, BR, CLM, MA), pp. 305–310.
- ICPR-v4-2004-ShettyR #classification #detection #modelling
- An Undecimated Wavelet Transform Based Denoising, PPCA Based Pulse Modeling and Detection-Classification of PD Signals (PKS, TSR), pp. 873–876.
- ICPR-v4-2004-SialaCCB #detection
- Moving Shadow Detection with Support Vector Domain Description in the Color Ratios Space (KS, MC, FC, OB), pp. 384–387.
- ICPR-v4-2004-SinghS #comparison #detection #image
- A Comparison of Image Enhancement Techniques for Explosive Detection (MS, SS), pp. 811–814.
- ICPR-v4-2004-TongLL #detection #effectiveness #performance
- An Effective and Fast Soccer Ball Detection and Tracking Method (XFT, HQL, QSL), pp. 795–798.
- ICPR-v4-2004-TothSWA #clustering #detection #using
- Detection of Moving Shadows using Mean Shift Clustering and a Significance Test (DT, IS, AW, TA), pp. 260–263.
- ICPR-v4-2004-UtsumiTI #3d #detection #interactive
- View-Based Detection of 3-D Interaction between Hands and Real Objects (AU, NT, SI), pp. 961–964.
- ICPR-v4-2004-WangJ #detection #multi
- Multi-View Face Detection under Complex Scene based on Combined SVMs (PW, QJ), pp. 179–182.
- ICPR-v4-2004-YangFTH04a #approach #detection #image #novel
- A Novel Approach to Detecting Adult Images (JY, ZF, TT, WH), pp. 479–482.
- ICPR-v4-2004-YangL #detection #multi
- Multiple Pedestrian Detection and Tracking based on Weighted Temporal Texture Features (HDY, SWL), pp. 248–251.
- ICPR-v4-2004-YingH04a #detection #using
- Catadioptric Line Features Detection using Hough Transform (XY, ZH), pp. 839–842.
- ICPR-v4-2004-ZhaiRS #detection #finite #state machine #using
- Conversation Detection in Feature Films Using Finite State Machines (YZ, ZR, MS), pp. 458–461.
- KDD-2004-Donoho #detection
- Early detection of insider trading in option markets (SD), pp. 420–429.
- KDD-2004-IdeK #detection
- Eigenspace-based anomaly detection in computer systems (TI, HK), pp. 440–449.
- KDD-2004-Iyengar #clustering #detection #on the
- On detecting space-time clusters (VSI), pp. 587–592.
- KDD-2004-KolczCA #detection #robust
- Improved robustness of signature-based near-replica detection via lexicon randomization (AK, AC, JA), pp. 605–610.
- KDD-2004-KolterM #bytecode #detection #learning
- Learning to detect malicious executables in the wild (JZK, MAM), pp. 470–478.
- KDD-2004-LazarevicKK #detection #effectiveness #locality #scalability
- Effective localized regression for damage detection in large complex mechanical structures (AL, RK, CK), pp. 450–459.
- KDD-2004-NeillM #agile #clustering #detection
- Rapid detection of significant spatial clusters (DBN, AWM), pp. 256–265.
- KDD-2004-ShavlikS #detection #effectiveness #evaluation
- Selection, combination, and evaluation of effective software sensors for detecting abnormal computer usage (JWS, MS), pp. 276–285.
- SEKE-2004-XingS #co-evolution #detection
- Data-mining in Support of Detecting Class Co-evolution (ZX, ES), pp. 123–128.
- SIGIR-2004-ConradS #corpus #detection
- Constructing a text corpus for inexact duplicate detection (JGC, CPS), pp. 582–583.
- SIGIR-2004-DAmore #community #detection
- Expertise community detection (RJD), pp. 498–499.
- SIGIR-2004-GowederPR #detection #information retrieval
- Broken plural detection for arabic information retrieval (AG, MP, ANDR), pp. 566–567.
- SIGIR-2004-KumaranA #classification #detection
- Text classification and named entities for new event detection (GK, JA), pp. 297–304.
- SIGIR-2004-ZhangV04a #detection #query
- Detection and translation of OOV terms prior to query time (YZ, PV), pp. 524–525.
- UML-2004-BauerdickGG #case study #detection #experience #ocl #uml
- Detecting OCL Traps in the UML 2.0 Superstructure: An Experience Report (HB, MG, FG), pp. 188–196.
- SAC-2004-AdamJA #dataset #detection
- Neighborhood based detection of anomalies in high dimensional spatio-temporal sensor datasets (NRA, VPJ, VA), pp. 576–583.
- SAC-2004-AmorBE #detection #naive bayes
- Naive Bayes vs decision trees in intrusion detection systems (NBA, SB, ZE), pp. 420–424.
- SAC-2004-BistarelliFO #constraints #detection #modelling #problem #using
- Modeling and detecting the cascade vulnerability problem using soft constraints (SB, SNF, BO), pp. 383–390.
- SAC-2004-FengBM #array #detection
- Time-frequency feature detection for time-course microarray data (JF, PEB, BM), pp. 128–132.
- SAC-2004-HuP #approach #data mining #database #detection #mining
- A data mining approach for database intrusion detection (YH, BP), pp. 711–716.
- SAC-2004-SiaterlisM #data fusion #detection #multi #towards
- Towards multisensor data fusion for DoS detection (CS, BSM), pp. 439–446.
- SAC-2004-ZaneroS #detection #learning
- Unsupervised learning techniques for an intrusion detection system (SZ, SMS), pp. 412–419.
- FSE-2004-PerkinsE #algorithm #detection #incremental #invariant #performance
- Efficient incremental algorithms for dynamic detection of likely invariants (JHP, MDE), pp. 23–32.
- ASPLOS-2004-HauswirthC #adaptation #detection #memory management #profiling #statistics #using
- Low-overhead memory leak detection using adaptive statistical profiling (MH, TMC), pp. 156–164.
- ASPLOS-2004-SmolensGKFHN #bound #detection #latency #named
- Fingerprinting: bounding soft-error detection latency and bandwidth (JCS, BTG, JK, BF, JCH, AN), pp. 224–234.
- SAT-2004-LewisSB #detection #satisfiability
- Early Conflict Detection Based BCP for SAT Solving (MDTL, TS, BB), pp. 29–36.
- SAT-2004-NishimuraRS #detection #set
- Detecting Backdoor Sets with Respect to Horn and Binary Clauses (NN, PR, SS), pp. 96–103.
- ASE-2003-AhmadAGK #detection #fault #spreadsheet #type system
- A Type System for Statically Detecting Spreadsheet Errors (YA, TA, SG, SK), pp. 174–183.
- ASE-2003-GuptaH #detection #invariant #test coverage
- A New Structural Coverage Criterion for Dynamic Detection of Program Invariants (NG, ZVH), pp. 49–59.
- ASE-2003-ShehataE #detection #framework #interactive #requirements
- Detecting Requirements Interactions: A Three-Level Framework (MS, AE), pp. 352–355.
- DAC-2003-PomeranzR #detection #on the #testing
- On test data compression and n-detection test sets (IP, SMR), pp. 748–751.
- DATE-2003-DrineasM #concurrent #detection #fault #monitoring
- Non-Intrusive Concurrent Error Detection in FSMs through State/Output Compaction and Monitoring via Parity Trees (PD, YM), pp. 11164–11167.
- DATE-2003-MangerucaFSPP #case study #design #detection #embedded
- System Level Design of Embedded Controllers: Knock Detection, A Case Study in the Automotive Domain (LM, AF, ALSV, AP, MP), pp. 20232–20237.
- DATE-2003-NicolescuV #approach #detection #fault #tool support
- Detecting Soft Errors by a Purely Software Approach: Method, Tools and Experimental Results (BN, RV), pp. 20057–20063.
- DATE-2003-PomeranzRK #detection #fault #on the
- On the Characterization of Hard-to-Detect Bridging Faults (IP, SMR, SK), pp. 11012–11019.
- DATE-2003-PradhanLC #detection #fault #generative #named #novel
- EBIST: A Novel Test Generator with Built-In Fault Detection Capability (DKP, CL, KC), pp. 10224–10229.
- DRR-2003-AradhyeHM #analysis #detection #recognition
- Syntax-directed content analysis of videotext: application to a map detection recognition system (HBA, JAH, GKM), pp. 57–66.
- HT-2003-AmitayCDLS #detection
- The connectivity sonar: detecting site functionality by structural patterns (EA, DC, AD, RL, AS), pp. 38–47.
- ICDAR-2003-ChenZ #detection #recognition
- Photo time-stamp detection and recognition (XRC, HZ), pp. 319–322.
- ICDAR-2003-Kasturi #detection
- Detection of Text Marks on Moving Vehicles Vladimir Y. Mariano (RK), pp. 393–397.
- ICDAR-2003-MandalCDC #automation #detection #documentation #image #segmentation
- Automated Detection and Segmentation of Table of Contents Page from Document Images (SM, SPC, AKD, BC), pp. 398–402.
- ICDAR-2003-NomuraMUS #detection #segmentation
- Detection and Segmentation of Touching Characters in Mathematical Expression (AN, KM, SU, MS), pp. 126–130.
- ICDAR-2003-RamelCVF #detection #representation
- Detection, Extraction and Representation of Tables (JYR, MC, NV, CF), pp. 374–378.
- ICDAR-2003-ShiG #detection #documentation #fuzzy #image #using
- Skew Detection for Complex Document Images Using Fuzzy Runlength (ZS, VG), pp. 715–719.
- ICDAR-2003-ToshihiroM #detection #documentation #image #matrix #segmentation
- Detection of Matrices and Segmentation of Matrix Elements in Scanned Images of Scientific Documents (KT, SM), pp. 433–437.
- ICDAR-2003-ZhengLD #algorithm #detection #documentation #modelling
- A Model-based Line Detection Algorithm in Documents (YZ, HL, DSD), pp. 44–48.
- ITiCSE-2003-CeraCHLNPZ #detection
- High-tech dishonesty: cheating, plagiarism and detection (CDC, BWC, NH, RNL, AN, JLP, PZ), p. 244.
- FASE-2003-Muccini #branch #detection
- Detecting Implied Scenarios Analyzing Non-local Branching Choices (HM), pp. 372–386.
- IWPC-2003-HeuzerothHHL #automation #design pattern #detection
- Automatic Design Pattern Detection (DH, TH, GH, WL), pp. 94–104.
- IWPC-2003-LakhotiaLWY #benchmark #clone detection #detection #metric #towards
- Towards a Clone Detection Benchmark Suite and Results Archive (AL, JL, AW, YY), pp. 285–287.
- SCAM-2003-Leitao #2d #detection #using
- Detection of Redundant Code using R2D2 (AML), pp. 183–192.
- SCAM-2003-PearceKH #analysis #detection #difference #online #pointer
- Online Cycle Detection and Difference Propagation for Pointer Analysis (DJP, PHJK, CH), pp. 3–12.
- WCRE-2003-WalensteinJLYL #clone detection #detection #problem
- Problems Creating Task-relevant Clone Detection Reference Data (AW, NJ, JL, YY, AL), pp. 285–295.
- WCRE-2003-ZouG #analysis #detection #using
- Detecting Merging and Splitting using Origin Analysis (LZ, MWG), pp. 146–154.
- PLDI-2003-DorRS #c #detection #named #towards
- CSSV: towards a realistic tool for statically detecting all buffer overflows in C (ND, MR, SS), pp. 155–167.
- ICEIS-v2-2003-BelgacemCR #detection #network
- Detection of Cardiac Arrhythmias By Neural Networks (NB, MAC, FBR), pp. 414–417.
- ICEIS-v3-2003-HoangHB #data mining #detection #mining
- Intrusion Detection Based on Data Mining (XDH, JH, PB), pp. 341–346.
- CIKM-2003-CatheyMGG #detection #information retrieval
- Misuse detection for information retrieval systems (RC, LM, NG, DAG), pp. 183–190.
- CIKM-2003-ConradGS #detection #documentation #online #reliability #retrieval
- Online duplicate document detection: signature reliability in a dynamic retrieval environment (JGC, XSG, CPS), pp. 443–452.
- CIKM-2003-RamaswamyILD #detection #performance #web
- Techniques for efficient fragment detection in web pages (LR, AI, LL, FD), pp. 516–519.
- CIKM-2003-WhiteJR #approach #detection
- An approach for implicitly detecting information needs (RW, JMJ, IR), pp. 504–507.
- ECIR-2003-MakkonenAS #detection #topic
- Topic Detection and Tracking with Spatio-Temporal Evidence (JM, HAM, MS), pp. 251–265.
- ECIR-2003-WuGC #detection #documentation
- Experiments with Document Archive Size Detection (SW, FG, FC), pp. 294–304.
- ICML-2003-WongMCW #detection #network
- Bayesian Network Anomaly Pattern Detection for Disease Outbreaks (WKW, AWM, GFC, MMW), pp. 808–815.
- KDD-2003-BilenkoM #adaptation #detection #metric #similarity #string #using
- Adaptive duplicate detection using learnable string similarity measures (MB, RJM), pp. 39–48.
- KDD-2003-MaP #detection #online #sequence
- Online novelty detection on temporal sequences (JM, SP), pp. 613–618.
- KDD-2003-NobleC #detection #graph
- Graph-based anomaly detection (CCN, DJC), pp. 631–636.
- KDD-2003-OteyPGLNP #detection #towards
- Towards NIC-based intrusion detection (MEO, SP, AG, GL, SN, DKP), pp. 723–728.
- KDD-2003-WebbBN #detection #difference #on the
- On detecting differences between groups (GIW, SMB, DAN), pp. 256–265.
- KDD-2003-ZhuS #data type #detection #performance
- Efficient elastic burst detection in data streams (YZ, DS), pp. 336–345.
- MLDM-2003-ImiyaTOH #bound #detection #random #set
- Detecting the Boundary Curve of Planar Random Point Set (AI, KT, HO, VH), pp. 413–424.
- SEKE-2003-SouzaORGR #consistency #detection #modelling #nondeterminism #re-engineering #using
- Using Critiquing Systems for Inconsistency Detection in Software Engineering Models (CRBdS, HLRO, CRPdR, KMG, DFR), pp. 196–203.
- SIGIR-2003-AllanWB #detection #retrieval
- Retrieval and novelty detection at the sentence level (JA, CW, AB), pp. 314–321.
- SIGIR-2003-BrantsC #detection
- A System for new event detection (TB, FC), pp. 330–337.
- SIGIR-2003-FengZP #detection #music #retrieval
- Popular music retrieval by detecting mood (YF, YZ, YP), pp. 375–376.
- OOPSLA-2003-DemskyR #automation #data type #detection #fault
- Automatic detection and repair of errors in data structures (BD, MCR), pp. 78–95.
- SAC-2003-BarbaraLLJC #data mining #detection #mining
- Bootstrapping a Data Mining Intrusion Detection System (DB, YL, JLL, SJ, JC), pp. 421–425.
- SAC-2003-Mahoney #detection #network
- Network Traffic Anomaly Detection Based on Packet Bytes (MVM), pp. 346–350.
- ESEC-FSE-2003-LivshitsL #c #context-sensitive grammar #debugging #detection #pointer #source code
- Tracking pointers with path and context sensitivity for bug detection in C programs (VBL, MSL), pp. 317–326.
- ESEC-FSE-2003-VignaVK #design #detection #implementation #product line
- Designing and implementing a family of intrusion detection systems (GV, FV, RAK), pp. 88–97.
- ESEC-FSE-2003-XieCE #analysis #detection #fault #memory management #named #using
- ARCHER: using symbolic, path-sensitive analysis to detect memory access errors (YX, AC, DRE), pp. 327–336.
- ICSE-2003-KemmererV #detection #internet #security
- Internet Security and Intrusion Detection (RAK, GV), pp. 748–749.
- CC-2003-NguyenIAC #automation #detection
- Automatic Detection of Uninitialized Variables (TVNN, FI, CA, FC), pp. 217–231.
- PPoPP-2003-OCallahanC #concurrent #detection #hybrid
- Hybrid dynamic data race detection (RO, JDC), pp. 167–178.
- PPoPP-2003-PoznianskyS #c++ #concurrent #detection #multi #on the fly #performance #source code
- Efficient on-the-fly data race detection in multihreaded C++ programs (EP, AS), pp. 179–190.
- SOSP-2003-EnglerA #detection #effectiveness #named #static analysis
- RacerX: effective, static detection of race conditions and deadlocks (DRE, KA), pp. 237–252.
- CAV-2003-ArmoniFFGPTV #detection #linear #logic
- Enhanced Vacuity Detection in Linear Temporal Logic (RA, LF, AF, OG, NP, AT, MYV), pp. 368–380.
- DAC-2002-BhuniaRS #analysis #detection #fault #locality #novel
- A novel wavelet transform based transient current analysis for fault detection and localization (SB, KR, JS), pp. 361–366.
- DAC-2002-Higuchi #detection #multi #scalability
- An implication-based method to detect multi-cycle paths in large sequential circuits (HH), pp. 164–169.
- DATE-2002-BhuniaR #analysis #detection #fault #using
- Fault Detection and Diagnosis Using Wavelet Based Transient Current Analysis (SB, KR), p. 1118.
- DATE-2002-KhomenkoKY #detection #integer #programming #using
- Detecting State Coding Conflicts in STGs Using Integer Programming (VK, MK, AY), pp. 338–345.
- DATE-2002-LechugaMMB #detection #fault
- Built-In Dynamic Current Sensor for Hard-to-Detect Faults in Mixed-Signal Ics (YL, RM, MM, SB), pp. 205–211.
- DATE-2002-LeeCDGM #algorithm #detection #fault #multi #testing
- A New ATPG Algorithm to Limit Test Set Size and Achieve Multiple Detections of All Faults (SL, BC, JD, MRG, MRM), pp. 94–99.
- DATE-2002-Leveugle #automation #detection #fault
- Automatic Modifications of High Level VHDL Descriptions for Fault Detection or Tolerance (RL), pp. 837–841.
- VLDB-2002-ChoN #detection #effectiveness #using
- Effective Change Detection Using Sampling (JC, AN), pp. 514–525.
- FoSSaCS-2002-KochMP #data access #detection #policy #specification
- Conflict Detection and Resolution in Access Control Policy Specifications (MK, LVM, FPP), pp. 223–237.
- SCAM-J-2001-ChenXYZ02 #ada #concurrent #detection
- Concurrent Ada dead statements detection (ZC, BX, HY, JZ), pp. 733–741.
- ICSM-2002-Schneidewind #detection #fault
- An Integrated Failure Detection and Fault Correction Model (NFS), pp. 238–241.
- SCAM-2002-BurdB #clone detection #detection #maintenance #tool support
- Evaluating Clone Detection Tools for Use during Preventative Maintenance (EB, JB), pp. 36–43.
- WCRE-2002-EmdenM #assurance #detection #java #quality #smell
- Java Quality Assurance by Detecting Code Smells (EVE, LM), p. 97–?.
- PLDI-2002-ChoiLLOSS #concurrent #detection #object-oriented #parallel #performance #precise #source code #thread
- Efficient and Precise Datarace Detection for Multithreaded Object-Oriented Programs (JDC, KL, AL, RO, VS, MS), pp. 258–269.
- SAS-2002-MesnardPN #detection #logic programming #source code #termination
- Detecting Optimal Termination Conditions of Logic Programs (FM, ÉP, UN), pp. 509–526.
- IFM-2002-ZulkernineS #algorithm #automation #detection
- Assume-Guarantee Algorithms for Automatic Detection of Software Failures (MZ, RES), pp. 89–108.
- ICGT-2002-GodardMMS #algorithm #detection #distributed #graph #termination
- Termination Detection of Distributed Algorithms by Graph Relabelling Systems (EG, YM, MM, AS), pp. 106–119.
- AdaEurope-2002-DoudouGG #detection #encapsulation
- Encapsulating Failure Detection: From Crash to Byzantine Failures (AD, BG, RG), pp. 24–50.
- EDOC-2002-DunlopIR #detection
- Dynamic Conflict Detection in Policy-Based Management Systems (ND, JI, KR), pp. 15–26.
- ICEIS-2002-LowLT #database #detection #named #transaction
- DIDAFIT: Detecting Intrusions in Databases Through Fingerprinting Transactions (WLL, JL, PT), pp. 121–128.
- CIKM-2002-CooperCB #detection #documentation #using
- Detecting similar documents using salient terms (JWC, AC, EWB), pp. 245–251.
- ICML-2002-MusleaMK02a #adaptation #automation #detection #towards #validation
- Adaptive View Validation: A First Step Towards Automatic View Detection (IM, SM, CAK), pp. 443–450.
- ICPR-v1-2002-AiYX #approach #detection
- A Subspace Approach to Face Detection with Support Vector Machines (HA, LY, GX), pp. 45–48.
- ICPR-v1-2002-ArakiSS #detection
- Detection of Faces of Various Directions in Complex Backgrounds (YA, NS, YS), pp. 409–412.
- ICPR-v1-2002-Bayro-CorrochanoA #approach #detection #geometry
- Geometric Approach for Pose Detection of Moving Human Heads (EBC, AA), pp. 636–639.
- ICPR-v1-2002-CaronMV #detection
- A Method for Detecting Artificial Objects in Natural Environments (YC, PM, NV), pp. 600–603.
- ICPR-v1-2002-ChazalRH #automation #detection #metric #using #variability
- Automatic Sleep Apnoea Detection Using Measures of Amplitude and Heart Rate Variability from the Electrocardiogram (PdC, RBR, CH), pp. 775–778.
- ICPR-v1-2002-DattaSL #detection #video
- Person-on-Person Violence Detection in Video Data (AD, MS, NdVL), pp. 433–438.
- ICPR-v1-2002-DOrazioACN #algorithm #detection #image #sequence
- A Ball Detection Algorithm for Real Soccer Image Sequences (TD, NA, GC, MN), pp. 210–213.
- ICPR-v1-2002-ErdemS #automation #communication #detection #gesture
- Automatic Detection of Relevant Head Gestures in American Sign Language Communication (UME, SS), p. 460–?.
- ICPR-v1-2002-FleuretG #detection #estimation #performance #precise
- Fast Face Detection with Precise Pose Estimation (FF, DG), p. 235–?.
- ICPR-v1-2002-JiangM #algorithm #detection #evaluation
- Supervised Evaluation Methodology for Curvilinear Structure Detection Algorithms (XJ, DM), pp. 103–106.
- ICPR-v1-2002-KimMK #approach #detection
- Wavelet-Based Morphological Approach for Detection of Human Face Region (JBK, CHM, HJK), pp. 417–420.
- ICPR-v1-2002-KimuraW #2d #detection #invariant
- An Extension of the Generalized Hough Transform to Realize Affine-Invariant Two-dimensional (2D) Shape Detection (AK, TW), pp. 65–69.
- ICPR-v1-2002-KrishnamoorthyBF #detection #modelling #robust
- Robust Detection of Buildings in Digital Surface Models (PK, KLB, PJF), pp. 159–163.
- ICPR-v1-2002-LuoE #approach #detection
- A Physics-Motivated Approach to Detecting Sky in Photographs (JL, SPE), pp. 155–158.
- ICPR-v1-2002-LuWL #detection
- A Target Detection Method in Range-Doppler Domain from SAR Echo Data (LL, RW, WL), pp. 91–94.
- ICPR-v1-2002-MaD #detection
- Face Detection Based on Hierarchical Support Vector Machines (YM, XD), pp. 222–225.
- ICPR-v1-2002-PengYW #detection #image #similarity
- Images Similarity Detection Based on Directional Gradient Angular Histogram (JP, BY, DW), pp. 147–150.
- ICPR-v1-2002-SongCL #detection #image #performance
- Edge Color Distribution Transform: An Efficient Tool for ObjectDetection in Images (JS, MC, MRL), pp. 608–612.
- ICPR-v1-2002-TerrillonPNY #detection #human-computer #image #interactive #recognition #robust
- Robust Face Detection and Hand Posture Recognition in Color Images for Human-Machine Interaction (JCT, AP, YN, KY), pp. 204–209.
- ICPR-v1-2002-Worthington #consistency #detection #using
- Enhanced Canny Edge Detection Using Curvature Consistency (PLW), pp. 596–599.
- ICPR-v1-2002-YuanGY #detection #robust
- Robust Frontal Face Detection in Complex Environment (QY, WG, HY), pp. 25–28.
- ICPR-v2-2002-AnconaCSD #complexity #detection #image #parametricity #runtime
- Object Detection in Images: Run-Time Complexity and Parameter Selection of Support Vector Machines (NA, GC, ES, AD), pp. 426–429.
- ICPR-v2-2002-Arana-ArejolaleibaLBLH #detection #navigation #visual notation
- A Smart Sensor Based Visual Landmarks Detection for Indoor Robot Navigation (NAA, FL, MB, CL, JBH), pp. 848–851.
- ICPR-v2-2002-BorghysLP #detection #image
- Edge and Line Detection in Polarimetric SAR Images (DB, VL, CP), pp. 921–924.
- ICPR-v2-2002-BredecheCH #detection #mobile
- Wrapper for Object Detection in an Autonomous Mobile Robot (NB, YC, LH), pp. 749–752.
- ICPR-v2-2002-ChangHHC #detection #effectiveness #modelling
- Shadow Elimination for Effective Moving Object Detection with Gaussian Models (CJC, WFH, JWH, YSC), pp. 540–543.
- ICPR-v2-2002-ChennubhotlaJM #detection #invariant #robust
- Robust Contrast-Invariant EigenDetection (CC, ADJ, JM), pp. 745–748.
- ICPR-v2-2002-GarciaD #architecture #detection #performance #robust
- A Neural Architecture for Fast and Robust Face Detection (CG, MD), pp. 44–47.
- ICPR-v2-2002-GiacintoR #classification #detection #multi #network
- Intrusion Detection in Computer Networks by Multiple Classifier Systems (GG, FR), pp. 390–393.
- ICPR-v2-2002-Gomez #component #detection #on the
- On Selecting Colour Components for Skin Detection (GG), pp. 961–964.
- ICPR-v2-2002-GuimaraesACL #detection #identification #video
- Video Fade Detection by Discrete Line Identification (SJFG, AdAA, MC, NJL), pp. 1013–1016.
- ICPR-v2-2002-HuangSK #detection #network #using
- Face Detection Using a Modified Radial Basis Function Neural Network (LLH, AS, HK), pp. 342–345.
- ICPR-v2-2002-KawanishiMT #3d #detection #locality #multi
- Quick 3D Object Detection and Localization by Dynamic Active Search with Multiple Active Cameras (TK, HM, ST), pp. 605–608.
- ICPR-v2-2002-KimJKS #clustering #detection #segmentation #word
- Word Segmentation of Printed Text Lines Based on Gap Clustering and Special Symbol Detection (SHK, CBJ, HKK, CYS), pp. 320–323.
- ICPR-v2-2002-KimLLKK #approach #detection #multi #video
- Integrated Approach of Multiple Face Detection for Video Surveillance (TKK, SUL, JHL, SCK, SRK), pp. 394–397.
- ICPR-v2-2002-KirshnerCSKC #detection #modelling #probability
- Probabilistic Model-Based Detection of Bent-Double Radio Galaxies (SK, IVC, PS, CK, ECP), pp. 499–502.
- ICPR-v2-2002-KovacsS #animation #detection #probability
- Creating Animations Combining Stochastic Paintbrush Transformation and Motion Detection (LK, TS), p. 1090–?.
- ICPR-v2-2002-LudtkeLHW #detection #using
- Corner Detection Using a Mixture Model of Edge Orientation (NL, BL, ERH, RCW), pp. 574–577.
- ICPR-v2-2002-LuZ #detection #realtime
- Real-Time Unsupervised Speaker Change Detection (LL, HZ), pp. 358–361.
- ICPR-v2-2002-MiyauchiHBK #analysis #collaboration #detection #multi #semantics #video
- Collaborative Multimedia Analysis for Detecting Semantical Events from Broadcasted Sports Video (SM, AH, NB, TK), pp. 1009–1012.
- ICPR-v2-2002-NadimiB #approach #detection #using
- Moving Shadow Detection Using a Physics-Based Approach (SN, BB), pp. 701–704.
- ICPR-v2-2002-Paletta #classification #detection #using
- Detection of Traffic Signs Using Posterior Classifier Combination (LP), pp. 705–708.
- ICPR-v2-2002-SatohTWKNY #detection #robust
- Robust Event Detection by Radial Reach Filter (RRF) (YS, HT, CW, SK, YN, KY), pp. 623–627.
- ICPR-v2-2002-StevensSA #automation #detection #using
- Automatic Target Detection Using PMMW and LADAR Imagery (MRS, MS, SA), pp. 647–650.
- ICPR-v2-2002-TweedM #analysis #automation #detection
- Automatic Detection of Regions of Interest in Mammographies Based on a Combined Analysis of Texture and Histogram (TT, SM), pp. 448–452.
- ICPR-v2-2002-UdeA #detection #probability #using
- Probabilistic Detection and Tracking at High Frame Rates Using Affine Warping (AU, CGA), pp. 6–9.
- ICPR-v2-2002-VisserSL #detection #people #retrieval #semantics #video
- Detecting Automobiles and People for Semantic Video Retrieval (RV, NS, MSL), pp. 733–736.
- ICPR-v2-2002-WuYSLK #3d #detection
- Glasses Frame Detection with 3D Hough Transform (HW, GY, TS, SL, MK), pp. 346–349.
- ICPR-v2-2002-XieJ #detection #performance
- A New Efficient Ellipse Detection Method (YX, QJ), pp. 957–960.
- ICPR-v2-2002-YangP02b #3d #detection #named
- CHEF: Convex Hull of Elliptic Features for 3D Blob Detection (QY, BP), pp. 282–285.
- ICPR-v3-2002-BruniV #detection
- Scratch Detection via Underdamped Harmonic Motion (VB, DV), pp. 887–890.
- ICPR-v3-2002-ChabbiTP #automation #detection #image
- Automatic Detection of Planar Contours from Uncalibrated Images (HC, LT, SP), pp. 541–544.
- ICPR-v3-2002-ChenZL #analysis #component #detection #independence #segmentation
- Edge Detection and Texture Segmentation Based on Independent Component Analysis (YWC, XYZ, HL), pp. 351–354.
- ICPR-v3-2002-ChoudhuryRPP #detection #learning #network
- Boosting and Structure Learning in Dynamic Bayesian Networks for Audio-Visual Speaker Detection (TC, JMR, VP, AP), p. 789–?.
- ICPR-v3-2002-DuC #detection #image #video
- Thresholding Video Images for Text Detection (EYD, CIC), p. 919–?.
- ICPR-v3-2002-FauqueurB #detection #image #query
- Coarse Detection and Fine Color Description for Region-Based Image Queries (JF, NB), pp. 1027–1034.
- ICPR-v3-2002-GargAH #detection #information management
- Fusion of Global and Local Information for Object Detection (AG, SA, TSH), p. 723–?.
- ICPR-v3-2002-HsiehYC #detection
- Morphology-Based License Plate Detection from Complex Scenes (JWH, SHY, YSC), pp. 176–179.
- ICPR-v3-2002-JinQH #detection #probability
- A Probabilistic Model for Camera Zoom Detection (RJ, YQ, AGH), pp. 859–862.
- ICPR-v3-2002-JungKH #detection #image #sequence
- Text Scanner with Text Detection Technology on Image Sequences (KJ, KIK, JH), pp. 473–476.
- ICPR-v3-2002-LinB #detection
- Discovering Operators and Features for Object Detection (YL, BB), pp. 339–342.
- ICPR-v3-2002-MaalmiEBVDG #detection #fault #locality #using
- Crack Defect Detection and Localization Using Genetic-Based Inverse Voting Hough Transform (KM, AEO, RB, LFCLYV, AD, PG), pp. 257–260.
- ICPR-v3-2002-MaoCLS #detection #hybrid #image #video
- Hybrid Chinese/English Text Detection in Images and Video Frames (WM, FLC, KKML, WCS), pp. 1015–1018.
- ICPR-v3-2002-MarianoMPKMLDD #algorithm #detection #evaluation #performance
- Performance Evaluation of Object Detection Algorithms (VYM, JM, JHP, RK, DM, HL, DSD, TD), pp. 965–969.
- ICPR-v3-2002-OkunYP #detection #documentation #image #robust
- Robust Text Detection from Binarized Document Images (OO, YY, MP), pp. 61–64.
- ICPR-v3-2002-Robinson #detection
- Optimal Detection of Blurred Edges (JAR), pp. 831–834.
- ICPR-v3-2002-SahbiB #classification #detection
- Coarse-to-Fine Support Vector Classifiers for Face Detection (HS, NB), pp. 359–362.
- ICPR-v3-2002-Smeraldi #detection #named #parametricity
- Ranklets: Orientation Selective Non-Parametric Features Applied to Face Detection (FS), pp. 379–382.
- ICPR-v3-2002-SpragueL #detection #image #people
- Clothed People Detection in Still Images (NS, JL), pp. 585–589.
- ICPR-v3-2002-SugimotoNM #detection #visual notation
- Detecting a Gazing Region by Visual Direction and Stereo Cameras (AS, AN, TM), pp. 278–282.
- ICPR-v3-2002-ZhangB #detection #multi
- A Wavelet-Based Edge Detection Method by Scale Multiplication (LZ, PB), pp. 501–500.
- ICPR-v4-2002-DassJL #detection #markov #modelling #random #synthesis #using
- Face Detection and Synthesis Using Markov Random Field Models (SCD, AKJ, XL), pp. 201–204.
- ICPR-v4-2002-DuricLSW #detection #image #using
- Using Normal Flow for Detection and Tracking of Limbs in Color Images (ZD, FL, YS, HW), p. 268–?.
- ICPR-v4-2002-FujiyoshiK #detection #multi
- Layered Detection for Multiple Overlapping Objects (HF, TK), pp. 156–161.
- ICPR-v4-2002-HadidPM #detection #using
- Color-Based Face Detection Using Skin Locus Model and Hierarchical Filtering (AH, MP, BM), pp. 196–200.
- ICPR-v4-2002-LefaixMB #detection
- Motion-Based Obstacle Detection and Tracking for Car Driving Assistance (GL, ÉM, PB), pp. 74–77.
- ICPR-v4-2002-MorimotoAF #detection
- Detecting Eye Position and Gaze from a Single Camera and 2 Light Sources (CHM, AA, MF), pp. 314–317.
- ICPR-v4-2002-XiL #detection #feature model #using
- Face Detection and Facial Feature Extraction Using Support Vector Machines (DX, SWL), pp. 209–212.
- ICPR-v4-2002-ZhuS #adaptation #analysis #detection #feature model #statistics
- Discriminant Analysis and Adaptive Wavelet Feature Selection for Statistical Object Detection (YZ, SCS), pp. 86–89.
- KDD-2002-JulischD #detection #mining
- Mining intrusion detection alarms for actionable knowledge (KJ, MD), pp. 366–375.
- KDD-2002-MahoneyC #detection #learning #modelling #network #novel
- Learning nonstationary models of normal network traffic for detecting novel attacks (MVM, PKC), pp. 376–385.
- KDD-2002-UedaS #category theory #detection #modelling #multi #parametricity #using
- Single-shot detection of multiple categories of text using parametric mixture models (NU, KS), pp. 626–631.
- KDD-2002-YamanishiT #detection #framework
- A unifying framework for detecting outliers and change points from non-stationary time series data (KY, JiT), pp. 676–681.
- KDD-2002-YangZCJ #detection #topic
- Topic-conditioned novelty detection (YY, JZ, JGC, CJ), pp. 688–693.
- SIGIR-2002-Smith #detection
- Detecting and Browsing Events in Unstructured text (DAS), pp. 73–80.
- SIGIR-2002-ZhangCM #adaptation #detection
- Novelty and redundancy detection in adaptive filtering (YZ, JPC, TPM), pp. 81–88.
- GPCE-2002-DouenceFS #detection #framework #interactive
- A Framework for the Detection and Resolution of Aspect Interactions (RD, PF, MS), pp. 173–188.
- SAC-2002-KrugelTK #detection #network
- Service specific anomaly detection for network intrusion detection (CK, TT, EK), pp. 201–208.
- SAC-2002-PerezCRT #algorithm #detection #interactive #multi
- An enablement detection algorithm for open multiparty interactions (JAP, RC, DR, MT), pp. 378–384.
- SAC-2002-SeleznyovM #detection #learning
- Learning temporal patterns for anomaly intrusion detection (AS, OM), pp. 209–213.
- ICSE-2002-HangalL #automation #debugging #detection #using
- Tracking down software bugs using automatic anomaly detection (SH, MSL), pp. 291–301.
- ICSE-2002-HausmannHT #approach #case study #detection #functional #graph transformation #requirements #static analysis
- Detection of conflicting functional requirements in a use case-driven approach: a static analysis technique based on graph transformation (JHH, RH, GT), pp. 105–115.
- ICSE-2002-Raz #detection #research #semantics #specification
- Research abstract for semantic detection in dynamic data feeds with incomplete specifications (OR), pp. 733–734.
- ICSE-2002-RazKS #data flow #detection #online #semantics
- Semantic anomaly detection in online data sources (OR, PK, MS), pp. 302–312.
- ASPLOS-2002-ButtsS #detection
- Dynamic dead-instruction detection and elimination (JAB, GSS), pp. 199–210.
- ICLP-2002-Christensen #detection #logic programming #pervasive #process #using
- Using Logic Programming to Detect Activities in Pervasive Healthcare (HBC), pp. 421–436.
- TestCom-2002-CavalliPY #communication #component #detection #fault
- Fault Detection within a Component of a System of Communicating FSMs (ARC, SP, NY), p. 317–?.
- WICSA-2001-BernardoCD #algebra #architecture #detection #process
- Detecting Architectural Mismatches in Process Algebraic Descriptions of Software Systems (MB, PC, LD), pp. 77–86.
- ASE-2001-Albin-AmiotCGJ #design pattern #detection
- Instantiating and Detecting Design Patterns: Putting Bits and Pieces Together (HAA, PC, YGG, NJ), pp. 166–173.
- DAC-2001-GuptaGYA #detection #image #satisfiability
- Dynamic Detection and Removal of Inactive Clauses in SAT with Application in Image Computation (AG, AG, ZY, PA), pp. 536–541.
- DAC-2001-KarriWMK #concurrent #detection #fault #symmetry
- Concurrent Error Detection of Fault-Based Side-Channel Cryptanalysis of 128-Bit Symmetric Block Ciphers (RK, KW, PM, YK), pp. 579–585.
- DAC-2001-KjeldsbergCA #data-driven #detection #estimation
- Detection of Partially Simultaneously Alive Signals in Storage Requirement Estimation for Data Intensive Applications (PGK, FC, EJA), pp. 365–370.
- DAC-2001-LeeNCKD #2d #detection
- Two-Dimensional Position Detection System with MEMS Accelerometer for MOUSE Applications (SL, GJN, JC, HK, AJD), pp. 852–857.
- DAC-2001-Qu #component #detection
- Publicly Detectable Techniques for the Protection of Virtual Components (GQ), pp. 474–479.
- DAC-2001-RaahemifarA #detection #fault
- Fault Characterizations and Design-for-Testability Technique for Detecting IDDQ Faults in CMOS/BiCMOS Circuits (KR, MA), pp. 313–316.
- DATE-2001-FavalliM #detection #fault #optimisation
- Optimization of error detecting codes for the detection of crosstalk originated errors (MF, CM), pp. 290–296.
- DATE-2001-HashizumeIYT #detection #fault
- CMOS open defect detection by supply current test (MH, MI, HY, TT), p. 509.
- DATE-2001-PomeranzR01a #detection #effectiveness #fault #generative #testing
- Definitions of the numbers of detections of target faults and their effectiveness in guiding test generation for high defect coverage (IP, SMR), pp. 504–508.
- ICDAR-2001-CrandallK #detection #robust #video
- Robust Detection of Stylized Text Events in Digital Video (DJC, RK), pp. 865–871.
- ICDAR-2001-FeldbachT #detection #segmentation
- Line Detection and Segmentation in Historical Church Registers (MF, KDT), pp. 743–747.
- ICDAR-2001-HuangTSX #detection #documentation #image #similarity
- Vertical Bar Detection for Gauging Text Similarity of Document Images (WH, CLT, SYS, YX), pp. 640–644.
- ICDAR-2001-HuaWZ #automation #detection #evaluation #performance #video
- Automatic Performance Evaluation for Video Text Detection (XSH, LW, HZ), pp. 545–550.
- ICDAR-2001-LooT #detection #word
- Detection of Word Groups Based on Irregular Pyramid (PKL, CLT), pp. 200–204.
- ICDAR-2001-PalMC #detection #documentation #multi
- Multi-Skew Detection of Indian Script Documents (UP, MM, BBC), pp. 292–296.
- ICDAR-2001-PietikainenO #detection #documentation #image
- Edge-Based Method for Text Detection from Complex Document Images (MP, OO), pp. 286–291.
- ICDAR-2001-Yan #algorithm #detection #fuzzy
- Detection of Curved Text Path Based on the Fuzzy Curve-Tracing (FCT) Algorithm (HY), pp. 266–270.
- ICDAR-2001-ZhengLDP #detection
- Form Frame Line Detection with Directional Single-Connected Chain (YZ, CL, XD, SP), pp. 699–703.
- ITiCSE-2001-LancasterC #detection #fault #process #towards
- Towards an error free plagarism detection process (TL, FC), pp. 57–60.
- TACAS-2001-FislerFVY #algorithm #detection #question
- Is There a Best Symbolic Cycle-Detection Algorithm? (KF, RF, GK, MYV, ZY), pp. 420–434.
- IWPC-J-1999-MartinoMMV01 #communication #detection #interactive #parallel #program analysis
- Parallel program analysis and restructuring by detection of point-to-point interaction patterns and their transformation into collective communication constructs (BDM, AM, NM, UV), pp. 235–263.
- CSMR-2001-FioravantiN #case study #detection #object-oriented
- A Study on Fault-Proneness Detection of Object-Oriented Systems (FF, PN), pp. 121–130.
- CSMR-2001-Villavicencion #automation #detection #program analysis #programming #slicing
- Program Analysis for the Automatic Detection of Programming Plans Applying Slicing (GV), pp. 188–191.
- ICSM-2001-MalenfantAMD #analysis #detection
- Flow Analysis to Detect Blocked Statements (BM, GA, EM, MD), p. 62–?.
- PASTE-2001-FlanaganF #detection #scalability #source code
- Detecting race conditions in large programs (CF, SNF), pp. 90–96.
- SCAM-2001-ChenXY #concurrent #detection #source code
- Detecting Dead Statements for Concurrent Programs (ZC, BX, HY), pp. 67–74.
- SCAM-2001-WeberSR #case study #constraints #detection #optimisation #security #using
- A Case Study in Detecting Software Security Vulnerabilities Using Constraint Optimization (MW, VS, CR), pp. 3–13.
- AdaEurope-2001-ChenL #detection #effectiveness #empirical #evaluation #fault #reduction #testing
- Test Suite Reduction and Fault Detecting Effectiveness: An Empirical Evaluation (TYC, MFL), pp. 253–265.
- SIGAda-2001-ChenBY #adaptation #algorithm #detection #using
- Detecting concurrently executed pairs of statements using an adapted MHP algorithm (ZC, BX, HY), pp. 107–114.
- ICML-2001-MarxDB #clustering #detection
- Coupled Clustering: a Method for Detecting Structural Correspondence (ZM, ID, JMB), pp. 353–360.
- KDD-2001-HotzGHNW #analysis #detection #industrial
- REVI-MINER, a KDD-environment for deviation detection and analysis of warranty and goodwill cost statements in automotive industry (EH, UG, WH, GN, MW), pp. 432–437.
- KDD-2001-ShekharLZ #algorithm #detection #graph #summary
- Detecting graph-based spatial outliers: algorithms and applications (a summary of results) (SS, CTL, PZ), pp. 371–376.
- MLDM-2001-ImiyaI #detection #statistics
- Statistics of Flow Vectors and Its Application to the Voting Method for the Detection of Flow Fields (AI, KI), pp. 293–306.
- MLDM-2001-JangKC #detection #fuzzy
- FAM-Based Fuzzy Inference for Detecting Shot Transitions (SWJ, GYK, HIC), pp. 52–61.
- MLDM-2001-PhamWS #classification #detection #network
- Face Detection by Aggregated Bayesian Network Classifiers (TVP, MW, AWMS), pp. 249–262.
- SEKE-2001-HoudekSE #detection #empirical #execution #fault #specification
- Defect Detection for Executable Specifications — An Experiment (FH, TS, DE), pp. 10–18.
- SEKE-2001-MorenoS #classification #detection #requirements
- A Method for Detection, Classification and Resolution of Discrepancies in Viewpoint-based Requirements Engineering (AMM, AS), pp. 110–119.
- SIGIR-2001-StokesC #classification #detection #documentation #semantics
- Combining Semantic and Syntactic Document Classifiers to Improve First Story Detection (NS, JC), pp. 424–425.
- ECOOP-2001-HirzelDH #detection #garbage collection #liveness #on the
- On the Usefulness of Liveness for Garbage Collection and Leak Detection (MH, AD, ALH), pp. 181–206.
- OOPSLA-2001-PraunG #concurrent #detection
- Object Race Detection (CvP, TRG), pp. 70–82.
- TOOLS-USA-2001-GueheneucA #constraints #design pattern #detection #fault #using
- Using Design Patterns and Constraints to Automate the Detection and Correction of Inter-Class Design Defects (YGG, HAA), pp. 296–306.
- TOOLS-USA-2001-Marinescu #design #detection #metric #object-oriented
- Detecting Design Flaws via Metrics in Object-Oriented Systems (RM), pp. 173–182.
- RE-2001-Feather #detection #fault #reduction #using
- Risk Reduction Using DDP (Defect Detection and Prevention): Software Support and Software Applications (MSF), p. 288.
- SAC-2001-AngelopoulosYPL #detection #on the #video
- On motion and noise detection in digital video (AA, EAY, AP, TL), pp. 309–311.
- SAC-2001-HwangR #algorithm #detection #fault
- Algorithms to detect chained-inference faults in information distribution systems (YPH, DCR), pp. 679–685.
- SAC-2001-VuHT #algorithm #detection #image #performance #query
- An efficient core-area detection algorithm for fast noise-free image query processing (KV, KAH, DAT), pp. 258–263.
- ESEC-FSE-2001-KavehE #concurrent #detection #object-oriented
- Deadlock detection in distribution object systems (NK, WE), pp. 44–51.
- ESEC-FSE-2001-UchitelKM #detection #sequence chart #specification
- Detecting implied scenarios in message sequence chart specifications (SU, JK, JM), pp. 74–82.
- IJCAR-2001-ReifST #detection #specification
- Flaw Detection in Formal Specifications (WR, GS, AT), pp. 642–657.
- ASE-2000-MalpohlHT #detection
- Renaming Detection (GM, JJH, WFT), pp. 73–80.
- DAC-2000-ChangCSM #detection #functional #performance #symmetry #using
- Fast post-placement rewiring using easily detectable functional symmetries (CWJC, CKC, PS, MMS), pp. 286–289.
- DAC-2000-LachMP #debugging #detection #fault #locality #performance
- Efficient error detection, localization, and correction for FPGA-based debugging (JL, WHMS, MP), pp. 207–212.
- DATE-2000-AnghelN #detection #evaluation #fault #reduction
- Cost Reduction and Evaluation of a Temporary Faults Detecting Technique (LA, MN), pp. 591–598.
- DATE-2000-CarlettaPN #analysis #detection #fault #using
- Detecting Undetectable Controller Faults Using Power Analysis (JC, CAP, MN), pp. 723–728.
- DATE-2000-ParkK #bound #design #detection #fault
- A New IEEE 1149.1 Boundary Scan Design for the Detection of Delay Defects (SP, TK), pp. 458–462.
- DATE-2000-VardanianM #concurrent #detection #fault
- Improving the Error Detection Ability of Concurrent Checkers by Observation Point Insertion in the Circuit Under Check (VAV, LBM), p. 762.
- DATE-2000-WeilerMHH #detection #using
- Detection of Defective Sensor Elements Using Sigma-Delta-Modulation and a Matched Filter (DW, OM, DH, BJH), pp. 599–603.
- IWPC-2000-GirardW #approach #classification #data type #detection
- Evaluating the Accessor Classification Approach to Detect Abstract Data Types (JFG, MW), pp. 87–95.
- PEPM-2000-ScholzBF #analysis #detection #memory management #pointer
- Symbolic Pointer Analysis for Detecting Memory Leaks (BS, JB, TF), pp. 104–113.
- PLDI-2000-FlanaganF #concurrent #detection #java #type system
- Type-based race detection for Java (CF, SNF), pp. 219–232.
- WLC-2000-Konstantinidis #detection
- Error-Detecting Properties of Languages (SK), pp. 240–252.
- AdaEurope-2000-BliebergerBS #ada #analysis #data flow #detection #source code
- Symbolic Data Flow Analysis for Detecting Deadlocks in Ada Tasking Programs (JB, BB, BS), pp. 225–237.
- CIKM-2000-AllanLJ #detection
- First Story Detection In TDT Is Hard (JA, VL, HJ), pp. 374–381.
- CIKM-2000-LiuPT #detection #named #web
- WebCQ: Detecting and Delivering Information Changes on the Web (LL, CP, WT), pp. 512–519.
- ICML-2000-Eskin #detection #probability #semistructured data #using
- Anomaly Detection over Noisy Data using Learned Probability Distributions (EE), pp. 255–262.
- ICML-2000-KlinkenbergJ #concept #detection
- Detecting Concept Drift with Support Vector Machines (RK, TJ), pp. 487–494.
- ICML-2000-Towell #detection
- Local Expert Autoassociators for Anomaly Detection (GGT), pp. 1023–1030.
- ICPR-v1-2000-BesshoIY #detection #using
- Detecting Human Face and Recognizing Facial Expressions Using Potential Net (HB, YI, MY), pp. 5076–5079.
- ICPR-v1-2000-BorgaMK #detection #named
- FSED — Feature Selective Edge Detection (MB, HM, HK), pp. 1229–1232.
- ICPR-v1-2000-BrandM #assessment #comparative #detection
- A Comparative Assessment of Three Approaches to Pixel-Level Human Skin-Detection (JB, JSDM), pp. 5056–5059.
- ICPR-v1-2000-ChengDHT #detection #performance
- Efficient Detection and Extraction of Color Objects from Complex Scenes (JC, SD, GH, JT), pp. 1668–1671.
- ICPR-v1-2000-DuffyCL #detection #using
- Object Detection Using Color (ND, JLC, GL), pp. 1700–1703.
- ICPR-v1-2000-GolovanYL #detection #image
- Pre-Attentive Detection of Perceptually Important Regions in Facial Images (AG, MHY, SWL), pp. 5092–5095.
- ICPR-v1-2000-GulsrudH #clustering #detection
- Optimal Filter for Detection of Clustered Microcalcifications (TOG, JHH), pp. 1508–1511.
- ICPR-v1-2000-KumarSR #detection #realtime #recognition #using
- Real Time Detection and Recognition of Human Profiles Using Inexpensive Desktop Cameras (PK, KS, SR), pp. 5096–5099.
- ICPR-v1-2000-LiGG #detection
- Detecting and Tracking Human Faces in Videos (YL, AAG, ONG), pp. 1807–1810.
- ICPR-v1-2000-MachiT #automation #detection #video
- Video Shot Detection and Characterization in Semi-Automatic Digital Video Restoration (AM, MT), pp. 1855–1859.
- ICPR-v1-2000-MikicCKT #detection
- Moving Shadow and Object Detection in Traffic Scenes (IM, PCC, GTK, MMT), pp. 1321–1324.
- ICPR-v1-2000-NealS #3d #detection #representation
- A Symbolic Representation for 3-D Object Feature Detection (PJN, LGS), pp. 1221–1224.
- ICPR-v1-2000-NgoPCZ #detection #representation #video
- Motion-Based Video Representation for Scene Change Detection (CWN, TCP, RTC, HZ), pp. 1827–1830.
- ICPR-v1-2000-RavyseSCR #composition #detection #process #recognition #using
- Eye Activity Detection and Recognition Using Morphological Scale-Space Decomposition (IR, HS, JC, MJTR), pp. 5080–5083.
- ICPR-v1-2000-ShioyamaWM #cumulative #detection
- Object Detection with Gabor Filters and Cumulative Histograms (TS, HW, SM), pp. 1704–1707.
- ICPR-v1-2000-SorianoMHL #detection #video
- Skin Detection in Video under Changing Illumination Conditions (MS, BM, SH, ML), pp. 1839–1842.
- ICPR-v1-2000-VogelhuberS #constraints #detection
- Face Detection Based on Generic Local Descriptors and Spatial Constraints (VV, CS), pp. 5084–5087.
- ICPR-v1-2000-YoonDD #detection #video
- Event Detection from MPEG Video in the Compressed Domain (KY, DD, DSD), pp. 1819–1822.
- ICPR-v2-2000-BovisS #detection #using
- Detection of Masses in Mammograms Using Texture Features (KB, SS), pp. 2267–2270.
- ICPR-v2-2000-BurrellP #algorithm #detection #learning #online #parametricity #probability #process
- Sequential Algorithms for Detecting Changes in Acting Stochastic Processes and On-Line Learning of their Operational Parameters (AB, TPK), pp. 2656–2659.
- ICPR-v2-2000-CordellaFSV #component #detection #graph #image #performance
- Fast Graph Matching for Detecting CAD Image Components (LPC, PF, CS, MV), pp. 6034–6037.
- ICPR-v2-2000-DoschMT #detection #recognition
- Improving Arc Detection in Graphics Recognition (PD, GM, KT), pp. 2243–2246.
- ICPR-v2-2000-GuillaudBRBT #detection #multi #using
- Continuity Perception Using a Multiagent System: An Application to Growth Ring Detection on Fish Otoliths (AG, AB, VR, JLB, HT), pp. 2519–2522.
- ICPR-v2-2000-GuoDR #detection #using
- Off-Line Skilled Forgery Detection Using Stroke and Sub-Stroke Properties (JKG, DSD, AR), pp. 2355–2358.
- ICPR-v2-2000-HickinbothamA #detection
- Novelty Detection in Airframe Strain Data (SJH, JA), pp. 2536–2539.
- ICPR-v2-2000-JingM #detection
- Glasses Detection and Extraction by Deformable Contour (ZJ, RM), pp. 2933–2936.
- ICPR-v2-2000-KuritaTHSM #adaptation #detection #estimation #image #performance
- Efficient Face Detection from News Images by Adaptive Estimation of Prior Probabilities and Ising Search (TK, MT, KH, HS, TM), pp. 2917–2920.
- ICPR-v2-2000-LiD00a #automation #detection #video
- A Video Text Detection System Based on Automated Training (HL, DSD), pp. 2223–2228.
- ICPR-v2-2000-LiG #detection #network #optimisation
- Combining Feature Optimization into Neural Network Based Face Detection (SZL, QG), pp. 2814–2817.
- ICPR-v2-2000-LinF #detection #geometry #using
- Human Face Detection Using Geometric Triangle Relationship (CL, KCF), pp. 2941–2944.
- ICPR-v2-2000-ShenIT #detection #energy
- Detecting Reflection Axes by Energy Minimization (DS, HHSI, EKT), pp. 6026–6029.
- ICPR-v2-2000-TerrillonMSSA #detection #invariant #orthogonal
- Invariant Neural-Network Based Face Detection with Orthogonal Fourier-Mellin Moments (JCT, DM, MS, YS, SA), p. 2993–?.
- ICPR-v3-2000-DeschenesZ #detection #image
- Detection of Line Junctions in Gray-Level Images (FD, DZ), pp. 3762–3765.
- ICPR-v3-2000-FayolleDRC #detection #multi
- A Wavelet Based Multiscale Detection Scheme of Feature Points (JF, CD, LR, SC), pp. 3425–3428.
- ICPR-v3-2000-Jehan-BessonBA #detection #set #using
- Detection and Tracking of Moving Objects using a New Level Set Based Method (SJB, MB, GA), pp. 7112–7117.
- ICPR-v3-2000-JohanssonKG #detection #normalisation #symmetry #using
- Detecting Rotational Symmetries Using Normalized Convolution (BJ, HK, GHG), pp. 3500–3504.
- ICPR-v3-2000-KimCL #detection #feature model #performance #using
- Fast Scene Change Detection Using Direct Feature Extraction from MPEG Compressed Videos (YMK, SWC, SWL), pp. 3178–3181.
- ICPR-v3-2000-LeiHR #detection #image #low level
- Detecting Generic Low-Level Features in Images (BJL, EAH, MJTR), pp. 3979–3982.
- ICPR-v3-2000-LiK #ambiguity #analysis #detection
- Detection of Cognitive Binding During Ambiguous Figure Tasks by Wavelet Coherence Analysis of EEG Signals (THL, WRK), pp. 3098–3101.
- ICPR-v3-2000-LuTH #detection #estimation #novel #robust
- A Novel Method for Camera Planar Motion Detection and Robust Estimation of the 1D Trifocal Tensor (LL, HTT, ZH), pp. 3815–3818.
- ICPR-v3-2000-MajchrzakSSM #detection #image
- Motion Detection from Temporally Integrated Images (DM, SS, BS, RRM), pp. 3844–3847.
- ICPR-v3-2000-MurakamiN #detection
- High Speed Line Detection by Hough Transform in Local Area (KM, TN), pp. 3471–3474.
- ICPR-v3-2000-OrriolsTBRVV #approach #detection #modelling #probability #using
- Probabilistic Saliency Approach for Elongated Structure Detection Using Deformable Models (XO, RT, XB, PR, JV, JJV), pp. 7018–7021.
- ICPR-v3-2000-PorterMT #correlation #detection #using #video
- Video Cut Detection using Frequency Domain Correlation (SVP, MM, BTT), pp. 3413–3416.
- ICPR-v3-2000-RittscherS #bound #detection
- An Integral Criterion for Detecting Boundary Edges and Textured Regions (JR, JS), pp. 7076–7079.
- ICPR-v3-2000-ShenIT00b #detection #robust #symmetry
- Robust Detection of Skewed Symmetries (DS, HHSI, EKT), pp. 7022–7025.
- ICPR-v3-2000-SugiyamaA #detection #reliability
- Edge Detection Method Based on Edge Reliability with Fixed Thresholds: Consideration of Uniformity and Gradation (TS, KA), pp. 3660–3663.
- ICPR-v3-2000-TodtT #detection #multi
- Detection of Natural Landmarks through Multiscale Opponent Features (ET, CT), pp. 3988–3991.
- ICPR-v3-2000-VriesV #3d #adaptation #classification #detection #estimation #image
- Scale-Adaptive Landmark Detection, Classification and Size Estimation in 3D Object-Background Images (RGdV, PWV), pp. 7026–7029.
- ICPR-v3-2000-WangB #detection #energy #modelling #segmentation
- Detection and Segmentation of Generic Shapes Based on Vectorial Affine Modeling of Energy in Eigenspace (ZW, JBA), pp. 3983–3987.
- ICPR-v3-2000-YamanaSA #detection #image #reliability #using
- Edge Plane Detection in Spatio-Temporal Images by Using Edge Vector and Edge Reliability (FY, TS, KA), pp. 3664–3667.
- ICPR-v4-2000-BodnarovaBL #detection #using
- Textile Flaw Detection Using Optimal Gabor Filters (AB, MB, SJL), pp. 4799–4802.
- ICPR-v4-2000-BolterL #detection #re-engineering
- Detection and Reconstruction of Human Scale Features from High Resolution Interferometric SAR Data (RB, FL), pp. 4291–4294.
- ICPR-v4-2000-Duta #detection #image
- Road Detection in Panchromatic SPOT Satellite Images (ND), pp. 4308–4311.
- ICPR-v4-2000-GutierrezEVF #automation #detection
- An Active Contour Model for the Automatic Detection of the Fovea in Fluorescein Angiographies (JG, IE, EdV, FJF), pp. 4312–4315.
- ICPR-v4-2000-HealeyP #detection #named
- SmartCar: Detecting Driver Stress (JH, RWP), pp. 4218–4221.
- ICPR-v4-2000-HuangM #detection #precise
- Face Detection and Precise Eyes Location (WH, RM), pp. 4722–4727.
- ICPR-v4-2000-JabriDWR #adaptation #detection #image #people #using #video
- Detection and Location of People in Video Images Using Adaptive Fusion of Color and Edge Information (SJ, ZD, HW, AR), pp. 4627–4631.
- ICPR-v4-2000-KopilovicVS #analysis #detection #lens
- Application of Panoramic Annular Lens for Motion Analysis Tasks: Surveillance and Smoke Detection (IK, BV, TS), pp. 4714–4717.
- ICPR-v4-2000-LeungCKC #bound #detection #fuzzy
- Thyroid Cancer Cells Boundary Location by a Fuzzy Edge Detection Method (CCL, FHYC, PCKK, WFC), pp. 4360–4363.
- ICPR-v4-2000-LilienblumMAC #detection
- Dent Detection in Car Bodies (TL, BM, PA, RC), pp. 4775–4778.
- ICPR-v4-2000-MamicB #automation #detection #using
- Automatic Flaw Detection in Textiles Using a Neyman-Pearson Detector (GJM, MB), pp. 4767–4770.
- ICPR-v4-2000-MataNS #detection #multi #using
- Microcalcifications Detection Using Multiresolution Methods (RM, EN, FS), pp. 4344–4347.
- ICPR-v4-2000-NakajimaIPP #correlation #detection #invariant #recognition
- Object Recognition and Detection by a Combination of Support Vector Machine and Rotation Invariant Phase Only Correlation (CN, NI, MP, TP), pp. 4787–4790.
- ICPR-v4-2000-NewmanY #detection
- Compound Extraction and Fitting Method for Detecting Cardiac Ventricle in SPECT Data (TSN, HY), pp. 4328–4331.
- ICPR-v4-2000-OhyamaWKTS #automation #detection
- Automatic Left Ventricular Endocardium Detection in Echocardiograms Based on Ternary Thresholding Method (WO, TW, FK, ST, KS), pp. 4320–4323.
- ICPR-v4-2000-PuigTN #detection #navigation
- Features Detection and Navigation on Neurovascular Trees (AP, DT, IN), pp. 4076–4079.
- ICPR-v4-2000-TerrillonSSFA #detection #invariant
- Invariant Face Detection with Support Vector Machines (JCT, MNS, MS, HF, SA), pp. 4210–4217.
- ICPR-v4-2000-ThaibaouiRB #approach #detection #fuzzy #image #logic
- A Fuzzy Logic Approach to Drusen Detection in Retinal Angiographic Images (AT, AR, PB), pp. 4748–4751.
- KDD-2000-PenaFL #behaviour #data mining #detection #mining
- Data mining to detect abnormal behavior in aerospace data (JMP, FF, SL), pp. 390–397.
- KDD-2000-RaghavanBS #detection #predict #process #using
- Defection detection: using activity profiles to predict ISP customer vulnerability (NR, RMB, MS), pp. 506–515.
- KDD-2000-Senator #case study #detection #information management #scalability
- Ongoing management and application of discovered knowledge in a large regulatory organization: a case study of the use and impact of NASD Regulation’s Advanced Detection System (RADS) (TES), pp. 44–53.
- KDD-2000-YamanishiTWM #algorithm #detection #finite #learning #online #using
- On-line unsupervised outlier detection using finite mixtures with discounting learning algorithms (KY, JiT, GJW, PM), pp. 320–324.
- SIGIR-2000-McCarleyF #detection #fault #recognition #speech #topic
- Influence of speech recognition errors on topic detection (JSM, MF), pp. 342–344.
- SIGIR-2000-StokesHC #detection #online #semantics
- Lexical semantic relatedness and online new event detection (NS, PH, JC), pp. 324–325.
- TOOLS-PACIFIC-2000-SkevoulisJ #detection #fault #invariant #java #runtime #source code #static analysis
- Generic Invariant-Based Static Analysis Tool for Detection of Runtime Errors in Java Programs (SS, XJ), pp. 36–44.
- SAC-2000-FeekinC #detection #sorting #using
- Duplicate Detection Using K-way Sorting Method (AF, ZC), pp. 323–327.
- SAC-2000-KohleM #detection
- Analyzing Human Gait Patterns for Malfunction Detection (MK, DM), pp. 41–45.
- SAC-2000-RiveroDL #detection #network #static analysis #strict
- Static Detection of Sources of Dynamic Anomalies in a Network of Referential Integrity Restrictions (LCR, JHD, DL), pp. 333–339.
- ICSE-2000-ErnstCGN #detection #invariant
- Quickly detecting relevant program invariants (MDE, AC, WGG, DN), pp. 449–458.
- CAV-2000-AlfaroHM #detection #fault
- Detecting Errors Before Reaching Them (LdA, TAH, FYCM), pp. 186–201.
- CAV-2000-StollerUL #detection #distributed #partial order #performance #using
- Efficient Detection of Global Properties in Distributed Systems Using Partial-Order Methods (SDS, LU, YAL), pp. 264–279.
- TestCom-2000-CavalliPY #communication #detection #fault #power of #testing
- Fault Detection Power of a Widely Used Test Suite for a System of Communicating FSMs (ARC, SP, NY), p. 35–?.
- ASE-1999-EgyedG #automation #component #detection #development #modelling
- Automatically Detecting Mismatches During Component-based and Model-based Development (AE, CG), pp. 191–198.
- ASE-1999-MiceliSG #design #detection #metric
- A Metric Based Technique for Design Flaws Detection and Correction (TM, HAS, RG), pp. 307–310.
- DAC-1999-RaimiA #detection
- Detecting False Timing Paths: Experiments on PowerPC Microprocessors (RR, JAA), pp. 737–741.
- DATE-1999-RayaneVN #detection #embedded
- A One-Bit-Signature BIST for Embedded Operational Amplifiers in Mixed-Signal Circuits Based on the Slew-Rate Detection (IR, JVM, MN), p. 792–?.
- ICDAR-1999-ArikiMT #detection
- Telop and Flip Frame Detection and Character Extraction from TV News Articles (YA, KM, ST), pp. 701–704.
- ICDAR-1999-ChenD #algorithm #detection #documentation #image #robust
- A Robust Skew Detection Algorithm for Grayscale Document Image (MC, XD), pp. 617–620.
- ICDAR-1999-GargiCAGKK #automation #detection #video
- A System for Automatic Text Detection in Video (UG, DJC, SA, TG, RK, RK), pp. 29–32.
- ICDAR-1999-HebertPG #detection #incremental #learning #using
- Cursive Character Detection using Incremental Learning (JFH, MP, NG), pp. 808–811.
- ICDAR-1999-JiangBW #clustering #detection #documentation #image #nearest neighbour
- Skew Detection of Document Images by Focused Nearest-Neighbor Clustering (XJ, HB, DWK), pp. 629–632.
- ICDAR-1999-LeeH #detection #documentation
- Duplicate Detection in Symbolically Compressed Documents (DSL, JJH), pp. 305–308.
- ICDAR-1999-LehalD #detection #documentation
- A Range Free Skew Detection Technique for Digitized Gurmukhi Script Documents (GSL, RD), pp. 147–152.
- ICDAR-1999-LladosML #detection #diagrams
- A Hough-based Method for Hatched Pattern Detection in Maps and Diagrams (JL, EM, JLK), pp. 479–482.
- ICDAR-1999-Lopresti #algorithm #detection #documentation #modelling
- Models and Algorithms for Duplicate Document Detection (DPL), pp. 297–300.
- ICDAR-1999-SteinherzIR #analysis #component #detection
- Skew Detection via Principal Components Analysis (TS, NI, ER), pp. 153–156.
- ICSM-1999-DucasseRD #approach #detection #independence
- A Language Independent Approach for Detecting Duplicated Code (SD, MR, SD), pp. 109–118.
- SAS-1999-RuthingKS #detection #performance #precise
- Detecting Equalities of Variables: Combining Efficiency with Precision (OR, JK, BS), pp. 232–247.
- FM-v1-1999-Bousquet #case study #detection #experience #feature model #interactive #model checking #testing #using
- Feature Interaction Detection Using Testing and Model-Checking Experience Report (LdB), pp. 622–641.
- FM-v1-1999-ReffelE #detection #fault #model checking
- Error Detection with Directed Symbolic Model Checking (FR, SE), pp. 195–211.
- FM-v2-1999-Eschbach #algorithm #detection #specification #termination #verification
- A Termination Detection Algorithm: Specification and Verification (RE), pp. 1720–1737.
- HCI-EI-1999-Burov #approach #detection
- Psychophysiological effect of the information technologies on users and a psychophysiological approach for its detection (AB), pp. 120–123.
- ICEIS-1999-StefanoV #detection #image
- Vehicle Detection in Traffic Images (LdS, EV), pp. 308–313.
- CIKM-1999-LanquillonR #adaptation #detection #information management
- Adaptive Information Filtering: Detecting Changes in Text Streams (CL, IR), pp. 538–544.
- ICML-1999-HuSK #detection #sequence
- Detecting Motifs from Sequences (YJH, SBS, DFK), pp. 181–190.
- KDD-1999-BayP #category theory #data mining #detection #mining #set
- Detecting Change in Categorical Data: Mining Contrast Sets (SDB, MJP), pp. 302–306.
- KDD-1999-BonchiGMP #classification #detection
- A Classification-Based Methodology for Planning Audit Strategies in Fraud Detection (FB, FG, GM, DP), pp. 175–184.
- KDD-1999-GuralnikS #detection
- Event Detection from Time Series Data (VG, JS), pp. 33–42.
- KDD-1999-LeeSM #data flow #detection #experience #mining #network
- Mining in a Data-Flow Environment: Experience in Network Intrusion Detection (WL, SJS, KWM), pp. 114–124.
- OOPSLA-1999-TravassosSFB #design #detection #fault #object-oriented #quality #using
- Detecting Defects in Object-Oriented Designs: Using Reading Techniques to Increase Software Quality (GT, FS, MF, VRB), pp. 47–56.
- TOOLS-USA-1999-Ciupke #automation #design #detection #object-oriented #problem #re-engineering
- Automatic Detection of Design Problems in Object-Oriented Reengineering (OC), pp. 18–32.
- TOOLS-USA-1999-MeziniPDB #detection #evolution #java
- Detecting Evolution Incompatibilities by Analyzing Java Binaries (MM, JUP, TD, WB), pp. 126–135.
- SAC-1999-ArakiIK #detection
- Detection and Correction of Mutually Interfered Erroneous Characters in Japanese Texts (TA, SI, YK), pp. 36–40.
- ICSE-1999-Ernst #detection #invariant #research #summary
- Research Summary for Dynamic Detection of Program Invariants (MDE), pp. 718–719.
- HPCA-1999-MartinezLD #concurrent #detection #performance
- Impact of Buffer Size on the Efficiency of Deadlock Detection (JMM, PL, JD), pp. 315–318.
- HPDC-1999-HuST #adaptation #detection
- Adaptive Write Detection in Home-based Software DSMs (WH, WS, ZT), pp. 353–354.
- TLCA-1999-Damiani #algebra #data type #detection
- Useless-Code Detection and Elimination for PCF with Algebraic Data types (FD), pp. 83–97.
- ASE-1998-GoedickeMP #architecture #consistency #design #detection #evaluation #nondeterminism #on the #performance
- On Detecting and Handling Inconsistencies in Integrating Software Architecture Design and Performance Evaluation (MG, TM, CP), pp. 188–191.
- ASE-1998-LeePL #detection
- Detection of Exclusive OR Global Predicates (EL, CP, DL), pp. 213–216.
- DATE-1998-AntolaPS #approach #detection #fault
- A Low-Redundancy Approach to Semi-Concurrent Error Detection in Data Paths (AA, VP, MS), pp. 266–272.
- DATE-1998-BolchiniSS #analysis #concurrent #detection #fault #network
- Fault Analysis in Networks with Concurrent Error Detection Properties (CB, FS, DS), pp. 957–958.
- DATE-1998-LindermeirVG #design #detection #fault #metric #parametricity
- Analog Test Design with IDD Measurements for the Detection of Parametric and Catastrophic Faults (WML, TJV, HEG), pp. 822–827.
- DATE-1998-SawadaYN #detection #logic
- Restructuring Logic Representations with Easily Detectable Simple Disjunctive Decompositions (HS, SY, AN), pp. 755–759.
- DATE-1998-Velasco-MedinaCN #detection #fault #injection #linear #using
- Fault Detection for Linear Analog Circuits Using Current Injection (JVM, TC, MN), pp. 987–988.
- TACAS-1998-AikenFS #detection #logic programming #source code
- Detecting Races in Relay Ladder Logic Programs (AA, MF, ZS), pp. 184–200.
- ICSM-1998-BaxterYMSB #abstract syntax tree #clone detection #detection #syntax #using
- Clone Detection Using Abstract Syntax Trees (IDB, AY, LMdM, MS, LB), pp. 368–377.
- ICSM-1998-GallHJ #detection #logic
- Detection of Logical Coupling Based on Product Release History (HG, KH, MJ), pp. 190–197.
- ICSM-1998-RothermelHOH #detection #empirical #fault #testing
- An Empirical Study of the Effects of Minimization on the Fault Detection Capabilities of Test Suites (GR, MJH, JO, CH), pp. 34–43.
- IWPC-1998-MartinoMMV #automation #detection #development #interactive #parallel #program analysis
- Automatic Detection of Interaction Patterns for Parallel Program Analysis and Development (BDM, AM, NM, UV), pp. 206–213.
- PASTE-1998-DorRS #analysis #detection #experience #fault #memory management #pointer
- Detecting Memory Errors via Static Pointer Analysis (Preliminary Experience) (ND, MR, SS), pp. 27–34.
- STOC-1998-BeigelBF #detection
- NP Might Not Be As Easy As Detecting Unique Solutions (RB, HB, LF), pp. 203–208.
- CIKM-1998-PalopoliSU #automation #database #detection
- An Automatic Techniques for Detecting Type Conflicts in Database Schemes (LP, DS, DU), pp. 306–313.
- ICPR-1998-BabaguchiJ #detection
- Event detection from continuous media (NB, RJ), pp. 1209–1212.
- ICPR-1998-BoccignoneCP #detection #using
- Small target detection using wavelets (GB, AC, AP), pp. 1776–1778.
- ICPR-1998-ChaudhuriG #automation #detection #documentation #image #word
- Automatic detection of italic, bold and all-capital words in document images (BBC, UG), pp. 610–612.
- ICPR-1998-CheungI #detection #symmetry #using
- Symmetry detection using complex moments (KKTC, HHSI), pp. 1473–1475.
- ICPR-1998-ColmenarezH #detection #fault
- Pattern detection with information-based maximum discrimination and error bootstrapping (AC, TSH), pp. 222–224.
- ICPR-1998-CutlerD #analysis #detection
- View-based detection and analysis of periodic motion (RC, LSD), pp. 495–500.
- ICPR-1998-GotoA #detection #framework
- A framework for detecting and selecting text line candidates of correct orientation (HG, HA), pp. 1074–1076.
- ICPR-1998-Heikkila #bound #detection
- Moment and curvature preserving technique for accurate ellipse boundary detection (JH), pp. 734–737.
- ICPR-1998-HontaniD #analysis #component #detection #image #multi
- Multi-scale image analysis for detection of characteristic component figure shapes and sizes (HH, KD), pp. 1470–1472.
- ICPR-1998-HosieVW #behaviour #detection #visual notation
- Classifying and detecting group behaviour from visual surveillance data (RH, SV, GAWW), pp. 602–604.
- ICPR-1998-HuangSLW #approach #detection #image #robust
- A robust approach to face and eyes detection from images with cluttered background (WH, QS, CPL, JKW), pp. 110–113.
- ICPR-1998-IketaniNKS #detection
- Detecting persons on changing background (AI, AN, YK, YS), pp. 74–76.
- ICPR-1998-IshiiMT #detection #image #realtime #using #video
- Detection of foreign substances mixed in a plastic bottle of medicinal solution using real-time video image processing (AI, TM, ST), pp. 1646–1650.
- ICPR-1998-JiangBAB #detection #image #towards
- Towards detection of glasses in facial images (XJ, MB, BA, HB), pp. 1071–1073.
- ICPR-1998-KadyrovP #detection #estimation #fault #linear #parametricity
- Linear transformation parameter estimation for fault detection (AK, MP), pp. 550–552.
- ICPR-1998-KanekoH #detection #using #video
- Cut detection technique from MPEG compressed video using likelihood ratio test (TK, OH), pp. 1476–1480.
- ICPR-1998-KawaguchiN #algorithm #detection #search-based #using
- Ellipse detection using a genetic algorithm (TK, RiN), pp. 141–145.
- ICPR-1998-LeeHSL #analysis #automation #bound #detection #parsing #using #video
- Automatic video parsing using shot boundary detection and camera operation analysis (MSL, BWH, SS, SWL), pp. 1481–1483.
- ICPR-1998-LeiW #detection #novel #symmetry
- A novel method for detecting and localising of reflectional and rotational symmetry under weak perspective projection (YL, KCW), pp. 417–419.
- ICPR-1998-LuoCH #detection #using
- Corner detection using vector potential (BL, ADJC, ERH), pp. 1018–1021.
- ICPR-1998-MelzerKZ #approach #detection #modelling #parametricity #using
- Stroke detection of brush strokes in portrait miniatures using a semi-parametric and a model based approach (TM, PK, EZ), pp. 474–476.
- ICPR-1998-MokhtarianS #detection #image #robust
- Curvature scale space for robust image corner detection (FM, RS), pp. 1819–1821.
- ICPR-1998-MunkeltRHH #3d #detection #image #modelling #video
- A model driven 3D image interpretation system applied to person detection in video images (OM, CR, DH, WH), pp. 70–73.
- ICPR-1998-OkumuraMKYMTIM #automation #detection #image
- Automatic detection of lung cancers in chest CT images by variable N-Quoit filter (TO, TM, JiK, SY, MM, YT, TI, TM), pp. 1671–1673.
- ICPR-1998-Onoguchi #detection
- Shadow elimination method for moving object detection (KO), pp. 583–587.
- ICPR-1998-OrwellBHW #detection
- Detecting periodic structure (JO, JFB, JFH, GHW), pp. 714–716.
- ICPR-1998-Pinto-EliasS #automation #detection
- Automatic facial feature detection and location (RPE, JHSA), pp. 1360–1364.
- ICPR-1998-PramadihantoIY #automation #detection #flexibility
- A flexible feature matching for automatic face and facial feature points detection (DP, YI, MY), pp. 92–95.
- ICPR-1998-ReiterM #detection
- Object-detection with a varying number of eigenspace projections (MR, JM), pp. 759–761.
- ICPR-1998-RoningR #detection #image
- Registration of nevi in successive skin images for early detection of melanoma (JR, MR), pp. 352–357.
- ICPR-1998-StofflerS #detection #realtime
- An MPEG-processor-based robot vision system for real-time detection of moving objects by a moving observer (NOS, ZS), pp. 477–481.
- ICPR-1998-TanakaHMK #detection
- Dynamic attention map by Ising model for human face detection (MT, KH, TM, TK), pp. 1044–1046.
- ICPR-1998-TangYF #detection
- Characterization and detection of edges by Lipschitz exponents and MASW wavelet transform (YYT, LY, LF), pp. 1572–1574.
- ICPR-1998-TerrillonDA #detection #image #invariant
- Detection of human faces in complex scene images by use of a skin color model and of invariant Fourier-Mellin moments (JCT, MD, SA), pp. 1350–1355.
- ICPR-1998-ToepferWBN #detection #navigation
- Robot navigation by combining central and peripheral optical flow detection on a space-variant map (CT, MW, GB, HN), pp. 1804–1807.
- ICPR-1998-TominagaKMK #detection #performance #using
- Realization of an efficient line detection by askant glance camera vision system using extended Hough transform (MT, KK, KM, HK), pp. 225–228.
- ICPR-1998-WatanabeMM #detection #image #using
- Detecting changes of buildings from aerial images using shadow and shading model (SW, KM, NM), pp. 1408–1412.
- ICPR-1998-XuS #detection #realtime #using
- Rits Eye: a software-based system for real-time face detection and tracking using pan-tilt-zoom controllable camera (GX, TS), pp. 1194–1197.
- KDD-1998-ChanS #case study #detection #learning #scalability #towards
- Toward Scalable Learning with Non-Uniform Class and Cost Distributions: A Case Study in Credit Card Fraud Detection (PKC, SJS), pp. 164–168.
- KDD-1998-DuMouchelS #algorithm #detection #performance #testing
- A Fast Computer Intrusion Detection Algorithm Based on Hypothesis Testing of Command Transition Probabilities (WD, MS), pp. 189–193.
- KDD-1998-EsterFKS #algorithm #database #detection
- Algorithms for Characterization and Trend Detection in Spatial Databases (ME, AF, HPK, JS), pp. 44–50.
- KDD-1998-LeeSM #detection #mining #modelling
- Mining Audit Data to Build Intrusion Detection Models (WL, SJS, KWM), pp. 66–72.
- KDD-1998-SteegRW #correlation #detection #higher-order #multi #performance
- Coincidence Detection: A Fast Method for Discovering Higher-Order Correlations in Multidimensional Data (EWS, DAR, EW), pp. 112–120.
- SIGIR-1998-AllanPL #detection #online
- On-Line New Event Detection and Tracking (JA, RP, VL), pp. 37–45.
- SIGIR-1998-YangPC #case study #detection #online
- A Study of Retrospective and On-Line Event Detection (YY, TP, JGC), pp. 28–36.
- ALP-PLILP-1998-BruynoogheVWD #detection #logic programming #query #source code
- Detecting Unsolvable Queries for Definite Logic Programs (MB, HV, DAdW, MD), pp. 118–133.
- ALP-PLILP-1998-Refalo #detection #incremental
- Approaches to the Incremental Detection of Implicit Equalities with the Revised Simplex Method (PR), pp. 481–496.
- FSE-1998-CoolW #concurrent #detection
- Event-Base Detection of Concurrency (JEC, ALW), pp. 35–45.
- FSE-1998-NaumovichA #algorithm #data flow #detection #parallel
- A Conservative Data Flow Algorithm for Detecting All Pairs of Statement That May Happen in Parallel (GN, GSA), pp. 24–34.
- CC-1998-GhiyaHZ #c #detection #parallel #recursion #source code
- Detecting Parallelism in C Programs with Recursive Darta Structures (RG, LJH, YZ), pp. 159–173.
- HPCA-1998-LopezMD #concurrent #detection #distributed #network #performance
- A Very Efficient Distributed Deadlock Detection Mechanism for Wormhole Networks (PL, JMM, JD), pp. 57–66.
- HPCA-1998-TubellaG #detection #parallel #thread
- Control Speculation in Multithreaded Processors through Dynamic Loop Detection (JT, AG), pp. 14–23.
- HPDC-1998-StellingFKLL #detection #distributed #fault
- A Fault Detection Service for Wide Area Distributed Computations (PS, ITF, CK, CAL, GvL), pp. 268–278.
- CAV-1998-StollerL #detection #distributed #performance
- Efficient Symbolic Detection of Global Properties in Distributed Systems (SDS, YAL), pp. 357–368.
- IWTCS-1998-PetrenkoUC #concurrent #detection #fault #using
- Using Partial-Orders for Detecting Faults in Concurrent Systems (AP, AU, VC), pp. 175–190.
- ASE-1997-GirardKS #approach #data type #detection
- A Metric-based Approach to Detect Abstract Data Types and State Encapsulations (JFG, RK, GS), pp. 82–89.
- DAC-1997-KukimotoB #analysis #detection
- Exact Required Time Analysis via False Path Detection (YK, RKB), pp. 220–225.
- ICDAR-1997-DoermannLK #database #detection #documentation #image
- The Detection of Duplicates in Document Image Databases (DSD, HL, OEK), pp. 314–318.
- ICDAR-1997-GuoDR #detection #random
- Local correspondence for detecting random forgeries (JKG, DSD, AR), pp. 319–323.
- ICDAR-1997-Ha #database #detection #performance #scalability
- Efficient Detection of Abnormalities in Large OCR Databases (TMH), p. 1006–?.
- ICDAR-1997-HullC #detection #documentation #equivalence #image #similarity
- Document image similarity and equivalence detection (JJH, JFC), pp. 308–313.
- SIGMOD-1997-ChawatheG #detection
- Meaningful Change Detection in Structured Data (SSC, HGM), pp. 26–37.
- ITiCSE-WGR-1997-Danielsson #detection #programming
- Detecting plagiarism in introductory programming courses (poster and demonstration) (MD), p. 148.
- ITiCSE-WGR-1997-Jimenez-PerisP #detection #independence
- A language-independent plagiarism detection system (poster) (RJP, MPM), p. 149.
- TACAS-1997-Ben-AbdallahL #detection #process #sequence chart
- Syntactic Detection of Process Divergence and Non-local Choice inMessage Sequence Charts (HBA, SL), pp. 259–274.
- WCRE-1997-GirardKS #architecture #comparison #comprehension #data type #detection #encapsulation
- Comparison of Abstract Data Type and Abstract State Encapsulation Detection Techniques for Architectural Understanding (JFG, RK, GS), pp. 66–75.
- WCRE-1997-Kontogiannis #detection #evaluation #metric #programming #using
- Evaluation Experiments on the Detection of Programming Patterns Using Software Metrics (KK), p. 44–?.
- ICSM-2000-LaguePMMH #clone detection #detection #development #process
- Assessing the Benefits of Incorporating Function Clone Detection in a Development Process (BL, DP, JM, EM, JPH), pp. 314–321.
- HCI-SEC-1997-KondoSYN #concept #detection #difference #information management #interactive #interface
- Interactive Interfaces to Detect Conceptual Difference for Knowledge Acquisition (TK, NS, TY, SN), pp. 303–306.
- ICML-1997-AskerM #case study #classification #detection #re-engineering
- Feature Engineering and Classifier Selection: A Case Study in Venusian Volcano Detection (LA, RM), pp. 3–11.
- KDD-1997-EsterKSX #database #detection #set
- Density-Connected Sets and their Application for Trend Detection in Spatial Databases (ME, HPK, JS, XX), pp. 10–15.
- KDD-1997-SmythGIRF #clustering #detection #using
- Detecting Atmospheric Regimes Using Cross-Validated Clustering (PS, MG, KI, JR, AF), pp. 61–66.
- SAC-1997-SiLL #detection #documentation #named
- CHECK: a document plagiarism detection system (AS, HVL, RWHL), pp. 70–77.
- ESEC-FSE-1997-ChenGK #analysis #c++ #detection #reachability
- A C++ Data Model Supporting Reachability Analysis and Dead Code Detection (YFC, ERG, EK), pp. 414–431.
- ESEC-FSE-1997-LandSJ #design #detection #empirical #fault #performance #using #validation
- Validating the Defect Detection Performance Advantage of Group Designs for Software Reviews: Report of a Laboratory Experiment Using Program Code (LPWL, CS, DRJ), pp. 294–309.
- ESEC-FSE-1997-WoodRBM #detection #empirical #fault
- Comparing and Combining Software Defect Detection Techniques: A Replicated Empirical Study (MW, MR, AB, JM), pp. 262–277.
- CAV-1997-BeerBER #detection #performance
- Efficient Detection of Vacuity in ACTL Formulaas (IB, SBD, CE, YR), pp. 279–290.
- SIGMOD-1996-ChawatheRGW #detection
- Change Detection in Hierarchically Structured Information (SSC, AR, HGM, JW), pp. 493–504.
- SIGMOD-1996-Tajima #database #detection #object-oriented #security #static analysis
- Static Detection of Security Flaws in Object-Oriented Databases (KT), pp. 341–352.
- ESOP-1996-FradetCM #algorithm #axiom #detection #fault #pointer #static analysis
- Static Detection of Pointer Errors: An Axiomatisation and a Checking Algorithm (PF, RC, DLM), pp. 125–140.
- TACAS-1996-Holzmann #detection #fault #tool support
- Early Fault Detection Tools (GJH), pp. 1–13.
- TACAS-1996-Margaria #automation #detection #fault
- Fully Automatic Verifcation and Error Detection for Parameterized Iterative Sequential Circuits (TMS), pp. 258–277.
- ICSM-1996-KhoshgoftaarAHT #detection #lifecycle
- Detection of Fault-Prone Software Modules During a Spiral Life Cycle (TMK, EBA, RH, GPT), pp. 69–76.
- ICSM-1996-MayrandLM #automation #detection #empirical #metric #using
- Experiment on the Automatic Detection of Function Clones in a Software System Using Metrics (JM, CL, EM), p. 244–?.
- WCRE-1996-Moore #detection #reverse engineering #rule-based #user interface
- Rule-Based Detection for Reverse Engineering User Interfaces (MMM), p. 42–?.
- PLDI-1996-Evans #detection #fault #memory management #static analysis
- Static Detection of Dynamic Memory Errors (DE), pp. 44–53.
- AdaEurope-1996-ChengU #ada #detection #source code
- Tasking Deadlocks in Ada 95 Programs and Their Detection (JC, KU), pp. 135–146.
- ICPR-1996-Ali #detection #documentation #image
- Background noise detection and cleaning in document images (MBHA), pp. 758–762.
- ICPR-1996-AmanoHYI #approach #detection #image
- Eigen space approach for a pose detection with range images (TA, SH, AY, SI), pp. 622–626.
- ICPR-1996-AstromH #analysis #detection #modelling #probability
- Stochastic modelling and analysis of sub-pixel edge detection (KÅ, AH), pp. 86–90.
- ICPR-1996-BalaDHVW #architecture #detection #hybrid #search-based #using #visual notation
- Visual routine for eye detection using hybrid genetic architectures (JWB, KD, JH, HV, HW), pp. 606–610.
- ICPR-1996-Brailovsky #approach #detection #probability
- An approach to outlier detection based on Bayesian probabilistic model (VLB), pp. 70–74.
- ICPR-1996-BrancaTAD #composition #detection
- Directionality detection in compositional textures (AB, MT, GA, AD), pp. 830–834.
- ICPR-1996-ChanY #algorithm #detection
- Line detection algorithm (TsC, RKKY), pp. 126–130.
- ICPR-1996-ChaudhuriP #detection #fault
- OCR error detection and correction of an inflectional Indian language script (BBC, UP), pp. 245–249.
- ICPR-1996-Chen #detection #parallel
- The use of hidden deletable pixel detection to obtain bias-reduced skeletons in parallel thinning (YSC), pp. 91–95.
- ICPR-1996-FungLK #2d #detection #random
- Randomized generalized Hough transform for 2-D gray scale object detection (PFF, WSL, IK), pp. 511–515.
- ICPR-1996-GofmanK #approach #detection #image #optimisation #symmetry
- Detecting symmetry in grey level images: the global optimization approach (YG, NK), pp. 889–894.
- ICPR-1996-HerpersMSW #detection
- Context based detection of keypoints and features in eye regions (RH, MM, GS, LW), pp. 23–28.
- ICPR-1996-HotterMM #analysis #detection #estimation #fault #robust #statistics #using
- Detection of moving objects using a robust displacement estimation including a statistical error analysis (MH, RM, MM), pp. 249–255.
- ICPR-1996-IoannouD #detection #image
- Parallelogram detection in a digital image with the use of the Hough transform (DI, ETD), pp. 532–536.
- ICPR-1996-IraniA #2d #3d #approach #detection
- A unified approach to moving object detection in 2D and 3D scenes (MI, PA), pp. 712–717.
- ICPR-1996-JengLLC #approach #detection #geometry #performance #using
- An efficient approach for facial feature detection using geometrical face model (SHJ, HYML, YTL, MYC), pp. 426–430.
- ICPR-1996-JiangHF #approach #detection #documentation #performance
- A fast approach to detect and correct skew documents (HFJ, CCH, KCF), pp. 742–746.
- ICPR-1996-KobatakeM #adaptation #detection
- Adaptive filter to detect rounded convex regions: iris filter (HK, MM), pp. 340–344.
- ICPR-1996-KunoWSN #automation #detection #visual notation
- Automated detection of human for visual surveillance system (YK, NW, YS, SN), pp. 865–869.
- ICPR-1996-Kupeev #algorithm #detection #on the
- On significant maxima detection: a fine-to-coarse algorithm (KYK), pp. 270–274.
- ICPR-1996-LakshmananW #bound #detection #image
- Detection of bounded weak echo regions in meteorological radar images (VL, AW), pp. 895–899.
- ICPR-1996-LamY #detection #performance
- Efficient circular object detection with hypothesis filtering strategy and Hough transform (WCYL, SYY), pp. 542–546.
- ICPR-1996-LeTW #adaptation #automation #detection #documentation #image #segmentation
- Automated borders detection and adaptive segmentation for binary document images (DXL, GRT, HW), pp. 737–741.
- ICPR-1996-LewH #detection
- Information theory and face detection (MSL, DPH), pp. 601–605.
- ICPR-1996-LinL #detection #using
- Detection of specularity using stereo in color and polarization space (SL, SWL), pp. 263–267.
- ICPR-1996-LittmannNP #data type #detection #interactive #visual notation
- Nonlinear interaction of ON and OFF data streams for the detection of visual structure (EL, HN, LP), pp. 540–544.
- ICPR-1996-Matsui #detection #image #multi
- A new mathematical human vision model with an autonomous image observing mechanism and its application to multiple motion detection (TM), pp. 723–727.
- ICPR-1996-MukherjeePCCK #algorithm #detection #image #performance
- An efficient algorithm for detection of road-like structures in satellite images (AM, SKP, DC, BBC, RK), pp. 875–879.
- ICPR-1996-MurshedBS #approach #classification #detection #fuzzy #problem
- A fuzzy ARTMAP-based classification system for detecting cancerous cells, based on the one-class problem approach (NAM, FB, RS), pp. 478–482.
- ICPR-1996-NetanyahuPRS #detection #image #robust
- Robust detection of road segments in noisy aerial images (NSN, VP, AR, AJS), pp. 151–155.
- ICPR-1996-OhyaK #algorithm #detection #image #search-based #using
- Detecting facial expressions from face images using a genetic algorithm (JO, FK), pp. 649–653.
- ICPR-1996-ParagiosT #algorithm #detection #using
- Detection and location of moving objects using deterministic relaxation algorithms (NP, GT), pp. 201–205.
- ICPR-1996-PeiH96a #algorithm #complexity #detection #symmetry
- A low complexity algorithm for detecting rotational symmetry based on the Hough transform technique (SCP, JHH), pp. 492–496.
- ICPR-1996-Reisfeld #detection
- Constrained phase congruency: simultaneous detection of interest points and of their orientational scales (DR), pp. 750–754.
- ICPR-1996-RuskoneGAJ #approach #detection #image
- Vehicle detection on aerial images: a structural approach (RR, LG, SA, OJ), pp. 900–904.
- ICPR-1996-SaberT #cost analysis #detection #feature model #symmetry #using
- Face detection and facial feature extraction using color, shape and symmetry-based cost functions (ES, AMT), pp. 654–658.
- ICPR-1996-Sablatnig #analysis #automation #detection #flexibility #visual notation
- Flexible automatic visual inspection based on the separation of detection and analysis (RS), pp. 944–948.
- ICPR-1996-SanchizQP #algorithm #detection
- A neural network-based algorithm to detect dominant points from the chain-code of a contour (JMS, JMIQ, FP), pp. 325–329.
- ICPR-1996-SatohO #algorithm #comparison #detection
- Occlusion detectable stereo-systematic comparison of detection algorithms (KS, YO), pp. 280–286.
- ICPR-1996-Singh #detection #recognition #using
- Shape detection using gradient features for handwritten character recognition (SPS), pp. 145–149.
- ICPR-1996-SpinuGC #approach #detection #distributed #multi #optimisation #problem
- A multi-agent approach to edge detection as a distributed optimization problem (CS, CG, JMC), pp. 81–85.
- ICPR-1996-StoschekYH #2d #detection #invariant #multi #robust #using
- Rotation-invariant and robust multiple-2D-object detection using steerable pyramid denoising and optimized circular harmonic filters (AS, TPYY, RH), pp. 376–380.
- ICPR-1996-TakacsW #detection #using
- Attention and pattern detection using sensory and reactive control mechanisms (BT, HW), pp. 19–23.
- ICPR-1996-TakatooOK #detection #image #using
- Detection of objects including persons using image processing (MT, CO, YK), pp. 466–472.
- ICPR-1996-VitulanoNVM #detection #using
- Edge detection using a new definition of entropy (SV, MN, DV, CM), pp. 141–145.
- ICPR-1996-WangF96a #algorithm #detection #geometry #search-based
- Detection of geometric shapes by the combination of genetic algorithm and subpixel accuracy (YW, NF), pp. 535–539.
- ICPR-1996-YamamotoMTI0 #automation #detection
- Quoit filter-a new filter based on mathematical morphology to extract the isolated shadow, and its application to automatic detection of lung cancer in X-ray CT (SY, MM, YT, TI, TM), pp. 3–7.
- ICPR-1996-YipP #detection #representation #using
- Detection of moving objects using a spatiotemporal representation (HMY, TCP), pp. 483–487.
- ICPR-1996-ZhengB #adaptation #detection #learning
- Adaptive object detection based on modified Hebbian learning (YJZ, BB), pp. 164–168.
- KDD-1996-ArningAR #database #detection #linear #scalability
- A Linear Method for Deviation Detection in Large Databases (AA, RA, PR), pp. 164–169.
- KDD-1996-StolorzD #data mining #detection #mining #named #scalability
- Quakefinder: A Scalable Data Mining System for Detecting Earthquakes from Space (PES, CD), pp. 208–213.
- KDD-1996-WirthR #approach #database #detection #multi
- Detecting Early Indicator Cars in an Automotive Database: A Multi-Strategy Approach (RW, TPR), pp. 76–81.
- SIGIR-1996-LamMMP #detection #information management #personalisation
- Detection of Shifts in User Interests for Personalized Information Filtering (WL, SM, JM, MJP), pp. 317–325.
- CAV-1996-CapellmannDFGNO #abstraction #behaviour #case study #detection #interactive #network #verification
- Verification by Behaviour Abstraction — A Case Study of Service Interaction Detection in Intelligent Telephone Networks (CC, RD, FFV, RGE, UN, PO), pp. 466–469.
- JICSLP-1996-BurgardCFKL #detection #logic programming #tool support
- Logic Programming Tools Applied to Fire Detection in Hard-coal Mines (Poster Abstract) (WB, ABC, DF, AMK, SLK), p. 532.
- ICDAR-v1-1995-GarciaDPC #analysis #detection #fault #pseudo #recognition #using
- Error detection in character recognition using pseudosyllable analysis (RGG, YAD, FMP, JLC), pp. 446–449.
- ICDAR-v2-1995-AgarwalGHGW #detection
- Detection of courtesy amount block on bank checks (AA, LG, KH, AG, PSPW), pp. 748–751.
- ICDAR-v2-1995-ChangKRKK #algorithm #detection #documentation #image
- Improved binarization algorithm for document image by histogram and edge detection (MSC, SMK, WSR, HGK, DJK), pp. 636–639.
- ICDAR-v2-1995-DeforgesB #detection #documentation #image #multi #performance #robust #segmentation
- Segmentation of Complex Documents Multilevel Images: A Robust and Fast Text Bodies-Headers Detection and Extraction Scheme 770 (OD, DB), pp. 770–773.
- ICDAR-v2-1995-HontaniS #detection #metric #multi
- Character detection based on multi-scale measurement (HH, SS), pp. 644–647.
- ICDAR-v2-1995-Smith #algorithm #detection #performance
- A simple and efficient skew detection algorithm via text row accumulation (RS), pp. 1145–1148.
- ICDAR-v2-1995-YuTS #detection #documentation
- Document skew detection based on the fractal and least squares method (CLY, YYT, CYS), pp. 1149–1152.
- SIGMOD-1995-BrinDG #detection #documentation
- Copy Detection Mechanisms for Digital Documents (SB, JD, HGM), pp. 398–409.
- ICSM-1995-KhoshgoftaarSV #detection #testing
- Detecting program modules with low testability (TMK, RMS, JMV), pp. 242–250.
- ICSM-1995-RugaberSW #detection
- Detecting interleaving (SR, KS, LMW), pp. 265–274.
- CIKM-1995-MakkiP #database #detection #distributed
- Detection and Resolution of Deadlocks in Distributed Database Systems (KM, NP), pp. 411–416.
- CIKM-1995-ParkST #algorithm #concurrent #detection #distributed #generative #graph #hybrid
- A Distributed Deadlock Detection and Resolution Algorithm Based on A Hybrid Wait-for Graph and Probe Generation Scheme (YCP, PS, HLT), pp. 378–386.
- SIGIR-1995-BooksteinKR #clustering #detection #word
- Detecting Content-Bearing Words by Serial Clustering (AB, STK, TR), pp. 319–327.
- SAC-1995-CrawfordVW #algorithm #detection #multi #search-based #using
- Detecting multiple outliers in regression data using genetic algorithms (KDC, DJV, RLW), pp. 351–356.
- SAC-1995-Stegmaier-StraccaT #classification #detection #fuzzy #using
- Cough detection using fuzzy classification (PASS, NNTG), pp. 440–444.
- SAC-1995-ToliasTP #detection #fuzzy #image
- Detecting aneurysms in retinal images: fuzzy morphology vs. conventional methods (YAT, IBT, SMP), pp. 565–569.
- ESEC-1995-KamstiesL #detection #empirical #evaluation
- An Empirical Evaluation of Three Defect-Detection Techniques (EK, CML), pp. 362–383.
- ICSE-1995-WongHLM #detection #effectiveness #fault #testing
- Effect of Test Set Minimization on Fault Detection Effectiveness (WEW, JRH, SL, APM), pp. 41–50.
- DAC-1994-KarriO #architecture #detection #fault #self #synthesis
- Area-Efficient Fault Detection During Self-Recovering Microarchitecture Synthesis (RK, AO), pp. 552–556.
- VLDB-1994-ChakravarthyKAK #database #detection #semantics
- Composite Events for Active Databases: Semantics, Contexts and Detection (SC, VK, EA, SKK), pp. 606–617.
- ICSM-1994-Johnson #clone detection #detection #string
- Substring Matching for Clone Detection and Change Tracking (JHJ), pp. 120–126.
- PLDI-1994-AustinBS #array #detection #fault #performance #pointer
- Efficient Detection of All Pointer and Array Access Errors (TMA, SEB, GSS), pp. 290–301.
- SAS-1994-Yi #detection #exception #ml #source code #standard
- Compile-time Detection of Uncaught Exceptions in Standard ML Programs (KY), pp. 238–254.
- POPL-1994-ProebstingF #detection #pipes and filters
- Detecting Pipeline Structural Hazards Quickly (TAP, CWF), pp. 280–286.
- SAC-1994-ChenB #analysis #concurrent #database #detection #performance #petri net #transaction
- A Petri net model for the performance analysis of transaction database systems with continuous deadlock detection (IRC, RB), pp. 539–544.
- SAC-1994-DAntoneVGM #detection #fuzzy #parallel
- A fuzzy system to detect and count parallel noised tracks (ID, CV, EG, MM), pp. 166–169.
- ICSE-1994-PorterV #detection #empirical #fault #requirements
- An Experiment to Assess Different Defect Detection Methods for Software Requirements Inspections (AAP, LGV), pp. 103–112.
- CADE-1994-Bruning #detection
- Detecting Non-Provable Goals (SB), pp. 222–236.
- ILPS-1994-DebrayGB #detection #logic programming #optimisation #source code
- Detection and Optimization of Suspension-free Logic Programs (SKD, DG, PAB), pp. 487–501.
- ICDAR-1993-AbeMNK #comparison #detection
- Comparison of methods for detecting corner points from digital curves-a preliminary report (KA, RM, KN, TK), pp. 854–857.
- ICDAR-1993-BackmutskyZ #detection #fault
- Some ergonomic improvements of text error detection and prevention in DTP-systems (VB, VZ), pp. 947–950.
- ICDAR-1993-ChenWB #detection #image #keyword #markov #modelling #using
- Detecting and locating partially specified keywords in scanned images using hidden Markov models (FC, LW, DSB), pp. 133–138.
- ICDAR-1993-FrankeO #classification #detection #statistics
- Writing style detection by statistical combination of classifiers in form reader applications (JF, MFO), pp. 581–584.
- ICDAR-1993-Ishitani #complexity #detection #documentation
- Document skew detection based on local region complexity (YI), pp. 49–52.
- ICDAR-1993-LaiK #detection #set
- Detection of dimension sets in engineering drawings (CPL, RK), pp. 606–613.
- ICDAR-1993-TaiLZ #approach #detection #feature model #modelling #recognition
- A model based detecting approach for feature extraction of off-line handwritten Chinese character recognition (JWT, YJL, LQZ), pp. 826–829.
- ICDAR-1993-TungL #detection #recognition
- 2-stage character recognition by detection and correction of erroneously-identified characters (CHT, HJL), pp. 834–837.
- CSM-1993-ChowdhuryM #automation #constraints #detection #maintenance
- Facilitating Software Maintenance by Automated Detection of Constraint Violations (AC, SM), pp. 262–271.
- PLDI-1993-Adl-TabatabaiG #detection #scheduling
- Detection and Recovery of Endangered Variables Caused by Instruction Scheduling (ARAT, TRG), pp. 13–25.
- HCI-SHI-1993-IshibuchiTK #detection #human-computer #interactive #multi #realtime
- Real-Time Multi-Hand Detection for Human-Computer Interaction (KI, HT, FK), pp. 1040–1045.
- HCI-SHI-1993-KishinoOTT #3d #detection #image #realtime
- Virtual Space Teleconferencing System — Real Time Detection and Reproduction of 3-D Human Images (FK, JO, HT, NT), pp. 669–674.
- ESEC-1993-CheungK #analysis #detection #distributed #source code
- Tractable Flow Analysis for Anomaly Detection in Distributed Programs (SCC, JK), pp. 283–300.
- ICSE-1993-DunnK #automation #detection #reuse
- Automating the Detection of Reusable Parts in Existing Software (MFD, JCK), pp. 381–390.
- ICSE-1993-FranklW #comparison #data flow #detection #testing
- An Analytical Comparison of the Fault-Detecting Ability of Data Flow Testing Techniques (PGF, EJW), pp. 415–424.
- CAV-1993-WolperL #detection #reliability
- Reliable Hashing without Collosion Detection (PW, DL), pp. 59–70.
- ISSTA-1993-ThompsonRC #data flow #detection #fault
- An Information Flow Model of Fault Detection (MCT, DJR, LAC), pp. 182–192.
- ESOP-1992-GiacobazziR #abstract interpretation #bottom-up #detection
- Detecting Determinate Computations by Bottom-up Abstract Interpretation (RG, LR), pp. 167–181.
- STOC-1992-Ben-David #detection #finite #question
- Can Finite Samples Detect Singularities of Real-Valued Functions? (SBD), pp. 390–399.
- WSA-1992-Kuiper #attribute grammar #detection #parallel
- Speeding Up Parallelism Detection for Attribute Grammars (MFK), pp. 152–162.
- AdaEurope-1992-LanderM #ada #detection #multi #problem #realtime
- Detection and Avoidance of Elaboration-Time Problems for Multi-Unit Real-Time Ada Applications (LCL, SM), pp. 165–181.
- ML-1992-SmythM #detection #fault #novel
- Detecting Novel Classes with Applications to Fault Diagnosis (PS, JM), pp. 416–425.
- IWPTS-1992-DriraASC #consistency #detection #fault #testing
- Characterizing and Ordering Errors Detected by Conformance Testing (KD, PA, BS, AMC), pp. 67–78.
- KBSE-1991-FrinckeAL #algorithm #approach #automation #concurrent #detection #named
- CTPLAN: A Planning-Based Approach to Automatically Detecting Flaws in Concurrent Algorithms (DAF, MA, KNL), pp. 151–160.
- PODS-1991-Chaudhuri #detection #evaluation #query #tuple
- Detecting Redundant Tuples During Query Evaluation (SC), pp. 115–126.
- PODS-1991-SohnG #detection #logic programming #source code #termination #using
- Termination Detection in Logic Programs using Argument Sizes (KS, AVG), pp. 216–226.
- PEPM-1991-Lisper #algorithm #detection #partial evaluation
- Detecting Static Algorithms by Partial Evaluation (BL), pp. 31–42.
- FPCA-1991-Fradet #continuation #detection #thread #using
- Syntactic Detection of Single-Threading Using Continuations (PF), pp. 241–258.
- PLILP-1991-GiannottiH #detection #recursion #specification
- A Technique for Recursive Invariance Detection and Selective Program Specification (FG, MVH), pp. 323–334.
- PLILP-1991-LoogenW #detection #functional
- Dynamic Detection of Determinism in Functional Languages (RL, SW), pp. 335–346.
- ASPLOS-1991-MinC #detection #performance
- An Efficient Cache-Based Access Anomaly Detection Scheme (SLM, JDC), pp. 235–244.
- PPoPP-1991-NetzerM #concurrent #detection
- Improving the Accuracy of Data Race Detection (RHBN, BPM), pp. 133–144.
- RTA-1991-KrischerB #detection
- Detecting Redundant Narrowing Derivations by the LSE-SL Reducability Test (SK, AB), pp. 74–85.
- TAV-1991-GuptaS #approach #detection #performance #runtime
- Loop Monotonic Computations: An Approach for the Efficient Run-Time Detection of Races (RG, MS), pp. 98–111.
- WAGA-1990-KuiperS #detection #evaluation #parallel
- Parallel Attribute Evaluation: Structure of Evaluators and Detection of Parallelism (MFK, SDS), pp. 61–75.
- PPoPP-1990-DinningS #algorithm #comparison #detection #empirical #monitoring
- An Empirical Comparison of Monitoring Algorithms for Access Anomaly Detection (AD, ES), pp. 1–10.
- CAV-1990-PengP #approach #communication #concurrent #detection #finite #network #problem #state machine
- A Unified Approach to the Deadlock Detection Problem in Networks of Communicating Finite State Machines (WP, SP), pp. 243–252.
- CLP-1990-InamuraO90 #algorithm #detection
- A Detection Algorithm of Perpetual Suspension in KL1 (YI, SO), pp. 18–30.
- CLP-1990-SchreyeVB90 #detection #graph #horn clause #query #strict #using
- A Practical Technique for Detecting Non-terminating Queries for a Restricted Class of Horn Clauses, Using Directed, Weighted Graphs (DDS, KV, MB), pp. 649–663.
- DAC-1989-RajsumanJM #detection #fault #using
- CMOS Stuck-open Fault Detection Using Single Test Patterns (RR, APJ, YKM), pp. 714–717.
- PLDI-1989-Schonberg #detection #on the fly
- On-The-Fly Detection of Access Anomalies (ES), pp. 285–297.
- STOC-1989-CohenM #algorithm #detection #graph #polynomial
- Strongly Polynomial-Time and NC Algorithms for Detecting Cycles in Dynamic Graphs (Preliminary Version) (EC, NM), pp. 523–534.
- Best-of-PLDI-1989-Schonberg89a #detection #on the fly
- On-the-fly detection of access anomalies (with retrospective) (ES), pp. 313–327.
- ML-1989-Spackman #detection #induction #learning #tool support
- Signal Detection Theory: Valuable Tools for Evaluating Inductive Learning (KAS), pp. 160–163.
- ICSE-1989-YoungT #detection #fault #taxonomy
- Rethinking the Taxonomy of Fault Detection Techniques (MY, RNT), pp. 53–62.
- PLDI-1988-LarusH #detection
- Detecting Conflicts Between Structure Accesses (JRL, PNH), pp. 21–34.
- STOC-1988-KosarajuS #detection #graph #polynomial
- Detecting Cycles in Dynamic Graphs in Polynomial Time (Preliminary Version) (SRK, GFS), pp. 398–406.
- POPL-1988-AlpernWZ #detection #similarity #source code
- Detecting Equality of Variables in Programs (BA, MNW, FKZ), pp. 1–11.
- CSL-1988-BuningLS #detection #prolog #source code
- Loop Detection in Propositional Prolog Programs (HKB, UL, SS), pp. 148–165.
- FPCA-1987-Goldberg #detection #functional #source code
- Detecting sharing of partial applications in functional programs (BG), pp. 408–425.
- RTA-1987-Purdom #detection
- Detecting Looping Simplifications (PWPJ), pp. 54–61.
- VLDB-1986-BlakeleyCL #detection
- Updating Derived Relations: Detecting Irrelevant and Autonomously Computable Updates (JAB, NC, PÅL), pp. 457–466.
- ESOP-1986-Jouvelot #detection #parallel #reduction #semantics
- Parallelization by Semantic Detection of Reductions (PJ), pp. 223–236.
- ICALP-1986-ShavitF #approach #detection
- A New Approach to Detection of Locally Indicative Stability (NS, NF), pp. 344–358.
- ICLP-1986-WarrenD86 #detection #functional #optimisation #prolog
- Detection and Optimization of Functional Computations in Prolog (DSW, SKD), pp. 490–504.
- STOC-1985-ValiantV #detection
- NP Is as Easy as Detecting Unique Solutions (LGV, VVV), pp. 458–463.
- DAC-1984-ReddyAJ #detection #fault #logic
- A gate level model for CMOS combinational logic circuits with application to fault detection (SMR, VDA, SKJ), pp. 504–509.
- ICSE-1984-Forman #algebra #data flow #detection
- An Algebra for Data Flow Anomaly Detection (IRF), pp. 278–287.
- DAC-1983-ChiangV #detection #fault #logic #network #on the
- On fault detection in CMOS logic networks (KWC, ZGV), pp. 50–56.
- PODS-1983-KorthKNR #algorithm #comprehension #concurrent #detection #distributed #framework
- A Framework for Understanding Distributed (Deadlock Detection) Algorithms (HFK, RK, AN, JTR), pp. 192–202.
- PODS-1982-Soisalon-SoininenW #algorithm #detection #safety #testing #transaction
- An Optimal Algorithm for Testing for Safety and Detecting Deadlocks in Locked Transaction Systems (ESS, DW), pp. 108–116.
- ICALP-1982-DobkinK #detection #performance
- Fast Detection of Polyhedral Intersections (DPD, DGK), pp. 154–165.
- VLDB-1981-BeeriO #algorithm #concurrent #detection #independence
- A Resource Class Independent Deadlock Detection Algorithm (CB, RO), pp. 166–178.
- STOC-1981-Fich #bound #detection #problem
- Lower Bounds for the Cycle Detection Problem (FEF), pp. 96–105.
- DAC-1980-KarpovskyS #component #detection #fault #standard
- Detecting bridging and stuck-at faults at input and output pins of standard digital components (MGK, SYHS), pp. 494–505.
- STOC-1980-ChazelleD #detection
- Detection is Easier than Computation (Extended Abstract) (BC, DPD), pp. 146–153.
- VLDB-1979-KawazuMIT #algorithm #concurrent #database #detection #distributed
- Two-Phase Deadlock Detection Algorithm in Distributed Databases (SK, SM, KI, KT), pp. 360–367.
- VLDB-1979-WilsonS #detection #fault #interactive
- A System for Interactive Error Detection (GAW, SBS), pp. 32–51.
- ICSE-1979-RiddleBDE #concurrent #detection #source code
- Anomaly Detection in Concurrent Programs (WER, GB, CD, BE), pp. 265–273.
- DAC-1977-BoseS #detection #logic
- Detection of static and dynamic hazards in logic nets (AKB, SAS), pp. 220–224.
- SIGMOD-1976-Macri #concurrent #data transformation #detection
- Deadlock Detection and Resolution in a CODASYL Based Data Management System (PPM), pp. 45–49.
- ICSE-1976-FosdickO #data flow #detection #interprocedural
- The Detection of Anomalous Interprocedural Data Flow (LDF, LJO), pp. 624–628.
- DAC-1975-Fike #design #detection #fault #predict #question
- Predicting fault detectability in combinational circuits — a new design tool? (JLF), pp. 290–295.
- DAC-1972-Lewis #bound #detection #logic #simulation
- Hazard detection by a quinary simulation of logic devices with bounded propagation delays (DWL), pp. 157–164.
- DAC-1971-KlaytonBL #detection #fault #memory management
- Fault detection and diagnosis of memory system faults (ARK, WAB, AIL), pp. 269–277.