BibSLEIGH
BibSLEIGH corpus
BibSLEIGH tags
BibSLEIGH bundles
BibSLEIGH people
CC-BY
Open Knowledge
XHTML 1.0 W3C Rec
CSS 2.1 W3C CanRec
email twitter
Used together with:
base (30)
use (26)
public (21)
data (18)
softwar (17)

Stem key$ (all stems)

261 papers:

DATEDATE-2015-LocatelliVMFVKK #architecture #energy
Spintronic devices as key elements for energy-efficient neuroinspired architectures (NL, AFV, AM, JSF, DV, JVK, JOK, WZ, JG, DQ), pp. 994–999.
PODSPODS-2015-KoutrisW #complexity #consistency #constraints #query #self
The Data Complexity of Consistent Query Answering for Self-Join-Free Conjunctive Queries Under Primary Key Constraints (PK, JW), pp. 17–29.
VLDBVLDB-2015-AhmadK #distributed
Compaction Management in Distributed Key-Value Datastores (MYA, BK), pp. 850–861.
VLDBVLDB-2015-FanFTD #graph
Keys for Graphs (WF, ZF, CT, XLD), pp. 1590–1601.
VLDBVLDB-2015-KohlerLZ #sql
Possible and Certain SQL Key (HK, SL, XZ), pp. 1118–1129.
VLDBVLDB-2015-ZhangWYGLZ #in memory #named #throughput
Mega-KV: A Case for GPUs to Maximize the Throughput of In-Memory Key-Value Stores (KZ, KW, YY, LG, RL, XZ), pp. 1226–1237.
ICSMEICSME-2015-ValeM #architecture #dynamic analysis #mining #named #using
Keecle: Mining key architecturally relevant classes using dynamic analysis (LdNV, MdAM), pp. 566–570.
MSRMSR-2015-SinhaSDPM #detection #repository #source code
Detecting and Mitigating Secret-Key Leaks in Source Code Repositories (VSS, DS, PD, RP, SM), pp. 396–400.
HCIHIMI-IKC-2015-Iwata #difference #learning
Method to Generate an Operation Learning Support System by Shortcut Key Differences in Similar Software (HI), pp. 332–340.
HCISCSM-2015-Flor #3d #process
3D Virtual Worlds: An Ethnography of Key Artifacts and Processes (NVF), pp. 20–29.
CAiSECAiSE-2015-BrownL #probability #quality
Probabilistic Keys for Data Quality Management (PB, SL), pp. 118–132.
ICEISICEIS-v2-2015-BarbarI #named
BlueKey — A Bluetooth Secure Solution for Accessing Personal Computers (AB, AI), pp. 509–515.
SIGIRSIGIR-2015-ParkC #concept #retrieval #using
Using Key Concepts in a Translation Model for Retrieval (JHP, WBC), pp. 927–930.
SACSAC-2015-BouaskerY #anti #constraints #correlation #mining
Key correlation mining by simultaneous monotone and anti-monotone constraints checking (SB, SBY), pp. 851–856.
SACSAC-2015-GouthamLY #authentication #protocol #smarttech #using
An anonymous ID-based remote mutual authentication with key agreement protocol on ECC using smart cards (RAG, GJL, KYY), pp. 169–174.
SACSAC-2015-MinHJCH #distributed #performance #process #scalability
An efficient backup-recovery technique to process large data in distributed key-value store (DM, TH, JJ, YC, JH), pp. 2072–2074.
HPCAHPCA-2015-RosDK #classification #clustering #performance
Hierarchical private/shared classification: The key to simple and efficient coherence for clustered cache hierarchies (AR, MD, SK), pp. 186–197.
ICLPICLP-J-2015-MannaRT #consistency #query #scalability
Taming primary key violations to query large inconsistent data via ASP (MM, FR, GT), pp. 696–710.
CASECASE-2014-HungPC #component #industrial
A logistics integrated service model in Taiwan FTZ for foreign key components supply of bicycle industry (YWH, HHP, HCC), pp. 600–602.
CASECASE-2014-TiengYHC #approach #multi #optimisation #process
A multi-objective optimization approach for selecting key features of machining processes (HT, HCY, MHH, FTC), pp. 899–904.
CASECASE-2014-ZhangLYL #optimisation #parametricity #simulation
Simulation and parameter optimization of the key working procedure of engine box (CZ, JL, RY, GL), pp. 315–319.
DATEDATE-2014-BhargavaM #encryption #generative #performance #reliability
An efficient reliable PUF-based cryptographic key generator in 65nm CMOS (MB, KM), pp. 1–6.
DATEDATE-2014-CortezRHN #testing
Testing PUF-based secure key storage circuits (MC, GR, SH, GDN), pp. 1–6.
DATEDATE-2014-DelvauxV
Key-recovery attacks on various RO PUF constructions via helper data manipulation (JD, IV), pp. 1–6.
VLDBVLDB-2014-ChenNC #detection #performance #sql
Fast Foreign-Key Detection in Microsoft SQL Server PowerPivot for Excel (ZC, VRN, SC), pp. 1417–1428.
VLDBVLDB-2014-Song0C #on the #set
On Concise Set of Relative Candidate Keys (SS, LC, HC), pp. 1179–1190.
ITiCSEITiCSE-2014-Dorge #approach
A methodological approach to key competencies in informatics (CD), pp. 201–206.
STOCSTOC-2014-MillerS #protocol #quantum #robust #using
Robust protocols for securely expanding randomness and distributing keys using untrusted quantum devices (CAM, YS), pp. 417–426.
ICALPICALP-v1-2014-IaconoO #why
Why Some Heaps Support Constant-Amortized-Time Decrease-Key Operations, and Others Do Not (JI, ÖÖ), pp. 637–649.
CHICHI-2014-RogersPBVMV #people
Never too old: engaging retired people inventing the future with MaKey MaKey (YR, JP, MB, KV, GM, FV), pp. 3913–3922.
HCIHIMI-DE-2014-ItoW #challenge #communication
Three Key Challenges in ARM-COMS for Entrainment Effect Acceleration in Remote Communication (TI, TW), pp. 177–186.
ICEISICEIS-v1-2014-PintoB #architecture #health #implementation
Architectural Key Dimensions for a Successful Electronic Health Record Implementation (EP, ACB), pp. 136–143.
CIKMCIKM-2014-HannulaKL #independence #on the
On Independence Atoms and Keys (MH, JK, SL), pp. 1229–1238.
ICPRICPR-2014-GaoRKL #documentation
Embedding Document Structure to Bag-of-Words through Pair-wise Stable Key-Regions (HG, MR, DK, JL), pp. 2903–2908.
ICPRICPR-2014-IoannidisCL #clustering #modelling #multi #using
Key-Frame Extraction Using Weighted Multi-view Convex Mixture Models and Spectral Clustering (AI, VC, AL), pp. 3463–3468.
ICPRICPR-2014-LeNVOT #documentation #retrieval #using
Document Retrieval Based on Logo Spotting Using Key-Point Matching (VPL, NN, MV, JMO, CDT), pp. 3056–3061.
SACSAC-2014-JangKCH #replication
Impacts of delayed replication on the key-value store (MJ, WK, YC, JH), pp. 1757–1758.
SACSAC-2014-LiuTZ #constraints #mining
Mining key and referential constraints enforcement patterns (KL, HBKT, HZ), pp. 850–854.
SACSAC-2014-YoonY #authentication #network #using
A biometric-based authenticated key agreement scheme using ECC for wireless sensor networks (EJY, KYY), pp. 699–705.
ASPLOSASPLOS-2014-GutierrezCGDCM #3d #design #physics
Integrated 3D-stacked server designs for increasing physical density of key-value stores (AG, MC, BG, RGD, LC, TNM), pp. 485–498.
ISMMISMM-2014-Joisha #performance #scalability
Sticky tries: fast insertions, fast lookups, no deletions for large key universes (PGJ), pp. 35–46.
ICDARICDAR-2013-GaoRKLSIK #detection #documentation #image #retrieval
Key-Region Detection for Document Images — Application to Administrative Document Retrieval (HG, MR, DK, JL, TS, MI, KK), pp. 230–234.
ICDARICDAR-2013-ToselliV #approach #documentation #performance #word
Fast HMM-Filler Approach for Key Word Spotting in Handwritten Documents (AHT, EV), pp. 501–505.
SIGMODSIGMOD-2013-ArenasDNUBV #xml
Discovering XSD keys from XML data (MA, JD, FN, MU, JVdB, SV), pp. 61–72.
VLDBVLDB-2013-Dey #scalability #transaction
Scalable Transactions across Heterogeneous NoSQL Key-Value Data Stores (AD), pp. 1434–1439.
CHICHI-2013-BaillyPDW #named
Métamorphe: augmenting hotkey usage with actuated keys (GB, TP, JD, DJW), pp. 563–572.
CHICHI-2013-YinOPZ #adaptation #approach
Making touchscreen keyboards adaptive to keys, hand postures, and individuals: a hierarchical spatial backoff model approach (YY, TO, KP, SZ), pp. 2775–2784.
HCIDHM-HB-2013-HuhK #estimation #image #using
Human Pose Estimation from Depth Image Using Visibility Estimation and Key Points (SH, GK), pp. 333–342.
HCIDHM-HB-2013-KimATBHJ #performance #process #type system
The Effects of Touch Screen Virtual Keyboard Key Sizes on Typing Performance, Typing Biomechanics and Muscle Activity (JHK, LSA, OT, MCB, CAH, PWJ), pp. 239–244.
HCIHCI-AMTE-2013-FuglerudS #design
The Link between Inclusive Design and Innovation: Some Key Elements (KSF, DS), pp. 41–50.
HCIHCI-III-2013-KunoST
Long-Term Study of a Software Keyboard That Places Keys at Positions of Fingers and Their Surroundings (YK, BS, JT), pp. 72–81.
HCIHCI-IMT-2013-KurosawaST
Keyboard Clawing: Input Method by Clawing Key Tops (TK, BS, JT), pp. 272–280.
ICEISICEIS-v2-2013-MachadoPATWO
Situation-awareness as a Key for Proactive Actions in Ambient Assisted Living (AM, AMP, IA, LHT, LKW, JPMdO), pp. 418–426.
KDDKDD-2013-LeeLM #evolution #keyword #named #social
KeySee: supporting keyword search on evolving events in social streams (PL, LVSL, EEM), pp. 1478–1481.
SACSAC-2013-ChoCC #ad hoc #mobile #network #trust
Composite trust-based public key management in mobile ad hoc networks (JHC, KSC, IRC), pp. 1949–1956.
HPDCHPDC-2013-Al-ShishtawyV #named
ElastMan: autonomic elasticity manager for cloud-based key-value stores (AAS, VV), pp. 115–116.
HPDCHPDC-2013-CostaDOR #3d #clustering #named #network #stack
CamCubeOS: a key-based network stack for 3D torus cluster topologies (PC, AD, GO, AITR), pp. 73–84.
SIGMODSIGMOD-2012-TatemuraPHH #named #sql
Partiqle: an elastic SQL engine over key-value stores (JT, OP, WPH, HH), pp. 629–632.
WCREWCRE-2012-CleveH #question #what
What Do Foreign Keys Actually Mean? (AC, JLH), pp. 299–307.
AdaEuropeAdaEurope-2012-RuizCM #ada #development #source code
Source Code as the Key Artifact in Requirement-Based Development: The Case of Ada 2012 (JFR, CC, YM), pp. 49–59.
CIKMCIKM-2012-QinZWWZH #migration #optimisation
Optimizing data migration for cloud-based key-value stores (XQ, WZ, WW, JW, XZ, TH), pp. 2204–2208.
CIKMCIKM-2012-QureshiOP #n-gram #using #wiki
Short-text domain specific key terms/phrases extraction using an n-gram model with wikipedia (MAQ, CO, GP), pp. 2515–2518.
CIKMCIKM-2012-WangWLL #graph #keyword #ranking #using #wiki
Exploring simultaneous keyword and key sentence extraction: improve graph-based ranking using wikipedia (XW, LW, JL, SL), pp. 2619–2622.
ICPRICPR-2012-LiuSZWBCT #bound #detection
Joint shot boundary detection and key frame extraction (XL, MS, LZ, SW, JB, CC, DT), pp. 2565–2568.
ICPRICPR-2012-XuLYWSL
Key frame selection based on Jensen-Rényi divergence (QX, XL, ZY, JW, MS, JL), pp. 1892–1895.
ICPRICPR-2012-ZhuLWL #effectiveness #video
Key observation selection for effective video synopsis (XZ, JL, JW, HL), pp. 2528–2531.
KDDKDD-2012-Posse #lessons learnt #network #recommendation #scalability #social
Key lessons learned building recommender systems for large-scale social networks (CP), p. 587.
SACSAC-2012-MavrogiannopoulosTP #encryption #framework #kernel #linux
A linux kernel cryptographic framework: decoupling cryptographic keys from applications (NM, MT, BP), pp. 1435–1442.
ICDARICDAR-2011-SaabniB #performance
Fast Key-Word Searching via Embedding and Active-DTW (RS, AB), pp. 68–72.
SIGMODSIGMOD-2011-DebnathSL #named #ram
SkimpyStash: RAM space skimpy key-value store on flash-based storage (BKD, SS, JL), pp. 25–36.
ITiCSEITiCSE-2011-VihavainenPLK #scalability
Extreme apprenticeship method: key practices and upward scalability (AV, MP, ML, JK), pp. 273–277.
STOCSTOC-2011-LewkoLW #how
How to leak on key updates (ABL, ML, BW), pp. 725–734.
HCIDUXU-v1-2011-KarschS #precise #safety #usability
Terminological Precision — A Key Factor in Product Usability and Safety (BIK, GS), pp. 138–147.
HCIDUXU-v2-2011-HeimgartnerTW #design #human-computer
Empathy as Key Factor for Successful Intercultural HCI Design (RH, LWT, HW), pp. 557–566.
HCIHCI-DDA-2011-NebeP #re-engineering #requirements #usability
Key Requirements for Integrating Usability Engineering and Software Engineering (KN, VP), pp. 114–120.
HCIHIMI-v1-2011-NamPKLW #authentication
Server-Aided Password-Authenticated Key Exchange: From 3-Party to Group (JN, JP, JK, YL, DW), pp. 339–348.
ICEISICEIS-v2-2011-LiOAK #fault #identification #modelling #network #using
Patterns Identification for Hitting Adjacent Key Errors Correction using Neural Network Models (JL, KO, MSA, HBK), pp. 5–12.
KDDKDD-2011-Boire #case study #data mining #lessons learnt #mining
The practitioner’s viewpoint to data mining: key lessons learned in the trenches and case studies (RB), p. 785.
SACSAC-2011-MunizL #encryption #on the #protocol #recognition
On the (im)possibility of perennial message recognition protocols without public-key cryptography (MGM, PL), pp. 1510–1515.
SPLCSPLC-2011-YoshimuraSOOAKWF #experience #multi #process #product line
Key Activities for Introducing Software Product Lines into Multiple Divisions: Experience at Hitachi (KY, JS, TO, CO, YA, SK, SW, KF), pp. 261–266.
SOSPSOSP-2011-LimFAK #named
SILT: a memory-efficient, high-performance key-value store (HL, BF, DGA, MK), pp. 1–13.
DATEDATE-2010-KlumppRW #3d
3D-integration of silicon devices: A key technology for sophisticated products (AK, PR, RW), pp. 1678–1683.
PODSPODS-2010-BenderHK #performance
Performance guarantees for B-trees with different-sized atomic keys (MAB, HH, BCK), pp. 305–316.
VLDBVLDB-2010-DebnathSL #named #persistent #throughput
FlashStore: High Throughput Persistent Key-Value Store (BKD, SS, JL), pp. 1414–1425.
VLDBVLDB-2010-ZhangHOPS #multi #on the
On Multi-Column Foreign Key Discovery (MZ, MH, BCO, CMP, DS), pp. 805–814.
ITiCSEITiCSE-2010-Yeti
Science, technology and innovation: a key driver for economic growth (NY), p. 1.
STOCSTOC-2010-ApplebaumBW #encryption
Public-key cryptography from different assumptions (BA, BB, AW), pp. 171–180.
ICALPICALP-v1-2010-LibertY #encryption #performance
Efficient Completely Non-malleable Public Key Encryption (BL, MY), pp. 127–139.
ICALPICALP-v1-2010-YaoYZ #concurrent
Concurrent Knowledge Extraction in the Public-Key Model (ACCY, MY, YZ), pp. 702–714.
CAiSECAiSE-2010-JarkeLLMR #design #requirements
The Brave New World of Design Requirements: Four Key Principles (MJ, PL, KL, JM, WNR), pp. 470–482.
ICEISICEIS-AIDSS-2010-GilS #implementation #performance #process #using
Using Key Performance Indicators to Facilitate the Strategy Implementation and Business Process Improvement in SME’s (MMG, DNS), pp. 193–197.
ICPRICPR-2010-BaysalKD #using
Recognizing Human Actions Using Key Poses (SB, MCK, PD), pp. 1727–1730.
ICPRICPR-2010-GudkovU #approach
A Topologic Approach to User-Dependent Key Extraction from Fingerprints (VYG, OU), pp. 1281–1284.
ICPRICPR-2010-LiuLH #learning #multi #representation #using
Semi-supervised Trajectory Learning Using a Multi-Scale Key Point Based Trajectory Representation (YL, XL, WH), pp. 3525–3528.
ICPRICPR-2010-ZhangXL #detection #video
Extracting Key Sub-trajectory Features for Supervised Tactic Detection in Sports Video (YZ, CX, HL), pp. 125–128.
KEODKEOD-2010-BarrosoAG #encryption #hardware #in the cloud #process
Key Management Process on the Hardware Cryptographic Module in the Cloud Computing (JMDB, LJA, PGG), pp. 493–496.
SACSAC-2010-BlackshearV
R-LEAP+: randomizing LEAP+ key distribution to resist replay and jamming attacks (SB, RMV), pp. 1985–1992.
SACSAC-2010-SulaymanM #process #web
Quantitative assessments of key success factors in software process improvement for small and medium web companies (MS, EM), pp. 2319–2323.
SPLCSPLC-2010-LeeK #feature model
Usage Context as Key Driver for Feature Selection (KL, KCK), pp. 32–46.
OSDIOSDI-2010-GeambasuLKKL #distributed #named
Comet: An active distributed key-value store (RG, AAL, TK, AK, HML), pp. 323–336.
HTHT-2009-KuflikP
User model on a key (TK, KP), pp. 371–372.
VLDBVLDB-2009-LometM #transaction
Locking Key Ranges with Unbundled Transaction Services (DBL, MFM), pp. 265–276.
ICPCICPC-2009-Rajlich #comprehension
Intensions are a key to program comprehension (VR), pp. 1–9.
STOCSTOC-2009-DodisW #encryption #symmetry
Non-malleable extractors and symmetric key cryptography from weak secrets (YD, DW), pp. 601–610.
STOCSTOC-2009-Peikert #problem #worst-case
Public-key cryptosystems from the worst-case shortest vector problem: extended abstract (CP), pp. 333–342.
CHICHI-2009-MaedaIA
Arrow tag: a direction-key-based technique for rapidly selecting hyperlinks while gazing at a screen (AM, HI, MA), pp. 1025–1028.
HCIHCI-AUII-2009-FarajMV #mobile #named
BigKey: A Virtual Keyboard for Mobile Devices (KAF, MM, NV), pp. 3–10.
HCIHCI-AUII-2009-JiK #named #using
CLURD: A New Character-Inputting System Using One 5-Way Key Module (HJ, TK), pp. 39–47.
HCIHIMI-II-2009-BaekPY #approach #comprehension #mobile
Understanding Key Attributes in Mobile Service: Kano Model Approach (SIB, SKP, WSY), pp. 355–364.
ICEISICEIS-AIDSS-2009-SmutsML #information management #tool support
Key Characteristics in Selecting Software Tools for Knowledge Management (HS, AvdM, ML), pp. 170–179.
RERE-2009-Zowghi #challenge #education #requirements
Requirements Engineering Education and Training: Key Challenges and Practical Solutions (DZ), p. 358.
SACSAC-2009-NecaskyM #query #xml
Discovering XML keys and foreign keys in queries (MN, IM), pp. 632–638.
SACSAC-2009-PinoGP #process
Key processes to start software process improvement in small companies (FJP, FG, MP), pp. 509–516.
SACSAC-2009-TangCCXHTC #network #peer-to-peer
Securing key issuing in peer-to-peer networks (CT, RC, ZC, AX, JbH, LT, ZC), pp. 84–85.
SPLCSPLC-2009-OLearyRRT #case study #experience #independence #process #research
Important issues and key activities in product derivation: experiences from two independent research projects (PO, RR, IR, ST), pp. 121–130.
DATEDATE-2008-FanBSV #algebra #design #encryption
FPGA Design for Algebraic Tori-Based Public-Key Cryptography (JF, LB, KS, IV), pp. 1292–1297.
PODSPODS-2008-JhaRS #constraints #evaluation #query
Query evaluation with soft-key constraints (AKJ, VR, DS), pp. 119–128.
VLDBVLDB-2008-PoessN #analysis #challenge #energy #power management
Energy cost, the key challenge of today’s data centers: a power consumption analysis of TPC-C results (MP, RON), pp. 1229–1240.
ITiCSEITiCSE-2008-DorgeS #question #what
What are information technology’s key qualifications? (CD, CS), pp. 296–300.
SCAMSCAM-2008-BinkleyGHLM #analysis
Evaluating Key Statements Analysis (DB, NG, MH, ZL, KM), pp. 121–130.
ICALPICALP-C-2008-KolesnikovR #authentication
Password Mistyping in Two-Factor-Authenticated Key Exchange (VK, CR), pp. 702–714.
ICALPICALP-C-2008-OstrovskyPV #concurrent
Constant-Round Concurrent Non-malleable Zero Knowledge in the Bare Public-Key Model (RO, GP, IV), pp. 548–559.
ICEISICEIS-ISAS2-2008-NgoWL #authentication #network
A Group Authentication Model for Wireless Network Services Based on Group Key Management (HHN, XW, PDL), pp. 182–188.
CIKMCIKM-2008-MacdonaldO #ranking
Key blog distillation: ranking aggregates (CM, IO), pp. 1043–1052.
ECIRECIR-2008-CloughR #design #image #using #visualisation
Key Design Issues with Visualising Images Using Google Earth (PDC, SR), pp. 570–574.
ICPRICPR-2008-WangLLSX #adaptation #automation #video #word
Automatic video annotation with adaptive number of key words (FW, WL, JL, MS, DX), pp. 1–4.
SIGIRSIGIR-2008-BenderskyC #concept #query
Discovering key concepts in verbose queries (MB, WBC), pp. 491–498.
SACSAC-2008-VictorCTC #recommendation #trust
Whom should I trust?: the impact of key figures on cold start recommendations (PV, CC, AT, MDC), pp. 2014–2018.
HPDCHPDC-2008-ShafaatSMHGR #consistency #network
Key-based consistency and availability in structured overlay networks (TMS, TS, MM, SH, AG, AR), pp. 235–236.
DACDAC-2007-SuhD #authentication #generative #physics
Physical Unclonable Functions for Device Authentication and Secret Key Generation (GES, SD), pp. 9–14.
CSEETCSEET-2007-RootRT #concept #re-engineering
Key Software Engineering Concepts for Project Success: The Use of “Boot Camp” to Establish Successful Software Projects (DR, MRL, GT), pp. 203–210.
TACASTACAS-2007-CortierKS #analysis #automation #security
Automatic Analysis of the Security of XOR-Based Key Management Schemes (VC, GK, GS), pp. 538–552.
WCREWCRE-2007-Marinescu #constraints #enterprise
Discovering the Objectual Meaning of Foreign Key Constraints in Enterprise Applications (CM), pp. 100–109.
ICALPICALP-2007-BellareR #design
Hash Functions in the Dedicated-Key Setting: Design Choices and MPP Transforms (MB, TR), pp. 399–410.
ICALPICALP-2007-FurukawaA #black box #encryption
Fully Collusion Resistant Black-Box Traitor Revocable Broadcast Encryption with Short Private Keys (JF, NA), pp. 496–508.
HCIHCI-IPT-2007-ChoiY #multi #named #network
MKPS: A Multi-level Key Pre-distribution Scheme for Secure Wireless Sensor Networks (SJC, HYY), pp. 808–817.
HCIHCI-IPT-2007-YoonL #named
BetweenKeys: Looking for Room Between Keys (YY, GL), pp. 504–512.
HCIHCI-MIE-2007-KopparapuSR #concept #parsing
Minimal Parsing Key Concept Based Question Answering System (SKK, AS, PVSR), pp. 104–113.
HCIOCSC-2007-MaAL #authentication #protocol
Chameleon-Based Deniable Authenticated Key Agreement Protocol Secure Against Forgery (CM, JA, JL), pp. 124–133.
ICEISICEIS-J-2007-YasuiLGWT07a #collaboration #online
Key Elements Extraction in Online Collaborative Environments (NIY, XL, DEG, YW, HT), pp. 148–159.
ICEISICEIS-SAIC-2007-DandashWLS #detection #internet
A New Group Key Management Structure for Fraudulent Internet Banking Payments Detection (OD, YW, PDL, BS), pp. 57–62.
ICEISICEIS-SAIC-2007-MorgadoRP #evaluation #learning
Key Issues for Learning Objects Evaluation (EMM, ÁBR, FJGP), pp. 149–154.
CIKMCIKM-2007-BotelhoZ #scalability #set
External perfect hashing for very large key sets (FCB, NZ), pp. 653–662.
ECIRECIR-2007-CioccaS #video
Hierarchical Browsing of Video Key Frames (GC, RS), pp. 691–694.
MLDMMLDM-2007-CoenenLSW #classification #identification #statistics
Statistical Identification of Key Phrases for Text Classification (FC, PHL, RS, YJW), pp. 838–853.
CGOCGO-2007-Fang #parallel #programming
Parallel Programming Environment: A Key to Translating Tera-Scale Platforms into a Big Success (JF), p. 18.
PPoPPPPoPP-2007-Fang #parallel #programming
Parallel programming environment: a key to translating tera-scale platforms into a big success (JZF), p. 1.
SOSPSOSP-2007-DeCandiaHJKLPSVV #named
Dynamo: amazon’s highly available key-value store (GD, DH, MJ, GK, AL, AP, SS, PV, WV), pp. 205–220.
VLDBVLDB-2006-SismanisBHR #named #performance #scalability
GORDIAN: Efficient and Scalable Discovery of Composite Keys (YS, PB, PJH, BR), pp. 691–702.
ICSMEICSM-2006-JansenB #deployment #process #validation
Definition and Validation of the Key process of Release, Delivery and Deployment for Product Software Vendors: turning the ugly duckling into a swan (SJ, SB), pp. 166–175.
ICALPICALP-v2-2006-FouquePSZ
Hardness of Distinguishing the MSB or LSB of Secret Keys in Diffie-Hellman Schemes (PAF, DP, JS, SZ), pp. 240–251.
ICALPICALP-v2-2006-PhanST #hybrid
Generic Construction of Hybrid Public Key Traitor Tracing with Full-Public-Traceability (DHP, RSN, DT), pp. 264–275.
CHICHI-2006-WobbrockMR #gesture
Few-key text entry revisited: mnemonic gestures on four keys (JOW, BAM, BR), pp. 489–492.
ICEISICEIS-ISAS-2006-GoeppK #information management #problem #question #requirements
Key-Problem and Goal Driven Requirements Engineering — Which Complementarities for Manufacturing Information Systems? (VG, FK), pp. 102–109.
CIKMCIKM-2006-CongFG
Annotation propagation revisited for key preserving views (GC, WF, FG), pp. 632–641.
ICPRICPR-v2-2006-MakkapatiM #encoding #using
Contour Encoding Based on Extraction of Key Points Using Wavelet Transform (VM, PRM), pp. 1177–1180.
ICPRICPR-v4-2006-HeCTW
Key Techniques and Methods for Imaging Iris in Focus (YH, JC, TT, YW), pp. 557–561.
ICPRICPR-v4-2006-ZhengLZ #encryption #generative #using
Cryptographic Key Generation from Biometric Data Using Lattice Mapping (GZ, WL, CZ), pp. 513–516.
KDDKDD-2006-ZhangL #classification #string
Extracting key-substring-group features for text classification (DZ, WSL), pp. 474–483.
SEKESEKE-2006-ChangLK #architecture #metric #product line
Key Issues and Metrics for Evaluating Product Line Architectures (SHC, HJL, SDK), pp. 212–219.
IJCARIJCAR-2006-TomanW #dependence #functional #logic #on the
On Keys and Functional Dependencies as First-Class Citizens in Description Logics (DT, GEW), pp. 647–661.
DATEDATE-2005-Abdel-HamidTA #design
A Public-Key Watermarking Technique for IP Designs (ATAH, ST, EMA), pp. 330–335.
DATEDATE-2005-CilardoMMR #architecture #encryption #novel
A Novel Unified Architecture for Public-Key Cryptography (AC, AM, NM, LR), pp. 52–57.
ICDARICDAR-2005-LiuFZL #documentation #image #retrieval
Document Image Retrieval Based on Density Distribution Feature and Key Block Feature (HL, SF, HZ, XL), pp. 1040–1044.
STOCSTOC-2005-Holenstein
Key agreement from weak bit agreement (TH), pp. 664–673.
ICALPICALP-2005-CrescenzoV #concurrent
Concurrent Zero Knowledge in the Public-Key Model (GDC, IV), pp. 816–827.
ICALPICALP-2005-MaurerS
Single-Key AIL-MACs from Any FIL-MAC (UMM, JS), pp. 472–484.
CIKMCIKM-2005-GriecoLRR #algorithm #consistency #dependence #query
Consistent query answering under key and exclusion dependencies: algorithms and experiments (LG, DL, RR, MR), pp. 792–799.
CIKMCIKM-2005-Yeh #bound
An RSA-based time-bound hierarchical key assignment scheme for electronic article subscription (JhY), pp. 285–286.
ECIRECIR-2005-YangJZY #documentation #effectiveness #retrieval #using
Improving Retrieval Effectiveness by Using Key Terms in Top Retrieved Documents (LY, DHJ, GZ, NY), pp. 169–184.
KDDKDD-2005-MorinagaAISA #dependence #mining #semantics
Key semantics extraction by dependency tree mining (SM, HA, TI, YS, SA), pp. 666–671.
SACSAC-2005-BicakciCT #certification #how #metric #trust
How to incorporate revocation status information into the trust metrics for public-key certification (KB, BC, AST), pp. 1594–1598.
SACSAC-2005-Strangio #performance #protocol
Efficient Diffie-Hellmann two-party key agreement protocols based on elliptic curves (MAS), pp. 324–331.
DATEDATE-DF-2004-FaroukS #architecture #design #implementation
Design and Implementation of a Secret Key Steganographic Micro-Architecture Employing FPGA (HAF, MS), pp. 212–217.
CSEETCSEET-2004-TomaykoCLSS #architecture #education
Key Considerations in Teaching Software Architecture (JET, SC, ML, MJS, DS), p. 174.
ESOPESOP-2004-AbadiBF #performance #π-calculus
Just Fast Keying in the π Calculus (MA, BB, CF), pp. 340–354.
ICALPICALP-2004-BlundoDS #bound #self
Definitions and Bounds for Self-Healing Key Distribution Schemes (CB, PD, ADS), pp. 234–245.
ICEISICEIS-v1-2004-JuniorV #algorithm #graph #relational #xml
Keys Graph — Based Relational to XML Translation Algorithm (WMdAJ, CV), pp. 142–148.
ICEISICEIS-v4-2004-BoppHE #weaving
Connecting Virtual Spaces: Shadow Objects as Key Elements for Weaving the Cooperative Space (TB, TH, BE), pp. 475–479.
CIKMCIKM-2004-AndrusBST #problem
Key problems in integrating structured and unstructured information (DCA, DB, JTS, ET), p. 360.
ICPRICPR-v3-2004-ZhuK #segmentation
Key-Based Melody Segmentation for Popular Songs (YZ, MSK), pp. 862–865.
SACSAC-2004-SakuraiS #data-driven #database
Rule discovery from textual data based on key phrase patterns (SS, AS), pp. 606–612.
IJCARIJCAR-2004-SteelBM #induction #protocol
Attacking a Protocol for Group Key Agreement by Refuting Incorrect Inductive Conjectures (GS, AB, MM), pp. 137–151.
ICDARICDAR-2003-HullEGL #component #documentation #multi #video #visualisation
Visualizing Multimedia Content on Paper Documents: Components of Key Frame Selection for Video Paper (JJH, BE, JG, DSL), pp. 389–392.
STOCSTOC-2003-Thorup #constant #integer #problem
Integer priority queues with decrease key in constant time and the single source shortest paths problem (MT), pp. 149–158.
SEFMSEFM-2003-Dromey #design #formal method #requirements
From Requirements to Design: Formalizing the Key Steps (RGD), p. 2–?.
ICEISICEIS-v2-2003-Raisinghani #enterprise #information management #taxonomy
Knowledge Management Systems for Leveraging Enterprise Data Resources: Taxonomy and Key Issues (MSR), pp. 519–521.
ICEISICEIS-v3-2003-GoeppK #evolution #information management #problem #towards
Towards a Definition of the Key-Problems in Information System Evolution — Formulating Problems to Better Address Information System Projects (VG, FK), pp. 586–589.
ICEISICEIS-v3-2003-HarrisonABBRTL #information management #network #re-engineering
Key Issues in Information Systems and Software Engineering — Views From a Joint Network of Practitioners and Academics (RH, DEA, KHB, RB, MR, DT, KL), pp. 357–363.
UMLUML-2003-SteimannGM #modelling #object-oriented #on the
On the Key Role of Compositioning Object-Oriented Modelling (FS, JG, TAM), pp. 106–120.
ICGTICGT-2002-Pfaltz #effectiveness #incremental #information management
Incremental Transformation of Lattices: A Key to Effective Knowledge Discovery (JLP), pp. 351–362.
CIKMCIKM-2002-GrahneZ #approximate #xml
Discovering approximate keys in XML data (GG, JZ), pp. 453–460.
CIKMCIKM-2002-WuY #adaptation #monitoring #multi #performance #query #using
Efficient query monitoring using adaptive multiple key hashing (KLW, PSY), pp. 477–484.
ICPRICPR-v2-2002-AmerDM #independence #realtime #recognition
Context-Independent Real-Time Event Recognition: Application to Key-Image Extraction (AA, ED, AM), pp. 945–948.
SACSAC-2002-FerreiraD #embedded #mobile
Blinded-key signatures: securing private keys embedded in mobile agents (LCF, RD), pp. 82–86.
SACSAC-2002-LuSP #generative #implementation #performance #smarttech
Implementation of fast RSA key generation on smart cards (CL, ALMdS, FRP), pp. 214–220.
SPLCSPLC-2002-KangDKLL #development #product line #using
Using a Marketing and Product Plan as a Key Driver for Product Line Asset Development (KCK, PD, EK, JL, KL), pp. 366–382.
IWPCIWPC-2001-LiY #comprehension #concept #named
Simplicity: A Key Engineering Concept for Program Understanding (YL, HY), pp. 98–107.
SACSAC-2001-Yfantis #algorithm #video
An algorithm for key-frame determination in digital video (EAY), pp. 312–314.
STOCSTOC-2000-BihamBBMR #proving #quantum #security
A proof of the security of quantum key distribution (extended abstract) (EB, MB, POB, TM, VPR), pp. 715–724.
STOCSTOC-2000-KatzY #encryption #probability #security
Complete characterization of security notions for probabilistic private-key encryption (JK, MY), pp. 245–254.
ICALPICALP-2000-BaudronPS #multi #security
Extended Notions of Security for Multicast Public Key Cryptosystems (OB, DP, JS), pp. 499–511.
WLCWLC-2000-YamamuraK #protocol
Key Agreement Protocol Securer than DLOG (AY, KK), pp. 450–465.
CHICHI-2000-LeeKM #design #internet #what
What makes Internet users visit cyber stores again? key design factors for customer loyalty (JL, JK, JYM), pp. 305–312.
ICEISICEIS-2000-SheeTT #architecture
Keys to the Supply-Demand Architecture in Electronic Commerce (DYS, TIT, JtET), pp. 494–498.
ICPRICPR-v1-2000-SanchezB #normalisation #recognition #video
Color Normalization for Appearance Based Recognition of Video Key-Frames (JMS, XB), pp. 1815–1818.
TOOLSTOOLS-USA-2000-Williams #enterprise #integration
Keys to Enterprise Application Integration (JW), pp. 399–400.
ASPLOSASPLOS-2000-BurkeMA #architecture #encryption #performance #symmetry
Architectural Support for Fast Symmetric-Key Cryptography (JB, JM, TMA), pp. 178–189.
ICALPICALP-1999-GrossiI #data type #linked data #maintenance #multi #open data #performance
Efficient Techniques for Maintaining Multidimensional Keys in Linked Data Structures (RG, GFI), pp. 372–381.
HCIHCI-EI-1999-KitakazeAIF #adaptation #evaluation
Study of Adaptive Input System for Telecommunication Terminal — Evaluation of Discriminant which Controls Computer key-input - (SK, YA, TI, SF), pp. 74–78.
HCIHCI-EI-1999-Thompson #feedback
Keyboard Tactile Feedback and its Effect on Keying Force Applied (DAT), pp. 157–161.
SOSPSOSP-1999-MazieresKKW #file system #security
Separating key management from file system security (DM, MK, MFK, EW), pp. 124–139.
STOCSTOC-1998-BellareCK #analysis #approach #authentication #composition #design #protocol
A Modular Approach to the Design and Analysis of Authentication and Key Exchange Protocols (Extended Abstract) (MB, RC, HK), pp. 419–428.
STOCSTOC-1998-FrankelMY #distributed #generative #performance #robust
Robust Efficient Distributed RSA-Key Generation (YF, PDM, MY), pp. 663–672.
ICPRICPR-1998-LiD #automation #identification #video
Automatic identification of text in digital video key frames (HL, DSD), pp. 129–132.
PODSPODS-1997-AlbertIR #equivalence #query #relational
Conjunctive Query Equivalence of Keyed Relational Schemas (JA, YEI, RR), pp. 44–50.
STOCSTOC-1997-AjtaiD #equivalence #worst-case
A Public-Key Cryptosystem with Worst-Case/Average-Case Equivalence (MA, CD), pp. 284–293.
STOCSTOC-1997-Pan #equation #performance
Faster Solution of the Key Equation for Decoding BCH Error-Correcting Codes (VYP), pp. 168–175.
DLTDLT-1997-Polemi #algebra #geometry
An Algebraic-Geometric Public Key Cryptosystem (DP), pp. 521–528.
HCIHCI-CC-1997-PaulD #concept #design #multi #privacy
Privacy and Acting in Groups-Key Concepts in Designing Multimedia-Supported Cooperative Work (HP, SD), pp. 281–284.
HCIHCI-SEC-1997-MorrisH #library
Potential Key Stress Factors Among Academic Library Assistants (AM, SH), pp. 407–410.
EDOCEDOC-1997-MunkeLCM #distributed #reuse
Type Management: A Key to Software Reuse in Open Distributed Systems (MM, WL, BOC, KMJ), pp. 78–89.
TACASTACAS-1996-Lowe #protocol #using
Breaking and Fixing the Needham-Schroeder Public-Key Protocol Using FDR (GL), pp. 147–166.
ICSMEICSM-1996-GarciaA #case study #maintenance
Maintainability as a key factor in maintenance productivity: a case study (MJBG, JCGA), p. 87–?.
STOCSTOC-1995-BellareR
Provably secure session key distribution: the three party case (MB, PR), pp. 57–66.
ICALPICALP-1995-BaoI #automaton #finite
Break Finite Automata Public Key Cryptosystem (FB, YI), pp. 147–158.
SEKESEKE-1995-Balmas #comprehension #source code
Classifying Programs: a Key For program Understanding (FB), pp. 342–349.
CHICHI-1994-MasuiN94b #editing #performance #predict
Repeat and predict — two keys to efficient text editing (TM, KN), pp. 118–123.
AdaTRI-Ada-1994-Cherry #ada #formal method #paradigm #re-engineering #visualisation
Software Engineering with Ada in a New Key: Formalizing and Visualizing the Object Paradigm (GWC), pp. 309–320.
VLDBVLDB-1993-Lomet #concurrent
Key Range Locking Strategies for Improved Concurrency (DBL), pp. 655–664.
PEPMPEPM-1993-ConselPW #composition #incremental #operating system #partial evaluation #performance
Incremental Partial Evaluation: The Key to High Performance, Modularity and Portability in Operating Systems (CC, CP, JW), pp. 44–46.
HCIHCI-ACS-1993-HuuhtanenVL #automation #communication #implementation #library #named
Communication — A Key Factor in Implementation of Library Automation (PH, MV, IL), pp. 976–981.
HCIHCI-ACS-1993-KishinoH #estimation #student
A Code Key-in Time Estimation Method for College Students (SK, YH), pp. 624–629.
SEKESEKE-1993-LoiaQ #logic programming #named #object-oriented
CLOS: A Key Issue To Bridge the Gap Between Object-Oriented and Logic Programming (VL, MQ), pp. 62–69.
FSEFSE-1993-ZaremskiW #reuse
Signature Matching: A Key to Reuse (AMZ, JMW), pp. 182–190.
OOPSLAOOPSLA-1991-Hayes #using
Using Key Object Opportunism to Collect Old Objects (BH), pp. 33–46.
ICLPICLP-1991-RollinsW #library #specification
Specifications as Search Keys for Software Libraries (EJR, JMW), pp. 173–187.
VLDBVLDB-1990-HardjonoS
Search Key Substitution in the Encipherment of B-Trees (TH, JS), pp. 50–58.
VLDBVLDB-1990-Mohan #concurrent #multi #named #transaction
ARIES/KVL: A Key-Value Locking Method for Concurrency Control of Multiaction Transactions Operating on B-Tree Indexes (CM), pp. 392–405.
STOCSTOC-1990-GilHW #constant
Not All Keys Can Be Hashed in Constant Time (Preliminary Version) (JYG, FMadH, AW), pp. 244–253.
STOCSTOC-1990-NaorY
Public-key Cryptosystems Provably Secure against Chosen Ciphertext Attacks (MN, MY), pp. 427–437.
CAiSECAiSE-1990-Almgren #metric #motivation #quality
Quality Control: A Cornerstone to Quality — Measurement and Motivation are Key Issues (RA), p. 288.
PODSPODS-1989-FaloutsosR #retrieval
Fractals for Secondary Key Retrieval (CF, SR), pp. 247–252.
FPCAFPCA-1989-Rittri #library #using
Using Types as Search Keys in Function Libraries (MR), pp. 174–183.
SOSPSOSP-1989-LomasGSN #risk management
Reducing Risks from Poorly Chosen Keys (TMAL, LG, JHS, RMN), pp. 14–18.
STOCSTOC-1987-Munro
Searching a Two Key Table Under a Single Key (JIM), pp. 383–387.
PODSPODS-1986-Robinson #linear #order #statistics #using
Order Preserving Linear Hashing Using Dynamic Key Statistics (JTR), pp. 91–99.
PODSPODS-1985-Kundu #algorithm
An Improved Algorithm for Finding a Key of a Relation (SK), pp. 189–192.
SIGMODSIGMOD-1985-Otoo #multi
A Multidimensional Digital Hashing Scheme for Files With Composite Keys (EJO), pp. 214–229.
ICALPICALP-1985-BilardiP #complexity #sorting
The Influence of Key Length on the Area-Time Complexity of Sorting (GB, FPP), pp. 53–62.
SIGMODSIGMOD-1984-Kriegel #comparison #multi #performance #retrieval
Performance Comparison of Index Structures for Multi-Key Retrieval (HPK), pp. 186–196.
SIGMODSIGMOD-1983-Lomet #performance
A High Performance, Universal, Key Associative Access Method (DBL), pp. 120–133.
STOCSTOC-1983-Adleman #on the
On Breaking Generalized Knapsack Public Key Cryptosystems (Abstract) (LMA), pp. 402–412.
STOCSTOC-1983-Blum #how
How to Exchange (Secret) Keys (Extended Abstract) (MB), pp. 440–447.
ICALPICALP-1983-LescanneS #case study #data type #on the
On the Study Data Structures: Binary Tournaments with Repeated Keys (PL, JMS), pp. 466–477.
SIGIRSIGIR-1983-Yannakoudakis #retrieval
Derived Search Keys for Bibliographic Retrieval (EJY), pp. 220–237.
SIGIRSIGIR-1978-Yan #retrieval
Record Block Allocation for Retrieval on Secondary Keys (CSY), pp. 83–108.
ICSEICSE-1976-BelfordBHS #development #effectiveness #named #specification
Specifications: A Key to Effective Software Development (PCB, AFB, DGH, LSS), pp. 71–79.
ICSEICSE-1976-DreyfusK #design #development
The Preliminary Design as a Key to Successful Software Development (JMD, PJK), pp. 206–213.
SIGMODSIGMOD-1975-FadousF #database #relational
Finding Candidate Keys for Relational Data Bases (RF, JF), pp. 203–210.
SIGMODSIGFIDET-1972-WalkerG #data type #hybrid
Hybrid Trees: A Data Structure for Lists of Keys (WAW, CCG), pp. 189–211.

Bibliography of Software Language Engineering in Generated Hypertext (BibSLEIGH) is created and maintained by Dr. Vadim Zaytsev.
Hosted as a part of SLEBOK on GitHub.