33 papers:
- SAC-2015-Oikawa #adaptation #memory management
- Exposing non-volatile memory cache for adaptive storage access (SO), pp. 2021–2026.
- ICPR-2014-KimK #estimation #image #multi #pattern matching #robust
- Robust Surface Pattern Matching for Ball Spin Estimation with Multi-exposed Images Under Varying Illumination Conditions (JK, MK), pp. 4560–4563.
- OSDI-2014-0001RB #concurrent #debugging #kernel #named
- SKI: Exposing Kernel Concurrency Bugs through Systematic Schedule Exploration (PF, RR, BBB), pp. 415–431.
- FASE-2013-ZhongTX #api #behaviour #difference
- Exposing Behavioral Differences in Cross-Language API Mapping Relations (HZ, ST, TX), pp. 130–145.
- CHI-2013-MalacriaBHCG
- Promoting Hotkey use through rehearsal with ExposeHK (SM, GB, JH, AC, CG), pp. 573–582.
- ESEC-FSE-2013-BohmeOR #fault #interactive #testing
- Regression tests to expose change interaction errors (MB, BCdSO, AR), pp. 334–344.
- ICSE-2011-Bacchelli #email #re-engineering
- Exploring, exposing, and exploiting emails to include human factors in software engineering (AB), pp. 1074–1077.
- ASE-2010-QiRL #evolution #generative #source code #testing
- Test generation to expose changes in evolving programs (DQ, AR, ZL), pp. 397–406.
- ICPR-2010-ZhangZ #analysis #canonical #correlation #image #using
- Exposing Digital Image Forgeries by Using Canonical Correlation Analysis (CZ, HZ), pp. 838–841.
- FSE-2010-SorrentinoFM #named #thread #weaving
- PENELOPE: weaving threads to expose atomicity violations (FS, AF, PM), pp. 37–46.
- CSMR-2009-FrancescomarinoMT #process #reverse engineering #web
- Reverse Engineering of Business Processes exposed as Web Applications (CDF, AM, PT), pp. 139–148.
- CHI-2009-LeeSRCT #dataset #named #roadmap
- FacetLens: exposing trends and relationships to support sensemaking within faceted datasets (BL, GS, GGR, MC, DST), pp. 1293–1302.
- ASPLOS-2009-ParkLZ #debugging #named
- CTrigger: exposing atomicity violation bugs from their hiding places (SP, SL, YZ), pp. 25–36.
- CSMR-2008-LienhardGGN #execution #testing
- Test Blueprint — Exposing Side Effects in Execution Traces to Support Writing Unit Tests (AL, TG, OG, ON), pp. 83–92.
- ASPLOS-2008-TuckACT #analysis #hardware #named #optimisation
- SoftSig: software-exposed hardware signatures for code analysis and optimization (JT, WA, LC, JT), pp. 145–156.
- CHI-2007-AhernEGKNN #mobile #online #privacy
- Over-exposed?: privacy patterns and considerations in online and mobile photo sharing (SA, DE, NG, SK, MN, RN), pp. 357–366.
- SIGAda-2007-Sward #ada #architecture #named #using #web #web service
- SP2: exposing ada web services using a service-oriented architecture (SOA) (RES), p. 4.
- ICEIS-DISI-2007-DyachukD #workflow
- Exposing workflows to load bursts (DD, RD), pp. 218–225.
- SIGIR-2007-KaiserSJ #named #web
- EXPOSE: searching the web for expertise (FK, HS, MJ), p. 906.
- RE-2006-StoneS #information management
- Exposing Tacit Knowledge via Pre-Requirements Tracing (AS, PS), pp. 346–347.
- PPoPP-2005-PrabhuO #concurrent #parallel #specification #thread
- Exposing speculative thread parallelism in SPEC2000 (MKP, KO), pp. 142–152.
- PPoPP-2005-SonCKC #compilation #energy #layout #parallel
- Exposing disk layout to compiler for reducing energy consumption of parallel disk based systems (SWS, GC, MTK, ANC), pp. 174–185.
- CSEET-2004-GerberC #development #education #object-oriented #student
- Teaching Object-Oriented Systems Development to Structurally Exposed Students (AG, EC), pp. 52–58.
- CGO-2004-WuPSRCA #memory management #profiling #using
- Exposing Memory Access Regularities Using Object-Relative Memory Profiling (QW, AP, AS, ER, DWC, DIA), pp. 315–324.
- AdaEurope-2003-BriotGDCW #ada #memory management
- Exposing Memory Corruption and Finding Leaks: Advanced Mechanisms in Ada (EB, FG, RD, DC, PW), pp. 129–141.
- WCRE-2002-JrW #algorithm #image #parallel
- Exposing Data-Level Parallelism in Sequential Image Processing Algorithms (LBBJ, LMW), pp. 245–254.
- ASIA-PEPM-2002-Amarasinghe #architecture #compilation
- Defying the speed of light: : a spatially-aware compiler for wire-exposed architectures (SPA), p. 70.
- AdaEurope-2002-DewarHCW #ada #runtime
- Exposing Uninitialized Variables: Strengthening and Extending Run-Time Checks in Ada (RD, OH, DC, PW), pp. 193–204.
- ASPLOS-2002-GordonTKLMLLWHMA #architecture #compilation
- A stream compiler for communication-exposed architectures (MIG, WT, MK, JL, ASM, AAL, CL, JW, HH, DM, SPA), pp. 291–303.
- CIKM-2001-HaaseH #database #query
- Exposing the Vagueness of Query Results on Partly Inaccessible Databases (OH, AH), pp. 49–56.
- TOOLS-EUROPE-1999-WoodmanGHRM #concept
- Employing Object Technology to Expose Fundamental Object Concepts (MW, RG, SH, HR, MM), pp. 371–383.
- ICSE-1995-WeideHH #legacy #reverse engineering
- Reverse Engineering of Legacy Code Exposed (BWW, WDH, JEH), pp. 327–331.
- CAV-1991-FinkelP #composition #graph
- Avoiding State Exposion by Composition of Minimal Covering Graphs (AF, LP), pp. 169–180.