BibSLEIGH
BibSLEIGH corpus
BibSLEIGH tags
BibSLEIGH bundles
BibSLEIGH people
CC-BY
Open Knowledge
XHTML 1.0 W3C Rec
CSS 2.1 W3C CanRec
email twitter
Used together with:
use (67)
code (42)
softwar (35)
base (30)
system (29)

Stem identifi$ (all stems)

453 papers:

QoSAQoSA-2015-DurisicST #architecture #identification #set #standard
Identifying Optimal Sets of Standardized Architectural Features: A Method and its Automotive Application (DD, MS, MT), pp. 103–112.
DATEDATE-2015-ChungSS #identification
Identifying redundant inter-cell margins and its application to reducing routing congestion (WC, SS, YS), pp. 1659–1664.
DATEDATE-2015-OyaSYT #classification #identification
A score-based classification method for identifying hardware-trojans at gate-level netlists (MO, YS, MY, NT), pp. 465–470.
SIGMODSIGMOD-2015-RazniewskiKNS #database #identification #query
Identifying the Extent of Completeness of Query Answers over Partially Complete Databases (SR, FK, WN, DS), pp. 561–576.
ICSMEICSME-2015-BaloghABVGV #developer #identification #interactive
Identifying wasted effort in the field via developer interaction data (GB, GA, ÁB, LV, TG, AZV), pp. 391–400.
ICSMEICSME-2015-PawelkaJ #case study #identifier #natural language
Is this code written in English? A study of the natural language of comments and identifiers in practice (TP, EJ), pp. 401–410.
MSRMSR-2015-GuptaSPA #bibliography #challenge #identification #process #scalability
Identifying Software Process Management Challenges: Survey of Practitioners in a Large Global IT Company (MG, AS, SP, AMA), pp. 346–356.
SANERSANER-2015-InfanteB #identification
Efficiently identifying object production sites (AI, AB), pp. 575–579.
SANERSANER-2015-OumarouAEDK #identification
Identifying the exact fixing actions of static rule violation (HO, NA, AE, SD, DTK), pp. 371–379.
SCAMSCAM-2015-GhafariGR #automation #identification #testing
Automatically identifying focal methods under test in unit test cases (MG, CG, KR), pp. 61–70.
HCIHIMI-IKC-2015-WangN #analysis #identification #matrix
Dot Matrix Analysis of Plant Operation Data for Identifying Sequential Alarms Triggered by Single Root Cause (ZW, MN), pp. 152–158.
HCISCSM-2015-VillelaXP #collaboration #identification #network
Identifying Collaboration Strategies in Scientific Collaboration Networks (MLBV, SX, ROP), pp. 253–264.
ECIRECIR-2015-GogMP #identification #on the #statistics #using
On Identifying Phrases Using Collection Statistics (SG, AM, MP), pp. 278–283.
ICMLICML-2015-WuGS #combinator #feedback #finite #identification #on the
On Identifying Good Options under Combinatorially Structured Feedback in Finite Noisy Environments (YW, AG, CS), pp. 1283–1291.
KDDKDD-2015-KicKimanR #identification #social #social media #towards
Towards Decision Support and Goal Achievement: Identifying Action-Outcome Relationships From Social Media (EK, MR), pp. 547–556.
KDDKDD-2015-LakkarajuASMBGA #framework #identification #machine learning #student
A Machine Learning Framework to Identify Students at Risk of Adverse Academic Outcomes (HL, EA, CS, DM, NB, RG, KLA), pp. 1909–1918.
KDDKDD-2015-RongCM #identification #modelling #social #why
Why It Happened: Identifying and Modeling the Reasons of the Happening of Social Events (YR, HC, ZM), pp. 1015–1024.
KDDKDD-2015-ShahafHM #identification
Inside Jokes: Identifying Humorous Cartoon Captions (DS, EH, RM), pp. 1065–1074.
SEKESEKE-2015-Tasse #analysis #identification #metric #using
Using peak analysis for identifying lagged effects between software metrics (JT), pp. 512–515.
SEKESEKE-2015-TironiMRM #approach #identification #learning
An approach to identify relevant subjects for supporting the Learning Scheme creation task (HT, ALAM, SSR, AM), pp. 506–511.
SIGIRSIGIR-2015-AlbakourMO #data type #identification #metadata #topic #using
Using Sensor Metadata Streams to Identify Topics of Local Events in the City (MDA, CM, IO), pp. 711–714.
SIGIRSIGIR-2015-HarelY #clustering #identification #query
Modularity-Based Query Clustering for Identifying Users Sharing a Common Condition (MGOH, EYT), pp. 819–822.
MoDELSMoDELS-2015-RagoMD #case study #identification #semantics
Identifying duplicate functionality in textual use cases by aligning semantic actions (SoSyM abstract) (AR, CM, JADP), p. 446.
GPCEGPCE-2015-MedeirosRRTG #empirical #identifier
An empirical study on configuration-related issues: investigating undeclared and unused identifiers (FM, IR, MR, LT, RG), pp. 35–44.
SACSAC-2015-FahnrichSP #database #identification #in memory #search-based
Facing the genome data deluge: efficiently identifying genetic variants with in-memory database technology (CF, MPS, HP), pp. 18–25.
ESEC-FSEESEC-FSE-2015-ZhengMZ #capacity #constraints #identification #problem #process
A method to identify and correct problematic software activity data: exploiting capacity constraints and data redundancies (QZ, AM, MZ), pp. 637–648.
CASECASE-2014-HuangYL #approach #identification
An intelligent approach to identify elderly body information (YPH, WJY, SYL), pp. 824–829.
HTHT-2014-KumarHL #approach #behaviour #identification #twitter
A behavior analytics approach to identifying tweets from crisis regions (SK, XH, HL), pp. 255–260.
HTHT-2014-Saez-Trumper #identification #twitter
Fake tweet buster: a webtool to identify users promoting fake news ontwitter (DST), pp. 316–317.
ITiCSEITiCSE-2014-FalknerVF #identification #learning #self
Identifying computer science self-regulated learning strategies (KF, RV, NJGF), pp. 291–296.
SANERCSMR-WCRE-2014-AntinyanSMOWWHH #agile #case study #development #experience #identification #industrial #risk management
Identifying risky areas of software code in Agile/Lean software development: An industrial experience report (VA, MS, WM, , EW, JW, AH, JH), pp. 154–163.
ICPCICPC-2014-EshkevariACP #identification #php
Identifying and locating interference issues in PHP applications: the case of WordPress (LME, GA, JRC, MDP), pp. 157–167.
ICSMEICSME-2014-PanichellaBPCA #developer #how
How Developers’ Collaborations Identified from Different Sources Tell Us about Code Changes (SP, GB, MDP, GC, GA), pp. 251–260.
MSRMSR-2014-NguyenNHNF #automation #case study #identification #industrial #performance
An industrial case study of automatically identifying performance regression-causes (THDN, MN, AEH, MNN, PF), pp. 232–241.
SCAMSCAM-2014-KawamitsuIKKRI #identification #repository #reuse #similarity #source code #using
Identifying Source Code Reuse across Repositories Using LCS-Based Source Code Similarity (NK, TI, TK, RGK, CDR, KI), pp. 305–314.
HCIHCI-TMT-2014-MattosPP #identification #interactive
Can Users Speak for Themselves? Investigating Users Ability to Identify Their Own Interactive Breakdowns (BAMM, RLSP, ROP), pp. 521–532.
HCIHCI-TMT-2014-PenderL #identification
Identifying Intention and Perception Mismatches in Digitally Augmented Museum Settings (HLP, DL), pp. 565–576.
HCIHIMI-AS-2014-JiangLLC #identification #network #sequence
Neural Networks for Identifying Civil Pilot’s Operation Sequences (ZJ, QL, YL, BC), pp. 241–252.
HCISCSM-2014-LeonardoFGPSSUWC #identification #social #social media #trust
Identifying Locations of Social Significance: Aggregating Social Media Content to Create a New Trust Model for Exploring Crowd Sourced Data and Information (ADL, SF, AG, FP, WS, TS, AU, DW, JBC), pp. 170–177.
CAiSECAiSE-2014-GralhaG0 #composition #identification #modelling #requirements
Identifying Modularity Improvement Opportunities in Goal-Oriented Requirements Models (CG, MG, JA), pp. 91–104.
CAiSECAiSE-2014-SimouKKG #challenge #forensics #identification
Cloud Forensics: Identifying the Major Issues and Challenges (SS, CK, EK, SG), pp. 271–284.
ICEISICEIS-v2-2014-HoosGKM #analysis #framework #identification #mobile #process
Improving Business Processes Through Mobile Apps — An Analysis Framework to Identify Value-added App Usage Scenarios (EH, CG, SK, BM), pp. 71–82.
CIKMCIKM-2014-ElsawyMM #identification #social #social media
TweetMogaz v2: Identifying News Stories in Social Media (EE, MM, WM), pp. 2042–2044.
CIKMCIKM-2014-GuptaB #identification #query
Identifying Time Intervals of Interest to Queries (DG, KB), pp. 1835–1838.
CIKMCIKM-2014-LuSY #identification #network #social
Identifying Your Customers in Social Networks (CTL, HHS, PSY), pp. 391–400.
CIKMCIKM-2014-WenR #behaviour #identification #mining #online
Identifying Latent Study Habits by Mining Learner Behavior Patterns in Massive Open Online Courses (MW, CPR), pp. 1983–1986.
CIKMCIKM-2014-ZengBLLL #identification #keyword #named #query #relational
ExpressQ: Identifying Keyword Context and Search Target in Relational Keyword Queries (ZZ, ZB, TNL, MLL, TWL), pp. 31–40.
ECIRECIR-2014-MeguebliKDP #approach #identification
Unsupervised Approach for Identifying Users’ Political Orientations (YM, MK, BLD, FP), pp. 507–512.
ICPRICPR-2014-KumarPJ #identification #music
Identifying Ragas in Indian Music (VK, HP, CVJ), pp. 767–772.
ICPRICPR-2014-NegiC #identification #image #set
Identifying Diverse Set of Images in Flickr (SN, SC), pp. 3624–3629.
KDDKDD-2014-DundarYR #identification #towards
Batch discovery of recurring rare classes toward identifying anomalous samples (MD, HZY, BR), pp. 223–232.
KDDKDD-2014-LiDDCZ #identification #process
Identifying and labeling search tasks via query-based hawkes processes (LL, HD, AD, YC, HZ), pp. 731–740.
KDDKDD-2014-XueWCG #identification
Identifying tourists from public transport commuters (MX, HW, WC, WSN, GHG), pp. 1779–1788.
KDIRKDIR-2014-BarcanteJDCCS #identification #mining #using
Identifying Drug Repositioning Targets using Text Mining (EB, MJ, FD, EC, OGC, FS), pp. 348–353.
KDIRKDIR-2014-OkumuraYSO #identification #twitter
Identifying Tweets that Contain a “Heartwarming Story” (MO, YY, MS, HO), pp. 323–326.
MLDMMLDM-2014-AbdullahiCM #approach #identification #novel #using
A Novel Approach for Identifying Banded Patterns in Zero-One Data Using Column and Row Banding Scores (FBA, FC, RM), pp. 58–72.
SEKESEKE-2014-NetoC #identification
Identifying Threats to Validity and Control Actions in the Planning Stages of Controlled Experiments (AAN, TC), pp. 256–261.
SEKESEKE-2014-SantosM #detection #identification
Identifying strategies on god class detection in two controlled experiments (JAMS, MGM), pp. 244–249.
SEKESEKE-2014-YangL #agile #architecture #development #identification
Identifying and Recording Software Architectural Assumptions in Agile Development (CY, PL), pp. 308–313.
SIGIRSIGIR-2014-WangZZL #identification #keyword #twitter
Efficiently identify local frequent keyword co-occurrence patterns in geo-tagged Twitter stream (XW, YZ, WZ, XL), pp. 1215–1218.
ECMFAECMFA-2014-MartinezZKT #identification #variability #visualisation
Identifying and Visualising Commonality and Variability in Model Variants (JM, TZ, JK, YLT), pp. 117–131.
ECOOPECOOP-2014-NittaKT #framework #identification
Identifying Mandatory Code for Framework Use via a Single Application Trace (NN, IK, YT), pp. 593–617.
RERE-2014-MasseyRAS #ambiguity #identification #requirements
Identifying and classifying ambiguity for regulatory requirements (AKM, RLR, AIA, PPS), pp. 83–92.
RERE-2014-RiazKSW #automation #identification #natural language #requirements #security
Hidden in plain sight: Automatically identifying security requirements from natural language artifacts (MR, JTK, JS, LAW), pp. 183–192.
SACSAC-2014-GraziadioDSSUME #game studies #identification #video
Bespoke video games to provide early response markers to identify the optimal strategies for maximizing rehabilitation (SG, RD, KS, KMAS, GU, GM, JAE), pp. 20–24.
SACSAC-2014-HosokawaNY #identification #information retrieval
Location-aware information retrieval for identifying local and distant landmark (YH, YN, TY), pp. 428–435.
SACSAC-2014-HuergoPD #approach #identification #modelling #using
A method to identify services using master data and artifact-centric modeling approach (RSH, PFP, FCD), pp. 1225–1230.
FSEFSE-2014-BosuCHHJ #empirical #identification
Identifying the characteristics of vulnerable code changes: an empirical study (AB, JCC, MH, PH, DJ), pp. 257–268.
SPLCSPLC-2014-AngererPLGG #dependence #graph #identification #product line
Identifying inactive code in product lines with configuration-aware system dependence graphs (FA, HP, DL, AG, PG), pp. 52–61.
OSDIOSDI-2014-ChenKWZK #identification #web
Identifying Information Disclosure in Web Applications with Retroactive Auditing (HC, TK, XW, NZ, MFK), pp. 555–569.
PPoPPPPoPP-2014-IsaacsGBBSH #execution #identification #logic #parallel
Extracting logical structure and identifying stragglers in parallel execution traces (KEI, TG, AB, PTB, MS, BH), pp. 397–398.
ISSTAISSTA-2014-NejatiB #constraints #cpu #identification #trade-off #using
Identifying optimal trade-offs between CPU time usage and temporal constraints using search (SN, LCB), pp. 351–361.
VMCAIVMCAI-2014-EhlersSK #identifier #synthesis
Synthesis with Identifiers (RE, SAS, HKG), pp. 415–433.
ASEASE-2013-SumnerZ #analysis #execution #identification
Identifying execution points for dynamic analyses (WNS, XZ), pp. 81–91.
DACDAC-2013-AngioneCCLN #modelling
Pareto epsilon-dominance and identifiable solutions for BioCAD modeling (CA, JC, GC, PL, GN), p. 9.
DATEDATE-2013-LagraaTP #concurrent #data access #data mining #identification #memory management #mining #simulation
Data mining MPSoC simulation traces to identify concurrent memory access patterns (SL, AT, FP), pp. 755–760.
HTHT-2013-KumarMZL #identification
Whom should I follow?: identifying relevant users during crises (SK, FM, RZ, HL), pp. 139–147.
PODSPODS-2013-Gottlob #identification #polynomial
Deciding monotone duality and identifying frequent itemsets in quadratic logspace (GG), pp. 25–36.
TACASTACAS-2013-WhiteL #data type #evolution #identification #in memory #learning #memory management
Identifying Dynamic Data Structures by Learning Evolving Patterns in Memory (DHW, GL), pp. 354–369.
CSMRCSMR-2013-AbebeT #automation #identifier
Automated Identifier Completion and Replacement (SLA, PT), pp. 263–272.
ICPCICPC-2013-GuptaMPV #identifier #re-engineering #tool support
Part-of-speech tagging of program identifiers for improved text-based software engineering tools (SG, SM, LLP, KVS), pp. 3–12.
ICPCICPC-2013-MondalRS #co-evolution #empirical #identification
Insight into a method co-change pattern to identify highly coupled methods: An empirical study (MM, CKR, KAS), pp. 103–112.
ICSMEICSM-2013-Karus #automation #development #identification
Automatic Means of Identifying Evolutionary Events in Software Development (SK), pp. 412–415.
ICSMEICSM-2013-ScannielloR #fault #identifier #source code
Dealing with Faults in Source Code: Abbreviated vs. Full-Word Identifier Names (GS, MR), pp. 190–199.
ICSMEICSM-2013-ToroiRV #case study #identification #process #testing
Identifying Process Improvement Targets in Test Processes: A Case Study (TT, AR, LV), pp. 11–19.
MSRMSR-2013-BinkleyLPHV #dataset #identifier
A dataset for evaluating identifier splitters (DB, DL, LLP, EH, KVS), pp. 401–404.
MSRMSR-2013-ButlerWYS #dataset #identifier #named
INVocD: identifier name vocabulary dataset (SB, MW, YY, HS), pp. 405–408.
MSRMSR-2013-ManiNMNSN #debugging #identification #repository
Bug resolution catalysts: identifying essential non-committers from bug repositories (SM, SN, DM, RN, VSS, AAN), pp. 193–202.
CHICHI-2013-BirnbaumBFDK #behaviour #identification #using
Using behavioral data to identify interviewer fabrication in surveys (BEB, GB, ADF, BD, ARK), pp. 2911–2920.
CHICHI-2013-HaraLF #artificial reality #crowdsourcing #identification #problem
Combining crowdsourcing and google street view to identify street-level accessibility problems (KH, VL, JF), pp. 631–640.
CSCWCSCW-2013-SmithQC #analysis #identification #using
Finger on the pulse: identifying deprivation using transit flow analysis (CSC, DQ, LC), pp. 683–692.
HCIDUXU-CXC-2013-CarignanK #case study #gamification #identification
Case Study: Identifying Gamification Opportunities in Sales Applications (JC, SLK), pp. 501–507.
HCIHCI-AMTE-2013-SantosM #automation #design #identification #implementation #interactive
Design and Implementation of ErgoIdentifier: A Tool for Automated Identification of Websites Interaction Elements (OFdS, MM), pp. 249–255.
HCIHCI-UC-2013-RodilJRW #identification #representation
Identifying and Representing Elements of Local Contexts in Namibia (KR, KLJ, MR, HWT), pp. 332–341.
HCIOCSC-2013-RichterBKF #contest #idea #identification #online
Online Idea Contests: Identifying Factors for User Retention (SR, SPB, GK, JF), pp. 76–85.
KDDKDD-2013-SunBK #identification #optimisation #polynomial
Quadratic optimization to identify highly heritable quantitative traits from complex phenotypic features (JS, JB, HRK), pp. 811–819.
KEODKEOD-2013-SagaeF #development #identification #image
Knowledge Resource Development for Identifying Matching Image Descriptions (AS, SEF), pp. 100–108.
SEKESEKE-2013-AnchietaSM #case study #diagrams #identification #prototype #uml #user interface #using
Using NLP Techniques for Identifying GUI Prototypes and UML Diagrams From Use Cases (RTA, RFdS, RSM), pp. 48–53.
SEKESEKE-2013-KayaF #identification
Identifying Extract Method Opportunities Based on Variable References (S) (MK, JWF), pp. 153–158.
SEKESEKE-2013-LosadaJ #documentation #identification #semantics
Processing rhetorical, morphosyntactic, and semantic features from corporate technical documents for identifying organizational domain knowledge (S) (BML, CMZJ), pp. 268–272.
SEKESEKE-2013-MarcalGCJ #identification #mining #repository #using
Mining Software Repository to Identify Crosscutting Concerns Using Combined Techniques (S) (IM, REG, RCMC, COJ), pp. 338–343.
SIGIRSIGIR-2013-ArroyueloGOS #documentation #identifier #performance
Document identifier reassignment and run-length-compressed inverted indexes for improved search performance (DA, SG, MO, VS), pp. 173–182.
RERE-2013-NcubeLD #challenge #identification #requirements #research
Identifying top challenges for international research on requirements engineering for systems of systems engineering (CN, SLL, HD), pp. 342–344.
SACSAC-2013-InzingerHSLD #identification #implementation #using
Identifying incompatible service implementations using pooled decision trees (CI, WH, BS, PL, SD), pp. 485–492.
SACSAC-2013-PorterA #algorithm #identification
An evolutionary spline fitting algorithm for identifying filamentous cyanobacteria (JP, DVA), pp. 40–45.
ESEC-FSEESEC-FSE-2013-BlincoeVD #coordination #dependence #identification
Do all task dependencies require coordination? the role of task properties in identifying critical coordination needs in software projects (KB, GV, DD), pp. 213–223.
ESEC-FSEESEC-FSE-2013-GarciaPSHM #distributed #identification
Identifying message flow in distributed event-based systems (JG, DP, GS, WGJH, NM), pp. 367–377.
ICSEICSE-2013-Ell #developer #identification #network
Identifying failure inducing developer pairs within developer networks (JE), pp. 1471–1473.
ICSEICSE-2013-Khalid #identification #on the
On identifying user complaints of iOS apps (HK), pp. 1474–1476.
SPLCSPLC-2013-KoziolekGGDS #analysis #case study #experience #identification #reuse
Experiences from identifying software reuse opportunities by domain analysis (HK, TG, TdG, DD, SS), pp. 208–217.
ISSTAISSTA-2013-XiaoHZX #identification #performance
Context-sensitive delta inference for identifying workload-dependent performance bottlenecks (XX, SH, DZ, TX), pp. 90–100.
ASEASE-2012-Meananeatra #identification #maintenance #refactoring #sequence
Identifying refactoring sequences for improving software maintainability (PM), pp. 406–409.
ASEASE-2012-MorenoM #automation #identification #java #named
JStereoCode: automatically identifying method and class stereotypes in Java code (LM, AM), pp. 358–361.
DRRDRR-2012-KimLT #classification #identification
Combining SVM classifiers to identify investigator name zones in biomedical articles (JK, DXL, GRT).
VLDBVLDB-2012-AgarwalRB #clustering #graph #identification #realtime
Real Time Discovery of Dense Clusters in Highly Dynamic Graphs: Identifying Real World Events in Highly Dynamic Environments (MKA, KR, MB), pp. 980–991.
CSMRCSMR-2012-BertranAGCS #architecture #identification #on the
On the Relevance of Code Anomalies for Identifying Architecture Degradation Symptoms (IMB, RA, AG, CC, AvS), pp. 277–286.
CSMRCSMR-2012-HeinemannBHH #api #recommendation
Identifier-Based Context-Dependent API Method Recommendation (LH, VB, MH, BH), pp. 31–40.
CSMRCSMR-2012-HottaHK #dependence #graph #identification #refactoring
Identifying, Tailoring, and Suggesting Form Template Method Refactoring Opportunities with Program Dependence Graph (KH, YH, SK), pp. 53–62.
CSMRCSMR-2012-KlattDKKSW #component #evolution #identification
Identify Impacts of Evolving Third Party Components on Long-Living Software Systems (BK, ZD, HK, KK, JS, RW), pp. 461–464.
CSMRCSMR-2012-NonnenI #identification #monitoring
Identifying Knowledge Divergence by Vocabulary Monitoring in Software Projects (JN, PI), pp. 441–446.
ICPCICPC-2012-AlawnehH #communication #identification
Identifying computational phases from inter-process communication traces of HPC applications (LA, AHL), pp. 133–142.
ICPCICPC-2012-SharafiSGA #identifier #source code #women
Women and men — Different but equal: On the impact of identifier style on source code reading (ZS, ZS, YGG, GA), pp. 27–36.
ICSMEICSM-2012-CorazzaMM #approach #identifier #named #performance
LINSEN: An efficient approach to split identifiers and expand abbreviations (AC, SDM, VM), pp. 233–242.
WCREWCRE-2012-GuerroujGGAP #algorithm #identifier #named #performance
TRIS: A Fast and Accurate Identifiers Splitting and Expansion Algorithm (LG, PG, YGG, GA, MDP), pp. 103–112.
CHICHI-2012-HollandKT #algorithm #detection #identification #usability #visual notation
Identifying usability issues via algorithmic detection of excessive visual search (CH, OK, DET), pp. 2943–2952.
EDOCEDOC-2012-HarrisonBADN #detection #framework #identification
A Framework for Detecting Malware in Cloud by Identifying Symptoms (KH, BB, STTA, CID, APN), pp. 164–172.
CIKMCIKM-2012-CamposBDC #feature model #identification
Time feature selection for identifying active household members (PGC, AB, FD, IC), pp. 2311–2314.
ECIRECIR-2012-DasMG #classification #identification #topic
Phrase Pair Classification for Identifying Subtopics (SD, PM, CLG), pp. 489–493.
ICMLICML-2012-KiralyT #algebra #approach #combinator #matrix #rank
A Combinatorial Algebraic Approach for the Identifiability of Low-Rank Matrix Completion (FJK, RT), p. 100.
ICMLICML-2012-PrasseSLS #email #identification #learning #regular expression
Learning to Identify Regular Expressions that Describe Email Campaigns (PP, CS, NL, TS), p. 146.
KDDKDD-2012-LeeC #difference
Differential identifiability (JL, CC), pp. 1041–1049.
KDIRKDIR-2012-SorkhiAHH #framework #game studies #identification #network #social
A Game-Theoretic Framework to Identify Top-K Teams in Social Networks (MS, HA, SH, AH), pp. 252–257.
SEKESEKE-2012-MiaoCLZZ #clustering #correctness #fault #identification #locality #testing
Identifying Coincidental Correctness for Fault Localization by Clustering Test Cases (YM, ZC, SL, ZZ, YZ), pp. 267–272.
SIGIRSIGIR-2012-SpinaMROBB #aspect-oriented #identification #microblog
Identifying entity aspects in microblog posts (DS, EM, MdR, AO, MTB, MB), pp. 1089–1090.
SIGIRSIGIR-2012-TanGS #exclamation #identification
$100, 000 prize jackpot. call now!: identifying the pertinent features of SMS spam (HT, NG, MS), pp. 1175–1176.
TOOLSTOOLS-EUROPE-2012-MarrD #abstraction #concurrent #identification #implementation #multi #virtual machine
Identifying a Unifying Mechanism for the Implementation of Concurrency Abstractions on Multi-language Virtual Machines (SM, TD), pp. 171–186.
RERE-2012-CharradaKG #identification #requirements #source code
Identifying outdated requirements based on source code changes (EBC, AK, MG), pp. 61–70.
REFSQREFSQ-2012-BeckersFKS #identification
A Pattern-Based Method for Identifying and Analyzing Laws (KB, SF, JCK, HS), pp. 256–262.
SACSAC-2012-SantosCSLB #analysis #heuristic #identification #modelling #process
Analysis of heuristics to identify crosscutting concerns in business process models (FJNS, CC, FMS, JCSdPL, TVB), pp. 1725–1726.
SACSAC-2012-SardinhaYNR #aspect-oriented #identification #named #traceability
EA-tracer: identifying traceability links between code aspects and early aspects (AS, YY, NN, AR), pp. 1035–1042.
ICSEICSE-2012-Butler #identifier #java #mining
Mining Java class identifier naming conventions (SB), pp. 1641–1643.
ICSEICSE-2012-TianLL #debugging #identification #linux
Identifying Linux bug fixing patches (YT, JLL, DL), pp. 386–396.
ICSEICSE-2012-Vetro #automation #identification #static analysis #technical debt #using
Using automatic static analysis to identify technical debt (AV), pp. 1613–1615.
SPLCSPLC-2012-PatzkeBSSSF #case study #evolution #identification #product line
Identifying improvement potential in evolving product line infrastructures: 3 case studies (TP, MB, MS, KS, JES, TF), pp. 239–248.
ISMMISMM-2012-InoueN #hardware #identification #java #source code
Identifying the sources of cache misses in Java programs without relying on hardware counters (HI, TN), pp. 133–142.
PPoPPPPoPP-2012-SimDKV #analysis #framework #identification #performance
A performance analysis framework for identifying potential benefits in GPGPU applications (JS, AD, HK, RWV), pp. 11–22.
ICSTICST-2012-GhandehariLXKK #combinator #identification #testing
Identifying Failure-Inducing Combinations in a Combinatorial Test Set (LSGG, YL, TX, DRK, RK), pp. 370–379.
ECSAECSA-2011-StolAB #design pattern #evaluation #identification #open source #process
Design and Evaluation of a Process for Identifying Architecture Patterns in Open Source Software (KJS, PA, MAB), pp. 147–163.
ASEASE-2011-ParizekL #identification #traversal
Identifying future field accesses in exhaustive state space traversal (PP, OL), pp. 93–102.
HTHT-2011-ChoudhuryCC #identification #social #social media
Identifying relevant social media content: leveraging information diversity and user cognition (MDC, SC, MC), pp. 161–170.
ITiCSEITiCSE-2011-GiannakosV #education #identification #predict
Identifying the predictors of educational webcasts’ adoption (MNG, PV), p. 376.
ICPCICPC-J-2009-HammadCM11 #automation #evolution #identification #traceability
Automatically identifying changes that impact code-to-design traceability during evolution (MH, MLC, JIM), pp. 35–64.
CSMRCSMR-2011-BelderrarKGAG #architecture #evolution #identification #mining #object-oriented
Sub-graph Mining: Identifying Micro-architectures in Evolving Object-Oriented Software (AB, SK, YGG, GA, PG), pp. 171–180.
ICPCICPC-2011-DitGPA #feature model #identifier #question
Can Better Identifier Splitting Techniques Help Feature Location? (BD, LG, DP, GA), pp. 11–20.
ICSMEICSM-2011-LawrieB #identifier #source code
Expanding identifiers to normalize source code vocabulary (DL, DB), pp. 113–122.
ICSMEICSM-2011-SoaresMG #identification #implementation #refactoring
Identifying overly strong conditions in refactoring implementations (GS, MM, RG), pp. 173–182.
ICSMEICSM-2011-SyerAH #concurrent #identification #performance #thread
Identifying performance deviations in thread pools (MDS, BA, AEH), pp. 83–92.
ICSMEICSM-2011-WieseHH #comparison #identifier #source code
A comparison of stemmers on source code identifiers for software search (AW, VH, EH), pp. 496–499.
ICSMEICSM-2011-YousefiS #distributed #identification #mining
Identifying distributed features in SOA by mining dynamic call trees (AY, KS), pp. 73–82.
MSRMSR-2011-BinkleyHL #identifier #speech #using
Improving identifier informativeness using part of speech information (DB, MH, DL), pp. 203–206.
MSRMSR-2011-EshkevariAPOGA #case study #identifier
An exploratory study of identifier renamings (LME, VA, MDP, RO, YGG, GA), pp. 33–42.
WCREWCRE-2011-AbebeT #concept #identifier #towards
Towards the Extraction of Domain Concepts from the Identifiers (SLA, PT), pp. 77–86.
CHICHI-2011-EppLM #identification #using
Identifying emotional states using keystroke dynamics (CE, ML, RLM), pp. 715–724.
CHICHI-2011-LinGTMA #identification #people #question
Does domain highlighting help people identify phishing sites? (EL, SG, ET, DM, JA), pp. 2075–2084.
CHICHI-2011-YoderS #facebook #identification #interface #social
Identifying social capital in the facebook interface (CY, FS), pp. 585–588.
CHICHI-2011-ZhuKWK #identification #wiki
Identifying shared leadership in Wikipedia (HZ, REK, YCW, AK), pp. 3431–3434.
HCIHCI-MIIE-2011-HyrkkanenN #functional #how #identification #mobile #physics #question
The Virtual Workplace of a Mobile Employee — How Does Vischer’s Model Function in Identifying Physical, Functional and Psychosocial Fit? (UH, SN), pp. 69–75.
HCIHCI-UA-2011-NisimuraMKKI #automation #development #identification #interface #recognition #speech
Development of Web-Based Voice Interface to Identify Child Users Based on Automatic Speech Recognition System (RN, SM, LK, HK, TI), pp. 607–616.
HCIIDGD-2011-ChenCC11b #identification #user interface
Identifying the Features of Friendly User Interfaces from Emotional Perspectives (LCC, PYC, YMC), pp. 293–301.
ICEISICEIS-v2-2011-BaiW #detection #fuzzy #identification #multi
Applying Fuzzy Multiple Criteria Decision Making to Evaluate and Identify Optimal Explosive Detection Equipments (YB, DW), pp. 118–124.
ICEISICEIS-v3-2011-Li11c #identification #performance
An Efficient Method to Identify Customer Value in Tourist Hotel Management (CL), pp. 165–169.
CIKMCIKM-2011-DongZCZZLWO #database #mining #named #performance
e-NSP: efficient negative sequential pattern mining based on identified positive patterns without database rescanning (XD, ZZ, LC, YZ, CZ, JL, WW, YO), pp. 825–830.
ECIRECIR-2011-PeregoST #documentation #identifier #representation
Representing Document Lengths with Identifiers (RP, FS, NT), pp. 665–669.
SEKESEKE-2011-ZaatarHH #approach #identification #implementation #product line
An Approach for Identifying and Implementing Aspectual Features inSoftware Product Lines (MAZ, HSH, AEFH), pp. 722–728.
SIGIRSIGIR-2011-CetintasRSF #identification #modelling #network #people #probability #social
Identifying similar people in professional social networks with discriminative probabilistic models (SC, MR, LS, YF), pp. 1209–1210.
SIGIRSIGIR-2011-YangGU #clustering #identification #self
Identifying points of interest by self-tuning clustering (YY, ZG, LHU), pp. 883–892.
MODELSMoDELS-2011-BavotaGOLTGC #comprehension #diagrams #identification #uml
Identifying the Weaknesses of UML Class Diagrams during Data Model Comprehension (GB, CG, RO, ADL, GT, MG, JACL), pp. 168–182.
MODELSMoDELS-2011-BavotaGOLTGC #comprehension #diagrams #identification #uml
Identifying the Weaknesses of UML Class Diagrams during Data Model Comprehension (GB, CG, RO, ADL, GT, MG, JACL), pp. 168–182.
ECOOPECOOP-2011-ButlerWYS #identifier
Improving the Tokenisation of Identifier Names (SB, MW, YY, HS), pp. 130–154.
RERE-2011-MaxwellAS #identification #requirements #taxonomy
A legal cross-references taxonomy for identifying conflicting software requirements (JCM, AIA, PPS), pp. 197–206.
SACSAC-2011-KimDB #dependence #diagrams #identification #state machine #uml
Identifying properties of UML state machine diagrams that affect data and control dependence (HK, VD, DHB), pp. 1464–1469.
SACSAC-2011-TariqBGMTAZ #correlation #identification
Identifying the provenance of correlated anomalies (DT, BB, AG, SM, RT, AA, FZ), pp. 224–229.
SACSAC-2011-WangZG #classification #identification #network
Traffic classification beyond application level: identifying content types from network traces (YW, ZZ, LG), pp. 540–541.
ICSEICSE-2011-HolmesN #behaviour #identification
Identifying program, test, and environmental changes that affect behaviour (RH, DN), pp. 371–380.
ICSEICSE-2011-HolmesN11a #behaviour #identification
Identifying opaque behavioural changes (RH, DN), pp. 995–997.
ICSEICSE-2011-LimDF #identification #network #requirements #social #using
StakeSource2.0: using social networks of stakeholders to identify and prioritise requirements (SLL, DD, AF), pp. 1022–1024.
ICSEICSE-2011-OlivetoGBPL #identification #smell
Identifying method friendships to remove the feature envy bad smell (RO, MG, GB, DP, ADL), pp. 820–823.
PLEASEPLEASE-2011-Li #evolution #identification #product line
Identifying best practice by analyzing the evolution of the FISCAN MTMSIS software product line (DL), pp. 40–44.
ECSAECSA-2010-KiwelekarJ10a #architecture #communication #concept analysis #identification
Identifying Architectural Connectors through Formal Concept Analysis of Communication Primitives (AWK, RKJ), pp. 515–518.
ASEASE-2010-KessentiniVS #identification #risk management
Deviance from perfection is a better criterion than closeness to evil when identifying risky code (MK, SV, HAS), pp. 113–122.
DATEDATE-2010-SheaSC #identifier #performance
Scoped identifiers for efficient bit aligned logging (RS, MBS, YC), pp. 1450–1455.
HTHT-2010-GippB #approach #detection #identification #independence
Citation based plagiarism detection: a new approach to identify plagiarized work language independently (BG, JB), pp. 273–274.
VLDBVLDB-2010-MathioudakisBK #identification
Identifying, Attributing and Describing Spatial Bursts (MM, NB, NK), pp. 1091–1102.
VLDBVLDB-2010-SettyBBW #identification #named
InZeit: Efficiently Identifying Insightful Time Points (VS, SJB, KB, GW), pp. 1605–1608.
VLDBVLDB-2010-VlachouDNK #identification #query
Identifying the Most Influential Data Objects with Reverse Top-k Queries (AV, CD, KN, YK), pp. 364–372.
FASEFASE-2010-CortellessaMRT #effectiveness #identification #performance #process
A Process to Effectively Identify “Guilty” Performance Antipatterns (VC, AM, RHR, CT), pp. 368–382.
CSMRCSMR-2010-AsadiPAG #approach #concept #execution #heuristic #identification
A Heuristic-Based Approach to Identify Concepts in Execution Traces (FA, MDP, GA, YGG), pp. 31–40.
CSMRCSMR-2010-ButlerWYS #empirical #identifier #quality
Exploring the Influence of Identifier Names on Code Quality: An Empirical Study (SB, MW, YY, HS), pp. 156–165.
CSMRCSMR-2010-MadaniGPGA #identifier #recognition #source code #speech #using #word
Recognizing Words from Source Code Identifiers Using Speech Recognition Techniques (NM, LG, MDP, YGG, GA), pp. 68–77.
ICPCICPC-2010-BernardiL #identification #object-oriented
The ConAn Tool to Identify Crosscutting Concerns in Object Oriented Systems (MLB, GADL), pp. 48–49.
ICPCICPC-2010-FalleriHLNPD #automation #identifier #network
Automatic Extraction of a WordNet-Like Identifier Network from Software (JRF, MH, ML, CN, VP, MD), pp. 4–13.
ICPCICPC-2010-JablonskiH #identifier
Renaming Parts of Identifiers Consistently within Code Clones (PJ, DH), pp. 38–39.
ICPCICPC-2010-SharifM #eye tracking #identifier
An Eye Tracking Study on camelCase and under_score Identifier Styles (BS, JIM), pp. 196–205.
ICSMEICSM-2010-ArnaoudovaEOGA #concept #fault #identifier #metric #physics
Physical and conceptual identifier dispersion: Measures and relation to fault proneness (VA, LME, RO, YGG, GA), pp. 1–5.
ICSMEICSM-2010-BavotaOLAG #game studies #identification #refactoring
Playing with refactoring: Identifying extract class opportunities through game theory (GB, RO, ADL, GA, YGG), pp. 1–5.
ICSMEICSM-2010-JalbertB #clone detection #concurrent #debugging #detection #identification #using
Using clone detection to identify bugs in concurrent software (KJ, JSB), pp. 1–5.
MSRMSR-2010-GegickRX #case study #debugging #identification #industrial #mining #security
Identifying security bug reports via text mining: An industrial case study (MG, PR, TX), pp. 11–20.
MSRMSR-2010-PentaGA #approach #identification #using
Identifying licensing of jar archives using a code-search approach (MDP, DMG, GA), pp. 151–160.
WCREWCRE-2010-Eshkevari #identifier #refactoring #source code
Linguistic Driven Refactoring of Source Code Identifiers (LME), pp. 297–300.
WCREWCRE-2010-Guerrouj #analysis #automation #concept #identifier #source code
Automatic Derivation of Concepts Based on the Analysis of Source Code Identifiers (LG), pp. 301–304.
CHICHI-2010-Vaananen-Vainio-MattilaWOS #experience #identification #social #user interface #web #web service
Identifying drivers and hindrances of social user experience in web services (KVVM, MW, JO, KS), pp. 2499–2502.
ICEISICEIS-ISAS-2010-FerreiraAB #communication #identification #modelling
Identifying Ruptures in Business-IT Communication through Business Models (JJF, RMdA, FAB), pp. 44–51.
ICEISICEIS-J-2010-FerreiraAB10a #communication #identification #modelling
Identifying Ruptures in Business-IT Communication through Business Models (JJF, RMdA, FAB), pp. 311–325.
CIKMCIKM-2010-KamathC #identification #realtime #web
Identifying hotspots on the real-time web (KYK, JC), pp. 1837–1840.
CIKMCIKM-2010-MiaoLTZ #approach #category theory #community #identification #modelling #topic
Identifying new categories in community question answering archives: a topic modeling approach (YM, CL, JT, LZ), pp. 1673–1676.
CIKMCIKM-2010-RaiberK #documentation #identification #on the
On identifying representative relevant documents (FR, OK), pp. 99–108.
ICMLICML-2010-SyedR #dataset #identification
Unsupervised Risk Stratification in Clinical Datasets: Identifying Patients at Risk of Rare Outcomes (ZS, IR), pp. 1023–1030.
ICPRICPR-2010-ChuHC #classification #gender #identification #image #set
Identifying Gender from Unaligned Facial Images by Set Classification (WSC, CRH, CSC), pp. 2636–2639.
KEODKEOD-2010-FukumotoS #classification #identification
Identifying Domain-specific Senses and Its Application to Text Classification (FF, YS), pp. 263–268.
RecSysRecSys-2010-Said #hybrid #identification #recommendation
Identifying and utilizing contextual data in hybrid recommender systems (AS), pp. 365–368.
RecSysRecSys-2010-WuGC #identification #multi
Merging multiple criteria to identify suspicious reviews (GW, DG, PC), pp. 241–244.
RERE-2010-YoungA #identification #policy #requirements
A Method for Identifying Software Requirements Based on Policy Commitments (JDY, AIA), pp. 47–56.
SACSAC-2010-PenimA #identification #modelling
Identifying and modeling aspectual scenarios with theme and MATA (ASP, JA), pp. 287–291.
ICSEICSE-2010-AdamsJH #identification #using
Identifying crosscutting concerns using historical code changes (BA, ZMJ, AEH), pp. 305–314.
ICSEICSE-2010-LohK #difference #identification #named
LSdiff: a program differencing tool to identify systematic structural differences (AL, MK), pp. 263–266.
ICSEICSE-2010-WuGAK #approach #evolution #framework #hybrid #identification #named
AURA: a hybrid approach to identify framework evolution (WW, YGG, GA, MK), pp. 325–334.
SLESLE-2010-HerrmannsdoerferRK #analysis #identification #metamodelling
Metamodel Usage Analysis for Identifying Metamodel Improvements (MH, DR, MK), pp. 62–81.
SLESLE-2010-HostO #canonical #identification #implementation #java #semantics #using
Canonical Method Names for Java — Using Implementation Semantics to Identify Synonymous Verbs (EWH, BMØ), pp. 226–245.
SPLCSPLC-2010-YoshimuraAF #constraints #feature model #identification #mining
A Method to Identify Feature Constraints Based on Feature Selections Mining (KY, YA, TF), pp. 425–429.
ICSTICST-2010-KimSGSHN #analysis #automation #debugging #identification
Automated Bug Neighborhood Analysis for Identifying Incomplete Bug Fixes (MK, SS, CG, HS, MJH, MGN), pp. 383–392.
ISSTAISSTA-2010-CarbinR #automation #identification
Automatically identifying critical input regions and code in applications (MC, MCR), pp. 37–48.
PODSPODS-2009-KirschMPPUV #approach #identification #performance #statistics
An efficient rigorous approach for identifying statistically significant frequent itemsets (AK, MM, AP, GP, EU, FV), pp. 117–126.
ITiCSEITiCSE-2009-KiesmullerB #algorithm #automation #identification #problem
Automatically identifying learners’ problem solving strategies in-process solving algorithmic problems (UK, TB), p. 354.
ICPCICPC-J-2008-BinkleyLMM09 #identifier #memory management
Identifier length and limited programmer memory (DB, DL, SM, CM), pp. 430–445.
CSMRCSMR-2009-GarciaPEM #architecture #identification #smell
Identifying Architectural Bad Smells (JG, DP, GE, NM), pp. 255–258.
ICPCICPC-2009-HammadCM #automation #identification #traceability
Automatically identifying changes that impact code-to-design traceability (MH, MLC, JIM), pp. 20–29.
ICSMEICSM-2009-Li #analysis #dependence #identification #using
Identifying high-level dependence structures using slice-based dependence analysis (ZL), pp. 457–460.
MSRMSR-2009-EnslenHPV #analysis #automation #identifier #mining #source code
Mining source code to automatically split identifiers for software analysis (EE, EH, LLP, KVS), pp. 71–80.
SCAMSCAM-2009-BinkleyH #clustering #dependence #identification #scalability
Identifying “Linchpin Vertices” That Cause Large Dependence Clusters (DB, MH), pp. 89–98.
WCREWCRE-1999-ButlerWYS99a #empirical #identifier #quality
Relating Identifier Naming Flaws and Code Quality: An Empirical Study (SB, MW, YY, HS), pp. 31–35.
WCREWCRE-1999-LavalDDB99a #dependence #identification #matrix
Identifying Cycle Causes with Enriched Dependency Structural Matrix (JL, SD, SD, AB), pp. 113–122.
WCREWCRE-1999-TangHZ99a #identification
Techniques for Identifying the Country Origin of Mailing List Participants (RT, AEH, YZ), pp. 36–40.
LATALATA-2009-VerwerWW #automaton
One-Clock Deterministic Timed Automata Are Efficiently Identifiable in the Limit (SV, MdW, CW), pp. 740–751.
ICFPICFP-2009-GenevesLQ #evolution #identification #query #xml
Identifying query incompatibilities with evolving XML schemas (PG, NL, VQ), pp. 221–230.
HCIHIMI-DIE-2009-OkaOMS #case study #identification #people
A Study on Color Conversion for Color Deficient People to Identify Color (MO, NO, HM, AS), pp. 594–600.
HCIHIMI-II-2009-SawaragiIHN #approach #identification #using
Identifying Latent Similarities among Near-Miss Incident Records Using a Text-Mining Method and a Scenario-Based Approach (TS, KI, YH, HN), pp. 594–603.
HCIIDGD-2009-AlostathAA #design #difference #identification #interface
Identifying and Measuring Cultural Differences in Cross-Cultural User-Interface Design (JMA, SA, ABA), pp. 3–12.
CIKMCIKM-2009-DewriRRW #identification #named
POkA: identifying pareto-optimal k-anonymous nodes in a domain hierarchy lattice (RD, IR, IR, DW), pp. 1037–1046.
CIKMCIKM-2009-JainP #identification #web
Identifying comparable entities on the web (AJ, PP), pp. 1661–1664.
CIKMCIKM-2009-LinEF #identification #web
Identifying interesting assertions from the web (TL, OE, JF), pp. 1787–1790.
ICMLICML-2009-MaSSV #identification #learning #online #scalability
Identifying suspicious URLs: an application of large-scale online learning (JM, LKS, SS, GMV), pp. 681–688.
KDDKDD-2009-TantipathananandhB #algorithm #approximate #community #identification
Constant-factor approximation algorithms for identifying dynamic communities (CT, TYBW), pp. 827–836.
KEODKEOD-2009-OliveiraTO #identification #image
Identifying the Cardiac Region in Images of Electrical Impedance Tomography through Wavelet Transform (JPdO, HT, NRSO), pp. 380–383.
SIGIRSIGIR-2009-ShaparenkoJ #documentation #identification #modelling
Identifying the original contribution of a document via language modeling (BS, TJ), pp. 696–697.
SACSAC-2009-BreauxLOA #identification #requirements #using
Identifying vulnerabilities and critical requirements using criminal court proceedings (TDB, JDL, PNO, AIA), pp. 355–359.
SACSAC-2009-LiuMZ #approach #dependence #evolution #identification
An approach to identifying conversation dependency in service oriented system during dynamic evolution (ML, DM, YZ), pp. 1072–1073.
SACSAC-2009-MacielPRG #identification #web
Identifying discourse mistakes in web debates: moderation in the DCC (CM, VCP, LR, ACBG), pp. 690–691.
ICSTICST-2009-HeckmanW #identification #process #static analysis
A Model Building Process for Identifying Actionable Static Analysis Alerts (SSH, LAW), pp. 161–170.
ISSTAISSTA-2009-ChengLZWY #debugging #graph #identification #mining #using
Identifying bug signatures using discriminative graph mining (HC, DL, YZ, XW, XY), pp. 141–152.
ISSTAISSTA-2009-ClauseO #automation #identification #named #using
Penumbra: automatically identifying failure-relevant inputs using dynamic tainting (JAC, AO), pp. 249–260.
ISSTAISSTA-2009-GorgZ #aspectj #difference #identification #semantics #source code
Identifying semantic differences in AspectJ programs (MTG, JZ), pp. 25–36.
CBSECBSE-2008-AlbaniOB #component #identification #towards
Towards a Systematic Method for Identifying Business Components (AA, SO, DB), pp. 262–277.
WICSAWICSA-2008-AllouiCV #architecture #component #identification #towards
Towards Software Architecture Physiology: Identifying Vital Components (IA, SC, HV), pp. 293–296.
ASEASE-2008-HsuJO #agile #debugging #identification #named #process
Rapid: Identifying Bug Signatures to Support Debugging Activities (HYH, JAJ, AO), pp. 439–442.
DACDAC-2008-HoTDDGS #identification #logic #verification
Early formal verification of conditional coverage points to identify intrinsically hard-to-verify logic (RCH, MT, MMD, ROD, JG, DES), pp. 268–271.
DocEngDocEng-2008-AdamDS #identification #web
Identifying and expanding titles in web texts (CA, ED, PSD), pp. 213–216.
DRRDRR-2008-KimLT #approach #hybrid #identification #statistics
Hybrid approach combining contextual and statistical information for identifying MEDLINE citation terms (ICK, DXL, GRT), p. 68150.
VLDBVLDB-2008-DDH #diagrams #identification #reduction #robust
Identifying robust plans through plan diagram reduction (HD, PND, JRH), pp. 1124–1140.
VLDBVLDB-2008-LiuC #identification #keyword #reasoning #xml
Reasoning and identifying relevant matches for XML keyword search (ZL, YC), pp. 921–932.
ICPCICPC-2008-DongG #architecture #identification #object-oriented
Identifying Architectural Change Patterns in Object-Oriented Systems (XD, MWG), pp. 33–42.
ICPCICPC-2008-SridharaHPV #case study #comparative #identification #semantics #similarity #tool support #word
Identifying Word Relations in Software: A Comparative Study of Semantic Similarity Tools (GS, EH, LLP, KVS), pp. 123–132.
ICSMEICSM-2008-JeffreyGG #debugging #identification #memory management #using
Identifying the root causes of memory bugs using corrupted memory location suppression (DJ, NG, RG), pp. 356–365.
ICSMEICSM-2008-Kamiya #analysis #identifier
Variation analysis of context-sharing identifiers with code clones (TK), pp. 464–465.
ICSMEICSM-2008-SuttonM #automation #c++ #concept #identification
Automatically identifying C++0x concepts in function templates (AS, JIM), pp. 57–66.
CIKMCIKM-2008-LiuMG #bound #detection #documentation #identification
Identifying table boundaries in digital documents via sparse line detection (YL, PM, CLG), pp. 1311–1320.
ICMLICML-2008-HyvarinenSH #modelling
Causal modelling combining instantaneous and lagged effects: an identifiable model based on non-Gaussianity (AH, SS, POH), pp. 424–431.
KDDKDD-2008-BouguessaDW #exclamation #identification
Identifying authoritative actors in question-answering forums: the case of Yahoo! answers (MB, BD, SW), pp. 866–874.
KDDKDD-2008-Sindhgatta #developer #identification #source code
Identifying domain expertise of developers from source code (RS), pp. 981–989.
KDDKDD-2008-ZhaoWLYC #data flow #identification #multi #semistructured data
Identifying biologically relevant genes via multiple heterogeneous data sources (ZZ, JW, HL, JY, YC), pp. 839–847.
KRKR-2008-TomanW #identification #logic
Identifying Objects Over Time with Description Logics (DT, GEW), pp. 724–732.
SEKESEKE-2008-BalushiSPCL #identification #ontology #quality #using
Identifying NFRs Conflicts Using Quality Ontology (THAB, PRFS, MP, ÓC, PL), pp. 929–934.
SIGIRSIGIR-2008-WelchC #automation #identification #query
Automatically identifying localizable queries (MJW, JC), pp. 507–514.
SACSAC-2008-BesshoKKS #framework #identification #ubiquitous
A space-identifying ubiquitous infrastructure and its application for tour-guiding service (MB, SK, NK, KS), pp. 1616–1621.
SACSAC-2008-StrapparavaM #identification #learning
Learning to identify emotions in text (CS, RM), pp. 1556–1560.
SACSAC-2008-WeiSWS #email #forensics #identification #mining
Mining spam email to identify common origins for forensic application (CW, AS, GW, AS), pp. 1433–1437.
SPLCSPLC-2008-KumarBC #identification #variability
Identifying and Exploiting the Similarities between Rationale Management and Variability Management (AKT, BB, OC), pp. 99–108.
CASECASE-2007-GuHTY #automation
Hardware-In-The-Loop for Manufacturing Automation Control: Current Status and Identified Needs (FG, WSH, DMT, CY), pp. 1105–1110.
HTHT-2007-ChinC #hypermedia #identification #social #using
Identifying subcommunities using cohesive subgroups in social hypertext (AC, MHC), pp. 175–178.
SIGMODSIGMOD-2007-LiuC #identification #keyword #xml
Identifying meaningful return information for XML keyword search (ZL, YC), pp. 329–340.
WCREWCRE-J-2005-KuhnDG07 #clustering #identification #semantics #source code #topic
Semantic clustering: Identifying topics in source code (AK, SD, TG), pp. 230–243.
ICPCICPC-2007-Vivanco #algorithm #complexity #identification #metric #modelling #predict #search-based #source code
Use of a Genetic Algorithm to Identify Source Code Metrics Which Improves Cognitive Complexity Predictive Models (RAV), pp. 297–300.
MSRMSR-2007-CanforaCP #identification #repository #source code
Identifying Changed Source Code Lines from Version Repositories (GC, LC, MDP), p. 14.
SCAMSCAM-2007-LawrieFB #identifier
Extracting Meaning from Abbreviated Identifiers (DL, HF, DB), pp. 213–222.
SASSAS-2007-WeiMZC #algorithm #decompiler #identification
A New Algorithm for Identifying Loops in Decompilation (TW, JM, WZ, YC), pp. 170–183.
HCIHCI-AS-2007-HayakawaUSAK #design #developer #identification #process #web
Report on Project to Identify Excellent Local Government Web Sites An Attempt to Educate Web Systems Developers on the Importance of Human-Centered Design Processes (SH, HU, TS, NA, YK), pp. 899–905.
HCIHCI-IDU-2007-EschenbrennerN #identification #information management #what
What Makes Them So Special?: Identifying Attributes of Highly Competent Information System Users (BE, FFHN), pp. 736–745.
HCIOCSC-2007-ChenRM #information management #mobile #process
The Need for Technology to Support Creative Information Sharing Whilst Mobile: Identified Activities and Relationship Groups (YC, TR, VM), pp. 50–59.
ICEISICEIS-AIDSS-2007-Rodriguez-EliasMFVS #analysis #approach #design #identification #information management
Knowledge Flow Analysis to Identify Knowledge Needs for the Design of Knowledge Management Systems and Strategies — A Methodological Approach (OMRE, AIMG, JF, AV, JPS), pp. 492–497.
CIKMCIKM-2007-SongCHT #identification
Identifying opinion leaders in the blogosphere (XS, YC, KH, BLT), pp. 971–974.
ECIRECIR-2007-Silvestri #documentation #identifier #problem #sorting
Sorting Out the Document Identifier Assignment Problem (FS), pp. 101–112.
KDDKDD-2007-FriedlandJ #identification
Finding tribes: identifying close-knit individuals from employment patterns (LF, DJ), pp. 290–299.
RecSysRecSys-2007-AngladeTV #clustering #identification
Complex-network theoretic clustering for identifying groups of similar listeners in p2p systems (AA, MT, FV), pp. 41–48.
RERE-2007-Kof #identification #named
Scenarios: Identifying Missing Objects and Actions by Means of Computational Linguistics (LK), pp. 121–130.
ESEC-FSEESEC-FSE-2007-SherriffHLW #identification #static analysis #using
Using groupings of static analysis alerts to identify files likely to contain field failures (MS, SSH, JML, LAW), pp. 565–568.
ICSEICSE-2007-KojarskiL #aspect-oriented #feature model #framework #identification #interactive #multi
Identifying Feature Interactions in Multi-Language Aspect-Oriented Frameworks (SK, DHL), pp. 147–157.
ASEASE-2006-WeissgerberD #identification #refactoring #source code
Identifying Refactorings from Source-Code Changes (PW, SD), pp. 231–240.
DATEDATE-2006-RosselloS #fault #identification
A compact model to identify delay faults due to crosstalk (JLR, JS), pp. 902–906.
HTHT-2006-Delort #documentation #identification #using
Identifying commented passages of documents using implicit hyperlinks (JYD), pp. 89–98.
VLDBVLDB-2006-ReissGH #identifier
Compact Histograms for Hierarchical Identifiers (FR, MNG, JMH), pp. 870–881.
ITiCSEITiCSE-2006-ThomassonRT #design #identification #object-oriented
Identifying novice difficulties in object oriented design (BJT, MR, LT), pp. 28–32.
ICPCICPC-2006-LawrieMFB #case study #identifier #what
What’s in a Name? A Study of Identifiers (DL, CM, HF, DB), pp. 3–12.
ICSMEICSM-2006-CanforaCP #co-evolution #identification #on the
On the Use of Line Co-change for Identifying Crosscutting Concern Code (GC, LC, MDP), pp. 213–222.
MSRMSR-2006-KakimotoMKTTM #identification #using
Using software birthmarks to identify similar classes and major functionalities (TK, AM, YK, HT, MT, KiM), pp. 171–172.
SCAMSCAM-2006-LawrieFB #consistency #identifier
Syntactic Identifier Conciseness and Consistency (DL, HF, DB), pp. 139–148.
SASSAS-2006-HuangCS #debugging #identification
Catching and Identifying Bugs in Register Allocation (YH, BRC, MLS), pp. 281–300.
ICPRICPR-v1-2006-YipW #identification
Identifying centers of circulating and spiraling flow patterns (CLY, KYW), pp. 769–772.
ICPRICPR-v2-2006-FarooqSG #documentation #identification
Identifying Handwritten Text in Mixed Documents (FF, KS, VG), pp. 1142–1145.
ICPRICPR-v3-2006-IsukapalliE #identification #learning #policy
Learning Policies for Efficiently Identifying Objects of Many Classes (RI, AME, RG), pp. 356–361.
ICPRICPR-v3-2006-YoshimuraHM #comparison
Comparison of Structural Variables with Spatio-temporal Variables Concerning the Identifiability of Okuri Class and Player in Japanese Traditional Dancing (MY, KH, YM), pp. 308–311.
ICPRICPR-v4-2006-WongYL #identification #predict
Identifying Weather Systems from Numerical Weather Prediction Data (KYW, CLY, PWL), pp. 841–844.
KDDKDD-2006-AgichteinZ #behaviour #identification #mining #web
Identifying “best bet” web search results by mining past user behavior (EA, ZZ), pp. 902–908.
KDDKDD-2006-ZhangCWZ #clustering #concept #identification
Identifying bridging rules between conceptual clusters (SZ, FC, XW, CZ), pp. 815–820.
KDDKDD-2006-ZhaoLBX #data mining #identification #mining
Opportunity map: identifying causes of failure — a deployed data mining system (KZ, BL, JB, WX), pp. 892–901.
SIGIRSIGIR-2006-JindalL #comparative #documentation #identification
Identifying comparative sentences in text documents (NJ, BL), pp. 244–251.
RERE-2006-ChantreeNRW #identification #natural language #requirements
Identifying Nocuous Ambiguities in Natural Language Requirements (FC, BN, ANDR, AW), pp. 56–65.
SACSAC-2006-Roth #detection #mobile
Detecting identifiable areas in mobile environments (JR), pp. 986–991.
SACSAC-2006-WangTTY #approach #identification #multi
An approach for identifying attribute correspondences in multilingual schemas (HW, ST, YT, DY), pp. 1674–1678.
ICSEICSE-2006-Grunske #architecture #design #identification #multi #optimisation
Identifying “good” architectural design alternatives with multi-objective optimization strategies (LG), pp. 849–852.
ASPLOSASPLOS-2006-ChilimbiG #debugging #detection #identification #named #using
HeapMD: identifying heap-based bugs using anomaly detection (TMC, VG), pp. 219–228.
ASEASE-2005-LienhardDA #concept analysis #identification
Identifying traits with formal concept analysis (AL, SD, GA), pp. 66–75.
HTHT-2005-WildeB #identifier
Fragment identifiers for plain text files (EW, MB), pp. 211–213.
ICDARICDAR-2005-BharathDM #approach #identification #online #recognition
An Approach to Identify Unique Styles in Online Handwriting Recognition (AB, VD, SM), pp. 775–779.
ICDARICDAR-2005-JaegerMD #identification
Identifying Script onWord-Level with Informational Confidenc (SJ, HM, DSD), pp. 416–420.
CSMRCSMR-2005-SukumaranS #identification #maintenance
Identifying Test Conditions for Software Maintenance (SS, AS), pp. 304–313.
ICSMEICSM-2005-LuoZS #clustering #composition #identification #object-oriented
A Hierarchical Decomposition Method for Object-Oriented Systems Based on Identifying Omnipresent Clusters (JL, LZ, JS), pp. 647–650.
IWPCIWPC-2005-KirkRW #framework #identification #problem #reuse
Identifying and Addressing Problems in Framework Reuse (DK, MR, MW), pp. 77–86.
MSRMSR-2005-OhbaG #concept #identifier #keyword #mining #scalability #towards
Toward mining “concept keywords” from identifiers in large software projects (MO, KG), pp. 11–15.
VISSOFTVISSOFT-2005-SmithM #identification #interactive #java #runtime #source code
Identifying Structural Features of Java Programs by Analysing the Interaction of Classes at Runtime (MPS, MM), pp. 108–113.
ICEISICEIS-v5-2005-TopiLB #enterprise #identification #implementation #usability
Identifying Usability Issues with an ERP Implementation (HT, WTL, TB), pp. 128–133.
ECIRECIR-2005-BlancoB #documentation #identifier #reduction
Document Identifier Reassignment Through Dimensionality Reduction (RB, AB), pp. 375–387.
ICMLICML-2005-SimsekWB #clustering #graph #identification #learning
Identifying useful subgoals in reinforcement learning by local graph partitioning (ÖS, APW, AGB), pp. 816–823.
SIGIRSIGIR-2005-BlancoB #documentation #identifier #problem
Characterization of a simple case of the reassignment of document identifiers as a pattern sequencing problem (RB, AB), pp. 587–588.
SIGIRSIGIR-2005-MetzlerBCMZ #data flow #identification
The recap system for identifying information flow (DM, YB, WBC, AM, JZ), p. 678.
RERE-2005-LutzNPFT #analysis #identification #requirements #using
Identifying Contingency Requirements Using Obstacle Analysis (RRL, SN, APH, CRF, DT), pp. 263–272.
RERE-2005-SampaioRR #approach #aspect-oriented #identification #named #requirements
Early-AIM: An Approach for Identifying Aspects in Requirements (AS, AR, PR), pp. 487–488.
SACSAC-2005-PaulyS #identification
Identifying topological predicates for vague spatial objects (AP, MS), pp. 587–591.
CSLCSL-2005-SchurmannS #identification #polynomial #recursion
Identifying Polynomial-Time Recursive Functions (CS, JS), pp. 525–540.
DocEngDocEng-2004-YehC #identification #topic
Creation of topic map by identifying topic chain in chinese (CLY, YCC), pp. 112–114.
SIGMODSIGMOD-2004-VlachosMV #identification #online #query
Identifying Similarities, Periodicities and Bursts for Online Search Queries (MV, CM, ZV, DG), pp. 131–142.
ICSMEICSM-2004-BruntinkDTE #clone detection #detection #evaluation #identification
An Evaluation of Clone Detection Techniques for Identifying Crosscutting Concerns (MB, AvD, TT, RvE), pp. 200–209.
WCREWCRE-2004-MarinDM #analysis #aspect-oriented #identification #using
Identifying Aspects Using Fan-In Analysis (MM, AvD, LM), pp. 132–141.
ICEISICEIS-v1-2004-LuciaST #clone detection #identification #similarity #using #web
Identifying Clones in Dynamic Web Sites Using Similarity Thresholds (ADL, GS, GT), pp. 391–396.
ICEISICEIS-v2-2004-BailonGPQ #identification
G.R.E.E.N. — An Expert System to Identify Gymnosperms (ABB, ELGG, RPP, CQ), pp. 216–221.
ICMLICML-2004-SimsekB #abstraction #identification #learning #using
Using relative novelty to identify useful temporal abstractions in reinforcement learning (ÖS, AGB).
KDDKDD-2004-RusmevichientongZS #identification
Identifying early buyers from purchase data (PR, SZ, DS), pp. 671–677.
KDDKDD-2004-XiongSTK #bound #correlation #identification
Exploiting a support-based upper bound of Pearson’s correlation coefficient for efficiently identifying strongly correlated pairs (HX, SS, PNT, VK), pp. 334–343.
SIGIRSIGIR-2004-SilvestriOP #clustering #documentation #identifier
Assigning identifiers to documents to enhance the clustering property of fulltext indexes (FS, SO, RP), pp. 305–312.
RERE-2004-KaiyaOK #case study #diagrams #identification
Identifying Stakeholders and Their Preferences about NFR by Comparing Use Case Diagrams of Several Existing Systems (HK, AO, KK), pp. 112–121.
SACSAC-2004-SilvestriPO #documentation #identifier #web
Assigning document identifiers to enhance compressibility of Web Search Engines indexes (FS, RP, SO), pp. 600–605.
DATEDATE-2003-LiuC #approach #fault #identification
A Partition-Based Approach for Identifying Failing Scan Cells in Scan-BIST with Applications to System-on-Chip Fault Diagnosis (CL, KC), pp. 10230–10237.
ICDARICDAR-2003-HuB #identification #image #web
Identifying Story and Preview Images in News Web Pages (JH, AB), pp. 640–644.
CSMRCSMR-2003-ClarkeMG #identification #object-oriented #taxonomy #using
Using a Taxonomy Tool to Identify Changes in OO Softwar (PJC, BAM, JPG), pp. 213–222.
CSMRCSMR-2003-TourweM #identification #logic #metaprogramming #refactoring #using
Identifying Refactoring Opportunities Using Logic Meta Programming (TT, TM), pp. 91–100.
IWPCIWPC-2003-RillingK #complexity #comprehension #identification #metric #slicing #using
Identifying Comprehension Bottlenecks Using Program Slicing and Cognitive Complexity Metric (JR, TK), pp. 115–124.
CHICHI-2003-BlackmonKP #problem #usability #web
Repairing usability problems identified by the cognitive walkthrough for the web (MHB, MK, PGP), pp. 497–504.
EDOCEDOC-2003-NealCLMGK #contract #identification #monitoring #requirements
Identifying requirements for Business Contract Language: a Monitoring Perspectiv (SWN, JBC, PFL, ZM, SG, SK), pp. 50–61.
ICEISICEIS-v2-2003-Drori #documentation #identification #information management #research #using
Using Knowledge Engineering Tool to Identify the Subject of a Document — Research Results (OD), pp. 442–445.
ICEISICEIS-v2-2003-ReBB #behaviour #identification
The Use of Neurofuzzy Computable System to Identify Prominent Behavior Characteristics in Successful Entrepreneurs (AR, RB, LB), pp. 522–528.
ICEISICEIS-v2-2003-SilvaIE #analysis #database #identification #information management #using
Using Knowledge Discovery to Identify Analysis Patterns for Geographic Database (CS, CI, PME), pp. 359–364.
ICEISICEIS-v3-2003-ThomI #aspect-oriented #design #identification #workflow
Identifying Patterns of Workflow Design Relying on Organizational Structure Aspects (LHT, CI), pp. 462–467.
ICMLICML-2003-McGovernJ #identification #learning #multi #predict #relational #using
Identifying Predictive Structures in Relational Data Using Multiple Instance Learning (AM, DJ), pp. 528–535.
SEKESEKE-2003-BahetiWDC #identification #information management #on the
On Identifying Deficiencies in a Knowledge Management System (PB, LAW, AD, AC), pp. 385–392.
SACSAC-2003-LeeLTY #identification
Identify Amino Acid Candidates Critical for Function of Rat Imidase by Cross-reference Voting in Imidase SuperFamily (CL, YtL, CYT, YSY), pp. 127–134.
ASEASE-2002-DiasR #component #concurrent #identification
Identifying Cause & Effect Relations between Events in Concurrent Event-Based Components (MSD, DJR), pp. 245–248.
DATEDATE-2002-LiuCG #identification
An Interval-Based Diagnosis Scheme for Identifying Failing Vectors in a Scan-BIST Environment (CL, KC, MG), pp. 382–386.
ICSMEICSM-2002-Jungmayr #dependence #identification
Identifying Test-Critical Dependencies (SJ), pp. 404–413.
CSCWCSCW-2002-WhittakerJT #communication #identification
Contact management: identifying contacts to support long-term communication (SW, QJ, LGT), pp. 216–225.
ICPRICPR-v2-2002-Mustafa #identification #image
Identifying and Classifying Image Transforms (AAYM), pp. 806–809.
ICPRICPR-v3-2002-StevensSP #identification #using
Identifying Vehicles Using Vibrometry Signatures (MRS, MS, DP), pp. 253–256.
KDDKDD-2002-Frigui #approach #clustering #identification #named #performance #scalability #set
SyMP: an efficient clustering approach to identify clusters of arbitrary shapes in large data sets (HF), pp. 507–512.
ICSEICSE-2002-MockusH #approach #identification
Expertise browser: a quantitative approach to identifying expertise (AM, JDH), pp. 503–512.
ITiCSEITiCSE-2001-Huizinga #identification #online #programming #topic
Identifying topics for instructional improvement through on-line tracking of programming assignments (DMH), pp. 129–132.
SCAMSCAM-2001-AntoniolVDCM #clone detection #identification #kernel #linux
Identifying Clones in the Linux Kernel (GA, UV, MDP, GC, EM), pp. 92–99.
WCREWCRE-2001-Krinke #dependence #graph #identification
Identifying Similar Code with Program Dependence Graphs (JK), pp. 301–309.
SASSAS-2001-KomondoorH #identification #slicing #source code #using
Using Slicing to Identify Duplication in Source Code (RK, SH), pp. 40–56.
CHICHI-2001-BhavnaniRJ #education #identification #using
Beyond command knowledge: identifying and teaching strategic knowledge for using complex computer applications (SKB, FR, BEJ), pp. 229–236.
ICEISICEIS-v2-2001-NunesP #enterprise #identification #information management #modelling
The Use of Information Systems Modelling to Identify and Evaluate E-Business Strategies for Small and Medium Enterprises (SMES) (JMBN, DP), pp. 1018–1025.
KDDKDD-2001-LiuHM #identification
Identifying non-actionable association rules (BL, WH, YM), pp. 329–334.
SACSAC-2001-Grigoriev #identification
Computational structural genomics: identifying protein targets for structural studies (IVG), pp. 41–45.
SACSAC-2001-ZhouCH #correlation #identification #optimisation #problem #set #using
Identifying the most significant pairwise correlations of residues in different positions of helices: the subset selection problem using least squares optimization (XZ, GC, MTH), pp. 51–55.
SIGMODSIGMOD-2000-BreunigKNS #identification #named
LOF: Identifying Density-Based Local Outliers (MMB, HPK, RTN, JS), pp. 93–104.
VLDBVLDB-2000-KoudasIM #identification #roadmap #set #sketching #using
Identifying Representative Trends in Massive Time Series Data Sets Using Sketches (PI, NK, SM), pp. 363–372.
CSMRCSMR-2000-AntoniolCCL #case study #identification #maintenance #set
Identifying the Starting Impact Set of a Maintenance Request: A Case Study (GA, GC, GC, ADL), pp. 227–230.
ICSMEICSM-2000-CaprileT #identifier
Restructuring Program Identifier Names (BC, PT), pp. 97–107.
ICSMEICSM-2000-MockusV #database #identification #using
Identifying Reasons for Software Changes using Historic Databases (AM, LGV), pp. 120–130.
ICMLICML-2000-CohnC #documentation #identification #learning
Learning to Probabilistically Identify Authoritative Documents (DC, HC), pp. 167–174.
ICMLICML-2000-WalkerWL #comprehension #fault #identification #natural language #using
Using Natural Language Processing and discourse Features to Identify Understanding Errors (MAW, JHW, IL), pp. 1111–1118.
KDDKDD-2000-ChouGGK #identification
Identifying prospective customers (PBC, EG, DG, PK), pp. 447–456.
ICDARICDAR-1999-Karnik #identification
Identifying Devnagri Characters (RRK), pp. 669–672.
ICDARICDAR-1999-KochiS #documentation #identification
User-defined Template for Identifying Document Type and Extracting Information from Documents (TK, TS), pp. 127–130.
SIGMODSIGMOD-1999-AnkerstBKS #clustering #identification #named
OPTICS: Ordering Points To Identify the Clustering Structure (MA, MMB, HPK, JS), pp. 49–60.
IWPCIWPC-1999-CanforaCLL #approach #case study #identification
A Case Study of Applying an Eclectic Approach to Identify Objects in Code (GC, AC, ADL, GADL), pp. 136–143.
PASTEPASTE-1999-FieldR #cobol #identification #source code
Identifying Procedural Structure in Cobol Programs (JF, GR), pp. 1–10.
WCREWCRE-1999-CaprileT #identifier
Nomen Est Omen: Analyzing the Language of Function Identifiers (BC, PT), pp. 112–122.
HCIHCI-CCAD-1999-Komischke #branch #identification #process #sequence
Identifying core sequences in process control across branches (TK), pp. 1301–1305.
CAiSECAiSE-1999-SadiqO #graph #identification #modelling #process #reduction
Applying Graph Reduction Techniques for Identifying Structural Conflicts in Process Models (WS, MEO), pp. 195–209.
KDDKDD-1999-Oates #clustering #identification #multi #sequence
Identifying Distinctive Subsequences in Multivariate Time Series by Clustering (TO), pp. 322–326.
TOOLSTOOLS-EUROPE-1999-Poo #case study #identification #specification
Events in Use Cases as a Basis for Identifying and Specifying Classes and Business Rules (DCCP), pp. 204–213.
ICSEICSE-1999-DeursenK #clustering #concept analysis #identification #using
Identifying Objects Using Cluster and Concept Analysis (AvD, TK), pp. 246–255.
ASEASE-1998-Ledru #identification #proving #theorem proving
Identifying Pre-Conditions with the Z/EVES Theorem Prover (YL), p. 32–?.
CSMRCSMR-1998-HongK #empirical #fault #identification
Identifying Fault Prone Modules: An Empirical Study in Telecommunication System (SH, KK), pp. 179–184.
ICSMEICSM-1998-CimitileLL #empirical #identification #persistent #scalability
An Experiment in Identifying Persistent Objects in Large Systems (AC, ADL, GADL), p. 122–?.
ICSMEICSM-1998-FiutemA #case study #consistency #identification #nondeterminism #object-oriented
Identifying Design-Code Inconsistencies in Object-Oriented Software: A Case Study (RF, GA), p. 94–?.
ICPRICPR-1998-BouletreauVSE #identifier #question
Handwriting and signature: one or two personality identifiers? (VB, NV, RS, HE), pp. 1758–1760.
ICSMEICSM-1997-SiffR #concept analysis #identification
Identifying modules via concept analysis (MS, TWR), pp. 170–179.
WPCWPC-1997-CimitileLLF #identification #legacy
Identifying objects in legacy systems (AC, ADL, GADL, ARF), pp. 138–147.
HCIHCI-CC-1997-ShafferC #identification #question #reduction #why
Identifying Areas for Workload Reduction Through System Changes: Why Bother? (MTS, HKC), pp. 497–500.
KDDKDD-1997-TurmonMP #identification
Bayesian Inference for Identifying Solar Active Regions (MJT, SM, JP), pp. 267–270.
DACDAC-1996-IyerLA #identification
Identifying Sequential Redundancies Without Search (MAI, DEL, MA), pp. 457–462.
WCREWCRE-1996-GravleyL #identification
Identifying Enumeration Types Modeled with Symbolic Constants (JMG, AL), p. 227–?.
CSCWCSCW-1996-McDanielOM #identification #multi #thread
Identifying and Analyzing Multiple Threads in Computer-Mediated and Face-to-Face Conversations (SEM, GMO, JCM), pp. 39–47.
ICMLICML-1996-EngelsonK #identification
Identifying the Information Contained in a Flawed Theory (SPE, MK), pp. 131–138.
ICPRICPR-1996-CucchiaraF #identification
The vector-gradient Hough transform for identifying straight-translation generated shapes (RC, FF), pp. 502–510.
ICPRICPR-1996-LuoWN #documentation #identification
Identifying contents page of documents (QL, TW, TN), pp. 696–700.
SEKESEKE-1996-Hurley #identification #requirements #specification
Identifying Language Requirements for Specifying Industrial-Strength Software Agents (WDH), pp. 238–245.
OOPSLAOOPSLA-1996-EcklundDF #case study #identification #requirements
Change Cases: Use Cases that Identify Future Requirements (EFEJ, LMLD, MJF), pp. 342–358.
REICRE-1996-BoehmI #identification
Identifying Quality-Requirement Conflicts (BWB, HI), p. 218.
SACSAC-1996-HashemiSHL #identification #testing #using
Identifying and testing of signatures for non-volatile biomolecules using tandem mass spectra (RRH, TMS, WGH, JOL), pp. 44–49.
SACSAC-1996-SucciBR #component #identification #nondeterminism #specification #taxonomy
A taxonomy for identifying a software component for uncertain and partial specifications (GS, FB, MR), pp. 570–579.
ICSEICSE-1996-Kaindl #domain model #how #identification #modelling
How to Identify Binary Relations for Domain Models (HK), pp. 28–36.
ICSMEICSM-1995-CimitileLM #case study #identification #reuse #slicing #specification #using
Identifying reusable functions using specification driven program slicing: a case study (AC, ADL, MM), pp. 124–133.
SEKESEKE-1995-LanubileLV #component #identification #modelling
Comparing models for identifying fault-prone software components (FL, AL, GV), pp. 312–319.
ICSMEICSM-1994-CanforaCTM #data type #identification #precise #reuse
A Precise Method for Identifying Reusable Abstract Data Types in Code (GC, AC, MT, MM), pp. 404–413.
PEPMPEPM-1994-DeanCG #identification #object-oriented
Identifying Profitable Specialization in Object-Oriented Languages (JD, CC, DG), pp. 85–96.
ISSTAISSTA-1994-RothermelH #identification #requirements #test coverage #testing
Selecting Tests and Identifying Test Coverage Requirements for Modified Software (GR, MJH), pp. 169–184.
DACDAC-1993-BamjiV #constraints #identification #named
MSTC: A Method for Identifying Overconstraints during Hierarchical Compaction (CB, RV), pp. 389–394.
DACDAC-1993-BoeseKR
High-Performance Routing Trees With Identified Critical Sinks (KDB, ABK, GR), pp. 182–187.
DACDAC-1993-OhlrichEGS #algorithm #identification #morphism #named #performance #using
SubGemini: Identifying SubCircuits using a Fast Subgraph Isomorphism Algorithm (MO, CE, EG, LS), pp. 31–37.
ICDARICDAR-1993-KimSK #diagrams #identification #logic #recognition
Recognition of logic diagrams by identifying loops and rectilinear polylines (SHK, JWS, JHK), pp. 349–352.
ICDARICDAR-1993-Nagaishi #identification #induction #recognition
Identifying ability of a recognition method based on the field of induction (MN), pp. 926–929.
ICDARICDAR-1993-TungL #detection #recognition
2-stage character recognition by detection and correction of erroneously-identified characters (CHT, HJL), pp. 834–837.
WCREWCRE-1993-CanforaCM #data type #identification #reuse #reverse engineering
A Reverse Engineering Method for Identifying Reusable Abstract Data Types (GC, AC, MM), pp. 73–82.
CSCWCSCW-1992-KuuttiA #concept #identification #process
Identifying Potential CSCW Applications by Means of Activity Theory Concepts: A Case Example (KK, TA), pp. 233–240.
AdaTRI-Ada-C-1992-Strong #development #identification #lifecycle #object-oriented #scalability
Identifying a Complete Object Oriented Life Cycle for Large Systems Development (NSS), pp. 166–175.
HTHT-1991-BotafogoS #hypermedia #identification
Identifying Aggregates in Hypertext Structures (RAB, BS), pp. 63–74.
PODSPODS-1991-HullY #database #equivalence #identifier #on the
On the Equivalence of Database Restructurings Involving Object Identifiers (RH, MY), pp. 328–340.
ICMLML-1991-YooF #bound #effectiveness #identification
Identifying Cost Effective Boundaries of Operationality (JPY, DHF), pp. 569–573.
DACDAC-1990-Chakravarty #identification #on the
On Synthesizing and Identifying Stuck-Open Testable CMOS Combinational Circuits (extended abstract) (SC), pp. 736–739.
VLDBVLDB-1990-HullY #declarative #identifier #named
ILOG: Declarative Creation and Manipulation of Object Identifiers (RH, MY), pp. 455–468.
PLDIPLDI-1990-Horwitz #difference #identification #semantics
Identifying the Semantic and Textual Differences Between Two Versions of a Program (SH), pp. 234–245.
CADECADE-1990-Rittri #equation #identifier #library
Retrieving Library Identifiers via Equational Matching of Types (MR), pp. 603–617.
ICMLML-1989-LeviSP #behaviour #identification #knowledge base
Identifying Knowledge Base Deficiencies by Observing User Behavior (KRL, VLS, DLP), pp. 296–301.
SEKESEKE-1989-WuCZT #identification #morphism #novel #query #subclass
A Novel Way 1o Identify IneguaIity Query Subclasses Which possess the Homomorphism Property (TW, JLC, NZ, KT), pp. 158–163.

Bibliography of Software Language Engineering in Generated Hypertext (BibSLEIGH) is created and maintained by Dr. Vadim Zaytsev.
Hosted as a part of SLEBOK on GitHub.