BibSLEIGH
BibSLEIGH corpus
BibSLEIGH tags
BibSLEIGH bundles
BibSLEIGH people
CC-BY
Open Knowledge
XHTML 1.0 W3C Rec
CSS 2.1 W3C CanRec
email twitter
Used together with:
base (579)
use (402)
system (261)
model (241)
analysi (207)

Stem method$ (all stems)

3321 papers:

QoSAQoSA-2015-DurisicST #architecture #identification #set #standard
Identifying Optimal Sets of Standardized Architectural Features: A Method and its Automotive Application (DD, MS, MT), pp. 103–112.
CASECASE-2015-BjorkenstamCL
Exploiting sparsity in the discrete mechanics and optimal control method with application to human motion planning (SB, JSC, BL), pp. 769–774.
CASECASE-2015-DasCQMTMK #automation #monitoring #precise
Devices, systems, and methods for automated monitoring enabling precision agriculture (JD, GC, CQ, AM, PT, YM, VK), pp. 462–469.
CASECASE-2015-HayakawaI #fault #linear #reduction
GPS error range reduction method based on linear kinematic model (TH, MI), pp. 1515–1520.
CASECASE-2015-HolmOFUHAK #evolution #industrial #integration #performance #process
Engineering method for the integration of modules into fast evolving production systems in the process industry (TH, MO, AF, LU, UH, TA, SK), pp. 1042–1047.
CASECASE-2015-KaoLJ #mobile
Application of potential field method and optimal path planning to mobile robot control (CCK, CML, JGJ), pp. 1552–1554.
CASECASE-2015-Lee #locality #mobile #reliability
A reliable range-free indoor localization method for mobile robots (YCL), pp. 720–727.
CASECASE-2015-LiuY #modelling #predict #self
A self-organizing method for predictive modeling with highly-redundant variables (GL, HY), pp. 1084–1089.
CASECASE-2015-LiX #energy #learning #multi
A multi-grid reinforcement learning method for energy conservation and comfort of HVAC in buildings (BL, LX), pp. 444–449.
CASECASE-2015-LuTZ #assessment #design #estimation #industrial #modelling
Model-based temperature estimation methods in design of industrial manipulator and their assessment (QL, GT, JZ), pp. 1242–1248.
CASECASE-2015-WangZ #modelling #predict #simulation
A prediction method for interior temperature of grain storage via dynamics models: A simulation study (DW, XZ), pp. 1477–1483.
CASECASE-2015-YanLP #fault
A fault diagnosis method for HVAC Air Handling Units considering fault propagation (YY, PBL, KRP), pp. 961–966.
DACDAC-2015-DunbarQ
A practical circuit fingerprinting method utilizing observability don’t care conditions (CD, GQ), p. 6.
DACDAC-2015-HelalBH #parallel #simulation #using
Parallel circuit simulation using the direct method on a heterogeneous cloud (AEH, AMB, YYH), p. 6.
DACDAC-2015-SeshiaSS #formal method
Formal methods for semi-autonomous driving (SAS, DS, SSS), p. 5.
DACDAC-2015-WangLYSOC #grid #novel #power management #reduction
Novel power grid reduction method based on L1 regularization (YW, ML, XY, ZS, MO, CC), p. 6.
DACDAC-2015-WangLZYW #architecture #configuration management #control flow
Acceleration of control flows on reconfigurable architecture with a composite method (JW, LL, JZ, SY, SW), p. 6.
DATEDATE-2015-AfacanBPDB #hybrid #monte carlo
A hybrid Quasi Monte Carlo method for yield aware analog circuit sizing tool (EA, GB, AEP, GD, IFB), pp. 1225–1228.
DATEDATE-2015-AwanoHS #named #performance #probability
ECRIPSE: an efficient method for calculating RTN-induced failure probability of an SRAM cell (HA, MH, TS), pp. 549–554.
DATEDATE-2015-FrancqF #detection #hardware
Introduction to hardware trojan detection methods (JF, FF), pp. 770–775.
DATEDATE-2015-KadryKMNSPPJS #case study #comparative #generative #simulation #testing
Comparative study of test generation methods for simulation accelerators (WK, DK, AM, AN, VS, JSP, SBP, WJ, JCS), pp. 321–324.
DATEDATE-2015-LiaperdosAT #detection #estimation #fault #probability #testing
A method for the estimation of defect detection probability of analog/RF defect-oriented tests (JL, AA, YT), pp. 1395–1400.
DATEDATE-2015-LiFBLON #design
Thermal aware design method for VCSEL-based on-chip optical interconnect (HL, AF, SLB, XL, IO, GN), pp. 1120–1125.
DATEDATE-2015-MacherSBAK #analysis #named
SAHARA: a security-aware hazard and risk analysis method (GM, HS, RB, EA, CK), pp. 621–624.
DATEDATE-2015-OyaSYT #classification #identification
A score-based classification method for identifying hardware-trojans at gate-level netlists (MO, YS, MY, NT), pp. 465–470.
DATEDATE-2015-RustP #approximate #design #multi
Design method for multiplier-less two-variable numeric function approximation (JR, SP), pp. 948–953.
DATEDATE-2015-SuHL #encoding #named #recognition #scalability
SubHunter: a high-performance and scalable sub-circuit recognition method with Prüfer-encoding (HYS, CHH, YLL), pp. 1583–1586.
DRRDRR-2015-FuLLQT #diagrams #learning #multi #retrieval
A diagram retrieval method with multi-label learning (SF, XL, LL, JQ, ZT).
HTHT-2015-BerettaMCM #interactive #twitter
An Interactive Method for Inferring Demographic Attributes in Twitter (VB, DM, TC, EM), pp. 113–122.
HTHT-2015-Jain #automation #social
Automated Methods for Identity Resolution across Heterogeneous Social Platforms (PJ), pp. 307–310.
SIGMODSIGMOD-2015-ArulrajPD #database #memory management
Let’s Talk About Storage & Recovery Methods for Non-Volatile Memory Database Systems (JA, AP, SD), pp. 707–722.
VLDBVLDB-2015-KatsarouNT #performance #query #scalability
Performance and Scalability of Indexed Subgraph Query Processing Methods (FK, NN, PT), pp. 1566–1577.
VLDBVLDB-2015-NaidanBN #performance #permutation
Permutation Search Methods are Efficient, Yet Faster Search is Possible (BN, LB, EN), pp. 1618–1629.
ITiCSEITiCSE-2015-ChaudhariD #formal method
Introducing Formal Methods via Program Derivation (DLC, OPD), pp. 266–271.
TACASTACAS-2015-ZengSLH #precise #predict
A Method for Improving the Precision and Coverage of Atomicity Violation Predictions (RZ, ZS, SL, XH), pp. 116–130.
ICSMEICSME-2015-AbidDCM #automation #c++ #generative #natural language #summary #using
Using stereotypes in the automatic generation of natural language summaries for C++ methods (NJA, ND, MLC, JIM), pp. 561–565.
ICSMEICSME-2015-AsaduzzamanRMS #api #parametricity #recommendation
Exploring API method parameter recommendations (MA, CKR, SM, KAS), pp. 271–280.
ICSMEICSME-2015-AsaduzzamanRS #api #named #parametricity #recommendation
PARC: Recommending API methods parameters (MA, CKR, KAS), pp. 330–332.
MSRMSR-2015-BlincoeHD #ecosystem #git #identification #using
Ecosystems in GitHub and a Method for Ecosystem Identification Using Reference Coupling (KB, FH, DD), pp. 202–211.
MSRMSR-2015-WuMKGI #consistency #detection #nondeterminism #open source #scalability
A Method to Detect License Inconsistencies in Large-Scale Open Source Projects (YW, YM, TK, DMG, KI), pp. 324–333.
SANERSANER-2015-HashimotoMI #fine-grained #scalability #source code
A comprehensive and scalable method for analyzing fine-grained source code change patterns (MH, AM, TI), pp. 351–360.
SCAMSCAM-2015-GhafariGR #automation #identification #testing
Automatically identifying focal methods under test in unit test cases (MG, CG, KR), pp. 61–70.
SCAMSCAM-2015-SteidlD #how #java #question
How do Java methods grow? (DS, FD), pp. 151–160.
SASSAS-2015-RapoportLT #analysis #correlation #data flow #precise
Precise Data Flow Analysis in the Presence of Correlated Method Calls (MR, OL, FT), pp. 54–71.
STOCSTOC-2015-AmbainisFG #matrix #multi #performance
Fast Matrix Multiplication: Limitations of the Coppersmith-Winograd Method (AA, YF, FLG), pp. 585–593.
STOCSTOC-2015-BarakKS #composition #learning #taxonomy
Dictionary Learning and Tensor Decomposition via the Sum-of-Squares Method (BB, JAK, DS), pp. 143–151.
STOCSTOC-2015-FearnleyS #complexity
The Complexity of the Simplex Method (JF, RS), pp. 201–208.
CIAACIAA-2015-Hulden #automaton #finite #regular expression
From Two-Way to One-Way Finite Automata — Three Regular Expression-Based Methods (MH), pp. 176–187.
ICALPICALP-v1-2015-BhattacharyaHI #algorithm #design
Design of Dynamic Algorithms via Primal-Dual Method (SB, MH, GFI), pp. 206–218.
CHICHI-2015-Clarke #design
The Work of Mad Men that Makes the Methods of Math Men Work: Practically Occasioned Segment Design (MFC), pp. 3275–3284.
CHICHI-2015-JokinenSPS #validation
Quick Affective Judgments: Validation of a Method for Primed Product Comparisons (JPPJ, JMS, PMHP, PS), pp. 2221–2230.
CHICHI-2015-JonesCDTPDH #delphi #information management #using
“For Telling” the Present: Using the Delphi Method to Understand Personal Information Management Practices (WJ, RC, AD, JT, MAPQ, JDD, BMH), pp. 3513–3522.
CHICHI-2015-OLearyEKVRP #approach #comprehension #design #health #trade-off
Understanding Design Tradeoffs for Health Technologies: A Mixed-Methods Approach (KO, JE, LK, LMV, JDR, WP), pp. 4151–4160.
HCIDHM-EH-2015-NakamuraYTLK
The Digital Reminiscence Method: Effect on Dementia in Japanese Day Care Centers (MN, TY, KT, ML, NK), pp. 482–489.
HCIDHM-EH-2015-UchidaHKEMOUG #analysis #process #using
Process Analysis of the Hand Lay-Up Method Using CFRP Prepreg Sheets (TU, HH, KK, AE, MM, JO, TU, AG), pp. 227–236.
HCIDHM-EH-2015-YamamotoABKGO
Caregiver’s Eye Gaze and Field of View Presumption Method During Bathing Care in Elderly Facility (AY, TA, HCBJ, NK, AG, TO), pp. 524–532.
HCIDHM-HM-2015-EndoKSOTGH #case study
Study on Method of Observing Maki-e Crafts Work in Urushi Craftspeople (AE, NK, YS, IO, YT, AG, HH), pp. 35–45.
HCIDHM-HM-2015-KikuchiSTGH #information management
An Investigation on Conversion from Tacit Knowledge to Explicit Knowledge in Hand Lay-Up Fabrication Method (TK, ES, YT, AG, HH), pp. 114–123.
HCIDHM-HM-2015-KikuchiSZTGH #quantifier
Effects of Quantified Instructional Tool on Spray-up Fabrication Method (TK, ES, YZ, YT, AG, HH), pp. 104–113.
HCIDHM-HM-2015-MigakiOTMKIH #experience
The Relationship Between Mechanical Properties and the Method Technique of GFRP Plate by Hand Lay-up Method: Effect of the Workers Experience (MM, KO, RT, YM, EK, DI, HH), pp. 143–153.
HCIDHM-HM-2015-WangHM #case study
A Study on Characteristic of Calligraphy Characters Part 1 Analytical Method with Computer Technology (ZW, IH, ZM), pp. 419–428.
HCIDUXU-DD-2015-ChasanidouGL #design #tool support
Design Thinking Methods and Tools for Innovation (DC, AAG, EL), pp. 12–23.
HCIDUXU-DD-2015-FilippiBS #design #interactive
Investigating Synergies Between Interaction Design Methods (SF, DB, PAS), pp. 179–190.
HCIDUXU-DD-2015-RenziF #delphi #human-computer
Delphi Method to Explore Future Scenario Possibilities on Technology and HCI (ABR, SFdF), pp. 644–653.
HCIDUXU-IXD-2015-YangWP #empirical #research
New Research Methods for Media and Cognition Experiment Course (YY, SW, LP), pp. 327–334.
HCIHCI-DE-2015-JensenRB #collaboration #design #interactive
An Interaction Design Method to Support the Expression of User Intentions in Collaborative Systems (CJJ, JCdR, RB), pp. 214–226.
HCIHCI-IT-2015-BakaevA #complexity #human-computer #optimisation #user interface
Defining and Optimizing User Interfaces Information Complexity for AI Methods Application in HCI (MB, TA), pp. 397–405.
HCIHCI-IT-2015-GuXCZ #using
To Write not Select, a New Text Entry Method Using Joystick (ZG, XX, CC, YZ), pp. 35–43.
HCIHCI-IT-2015-HuhJIKKP #case study #comparison #interactive
Preliminary Study to Determine a “User-Friendly” Bending Method: Comparison Between Bending and Touch Interaction (BH, HJ, SI, HSK, GK, JP), pp. 175–183.
HCIHCI-IT-2015-MurataMT #comparison
Optimal Scroll Method for Eye-Gaze Input System — Comparison of R-E and R-S Compatibility (AM, MM, YT), pp. 86–93.
HCIHCI-UC-2015-Obwegeser #development #matter #why
Entrepreneurial IS Development: Why Techniques Matter and Methods Don’t (NO), pp. 218–225.
HCIHIMI-IKC-2015-HamaguchiMTKN #design #generative #matrix #using
A Method for Generation and Check of Alarm Configurations Using Cause-Effect Matrices for Plant Alarm System Design (TH, BM, KT, NK, MN), pp. 549–556.
HCIHIMI-IKC-2015-Iwata #difference #learning
Method to Generate an Operation Learning Support System by Shortcut Key Differences in Similar Software (HI), pp. 332–340.
HCIHIMI-IKC-2015-KosakaN #behaviour #education
Education Method for Safe Bicycle Riding to Evaluate Actual Cycling Behaviors When Entering an Intersection (HK, MN), pp. 225–232.
HCIHIMI-IKC-2015-RobertsACC #communication #complexity
A Method for Calculating Air Traffic Controller Communication Complexity (ZR, BA, JC, DC), pp. 25–32.
HCIHIMI-IKC-2015-SturreCVS #assessment #eye tracking #using
Using Eye Movements to Test Assumptions of the Situation Present Assessment Method (LS, DC, KPLV, TZS), pp. 45–52.
HCIHIMI-IKC-2015-UeokaI #development
Development of the Horror Emotion Amplification System by Means of Biofeedback Method (RU, KI), pp. 657–665.
HCIHIMI-IKD-2015-0002S #approach #visualisation
An Approach to Spatial Visualizing Method for Information Structure to Enhance Remember to Look (JGL, DHS), pp. 67–73.
HCIHIMI-IKD-2015-ArgyleLG #evaluation #predict
Evaluation of Data Display Methods in a Flash Flood Prediction Tool (EMA, CL, JJG), pp. 15–22.
HCIHIMI-IKD-2015-HallettASRDJV #case study #comparative #design #usability #web
The Usability of Magnification Methods: A Comparative Study Between Screen Magnifiers and Responsive Web Design (ECH, BA, JS, ZR, WD, TJ, KPLV), pp. 181–189.
HCIHIMI-IKD-2015-IchiharaHIK #behaviour #metric
Presentation Method of Walking Sensation Based on Walking Behavior Measurement with Inertial Sensors and Pressure Sensors (KI, KH, YI, MK), pp. 374–385.
HCIHIMI-IKD-2015-SasajimaOOS #communication #twitter #using #visualisation
Proposal of a Visualization Method to Support Informal Communication Using Twitter Attributes (RS, KO, MO, AS), pp. 107–114.
ICEISICEIS-v1-2015-BousdekisMAM
Supporting the Selection of Prognostic-based Decision Support Methods in Manufacturing (AB, BM, DA, GM), pp. 487–494.
ICEISICEIS-v1-2015-Castanon-PugaSG #algorithm #data mining #fuzzy #logic #mining #mobile #using
Hybrid-Intelligent Mobile Indoor Location Using Wi-Fi Signals — Location Method Using Data Mining Algorithms and Type-2 Fuzzy Logic Systems (MCP, ASC, CGP, GLS, MFP, EAT), pp. 609–615.
ICEISICEIS-v1-2015-VaroneA #multi #using
Multi-modal Transportation with Public Transport and Ride-sharing — Multi-modal Transportation using a Path-based Method (SV, KA), pp. 479–486.
ICEISICEIS-v1-2015-Xylogiannopoulos #detection #roadmap
Discretization Method for the Detection of Local Extrema and Trends in Non-discrete Time Series (KFX, PK, RA), pp. 346–352.
ICEISICEIS-v2-2015-TrujilloOP #authoring #framework #re-engineering #using #validation
Using Technical-Action-Research to Validate a Framework for Authoring Software Engineering Methods (MMT, HO, MP), pp. 15–27.
ICEISICEIS-v3-2015-PepinAAB #legacy
A Method for Business-IT Alignment of Legacy Systems (JP, PA, CA, EB), pp. 229–237.
ICEISICEIS-v3-2015-RiveroC #case study #evaluation #experience #user interface #using
Using a Study to Assess User eXperience Evaluation Methods from the Point of View of Users (LR, TC), pp. 88–95.
ECIRECIR-2015-ValcarcePB #case study #modelling #recommendation
A Study of Smoothing Methods for Relevance-Based Language Modelling of Recommender Systems (DV, JP, AB), pp. 346–351.
ECIRECIR-2015-VieiraSCM #self #web
A Self-training CRF Method for Recognizing Product Model Mentions in Web Forums (HSV, ASdS, MC, ESdM), pp. 257–264.
ICMLICML-2015-AybatWI #distributed #optimisation
An Asynchronous Distributed Proximal Gradient Method for Composite Convex Optimization (NSA, ZW, GI), pp. 2454–2462.
ICMLICML-2015-BoutsidisKG #clustering
Spectral Clustering via the Power Method — Provably (CB, PK, AG), pp. 40–48.
ICMLICML-2015-ChazalFLMRW #persistent
Subsampling Methods for Persistent Homology (FC, BF, FL, BM, AR, LAW), pp. 2143–2151.
ICMLICML-2015-EneN #coordination #random
Random Coordinate Descent Methods for Minimizing Decomposable Submodular Functions (AE, HLN), pp. 787–795.
ICMLICML-2015-GarberH #performance #set
Faster Rates for the Frank-Wolfe Method over Strongly-Convex Sets (DG, EH), pp. 541–549.
ICMLICML-2015-GhoshdastidarD #clustering
A Provable Generalized Tensor Spectral Method for Uniform Hypergraph Partitioning (DG, AD), pp. 400–409.
ICMLICML-2015-GongY #analysis #convergence #memory management
A Modified Orthant-Wise Limited Memory Quasi-Newton Method with Convergence Analysis (PG, JY), pp. 276–284.
ICMLICML-2015-LimKPJ #performance #scalability #set
Double Nyström Method: An Efficient and Accurate Nyström Scheme for Large-Scale Data Sets (WL, MK, HP, KJ), pp. 1367–1375.
ICMLICML-2015-NaessethLS #monte carlo
Nested Sequential Monte Carlo Methods (CAN, FL, TBS), pp. 1292–1301.
ICMLICML-2015-TheisH #probability #streaming
A trust-region method for stochastic variational inference with applications to streaming data (LT, MDH), pp. 2503–2511.
ICMLICML-2015-ZhangL #coordination #empirical #probability
Stochastic Primal-Dual Coordinate Method for Regularized Empirical Risk Minimization (YZ, XL), pp. 353–361.
ICMLICML-2015-ZhaoYZL #adaptation #multi #probability
Adaptive Stochastic Alternating Direction Method of Multipliers (PZ, JY, TZ, PL), pp. 69–77.
ICMLICML-2015-ZhouZS #analysis #bound #convergence #fault #first-order
ℓ₁,p-Norm Regularization: Error Bounds and Convergence Rate Analysis of First-Order Methods (ZZ, QZ, AMCS), pp. 1501–1510.
KDDKDD-2015-GleichM #algorithm #graph #learning #using
Using Local Spectral Methods to Robustify Graph-Based Learning Algorithms (DFG, MWM), pp. 359–368.
KDDKDD-2015-Gomez-Rodriguez #machine learning #modelling #network #probability #problem #research #social
Diffusion in Social and Information Networks: Research Problems, Probabilistic Models and Machine Learning Methods (MGR, LS), pp. 2315–2316.
KDDKDD-2015-KadkhodaieCSB #multi
Accelerated Alternating Direction Method of Multipliers (MK, KC, MS, AB), pp. 497–506.
KDDKDD-2015-NikolaevDGUGS #composition #evaluation #online
Extreme States Distribution Decomposition Method for Search Engine Online Evaluation (KN, AD, EG, AU, GG, PS), pp. 845–854.
MLDMMLDM-2015-Prado #classification #named
MOGACAR: A Method for Filtering Interesting Classification Association Rules (DBP), pp. 172–183.
MLDMMLDM-2015-TanGZ #incremental #kernel #named
IKLTSA: An Incremental Kernel LTSA Method (CT, JG, SZ), pp. 70–83.
SEKESEKE-2015-AlencarARRB #rule-based
A Rule-based Method for Discovering Trajectory Profiles (LAdA, LOA, CR, AR, VB), pp. 244–249.
SEKESEKE-2015-CavalcanteRC #experience #named #user interface
MAX: A Method for Evaluating the Post-use User eXperience through Cards and a Board (EC, LR, TC), pp. 495–500.
SEKESEKE-2015-CostaSRSAP #collaboration #nearest neighbour
A Collaborative Method to Reduce the Running Time and Accelerate the k-Nearest Neighbors Search (AAMC, RRdS, FBAR, GS, HOdA, AP), pp. 105–109.
SEKESEKE-2015-SchreiberMRM #comprehension #named #object-oriented #source code
TAGGINGSENSE: Method Based On Sensemaking For Object-Oriented Source Code Comprehension (DS, ALAM, SSR, AM), pp. 278–283.
SEKESEKE-2015-VacariP #agile #bibliography #perspective
Adopting Agile Methods in the Public Sector: A Systematic Literature Review (IV, RP), pp. 709–714.
SEKESEKE-2015-WangKN #feature model #re-engineering
Stability of Three Forms of Feature Selection Methods on Software Engineering Data (HW, TMK, AN), pp. 385–390.
SEKESEKE-2015-XuZHX
A Balanced Method for Budgeted Influence Maximization (XX, YZ, QH, CX), pp. 250–255.
SIGIRSIGIR-2015-GwizdkaoMW #information retrieval #research
NeuroIR 2015: Neuro-Physiological Methods in IR Research (JG, JMJ, JM, MW), pp. 1151–1153.
SIGIRSIGIR-2015-LiCLPK #named #ranking #recommendation
Rank-GeoFM: A Ranking based Geographical Factorization Method for Point of Interest Recommendation (XL, GC, XL, TANP, SK), pp. 433–442.
MoDELSMoDELS-2015-FarwickSBH #architecture #automation #documentation #enterprise
A situational method for semi-automated enterprise architecture documentation (SoSyM abstract) (MF, CMS, RB, IH), p. 448.
REFSQREFSQ-2015-VriezekolkEW #assessment #risk management #validation
Experimental Validation of a Risk Assessment Method (EV, SE, RW), pp. 1–16.
SACSAC-2015-AlvesMM #case study #detection #fault #impact analysis #refactoring #test coverage
Test coverage and impact analysis for detecting refactoring faults: a study on the extract method refactoring (ELGA, TM, PDdLM), pp. 1534–1540.
SACSAC-2015-BarbieriTPG #named #representation #video #visual notation
Shot-HR: a video shot representation method based on visual features (TTSB, THT, MPPJ, RG), pp. 1257–1262.
SACSAC-2015-BezuBRVVF #component #detection #multi #similarity #web
Multi-component similarity method for web product duplicate detection (RvB, SB, RR, JV, DV, FF), pp. 761–768.
SACSAC-2015-KhelladiBBLG #consistency #framework #process #verification
A framework to formally verify conformance of a software process to a software method (DEK, RB, SB, YL, MPG), pp. 1518–1525.
SACSAC-2015-MatuszykVSJG #incremental #matrix #recommendation
Forgetting methods for incremental matrix factorization in recommender systems (PM, JV, MS, AMJ, JG), pp. 947–953.
SACSAC-2015-MergelSS #mining #string #visual notation
A method to support search string building in systematic literature reviews through visual text mining (GDM, MSS, TSdS), pp. 1594–1601.
SACSAC-2015-OmatuYI #classification #learning #smell
Smell classification of wines by the learning vector quantization method (SO, MY, YI), pp. 195–200.
ESEC-FSEESEC-FSE-2015-AllamanisBBS
Suggesting accurate method and class names (MA, ETB, CB, CAS), pp. 38–49.
ESEC-FSEESEC-FSE-2015-GreenyerHMB #analysis #re-engineering #requirements
Evaluating a formal scenario-based method for the requirements analysis in automotive software engineering (JG, MH, JM, RB), pp. 1002–1005.
ESEC-FSEESEC-FSE-2015-ZhengMZ #capacity #constraints #identification #problem #process
A method to identify and correct problematic software activity data: exploiting capacity constraints and data redundancies (QZ, AM, MZ), pp. 637–648.
ICSEICSE-v1-2015-Ben-DavidSAB #model checking #product line #requirements #satisfiability #using
Symbolic Model Checking of Product-Line Requirements Using SAT-Based Methods (SBD, BS, JMA, SB), pp. 189–199.
ICSEICSE-v1-2015-MorenoBPOM #how #question
How Can I Use This Method? (LM, GB, MDP, RO, AM), pp. 880–890.
ICSEICSE-v1-2015-YiYLZW #analysis #testing
A Synergistic Analysis Method for Explaining Failed Regression Tests (QY, ZY, JL, CZ, CW), pp. 257–267.
ICSEICSE-v2-2015-GuerroujBR #documentation
Leveraging Informal Documentation to Summarize Classes and Methods in Context (LG, DB, PCR), pp. 639–642.
ICSEICSE-v2-2015-MaplesdenRTHG #analysis #case study #industrial #performance #using
Performance Analysis Using Subsuming Methods: An Industrial Case Study (DM, KvR, EDT, JGH, JCG), pp. 149–158.
ICSEICSE-v2-2015-MenziesMP #data analysis
The Art and Science of Analyzing Software Data; Quantitative Methods (TM, LLM, FP), pp. 959–960.
SPLCSPLC-2015-ValovGC #comparison #empirical #performance #predict #variability
Empirical comparison of regression methods for variability-aware performance prediction (PV, JG, KC), pp. 186–190.
PPoPPPPoPP-2015-SeoKK #graph #named #scalability #streaming
GStream: a graph streaming processing method for large-scale graphs on GPUs (HS, JK, MSK), pp. 253–254.
CADECADE-2015-BalbianiB #composition #logic #parallel
Tableaux Methods for Propositional Dynamic Logics with Separating Parallel Composition (PB, JB), pp. 539–554.
CADECADE-2015-ChocronFR #revisited
A Polite Non-Disjoint Combination Method: Theories with Bridging Functions Revisited (PC, PF, CR), pp. 419–433.
ICLPICLP-2015-Harrison #formal method #programming #set
Formal Methods for Answer Set Programming (AH).
TAPTAP-2015-MoreiraHDMNM #case study #code generation #testing #tool support #using #verification
Verifying Code Generation Tools for the B-Method Using Tests: A Case Study (AMM, CH, DD, ECBdM, JBSN, VdMJ), pp. 76–91.
CBSECBSE-2014-Dustdar
Principles and methods for elastic computing (SD), pp. 1–2.
CBSECBSE-2014-KurodaYKKM #memory management
A memory isolation method for OSGi-based home gateways (YK, IY, SK, YK, OM), pp. 117–122.
ECSAECSA-2014-RekhaM #architecture
Suitability of Software Architecture Decision Making Methods for Group Decisions (VSR, HM), pp. 17–32.
QoSAQoSA-2014-OlssonTWE #architecture #consistency #evaluation #game studies
Evaluation of a static architectural conformance checking method in a line of computer games (TO, DT, AW, ME), pp. 113–118.
WICSAWICSA-2014-SeeleSB #architecture #functional #modelling #web
The Functional Architecture Modeling Method Applied on Web Browsers (WS, SS, SB), pp. 171–174.
CASECASE-2014-ChiuC #bound #detection #image
A variance-reduction method for thyroid nodule boundary detection on ultrasound images (LYC, AC), pp. 681–685.
CASECASE-2014-ChowJCN #novel
A novel vision guided knot-tying method for autonomous robotic surgery (DLC, RCJ, MCC, WSN), pp. 504–508.
CASECASE-2014-LeePP #locality #using
Coarse-to-fine robot localization method using radio fingerprint and Particle Filter (YCL, BP, SP), pp. 290–296.
CASECASE-2014-LiuLS #monitoring
A wavelet-based characteristic vector construction method for machining condition monitoring (CL, YL, WS), pp. 304–308.
CASECASE-2014-LiuXL #approximate #capacity
A queuing approximation method for capacity planning of emergency department with time-varying demand (QL, XX, RL), pp. 558–563.
CASECASE-2014-ParkLH #generative #performance #using
Trajectory generation method using Bézier spiral curves for high-speed on-road autonomous vehicles (BP, YCL, WYH), pp. 927–932.
CASECASE-2014-ShiWS #approximate #matrix
Approximation method to rank-one binary matrix factorization (ZS, LW, LS), pp. 800–805.
CASECASE-2014-XuJGX #energy #scalability
A new method to solve large-scale building energy management for energy saving (ZX, QSJ, XG, XX), pp. 940–945.
CASECASE-2014-YanZJCC #3d #metric
Hall-sensor-based orientation measurement method in three-dimensional space for electromagnetic actuators (LY, BZ, ZJ, CYC, IMC), pp. 182–187.
CASECASE-2014-ZhaoUH #divide and conquer #flexibility #synthesis
A divide-and-conquer method for the synthesis of non-blocking supervisors for flexible manufacturing systems (MZ, MU, YH), pp. 455–460.
DACDAC-2014-LiuF
A Time-Unrolling Method to Compute Sensitivity of Dynamic Systems (FL, PF), p. 6.
DACDAC-2014-LuCCSHTC #named #using
ePlace: Electrostatics Based Placement Using Nesterov’s Method (JL, PC, CCC, LS, DJHH, CCT, CKC), p. 6.
DACDAC-2014-RaoGHC #artificial reality #design
Design Methods for Augmented Reality In-Vehicle Infotainment Systems (QR, CG, MH, SC), p. 6.
DACDAC-2014-WaksmanRSS #analysis #assessment #functional #identification
A Red Team/Blue Team Assessment of Functional Analysis Methods for Malicious Circuit Identification (AW, JR, MS, SS), p. 4.
DACDAC-2014-ZhangYYX #approximate #framework #named
ApproxIt: An Approximate Computing Framework for Iterative Methods (QZ, FY, RY, QX), p. 6.
DATEDATE-2014-BahrebarS #approach #network
Improving hamiltonian-based routing methods for on-chip networks: A turn model approach (PB, DS), pp. 1–4.
DATEDATE-2014-FerentD #comparison #mining #novel #synthesis #using
Novel circuit topology synthesis method using circuit feature mining and symbolic comparison (CF, AD), pp. 1–4.
DATEDATE-2014-NoursPB #architecture #evaluation #manycore #performance
A dynamic computation method for fast and accurate performance evaluation of multi-core architectures (SLN, AP, NWB), pp. 1–6.
DocEngDocEng-2014-DavisonMM #named #privacy #semantics #similarity
P-GTM: privacy-preserving google tri-gram method for semantic text similarity (OD, AM, EEM), pp. 81–84.
DRRDRR-2014-LiPLD #analysis #online #verification
On-line signature verification method by Laplacian spectral analysis and dynamic time warping (CL, LP, CL, XD), p. ?–10.
HTHT-2014-Abdel-HafezXJ #generative #rating
A rating aggregation method for generating product reputations (AAH, YX, AJ), pp. 291–293.
SIGMODSIGMOD-2014-ZengGMZ #approximate #estimation #fault #performance #query
The analytical bootstrap: a new method for fast error estimation in approximate query processing (KZ, SG, BM, CZ), pp. 277–288.
VLDBVLDB-2014-XuCC #clustering #graph #named
LogGP: A Log-based Dynamic Graph Partitioning Method (NX, LC, BC), pp. 1917–1928.
ITiCSEITiCSE-2014-Jasute #education #geometry #interactive #learning #visualisation
An interactive visualization method of constructionist teaching and learning of geometry (EJ), p. 349.
ITiCSEITiCSE-2014-MI #bound #query
A method to prove query lower bounds (JM, SI), pp. 81–86.
SANERCSMR-WCRE-2014-KashiwabaraOIHYI #mining #recommendation #using
Recommending verbs for rename method using association rule mining (YK, YO, TI, YH, TY, KI), pp. 323–327.
ICPCICPC-2014-GuptaS #program analysis #quality
A semiautomated method for classifying program analysis rules into a quality model (SG, HKS), pp. 266–270.
ICPCICPC-2014-GuptaSVU #assessment #industrial #named #quality #scalability
SCQAM: a scalable structured code quality assessment method for industrial software (SG, HKS, RDV, UU), pp. 244–252.
ICPCICPC-2014-MatsumuraIKI #execution #java #performance #visualisation
Repeatedly-executed-method viewer for efficient visualization of execution paths and states in Java (TM, TI, YK, KI), pp. 253–257.
ICPCICPC-2014-McBurneyM #automation #documentation #generative #source code #summary
Automatic documentation generation via source code summarization of method context (PWM, CM), pp. 279–290.
ICPCICPC-2014-SilvaTV #automation #recommendation #refactoring
Recommending automated extract method refactorings (DS, RT, MTV), pp. 146–156.
ICPCICPC-2014-SuzukiSIH #approach #modelling #n-gram #using
An approach for evaluating and suggesting method names using n-gram models (TS, KS, FI, SH), pp. 271–274.
ICSMEICSME-2014-LandmanSV #analysis #corpus #empirical #java #scalability
Empirical Analysis of the Relationship between CC and SLOC in a Large Corpus of Java Methods (DL, AS, JJV), pp. 221–230.
SCAMSCAM-2014-LozanoNJ #why
Explaining Why Methods Change Together (AL, CN, VJ), pp. 185–194.
SCAMSCAM-2014-YoshidaH #c #semiparsing #source code #syntax
A Pattern Search Method for Unpreprocessed C Programs Based on Tokenized Syntax Trees (AY, YH), pp. 295–304.
AFLAFL-2014-Crespi-ReghizziP #commutative #composition
Commutative Languages and their Composition by Consensual Methods (SCR, PSP), pp. 216–230.
FMFM-2014-BjornerH #formal method #question
40 Years of Formal Methods — Some Obstacles and Some Possibilities? (DB, KH), pp. 42–61.
FMFM-2014-FreitasW #formal method #proving
Proof Patterns for Formal Methods (LF, IW), pp. 279–295.
IFMIFM-2014-TofanSR #composition #multi #proving
A Compositional Proof Method for Linearizability Applied to a Wait-Free Multiset (BT, GS, WR), pp. 357–372.
ICFPICFP-2014-Fisher #formal method #using
Using formal methods to enable more secure vehicles: DARPA’s HACMS program (KF), p. 1.
CHICHI-2014-DixonLF #implementation #runtime
Pixel-based methods for widget state and style in a runtime implementation of sliding widgets (MED, GL, JAF), pp. 2231–2240.
CHICHI-2014-YueLCSBGSZ #experience #research
Photographing information needs: the role of photos in experience sampling method-style research (ZY, EL, CJC, JS, KB, ZG, NS, G(Z), pp. 1545–1554.
CSCWCSCW-2014-SaveryGGB #consistency #experience #game studies #maintenance #performance
The effects of consistency maintenance methods on player experience and performance in networked games (CS, TCNG, CG, MB), pp. 1344–1355.
CSCWCSCW-2014-ShiltonKF #how #social
How to see values in social computing: methods for studying values dimensions (KS, JAK, KRF), pp. 426–435.
HCIDHM-2014-KikuchiTTGH #information management
Biomechanics Investigation of Skillful Technician in Spray-up Fabrication Method — Converting Tacit Knowledge to Explicit Knowledge in the Fiber Reinforced Plastics Molding (TK, YT, YT, AG, HH), pp. 24–34.
HCIDHM-2014-Kull #using
Using the Critical Path Method in Analyzing the Interdependencies of Critical Services — Feasibility Study (AK), pp. 620–629.
HCIDHM-2014-YamamotoKGOAYB
Caregiver’s Gaze and Field of View Presumption Method During Bath Care in the Elderly Facility (AY, NK, AG, TO, TA, SY, HBJ), pp. 78–87.
HCIDHM-2014-YangZYHZL #design
Based on Upper Extremity Comfort ROM of Ergonomic Methods for Household Products Design (FY, QXZ, AY, HH, XZ, ZQL), pp. 167–173.
HCIDUXU-DI-2014-GencerBZV #detection #machine learning #mobile
Detection of Churned and Retained Users with Machine Learning Methods for Mobile Applications (MG, GB, ÖZ, TV), pp. 234–245.
HCIDUXU-DI-2014-MonatBL #visual notation
Taking Decisions with Systems Oriented to the General Public — Applying Visual Information Based on Viennese Method (ASM, MB, RCL), pp. 463–471.
HCIDUXU-DI-2014-PalomakiHVH #bibliography #mobile #perspective #process
Methods to Study Everyday Activities in a Mobile Work Context — A Literature Overview (EP, KH, MV, MH), pp. 301–312.
HCIDUXU-DI-2014-RugenhagenH #design #development #game studies #research
Game Design Techniques in User Research Methods — A New Way to Reach the High Score in Development Teams (ER, TH), pp. 754–762.
HCIDUXU-DP-2014-Gatsou #generative
From Inexperienced Users to Co-creators: An Exploration of a Generative Method (CG), pp. 244–252.
HCIDUXU-DP-2014-Schall14a
New Methods for Measuring Emotional Engagement (AS), pp. 347–357.
HCIDUXU-TMT-2014-GoodeLSGB #approach #research
A Mixed-Method Approach for In-Depth Contextual User Research (AWG, CL, AS, RG, VB), pp. 86–95.
HCIDUXU-TMT-2014-HeimgartnerS #agile #design #human-computer #using
Using Agile Methods in Intercultural HCI Design Projects (RH, AS), pp. 123–129.
HCIDUXU-TMT-2014-HeimgartnerSH #agile #usability #using
Enhancing Usability Engineering in Rural Areas Using Agile Methods (RH, AS, BH), pp. 445–452.
HCIDUXU-TMT-2014-JerzakR #evaluation #game studies #heuristic
Serious Games and Heuristic Evaluation — The Cross-Comparison of Existing Heuristic Evaluation Methods for Games (NJ, FR), pp. 453–464.
HCIDUXU-TMT-2014-SakamotoM #elicitation #interactive #mobile #named #perspective #requirements
M4REMAIP: Method for Requirements Elicitation Based on Mobile Applications under an Interaction Perspective (SGS, LCdM), pp. 74–85.
HCIDUXU-TMT-2014-SchmidtKGSGW #education
Bridging the Gap — Methods and Teaching of F-A-S-T — Framing-Art-Science- Technology (DS, GK, SG, CS, RG, MW), pp. 589–600.
HCIDUXU-TMT-2014-SchmuntzschF #design #how #smarttech
How Two become One — Creating Synergy Effects by Applying the Joint Interview Method to Design Wearable Technology (US, LHF), pp. 173–184.
HCIDUXU-TMT-2014-SilvaMLO #quality #usability #user interface
Evaluating Quality and Usability of the User Interface: A Practical Study on Comparing Methods with and without Users (CMS, VM, RL, MLLRO), pp. 318–328.
HCIHCI-AIMT-2014-KashimaMY #programming
Proposal of a Method to Measure Difficulty Level of Programming Code with Eye-Tracking (TK, SM, SY), pp. 264–272.
HCIHCI-AIMT-2014-NakaI #communication #effectiveness #generative #gesture
Proposal of the Effective Method of Generating Characteristic Gestures in Nonverbal Communication (TN, TI), pp. 102–112.
HCIHCI-AIMT-2014-YanikTMMBGW #gesture #learning
A Method for Lifelong Gesture Learning Based on Growing Neural Gas (PMY, AT, JM, JM, JOB, KEG, IDW), pp. 191–202.
HCIHCI-AS-2014-TeracineM #assessment #usability #web
Proposals for an Assessment Method of Accessibility and Usability in Web Software (ECT, FCM), pp. 80–89.
HCIHCI-TMT-2014-LiXTW #research #visual notation
Color Saliency Research on Visual Perceptual Layering Method (JL, CX, WT, XW), pp. 86–97.
HCIHCI-TMT-2014-MatsumotoKKA #adaptation #automation #learning #student #word
Evaluating an Automatic Adaptive Delivery Method of English Words Learning Contents for University Students in Science and Technology (SM, TK, TK, MA), pp. 510–520.
HCIHCI-TMT-2014-MauesB
Reflections on the Cross-Platform Semiotic Inspection Method (RdAM, SDJB), pp. 533–544.
HCIHCI-TMT-2014-MayasHRK #testing #usability
Evaluating Methods and Equipment for Usability Field Tests in Public Transport (CM, SH, CR, HK), pp. 545–553.
HCIHCI-TMT-2014-MotylF #comparison #design #generative #idea
Comparison of Creativity Enhancement and Idea Generation Methods in Engineering Design Training (BM, SF), pp. 242–250.
HCIHCI-TMT-2014-YajimaTS #collaboration #learning
Proposal of Collaborative Learning Support Method in Risk Communications (HY, NT, RS), pp. 457–465.
HCIHIMI-AS-2014-AlkhateebHH #comprehension #using
The Effects of Using Kit-Build Method to Support Reading Comprehension of EFL (MA, YH, TH), pp. 3–11.
HCIHIMI-AS-2014-JangKJS #analysis #framework #reliability
A Framework of Human Reliability Analysis Method Considering Soft Control in Digital Main Control Rooms (IJ, ARK, WJ, PHS), pp. 335–346.
HCIHIMI-DE-2014-FukuzumiYTYYK
A New Computational Method for Single-Trial-EEG-Based BCI — Proposal of the Number of Electrodes (SF, HY, KT, TY, TY, KK), pp. 148–156.
HCIHIMI-DE-2014-LinKT #analysis #collaboration #design #learning
A Learning Method for Product Analysis in Product Design — Learning Method of Product Analysis Utilizing Collaborative Learning and a List of Analysis Items (HL, HK, TT), pp. 503–513.
HCIHIMI-DE-2014-SugayaNT #clustering #recognition #using
Enhancement of Accuracy of Hand Shape Recognition Using Color Calibration by Clustering Scheme and Majority Voting Method (TS, HN, HT), pp. 251–260.
HCIHIMI-DE-2014-UedaA14a #twitter
Suggestion of Operation Method of the Interest Shift Model of the Twitter User (YU, YA), pp. 664–677.
AdaEuropeAdaEurope-2014-IliasovLR #approach #formal method
Practical Formal Methods in Railways — The SafeCap Approach (AI, IL, AR), pp. 177–192.
CAiSECAiSE-2014-VlaanderenDB #incremental
Finding Optimal Plans for Incremental Method Engineering (KV, FD, SB), pp. 640–655.
ICEISICEIS-v1-2014-ChinoGRTT #named #scalability
TrieMotif — A New and Efficient Method to Mine Frequent K-Motifs from Large Time Series (DYTC, RRdVG, LASR, CTJ, AJMT), pp. 60–69.
ICEISICEIS-v2-2014-BarretoFSJ #formal method #petri net #using
A Straightforward Introduction to Formal Methods Using Coloured Petri Nets (FMB, JCJdF, MSS, SJ), pp. 145–152.
ICEISICEIS-v2-2014-PfisterHN #agile #concurrent #design #diagrams #framework #metamodelling #modelling #synthesis #towards #visual notation
A Framework for Concurrent Design of Metamodels and Diagrams — Towards an Agile Method for the Synthesis of Domain Specific Graphical Modeling Languages (FP, MH, CN), pp. 298–306.
ICEISICEIS-v2-2014-VieiraJF #analysis #network
A Risk Analysis Method for Selecting Service Providers in P2P Service Overlay Networks (RGV, OCAJ, AF), pp. 477–488.
ICEISICEIS-v3-2014-RibeiroS #case study #evaluation #usability
A Study on the Use of Personas as a Usability Evaluation Method (TR, PdS), pp. 168–175.
CIKMCIKM-2014-LiangZHGB #identification #named #novel #sentiment #word
CONR: A Novel Method for Sentiment Word Identification (JL, XZ, YH, LG, SB), pp. 1943–1946.
CIKMCIKM-2014-PaikO #fixpoint #query
A Fixed-Point Method for Weighting Terms in Verbose Informational Queries (JHP, DWO), pp. 131–140.
CIKMCIKM-2014-SongG #difference #named #privacy #query
Aroma: A New Data Protection Method with Differential Privacy and Accurate Query Answering (CS, TG), pp. 1569–1578.
ECIRECIR-2014-NainiA #feature model #learning #rank
Exploiting Result Diversification Methods for Feature Selection in Learning to Rank (KDN, ISA), pp. 455–461.
ICMLICML-c1-2014-AzadiS #multi #probability #towards
Towards an optimal stochastic alternating direction method of multipliers (SA, SS), pp. 620–628.
ICMLICML-c1-2014-LinX #adaptation #continuation #optimisation
An Adaptive Accelerated Proximal Gradient Method and its Homotopy Continuation for Sparse Optimization (QL, LX), pp. 73–81.
ICMLICML-c1-2014-LiuJL #approximate #kernel #performance #using
Efficient Approximation of Cross-Validation for Kernel Methods using Bouligand Influence Function (YL, SJ, SL), pp. 324–332.
ICMLICML-c1-2014-Suzuki #coordination #multi #probability
Stochastic Dual Coordinate Ascent with Alternating Direction Method of Multipliers (TS), pp. 736–744.
ICMLICML-c1-2014-YogatamaS #multi #word
Making the Most of Bag of Words: Sentence Regularization with Alternating Direction Method of Multipliers (DY, NAS), pp. 656–664.
ICMLICML-c1-2014-ZhongK #multi #performance #probability
Fast Stochastic Alternating Direction Method of Multipliers (WZ, JTYK), pp. 46–54.
ICMLICML-c2-2014-BalleHP #comparison #empirical #learning #probability
Methods of Moments for Learning Stochastic Languages: Unified Presentation and Empirical Comparison (BB, WLH, JP), pp. 1386–1394.
ICMLICML-c2-2014-Bou-AmmarERT #learning #multi #online #policy
Online Multi-Task Learning for Policy Gradient Methods (HBA, EE, PR, MET), pp. 1206–1214.
ICMLICML-c2-2014-CarlssonMRS #clustering #network #symmetry
Hierarchical Quasi-Clustering Methods for Asymmetric Networks (GEC, FM, AR, SS), pp. 352–360.
ICMLICML-c2-2014-CortesKM #predict
Ensemble Methods for Structured Prediction (CC, VK, MM), pp. 1134–1142.
ICMLICML-c2-2014-DefazioDC #big data #incremental #named #performance #problem
Finito: A faster, permutable incremental gradient method for big data problems (AD, JD, TSC), pp. 1125–1133.
ICMLICML-c2-2014-ShamirS0 #approximate #distributed #optimisation #using
Communication-Efficient Distributed Optimization using an Approximate Newton-type Method (OS, NS, TZ), pp. 1000–1008.
ICMLICML-c2-2014-Sohl-DicksteinPG #optimisation #performance #probability #scalability
Fast large-scale optimization by unifying stochastic gradient and quasi-Newton methods (JSD, BP, SG), pp. 604–612.
ICMLICML-c2-2014-ToulisAR #analysis #linear #modelling #probability #statistics
Statistical analysis of stochastic gradient methods for generalized linear models (PT, EA, JR), pp. 667–675.
ICPRICPR-2014-AghdamPS #adaptation #probability #segmentation
Adaptive Probabilistic Thresholding Method for Accurate Breast Region Segmentation in Mammograms (HHA, DP, AS), pp. 3357–3362.
ICPRICPR-2014-CadoniLG #case study #comparative #multimodal #recognition
Iconic Methods for Multimodal Face Recognition: A Comparative Study (MC, AL, EG), pp. 4612–4617.
ICPRICPR-2014-ChironGM #behaviour #parametricity #using
Discovering Emergent Behaviors from Tracks Using Hierarchical Non-parametric Bayesian Methods (GC, PGK, MM), pp. 2185–2190.
ICPRICPR-2014-DahlCB #image #multi #segmentation #using
Multiphase Image Segmentation Using the Deformable Simplicial Complex Method (VAD, ANC, JAB), pp. 1002–1007.
ICPRICPR-2014-DuanHZCZ #image #segmentation #using
A Two-Stage Image Segmentation Method Using Euler’s Elastica Regularized Mumford-Shah Model (YD, WH, JZ, HC, TZ), pp. 118–123.
ICPRICPR-2014-DuCZ #aspect-oriented #identification #using
A Product Aspects Identification Method by Using Translation-Based Language Model (JD, WC, XZ), pp. 2790–2795.
ICPRICPR-2014-FernandezT #analysis #documentation #layout
EM-Based Layout Analysis Method for Structured Documents (FCF, ORT), pp. 315–320.
ICPRICPR-2014-FuKGYZ #ranking
Binary Code Reranking Method Based on Bit Importance (HF, XK, YG, XY, LZ), pp. 2679–2684.
ICPRICPR-2014-GongWLT #consistency #video
Temporal Consistency Based Method for Blind Video Deblurring (WG, WW, WL, ST), pp. 861–864.
ICPRICPR-2014-HedjamCK #detection #documentation #energy #image #multi #self
Constrained Energy Maximization and Self-Referencing Method for Invisible Ink Detection from Multispectral Historical Document Images (RH, MC, MK), pp. 3026–3031.
ICPRICPR-2014-HuangZLW #distance #feature model
A Method of Discriminative Information Preservation and In-Dimension Distance Minimization Method for Feature Selection (SH, JZ, XL, LW), pp. 1615–1620.
ICPRICPR-2014-IshaqEW #evaluation #performance
An Evaluation of the Faster STORM Method for Super-resolution Microscopy (OI, JE, CW), pp. 4435–4440.
ICPRICPR-2014-KhanVP #multi #visual notation
A Generalized Search Method for Multiple Competing Hypotheses in Visual Tracking (MHK, MFV, TPP), pp. 2245–2250.
ICPRICPR-2014-KondoriYOLL #3d
A Direct Method for 3D Hand Pose Recovery (FAK, SY, AO, LL, HL), pp. 345–350.
ICPRICPR-2014-LiCGW #hybrid #interactive #recognition #using
A Hybrid Method for Human Interaction Recognition Using Spatio-temporal Interest Points (NL, XC, HG, ZW), pp. 2513–2518.
ICPRICPR-2014-LiewY #detection #feature model #novel #performance #robust
Generalized BRIEF: A Novel Fast Feature Extraction Method for Robust Hand Detection (CFL, TY), pp. 3014–3019.
ICPRICPR-2014-MontagnerjH #machine learning
A Machine Learning Based Method for Staff Removal (IdSM, RHJ, NSTH), pp. 3162–3167.
ICPRICPR-2014-NguyenTHM #classification #novel
A Novel Sphere-Based Maximum Margin Classification Method (PN, DT, XH, WM), pp. 620–624.
ICPRICPR-2014-RozzaMP #graph #kernel #learning #novel
A Novel Graph-Based Fisher Kernel Method for Semi-supervised Learning (AR, MM, AP), pp. 3786–3791.
ICPRICPR-2014-SuiTX #predict
An Unsupervised Band Selection Method Based on Overall Accuracy Prediction (CS, YT, YX), pp. 3756–3761.
ICPRICPR-2014-WangZZ #segmentation
An Improved BET Method for Brain Segmentation (LW, ZZ, RZ), pp. 3221–3226.
ICPRICPR-2014-Yasuda #effectiveness
Effective Mean-Field Inference Method for Nonnegative Boltzmann Machines (MY), pp. 3600–3605.
ICPRICPR-2014-ZhangLWZ #image #modelling #multi #statistics #using
Statistical Modeling of Multi-modal Medical Image Fusion Method Using C-CHMM and M-PCNN (HZ, XL, XW, ZZ), pp. 1067–1072.
ICPRICPR-2014-ZhaoTHTY #comparison #performance #segmentation
A Performance Comparison between Circular and Spline-Based Methods for Iris Segmentation (YZ, CT, XH, AOT, RY), pp. 351–356.
ICPRICPR-2014-ZhuY #image #optimisation #quality
A Bit Allocation Optimization Method for ROI Based Image Compression with Stable Image Quality (YZ, JY), pp. 849–854.
KDDKDD-2014-BenderskyPHJL #retrieval #scalability #video
Up next: retrieval methods for large scale related video suggestion (MB, LGP, JJH, VJ, DL), pp. 1769–1778.
KDDKDD-2014-RamanJ
Methods for ordinal peer grading (KR, TJ), pp. 1037–1046.
KDDKDD-2014-Ting #approximate
Streamed approximate counting of distinct elements: beating optimal batch methods (DT), pp. 442–451.
KDDKDD-2014-WangZQZ #using
Improving the modified nyström method using spectral shifting (SW, CZ, HQ, ZZ), pp. 611–620.
KDDKDD-2014-ZhaiXW #multi #optimisation
A multi-class boosting method with direct optimization (SZ, TX, SW), pp. 273–282.
KDIRKDIR-2014-AbdallahI #classification #modelling #n-gram #using #web
URL-based Web Page Classification — A New Method for URL-based Web Page Classification Using n-Gram Language Models (TAA, BdlI), pp. 14–21.
KDIRKDIR-2014-PlansangketG #evaluation #performance #query #retrieval #state of the art
Performance Evaluation of State-of-the-Art Ranked Retrieval Methods and Their Combinations for Query Suggestion (SP, JQG), pp. 141–148.
KDIRKDIR-2014-PsomakelisTAV #analysis #sentiment #twitter
Comparing Methods for Twitter Sentiment Analysis (EP, KT, DA, TAV), pp. 225–232.
KDIRKDIR-2014-SatoNS #classification #kernel #using
A Simple Classification Method for Class Imbalanced Data using the Kernel Mean (YS, KN, AS), pp. 327–334.
KDIRKDIR-2014-SenkoDPRK #modelling
A Method for Evaluating Validity of Piecewise-linear Models (OVS, DSD, EAP, LYR, AVK), pp. 437–443.
KMISKMIS-2014-HisakaneOSK #multi
A Tutoring Rule Selection Method for Case-based e-Learning by Multi-class Support Vector Machine (DH, MO, MS, NK), pp. 119–125.
KMISKMIS-2014-HisakaneS #learning #visualisation
A Visualization System of Discussion Structure in Case Method Learning (DH, MS), pp. 126–132.
KMISKMIS-2014-ToureMM #architecture #design #information management #towards
Re-Designing Knowledge Management Systems — Towards User-Centred Design Methods Integrating Information Architecture (CET, CM, JCM), pp. 298–305.
KRKR-2014-BoothAR
Interval Methods for Judgment Aggregation in Argumentation (RB, EA, IR).
MLDMMLDM-2014-AnandWA #information management #scalability
A Method of Crowd-Sourced Information Extraction From Large Data Files (IMA, AW, PA), pp. 431–436.
MLDMMLDM-2014-SenkoD #multi
Multiple Regression Method Based on Unexpandable and Irreducible Convex Combinations (OVS, AD), pp. 43–57.
MLDMMLDM-2014-SharmaT #mining #social #social media
A Generalized Relationship Mining Method for Social Media Text Data (TS, DT), pp. 376–392.
SEKESEKE-2014-GuimaraesSALC #alloy #consistency #using #verification
A Method for Verifying the Consistency of Business Rules Using Alloy (DG, EAS, AJA, PL, ALC), pp. 381–386.
SEKESEKE-2014-GuptaAWD #empirical #modelling #verification
Evaluating the Use of Model-Based Requirement Verification Method: An Empirical Study (MG, DA, GSW, HD), pp. 397–401.
SEKESEKE-2014-LeeKB #twitter
Method for Measuring Twitter Content Influence (EL, JDK, DKB), pp. 659–664.
SEKESEKE-2014-SatapathyPR #agile #approach #estimation #kernel #using
Story Point Approach based Agile Software Effort Estimation using Various SVR Kernel Methods (SMS, AP, SKR), pp. 304–307.
SIGIRSIGIR-2014-QianL0H
Co-training on authorship attribution with very fewlabeled examples: methods vs. views (TQ, BL, MZ, GH), pp. 903–906.
SIGIRSIGIR-2014-RoitmanHK #using
Using the cross-entropy method to re-rank search results (HR, SH, OK), pp. 839–842.
LOPSTRLOPSTR-2014-Balaniuk #induction #synthesis
Drill and Join: A Method for Exact Inductive Program Synthesis (RB), pp. 219–237.
LOPSTRLOPSTR-2014-TahatE #hybrid #protocol #self #synthesis #verification
A Hybrid Method for the Verification and Synthesis of Parameterized Self-Stabilizing Protocols (AT, AE), pp. 201–218.
QAPLQAPL-2014-KempfLM #design #formal method #manycore
Formal and Informal Methods for Multi-Core Design Space Exploration (JFK, OL, OM), pp. 78–92.
RERE-2014-KnaussH #assessment #named
EAM: Ecosystemability assessment method (EK, IH), pp. 319–320.
RERE-2014-PutnamC #approach #game studies #multi #requirements
Therapist-centered requirements: A multi-method approach of requirement gathering to support rehabilitation gaming (CP, JC), pp. 13–22.
RERE-2014-WohlrabGKB #experience #industrial #performance #requirements
Experience of pragmatically combining RE methods for performance requirements in industry (RW, TdG, AK, SB), pp. 344–353.
SACSAC-2014-AlnajemZ #evaluation #mobile
A copula-based risk evaluation method (C-REM) in a corporate mobile banking context (AAIA, NZ), pp. 1455–1462.
SACSAC-2014-AnjosTCON #3d #evaluation #interactive #statistics
Statistical methods in the evaluation of sensory-motor skills acquisition in 3D interactive virtual environments (AMdA, RT, AC, SdO, FLSN), pp. 223–228.
SACSAC-2014-BaeCPJKC #clustering #effectiveness #memory management
An effective data clustering method based on expected update time in flash memory environment (DHB, JWC, SMP, BSJ, SWK, SjC), pp. 1492–1497.
SACSAC-2014-BaeLKWP #network #privacy #social
Analyzing network privacy preserving methods: a perspective of social network characteristics (DHB, JML, SWK, YW, YP), pp. 331–332.
SACSAC-2014-BarddalGE #classification #concept #named #network #social
SFNClassifier: a scale-free social network method to handle concept drift (JPB, HMG, FE), pp. 786–791.
SACSAC-2014-CorralGSS #android #energy #implementation
Method reallocation to reduce energy consumption: an implementation in Android OS (LC, ABG, AS, GS), pp. 1213–1218.
SACSAC-2014-HuergoPD #approach #identification #modelling #using
A method to identify services using master data and artifact-centric modeling approach (RSH, PFP, FCD), pp. 1225–1230.
SACSAC-2014-MoraCGZJEBAH #named
MUSES: a corporate user-centric system which applies computational intelligence methods (AMM, PdlC, JJMG, SZ, MJ, AIEA, MB, HA, ZH), pp. 1719–1723.
SACSAC-2014-SakamotoKTT #visualisation
Method for visualizing undone operations based on changes on desktop screen (AS, TK, TT, MT), pp. 193–195.
SACSAC-2014-TinK #clustering #distributed #performance
Method for fast clustering of data distributed on a sphere surface (TT, SRK), pp. 1735–1736.
SACSAC-2014-WangWPSC #collaboration #network #process
A collaborative processes synchronization method with regards to system crashes and network failures (LW, AW, LFP, MvS, CC), pp. 1393–1398.
FSEFSE-2014-GoffiGMPT #search-based #sequence #synthesis
Search-based synthesis of equivalent method sequences (AG, AG, AM, MP, PT), pp. 366–376.
FSEFSE-2014-HigoK #case study #functional #how #java #source code
How should we measure functional sameness from program source code? an exploratory study on Java methods (YH, SK), pp. 294–305.
FSEFSE-2014-KrkaBM #automation #invariant #mining #specification
Automatic mining of specifications from invocation traces and method invariants (IK, YB, NM), pp. 178–189.
SPLCSPLC-2014-DillonRD #approach #product line
A methodical approach to product line adoption (MD, JR, RD), pp. 340–349.
RTARTA-TLCA-2014-Schmidt-Schauss #analysis #concurrent #programming language #semantics
Concurrent Programming Languages and Methods for Semantic Analyses (Extended Abstract of Invited Talk) (MSS), pp. 21–30.
VMCAIVMCAI-2014-BloemKS #safety #satisfiability #specification #synthesis
SAT-Based Synthesis Methods for Safety Specs (RB, RK, MS), pp. 1–20.
ASEASE-2013-Fard #behaviour #detection #distributed #independence #using
Detecting and fixing emergent behaviors in Distributed Software Systems using a message content independent method (FHF), pp. 746–749.
ASEASE-2013-ThungWLL #api #automation #feature model #recommendation
Automatic recommendation of API methods from feature requests (FT, SW, DL, JLL), pp. 290–300.
CASECASE-2013-BentahaBD #composition #probability
A decomposition method for stochastic partial disassembly line balancing with profit maximization (MLB, OB, AD), pp. 404–409.
CASECASE-2013-ChowN
Improved knot-tying methods for autonomous robot surgery (DLC, WSN), pp. 461–465.
CASECASE-2013-DevesseRFW #realtime
A real-time optimal control method for swing-free tower crane motions (WD, MR, LF, JW), pp. 336–341.
CASECASE-2013-FerreiraL #generative #multi #tool support #using
A method for generating tool paths for milling pockets in prismatic parts using multiple tools (JCEF, RAL), pp. 528–533.
CASECASE-2013-LiuCXG #distributed #energy #optimisation
A decentralized optimization method for energy saving of HVAC systems (ZL, XC, XX, XG), pp. 225–230.
CASECASE-2013-Nieves-RiveraXJMZ #automation #development
Development of a position sensitive device and control method for automated robot calibration (ENR, NX, YJ, CM, GZ), pp. 1127–1132.
CASECASE-2013-QianY #named #navigation #performance #visual notation
NCC-RANSAC: A fast plane extraction method for navigating a smart cane for the visually impaired (XQ, CY), pp. 261–267.
DACDAC-2013-BombieriLFC #c++ #synthesis
A method to abstract RTL IP blocks into C++ code and enable high-level synthesis (NB, HYL, FF, LPC), p. 9.
DACDAC-2013-Fang #simulation
A new time-stepping method for circuit simulation (GPF), p. 10.
DACDAC-2013-KimOCHH #distributed #embedded #estimation #novel
A novel analytical method for worst case response time estimation of distributed embedded systems (JK, HO, JC, HH, SH), p. 10.
DACDAC-2013-LiuC #on the #synthesis
On learning-based methods for design-space exploration with high-level synthesis (HYL, LPC), p. 7.
DACDAC-2013-MillerVG #modelling #physics #statistics #using
Exploration with upgradeable models using statistical methods for physical model emulation (BM, FV, TG), p. 6.
DATEDATE-2013-ElfadelMA #formal method #industrial #manycore
Closed-loop control for power and thermal management in multi-core processors: formal methods and industrial practice (IME, RM, DA), pp. 1879–1881.
DATEDATE-2013-KodakaTSYKTXSUTMM #manycore #power management #predict
A near-future prediction method for low power consumption on a many-core processor (TK, AT, SS, AY, TK, TT, HX, TS, HU, JT, TM, NM), pp. 1058–1059.
DATEDATE-2013-PigorschS #locality
Lemma localization: a practical method for downsizing SMT-interpolants (FP, CS), pp. 1405–1410.
DATEDATE-2013-WachterEAM #fault tolerance
Topology-agnostic fault-tolerant NoC routing method (EW, AE, AMA, FM), pp. 1595–1600.
DATEDATE-2013-YanLH #adaptation #fault #self
A dynamic self-adaptive correction method for error resilient application (LY, HL, ZH), pp. 943–946.
DATEDATE-2013-YingHH #3d #performance
Fast and optimized task allocation method for low vertical link density 3-dimensional networks-on-chip based many core systems (HY, TH, KH), pp. 1777–1782.
DocEngDocEng-2013-Esposito #documentation #machine learning
Symbolic machine learning methods for historical document processing (FE), pp. 1–2.
DocEngDocEng-2013-SrivastavaSM #graph #interactive #topic
A graph-based topic extraction method enabling simple interactive customization (AS, AJS, EEM), pp. 71–80.
DRRDRR-2013-YangP #documentation #segmentation
Local projection-based character segmentation method for historical Chinese documents (LY, LP).
ICDARICDAR-2013-AhmedSLD #segmentation #using
A Generic Method for Stamp Segmentation Using Part-Based Features (SA, FS, ML, AD), pp. 708–712.
ICDARICDAR-2013-BuiVM #documentation #invariant #navigation
Invariants Extraction Method Applied in an Omni-language Old Document Navigating System (QAB, MV, RM), pp. 1325–1329.
ICDARICDAR-2013-ChattopadhyayRG #automation #robust
Automatic Selection of Binarization Method for Robust OCR (TC, VRR, UG), pp. 1170–1174.
ICDARICDAR-2013-Furukawa #composition #using
A New Method for Discriminating Printers Based on Contours Qualities of Printed Characters Using Wavelet Decomposition (TF), pp. 1115–1119.
ICDARICDAR-2013-GacebLD #adaptation #documentation #image
Adaptative Smart-Binarization Method: For Images of Business Documents (DG, FL, JD), pp. 118–122.
ICDARICDAR-2013-ItaniHI #using
Text Line Extraction Method Using Domain-Based Active Contour Model (YI, TH, JI), pp. 1230–1234.
ICDARICDAR-2013-LinGTBAS #detection #recognition
A Text Line Detection Method for Mathematical Formula Recognition (XL, LG, ZT, JBB, MA, VS), pp. 339–343.
ICDARICDAR-2013-LiPXW #analysis #consistency #online #order #verification
A Stroke Order Verification Method for On-Line Handwritten Chinese Characters Based on Tempo-spatial Consistency Analysis (RL, LP, EX, NW), pp. 999–1003.
ICDARICDAR-2013-MiyoshiNS #image #using
Moment-Based Character-Normalization Methods Using a Contour Image Combined with an Original Image (TM, TN, HS), pp. 1066–1070.
ICDARICDAR-2013-NguyenZN #online #recognition
A Semi-incremental Recognition Method for On-Line Handwritten Japanese Text (CTN, BZ, MN), pp. 84–88.
ICDARICDAR-2013-PuriST #learning #network
Bayesian Network Structure Learning and Inference Methods for Handwriting (MP, SNS, YT), pp. 1320–1324.
ICDARICDAR-2013-Ramirez-OrtegonMRC #documentation #metric
An Objective Method to Evaluate Stroke-Width Measures for Binarized Documents (MARO, VM, RR, EC), pp. 175–179.
ICDARICDAR-2013-SekiAYNSN #documentation #image
Color Drop-Out Binarization Method for Document Images with Color Shift (MS, EA, TY, HN, HS, TN), pp. 123–127.
ICDARICDAR-2013-SharmaSPBT #multi #segmentation #video #word
A New Method for Character Segmentation from Multi-oriented Video Words (NS, PS, UP, MB, CLT), pp. 413–417.
ICDARICDAR-2013-ShivakumaraBGT #detection #video
Detection of Curved Text in Video: Quad Tree Based Method (PS, HTB, DSG, CLT), pp. 594–598.
ICDARICDAR-2013-SuDPL #comprehension #documentation #novel #word
Cross-Language Sensitive Words Distribution Map: A Novel Recognition-Based Document Understanding Method for Uighur and Tibetan (BS, XD, LP, CL), pp. 255–259.
ICDARICDAR-2013-SurintaSW #comparison
A Comparison of Feature and Pixel-Based Methods for Recognizing Handwritten Bangla Digits (OS, LS, MW), pp. 165–169.
SIGMODSIGMOD-2013-GaoLOWC #crowdsourcing #online
An online cost sensitive decision-making method in crowdsourcing systems (JG, XL, BCO, HW, GC), pp. 217–228.
SIGMODSIGMOD-2013-SametSA #database #game studies
Indexing methods for moving object databases: games and other applications (HS, JS, MA), pp. 169–180.
VLDBVLDB-2013-HuaiMLO0 #clustering #comprehension
Understanding Insights into the Basic Structure and Essential Issues of Table Placement Methods in Clusters (YH, SM, RL, OO, XZ), pp. 1750–1761.
VLDBVLDB-2013-QardajiYL #comprehension
Understanding Hierarchical Methods for Differentially Private Histograms (WHQ, WY, NL), pp. 1954–1965.
ICPCICPC-2013-MondalRS #co-evolution #empirical #identification
Insight into a method co-change pattern to identify highly coupled methods: An empirical study (MM, CKR, KAS), pp. 103–112.
WCREWCRE-2013-SalesTMV #dependence #recommendation #refactoring #set #using
Recommending Move Method refactorings using dependency sets (VS, RT, LFM, MTV), pp. 232–241.
ICALPICALP-v2-2013-EtessamiSY #context-free grammar #probability #regular expression
Stochastic Context-Free Grammars, Regular Languages, and Newton’s Method (KE, AS, MY), pp. 199–211.
LATALATA-2013-LuttenbergerS #commutative #convergence
Convergence of Newton’s Method over Commutative Semirings (ML, MS), pp. 407–418.
CHICHI-2013-BauerK #design #named
DesignLibs: a scenario-based design method for ideation (JSB, JAK), pp. 1955–1958.
CHICHI-2013-Grosse-PuppendahlBKK #interface #proximity #recognition #ubiquitous
Swiss-cheese extended: an object recognition method for ubiquitous interfaces based on capacitive proximity sensing (TAGP, AB, FK, AK), pp. 1401–1410.
CHICHI-2013-JokelaL #collaboration #comparative #evaluation #interactive #mobile
A comparative evaluation of touch-based methods to bind mobile devices for collaborative interactions (TJ, AL), pp. 3355–3364.
CHICHI-2013-JungBLK #design
Make it move: a movement design method of simple standing products based on systematic mapping of torso movements & product messages (JJ, SHB, JHL, MSK), pp. 1279–1288.
CHICHI-2013-MankoffRF #research #using
Looking past yesterday’s tomorrow: using futures studies methods to extend the research horizon (JM, JAR, HF), pp. 1629–1638.
CHICHI-2013-VoelkerWB #evaluation
An evaluation of state switching methods for indirect touch systems (SV, CW, JOB), pp. 745–754.
CSCWCSCW-2013-HailpernDHSLK #communication #framework #named #research
ACES: a cross-discipline platform and method for communication and language research (JMH, MD, AH, SS, RL, KK), pp. 515–526.
HCIDHM-HB-2013-GuoCWDL #design #e-commerce #interface
An Interface Design Method for E-commerce Sites’ Homepage Considering Users’ Emotions (FG, YC, MW, YD, LWL), pp. 30–39.
HCIDHM-HB-2013-KeyvaniLBO #database #metric #using
Using Methods-Time Measurement to Connect Digital Humans and Motion Databases (AK, DL, GB, ), pp. 343–352.
HCIDHM-SET-2013-LauterbachS #evaluation #implementation #interactive
Implementing Scenarios as an Evaluation Method of the Patient-Physician Interaction in Decision Aids (CVL, JDS), pp. 232–239.
HCIDUXU-CXC-2013-AsanoY #analysis #design
Observation Analysis Method for Culture Centered Design — Proposal of KH Method - (KA, KY), pp. 11–19.
HCIDUXU-CXC-2013-Chang #evaluation #segmentation #usability
Usability Evaluation of Two Chinese Segmentation Methods in Subtitles to Scaffold Chinese Novice (CKC), pp. 28–37.
HCIDUXU-CXC-2013-PlogmannJJR #development #evaluation #knowledge-based #risk management #using
Development and Evaluation of a Knowledge-Based Method for the Treatment of Use-Oriented and Technical Risks Using the Example of Medical Devices (SP, AJ, AJT, KR), pp. 452–461.
HCIDUXU-NTE-2013-FukumotoI #algorithm #interactive #mobile #optimisation #search-based
A Proposal for Optimization Method of Vibration Pattern of Mobile Device with Interactive Genetic Algorithm (MF, TI), pp. 264–269.
HCIDUXU-NTE-2013-ParkK #performance #representation
Efficient Information Representation Method for Driver-Centered AR-HUD System (HP, KhK), pp. 393–400.
HCIDUXU-PMT-2013-FischerSN #design #set #towards #usability #validation
Towards a Holistic Tool for the Selection and Validation of Usability Method Sets Supporting Human-Centered Design (HF, BS, KN), pp. 252–261.
HCIDUXU-PMT-2013-HamaKKIN #design #experience #framework #novel #social #user interface
Novel Method of Evaluating GUI Design from the Viewpoint of Worker Experience — Central Control Systems for Social Infrastructure (DH, MK, MK, KI, MN), pp. 283–293.
HCIDUXU-PMT-2013-SuL #design #interactive
Designing for Resonance by Evocative Objects: An Experiential Interaction Design Method (CSS, RHL), pp. 610–619.
HCIDUXU-PMT-2013-Yantac #design #education #experience #interactive #user interface
A Method for Teaching Affordance for User Experience Design in Interactive Media Design Education (AEY), pp. 630–638.
HCIDUXU-WM-2013-OkazawaY #design #modelling
A Proposal of Design Method of Obtaining the Construction Items of Mental Models in Product Design (NO, TY), pp. 408–413.
HCIHCI-AMTE-2013-ChamberlainC #named
Engagingdesign — Methods for Collective Creativity (PC, CC), pp. 22–31.
HCIHCI-AMTE-2013-HirataY #design pattern #logic #user interface #using
A Logical Design Method for User Interface Using GUI Design Patterns (IH, TY), pp. 361–370.
HCIHCI-AMTE-2013-UedaGTHYY #design #experience
Structured Scenario-Based Design Method for Experience Vision (YU, KG, KT, SH, KY, KY), pp. 500–509.
HCIHCI-AMTE-2013-YanagidaUGTHY #experience
Method Format for Experience Vision (KY, YU, KG, KT, SH, KY), pp. 531–539.
HCIHCI-AMTE-2013-YasuIK #collaboration #design #enterprise #experience #user interface
Collaborative User Experience Design Methods for Enterprise System (HY, NI, IK), pp. 146–155.
HCIHCI-III-2013-ItoON #biology #interactive
A Method for Promoting Interaction Awareness by Biological Rhythm in Elementary School Children (KI, KO, SN), pp. 421–430.
HCIHCI-III-2013-RebenitschO #speech
Facial Electromyogram Activation as Silent Speech Method (LR, CBO), pp. 464–473.
HCIHCI-III-2013-WangLDHY #detection #set
A Coastline Detection Method Based on Level Set (QW, KL, FD, NH, LY), pp. 216–226.
HCIHCI-III-2013-ZhaolaoZWFT #image #semantics
Semantic Annotation Method of Clothing Image (LZ, MZ, XW, YF, XT), pp. 289–298.
HCIHCI-IMT-2013-EbisawaF #detection #using #video
Head-Free, Remote Gaze Detection System Based on Pupil-Corneal Reflection Method with Using Two Video Cameras — One-Point and Nonlinear Calibrations (YE, KF), pp. 205–214.
HCIHCI-IMT-2013-KurosawaST
Keyboard Clawing: Input Method by Clawing Key Tops (TK, BS, JT), pp. 272–280.
HCIHCI-IMT-2013-MaWHZ #gesture #interactive
A Method for Single Hand Fist Gesture Input to Enhance Human Computer Interaction (TM, WGW, CYH, XZ), pp. 291–300.
HCIHCI-IMT-2013-MurataHMH #case study #interface #using
Study on Character Input Methods Using Eye-gaze Input Interface (AM, KH, MM, TH), pp. 320–329.
HCIHCI-IMT-2013-MurataHO #estimation #interface
Proposal of Estimation Method of Stable Fixation Points for Eye-gaze Input Interface (AM, TH, KO), pp. 330–339.
HCIHCI-IMT-2013-SakamotoTT #music #using
A Method for Discussing Musical Expression between Music Ensemble Players Using a Web-Based System (TS, ST, JT), pp. 730–739.
HCIHCI-IMT-2013-ShibuyaKM #web
A Web Browsing Method on Handheld Touch Screen Devices for Preventing from Tapping Unintended Links (YS, HK, KM), pp. 491–496.
HCIHCI-IMT-2013-WongKCPW #documentation #multi
Audio-Visual Documentation Method for Digital Storytelling for a Multimedia Art Project (CYW, CWK, KC, MAMP, MLW), pp. 750–758.
HCIHCI-UC-2013-FurukawaN #navigation
A Pedestrian Navigation Method for User’s Safe and Easy Wayfinding (HF, YN), pp. 156–165.
HCIHCI-UC-2013-KuramochiOTHN #analysis #community #graph #network #semantics #twitter #using
Applying to Twitter Networks of a Community Extraction Method Using Intersection Graph and Semantic Analysis (TK, NO, KT, YH, SN), pp. 314–323.
HCIHCI-UC-2013-LinCTH
An Application of the Ballistic Movement Method for Evaluating Computer Mice (RFL, CWC, YCT, CYH), pp. 199–208.
HCIHCI-UC-2013-OkiTS #named #using
AugmentedBacklight: Expansion of LCD Backlights Using Lighting Methods in the Real World (MO, KT, IS), pp. 209–216.
HCIHIMI-D-2013-IsogaiN #modelling #motivation #music #recommendation
Modeling of Music Recommendation Methods to Promote the User’s Singing Motivation — For Next-Generation Japanese Karaoke Systems (SI, MN), pp. 439–448.
HCIHIMI-D-2013-MoriTK #adaptation
Correction Method Based on KI-VPA Model for Changes in Vibratory Perception Caused by Adaptation (YM, TT, SK), pp. 107–116.
HCIHIMI-D-2013-OkuboN #composition #generative
Proposal of Avatar Generating Method by Composition of the Portraits Made by Friends (MO, SN), pp. 515–523.
HCIHIMI-HSM-2013-MoreiraB #automation #interface
A Semiotic Based Method for Evaluating Automated Cockpit Interfaces (WM, RB), pp. 530–539.
HCIHIMI-LCCB-2013-GuoZSP #axiom #usability
Value Added by the Axiomatic Usability Method for Evaluating Consumer Electronics (YG, YZ, GS, RWP), pp. 457–466.
HCIHIMI-LCCB-2013-KimitaKWTS #evaluation #nondeterminism
Service Evaluation Method for Managing Uncertainty (KK, YK, KW, TT, YS), pp. 569–578.
HCIHIMI-LCCB-2013-KuritaKWS #analysis
A Method for Service Failure Effects Analysis Based on Customer Satisfaction (YK, KK, KW, YS), pp. 485–494.
HCIHIMI-LCCB-2013-OmoriTU #3d #experience
A Method of Viewing 3D Horror Contents for Amplifying Horror Experience (NO, MT, RU), pp. 228–237.
HCIHIMI-LCCB-2013-TomiokaSI #deployment #ontology #quality
A Method for Developing Quality Function Deployment Ontology (KT, FS, SI), pp. 632–638.
HCIHIMI-LCCB-2013-YajimaHY #analysis #communication #design
Application of Ethno-Cognitive Interview and Analysis Method for the Smart Communication Design (AY, HH, TY), pp. 649–657.
HILTHILT-2013-Wing #formal method #industrial #perspective
Formal methods: an industrial perspective (JMW), pp. 85–86.
CAiSECAiSE-2013-DelmasP #formal method #policy #specification
Formal Methods for Exchange Policy Specification (RD, TP), pp. 288–303.
ICEISICEIS-J-2013-AmmarTM #development #modelling #usability
Dealing with Usability in Model-Driven Development Method (LBA, AT, AM), pp. 405–420.
ICEISICEIS-v1-2013-AndradeRYS #data-driven #database #novel #similarity
A Novel Method for Similarity Search over Meteorological Time Series Data based on the Coulomb’s Law (CGdA, MXR, CAY, MTPS), pp. 209–216.
ICEISICEIS-v1-2013-Frank #enterprise #modelling #multi #self
Multi-Perspective Enterprise Modelling as a Foundation of Method Engineering and Self-Referential Enterprise Systems (UF), p. IX.
ICEISICEIS-v1-2013-HayashiK #optimisation #performance
Data Location Optimization Method to Improve Tiered Storage Performance (SH, NK), pp. 112–119.
ICEISICEIS-v1-2013-SimrinAD #heuristic #problem #using
A Lagrangian Relaxation based Heuristic for the Static Berth Allocation Problem using the Cutting Plane Method (ASS, NNA, AHD), pp. 565–569.
ICEISICEIS-v2-2013-DjuanaXLJC #ontology #problem #recommendation
An Ontology-based Method for Sparsity Problem in Tag Recommendation (ED, YX, YL, AJ, CC), pp. 467–474.
ICEISICEIS-v2-2013-SiepermannSL
Electronic Exercises for the Metra Potential Method (MS, CS, RL), pp. 435–442.
ICEISICEIS-v3-2013-MiloszBL #empirical #evaluation #usability
Memorability Experiment Vs. Expert Method in Websites Usability Evaluation (MM, MB, ML), pp. 151–157.
ICEISICEIS-v3-2013-Plechawska-WojcikLW #assessment #case study #experience #user interface #using #web
Assessment of User Experience with Responsive Web Applications using Expert Method and Cognitive Walkthrough — A Case Study (MPW, SLM, LW), pp. 111–118.
CIKMCIKM-2013-MengK #network
Discovering influential authors in heterogeneous academic networks by a co-ranking method (QM, PJK), pp. 1029–1036.
CIKMCIKM-2013-XuXWW #automation #feedback #image #ranking
A heterogenous automatic feedback semi-supervised method for image reranking (XCX, XSX, YW, XW), pp. 999–1008.
ECIRECIR-2013-ChenC #analysis #multi #network #topic #using
A Topic Person Multi-polarization Method Using Friendship Network Analysis (ZYC, CCC), pp. 688–692.
ECIRECIR-2013-MirkinS #clustering
Least Square Consensus Clustering: Criteria, Methods, Experiments (BGM, AS), pp. 764–767.
ECIRECIR-2013-NeshatiAHB #classification #network #social
A Joint Classification Method to Integrate Scientific and Social Networks (MN, EA, DH, HB), pp. 122–133.
ECIRECIR-2013-ZhukovskiiGS #ranking
URL Redirection Accounting for Improving Link-Based Ranking Methods (MZ, GG, PS), pp. 656–667.
ICMLICML-c1-2013-ChevaleyreKZ #classification #linear
Rounding Methods for Discrete Linear Classification (YC, FK, JDZ), pp. 651–659.
ICMLICML-c1-2013-OuyangHTG #multi #probability
Stochastic Alternating Direction Method of Multipliers (HO, NH, LT, AGG), pp. 80–88.
ICMLICML-c1-2013-Suzuki #multi #online
Dual Averaging and Proximal Gradient Descent for Online Alternating Direction Multiplier Method (TS), pp. 392–400.
ICMLICML-c3-2013-GittensM #machine learning #scalability
Revisiting the Nystrom method for improved large-scale machine learning (AG, MWM), pp. 567–575.
ICMLICML-c3-2013-GoschinWL
The Cross-Entropy Method Optimizes for Quantiles (SG, AW, MLL), pp. 1193–1201.
ICMLICML-c3-2013-TakacBRS
Mini-Batch Primal and Dual Methods for SVMs (MT, ASB, PR, NS), pp. 1022–1030.
ICMLICML-c3-2013-TamarCM #difference
Temporal Difference Methods for the Variance of the Reward To Go (AT, DDC, SM), pp. 495–503.
KDDKDD-2013-BakshyE #evaluation #nondeterminism #online
Uncertainty in online experiments with dependent data: an evaluation of bootstrap methods (EB, DE), pp. 1303–1311.
KDDKDD-2013-EmersonWN #data mining #mining #profiling
A data mining driven risk profiling method for road asset management (DE, JW, RN), pp. 1267–1275.
KDDKDD-2013-GaneshapillaiG #data-driven
A data-driven method for in-game decision making in MLB: when to pull a starting pitcher (GG, JVG), pp. 973–979.
KDDKDD-2013-MorenoNK #graph #learning #modelling
Learning mixed kronecker product graph models with simulated method of moments (SM, JN, SK), pp. 1052–1060.
KDDKDD-2013-NarasimhanA #bound #named #optimisation
SVMpAUCtight: a new support vector method for optimizing partial AUC based on a tight convex upper bound (HN, SA), pp. 167–175.
KDIRKDIR-KMIS-2013-CostaS #assessment #concept #enterprise #security #using
Enterprise to Cloud Security Assessment — A Method using OSSTMM 3.0 Concepts (RC, CS), pp. 571–578.
KDIRKDIR-KMIS-2013-CunhaFM #clustering #documentation #integration
Clustering and Classifying Text Documents — A Revisit to Tagging Integration Methods (EC, ÁF, ÓM), pp. 160–168.
KEODKEOD-2013-KarolyA #implementation
The Implementation of a ReALIS-based Method of Static Intensional Interpretation (MK, GA), pp. 393–398.
MLDMMLDM-2013-OthmanB #induction #reduction
Preceding Rule Induction with Instance Reduction Methods (OO, CHB), pp. 209–218.
RecSysRecSys-2013-AdamopoulosT #collaboration #predict #recommendation #using
Recommendation opportunities: improving item prediction using weighted percentile methods in collaborative filtering systems (PA, AT), pp. 351–354.
RecSysRecSys-2013-BabasCT #personalisation #recommendation #what
You are what you consume: a bayesian method for personalized recommendations (KB, GC, ET), pp. 221–228.
RecSysRecSys-2013-MouraoRKM #hybrid #recommendation
Exploiting non-content preference attributes through hybrid recommendation method (FM, LCdR, JAK, WMJ), pp. 177–184.
SEKESEKE-2013-ChaoY #analysis #order #reachability #scalability
A Best Method to Synthesize Very Large K-th Order Systems without Reachability Analysis (S) (DYC, THY), pp. 417–420.
SEKESEKE-2013-DuHCLH #incremental #named #personalisation #recommendation
ABEY: an Incremental Personalized Method Based on Attribute Entropy for Recommender Systems (S) (XD, TH, ZC, JL, CH), pp. 318–321.
SEKESEKE-2013-HeDWCL #collaboration #topic
Comparing Collaborative Filtering Methods Based on User-Topic Ratings (TH, XD, WW, ZC, JL), pp. 312–317.
SEKESEKE-2013-KayaF #identification
Identifying Extract Method Opportunities Based on Variable References (S) (MK, JWF), pp. 153–158.
SEKESEKE-2013-TriasCSM #migration #web
An ADM-based Method for migrating CMS-based Web applications (FT, VdC, MLS, EM), pp. 256–261.
SIGIRSIGIR-2013-CuiMLWR #automation #image #nearest neighbour
Ranking-oriented nearest-neighbor based method for automatic image annotation (CC, JM, TL, XW, ZR), pp. 957–960.
SIGIRSIGIR-2013-LuWTZHZ #rank #ranking #scalability
A low rank structural large margin method for cross-modal ranking (XL, FW, ST, ZZ, XH, YZ), pp. 433–442.
SIGIRSIGIR-2013-ZhuC #adaptation
An adaptive evidence weighting method for medical record search (DZ, BC), pp. 1025–1028.
AMTAMT-2013-TisoRL #model-to-text #testing
A Method for Testing Model to Text Transformations (AT, GR, ML), pp. 22–31.
RERE-2013-GolnamRWK #case study #integration #scalability
The integration of an RE method and AHP: A pilot study in a large Swiss bank (AG, GR, AW, SK), pp. 308–313.
RERE-2013-GuillermDS #safety
A safety requirement engineering method and tool (RG, HD, NS), pp. 328–329.
RERE-2013-ZarghamiVESW #identification #risk management
Assumption-based risk identification method (ARM) in dynamic service provisioning (AZ, EV, MZE, MvS, RW), pp. 175–184.
SACSAC-2013-AlitavoliJE #java #novel #source code
A novel watermarking method for Java programs (MA, MJ, AE), pp. 1013–1018.
SACSAC-2013-BrinkeMBBA #composition #design #energy
A design method for modular energy-aware software (StB, SM, CB, LB, MA), pp. 1180–1182.
SACSAC-2013-BuarqueCA #modelling #requirements
The role of NFRs when transforming i* requirements models into OO-method models (AB, JC, FMRA), pp. 1305–1306.
SACSAC-2013-FanYZ #architecture #framework #modelling #scalability
A generic framework for deriving architecture modeling methods for large-scale software-intensive systems (ZF, TY, LZ), pp. 1750–1757.
SACSAC-2013-KawakamiIYT #communication #data type
A delivery method considering communication loads for sensor data stream with different collection cycles (TK, YI, TY, YT), pp. 611–618.
SACSAC-2013-KinderenP #approach #named
e3RoME: a value-based approach for method bundling (SdK, HAP), pp. 1469–1471.
SACSAC-2013-MartinaP #induction #multi #protocol #security #using #verification
Verifying multicast-based security protocols using the inductive method (JEM, LCP), pp. 1824–1829.
SACSAC-2013-MendesW #navigation #realtime #using
Real time autonomous navigation and obstacle avoidance using a semi-global stereo method (CCTM, DFW), pp. 235–236.
SACSAC-2013-SouzaRB #clustering #data access #metric #performance
Faster construction of ball-partitioning-based metric access methods (JAdS, HLR, MCNB), pp. 8–12.
ESEC-FSEESEC-FSE-2013-ZervoudakisREF #model checking #verification
Cascading verification: an integrated method for domain-specific model checking (FZ, DSR, SGE, AF), pp. 400–410.
ICSEICSE-2013-CotroneoPR #testing
A learning-based method for combining testing techniques (DC, RP, SR), pp. 142–151.
ICSEICSE-2013-FitzgeraldSOO #agile #case study #industrial #scalability
Scaling agile methods to regulated environments: an industry case study (BF, KJS, RO, DO), pp. 863–872.
ICSEICSE-2013-SamarthyamSSG #assessment #design #industrial #named #quality
MIDAS: a design quality assessment method for industrial software (GS, GS, TS, SG), pp. 911–920.
SLESLE-2013-LammelMV #tool support #wiki
Method and Tool Support for Classifying Software Languages with Wikipedia (RL, DM, AV), pp. 249–259.
SPLCSPLC-2013-ClementsKSW #strict
A PLE-based auditing method for protecting restricted content in derived products (PCC, CWK, JS, AW), pp. 218–226.
PPoPPPPoPP-2013-Chen #algorithm #detection #fault #fault tolerance #named #online
Online-ABFT: an online algorithm based fault tolerance scheme for soft error detection in iterative methods (ZC), pp. 167–176.
CADECADE-2013-GoreT #logic
An Improved BDD Method for Intuitionistic Propositional Logic: BDDIntKt System Description (RG, JT), pp. 275–281.
CADECADE-2013-HahnleSB #reuse #verification
Reuse in Software Verification by Abstract Method Calls (RH, IS, RB), pp. 300–314.
CAVCAV-2013-StewartEY #automaton #bound #model checking #polynomial #probability
Upper Bounds for Newton’s Method on Monotone Polynomial Systems, and P-Time Model Checking of Probabilistic One-Counter Automata (AS, KE, MY), pp. 495–510.
ICSTICST-2013-FarooqQA #effectiveness #empirical #performance #testing
A Controlled Experiment to Evaluate Effectiveness and Efficiency of Three Software Testing Methods (SUF, SMKQ, NA), pp. 493–494.
ICSTICST-2013-IchidaSO #testing
A Method of Making Single Function Tests for Constituting Scenario Tests (NI, TS, HO), pp. 479–480.
ICSTICST-2013-ShuSPC #fault #locality #named
MFL: Method-Level Fault Localization with Causal Inference (GS, BS, AP, FC), pp. 124–133.
ISSTAISSTA-2013-Buda #database #generative #testing #using
Generation of test databases using sampling methods (TSB), pp. 366–369.
WICSA-ECSAWICSA-ECSA-2012-BassN #architecture #comprehension #evaluation
Understanding the Context of Architecture Evaluation Methods (LB, RLN), pp. 277–281.
WICSA-ECSAWICSA-ECSA-2012-KoziolekDGVW #architecture #lightweight #named
MORPHOSIS: A Lightweight Method Facilitating Sustainable Software Architectures (HK, DD, TG, PV, RJW), pp. 253–257.
WICSA-ECSAWICSA-ECSA-2012-LytraSZ #architecture #framework #integration #multi
Architectural Decision Making for Service-Based Platform Integration: A Qualitative Multi-Method Study (IL, SS, UZ), pp. 111–120.
ASEASE-2012-MorenoM #automation #identification #java #named
JStereoCode: automatically identifying method and class stereotypes in Java code (LM, AM), pp. 358–361.
CASECASE-2012-BaekKAYK #case study
Study on iterative method of electro-hydraulic actuator in force control (SGB, HK, KTA, HGY, JCK), pp. 178–183.
CASECASE-2012-KimPLPC #estimation #framework #parametricity
A parameter estimation method for the bilateral teleoperation framework for an O2 lance manipulator (HK, BP, JL, YJP, WKC), pp. 564–568.
CASECASE-2012-KosakiS #architecture #internet
Control of pneumatic artificial muscles with the just-in-time method based on a client-server architecture via the internet (TK, MS), pp. 980–985.
CASECASE-2012-LiZH #realtime
A practical method for motor imagery based real-time prosthesis control (YNL, XDZ, ZXH), pp. 1052–1056.
CASECASE-2012-WeiZW #detection #recognition #research
Research on a detection and recognition method of tactile-slip sensation used to control the Elderly-assistant & Walking-assistant Robot (XW, XZ, YW), pp. 1040–1045.
CASECASE-2012-ZhuSZZ #assessment #kernel #multi
A novelty degradation assessment method for equipment based on multi-kernel SVDD (YZ, YS, XZ, YZ), pp. 753–756.
DACDAC-2012-SunGR #design #nondeterminism #robust
A new uncertainty budgeting based method for robust analog/mixed-signal design (JS, PG, JMWR), pp. 529–535.
DACDAC-2012-SuYZ #named #order #performance #reduction
AMOR: an efficient aggregating based model order reduction method for many-terminal interconnect circuits (YS, FY, XZ), pp. 295–300.
DACDAC-2012-WenZCWX #analysis #named #performance #reliability #scalability #statistics
PS3-RAM: a fast portable and scalable statistical STT-RAM reliability analysis method (WW, YZ, YC, YW, YX), pp. 1191–1196.
DATEDATE-2012-LinWCCCHYS #analysis #functional #mutation testing #probability
A probabilistic analysis method for functional qualification under Mutation Analysis (HYL, CYW, SCC, YCC, HMC, CYH, YCY, CCS), pp. 147–152.
DATEDATE-2012-LiuMG #estimation #performance #problem
A fast analog circuit yield estimation method for medium and high dimensional problems (BL, JM, GGEG), pp. 751–756.
DATEDATE-2012-LiuTWY #simulation
A GPU-accelerated envelope-following method for switching power converter simulation (XL, SXDT, HW, HY), pp. 1349–1354.
DATEDATE-2012-MitraBD #formal method #mining #ranking
Formal methods for ranking counterexamples through assumption mining (SM, AB, PD), pp. 911–916.
DATEDATE-2012-ZhangPM #3d #analysis #grid #power management
Voltage propagation method for 3-D power grid analysis (CZ, VFP, GDM), pp. 844–847.
DRRDRR-2012-DaherGEBV #categorisation #recognition
Unsupervised categorization method of graphemes on handwritten manuscripts: application to style recognition (HD, DG, VE, SB, NV).
DRRDRR-2012-Obafemi-AjayiAX #classification #documentation
Ensemble methods with simple features for document zone classification (TOA, GA, BX).
DRRDRR-2012-WalkerLR #dataset #documentation #image
A synthetic document image dataset for developing and evaluating historical document processing methods (DDW, WBL, EKR).
CSEETCSEET-2012-Kajko-Mattsson #design #education #re-engineering #source code
A Method for Designing Software Engineering Educational Programs (MKM), pp. 139–143.
ITiCSEITiCSE-2012-MI #algorithm
A method to construct counterexamples for greedy algorithms (JM, SI), pp. 238–243.
ITiCSEITiCSE-2012-SalzerHY #testing
The scientific method and software testing integrated into the same lesson (HTS, BH, CY), p. 385.
CSMRCSMR-2012-HeinemannBHH #api #recommendation
Identifier-Based Context-Dependent API Method Recommendation (LH, VB, MH, BH), pp. 31–40.
CSMRCSMR-2012-HottaHK #dependence #graph #identification #refactoring
Identifying, Tailoring, and Suggesting Form Template Method Refactoring Opportunities with Program Dependence Graph (KH, YH, SK), pp. 53–62.
CSMRCSMR-2012-KimKKB #analysis #database
Rebuilding a Unified Database Service via Context Analysis Method (WK, THK, SK, DHB), pp. 471–474.
ICPCICPC-2012-HottaHIK #named #refactoring
CRat: A refactoring support tool for Form Template Method (KH, YH, HI, SK), pp. 250–252.
ICPCICPC-2012-LuciaPOPP #information retrieval #question #source code #using
Using IR methods for labeling source code artifacts: Is it worthwhile? (ADL, MDP, RO, AP, SP), pp. 193–202.
ICSMEICSM-2012-BiegelBHD #developer #how #order
The Order of Things: How developers sort fields and methods (BB, FB, WH, SD), pp. 88–97.
SASSAS-2012-ThakurR
A Generalization of Stålmarck’s Method (AVT, TWR), pp. 334–351.
STOCSTOC-2012-OrecchiaSV #algorithm #approximate #exponential
Approximating the exponential, the lanczos method and an Õ(m)-time spectral algorithm for balanced separator (LO, SS, NKV), pp. 1141–1160.
DLTDLT-2012-GiambrunoMNS #bidirectional #finite
A Generalization of Girod’s Bidirectional Decoding Method to Codes with a Finite Deciphering Delay (LG, SM, JN, CS), pp. 471–476.
ICALPICALP-v1-2012-AchlioptasM #bound #random #satisfiability
Unsatisfiability Bounds for Random CSPs from an Energetic Interpolation Method (DA, RMM), pp. 1–12.
ICALPICALP-v1-2012-BringmannP #performance
Efficient Sampling Methods for Discrete Distributions (KB, KP), pp. 133–144.
ICALPICALP-v1-2012-ShiW #optimisation
Epsilon-Net Method for Optimizations over Separable States (YS, XW), pp. 798–809.
ICALPICALP-v2-2012-BroadbentCHS #automaton
A Saturation Method for Collapsible Pushdown Systems (CHB, AC, MH, OS), pp. 165–176.
FMFM-2012-Degani #formal method
Formal Methods in the Wild: Trains, Planes, & Automobile (AD), p. 6.
FMFM-2012-OsaiweranFGR #case study #component #design #experience #formal method #using
Experience Report on Designing and Developing Control Components Using Formal Methods (AO, TF, JFG, BJvR), pp. 341–355.
FMFM-2012-YangKK #formal method #lightweight #using
Specification-Based Test Repair Using a Lightweight Formal Method (GY, SK, MK), pp. 455–470.
GRAPHITEGRAPHITE-2012-Cormie-Bowins #comparison #gpu #implementation #reachability
A Comparison of Sequential and GPU Implementations of Iterative Methods to Compute Reachability Probabilities (ECB), pp. 20–34.
CHICHI-2012-BabaianLO #collaboration
Evaluating the collaborative critique method (TB, WTL, MKO), pp. 2137–2164.
CHICHI-2012-GhomiFHCB #using
Using rhythmic patterns as an input method (EG, GF, SH, OC, MBL), pp. 1253–1262.
CHICHI-2012-KapteinR #analysis #statistics
Rethinking statistical analysis methods for CHI (MK, JR), pp. 1105–1114.
CHICHI-2012-ZhangYELBI #lightweight
See me, see you: a lightweight method for discriminating user touches on tabletop displays (HZ, XDY, BE, HNL, PB, PI), pp. 2327–2336.
CSCWCSCW-2012-PhilipUASGLR #component #reuse
Software reuse through methodical component reuse and amethodical snippet remixing (KP, MU, MA, SES, REGV, CVL, SR), pp. 1361–1370.
ICEISICEIS-J-2012-KaragiannisS #approach #design #hybrid #modelling
An Engineering Approach for the Design of Hybrid Modelling Methods (DK, MS), pp. 3–17.
ICEISICEIS-J-2012-NikovskiEYST12a #automation #composition
Matcher Composition Methods for Automatic Schema Matching (DN, AE, XY, MS, ST), pp. 108–123.
ICEISICEIS-J-2012-PolasikGWKPT12a #empirical #mobile #performance
Time Efficiency of Point-of-Sale Payment Methods: Empirical Results for Cash, Cards and Mobile Payments (MP, JG, GW, JK, KP, NT), pp. 306–320.
ICEISICEIS-v1-2012-CarvalhoBSR #clustering
Labeling Methods for Association Rule Clustering (VOdC, DSB, FFdS, SOR), pp. 105–111.
ICEISICEIS-v3-2012-HamadaASO #classification #documentation #taxonomy #using
A Classification Method of Open-ended Questionnaires using Category-based Dictionary from Sampled Documents (KH, MA, MS, HO), pp. 193–198.
ICEISICEIS-v3-2012-TsudaASO #automation #classification
A Classification Method of Inquiry e-Mails for Describing FAQ with Automatic Setting Mechanism of Judgment Threshold Values (YT, MA, MS, HO), pp. 199–205.
CIKMCIKM-2012-BaeK #classification #effectiveness #recommendation
An effective category classification method based on a language model for question category recommendation on a cQA service (KB, YK), pp. 2255–2258.
CIKMCIKM-2012-ChenPZ #semantics
A co-training based method for chinese patent semantic annotation (XC, ZP, CZ), pp. 2379–2382.
CIKMCIKM-2012-DybalaRAS #analysis #comparative #generative #ranking
Data filtering in humor generation: comparative analysis of hit rate and co-occurrence rankings as a method to choose usable pun candidates (PD, RR, KA, KS), pp. 2587–2590.
CIKMCIKM-2012-LiuSJL #web
An unsupervised method for author extraction from web pages containing user-generated content (JL, XS, JJ, CYL), pp. 2387–2390.
CIKMCIKM-2012-MaFL #database #relational
A positional access method for relational databases (DM, JF, GL), pp. 2164–2168.
CIKMCIKM-2012-OhY #framework #named
iSampling: framework for developing sampling methods considering user’s interest (JO, HY), pp. 1667–1671.
CIKMCIKM-2012-RenLZZ #collaboration #performance
The efficient imputation method for neighborhood-based collaborative filtering (YR, GL, JZ, WZ), pp. 684–693.
CIKMCIKM-2012-XuKZ #generative #timeline #word
A picture paints a thousand words: a method of generating image-text timelines (SX, LK, YZ), pp. 2511–2514.
ICMLICML-2012-BalasubramanianL #multi #predict
The Landmark Selection Method for Multiple Output Prediction (KB, GL), p. 41.
ICMLICML-2012-DefazioC #collaboration #performance #visual notation
A Graphical Model Formulation of Collaborative Filtering Neighbourhood Methods with Fast Maximum Entropy Training (AD, TSC), p. 75.
ICMLICML-2012-DhillonRFU #modelling #using #word
Using CCA to improve CCA: A new spectral method for estimating vector models of words (PSD, JR, DPF, LHU), p. 13.
ICMLICML-2012-HannahD #design #geometry #programming
Ensemble Methods for Convex Regression with Applications to Geometric Programming Based Circuit Design (LH, DBD), p. 24.
ICMLICML-2012-HennigK
Quasi-Newton Methods: A New Direction (PH, MK), p. 134.
ICMLICML-2012-RavanbakhshYG #approximate #modelling #visual notation
A Generalized Loop Correction Method for Approximate Inference in Graphical Models (S(R, CNY, RG), p. 84.
ICMLICML-2012-WangB #online
Online Alternating Direction Method (HW, AB), p. 221.
ICMLICML-2012-XiaoZ #problem
A Proximal-Gradient Homotopy Method for the L1-Regularized Least-Squares Problem (LX, TZ), p. 160.
ICPRICPR-2012-AntoniukFH #learning #markov #network
Learning Markov Networks by Analytic Center Cutting Plane Method (KA, VF, VH), pp. 2250–2253.
ICPRICPR-2012-FausserS #clustering #dataset #kernel #scalability
Clustering large datasets with kernel methods (SF, FS), pp. 501–504.
ICPRICPR-2012-FrouzeshPH #modelling #optimisation
A combined method for finding best starting points for optimisation in bernoulli mixture models (FF, SP, YH), pp. 1128–1131.
ICPRICPR-2012-FuLBF
Spectral correspondence method for fingerprint minutia matching (XF, CL, JB, JF), pp. 1743–1746.
ICPRICPR-2012-GaoTLW #graph #re-engineering
A graph-based method of newspaper article reconstruction (LG, ZT, XL, YW), pp. 1566–1569.
ICPRICPR-2012-GautamSV #performance
An efficient, bolus-stage based method for motion correction in perfusion weighted MRI (RG, JS, RV), pp. 145–148.
ICPRICPR-2012-GonzalezBTB #image #recognition
A character recognition method in natural scene images (ÁG, LMB, JJYT, SB), pp. 621–624.
ICPRICPR-2012-KangLH #adaptation #image
Fusing soft-decision-adaptive and bicubic methods for image interpolation (XK, SL, JH), pp. 1043–1046.
ICPRICPR-2012-KovalenkoS #on the
On methods for incorporating evidences into posterior scoring of hypotheses (DK, SNS), pp. 577–580.
ICPRICPR-2012-LiuSZ #feature model #graph
Sparsity Score: A new filter feature selection method based on graph (ML, DS, DZ), pp. 959–962.
ICPRICPR-2012-LiuXL #performance #recognition
An efficient method for occluded face recognition (WL, XX, KML), pp. 2993–2996.
ICPRICPR-2012-MinagawaKTH #automation #detection
A color chart detection method for automatic color correction (AM, YK, HT, YH), pp. 1912–1915.
ICPRICPR-2012-MoriyamaAS #analysis #using
Face analysis of aggressive moods in automobile driving using mutual subspace method (TM, KA, NS), pp. 2898–2901.
ICPRICPR-2012-ShaoWCHW #array #automation #image
An improved automatic gridding method for cDNA microarray images (GS, TW, ZC, YH, YW), pp. 1615–1618.
ICPRICPR-2012-ShivakumaraHZTP #video
A new Iterative-Midpoint-Method for video character gap filling (PS, DBH, DZ, CLT, UP), pp. 673–676.
ICPRICPR-2012-SunH #component
A component-tree based method for user-intention guided text extraction (LS, QH), pp. 633–636.
ICPRICPR-2012-TajimaIA #3d #correlation #using
A non-rigid registration method for medical volume data using 3D Phase-Only Correlation (YT, KI, TA), pp. 93–96.
ICPRICPR-2012-WangUL
Part-based method on handwritten texts (SW, SU, ML), pp. 339–342.
ICPRICPR-2012-YangLP #effectiveness
A simple and effective extrinsic calibration method of a camera and a single line scanning lidar (HY, XL, IP), pp. 1439–1442.
ICPRICPR-2012-ZangY0JZT #information management
A score-level fusion method with prior knowledge for fingerprint matching (YZ, XY, KC, XJ, NZ, JT), pp. 2379–2382.
ICPRICPR-2012-ZhangLC #analysis #detection #multi #novel
A novel spatial-temporal multi-scale method for detection and analysis of infrared multiple moving objects (TZ, HL, JC), pp. 1884–1887.
ICPRICPR-2012-ZhangLMA #detection #independence #statistics
A viewpoint-independent statistical method for fall detection (ZZ, WL, VM, VA), pp. 3626–3630.
ICPRICPR-2012-ZhangW #image #segmentation
An image fusion method based on region segmentation and Cauchy convolution (YQZ, XJW), pp. 392–395.
ICPRICPR-2012-ZhangWL #documentation #keyword #online
A confidence-based method for keyword spotting in online Chinese handwritten documents (HZ, DHW, CLL), pp. 525–528.
ICPRICPR-2012-ZhaoL #3d #detection
Patch based saliency detection method for 3D surface simplification (YZ, YL), pp. 845–848.
ICPRICPR-2012-ZhaoYXJ #learning
A near-optimal non-myopic active learning method (YZ, GY, XX, QJ), pp. 1715–1718.
ICPRICPR-2012-Zhu0N #normalisation #recognition
Discriminative normalization method for handwritten Chinese character recognition (YZ, JS, SN), pp. 274–277.
KDDKDD-2012-BellalaMALB #power management
Following the electrons: methods for power management in commercial buildings (GB, MM, MFA, GL, CB), pp. 994–1002.
KDDKDD-2012-CosciaRGP #community #named
DEMON: a local-first discovery method for overlapping communities (MC, GR, FG, DP), pp. 615–623.
KDDKDD-2012-GleichS #community
Vertex neighborhoods, low conductance cuts, and good seeds for local community methods (DFG, CS), pp. 597–605.
KDIRKDIR-2012-MiaoLWZ #infinity #modelling #process #semantics #topic #wiki
Infinite Topic Modelling for Trend Tracking — Hierarchical Dirichlet Process Approaches with Wikipedia Semantic based Method (YM, CL, HW, LZ), pp. 35–44.
KEODKEOD-2012-FernandezVML #fuzzy #named #ontology
FuzzyAlign — A Fuzzy Method for Ontology Alignment (SF, JRV, IMM, MALC), pp. 98–107.
KEODKEOD-2012-HenriquesS #framework #ontology
An Ontology-based Framework for Syndromic Surveillance Method Selection (GH, DAS), pp. 396–400.
KMISKMIS-2012-HamadaAS #generative #learning #using
A Generation Method of Reference Operation using Reinforcement Learning on Project Manager Skill-up Simulator (KH, MA, MS), pp. 15–20.
KMISKMIS-2012-KataokaTKH #information management #network
An Information Sharing Method for Skilled Management Operations based on Bayesian Network Inference (TK, KT, MK, MH), pp. 257–260.
KMISKMIS-2012-OtsukiAS #using
An Improvement Method of User Operations using Decision Tree on Project Manager Skill-up Simulator (MO, MA, MS), pp. 158–163.
KMISKMIS-2012-PanTG #analysis #component
A Component-based Method for Stakeholder Analysis (YCP, YT, SRG), pp. 290–293.
KMISKMIS-2012-RezendeLBJMRB #framework #information management #modelling
Modelling and Knowledge Management in the Field of Road Infrastructure Operation and Regulation — Study on the Methods Application in an Organizational Unit (LR, MAL, CRNB, JdLPCJ, LAM, SAR, CAMB), pp. 265–268.
MLDMMLDM-2012-Ba-KaraitSS #classification #hybrid #optimisation #using
EEG Signals Classification Using a Hybrid Method Based on Negative Selection and Particle Swarm Optimization (NOSBK, SMS, RS), pp. 427–438.
MLDMMLDM-2012-JoenssenB
Hot Deck Methods for Imputing Missing Data — The Effects of Limiting Donor Usage (DWJ, UB), pp. 63–75.
MLDMMLDM-2012-StaroszczykOM #analysis #comparative #feature model #recognition
Comparative Analysis of Feature Selection Methods for Blood Cell Recognition in Leukemia (TS, SO, TM), pp. 467–481.
RecSysRecSys-2012-NingK #linear #recommendation
Sparse linear methods with side information for top-n recommendations (XN, GK), pp. 155–162.
RecSysRecSys-2012-SchelterBM #pipes and filters #scalability #similarity
Scalable similarity-based neighborhood methods with MapReduce (SS, CB, VM), pp. 163–170.
SEKESEKE-2012-ChenCZS #analysis #approach #integration
A Model-centric Approach for the Integration of Software Analysis Methods (XC, JC, ZZ, LS), pp. 211–216.
SEKESEKE-2012-GaoKN #feature model #metric
Stability of Filter-Based Feature Selection Methods for Imbalanced Software Measurement Data (KG, TMK, AN), pp. 74–79.
SEKESEKE-2012-HuangL
A Goal-Driven Method for Selecting Issues Used in Agent Negotiation (YCH, AL), pp. 759–762.
SEKESEKE-2012-HuiLCDM #e-commerce #empirical #recommendation
An Empirical Study on Recommendation Methods for Vertical B2C E-commerce (CH, JL, ZC, XD, WM), pp. 139–142.
SEKESEKE-2012-LiLCZJZ #adaptation #continuation #self #verification
A HybridUML and QdL Based Verification Method for CPS Self-Adaptability (JL, BL, QC, MZ, SJ, XZ), pp. 239–242.
SEKESEKE-2012-RiveroC #usability #using #web
Using the Results from a Systematic Mapping Extension to Define a Usability Inspection Method for Web Applications (LR, TC), pp. 582–587.
SEKESEKE-2012-SubburajUS #safety #specification
Specification of Safety Critical Systems with Intelligent Software Agent Method (VHS, JEU, MRS), pp. 578–581.
SEKESEKE-2012-TanizakiAK #variability
A Variability Management Method for Software Configuration Files (HT, TA, TK), pp. 672–677.
SIGIRSIGIR-2012-BerardiES #automation #classification #ranking
A utility-theoretic ranking method for semi-automated text classification (GB, AE, FS), pp. 961–970.
SIGIRSIGIR-2012-CareniniM #mining
Methods for mining and summarizing text conversations (GC, GM), pp. 1178–1179.
SIGIRSIGIR-2012-MetzlerK #information retrieval
Experimental methods for information retrieval (DM, OK), pp. 1185–1186.
SIGIRSIGIR-2012-WeiLZMRZ #novel #web
Fighting against web spam: a novel propagation method based on click-through data (CW, YL, MZ, SM, LR, KZ), pp. 395–404.
ECMFAECMFA-2012-QureshiCT #constraints #specification
A Timed Automata-Based Method to Analyze EAST-ADL Timing Constraint Specifications (TNQ, DJC, MT), pp. 303–318.
TOOLSTOOLS-EUROPE-J-2011-SchwarzLN12 #fine-grained #named
Seuss: Decoupling responsibilities from static methods for fine-grained configurability (NS, ML, ON), pp. 1–23.
OOPSLAOOPSLA-2012-CousotCLB #abstract interpretation #contract #framework #refactoring
An abstract interpretation framework for refactoring with application to extract methods with contracts (PC, RC, FL, MB), pp. 213–232.
OOPSLAOOPSLA-2012-HuangMDE
Reim & ReImInfer: checking and inference of reference immutability and method purity (WH, AM, WD, MDE), pp. 879–896.
TOOLSTOOLS-EUROPE-2012-CatanoHR #formal method #named #network #policy #privacy #social
Poporo: A Formal Methods Tool for Fast-Checking of Social Network Privacy Policies (NC, SH, CR), pp. 9–16.
TOOLSTOOLS-EUROPE-2012-OlszakBJV #detection #quantifier
Detection of Seed Methods for Quantification of Feature Confinement (AO, EB, BNJ, JV), pp. 252–268.
TOOLSTOOLS-EUROPE-2012-VranyKG #performance #smalltalk
Efficient Method Lookup Customization for Smalltalk (JV, JK, CG), pp. 124–139.
QAPLQAPL-2012-GazeauMP #analysis #float #robust #source code
A non-local method for robustness analysis of floating point programs (IG, DM, CP), pp. 63–76.
REFSQREFSQ-2012-BeckersFKS #identification
A Pattern-Based Method for Identifying and Analyzing Laws (KB, SF, JCK, HS), pp. 256–262.
REFSQREFSQ-2012-TekaCS #bibliography
A Systematic Literature Review on Service Description Methods (AYT, NCF, BS), pp. 239–255.
SACSAC-2012-ChenNX #collaboration #recommendation
A common neighbour based two-way collaborative recommendation method (LC, RN, YX), pp. 214–215.
SACSAC-2012-GrooteOW #case study #experience #formal method
Experience report on developing the Front-end client unit under the control of formal methods (JFG, AO, JHW), pp. 1183–1190.
SACSAC-2012-IkemotoDO #pseudo #reliability
Estimating software reliability via pseudo maximum likelihood method (SI, TD, HO), pp. 1171–1176.
SACSAC-2012-LiuHHYS #multi #performance
An application of circumscribed circle filter in the Multi-Stencils Fast Marching method (HL, CCH, HH, MY, ES), pp. 33–38.
SACSAC-2012-MaruhashiTT #identification
A method for identification of moving objects by integrative use of a camera and accelerometers (NM, TT, MT), pp. 1–6.
SACSAC-2012-OtaMSA #dependence #flexibility #functional #named
C-Mapping: a flexible XML-RDB mapping method based on functional and inclusion dependencies (SO, AM, NS, TA), pp. 834–839.
SACSAC-2012-RajeDFRR #data access #implementation #ontology #using
Using ontology-based methods for implementing role-based access control in cooperative systems (SR, CD, MF, RR, JR), pp. 763–764.
SACSAC-2012-TeymooriKY #fault tolerance #network #realtime
A real-time data aggregation method for fault-tolerant wireless sensor networks (PT, MK, NY), pp. 605–612.
SACSAC-2012-YuHJSLH #novel #programming #segmentation
A novel segmentation method for convex lesions based on dynamic programming with local intra-class variance (MY, QH, RJ, ES, HL, CCH), pp. 39–44.
FSEFSE-2012-HuangM #java #named
ReImInfer: method purity inference for Java (WH, AM), p. 38.
ICSEICSE-2012-DangWZZN #clustering #named #similarity #stack
ReBucket: A method for clustering duplicate crash reports based on call stack similarity (YD, RW, HZ, DZ, PN), pp. 1084–1093.
ICSEICSE-2012-PanditaXZXOP #api #natural language #specification
Inferring method specifications from natural language API descriptions (RP, XX, HZ, TX, SO, AMP), pp. 815–825.
ICSEICSE-2012-SingerS #re-engineering #social #using
Influencing the adoption of software engineering methods using social software (LS, KS), pp. 1325–1328.
PLEASEPLEASE-2012-ShimbaraWKKO #testing
Feature-analysis-based selection method for system configuration for system testing (DS, HW, SK, MK, HO), pp. 61–64.
SPLCSPLC-2012-Heymans #formal method
Formal methods for the masses (PH), p. 4.
CCCC-2012-HouVQJFV
A New Method for Program Inversion (CH, GV, DJQ, DJ, RF, RWV), pp. 81–100.
CGOCGO-2012-AnsaloniBHC #multi #program analysis
Deferred methods: accelerating dynamic program analysis on multicores (DA, WB, AH, LYC), pp. 242–251.
CAVCAV-2012-ChuJ #reduction #safety #symmetry #verification
A Complete Method for Symmetry Reduction in Safety Verification (DHC, JJ), pp. 616–633.
CAVCAV-2012-ThakurR #symbolic computation
A Method for Symbolic Computation of Abstract Operations (AVT, TWR), pp. 174–192.
ICSTICST-2012-EndoS #comparison #finite #generative #state machine #testing
Experimental Comparison of Test Case Generation Methods for Finite State Machines (ATE, AdSS), pp. 549–558.
ICSTICST-2012-GrooteOW #formal method #using
Analyzing a Controller of a Power Distribution Unit Using Formal Methods (JFG, AO, JHW), pp. 420–428.
ICSTICST-2012-Kapfhammer #database #testing #towards
Towards a Method for Reducing the Test Suites of Database Applications (GMK), pp. 964–965.
ICSTICST-2012-KuhnHLKL #combinator #sequence #testing
Combinatorial Methods for Event Sequence Testing (DRK, JMH, JL, RK, YL), pp. 601–609.
ICTSSICTSS-2012-ChenV #protocol #testing
Passive Interoperability Testing for Request-Response Protocols: Method, Tool and Application on CoAP Protocol (NC, CV), pp. 87–102.
ICSTSAT-2012-DemirovicG #composition #performance #satisfiability
An Efficient Method for Solving UNSAT 3-SAT and Similar Instances via Static Decomposition — (Poster Presentation) (ED, HG), pp. 489–490.
CBSECBSE-2011-DistefanoFGM #analysis #composition #multi #reliability #workflow
A compositional method for reliability analysis of workflows affected by multiple failure modes (SD, AF, CG, RM), pp. 149–158.
CBSECBSE-2011-InoueH #analysis #component #data flow
A method for data-flow analysis of business components (TI, SH), pp. 51–60.
ECSAECSA-2011-MullerKG #architecture
A Question-Based Method for Deriving Software Architectures (MM, BK, MG), pp. 35–42.
ECSAECSA-2011-Naab #architecture #design #flexibility #information management
Enhancing Architecture Design Methods for Improved Flexibility in Long-Living Information Systems (MN), pp. 194–198.
WICSAWICSA-2011-PetrovBN #analysis #architecture #design #enterprise #multi
The Need for a Multilevel Context-Aware Software Architecture Analysis and Design Method with Enterprise and System Architecture Concerns as First Class Entities (PP, UB, RLN), pp. 147–156.
WICSAWICSA-2011-RosS #architecture
A Method for Evidence-Based Architecture Discovery (JPR, RSS), pp. 342–345.
ASEASE-2011-HillPV #code search #natural language #source code
Improving source code search with natural language phrasal representations of method signatures (EH, LLP, KVS), pp. 524–527.
CASECASE-2011-AranovskiyBB #identification #metric
The method of identification for the “motor-dual-section device” system through output signal measurements (SA, AAB, VB), pp. 346–350.
CASECASE-2011-CaoPW #scheduling
A drum-buffer-rope based scheduling method for semiconductor manufacturing system (ZC, YP, YW), pp. 120–125.
CASECASE-2011-LeonardoKKDS #monitoring #simulation
Simulation of a hydraulic pump application for monitoring and diagnosis methods (DL, SK, AKH, AD, RS), pp. 341–345.
CASECASE-2011-LiTL #process
A GERT-based analytical method for remanufacturing process routing (CL, YT, CL), pp. 462–467.
CASECASE-2011-PurwinsNBHKLPW #predict
Regression methods for prediction of PECVD Silicon Nitride layer thickness (HP, AN, BB, UH, AK, BL, GP, KW), pp. 387–392.
CASECASE-2011-WuS #bound #multi #problem
A lower and upper bound guided nested partitions method for solving capacitated multi-level production planning problems (TW, LS), pp. 78–83.
CASECASE-2011-ZanasiC #design #visual notation
Direct method for digital lead-lag design: analytical and graphical solutions (RZ, SC), pp. 804–809.
DACDAC-2011-HochmanBW #empirical #reduction
A stabilized discrete empirical interpolation method for model reduction of electrical, thermal, and microelectromechanical systems (AH, BNB, JKW), pp. 540–545.
DACDAC-2011-HsiaoD #bound #parallel #scalability
A highly scalable parallel boundary element method for capacitance extraction (YCH, LD), pp. 552–557.
DACDAC-2011-MillerBHDCB #analysis #testing #validation
A method to leverage pre-silicon collateral and analysis for post-silicon testing and validation (GM, BB, YCH, JD, XC, GB), pp. 575–578.
DACDAC-2011-ZhaoF #3d #gpu #parallel #performance
Fast multipole method on GPU: tackling 3-D capacitance extraction on massively parallel SIMD platforms (XZ, ZF), pp. 558–563.
DATEDATE-2011-AadithyaDVR #modelling #named #random #simulation
SAMURAI: An accurate method for modelling and simulating non-stationary Random Telegraph Noise in SRAMs (KVA, AD, SV, JSR), pp. 1113–1118.
DATEDATE-2011-BonannoBS #analysis #energy #modelling #monitoring #optimisation #tool support
Energy analysis methods and tools for modelling and Optimizing monitoring tyre systems (AB, AB, MS), pp. 1121–1122.
DATEDATE-2011-ErbP #analysis #performance
A method for fast jitter tolerance analysis of high-speed PLLs (SE, WP), pp. 1107–1112.
DATEDATE-2011-KaraklajicFSV #detection #fault #low cost #using
Low-cost fault detection method for ECC using Montgomery powering ladder (DK, JF, JMS, IV), pp. 1016–1021.
DATEDATE-2011-KeezerG #synthesis
Two methods for 24 Gbps test signal synthesis (DCK, CEG), pp. 579–582.
DATEDATE-2011-LiuS #continuation #optimisation #performance
An efficient mask optimization method based on homotopy continuation technique (FL, XS), pp. 1053–1058.
DATEDATE-2011-PanHHL #effectiveness
A cost-effective substantial-impact-filter based method to tolerate voltage emergencies (SP, YH, XH, XL), pp. 311–315.
DATEDATE-2011-RekikADMN #development #evaluation
An electrical test method for MEMS convective accelerometers: Development and evaluation (AAR, FA, ND, FM, PN), pp. 806–811.
DATEDATE-2011-ShinG #fault
A new circuit simplification method for error tolerant applications (DS, SKG), pp. 1566–1571.
DATEDATE-2011-Sifakis #component #design #tool support
Methods and tools for component-based system design (JS), p. 1022.
DATEDATE-2011-SommerKHSS #automation #design #generative #network
A new method for automated generation of compensation networks — The EDA Designer Finger (RS, DK, EH, ES, CS), pp. 1666–1672.
DATEDATE-2011-VasicekS #optimisation
A global postsynthesis optimization method for combinational circuits (ZV, LS), pp. 1525–1528.
DATEDATE-2011-YehHWL #framework #simulation
Speeding Up MPSoC virtual platform simulation by Ultra Synchronization Checking Method (YFY, CYH, CAW, HCL), pp. 353–358.
DATEDATE-2011-YuH #fault #logic
Trigonometric method to handle realistic error probabilities in logic circuits (CCY, JPH), pp. 64–69.
DocEngDocEng-2011-CardosoJLRC #independence #performance
An efficient language-independent method to extract content from news webpages (ETC, IVJ, ESL, RR, PC), pp. 121–128.
DRRDRR-2011-Dejean
Unsupervised method to generate page templates (HD), pp. 1–10.
DRRDRR-2011-FujiiTTH #keyword #retrieval #robust
Robust keyword retrieval method for OCRed text (YF, HT, HT, YH), pp. 1–10.
DRRDRR-2011-LemaitreCC #segmentation
A perceptive method for handwritten text segmentation (AL, JC, BC), pp. 1–10.
DRRDRR-2011-Rodriguez-PineiroAPM #documentation #image
A new method for perspective correction of document images (JRP, PCA, FPG, AMG), pp. 1–10.
DRRDRR-2011-SmithDL #documentation
A mask-based enhancement method for historical documents (EHBS, JD, LLS), pp. 1–10.
DRRDRR-2011-SuPD #recognition
SemiBoost-based Arabic character recognition method (BS, LP, XD), pp. 1–10.
ICDARICDAR-2011-AlmazanFV #feature model #recognition
A Non-rigid Feature Extraction Method for Shape Recognition (JA, AF, EV), pp. 987–991.
ICDARICDAR-2011-ClausnerPA11a #analysis #documentation #evaluation #layout #performance
Scenario Driven In-depth Performance Evaluation of Document Layout Analysis Methods (CC, SP, AA), pp. 1404–1408.
ICDARICDAR-2011-FangGBQTT #detection #documentation #multi #visual notation
A Table Detection Method for Multipage PDF Documents via Visual Seperators and Tabular Structures (JF, LG, KB, RQ, XT, ZT), pp. 779–783.
ICDARICDAR-2011-GaoDL #documentation #multi #segmentation
A Multi-scale Text Line Segmentation Method in Freestyle Handwritten Documents (YG, XD, CL), pp. 643–647.
ICDARICDAR-2011-GaoWJ #2d #optimisation #recognition
A New Feature Optimization Method Based on Two-Directional 2DLDA for Handwritten Chinese Character Recognition (XG, WW, LJ), pp. 232–236.
ICDARICDAR-2011-KurbielKE #analysis #component #independence #novel #preprocessor
A Novel Preprocessing Method for Hectography Prints Based on Independent Component Analysis (TK, IVK, SE), pp. 1145–1149.
ICDARICDAR-2011-LiangWS #image #segmentation
A Method of Evaluating Table Segmentation Results Based on a Table Image Ground Truther (YL, YW, ES), pp. 247–251.
ICDARICDAR-2011-LiuLZL #detection #image #novel
A Novel Italic Detection and Rectification Method for Chinese Advertising Images (JL, HL, SZ, WL), pp. 698–702.
ICDARICDAR-2011-LiuZLL #clustering #image #locality
A Chinese Character Localization Method Based on Intergrating Structure and CC-Clustering for Advertising Images (JL, SZ, HL, WL), pp. 1044–1048.
ICDARICDAR-2011-LuangvilayZN #online
An On-line Handwritten Text Search Method Based on Directional Feature Matching (PL, BZ, MN), pp. 683–686.
ICDARICDAR-2011-ManoharVCPN #clustering #graph #segmentation
Graph Clustering-Based Ensemble Method for Handwritten Text Line Segmentation (VM, SNPV, HC, RP, PN), pp. 574–578.
ICDARICDAR-2011-NavonKO
Enhanced Active Contour Method for Locating Text (YN, VK, BO), pp. 222–226.
ICDARICDAR-2011-PhamDB #detection
A Contour-Based Method for Logo Detection (TAP, MD, SB), pp. 718–722.
ICDARICDAR-2011-PhanSST #segmentation #video
A Gradient Vector Flow-Based Method for Video Character Segmentation (TQP, PS, BS, CLT), pp. 1024–1028.
ICDARICDAR-2011-RajendranSSLT #recognition #video #word
A New Fourier-Moments Based Video Word and Character Extraction Method for Recognition (DR, PS, BS, SL, CLT), pp. 1165–1169.
ICDARICDAR-2011-RenLC #automation #recognition #retrieval #segmentation
A New Method on the Segmentation and Recognition of Chinese Characters for Automatic Chinese Seal Imprint Retrieval (CR, DL, YC), pp. 972–976.
ICDARICDAR-2011-RusinolATL #documentation #word
Browsing Heterogeneous Document Collections by a Segmentation-Free Word Spotting Method (MR, DA, RT, JL), pp. 63–67.
ICDARICDAR-2011-ShaoWXZZ11a #learning #multi
Multiple Instance Learning Based Method for Similar Handwritten Chinese Characters Discrimination (YS, CW, BX, RZ, YZ), pp. 1002–1006.
ICDARICDAR-2011-ShivakumaraBSTP #recognition #segmentation #video
A New Gradient Based Character Segmentation Method for Video Text Recognition (PS, SB, BS, CLT, UP), pp. 126–130.
ICDARICDAR-2011-SilvaL #automation #documentation #recognition
An Automatic Method for Enhancing Character Recognition in Degraded Historical Documents (GPeS, RDL), pp. 553–557.
ICDARICDAR-2011-SongUL11a #case study #comparative #recognition
Comparative Study of Part-Based Handwritten Character Recognition Methods (WS, SU, ML), pp. 814–818.
ICDARICDAR-2011-TanakaTH #documentation #optimisation #robust
Robust Cell Extraction Method for Form Documents Based on Intersection Searching and Global Optimization (HT, HT, YH), pp. 354–358.
ICDARICDAR-2011-TerasawaSK #image #performance
A Fast Appearance-Based Full-Text Search Method for Historical Newspaper Images (KT, TS, TK), pp. 1379–1383.
ICDARICDAR-2011-WangHL #embedded #novel #segmentation
A Novel Method for Embedded Text Segmentation Based on Stroke and Color (XW, LH, CL), pp. 151–155.
ICDARICDAR-2011-WeiGB #word
A Method for Removing Inflectional Suffixes in Word Spotting of Mongolian Kanjur (HW, GG, YB), pp. 88–92.
ICDARICDAR-2011-XuDPL #grid #independence #recognition
An Improved Method Based on Weighted Grid Micro-structure Feature for Text-Independent Writer Recognition (LX, XD, LP, XL), pp. 638–642.
ICDARICDAR-2011-ZhangL #keyword #online
A Lattice-Based Method for Keyword Spotting in Online Chinese Handwriting (HZ, CLL), pp. 1064–1068.
ICDARICDAR-2011-ZhangLYDW #random #recognition #using
An Improved Scene Text Extraction Method Using Conditional Random Field and Optical Character Recognition (HZ, CL, CY, XD, KW), pp. 708–712.
ICDARICDAR-2011-ZhaoLL #detection #independence #robust
A Robust Color-Independent Text Detection Method from Complex Videos (YZ, TL, WL), pp. 374–378.
ICDARICDAR-2011-ZhuN11a #classification #online #recognition #scalability
A Coarse Classifier Construction Method from a Large Number of Basic Recognizers for On-line Recognition of Handwritten Japanese Characters (BZ, MN), pp. 1090–1094.
ICDARICDAR-2011-ZhuN11b #online #recognition #using
Trie-Lexicon-Driven Recognition for On-line Handwritten Japanese Disease Names Using a Time-Synchronous Method (BZ, MN), pp. 1130–1134.
SIGMODSIGMOD-2011-LiTP #named #sequence
WHAM: a high-throughput sequence alignment method (YL, AT, JMP), pp. 445–456.
VLDBVLDB-2012-LiDWF11 #named #similarity
PASS-JOIN: A Partition-based Method for Similarity Joins (GL, DD, JW, JF), pp. 253–264.
CSEETCSEET-2011-AndrianoMBR #assessment
A quantitative assessment method for simulation-based e-learnings (NA, MGM, CB, DR), pp. 159–168.
CSEETCSEET-2011-ChenZL #education #testing
Teaching software testing methods based on diversity principles (ZC, JZ, BL), pp. 391–395.
CSEETCSEET-2011-ChookittikulMK #agile #education
Agile methods in Thai higher education and beyond (WC, PEM, JLK), p. 557.
CSEETCSEET-2011-John #assessment #re-engineering #usability
A quantitative usability assessment method for inclusion in software engineering courses (BEJ), pp. 537–539.
CSEETCSEET-2011-LuLL #analysis #using
Competence analysis of IT professionals involved in business services — Using a qualitative method (HKL, CHL, PCL), pp. 61–70.
CSEETCSEET-2011-MacekK #development #student
The practical method of motivating students to iterative software development (OM, MK), pp. 512–516.
ITiCSEITiCSE-2011-VihavainenPLK #scalability
Extreme apprenticeship method: key practices and upward scalability (AV, MP, ML, JK), pp. 273–277.
ESOPESOP-2011-JimM #parsing
A New Method for Dependent Parsing (TJ, YM), pp. 378–397.
ICPCICPC-2011-SridharaPV #generative #parametricity #summary
Generating Parameter Comments and Integrating with Method Summaries (GS, LLP, KVS), pp. 71–80.
ICSMEICSM-2011-Demeyer #research
Research methods in computer science (SD), p. 600.
ICSMEICSM-2011-Dragan #object-oriented
Emergent laws of method and class stereotypes in object oriented software (ND), pp. 550–555.
ICSMEICSM-2011-GethersOPL #information retrieval #on the #orthogonal #traceability
On integrating orthogonal information retrieval methods to improve traceability recovery (MG, RO, DP, ADL), pp. 133–142.
ICSMEICSM-2011-GrooteOW #development #formal method #industrial
Analyzing the effects of formal methods on the development of industrial control software (JFG, AO, JHW), pp. 467–472.
ICSMEICSM-2011-HouP #api #code completion #evaluation #sorting
An evaluation of the strategies of sorting, filtering, and grouping API methods for Code Completion (DH, DMP), pp. 233–242.
ICSMEICSM-2011-KhadkaRSJH #legacy #migration
A method engineering based legacy to SOA migration method (RK, GR, AS, SJ, JH), pp. 163–172.
ICSMEICSM-2011-KuhnK #combinator #detection #fault #testing
Practical combinatorial (t-way) methods for detecting complex faults in regression testing (RK, RK), p. 599.
WCREWCRE-2011-WangPV #automation #readability #segmentation
Automatic Segmentation of Method Code into Meaningful Blocks to Improve Readability (XW, LLP, KVS), pp. 35–44.
ICALPICALP-v1-2011-Zhang #bound #communication #complexity #on the #power of #quantum
On the Power of Lower Bound Methods for One-Way Quantum Communication Complexity (SZ), pp. 49–60.
FMFM-2011-BowenR #case study #community #formal method
From a Community of Practice to a Body of Knowledge: A Case Study of the Formal Methods Community (JPB, SR), pp. 308–322.
SEFMSEFM-2011-EggersRNF #analysis #hybrid #satisfiability
Improving SAT Modulo ODE for Hybrid Systems Analysis by Combining Different Enclosure Methods (AE, NR, NSN, MF), pp. 172–187.
SEFMSEFM-2011-Hermanns #energy #formal method
Formal Methods in Energy Informatics (HH), pp. 1–2.
SEFMSEFM-2011-Metayer #formal method
Formal Methods as a Link between Software Code and Legal Rules (DLM), pp. 3–18.
CHICHI-2011-BrownRS #challenge
Into the wild: challenges and opportunities for field trial methods (BB, SR, SS), pp. 1657–1666.
CHICHI-2011-DixonLF #interface #reverse engineering
Content and hierarchy in pixel-based methods for reverse engineering interface structure (MD, DL, JF), pp. 969–978.
CHICHI-2011-EllingLJ #eye tracking #using
Retrospective think-aloud method: using eye movements as an extra cue for participants’ verbalizations (SE, LL, MdJ), pp. 1161–1170.
CHICHI-2011-GerkenJZMR #api #concept #usability
The concept maps method as a tool to evaluate the usability of APIs (JG, HCJ, MZ, MM, HR), pp. 3373–3382.
CHICHI-2011-QuinnCRD #cost analysis #multi #on the
On the costs of multiple trajectory pointing methods (PQ, AC, KJR, JD), pp. 859–862.
CHICHI-2011-WacharamanothamHMKSB
Evaluating swabbing: a touchscreen input method for elderly users with tremor (CW, JH, AM, MK, CMS, JOB), pp. 623–626.
HCIDHM-2011-FangF #automation
An Automatic Method for Computerized Head and Facial Anthropometry (JJF, SYF), pp. 12–21.
HCIDHM-2011-GraggYB #modelling #re-engineering #simulation
Posture Reconstruction Method for Mapping Joint Angles of Motion Capture Experiments to Simulation Models (JG, J(Y, RB), pp. 69–78.
HCIDUXU-v1-2011-AnderssonBORT #industrial
To Develop Viable Human Factors Engineering Methods for Improved Industrial Use (JA, LOB, ALO, MJR, ST), pp. 355–362.
HCIDUXU-v1-2011-DinetVB #community #design #difference #towards
Towards Future Methods to Take into Account Cross-Cultural Differences in Design: An Example with the “Expert Community Staff” (ECS) (JD, RV, EB), pp. 53–61.
HCIDUXU-v1-2011-FunadaIFS #effectiveness
Studies on Imaging Methods to Realize Effective BCI through ERPs (MFF, YI, TF, MS), pp. 228–236.
HCIDUXU-v1-2011-Hsu #case study #design #interface
A Study of Interface Design Method on Crossing Media-Dimension (HPH), pp. 247–255.
HCIDUXU-v2-2011-BohmSW11a #adaptation #constraints #usability
Customized Usability Engineering for a Solar Control Unit: Adapting Traditional Methods to Domain and Project Constraints (PB, TS, CW), pp. 109–117.
HCIDUXU-v2-2011-MatsumotoINI #biology
An Air Conditioning Control Method Based on Biological Fluctuation (HM, YI, YN, HI), pp. 608–615.
HCIDUXU-v2-2011-TengC #concept #design
The Application of the Concept of Affordance to a Creative Design Method (CKT, MCC), pp. 215–224.
HCIHCD-2011-ChouC #interactive #physics
Investigating Users’ Interaction with Physical Products Applying Qualitative and Quantitative Methods (CJC, CC), pp. 3–12.
HCIHCD-2011-GoreHHBM #approach #modelling #performance
A Methodical Approach for Developing Valid Human Performance Models of Flight Deck Operations (BFG, BLH, NH, DLB, EM), pp. 379–388.
HCIHCD-2011-HoriKK #testing #usability
Investigation of Indirect Oral Operation Method for Think Aloud Usability Testing (MH, YK, TK), pp. 38–46.
HCIHCD-2011-KondoK #design
Consideration of HCD Methods for Service Innovation Design (AK, NK), pp. 74–80.
HCIHCD-2011-Yamaoka #design #evaluation
A Proposal of Service Design Evaluation Method (TY), pp. 153–159.
HCIHCD-2011-Yamazaki #idea
Idea Creation Method for HCD (KY), pp. 160–165.
HCIHCD-2011-YanagidaUGTHY #design
Vision-Proposal Design Method (KY, YU, KG, KT, SH, KY), pp. 166–174.
HCIHCI-DDA-2011-ChiangT #design #education #interactive
Interaction Design Teaching Method Design (CWC, KT), pp. 45–53.
HCIHCI-DDA-2011-HeL #graph #image #modelling #segmentation
An Image Segmentation Method for Chinese Paintings by Combining Deformable Models with Graph Cuts (NH, KL), pp. 571–579.
HCIHCI-DDA-2011-MiyazakiNI #detection #image
A Detection Method of Basic Mouth Shapes from Japanese Utterance Images (TM, TN, NI), pp. 608–617.
HCIHCI-ITE-2011-KimiokaST #multi #using
Niboshi for Slate Devices: A Japanese Input Method Using Multi-touch for Slate Devices (GK, BS, JT), pp. 81–89.
HCIHCI-ITE-2011-KimRH #detection #multi #recognition
A Method of Multiple Odors Detection and Recognition (DKK, YWR, KSH), pp. 464–473.
HCIHCI-ITE-2011-OkamotoYW #using #visual notation
A Configuration Method of Visual Media by Using Characters of Audiences for Embodied Sport Cheering (KO, MY, TW), pp. 585–592.
HCIHCI-MIIE-2011-AoyagiOIS #behaviour #communication
Proposal of a Method for Promotion of Continuous Pro-Environmental Behavior with Easy Communication (SA, TO, HI, HS), pp. 465–473.
HCIHCI-MIIE-2011-ShibuyaNM #diagrams #documentation #float #mobile #performance
An Efficient Document Browsing Method with Floating Diagram Window on Mobile Device (YS, KN, KM), pp. 101–106.
HCIHCI-UA-2011-IshidaNKOT #word
Therapeutic Category Improvement Method Based on the Words Appearing in Effect-Efficacy Description (HI, KN, MK, MO, FT), pp. 174–181.
HCIHCI-UA-2011-ItoIN #bias #information management #parametricity #using
Method for Cultivating the “Inquiry-Mindset” Using the Information Access-Based Belief Bias Parameter (KI, YI, SN), pp. 48–57.
HCIHCI-UA-2011-KanekoN #evaluation #simulation
Proposal of BCM Evaluation Method Based on Disaster Scenario Simulation (RK, YN), pp. 346–353.
HCIHCI-UA-2011-YajimaT #collaboration #learning
Proposal of Collaborative Learning Support Method in Risk Communications (HY, NT), pp. 113–120.
HCIHIMI-v1-2011-GuoPS #axiom #concept #evaluation #usability
A Conceptual Model of the Axiomatic Usability Evaluation Method (YG, RWP, GS), pp. 93–102.
HCIHIMI-v1-2011-MikiHY #visualisation
Methods for Service Sciences from Visualization Points (HM, NH, SY), pp. 231–238.
HCIHIMI-v2-2011-HosonoIMSNTY
Service Science Method to Create Pictograms Referring to Sign Languages (NH, HI, HM, MS, YN, YT, SY), pp. 123–130.
HCIHIMI-v2-2011-NguyenBRHVSB #how #multi
How Data Comm Methods and Multi-dimensional Traffic Displays Influence Pilot Workload under Trajectory Based Operations (JHN, LPB, RCR, MH, KPLV, TZS, VB), pp. 507–515.
EDOCEDOC-2011-FakhfakhVP #multi #quality
Multi-criteria Decision Making Method for Quality of Service Aggregation (NF, HV, FP), pp. 203–212.
ICEISICEIS-v1-2011-AbramoviciJ #industrial #monitoring
A New Method for Monitoring Industrial Product-service Systems based on BSC and AHP (MA, FJ), pp. 190–196.
ICEISICEIS-v1-2011-GongG #evaluation #internet #performance #research
Research on the Evaluation Index System and Method for Intelligent Performance of Smart Space based on Internet of Things Technology (XG, TG), pp. 301–307.
ICEISICEIS-v1-2011-Li #image #lifecycle #locality #novel
A Novel Method for Dynamic Image Localization of Tourism Destination based on Butler Life Cycle Theory (CL), pp. 473–476.
ICEISICEIS-v1-2011-LiX
A Method of Adjusting the Number of Replica Dynamically in HDFS (BL, KX), pp. 529–533.
ICEISICEIS-v1-2011-LuoS #network #novel
A Novel Service Routing Method in a Service-oriented Network (XL, JS), pp. 560–563.
ICEISICEIS-v1-2011-XiaoXYZ #case study
Study on Developing Warehouse Receipt Hypothecation Financing Method in China (XX, SX, CY, ZZ), pp. 295–300.
ICEISICEIS-v1-2011-ZhuXP
A Differentiated Service based Content Distribution Method in CDN (BZ, KX, RP), pp. 576–579.
ICEISICEIS-v2-2011-JiananDF #summary
Summary of LASSO and Relative Methods (XJ, SD, XF), pp. 131–134.
ICEISICEIS-v3-2011-DuLD #comparison #modelling
Comparison Between the Business Modelling Methods Provided by MEASUR and RUP (HD, TL, DD), pp. 432–438.
ICEISICEIS-v3-2011-JuniorNI #bibliography #execution #identification #legacy #source code
Survey and Proposal of a Method for Business Rules Identification in Legacy Systems Source Code and Execution Logs (WARJ, GSdN, CI), pp. 207–213.
ICEISICEIS-v3-2011-LazarteVCTI #design #integration #modelling #process
An MDA-based Method for Designing Integration Process Models in B2B Collaborations (IML, PDV, OC, LHT, CI), pp. 55–65.
ICEISICEIS-v3-2011-Li11c #identification #performance
An Efficient Method to Identify Customer Value in Tourist Hotel Management (CL), pp. 165–169.
ICEISICEIS-v3-2011-ZhouL #analysis #metric
A New Method and Metric for Quantitative Risk Analysis (PZ, HL), pp. 25–33.
ICEISICEIS-v4-2011-MartinsP #implementation #visual notation
A Method Proposal for Implementing Accessibility in Desktop Applications for Visually Impaired Users (LCGM, BEP), pp. 287–290.
CIKMCIKM-2011-GaoL #adaptation #analysis #classification #probability #sentiment #using
A cross-domain adaptation method for sentiment classification using probabilistic latent analysis (SG, HL), pp. 1047–1052.
CIKMCIKM-2011-HofmannWR #probability
A probabilistic method for inferring preferences from clicks (KH, SW, MdR), pp. 249–258.
CIKMCIKM-2011-JameelLYC #ranking
An unsupervised ranking method based on a technical difficulty terrain (SJ, WL, CmAY, SC), pp. 1989–1992.
CIKMCIKM-2011-LiaoLCW #named #performance
KLEAP: an efficient cleaning method to remove cross-reads in RFID streams (GL, JL, LC, CW), pp. 2209–2212.
CIKMCIKM-2011-MagdyJ #performance #using
An efficient method for using machine translation technologies in cross-language patent search (WM, GJFJ), pp. 1925–1928.
CIKMCIKM-2011-ParkSBY #distance #nearest neighbour #query
k-Nearest neighbor query processing method based on distance relation pattern (YP, DS, KB, JY), pp. 2413–2416.
CIKMCIKM-2011-PimentelCS #clustering #data-driven #database #kernel #metric
A partitioning method for symbolic interval data based on kernelized metric (BAP, AFBFdC, RMCRdS), pp. 2189–2192.
CIKMCIKM-2011-XuSPZ #kernel #named #performance
TAKES: a fast method to select features in the kernel space (YX, FS, WP, JZ), pp. 683–692.
CIKMCIKM-2011-YanWN #adaptation #performance
Efficient methods for finding influential locations with adaptive grids (DY, RCWW, WN), pp. 1475–1484.
ECIRECIR-2011-BelloginWC #collaboration #ranking #retrieval
Text Retrieval Methods for Item Ranking in Collaborative Filtering (AB, JW, PC), pp. 301–306.
ECIRECIR-2011-KeikhaGC #feedback #named
TEMPER: A Temporal Relevance Feedback Method (MK, SG, FC), pp. 436–447.
ECIRECIR-2011-LiSD #ambiguity #wiki #word
A Generalized Method for Word Sense Disambiguation Based on Wikipedia (CL, AS, AD), pp. 653–664.
ECIRECIR-2011-NeumayerMN #categorisation #feature model
Combination of Feature Selection Methods for Text Categorisation (RN, RM, KN), pp. 763–766.
ICMLICML-2011-GermainLLMS #approach #kernel
A PAC-Bayes Sample-compression Approach to Kernel Methods (PG, AL, FL, MM, SS), pp. 297–304.
ICMLICML-2011-JimenezS #performance
Fast Newton-type Methods for Total Variation Regularization (ÁBJ, SS), pp. 313–320.
ICMLICML-2011-LeeW #identification #learning #online #probability
Manifold Identification of Dual Averaging Methods for Regularized Stochastic Online Learning (SL, SJW), pp. 1121–1128.
ICMLICML-2011-LeNCLPN #learning #on the #optimisation
On optimization methods for deep learning (QVL, JN, AC, AL, BP, AYN), pp. 265–272.
KDDKDD-2011-HsiehD #coordination #matrix #performance
Fast coordinate descent methods with variable selection for non-negative matrix factorization (CJH, ISD), pp. 1064–1072.
KDIRKDIR-2011-ArmengolP #case study #classification #information management #lazy evaluation #learning
Combining Two Lazy Learning Methods for Classification and Knowledge Discovery — A Case Study for Malignant Melanoma Diagnosis (EA, SP), pp. 200–207.
KDIRKDIR-2011-MohammadzadehGSN #documentation #web
Extracting the Main Content of Web Documents based on a Naive Smoothing Method (HM, TG, FS, GN), pp. 470–475.
KDIRKDIR-2011-OlegA #analysis #approach #clustering
Methods for Discovering and Analysis of Regularities Systems — Approach based on Optimal Partitioning of Explanatory Variables Space (OVS, AVK), pp. 423–426.
KDIRKDIR-2011-ShishiboriLK #metric
An Improved Method to Select Candidates on Metric Index VP-tree (MS, SSL, KK), pp. 314–319.
KDIRKDIR-2011-VanetikG #mining #named
HashMax: A New Method for Mining Maximal Frequent Itemsets (NV, EG), pp. 140–145.
KEODKEOD-2011-AarnioSK #industrial #lightweight #semantics
A Lightweight Element Matching Method for Industrial Terminology Harmonization — Exploiting Minimal Semantics based on Naming Conventions (PA, SS, KK), pp. 390–395.
KEODKEOD-2011-FrikhDO #hybrid #ontology #web
A Hybrid Method for Domain Ontology Construction from the Web (BF, ASD, BO), pp. 285–292.
KEODKEOD-2011-OkumuraH #concept #using
A Refining Method of Obtained Attributes to Characterize Undefined Concepts using Search Engine (NO, YH), pp. 493–497.
KMISKMIS-2011-RamosSB #process
A Method for Discovering the Relevance of External Context Variables to Business Processes (ECR, FMS, FAB), pp. 399–408.
KMISKMIS-2011-SaharkhizS #multi #network #privacy #social
A Method for Preserving Privacy in Published Multi-relational Social Networks (AS, HRS), pp. 341–346.
MLDMMLDM-2011-JoutsijokiJ #classification #image
Comparing the One-vs-One and One-vs-All Methods in Benthic Macroinvertebrate Image Classification (HJ, MJ), pp. 399–413.
RecSysRecSys-2011-KnijnenburgRW #how #interactive #recommendation
Each to his own: how different users call for different interaction methods in recommender systems (BPK, NJMR, MCW), pp. 141–148.
RecSysRecSys-2011-TakacsPT #collaboration #feedback
Applications of the conjugate gradient method for implicit feedback collaborative filtering (GT, IP, DT), pp. 297–300.
SEKESEKE-2011-LiJ #classification #ontology
An Ontology based Method for Building Understandable Hierarchical Classification Structure for Software Assets Browsing (GL, ZJ), pp. 521–526.
SEKESEKE-2011-SunHGZWY #detection #novel #petri net #using
A Novel Method for Formally Detecting RFID Event Using Petri Nets (JS, YH, XG, SZ, LW, CYY), pp. 122–125.
SIGIRSIGIR-2011-AlonsoL #crowdsourcing #information retrieval
Crowdsourcing for information retrieval: principles, methods, and applications (OA, ML), pp. 1299–1300.
SIGIRSIGIR-2011-EfronG #estimation #ranking
Estimation methods for ranking recent information (ME, GG), pp. 495–504.
SIGIRSIGIR-2011-FernandesMSRA #web
A site oriented method for segmenting web pages (DFdO, ESdM, ASdS, BARN, EBA), pp. 215–224.
SIGIRSIGIR-2011-HanSZ #graph #web
Collective entity linking in web text: a graph-based method (XH, LS, JZ), pp. 765–774.
SIGIRSIGIR-2011-HeHS
A weighted curve fitting method for result merging in federated search (CH, DH, LS), pp. 1177–1178.
SIGIRSIGIR-2011-KanhabuaN11a #comparison #ranking
A comparison of time-aware ranking methods (NK, KN), pp. 1257–1258.
SIGIRSIGIR-2011-MartinHRF #music #retrieval #towards
Towards an indexing method to speed-up music retrieval (BM, PH, MR, PF), pp. 1167–1168.
SIGIRSIGIR-2011-TangLWWL #ambiguity #graph #network #social
A bipartite graph based social network splicing method for person name disambiguation (JT, QL, TW, JW, WL), pp. 1233–1234.
OOPSLAOOPSLA-2011-ThummalapentaXTHS #sequence #testing
Synthesizing method sequences for high-coverage testing (ST, TX, NT, JdH, ZS), pp. 189–206.
GPCEGPCE-2011-SlattenKH #automation #case study #distributed #generative #industrial #reliability #specification #towards #validation #verification
Towards automatic generation of formal specifications to validate and verify reliable distributed systems: a method exemplified by an industrial case study (VS, FAK, PH), pp. 147–156.
RERE-2011-FranqueiraTYWN #security
Risk and argument: A risk-based argumentation method for practical security (VNLF, TTT, YY, RW, BN), pp. 239–248.
RERE-2011-UbayashiKHT #analysis #bound #embedded
A context analysis method for embedded systems — Exploring a requirement boundary between a system and its context (NU, YK, MH, TT), pp. 143–152.
SACSAC-2011-AlencarRB #composition #evaluation #human-computer #hybrid
Composition of HCI evaluation methods for hybrid virtual environments (MFCA, ABR, SDJB), pp. 1237–1244.
SACSAC-2011-DumasDBB #partial order #verification
Application of partial-order methods for the verification of closed-loop SDL systems (XD, PD, FB, EB), pp. 1666–1673.
SACSAC-2011-EcharteACVL #classification #folksonomy
A method for the classification of folksonomy resources (FE, JJA, AC, JEV, AL), pp. 1675–1680.
SACSAC-2011-ElahiY #analysis #heuristic #metric #requirements #trade-off
Requirements trade-offs analysis in the absence of quantitative measures: a heuristic method (GE, ESKY), pp. 651–658.
SACSAC-2011-LinCL #data-driven #navigation
Service-oriented dynamic data driven application systems to potential field method vehicle navigation (SYL, KMC, CCL), pp. 462–467.
SACSAC-2011-RosaGO #problem #quality #satisfiability
Optimal stopping methods for finding high quality solutions to satisfiability problems with preferences (EDR, EG, BO), pp. 901–906.
SACSAC-2011-SunLZTCW #dependence #impact analysis #object-oriented #source code #using
Using lattice of class and method dependence for change impact analysis of object oriented programs (XS, BL, SZ, CT, XC, WW), pp. 1439–1444.
SACSAC-2011-YatakaTTT #smarttech
A context-aware audio presentation method in wearable computing (SY, KT, TT, MT), pp. 405–412.
GTTSEGTTSE-2011-MikhaielTNSX #difference #modelling #uml
Differencing UML Models: A Domain-Specific vs. a Domain-Agnostic Method (RM, NT, NN, ES, ZX), pp. 159–196.
ICSEICSE-2011-OBrienGG #framework #metric
A method for selecting SOA pilot projects including a pilot metrics framework (LO, JG, JG), pp. 653–662.
ICSEICSE-2011-OlivetoGBPL #identification #smell
Identifying method friendships to remove the feature envy bad smell (RO, MG, GB, DP, ADL), pp. 820–823.
ICSEICSE-2011-Sethanandha #open source #process #tool support
Improving open source software patch contribution process: methods and tools (BDS), pp. 1134–1135.
ICSEICSE-2011-SridharaPV #automation #detection
Automatically detecting and describing high level actions within methods (GS, LLP, KVS), pp. 101–110.
SPLCSPLC-2011-ChastekDMM #product line
Engineering a Production Method for a Software Product Line (GJC, PD, JDM, DM), pp. 277–286.
CGOCGO-2011-InoueHWN #compilation #java #jit
A trace-based Java JIT compiler retrofitted from a method-based compiler (HI, HH, PW, TN), pp. 246–256.
CGOCGO-2011-SanchezASPS #compilation #using
Using machines to learn method-specific compilation strategies (RNS, JNA, DS, MP, MGS), pp. 257–266.
HPDCHPDC-2011-Chen
Algorithm-based recovery for iterative methods without checkpointing (ZC), pp. 73–84.
CADECADE-2011-KlinovP #hybrid #probability #satisfiability
A Hybrid Method for Probabilistic Satisfiability (PK, BP), pp. 354–368.
ICLPICLP-J-2011-DrescherT #logic programming #named #prolog
ALPprolog — A new logic programming method for dynamic domains (CD, MT), pp. 451–468.
ICSTICST-2011-EldhHP #analysis #design #testing
Analysis of Mistakes as a Method to Improve Test Case Design (SE, HH, SP), pp. 70–79.
ISSTAISSTA-2011-PradelG #detection #order
Detecting anomalies in the order of equally-typed method arguments (MP, TRG), pp. 232–242.
ASEASE-2010-GermanMI #automation #identification #source code
A sentence-matching method for automatic license identification of source code files (DMG, YM, KI), pp. 437–446.
ASEASE-2010-SridharaHMPV #automation #generative #java #summary #towards
Towards automatically generating summary comments for Java methods (GS, EH, DM, LLP, KVS), pp. 43–52.
CASECASE-2010-PaullGLM #adaptation #using
An information gain based adaptive path planning method for an autonomous underwater vehicle using sidescan sonar (LP, SSG, HL, VM), pp. 835–840.
DACDAC-2010-El-MoselhyD #probability
Stochastic dominant singular vectors method for variation-aware extraction (TAEM, LD), pp. 667–672.
DACDAC-2010-FonsecaDBGPVB #analysis #reliability #simulation #statistics
A statistical simulation method for reliability analysis of SRAM core-cells (RAF, LD, AB, PG, SP, AV, NB), pp. 853–856.
DACDAC-2010-KinsmanN #algorithm #design #hardware #robust
Robust design methods for hardware accelerators for iterative algorithms in scientific computing (ABK, NN), pp. 254–257.
DATEDATE-2010-ForoutanTHJ #performance
An analytical method for evaluating Network-on-Chip performance (SF, YT, RH, AJ), pp. 1629–1632.
DATEDATE-2010-GaoH #geometry #optimisation #programming #using
A power optimization method for CMOS Op-Amps using sub-space based geometric programming (WG, RH), pp. 508–513.
DATEDATE-2010-JavaidJHP #agile #estimation #pipes and filters #runtime
Rapid runtime estimation methods for pipelined MPSoCs (HJ, AJ, MSH, SP), pp. 363–368.
DATEDATE-2010-KerstanO #design #realtime
Design of a real-time optimized emulation method (TK, MO), pp. 646–649.
DATEDATE-2010-LiuFG #optimisation #performance
An accurate and efficient yield optimization method for analog circuits based on computing budget allocation and memetic search technique (BL, FVF, GGEG), pp. 1106–1111.
DATEDATE-2010-OnoTKSNF #evaluation #execution #modelling #performance
A modeling method by eliminating execution traces for performance evaluation (KO, MT, RK, YS, TN, NF), pp. 1337–1340.
DATEDATE-2010-SeiculescuMBM
A method to remove deadlocks in Networks-on-Chips with Wormhole flow control (CS, SM, LB, GDM), pp. 1625–1628.
DATEDATE-2010-SuCG #multi
A general method to make multi-clock system deterministic (MS, YC, XG), pp. 1480–1485.
DATEDATE-2010-VasicekSB #design #implementation
A method for design of impulse bursts noise filters optimized for FPGA implementations (ZV, LS, MB), pp. 1731–1736.
DATEDATE-2010-WieckowskiSBCIPA #analysis #black box
A black box method for stability analysis of arbitrary SRAM cell structures (MW, DS, DB, VC, SI, CP, RCA), pp. 795–800.
DocEngDocEng-2010-CahierMZ #documentation #hybrid #modelling #semantics #web
Document and item-based modeling: a hybrid method for a socio-semantic web (JPC, XM, LZ), pp. 243–246.
DRRDRR-2010-KatsuyamaMHOK #classification
A new pre-classification method based on associative matching method (YK, AM, YH, SO, NK), pp. 1–10.
DRRDRR-2010-SunPD #documentation #segmentation
Touching character segmentation method for Chinese historical documents (XS, LP, XD), pp. 1–10.
DRRDRR-2010-ZhangZLT #learning #recognition
A stacked sequential learning method for investigator name recognition from web-based medical articles (XZ, JZ, DXL, GRT), pp. 1–10.
VLDBVLDB-2010-CormodeLLS
Minimizing Minimality and Maximizing Utility: Analyzing Method-based attacks on Anonymized Data (GC, NL, TL, DS), pp. 1045–1056.
CSEETCSEET-2010-Cowling #education #formal method
Stages in Teaching Formal Methods (AJC), pp. 17–24.
ITiCSEITiCSE-2010-Ezel #assessment #education #how #student
Assessment methods and how teachers and students view them in a computer science course at Uppsala University (MCE), p. 309.
ITiCSEITiCSE-2010-KiesmullerSBR #identification #online #pattern matching #pattern recognition #problem #recognition #using
Online identification of learner problem solving strategies using pattern recognition methods (UK, SS, TB, KR), pp. 274–278.
FASEFASE-2010-HashimotoM #evolution
A Method for Analyzing Code Homology in Genealogy of Evolving Software (MH, AM), pp. 91–106.
CSMRCSMR-2010-NagyPGB #dependence #towards
Towards a Safe Method for Computing Dependencies in Database-Intensive Systems (CN, JP, TG, ÁB), pp. 166–175.
CSMRCSMR-2010-SanchezNCP #case study #java #refactoring
Refactoring Generics in JAVA: A Case Study on Extract Method (RMS, CLN, YC, FJP), pp. 212–221.
ICPCICPC-2010-OlivetoGPL #automation #equivalence #information retrieval #on the #traceability
On the Equivalence of Information Retrieval Methods for Automated Traceability Link Recovery (RO, MG, DP, ADL), pp. 68–71.
ICSMEICSM-2010-MirzaAghaeiPP #automation #evolution #testing
Automatically repairing test cases for evolving method declarations (MM, FP, MP), pp. 1–5.
ICSMEICSM-2010-QusefOL #testing #traceability
Recovering traceability links between unit tests and classes under test: An improved method (AQ, RO, ADL), pp. 1–10.
SASSAS-2010-KatoenMMM #automation #generative #invariant #probability #source code
Linear-Invariant Generation for Probabilistic Programs: — Automated Support for Proof-Based Methods (JPK, AM, LM, CCM), pp. 390–406.
SASSAS-2010-MatringeMR #algebra #generative #hybrid #invariant #linear
Generating Invariants for Non-linear Hybrid Systems by Linear Algebraic Methods (NM, AVM, RR), pp. 373–389.
STOCSTOC-2010-BayatiGT #approach #combinator #graph #random #scalability
Combinatorial approach to the interpolation method and scaling limits in sparse random graphs (MB, DG, PT), pp. 105–114.
STOCSTOC-2010-Kannan #matrix
Spectral methods for matrices and tensors (RK), pp. 1–12.
IFMIFM-2010-Dimovski #composition #equivalence #nondeterminism #source code #termination
A Compositional Method for Deciding Equivalence and Termination of Nondeterministic Programs (AD), pp. 121–135.
SEFMSEFM-2010-Powell #analysis #behaviour #modelling #scalability
Behavior Engineering — A Scalable Modeling and Analysis Method (DP), pp. 31–40.
SEFMSEFM-2010-TudoseO #design pattern #execution #symbolic computation #testing #using
A Method for Testing Software Systems Based on State Design Pattern Using Symbolic Execution (CT, RO), pp. 113–117.
CHICHI-2010-FarooqWZ #api #programming #usability
API usability peer reviews: a method for evaluating the usability of application programming interfaces (UF, LW, DZ), pp. 2327–2336.
CHICHI-2010-IlinkinK #case study #evaluation #mobile
Evaluation of text entry methods for Korean mobile phones, a user study (II, SK), pp. 2023–2026.
CHICHI-2010-SchwarzHHM #mobile #multi
Cord input: an intuitive, high-accuracy, multi-degree-of-freedom input method for mobile devices (JS, CH, SEH, JM), pp. 1657–1660.
CHICHI-2010-SongKLS #comparative #evaluation #scalability #visualisation
A comparative evaluation on tree visualization methods for hierarchical structures with large fan-outs (HS, BHK, BL, JS), pp. 223–232.
CSCWCSCW-2010-FarooqZ #api #programming #usability
API peer reviews: a method for evaluating usability of application programming interfaces (UF, DZ), pp. 207–210.
CAiSECAiSE-2010-EsfahaniYC #approach #evaluation
Situational Evaluation of Method Fragments: An Evidence-Based Goal-Oriented Approach (HCE, ESKY, JC), pp. 424–438.
ICEISICEIS-AIDSS-2010-AdamLDB #clustering #parallel #performance #using
Performance Gain for Clustering with Growing Neural Gas using Parallelization Methods (AA, SL, SD, WB), pp. 264–269.
ICEISICEIS-AIDSS-2010-MasvoulaKM #bibliography #learning
A Review of Learning Methods Enhanced in Strategies of Negotiating Agents (MM, PK, DM), pp. 212–219.
ICEISICEIS-AIDSS-2010-WatanabeRTT #classification #statistics
Statistical Associative Classification of Mammograms — The SACMiner Method (CYVW, MXR, CTJ, AJMT), pp. 121–128.
ICEISICEIS-ISAS-2010-Looso
A Generic Method for Best Practice Reference Model Application (SL), pp. 149–158.
ICEISICEIS-ISAS-2010-SeemuellerVHB #approach #development #process
Situational Method Engineering Applied for the Enactment of Development Processes — An Agent based Approach (HS, HV, BH, BB), pp. 399–405.
ICEISICEIS-ISAS-2010-TaveiraAS #approach #incremental
A Method for Portfolio Management and Prioritization — An Incremental Funding Method Approach (GT, AJA, EAS), pp. 23–33.
ICEISICEIS-J-2010-ClariziaGN10a #adaptation #automation #lightweight #ontology #optimisation
An Adaptive Optimisation Method for Automatic Lightweight Ontology Extraction (FC, LG, PN), pp. 357–371.
ICEISICEIS-J-2010-WatanabeRTT10a #classification #image #named #statistics
SACMiner: A New Classification Method Based on Statistical Association Rules to Mine Medical Images (CYVW, MXR, CTJ, AJMT), pp. 249–263.
ICEISICEIS-SAIC-2010-MatCS #approach #collaboration #network
Selecting Partners for Collaborative Networks — Mixed Methods Approach (NACM, YC, HS), pp. 122–128.
CIKMCIKM-2010-BamisFS #component
A method for discovering components of human rituals from streams of sensor data (AB, JF, AS), pp. 779–788.
CIKMCIKM-2010-FujinoUN #classification #learning #robust
A robust semi-supervised classification method for transfer learning (AF, NU, MN), pp. 379–388.
ECIRECIR-2010-Martinez-RomoA #information retrieval #web
Analyzing Information Retrieval Methods to Recover Broken Web Links (JMR, LA), pp. 26–37.
ECIRECIR-2010-SaldarriagaMV #information retrieval #online #ranking
Ranking Fusion Methods Applied to On-Line Handwriting Information Retrieval (SPS, EM, CVG), pp. 253–264.
ICMLICML-2010-ChengDH #ranking
Label Ranking Methods based on the Plackett-Luce Model (WC, KD, EH), pp. 215–222.
ICMLICML-2010-JenattonMOB #learning #taxonomy
Proximal Methods for Sparse Hierarchical Dictionary Learning (RJ, JM, GO, FRB), pp. 487–494.
ICMLICML-2010-RouxF #performance
A fast natural Newton method (NLR, AWF), pp. 623–630.
ICMLICML-2010-Yu #convergence #difference
Convergence of Least Squares Temporal Difference Methods Under General Conditions (HY), pp. 1207–1214.
ICPRICPR-2010-AnthimopoulosVG #detection #evaluation #image
A Pixel-Based Evaluation Method for Text Detection in Color Images (MA, NV, BG), pp. 3264–3267.
ICPRICPR-2010-ArslanSATY #comparison #data access #image #multi #retrieval
Comparison of Multidimensional Data Access Methods for Feature-Based Image Retrieval (SA, AS, EA, IHT, AY), pp. 3260–3263.
ICPRICPR-2010-Artigas-FuentesGB #approximate #mining #similarity
A High-Dimensional Access Method for Approximated Similarity Search in Text Mining (FJAF, RGG, JMBC), pp. 3155–3158.
ICPRICPR-2010-AungSN #3d #precise
Traj Align: A Method for Precise Matching of 3-D Trajectories (ZA, KS, WSN), pp. 3818–3821.
ICPRICPR-2010-BanimahdE #distance #image #segmentation #set #using
Lip Segmentation Using Level Set Method: Fusing Landmark Edge Distance and Image Information (SRB, HE), pp. 2432–2435.
ICPRICPR-2010-BrezovanBGSS #adaptation #detection #image #performance #visual notation
An Adaptive Method for Efficient Detection of Salient Visual Object from Color Images (MB, DDB, EG, LS, CSS), pp. 2346–2349.
ICPRICPR-2010-ElmezainAM #gesture #random #recognition #robust #segmentation #using
A Robust Method for Hand Gesture Segmentation and Recognition Using Forward Spotting Scheme in Conditional Random Fields (ME, AAH, BM), pp. 3850–3853.
ICPRICPR-2010-FausserS #approximate #learning
Learning a Strategy with Neural Approximated Temporal-Difference Methods in English Draughts (SF, FS), pp. 2925–2928.
ICPRICPR-2010-FujitaHSTS #detection #image #using
An Improved Method for Cirrhosis Detection Using Liver’s Ultrasound Images (YF, YH, MS, ST, IS), pp. 2294–2297.
ICPRICPR-2010-GangehKD #categorisation #random
Random Subspace Method in Text Categorization (MJG, MSK, RPWD), pp. 2049–2052.
ICPRICPR-2010-GhiasiS #identification #independence #performance
An Efficient Method for Offline Text Independent Writer Identification (GG, RS), pp. 1245–1248.
ICPRICPR-2010-HarandiAABL #random #recognition
Directed Random Subspace Method for Face Recognition (MTH, MNA, BNA, AB, BCL), pp. 2688–2691.
ICPRICPR-2010-IwahoriIWKFK #performance
Extending Fast Marching Method under Point Light Source Illumination and Perspective Projection (YI, KI, RJW, HK, SF, KK), pp. 1650–1653.
ICPRICPR-2010-KayaCC #design #using
Designing a Pattern Stabilization Method Using Scleral Blood Vessels for Laser Eye Surgery (AK, ABC, HBC), pp. 698–701.
ICPRICPR-2010-KeuperSPHPBR #3d #parametricity #robust #self
3D Deformable Surfaces with Locally Self-Adjusting Parameters — A Robust Method to Determine Cell Nucleus Shapes (MK, TS, JP, PH, KP, HB, OR), pp. 2254–2257.
ICPRICPR-2010-KohGC #locality #robust #using
A Robust Iris Localization Method Using an Active Contour Model and Hough Transform (JK, VG, VC), pp. 2852–2856.
ICPRICPR-2010-LiuCLL #automation #locality #parametricity #using
A Lip Contour Extraction Method Using Localized Active Contour Model with Automatic Parameter Selection (XL, YmC, ML, HL), pp. 4332–4335.
ICPRICPR-2010-LiuZYL #hybrid #image #performance
A Fast Image Inpainting Method Based on Hybrid Similarity-Distance (JL, SZ, WY, HL), pp. 4432–4435.
ICPRICPR-2010-MezghaniPMLG #network #order
A Computer-Aided Method for Scoliosis Fusion Level Selection by a Topologicaly Ordered Self Organizing Kohonen Network (NM, PP, AM, HL, JAdG), pp. 4012–4015.
ICPRICPR-2010-MochizukiKISI #energy
An Iterative Method for Superresolution of Optical Flow Derived by Energy Minimisation (YM, YK, AI, TS, TI), pp. 2270–2273.
ICPRICPR-2010-MonzoAAM #case study #comparative #locality #recognition #using
A Comparative Study of Facial Landmark Localization Methods for Face Recognition Using HOG descriptors (DM, AA, AA, JMM), pp. 1330–1333.
ICPRICPR-2010-OrtegaGJV #configuration management #self #video
A Combined Self-Configuring Method for Object Tracking in Colour Video (JARO, GAG, ÁRJ, VLAV), pp. 2081–2084.
ICPRICPR-2010-Parker #classification #empirical #feature model
An Empirical Study of Feature Extraction Methods for Audio Classification (CP), pp. 4593–4596.
ICPRICPR-2010-QiaoC #3d #analysis #component #modelling #statistics #using
Statistical Texture Modeling for Medical Volume Using Generalized N-Dimensional Principal Component Analysis Method and 3D Volume Morphing (XQ, YWC), pp. 2488–2491.
ICPRICPR-2010-Ramirez-OrtegonR #documentation #evaluation
Unsupervised Evaluation Methods Based on Local Gray-Intensity Variances for Binarization of Historical Documents (MARO, RR), pp. 2029–2032.
ICPRICPR-2010-RenHHLC #detection
A Sample Pre-mapping Method Enhancing Boosting for Object Detection (HR, XH, CKH, LL, XC), pp. 3005–3008.
ICPRICPR-2010-SakarK #analysis #canonical #correlation #feature model #hybrid
A Hybrid Method for Feature Selection Based on Mutual Information and Canonical Correlation Analysis (COS, OK), pp. 4360–4363.
ICPRICPR-2010-SattiGCP #adaptation #human-computer #interface
A Covariate Shift Minimisation Method to Alleviate Non-stationarity Effects for an Adaptive Brain-Computer Interface (ARS, CG, DC, GP), pp. 105–108.
ICPRICPR-2010-SemenovichS #higher-order #performance
Tensor Power Method for Efficient MAP Inference in Higher-order MRFs (DS, AS), pp. 734–737.
ICPRICPR-2010-SenkoK #clustering #pattern matching #pattern recognition #recognition #using
Pattern Recognition Method Using Ensembles of Regularities Found by Optimal Partitioning (OVS, AVK), pp. 2957–2960.
ICPRICPR-2010-SethiC #analysis #motivation #probability #process #video
A Neurobiologically Motivated Stochastic Method for Analysis of Human Activities in Video (RJS, AKRC), pp. 281–285.
ICPRICPR-2010-SodaI #composition #dataset #integration #learning
Decomposition Methods and Learning Approaches for Imbalanced Dataset: An Experimental Integration (PS, GI), pp. 3117–3120.
ICPRICPR-2010-SomolGP #algorithm #feature model #problem #set
The Problem of Fragile Feature Subset Preference in Feature Selection Methods and a Proposal of Algorithmic Workaround (PS, JG, PP), pp. 4396–4399.
ICPRICPR-2010-SukF
Refined Morphological Methods of Moment Computation (TS, JF), pp. 966–970.
ICPRICPR-2010-Temerinac-OttKB #evaluation
Evaluation of a New Point Clouds Registration Method Based on Group Averaging Features (MTO, MK, HB), pp. 2452–2455.
ICPRICPR-2010-Thurau #classification #scalability
Nearest Archetype Hull Methods for Large-Scale Data Classification (CT), pp. 4040–4043.
ICPRICPR-2010-WangC #3d #estimation
3D Human Pose Estimation by an Annealed Two-Stage Inference Method (YKW, KYC), pp. 535–538.
ICPRICPR-2010-WeiXZ
Calibration Method for Line Structured Light Vision Sensor Based on Vanish Points and Lines (ZW, MX, GZ), pp. 794–797.
ICPRICPR-2010-WshahGCL #novel #recognition #reduction
A Novel Lexicon Reduction Method for Arabic Handwriting Recognition (SW, VG, YC, HL), pp. 2865–2868.
ICPRICPR-2010-YamashitaW #correlation #matrix
Subspace Methods with Globally/Locally Weighted Correlation Matrix (YY, TW), pp. 4259–4262.
ICPRICPR-2010-YangSZ #analysis #multi #recognition #using
Face Recognition Using a Multi-manifold Discriminant Analysis Method (WY, CS, LZ), pp. 527–530.
ICPRICPR-2010-ZhangGA #analysis #linear
An Information Theoretic Linear Discriminant Analysis Method (HZ, CG, KKA), pp. 4182–4185.
ICPRICPR-2010-ZhangH #clustering
A Hierarchical Clustering Method for Color Quantization (JZ, JH), pp. 786–789.
ICPRICPR-2010-ZhangW10a #modelling #random #validation
LLN-based Model-Driven Validation of Data Points for Random Sample Consensus Methods (LZ, DW), pp. 3436–3439.
ICPRICPR-2010-ZouH #3d #performance #using
Recovering 3D Shape Using an Improved Fast Marching Method (CZ, ERH), pp. 1678–1681.
KDDKDD-2010-LichtenwalterLC #predict
New perspectives and methods in link prediction (RL, JTL, NVC), pp. 243–252.
KDIRKDIR-2010-Bernard #formal method #modelling #reuse
Characterisation, Formalisation and Reuse of Knowledge — Models, Methods and Application Cases (AB), p. 13.
KDIRKDIR-2010-DoucetA #evaluation #statistics
Statistical Methods for the Evaluation of Indexing Phrases (AD, HAM), pp. 141–149.
KDIRKDIR-2010-GuderSC #kernel #modelling #quality
Integrated Instance-based and Kernel Methods for Power Quality Knowledge Modeling (MG, ÖS, ), pp. 352–357.
KDIRKDIR-2010-Molokov #combinator #identification
Application of Combinatorial Methods to Protein Identification in Peptide Mass Fingerprinting (LM), pp. 307–313.
KDIRKDIR-2010-ViswanathBK #classification #nearest neighbour #performance #set
A Method to Generate a Reduced Training Set for Faster and Better Nearest Neighbor Classification (PV, VSB, TNK), pp. 232–236.
KDIRKDIR-2010-WangSFR #concept
A Meta-learning Method for Concept Drift (RW, LS, MÓF, ER), pp. 257–262.
KEODKEOD-2010-MatsumotoMM #development #information management #modelling
A Model-driven Systems Development Method for Management Information Systems (KM, TM, NM), pp. 10–16.
KEODKEOD-2010-MazakSL #approximate #heuristic #ontology
align++ — A Heuristic-based Method for Approximating the Mismatch-at-Risk in Schema-based Ontology Alignment (AM, BS, ML), pp. 17–26.
KEODKEOD-2010-MurdockBA #ontology
Two Methods for Evaluating Dynamic Ontologies (JM, CB, CA), pp. 110–122.
KEODKEOD-2010-NirenburgMBC #elicitation #hybrid
Hybrid Methods of Knowledge Elicitation within a Unified Representational Knowledge Scheme (SN, MM, SB, RC), pp. 177–182.
KMISKMIS-2010-BrockV #analysis #data flow #semantics #using
A Method for Interoperability between Structured Data Sources using Semantic Analysis (DLB, JV), pp. 234–239.
KMISKMIS-2010-DienstAHF #knowledge base #visual notation
Applying Fusion Techniques to Graphical Methods for Knowledge based Processing of Product use Information (SD, FA, AH, MF), pp. 136–142.
KMISKMIS-2010-EtoMKM #evaluation #process
Externalization Method and Its Evaluation of Know-how Information for Care Planning Processes by Awareness of Novices (KE, MM, YK, TM), pp. 201–206.
KMISKMIS-2010-SultanowWL #communication
Solve Insufficient Communications — A Measurement-method for Satisfied Communication in Business Organizations (ES, EW, RL), pp. 367–371.
SEKESEKE-2010-ChangK #architecture #modelling #process
A Model-based Business Process Diagnosis Method in Service Oriented Architecture (SHC, SDK), pp. 458–461.
SEKESEKE-2010-MadieshW #process #top-down
A Top-Down Method for Secure SOA-based B2B Processes (MM, GW), pp. 698–703.
SIGIRSIGIR-2010-JiangPL #challenge #information retrieval #mining #web
Search and browse log mining for web information retrieval: challenges, methods, and applications (DJ, JP, HL), p. 912.
SIGIRSIGIR-2010-KardanGB #automation
A method to automatically construct a user knowledge model in a forum environment (AK, MG, BB), pp. 717–718.
SIGIRSIGIR-2010-Keikha #retrieval
Investigation on smoothing and aggregation methods in blog retrieval (MK), p. 923.
ECMFAECMFA-2010-OnoTKSNF #abstraction #embedded #execution #modelling #performance
A Model-Based Method for Evaluating Embedded System Performance by Abstraction of Execution Traces (KO, MT, RK, YS, TN, NF), pp. 233–244.
ECOOPECOOP-2010-MonperrusBM #detection #object-oriented
Detecting Missing Method Calls in Object-Oriented Software (MM, MB, MM), pp. 2–25.
GPCEGPCE-J-2007-PirkelbauerSS10 #c++ #design #evaluation #multi
Design and evaluation of C++ open multi-methods (PP, YS, BS), pp. 638–667.
GPCEGPCE-2010-GrechRF #generative #named #similarity
JEqualityGen: generating equality and hashing methods (NG, JR, BF), pp. 177–186.
RERE-2010-YoungA #identification #policy #requirements
A Method for Identifying Software Requirements Based on Policy Commitments (JDY, AIA), pp. 47–56.
REFSQREFSQ-2010-VillelaDJ #evaluation #evolution #product line
Evaluation of a Method for Proactively Managing the Evolving Scope of a Software Product Line (KV, JD, IJ), pp. 113–127.
SACSAC-2010-AddicksA #architecture #enterprise
A method for application evaluations in context of enterprise architecture (JSA, HJA), pp. 131–136.
SACSAC-2010-AraujoOS #hybrid #quantum
Hybrid evolutionary quantum inspired method to adjust time phase distortions in financial time series (RdAA, ALIdO, SCBS), pp. 1153–1154.
SACSAC-2010-AraujoSCA #process #validation
A method for validating the compliance of business processes to business rules (BdMA, EAS, ALC, AJA), pp. 145–149.
SACSAC-2010-BaeCK
Flash-aware record management method (DHB, JWC, SWK), pp. 554–555.
SACSAC-2010-BattistelliMMSS #documentation
Avoiding to dispense with accuracy: a method to make different DTDs documents comparable (MB, SM, LAM, PS, SS), pp. 862–866.
SACSAC-2010-CaetanoST #composition #principle #process
A method for business process decomposition based on the separation of concerns principle (AC, ARS, JMT), pp. 79–85.
SACSAC-2010-HilaireGGK #approach #documentation
An approach based upon OWL-S for method fragments documentation and selection (VH, NG, SG, AK), pp. 938–939.
SACSAC-2010-LanLSH #algorithm #classification #image #using
An improved K-view algorithm for image texture classification using new characteristic views selection methods (YL, HL, ES, CCH), pp. 959–963.
SACSAC-2010-LoTLC #named #performance
Swap-before-hibernate: a time efficient method to suspend an OS to a flash drive (SWL, WsT, JgL, GsC), pp. 201–205.
SACSAC-2010-PeixotoPR #education #game studies #simulation
Semiotic inspection method in the context of educational simulation games (DCCP, ROP, RFR), pp. 1207–1212.
SACSAC-2010-RiosBKO #documentation #evaluation #set #word
Evaluation of different feature sets in an OCR free method for word spotting in printed documents (IR, AdSBJ, ALK, LSO), pp. 52–56.
SACSAC-2010-RyuLYS #clustering #file system
Flash-aware cluster allocation method based on filename extension for FAT file system (SR, CL, SY, SS), pp. 502–509.
SACSAC-2010-SerugendoFR #architecture #development #named #self
MetaSelf: an architecture and a development method for dependable self-* systems (GDMS, JSF, AR), pp. 457–461.
ICSEICSE-2010-Chan #approach #formal method #taxonomy #web #web service
Formal methods for web services: a taxonomic approach (KSMC), pp. 357–360.
ICSEICSE-2010-SharpdD #re-engineering #research #using
Using ethnographic methods in software engineering research (HS, CRBdS, YD), pp. 491–492.
ICSEICSE-2010-SridharanN #data analysis #re-engineering
Bayesian methods for data analysis in software engineering (MS, ASN), pp. 477–478.
ICSEICSE-2010-WangZ #case study #development #multi #policy
Penalty policies in professional software development practice: a multi-method field study (YW, MZ), pp. 39–47.
LDTALDTA-2009-SingerBLPY10 #java
Fundamental Nano-Patterns to Characterize and Classify Java Methods (JS, GB, ML, AP, PY), pp. 191–204.
SLESLE-2010-HostO #canonical #identification #implementation #java #semantics #using
Canonical Method Names for Java — Using Implementation Semantics to Identify Synonymous Verbs (EWH, BMØ), pp. 226–245.
SPLCSPLC-2010-YoshimuraAF #constraints #feature model #identification #mining
A Method to Identify Feature Constraints Based on Feature Selections Mining (KY, YA, TF), pp. 425–429.
ICLPICLP-2010-OetschPT10 #source code
Methods and Methodologies for Developing Answer-Set Programs — Project Description (JO, JP, HT), pp. 154–161.
ICSTICST-2010-Laurent #concept #formal method #process #testing #using #validation #verification
Using Formal Methods and Testability Concepts in the Avionics Systems Validation and Verification (V&V) Process (OL), pp. 1–10.
ICSTICST-2010-SilvaJA #cost analysis #execution #machine learning #symmetry #testing
Machine Learning Methods and Asymmetric Cost Function to Estimate Execution Effort of Software Testing (DGeS, MJ, BTdA), pp. 275–284.
ICSTSAT-2010-PankratovB #on the #problem #satisfiability
On the Relative Merits of Simple Local Search Methods for the MAX-SAT Problem (DP, AB), pp. 223–236.
ICSTSAT-2010-TompkinsH #satisfiability
Dynamic Scoring Functions with Variable Expressions: New SLS Methods for Solving SAT (DADT, HHH), pp. 278–292.
WICSA-ECSAWICSA-ECSA-2009-BielG #architecture #towards #usability
Towards a Method for Analyzing Architectural Support Levels of Usability (BB, VG), pp. 273–276.
WICSA-ECSAWICSA-ECSA-2009-HoylandA #development
RQ-Tech method for user-involved software development (CAH, KMA), pp. 257–260.
WICSA-ECSAWICSA-ECSA-2009-XuZSL #architecture #distributed
An architecting method for distributed process-intensive systems (XX, LZ, MS, YL), pp. 277–280.
ASEASE-2009-PradelG #automation #generative #scalability #specification
Automatic Generation of Object Usage Specifications from Large Method Traces (MP, TRG), pp. 371–382.
ASEASE-2009-VakilianDBOAJ #summary
Inferring Method Effect Summaries for Nested Heap Regions (MV, DD, RLBJ, JO, VSA, REJ), pp. 421–432.
CASECASE-2009-ChengP #predict
A fusion prognostics method for remaining useful life prediction of electronic products (SC, MGP), pp. 102–107.
CASECASE-2009-FiorentiniSRS #standard #towards
Towards a method for harmonizing information standards (XF, RS, SR, RDS), pp. 466–471.
CASECASE-2009-WuS #heuristic #multi #problem
A new heuristic method for capacitated multi-level lot sizing problem with backlogging (TW, LS), pp. 483–488.
DACDAC-2009-IsshikiLKIS #multi #simulation
Trace-driven workload simulation method for Multiprocessor System-On-Chips (TI, DL, HK, TI, KS), pp. 232–237.
DACDAC-2009-TamPB #automation #validation
Automated failure population creation for validating integrated circuit diagnosis methods (WCT, OP, RD(B), pp. 708–713.
DACDAC-2009-UzelacM #realtime
A real-time program trace compressor utilizing double move-to-front method (VU, AM), pp. 738–743.
DATEDATE-2009-HsiehLH #reduction
A physical-location-aware X-filling method for IR-drop reduction in at-speed scan test (WWH, ISL, TH), pp. 1234–1237.
DATEDATE-2009-KorhonenK #identification
A loopback-based INL test method for D/A and A/D converters employing a stimulus identification technique (EK, JK), pp. 1650–1655.
DATEDATE-2009-LadharMB #fault #performance
Efficient and accurate method for intra-gate defect diagnoses in nanometer technology and volume data (AL, MM, LB), pp. 988–993.
DATEDATE-2009-RemersaroRRP #generative #scalability #testing
A scalable method for the generation of small test sets (SR, JR, SMR, IP), pp. 1136–1141.
DATEDATE-2009-TzengH #named
QC-Fill: An X-Fill method for quick-and-cool scan test (CWT, SYH), pp. 1142–1147.
DRRDRR-2009-KhurshidSFV #comparison #documentation
Comparison of Niblack inspired binarization methods for ancient documents (KK, IS, CF, NV), pp. 1–10.
DRRDRR-2009-LiD #difference #independence #using #verification
Improving semi-text-independent method of writer verification using difference vector (XL, XD), pp. 1–10.
DRRDRR-2009-ZhangZLT #learning
A semi-supervised learning method to classify grant-support zone in web-based medical articles (XZ, JZ, DXL, GRT), pp. 1–10.
HTHT-2009-ParisCW #evaluation #information management
A cost-benefit evaluation method for web-based information systems (CP, NC, RW), pp. 353–354.
ICDARICDAR-2009-ChiangK #automation
A Method for Automatically Extracting Road Layers from Raster Maps (YYC, CAK), pp. 838–842.
ICDARICDAR-2009-CoustatyOPV #composition
Drop Caps Decomposition for Indexing a New Letter Extraction Method (MC, JMO, RP, NV), pp. 476–480.
ICDARICDAR-2009-DingJG #approach #online #recognition #word
A New Method for Rotation Free Method for Online Unconstrained Handwritten Chinese Word Recognition: A Holistic Approach (KD, LJ, XG), pp. 1131–1135.
ICDARICDAR-2009-HamamuraAI #probability #recognition #word
An A Posteriori Probability Calculation Method for Analytic Word Recognition Applicable to Address Recognition (TH, TA, BI), pp. 391–395.
ICDARICDAR-2009-ImuraT #documentation #image #string
Compression and String Matching Method for Printed Document Images (HI, YT), pp. 291–295.
ICDARICDAR-2009-MuramatsuYM #authentication #online #using
Biometric Person Authentication Method Using Camera-Based Online Signature Acquisition (DM, KY, TM), pp. 46–50.
ICDARICDAR-2009-PhanST #detection #video
A Laplacian Method for Video Text Detection (TQP, PS, CLT), pp. 66–70.
ICDARICDAR-2009-Pletschacher #adaptation #self
A Self-Adaptive Method for Extraction of Document-Specific Alphabets (SP), pp. 656–660.
ICDARICDAR-2009-ShahabiR #documentation #identification
A New Method for Writer Identification of Handwritten Farsi Documents (FS, MR), pp. 426–430.
ICDARICDAR-2009-SundaramR #online #recognition #using
An Improved Online Tamil Character Recognition Engine Using Post-Processing Methods (SS, AGR), pp. 1216–1220.
ICDARICDAR-2009-XiaJ
A Kai Style Calligraphic Beautification Method for Handwriting Chinese Character (WX, LJ), pp. 798–802.
ICDARICDAR-2009-YinL #segmentation
A Variational Bayes Method for Handwritten Text Line Segmentation (FY, CLL), pp. 436–440.
SIGMODSIGMOD-2009-GhotingM #parallel #performance
Serial and parallel methods for i/o efficient suffix tree construction (AG, KM), pp. 827–840.
VLDBVLDB-2009-KimH #clustering #network
A Particle-and-Density Based Evolutionary Clustering Method for Dynamic Networks (MSK, JH), pp. 622–633.
VLDBVLDB-2009-KimuraHRMZ #correlation #dependence #functional
Correlation Maps: A Compressed Access Method for Exploiting Soft Functional Dependencies (HK, GH, AR, SM, SBZ), pp. 1222–1233.
VLDBVLDB-2009-WongOYFL #nearest neighbour #performance
Efficient Method for Maximizing Bichromatic Reverse Nearest Neighbor (RCWW, MTÖ, PSY, AWCF, LL), pp. 1126–1137.
CSEETCSEET-2009-SkevoulisCHVT #health #industrial
Engineering a Software Supported Health Risk Appraisal Method: A Joint Effort between Academia and Health Care Industry (SS, JC, KH, JV, ST), pp. 113–116.
ITiCSEITiCSE-2009-MoraPJC #assessment #collaboration #learning #student
Learning method based on collaborative assessment performed by the students: an application to computer science (HMM, MTSP, RCJ, JMGC), p. 372.
FASEFASE-2009-LeinoM #consistency #proving
Proving Consistency of Pure Methods and Model Fields (KRML, RM), pp. 231–245.
CSMRCSMR-2009-FrankeJLUHEK #assessment #metric #network #using
A Method for Choosing Software Assessment Measures Using Bayesian Networks and Diagnosis (UF, PJ, RL, JU, DH, ME, JK), pp. 241–246.
CSMRCSMR-2009-Sneed #development
Stevens Lecture on Software Development Methods at CSMR 2009 (HMS), pp. 5–6.
CSMRCSMR-2009-TsantalisC #identification #refactoring
Identification of Extract Method Refactoring Opportunities (NT, AC), pp. 119–128.
ICPCICPC-2009-ShternT #algorithm #clustering
Methods for selecting and improving software clustering algorithms (MS, VT), pp. 248–252.
ICSMEICSM-2009-DraganCM #using
Using method stereotype distribution as a signature descriptor for software systems (ND, MLC, JIM), pp. 567–570.
ICSMEICSM-2009-WangWYZY #evolution #kernel #linux #network #novel
Linux kernels as complex networks: A novel method to study evolution (LW, ZW, CY, LZ, QY), pp. 41–50.
WCREWCRE-1999-AnquetilL99b #clustering #years after
Ten Years Later, Experiments with Clustering as a Software Remodularization Method (NA, TCL), p. 7.
WCREWCRE-1999-SerebrenikRRB99a #diagrams #enterprise #java #reverse engineering #sequence chart
Reverse Engineering Sequence Diagrams for Enterprise JavaBeans with Business Method Interceptors (AS, SAR, EER, MvdB), pp. 269–273.
STOCSTOC-2009-KannanN #linear #programming #random
Random walks on polytopes and an affine interior point method for linear programming (RK, HN), pp. 561–570.
CIAACIAA-2009-LiuYLT #automaton
A Table Compression Method for Extended Aho-Corasick Automaton (YL, YY, PL, JT), pp. 84–93.
ICALPICALP-v2-2009-FotakisKS #design #network #performance
Efficient Methods for Selfish Network Design (DF, ACK, PGS), pp. 459–471.
FMFM-2009-BicarreguiFLW #bibliography #formal method #industrial #perspective
Industrial Practice in Formal Methods: A Review (JB, JSF, PGL, JCPW), pp. 810–813.
FMFM-2009-BonzanniFFK #biology #formal method #question #what
What Can Formal Methods Bring to Systems Biology? (NB, KAF, WF, EK), pp. 16–22.
FMFM-2009-JeffordsHAL #composition #fault tolerance #formal method #refinement #using
A Formal Method for Developing Provably Correct Fault-Tolerant Systems Using Partial Refinement and Composition (RDJ, CLH, MA, EIL), pp. 173–189.
FMFM-2009-ShaoKP #approach #bound #formal method #incremental #lightweight #using
An Incremental Approach to Scope-Bounded Checking Using a Lightweight Formal Method (DS, SK, DEP), pp. 757–772.
FMFM-2009-TschantzW #formal method #privacy
Formal Methods for Privacy (MCT, JMW), pp. 1–15.
CHICHI-2009-BlytheC
Critical methods and user generated content: the iPhone on YouTube (MB, PAC), pp. 1467–1476.
CHICHI-2009-BruunGHS #comparison #testing #usability
Let your users do the testing: a comparison of three remote asynchronous usability testing methods (AB, PG, LH, JS), pp. 1619–1628.
CHICHI-2009-JakobsenH #source code #using #visualisation
Fisheyes in the field: using method triangulation to study the adoption and use of a source code visualization (MRJ, KH), pp. 1579–1588.
CHICHI-2009-PooleCMGE
Computer help at home: methods and motivations for informal technical support (ESP, MC, TM, REG, WKE), pp. 739–748.
CHICHI-2009-ZimmermanRHTM #communication #effectiveness
User-created forms as an effective method of human-agent communication (JZ, KR, IH, AT, KM), pp. 1869–1878.
HCIDHM-2009-AndreoniMCZRCP #assessment #gesture
Method for Movement and Gesture Assessment (MMGA) in Ergonomics (GA, MM, OC, MZ, MR, FC, EP), pp. 591–598.
HCIDHM-2009-NiedermaierDEK #process #usability
The New BMW iDrive — Applied Processes and Methods to Assure High Usability (BN, SD, LE, AK), pp. 443–452.
HCIDHM-2009-Pauzie
Method to Evaluate Driver’s Workload in Real Road Context (AP), pp. 453–462.
HCIDHM-2009-WuLN #3d #assessment
A 3D Method for Fit Assessment of a Sizing System (JW, ZL, JN), pp. 737–743.
HCIHCD-2009-Cinar #case study #eye tracking #usability #web
Eye Tracking Method to Compare the Usability of University Web Sites: A Case Study (MOÇ), pp. 671–678.
HCIHCD-2009-KimY #consistency #design #interactive #multi
A Method for Consistent Design of User Interaction with Multifunction Devices (DSK, WCY), pp. 202–211.
HCIHCD-2009-LinO #analysis #information management
The Method of User’s Requirement Analysis by Participation of the User: Constructing an Information System for Travelers (CYL, MO), pp. 862–868.
HCIHCD-2009-MisawaF #case study #experience #generative #idea #user interface #using
A Proposal of XB-Method, an Idea Generation System for New Services Using User Experiences (NM, MF), pp. 276–283.
HCIHCD-2009-NakanoR #analysis #corpus #multimodal #usability
Multimodal Corpus Analysis as a Method for Ensuring Cultural Usability of Embodied Conversational Agents (YIN, MR), pp. 521–530.
HCIHCD-2009-Nishiguchi #people #user interface
Support Method for Improving the Ability of People with Cerebral Palsy to Efficiently Point a Mouse at Objects on a GUI Screen (HN), pp. 531–537.
HCIHCD-2009-RuggeRS #development #human-computer #process #smarttech #towards
Changes of HCI Methods towards the Development Process of Wearable Computing Solutions (IR, CR, BSR), pp. 302–311.
HCIHCD-2009-RunonenM #concept #development #research #tool support
Shaping the Future with Users — Futures Research Methods as Tools for User-Centered Concept Development (MR, PM), pp. 904–911.
HCIHCD-2009-Seland #design #game studies #mobile #using
Empowering End Users in Design of Mobile Technology Using Role Play as a Method: Reflections on the Role-Play Conduction (GS), pp. 912–921.
HCIHCD-2009-WadaY #analysis
The Proposal of Quantitative Analysis Method Based on the Method of Observation Engineering (TW, TY), pp. 342–350.
HCIHCD-2009-YanagidaUGTHY #design
Structured Scenario-Based Design Method (KY, YU, KG, KT, SH, KY), pp. 374–380.
HCIHCI-AUII-2009-Dai #design #research
Nine Assistant Guiding Methods in Subway Design — A Research of Shanghai Subway Users (LD), pp. 125–132.
HCIHCI-AUII-2009-HongE #multi
Point and Control: The Intuitive Method to Control Multi-device with Single Remote Control (SSH, JIE), pp. 416–422.
HCIHCI-AUII-2009-IbenWK #feedback #smarttech #visual notation
The Impact of Different Visual Feedback Presentation Methods in a Wearable Computing Scenario (HI, HW, EMK), pp. 752–759.
HCIHCI-AUII-2009-SongPJPKJ #effectiveness #human-computer #interactive #multi #using
Multi-pointing Method Using a Desk Lamp and Single Camera for Effective Human-Computer Interaction (TS, TCP, SJ, JHP, KHK, JWJ), pp. 520–525.
HCIHCI-NIMT-2009-NisimuraMKI #development #interactive #speech
Development of Speech Input Method for Interactive VoiceWeb Systems (RN, JM, HK, TI), pp. 710–719.
HCIHCI-NT-2009-AbeOO #automation #image #using
Automatic Method for Measuring Eye Blinks Using Split-Interlaced Images (KA, SO, MO), pp. 3–11.
HCIHCI-NT-2009-AsahiIF #evaluation #usability
A Usability Evaluation Method Applying AHP and Treemap Techniques (TA, TI, SF), pp. 195–203.
HCIHCI-NT-2009-FukuzumiIO #development #evaluation #usability
Development of Quantitative Usability Evaluation Method (SF, TI, HO), pp. 252–258.
HCIHCI-NT-2009-KimuraUOM #evaluation #metric #towards #usability
Toward Constructing an Electroencephalogram Measurement Method for Usability Evaluation (MK, HU, MO, KiM), pp. 95–104.
HCIHCI-NT-2009-ShastriPW #monitoring
A Method to Monitor Operator Overloading (DS, IP, AW), pp. 169–175.
HCIHCI-NT-2009-WatanabeSMY #design #interface
Time-Oriented Interface Design: Picking the Right Time and Method for Information Presentation (KW, KS, SM, MY), pp. 752–759.
HCIHCI-NT-2009-Yang #design #development #evaluation #interface
Website Designer as an Evaluator: A Formative Evaluation Method for Website Interface Development (CYY), pp. 372–381.
HCIHIMI-DIE-2009-IshiiS #perspective #representation
Representation Method for Engineering Perspective (GI, MS), pp. 69–76.
HCIHIMI-DIE-2009-KawashimoSDAT
A Skill Transfer Method for Manual Machine Tool Operation Utilizing Cutting Sound (TK, NS, DD, MA, TT), pp. 77–86.
HCIHIMI-DIE-2009-MatsumotoSS #case study #effectiveness #visual notation
A Study on Effective Methods of Visual Inspection for Reused-Parts by Inspectors (TM, HS, KS), pp. 131–139.
HCIHIMI-DIE-2009-SrinivasSPK #classification #feature model #performance #using
Efficient Text Classification Using Best Feature Selection and Combination of Methods (MS, KPS, EVP, SAK), pp. 437–446.
HCIHIMI-DIE-2009-TaguchiKT
A Method for Evaluating the Relationship among Four Perspectives of the Balanced Scorecard (YT, TK, TT), pp. 163–170.
HCIHIMI-DIE-2009-YamaguchiNKN #evaluation
Evaluation for Adjustment Method of Vehicle’s Location by Recognizing Crosswalks (YY, TN, HK, SN), pp. 648–656.
HCIHIMI-DIE-2009-YatsuzukaTT #case study #motivation
A Study on a Method of Support for Improving the Motivation of Employees (DY, YT, TT), pp. 197–204.
HCIHIMI-II-2009-NabetaKOT
A Proposal of a Method to Extract Active Ingredient Names from Package Inserts (KN, MK, MO, FT), pp. 576–585.
HCIHIMI-II-2009-NakamuraS #learning
Construction of Systematic Learning Support System of Business Theory and Method (YN, KS), pp. 669–678.
HCIHIMI-II-2009-NozawaK #analysis #comparison #realtime #reduction
A Comparison of Artifact Reduction Methods for Real-Time Analysis of fNIRS Data (TN, TK), pp. 413–422.
HCIHIMI-II-2009-OotsukiIOT #evaluation #similarity
Examination of Evaluation Method for Appearance Similarity of PTP Sheets (YO, AI, MO, FT), pp. 586–593.
HCIHIMI-II-2009-SawaragiIHN #approach #identification #using
Identifying Latent Similarities among Near-Miss Incident Records Using a Text-Mining Method and a Scenario-Based Approach (TS, KI, YH, HN), pp. 594–603.
HCIHIMI-II-2009-ShibuyaNMKT #3d #distance #empirical #evaluation #mobile
Empirical Evaluation of Throwing Method to Move Object for Long Distance in 3D Information Space on Mobile Device (YS, KN, KM, IK, YT), pp. 468–475.
HCIHIMI-II-2009-TakaoIS #keyword #web
A Coauthoring Method of Keyword Dictionaries for Knowledge Combination on Corporate Discussion Web Sites (ST, TI, AS), pp. 84–93.
HCIIDGD-2009-TranL #interface #question #research
Attention to Effects of Different Cross-Cultural Levels in User Research Method’s Interface: Discipline or Nationality — Which Has Stronger Force? (TTT, KPL), pp. 127–134.
HCIOCSC-2009-SongNKE #recommendation #using #word
A Proposed Movie Recommendation Method Using Emotional Word Selection (MS, HN, HGK, JE), pp. 525–534.
CAiSECAiSE-2009-EspanaGP #analysis #communication #information management #requirements
Communication Analysis: A Requirements Engineering Method for Information Systems (SE, AG, OP), pp. 530–545.
CAiSECAiSE-2009-Franch #metric #modelling
A Method for the Definition of Metrics over i* Models (XF), pp. 201–215.
ICEISICEIS-AIDSS-2009-RoperoGLC #fuzzy #information management #logic #novel #web
Term Weighting: Novel Fuzzy Logic based Method Vs. Classical TF-IDF Method for Web Information Extraction (JR, AG, CL, AC), pp. 130–137.
ICEISICEIS-DISI-2009-RomeuAC #integration #metric #using
Integration Method Among BSC, CMMI and Six Sigma using GQM to Support Measurement Definition (MIBCIS) (LR, JA, AC), pp. 171–176.
ICEISICEIS-ISAS-2009-BifflFHM #analysis #automation #evaluation #open source #process #tool support
Evaluation of Case Tool Methods and Processes — An Analysis of Eight Open-source CASE Tools (SB, CF, CH, TM), pp. 41–48.
ICEISICEIS-ISAS-2009-GruhnK #analysis #mobile #modelling #process
Modelling, Analysis and Improvement of Mobile Business Processes with the MPL Method (VG, AK), pp. 89–94.
ICEISICEIS-ISAS-2009-KillispergerPSS #generative #process #validation
Method Manual based Process Generation and Validation (PK, GP, MS, TS), pp. 256–261.
ICEISICEIS-ISAS-2009-NascimentoITR #legacy #process #using
A Method for Rewriting Legacy Systems using Business Process Management Technology (GSdN, CI, LHT, MR), pp. 57–62.
ICEISICEIS-J-2009-CallegariB #fuzzy #logic #multi #using
A Multi-criteria Resource Selection Method for Software Projects Using Fuzzy Logic (DAC, RMB), pp. 376–388.
ICEISICEIS-SAIC-2009-ClariziaCSN #probability #semantics #web
Semantic Indexing of Web Pages Via Probabilistic Methods — In Search of Semantics Project (FC, FC, MDS, PN), pp. 134–140.
CIKMCIKM-2009-ChenWL #kernel #learning #novel #rank
Learning to rank with a novel kernel perceptron method (XwC, HW, XL), pp. 505–512.
CIKMCIKM-2009-HeZL #comparison #evaluation #retrieval
Evaluation of methods for relative comparison of retrieval systems based on clickthroughs (JH, CZ, XL), pp. 2029–2032.
CIKMCIKM-2009-KhaitanDGS #data-driven
Data-driven compound splitting method for english compounds in domain names (SK, AD, SG, AS), pp. 207–214.
CIKMCIKM-2009-LaberSJACRTV #performance
A fast and simple method for extracting relevant content from news webpages (ESL, CPdS, IVJ, ECFdA, ETC, RPR, LCT, CDV), pp. 1685–1688.
CIKMCIKM-2009-LiuZ #classification #sentiment #using
Cross-domain sentiment classification using a two-stage method (KL, JZ), pp. 1717–1720.
CIKMCIKM-2009-LvZ09a #case study #comparative #feedback #modelling #pseudo #query
A comparative study of methods for estimating query language models with pseudo feedback (YL, CZ), pp. 1895–1898.
CIKMCIKM-2009-YuOH #performance #ranking
Efficient feature weighting methods for ranking (HY, JO, WSH), pp. 1157–1166.
ECIRECIR-2009-HauffAH #evaluation #performance #predict #query
The Combination and Evaluation of Query Performance Prediction Methods (CH, LA, DH), pp. 301–312.
ICMLICML-2009-JiY
An accelerated gradient method for trace norm minimization (SJ, JY), pp. 457–464.
ICMLICML-2009-Shalev-ShwartzT #probability
Stochastic methods for l1 regularized loss minimization (SSS, AT), pp. 929–936.
ICMLICML-2009-SuttonMPBSSW #approximate #learning #linear #performance
Fast gradient-descent methods for temporal-difference learning with linear function approximation (RSS, HRM, DP, SB, DS, CS, EW), pp. 993–1000.
ICMLICML-2009-WallachMSM #evaluation #modelling #topic
Evaluation methods for topic models (HMW, IM, RS, DMM), pp. 1105–1112.
ICMLICML-2009-YangJY #learning #online
Online learning by ellipsoid method (LY, RJ, JY), pp. 1153–1160.
KDDKDD-2009-AshrafiN
Collusion-resistant anonymous data collection method (MZA, SKN), pp. 69–78.
KDDKDD-2009-BifetHPKG #data type #evolution
New ensemble methods for evolving data streams (AB, GH, BP, RK, RG), pp. 139–148.
KDDKDD-2009-LozanoALR #modelling #visual notation
Grouped graphical Granger modeling methods for temporal causal modeling (ACL, NA, YL, SR), pp. 577–586.
KDDKDD-2009-Mannila #data mining #mining
Randomization methods in data mining (HM), pp. 5–6.
KDDKDD-2009-XueW #classification #quantifier
Quantification and semi-supervised classification methods for handling changes in class distribution (JCX, GMW), pp. 897–906.
KDDKDD-2009-YaoMM #documentation #model inference #performance #streaming #topic
Efficient methods for topic model inference on streaming document collections (LY, DMM, AM), pp. 937–946.
KDIRKDIR-2009-CallejaFGA #learning #set
A Learning Method for Imbalanced Data Sets (JdlC, OF, JG, RMAP), pp. 307–310.
KDIRKDIR-2009-Fang #development #gender
Development and Application of a Roach Gene Regulation Profile based Gender Discrimination Method (YF), pp. 263–269.
KDIRKDIR-2009-KimRM #retrieval #semantics #using
A Patent Retrieval Method using Semantic Annotations (YK, JR, SHM), pp. 211–218.
KEODKEOD-2009-ChimientiDNM #evaluation #ontology
Evaluation of Ontology Building Methodologies — A Method based on Balanced Scorecards (MC, MD, ADN, MM), pp. 141–146.
KEODKEOD-2009-StanevOW #design #formal method #modelling #validation
Formal Method for Validation of Product Design through Knowledge Modelling (SS, JO, WW), pp. 166–170.
KEODKEOD-2009-TsalapatiSK #approximate #ontology #problem #reuse
A Method for Approximation to Ontology Reuse Problem (ET, GBS, GK), pp. 416–419.
KEODKEOD-2009-ZambachM #implementation #logic #ontology
Applying Terminological Methods and Description Logic for Creating and Implementing an Ontology on Inhibition (SZ, BNM), pp. 452–455.
MLDMMLDM-2009-ChanguelLB #automation #html #learning
A General Learning Method for Automatic Title Extraction from HTML Pages (SC, NL, BBM), pp. 704–718.
MLDMMLDM-2009-KobayashiS #classification #distributed #linear #representation #using
A Linear Classification Method in a Very High Dimensional Space Using Distributed Representation (TK, IS), pp. 137–147.
MLDMMLDM-2009-TronciGR
Dynamic Score Combination: A Supervised and Unsupervised Score Combination Method (RT, GG, FR), pp. 163–177.
MLDMMLDM-2009-XiongBS #detection
A Wavelet-Based Method for Detecting Seismic Anomalies in Remote Sensing Satellite Data (PX, YB, XS), pp. 569–581.
RecSysRecSys-2009-KnijnenburgW #adaptation #comprehension #elicitation #recommendation #user satisfaction
Understanding the effect of adaptive preference elicitation methods on user satisfaction of a recommender system (BPK, MCW), pp. 381–384.
RecSysRecSys-2009-SchclarTRMA #collaboration #performance
Ensemble methods for improving the performance of neighborhood-based collaborative filtering (AS, AT, LR, AM, LA), pp. 261–264.
SEKESEKE-2009-AhsanFW #debugging #estimation #machine learning #using
Program File Bug Fix Effort Estimation Using Machine Learning Methods for OSS (SNA, JF, FW), pp. 129–134.
SEKESEKE-2009-JiCXZ #analysis #clustering #novel
A Novel Method of Mutation Clustering Based on Domain Analysis (CJ, ZC, BX, ZZ), pp. 422–425.
SEKESEKE-2009-KongLLYW #feedback #refinement #traceability
A Requirement Traceability Refinement Method Based on Relevance Feedback (LK, JL, YL, YY, QW), pp. 37–42.
SEKESEKE-2009-PengSZ #architecture #evolution #product line
An Architecture-based Evolution Management Method for Software Product Line (XP, LS, WZ), pp. 135–140.
SEKESEKE-2009-XieWXWY #named #scheduling
PP-HAS: A Task Priority Based Preemptive Human Resource Scheduling Method (LX, QW, JX, YW, YY), pp. 655–660.
SEKESEKE-2009-ZepedaCRCCC #modelling
A Model Driven Method for Data Warehouse (LZ, EC, JR, JC, NCF, MC), pp. 676–681.
SEKESEKE-2009-ZhaoWX #optimisation #web #web service
User Perceived Response-time Optimization Method for Composite Web Services (JZ, YW, BX), pp. 356–363.
SIGIRSIGIR-2009-AmbaiY #clustering #image #multi #ranking #set #visual notation
Multiclass VisualRank: image ranking method in clustered subsets based on visual features (MA, YY), pp. 732–733.
SIGIRSIGIR-2009-CormackCB #learning #rank
Reciprocal rank fusion outperforms condorcet and individual rank learning methods (GVC, CLAC, SB), pp. 758–759.
SIGIRSIGIR-2009-KazaiMC #quality #towards
Towards methods for the collective gathering and quality control of relevance assessments (GK, NMF, JC), pp. 452–459.
SIGIRSIGIR-2009-MeijMZ #evaluation #query
An evaluation of entity and frequency based query completion methods (EM, PM, HZ), pp. 678–679.
MODELSMoDELS-2009-ShoushaBL #analysis #concurrent #detection #uml
A UML/MARTE Model Analysis Method for Detection of Data Races in Concurrent Systems (MS, LCB, YL), pp. 47–61.
MODELSMoDELS-2009-ShoushaBL #analysis #concurrent #detection #uml
A UML/MARTE Model Analysis Method for Detection of Data Races in Concurrent Systems (MS, LCB, YL), pp. 47–61.
ECOOPECOOP-2009-HostO #debugging
Debugging Method Names (EWH, BMØ), pp. 294–317.
RERE-2009-DecreusSP #challenge #modelling #process
Practical Challenges for Methods Transforming i* Goal Models into Business Process Models (KD, MS, GP), pp. 15–23.
REFSQREFSQ-2009-KhurumGAF #empirical #requirements
A Controlled Experiment of a Method for Early Requirements Triage Utilizing Product Strategies (MK, TG, LA, RF), pp. 22–36.
REFSQREFSQ-2009-SeyffGMG #case study #experience #requirements
Scenarios in the Wild: Experiences with a Contextual Requirements Discovery Method (NS, FG, NAMM, PG), pp. 147–161.
SACSAC-2009-BangerthJ #adaptation #finite #problem
Adaptive finite element methods for nonlinear inverse problems (WB, AJ), pp. 1002–1006.
SACSAC-2009-BeckerR #evaluation #modelling #off the shelf #requirements
Requirements modelling and evaluation for digital preservation: a COTS selection method based on controlled experimentation (CB, AR), pp. 401–402.
SACSAC-2009-ChaovalitG #clustering #data type
A method for clustering transient data streams (PC, AG), pp. 1518–1519.
SACSAC-2009-ChoppyR #state machine #uml
A method for developing UML state machines (CC, GR), pp. 382–388.
SACSAC-2009-FloraTB #forensics #identification #image #using
Forensic bite mark identification using image processing methods (GF, MT, HB), pp. 903–907.
SACSAC-2009-KiyoharaMMNK #embedded #performance
Method for fast compression of program codes for remote updates in embedded systems (RK, SM, MM, MN, SK), pp. 1683–1684.
SACSAC-2009-LandZEL #enterprise #integration #ontology #performance #towards
Towards a fast enterprise ontology based method for post merger integration (MOL, HZ, PE, QL), pp. 245–252.
SACSAC-2009-LievensH #encapsulation #multi #symmetry
Symmetric encapsulated multi-methods to abstract over application structure (DL, WH), pp. 1873–1880.
SACSAC-2009-SuzukiOSKTK #generative #quality #requirements
A systematic method for generating quality requirements spectrum (SS, AO, TS, HK, MT, KK), pp. 399–400.
SACSAC-2009-TanakaKTN #navigation #predict #using
A destination prediction method using driving contexts and trajectory for car navigation systems (KT, YK, TT, SN), pp. 190–195.
SACSAC-2009-TokoroTT #smarttech #using
A pointing method using two accelerometers for wearable computing (YT, TT, MT), pp. 136–141.
SACSAC-2009-XuMX #game studies
A method to construct knowledge table-base in k-in-a-row games (CX, ZMM, XX), pp. 929–933.
LDTALDTA-2008-Basten09 #ambiguity #context-free grammar #detection #usability
The Usability of Ambiguity Detection Methods for Context-Free Grammars (BB), pp. 35–46.
CADECADE-2009-McLaughlinP #performance #proving #theorem proving
Efficient Intuitionistic Theorem Proving with the Polarized Inverse Method (SM, FP), pp. 230–244.
CAVCAV-2009-CernyA #analysis #automation #java
Automated Analysis of Java Methods for Confidentiality (PC, RA), pp. 173–187.
ICLPICLP-2009-Raiser #constraints #graph transformation #research #summary #using
Analysing Graph Transformation Systems Using Extended Methods from Constraint Handling Rules (Research Summary) (FR), pp. 540–541.
RTARTA-2009-MoserS #complexity #dependence
The Derivational Complexity Induced by the Dependency Pair Method (GM, AS), pp. 255–269.
TAPTAP-2009-Chetali #certification #formal method #security #smarttech #testing
Security Testing and Formal Methods for High Levels Certification of Smart Cards (BC), pp. 1–5.
TAPTAP-2009-Gladisch #contract #invariant #question
Could We Have Chosen a Better Loop Invariant or Method Contract? (CG), pp. 74–89.
CBSECBSE-2008-AlbaniOB #component #identification #towards
Towards a Systematic Method for Identifying Business Components (AA, SO, DB), pp. 262–277.
ECSAECSA-2008-AngelovTG #architecture #case study #evaluation #experience #towards
Towards a Method for the Evaluation of Reference Architectures: Experiences from a Case (SA, JJMT, PWPJG), pp. 225–240.
WICSAWICSA-2008-StollWN #architecture
Guiding Architectural Decisions with the Influencing Factors Method (PS, AW, CN), pp. 179–188.
WICSAWICSA-2008-ZimmermannZGL #architecture #design #modelling #pattern matching #reuse
Combining Pattern Languages and Reusable Architectural Decision Models into a Comprehensive and Comprehensible Design Method (OZ, UZ, TG, FL), pp. 157–166.
ASEASE-2008-TurnerPKC #approach #automation #code generation #process #using #web
An Automated Test Code Generation Method for Web Applications using Activity Oriented Approach (DAT, MP, JK, JC), pp. 411–414.
CASECASE-2008-0001LYS #optimisation
An improved lagrangian relaxation method for discrete optimization applications (WW, PBL, JHY, GAS), pp. 359–364.
CASECASE-2008-JungL #clustering #performance #scheduling #tool support
Efficient scheduling method based on an assignment model for robotized cluster tools (CJ, TEL), pp. 79–84.
CASECASE-2008-KangXWW #assembly #scheduling
A swarm-dynamic scheduling method for semiconductor assembly production line (QK, HX, LW, QW), pp. 91–96.
CASECASE-2008-KuanCJ #modelling
Method for proposing sort screen thresholds based on modeling etest/sort-class in semiconductor manufacturing (WKY, LCC, WJL), pp. 236–241.
CASECASE-2008-SunZL
An enhanced nested partitions method (JS, QZ, PBL), pp. 377–382.
CASECASE-2008-SunZL08a #framework #optimisation
A unified optimization framework for population-based methods (JS, QZ, PBL), pp. 383–387.
DACDAC-2008-YeZP #analysis #equation #linear #multi
Generalized Krylov recycling methods for solution of multiple related linear equation systems in electromagnetic analysis (ZY, ZZ, JRP), pp. 682–687.
DATEDATE-2008-BinkleyGGR #design
From Transistor to PLL — Analogue Design and EDA Methods (DB, HEG, GGEG, JSR).
DATEDATE-2008-CongX #network
Simultaneous FU and Register Binding Based on Network Flow Method (JC, JX), pp. 1057–1062.
DATEDATE-2008-CornetMM #development #modelling #performance #transaction
A Method for the Efficient Development of Timed and Untimed Transaction-Level Models of Systems-on-Chip (JC, FM, LMC), pp. 9–14.
DATEDATE-2008-ErnstJSBC #analysis #formal method #optimisation #performance
Formal Methods in System and MpSoC Performance Analysis and Optimisation (RE, MJ, HS, MB, SC).
DATEDATE-2008-FrankWESN #analysis #architecture #design #evaluation #standard #tool support
Methods, Tools and Standards for the Analysis, Evaluation and Design of Modern Automotive Architectures (EF, RW, RE, ALSV, MDN), pp. 659–663.
DATEDATE-2008-GouraryRUZMG #analysis #injection
Analysis of Oscillator Injection Locking by Harmonic Balance Method (MMG, SGR, SLU, MMZ, BJM, KKG), pp. 318–323.
DATEDATE-2008-HalakY #optimisation
Bandwidth-Centric Optimisation for Area-Constrained Links with Crosstalk Avoidance Methods (BH, AY), pp. 438–443.
DATEDATE-2008-LiTM #analysis #grid #named #network #power management
ETBR: Extended Truncated Balanced Realization Method for On-Chip Power Grid Network Analysis (DL, SXDT, BM), pp. 432–437.
DATEDATE-2008-LiXHL #named #reduction #testing
iFill: An Impact-Oriented X-Filling Method for Shift- and Capture-Power Reduction in At-Speed Scan-Based Testing (JL, QX, YH, XL), pp. 1184–1189.
DATEDATE-2008-NessL #design #fault tolerance #statistics
Guiding Circuit Level Fault-Tolerance Design with Statistical Methods (DCN, DJL), pp. 348–353.
DATEDATE-2008-StratigopoulosTM #estimation #parametricity
A General Method to Evaluate RF BIST Techniques Based on Non-parametric Density Estimation (HGDS, JT, SM), pp. 68–73.
DATEDATE-2008-ZhangYWYJX #correlation #performance #process #statistics
An Efficient Method for Chip-Level Statistical Capacitance Extraction Considering Process Variations with Spatial Correlation (WZ, WY, ZW, ZY, RJ, JX), pp. 580–585.
DocEngDocEng-2008-Nguyen #algorithm #documentation #image #using
A rotation method for binary document images using DDA algorithm (DTN), pp. 267–270.
DRRDRR-2008-BaiNS #composition #using
Extracting curved text lines using the chain composition and the expanded grouping method (NNB, KN, YS), p. 68150.
DRRDRR-2008-LemaitreCC #documentation #recognition
A generic method for structure recognition of handwritten mail documents (AL, JC, BC), p. 68150.
SIGMODSIGMOD-2008-HeS #data access #database #graph #named #query
Graphs-at-a-time: query language and access methods for graph databases (HH, AKS), pp. 405–418.
SIGMODSIGMOD-2008-LiOFWZ #effectiveness #keyword #named
EASE: an effective 3-in-1 keyword search method for unstructured, semi-structured and structured data (GL, BCO, JF, JW, LZ), pp. 903–914.
SIGMODSIGMOD-2008-ShaullSX #named
Skippy: a new snapshot indexing method for time travel in the storage manager (RS, LS, HX), pp. 637–648.
SIGMODSIGMOD-2008-VuOPT #database #graph #keyword
A graph method for keyword-based selection of the top-K databases (QHV, BCO, DP, AKHT), pp. 915–926.
VLDBVLDB-2008-WangLLG #documentation #query #xml
Hash-base subgraph query processing method for graph-structured XML documents (HW, JL, JL, HG), pp. 478–489.
ITiCSEITiCSE-2008-ApplinH #library #multi #research
Computing research methods multi-perspective digital library: a call for participation (AGA, HJH), p. 337.
ITiCSEITiCSE-2008-GunawardenaBO #comprehension
A method for analyzing reading comprehension in computer science courses (AG, JB, AO), p. 348.
ESOPESOP-2008-LeinoM #verification
Verification of Equivalent-Results Methods (KRML, PM), pp. 307–321.
FoSSaCSFoSSaCS-2008-BraunCP #composition #information management
Compositional Methods for Information-Hiding (CB, KC, CP), pp. 443–457.
CSMRCSMR-2008-Oliveto #information retrieval #traceability
Traceability Management meets Information Retrieval Methods “Strengths and Limitations” (RO), pp. 302–305.
ICSMEICSM-2008-XiaoWLYZX #constraints #development #maintenance #process #scheduling
A constraint-driven human resource scheduling method in software development and maintenance process (JX, QW, ML, YY, FZ, LX), pp. 17–26.
MSRMSR-2008-ChangM #detection #evaluation #source code
Evaluation of source code copy detection methods on freebsd (HFC, AM), pp. 61–66.
PASTEPASTE-2008-JashkiZB #impact analysis #performance #towards
Towards a more efficient static software change impact analysis method (MAJ, RZ, EB), pp. 84–90.
STOCSTOC-2008-Sherstov #bound #communication #matrix #quantum
The pattern matrix method for lower bounds on quantum communication (AAS), pp. 85–94.
DLTDLT-J-2007-Freivalds08 #automaton #finite #probability
Non-Constructive Methods for Finite Probabilistic Automata (RF), pp. 565–580.
ICALPICALP-A-2008-EsparzaGKS #approximate #equation
Approximative Methods for Monotone Systems of Min-Max-Polynomial Equations (JE, TG, SK, HS), pp. 698–710.
ICALPICALP-B-2008-EsparzaKL
Newton’s Method for ω-Continuous Semirings (JE, SK, ML), pp. 14–26.
FMFM-2008-ChetaliN #evaluation #formal method #industrial #security
Industrial Use of Formal Methods for a High-Level Security Evaluation (BC, QHN), pp. 198–213.
FMFM-2008-Katz #aspect-oriented #formal method
Aspects and Formal Methods (SK), pp. 1–11.
FMFM-2008-KiniryZ #formal method
Secret Ninja Formal Methods (JRK, DMZ), pp. 214–228.
FMFM-2008-LintelmanRLS #formal method #security
Formal Methods for Trustworthy Skies: Building Confidence in the Security of Aircraft Assets Distribution (SL, RR, ML, KS), pp. 406–410.
FMFM-2008-RudichDM #specification
Checking Well-Formedness of Pure-Method Specifications (AR, ÁD, PM), pp. 68–83.
FMFM-2008-VerhulstJM #case study #development #formal method #industrial
An Industrial Case: Pitfalls and Benefits of Applying Formal Methods to the Development of a Network-Centric RTOS (EV, GGdJ, VM), pp. 411–418.
FMFM-2008-WijbransBRG #case study #development #experience #formal method #re-engineering
Software Engineering with Formal Methods: Experiences with the Development of a Storm Surge Barrier Control System (KW, FB, RR, WG), pp. 419–424.
SEFMSEFM-2008-BartheKPS #hybrid #proving #verification
Preservation of Proof Pbligations for Hybrid Verification Methods (GB, CK, DP, JSF), pp. 127–136.
SEFMSEFM-2008-BonifacioMS #generative #modelling #testing
A Generalized Model-Based Test Generation Method (ALB, AVM, AdSS), pp. 139–148.
SEFMSEFM-2008-PetrenkoP #challenge #formal method
Formal Methods and Innovation Economy: Facing New Challenges (AKP, OLP), pp. 367–371.
SFMSFM-2008-Gillespie #biology #simulation
Simulation Methods in Systems Biology (DTG), pp. 125–167.
GT-VCGT-VC-2007-Bruggink08 #graph transformation #proving #termination #towards
Towards a Systematic Method for Proving Termination of Graph Transformation Systems (HJSB), pp. 23–38.
CHICHI-2008-EverettGBWDST #performance
Electronic voting machines versus traditional methods: improved preference, similar performance (SPE, KKG, MDB, DSW, KD, DS, TT), pp. 883–892.
CHICHI-2008-KramerR #behaviour #modelling #word
Word usage and posting behaviors: modeling blogs with unobtrusive data collection methods (ADIK, KR), pp. 1125–1128.
CHICHI-2008-ShiIGS #named
PressureFish: a method to improve control of discrete pressure-based input (KS, PI, SG, SS), pp. 1295–1298.
CAiSECAiSE-2008-NiknafsR #analysis
Computer-Aided Method Engineering: An Analysis of Existing Environments (AN, RR), pp. 525–540.
EDOCEDOC-2008-CarbonJMN #collaboration #development
A Method for Collaborative Development of Systems of Systems in the Office Domain (RC, GJ, DM, MN), pp. 339–345.
EDOCEDOC-2008-EngelsA #architecture #concept #enterprise #evolution
Service-Oriented Enterprise Architectures: Evolution of Concepts and Methods (GE, MA).
EDOCEDOC-2008-SchropferS
Introducing a Method to Derive an Enterprise-Specific SOA Operating Model (CS, MS), pp. 235–244.
EDOCEDOC-2008-SimoninADTJN #architecture #development #enterprise #named
EA4UP: An Enterprise Architecture-Assisted Telecom Service Development Method (JS, FA, JPD, YLT, JMJ, BN), pp. 279–285.
ICEISICEIS-AIDSS-2008-BiscarriMLGBM #data mining #mining #variability
A Data Mining Method Based on the Variability of the Customer Consumption — A Special Application on Electric Utility Companies (FB, IM, CL, JIG, JB, RM), pp. 370–374.
ICEISICEIS-AIDSS-2008-KompaoreMT #information retrieval #query
Combining Indexing Methods and Query Sizes in Information Retrieval in French (DK, JM, LT), pp. 149–154.
ICEISICEIS-AIDSS-2008-PanahiT #clustering #hybrid #performance #problem
An Efficient Hybrid Method for Clustering Problems (HP, RTM), pp. 288–294.
ICEISICEIS-AIDSS-2008-RokachMS #elicitation #recommendation
Anytime AHP Method for Preferences Elicitation in Stereotype-Based Recommender System (LR, AM, AS), pp. 268–275.
ICEISICEIS-DISI-2008-MendezPM #testing
Improving Software Test Strategy with a Method to Specify Test Cases (MSTC) (EMM, MAP, LEM), pp. 159–164.
ICEISICEIS-DISI-2008-SilveiraPM #enterprise #information management #integration #towards
Towards a Method for Enterprise Information Systems Integration (RS, JP, EM), pp. 349–354.
ICEISICEIS-HCI-2008-LeivaCGA #development #maintenance #using #workflow
A Cooperative Method for System Development and Maintenance Using Workflow Technologies (JLL, JLC, AG, MAA), pp. 130–135.
ICEISICEIS-ISAS1-2008-VlaanderenVP #web
Improvement of a Web Engineering Method Applying Situational Method Engineering (KV, FV, OP), pp. 147–154.
ICEISICEIS-ISAS2-2008-EngelsHHJLRVW #architecture
A Method for Engineering a True Service-Oriented Architecture (GE, AH, BH, OJ, ML, JPR, MV, JW), pp. 272–281.
ICEISICEIS-ISAS2-2008-GoekenA #framework
IT Governance Frameworks as Methods (MG, SA), pp. 331–338.
ICEISICEIS-ISAS2-2008-SantosBBR #analysis #architecture #modelling #semantics
A Model Driven Architecture Tool Based on Semantic Analysis Method (TMdS, RB, MCCB, MAR), pp. 305–310.
ICEISICEIS-ISAS2-2008-SchultK #adaptation #automation #concept #data mining #enterprise #mining #self
Self-Adaptive Customizing with Data Mining Methods — A Concept for the Automatic Customizing of an ERP System with Data Mining Methods (RS, GK), pp. 70–75.
CIKMCIKM-2008-BarskySTU #using
A new method for indexing genomes using on-disk suffix trees (MB, US, AT, CU), pp. 649–658.
CIKMCIKM-2008-HeW #feedback #information retrieval
Translation enhancement: a new relevance feedback method for cross-language information retrieval (DH, DW), pp. 729–738.
CIKMCIKM-2008-HsuC #predict #social
A method to predict social annotations (MHH, HHC), pp. 1375–1376.
CIKMCIKM-2008-ItoNHN #analysis #wiki
Association thesaurus construction methods based on link co-occurrence analysis for wikipedia (MI, KN, TH, SN), pp. 817–826.
CIKMCIKM-2008-LeeL #clustering #data type #multi #online
A coarse-grain grid-based subspace clustering method for online multi-dimensional data streams (JWL, WSL), pp. 1521–1522.
CIKMCIKM-2008-Moschitti #categorisation #kernel #relational #semantics #syntax
Kernel methods, syntax and semantics for relational text categorization (AM), pp. 253–262.
CIKMCIKM-2008-RazenteBTFT #approach #data access #metric #novel #optimisation #process #query #similarity
A novel optimization approach to efficiently process aggregate similarity queries in metric access methods (HLR, MCNB, AJMT, CF, CTJ), pp. 193–202.
CIKMCIKM-2008-ZubizarretaFCACGLV #multi #web
A georeferencing multistage method for locating geographic context in web search (ÁZ, PdlF, JMC, MA, JCA, GGB, CL, JV), pp. 1485–1486.
ECIRECIR-2008-FishbeinE #classification #encoding
Integrating Structure and Meaning: A New Method for Encoding Structure for Text Classification (JMF, CE), pp. 514–521.
ECIRECIR-2008-FishbeinE08a #classification #modelling #semantics
Methods for Augmenting Semantic Models with Structural Information for Text Classification (JMF, CE), pp. 575–579.
ECIRECIR-2008-LoponenPJK #implementation #novel
A Novel Implementation of the FITE-TRT Translation Method (AL, AP, KJ, HK), pp. 138–149.
ECIRECIR-2008-NaderiR #evaluation #graph #similarity
Graph-Based Profile Similarity Calculation Method and Evaluation (HN, BR), pp. 637–641.
ECIRECIR-2008-VanB #hybrid #library #personalisation
Hybrid Method for Personalized Search in Digital Libraries (TTV, MB), pp. 647–651.
ECIRECIR-2008-WuKT #information retrieval
Book Search Experiments: Investigating IR Methods for the Indexing and Retrieval of Books (HW, GK, MT), pp. 234–245.
ICMLICML-2008-CevikalpTP #classification
Nearest hyperdisk methods for high-dimensional classification (HC, BT, RP), pp. 120–127.
ICMLICML-2008-CunninghamSS #estimation #performance #process
Fast Gaussian process methods for point process intensity estimation (JPC, KVS, MS), pp. 192–199.
ICMLICML-2008-HsiehCLKS #coordination #linear #scalability
A dual coordinate descent method for large-scale linear SVM (CJH, KWC, CJL, SSK, SS), pp. 408–415.
ICPRICPR-2008-AliFG #estimation #parametricity
Analytical method for MGRF Potts model parameter estimation (AMA, AAF, GLG), pp. 1–4.
ICPRICPR-2008-BorsN #estimation #kernel #modelling #probability
Kernel bandwidth estimation in methods based on probability density function modelling (AGB, NN), pp. 1–4.
ICPRICPR-2008-BridsonA #analysis #approach #evaluation #geometry #layout #performance
A geometric approach for accurate and efficient performance evaluation of layout analysis methods (DB, AA), pp. 1–4.
ICPRICPR-2008-ChandraS #using
A method for removing cyclic artefacts in discrete tomography using latin squares (SC, IDS), pp. 1–4.
ICPRICPR-2008-ChenCC #performance
A performance controllable octree construction method (ZC, HLC, WCC), pp. 1–4.
ICPRICPR-2008-Cleuziou #clustering
An extended version of the k-means method for overlapping clustering (GC), pp. 1–4.
ICPRICPR-2008-Correa-MorrisRPE #incremental
Incremental nested partition method (JCM, JRS, APP, DLEI), pp. 1–4.
ICPRICPR-2008-HuangLZ #detection
A method of small object detection and tracking based on particle filters (YH, JL, CZ), pp. 1–4.
ICPRICPR-2008-HulkkonenH #detection #monitoring
A minimum description length principle based method for signal change detection in machine condition monitoring (JJH, JVH), pp. 1–4.
ICPRICPR-2008-IshidaTIM #recognition
A Hilbert warping method for camera-based finger-writing recognition (HI, TT, II, HM), pp. 1–5.
ICPRICPR-2008-IwahoriNWFK #performance #self
Shape from self-calibration and Fast Marching Method (YI, TN, RJW, SF, HK), pp. 1–4.
ICPRICPR-2008-JiangDX #design
An affinity propagation based method for vector quantization codebook design (WJ, FD, QLX), pp. 1–4.
ICPRICPR-2008-KangBK #3d #modelling #multi
Multi-resolution 3D morphable models and its matching method (BNK, HB, DK), pp. 1–4.
ICPRICPR-2008-KawabataHS #agile #kernel
A rapid anomalous region extraction method by iterative projection onto kernel eigenspace (SK, SH, KS), pp. 1–4.
ICPRICPR-2008-KobayashiO #strict
Cone-restricted subspace methods (TK, NO), pp. 1–4.
ICPRICPR-2008-LeKM #clustering #graph
Coring method for clustering a graph (TVL, CAK, IBM), pp. 1–4.
ICPRICPR-2008-LiL #incremental #segmentation
An incremental method for accurate iris segmentation (PL, XL), pp. 1–4.
ICPRICPR-2008-LongJ #novel #online #recognition #word
A novel orientation free method for online unconstrained cursive handwritten chinese word recognition (TL, LJ), pp. 1–4.
ICPRICPR-2008-Lu #performance
Markerless human motion capture: An application of simulated annealing and Fast Marching Method (YL), pp. 1–4.
ICPRICPR-2008-LuJZ #detection #effectiveness #segmentation
An effective method for detection and segmentation of the body of human in the view of a single stationary camera (HL, CJ, RZ), pp. 1–4.
ICPRICPR-2008-OkadaH #incremental #network #recognition #self
Motion recognition based on Dynamic-Time Warping method with Self-Organizing Incremental Neural Network (SO, OH), pp. 1–4.
ICPRICPR-2008-PorroHTNDB #evaluation #performance
Performance evaluation of relevance vector machines as a nonlinear regression method in real-world chemical spectroscopic data (DP, NHG, ITB, ON, AD, RJB), pp. 1–4.
ICPRICPR-2008-SaitohMK #analysis #performance
Analysis of efficient lip reading method for various languages (TS, KM, RK), pp. 1–4.
ICPRICPR-2008-Sakai #approach #classification #incremental #monte carlo
Monte Carlo subspace method: An incremental approach to high-dimensional data classification (TS), pp. 1–4.
ICPRICPR-2008-SatoOKI #image #realtime
Real-time image-based rendering system for virtual city based on image compression technique and eigen texture method (RS, SO, HK, KI), pp. 1–4.
ICPRICPR-2008-ThomasRCB #analysis #comparative
Comparative analysis of registration based and registration free methods for cancelable fingerprint biometrics (AOT, NKR, JHC, RMB), pp. 1–4.
ICPRICPR-2008-TsuchiyaF #feature model #using
A method of feature selection using contribution ratio based on boosting (MT, HF), pp. 1–4.
ICPRICPR-2008-VazquezRC #image #recognition
A new image division for LBP method to improve face recognition under varying lighting conditions (HMV, EBGR, YCM), pp. 1–4.
ICPRICPR-2008-Wang #algorithm #string
A new method to obtain the shift-table in Boyer-Moore’s string matching algorithm (YW), pp. 1–4.
ICPRICPR-2008-YamaguchiH #detection #image
Improved percolation-based method for crack detection in concrete surface images (TY, SH), pp. 1–4.
ICPRICPR-2008-YangB08a #feature model #recognition #sketching
Feature extraction method based on cascade noise elimination for sketch recognition (JY, HB), pp. 1–4.
ICPRICPR-2008-YangQ #analysis #component #detection #independence #network #using
A network intrusion detection method using independent component analysis (DY, HQ), pp. 1–4.
ICPRICPR-2008-ZhangK #automation #detection
Automatic road sign detection method based on Color Barycenters Hexagon model (QZ, SiK), pp. 1–4.
ICPRICPR-2008-ZhangYLCG
A covariance-based method for dynamic background subtraction (SZ, HY, SL, XC, WG), pp. 1–4.
KDDKDD-2008-CuiDSAJ #learning
Learning methods for lung tumor markerless gating in image-guided radiotherapy (YC, JGD, GCS, BMA, SBJ), pp. 902–910.
KDDKDD-2008-KeerthiSCHL #linear #multi #scalability
A sequential dual method for large scale multi-class linear svms (SSK, SS, KWC, CJH, CJL), pp. 408–416.
KRKR-2008-Cortes-CalabuigDAB #approximate #database #fixpoint #performance #query
Accuracy and Efficiency of Fixpoint Methods for Approximate Query Answering in Locally Complete Databases (ACC, MD, OA, MB), pp. 81–91.
RecSysRecSys-2008-MaidelSST #evaluation #personalisation
Evaluation of an ontology-content based filtering method for a personalized newspaper (VM, PS, BS, MTM), pp. 91–98.
RecSysRecSys-2008-YildirimK #collaboration #problem #random
A random walk method for alleviating the sparsity problem in collaborative filtering (HY, MSK), pp. 131–138.
SEKESEKE-2008-CuiSXM #architecture #design #reuse
A Decision-centric Architecture Design Method Facilitating the Contextually Capture and Reuse of Design Knowledge (XC, YS, SX, HM), pp. 321–326.
SEKESEKE-2008-HeWTG #process #reuse
A Systematic Method for Process Tailoring Based on Knowledge Reuse (XyH, YsW, YxT, JgG), pp. 38–41.
SEKESEKE-2008-QuNXZ #testing
A Dynamic Adjusting Method for Test Case Prioritization (BQ, CN, BX, XZ), pp. 484–487.
SEKESEKE-2008-XieXLW #scheduling
A Project Scheduling Method Based on Human Resource Availability (LX, JX, DL, QW), pp. 161–166.
SEKESEKE-2008-XiPLH #component #repository
A Goal-oriented Mixed-granularity Component Selection Method for Huge Component Repositories (XX, JP, JL, SH), pp. 573–576.
SIGIRSIGIR-2008-ChenC #named #novel #summary #topic
TSCAN: a novel method for topic summarization and content anatomy (CCC, MCC), pp. 579–586.
SIGIRSIGIR-2008-Diaz #retrieval
A method for transferring retrieval scores between collections with non-overlapping vocabularies (FDD), pp. 805–806.
SIGIRSIGIR-2008-LeeCA #clustering #feedback #pseudo
A cluster-based resampling method for pseudo-relevance feedback (KSL, WBC, JA), pp. 235–242.
SIGIRSIGIR-2008-LiT #documentation #image #word
A word shape coding method for camera-based document images (LL, CLT), pp. 771–772.
SIGIRSIGIR-2008-WangFZ #case study #feedback
A study of methods for negative relevance feedback (XW, HF, CZ), pp. 219–226.
SIGIRSIGIR-2008-YilmazKA #performance
A simple and efficient sampling method for estimating AP and NDCG (EY, EK, JAA), pp. 603–610.
MODELSMoDELS-2008-CabotCGL #analysis #declarative #invariant #model transformation
An Invariant-Based Method for the Analysis of Declarative Model-to-Model Transformations (JC, RC, EG, JdL), pp. 37–52.
MODELSMoDELS-2008-CabotCGL #analysis #declarative #invariant #model transformation
An Invariant-Based Method for the Analysis of Declarative Model-to-Model Transformations (JC, RC, EG, JdL), pp. 37–52.
PPDPPPDP-2008-DeckerM #consistency #nondeterminism
Classifying integrity checking methods with regard to inconsistency tolerance (HD, DM), pp. 195–204.
PADLPADL-2008-KellerCCSB #generative #monte carlo
Specialising Simulator Generators for High-Performance Monte-Carlo Methods (GK, HCM, MMTC, DS, CBK), pp. 116–132.
RERE-2008-MakinoO #difference #generative
A Method of Scenario Generation with Differential Scenario (MM, AO), pp. 337–338.
RERE-2008-Szoke #automation #scheduling #using
A Proposed Method for Automated Project Scheduling using Goals and Scenarios (AS), pp. 339–340.
REFSQREFSQ-2008-AlenljungP #named #requirements #tool support
DESCRY: A Method for Evaluating Decision-Supporting Capabilities of Requirements Engineering Tools (BA, AP), pp. 52–57.
REFSQREFSQ-2008-BrinkkemperWSV #approach #process #requirements
Process Improvement in Requirements Management: A Method Engineering Approach (SB, IvdW, MS, JV), pp. 6–22.
REFSQREFSQ-2008-FrickerG #framework #requirements
Negotiation Constellations — Method Selection Framework for Requirements Negotiation (SF, PG), pp. 37–51.
SACSAC-2008-AndresAN #experience #formal method #information management #using
Using formal methods to develop a complex information system: a practical/theoretical experience (CA, RGA, MN), pp. 848–849.
SACSAC-2008-AndronickN #embedded #protocol
Certifying an embedded remote method invocation protocol (JA, QHN), pp. 352–359.
SACSAC-2008-BuenoTT #algorithm #data access #effectiveness #metric #optimisation
An algorithm for effective deletion and a new optimization technique for metric access methods (RB, AJMT, CTJ), pp. 1034–1035.
SACSAC-2008-CimadamoreV #java #prolog #type inference
Integrating Java and Prolog through generic methods and type inference (MC, MV), pp. 198–205.
SACSAC-2008-DornS #3d #approximate #named #predict
CReF: a central-residue-fragment-based method for predicting approximate 3-D polypeptides structures (MD, ONdS), pp. 1261–1267.
SACSAC-2008-KuangZ #algorithm #detection #using
An anomaly intrusion detection method using the CSI-KNN algorithm (LK, MZ), pp. 921–926.
SACSAC-2008-NaderiRP #collaboration #graph #information retrieval #similarity
A graph-based profile similarity calculation method for collaborative information retrieval (HN, BR, JMP), pp. 1127–1131.
SACSAC-2008-RazenteBTT #feedback #image #query #retrieval #similarity
Aggregate similarity queries in relevance feedback methods for content-based image retrieval (HLR, MCNB, AJMT, CTJ), pp. 869–874.
SACSAC-2008-Santos-NetoRP #evaluation #information management #modelling #testing
An evaluation of a model-based testing method for information systems (PdAdSN, RFR, CIPdSeP), pp. 770–776.
SACSAC-2008-SchmitzAA #implementation #nondeterminism #order
A method for defining the implementation order of software projects under uncertainty (EAS, AJA, CMdA), pp. 844–845.
SACSAC-2008-TakanoC #documentation #feature model #feedback
A light-weight feedback method for reconstructing a document vector space on a feature extraction model (KT, XC), pp. 1169–1170.
SACSAC-2008-YuB #detection #effectiveness #multi #performance
A fast and effective method to detect multiple least significant bits steganography (XY, NB), pp. 1443–1447.
SACSAC-2008-ZhouZCZ #concept #ontology #semantics
A method for semantics-based conceptual expansion of ontology (LZ, DZ, XC, CZ), pp. 1583–1587.
FSEFSE-2008-StylosM #api
The implications of method placement on API learnability (JS, BAM), pp. 105–112.
ICSEICSE-2008-McCafferyPR #agile #assessment #hybrid #named #safety
Ahaa — agile, hybrid assessment method for automotive, safety critical smes (FM, MP, IR), pp. 551–560.
ICSEICSE-2008-Murphy-HillB #refactoring #tool support
Breaking the barriers to successful refactoring: observations and tools for extract method (ERMH, APB), pp. 421–430.
ICSEICSE-2008-WangCW #automation #distributed
Four enhancements to automated distributed system experimentation methods (YW, AC, ALW), pp. 491–500.
SPLCSPLC-2008-Krueger08b #product line
Pragmatic Methods for Commercial Software Product Line Engineering Practice (CWK), p. 376.
CCCC-2008-KhedkerK #analysis #data flow #interprocedural #performance #precise #string
Efficiency, Precision, Simplicity, and Generality in Interprocedural Data Flow Analysis: Resurrecting the Classical Call Strings Method (UPK, BK), pp. 213–228.
HPDCHPDC-2008-ShiPRJJ #adaptation #fault tolerance #grid #named #safety #using
Dynasa: adapting grid applications to safety using fault-tolerant methods (XS, JLP, ER, HJ, HJ), pp. 237–238.
ICSTICST-2008-BousquetS #inheritance
Relation between Depth of Inheritance Tree and Number of Methods to Test (LdB, MRS), pp. 161–170.
ICSTICST-2008-KimC #object-oriented #sequence #source code #testing
A Fitness Function to Find Feasible Sequences of Method Calls for Evolutionary Testing of Object-Oriented Programs (MK, YC), pp. 537–540.
ICSTICST-2008-RahaJ #automation #testing #xml
Automation Method for Testing XML/DB/XML Layers (DR, MJ), pp. 458–464.
ICSTICST-2008-WongWQZ #effectiveness #fault #locality #statistics
A Crosstab-based Statistical Method for Effective Fault Localization (WEW, TW, YQ, LZ), pp. 42–51.
IJCARIJCAR-2008-HirokawaM #analysis #automation #complexity #dependence
Automated Complexity Analysis Based on the Dependency Pair Method (NH, GM), pp. 364–379.
IJCARIJCAR-2008-SchmidtT #first-order #logic
A General Tableau Method for Deciding Description Logics, Modal Logics and Related First-Order Fragments (RAS, DT), pp. 194–209.
RTARTA-2008-Schmidt-SchaussM #call-by #finite #nondeterminism #simulation #λ-calculus
A Finite Simulation Method in a Non-deterministic Call-by-Need λ-Calculus with Letrec, Constructors, and Case (MSS, EM), pp. 321–335.
WICSAWICSA-2007-FalessiCK #architecture #design #question
Do Architecture Design Methods Meet Architects’ Needs? (DF, GC, PK), p. 5.
WICSAWICSA-2007-MurthyRH #refactoring
Refactoring Methods (PVRM, TR, SH), p. 37.
WICSAWICSA-2007-SangwanH #analysis #architecture #design #object-oriented
Integrating Architecture-Centric Methods into Object-Oriented Analysis and Design (RSS, ZEH), p. 32.
ASEASE-2007-Easterbrook #empirical #re-engineering #research
Empirical research methods for software engineering (SME), p. 574.
ASEASE-2007-WapplerS #testing
Improving evolutionary class testing in the presence of non-public methods (SW, IS), pp. 381–384.
CASECASE-2007-ChengYT #evaluation #testing
A Quantitative Knife-edge Testing Method for Local Deformation Evaluation in Optical Aspheric Fabrication (HC, YY, HT), pp. 818–822.
CASECASE-2007-HablaDMPE
A Short-Term Forecast Method for Demand Quantities in Semiconductor Manufacturing (CH, RD, LM, TP, HE), pp. 94–99.
CASECASE-2007-NishiHI #problem #scheduling
A Successive Lagrangian Relaxation Method for Solving Flowshop Scheduling Problems with Total Weighted Tardiness (TN, YH, MI), pp. 875–880.
CASECASE-2007-NishiHIG #composition #generative #multi #scheduling
A Decomposition Method with Cut Generation for Simultaneous Production Scheduling and Routing for multiple AGVs (TN, YH, MI, IEG), pp. 658–663.
CASECASE-2007-ZhuangXZD #multi #optimisation #set
Von Mises Stress and Level Set Method based Structural Topology Optimization with Multi-phase Materials (CZ, ZX, XZ, HD), pp. 945–949.
DACDAC-2007-IwataYF
A DFT Method for Time Expansion Model at Register Transfer Level (HI, TY, HF), pp. 682–687.
DACDAC-2007-RastogiCK #on the
On Estimating Impact of Loading Effect on Leakage Current in Sub-65nm Scaled CMOS Circuits Based on Newton-Raphson Method (AR, WC, SK), pp. 712–715.
DACDAC-2007-TaylorP #combinator #design #logic #optimisation #physics
Exact Combinatorial Optimization Methods for Physical Design of Regular Logic Bricks (BT, LTP), pp. 344–349.
DACDAC-2007-VytyazLLMMM #parametricity
Parameter Finding Methods for Oscillators with a Specified Oscillation Frequency (IV, DCL, SL, AM, UKM, KM), pp. 424–429.
DACDAC-2007-ZhouLS #bound #embedded #hybrid #multi #performance #using
Fast Capacitance Extraction in Multilayer, Conformal and Embedded Dielectric using Hybrid Boundary Element Method (NYZ, ZL, WS), pp. 835–840.
DATEDATE-2007-0004XJ #analysis #novel #statistics
A novel criticality computation method in statistical timing analysis (FW, YX, HJ), pp. 1611–1616.
DATEDATE-2007-BjerregaardSS #architecture #scalability
A scalable, timing-safe, network-on-chip architecture with an integrated clock distribution method (TB, MBS, JS), pp. 648–653.
DATEDATE-2007-HongSCY #adaptation
A two-tone test method for continuous-time adaptive equalizers (DH, SS, KTC, CPY), pp. 1283–1288.
DATEDATE-2007-KeezerMD #multi
Method for reducing jitter in multi-gigahertz ATE (DCK, DM, PD), pp. 701–706.
DATEDATE-2007-LisselGG #design #industrial #perspective #verification
Introducing new verification methods into a company’s design flow: an industrial user’s point of view (RL, JG), pp. 689–694.
DATEDATE-2007-SeongM #performance #taxonomy #using
An efficient code compression technique using application-aware bitmask and dictionary selection methods (SWS, PM), pp. 582–587.
DATEDATE-2007-SingheeR #monte carlo #novel #performance #simulation #statistics
Statistical blockade: a novel method for very fast Monte Carlo simulation of rare circuit events, and its application (AS, RAR), pp. 1379–1384.
DATEDATE-2007-VerbauwhedeS #design #security #trust
Design methods for security and trust (IV, PS), pp. 672–677.
DATEDATE-2007-XuC #array
A cross-referencing-based droplet manipulation method for high-throughput and pin-constrained digital microfluidic arrays (TX, KC), pp. 552–557.
DATEDATE-2007-ZhuZCXZ #grid #probability #process
A sparse grid based spectral stochastic collocation method for variations-aware capacitance extraction of interconnects under nanometer process technology (HZ, XZ, WC, JX, DZ), pp. 1514–1519.
DATEDATE-2007-ZjajoAG #interactive #monitoring #parametricity #process
Interactive presentation: BIST method for die-level process parameter variation monitoring in analog/mixed-signal integrated circuits (AZ, MJBA, JPdG), pp. 1301–1306.
DocEngDocEng-2007-KimYHKK #documentation #modelling #scalability #xml
A document object modeling method to retrieve data from a very large XML document (SMK, SIY, EH, TGK, IKK), pp. 59–68.
DRRDRR-2007-AndraNLZBBHST #effectiveness
Frequency coding: an effective method for combining dichotomizers (SA, GN, CLL, IZ, EB, AB, LH, KMS, MT).
ICDARICDAR-2007-AbedM #comparison #feature model #preprocessor #recognition
Comparison of Different Preprocessing and Feature Extraction Methods for Offline Recognition of Handwritten ArabicWords (HEA, VM), pp. 974–978.
ICDARICDAR-2007-AntonacopoulosB #analysis #framework #layout #performance
Performance Analysis Framework for Layout Analysis Methods (AA, DB), pp. 1258–1262.
ICDARICDAR-2007-BaudrierR #image #visualisation
A Method for Image Local-Difference Visualization (EB, AR), pp. 949–953.
ICDARICDAR-2007-ChenLJ #learning #pseudo #recognition
Learning Handwritten Digit Recognition by the Max-Min Posterior Pseudo-Probabilities Method (XC, XL, YJ), pp. 342–346.
ICDARICDAR-2007-NejadR #identification #verification
A New Method for Writer Identification and Verification Based on Farsi/Arabic Handwritten Texts (FN, MR), pp. 829–833.
ICDARICDAR-2007-PapavassiliouSKC #parametricity #verification
A Parametric Spectral-Based Method for Verification of Text in Videos (VP, TS, VK, GC), pp. 879–883.
ICDARICDAR-2007-RabasseGF #synthesis
A Method for the Synthesis of Dynamic Biometric Signature Data (CR, RMG, MCF), pp. 168–172.
ICDARICDAR-2007-Renaudin #collaboration
A General Method of Segmentation-Recognition Collaboration Applied to Pairs of Touching and Overlapping Symbols (CR), pp. 659–663.
ICDARICDAR-2007-TabboneZ #documentation #visual notation
An Indexing Method for Graphical Documents (ST, DZ), pp. 789–793.
ICDARICDAR-2007-WuLFLX #2d #image #modelling
A Model Based Book Dewarping Method to Handle 2D Images Captured by a Digital Camera (MW, RL, BF, WL, ZX), pp. 158–162.
SIGMODSIGMOD-2007-MorseP #performance #similarity
An efficient and accurate method for evaluating time series similarity (MDM, JMP), pp. 569–580.
VLDBVLDB-2007-ChenCB #estimation #performance
A Simple and Efficient Estimation Method for Stream Expression Cardinalities (AC, JC, TB), pp. 171–182.
VLDBVLDB-2007-WuJ #set
A Bayesian Method for Guessing the Extreme Values in a Data Set (MW, CJ), pp. 471–482.
CSEETCSEET-2007-FrezzaT #behaviour #developer #testing
Testing as a Mental Discipline: Practical Methods for Affecting Developer Behavior (STF, MHT), pp. 355–356.
ITiCSEITiCSE-2007-CaronnaSMIHT #predict #using
Prediction of modulators of pyruvate kinase in smiles text using aprori methods (JSC, RS, JDM, VLI, KGH, JHT), p. 348.
FASEFASE-2007-DarvasL #implementation #reasoning
Practical Reasoning About Invocations and Implementations of Pure Methods (ÁD, KRML), pp. 336–351.
TACASTACAS-2007-HarelS #flexibility #source code
Planned and Traversable Play-Out: A Flexible Method for Executing Scenario-Based Programs, (DH, IS), pp. 485–499.
WCREWCRE-J-2005-ChristlKS07 #automation #clustering
Automated clustering to support the reflexion method (AC, RK, MADS), pp. 255–274.
SCAMSCAM-2007-JuilleratH #implementation #refactoring #towards
Toward an Implementation of the “Form Template Method” Refactoring (NJ, BH), pp. 81–90.
WCREWCRE-2007-FrenzelKBA #product line
Extending the Reflexion Method for Consolidating Software Variants into Product Lines (PF, RK, APJB, KA), pp. 160–169.
STOCSTOC-2007-DunaganH
Iteratively constructing preconditioners via the conjugate gradient method (JD, NJAH), pp. 207–216.
STOCSTOC-2007-KieferLE #convergence #equation #on the #polynomial
On the convergence of Newton’s method for monotone systems of polynomial equations (SK, ML, JE), pp. 217–226.
CIAACIAA-2007-Yli-JyraK #compilation #parallel
A New Method for Compiling Parallel Replacement Rules (AYJ, KK), pp. 320–321.
DLTDLT-2007-EsparzaKL
An Extension of Newton’s Method to ω-Continuous Semirings (JE, SK, ML), pp. 157–168.
DLTDLT-2007-Freivalds #automaton #finite #probability
Non-constructive Methods for Finite Probabilistic Automata (RF), pp. 169–180.
ICALPICALP-2007-BlomerN
Sampling Methods for Shortest Vectors, Closest Vectors and Successive Minima (JB, SN), pp. 65–77.
SEFMSEFM-2007-AichernigPWW #consistency #formal method #industrial #protocol #testing
Protocol Conformance Testing a SIP Registrar: an Industrial Application of Formal Methods (BKA, BP, MW, FW), pp. 215–226.
SEFMSEFM-2007-Cousot #abstract interpretation #formal method
The Rôle of Abstract Interpretation in Formal Methods (PC), pp. 135–140.
CHICHI-2007-AndreasenNSS #empirical #testing #usability #what
What happened to remote usability testing?: an empirical study of three methods (MSA, HVN, SOS, JS), pp. 1405–1414.
CHICHI-2007-ZimmermanFE #design #human-computer #interactive #research
Research through design as a method for interaction design research in HCI (JZ, JF, SE), pp. 493–502.
HCIDHM-2007-ChoiNCC #3d #generative
A Method for Garment Pattern Generation by Flattening 3D Body Scan Data (YLC, YN, KMC, MHC), pp. 803–812.
HCIDHM-2007-DingYYYL #case study
Study on the Appraisal Methods of Hand Fatigue (LD, FY, CY, XY, YL), pp. 33–41.
HCIDHM-2007-HelinVMAM #design #modelling
Digital Human Model Based Participatory Design Method to Improve Work Tasks and Workplaces (KH, JV, JM, SA, TM), pp. 847–855.
HCIDHM-2007-LuoYZ #identification
A Method for Gene Identification by Dynamic Feature Choosing (JL, LY, XZ), pp. 678–683.
HCIDHM-2007-NiuLS #3d #analysis #bibliography #comparison #perspective
Mathematical Methods for Shape Analysis and form Comparison in 3D Anthropometry: A Literature Review (JN, ZL, GS), pp. 161–170.
HCIDHM-2007-Soltysinski #human-computer #interactive #multimodal #novel
Novel Methods for Human-Computer Interaction in Multimodal and Multidimensional Noninvasive Medical Imaging (TS), pp. 717–726.
HCIDHM-2007-XiangZ07a #database #performance #retrieval #scalability
Motion Retrieval Based on an Efficient Index Method for Large-Scale Mocap Database (JX, HZ), pp. 234–242.
HCIDHM-2007-ZhuXYM #detection #novel
A Novel Method for Cloth-Body Collision Detection (XZ, SX, YY, TM), pp. 1056–1063.
HCIHCI-AS-2007-JeenHKLP #interactive #persuasion
Persuasive Interaction Strategy for Self Diet System: Exploring the Relation of User Attitude and Intervention by Computerized Systematic Methods (YJ, JH, HK, KL, PP), pp. 450–458.
HCIHCI-AS-2007-KojimaIN #documentation #using
Document Management and Information Organizing Method Using RFID Tags (HK, KI, NN), pp. 601–610.
HCIHCI-AS-2007-LinKTKT #design #development #process #verification #visual notation
Verification of Development of Scenarios Method and Visual Formats for Design Process (HL, MK, HT, HK, TT), pp. 1095–1101.
HCIHCI-IDU-2007-CortierdA #java #user interface #validation
Formal Validation of Java/Swing User Interfaces with the Event B Method (AC, Bd, YAA), pp. 1062–1071.
HCIHCI-IDU-2007-DaimotoAMK #case study #research #safety
Application of Micro-Scenario Method (MSM) to User Research for the Motorcycle’s Informatization — A Case Study for the Information Support System for Safety (HD, SA, MM, MK), pp. 49–57.
HCIHCI-IDU-2007-DomingoHM #comprehension #game studies #process
A Game to Promote Understanding About UCD Methods and Process (MGD, MAH, EM), pp. 446–452.
HCIHCI-IDU-2007-Go #design
A Scenario-Based Design Method with Photo Diaries and Photo Essays (KG), pp. 88–97.
HCIHCI-IDU-2007-KangY #difference #performance
Age Differences in Performance, Operation Methods, and Workload While Interacting with an MP3 Player (NEK, WCY), pp. 854–861.
HCIHCI-IDU-2007-KoutsabasisSD #case study #evaluation #usability
Evaluating Usability Evaluation Methods: Criteria, Method and a Case Study (PK, TS, JD), pp. 569–578.
HCIHCI-IDU-2007-ResterPWHMPO #evaluation #interactive
Mixing Evaluation Methods for Assessing the Utility of an Interactive InfoVis Technique (MR, MP, SW, KH, SM, CP, SO), pp. 604–613.
HCIHCI-IPT-2007-HuaP #data access #mobile
WAP Access Methods on Mobile Phones (ZH, CYP), pp. 320–325.
HCIHCI-IPT-2007-IshidoKIO #evaluation #interface
Evaluation of Content Handling Methods for Tabletop Interface (RI, KK, TI, KiO), pp. 326–335.
HCIHCI-IPT-2007-LiK #automation #image
A Color Adjustment Method for Automatic Seamless Image Blending (XL, DK), pp. 82–91.
HCIHCI-IPT-2007-OtsukiKNST #artificial reality #interactive #novel
RealSound Interaction: A Novel Interaction Method with Mixed Reality Space by Localizing Sound Events in Real World (MO, AK, TN, FS, HT), pp. 653–662.
HCIHCI-IPT-2007-ParkSKPJ #composition #modelling #user interface
User Customization Methods Based on Mental Models: Modular UI Optimized for Customizing in Handheld Device (BP, SS, JK, WP, HJ), pp. 445–451.
HCIHCI-IPT-2007-SongKPPJ #design
Designing Input Method of Hand-Held Device with International User Studies (SS, JK, WP, BP, HJ), pp. 480–485.
HCIHCI-IPT-2007-WuH #visualisation
The Perceptual Eye View: A User-Defined Method for Information Visualization (LHW, PYH), pp. 181–190.
HCIHCI-IPT-2007-XuRMMB #challenge #evaluation #user interface
Evaluation of Tangible User Interfaces (TUIs) for and with Children — Methods and Challenges (DYX, JCR, EM, SM, MB), pp. 1008–1017.
HCIHCI-MIE-2007-ChanCCHH #detection #multi #using
A New Method for Multi-finger Detection Using a Regular Diffuser (LWC, YFC, YWC, YPH, JYjH), pp. 573–582.
HCIHCI-MIE-2007-LeePWP #artificial reality #robust
Robust Gaze Tracking Method for Stereoscopic Virtual Reality Systems (ECL, KRP, MCW, JP), pp. 700–709.
HCIHCI-MIE-2007-NodaITF #adaptation #semantics #web
An Adaptive Web Browsing Method for Various Terminals: A Semantic Over-Viewing Method (HN, TI, YT, SF), pp. 440–448.
HCIHIMI-IIE-2007-AndoM #education #student
A New Method for Teachers and Students to Record Daily Progress in a Class (AA, KM), pp. 245–251.
HCIHIMI-IIE-2007-AnseT #evaluation
Evaluation Method of e-Learning Materials by α-Wave and β-Wave of EEG (MA, TT), pp. 252–259.
HCIHIMI-IIE-2007-HorinouchiWAT #case study #effectiveness
A Study of an Effective Rehearsal Method in e-Learning (TH, SW, MA, TT), pp. 328–336.
HCIHIMI-IIE-2007-KanekoNATT #analysis #generative #mining #using
A Method for Generating Plans for Retail Store Improvements Using Text Mining and Conjoint Analysis (TK, YN, MA, TT, YT), pp. 910–917.
HCIHIMI-IIE-2007-KusukawaMA #e-commerce
Impact of E-Commerce Environment on Selection of Sales Methods Considering Delivery Lead Time of Goods (EK, SM, IA), pp. 929–938.
HCIHIMI-IIE-2007-ObayashiKTTHSIY #development
Development of an Illumination Control Method to Improve Office Productivity (FO, MK, MT, KT, YH, HS, HI, HY), pp. 939–947.
HCIHIMI-IIE-2007-ShimodaIHIYOT #development #evaluation
Development of Productivity Evaluation Method to Improve Office Environment (HS, KI, YH, HI, HY, FO, MT), pp. 965–972.
HCIHIMI-IIE-2007-YajimaWS #evaluation #information management #multi
Evaluation of the Participant-Support Method for Information Acquisition in the “Multiplex Risk Communicator” (HY, TW, RS), pp. 195–203.
HCIHIMI-MTT-2007-Jeong #comprehension #using
Suggestion of Methods for Understanding User’s Emotional Changes While Using a Product (SHJ), pp. 59–67.
HCIHIMI-MTT-2007-JiGC #comparison #using #word
Selecting Target Word Using Contexonym Comparison Method (HJ, BG, HC), pp. 463–470.
HCIHIMI-MTT-2007-OkaMS #information management
An Information Filtering Method Based on User’s Moods, Situations, and Preferences (MO, HM, MS), pp. 715–719.
HCIHIMI-MTT-2007-ParkK07a #case study #effectiveness #mobile
A Case Study on Effective Application of Inquiry Methods to Find Out Mobile Phone’s New Function (SP, YK), pp. 163–170.
HCIHIMI-MTT-2007-SatoAT
A Method for Constructing a Movie-Selection Support System Based on Kansei Engineering (NS, MA, TT), pp. 526–534.
HCIHIMI-MTT-2007-TsengTW #implementation #process
Implementing the HCD Method into the Developing Process of a CPD System (KCT, THT, KCW), pp. 199–207.
HCIHIMI-MTT-2007-XuLSB
A Method for Rule Extraction by Discernible Vector (EX, LS, ST, BY), pp. 779–784.
HCIHIMI-MTT-2007-YamamotoW #development #image
Development of an Embodied Image Telecasting Method Via a Robot with Speech-Driven Nodding Response (MY, TW), pp. 1017–1025.
HCIHIMI-MTT-2007-YangDJB #human-computer
Human-Friendly HCI Method for the Control of Home Appliance (SEY, JHD, HJ, ZB), pp. 218–226.
HCIOCSC-2007-DayF #analysis #community #concept #named #network #research
CNA2 — Communications and Community; Neighborhoods and Networks; Action and Analysis: Concepts and Methods for Community Technology Research (PD, CF), pp. 301–314.
HCIOCSC-2007-SagaT #network #ranking #social
Ranking Method for Mediators in Social Network (RS, HT), pp. 151–159.
CAiSECAiSE-2007-DjebbiS #product line #requirements
RED-PL, a Method for Deriving Product Requirements from a Product Line Requirements Model (OD, CS), pp. 279–293.
CAiSECAiSE-2007-ThevenetS
Aligning IS to Organization’s Strategy: The InStAlMethod (LHT, CS), pp. 203–217.
CAiSECAiSE-2007-WeerdBV #concept #empirical #evolution #incremental #requirements #validation
Concepts for Incremental Method Evolution: Empirical Exploration and Validation in Requirements Management (IvdW, SB, JV), pp. 469–484.
ICEISICEIS-AIDSS-2007-CuellarDP #algorithm #hybrid #network #problem
Problems and Features of Evolutionary Algorithms to Build Hybrid Training Methods for Recurrent Neural Networks (MPC, MD, MdCPJ), pp. 204–211.
ICEISICEIS-AIDSS-2007-FurstT #concept #graph #ontology
Heavyweight Ontology Matching — A Method and a Tool based on the Conceptual Graphs Model (FF, FT), pp. 265–270.
ICEISICEIS-DISI-2007-OsbornB #2d
An insertion strategy for a two-dimensional spatial access method (WO, KB), pp. 295–300.
ICEISICEIS-DISI-2007-RayG #using
A method for early correspondence discovery using instance data (IR, CJMG), pp. 258–263.
ICEISICEIS-DISI-2007-SantosB #clustering #named #optimisation
PIN: A partitioning and indexing optimization method for olap (RJS, JB), pp. 170–177.
ICEISICEIS-EIS-2007-KornyshovaS #multi #process #re-engineering
Business Process Priorisation with Multicriteria Methods — Case of Business Process Reengineering (EK, CS), pp. 138–143.
ICEISICEIS-EIS-2007-MaamarBG #design #named #web #web service
CP4WS — A Method for Designing and Developing Systems Based on Web Services (ZM, DB, CG), pp. 452–458.
ICEISICEIS-HCI-2007-Godet-BarRDJ #analysis #human-computer
Interactional Objects: HCI Concerns in the Analysis Phase of the Symphony Method (GGB, DR, SDC, DJ), pp. 37–44.
ICEISICEIS-J-2007-Barjis07a #modelling #process #simulation #using
A Business Process Modeling and Simulation Method Using DEMO (JB), pp. 254–265.
CIKMCIKM-2007-EavisT #named #performance
Mapgraph: efficient methods for complex olap hierarchies (TE, AT), pp. 465–474.
CIKMCIKM-2007-GarakaniIHH #named #novel #query #xml
Ntjfsatnot: a novel method for query with not-predicates on xml data (VG, SKI, MH, MH), pp. 885–888.
CIKMCIKM-2007-InokuchiT #online
A method for online analytical processing of text data (AI, KT), pp. 455–464.
CIKMCIKM-2007-ShinL #data type #interactive #online
An on-line interactive method for finding association rules data streams (SJS, WSL), pp. 963–966.
ECIRECIR-2007-CasanovaQB #comparison #multi #retrieval #standard
Overall Comparison at the Standard Levels of Recall of Multiple Retrieval Methods with the Friedman Test (JMC, MAPQ, AB), pp. 682–685.
ECIRECIR-2007-HeD #classification #naive bayes #using
Improving Naive Bayes Text Classifier Using Smoothing Methods (FH, XD), pp. 703–707.
ECIRECIR-2007-PanLZTC #retrieval #video
Retrieval Method for Video Content in Different Format Based on Spatiotemporal Features (XP, JL, YZ, ST, JC), pp. 728–731.
ICMLICML-2007-KimP #learning #recursion
A recursive method for discriminative mixture learning (MK, VP), pp. 409–416.
ICMLICML-2007-KropotovV #learning #on the
On one method of non-diagonal regularization in sparse Bayesian learning (DK, DV), pp. 457–464.
ICMLICML-2007-LinWK #scalability #trust
Trust region Newton methods for large-scale logistic regression (CJL, RCW, SSK), pp. 561–568.
ICMLICML-2007-SriperumbudurTL #programming
Sparse eigen methods by D.C. programming (BKS, DAT, GRGL), pp. 831–838.
KDDKDD-2007-ArnoldLA #modelling #visual notation
Temporal causal modeling with graphical granger methods (AA, YL, NA), pp. 66–75.
KDDKDD-2007-DasguptaDHJM #classification #feature model
Feature selection methods for text classification (AD, PD, BH, VJ, MWM), pp. 230–239.
KDDKDD-2007-DruckPMZ #classification #generative #hybrid
Semi-supervised classification with hybrid generative/discriminative methods (GD, CP, AM, XZ), pp. 280–289.
KDDKDD-2007-WanNHL #privacy
Privacy-preservation for gradient descent methods (LW, WKN, SH, VCSL), pp. 775–783.
MLDMMLDM-2007-HulsmannF #algorithm #comparison #multi #novel #optimisation #parametricity
Comparison of a Novel Combined ECOC Strategy with Different Multiclass Algorithms Together with Parameter Optimization Methods (MH, CMF), pp. 17–31.
MLDMMLDM-2007-MendezCGRD #performance
Analyzing the Performance of Spam Filtering Methods When Dimensionality of Input Vector Changes (JRM, BC, DGP, FFR, FD), pp. 364–378.
MLDMMLDM-2007-WangLYC #classification #data type #fuzzy #incremental #mining
An Incremental Fuzzy Decision Tree Classification Method for Mining Data Streams (TW, ZL, YY, HC), pp. 91–103.
SEKESEKE-2007-HummelJA #component #performance #repository #retrieval
Evaluating the Efficiency of Retrieval Methods for Component Repositories (OH, WJ, CA), pp. 404–409.
SEKESEKE-2007-LiZXS #classification #component #generative #ontology #retrieval
Ontology Based Classification Generating Method for Browsing-Based Component Retrieval (GL, LZ, BX, WS), p. 428–?.
SEKESEKE-2007-ZanattaV #agile #integration #modelling #quality #requirements #towards
Agile Methods and Quality Models: Towards an Integration in Requirements Engineering (ALZ, PV), pp. 173–178.
SEKESEKE-2007-ZiemerC #development #release planning #web
Knowledge Sharing through a Simple Release Planning Method for Web Application Development (SZ, ICC), pp. 686–691.
SIGIRSIGIR-2007-KoAS #effectiveness #feedback #generative #pseudo #using
An effective snippet generation method using the pseudo relevance feedback technique (YK, HA, JS), pp. 711–712.
SIGIRSIGIR-2007-PopoviciMM #documentation #effectiveness
An effective method for finding best entry points in semi-structured documents (EP, PFM, GM), pp. 851–852.
SIGIRSIGIR-2007-ThomasH
Evaluating sampling methods for uncooperative collections (PT, DH), pp. 503–510.
SIGIRSIGIR-2007-TsaiLQCM #named #ranking
FRank: a ranking method with fidelity loss (MFT, TYL, TQ, HHC, WYM), pp. 383–390.
SIGIRSIGIR-2007-YueFRJ #optimisation #precise
A support vector method for optimizing average precision (YY, TF, FR, TJ), pp. 271–278.
MODELSMoDELS-2007-LeppanenLT #automation #design #industrial #modelling #scalability
A Modelling Method for Rigorous and Automated Design of Large-Scale Industrial Systems (KL, SL, MT), pp. 331–345.
MODELSMoDELS-2007-LeppanenLT #automation #design #industrial #modelling #scalability
A Modelling Method for Rigorous and Automated Design of Large-Scale Industrial Systems (KL, SL, MT), pp. 331–345.
OOPSLAOOPSLA-2007-ShanerLN #composition #higher-order #source code #verification
Modular verification of higher-order methods with mandatory calls specified by model programs (SMS, GTL, DAN), pp. 351–368.
TOOLSTOOLS-EUROPE-2007-DenkerDLM
Sub-Method Reflection (MD, SD, AL, PM), pp. 275–295.
TOOLSTOOLS-EUROPE-2007-KusmierekB
Hygienic methods Ñ Introducing HygJava (JDMK, VB), pp. 209–229.
GPCEGPCE-2007-PirkelbauerSS #c++ #multi
Open multi-methods for c++ (PP, YS, BS), pp. 123–134.
REFSQREFSQ-2007-HerrmannKD
Exploring the Characteristics of NFR Methods — A Dialogue About Two Approaches (AH, DK, JD), pp. 320–334.
SACSAC-OOPS-J-2006-BeugnardS07 #encapsulation
Method Overloading and Overriding Cause Distribution Transparency and Encapsulation Flaws (AB, SS), pp. 31–45.
SACSAC-2007-BarratT #learning #recognition
A progressive learning method for symbols recognition (SB, ST), pp. 627–631.
SACSAC-2007-BoussellaaZA #hybrid #using
A methodology for the separation of foreground/background in Arabic historical manuscripts using hybrid methods (WB, AZ, AMA), pp. 605–609.
SACSAC-2007-InokiF #approach #evolution #product line
Software product line evolution method based on kaizen approach (MI, YF), pp. 1207–1214.
SACSAC-2007-KarwaczynskiKMN #peer-to-peer #proximity
Dual proximity neighbour selection method for peer-to-peer-based discovery service (PK, DK, JM, MN), pp. 590–591.
SACSAC-2007-KoralalageRMGC #approach #lifecycle #privacy #security
POP method: an approach to enhance the security and privacy of RFID systems used in product lifecycle with an anonymous ownership transferring mechanism (KHSSK, MRS, JM, YG, JC), pp. 270–275.
SACSAC-2007-LinsS #algorithm #documentation
A quantitative method for assessing algorithms to remove back-to-front interference in documents (RDL, JMMdS), pp. 610–616.
SACSAC-2007-TetsuyaAHN #ad hoc #generative #network #using
Topology information generation methods using a routing table in ad hoc network applications (TT, AK, TH, SN), pp. 896–900.
SACSAC-2007-TreeprapinKHN #mobile #network
A mobile sensor control method for sparse sensor networks (KT, AK, TH, SN), pp. 886–890.
SACSAC-2007-ZengS #combinator #geometry #optimisation #problem
Semi-mechanization method for a unsolved optimization problem in combinatorial geometry (ZZ, MS), pp. 762–766.
SPLCSPLC-2007-ChangK #adaptation #modelling #variability
A Variability Modeling Method for Adaptable Services in Service-Oriented Computing (SHC, SDK), pp. 261–268.
CCCC-2007-CheremR #analysis #lightweight #summary
A Practical Escape and Effect Analysis for Building Lightweight Method Summaries (SC, RR), pp. 172–186.
PPoPPPPoPP-2007-LeeBSSSM #learning #modelling #parallel #performance
Methods of inference and learning for performance modeling of parallel applications (BCL, DMB, BRdS, MS, KS, SAM), pp. 249–258.
PPoPPPPoPP-2007-ZhangSZSG #concurrent
Optimized lock assignment and allocation: a method for exploiting concurrency among critical sections (YZ, VCS, WZ, VS, GRG), pp. 146–147.
AMOSTAMOST-2007-KorelKT #evaluation #heuristic #modelling
Model-based test prioritization heuristic methods and their evaluation (BK, GK, LHT), pp. 34–43.
CADECADE-2007-Baumgartner #logic
Logical Engineering with Instance-Based Methods (PB), pp. 404–409.
CADECADE-2007-GhilardiNRZ #infinity #model checking #satisfiability
Combination Methods for Satisfiability and Model-Checking of Infinite-State Systems (SG, EN, SR, DZ), pp. 362–378.
CAVCAV-2007-Kropf #debugging #development #formal method #industrial #question
Software Bugs Seen from an Industrial Perspective or Can Formal Methods Help on Automotive Software Development? (TK), p. 3.
ICLPICLP-2007-Morozov #analysis #design #logic programming #visual notation
Visual Logic Programming Method Based on Structural Analysis and Design Technique (AAM), pp. 436–437.
LICSLICS-2007-Hales #geometry #problem
Some Methods of Problem Solving in Elementary Geometry (TCH), pp. 35–40.
LICSLICS-2007-MontanariP
A Contraction Method to Decide MSO Theories of Deterministic Trees (AM, GP), pp. 141–150.
FATESTestCom-FATES-2007-DesmoulinV #generative #testing
A New Method for Interoperability Test Generation (AD, CV), pp. 58–73.
QoSAQoSA-2006-LiuGBHA #architecture #middleware #named
MEMS: A Method for Evaluating Middleware Architectures (YL, IG, LB, CH, SA), pp. 9–26.
ASEASE-2006-PontissoC #automation #formal method #modelling
TOPCASED Combining Formal Methods with Model-Driven Engineering (NP, DC), pp. 359–360.
ASEASE-2006-Singer #evaluation #testing #tool support
Testing Tools and Techniques: A Mini-Tutorial on Evaluation Methods for ASE (JS), pp. 371–374.
CASECASE-2006-CapachoPGD #assembly #heuristic #problem
Heuristic Methods to Solve the Alternative Subgraphs Assembly Line Balancing Problem (LC, RP, OG, AD), pp. 501–506.
CASECASE-2006-ChengSOYII #performance #scheduling
A fast rescheduling method in semiconductor manufacturing allowing for tardiness and scheduling stability (MC, MS, JO, MY, HI, KI), pp. 100–105.
CASECASE-2006-HuSHL #modelling #probability #using
Vision-based Indoor Scene Cognition Using a Spatial Probabilistic Modeling Method (JSH, TMS, HCH, PCL), pp. 620–625.
CASECASE-2006-LiLWC #automation #component #equation #generative #graph #linear #using
Automatic Generation of Component-level Dynamic Equations Using Extensible Element Linear Graph Method (YL, ZL, HW, YC), pp. 118–123.
CASECASE-2006-LiZY #development #fault #integration #probability #research
Research on Computational Method of Fault Probability for New Product Development Based on Intelligence and Integration (FL, LZ, YY), pp. 319–324.
CASECASE-2006-Mishima #development #evaluation #performance
Development of a micro manufacturing system and its efficiency evaluation method (NM), pp. 478–483.
CASECASE-2006-PiPS #problem
Nested Partitions Method for the Local Pickup and Delivery Problem (LP, YP, LS), pp. 375–380.
CASECASE-2006-SunXZ #adaptation #correlation #performance #self
Self-adaptive Surge Adjustment based on Fast Correlation Integral Method in Centrifugal Compressors (TS, GX, CZ), pp. 661–666.
CASECASE-2006-SunZF #convergence #parallel
Convergence of parallel dynamic iteration methods for nonlinear DAEs of index-2 (WS, JHZ, XGF), pp. 129–133.
CASECASE-2006-XiaoX #modelling #monitoring #process
Monitoring of batch processes with non-linear modeling methods (YX, BX), pp. 140–143.
DACDAC-2006-Gluska #verification
Practical methods in coverage-oriented verification of the merom microprocessor (AG), pp. 332–337.
DACDAC-2006-LiZJ #concurrent #named #network #proximity
DyXY: a proximity congestion-aware deadlock-free dynamic routing method for network on chip (ML, QAZ, WBJ), pp. 849–852.
DACDAC-2006-MeiR #robust
A robust envelope following method applicable to both non-autonomous and oscillatory circuits (TM, JSR), pp. 1029–1034.
DACDAC-2006-NakamuraTOTY #design #scalability
Budgeting-free hierarchical design method for large scale and high-performance LSIs (YN, MT, TO, ST, KY), pp. 955–958.
DACDAC-2006-TanimotoYNH #realtime #using
A real time budgeting method for module-level-pipelined bus based system using bus scenarios (TT, SY, AN, TH), pp. 37–42.
DACDAC-2006-WuJYLT #estimation #functional
A systematic method for functional unit power estimation in microprocessors (WW, LJ, JY, PL, SXDT), pp. 554–557.
DATEDATE-2006-HosseinabadyBBN #concurrent #testing
A concurrent testing method for NoC switches (MH, AB, MNB, ZN), pp. 1171–1176.
DATEDATE-2006-JerinicLHM #functional #metric #verification
New methods and coverage metrics for functional verification (VJ, JL, UH, DM), pp. 1025–1030.
DATEDATE-2006-KrautzP0TWV #detection #fault #formal method #logic #using
Evaluating coverage of error detection logic for soft errors using formal methods (UK, MP, CJ, HWT, KW, HTV), pp. 176–181.
DATEDATE-2006-KunzliPBT #analysis #formal method #performance #simulation
Combining simulation and formal methods for system-level performance analysis (SK, FP, LB, LT), pp. 236–241.
DATEDATE-2006-Liu
A practical method to estimate interconnect responses to variabilities (FL), pp. 545–546.
DATEDATE-2006-MeiR #analysis #performance #using
Efficient AC analysis of oscillators using least-squares methods (TM, JSR), pp. 263–268.
DATEDATE-2006-VandersteenBDR
Systematic stability-analysis method for analog circuits (GV, SB, PD, YR), pp. 150–155.
DATEDATE-2006-ZengFSCZC #domain model #order #reduction
Time domain model order reduction by wavelet collocation method (XZ, LF, YS, WC, DZ, CC), pp. 21–26.
DRRDRR-2006-WangDLL #authentication #documentation
A new document authentication method by embedding deformation characters (XW, XD, HL, CL).
VLDBVLDB-2006-RaoDTC #data analysis
A Deferred Cleansing Method for RFID Data Analytics (JR, SD, HT, LSC), pp. 175–186.
CSEETCSEET-2006-FrezzaT #behaviour #student #testing
Testing as a Mental Discipline: Practical Methods for Affecting Student Behavior (STF, MHT), p. 241.
ITiCSEITiCSE-2006-DonyC #education #programming
A tool for helping teach a programming method (ID, BLC), pp. 212–216.
ICSMEICSM-2006-DraganCM #reverse engineering
Reverse Engineering Method Stereotypes (ND, MLC, JIM), pp. 24–34.
ICSMEICSM-2006-NgoT #fault #maintenance
A Method to Aid Recovery and Maintenance of the Input Error Correction Features (MNN, HBKT), pp. 360–369.
ICSMEICSM-2006-ShenM #architecture #named
ESDM — A Method for Developing Evolutionary Scenarios for Analysing the Impact of Historical Changes on Architectural Elements (YS, NHM), pp. 45–54.
ICSMEICSM-2006-TomaszewskiGL #fault #predict
A Method for an Accurate Early Prediction of Faults in Modified Classes (PT, HG, LL), pp. 487–496.
MSRMSR-2006-ZimmermannBLL #mining
Mining additions of method calls in ArgoUML (TZ, SB, CL, VBL), pp. 169–170.
STOCSTOC-2006-AmbainisSW #bound #quantum #theorem #trade-off
A new quantum lower bound method, : with applications to direct product theorems and time-space tradeoffs (AA, RS, RdW), pp. 618–633.
STOCSTOC-2006-FischerRV #adaptation #convergence #performance
Fast convergence to Wardrop equilibria by adaptive sampling methods (SF, HR, BV), pp. 653–662.
FMFM-2006-BacheriniFTZ #formal method
A Story About Formal Methods Adoption by a Railway Signaling Manufacturer (SB, AF, MT, NZ), pp. 179–189.
FMFM-2006-BackesPW #encryption #formal method
Formal Methods and Cryptography (MB, BP, MW), pp. 612–616.
FMFM-2006-Boute #formal method #independence #problem #using
Using Domain-Independent Problems for Introducing Formal Methods (RTB), pp. 316–331.
FMFM-2006-Mostowski #java #logic #reasoning
Formal Reasoning About Non-atomic Java Card Methods in Dynamic Logic (WM), pp. 444–459.
FMFM-2006-Oheimb #formal method #security
Formal Methods in the Security Business: Exotic Flowers Thriving in an Expanding Niche (DvO), pp. 592–597.
FMFM-2006-Stephan #formal method #lightweight #plugin #security
Formal Methods for Security: Lightweight Plug-In or New Engineering Discipline (WS), pp. 587–591.
FMFM-2006-ZhengWWX #approach #case study #development #formal method #object-oriented #using
Partially Introducing Formal Methods into Object-Oriented Development: Case Studies Using a Metrics-Driven Approach (YZ, JW, KW, JX), pp. 190–204.
SEFMSEFM-2006-Rushby06a #automation #formal method #named #tutorial
Tutorial: Automated Formal Methods with PVS, SAL, and Yices (JMR), p. 262.
SFMSFM-2006-GuptaGW #hardware #satisfiability #verification
SAT-Based Verification Methods and Applications in Hardware Verification (AG, MKG, CW), pp. 108–143.
CHICHI-2006-GongT #evaluation #fault #metric
A new error metric for text entry method evaluation (JG, PT), pp. 471–474.
CHICHI-2006-GuanLCR #eye tracking
The validity of the stimulated retrospective think-aloud method as measured by eye tracking (ZG, SL, EC, JR), pp. 1253–1262.
CHICHI-2006-ProschowskySJ
An intuitive text input method for touch wheels (MP, NS, NEJ), pp. 467–470.
CHICHI-2006-RotoPKV #mobile #named #visualisation #web
Minimap: a web page visualization method for mobile phones (VR, AP, AK, EV), pp. 35–44.
CSCWCSCW-2006-PalenB
Of pill boxes and piano benches: “home-made” methods for managing medication (LP, SAB), pp. 79–88.
CAiSECAiSE-2006-HaggmarkA #analysis #logic #principle #why
Why Software Engineers Do Not Keep to the Principle of Separating Business Logic from Display: A Method Rationale Analysis (MH, PJÅ), pp. 399–413.
CAiSECAiSE-2006-Saeki #configuration management
Configuration Management in a Method Engineering Context (MS), pp. 384–398.
CAiSECAiSE-2006-ValderasPP #approach #development #towards #web
Towards an End-User Development Approach for Web Engineering Methods (PV, VP, OP), pp. 528–543.
EDOCEDOC-2006-Hashemzadeh #navigation #network #performance
A Fast and Efficient Route Finding Method for Car Navigation Systems with Neural Networks (MH), pp. 423–426.
ICEISICEIS-AIDSS-2006-BoudjeloudP #data mining #interactive #mining
Semi Interactive Method for Data Mining (LB, FP), pp. 3–10.
ICEISICEIS-AIDSS-2006-Grzeszczyk #evaluation #set
Application of the Rough Set Method for Evaluation of Structural Funds Projects (TAG), pp. 202–207.
ICEISICEIS-HCI-2006-CoppolaCMFP #clustering #distance #empirical
A Fuzzy-Based Distance to Improve Empirical Methods for Menu Clustering (CC, GC, SDM, FF, TP), pp. 59–64.
ICEISICEIS-ISAS-2006-BurmesterG #modelling
Method for User Oriented Modelling of Data Warehouse Systems (LB, MG), pp. 366–374.
ICEISICEIS-ISAS-2006-Ohnishi #generative
Supporting Methods of Generating Alternative Scenarios from a Normal Scenario (AO), pp. 110–117.
CIKMCIKM-2006-HlaouaSB #feedback #retrieval #xml
A structure-oriented relevance feedback method for XML retrieval (LH, KS, MB), pp. 780–781.
CIKMCIKM-2006-LuPLA #feature model #identification #machine learning #query
Coupling feature selection and machine learning methods for navigational query identification (YL, FP, XL, NA), pp. 682–689.
CIKMCIKM-2006-TaylorZCRB #multi #optimisation #parametricity #ranking
Optimisation methods for ranking functions with multiple parameters (MJT, HZ, NC, SR, CB), pp. 585–593.
CIKMCIKM-2006-VieiraSPMCF #detection #performance #robust #web
A fast and robust method for web page template detection and removal (KV, ASdS, NP, ESdM, JMBC, JF), pp. 258–267.
ICMLICML-2006-AgarwalHKS #algorithm
Algorithms for portfolio management based on the Newton method (AA, EH, SK, RES), pp. 9–16.
ICMLICML-2006-ChapelleCZ #continuation
A continuation method for semi-supervised SVMs (OC, MC, AZ), pp. 185–192.
ICMLICML-2006-GeurtsWd #kernel
Kernelizing the output of tree-based methods (PG, LW, FdB), pp. 345–352.
ICMLICML-2006-Haffner #kernel #learning #performance
Fast transpose methods for kernel learning on sparse data (PH), pp. 385–392.
ICMLICML-2006-VishwanathanSSM #probability #random
Accelerated training of conditional random fields with stochastic gradient methods (SVNV, NNS, MWS, KPM), pp. 969–976.
ICMLICML-2006-XiaoSB #reduction
A duality view of spectral methods for dimensionality reduction (LX, JS, SPB), pp. 1041–1048.
ICPRICPR-v1-2006-CaoN
New RHT-Based Ellipsoid Recovery Method (CKC, TSN), pp. 622–625.
ICPRICPR-v1-2006-CaparG #concurrent #performance #recognition #segmentation
Concurrent Segmentation and Recognition with Shape-Driven Fast Marching Methods (, MG), pp. 155–158.
ICPRICPR-v1-2006-CayouetteC #realtime
Generic Real-Time Tracking Method on Semi-Dynamic Scenes (FC, JRC), pp. 711–714.
ICPRICPR-v1-2006-ChenCW #complexity #image
LBT Based Low Complexity Image Compression Method (BC, LC, HW), pp. 941–944.
ICPRICPR-v1-2006-IshidaTIMM #generative #identification #learning
Identification of degraded traffic sign symbols by a generative learning method (HI, TT, II, YM, HM), pp. 531–534.
ICPRICPR-v1-2006-KoTSH #image #learning #segmentation
A New Image Segmentation Method for Removing Background of Object Movies by Learning Shape Priors (CHK, YPT, ZCS, YPH), pp. 323–326.
ICPRICPR-v1-2006-NieseAM #estimation #feature model
A Stereo and Color-based Method for Face Pose Estimation and Facial Feature Extraction (RN, AAH, BM), pp. 299–302.
ICPRICPR-v1-2006-SchrotterZ #analysis #image #modelling #multi #robust
Robust Model Driven Matching Method for Face Analysis with Multi Image Photogrammetry (GS, LZ), pp. 480–483.
ICPRICPR-v1-2006-ViswanathP #clustering #hybrid #performance
l-DBSCAN : A Fast Hybrid Density Based Clustering Method (PV, RP), pp. 912–915.
ICPRICPR-v1-2006-WangCWG #invariant #recognition #verification
A Verification Method for Viewpoint Invariant Sign Language Recognition (QW, XC, CW, WG), pp. 456–459.
ICPRICPR-v1-2006-WangS #robust
Background Subtraction Based on a Robust Consensus Method (HW, DS), pp. 223–226.
ICPRICPR-v1-2006-WuMLC #segmentation
A New Method of Object Segmentation in the Basketball Videos (LW, XM, XL, SC), pp. 319–322.
ICPRICPR-v1-2006-XuS #robust
A Robust and Accurate Method for Pupil Features Extra (ZX, PS), pp. 437–440.
ICPRICPR-v1-2006-ZhangG #human-computer #interface #kernel #locality
A Kernel-based Signal Localization Method for NIRS Brain-computer Interfaces (HZ, CG), pp. 1158–1161.
ICPRICPR-v1-2006-ZhuWCW #classification #human-computer #interface #predict
GMM-Based Classification Method for Continuous Prediction in Brain-Computer Interface (XZ, JW, YC, YW), pp. 1171–1174.
ICPRICPR-v2-2006-ChenS #graph #verification
A New Off-line Signature Verification Method based on Graph (SC, SNS), pp. 869–872.
ICPRICPR-v2-2006-ChouKC #nearest neighbour #reduction
The Generalized Condensed Nearest Neighbor Rule as A Data Reduction Method (CHC, BHK, FC), pp. 556–559.
ICPRICPR-v2-2006-GanLY #analysis #detection
Detecting Periodically Expressed Genes based on Time-frequency Analysis and L-curve Method (XG, AWCL, HY), pp. 654–657.
ICPRICPR-v2-2006-JiangDR #recognition #string
Substring Alignment Method for Lexicon Based Handwritten Chinese String Recognition and Its Application to Address Line Recognition (YJ, XD, ZR), pp. 683–686.
ICPRICPR-v2-2006-JinM #learning #parametricity #recognition
A Non-Parametric HMM Learning Method for Shape Dynamics with Application to Human Motion Recognition (NJ, FM), pp. 29–32.
ICPRICPR-v2-2006-KelmPM #classification #generative #learning #multi
Combining Generative and Discriminative Methods for Pixel Classification with Multi-Conditional Learning (BMK, CP, AM), pp. 828–832.
ICPRICPR-v2-2006-KoideY #kernel #symmetry
Asymmetric kernel method and its application to Fisher’s discriminant (NK, YY), pp. 820–824.
ICPRICPR-v2-2006-LeL #hybrid
A Hybrid License Plate Extraction Method for Complex Scenes (WL, SL), pp. 324–327.
ICPRICPR-v2-2006-LiLW #feature model #hybrid #ranking
A Hybrid Method of Unsupervised Feature Selection Based on Ranking (YL, BLL, ZFW), pp. 687–690.
ICPRICPR-v2-2006-LuX #estimation
A PDE-Based Method For Optical Flow Estimation (ZL, WX), pp. 78–81.
ICPRICPR-v2-2006-MaceA #documentation #online
A Generic Method for Eager Interpretation of On-Line Handwritten Structured Documents (SM, ÉA), pp. 1106–1109.
ICPRICPR-v2-2006-MahiniKDD #locality #performance
An Efficient Features — Based License Plate Localization Method (HM, SK, FD, FD), pp. 841–844.
ICPRICPR-v2-2006-RaoGSK #image
A Heterogeneous Feature-based Image Alignment Method (CR, YG, HSS, RK), pp. 345–350.
ICPRICPR-v2-2006-SadriSB #clustering #recognition
A New Clustering Method for Improving Plasticity and Stability in Handwritten Character Recognition Systems (JS, CYS, TDB), pp. 1130–1133.
ICPRICPR-v2-2006-ShiratoriGK #performance #using
An Efficient Text Capture Method for Moving Robots Using DCT Feature and Text Tracking (HS, HG, HK), pp. 1050–1053.
ICPRICPR-v2-2006-Strand #3d #distance #fourier #grid #image #re-engineering #using
Using the Hexagonal Grid for Three-Dimensional Images: Direct Fourier Method Reconstruction and Weighted Distance Transform (RS), pp. 1169–1172.
ICPRICPR-v2-2006-ViswanathJ #clustering #performance
A Fast and Efficient Ensemble Clustering Method (PV, KJ), pp. 720–723.
ICPRICPR-v2-2006-YaslanC #classification #feature model #music #using
Audio Music Genre Classification Using Different Classifiers and Feature Selection Methods (YY, ), pp. 573–576.
ICPRICPR-v2-2006-ZhengLY #kernel #learning #problem
Weakly Supervised Learning on Pre-image Problem in Kernel Methods (WSZ, JHL, PCY), pp. 711–715.
ICPRICPR-v3-2006-BaudrierMNR #comparison #performance #quantifier
A fast binary-image comparison method with local-dissimilarity quantification (EB, GM, FN, SR), pp. 216–219.
ICPRICPR-v3-2006-ChengC #problem
A Complementary Ordering Method for Class Imbalanced Problem (HTC, CSC), pp. 429–432.
ICPRICPR-v3-2006-FujitaMH #detection
A Method for Crack Detection on a Concrete Structure (YF, YM, YH), pp. 901–904.
ICPRICPR-v3-2006-HuangL #image #using
A Secret Image Sharing Method Using Integer-to-Integer Wavelet Transform (CPH, CCL), pp. 802–805.
ICPRICPR-v3-2006-JinJL #image #modelling
A Method of Reducing Speckle Noise of SAR Images Based on Wavelets and Wedgelet HMT Models (HyJ, LJ, FL), pp. 635–638.
ICPRICPR-v3-2006-KananFE #locality #performance #recognition #using
An Efficient Face Recognition System Using a New Optimized Localization Method (HRK, KF, ME), pp. 564–567.
ICPRICPR-v3-2006-LenzS
Lie Methods in Color Signal Processing: Illumination Effects (RL, MS), pp. 738–741.
ICPRICPR-v3-2006-NagasakiMKS #adaptation #classification #image
A Coupon Classification Method Based on Adaptive Image Vector Matching (TN, KM, TK, HS), pp. 280–283.
ICPRICPR-v3-2006-PeiLX #detection #information retrieval
A Method For IR Point Target Detection Based on Spatial-temporal Bilateral Filter (JP, ZL, WX), pp. 846–849.
ICPRICPR-v3-2006-PengWT #image #performance
A New Efficient SVM-based Image Registration Method (DP, DW, JWT), pp. 782–785.
ICPRICPR-v3-2006-PozdnoukhovB #graph #invariant #kernel #pattern matching #pattern recognition #recognition
Graph-based transformation manifolds for invariant pattern recognition with kernel methods (AP, SB), pp. 1228–1231.
ICPRICPR-v3-2006-RothausJL #comparison #estimation #parametricity
Comparison of Methods for Hyperspherical Data Averaging and Parameter Estimation (KR, XJ, ML), pp. 395–399.
ICPRICPR-v3-2006-SalmonDW #detection
A new method to detect arcs and segments from curvature profiles (JPS, IDR, LW), pp. 387–390.
ICPRICPR-v3-2006-SuSDW #multimodal #recognition
A Multimodal and Multistage Face Recognition Method for Simulated Portrait (GS, YS, CD, JW), pp. 1013–1017.
ICPRICPR-v3-2006-XieQW
Bootstrap Methods for Reject Rules of Fisher LDA (JX, ZQ, JW), pp. 425–428.
ICPRICPR-v3-2006-ZhengYYWY #agile #feature model #recognition
A Complete and Rapid Feature Extraction Method for Face Recognition (YJZ, JYY, JY, XW, DY), pp. 469–472.
ICPRICPR-v4-2006-ChaiWJZ #novel #recognition
A Novel Human Gait Recognition Method by Segmenting and Extracting the Region Variance Feature (YC, QW, JJ, RZ), pp. 425–428.
ICPRICPR-v4-2006-DuB #image #segmentation
A New Hierarchical Image Segmentation Method (XD, TDB), pp. 108–112.
ICPRICPR-v4-2006-GurevichKMSV #analysis #automation
Technology for Automated Morphologic Analysis of Cytological Slides. Methods and Results (IBG, DK, DM, OS, IV), pp. 711–714.
ICPRICPR-v4-2006-HeCTW
Key Techniques and Methods for Imaging Iris in Focus (YH, JC, TT, YW), pp. 557–561.
ICPRICPR-v4-2006-KwonYKL #clustering #using
Fingerprint Matching Method Using Minutiae Clustering and Warping (DK, IDY, DHK, SUL), pp. 525–528.
ICPRICPR-v4-2006-LienY #performance #predict #using
A Fast Mode Decision Method for H.264/AVC Using the Spatial-Temporal Prediction Scheme (CCL, CPY), pp. 334–337.
ICPRICPR-v4-2006-LiuH #automation #predict #segmentation #speech
A Bayesian Predictive Method for Automatic Speech Segmentation (ML, TSH), pp. 290–293.
ICPRICPR-v4-2006-PozdnoukhovB06a #graph #invariant #kernel #pattern matching #pattern recognition #recognition
Graph-based transformation manifolds for invariant pattern recognition with kernel methods (AP, SB), p. 956.
ICPRICPR-v4-2006-ProencaA #identification #image #normalisation
A Method for the Identification of Noisy Regions in Normalized Iris Images (HP, LAA), pp. 405–408.
ICPRICPR-v4-2006-SekoSHMK #image #lens #quote #scalability
“Firefly capturing method”: Motion capturing by monocular camera with large spherical aberration of lens and Hough-transform-based image processing (YS, YS, HH, JM, HK), pp. 821–824.
ICPRICPR-v4-2006-TeshimaSOYI #estimation #image
Vehicle Lateral Position Estimation Method Based on Matching of Top-View Images (TT, HS, SO, KY, TI), pp. 626–629.
ICPRICPR-v4-2006-VandeportaeleCMG #linear
A New Linear Calibration Method for Paracatadioptric Cameras (BV, MC, PM, PG), pp. 647–651.
ICPRICPR-v4-2006-WuQ #geometry #identification #using
A Hierarchical Palmprint Identification Method Using Hand Geometry and Grayscale Distribution Features (JW, ZQ), pp. 409–412.
ICPRICPR-v4-2006-ZhangZX #segmentation
A Two-level Method for Unsupervised Speaker-based Audio Segmentation (SZ, SZ, BX), pp. 298–301.
KDDKDD-2006-IwataSY #recommendation
Recommendation method for extending subscription periods (TI, KS, TY), pp. 574–579.
SEKESEKE-2006-BaileyS #empirical #modelling #tool support
Applying Models of Technology Adoption to Software Tools and Methods: An Empirical Study (SAB, SES), pp. 200–205.
SEKESEKE-2006-HuangC06a #nondeterminism #rule-based
A New Method of Value-Adding Treatment Inference for Rule-based Uncertainty Knowledge (CJH, MYC), pp. 51–56.
SEKESEKE-2006-HuangH #modelling #object-oriented
A Method for Modeling Object-Oriented Systems with PZ nets (YH, XH), pp. 456–462.
SEKESEKE-2006-ZengA #classification #multi #representation
Classification by Multi-Perspective Representation Method (JZ, RA), pp. 85–90.
SIGIRSIGIR-2006-AslamPY #evaluation #statistics #using
A statistical method for system evaluation using incomplete judgments (JAA, VP, EY), pp. 541–548.
SIGIRSIGIR-2006-DiaoS #summary #web
A new web page summarization method (QD, JS), pp. 639–640.
SIGIRSIGIR-2006-NaguraSKA #documentation #rating #web
A method of rating the credibility of news documents on the web (RN, YS, NK, MA), pp. 683–684.
OOPSLAOOPSLA-2006-CavazosO #compilation #using
Method-specific dynamic compilation using logistic regression (JC, MFPO), pp. 229–240.
GPCEGPCE-2006-LeavensABBCFHJMJSSS #roadmap #verification
Roadmap for enhanced languages and methods to aid verification (GTL, JRA, DSB, MJB, AC, KF, ECRH, CBJ, DM, SLPJ, MS, DRS, AS), pp. 221–236.
SACSAC-2006-Beugnard #assembly #component #empirical #encapsulation
Method overloading and overriding cause encapsulation flaw: an experiment on assembly of heterogeneous components (AB), pp. 1424–1428.
SACSAC-2006-CavalinBBSO #recognition #string
An implicit segmentation-based method for recognition of handwritten strings of characters (PRC, AdSBJ, FB, RS, LESdO), pp. 836–840.
SACSAC-2006-ChenJH #detection #fault #generative #multi #sequence #testing
A new method of generating synchronizable test sequences that detect output-shifting faults based on multiple UIO sequences (KC, FJ, CdH), pp. 1791–1797.
SACSAC-2006-ChenPSW
An integrated computational proteomics method to extract protein targets for Fanconi Anemia studies (JYC, SLP, CS, MW), pp. 173–179.
SACSAC-2006-KramerMH #case study #elicitation #mobile #using
Field study on methods for elicitation of preferences using a mobile digital assistant for a dynamic tour guide (RK, MM, KtH), pp. 997–1001.
SACSAC-2006-LangstonPSSV #data analysis
Innovative computational methods for transcriptomic data analysis (MAL, ADP, AMS, JAS, BHV), pp. 190–194.
SACSAC-2006-PetrakisKVM #feedback #image #retrieval #web
Relevance feedback methods for logo and trademark image retrieval on the web (EGMP, KK, EV, EEM), pp. 1084–1088.
SACSAC-2006-ReeveHB #named #summary
BioChain: lexical chaining methods for biomedical text summarization (LHR, HH, ADB), pp. 180–184.
SACSAC-2006-SchmidtT #design #development #guidelines #ubiquitous
Methods and guidelines for the design and development of domestic ubiquitous computing applications (AS, LT), pp. 1928–1929.
SACSAC-2006-WinterS #design #modelling #perspective
Reference modeling and method construction: a design science perspective (RW, JS), pp. 1561–1562.
ICSEICSE-2006-Abrial #formal method #industrial #problem
Formal methods in industry: achievements, problems, future (JRA), pp. 761–768.
ICSEICSE-2006-HazzanD #development #education #framework
Teaching framework for software development methods (OH, YD), pp. 703–706.
ICSEICSE-2006-LiHSL #programming #release planning
A risk-driven method for eXtreme programming release planning (ML, MH, FS, JL), pp. 423–430.
ICSEICSE-2006-MaurerM #agile #industrial #towards
Agile methods: moving towards the mainstream of the software industry (FM, GM), pp. 1057–1058.
SPLCSPL-BOOK-2006-Immonen #architecture #predict #reliability
A Method for Predicting Reliability and Availability at the Architecture Level (AI), pp. 373–422.
SPLCSPL-BOOK-2006-ReuysRKP #product line #testing
The ScenTED Method for Testing Software Product Lines (AR, SR, EK, KP), pp. 479–520.
SPLCSPL-BOOK-2006-RommesA #architecture #product line
A Scenario-Based Method for Software Product Line Architecting (ER, PA), pp. 3–52.
SPLCSPLC-2006-Krueger #development #product line
New Methods in Software Product Line Development (CWK), pp. 95–102.
SPLCSPLC-2006-Krueger06a #generative #named #product line #tutorial
Tutorial: New Methods Behind the New Generation of Software Product Line Success Stories (CWK), p. 216.
HPCAHPCA-2006-VenkatesanHR #agile
Retention-aware placement in DRAM (RAPID): software methods for quasi-non-volatile DRAM (RKV, SH, ER), pp. 155–165.
HPDCHPDC-2006-DjerrahCCR #bound #framework #optimisation #problem
Bob++: Framework for Solving Optimization Problems with Branch-and-Bound methods (AD, BLC, VDC, CR), pp. 369–370.
CAVCAV-2006-Harel #aspect-oriented #game studies #source code #verification
Playing with Verification, Planning and Aspects: Unusual Methods for Running Scenario-Based Programs (DH), pp. 3–4.
CAVCAV-2006-SenV #model checking #parallel #source code #thread
Model Checking Multithreaded Programs with Asynchronous Atomic Methods (KS, MV), pp. 300–314.
IJCARIJCAR-2006-BaumgartnerS #bottom-up #generative
Blocking and Other Enhancements for Bottom-Up Model Generation Methods (PB, RAS), pp. 125–139.
IJCARIJCAR-2006-ChaudhuriPP #logic
A Logical Characterization of Forward and Backward Chaining in the Inverse Method (KC, FP, GP), pp. 97–111.
LICSLICS-2006-Bryant #infinity #using #verification
Formal Verification of Infinite State Systems Using Boolean Methods (REB), pp. 3–4.
MBTMBT-2006-BraspenningMR #development #integration #modelling #testing
A Model-based Integration and Testing Method to Reduce System Development Effort (NCWMB, JMvdMF, JER), pp. 13–28.
MBTMBT-2006-ConradK #classification #embedded
An Extension of the Classification-Tree Method for Embedded Systems for the Description of Events (MC, AK), pp. 3–11.
RTARTA-2006-Bryant #infinity #using #verification
Formal Verification of Infinite State Systems Using Boolean Methods (REB), pp. 1–3.
ICSTSAT-2006-HsuM #satisfiability
Characterizing Propagation Methods for Boolean Satisfiability (EIH, SAM), pp. 325–338.
ICSTSAT-2006-HyvarinenJN #satisfiability
A Distribution Method for Solving SAT in Grids (AEJH, TAJ, IN), pp. 430–435.
VMCAIVMCAI-2006-JaffarSV #abstraction #composition
A CLP Method for Compositional and Intermittent Predicate Abstraction (JJ, AES, RV), pp. 17–32.
VMCAIVMCAI-2006-Mine #abstract domain #precise
Symbolic Methods to Enhance the Precision of Numerical Abstract Domains (AM), pp. 348–363.
WICSAWICSA-2005-SagarduiAE #architecture #experience
The ADOV Method: an Experience in Selecting the Relevant Views of an Architecture in a SME (GSM, GA, LE), pp. 259–260.
WICSAWICSA-2005-WangSM #analysis #architecture #named
ACCA: An Architecture-Centric Concern Analysis Method (ZW, KS, NHM), pp. 99–108.
DACDAC-2005-PengL #named #performance #power management #using
Freeze: engineering a fast repeater insertion solver for power minimization using the ellipsoid method (YP, XL), pp. 813–818.
DACDAC-2005-Rossi #design #formal method #question #scalability #verification
Can we really do without the support of formal methods in the verification of large designs? (UR), pp. 672–673.
DACDAC-2005-SuWKLK #analysis #effectiveness #embedded #functional #performance
A noise-driven effective capacitance method with fast embedded noise rule calculation for functional noise analysis (HS, DW, CVK, FL, BK), pp. 186–189.
DACDAC-2005-TiwaryR #megamodelling #on-demand #scalability
Scalable trajectory methods for on-demand analog macromodel extraction (SKT, RAR), pp. 403–408.
DACDAC-2005-XuGFM
A green function-based parasitic extraction method for inhomogeneous substrate layers (CX, RG, TSF, KM), pp. 141–146.
DATEDATE-2005-AsadiT #estimation #probability
An Accurate SER Estimation Method Based on Propagation Probability (GA, MBT), pp. 306–307.
DATEDATE-2005-DykaL #encryption #hardware #implementation #performance
Area Efficient Hardware Implementation of Elliptic Curve Cryptography by Iteratively Applying Karatsuba’s Method (ZD, PL), pp. 70–75.
DATEDATE-2005-KumarLTW #multi #probability #process #statistics
A Probabilistic Collocation Method Based Statistical Gate Delay Model Considering Process Variations and Multiple Input Switching (YSK, JL, CT, JMW), pp. 770–775.
DATEDATE-2005-LiauS
Computational Intelligence Characterization Method of Semiconductor Device (EL, DSL), pp. 456–461.
DATEDATE-2005-LiS #performance #simulation
An Efficiently Preconditioned GMRES Method for Fast Parasitic-Sensitive Deep-Submicron VLSI Circuit Simulation (ZL, CJRS), pp. 752–757.
DATEDATE-2005-Takeuchi #debugging #lightweight #monitoring #using #virtual machine
OS Debugging Method Using a Lightweight Virtual Machine Monitor (TT), pp. 1058–1059.
DATEDATE-2005-TiriV #constant #design #difference #logic #power management
Design Method for Constant Power Consumption of Differential Logic Circuits (KT, IV), pp. 628–633.
DocEngDocEng-2005-SimskeLA #classification #image #statistics
A statistical method for binary classification of images (SJS, DL, JSA), pp. 127–129.
DRRDRR-2005-WangDJH #recognition #statistics
New statistical method for machine-printed Arabic character recognition (HW, XD, JJ, MH), pp. 127–135.
ICDARICDAR-2005-Aradhye
A Generic Method for Determining the Up/Down Orientation of Text in Roman and Non-roman Scripts (HBA), pp. 187–191.
ICDARICDAR-2005-BulacuS #clustering #comparison #identification #verification
A Comparison of Clustering Methods for Writer Identification and Verification (MB, LS), pp. 1275–1279.
ICDARICDAR-2005-EzakiKMBS #detection
Improved Text-Detection Methods for a Camera-based Text Reading System for Blind Persons (NE, KK, BTM, MB, LS), pp. 257–261.
ICDARICDAR-2005-FarooqGP #documentation #preprocessor
Pre-processing Methods for Handwritten Arabic Documents (FF, VG, MPP), pp. 267–271.
ICDARICDAR-2005-FinkP #feature model #independence #on the #recognition
On Appearance-Based Feature Extraction Methods for Writer-Independent Handwritten Text Recognition (GAF, TP), pp. 1070–1074.
ICDARICDAR-2005-HeDDK #comparison #documentation
A Comparison of Binarization Methods for Historical Archive Documents (JH, QDMD, ACD, JHK), pp. 538–542.
ICDARICDAR-2005-HeTFDY #identification #novel
A Novel Method for Off-line Handwriting-based Writer Identification (ZH, YYT, BF, JD, XY), pp. 242–246.
ICDARICDAR-2005-KangG #ranking #recognition
A New Feature Ranking Method in a HMM-Based Handwriting Recognition System (SK, VG), pp. 779–783.
ICDARICDAR-2005-KboubiCA #evaluation #recognition
Table Recognition Evaluation and Combination Methods (FK, AHC, MBA), pp. 1237–1241.
ICDARICDAR-2005-LeeI #performance #recognition #word
A Simple and Efficient Method for Global Handwritten Word Recognition Applied to Brazilian Bankchecks (LLL, SI), pp. 950–955.
ICDARICDAR-2005-LiSC #analysis #matrix #multi
A Threshlod Selection Method Based on Multiscale and Graylevel Co-occurrence Matrix Analysis (YL, CYS, MC), pp. 575–579.
ICDARICDAR-2005-LiuLCL #performance #recognition
Fast Vector Matching Methods and Their Applications to Handwriting Recognition (YHL, WHL, FC, CCL), pp. 871–877.
ICDARICDAR-2005-MandalCDC #automation #identification #segmentation
A Hierarchical Method for Automated Identification and Segmentation of Forms (SM, SPC, AKD, BC), pp. 705–709.
ICDARICDAR-2005-NomuraYOK #effectiveness #image #recognition
A Proposal of the Effective Recognition Method for Low-Resolution Characters from Motion Images (MN, KY, HO, KK), pp. 720–724.
ICDARICDAR-2005-PervouchineLM
Three-stage Handwriting Stroke Extraction Method with Hidden Loop Recovery (VP, GL, KM), pp. 307–311.
ICDARICDAR-2005-RaghavendraNSRS #learning #online #prototype #recognition
Prototype Learning Methods for Online Handwriting Recognition (BSR, CKN, GS, AGR, MS), pp. 287–291.
ICDARICDAR-2005-ShimaOY
A Form Dropout Method based on Line-elimination and Image-subtraction (YS, HO, MY), pp. 126–130.
ICDARICDAR-2005-TerasawaNK #documentation #image #retrieval
Eigenspace Method for Text Retrieval in Historical Document Images (KT, TN, TK), pp. 437–441.
ICDARICDAR-2005-TerashimaSKW #3d #representation
Method for Representing 3-D Virtual Origami (TT, HS, JK, TW), pp. 1211–1215.
ICDARICDAR-2005-YangYS
A New Method of Recognizing Chinese Fonts (ZY, LY, CYS), pp. 962–966.
PODSPODS-2005-Dobra #approximate #question
Histograms revisited: when are histograms the best approximation method for aggregates over joins? (AD), pp. 228–237.
PODSPODS-2005-Gehrke #analysis #modelling #privacy #tutorial
Models and methods for privacy-preserving data publishing and analysis: invited tutorial (JG), p. 316.
SIGMODSIGMOD-2005-PapadiasMH #clustering #concept #monitoring #nearest neighbour #performance
Conceptual Partitioning: An Efficient Method for Continuous Nearest Neighbor Monitoring (KM, MH, DP), pp. 634–645.
VLDBVLDB-2005-BartaCM #data access #multi #query #summary #xml
Benefits of Path Summaries in an XML Query Optimizer Supporting Multiple Access Methods (AB, MPC, AOM), pp. 133–144.
VLDBVLDB-2005-IoannidisK #information retrieval #modelling #personalisation #perspective
Personalized Systems: Models and Methods from an IR and DB Perspective (YEI, GK), p. 1365.
CSEETCSEET-2005-Cowling #approach #diagrams #formal method
Translating Diagrams: A New Approach to Introducing Formal Methods (AJC), pp. 121–128.
ITiCSEITiCSE-2005-Deibel #interactive
Team formation methods for increasing interaction during in-class group work (KD), pp. 291–295.
WRLAWRLA-2004-JohnsenOA05 #concurrent #runtime
A Run-Time Environment for Concurrent Objects With Asynchronous Method Calls (EBJ, OO, EWA), pp. 375–392.
ICSMEICSM-2005-LuoZS #clustering #composition #identification #object-oriented
A Hierarchical Decomposition Method for Object-Oriented Systems Based on Identifying Omnipresent Clusters (JL, LZ, JS), pp. 647–650.
ICSMEICSM-2005-SalahDMSV #named #reverse engineering #sequence
Scenariographer: A Tool for Reverse Engineering Class Usage Scenarios from Method Invocation Sequences (MS, TD, SM, AS, FIV), pp. 155–164.
IWPCIWPC-2005-Storey #comprehension #past present future #tool support
Theories, Methods and Tools in Program Comprehension: Past, Present and Future (MADS), pp. 181–191.
MSRMSR-2005-RoblesG #developer #identification
Developer identification methods for integrated data from various sources (GR, JMGB), pp. 66–70.
PASTEPASTE-2005-Hamlet #formal method #invariant #testing
Invariants and state in testing and formal methods (DH), pp. 48–51.
WCREWCRE-2005-ChristlKS #automation #clustering
Equipping the Reflexion Method with Automated Clustering (AC, RK, MADS), pp. 89–98.
ICALPICALP-2005-SpalekS #quantum
All Quantum Adversary Methods Are Equivalent (RS, MS), pp. 1299–1311.
FMFM-2005-Broadfoot #cost analysis #formal method #industrial
ASD Case Notes: Costs and Benefits of Applying Formal Methods to Industrial Control Software (GHB), pp. 548–551.
FMFM-2005-Gaudel #approximate #correctness #formal method #testing
Formal Methods and Testing: Hypotheses, and Correctness Approximations (MCG), pp. 2–8.
FMFM-2005-Johnson #debugging #formal method #using
The Natural History of Bugs: Using Formal Methods to Analyse Software Related Failures in Space Missions (CWJ), pp. 9–25.
IFMIFM-2005-BodeveixFLM #domain-specific language #formal method
Formal Methods Meet Domain Specific Languages (JPB, MF, JLL, GM), pp. 187–206.
IFMIFM-2005-Lang #composition #flexibility #on the fly #partial order #verification
Exp.Open 2.0: A Flexible Tool Integrating Partial Order, Compositional, and On-The-Fly Verification Methods (FL), pp. 70–88.
IFMIFM-2005-PaigeB #agile #formal method
Agile Formal Method Engineering (RFP, PJB), pp. 109–128.
IFMIFM-2005-Parnas #documentation #product line
A Family of Mathematical Methods for Professional Software Documentation (DLP), pp. 1–4.
SEFMSEFM-2005-DorofeevaYEC #evaluation #testing
Experimental Evaluation of FSM-Based Testing Methods (RD, NY, KEF, ARC), pp. 23–32.
SEFMSEFM-2005-Hall #formal method
Making Formal Methods Work (AH), pp. 261–262.
SFMSFM-2005-AcquavivaABBBL #formal method #impact analysis #power management #predict
A Methodology Based on Formal Methods for Predicting the Impact of Dynamic Power Management (AA, AA, MB, AB, EB, EL), pp. 155–189.
CHICHI-2005-MankoffFT #case study #comparative #web
Is your web page accessible?: a comparative study of methods for assessing web page accessibility for the blind (JM, HF, TT), pp. 41–50.
CHICHI-2005-SauroK #metric #standard #usability
A method to standardize usability metrics into a single score (JS, EK), pp. 401–409.
VISSOFTVISSOFT-2005-DucasseLR #comprehension #multi #using
Multi-level Method Understanding Using Microprints (SD, ML, RR), pp. 33–38.
AdaSIGAda-2005-Davis #formal method #re-engineering
The affordable application of formal methods to software engineering (JFD), pp. 57–62.
CAiSECAiSE-2005-NetoRP #automation #information management #testing
A Method for Information Systems Testing Automation (PdAdSN, RFR, CIPdSeP), pp. 504–518.
EDOCEDOC-2005-Molina-JimenezSW #contract #interactive #specification
A Method for Specifying Contract Mediated Interactions (CMJ, SKS, JPW), pp. 106–118.
ICEISICEIS-v3-2005-KloseKB #integration #modelling #process #specification
Process Modelling for Service Processes — Modelling Methods Extensions for Specifying and Analysing Customer Integration (KK, RK, JB), pp. 260–265.
ICEISICEIS-v3-2005-TanL #enterprise #framework #modelling #problem #simulation #using
Enterprise Infrastructure Planning — Modelling and Simulation Using the Problem Articulation Method (ST, KL), pp. 240–245.
ICEISICEIS-v3-2005-YangLZ #analysis #performance #process
A Theoretical Performance Analysis Method for Business Process Model (LY, YL, XZ), pp. 73–80.
ICEISICEIS-v4-2005-OnoMK #evaluation #online
Evaluation of Methods for Converting Request for Quotation Data into Ordinal Preference Data: Estimating Product Preference in Online Shopping System (TO, HM, NK), pp. 24–31.
CIKMCIKM-2005-ArvolaJK #information retrieval #xml
Generalized contextualization method for XML information retrieval (PA, MJ, JK), pp. 20–27.
CIKMCIKM-2005-ZhuYL #distributed #rank
Distributed PageRank computation based on iterative aggregation-disaggregation methods (YZ, SY, XL), pp. 578–585.
ECIRECIR-2005-CamposFH #diagrams #documentation #evaluation #retrieval #strict
Improving the Context-Based Influence Diagram Model for Structured Document Retrieval: Removing Topological Restrictions and Adding New Evaluation Methods (LMdC, JMFL, JFH), pp. 215–229.
ECIRECIR-2005-ChenDWLZ #feature model
AP-Based Borda Voting Method for Feature Extraction in TRECVID-2004 (LC, DD, DW, FL, BZ), pp. 568–570.
ECIRECIR-2005-SkopalM #data access #metric #performance
Modified LSI Model for Efficient Search by Metric Access Methods (TS, PM), pp. 245–259.
ICMLICML-2005-BachJ #composition #kernel #predict #rank
Predictive low-rank decomposition for kernel methods (FRB, MIJ), pp. 33–40.
ICMLICML-2005-DaumeM #approximate #learning #optimisation #predict #scalability
Learning as search optimization: approximate large margin methods for structured prediction (HDI, DM), pp. 169–176.
ICMLICML-2005-HillD #adaptation #classification #problem
Adapting two-class support vector classification methods to many class problems (SIH, AD), pp. 313–320.
ICMLICML-2005-IlghamiMNA #approximate #learning
Learning approximate preconditions for methods in hierarchical plans (OI, HMA, DSN, DWA), pp. 337–344.
ICMLICML-2005-Joachims #metric #multi #performance
A support vector method for multivariate performance measures (TJ), pp. 377–384.
ICMLICML-2005-MannorPR #classification
The cross entropy method for classification (SM, DP, RYR), pp. 561–568.
ICMLICML-2005-NguyenH #performance
An efficient method for simplifying support vector machines (DN, TBH), pp. 617–624.
ICMLICML-2005-ShaS #analysis #reduction
Analysis and extension of spectral methods for nonlinear dimensionality reduction (FS, LKS), pp. 784–791.
ICMLICML-2005-ZhuL #graph #induction #learning #modelling #scalability
Harmonic mixtures: combining mixture models and graph-based methods for inductive and scalable semi-supervised learning (XZ, JDL), pp. 1052–1059.
LSOLSO-2005-BjornsonS #framework #process
Harvesting Knowledge through a Method Framework in an Electronic Process Guide (FOB, TS), pp. 107–111.
LSOLSO-2005-DingsoyrB #using
Using Open Space Technology as a Method to Share Domain Knowledge (TD, FOB), pp. 102–106.
MLDMMLDM-2005-Boulle #category theory #scalability
A Grouping Method for Categorical Attributes Having Very Large Number of Values (MB), pp. 228–242.
MLDMMLDM-2005-GhoshGYB #algorithm #analysis #comparative #network #search-based
Comparative Analysis of Genetic Algorithm, Simulated Annealing and Cutting Angle Method for Artificial Neural Networks (RG, MG, JY, AMB), pp. 62–70.
MLDMMLDM-2005-HalveyKS #clustering #internet #navigation #predict #using
Birds of a Feather Surf Together: Using Clustering Methods to Improve Navigation Prediction from Internet Log Files (MH, MTK, BS), pp. 174–183.
MLDMMLDM-2005-LegrandN #feature model #using
Feature Selection Method Using Preferences Aggregation (GL, NN), pp. 203–217.
MLDMMLDM-2005-TakigawaKN #classification #combinator #product line #set #subclass
The Convex Subclass Method: Combinatorial Classifier Based on a Family of Convex Sets (IT, MK, AN), pp. 90–99.
SEKESEKE-2005-BabarNJ #architecture #bibliography #framework #using
Assessing a Framework of Comparing Architecture Review Methods Using CMMI (MAB, MN, DRJ), pp. 400–403.
SEKESEKE-2005-BeydounGLH #metamodelling #multi #towards #validation
Towards Method Engineering for Multi-Agent Systems: A preliminary validation of a Generic MAS Metamodel (GB, CGP, GL, BHS), pp. 51–56.
SEKESEKE-2005-HongCC #fuzzy #learning #performance
Learning Efficiency Improvement of Fuzzy CMAC by Aitken Acceleration Method (CMH, CMC, HYC), pp. 556–595.
SIGIRSIGIR-2005-AslamYP #metric #retrieval
The maximum entropy method for analyzing retrieval measures (JAA, EY, VP), pp. 27–34.
SIGIRSIGIR-2005-HawkingT #hybrid
Server selection methods in hybrid portal search (DH, PT), pp. 75–82.
SIGIRSIGIR-2005-LiY #analysis #recursion
Analysis of recursive feature elimination methods (FL, YY), pp. 633–634.
SIGIRSIGIR-2005-SekiM #categorisation #ontology
An application of text categorization methods to gene ontology annotation (KS, JM), pp. 138–145.
SIGIRSIGIR-2005-YangYZK #adaptation #benchmark #evaluation #robust
Robustness of adaptive filtering methods in a cross-benchmark evaluation (YY, SY, JZ, BK), pp. 98–105.
SIGIRSIGIR-2005-ZhuJXG #classification #multi #using
Multi-labelled classification using maximum entropy method (SZ, XJ, WX, YG), pp. 274–281.
PPDPPPDP-2005-Mitchell #analysis #logic #network #protocol #security
Security analysis of network protocols: logical and computational methods (JCM), pp. 151–152.
RERE-2005-DorrKKOS #case study #industrial #non-functional #requirements
Non-Functional Requirements in Industry — Three Case Studies Adopting an Experience-based NFR Method (JD, DK, TK, TO, TS), pp. 373–384.
SACSAC-2005-BraunWHW #approach
Method construction — a core approach to organizational engineering (CB, FW, MH, RW), pp. 1295–1299.
SACSAC-2005-ChenCG #biology #database #query
A complex biological database querying method (JYC, JVC, NG), pp. 110–114.
SACSAC-2005-ChinoVTT #comprehension #data access #metric #named #visual notation
MAMView: a visual tool for exploring and understanding metric access methods (FJTC, MRV, AJMT, CTJ), pp. 1218–1223.
SACSAC-2005-DuanHW #detection #network
Enhancing network intrusion detection systems with interval methods (QD, CH, HCW), pp. 1444–1448.
SACSAC-2005-FradkinK #classification #learning
Methods for learning classifier combinations: no clear winner (DF, PBK), pp. 1038–1043.
SACSAC-2005-JangSSH #comparison #identification
A comparison on information fusion methods for air target identification (DJ, SYS, CYS, CCH), pp. 45–46.
SACSAC-2005-JayadevaprakashMP #generative #graph #transitive #using
Generating association graphs of non-cooccurring text objects using transitive methods (NJ, SM, MJP), pp. 141–145.
SACSAC-2005-KaminaT #composition #mixin
Selective method combination in mixin-based composition (TK, TT), pp. 1269–1273.
SACSAC-2005-LimZLR #graph #heuristic #problem
Heuristic methods for graph coloring problems (AL, YZ, QL, BR), pp. 933–939.
SACSAC-2005-TebriBC #incremental #learning
Incremental profile learning based on a reinforcement method (HT, MB, CC), pp. 1096–1101.
SACSAC-OOPS-J-2005-KaminaT #flexibility #mixin #type system
Flexible Method Combination based on Mixin Subtyping (TK, TT), pp. 95–115.
ICSEICSE-2005-BryceCC #framework #interactive #testing
A framework of greedy methods for constructing interaction test suites (RCB, CJC, MBC), pp. 146–155.
ICSEICSE-2005-Jurjens #effectiveness #modelling #security #tool support #uml
Sound methods and effective tools for model-based security engineering with UML (JJ), pp. 322–331.
ICSEICSE-2005-MaurerM #agile #what
What you always wanted to know about agile methods but did not dare to ask (FM, GM), pp. 731–732.
ICSEICSE-2005-MelnikM #agile #student
A cross-program investigation of students’ perceptions of agile methods (GM, FM), pp. 481–488.
ICSEICSE-2005-MenziesPCHS #modelling #validation
Validation methods for calibrating software effort models (TM, DP, ZC, JH, SS), pp. 587–595.
CCCC-2005-QianH #analysis #case study #jit
A Study of Type Analysis for Speculative Method Inlining in a JIT Environment (FQ, LJH), pp. 255–270.
SOSPSOSP-2005-QinTSZ #debugging #named
Rx: treating bugs as allergies — a safe method to survive software failures (FQ, JT, JS, YZ), pp. 235–248.
AMOSTAMOST-2005-SchillingMDSFF #design #testing #user interface
An integrated method for designing user interfaces based on tests (AS, KM, PD, KSS, EF, VF).
CADECADE-2005-ChaudhuriP #first-order #linear #logic #proving #theorem proving
A Focusing Inverse Method Theorem Prover for First-Order Linear Logic (KC, FP), pp. 69–83.
CADECADE-2005-YorshM #generative
A Combination Method for Generating Interpolants (GY, MM), pp. 353–368.
CAVCAV-2005-BarnerGR #concurrent #debugging #formal method #named #using
Wolf — Bug Hunter for Concurrent Software Using Formal Methods (SB, ZG, IR), pp. 153–157.
CSLCSL-2005-ChaudhuriP #linear #logic
Focusing the Inverse Method for Linear Logic (KC, FP), pp. 200–215.
ICSTSAT-2005-GentR #learning
Local and Global Complete Solution Learning Methods for QBF (IPG, AGDR), pp. 91–106.
ICSTSAT-2005-SheiniS #integer #linear #logic #satisfiability #scalability
A Scalable Method for Solving Satisfiability of Integer Linear Arithmetic Logic (HMS, KAS), pp. 241–256.
TLCATLCA-2005-MatwinFHC #data mining #formal method #mining #privacy #using
Privacy in Data Mining Using Formal Methods (SM, APF, ITH, VC), pp. 278–292.
WICSAWICSA-2004-Tekinerdogan #analysis #architecture #named
ASAAM: Aspectual Software Architecture Analysis Method (BT), pp. 5–14.
ASEASE-2004-HillR #automation
Automatic Method Completion (RH, JR), pp. 228–235.
ASEASE-2004-HopcroftB #csp #development
Combining the Box Structure Development Method and CSP (PJH, GHB), pp. 340–345.
DACDAC-2004-CarballoNYVCN #adaptation #design
Requirement-based design methods for adaptive communications links (JAC, KJN, SMY, IV, CC, VRN), pp. 93–98.
DACDAC-2004-KahngR #concept #feedback
Placement feedback: a concept and method for better min-cut placements (ABK, SR), pp. 357–362.
DACDAC-2004-MeiRCHD #performance #robust
Robust, stable time-domain methods for solving MPDEs of fast/slow systems (TM, JSR, TSC, SAH, DMD), pp. 848–853.
DACDAC-2004-NakamuraHKYY #c #c++ #communication #hardware #performance #using
A fast hardware/software co-verification method for system-on-a-chip by using a C/C++ simulator and FPGA emulator with shared register communication (YN, KH, IK, KY, TY), pp. 299–304.
DACDAC-2004-NookalaS
A method for correcting the functionality of a wire-pipelined circuit (VN, SSS), pp. 570–575.
DACDAC-2004-SasaoM #logic #multi
A method to decompose multiple-output logic functions (TS, MM), pp. 428–433.
DATEDATE-v1-2004-FernandesSOT #probability #testing
A Probabilistic Method for the Computation of Testability of RTL Constructs (JMF, MBS, ALO, JPT), pp. 176–181.
DATEDATE-v1-2004-VazquezLHRH #parametricity #self
A Method for Parameter Extraction of Analog Sine-Wave Signals for Mixed-Signal Built-In-Self-Test Applications (DV, GL, GH, AR, JLH), pp. 298–305.
DATEDATE-v2-2004-ZhouZLLZC #analysis #using
Steady-State Analysis of Nonlinear Circuits Using Discrete Singular Convolution Method (XZ, DZ, JL, RL, XZ, CC), pp. 1322–1326.
DRRDRR-2004-WangD #segmentation
Comprehensive printed Tibetan/English mixed text segmentation method (HW, XD), pp. 136–146.
DRRDRR-2004-WangD04a #multi #statistics
New statistical method for multifont printed Tibetan/English OCR (HW, XD), pp. 155–165.
VLDBVLDB-2004-ChengXPSV #nondeterminism #performance #probability #query
Efficient Indexing Methods for Probabilistic Threshold Queries over Uncertain Data (RC, YX, SP, RS, JSV), pp. 876–887.
VLDBVLDB-2004-XiaLOH #named #performance
Gorder: An Efficient Method for KNN Join Processing (CX, HL, BCO, JH), pp. 756–767.
CSEETCSEET-2004-Nikula #case study #experience #requirements
Experiences of Embedding Training in a Basic Requirements Engineering Method (UN), pp. 104–109.
ITiCSEITiCSE-2004-Kerren #education #generative #learning
Generation as method for explorative learning in computer science education (AK), pp. 77–81.
ITiCSEITiCSE-WGR-2004-CanningMRR #c #using
Reading types in C using the right left walk method (JC, WM, AR, DR), pp. 52–54.
ITiCSEITiCSE-WGR-2004-Clear #agile #student
Students becoming political and “incorrect” through agile methods (TC), pp. 13–15.
ESOPESOP-2004-GuttmanTCHRS #trust
Trust Management in Strand Spaces: A Rely-Guarantee Method (JDG, FJT, JAC, JCH, JDR, BTS), pp. 325–339.
FASEFASE-2004-GhezziMP #static analysis #type system
Enhancing Remote Method Invocation through Type-Based Static Analysis (CG, VM, GPP), pp. 339–353.
TACASTACAS-2004-MailundW #graph #reachability #using
Obtaining Memory-Efficient Reachability Graph Representations Using the Sweep-Line Method (TM, MW), pp. 177–191.
TACASTACAS-2004-Schmidt #automation #generative
Automated Generation of a Progress Measure for the Sweep-Line Method (KS0), pp. 192–204.
ICSMEICSM-2004-Chapin #agile #evolution
Agile Methods’ Contributions in Software Evolution (NC), p. 522.
ICSMEICSM-2004-Kung #lifecycle #maintenance
Quantitative Method to Determine Software Maintenance Life Cycle (HJK), pp. 232–241.
ICSMEICSM-2004-LuoJZMS #analysis #case study #component #graph #object-oriented
An Experimental Study of Two Graph Analysis Based Component Capture Methods for Object-Oriented Systems (JL, RJ, LZ, HM, JS), pp. 390–398.
ICSMEICSM-2004-Rountev #identification #java #precise
Precise Identification of Side-Effect-Free Methods in Java (AR), pp. 82–91.
DLTDLT-2004-Truthe
A Method for Deciding the Finiteness of Deterministic Tabled Picture Languages (BT), pp. 406–417.
IFMIFM-2004-BallCLR #formal method #verification
SLAM and Static Driver Verifier: Technology Transfer of Formal Methods inside Microsoft (TB, BC, VL, SKR), pp. 1–20.
IFMIFM-2004-Boute #abstraction #formal method
Integrating Formal Methods by Unifying Abstractions (RTB), pp. 441–460.
IFMIFM-2004-MorilloV #compilation
A Method for Compiling and Executing Expressive Assertions (FJGM, JMCV), pp. 521–540.
SEFMSEFM-2004-RouffVHTR #behaviour #formal method #predict
Properties of a Formal Method for Prediction of Emergent Behaviors in Swarm-Based Systems (CR, AV, MGH, WT, JLR), pp. 24–33.
CHICHI-2004-IngmarssonDZ #named
TNT: a numeric keypad based text input method (MI, DD, SZ), pp. 639–646.
AdaEuropeAdaEurope-2004-Gogolla #formal method #problem
Benefits and Problems of Formal Methods (MG), pp. 1–15.
CAiSECAiSE-2004-RalyteRD #towards
Towards a Meta-tool for Change-Centric Method Engineering: A Typology of Generic Operators (JR, CR, RD), pp. 202–218.
CAiSECAiSE-2004-WistrandK #component
Method Components — Rationale Revealed (KW, FK), pp. 189–201.
EDOCEDOC-2004-YoshiokaHF #coordination #performance #security
Security Patterns: A Method for Constructing Secure and Efficient Inter-Company Coordination Systems (NY, SH, AF), pp. 84–97.
ICEISICEIS-v1-2004-Gilb04a
Competitive Engineering: A Totally Metrics-Based System-Development Method (TG), p. XXXI.
ICEISICEIS-v2-2004-Kabiri #approximate #comparison #learning #network
A Comparison Between the Proportional Keen Approximator and the Neural Networks Learning Methods (PK), pp. 159–164.
ICEISICEIS-v2-2004-Martinez-OtzetaS #algorithm #analysis #nearest neighbour #probability
Analysis of the Iterated Probabilistic Weighted K Nearest Neighbor Method, a new Distance-Based Algorithm (JMMO, BS), pp. 233–240.
ICEISICEIS-v2-2004-ZengLV #xml
An XML-Based Bootstrapping Method for Pattern Acquisition (XZ, FL, DZ, AV), pp. 303–308.
ICEISICEIS-v3-2004-LingsL #automation
Method-in-Action and Method-in-Tool: Some Implications for CASE (BL, BL), pp. 623–628.
ICEISICEIS-v3-2004-PicaultBDPT #architecture #information management #specification #standard
Specifying Information System Architectures with DASIBAO — A Standard Based Method (AP, PB, JLD, JP, BT), pp. 254–264.
ICEISICEIS-v5-2004-QuekS #bibliography #comparative #development #information management
A Comparative Survey of Activity-Based Methods for Information Systems Development (AQ, HS), pp. 221–232.
CIKMCIKM-2004-Banaei-KashaniS #data access #named #network #peer-to-peer #product line
SWAM: a family of access methods for similarity-search in peer-to-peer data networks (FBK, CS), pp. 304–313.
CIKMCIKM-2004-ChenGS #rank
Local methods for estimating pagerank values (YYC, QG, TS), pp. 381–389.
CIKMCIKM-2004-RenRPS #detection
A vertical distance-based outlier detection method with local pruning (DR, IR, WP, KS), pp. 279–284.
CIKMCIKM-2004-SiersdorferSW #classification #documentation #parametricity
Goal-oriented methods and meta methods for document classification and their parameter tuning (SS, SS, GW), pp. 59–68.
ICMLICML-2004-BleiJ #process
Variational methods for the Dirichlet process (DMB, MIJ).
ICMLICML-2004-CastilloW #case study #comparative #learning #multi
A comparative study on methods for reducing myopia of hill-climbing search in multirelational learning (LPC, SW).
ICMLICML-2004-NguyenWJ #classification #detection #distributed #kernel #using
Decentralized detection and classification using kernel methods (XN, MJW, MIJ).
ICMLICML-2004-VuralD #multi
A hierarchical method for multi-class support vector machines (VV, JGD).
ICPRICPR-v1-2004-ArcaCL #detection #performance #recognition
An Efficient Method to Detect Facial Fiducial Points for Face Recognition (SA, PC, RL), pp. 532–535.
ICPRICPR-v1-2004-ChenD #recognition
A Universal Method for Single Character Type Recognition (LC, XD), pp. 413–416.
ICPRICPR-v1-2004-GunterB #evaluation #feature model #recognition #word
An Evaluation of Ensemble Methods in Handwritten Word Recognition Based on Feature Selection (SG, HB), pp. 388–392.
ICPRICPR-v1-2004-KannalaB #lens
A Generic Camera Calibration Method for Fish-Eye Lenses (JK, SSB), pp. 10–13.
ICPRICPR-v1-2004-MaedaKI #clustering #data-driven #database #probability #process #segmentation
Segmentation of Range Data Based on A Stochastic Clustering Method with Competitive Process (MM, KK, KI), pp. 624–627.
ICPRICPR-v1-2004-YaoC #performance
An Efficient Image-Based Rendering Method (JY, WkC), pp. 88–91.
ICPRICPR-v2-2004-ChangLC #hybrid #recognition
Applying A Hybrid Method To Handwritten Character Recognition (FC, CCL, CJC), pp. 529–532.
ICPRICPR-v2-2004-HaseSTS #multi #robust
A Robust Method of Recognizing Multi-font Rotated Characters (HH, TS, ST, CYS), pp. 363–366.
ICPRICPR-v2-2004-HongliangC #hybrid #statistics
A hybrid License Plate Extraction Method Based On Edge Statistics and Morphology (HB, CL), pp. 831–834.
ICPRICPR-v2-2004-KaratzasA #image #segmentation #using #web
Text Extraction from Web Images Based on A Split-and-Merge Segmentation Method Using Colour Perception (DK, AA), pp. 634–637.
ICPRICPR-v2-2004-KoKB #image #retrieval
SVM-based Salient Region(s) Extraction Method for Image Retrieval (BK, SYK, HB), pp. 977–980.
ICPRICPR-v2-2004-KubasovaT #image
Lossless Compression Methods for Hyperspectral Images (OK, PJT), pp. 803–806.
ICPRICPR-v2-2004-LiNCS #segmentation
A Segmentation Method for Touching Italic Characters (YL, SN, MC, CYS), pp. 594–597.
ICPRICPR-v2-2004-LiZYH #image #performance #robust #segmentation #sequence
FFT Snake: A Robust and Efficient Method for the Segmentation of Arbitrarily Shaped Objects in Image Sequences (TL, YZ, DY, DH), pp. 116–119.
ICPRICPR-v2-2004-ManoMT #generative
Factorization-Based Planar Mapping Method for Generating Intermediate Views (HM, AM, NT), pp. 891–894.
ICPRICPR-v2-2004-SoiferKK #analysis #fuzzy
Fuzzy Direction Field Method for Fringe and Tree-like Patterns Analysis (VAS, AGK, AOK), pp. 779–782.
ICPRICPR-v2-2004-SukF #generative #graph #invariant
Graph Method for Generating Affine Moment Invariants (TS, JF), pp. 192–195.
ICPRICPR-v2-2004-TamSS #categorisation #documentation
Applying the Conjugate Gradient Method for Text Document Categorization (VT, RS, AS), pp. 558–561.
ICPRICPR-v2-2004-TanakaSO #image #multi #retrieval
Retrieval Method for Multi-category Images (HT, HS, SO), pp. 965–968.
ICPRICPR-v2-2004-TanakaT #image #probability
Probabilistic Image Processing based on the Q-Ising Model by Means of the Mean-Field Method and Loopy Belief Propagation (KT, DMT), pp. 40–43.
ICPRICPR-v2-2004-ToyozumiYMKMST #case study #recognition #segmentation #using
A Study of Symbol Segmentation Method for Handwritten Mathematical Formula Recognition using Mathematical Structure Information (KT, NY, KM, TK, KM, YS, TT), pp. 630–633.
ICPRICPR-v2-2004-WangZKT #distance #image #segmentation #set
Level Set Methods, Distance Function and Image Segmentation (DW, JZ, SCK, ZT), pp. 110–115.
ICPRICPR-v2-2004-WeiXMJS #hybrid
A Hybrid SOM-SVM Method for Analyzing Zebra Fish Gene Expression (WW, LX, XM, PJ, RS), pp. 323–326.
ICPRICPR-v2-2004-ZhangHHL #kernel
Kernel-Based Method for Tracking Objects with Rotation and Translation (HZ, ZH, WH, LL), pp. 728–731.
ICPRICPR-v3-2004-BolleRP #estimation #evaluation #fault
An Evaluation of Error Confidence Interval Estimation Methods (RMB, NKR, SP), pp. 103–106.
ICPRICPR-v3-2004-ChenYC #distance #multi #recognition
Inter-Subspace Distance: A New Method for Face Recognition with Multiple Samples (JHC, SLY, CSC), pp. 140–143.
ICPRICPR-v3-2004-DouretB #3d #monitoring #multi
A Multi-Cameras 3D Volumetric Method for Outdoor Scenes : A Road Traffic Monitoring Application (JD, RB), pp. 334–337.
ICPRICPR-v3-2004-FurukawaKMSMT #3d #approximate #estimation #image #physics #using
Spine Posture Estimation Method from Human Images Using 3D Spine Model — Computation of the rough approximation of the physical forces working on vertebral bodies (DF, TK, KM, YS, KM, TT), pp. 322–325.
ICPRICPR-v3-2004-GanLY #array #estimation #set
Missing Microarray Data Estimation Based on Projection onto Convex Sets Method (XG, AWCL, HY), pp. 782–785.
ICPRICPR-v3-2004-GurevichM #analysis #image
Method for Early Diagnostics of Lymphatic System Tumors on the Basis of the Analysis of Chromatin Constitution in Cell Nucleus Images (IBG, DM), pp. 806–809.
ICPRICPR-v3-2004-HaindlFA #image #modelling
BTF Image Space Utmost Compression and Modelling Method (MH, JF, MA), pp. 194–197.
ICPRICPR-v3-2004-HuangMP #hybrid #markov #random #recognition #using
A Hybrid Face Recognition Method using Markov Random Fields (RH, DNM, VP), pp. 157–160.
ICPRICPR-v3-2004-HuangWTC #recognition #segmentation
A New Iris Segmentation Method for Recognition (JH, YW, TT, JC), pp. 554–557.
ICPRICPR-v3-2004-KashinoKK #clustering #video
A Quick Video Search Method based on Local and Global Feature Clustering (KK, AK, TK), pp. 894–897.
ICPRICPR-v3-2004-KitaSK #modelling
A Deformable Model Driven Method for Handling Clothes (YK, FS, NK), pp. 243–247.
ICPRICPR-v3-2004-KovalevK #quantifier
A New Method for Quantification of Age-Related Brain Changes (VAK, FK), pp. 770–773.
ICPRICPR-v3-2004-LiMH
New Method for Sparse Point-Sets Matching with Underlying Non-Rigidity (BL, QM, HH), pp. 8–11.
ICPRICPR-v3-2004-MatsuiCUM #markov #monte carlo #recognition #using
Bayesian Face Recognition using a Markov Chain Monte Carlo Method (AM, SC, FU, TM), pp. 918–921.
ICPRICPR-v3-2004-SprevakAW #assessment #classification
A Non-Random Data Sampling Method for Classification Model Assessment (DS, FA, HW), pp. 406–409.
ICPRICPR-v3-2004-YanLWW #automation
Automatic Template Matching Method for Tropical Cyclone Eye Fix (KYW, CLY, PWL, WWT), pp. 650–653.
ICPRICPR-v3-2004-YuanTR #performance #robust #scalability #video
Fast and Robust Search Method for Short Video Clips from Large Video Collection (JY, QT, SR), pp. 866–869.
ICPRICPR-v3-2004-YuCS #quality
Vignetting Distortion Correction Method for High Quality Digital Imaging (WY, YC, JS), pp. 666–669.
ICPRICPR-v4-2004-Amano #image
Image Interpolation by High Dimensional Projection based on Subspace Method (TA), pp. 665–668.
ICPRICPR-v4-2004-AnJWZL #performance
An Efficient Rectification Method for Trinocular Stereovision (LA, YJ, JW, XZ, ML), pp. 56–59.
ICPRICPR-v4-2004-CuiWHTS #image #synthesis
An Iris Image Synthesis Method Based on PCA and Super-Resolution (JC, YW, JH, TT, ZS), pp. 471–474.
ICPRICPR-v4-2004-HsiehYCH #analysis
A Shadow Elimination Method for Vehicle Analysis (JWH, SHY, YSC, WFH), pp. 372–375.
ICPRICPR-v4-2004-KamberovK #evaluation #formal method #performance
Conformal Method for Quantitative Shape Extraction: Performance Evaluation (GK, GK), pp. 31–35.
ICPRICPR-v4-2004-KuzmenkoZ #network #self
Structure Relaxation Method for Self-Organizing Neural Networks (AK, NZ), pp. 589–592.
ICPRICPR-v4-2004-LeeNG #automation #detection
Automated Detection of Solar Loops by the Oriented Connectivity Method (JKL, TSN, GAG), pp. 315–318.
ICPRICPR-v4-2004-MurakitaII #markov #monte carlo #using
Human Tracking using Floor Sensors based on the Markov Chain Monte Carlo Method (TM, TI, HI), pp. 917–920.
ICPRICPR-v4-2004-NakamuraFTMYMTI #image #recognition #using
Eigen Nodule: View-Based Recognition of Lung Nodule in Chest X-ray CT Images Using Subspace Method (YN, GF, HT, SM, SY, TM, YT, TI), pp. 681–684.
ICPRICPR-v4-2004-PoonWS
A New Method in Locating and Segmenting Palmprint into Region-of-Interest (CP, DCMW, HCS), pp. 533–536.
ICPRICPR-v4-2004-SamsonB #clustering #learning #parallel #robust #video
Learning Classes for Video Interpretation with a Robust Parallel Clustering Method (VS, PB), pp. 569–572.
ICPRICPR-v4-2004-TongLL #detection #effectiveness #performance
An Effective and Fast Soccer Ball Detection and Tracking Method (XFT, HQL, QSL), pp. 795–798.
ICPRICPR-v4-2004-UekiKIKISKK #classification #gender #image
A Method of Gender Classification by Integrating Facial, Hairstyle, and Clothing Images (KU, HK, SI, KK, NS, JK, TK), pp. 446–449.
ICPRICPR-v4-2004-ZhuRL04a #algorithm #optimisation #robust
A Robust Regularised Restoration Algorithm Based on Topkis-Veinott Optimisation Method (DZ, MR, RAL), pp. 705–708.
KDDKDD-2004-AbeZL #learning #multi
An iterative method for multi-class cost-sensitive learning (NA, BZ, JL), pp. 3–11.
KDDKDD-2004-BiZB #kernel
Column-generation boosting methods for mixture of kernels (JB, TZ, KPB), pp. 521–526.
KDDKDD-2004-CohenS #integration #markov #process
Exploiting dictionaries in named entity extraction: combining semi-Markov extraction processes and data integration methods (WWC, SS), pp. 89–98.
KDDKDD-2004-DengPML #rank
A rank sum test method for informative gene discovery (LD, JP, JM, DLL), pp. 410–419.
KRKR-2004-QiLG #consistency #knowledge base
A Split-Combination Method for Merging Inconsistent Possibilistic Knowledge Bases (GQ, WL, DHG), pp. 348–356.
SEKESEKE-2004-CairoA #architecture #problem #reuse
The KAMET II Architecture for Problem-Solving Method Reuse (OC, JCA), pp. 435–438.
SIGIRSIGIR-2004-HunnisettT #categorisation
Context-based methods for text categorisation (DSH, WJT), pp. 578–579.
SIGIRSIGIR-2004-JinS #case study #collaboration #normalisation
A study of methods for normalizing user ratings in collaborative filtering (RJ, LS), pp. 568–569.
OOPSLAOOPSLA-2004-GeorgesBEB #behaviour #java
Method-level phase behavior in java workloads (AG, DB, LE, KDB), pp. 270–287.
RERE-2004-GordijnKSWA
Developing a Domain-Specific Cross-Organizational RE Method (JG, VK, JS, RW, HA), pp. 134–143.
SACSAC-J-2003-CavarraCD04 #automation #generative #modelling #testing
A method for the automatic generation of test suites from object models (AC, CC, JD), pp. 309–314.
SACSAC-J-2003-YuNPC04 #on the #testing
On the testing methods used by beginning software testers (YTY, SPN, PLP, TYC), pp. 329–335.
SACSAC-2004-BamasakZ #mobile
A secure method for signature delegation to mobile agents (OB, NZ), pp. 813–818.
SACSAC-2004-BeckerAN
Organizational engineering in public administrations: a method for process-oriented egovernment projects (JB, LA, BN), pp. 1385–1389.
SACSAC-2004-Cazzola #named #performance
SmartMethod: an efficient replacement for method (WC), pp. 1305–1309.
SACSAC-2004-ChenC #database #graph #object-oriented
Signature file hierarchies and signature graphs: a new index method for object-oriented databases (YC, YC), pp. 724–728.
SACSAC-2004-JanssensSHV #coordination #design
An agent design method promoting separation between computation and coordination (NJ, ES, TH, PV), pp. 456–461.
SACSAC-2004-JezierskiMW #database #maintenance #object-oriented #prototype #type system
Prototype system for method materialisation and maintenance in object-oriented databases (JJ, MM, RW), pp. 1323–1327.
SACSAC-2004-Kavakli #analysis #modelling
Modeling organizational goals: analysis of current methods (EK), pp. 1339–1343.
SACSAC-2004-PereiraS #architecture #enterprise #framework #using
A method to define an Enterprise Architecture using the Zachman Framework (CMP, PMAS), pp. 1366–1371.
SACSAC-2004-QianZ #automation #clustering #named #performance
GraphZip: a fast and automatic compression method for spatial data clustering (YQ, KZ), pp. 571–575.
SACSAC-2004-Rigaux #rating
An iterative rating method: application to web-based conference management (PR), pp. 1682–1687.
SACSAC-2004-TrutaFB #metric
Disclosure risk measures for the sampling disclosure control method (TMT, FF, DCBJ), pp. 301–306.
SACSAC-2004-WuC #documentation
Shadow document methods of resutls merging (SW, FC), pp. 1067–1072.
ICSEICSE-2004-AkgulMP #assembly #execution #performance #slicing
A Fast Assembly Level Reverse Execution Method via Dynamic Slicing (TA, VJMI, SP), pp. 522–531.
ICSEICSE-2004-BoehmT #agile
Balancing Agility and Discipline: Evaluating and Integrating Agile and Plan-Driven Methods (BWB, RT), pp. 718–719.
ICSEICSE-2004-Matinlassi #architecture #comparison #design #performance #product line
Comparison of Software Product Line Architecture Design Methods: COPA, FAST, FORM, KobrA and QADA (MM), pp. 127–136.
LDTALDTA-2004-GoldreiS #attribute grammar #formal method #off the shelf #using #verification
Using Off-the-Shelf Formal Methods to Verify Attribute Grammar Properties (SG, AMS), pp. 33–54.
ASPLOSASPLOS-2004-WuJMC #multi #online
Formal online methods for voltage/frequency control in multiple clock domain microprocessors (QW, PJ, MM, DWC), pp. 248–259.
CAVCAV-2004-Hunt #verification
Mechanical Mathematical Methods for Microprocessor Verification (WAHJ), pp. 523–533.
CSLCSL-2004-MetcalfeOG #logic
Goal-Directed Methods for Lukasiewicz Logic (GM, NO, DMG), pp. 85–99.
ICLPICLP-2004-CumboFGL #datalog #source code
Enhancing the Magic-Set Method for Disjunctive Datalog Programs (CC, WF, GG, NL), pp. 371–385.
IJCARIJCAR-2004-Bonichon #deduction #named
TaMeD: A Tableau Method for Deduction Modulo (RB), pp. 445–459.
IJCARIJCAR-2004-Weispfenning #constraints
Solving Constraints by Elimination Methods (VW), pp. 336–341.
LICSLICS-2004-Abramsky #quantum
High-Level Methods for Quantum Computation and Information (SA), pp. 410–414.
ICTSSTestCom-2004-El-FakihTSY #automaton #multi #testing
FSM Based Interoperability Testing Methods for Multi Stimuli Model (KEF, VT, NS, NY), pp. 60–75.
VMCAIVMCAI-2004-PodelskiR #linear #ranking #synthesis
A Complete Method for the Synthesis of Linear Ranking Functions (AP, AR), pp. 239–251.
DACDAC-2003-LiYRP #generative #markov #using
A scan BIST generation method using a markov source and partial bit-fixing (WL, CY, SMR, IP), pp. 554–559.
DACDAC-2003-PimentelE #communication #refinement
An IDF-based trace transformation method for communication refinement (ADP, CE), pp. 402–407.
DATEDATE-2003-HondaT #design #evaluation
Evaluation of Applying SpecC to the Integrated Design Method of Device Driver and Device (SH, HT), pp. 20138–20143.
DATEDATE-2003-JersakREBJW #formal method #integration
Formal Methods for Integration of Automotive Software (MJ, KR, RE, JCB, ZYJ, FW), pp. 20045–20050.
DATEDATE-2003-LeeC #3d #grid #linear #power management #simulation
The Power Grid Transient Simulation in Linear Time Based on 3D Alternating-Direction-Implicit Method (YML, CCPC), pp. 11020–11025.
DATEDATE-2003-LoKWH #design #identification #standard
A Custom-Cell Identification Method for High-Performance Mixed Standard/Custom-Cell Designs (JYLL, WAK, ACHW, TH), pp. 11102–11103.
DATEDATE-2003-MansourM #reduction
Model-Order Reduction Based on PRONY’s Method (MMM, AM), pp. 10530–10535.
DATEDATE-2003-NicolescuV #approach #detection #fault #tool support
Detecting Soft Errors by a Purely Software Approach: Method, Tools and Experimental Results (BN, RV), pp. 20057–20063.
DATEDATE-2003-OhtakeOF #algorithm #fault #generative #testing #using
A Method of Test Generation fo Path Delay Faults Using Stuck-at Fault Test Generation Algorithms (SO, KO, HF), pp. 10310–10315.
DocEngDocEng-2003-BayerlLGWN #analysis #documentation #semantics
Methods for the semantic analysis of document markup (PSB, HL, DG, AW, DN), pp. 161–170.
DRRDRR-2003-SunW #retrieval #similarity
Similarity-based matching method for handwriting retrieval (KS, JW), pp. 156–163.
ICDARICDAR-2003-BesagniBB #segmentation
A Segmentation Method for Bibliographic References by Contextual Tagging of Fields (DB, AB, NB), pp. 384–388.
ICDARICDAR-2003-HamamuraMI #classification #multi
A Multiclass Classification Method Based on Multiple Pairwise Classifiers (TH, HM, BI), pp. 809–813.
ICDARICDAR-2003-HaoLS03a #algorithm #classification #comparison #search-based #set
Comparison of Genetic Algorithm and Sequential Search Methods for Classifier Subset Selection (HH, CLL, HS), pp. 765–769.
ICDARICDAR-2003-Ishitani #data-driven #database #documentation #xml
Document Transformation System from Papers to XML Data Based on Pivot XML Document Method (YI), pp. 250–255.
ICDARICDAR-2003-JeongNK #recognition
Non-similar candidate removal method for off-line handwritten Korean character recognition (SHJ, YSN, HKK), pp. 323–328.
ICDARICDAR-2003-Ratzlaff #bibliography #comparison #database #recognition
Methods, Report and Survey for the Comparison of Diverse Isolated Character Recognition Results on the UNIPEN Database (EHR), pp. 623–628.
ICDARICDAR-2003-ZouariHLA #classification #parallel
A New Classifier Simulator for Evaluating Parallel Combination Methods (HZ, LH, YL, AMA), pp. 26–30.
SIGMODSIGMOD-2003-WangJLY #estimation #modelling
Containment Join Size Estimation: Models and Methods (WW, HJ, HL, JXY), pp. 145–156.
SIGMODSIGMOD-2003-WangPFY #named #query #xml
ViST: A Dynamic Index Method for Querying XML Data by Tree Structures (HW, SP, WF, PSY), pp. 110–121.
VLDBVLDB-2003-CeriM #tool support #web
Constructing and integrating data-centric Web Applications: Methods, Tools, and Techniques (SC, IM), p. 1151.
VLDBVLDB-2003-PapadiasTS #predict #query
The TPR*-Tree: An Optimized Spatio-Temporal Access Method for Predictive Queries (YT, DP, JS), pp. 790–801.
ESOPESOP-2003-Nieto #higher-order
The Rely-Guarantee Method in Isabelle/HOL (LPN), pp. 348–362.
ICALPICALP-2003-MerroN #bisimulation #mobile #proving
Bisimulation Proof Methods for Mobile Ambients (MM, FZN), pp. 584–598.
FMFME-2003-Henderson #correctness #proving #using
Proving the Correctness of Simpson’s 4-Slot ACM Using an Assertional Rely-Guarantee Proof Method (NH), pp. 244–263.
FMFME-2003-StidolphW #formal method
Managerial Issues for the Consideration and Use of Formal Methods (DCS, EJWJ), pp. 170–186.
FMFME-2003-WassyngL #formal method #implementation #industrial #lessons learnt
Lessons Learned from a Successful Implementation of Formal Methods in an Industrial Project (AW, ML), pp. 133–153.
SEFMSEFM-2003-AstesianoR #development #towards #uml
Towards a Well-Founded UML-Based Development Method (EA, GR), p. 102–?.
SFMSFM-2003-BertolinoIM #architecture #formal method #testing
Formal Methods in Testing Software Architectures (AB, PI, HM), pp. 122–147.
CAiSECAiSE-2003-RalyteDR #towards
Towards a Generic Model for Situational Method Engineering (JR, RD, CR), pp. 95–110.
CAiSECAiSE-2003-Saeki #development #information management #metric
Embedding Metrics into Information Systems Development Methods: An Application of Method Engineering Technique (MS), pp. 374–389.
EDOCEDOC-2003-DunlopIR
Methods for Conflict Resolution in Policy-Based Management Systems (ND, JI, KR), pp. 98–111.
EDOCEDOC-2003-KoehlerHKWK #modelling
A Model-Driven Transformation Method (JK, RH, SK, FYW, SK), pp. 186–197.
EDOCEDOC-2003-SilaghiS #aspect-oriented #development
Integrating CBSE, SoC, MDA, and AOP in a Software Development Method (RS, AS), pp. 136–146.
ICEISICEIS-v1-2003-MontilvaB #component #web
A Component-Based Method for Developing Web Applications (JAM, JB), pp. 334–340.
ICEISICEIS-v2-2003-BailonDF #fuzzy
Extension of the Box-Counting Method to Measure the Fractal Dimension of Fuzzy Data (ABB, MD, WF), pp. 185–190.
ICEISICEIS-v2-2003-MaciasVSR #data mining #development #mining
A Data Mining Method to Support Decision Making in Software Development Projects (JLÁM, JMV, JCRS, IR), pp. 11–18.
ICEISICEIS-v2-2003-OkuharaSMIN
Application of Group Method of Data Handling to Virtual Environment Simulator (KO, WS, YM, HI, TN), pp. 545–548.
ICEISICEIS-v3-2003-AgerfalkW #analysis #concept #development #framework
Systems Development Method Rationale: A Conceptual Framework for Analysis (PJÅ, KW), pp. 185–190.
ICEISICEIS-v3-2003-AgerfalkWKBEM #process #research
Flexibile Processes and Method Configuration: Outline of a Joint Industry-Academia Research Project (PJÅ, KW, FK, GB, ME, KM), pp. 519–522.
ICEISICEIS-v3-2003-TyrvainenP #analysis #communication #how #metric
How Digital Is Communication in Your Organization? a Metrics and an Analysis Method (PT, TP), pp. 156–166.
ICEISICEIS-v3-2003-YangZ #data access #enterprise #xml
An XML Based Administration Method on Role-Based Access Control in the Enterprise Environment (CY, CNZ), pp. 646–649.
CIKMCIKM-2003-CaladoCMZRG #classification #documentation #web
Combining link-based and content-based methods for web document classification (PC, MC, ESdM, NZ, BARN, MAG), pp. 394–401.
CIKMCIKM-2003-MelucciO #generative #markov #modelling #novel
A novel method for stemmer generation based on hidden markov models (MM, NO), pp. 131–138.
CIKMCIKM-2003-TaoFP #estimation #multi #query
The power-method: a comprehensive estimation technique for multi-dimensional queries (YT, CF, DP), pp. 83–90.
ICMLICML-2003-BrownW #ambiguity #composition #learning #network
The Use of the Ambiguity Decomposition in Neural Network Ensemble Learning Methods (GB, JLW), pp. 67–74.
ICMLICML-2003-CumbyR #kernel #learning #on the #relational
On Kernel Methods for Relational Learning (CMC, DR), pp. 107–114.
ICMLICML-2003-KubicaMCS #analysis #collaboration #graph #performance #query
Finding Underlying Connections: A Fast Graph-Based Method for Link Analysis and Collaboration Queries (JK, AWM, DC, JGS), pp. 392–399.
ICMLICML-2003-KwokT03a #kernel #problem
The Pre-Image Problem in Kernel Methods (JTK, IWT), pp. 408–415.
ICMLICML-2003-LiY #analysis #categorisation #classification
A Loss Function Analysis for Classification Methods in Text Categorization (FL, YY), pp. 472–479.
ICMLICML-2003-MannorRG #performance #policy
The Cross Entropy Method for Fast Policy Search (SM, RYR, YG), pp. 512–519.
ICMLICML-2003-SalakhutdinovR #adaptation #bound #optimisation
Adaptive Overrelaxed Bound Optimization Methods (RS, STR), pp. 664–671.
ICMLICML-2003-WiewioraCE #learning
Principled Methods for Advising Reinforcement Learning Agents (EW, GWC, CE), pp. 792–799.
KDDKDD-2003-KorenH #clustering #visualisation
A two-way visualization method for clustered data (YK, DH), pp. 589–594.
KDDKDD-2003-LeungP #empirical
Empirical comparisons of various voting methods in bagging (KTL, DSPJ), pp. 595–600.
MLDMMLDM-2003-AntunesO #constraints #mining
Generalization of Pattern-Growth Methods for Sequential Pattern Mining with Gap Constraints (CA, ALO), pp. 239–251.
MLDMMLDM-2003-Boulle #named
Khiops: A Discretization Method of Continuous Attributes with Guaranteed Resistance to Noise (MB), pp. 50–64.
MLDMMLDM-2003-CeciAM
Simplification Methods for Model Trees with Regression and Splitting Nodes (MC, AA, DM), pp. 20–34.
SEKESEKE-2003-AstesianoMMR #execution #multi #prototype #specification
From Requirement Specification to Prototype Execution: a Combination of Multiview Use-Case Driven Methods and Agent-Oriented Techniques (EA, MM, VM, GR), pp. 578–585.
SEKESEKE-2003-ChenJ #fuzzy #induction #information management #learning #multi #named
MFILM: a multi-dimensional fuzzy inductive learning method for knowledge acquisition (YTC, BJ), pp. 445–449.
SEKESEKE-2003-CiancariniPA #communication #design #ontology
An Ontology Driven Design Method for inter-Agent Communication (PC, VP, LA), pp. 90–94.
SEKESEKE-2003-JiehanL
Relative Index Term Frequency (RITF) Method (ZJ, HL), pp. 427–431.
SEKESEKE-2003-Ochs #assessment #off the shelf #requirements #risk management #using
Using Software Risk Management for Deriving Method Requirements for Risk Mitigation in COTS Assessment and Selection (MO), pp. 639–646.
SEKESEKE-2003-RezaH #architecture
An Integrated Method to Software Architecture (HR, XH), pp. 398–405.
SIGIRSIGIR-2003-DarwishO #probability #query
Probabilistic structured query methods (KD, DWO), pp. 338–344.
SIGIRSIGIR-2003-NottelmannF #quality #retrieval
Evaluating different methods of estimating retrieval quality for resource selection (HN, NF), pp. 290–297.
SIGIRSIGIR-2003-SiC #documentation #estimation
Relevant document distribution estimation method for resource selection (LS, JPC), pp. 298–305.
SIGIRSIGIR-2003-ZhaiCL #evaluation #independence #metric #retrieval #topic
Beyond independent relevance: methods and evaluation metrics for subtopic retrieval (CZ, WWC, JDL), pp. 10–17.
SIGIRSIGIR-2003-ZhangY #categorisation #classification #linear #robust
Robustness of regularized linear classification methods in text categorization (JZ, YY), pp. 190–197.
RERE-2003-HaggeK #benchmark #information management #metric
A Benchmarking Method for Information Systems (LH, JK), p. 245.
RERE-2003-MaidenJF #case study #requirements #specification
Integrating RE Methods to Support Use Case Based Requirements Specification (NAMM, SJ, MF), pp. 369–370.
RERE-2003-OshiroWS #elicitation #generative #idea #requirements
Goal-Oriented Idea Generation Method for Requirements Elicitation (KO, KW, MS), pp. 363–364.
SACSAC-2003-ChenYT #feature model
The Bitmap-based Feature Selection Method (WCC, MCY, SST), pp. 465–469.
SACSAC-2003-DaviesCC #automation #generative #modelling #testing
A Method for the Automatic Generation of Test Suites from Object Models (JD, CC, AC), pp. 1104–1109.
SACSAC-2003-RendaS #rank #web
Web Metasearch: Rank vs. Score Based Rank Aggregation Methods (MER, US), pp. 841–846.
SACSAC-2003-ShinjoKP #code generation #empirical #performance
Efficient Mediators through Dynamic Code Generation: a Method and an Experiment (YS, TK, CP), pp. 1147–1154.
SACSAC-2003-TsengT #mining #mobile #performance #web
An Efficient Method for Mining Associated Service Patterns in Mobile Web Environments (SMT, CFT), pp. 455–459.
SACSAC-2003-WuC #information retrieval #ranking
Methods for Ranking Information Retrieval Systems Without Relevance Judgments (SW, FC), pp. 811–816.
SACSAC-2003-YuNPC #classification #on the #testing
On the Use of the Classification-Tree Method by Beginning Software Testers (YTY, SPN, PLP, TYC), pp. 1123–1127.
ICSEICSE-2003-AbrahamssonWSR #agile #analysis #comparative
New Directions on Agile Methods: A Comparative Analysis (PA, JW, MTS, JR), pp. 244–254.
ICSEICSE-2003-CoppitS #analysis #effectiveness #modelling #tool support
Sound Methods and Effective Tools for Engineering Modeling and Analysis (DC, KJS), pp. 198–209.
CADECADE-2003-HirokawaM #automation #dependence
Automating the Dependency Pair Method (NH, AM), pp. 32–46.
CAVCAV-2003-SeshiaB #automaton #bound #model checking #using
Unbounded, Fully Symbolic Model Checking of Timed Automata using Boolean Methods (SAS, REB), pp. 154–166.
ICLPICLP-2003-BackofenW #approach #constraints #modelling #predict
A Constraint-Based Approach to Structure Prediction for Simplified Protein Models That Outperforms Other Existing Methods (RB, SW), pp. 49–71.
ICSTSAT-2003-SemerjianM #case study #physics #problem #random #satisfiability
A Study of Pure Random Walk on Random Satisfiability Problems with “Physical” Methods (GS, RM), pp. 120–134.
ICTSSTestCom-2003-En-NouaaryD #automaton #testing
A Guided Method for Testing Timed Input Output Automata (AEN, RD), pp. 211–225.
CBSECBSE-2002-LiuR #component #specification
Specifying Component Method Properties for Component State Recovery in RAIC (CL, DJR), p. 9.
DACDAC-2002-AnastasakisDMS #performance
A practical and efficient method for compare-point matching (DA, RFD, HKTM, TS), pp. 305–310.
DACDAC-2002-DillJRBFFRSW #verification
Formal verification methods: getting around the brick wall (DLD, NJ, SR, GB, LF, HF, RKR, GS, CW), pp. 576–577.
DACDAC-2002-EderB #logic #performance #pipes and filters #verification
Achieving maximum performance: a method for the verification of interlocked pipeline control logic (KE, GB), pp. 135–140.
DACDAC-2002-Higuchi #detection #multi #scalability
An implication-based method to detect multi-cycle paths in large sequential circuits (HH), pp. 164–169.
DACDAC-2002-KannanBB #estimation #metric #on the
On metrics for comparing routability estimation methods for FPGAs (PK, SB, DB), pp. 70–75.
DACDAC-2002-MahawarSS #performance
A solenoidal basis method for efficient inductance extraction (HM, VS, WS), pp. 751–756.
DACDAC-2002-Pogge #challenge #effectiveness
The next chip challenge: effective methods for viable mixed technology SoCs (HBP), pp. 84–87.
DACDAC-2002-Roychowdhury
A time-domain RF steady-state method for closely spaced tones (JSR), pp. 510–513.
DACDAC-2002-YangP #component #multi #simulation #using
Time-domain steady-state simulation of frequency-dependent components using multi-interval Chebyshev method (BY, JRP), pp. 504–509.
DATEDATE-2002-BontempiK #data analysis #performance #predict
A Data Analysis Method for Software Performance Prediction (GB, WK), pp. 971–976.
DATEDATE-2002-BrachtendorfLLMF #continuation #using
Steady State Calculation of Oscillators Using Continuation Methods (HGB, SL, RL, RCM, PF), p. 1139.
DATEDATE-2002-ChenBKR #reduction #using
Model Reduction in the Time-Domain Using Laguerre Polynomials and Krylov Methods (YC, VB, CKK, KR), pp. 931–935.
DATEDATE-2002-DrozdLD #array #float #online #performance #testing
Efficient On-Line Testing Method for a Floating-Point Iterative Array Divider (AVD, MVL, JVD), p. 1127.
DATEDATE-2002-LevantR #design
An EMC-Compliant Design Method of High-Density Integrated Circuits (JLL, MR), p. 1115.
DATEDATE-2002-PenzesM #energy #estimation
An Energy Estimation Method for Asynchronous Circuits with Application to an Asynchronous Microprocessor (PIP, AJM), pp. 640–647.
DATEDATE-2002-PronathGA #design #fault #float
A Test Design Method for Floating Gate Defects (FGD) in Analog Integrated Circuits (MP, HEG, KA), pp. 78–83.
DATEDATE-2002-SommerRHGMMECSN #design #layout #specification #top-down
From System Specification To Layout: Seamless Top-Down Design Methods for Analog and Mixed-Signal Applications (RS, IRH, EH, UG, PM, FM, KE, CC, PS, GN), pp. 884–891.
DATEDATE-2002-ThielenV #performance #simulation
Fast Method to Include Parasitic Coupling in Circuit Simulations (BLAVT, GAEV), pp. 1033–1037.
SIGMODSIGMOD-2002-MoonWH #database #sequence
General match: a subsequence matching method in time-series databases based on generalized windows (YSM, KYW, WSH), pp. 382–393.
VLDBVLDB-2002-Mohan02a #performance #using
An Efficient Method for Performing Record Deletions and Updates Using Index Scans (CM), pp. 940–949.
CSEETCSEET-2002-Host #education #empirical #re-engineering
Introducing Empirical Software Engineering Methods in Education (MH), p. 170–?.
ITiCSEITiCSE-2002-SkevoulisF #education #formal method #tool support
Integrating formal methods tools into undergraduate computer science curriculum (SS, MF), p. 232.
ESOPESOP-2002-WandW #analysis #composition #proving
A Modular, Extensible Proof Method for Small-Step Flow Analyses (MW, GBW), pp. 213–227.
FASEFASE-2002-AhrendtBBGHHMMS #design #formal method #object-oriented
The KeY System: Integrating Object-Oriented Design and Formal Methods (WA, TB, BB, MG, EH, RH, WM, WM, PHS), pp. 327–330.
FoSSaCSFoSSaCS-2002-JancarKMS #automaton #bound #proving
Equivalence-Checking with One-Counter Automata: A Generic Method for Proving Lower Bounds (PJ, AK, FM, ZS), pp. 172–186.
CSMRCSMR-2002-CarM #maintenance #modelling #process
A Method for Modeling and Evaluating Software Maintenance Process Performances (ZC, BM), pp. 15–23.
IWPCIWPC-2002-TakadaOI #information management #lightweight #slicing #using
Dependence-Cache Slicing: A Program Slicing Method Using Lightweight Dynamic Information (TT, FO, KI), pp. 169–177.
WCREWCRE-2002-ShokoufandehMM #clustering
Applying Spectral Methods to Software Clustering (AS, SM, MM), pp. 3–10.
WCREWCRE-2002-TrogerC #analysis
Analysis of Virtual Method Invocation for Binary Translation (JT, CC), p. 65–?.
FLOPSFLOPS-2002-Futatsugi #formal method
Formal Methods in CafeOBJ (KF), pp. 1–20.
ICALPICALP-2002-Mannila #data mining #mining #problem
Local and Global Methods in Data Mining: Basic Techniques and Open Problems (HM), pp. 57–68.
FMFME-2002-Casset #development #embedded #formal method #java #using #verification
Development of an Embedded Verifier for Java Card Byte Code Using Formal Methods (LC), pp. 290–309.
FMFME-2002-KristensenM #safety
A Generalised Sweep-Line Method for Safety Properties (LMK, TM), pp. 549–567.
FMFME-2002-OheimbN #hoare #logic #revisited
Hoare Logic for NanoJava: Auxiliary Variables, Side Effects, and Virtual Methods Revisited (DvO, TN), pp. 89–105.
ICFPICFP-2002-Moore #formal method #functional
Functional formal methods (JSM), p. 123.
CHICHI-2002-HeerC #categorisation #web
Separating the swarm: categorization methods for user sessions on the web (JH, EHhC), pp. 243–250.
CHICHI-2002-IsokoskiK #comparison
Comparison of two touchpad-based methods for numeric entry (PI, MK), pp. 25–32.
CAiSECAiSE-2002-ArjonaCRT #semantics #web
A Practical Agent-Based Method to Extract Semantic Information from the Web (JLA, RC, ARC, MT), pp. 697–700.
CAiSECAiSE-2002-MonteroDA #bibliography #development #hypermedia #requirements
Requirements for Hypermedia Development Methods: A Survey of Outstanding Methods (SM, PD, IA), pp. 747–751.
CAiSECAiSE-2002-PrakashB #modelling
Generic Models for Engineering Methods of Diverse Domains (NP, MPSB), pp. 612–625.
CAiSECAiSE-2002-Saeki #model transformation
Role of Model Transformation in Method Engineering (MS), pp. 626–642.
EDOCEDOC-2002-KoehlerTK #consistency #implementation #process #verification
From Business Process Model to Consistent Implementation: A Case for Formal Verification Methods (JK, GT, SK), p. 96–?.
EDOCEDOC-2002-SalinesiP #adaptation #information management
A Method to Analyse Changes in the Realisation of Business Intentions and Strategies for Information System Adaptation (CS, MJP), pp. 84–95.
ICEISICEIS-2002-Bider #modelling #process #requirements
Business Process Modeling as a Method of Requirements Engineering (IB), pp. 13–15.
ICEISICEIS-2002-DelaitreGM
The AEX Method and Its Instrumentation (SD, AG, SM), pp. 473–481.
ICEISICEIS-2002-Petit
A Method for WIS Centered on Users Goals (NP), pp. 975–980.
ICEISICEIS-2002-Poels #enterprise #functional #metric #modelling
A Functional Size Measurement Method for Event-Based Objectoriented Enterprise Models (GP), pp. 667–675.
ICEISICEIS-2002-Prosser
Proposing a Method for Planning the Materialisation of Views in a Data Warehouse (AP), pp. 155–162.
ICEISICEIS-2002-Rodriguez-Luna #process #word
Stemming Process in Spanish Words with the Successor Variety Method. Methodology and Result (MRL), pp. 838–842.
CIKMCIKM-2002-LohLAL #analysis #query
Analysis of pre-computed partition top method for range top-k queries in OLAP data cubes (ZXL, TWL, CHA, SYL), pp. 60–67.
CIKMCIKM-2002-SpanglerK #editing #interactive #taxonomy #validation
Interactive methods for taxonomy editing and validation (WSS, JTK), pp. 665–668.
CIKMCIKM-2002-TrainaTFF #data access #how #metric
How to improve the pruning ability of dynamic metric access methods (CTJ, AJMT, RFSF, CF), pp. 219–226.
ECIRECIR-2002-Sormunen #evaluation #interactive #performance #query
A Retrospective Evaluation Method for Exact-Match and Best-Match Queries Applying an Interactive Query Performance Analyser (ES), pp. 334–352.
ICMLICML-2002-AberdeenB #scalability
Scalable Internal-State Policy-Gradient Methods for POMDPs (DA, JB), pp. 3–10.
ICMLICML-2002-GlobersonT #analysis #novel #reduction
Sufficient Dimensionality Reduction — A novel Analysis Method (AG, NT), pp. 203–210.
ICPRICPR-v1-2002-BingLP #recognition
A New LDA-Based Method for Face Recognition (YB, JL, CP), pp. 168–171.
ICPRICPR-v1-2002-CaronMV #detection
A Method for Detecting Artificial Objects in Natural Environments (YC, PM, NV), pp. 600–603.
ICPRICPR-v1-2002-CoquinB #image
A New Method to Compute the Distortion Vector Field from Two Images (DC, PB), pp. 279–282.
ICPRICPR-v1-2002-DebaqueSD #3d #modelling
An Area-Based Alignment Method for 3D Urban Models (BD, GS, MPD), pp. 61–64.
ICPRICPR-v1-2002-DeschampsC #3d #performance
Fast Extraction of Tubular and Tree 3D Surfaces with Front Propagation Methods (TD, LDC), pp. 731–734.
ICPRICPR-v1-2002-HuangHN
A Region-Based Method for Model-Free Object Tracking (YH, TSH, HN), pp. 592–595.
ICPRICPR-v1-2002-LuWL #detection
A Target Detection Method in Range-Doppler Domain from SAR Echo Data (LL, RW, WL), pp. 91–94.
ICPRICPR-v1-2002-OhyamaWKTS #automation #correlation
Automatic Tracking of Local Myocardial Motion by Correlation Weighted Velocity Method (WO, TW, FK, ST, KS), pp. 711–714.
ICPRICPR-v1-2002-TangFYLS #geometry #modelling #novel
A Novel Method for Harmonic Geometric Transformation Model Based on Wavelet Collocation (YYT, XCF, XY, ZWL, LS), pp. 49–52.
ICPRICPR-v1-2002-YuLC #multi #synthesis
Multiresolution Block Sampling-Based Method for Texture Synthesis (YY, JL, CWC), pp. 239–242.
ICPRICPR-v2-2002-ArseneauC #automation #robust
Automated Feature Registration for Robust Tracking Methods (SA, JRC), pp. 1078–1081.
ICPRICPR-v2-2002-GiugnoS #graph #named #performance #query
GraphGrep: A Fast and Universal Method for Querying Graphs (RG, DS), pp. 112–115.
ICPRICPR-v2-2002-HuangT #classification #fault #pattern matching #pattern recognition #recognition
An RBF-Based Pattern Recognition Method by Competitively Reducing Classification-Oriented Error (YSH, YHT), pp. 180–183.
ICPRICPR-v2-2002-SinghG #pattern matching #pattern recognition #recognition #slicing #using
Pattern Recognition Using Information Slicing Method (pRISM) (SS, AG), pp. 144–147.
ICPRICPR-v2-2002-XieJ #detection #performance
A New Efficient Ellipse Detection Method (YX, QJ), pp. 957–960.
ICPRICPR-v2-2002-ZhaoSHS #named
Super-Fusion: A Super-Resolution Method Based on Fusion (WYZ, HSS, MWH, SS), pp. 269–272.
ICPRICPR-v2-2002-ZouY #image
A POCS-Based Method for Reducing Artifacts in BDCT Compressed Images (JJZ, HY), pp. 253–256.
ICPRICPR-v3-2002-Cuesta-FrauPAN #case study #clustering #comparative #feature model
Feature Extraction Methods Applied to the Clustering of Electrocardiographic Signals. A Comparative Study (DCF, JCPC, GAG, DN), pp. 961–964.
ICPRICPR-v3-2002-GarciaP #feature model #integration #multi #pattern matching #pattern recognition #recognition
Improving Texture Pattern Recognition by Integration of Multiple Texture Feature Extraction Methods (MAG, DP), pp. 7–10.
ICPRICPR-v3-2002-GurevichJS #image #invariant #recognition
A Method of Image Recognition Based on the Fusion of Reduced Invariant Representations: Mathematical Substantiation (IBG, IAJ, YGS), pp. 391–394.
ICPRICPR-v3-2002-KimKRK #image #robust
A Robust License-Plate Extraction Method under Complex Image Conditions (SK, DK, YR, GK), pp. 216–219.
ICPRICPR-v3-2002-KitasakaMHT #3d #automation #image #modelling #using
A Method for Automated Extraction of Aorta and Pulmonary Artery in the Mediastinum Using Medial Line Models from 3D Chest X-ray CT Images without Contrast Materials (TK, KM, JiH, JiT), p. 273–?.
ICPRICPR-v3-2002-KurozumiKM #information retrieval #music #robust
A Robust Audio Searching Method for Cellular-Phone-Based Music Information Retrieval (TK, KK, HM), pp. 991–994.
ICPRICPR-v3-2002-LeungKCT #documentation #fuzzy #image #normalisation #using
Normalization of Contrast in Document Images Using Generalized Fuzzy Operator with Least Square Method (CCL, PCKK, FHYC, WKT), pp. 115–118.
ICPRICPR-v3-2002-MolinaMKV #image #modelling #multi #using
A General Multichannel Image Restoration Method Using Compound Models (RM, JM, AKK, MV), pp. 835–838.
ICPRICPR-v3-2002-PeiC #adaptation #fault #novel #predict
Novel Error Concealment Method with Adaptive Prediction to the Abrupt and Gradual Scene Changes (SCP, YZC), pp. 827–830.
ICPRICPR-v3-2002-QuanTH #recognition #robust #speech
A Robust Method for the Vietnamese Handwritten and Speech Recognition (VHQ, PNT, NDHH), pp. 732–735.
ICPRICPR-v3-2002-RavindranF #linear
A Simple Linear Method to Obtain Height Ordering of Scene Points (PR, NJF), pp. 719–722.
ICPRICPR-v3-2002-WangPH #classification #documentation
A Method for Document Zone Content Classification (YW, ITP, RMH), p. 196–?.
ICPRICPR-v3-2002-ZhangB #detection #multi
A Wavelet-Based Edge Detection Method by Scale Multiplication (LZ, PB), pp. 501–500.
ICPRICPR-v4-2002-YuiHZH #3d #adaptation #modelling #performance
A Fast Narrow Band Method and Its Application in Topology-Adaptive 3-D Modeling (SY, KH, HZ, TH), pp. 122–125.
KDDKDD-2002-BennettDM
Exploiting unlabeled data in ensemble methods (KPB, AD, RM), pp. 289–296.
LSOLSO-2002-DingsoyrH #agile #feedback
Extending Agile Methods: Postmortem Reviews as Extended Feedback (TD, GKH), pp. 4–12.
SEKESEKE-2002-CanforaT #evaluation #nondeterminism #re-engineering #tool support
The importance of dealing with uncertainty in the evaluation of software engineering methods and tools (GC, LT), pp. 691–698.
SEKESEKE-2002-GriffithsHLO #web
A simple method & tool for web engineering (GG, BDH, MAL, BJO), pp. 755–762.
SEKESEKE-2002-MorisioST
A new method to evaluate software artifacts against predefined profiles (MM, IS, AT), pp. 811–818.
SEKESEKE-2002-RuheEP #requirements
Quantitative WinWin: a new method for decision support in requirements negotiation (GR, AE, DP), pp. 159–166.
SEKESEKE-2002-SvahnbergWLM #architecture #comprehension #quality
A method for understanding quality attributes in software architecture structures (MS, CW, LL, MM), pp. 819–826.
SIGIRSIGIR-2002-KimRL #classification #estimation #multi #naive bayes #parametricity
A new method of parameter estimation for multinomial naive bayes text classifiers (SBK, HCR, HSL), pp. 391–392.
SIGIRSIGIR-2002-ScheinPUP #metric #recommendation
Methods and metrics for cold-start recommendations (AIS, AP, LHU, DMP), pp. 253–260.
UMLUML-2002-Dietzsch #adaptation #case study #experience #modelling #uml
Adapting the UML to Business Modelling’s Needs — Experiences in Situational Method Engineering (AD), pp. 73–83.
ECOOPECOOP-2002-GlewP #type safety
Type-Safe Method Inlining (NG, JP), pp. 525–544.
POPLPOPL-2002-Manohar #design #scalability
Scalable formal design methods for asynchronous VLSI (RM), pp. 245–246.
RERE-2002-GrossMZH #convergence #development
The Reference Point Method: Requirements-Based ICT Convergence Solution Development (WG, TM, FZ, CH), p. 193.
RERE-2002-KaiyaHS #analysis #named #requirements
AGORA: Attributed Goal-Oriented Requirements Analysis Method (HK, HH, MS), pp. 13–22.
SACSAC-2002-AghbariKM #performance #reduction #video
Topological mapping: a dimensionality reduction method for efficient video search (ZA, KK, AM), pp. 470–475.
SACSAC-2002-ChangJ #clustering #data mining #mining #scalability
A new cell-based clustering method for large, high-dimensional data in data mining applications (JWC, DSJ), pp. 503–507.
SACSAC-2002-Dandashi #automation #metric #object-oriented #reuse #set #using
A method for assessing the reusability of object-oriented code using a validated set of automated measurements (FD), pp. 997–1003.
SACSAC-2002-KimL #adaptation #clustering #distance #documentation #effectiveness #metric #using
An effective document clustering method using user-adaptable distance metrics (HjK, SgL), pp. 16–20.
SACSAC-2002-KoC #documentation #retrieval
A structured documents retrieval method supporting attribute-based structure information (SKK, YCC), pp. 668–674.
SACSAC-2002-MartinezDF #documentation #evolution #generative
A method for the dynamic generation of virtual versions of evolving documents (MMM, JCD, PdlF), pp. 476–482.
SACSAC-2002-MathiasCDM #architecture #distributed #heuristic #metaheuristic #named #optimisation
DEVOpT: a distributed architecture supporting heuristic and metaheuristic optimization methods (ENM, CMdC, FLD, FMM), pp. 870–875.
SACSAC-2002-ParsopoulosV #multi #optimisation #problem
Particle swarm optimization method in multiobjective problems (KEP, MNV), pp. 603–607.
ICSEICSE-2002-Butler #approach #evaluation #security
Security attribute evaluation method: a cost-benefit approach (SAB), pp. 232–240.
SPLCSPLC-2002-KishiNK #framework #product line
A Method for Product Line Scoping Based on a Decision-Making Framework (TK, NN, TK), pp. 348–365.
SPLCSPLC-2002-SmithBB #analysis #component #mining #product line #re-engineering #using
Using the Options Analysis for Reengineering (OAR) Method for Mining Components for a Product Line (DBS, LO, JB), pp. 316–327.
CAVCAV-2002-ColonS #proving #termination
Practical Methods for Proving Program Termination (MC, HS), pp. 442–454.
CAVCAV-2002-McMillan #bound #model checking #satisfiability
Applying SAT Methods in Unbounded Symbolic Model Checking (KLM), pp. 250–264.
ICLPICLP-2002-Cabalar #semantics
A Rewriting Method for Well-Founded Semantics with Explicit Negation (PC), pp. 378–392.
ISSTAISSTA-2002-ChenTZ #evaluation #named #symbolic computation #testing
Semi-proving: an integrated method based on global symbolic evaluation and metamorphic testing (TYC, THT, ZZ), pp. 191–195.
SATSAT-2002-ManyaABCL
Resolution methods for many-valued CNF formulas (FM, CA, RB, AC, CML), p. 42.
SATSAT-2002-MonassonC #algorithm #analysis #exponential #random #satisfiability #scalability
Restart method and exponential acceleration of random 3-SAT instances resolutions: A large deviation analysis of the Davis-Putnam-Loveland-Logemann algorithm (RM, SC), p. 11.
ICTSSTestCom-2002-Ahtiainen #formal method #mobile #protocol #testing
Applying Formal Method in Mobile Protocol Testing (AA), p. 187–?.
ICTSSTestCom-2002-El-FakihYB
FSM-based Re-Testing Methods (KEF, NY, GvB), pp. 373–390.
VMCAIVMCAI-2002-FocardiPR #bisimulation #data flow #proving #security
Proofs Methods for Bisimulation Based Information Flow Security (RF, CP, SR), pp. 16–31.
WICSAWICSA-2001-KloukinasI #architecture
SPIN-ning Software Architectures: A Method for Exploring Complex (CK, VI), pp. 67–76.
ASEASE-2001-GouraudDGM #automation #statistics #testing
A New Way of Automating Statistical Testing Methods (SDG, AD, MCG, BM), pp. 5–12.
DACDAC-2001-ChenC #analysis #grid #performance #power management #scalability
Efficient Large-Scale Power Grid Analysis Based on Preconditioned Krylov-Subspace Iterative Methods (THC, CCPC), pp. 559–562.
DACDAC-2001-GorenSW #analysis #novel #pipes and filters #probability
A Novel Method for Stochastic Nonlinearity Analysis of a CMOS Pipeline ADC (DG, ES, IAW), pp. 127–132.
DACDAC-2001-YalcinPMBSH #dependence #using
An Advanced Timing Characterization Method Using Mode Dependency (HY, RP, MM, CB, KAS, JPH), pp. 657–660.
DATEDATE-2001-Axelsson #architecture #tool support
Methods and tools for systems engineering of automotive electronic architectures (JA), p. 112.
DATEDATE-2001-DoboliV #analysis #network #scalability
A regularity-based hierarchical symbolic analysis method for large-scale analog networks (AD, RV), p. 806.
DATEDATE-2001-DrozdL #float #online #performance #testing
Efficient on-line testing method for a floating-point adder (AVD, MVL), pp. 307–313.
DATEDATE-2001-NguyenJ #communication #simulation
Simulation method to extract characteristics for digital wireless communication systems (LN, VJ), pp. 176–181.
DATEDATE-2001-XuM #difference #modelling #performance #using
Efficient and passive modeling of transmission lines by using differential quadrature method (QX, PM), pp. 437–444.
ICDARICDAR-2001-AkselaLOK #adaptation #classification
Rejection Methods for an Adaptive Committee Classifier (MA, JL, EO, JK), pp. 982–986.
ICDARICDAR-2001-BogushMAUK #correlation #image #matrix #performance
An Efficient Correlation Computation Method for Binary Images Based on Matrix Factorisation (RB, SM, SA, SU, SiK), pp. 312–316.
ICDARICDAR-2001-ChoisyB #normalisation #recognition #using
Handwriting Recognition Using Local Methods for Normalization and Global Methods for Recognition (CC, AB), pp. 23–27.
ICDARICDAR-2001-Couasnon #automation #documentation #generative #named #recognition
DMOS: A Generic Document Recognition Method, Application to an Automatic Generator of Musical Scores, Mathematical Formulae and Table Structures Recognition Systems (BC), pp. 215–220.
ICDARICDAR-2001-CouasnonP #documentation #evaluation #recognition
A Real-World Evaluation of a Generic Document Recognition Method Applied to a Military Form of the 19th Century (BC, LP), pp. 779–783.
ICDARICDAR-2001-FujimotoON #image
A Ruled-Line Extraction Method for Digital Camera Images (KF, AO, SN), pp. 297–301.
ICDARICDAR-2001-HiranoOY
Field Extraction Method from Existing Forms Transmitted by Facsimile (TH, YO, FY), pp. 738–742.
ICDARICDAR-2001-Hullender #parametricity #performance
An Efficient Method for Tuning Handwriting Parameters (GNH), pp. 251–254.
ICDARICDAR-2001-IshideraS #recognition #reduction
A Candidate Reduction Method for Handwritten Kanji Character Recognition (EI, AS), pp. 8–13.
ICDARICDAR-2001-Ishitani #documentation #fault #image #information management #modelling
Model-Based Information Extraction Method Tolerant of OCR Errors for Document Images (YI), pp. 908–915.
ICDARICDAR-2001-KameshiroHOY #documentation #retrieval
A Document Retrieval Method from Handwritten Characters Based on OCR and Character Shape Information (TK, TH, YO, FY), pp. 597–601.
ICDARICDAR-2001-KogaMSF #2d #bottom-up #parsing #recognition #segmentation
A Recognition Method of Machine-Printed Monetary Amounts Based on the Two-Dimensional Segmentation and the Bottom-up Parsing (MK, RM, HS, HF), pp. 968–971.
ICDARICDAR-2001-NatteeN #classification #comprehension #documentation #geometry #machine learning #online #using
Geometric Method for Document Understanding and Classification Using On-line Machine Learning (CN, MN), pp. 602–606.
ICDARICDAR-2001-OkamotoIT #evaluation #performance #recognition #robust
Performance Evaluation of a Robust Method for Mathematical Expression Recognition (MO, HI, KT), pp. 121–128.
ICDARICDAR-2001-PengCLDZ #automation #documentation #evaluation #performance #segmentation
An Automatic Performance Evaluation Method for Document Page Segmentation (LP, MC, CL, XD, JZ), pp. 134–137.
ICDARICDAR-2001-PietikainenO #detection #documentation #image
Edge-Based Method for Text Detection from Complex Document Images (MP, OO), pp. 286–291.
ICDARICDAR-2001-WangHP #automation #generative
Automatic Table Ground Truth Generation and a Background-Analysis-Based Table Structure Extraction Method (YW, RMH, ITP), pp. 528–532.
ICDARICDAR-2001-YamaguchiYSTT #segmentation
A Segmentation Method for Touching Japanese Handwritten Characters Based on Connecting Condition of Line (TY, TY, TS, ST, MT), pp. 837–843.
ICDARICDAR-2001-ZhuS #feedback #recognition
A Handwritten Character Recognition Method with ANN Feedback (XZ, YS), pp. 255–259.
VLDBVLDB-2001-AnSVKIG #behaviour #data access #energy
Analyzing energy behavior of spatial access methods for memory-resident data (NA, AS, NV, MTK, MJI, SG), pp. 411–420.
VLDBVLDB-2001-OoiYTJ #distance #performance
Indexing the Distance: An Efficient Method to KNN Processing (CY, BCO, KLT, HVJ), pp. 421–430.
VLDBVLDB-2001-PapadiasT #named #query
MV3R-Tree: A Spatio-Temporal Access Method for Timestamp and Interval Queries (YT, DP), pp. 431–440.
ITiCSEITiCSE-2001-AedoD #hypermedia #re-engineering
Applying software engineering methods for hypermedia systems (IA, PD), pp. 5–8.
ITiCSEITiCSE-2001-HabermanK #black box #concept #education
Activating “black boxes” instead of opening “zipper” — a method of teaching novices basic CS concepts (BH, YBDK), pp. 41–44.
TACASTACAS-2001-ChristensenKM
A Sweep-Line Method for State Space Exploration (SC, LMK, TM), pp. 450–464.
CSMRCSMR-2001-BeszedesGSCG #c #maintenance #scalability #slicing #source code
Dynamic Slicing Method for Maintenance of Large C Programs (ÁB, TG, ZMS, JC, TG), pp. 105–113.
ICSMEICSM-2001-OtaniY #component #network #off the shelf
A Customization Method for Network Management Functions without Modification of Off-the-Shelf Components (TO, YY), pp. 460–469.
ICSMEICSM-2001-SchauerK #behaviour #metric
The Method Replacement Indicator: A Metric for Analyzing Behavioral Substitution (RS, RKK), pp. 754–764.
IWPCIWPC-2001-AntoniolDCM #concept analysis #legacy
A Method to Re-Organize Legacy Systems via Concept Analysis (GA, MDP, GC, EM), pp. 281–290.
IWPCIWPC-2001-AversanoCS #case study #comprehension #maintenance #process
Understanding and Improving the Maintenance Process: A Method and Two Case Studies (LA, GC, SS), pp. 199–208.
IWPCIWPC-2001-GannodC #formal method #reverse engineering #tool support #using
A Suite of Tools for Facilitating Reverse Engineering Using Formal Methods (GCG, BHCC), pp. 221–232.
IWPCIWPC-2001-GoldB #concept #flexibility #segmentation
A Flexible Method for Segmentation in Concept Assignmen (NG, KHB), pp. 135–144.
SCAMSCAM-2001-Lucia #slicing
Program Slicing: Methods and Applications (ADL), pp. 144–151.
PLDIPLDI-2001-GhiyaLS #ambiguity #analysis #c #memory management #on the #points-to #source code
On the Importance of Points-to Analysis and Other Memory Disambiguation Methods for C Programs (RG, DML, DCS), pp. 47–58.
CIAACIAA-2001-GranaBA #automaton #compilation #finite #scalability
Compilation Methods of Minimal Acyclic Finite-State Automata for Large Dictionaries (JG, FMB, MAA), pp. 135–148.
ICALPICALP-2001-Roura
A New Method for Balancing Binary Search Trees (SR), pp. 469–480.
FMFME-2001-Jackson #formal method #lightweight
Lightweight Formal Methods (DJ), p. 1.
CHICHI-2001-CardPWMRSB #analysis #behaviour #graph #protocol #usability #web
Information scent as a driver of Web behavior graphs: results of a protocol analysis method for Web usability (SKC, PP, MMVDW, JBM, RWR, PKS, JB), pp. 498–505.
CAiSECAiSE-2001-BrinkkemperSH #development
A Method Engineering Language for the Description of Systems Development Methods (SB, MS, FH), pp. 473–476.
CAiSECAiSE-2001-EcksteinAN #development #information management #reuse
Increasing Reusability in Information Systems Development by Applying Generic Methods (SE, PA, KN), pp. 251–266.
CAiSECAiSE-2001-RalyteR #assembly #process
An Assembly Process Model for Method Engineering (JR, CR), pp. 267–283.
EDOCEDOC-2001-WangC #distributed #enterprise #risk management
A Method to Reduce Risks in Building Distributed Enterprise Systems (GW, GC), pp. 164–168.
ICEISICEIS-v2-2001-CaleroPG #metric
Method for Obtaining Correct Metrics (CC, MP, MG), pp. 779–784.
CIKMCIKM-2001-ChoHLP #integer #using
Dynamic and Hierarchical Spatial Access Method using Integer Searching (KC, YH, YL, EKP), pp. 341–348.
ICMLICML-2001-DomingosH #algorithm #clustering #machine learning #scalability
A General Method for Scaling Up Machine Learning Algorithms and its Application to Clustering (PMD, GH), pp. 106–113.
ICMLICML-2001-MarxDB #clustering #detection
Coupled Clustering: a Method for Detecting Structural Correspondence (ZM, ID, JMB), pp. 353–360.
KDDKDD-2001-CarageaCH #classification #using
Gaining insights into support vector machine pattern classifiers using projection-based tour methods (DC, DC, VH), pp. 251–256.
KDDKDD-2001-DingHZ #component #graph #web
A spectral method to separate disconnected and nearly-disconnected web graph components (CHQD, XH, HZ), pp. 275–280.
KDDKDD-T-2001-HanLP #bibliography #mining #perspective #scalability
Scalable frequent-pattern mining methods: an overview (JH, LVSL, JP), pp. 264–324.
MLDMMLDM-2001-ImiyaI #detection #statistics
Statistics of Flow Vectors and Its Application to the Voting Method for the Detection of Flow Fields (AI, KI), pp. 293–306.
SEKESEKE-2001-Lopez #analysis #architecture #evaluation #framework #trade-off
Application of an Evaluation Framework for Analyzing the Architecture Tradeoff Analysis Method (ML), pp. 397–404.
SEKESEKE-2001-MorenoS #classification #detection #requirements
A Method for Detection, Classification and Resolution of Discrepancies in Viewpoint-based Requirements Engineering (AMM, AS), pp. 110–119.
SIGIRSIGIR-2001-OakesGF #classification #documentation
A Method Based on the Chi-Square Test for Document Classification (MPO, RJG, HF), pp. 440–441.
SIGIRSIGIR-2001-ZhaiL #ad hoc #case study #information retrieval #modelling
A Study of Smoothing Methods for Language Models Applied to Ad Hoc Information Retrieval (CZ, JDL), pp. 334–342.
OOPSLAOOPSLA-2001-Whaley #compilation #using
Partial Method Compilation using Dynamic Profile Information (JW), pp. 166–179.
TOOLSTOOLS-USA-2001-HeSH #multi #refinement #requirements #standard
Extensions of Standard Z Refinement Relation for Multiple Viewpoints Oriented Requirements Method (YH, QS, QH), pp. 253–262.
PADLPADL-2001-TyagiT #algorithm #interface #prolog
A Most Specific Method Finding Algorithm for Reflection Based Dynamic Prolog-to-Java Interfaces (ST, PT), pp. 322–336.
POPLPOPL-2001-Ganzinger #deduction #performance #program analysis
Efficient deductive methods for program analysis (HG), pp. 102–103.
POPLPOPL-2001-Mitchell #programming language #security
Programming language methods in computer security (JCM), pp. 1–3.
POPLPOPL-2001-Monniaux #analysis #monte carlo #probability #source code
An abstract Monte-Carlo method for the analysis of probabilistic programs (DM), pp. 93–101.
POPLPOPL-2001-Vouillon #calculus
Combining subsumption and binary methods: an object calculus with views (JV), pp. 290–303.
RERE-2001-JarzabekZ #domain model #modelling #requirements #xml
XML-Based Method and Tool for Handling Variant Requirements in Domain Models (SJ, HZ), pp. 166–173.
SACSAC-2001-BadgerK #taxonomy
Picking fruit from the tree of life: comments on taxonomic sampling and quartet methods (JHB, PEK), pp. 61–67.
SACSAC-2001-CiSN #network #performance #using
Improving performance of MAC layer by using congestion control/avoidance methods in wireless network (SC, HS, GN), pp. 420–424.
SACSAC-2001-LuZP #multi #transaction #version control
A dual copy method for transaction separation with multiversion control for read-only transactions (BL, QZ, WP), pp. 290–294.
SACSAC-2001-Viroli #implementation #java #morphism #parametricity #performance #polymorphism
Parametric polymorphism in Java: an efficient implementation for parametric methods (MV), pp. 610–619.
SACSAC-2001-Zhang #automation #satisfiability #symmetry
Automatic symmetry breaking method combined with SAT (JZ0), pp. 17–21.
FSEESEC-FSE-2001-MorisawaT #architecture #distributed #product line
An architectural style of product lines for distributed processing systems, and practical selection method (YM, KT), pp. 11–20.
FSEESEC-FSE-2001-WallnauHS #component #concept #experience #re-engineering #tutorial
Half day tutorial in methods of component-based software engineering essential concepts and classroom experience (KCW, SAH, RCS), pp. 314–315.
ICSEICSE-2001-BachmannB #design
Introduction to the Attribute Driven Design Method (FB, LJB), pp. 745–746.
ICSEICSE-2001-BerstelCRP #automation #design #formal method #scalability #user interface
A Scalable Formal Method for Design and Automatic Checking of User Interfaces (JB, SCR, GR, PSP), pp. 453–462.
ICSEICSE-2001-SmithOB #analysis #architecture #component #mining #product line #re-engineering
Mining Components for a Software Architecture and a Product Line: the Options Analysis for Reengineering (OAR) Method (DBS, LO, JB), p. 728.
ICSEICSE-2001-Wallnau #component #concept #experience #re-engineering
Methods of Component-Based Software Engineering: Essential Concepts and Classroom Experience (KCW), pp. 709–710.
CCCC-2001-TiceG #generative #robust
A Practical, Robust Method for Generating Variable Range Tables (CT, SLG), pp. 102–117.
IJCARIJCAR-2001-BaaderT #approach #automaton #satisfiability
The Inverse Method Implements the Automata Approach for Modal Satisfiability (FB, ST), pp. 92–106.
IJCARIJCAR-2001-HodasT #agile #first-order #implementation #linear #logic #named #proving #theorem proving
lolliCop — A Linear Logic Implementation of a Lean Connection-Method Theorem Prover for First-Order Classical Logic (JSH, NT), pp. 670–684.
IJCARIJCAR-2001-Peltier #automation #deduction #using
A General Method for Using Schematizations in Automated Deduction (NP), pp. 578–592.
CBSECBSE-2000-BurgHHMPSW
Exploring a Comprehensive CBD Method: Use of CBD/e in Practice (WDB, JSH, DPH, KM, ASP, SS, RW), p. 9.
ASEASE-2000-LaleauM #bibliography #generative #specification #uml
An Overview of a Method and Its Support Tool for Generating B Specifications from UML Notations (RL, AM), pp. 269–272.
DACDAC-2000-HsiehBLS #design #embedded #performance
Efficient methods for embedded system design space exploration (HH, FB, LL, ALSV), pp. 607–612.
DACDAC-2000-KanapkaPW #performance
Fast methods for extraction and sparsification of substrate coupling (JK, JRP, JW), pp. 738–743.
DACDAC-2000-LevySMW #analysis #performance
A rank-one update method for efficient processing of interconnect parasitics in timing analysis (HL, WS, DM, JW), pp. 75–78.
DACDAC-2000-WangN #analysis #linear #multi #order
Extended Krylov subspace method for reduced order analysis of linear circuits with multiple sources (JMW, TVN), pp. 247–252.
DACDAC-2000-YangP #multi #performance #simulation
A multi-interval Chebyshev collocation method for efficient high-accuracy RF circuit simulation (BY, JRP), pp. 178–183.
DACDAC-2000-Zhao #3d
Singularity-treated quadrature-evaluated method of moments solver for 3-D capacitance extraction (JZ), pp. 536–539.
DATEDATE-2000-BjureusJ #control flow #named #specification
MASCOT: A Specification and Cosimulation Method Integrating Data and Control Flow (PB, AJ), pp. 161–168.
DATEDATE-2000-EdwardsG #configuration management #design #object-oriented
An Object Oriented Design Method for Reconfigurable Computing Systems (ME, PG), pp. 692–696.
DATEDATE-2000-FrohlichGF #clustering #parallel #simulation
A New Partitioning Method for Parallel Simulation of VLSI Circuits on Transistor Level (NF, VG, JF), pp. 679–684.
DATEDATE-2000-KacNMZ #using
Alternative Test Methods Using IEEE 1149.4 (UK, FN, SM, MSZ), pp. 463–467.
DATEDATE-2000-SchwenckerSGA #automation #bound #design
The Generalized Boundary Curve-A Common Method for Automatic Nominal Design and Design Centering of Analog Circuits (RS, FS, HEG, KA), pp. 42–47.
SIGMODSIGMOD-2000-PalmerF #clustering #data mining #mining
Density Biased Sampling: An Improved Method for Data Mining and Clustering (CRP, CF), pp. 82–92.
VLDBVLDB-2000-JiangSLB
The BT-tree: A Branched and Temporal Access Method (LJ, BS, DBL, MBG), pp. 451–460.
CSEETCSEET-2000-AbernethyKSKP #formal method #specification
Technology Transfer Issues for Formal Methods of Software Specification (KA, JCK, AEKS, JDK, JDP), pp. 23–31.
CSEETCSEET-2000-DampierW #education #re-engineering #realtime
Teaching Scientific Method for Real-Time Software Engineering (DAD, REW), p. 199.
CSEETCSEET-2000-SobelSSH #education #formal method #re-engineering
Teaching Formal Methods Early in the Software Engineering Curriculum (panel) (AEKS, HS, AMS, PBH), p. 55–?.
CSEETCSEET-2000-Tremblay #formal method #question #re-engineering
Formal Methods: Mathematics, Computer Science, or Software Engineering? (GT), pp. 273–282.
ESOPESOP-2000-DenneyJ #correctness #java #logic
Correctness of Java Card Method Lookup via Logical Relations (ED, TPJ), pp. 104–118.
FASEFASE-2000-DondossolaB #fault tolerance #formal method #specification
System Fault Tolerance Specification: Proposal of a Method Combining Semi-formal and Formal Approaches (GD, OB), pp. 82–96.
FASEFASE-2000-Wehrheim #automation #case study #formal method #specification #using
Specification of an Automatic Manufacturing System: A Case Study in Using Integrated Formal Methods (HW), pp. 334–348.
TACASTACAS-2000-AronsP #comparison #execution #verification
A Comparison of Two Verification Methods for Speculative Instruction Execution (TA, AP), pp. 487–502.
TACASTACAS-2000-BraunLSS #consistency #formal method #integration
Consistent Integration of Formal Methods (PB, HL, BS, OS), pp. 48–62.
CSMRCSMR-2000-BojicV #architecture #comprehension #re-engineering #reuse
A Use-Case Driven Method of Architecture Recovery for Program Understanding and Reuse Reengineering (DB, DMV), pp. 23–32.
CSMRCSMR-2000-KellerS #assessment #towards
Towards a Quantitative Assessment of Method Replacement (RKK, RS), pp. 141–150.
WCREWCRE-2000-BianchiCV #legacy #process #re-engineering
Method and Process for Iterative Reengineering of Data in a Legacy System (AB, DC, GV), p. 86–?.
IFMIFM-2000-Ameur #development #formal method #process
Cooperation of Formal Methods in an Engineering Based Software Development Process (YAA), pp. 136–155.
IFMIFM-2000-Schulte #formal method #question #why
Why Doesn’t Anyone Use Formal Methods? (WS), pp. 297–298.
CHICHI-2000-Spencer #constraints #development #social
The streamlined cognitive walkthrough method, working around social constraints encountered in a software development company (RS), pp. 353–359.
EDOCEDOC-2000-GinbayashiYH #architecture #component #framework #modelling
Business Component Framework and Modeling Method for Component-Based Application Architecture (JG, RY, KH), pp. 184–193.
EDOCEDOC-2000-SudaTHN #distributed #scalability
New Control Methods for the Realization of an Ultra-Large-Scale Cooperative Distributed System (SS, HT, AH, KN), pp. 13–20.
ICEISICEIS-2000-KundaB #approach #bibliography #off the shelf
Accessing Success of a Social-Technical Method for Cots Software Selection: A Survey Approach (DK, LB), pp. 294–298.
ICEISICEIS-2000-Laleau #database #formal method #on the #specification #uml
On the Interest of Combining UML with the B Formal Method for the Specification of Database Applications (RL), pp. 56–63.
ICEISICEIS-2000-Stamper #requirements #social
Information Requirements are Human, Computers only Machines: Measur’s Rigorous Methods Based on Social Norms (RKS), p. XXVII-XXX.
CIKMCIKM-2000-SakuraiYUK
The Subspace Coding Method: A New Indexing Scheme for High-Dimensional Data (YS, MY, SU, HK), pp. 210–218.
CIKMCIKM-2000-ZwolA #database #integration #multi #retrieval
The Webspace Method: On the Integration of Database Technology with Multimedia Retrieval (RvZ, PMGA), pp. 438–445.
ICMLICML-2000-MargineantuD #classification #evaluation
Bootstrap Methods for the Cost-Sensitive Evaluation of Classifiers (DDM, TGD), pp. 583–590.
ICPRICPR-v1-2000-AwanzinoLDLV #locality
A Method Designed for Trihedron Localization in a Textured Environment (CA, JML, MD, LL, MV), pp. 1664–1667.
ICPRICPR-v1-2000-AzuelaG #image
New Method to Count Objects into an Image (JHSA, GG), pp. 1470–1473.
ICPRICPR-v1-2000-FujikiK #modelling #recursion
Recursive Factorization Method for the Paraperspective Model Based on the Perspective Projection (JF, TK), pp. 1406–1410.
ICPRICPR-v1-2000-HuangH #using
Road Sign Interpretation Using Matching Pursuit Method (CLH, SHH), pp. 1329–1334.
ICPRICPR-v1-2000-KimH #self
A Practical Self-Calibration Method of Rotating and Zooming Cameras (HK, KSH), pp. 1354–1357.
ICPRICPR-v1-2000-KitaKWN #2d #3d
A Quick 3D-2D Registration Method for a Wide-Range of Applications (YK, NK, DLW, JAN), pp. 1981–1986.
ICPRICPR-v1-2000-OkataniD #fault #image #metric #multi
A Method for Fine Registration of Multiple View Range Images Considering the Measurement Error Properties (ISO, KD), pp. 1280–1283.
ICPRICPR-v1-2000-RibeiroWH
An Eigendecomposition Method for Shape-from-Texture (ER, PLW, ERH), pp. 1758–1761.
ICPRICPR-v1-2000-RosenbergerC #clustering #estimation #image #segmentation
Unsupervised Clustering Method with Optimal Estimation of the Number of Clusters: Application to Image Segmentation (CR, KC), pp. 1656–1659.
ICPRICPR-v2-2000-BauerHK #recognition #statistics #using
Video-Based Continuous Sign Language Recognition Using Statistical Methods (BB, HH, KFK), pp. 2463–2466.
ICPRICPR-v2-2000-Ben-HurSHV #clustering
A Support Vector Clustering Method (ABH, HTS, DH, VV), pp. 2724–2727.
ICPRICPR-v2-2000-ChapronBA #multi
A Multiresolution Based Method for Recognizing Weeds in Corn Fields (MC, PB, LA), pp. 2303–2306.
ICPRICPR-v2-2000-KimSK #recognition #segmentation #string
Recognition of Unconstrained Handwritten Numeral Strings by Composite Segmentation Method (KKK, CYS, JHK), pp. 2594–2597.
ICPRICPR-v2-2000-MottlDLM #pattern matching #pattern recognition #recognition
Pattern Recognition in Spatial Data: A New Method of Seismic Explorations for Oil and Gas in Crystalline Basement Rocks (VM, SD, VL, IBM), pp. 2315–2318.
ICPRICPR-v2-2000-QianS #clustering
Clustering Combination Method (YQ, CYS), pp. 2732–2735.
ICPRICPR-v2-2000-RibaCVJ #classification #invariant
Methods for Invariant Signature Classification (JRR, AC, SV, IJ), pp. 2953–2956.
ICPRICPR-v2-2000-Sato #classification #fault #learning
A Learning Method for Definite Canonicalization Based on Minimum Classification Error (AS), pp. 2199–2202.
ICPRICPR-v2-2000-Tambouratzis #classification
Improving the Classification Accuracy of the Scanning n-tuple Method (GT), pp. 6046–6049.
ICPRICPR-v2-2000-UmRK #clustering #comparison #verification
Comparison of Clustering Methods for MLP-Based Speaker Verification (ITU, JHR, MHK), pp. 2475–2474.
ICPRICPR-v2-2000-VinokourovG #clustering #documentation #probability
Probabilistic Hierarchical Clustering Method for Organizing Collections of Text Documents (AV, MG), pp. 2182–2185.
ICPRICPR-v2-2000-ZhouLC
A Theoretical Justification of Nearest Feature Line Method (ZZ, SZL, KLC), pp. 2759–2762.
ICPRICPR-v3-2000-GashnikovGS #realtime
Compression Method for Real-Time Systems of Remote Sensing (MVG, NJG, VVS), pp. 3232–3235.
ICPRICPR-v3-2000-Ichimura #feature model #segmentation #using
Motion Segmentation Using Feature Selection and Subspace Method Based on Shape Space (NI), pp. 3858–3864.
ICPRICPR-v3-2000-Jehan-BessonBA #detection #set #using
Detection and Tracking of Moving Objects using a New Level Set Based Method (SJB, MB, GA), pp. 7112–7117.
ICPRICPR-v3-2000-KoubaroulisMK #multimodal #performance
The Multimodal Signature Method: An Efficiency and Sensitivity Study (DK, JM, JK), pp. 3379–3382.
ICPRICPR-v3-2000-LuJ #approach #image
A New Bayesian Approach to Image Denoising with a Combination of MRFs and Pixon Method (QL, TJ), pp. 3734–3737.
ICPRICPR-v3-2000-LuTH #detection #estimation #novel #robust
A Novel Method for Camera Planar Motion Detection and Robust Estimation of the 1D Trifocal Tensor (LL, HTT, ZH), pp. 3815–3818.
ICPRICPR-v3-2000-NelsonLCC #biology #estimation
Time-Frequency Methods for Biological Signal Estimation (DN, PJL, GC, LC), pp. 3114–3118.
ICPRICPR-v3-2000-PeceP #composition #performance
Fast Atomic Decomposition by the Inhibition Method (AECP, NP), pp. 3215–3218.
ICPRICPR-v3-2000-RajanC #image
A Perceptually Organized Method for Image Interpolation (DR, SC), pp. 3742–3745.
ICPRICPR-v3-2000-RibeiroH00a #adaptation
A Scale Adaptive Method for Focusing Spectral Peaks (ER, ERH), pp. 3123–3126.
ICPRICPR-v3-2000-StoeckelVVV #evaluation
An Evaluation of Ridge Extraction Methods for Portal Imaging (JS, FV, PHV, AMV), pp. 3433–3436.
ICPRICPR-v3-2000-SugiyamaA #detection #reliability
Edge Detection Method Based on Edge Reliability with Fixed Thresholds: Consideration of Uniformity and Gradation (TS, KA), pp. 3660–3663.
ICPRICPR-v3-2000-ZhangW #clustering #image #segmentation
A New Method of Color Image Segmentation Based on Intensity and Hue Clustering (CZ, PSPW), pp. 3617–3620.
ICPRICPR-v4-2000-HuynhCT #automation #evaluation #linear #metric #re-engineering #self
Semi-Automatic Metric Reconstruction of Buildings from Self-Calibration: Preliminary Results on the Evaluation of a Linear Camera Self-Calibration Method (DQH, YSC, HTT), pp. 4599–4602.
ICPRICPR-v4-2000-Ishii #3d #metric #using
3-D Shape Measurement Using a Focused-Section Method (AI), pp. 4828–4832.
ICPRICPR-v4-2000-IskeRMS #behaviour #learning #navigation
A Bootstrapping Method for Autonomous and in Site Learning of Generic Navigation Behavior (BI, UR, KM, JS), pp. 4656–4659.
ICPRICPR-v4-2000-Kauppinen #fault #recognition
A Two Stage Defect Recognition Method for Parquet Slab Grading (HK), pp. 4803–4806.
ICPRICPR-v4-2000-LeungCKC #bound #detection #fuzzy
Thyroid Cancer Cells Boundary Location by a Fuzzy Edge Detection Method (CCL, FHYC, PCKK, WFC), pp. 4360–4363.
ICPRICPR-v4-2000-MataNS #detection #multi #using
Microcalcifications Detection Using Multiresolution Methods (RM, EN, FS), pp. 4344–4347.
ICPRICPR-v4-2000-MurakamiW #automation
An Automatic Extraction and Display Method of Walking Person’s Trajectories (SiM, AW), pp. 4611–4614.
ICPRICPR-v4-2000-NewmanY #detection
Compound Extraction and Fitting Method for Detecting Cardiac Ventricle in SPECT Data (TSN, HY), pp. 4328–4331.
ICPRICPR-v4-2000-OhyamaWKTS #automation #detection
Automatic Left Ventricular Endocardium Detection in Echocardiograms Based on Ternary Thresholding Method (WO, TW, FK, ST, KS), pp. 4320–4323.
ICPRICPR-v4-2000-OkunP #analysis #automation #documentation #evaluation #generative #layout
Automatic Ground-Truth Generation for Skew-Tolerance Evaluation of Document Layout Analysis Methods (OO, MP), pp. 4376–4379.
ICPRICPR-v4-2000-SziranyiC #optimisation #parallel #segmentation #using
Spatio-Temporal Segmentation with Edge Relaxation and Optimization Using Fully Parallel Methods (TS, LC), pp. 4820–4823.
ICPRICPR-v4-2000-TakahashiSO #3d #estimation #image #realtime #using
Remarks on a Real-Time 3D Human Body Posture Estimation Method Using Trinocular Images (KT, TS, JO), pp. 4693–4697.
ICPRICPR-v4-2000-YamadaIN #documentation #image
A Method of Analyzing the Handling of Paper Documents in Motion Images (KY, KI, NN), pp. 4413–4416.
KDDKDD-2000-KittsFV #independence #named #performance #recommendation
Cross-sell: a fast promotion-tunable customer-item recommendation method based on conditionally independent probabilities (BK, DF, MV), pp. 437–446.
SIGIRSIGIR-2000-DownieN #effectiveness #evaluation #information retrieval #music
Evaluation of a simple and effective music information retrieval method (JSD, MN), pp. 73–80.
SIGIRSIGIR-2000-HoashiMIH #documentation #using
Document filtering method using non-relevant information profile (KH, KM, NI, KH), pp. 176–183.
SIGIRSIGIR-2000-JarvelinK #documentation #evaluation #information retrieval
IR evaluation methods for retrieving highly relevant documents (KJ, JK), pp. 41–48.
SIGIRSIGIR-2000-Ogawa #documentation #n-gram #performance #pseudo #ranking #retrieval
Pseudo-frequency method: an efficient document ranking retrieval method for n-gram indexing (YO), pp. 321–323.
SIGIRSIGIR-2000-OhML #categorisation #hypermedia #incremental #using
A practical hypertext categorization method using links and incrementally available class information (HJO, SHM, MHL), pp. 264–271.
SIGIRSIGIR-2000-PetasisCVPKS #adaptation #automation #machine learning #probability
Automatic adaptation of proper noun dictionaries through cooperation of machine learning and probabilistic methods (GP, AC, PV, GP, VK, CDS), pp. 128–135.
SIGIRSIGIR-2000-SlonimT #clustering #documentation #using #word
Document clustering using word clusters via the information bottleneck method (NS, NT), pp. 208–215.
SIGIRSIGIR-2000-Sormunen #effectiveness #evaluation #novel #query
A novel method for the evaluation of Boolean query effectiveness across a wide operational range (ES), pp. 25–32.
SIGIRSIGIR-2000-YangAPL #categorisation
Improving text categorization methods for event tracking (YY, TA, TP, CWL), pp. 65–72.
OOPSLAOOPSLA-2000-LeeKK #modelling #realtime #simulation
A real world object modeling method for creating simulation environment of real-time systems (JYL, HJK, KCK), pp. 93–104.
OOPSLAOOPSLA-2000-SundaresanHRVLGG #java
Practical virtual method call resolution for Java (VS, LJH, CR, RVR, PL, EG, CG), pp. 264–280.
TOOLSTOOLS-ASIA-2000-Taibi #development #hybrid #object-oriented #process
Hybrid Object-Oriented Method (HOOM): The Software Development Process (TT), pp. 8–17.
TOOLSTOOLS-ASIA-2000-YaoGL #development #multi
Application of Development Method Based on Multi-Agents (SY, SG, YL), pp. 158–161.
TOOLSTOOLS-PACIFIC-2000-BornHK #design #development #distributed #uml #using
A Method for the Design and Development of Distributed Applications Using UML (MB, EH, OK), pp. 253–265.
TOOLSTOOLS-PACIFIC-2000-CohenG #java #metric #self
Self-Calibration of Metrics of Java Methods (TC, JYG), pp. 94–107.
TOOLSTOOLS-PACIFIC-2000-ForaxDR #framework #java #multi
Java Multi-Method Framework (RF, ÉD, GR), pp. 45–56.
REICRE-2000-HubbardSM #assessment #performance #process #requirements
An Assessment of the Relative Efficiency of a Facilitator-Driven Requirements Collection Process with Respect to the Conventional Interview Method (RH, CNS, NRM), pp. 178–188.
SACSAC-2000-FeekinC #detection #sorting #using
Duplicate Detection Using K-way Sorting Method (AF, ZC), pp. 323–327.
SACSAC-2000-LohHTN #concurrent #database #hybrid #mobile
A Hybrid Method for Concurrent Updates on Disconnected Databases in Mobile Computing Environments (YHL, TH, MT, SN), pp. 563–565.
SACSAC-2000-SakureiTO #self
Effect of Background Knowledge in a Task Model Self-organization Method (SS, HT, RO), pp. 20–27.
SACSAC-2000-SchreckC #implementation #using
R-Tree Implementation Using Branch-Grafting Method (TS, ZC), pp. 328–332.
SACSAC-2000-TousidouM #comparison #data access #performance
A Performance Comparison of Quadtree-Based Access Methods for Thematic Maps (ET, YM), pp. 381–388.
ICSEICSE-2000-LittlewoodS #assessment #concept #reliability #tutorial
Software reliability (tutorial session): basic concepts and assessment methods (BL, LS), p. 831.
ICSEICSE-2000-Miranda #evaluation
An evaluation of the paired comparisons method for software sizing (EM), pp. 597–604.
SPLCSPLC-2000-AmericaOOL #architecture #component #framework #named #product line
CoPAM: A component-oriented platform architecting method family for product family engineering (PA, JHO, RCvO, FvdL), pp. 167–180.
SPLCSPLC-2000-CoriatJB
The SPLIT Method (MC, JJ, FB), pp. 147–166.
LCTESLCTES-2000-LeeSJ #communication #multi
An Integrated Push/Pull Buffer Management Method in Multimedia Communication Environments (SL, HS, TJ), pp. 216–220.
CAVCAV-2000-Meadows #analysis #encryption #formal method #protocol
Invited Address: Applying Formal Methods to Cryptographic Protocol Analysis (CM), p. 2.
CAVCAV-2000-StollerUL #detection #distributed #partial order #performance #using
Efficient Detection of Global Properties in Distributed Systems Using Partial-Order Methods (SDS, LU, YAL), pp. 264–279.
ICLPCL-2000-AudemardBS #named #satisfiability
AVAL: An Enumerative Method for SAT (GA, BB, PS), pp. 373–383.
ICLPCL-2000-JunttilaN #performance #satisfiability #towards
Towards an Efficient Tableau Method for Boolean Circuit Satisfiability Checking (TAJ, IN), pp. 553–567.
RTARTA-2000-Arts #dependence
System Description: The Dependency Pair Method (TA), pp. 261–264.
WICSAWICSA-1999-GuoAK #architecture #re-engineering
A Software Architecture Reconstruction Method (GYG, JMA, RK), pp. 15–34.
WICSAWICSA-1999-MedvidovicR #architecture #design #modelling #standard
Assessing the Suitability of a Standard Design Method for Modeling Software Architectures (NM, DSR), pp. 161–182.
WICSAWICSA-1999-Muller #design
Aspect Design with the Building Block Method (JKM), p. 585–?.
ASEASE-1999-DevulderL #case study #comparative #linear #programming #validation #verification
A Comparative Study between Linear Programming Validation (LPV) and other Verification Methods (SD, JLL), pp. 299–302.
ASEASE-1999-ReyesR #generative #named
Siddhartha: A Method for Developing Domain-Specific Test Driver Generators (AAR, DJR), p. 81–?.
DACDAC-1999-SuWL #interactive
A Timing-Driven Soft-Macro Resynthesis Method in Interaction with Chip Floorplanning (HPS, ACHW, YLL), pp. 262–267.
DACDAC-1999-TauschW #multi #performance
A Multiscale Method for Fast Capacitance Extraction (JT, JKW), pp. 537–542.
DATEDATE-1999-AntakiSXA #design #testing
Design For Testability Method for CML Digital Circuits (BA, YS, NX, SA), pp. 360–367.
DATEDATE-1999-CotaCL #adaptation #fault #linear #using
A Method to Diagnose Faults in Linear Analog Circuits using an Adaptive Tester (ÉFC, LC, ML), pp. 184–188.
DATEDATE-1999-PapachristouA #design #distributed
A Method of Distributed Controller Design for RTL Circuits (CAP, YA), pp. 774–775.
DATEDATE-1999-SmithM #component #polynomial
Polynomial Methods for Allocating Complex Components (JS, GDM), pp. 217–222.
HTHT-1999-LoweBW #assessment #development #hypermedia #modelling #process
Improving Hypermedia Development: A Reference Model-Based Process Assessment Method (DBL, AJB, RW), pp. 139–146.
ICDARICDAR-1999-AmanoM #documentation #image
A Feature Calibration Method for Watermarking of Document Images (TA, DM), pp. 91–94.
ICDARICDAR-1999-HeJLZ #documentation #image #retrieval
Content-based Index and Retrieval Method of Chinese Document Images (YH, ZJ, BL, HZ), pp. 685–688.
ICDARICDAR-1999-Hori #recognition #video
A Video Text Extraction Method for Character Recognition (OH), pp. 25–28.
ICDARICDAR-1999-IkedaOKNSF #recognition
A Recognition Method for Touching Japanese Handwritten Characters (HI, YO, MK, HN, HS, HF), pp. 641–644.
ICDARICDAR-1999-ImpedovoS #evaluation
Evaluation of Combination Methods (SI, AS), pp. 394–397.
ICDARICDAR-1999-KamadaF #image #performance
High-speed, High-accuracy Binarization Method for Recognizing Text in Images of Low Spatial Resolutions (HK, KF), pp. 139–142.
ICDARICDAR-1999-KameshiroHOY #documentation #fault #image #multi #recognition #retrieval #segmentation #using
A Document Image Retrieval Method Tolerating Recognition and Segmentation Errors of OCR using Shape-Feature and Multiple Candidates (TK, TH, YO, FY), pp. 681–684.
ICDARICDAR-1999-LaaksonenAOK #adaptation #online #recognition
Dynamically Expanding Context as Committee Adaptation Method in On-Line Recognition of Handwritten Latin Characters (JL, MA, EO, JK), pp. 796–799.
ICDARICDAR-1999-LiangHP #segmentation #statistics
A Statistically based, Highly Accurate Text-line Segmentation Method (JL, RMH, ITP), pp. 551–554.
ICDARICDAR-1999-LladosML #detection #diagrams
A Hough-based Method for Hatched Pattern Detection in Maps and Diagrams (JL, EM, JLK), pp. 479–482.
ICDARICDAR-1999-MisraAC #image #memory management #performance
A Memory Efficient Method for Fast Transposing Run-length Encoded Images (VM, JFA, AKC), pp. 161–164.
ICDARICDAR-1999-NakagawaYN #normalisation #recognition
An Off-line Character Recognition Method Employing Model-dependent Pattern Normalization by an Elastic Membrane Model (MN, TY, TN), pp. 495–498.
ICDARICDAR-1999-OgataUMSF #recognition
A Method for Street Number Matching in Japanese Address Recognition (HO, YU, KM, HS, HF), pp. 321–324.
ICDARICDAR-1999-OkamotoY #online #recognition #using
On-line Handwritten Character Recognition Method using Directional Features and Clockwise/Counterwise Direction-Change Features (MO, KY), pp. 491–494.
ICDARICDAR-1999-WangT #documentation #image #recognition
A New Method of Character Line Extraction from Mixed-unformatted Document Image for Japanese Mail Address Recognition (XW, TT), pp. 769–772.
ICDARICDAR-1999-XiLT #novel
A Novel Method for Discriminating between Oriental and European Languages by Fractal Features (DX, SWL, YYT), pp. 345–348.
ICDARICDAR-1999-XingyuanGDO #analysis #robust
A Robust Method for Unknown Forms Analysis (XL, WG, DSD, WGO), pp. 531–534.
SIGMODSIGMOD-1999-AggarwalWY #similarity
A New Method for Similarity Indexing of Market Basket Data (CCA, JLW, PSY), pp. 407–418.
SIGMODSIGMOD-1999-ChakrabartiM #concurrent #data access #multi #performance
Efficient Concurrency Control in Multidimensional Access Methods (KC, SM), pp. 25–36.
SIGMODSIGMOD-1999-HinneburgK #clustering #database #scalability
Clustering Methods for Large Databases: From the Past to the Future (AH, DAK), p. 509.
ITiCSEITiCSE-1999-Bobkowska #empirical #game studies
Laboratory experiment with the 3RolesPlaying method (AEB), pp. 123–126.
ITiCSEITiCSE-1999-KurasGZ #education
Changing IS curriculum and methods of instruction (MK, MG, AZ), pp. 36–39.
ITiCSEITiCSE-1999-Polak #case study #communication #education #using
Teaching computer communication skills using case study method (PP), p. 190.
CSMRCSMR-1999-Pedro-de-JesusS #database #relational #reverse engineering
Selection of Reverse Engineering Methods for Relational Databases (MdLPdJ, PMAS), pp. 194–197.
CSMRCSMR-1999-WangKW #component #maintenance #testing
A Method for Built-in Tests in Component-based Software Maintenance (YW, GK, HW), pp. 186–189.
ICSMEICSM-1999-SchauerRMK #composition #inheritance #object-oriented
Hot Spot Recovery in Object-Oriented Software with Inheritance and Composition Template Methods (RS, SR, FM, RKK), pp. 220–229.
WCREWCRE-1999-AnquetilL #clustering
Experiments with Clustering as a Software Remodularization Method (NA, TCL), pp. 235–255.
WCREWCRE-1999-Jermaine #using
Computing Program Modularizations Using the k-Cut Method (CJ), pp. 224–234.
WCREWCRE-1999-Koschke #automation #component #incremental
An Incremental Semi-Automatic Method for Component Recovery (RK), p. 256–?.
STOCSTOC-1999-FerraginaMB #approach #geometry #multi #problem #string
Multi-Method Dispatching: A Geometric Approach With Applications to String Matching Problems (PF, SM, MdB), pp. 483–491.
ICALPICALP-1999-BuhrmanJLV
New Applications of the Incompressibility Method (HB, TJ, ML, PMBV), pp. 220–229.
CIAAWIA-1999-SeuringG #automaton
A Structural Method for Output Compaction of Sequential Automata Implemented as Circuits (MS, MG), pp. 158–163.
FMFM-v1-1999-Jackson
The Role of Formalism in Method (MJ), p. 56.
FMFM-v1-1999-MunozR
Structural Embeddings: Mechanization with Method (CAM, JMR), pp. 452–471.
FMFM-v1-1999-PaigeO #formal method
Developing BON as an Industrial-Strength Formal Method (RFP, JSO), pp. 834–853.
FMFM-v1-1999-Rouzaud #calculus #refinement
Interpreting the B-Method in the Refinement Calculus (YR), pp. 411–430.
FMFM-v1-1999-Rushby #formal method #question
Mechanized Formal Methods: Where Next? (JMR), pp. 48–51.
FMFM-v1-1999-SabatierL #design #formal method #smarttech #transaction #validation
The Use of the B Formal Method for the Design and the Validation of the Transaction Mechanism for Smart Card Applications (DS, PL), pp. 348–368.
FMFM-v2-1999-ChaudronTW #design #formal method #lessons learnt
Lessons from the Application of Formal Methods to the Design of a Storm Surge Barrier Control System (MRVC, JT, KW), pp. 1511–1526.
FMFM-v2-1999-DunstanKML #formal method
Formal Methods for Extensions to CAS (MD, TK, UM, SL), pp. 1758–1777.
FMFM-v2-1999-Krieg-BrucknerPOB #development #formal method
The UniForM Workbench, a Universal Development Environment for Formal Methods (BKB, JP, ERO, AB), pp. 1186–1205.
HCIHCI-CCAD-1999-EndoKTHT
Cybercity walker — layered morphin method (TE, AK, HT, MH, TT), pp. 1044–1048.
HCIHCI-CCAD-1999-FachB #adaptation #design #learning
Training wheels: an “old” method for designing modern and adaptable learning environments (PWF, MB), pp. 725–729.
HCIHCI-CCAD-1999-Honold #elicitation #requirements
Focus groups: A qualitative method to elicit culture-specific user requirements (PH), pp. 3–7.
HCIHCI-EI-1999-Baumann #evaluation #feedback #matrix #usability
Matrix Evaluation Method for Planned Usability Improvements Based on Customer Feedback (KB), pp. 701–705.
HCIHCI-EI-1999-Czerwinski #generative #human-computer #research
Research Methods for Next Generation HCI (MC), pp. 1103–1107.
HCIHCI-EI-1999-FitzpatrickD #evaluation #process #usability
A Process for Appraising Commercial Usability Evaluation Methods (RF, AJD), pp. 1068–1072.
HCIHCI-EI-1999-HosonoIT #evaluation #requirements
Sensory Evaluation Method for Determining Portable Information Terminal Requirements for Nursing Care Applications (NH, HI, YT), pp. 953–957.
HCIHCI-EI-1999-KurosuSM #case study #comparative #evaluation #heuristic
A Comparative Study of sHEM (structured heuristic evaluation method) (MK, MS, SM), pp. 938–942.
HCIHCI-EI-1999-LuSUI
A New Method to Synthesize Japanese Sign Language Based on Intuitive Motion Primitives (SL, HS, TU, SI), pp. 441–445.
HCIHCI-EI-1999-MoussaRMK #automation #generative #petri net #specification #user interface
A Petri Nets based Method for Specification and Automatic Generation of User Interface (FM, MR, MM, CK), pp. 988–992.
HCIHCI-EI-1999-RavidB #prototype #requirements #user interface
A Method for Extracting Requirements that a User Interface Prototype Contains (AR, DMB), pp. 900–904.
HCIHCI-EI-1999-SanuiU #email #evaluation #grid
Extracting Baby-Boomers’ Future Expectations by the Evaluation Grid Method Through E-Mail (JS, MU), pp. 760–763.
HCIHCI-EI-1999-SuzukiKO #design #named #process
QUIS: applying a new walkthrough method to a product design process (SS, AK, KO), pp. 933–937.
HCIHCI-EI-1999-Urokohara #analysis #design #usability #user interface #using
Method to Build Good Usability: Task Analysis and User Interface Design Using Operation Flowcharts (HU), pp. 928–932.
AdaSIGAda-1999-GedelaSX #ada #concurrent #formal method #modelling
Formal modeling of synchronization methods for concurrent objects in Ada 95 (RKG, SMS, HX), pp. 211–220.
CAiSECAiSE-1999-PrakashS #heuristic #modelling #quality
Modelling Method Heuristics for Better Quality Products (NP, RS), pp. 429–433.
CAiSECAiSE-1999-RalyteRP
Method Enhancement with Scenario Based Techniques (JR, CR, VP), pp. 103–118.
CAiSECAiSE-1999-SvinterikouT #information management #modelling #named
TUML: A Method for Modelling Temporal Information Systems (MS, BT), pp. 456–461.
ICEISICEIS-1999-BorgesN #development #object-oriented
An Assistant for Selecting Object Oriented Methods for Applications Development (GdESB, MEMN), p. 780.
ICEISICEIS-1999-JuricRH #architecture #distributed #legacy
A Method for Integrating Legacy Systems within Distributed Object Architecture (MBJ, IR, MH), pp. 461–468.
ICEISICEIS-1999-NishiokaKKON #data type #inheritance
A High Speed Access Method to Data Structures with Inheritance Hierarchy (SN, FK, JK, MO, JN), pp. 509–516.
ICEISICEIS-1999-YooYP #data access #internet
A New Method to Block Access to Illegal and Harmful Content on the Internet (BJY, HGY, MSP), pp. 732–739.
CIKMCIKM-1999-EpterK #clustering #multi
A Multiple-Resolution Method for Edge-Centric Data Clustering (SE, MSK), pp. 491–498.
CIKMCIKM-1999-Kanada
A Method of Geographical Name Extraction from Japanese Text for Thematic Geographical Search (YK), pp. 46–54.
CIKMCIKM-1999-YuOE #performance #scalability
Simple QSF-Trees: An Efficient and Scalable Spatial Access Method (BY, RO, MWE), pp. 5–14.
KDDKDD-1999-Domingos #classification #named
MetaCost: A General Method for Making Classifiers Cost-Sensitive (PMD), pp. 155–164.
MLDMMLDM-1999-HongW #data mining #mining #predict
Advanced in Predictive Data Mining Methods (SJH, SMW), pp. 13–20.
SIGIRSIGIR-1999-HoashiMIH #query #word
Query Expansion Method Based on Word Contribution (poster abstract) (KH, KM, NI, KH), pp. 303–304.
SIGIRSIGIR-1999-JonesSCKS #comparison #information retrieval #query
A Comparison of Query Translation Methods for English-Japanese Cross-Language Information Retrieval (poster abstract) (GJFJ, TS, NC, AK, KS), pp. 269–270.
SIGIRSIGIR-1999-YangL #categorisation
A Re-Examination of Text Categorization Methods (YY, XL), pp. 42–49.
ECOOPECOOP-1999-DetlefsA
Inlining of Virtual Methods (DD, OA), pp. 258–278.
ECOOPECOOP-1999-Ernst
Propagating Class and Method Combination (EE), pp. 67–91.
ECOOPECOOP-1999-PangHLS #multi #using
Multi-method Dispatch Using Multiple Row Displacement (CP, WH, YL, DS), pp. 304–328.
TOOLSTOOLS-ASIA-1999-HuZJ #object-oriented
Applying Object-Oriented Method to CSIE System (YH, SZ, WJ), pp. 484–491.
TOOLSTOOLS-EUROPE-1999-Henderson-Sellers99b #uml
Introduction to the OPEN Method with UML (BHS), p. 399.
TOOLSTOOLS-EUROPE-1999-KoskimiesBPH #architecture #challenge #design #object-oriented #reuse #tool support
Designing Reusable Object-Oriented Architectures — Challenges, Methods & Tools (KK, JB, WP, GH), p. 421.
TOOLSTOOLS-EUROPE-1999-Meyer99c #development #eiffel
Seamless Development with the Eiffel Method (BM), p. 397.
TOOLSTOOLS-EUROPE-1999-Stapleton #development #named
DSDM: Dynamic Systems Development Method (JS), p. 406.
TOOLSTOOLS-PACIFIC-1999-MitchellM #contract
Extending a Method of Devising Software Contracts (RM, JM), p. 234–?.
TOOLSTOOLS-PACIFIC-1999-SchmolitzkyEKM #how #question #type safety
How Can Covariance in Pragmatical Class Methods be Made Statically Type-Safe? (AS, ME, JLK, GM), pp. 200–209.
TOOLSTOOLS-USA-1999-DanielsT #constraints #effectiveness #sequence #testing
Measuring the Effectiveness of Method Test Sequences Derived from Sequencing Constraints (FJD, KCT), pp. 74–83.
TOOLSTOOLS-USA-1999-Henderson-Sellers99a #uml
Introduction to the OPEN Method with UML (BHS), p. 504.
LOPSTRLOPSTR-1999-DucasseR #consistency #formal method #proving
Proof Obligations of the B Formal Method: Local Proofs Ensure Global Consistency (MD, LR), pp. 10–29.
PPDPPPDP-1999-BaldanCFP #abstract interpretation
A Simple and General Method for Integrating Abstract Interpretation in SICStus (DB, NC, GF, FP), pp. 207–223.
RERE-1999-VillerS #analysis #process #requirements #social
Social Analysis in the Requirements Engineering Process: From Ethnography to Method (SV, IS), pp. 6–13.
SACSAC-1999-DunningR #estimation #heuristic #optimisation
A Heuristic Cost Estimation Method for Optimizing Assignment of Tasks to Processors (LAD, SR), pp. 358–364.
SACSAC-1999-HarwoodS #low cost #network
A Method of Trading Diameter for Reduced Degree to Construct Low Cost Interconnection Networks (AH, HS), pp. 474–480.
SACSAC-1999-Lee #multi #scheduling
Artificial Intelligence Search Methods for Multi-Machine Two-Stage Scheduling (IL), pp. 31–35.
SACSAC-1999-RauberR99a #matrix
Matrix Computations Behind the Hierarchical Radiosity Method (TR, GR), pp. 533–540.
ESECESEC-FSE-1999-Fierz #component #embedded #modelling
The CIP Method: Component- and Model-Based Construction of Embedded Systems (HF), pp. 375–392.
ESECESEC-FSE-1999-GyimothyBF #debugging #performance #slicing
An Efficient Relevant Slicing Method for Debugging (TG, ÁB, IF), pp. 303–321.
ICSEICSE-1999-HolzmannS #verification
A Practical Method for Verifying Event-Driven Software (GJH, MHS), pp. 597–607.
ICSEICSE-1999-Kontio #bibliography #development #risk management
Risk Management in Software Development: A Technology Overview and the Riskit Method (JK), pp. 679–680.
ICSEICSE-1999-MaruyamaS #automation #dependence #graph #refactoring #using
Automatic Method Refactoring Using Weighted Dependence Graphs (KM, KS), pp. 236–245.
ICSEICSE-1999-TaharaOH #development
Agent System Development Method Based on Agent Patterns (YT, AO, SH), pp. 356–367.
CCCC-1999-ZhangGRG #performance #pipes and filters
Efficient State-Diagram Construction Methods for Software Pipelining (CZ, RG, SR, GRG), pp. 153–167.
PPoPPPPoPP-1999-MaassenNVBP #implementation #java #performance
An Efficient Implementation of Java’s Remote Method Invocation (JM, RvN, RV, HEB, AP), pp. 173–182.
CADECADE-1999-ArecesNR #logic
Prefixed Resolution: A Resolution Method for Modal and Description Logics (CA, HdN, MdR), pp. 187–201.
CAVCAV-1999-Brinksma #consistency #formal method #testing
Formal Methods for Conformance Testing: Theory Can Be Practical (EB), pp. 44–45.
CSLCSL-1999-HagiharaY #logic
Resolution Method for Modal Logic with Well-Founded Frames (SH, NY), pp. 277–291.
ICTSSIWTCS-1999-ArtychB #concept #consistency #requirements #tool support
External Conformance Requirements: Concepts, Methods and Tools (RA, KMB), pp. 363–378.
ICTSSIWTCS-1999-LatvakoskiH #communication #embedded #protocol #simulation #testing
Time Simulation Methods for Testing Protocol Software Embedded in Communicating Systems (JL, HH), pp. 379–394.
ASEASE-1998-Andrews #analysis #testing #tool support #using
Testing using Log File Analysis: Tools, Methods, and Issues (JHA), p. 157–?.
DACDAC-1998-ChouW #equation #multi #parametricity
Multilevel Integral Equation Methods for the Extraction of Substrate Coupling Parameters in Mixed-Signal IC’s (MC, JW), pp. 20–25.
DACDAC-1998-CuletuAM
A Practical Repeater Insertion Method in High Speed VLSI Circuits (JC, CA, JM), pp. 392–395.
DACDAC-1998-DemirMR
Phase Noise in Oscillators: A Unifying Theory and Numerical Methods for Characterisation (AD, AM, JSR), pp. 26–31.
DACDAC-1998-DengiR #2d #bound #megamodelling
Boundary Element Method Macromodels for 2-D Hierachical Capacitance Extraction (EAD, RAR), pp. 218–223.
DACDAC-1998-LillisB
Table-Lookup Methods for Improved Performance-Driven Routing (JL, PB), pp. 368–373.
DACDAC-1998-SteeleORH #verification
Full-Chip Verification Methods for DSM Power Distribution Systems (GS, DO, SR, SZH), pp. 744–749.
SIGMODSIGMOD-1998-KornackerSH #debugging #named
amdb: An Access Method Debugging Tool (MK, MAS, JMH), pp. 570–571.
VLDBVLDB-1998-MuthOPW #data access #design #implementation #performance
Design, Implementation, and Performance of the LHAM Log-Structured History Data Access Method (PM, PEO, AP, GW), pp. 452–463.
VLDBVLDB-1998-WeberSB #analysis #performance
A Quantitative Analysis and Performance Study for Similarity-Search Methods in High-Dimensional Spaces (RW, HJS, SB), pp. 194–205.
ITiCSEITiCSE-1998-CarboneK #bibliography #education
A survey of methods used to evaluate computer science teaching (AC, JK), pp. 41–45.
ESOPESOP-1998-AbadiG #bisimulation #encryption #protocol
A Bisimulation Method for Cryptographic Protocols (MA, ADG), pp. 12–26.
CSMRCSMR-1998-BattagliaSF #legacy #named
RENAISSANCE: A Method to Migrate from Legacy to Immortal Software Systems (MB, GS, JMF), pp. 197–200.
CSMRCSMR-1998-DumkeF #development #evaluation #object-oriented
Metrics-Based Evaluation of Object-Oriented Software Development Methods (RRD, EF), pp. 193–196.
CSMRCSMR-1998-Kleuker #distributed #formal method #re-engineering #using
Reengineering of Distributed Systems Using Formal Methods (SK), pp. 189–192.
CSMRCSMR-1998-RansomSW #evolution #legacy
A Method for Assessing Legacy Systems for Evolution (JR, IS, IW), pp. 128–134.
ICSMEICSM-1998-Schneidewind #maintenance #off the shelf #reliability
Methods for Assessing COTS Reliability, Maintainability, and Availability (NFS), p. 224–?.
SASSAS-1998-HagiyaT #analysis #data flow #java #on the #virtual machine
On a New Method for Dataflow Analysis of Java Virtual Machine Subroutines (MH, AT), pp. 17–32.
ICALPICALP-1998-HusfeldtR #problem
Hardness Results for Dynamic Problems by Extensions of Fredman and Saks’ Chronogram Method (TH, TR), pp. 67–78.
FMFM-1998-AgerholmL #approach #formal method #lightweight
A Lightweight Approach to Formal Methods (SA, PGL), pp. 168–183.
FMFM-1998-AgerholmL98a #formal method #lightweight #tool support
The IFAD VDM Tools: Lightweight Formal Methods (SA, PGL), pp. 326–329.
FMFM-1998-BroyS #development #formal method #process
Enriching the Software Development Process by Formal Methods (MB, OS), pp. 44–61.
FMFM-1998-Krieg-Bruckner #formal method
UniForM Perspectives for Formal Methods (BKB), pp. 251–265.
FMFM-1998-MeulenC #formal method #specification
Formal Methods in the Specification of the Emergency Closing System of the Eastern Scheldt Storm Surge Barrier (MvdM, TC), pp. 296–301.
ICFPICFP-1998-Russell #analysis #design #functional #named
MAP: A Functional Analysis and Design Method (DR), p. 342.
CHICHI-1998-LewisBCR #adaptation #design #education #process #user interface
Adapting User Interface Design Methods to the Design of Educational Activities (CHL, CB, GC, CR), pp. 619–626.
CHICHI-1998-Masui #performance
An Efficient Text Input Method for Pen-Based Computers (TM), pp. 328–335.
CAiSECAiSE-1998-BrinkkemperSH #assembly
Assembly Techniques for Method Engineering (SB, MS, FH), pp. 381–400.
CAiSECAiSE-1998-DomgesPS
A Filter-Mechanism for Method-Driven Trace Capture (RD, KP, KS), pp. 237–250.
CAiSECAiSE-1998-RollandPR #reuse #specification
Specifying the Reuse Context of Scenario Method Chunks (CR, VP, JR), pp. 191–218.
CIKMCIKM-1998-ClairLP #process
Attribute Weighting: A Method of Applying Domain Knowledge in the Decision Tree Process (CSC, CL, NP), pp. 259–266.
CIKMCIKM-1998-ZhouPL #implementation #process #transaction #workflow
Dynamic Restructuring of Transactional Workflow Activities: A Practical Implementation Method (TZ, CP, LL), pp. 378–385.
ICMLICML-1998-Dietterich #learning
The MAXQ Method for Hierarchical Reinforcement Learning (TGD), pp. 118–126.
ICPRICPR-1998-ArikiS #classification #multi #using
Classification of TV sports news by DCT features using multiple subspace method (YA, YS), pp. 1488–1491.
ICPRICPR-1998-FunadaOMTNMSWY #feature model
Feature extraction method for palmprint considering elimination of creases (JiF, NO, MM, TT, KN, AM, TS, TW, YY), pp. 1849–1854.
ICPRICPR-1998-HerouxDRT #automation #classification #identification
Classification method study for automatic form class identification (PH, SD, AR, ÉT), pp. 926–928.
ICPRICPR-1998-HwangYTY #3d #linear #using
A factorization method using 3D linear combination for shape and motion recovery (KCH, NY, HT, KY), pp. 959–963.
ICPRICPR-1998-KawataniS #recognition
Handwritten Kanji recognition with the LDA method (TK, HS), pp. 1301–1305.
ICPRICPR-1998-KosmalaR #online #recognition #statistics #using
On-line handwritten formula recognition using statistical methods (AK, GR), pp. 1306–1308.
ICPRICPR-1998-KrejciFS #image #multi
A new multichannel blind deconvolution method and its application to solar images (RK, JF, SS), pp. 1765–1767.
ICPRICPR-1998-KronerL #authentication #pattern matching #pattern recognition #recognition
Authentication of free hand drawings by pattern recognition methods (SK, ADL), pp. 462–464.
ICPRICPR-1998-KurataFS #geometry
Affine epipolar geometry via factorization method (TK, JF, KS), pp. 862–866.
ICPRICPR-1998-LeiW #detection #novel #symmetry
A novel method for detecting and localising of reflectional and rotational symmetry under weak perspective projection (YL, KCW), pp. 417–419.
ICPRICPR-1998-LiML #estimation #multi #recognition #using
Human posture recognition using multi-scale morphological method and Kalman motion estimation (YL, SM, HL), pp. 175–177.
ICPRICPR-1998-MeckeAM #estimation #robust #sequence
A robust method for block-based motion estimation in RGB-image sequences (RM, AAH, BM), pp. 663–667.
ICPRICPR-1998-MottlBKKM #analysis #image
Variational methods in signal and image analysis (VM, AB, AK, AK, IBM), pp. 525–527.
ICPRICPR-1998-Onoguchi #detection
Shadow elimination method for moving object detection (KO), pp. 583–587.
ICPRICPR-1998-PalubinskasDK #clustering #using
An unsupervised clustering method using the entropy minimization (GP, XD, FK), pp. 1816–1818.
ICPRICPR-1998-RiazanovSZ #algebra #logic #optimisation #pattern matching #pattern recognition #recognition
Mathematical methods for pattern recognition: logic, optimization, algebraic approaches (VVR, OVS, YIZ), pp. 831–834.
ICPRICPR-1998-RigollK #comparison #markov #modelling #online #verification
A systematic comparison between on-line and off-line methods for signature verification with hidden Markov models (GR, AK), pp. 1755–1757.
ICPRICPR-1998-ShihLRC #image
Morphologic field warping: a volumetric deformation method for medical image registration (WSVS, WCL, SYR, CTC), pp. 1680–1682.
ICPRICPR-1998-ShikuKN #string #using
A method for character string extraction using local and global segment crowdedness (OS, KK, AN), pp. 1077–1080.
ICPRICPR-1998-TombreADHM #off the shelf #recognition #robust
Stable, robust and off-the-shelf methods for graphics recognition (KT, CAS, PD, AH, GM), pp. 406–408.
ICPRICPR-1998-Visa #algorithm #image #search-based #segmentation
A genetic algorithm based method to improve image segmentation (AV), pp. 1015–1017.
ICPRICPR-1998-YamashitaIO #pattern matching #pattern recognition #recognition
Relative Karhunen-Loeve transform method for pattern recognition (YY, YI, HO), pp. 1031–1033.
ICPRICPR-1998-ZhugeTLHD #analysis #image #interactive #programming #segmentation
An interactive image segmentation method based on dynamic programming and its application in medical image analysis (YZ, JT, NL, ZH, RD), pp. 1558–1560.
KDDKDD-1998-PadmanabhanT
A Belief-Driven Method for Discovering Unexpected Patterns (BP, AT), pp. 94–100.
KDDKDD-1998-PinheiroS #database #mining #semistructured data
Methods for Linking and Mining Massive Heterogeneous Databases (JCP, DXS), pp. 309–313.
KDDKDD-1998-Rosset #classification #comparison #evaluation #flexibility #named #performance #ranking
Ranking — Methods for Flexible Evaluation and Efficient Comparison of Classification Performance (SR), pp. 324–328.
KDDKDD-1998-SteegRW #correlation #detection #higher-order #multi #performance
Coincidence Detection: A Fast Method for Discovering Higher-Order Correlations in Multidimensional Data (EWS, DAR, EW), pp. 112–120.
SIGIRSIGIR-1998-FranzR #correlation #query
A Method for Scoring Correlated Features in Query Expansion (MF, SR), pp. 337–338.
TOOLSTOOLS-USA-1998-BarnB #component #development #tool support
Methods and Tools for Component Based Development (BB, AWB), pp. 384–395.
TOOLSTOOLS-USA-1998-Mellor #development #realtime
Real-Time Development with the Shlaer-Mellor Method (SJM), p. 412.
TOOLSTOOLS-USA-1998-Meyer98a #contract #design #eiffel
Design by Contract: The Eiffel Method (BM), p. 446.
PPDPALP-PLILP-1998-LeviV #abstract interpretation #proving
Derivation of Proof Methods by Abstract Interpretation (GL, PV), pp. 102–117.
PPDPALP-PLILP-1998-Pitts #higher-order #semantics
Operational Versus Denotational Methods in the Semantics of Higher Order Languages (AMP), pp. 282–283.
PPDPALP-PLILP-1998-Refalo #detection #incremental
Approaches to the Incremental Detection of Implicit Equalities with the Revised Simplex Method (PR), pp. 481–496.
LOPSTRLOPSTR-1998-Rosenblueth #source code #using
An Exhaustive-Search Method Using Layered Streams Obtained Through a Meta-Interpreter for Chain Programs (DAR), pp. 322–324.
REICRE-1998-SutcliffeR #analysis #experience #requirements
Experience with SCRAM, a SCenario Requirements Analysis Method (AGS, MR), p. 164–?.
REFSQREFSQ-1998-GoldkuhlA #information management #requirements
Action Within Information Systems: Outline of a Requirements Engineering Method (GG, PJÅ), pp. 133–153.
SACSAC-1998-SabinY #database #information retrieval
Integrating information retrieval techniques with traditional DB methods in a Web-based database browser (RES, TKY), pp. 760–766.
SACSAC-1998-WangW #adaptation #multi #optimisation #performance
Efficient and adaptive Lagrange-multiplier methods for continuous nonlinear optimization (TW, BWW), pp. 361–365.
SACSAC-1998-WohlmuthM #communication #configuration management #parallel
A method for them embedding of arbitrary communication topologies into configurable parallel computers (OW, FML), pp. 569–574.
FSEFSE-1998-GuptaMS #automation #generative #testing #using
Automated Test Data Generation Using an Iterative Relaxation Method (NG, APM, MLS), pp. 231–244.
FSEFSE-1998-KontioGL #case study #concept #experience #process #risk management #using
Experiences in Improving Risk Management Processes Using the Concepts of the Riskit Method (JK, GG, DL), pp. 163–172.
ICSEICSE-1998-BriandEB #assessment #benchmark #estimation #hybrid #metric #named #risk management
COBRA: A Hybrid Method for Software Cost Estimation, Benchmarking, and Risk Assessment (LCB, KEE, FB), pp. 390–399.
ICSEICSE-1998-MotoyoshiO #development #incremental #object-oriented
An Incremental Project Plan: Introducing Cleanroom Method and Object-Oriented Development Method (YM, SO), pp. 430–433.
ICSEICSE-1998-RobbinsMR #architecture #design #standard
Integrating Architecture Description Languages with a Standard Design Method (JER, NM, DFR), pp. 209–218.
LCTESLCTES-1998-AnantharamanP #clustering #embedded #memory management #performance
An Efficient Data Partitioning Method for Limited Memory Embedded Systems (SA, SP), pp. 108–222.
CAVCAV-1998-BellaP #induction
Mechanising BAN Kerberos by the Inductive Method (GB, LCP), pp. 416–427.
CAVCAV-1998-CourturierM #empirical #formal method #using
An Experiment in Parallelizing an Application Using Formal Methods (RC, DM), pp. 345–356.
CAVCAV-1998-Cuellar #formal method #industrial
Formal Methods in an Industrial Environment (JC), pp. 57–60.
CAVCAV-1998-HoffmanP #experience #formal method
A Formal Method Experience at Secure Computing Corporation (JH, CP), pp. 49–56.
ASEASE-1997-BlazyF #development #formal method #maintenance
Application of Formal Methods to the Development of a Software Maintenance Tool (SB, PF), pp. 162–171.
ASEASE-1997-GoguenLMRS #distributed #formal method #tool support
Distributed Cooperative Formal Methods Tools (JAG, KL, AM, GR, AS), pp. 55–62.
ASEASE-1997-SahraouiMLD #concept #identification
Applying Concept Formation Methods to Object Identification in Procedural Code (HAS, WLM, HL, FD), pp. 210–218.
DACDAC-1997-FangWY #debugging #online #realtime
A Real-Time RTL Engineering-Change Method Supporting On-Line Debugging for Logic-Emulation Applications (WJF, ACHW, TYY), pp. 101–106.
DACDAC-1997-KapurZ #parametricity #performance
A Fast Method of Moments Solver for Efficient Parameter Extraction of MCMs (SK, JZ), pp. 141–146.
DACDAC-1997-KrupnovaAS #clustering
A Hierarchy-Driven FPGA Partitioning Method (HK, AA, GS), pp. 522–525.
DACDAC-1997-Roychowdhury #multi #performance #simulation
Efficient Methods for Simulating Highly Nonlinear Multi-Rate Circuits (JSR), pp. 269–274.
DATEEDTC-1997-ArabiK #performance #testing #using
Efficient and accurate testing of analog-to-digital converters using oscillation-test method (KA, BK), pp. 348–352.
DATEEDTC-1997-ChoiH #estimation
Improving the accuracy of support-set finding method for power estimation of combinational circuits (HC, SHH), pp. 526–530.
DATEEDTC-1997-LaquaiRW #metric #performance #testing
A production-oriented measurement method for fast and exhaustive Iddq tests (BL, HR, HW), pp. 279–286.
HTHT-1997-Fraisse #automation #design #generative
A Task Driven Design Method and Its Associated Tool for Automatically Generating Hypertexts (SF), pp. 234–235.
ICDARICDAR-1997-ChungY #comparison #feature model #performance #recognition
Performance comparison of several feature selection methods based on node pruning in handwritten character recognition (KC, JY), pp. 11–15.
ICDARICDAR-1997-DjematenTZ #geometry #recognition
A Geometrical Method for Printing and Handwritten Berber Character Recognition (AD, BT, AZ), pp. 564–567.
ICDARICDAR-1997-Horiuchi #classification
Pattern Classification Method by Integrating Interval Feature Values (TH), pp. 847–850.
ICDARICDAR-1997-HoriuchiHYY #2d #normalisation #recognition #using
Two-dimensional Extension of Nonlinear Normalization Method using Line Density for Character Recognition (TH, RH, HY, KY), pp. 511–514.
ICDARICDAR-1997-Jaeger
A Psychomotor Method for Tracking Handwriting (SJ0), pp. 528–531.
ICDARICDAR-1997-KimL #normalisation #recognition
Nonlinear Shape Normalization Methods for Gray-Scale Handwritten Character Recognition (SYK, SWL), pp. 479–482.
ICDARICDAR-1997-LiuHS #recognition #robust #segmentation
Robust Stroke Segmentation Method for Handwritten Chinese Character Recognition (KL, YSH, CYS), p. 211–?.
ICDARICDAR-1997-LiuKK #recognition
High Accuracy Handwritten Chinese Character Recognition by Improved Feature Matching Method (CLL, IJK, JHK), pp. 1033–1037.
ICDARICDAR-1997-MiuraSM #recognition
A method of extracting curvature features and its application to handwritten character recognition (KTM, RS, SM), pp. 450–454.
ICDARICDAR-1997-NaoiY #automation #information management
Global Interpolation Method II for Handwritten Numbers Overlapping a Border by Automatic Knowledge Acquisition of Overlapped Condition (SN, MY), pp. 540–543.
ICDARICDAR-1997-OhtaTA #retrieval
Retrieval methods for English-text with missrecognized OCR characters (MO, AT, JA), pp. 950–956.
ICDARICDAR-1997-OkamotoY #online #recognition
On-line handwriting character recognition method with directional features and direction-change features (MO, KY), pp. 926–930.
ICDARICDAR-1997-PavlidisSP #online #recognition #using
An On-Line Handwritten Note Recognition Method Using Shape Metamorphosis (IP, RS, NP), pp. 914–918.
ICDARICDAR-1997-ShinjoNKMSH #documentation
A method for connecting disappeared junction patterns on frame lines in form documents (HS, KN, MK, KM, YS, EH), pp. 667–670.
ICDARICDAR-1997-TonouchiK #algorithm #online #recognition #using
An on-line Japanese character recognition method using length-based stroke correspondence algorithm (YT, AK), pp. 633–636.
ICDARICDAR-1997-TsengC97a
A New Method for Segmenting Handwritten Chinese Characters (LYT, RCC), pp. 568–571.
ICDARICDAR-1997-VuurpijlS #categorisation #clustering
Finding structure in diversity: a hierarchical clustering method for the categorization of allographs in handwriting (LV, LS), p. 387–?.
ICDARICDAR-1997-Yamada #feature model #recognition
Non-uniformly Sampled Feature Extraction Method for Kanji Character Recognition (KY), pp. 200–205.
ICDARICDAR-1997-YamauchiIT #learning #multi #recognition
Shape based Learning for a Multi-Template Method, and its Application to Handprinted Numeral Recognition (TY, YI, JT), pp. 495–498.
ICDARICDAR-1997-YamazakiK #verification
Proposal for a Text-Indicated Writer Verification Method (YY, NK), pp. 709–713.
ICDARICDAR-1997-ZhaoSX #string
A New Method for Segmenting Unconstrained Handwritten Numeral String (BZ, HS, SX), pp. 524–527.
VLDBVLDB-1997-CiacciaPZ #metric #named #performance #similarity
M-tree: An Efficient Access Method for Similarity Search in Metric Spaces (PC, MP, PZ), pp. 426–435.
VLDBVLDB-1997-SellisRF #data access #multi
Multidimensional Access Methods: Trees Have Grown Everywhere (TKS, NR, CF), pp. 13–14.
CSMRCSMR-1997-JarzabekW #precise #reverse engineering #tool support #towards
Towards a precise description of reverse engineering methods and tools (SJ, IW), pp. 3–9.
CSMRCSMR-1997-Lowe #formal method
Formal Methods (ML), p. 43.
CSMRCSMR-1997-PidaparthiC #case study #design #migration #object-oriented #using
Case Study in Migration to Object-Oriented System Structure Using Design Transformation Methods (SP, GC), pp. 128–135.
ICSMEICSM-1997-HeSRC #black box #maintenance #testing
Software Black Box Mechanism: A Pragmatic Method for Software Crash Diagnosis and Usage Maintenance Testing (ZH, GS, MR, IC), pp. 142–149.
ICSMEICSM-2000-YoungerBL #concurrent #refinement #source code
A Formal Transformation and Refinement Method for Concurrent Programs (EJY, KHB, ZL), p. 287–?.
ICALPICALP-1997-AndreevCR #trade-off #worst-case
Worst-Case Hardness Suffices for Derandomization: A New Method for Hardness-Randomness Trade-Offs (AEA, AEFC, JDPR), pp. 177–187.
ICALPICALP-1997-Bernardo #algebra
An Algebra-Based Method to Associate Rewards with EMPA Terms (MB), pp. 358–368.
FMFME-1997-Gregoire #protocol #proving #using
TLA + PROMELA: Conjecture, Check, Proof, Engineering New Protocols Using Methods and Formal Notations (JCG), pp. 378–397.
FMFME-1997-Paige #formal method #integration
A Meta-Method for Formal Method Integration (RFP), pp. 473–494.
ICFPICFP-1997-ChinH #bound
A Bounds Inference Method for Vector-Based Memoisation (WNC, MH), pp. 176–187.
HCIHCI-CC-1997-DobronetsSV #identification
Ergodynamic Method of Identification of the Cognitive Strategy Used by the Human-Operator (BSD, AAS, VFV), pp. 837–840.
HCIHCI-CC-1997-LewandowskiK #assessment #safety
Method of Assessment of Occupational Safety (JL, CK), pp. 703–706.
HCIHCI-CC-1997-SavidisSE #design #incremental #interface #physics #polymorphism
Abstract Task Definition and Incremental Polymorphic Physical Instantiation: The Unified Interface Design Method (AS, CS, PLE), pp. 465–468.
HCIHCI-CC-1997-StrasserK #evaluation #rest
Ergonomic Evaluation of a Wrist Rest for VDU Work via Electromyographic Methods (HS, EK), pp. 615–618.
HCIHCI-CC-1997-WatersonOC #development
Further Development of a New Method for Task Allocation in Complex Systems (PEW, MTO, CWC), pp. 257–260.
HCIHCI-SEC-1997-Ficarra #evaluation #multi
Method and Techniques for the Evaluation of Multimedia Applications (FVCF), pp. 635–638.
HCIHCI-SEC-1997-HijikataSYN #design #hypermedia
A Dynamic Linkage Method for Hypermedia and Its Design Support Tool (YH, NS, TY, SN), pp. 727–730.
HCIHCI-SEC-1997-LaugheryP #case study #performance #predict
Predicting Human Performance in Complex Systems-A Method and Case Study (KRLJ, BMP), pp. 75–78.
HCIHCI-SEC-1997-NakagawaKNT #evaluation #interface
Simulation-Based Interface Evaluation Method of Equipment in Power Plants (TN, MK, YN, NT), pp. 233–236.
HCIHCI-SEC-1997-NishitaniKKS #industrial #usability
Experimental Method for Usability Test of Industrial Plant Operation System (HN, TK, TK, CS), pp. 625–628.
HCIHCI-SEC-1997-Ntuen #formal method
A Formal Method for Deriving Command Production Language from Human Intents (CAN), pp. 257–260.
HCIHCI-SEC-1997-SanuiM #evaluation #grid
Revealing of Preference Structure by the Evaluation Grid Method (JS, GM), pp. 471–474.
HCIHCI-SEC-1997-SmithD #design #interface
User Centred Design: The Application of the LUCID Interface Design Method (AS, LD), pp. 563–568.
HCIHCI-SEC-1997-StorkL #development #research
Structured Methods for Human Factors Research and Development (AS, JL), pp. 531–534.
HCIHCI-SEC-1997-Yamaoka #concept #design
A New Design Concept and Method Based on Ergonomics and Kansei Engineering and So On (TY), pp. 547–550.
AdaEuropeAdaEurope-1997-CheungCC #integration #object-oriented #towards
Towards an Integration of Syntactic Constructs and Structural Features for Formalised Object-Oriented Methods (KSC, PKOC, TYC), pp. 173–184.
CAiSECAiSE-1997-AltmeyerRSSZ #development #reuse
Application of a Generator-Based Software Development Method Supporting Model Reuse (JA, JPR, BS, MS, GZ), pp. 159–172.
CAiSECAiSE-1997-KloosterBHW #information management #intranet
Intranet Facilitated Knowledge Management: A Theory and Tool for Defining Situational Methods (MK, SB, FH, GW), pp. 303–317.
CAiSECAiSE-1997-PastorIPRM #formal method #named #object-oriented
OO-METHOD: An OO Software Production Environment Combining Conventional and Formal Methods (OP, EI, VP, JRR, JM), pp. 145–158.
CAiSECAiSE-1997-PohlDJ #towards
Towards Method-Driven Trace Capture (KP, RD, MJ), pp. 103–116.
EDOCEDOC-1997-IidaK #communication #corba #evaluation #reliability
Evaluation of a Method for Reliable Message Transfer Communication in CORBA (KI, JK), pp. 104–110.
ICMLICML-1997-CohenD #case study #comparative #fault #induction #logic programming #predict
A Comparative Study of Inductive Logic Programming Methods for Software Fault Prediction (WWC, PTD), pp. 66–74.
ICMLICML-1997-PrecupS #learning
Exponentiated Gradient Methods for Reinforcement Learning (DP, RSS), pp. 272–277.
ICMLICML-1997-SchapireFBL #effectiveness
Boosting the margin: A new explanation for the effectiveness of voting methods (RES, YF, PB, WSL), pp. 322–330.
KDDKDD-1997-BreitnerSW #database
Process-Based Database Support for the Early Indicator Method (CB, JS, RW), pp. 131–134.
KDDKDD-1997-CerquidesM #comparison #empirical
Proposal and Empirical Comparison of a Parallelizable Distance-Based Discretization Method (JC, RLdM), pp. 139–142.
KDDKDD-1997-HoS #named
Zeta: A Global Method for Discretization of Continuous Variables (KMH, PDS), pp. 191–194.
SIGIRSIGIR-1997-OgawaM #statistics #word
Overlapping Statistical Word Indexing: A New Indexing Method for Japanese Text (YO, TM), pp. 226–234.
SIGIRSIGIR-1997-SintichakisC
A Method for Monolingual Thesauri Merging (MS, PC), pp. 129–138.
ECOOPECOOP-1997-HolstS #framework #inheritance #object-oriented
A General Framework for Inheritance Management and Method Dispatch in Object-Oriented Languages (WH, DS), pp. 276–301.
OOPSLAOOPSLA-1997-BoylandC #implementation #java #multi
Parasitic Methods: An Implementation of Multi-Methods for Java (JB, GC), pp. 66–76.
TOOLSTOOLS-ASIA-1997-HungLC #experience #network #using
An Experience of Using FDOOA Method to Develop a Telecommunications Network Management System (YSH, WCL, CGC), pp. 320–329.
TOOLSTOOLS-ASIA-1997-PeiYJS #framework #modelling #object-oriented #parallel #using
A Method for Using Object-Oriented Frameworks to Support Various High-Level Parallel Computing Models (LP, DY, LJ, DLS), pp. 151–158.
TOOLSTOOLS-PACIFIC-1997-WongC #multi #type safety
Method Dispatching and Type Safety for Objects with Multiple Roles (RKW, HLC), pp. 286–296.
TOOLSTOOLS-USA-1997-AllenHF #uml #unification
Method Unification: UML and OML (RA, BHS, DF), p. 372.
TOOLSTOOLS-USA-1997-HolstS #incremental #object-oriented
Incremental Table-Based Method Dispatch for Reflective Object-Oriented Languages (WH, DS), p. 63–?.
TOOLSTOOLS-USA-1997-Mellor #development #realtime
Real-Time Development with the Shlaer-Mellor Method (SJM), p. 372.
TOOLSTOOLS-USA-1997-Walden #analysis #design #reuse
The BON Method: Analysis and Design for Reusability (KW), p. 372.
PPDPPLILP-1997-GallardoGR #concurrent #haskell #inheritance
Inheritance and Selective Methods Dispatching in Concurrent Haskell (JEG, FG, BCR), pp. 33–46.
POPLPOPL-1997-BourdoncleM #higher-order #multi #polymorphism
Type-Checking Higher-Order Polymorphic Multi-Methods (FB, SM), pp. 302–315.
RERE-1997-EasterbrookC #experience #formal method #specification
Formal Methods for V&V of Partial Specifications: An Experience RSeport (SME, JRC), pp. 160–168.
RERE-1997-Wieringa #object-oriented #requirements #specification
Advanced Object-Oriented Requirements Specification Methods (RW), p. 266.
SACSAC-1997-HaraHTN #network
Location Management Methods of Migratory Data Resources in ATM Networks (TH, KH, MT, SN), pp. 123–130.
SACSAC-1997-Li #effectiveness #evaluation #multi #performance
An efficient and effective performance evaluation method for multiprogrammed multiprocessor systems (KL), pp. 478–487.
SACSAC-1997-PerrizoZK #multi #query
A query processing method for data warehouses which contain multimedia (WP, ZZ, SK), pp. 323–327.
ICSEICSE-1997-BaresiOP #industrial #specification
Introducing Formal Specification Methods in Industrial Practice (LB, AO, MP), pp. 56–66.
ICSEICSE-1997-Curtis #lessons learnt #process #tutorial
Software Process Improvement: Methods and Lessons Learned (Tutorial) (BC), pp. 624–625.
ICSEICSE-1997-FaulkH #evolution #realtime #requirements #tutorial
Rigorous Requirements for Real-Time Systems: Evolution and Application of the SCR Method (Tutorial) (SRF, CLH), pp. 637–638.
ICSEICSE-1997-FischerL #formal method #multi #tutorial
Formal Methods for Broadband and Multimedia Systems (Tutorial) (SF, SL), pp. 665–666.
ICSEICSE-1997-Fowler #analysis #bibliography #design #object-oriented #tutorial
A Survey of Object Oriented Analysis and Design Methods (Tutorial) (MF), pp. 653–654.
ICSEICSE-1997-FranklHLS #reliability #testing
Choosing a Testing Method to Deliver Reliability (PGF, RGH, BL, LS), pp. 68–78.
ICSEICSE-1997-HeitmeyerKL #requirements #specification #tool support #validation #verification
The SCR Method for Formally Specifying, Verifying, and Validating Requirements: Tool Support (CLH, JK, BGL), pp. 610–611.
ICSEICSE-1997-NakajimaF #algebra #modelling #object-oriented #specification
An Object-Oriented Modeling Method for Algebraic Specifications in CafeOBJ (SN, KF), pp. 34–44.
ICSEICSE-1997-PodorizhnyO #case study #comparison #design #experience #modelling
The Criticality of Modeling Formalisms in Software Design Method Comparison: Experience Report (RMP, LJO), pp. 303–313.
ICSEICSE-1997-SullivanSM #architecture #formal method #standard #using
Using Formal Methods to Reason about Architectural Standards (KJS, JS, MM), pp. 503–513.
HPDCHPDC-1997-ArmstrongWYBB #component
Frame-Based Components for Generalized Particle Methods (RCA, PW, CY, MBP, NB), pp. 50–59.
HPDCHPDC-1997-HuL #adaptation #mobile
Adaptive Cache Invalidation Methods in Mobile Environments (QH, DLL), pp. 264–273.
HPDCHPDC-1997-LeeHL #mobile
Channel Allocation Methods for Data Dissemination in Mobile Computing Environments (WCL, QH, DLL), pp. 274–281.
HPDCHPDC-1997-SudoSS #scheduling #thread
Distributed-Thread Scheduling Methods for Reducing Page-Thrashing (YS, SS, SS), pp. 356–364.
SOSPSOSP-1997-NeefeWRCA #adaptation #file system #performance
Improving the Performance of Log-Structured File Systems with Adaptive Methods (JMN, DSR, AMC, RYW, TEA), pp. 238–251.
CADECADE-1997-BaaderT #approach #problem #word
A New Approach for Combining Decision Procedure for the Word Problem, and Its Connection to the Nelson-Oppen Combination Method (FB, CT), pp. 19–33.
CADECADE-1997-GiunchigliaRS #logic #testing
A New Method for Testing Decision Procedures in Modal Logics (FG, MR, RS), pp. 264–267.
CADECADE-1997-Wen-Tsun #automation #reasoning
The Char-Set Method and Its Applications to Automated Reasoning (WWT), pp. 1–3.
CAVCAV-1997-BoigelotBR #analysis #hybrid #linear #reachability
An Improved Reachability Analysis Method for Strongly Linear Hybrid Systems (Extended Abstract) (BB, LB, SR), pp. 167–178.
CAVCAV-1997-Boralv #industrial #tool support #verification
The Industrial Success of Verification Tools Based on Stålmarck’s Method (AB), pp. 7–10.
DACDAC-1996-Eiriksson #design #verification
Integrating Formal Verification Methods with A Conventional Project Design Flow (ÁTE), pp. 666–671.
DACDAC-1996-KrauterXDP #image
A Sparse Image Method for BEM Capacitance Extraction (BK, YX, EAD, LTP), pp. 357–362.
DACDAC-1996-SuzukiS #estimation #hardware #performance
Efficient Software Performance Estimation Methods for Hardware/Software Codesign (KS, ALSV), pp. 605–610.
ASEKBSE-1996-Darche #algorithm #automation #difference #generative #set
Set Differentiation: A Method for the Automatic Generation of Filtering Algorithms (FDD), p. 19.
HTHT-1996-ClearyB #automation #hypermedia
Practical Methods for Automating Linking in Structured Hypermedia Systems (CC, RB), pp. 31–41.
SIGMODSIGMOD-1996-HellersteinN #execution #query
Query Execution Techniques for Caching Expensive Methods (JMH, JFN), pp. 423–434.
SIGMODSIGMOD-1996-ZhangRL #clustering #database #named #performance #scalability
BIRCH: An Efficient Data Clustering Method for Very Large Databases (TZ, RR, ML), pp. 103–114.
VLDBVLDB-1996-BerckenS #data access #multi #query
Query Processing Techniques for Multiversion Access Methods (JVdB, BS), pp. 168–179.
ITiCSEITiCSE-1996-LuqueSSCFS #development #education #parallel
Parallel systems development in education: a guided method (EL, JS, RS, EC, JF, MS), pp. 156–158.
ICSMEICSM-1996-ChuYL #formal method #maintenance
A Formal Method for Software Maintenance (WCC, HY, PL), pp. 206–216.
WPCWPC-1996-Graham #testing #tool support #visualisation
A Method for The Formal Testing of Program Visualization Tools (TCNG), pp. 45–54.
PLDIPLDI-1996-RuttenbergGLS #compilation #heuristic #pipes and filters
Software Pipelining Showdown: Optimal vs. Heuristic Methods in a Production Compiler (JCR, GRG, WL, AS), pp. 1–11.
STOCSTOC-1996-AndrewsLMZ #automation #latency #network
Automatic Methods for Hiding Latency in High Bandwidth Networks (Extended Abstract) (MA, FTL, PTM, LZ), pp. 257–265.
ICALPICALP-1996-Lisovik #linear #set
Hard Sets Method and Semilinear Reservoir Method with Applications (LPL), pp. 219–231.
FMFME-1996-ArnoldBR #debugging #embedded #formal method
An Example of Use of Formal Methods to Debug an Embedded Software (AA, DB, JPR), pp. 649–661.
FMFME-1996-BicarreguiDW #analysis #formal method
Quantitative Analysis of an Application of Formal Methods (JB, JD, EW), pp. 60–73.
CSCWCSCW-1996-Wyner #coordination #design #distributed
The Language of Coordination: A Method for the Distributed Design of Complex Organizations (doctoral colloquium) (GMW), p. 446.
AdaEuropeAdaEurope-1996-EmeryHR #architecture #case study #experience
Experiences Applying a Practical Architectural Method (DEE, RFHI, TBR), pp. 471–484.
AdaEuropeAdaEurope-1996-LundqvistW #ada #object-oriented #using
Using Object-Oriented Methods in Ada 95 to Implement Linda (KL, GW), pp. 211–222.
CAiSECAiSE-1996-BatesBFL #analysis #formal method #guidelines #object-oriented
Guidelines for Formalizing Fusion Object-Oriented Analysis Methods (BWB, JMB, RBF, MMLP), pp. 222–233.
CAiSECAiSE-1996-MirbelC #design #integration
An Integration Method for Design Schemas (IM, JLC), pp. 457–475.
CIKMCIKM-1996-LeePHC #composition #query #using
Spatial Query Processing Using Object Decomposition Method (YJL, HHP, NHH, CWC), pp. 53–61.
ICMLICML-1996-GordonS #learning #parametricity #statistics
Nonparametric Statistical Methods for Experimental Evaluations of Speedup Learning (GJG, AMS), pp. 200–206.
ICPRICPR-1996-ArikiI #integration #recognition
Integration of face and speaker recognition by subspace method (YA, NI), pp. 456–460.
ICPRICPR-1996-ArmandeMM #3d
A 3D thin nets extraction method for medical imaging (NA, PM, OM), pp. 642–646.
ICPRICPR-1996-BonifaziMNP #classification #image #industrial #recognition
The classification of industrial sand-ores by image recognition methods (GB, PM, LN, GP), pp. 174–179.
ICPRICPR-1996-ChenL96c #novel #using
A novel form structure extraction method using strip projection (JLC, HJL), pp. 823–827.
ICPRICPR-1996-ChiaCY #re-engineering #using
Curved surface reconstruction using a simple structured light method (TLC, ZC, CJY), pp. 844–848.
ICPRICPR-1996-ChiangY #recognition
A method for improving the machine recognition of confusing Chinese characters (CCC, SSY), pp. 79–83.
ICPRICPR-1996-ChouFF #online #recognition
Radical-based neighboring segment matching method for on-line Chinese character recognition (KSC, KCF, TIF), pp. 84–88.
ICPRICPR-1996-DeguchiN #interactive #matrix #using #visual notation
Visual servoing using eigenspace method and dynamic calculation of interaction matrices (KD, TN), pp. 302–306.
ICPRICPR-1996-HeydenR #evaluation #using
Evaluation of corner extraction schemes using invariance methods (AH, KR), pp. 895–899.
ICPRICPR-1996-HoriuchiYY #nondeterminism #robust
Robust relaxation method for structural matching under uncertainty (TH, KY, HY), pp. 176–180.
ICPRICPR-1996-HuangPC #using
Shape from shading using Ritz method with tent basis (CKH, CP, WTC), pp. 398–402.
ICPRICPR-1996-HwangB #classification #network #performance #recognition
An efficient method to construct a radial basis function neural network classifier and its application to unconstrained handwritten digit recognition (YSH, SYB), pp. 640–644.
ICPRICPR-1996-KawataniSM #recognition
Handwritten numeral recognition with the improved LDA method (TK, HS, MM), pp. 441–446.
ICPRICPR-1996-Kita #using
Force-based registration method using attribute values (YK), pp. 34–39.
ICPRICPR-1996-KnipeL #composition #re-engineering
A new quadtree decomposition reconstruction method (JK, XL), pp. 364–369.
ICPRICPR-1996-LamY96a #image
An Improved Method for Locating and Extracting the Eye in Human Face Images (KML, HY).
ICPRICPR-1996-LanitisSTCM #image #modelling
A general non-linear method for modelling shape and locating image objects (AL, PDS, CJT, TFC, ECDM), pp. 266–270.
ICPRICPR-1996-LaunayBMBM #3d #flexibility #re-engineering
A flexible iterative method for 3D reconstruction from X-ray projections (LL, PB, EM, MOB, JLM), pp. 513–517.
ICPRICPR-1996-LeeKB #recognition
Highly accurate recognition of printed Korean characters through an improved grapheme recognition method (JSL, OJK, SYB), pp. 447–451.
ICPRICPR-1996-LeeL #verification
An off-line method for human signature verification (LLL, MGL), pp. 195–198.
ICPRICPR-1996-LeeL96a #image
A lossless image compression method for human static signatures (LLL, MGL), pp. 910–913.
ICPRICPR-1996-MariD #clustering #fuzzy #segmentation
A segmentation method based on fuzzy topology and clustering (MM, SGD), pp. 565–569.
ICPRICPR-1996-MinCL #documentation #estimation #performance #reduction
A data reduction method for efficient document skew estimation based on Hough transformation (YM, SBC, YL), pp. 732–736.
ICPRICPR-1996-Nagao #2d #using
Direct methods for evaluating the planarity and rigidity of a surface using only 2D views (KN), pp. 417–422.
ICPRICPR-1996-NishimuraK0HNNO #image #locality #using
Effect of time-spatial size of motion image for localization by using the spotting method (TN, HK, YI, AH, SN, SN, RO), pp. 191–195.
ICPRICPR-1996-NodaSK #image #modelling #segmentation
An MRF model-based method for unsupervised textured image segmentation (HN, MNS, EK), pp. 765–769.
ICPRICPR-1996-Nouza #feature model #markov #modelling #recognition #speech
Feature selection methods for hidden Markov model-based speech recognition (JN), pp. 186–190.
ICPRICPR-1996-OkamotoYSY #network #online #string #using
On-line handwriting character string separation method using network expression (MO, HY, KS, KY), pp. 422–425.
ICPRICPR-1996-SaidCS #performance
Dynamical morphological processing: a fast method for base line extraction (JNS, MC, CYS), pp. 8–12.
ICPRICPR-1996-Schikuta #clustering #named #performance #scalability #set
Grid-clustering: an efficient hierarchical clustering method for very large data sets (ES), pp. 101–105.
ICPRICPR-1996-Shimshoni #3d #image #nondeterminism #performance #recognition
A fast method for estimating the uncertainty in the location of image points in 3D recognition (IS), pp. 590–594.
ICPRICPR-1996-StarkF #3d
A method for tracking the pose of known 3-D objects based on an active contour model (KS, SF), pp. 905–909.
ICPRICPR-1996-WatanabeLTY #gesture #interactive #realtime #recognition
A method of real-time gesture recognition for interactive systems (SW, CWL, AT, MY), pp. 473–477.
ICPRICPR-1996-WatanabeTO #analysis #recognition
A moving object recognition method by optical flow analysis (MW, NT, KO), pp. 528–533.
ICPRICPR-1996-YamadaT #sequence
Elastic edge sequence matching method for global extraction and local tracking of echocardiogram (HY, KT), pp. 637–641.
KDDKDD-1996-ArningAR #database #detection #linear #scalability
A Linear Method for Deviation Detection in Large Databases (AA, RA, PR), pp. 164–169.
KDDKDD-1996-KaufmanM #information management #multi #reasoning
A Method for Reasoning with Structured and Continuous Attributes in the INLEN-2 Multistrategy Knowledge Discovery System (KAK, RSM), pp. 232–237.
KDDKDD-1996-TeranoI #induction #information management #interactive #learning #using
Interactive Knowledge Discovery from Marketing Questionnaire Using Simulated Breeding and Inductive Learning Methods (TT, YI), pp. 279–282.
KRKR-1996-Sandewall #constraints
Assessments of Ramification Methods that Use Static Domain Constraints (ES), pp. 99–110.
KRKR-1996-SmirnovV #contest #integer #performance #programming #representation
Efficiency Competition through Representation Changes: Pigeonhole Principle vs. Integer Programming Methods (YVS, MMV), pp. 124–134.
SEKESEKE-1996-HsiaLK #approach #sequence #testing
An Early Warning Approach for Method Sequence Testing (PH, XL, DCK), pp. 330–337.
SEKESEKE-1996-JamoussiB #generative #monte carlo #performance #random testing #testing
Efficient Monte Carlo Method for Generating Random Test Data from Irregular Test Regions (AJ, FBB), pp. 17–24.
SEKESEKE-1996-MillsG #approach #automation #concurrent #design #knowledge-based #realtime
A Knowledge-based Approach for Automating a Design Method for Concurrent and Real-Time Systems (KLM, HG), pp. 529–536.
SEKESEKE-1996-SlivaMS #communication #protocol
A Method for Applying G-Nets To Communication Protocols (VPS, TM, SMS), pp. 145–152.
SEKESEKE-1996-ZhangZ #evolution #visual notation
Developing Visual Languages Through an Evolving Method (KZ, DQZ), pp. 514–521.
SIGIRSIGIR-1996-CohenS #categorisation #learning
Context-sensitive Learning Methods for Text Categorization (WWC, YS), pp. 307–315.
SIGIRSIGIR-1996-HullPS #documentation
Method Combination For Document Filtering (DAH, JOP, HS), pp. 279–287.
SIGIRSIGIR-1996-Kwok #ad hoc #query #retrieval
A New Method of Weighting Query Terms for Ad-Hoc Retrieval (KLK), pp. 187–195.
ECOOPECOOP-1996-AmielD #ambiguity #multi
Supporting Explicit Disambiguation of Multi-Methods (EA, ED), pp. 167–188.
ECOOPECOOP-1996-KonoKM #distributed #implementation #memory management #using
An Implementation Method of Migratable Distributed Objects Using an RPC Technique Integrated with Virtual Memory Management (KK, KK, TM), pp. 295–315.
OOPSLAOOPSLA-1996-Moore #automation #inheritance #refactoring
Automatic Inheritance Hierarchy Restructuring and Method Refactoring (IM), pp. 235–250.
REICRE-1996-Cheng #formal method #how #question #requirements
Where and How do Formal Methods Fit in Requirements Engineering? (BHCC), pp. 154–156.
REICRE-1996-GonzalesW #design #process
A facilitator method for upstream design activities with diverse stakeholders (RMG, ALW), pp. 190–198.
REICRE-1996-Hudlicka #comparison #elicitation #requirements
Requirements Elicitation with Indirect Knowledge Elicitation Techniques: Comparison of Three Methods (EH), pp. 4–11.
REICRE-1996-RollandP #modelling #process #using
Using Generic Method Chunks to Generate Process Models Fragments (CR, VP), pp. 173–181.
FSEFSE-1996-Jackson #problem
Problems, Methods, and Structures (Abstract) (MJ), p. 1.
ICSEICSE-1996-Kontio #case study #off the shelf
A Case Study in Applying a Systematic Method for COTS Selection (JK), pp. 201–209.
CADECADE-1996-ParkG #clustering #satisfiability #scalability #testing
Partitioning Methods for Satisfiability Testing on Large Formulas (TJP, AVG), pp. 748–762.
CADECADE-1996-RousselM #compilation
A New Method for Knowledge Compilation: The Achievement by Cycle Search (OR, PM), pp. 493–507.
CAVCAV-1996-Rushby #automation #deduction #formal method
Automated Deduction and Formal Methods (JMR), pp. 169–183.
ISSTAISSTA-1996-CrowleyLL #automation #formal method #testing
Issues in the Full Scale Use of Formal Methods for Automated Testing (JLC, JFL, KAL), pp. 71–78.
ISSTAISSTA-1996-GodefroidPS #concurrent #industrial #partial order #source code #using #validation
Using Partial-Order Methods in the Formal Validation of Industrial Concurrent Programs (PG, DP, MGS), pp. 261–269.
ICLPJICSLP-1996-TamuraK #compilation #linear #logic programming #programming language #resource management
Resource Management Method for a Compiler System of a Linear Logic Programming Language (Poster Abstract) (NT, YK), p. 545.
ICLPJICSLP-1996-Zhou #implementation #novel
A Novel Implementation Method of Delay (NFZ), pp. 97–111.
LICSLICS-1996-WillemsW #branch #linear #model checking #partial order
Partial-Order Methods for Model Checking: From Linear Time to Branching Time (BW, PW), pp. 294–303.
DACDAC-1995-FrenchLLO #compilation #simulation
A General Method for Compiling Event-Driven Simulations (RSF, MSL, JRL, KO), pp. 151–156.
DACDAC-1995-NakamuraY #clustering #logic #matrix #optimisation #scalability
A Partitioning-Based Logic Optimization Method for Large Scale Circuits with Boolean Matrix (YN, TY), pp. 653–657.
DACDAC-1995-ReddyKP #framework #novel #synthesis #verification
Novel Verification Framework Combining Structural and OBDD Methods in a Synthesis Environment (SMR, WK, DKP), pp. 414–419.
DACDAC-1995-StanionS #synthesis
A Method for Finding Good Ashenhurst Decompositions and Its Application to FPGA Synthesis (TS, CS), pp. 60–64.
DACDAC-1995-TelicheveskyKW #analysis #performance
Efficient Steady-State Analysis Based on Matrix-Free Krylov-Subspace Methods (RT, KSK, JW), pp. 480–484.
ICDARICDAR-v1-1995-ArikiM #recognition #segmentation #using
Segmentation and recognition of handwritten characters using subspace method (YA, YM), pp. 120–123.
ICDARICDAR-v1-1995-DeseillignyMS #re-engineering #recognition #string
Characters string recognition on maps, a method for high level reconstruction (MPD, HLM, GS), pp. 249–252.
ICDARICDAR-v1-1995-Don #documentation #image
A noise attribute thresholding method for document image binarization (HSD), pp. 231–234.
ICDARICDAR-v1-1995-JoeL #recognition
A combined method on the handwritten character recognition (MJJ, HJL), pp. 112–115.
ICDARICDAR-v1-1995-MenierLG #modelling #online #recognition
A new modeling method for on-line handwriting recognition (GM, GL, PG), pp. 499–503.
ICDARICDAR-v1-1995-ShimadaMMH #parallel #recognition
Agent-based parallel recognition method of contour lines (SS, KM, AM, KH), pp. 154–157.
ICDARICDAR-v1-1995-TakasuSK #documentation #image #learning
A rule learning method for academic document image processing (AT, SS, EK), pp. 239–242.
ICDARICDAR-v1-1995-WangY #editing #image
Block selection: a method for segmenting a page image of various editing styles (SYW, TY), pp. 128–133.
ICDARICDAR-v2-1995-CongedoDIP #recognition
A structural method with local refining for handwritten character recognition (GC, GD, SI, GP), pp. 853–856.
ICDARICDAR-v2-1995-Hirayama #analysis #using
A method for table structure analysis using DP matching (YH), pp. 583–586.
ICDARICDAR-v2-1995-LiH #robust
A Robust Method of Extracting Rectangle Blocks for Form Reading (XL, JH), p. 760–?.
ICDARICDAR-v2-1995-MalaviyaP #fuzzy
Extracting meaningful handwriting features with fuzzy aggregation method (AM, LP), pp. 841–844.
ICDARICDAR-v2-1995-Randriamasy #benchmark #image #metric
A set-based benchmarking method for address bloc location on arbitrarily complex grey level images (SR), pp. 619–622.
ICDARICDAR-v2-1995-Shieh #recursion
Recursive morphological sieve method for searching pictorial point symbols on maps (JSS), pp. 931–935.
ICDARICDAR-v2-1995-SivaramakrishnanPHSH #classification #documentation #generative #using
Zone classification in a document using the method of feature vector generation (RS, ITP, JH, SS, RMH), pp. 541–544.
ICDARICDAR-v2-1995-SrikantanLF #comparison #normalisation #recognition
Comparison of normalization methods for character recognition (GS, DSL, JTF), pp. 719–722.
ICDARICDAR-v2-1995-TakahashiM #clustering
A clustering method and radius tuning by end users (HT, KMM), pp. 698–701.
ICDARICDAR-v2-1995-ToraichiHH
Observation method for mathematical graphology (KT, TH, RH), pp. 656–659.
ICDARICDAR-v2-1995-YuTS #detection #documentation
Document skew detection based on the fractal and least squares method (CLY, YYT, CYS), pp. 1149–1152.
ICDARICDAR-v2-1995-ZhouHL #classification #recognition
A method of Jia Gu Wen recognition based on a two-level classification (XLZ, XCH, FL), pp. 833–836.
PODSPODS-1995-AndriesCPB #set
Applying an Update Method to a Set of Receivers (MA, LC, JP, JVdB), pp. 208–218.
VLDBVLDB-1995-AmmannJR #formal method #semantics #transaction #using
Using Formal Methods to Reason about Semantics-Based Decompositions of Transactions (PA, SJ, IR), pp. 218–227.
CSEETCSEE-1995-AlmstrumBF #education #research
Research Methods in Computer Science Education (VLA, DB, AEF), p. 449.
CSEETCSEE-1995-ScottC #programming #student
Team Selection Methods for Student Programming Projects (TJS, JHCI), pp. 295–303.
ICSMEICSM-1995-DeBaudR #domain model #modelling #re-engineering #using
A software re-engineering method using domain models (JMD, SR), pp. 204–213.
ICSMEICSM-1995-ShimomuraOCO #independence
An independent software-modification method (TS, YO, TC, TO), pp. 214–221.
WCREWCRE-1995-EdwardsM #logic #using
Deriving a Logical Data Model for a System Using the RECAST Method (HME, MM).
STOCSTOC-1995-MillerTTW #generative
A Delaunay based numerical method for three dimensions: generation, formulation, and partition (GLM, DT, SHT, NW), pp. 683–692.
ICALPICALP-1995-GrecoSZ #automaton #logic programming #source code
The PushDown Method to Optimize Chain Logic Programs (Extended Abstract) (SG, DS, CZ), pp. 523–534.
CHICHI-1995-JohnP #approach #case study #learning #using
Learning and Using the Cognitive Walkthrough Method: A Case Study Approach (BEJ, HP), pp. 429–436.
CHICHI-1995-RoeslerM #data access #online #taxonomy #what
What Help Do Users Need?: Taxonomies for On-Line Information Needs and Access Methods (AWR, SGM), pp. 437–441.
CHICHI-1995-WiedenbeckZM #empirical #online
End-User Training: An Empirical Study Comparing On-Line Practice Methods (SW, PLZ, DSM), pp. 74–81.
AdaEuropeAdaEurope-1995-Simoens #analysis #design #development #lifecycle #metric #object-oriented
The Introduction of an Object-Oriented Analysis/Design Method and Object-Oriented Metrics in the Software Development Life-Cycle (RS), pp. 271–283.
AdaTRI-Ada-1995-Ogren95a #case study #development #experience
Experiences from Trial Use of MIL-STD-498 in Connection with the O4S (Objects for Systems) Development Method (), pp. 773–789.
CAiSECAiSE-1995-OliveS #behaviour #concept #modelling
A Method for Explaining the Behaviour of Conceptual Models (AO, MRS), pp. 12–25.
CAiSECAiSE-1995-RossiB #metric
Metrics in Method Engineering (MR, SB), pp. 200–216.
CIKMCIKM-1995-AbdelmotyE #database #reasoning
A General Method for Spatial Reasoning in Spatial Databases (AIA, BAEG), pp. 312–317.
CIKMCIKM-1995-KimC #information retrieval #parallel #performance
A New Parallel Signature File Method for Efficient Information Retrieval (JKK, JWC), pp. 66–73.
KDDKDD-1995-KohaviS #set #using
Feature Subset Selection Using the Wrapper Method: Overfitting and Dynamic Search Space Topology (RK, DS), pp. 192–197.
KDDKDD-1995-TsumotoT #automation #induction #multi #recursion #statistics #testing
Automated Selection of Rule Induction Methods Based on Recursive Iteration of Resampling Methods and Multiple Statistical Testing (ST, HT), pp. 312–317.
SEKESEKE-1995-He #formal method #petri net
PZ Nets- A Formal Method Integrating Petri Nets with Z (XH), pp. 173–180.
SEKESEKE-1995-Sliva #synthesis
A G-Net Module Synthesis Method for Software Applications (VPS), pp. 419–426.
SEKESEKE-1995-Stanbrough
An object view = methods + events (DS), pp. 80–86.
SIGIRSIGIR-1995-Fuhr #datalog #logic #probability #retrieval
Probabilistic Datalog — A Logic For Powerful Retrieval Methods (NF), pp. 282–290.
SACSAC-1995-BironK #feedback #information retrieval #performance
New methods for relevance feedback: improving information retrieval performance (PVB, DHK), pp. 482–487.
SACSAC-1995-HalgamugeBG #algorithm #classification #comparison #generative #heuristic #rule-based #search-based
Comparison of a heuristic method with a genetic algorithm for generation of compact rule based classifiers (SKH, AB, MG), pp. 580–585.
SACSAC-1995-ToliasTP #detection #fuzzy #image
Detecting aneurysms in retinal images: fuzzy morphology vs. conventional methods (YAT, IBT, SMP), pp. 565–569.
ICSEICSE-1995-ArdisCJMPSO #case study #experience #framework #specification
A Framework for Evaluating Specification Methods for Reactive Systems: Experience Report (MAA, JAC, LJJ, PM, CP, MGS, JVO), pp. 159–168.
ICSEICSE-1995-KangK #named #realtime #specification #verification
PARTS: A Temporal Logic-Based Real-Time Software Specification and Verification Method (KCK, KIK), pp. 169–176.
CAVCAV-1995-EirikssonM #analysis #case study #design #using #verification
Using Formal Verification/Analysis Methods on the Critical Path in System Design: A Case Study (ÁTE, KLM), pp. 367–380.
CAVCAV-1995-Emerson #calculus #model checking #tutorial #μ-calculus
Methods for μ-calculus Model Checking: A Tutorial (Abstract) (EAE), p. 141.
ICLPICLP-1995-ChengPE #equation #implementation #logic programming #source code
A Method for Implementing Equational Theories as Logic Programs (MHMC, DSPJ, MHvE), pp. 497–511.
ICLPICLP-1995-ChiuL #constraints #linear #theorem proving #using
Interval Linear Constraint Solving Using the Preconditioned Interval Gauss-Seidel Method (CKC, JHML), pp. 17–31.
ICLPICLP-1995-Sato #learning #logic programming #semantics #source code #statistics
A Statistical Learning Method for Logic Programs with Distribution Semantics (TS), pp. 715–729.
ICLPILPS-1995-FerrandL #composition #correctness #logic programming #proving #source code
A Compositional Proof Method of Partial Correctness for Normal Logic Programs (GF, AL), pp. 209–223.
DACDAC-1994-ChakrabartyH #named #testing
DFBT: A Design-for-Testability Method Based on Balance Testing (KC, JPH), pp. 351–357.
DACDAC-1994-McMillan #design #formal method
Fitting Formal Methods into the Design Cycle (KLM), pp. 314–319.
DACDAC-1994-TsuiPD #approximate
Exact and Approximate Methods for Calculating Signal and Transition Probabilities in FSMs (CYT, MP, AMD), pp. 18–23.
DACDAC-1994-VerlindKJLM #abstraction #communication #performance #verification
A Time Abstraction Method for Efficient Verification of Communicating Systems (EV, TK, GGdJ, BL, HDM), pp. 609–614.
DATEEDAC-1994-AkitaA #logic #power management #probability
A Method for Reducing Power Consumption of CMOS Logic Based on Signal Transition Probability (JA, KA), pp. 420–424.
DATEEDAC-1994-WangD #approximate #linear #optimisation #performance #using
An Efficient Yield Optimization Method Using A Two Step Linear Approximation of Circuit Performance (ZW, SWD), pp. 567–571.
DATEEDAC-1994-WuTWL #behaviour #synthesis
A Synthesis Method for Mixed Synchronous / Asynchronous Behavior (TYW, TCT, ACHW, YLL), pp. 277–281.
SIGMODSIGMOD-1994-MohanN #architecture #database #named
ARIES/CSA: A Method for Database Recovery in Client-Server Architectures (CM, IN), pp. 55–66.
VLDBVLDB-1994-MedianoCD #named
V-Trees — A Storage Method for Long Vector Data (MRM, MAC, MD), pp. 321–330.
VLDBVLDB-1994-NgH #clustering #data mining #effectiveness #mining #performance
Efficient and Effective Clustering Methods for Spatial Data Mining (RTN, JH), pp. 144–155.
CSEETCSEE-1994-Dodani #formal method #re-engineering
Formal Methods for Software Engineering (MD), p. 597.
CSEETCSEE-1994-Gomaa #concurrent #design #realtime
Software Design Methods for Concurrent and Real-Time Systems (HG), p. 341.
ICSMEICSM-1994-CanforaCTM #data type #identification #precise #reuse
A Precise Method for Identifying Reusable Abstract Data Types in Code (GC, AC, MT, MM), pp. 404–413.
STOCSTOC-1994-AlonYZ #graph #named #scalability
Color-coding: a new method for finding simple paths, cycles and other small subgraphs within large graphs (NA, RY, UZ), pp. 326–335.
STOCSTOC-1994-VavasisY
An accelerated interior point method whose running time depends only on A (extended abstract) (SAV, YY), pp. 512–521.
ICALPICALP-1994-BuhrmanT #bound #on the
On the Cutting Edge of Relativization: The Resource Bounded Injury Method (HB, LT), pp. 263–273.
FMFME-1994-BowenH #formal method
Seven More Myths of Formal Methods (JPB, MGH), pp. 105–117.
FMFME-1994-DehboneiM #formal method #industrial
Formal Methods in the Railways Signalling Industry (BD, FM), pp. 26–34.
FMFME-1994-GuttmanJ #formal method
Three Applications of Formal Methods at MITRE (JDG, DMJ), pp. 55–65.
FMFME-1994-StoreyH #using
A Strategy for the Production of Verifiable Code Using the B Method (AS, HPH), pp. 346–365.
CHICHI-1994-McDanielOO94a #human-computer #object-oriented
Methods in search of methodology — combining HCI and object orientation (SEM, GMO, JSO), pp. 145–151.
AdaEuropeAdaEurope-1994-ArberetD #memory management #tool support
Test Methods and Tools for SOHO Mass Memory Unit Software (PA, LD), pp. 121–129.
AdaEuropeAdaEurope-1994-HagelsteinB #requirements
A Front-End to HOOD — The Clyder Requirements Engineering Method (JH, DR), pp. 60–62.
AdaEuropeAdaEurope-1994-Schneeweiss #object-oriented
Shlaer/Mellor or Rumbaugh? A Discussion of two Popular Object-Oriented Methods (HS), pp. 155–161.
AdaEuropeAdaEurope-1994-Taylor #development #formal method
Formal Methods for a Space Software Development Environment (PT), pp. 90–103.
AdaTRI-Ada-1994-HollowayVGS #formal method
Formal Methods Fact vs. Fiction (CMH, BLDV, DG, MS), pp. 256–258.
CAiSECAiSE-1994-SaekiW #design #specification
Specifying Software Specification & Design Methods (MS, KW), pp. 353–366.
CIKMCIKM-1994-RezendeH #abstraction #semantics #using
A Lock Method for KBMSs Using Abstraction Relationships’ Semantics (FdFR, TH), pp. 112–121.
ICMLICML-1994-AbeM #predict #probability
A New Method for Predicting Protein Secondary Structures Based on Stochastic Tree Grammars (NA, HM), pp. 3–11.
ICMLICML-1994-MahoneyM
Comparing Methods for Refining Certainty-Factor Rule-Bases (JJM, RJM), pp. 173–180.
KDDKDD-1994-Furnkranz #comparison #concept #learning #relational
A Comparison of Pruning Methods for Relational Concept Learning (JF), pp. 371–382.
KDDKDD-1994-TsumotoT #estimation #probability #recursion
Selection of Probabilistic Measure Estimation Method Based on Recursive Iteration of Resampling Methods (ST, HT), pp. 121–132.
KRKR-1994-GereviniS #performance #reasoning
An Efficient Method for Managing Disjunctions in Qualitative Temporal Reasoning (AG, LKS), pp. 214–225.
KRKR-1994-Niemela #reasoning
A Decision Method for Nonmomotonic Reasoning Based on Autoepistemic Reasoning (IN), pp. 473–484.
SEKESEKE-1994-HauslerL #re-engineering
From software craft to software engineering: the Cleanroom method (PAH, RCL), pp. 172–179.
SEKESEKE-1994-Holm #communication #modelling
The COMMODIOUS method — COMmunication MODelling as an aid to Illustrate the Organisational Use of Software (PH), pp. 10–19.
SIGIRSIGIR-1994-Gey #probability #using
Inferring Probability of Relevance Using the Method of Logistic Regression (FCG), pp. 222–231.
SIGIRSIGIR-1994-Paice #algorithm #evaluation
An Evaluation Method for Stemming Algorithms (CDP), pp. 42–50.
ECOOPECOOP-1994-ChenTK #multi #performance
Efficient Dynamic Look-Up Strategy for Multi-Methods (WC, VT, WK), pp. 408–431.
ECOOPECOOP-1994-LampingA
Methods as Assertions (JL, MA), pp. 60–80.
ECOOPECOOP-1994-VitekH #message passing #performance
Taming Message Passing: Efficient Method Look-Up for Dynamically Typed Languages (JV, RNH), pp. 432–449.
OOPSLAOOPSLA-1994-AmielGS #multi #optimisation #using
Optimizing Multi-Method Dispatch Using Compressed Dispatch Tables (EA, OG, ES), pp. 244–258.
OOPSLAOOPSLA-1994-ChambersL #multi
Typechecking and Modules for Multi-Methods (CC, GTL), pp. 1–15.
TOOLSTOOLS-EUROPE-1994-Carrillo-CastellonMP #smalltalk
Eiffel-like Assertions and Private Methods in Smalltalk (MCC, JGM, EP), pp. 479–488.
TOOLSTOOLS-EUROPE-1994-Fowler #analysis #comparison #design
Comparison of Analysis and Design Methods (MF), p. 517.
TOOLSTOOLS-EUROPE-1994-Mingins #eiffel
The Eiffel Method (CM), p. 509.
REICRE-1994-Ohnishi #requirements #visual notation
A visual software requirements definition method (AO), pp. 194–201.
REICRE-1994-ReizerAMP #formal method #requirements #specification #standard #using
Using formal methods for requirements specification of a proposed POSIX standard (NRR, GDA, BCM, PRHP), pp. 118–125.
REICRE-1994-White #analysis #comparative #embedded #requirements
Comparative analysis of embedded computer system requirements methods (SMW), pp. 126–134.
SACSAC-1994-GentherG #automation #classification #clustering #fuzzy #generative #using
Automatic generation of a fuzzy classification system using fuzzy clustering methods (HG, MG), pp. 180–183.
SACSAC-1994-RosenG #network #using
Training hard to learn networks using advanced simulated annealing methods (BER, JMG), pp. 256–260.
SACSAC-1994-RothermelT #bibliography #learning #logic
Test Review: a new method of computer-assisted learning to promote careful reading and logical skills (DR, GT), pp. 573–577.
ICSEICSE-1994-CheungK #analysis #behaviour #distributed #effectiveness
An Integrated Method for Effective Behaviour Analysis of Distributed Systems (SCC, JK), pp. 309–320.
ICSEICSE-1994-KazmanBWA #architecture #named
SAAM: A Method for Analyzing the Properties of Software Architectures (RK, LJB, MW, GDA), pp. 81–90.
ICSEICSE-1994-PorterV #detection #empirical #fault #requirements
An Experiment to Assess Different Defect Detection Methods for Software Requirements Inspections (AAP, LGV), pp. 103–112.
CADECADE-1994-Beckert
A Completion-Based Method for Mixed Universal and Rigid E-Unification (BB), pp. 678–692.
CADECADE-1994-BourelyCP #automation #modelling
A Method for Building Models Automatically. Experiments with an Extension of OTTER (CB, RC, NP), pp. 72–86.
CADECADE-1994-McPheeCG #geometry #proving #theorem #using
Mechanically Proving Geometry Theorems Using a Combination of Wu’s Method and Collins’ Method (NFM, SCC, XSG), pp. 401–415.
CAVCAV-1994-MihailP #on the #protocol #random #testing
On the Random Walk Method for Protocol Testing (MM, CHP), pp. 132–141.
ICLPICLP-1994-Kagedal #analysis #data flow #prolog
A Dataflow Analysis Method for Ground Prolog (AK), p. 746.
ICLPICLP-1994-Pedreschi #prolog #proving #runtime #source code
A Proof Method for Runtime Properties of Prolog Programs (DP), pp. 584–598.
ICLPILPS-1994-RameshC #prolog
A Portable Method of Integrating SLG Resolution into Prolog Systems (RR, WC), pp. 618–632.
ICLPILPS-1994-YuanY #effectiveness
A Simple but Effective Program Revision Method (LYY, JHY), p. 686.
ISSTAISSTA-1994-BochmannP #bibliography #protocol #testing
Protocol Testing: Review of Methods and Relevance for Software Testing (GvB, AP), pp. 109–124.
ISSTAISSTA-1994-Corbett #ada #analysis #concurrent #empirical #evaluation #source code
An Empirical Evaluation of Three Methods for Deadlock Analysis of Ada Tasking Programs (JCC), pp. 204–215.
DACDAC-1993-BamjiV #constraints #identification #named
MSTC: A Method for Identifying Overconstraints during Hierarchical Compaction (CB, RV), pp. 389–394.
DACDAC-1993-ChouCC #finite #modelling #performance #simulation #using
High-Speed Interconnect Modeling and High-Accuracy Simulation Using SPICE and Finite Element Methods (TYC, JC, ZJC), pp. 684–690.
DACDAC-1993-DaoMHOM
A Compaction Method for Full Chip VLSI Layouts (JD, NM, TH, CO, SM), pp. 407–412.
DACDAC-1993-GraebWA #analysis #optimisation #worst-case
Improved Methods for Worst-Case Analysis and Optimization Incorporating Operating Tolerances (HEG, CUW, KA), pp. 142–147.
DACDAC-1993-Kra #co-evolution #design #hardware
A Cross-Debugging Method for Hardware/Software Co-design Environments (YK), pp. 673–677.
DACDAC-1993-LewisP
A Negative Reinforcement Method for PGA Routing (FDL, WCCP), pp. 601–605.
DACDAC-1993-PomeranzRU #fault #generative #named #testing
NEST: A Non-Enumerative Test Generation Method for Path Delay Faults in Combinational Circuits (IP, SMR, PU), pp. 439–445.
DACDAC-1993-WooK #clustering #implementation #multi #performance
An Efficient Method of Partitioning Circuits for Multiple-FPGA Implementation. (NSW, JK), pp. 202–207.
ICDARICDAR-1993-AbeMNK #comparison #detection
Comparison of methods for detecting corner points from digital curves-a preliminary report (KA, RM, KN, TK), pp. 854–857.
ICDARICDAR-1993-GazzoloB #identification #realtime #recognition
Real time signature recognition: A method for personal identification (GG, LB), pp. 707–709.
ICDARICDAR-1993-HamanakaYT #feature model #online #recognition
On-line Japanese character recognition experiments by an off-line method based on normalization-cooperated feature extraction (MH, KY, JT), pp. 204–207.
ICDARICDAR-1993-Hirayama #documentation #image #segmentation
A block segmentation method for document images with complicated column structures (YH), pp. 91–94.
ICDARICDAR-1993-HoriuchiTYY #on the #recognition #using
On method of training dictionaries for handwritten character recognition using relaxation matching (TH, KT, KY, HY), pp. 638–641.
ICDARICDAR-1993-HoriuchiTYY93a #image #recognition #using
Stamped character recognition method using range image (TH, KT, HY, KY), pp. 782–785.
ICDARICDAR-1993-HoriuchiTYYI #optimisation #problem
Generalized interpretation of optimization methods for labeling problems (TH, KT, HY, KY, TI), pp. 6–9.
ICDARICDAR-1993-InoharaKSS #complexity #database #retrieval #using
Retrieval method of textile pictures database using a complexity scale (TI, KK, HS, SS), pp. 699–702.
ICDARICDAR-1993-JanssenDV #automation #evaluation
Evaluation method for an automatic map interpretation system for cadastral maps (RDTJ, RPWD, AMV), pp. 125–128.
ICDARICDAR-1993-KonnoH #algorithm #probability #semantics
Postprocessing algorithm based on the probabilistic and semantic method for Japanese OCR (AK, YH), pp. 646–649.
ICDARICDAR-1993-KuoW #segmentation
A new method for the segmentation of mixed handprinted Chinese/English characters (HHK, JFW), pp. 810–813.
ICDARICDAR-1993-LeeDKA #case study #functional
A study on a method of dividing machine-parts into functional groups for technical illustrations (IL, SD, TK, NA), pp. 886–889.
ICDARICDAR-1993-LeePT #evaluation #normalisation #performance #recognition
Performance evaluation of nonlinear shape normalization methods for the recognition of large-set handwritten characters (SWL, JSP, YT), pp. 402–407.
ICDARICDAR-1993-MarcelliLP #recognition
A structural indexing method for character recognition (AM, NL, TP), pp. 175–178.
ICDARICDAR-1993-MarukawaKSF #recognition #using
A post-processing method for handwritten Kanji name recognition using Furigana information (KM, MK, YS, HF), pp. 218–221.
ICDARICDAR-1993-Nagaishi #identification #induction #recognition
Identifying ability of a recognition method based on the field of induction (MN), pp. 926–929.
ICDARICDAR-1993-NakamuraSANK #string #using
A method for recognizing character strings from maps using linguistic knowledge (AN, OS, MA, CN, HK), pp. 561–564.
ICDARICDAR-1993-NakashimaKMSN #generative #image
A contour fill method for alpha-numeric character image generation (KN, MK, KM, YS, YN), pp. 722–725.
ICDARICDAR-1993-OhkuraSSH #on the #using
On discrimination of handwritten similar KANJI characters by subspace method using several features (MO, YS, MS, RH), pp. 589–592.
ICDARICDAR-1993-OkamotoT #hybrid #segmentation
A hybrid page segmentation method (MO, MT), pp. 743–746.
ICDARICDAR-1993-OzawaN #image
A character image enhancement method from characters with various background images (HO, TN), pp. 58–61.
ICDARICDAR-1993-SatohTK #collaboration #documentation #hypermedia
A collaborative supporting method between document processing and hypertext construction (SS, AT, EK), pp. 533–536.
ICDARICDAR-1993-TanakaKT #development #process
Development of a map vectorization method involving a shape reforming process (NT, TK, JT), pp. 680–683.
ICDARICDAR-1993-WebsterN #parallel #recognition
The feasibility of a parallel processing oriented character recognition method based on a dynamic model (RGW, MN), pp. 714–717.
ICDARICDAR-1993-YamamotoYM #parallel #re-engineering #recognition
Symbol recognition and surface reconstruction from topographic map by parallel method (KY, HY, SM), pp. 914–917.
ICDARICDAR-1993-YangHT #approximate #automation #identification #using
Automatic seal identification using fluency function approximation and relaxation matching method (YY, TH, KT), pp. 786–789.
ICDARICDAR-1993-YasudaYY #correlation #recognition
Effect of the perturbed correlation method for optical character recognition (MY, KY, HY), pp. 830–833.
ICDARICDAR-1993-YoshimuraSY #locality #recognition #using
A zip code recognition system using the localized arc pattern method (MY, TS, IY), pp. 183–186.
PODSPODS-1993-DenninghoffV #database
Database Method Schemas and Object Creation (KD, VV), pp. 265–275.
SIGMODSIGMOD-1993-AbiteboulLUW
Methods and Rules (SA, GL, HU, EW), pp. 32–41.
SIGMODSIGMOD-1993-MohanN #database #flexibility #performance
An Efficient and Flexible Method for Archiving a Data Base (CM, IN), pp. 139–146.
SIGMODSIGMOD-1993-SuLRD #estimation
An Instant and Accurate Estimation Method for Joins and Selection in a Retrieval-Intensive Environment (WS, YL, NR, YD), pp. 79–88.
VLDBVLDB-1993-Gal-OzGF #database #object-oriented
A Model of Methods Access Authorization in Object-oriented Databases (NGO, EG, EBF), pp. 52–61.
VLDBVLDB-1993-Mohan #effectiveness
A Cost-Effective Method for Providing Improved Data Availability During DBMS Restart Recovery After a Failure (CM), pp. 368–379.
ICSMECSM-1993-EdwardsM #lifecycle #logic #using
Abstracting the Logical Processing Life Cycle for Entities Using the RECAST Method (HME, MM), pp. 162–171.
WCREWCRE-1993-CanforaCM #data type #identification #reuse #reverse engineering
A Reverse Engineering Method for Identifying Reusable Abstract Data Types (GC, AC, MM), pp. 73–82.
WCREWCRE-1993-LanoH #reverse engineering
Integrating Formal and Structured Methods in Reverse Engineering (KL, HPH), pp. 17–26.
ICALPICALP-1993-DillencourtS
A Simple Method for Resolving Degeneracies in Delaunay Triangulations (MBD, WDS), pp. 177–188.
ICALPICALP-1993-Schonhage #adaptation #finite #parallel #performance
Fast Parallel Computation of Characteristic Polynomials by Leverrier’s POwer Sum Method Adapted to Fields of Finite Characteristic (AS), pp. 410–417.
FMFME-1993-BowenS #formal method #industrial #perspective #safety
The Industrial Take-up of Formal Methods in Safety-Critical and Other Areas: A Perspective (JPB, VS), pp. 183–195.
FMFME-1993-CraigenGR #formal method #industrial
Formal Methods Reality Check: Industrial Usage (DC, SLG, TR), pp. 250–267.
FMFME-1993-EngelhardtR #problem
Generalizing Abadi & Lamport’s Method to Solve a Problem Posed by A. Pnueli (KE, WPdR), pp. 294–313.
FMFME-1993-Hedlund #development #integration #object-oriented
The Integration of LOTOS with an Object Oriented Development Method (MH), pp. 73–82.
FMFME-1993-Jones #design #reasoning
Reasoning about Interference in an Object-Based Design Method (CBJ), pp. 1–18.
FMFME-1993-Jonkers #bibliography
An Overview of the SPRINT Method (HBMJ), pp. 403–427.
FMFME-1993-KalinichenkoNZ #composition #development #query #semantics #synthesis
Application of Composition Development Method for definition of SYNTHESIS information resource query language semantics (LAK, NSN, VZ), pp. 428–441.
FMFME-1993-Weber-Wulff #formal method #industrial
Selling Formal Methods to Industry (DWW), pp. 671–678.
HCIHCI-ACS-1993-Kirsch #communication #evaluation #modelling
Evaluation of Communication Methods for User Participation in Data Modelling (CK), pp. 558–563.
HCIHCI-ACS-1993-KishinoH #estimation #student
A Code Key-in Time Estimation Method for College Students (SK, YH), pp. 624–629.
HCIHCI-ACS-1993-MiwaFKO #communication #interface
A Method of Communication Between CAD and VR Interfaces (MM, MF, MK, TO), pp. 255–260.
HCIHCI-ACS-1993-PouraghabagherB #evaluation #eye tracking #monitoring #using
An Evaluation of Information Highlighting Methods on Computer Screens Using an Eye Movement Monitor (RP, DB), pp. 762–767.
HCIHCI-ACS-1993-SuzukiH #effectiveness #on the #variability
On a Simple and Effective Method to Analyze Heart Rate Variability (KS, YH), pp. 914–919.
HCIHCI-ACS-1993-WestlanderSCA #evaluation
The Success of an Ambtious Broad QWL Strategy — Our Methods of Evaluation and Interpretation of the Findings (GW, IS, BC, ), pp. 857–862.
HCIHCI-SHI-1993-DijkstraHD #editing
User Responses to an Editor Supporting Syntactic Selection Method (AD, CH, HD), pp. 627–632.
HCIHCI-SHI-1993-FaradayS #design #multi #towards
Toward a Walkthrough Method for Multimedia Design (PF, AGS), pp. 452–457.
HCIHCI-SHI-1993-KatoO #analysis #using
Task Analysis Method using the GOMS Model with Grouping (KK, KO), pp. 891–896.
HCIHCI-SHI-1993-KobayashiN #generative #online
A Method for Generating Messages of the On-Line Help System Based on a User Model and a Situational Model (YK, MN), pp. 621–626.
HCIHCI-SHI-1993-OgawaSTS #knowledge-based #scheduling
Experimental Method for Construction of a Knowledge-Based System for Shipping Berth Scheduling (MO, NS, TT, SS), pp. 315–320.
HCIHCI-SHI-1993-UenoO #design #network
A Design Guideline Search Method that Uses a Neural Network (KU, KO), pp. 27–32.
HCIHCI-SHI-1993-Warren #approach #development #modelling #realtime #safety #tool support
The TOM Approach to System Development: Methods and Tools for Task Oriented Modelling of Real-Time Safety Critical Systems (CW), pp. 285–290.
CHIINTERCHI-1993-NielsenP #empirical #heuristic #interface #usability
Estimating the relative usability of two interfaces: heuristic, formal, and empirical methods compared (JN, VLP), pp. 214–221.
AdaEuropeAdaEurope-1993-Tonndorf #ada #compilation #performance #validation
An Efficient Compiler Validation Method for Ada 9X (MT), pp. 95–107.
AdaTRI-Ada-1993-Frankel #ada #automation #perspective
Ada 9X and CASE: A Methods Perspective (MIF), pp. 200–210.
CAiSECAiSE-1993-BreuLSBPU #approach #architecture #development #distributed #information management
The BOS-Method Architecture: An Improved Structured Approach for the Development of Distributed Information Systems (MB, GL, BPdS, LB, MP, JCU), pp. 221–233.
CIKMCIKM-1993-LeeK #database #refinement #summary
A Hypothesis Refinement Method for Summary Discovery in Databases (DL, MHK), pp. 274–282.
CIKMCIKM-1993-MehtaGPN #generative #using
The OODB Path-Method Generator (PMG) Using Precomputed Access Relevance (AM, JG, YP, EJN), pp. 596–605.
CIKMCIKM-1993-Xie #encapsulation #optimisation #query
Optimization of Object Queries Containing Encapsulated Methods (ZX), pp. 451–460.
CIKMCIKM-1993-ZhangOCF #data type #optimisation #query #using
A Method of Using Semijoins to Optimizing Queries with ADT Functions (XZ, NO, HC, YF), pp. 723–725.
ICMLICML-1993-BrezellecS #bottom-up #learning #named
ÉLÉNA: A Bottom-Up Learning Method (PB, HS), pp. 9–16.
ICMLICML-1993-Schwartz #learning
A Reinforcement Learning Method for Maximizing Undiscounted Rewards (AS), pp. 298–305.
SEKESEKE-1993-ChangCCL #branch #empirical #generative #testing
An Empirical Study of Intelligent Test Case Generation Methods for Software Branch Coverage (KHC, JHCI, WHC, SSL), pp. 437–444.
SIGIRSIGIR-1993-OgawaBH #keyword #ranking #string #word
Simple Word Strings as Compound Keywords: An Indexing and Ranking Method for Japanese Texts (YO, AB, MH), pp. 227–236.
ECOOPECOOP-1993-CaseauP #higher-order #object-oriented
Attaching Second-Order Types to Methods in an Object-Oriented Language (YC, LP), pp. 142–160.
ECOOPECOOP-1993-SteyaertCDHLL
Nested Mixin-Methods in Agora (PS, WC, TD, KDH, CL, MVL), pp. 197–219.
TOOLSTOOLS-EUROPE-1993-LewerentzC #formal method #object-oriented
Formal Methods and Object-Orientation (CL, EC), p. 329.
TOOLSTOOLS-PACIFIC-1993-Duke #design #formal method #object-oriented #specification
Formal Methods for the Design and Specification of Object-Oriented Systems (RD), p. 324.
TOOLSTOOLS-PACIFIC-1993-PotterM #design #eiffel #object-oriented
Object-Oriented Design — the Eiffel Method (JP, CM), p. 320.
TOOLSTOOLS-USA-1993-Firesmith93a #development #named #object-oriented #realtime #scalability
ADM4: an Object-Oriented Development Method for Large, Complex Real Time Systems (DF), p. 558.
TOOLSTOOLS-USA-1993-Fowler #analysis #comparison #design #object-oriented
A Comparison of Object-Oriented Analysis and Design Methods (MF), p. 527.
PPDPPLILP-1993-AliK #implementation #novel #parallel
A Novel Method for Parallel Implementation of findall (KAMA, RK), pp. 235–245.
RERE-1993-BickertonS #classification #requirements
The classification of requirements engineering methods (MJB, JS), pp. 182–186.
RERE-1993-IshiharaSK #dependence #natural language #specification #using
A translation method from natural language specifications into formal specifications using contextual dependencies (YI, HS, TK), pp. 232–239.
SACSAC-1993-KelleherLD #equation #on the #parallel #performance #reduction
On the Performance of a Direct Parallel Method for Solving Separable Elliptic Equations Based on Block Cyclic Reduction (KK, SL, SKD), pp. 517–524.
SACSAC-1993-Sen #low cost #probability #set #using
Minimal Cost Set Covering Using Probabilistic Methods (SS), pp. 157–164.
SACSAC-1993-StansiferW #object-oriented #reuse
Method Reuse in Typed Object-Oriented Languages (RS, DW), pp. 63–70.
SACSAC-1993-ThangiahN #adaptation #using
Dynamic Trajectory Routing Using an Adaptive Search Method (SRT, KEN), pp. 131–138.
ESECESEC-1993-JengC #component #formal method #library #using
Using Formal Methods to Construct a Software Component Library (JJJ, BHCC), pp. 397–417.
ESECESEC-1993-Kunzmann-Combelles #approach
Quantitative Approach to Software Management: the ami Method (AKC), pp. 238–250.
ICSEICSE-1993-ArangoSPH #design
The Graft-Host Method for Design Change (GA, ES, RP, JCH), pp. 243–254.
ICSEICSE-1993-GerhartCR #formal method #industrial #using
Observations on Industrial Practice Using Formal Methods (SLG, DC, TR), pp. 24–33.
HPDCHPDC-1993-Kung #network #performance
New Flow Control Methods for High-Speed Networks (HTK), p. 4.
HPDCHPDC-1993-MullinTDS #communication #formal method #protocol #scheduling
Formal Method for Scheduling, Routing and Communication Protocol (LMRM, ST, DRD, EAS), pp. 234–242.
HPDCHPDC-1993-TungK #distributed
Distributed Control Methods (BT, LK), pp. 206–215.
CAVCAV-1993-GodefroidP #dependence #partial order #verification
Refining Dependencies Improves Partial-Order Verification Methods (Extended Abstract) (PG, DP), pp. 438–449.
ICLPILPS-1993-Fitting #logic programming #metric #semantics #source code
Metric Methods in the Semantics of Logic Programs (MF), pp. 69–71.
ICLPILPS-1993-Hui-Bon-Hoa #constraints
An Intuitionistic Resolution Method for a Language Dealing with Scope Constraints (AHBH), p. 667.
ISSTAISSTA-1993-DuriBDS #ada #analysis #concurrent #reduction #using
Using State Space Reduction Methods for Deadlock Analysis in Ada Tasking (SD, UAB, RD, SMS), pp. 51–60.
ICTSSIWPTS-1993-CavalliFP #consistency #formal method #testing
Formal Methods for Conformance Testing: Results and Perspectives (ARC, JPF, MP), pp. 3–17.
ICTSSIWPTS-1993-MottelerCS #fault #protocol #testing
Fault Coverage of UIO-based Methods for Protocol Testing (HEM, AC, DPS), pp. 21–34.
DACDAC-1992-ChiproutN #analysis #network
Generalized Moment-Matching Methods for Transient Analysis of Interconnect Networks (EC, MSN), pp. 201–206.
ASEKBSE-1992-SolderitschY #knowledge base #reuse #tool support #tutorial
Knowledge Based Software Reuse Methods and Tools: DoD STARS RLF Technology (Tutorial) (JS, DY), p. 1.
SIGMODSIGMOD-1992-Carter
Extending Ingres with Methods and Triggers (FC), p. 381.
SIGMODSIGMOD-1992-Lomet #multi #named
MLR: A Recovery Method for Multi-level Systems (DBL), pp. 185–194.
SIGMODSIGMOD-1992-LometS #concurrent
Access Method Concurrency with Recovery (DBL, BS), pp. 351–360.
SIGMODSIGMOD-1992-MohanL #concurrent #named #performance #using
ARIES/IM: An Efficient and High Concurrency Index Management Method Using Write-Ahead Logging (CM, FEL), pp. 371–380.
SIGMODSIGMOD-1992-MohanPL #flexibility #performance #transaction #version control
Efficient and Flexible Methods for Transient Versioning of Records to Avoid Locking by Read-Only Transactions (CM, HP, RAL), pp. 124–133.
VLDBVLDB-1992-LiSR #clustering #named #parallel
CMD: A Multidimensional Declustering Method for Parallel Data Systems (JL, JS, DR), pp. 3–14.
VLDBVLDB-1992-MoenkebergW #adaptation #evaluation #performance #robust
Performance Evaluation of an Adaptive and Robust Load Control Method for the Avoidance of Data-Contention Thrashing (AM, GW), pp. 432–443.
VLDBVLDB-1992-UrpiO #database #deduction
A Method for Change Computation in Deductive Databases (TU, AO), pp. 225–237.
CSEETSEI-1992-Garlan #design #education #formal method #trade-off
Formal Methods for Software Engineers: Tradeoffs in Curriculum Design (DG), pp. 131–142.
CSEETSEI-1992-Lutz #formal method #paradigm
Formal Methods and the Engineering Paradigm (MJL), pp. 121–130.
STOCSTOC-1992-Leighton #parallel
Methods for Message Routing in Parallel Machines (FTL), pp. 77–96.
CHICHI-1992-KaratCF #comparison #empirical #evaluation #testing #user interface
Comparison of empirical testing and walkthrough methods in user interface evaluation (CMK, RC, TF), pp. 397–404.
CHICHI-1992-LimL #design
A Method for (recruiting) Methods: Facilitating Human Factors Input to System Design (KYL, JBL), pp. 549–556.
CHICHI-1992-NilsenJOP
Method engineering: from data to model to practice (EN, HSJ, JSO, PGP), pp. 313–320.
AdaTRI-Ada-C-1992-FayadHRST #development #object-oriented #simulation
Hardware-In-the-Loop (HIL) Simulation: An Application of Colbert’s Object-Oriented Software Development Method (MF, LJH, MAR, JWS, WTT), pp. 176–188.
CAiSECAiSE-1992-Brough #automation #framework
Methods for CASE: A Generic Framework (MB), pp. 524–545.
CAiSECAiSE-1992-CostalO #concept #deduction #information management #modelling #reasoning
A Method for Reasoning About Deductive Conceptual Models of Information Systems (DC, AO), pp. 612–631.
CAiSECAiSE-1992-Dalianis #concept #generative #natural language #validation
A Method for Validating a Conceptual Model by Natural Language Discourse Generation (HD), pp. 425–444.
ICMLML-1992-BalaMW #induction
The Principal Axes Method for Constructive Induction (JWB, RSM, JW), pp. 20–29.
ICMLML-1992-ClouseU #education #learning
A Teaching Method for Reinforcement Learning (JAC, PEU), pp. 92–110.
SEKESEKE-1992-Hayes-RothETH #concept #distributed #tool support
Distributed Intelligent Control and Management: Concepts, Methods and Tools for Developing DICAM Applications (FHR, LDE, AT, BHR), pp. 235–244.
SEKESEKE-1992-HofstedeVNW #specification
Integrated Specification of Method and Graphic Knowledge (AHMtH, TFV, ERN, GMW), pp. 307–316.
SEKESEKE-1992-JacquesSGL #knowledge-based #user interface
A Knowledge-Based Method for Engineering Navigational Capability into User Interface Software (MSJ, DS, JG, LL), pp. 26–31.
SIGIRSIGIR-1992-RobertsonW #database #using
Searching for Historical Word-Forms in a Database of 17th-Century English Text Using Spelling-Correction Methods (AMR, PW), pp. 256–265.
ECOOPECOOP-1992-Chambers #multi #object-oriented
Object-Oriented Multi-Methods in Cecil (CC), pp. 33–56.
OOPSLAOOPSLA-1992-AndreR #incremental #optimisation
Optimizing Method Search with Lookup Caches and Incremental Coloring (PA, JCR), pp. 110–126.
OOPSLAOOPSLA-1992-MyersGZ #declarative #object-oriented #programming #prototype
Declarative Programming in a Prototype-Instance System: Object-Oriented Programming Without Writing Methods (BAM, DAG, BTVZ), pp. 184–200.
OOPSLAOOPSLA-1992-WanglerH #concept #interactive #visualisation
Visualizing Objects: Methods for Exploring Human Computer Interaction Concepts (MFW, PH), pp. 146–153.
TOOLSTOOLS-EUROPE-1992-BaelenLSR #named #object-oriented #specification
EROOS: An Entity-Relationship Based OO Specification Method (SVB, JL, ES, HVR), pp. 103–117.
TOOLSTOOLS-EUROPE-1992-BlakN #embedded #object-oriented #tool support
OO Methods and Tools for Embedded Applications, The Mjolner BETA System (LB, JN), pp. 359–367.
TOOLSTOOLS-USA-1992-Mitchell #object-oriented
Theoretical Basis of Object-Oriented Methods (JM), p. 272.
POPLPOPL-1992-Ohori #calculus #compilation #polymorphism
A Compilation Method for ML-Style Polymorphic Record Calculi (AO), pp. 154–165.
ICSEICSE-1992-Rosenblum #programming #towards
Towards a Method of Programming With Assertions (DSR), pp. 92–104.
HPDCHPDC-1992-BetelloRSR #clustering
Lattice Boltzmann Method on a Cluster of IBM RISC System/6000 Workstations (GB, GR, SS, FR), pp. 242–247.
CADECADE-1992-BeckertH #semantics #similarity
An Improved Method for Adding Equality to Free Variable Semantic Tableaux (BB, RH), pp. 507–521.
CADECADE-1992-Voronkov #logic #proving #standard #theorem proving
Theorem Proving in Non-Standard Logics Based on the Inverse Method (AV), pp. 648–662.
CSLCSL-1992-Creignou #linear #problem #proving #satisfiability
The Class of Problems that are Linear Equivalent to Satisfiability or a Uniform Method for Proving NP-Completeness (NC), pp. 115–133.
ICTSSIWPTS-1992-CavalliMK #automation #consistency #formal method #generative #protocol #specification #testing
Automated Protocol Conformance Test Generation Based on Formal Methods for LOTOS Specifications (ARC, PM, SUK), pp. 237–248.
ICTSSIWPTS-1992-Witteman #consistency #experience #protocol
Promoting the Local Test Method, GSM Protocol Conformance Test Experience (MFW), pp. 292–294.
ICLPJICSLP-1992-Cerrito #calculus #ll #unification
Herbrand Methods in Sequent Calculi: Unification in LL (SC), pp. 607–621.
ICLPJICSLP-1992-FerrandD #correctness #logic programming #proving #source code
Proof Method of Partial Correctness and Weak Completeness for Normal Logic Programs (GF, PD), pp. 161–174.
ICLPJICSLP-1992-SatohI #abduction #evaluation #logic programming #query
A Query Evaluation Method for Abductive Logic Programming (KS, NI), pp. 671–685.
DACDAC-1991-CrastesSS
A Technology Mapping Method Based On Perfect And Semi-Perfect Matchings (MC, KS, GS), pp. 93–98.
DACDAC-1991-MogakiKSY #constraints #layout
A Layout Improvement Method Based on Constraint Propagation for Analog LSI’s (MM, NK, NS, YY), pp. 510–513.
DACDAC-1991-PapachristouCH #design #self #synthesis
A Data Path Synthesis Method for Self-Testable Designs (CAP, SC, HH), pp. 378–384.
DACDAC-1991-Woo #heuristic
A Heuristic Method for FPGA Technology Mapping Based on the Edge Visibility (NSW), pp. 248–251.
SIGMODSIGMOD-1991-HansenU #dependence
An Extended Memoryless Inference Control Method: Accounting for Dependence in Table-level Controls (SCH, EAU), pp. 348–356.
SIGMODSIGMOD-1991-LouO #deduction #inheritance #named #object-oriented
LLO: An Object-Oriented Deductive Language with Methods and Method Inheritance (YL, ZMÖ), pp. 198–207.
VLDBVLDB-1991-DenninghoffV #parallel #power of #semantics
The Power of Methods With Parallel Semantics (KD, VV), pp. 221–232.
FMVDME-1991-1-Bril #algebra #specification #using
A Model-Oriented Method for Algebraic Specification using COLD-1 as Notation (RJB), pp. 106–124.
FMVDME-1991-2-AbrialLNSS
The B-Method (JRA, MKOL, DN, PNS, IHS), pp. 398–405.
FMVDME-1991-2-GoodY #development
Mathematical Methods for Digital Systems Development (DIG, WDY), pp. 406–430.
AdaEuropeAdaEurope-1991-BadaroM #ada #named #reuse
ROSE-Ada: a Method and a Tool to Help Reuse of Ada Codes (NB, TM), pp. 304–325.
CAiSECAiSE-1991-OrlowskaJ #algebra #relational
A Funtional Method of Data Processing based on Relational Algebra (MEO, KGJ), pp. 98–123.
KDDKDD-1991-McLeishYGS #bibliography
Discovery of Medical Diagnostic Information: An Overview of Methods and Results (MM, PY, MG, TS), pp. 477–490.
KRKR-1991-Myers #integration #logic
Universal Attachment: An Integration Method for Logic Hybrids (KLM), pp. 405–416.
ICMLML-1991-FawcettU #generative #hybrid
A Hybrid Method for Feature Generation (TF, PEU), pp. 137–141.
ICMLML-1991-LingN #comparison
Comparison of Methods Based on Inverse Resolution (XL, MAN), pp. 168–172.
ICMLML-1991-MaW #consistency #knowledge base #optimisation #performance
Improving the Performance of Inconsistent Knowledge Bases via Combined Optimization Method (YM, DCW), pp. 23–27.
ICMLML-1991-TecuciM #adaptation #learning #multi
A Method for Multistrategy Task-Adaptive Learning Based on Plausible Justifications (GT, RSM), pp. 549–553.
ECOOPECOOP-1991-MugridgeHH #multi #programming language #static typing
Multi-Methods in a Statically-Typed Programming Language (WBM, JH, JGH), pp. 307–324.
OOPSLAOOPSLA-1991-AgrawalDL #multi #static typing #type checking
Static Type Checking of Multi-Methods (RA, LGD, BGL), pp. 113–128.
LOPSTRLOPSTR-1991-Noel #nondeterminism
A Method for the Determinisation of Propositional Temporal Formulae (PN), pp. 276–296.
ESECESEC-1991-AmadorVA #design
Dynamically Replaceable Software: A Design Method (JA, BdV, AA), pp. 210–228.
ESECESEC-1991-Berzins #modelling #source code
Software Merge: Models and Methods for Combining Changes to Programs (VB), pp. 229–250.
ESECESEC-1991-DickL #approach #formal method #visual notation
Integrating Structured and Formal Methods: A Visual Approach to VDM (JD, JL), pp. 37–59.
ESECESEC-1991-Troy #quality
Impact of Methods on Productivity and Quality (RT), pp. 480–484.
ICSEICSE-1991-Craigen #formal method #tool support
Tool Support for Formal Methods (DC), pp. 184–185.
ICSEICSE-1991-Gerhart #formal method #perspective
Formal Methods: An International Perspective (SLG), pp. 36–37.
ICSEICSE-1991-JacobyT #evaluation #geometry #parametricity #reliability
Parameter Value Computation by Least Square Method and Evaluation of Software Availability and Reliability at Service-Operation by the Hyper-Geometric Distribution Software Reliability Growth Model (HGDM) (RJ, YT), pp. 226–237.
CAVCAV-1991-FrancescoI #process #semantics
A Semantic Driven Method to Check the Finiteness of CCS Processes (NDF, PI), pp. 266–276.
ICLPISLP-1991-HidakaKTT #clustering #commit #execution
A Static Load Partitioning Method based on Execution Profile for Committed Choice Languages (YH, HK, JT, HT), pp. 470–484.
ICTSSIWPTS-1991-ArakawaS #concurrent #generative #source code #testing
A Test Case Generation Method for Concurrent Programs (NA, TS), pp. 95–106.
ICTSSIWPTS-1991-DamKK #standard
Text Derivation for Standardised Test Methods (HvD, HK, EK), pp. 69–82.
ICTSSIWPTS-1991-Hogrefe91a #consistency #formal method #requirements
Session on Conformance Requirements and Test Purposes in the Context of Formal Methods (DH), pp. 289–290.
ISSTATAV-1991-Young #formal method #question #re-engineering
Formal Methods versus Software Engineering: Is There a Conflict? (WDY), pp. 188–189.
DACDAC-1990-KuoLW #analysis #fault
A Fault Analysis Method for Synchronous Sequential Circuits (TYK, JYL, JFW), pp. 732–735.
DACDAC-1990-MaoC #fault #testing
A Variable Observation Time Method for Testing Delay Faults (WM, MDC), pp. 728–731.
DACDAC-1990-McCormickA #analysis
Waveform Moment Methods for Improved Interconnection Analysis (SPM, JA), pp. 406–412.
DACDAC-1990-PapachristouK #algorithm #linear #optimisation #scheduling
A Linear Program Driven Scheduling and Allocation Method Followed by an Interconnect Optimization Algorithm (CAP, HK), pp. 77–83.
DACDAC-1990-Soukup #algorithm #database
Organized C: A Unified Method of Handling Data in CAD Algorithms and Databases (JS), pp. 425–430.
PODSPODS-1990-AbiteboulKW
Method Schemas (SA, PCK, EW), pp. 16–27.
PODSPODS-1990-Yannakakis #database #graph
Graph-Theoretic Methods in Database Theory (MY), pp. 230–242.
SIGMODSIGMOD-1990-BeckmannKSS #performance #robust
The R*-Tree: An Efficient and Robust Access Method for Points and Rectangles (NB, HPK, RS, BS), pp. 322–331.
SIGMODSIGMOD-1990-LometS #multi #performance
The Performance of a Multiversion Access Method (DBL, BS), pp. 353–363.
VLDBVLDB-1990-KitsuregawaO #database #parallel #robust
Bucket Spreading Parallel Hash: A New, Robust, Parallel Hash Join Method for Data Skew in the Super Database Computer (SDC) (MK, YO), pp. 210–221.
VLDBVLDB-1990-Mohan #concurrent #multi #named #transaction
ARIES/KVL: A Key-Value Locking Method for Concurrency Control of Multiaction Transactions Operating on B-Tree Indexes (CM), pp. 392–405.
VLDBVLDB-1990-Mohan90a #commit #named #novel #transaction
Commit_LSN: A Novel and Simple Method for Reducing Locking and Latching in Transaction Processing Systems (CM), pp. 406–418.
VLDBVLDB-1990-SeegerK #database #performance #robust
The Buddy-Tree: An Efficient and Robust Access Method for Spatial Data Base Systems (BS, HPK), pp. 590–601.
LISPLFP-1990-KiczalesR #performance
Efficient Method Dispatch in PCL (GK, LR), pp. 99–105.
CAiSECAiSE-1990-SmolanderTL #case study #how #tool support
How to Combine Tools and Methods in Practice — a Field Study (KS, VPT, KL), pp. 195–214.
ICMLML-1990-Lehman #learning
A General Method for Learning Idiosyncratic Grammars (JFL), pp. 368–376.
ICMLML-1990-UtgoffB #incremental #multi
An Incremental Method for Finding Multivariate Splits for Decision Trees (PEU, CEB), pp. 58–65.
SEKESEKE-1990-ChungK #automation #programming #specification
An Automatic Programming Method of Nonprocedural / Procedural Program Specification (MDC, YTK), pp. 222–227.
SIGIRSIGIR-1990-Egghe #formal method #information retrieval
A New Method for Information Retrieval, Based on the Theory of Relative Concentration (LE), pp. 469–493.
PPDPALP-1990-Bundgen #finite #term rewriting
Applying Term Rewriting Methods to Finite Groups (RB), pp. 332–346.
POPLPOPL-1990-Mitchell #inheritance #towards
Toward a Typed Foundation for Method Specialization and Inheritance (JCM), pp. 109–124.
CADECADE-1990-DoughertyJ
An Improved General E-Unification Method (DJD, PJ), pp. 261–275.
CADECADE-1990-Pierce #proving #towards
Toward Mechanical Methods for Streamlining Proofs (WP), pp. 351–365.
CAVCAV-1990-Godefroid #automation #partial order #using #verification
Using Partial Orders to Improve Automatic Verification Methods (PG), pp. 176–185.
ICLPCLP-1990-ChengER90 #functional #logic #on the #programming
On Warren’s Method for Functional Programming in Logic (MHMC, MHvE, BER), pp. 546–560.
ICLPCLP-1990-MuthukumarH90 #automation #definite clause grammar #independence #logic programming #parallel #source code
The DCG, UDG, and MEL Methods for Automatic Compile-time Parallelization of Logic Programs for Independent And-parallelism (KM, MVH), pp. 221–236.
DACDAC-1989-ChengY #difference #fault #memory management #performance #simulation #using
Differential Fault Simulation — a Fast Method Using Minimal Memory (WTC, MLY), pp. 424–428.
DACDAC-1989-Coppola #algorithm #analysis #logic
New Methods in the Analysis of Logic Minimization Data and Algorithms (AJC), pp. 226–231.
DACDAC-1989-MaoC #fault #testing
A Simplified Six-waveform Type Method for Delay Fault Testing (WM, MDC), pp. 730–733.
DACDAC-1989-MeijsG #finite #performance
An Efficient Finite Element Method for Submicron IC Capacitance Extraction (NPvdM, AJvG), pp. 678–681.
DACDAC-1989-SaucierDP #using
State Assignment Using a New Embedding Method Based on an Intersecting Cube Theory (GS, CD, FP), pp. 321–326.
HTHT-1989-Perlman #design #development #evaluation #hypermedia
Asynchronous Design/Evaluation Methods for Hypertext Technology Development (GP), pp. 61–81.
SIGMODSIGMOD-1989-LometS #data access #multi
Access Methods for Multiversion Data (DBL, BS), pp. 315–324.
VLDBVLDB-1989-BattistaL #deduction #modelling
A Deductive Method for Entity-Relationship Modeling (GDB, ML), pp. 13–21.
VLDBVLDB-1989-ChangS #database
A Signature Access Method for the Starburst Database System (WWC, HJS), pp. 145–153.
VLDBVLDB-1989-KitsuregawaNT #hybrid
The Effect of Bucket Size Tuning in the Dynamic Hybrid GRACE Hash Join Method (MK, MN, MT), pp. 257–266.
VLDBVLDB-1989-RothermelM #named #transaction
ARIES/NT: A Recovery Method Based on Write-Ahead Logging for Nested Transactions (KR, CM), pp. 337–346.
CSEETSEI-1989-ZwebenSB #testing
Exploratory Studies of the Software Testing Methods Used by Novice Programmers (SHZ, CS, RB), pp. 169–188.
STOCSTOC-1989-Razborov #approximate #on the
On the Method of Approximations (AAR), pp. 167–176.
ICALPICALP-1989-Kenyon-MathieuV #analysis #data type
General Methods for the Analysis of the Maximum Size of Dynamic Data Structures (Extended Abstract) (CKM, JSV), pp. 473–487.
FPCAFPCA-1989-Takayama #performance #proving #source code
Extended Projection — New Method to Extract Efficient Programs from Constructive Proofs (YT), pp. 299–312.
CHICHI-1989-JacksonR #named
Circling: a method of mouse-based selection without button presses (JCJ, RJRH), pp. 161–166.
CAiSECAiSE-1989-DahlO #development #modelling #tool support
The Relationship between Models, Methods and System Development Tools (i.e. Case Tools and 4GL) (LD, RO).
CAiSECAiSE-1989-Lustig #automation #how #tool support
How CASE Tools and Methods Relate to Each Other (GL).
CAiSECAiSE-1989-Rolland #automation #future of #modelling #on the #tool support #why
On the Future of Modelling — Why Current CASE Tools Insist on Supporting 20 Years Old Methods and Techniques (CR).
CAiSECAiSE-1989-StenstromS #data-driven #development #named
SVEA — A User Driven and Data Driven System Development Method (IMS, ES).
CAiSECAiSE-1989-Swende #architecture #data-driven #named #resource management
IRMA — Information Resource Management Architecture: A Data-driven Method Used in Planning the Overall System Architecture (ES).
SEKESEKE-1989-Cooke #design #proving
Proving Properties of Software Design Methods (DEC), pp. 9–12.
SEKESEKE-1989-MurataY #petri net #realtime #rule-based
Petri Net Method for Real-Time Control of Rule-Based Systems (TM, JY), pp. 122–127.
SIGIRSIGIR-1989-ChangLL #clustering #data access #multi
Multikey Access Methods Based on Term Discrimination and Signature Clustering (JWC, JHL, YJL), pp. 176–185.
SIGIRSIGIR-1989-ChristodoulakisF #data access
File Organizations and Access Methods for CLV Optical Disks (SC, DAF), pp. 152–159.
ECOOPECOOP-1989-PunW #design #object-oriented #programming
A Design Method for Object-Oriented Programming (WWYP, RLW), pp. 225–240.
OOPSLAOOPSLA-1989-DixonMSV #inheritance #multi #performance
A Fast Method Dispatcher for Compiled Languages with Multiple Inheritance (RD, TM, PS, MV), pp. 211–214.
OOPSLAOOPSLA-1989-MullerRKS #interface #multi
The Use of Multimethods and Method Combination in a CLOS Based Window System Interface (HM, JRR, JK, TS), pp. 239–253.
POPLPOPL-1989-CytronFRWZ #performance
An Efficient Method of Computing Static Single Assignment Form (RC, JF, BKR, MNW, FKZ), pp. 25–35.
ESECESEC-1989-NorrisS #formal method
Industrialising Formal Methods for Telecommunications (MTN, SGS), pp. 159–175.
ICSEICSE-1989-InoueOKT #adaptation #process
A Formal Adaptation Method for Process Descriptions (KI, TO, TK, KT), pp. 145–153.
ICSEICSE-1989-PatelONB #formal method #tool support
Tools to Support Formal Methods (SP, RAO, MTN, DWB), pp. 123–132.
ICSEICSE-1989-Potts #design #representation
A Generic Model for Representing Design Methods (CP), pp. 217–226.
ICLPNACLP-1989-Lin #backtracking #parallel #performance #random
Expected Performance of the Randomized Parallel Backtracking Method (ZL), pp. 677–696.
ISSTATAV-1989-Gerhart #assessment #formal method #summary
Preliminary Summary: FM89 Assessment of Formal Methods for Trustworthy Computer Systems (SLG), pp. 152–155.
ISSTATAV-1989-Hamlet #comparison #testing
Theoretical Comparison of Testing Methods (RGH), pp. 28–37.
DACDAC-1988-BergstraesserGHW #architecture #named #synthesis #tool support
SMART: Tools and Methods for Synthesis of VLSI Chips with Processor Architecture (TB, JG, KH, SW), pp. 654–657.
DACDAC-1988-GloverM #fault #generative #testing
A Method of Delay Fault Test Generation (CTG, MRM), pp. 90–95.
DACDAC-1988-GuraA #simulation
Improved Methods of Simulating RLC Couple and Uncoupled Transmission Lines Based on the Method of Characteristics (CVG, JAA), pp. 300–305.
PODSPODS-1988-HaddadN
Counting Methods for Cyclic Relations (RWH, JFN), pp. 333–340.
VLDBVLDB-1988-FaloutsosC #comparison #data access #design #performance #scalability
Fast Text Access Methods for Optical and Large Magnetic Disks: Designs and Performance Comparison (CF, RC), pp. 280–293.
VLDBVLDB-1988-NakayamaK #using
Hash-Partitioned Join Method Using Dynamic Destaging Strategy (MN, MK, MT), pp. 468–478.
VLDBVLDB-1988-SeegerK #data access #design #implementation #performance
Techniques for Design and Implementation of Efficient Spatial Access Methods (BS, HPK), pp. 360–371.
FMVDME-1988-NielsenHWG #tool support
The RAISE Language, Method and Tools (MN, KH, KRW, CG), pp. 376–405.
FMVDME-1988-Ruggles88a #formal method #standard
Formal Methods in Standards — A Report from the BCS Working Group (CR), pp. 79–85.
LISPLFP-1988-SussmanH #abstraction #named #tutorial
Tutorial: Abstraction in Numerical Methods (GJS, MH), pp. 1–7.
SIGIRSIGIR-1988-Case #comprehension #how #retrieval #scalability
How Do the Experts Do It? The Use of Ethnographic Methods as an Aid to Understanding the Cognitive Processing and Retrieval of Large Bodies of Text (DOC), pp. 127–133.
SIGIRSIGIR-1988-JonesdK #alloy #named #statistics
ALLOY: An Amalgamation of Expert, Linguistic and Statistical Indexing Methods (LPJ, Cd, SK), pp. 191–199.
SIGIRSIGIR-1988-SaltonB #automation #information retrieval #on the
On the Use of Spreading Activation Methods in Automatic Information Retrieval (GS, CB), pp. 147–160.
PPDPALP-1988-Comon #algebra #effectiveness
An Effective Method for Handling Initial Algebras (HC), pp. 108–118.
POPLPOPL-1988-GarlandG #data type #induction #reasoning
Inductive Methods for Reasoning about Abstract Data Types (SJG, JVG), pp. 219–228.
ICSEICSE-1988-Itzigehl #parallel
A Method for Asynchronous Parallelization (PRI), pp. 4–9.
CADECADE-1988-MarcusR #automation #implementation #proving
Two Automated Methods in Implementation Proofs (LM, TR), pp. 622–642.
CSLCSL-1988-Eder #calculus #comparison
A Comparison of the Resolution Caculus and the Connection Method, and a new Calculus Generalizing Both Methods (EE), pp. 80–98.
ICLPJICSCP-1988-CodognetCF88 #backtracking
Yet Another Intelligent Backtracking Method (CC, PC, GF), pp. 447–465.
ICLPJICSCP-1988-GotoKNC88 #garbage collection #incremental #lazy evaluation #parallel
Lazy Reference Counting: An Incremental Garbage Collection Method for Parallel Inference Machines (AG, YK, TN, TC), pp. 1241–1256.
ICLPJICSCP-1988-SekiI88 #evaluation #query #source code
A Query Evaluation Method for Stratified Programs Under the Extended CWA (HS, HI), pp. 195–211.
DACDAC-1987-FaroughiS #algorithm #array
An Improved Systematic Method for Constructing Systolic Arrays from Algorithms (NF, MAS), pp. 26–34.
PODSPODS-1987-Marchetti-SpaccamelaPS #analysis #complexity #implementation #logic #query #worst-case
Worst-case Complexity Analysis of Methods for Logic Query Implementation (AMS, AP, DS), pp. 294–301.
SIGMODSIGMOD-1987-FaloutsosSR #analysis #data access #object-oriented
Analysis of Object Oriented Spatial Access Methods (CF, TKS, NR), pp. 426–439.
SIGMODSIGMOD-1987-SaccaZ
Magic Counting Methods (DS, CZ), pp. 49–59.
VLDBVLDB-1987-HwangY #query
An Analytical Method for Estimating and Interpreting Query Time (HYH, YTY), pp. 347–358.
VLDBVLDB-1987-LiRW #database #performance #scalability
A New Compression Method with Fast Searching on Large Databases (JL, DR, HKTW), pp. 311–318.
STOCSTOC-1987-Smolensky #algebra #bound #complexity #formal method
Algebraic Methods in the Theory of Lower Bounds for Boolean Circuit Complexity (RS), pp. 77–82.
FMVDME-1987-ChedgeyKK #ada #development #object-oriented #using
Using VDM in an Object-Oriented Development Method for Ada Software (CC, SK, HJK), pp. 63–76.
FMVDME-1987-Letschert #specification
VDM as a Specification Method for Telecommunications Software (TL), pp. 106–109.
HCIHCI-CE-1987-Tominaga #specification
A Computer Method for Specifying Colors by Means of Color Naming (ST), pp. 131–138.
SIGIRSIGIR-1987-Fagan #automation #documentation #retrieval
Automatic Phrase Indexing for Document Retrieval: An Examination of Syntactic and Non-Syntactic Methods (JLF), pp. 91–101.
ECOOPECOOP-1987-KristensenMMN #classification #inheritance
Classification of Actions, or Inheritance also for Methods (BBK, OLM, BMP, KN), pp. 98–107.
ESECESEC-1987-BlackSLL #development
Translation between Pragmatic Software Development Methods (WJB, AGS, PL, PJL), pp. 357–365.
ESECESEC-1987-CollbergK #implementation #multi
A Property-Based Method for Selecting Among Multiple Implementations of Modules (CSC, MGK), pp. 193–201.
ICSEICSE-1987-Bjorner #development #formal method #on the
On the Use of Formal Methods in Software Development (DB), pp. 17–29.
ICSEICSE-1987-Kelly #comparison #design #realtime
A Comparison of Four Design Methods for Real-Time Systems (JCK), pp. 238–252.
ICLPSLP-1987-Ali87 #execution #implementation #parallel #prolog
A Method for Implementing Cut in Parallel Execution of Prolog (KAMA), pp. 449–456.
DACDAC-1986-MiyoshiOSOA #design #logic #scalability #simulation
An extensive logic simulation method of very large scale computer design (MM, YO, AS, NO, NA), pp. 360–365.
DACDAC-1986-SupowitF #verification
A new method for verifying sequential circuits (KJS, SJF), pp. 200–207.
SIGMODSIGMOD-1986-BiskupC #integration
A Formal View Integration Method (JB, BC), pp. 398–407.
ESOPESOP-1986-CodognetCF #backtracking #logic programming #source code
A Very Intelligent Backtracking Method for Logic Programs (CC, PC, GF), pp. 315–326.
ICGTGG-1986-EngelsLS #grammarware #graph grammar #specification
Graph Grammar Engineering: A Software Specification Method (GE, CL, WS), pp. 186–201.
AdaCRAI-1986-Jones #development #formal method
Software Development Based on Formal Methods (CBJ), pp. 153–172.
SIGIRSIGIR-1986-El-HamdouchiW #clustering #documentation #using
Hierarchic Document Clustering Using Ward’s Method (AEH, PW), pp. 149–156.
OOPSLAOOPSLA-1986-BallardMW #named
Quicktalk: A Smalltalk-80 Dialect for Defining Primitive Methods (MBB, DM, AWB), pp. 140–150.
CADECADE-1986-HsiangR #proving #theorem proving
A New Method for Establishing Refutational Completeness in Theorem Proving (JH, MR), pp. 141–152.
CADECADE-1986-Plaisted
A Simple Non-Termination Test for the Knuth-Bendix Method (DAP), pp. 79–88.
ICLPSLP-1986-GallierR86 #horn clause #similarity
SLD-Resolution Methods for Horn Clauses with Equality Based on E-Unification (JHG, SR), pp. 168–179.
ICLPSLP-1986-LiM86 #execution #logic programming #parallel
The Sync Model: A Parallel Execution Method for Logic Programming (PPL, AJM), pp. 223–234.
DACDAC-1985-Barke #finite
Resistance calculation from mask artwork data by finite element method (EB), pp. 305–311.
DACDAC-1985-FinchMBS
A method for gridless routing of printed circuit boards (ACF, KJM, GJB, GS), pp. 509–515.
DACDAC-1985-HennionSC #algorithm #generative
A new algorithm for third generation circuit simulators: the one-step relaxation method (BH, PS, DC), pp. 137–143.
SIGMODSIGMOD-1985-Faloutsos #comparison #design #performance
Signature files: Design and Performance Comparison of Some Signature Extraction Methods (CF), pp. 63–82.
VLDBVLDB-1985-FaloutsosC #design #query
Design of a Signature File Method that Accounts for Non-Uniform Occurrence and Query Frequencies (CF, SC), pp. 165–170.
FPCAFPCA-1985-Wadler85 #backtracking #exception #functional #how #lazy evaluation #pattern matching
How to Replace Failure by a List of Successes: A method for exception handling, backtracking, and pattern matching in lazy functional languages (PW), pp. 113–128.
ICSEICSE-1985-KnightA #evaluation #fault
An Experimental Evaluation of Simple Methods for Seeding Program Errors (JCK, PA), pp. 337–342.
DACDAC-1984-Blanks #array #using
Initial placement of gate arrays using least-squares methods (JPB), pp. 670–671.
DACDAC-1984-Marvik #layout #verification
A method for IC layout verification (OAM), pp. 708–709.
SIGMODSIGMOD-1984-ChenK #network #relational #retrieval
Combining Relational and Network Retrieval Methods (HHC, SMK), pp. 131–142.
VLDBVLDB-1984-Bratbergsengen #algebra #relational
Hashing Methods and Relational Algebra Operations (KB), pp. 323–333.
LISPLFP-1984-StoyeCN #agile #combinator #reduction
Some Practical Methods for Rapid Combinator Reduction (WRS, TJWC, ACN), pp. 159–166.
SIGIRSIGIR-1984-RabittiZ #data access #documentation #evaluation
Evaluation of Access Methods to Text Document in Office Systems (FR, JZ), pp. 21–40.
ICSEICSE-1984-Gerhart #axiom #specification
Application of Axiomatic Methods to a Specification Analyser (SLG), pp. 441–453.
ICSEICSE-1984-HozumiSE #development #scalability
A Method of Large-Scale Software Development (HH, YS, HE), pp. 520–527.
ICSEICSE-1984-MiliD #verification
A System for Classifying Program Verification Methods: Assigning Meanings to Program Verification Methods (AM, JD), pp. 499–509.
CADECADE-1984-CavalliC #linear #logic
A Decision Method for Linear Temporal Logic (ARC, LFdC), pp. 113–127.
CADECADE-1984-Kirchner #algorithm #equation #unification
A New Equational Unification Method: A Generalization of Martelli-Montanari’s Algorithm (CK), pp. 224–247.
CADECADE-1984-Stickel #case study #commutative #proving #theorem proving
A Case Study of Theorem Proving by the Knuth-Bendix Method: Discovering That x³=x Implies Ring Commutativity (MES), pp. 248–258.
ICLPSLP-1984-MiyachiKKFTY84 #database #logic
A Knowledge Assimilation Method for Logic Databases (TM, SK, HK, KF, AT, HY), pp. 118–125.
DACDAC-1983-HitchcockT #automation #synthesis
A method of automatic data path synthesis (CYHI, DET), pp. 484–489.
DACDAC-1983-RothermelM #design #using
Routing method for VLSI design using irregular cells (HJR, DAM), pp. 257–262.
SIGMODSIGMOD-1983-JarkeK #performance #quantifier #query
Range Nesting: A Fast Method to Evaluate Quantified Queries (MJ, JK), pp. 196–206.
SIGMODSIGMOD-1983-Lomet #performance
A High Performance, Universal, Key Associative Access Method (DBL), pp. 120–133.
ICALPICALP-1983-AptD #axiom #logic #using
An Axiomatization of the Intermittent Assertion Method Using Temporal Logic (Extended Abstract) (KRA, CD), pp. 15–27.
ICALPICALP-1983-HsiangD #proving #theorem proving
Rewrite Methods for Clausal and Non-Clausal Theorem Proving (JH, ND), pp. 331–346.
RERE-1983-Partsch #algebra #on the #requirements
On the Use of Algebraic Methods for Formal Requirements Definitions (HP), pp. 138–158.
DACDAC-1982-AdachiKNS #design #layout #top-down
Hierarchical top-down layout design method for VLSI chip (TA, HK, MN, TS), pp. 785–791.
DACDAC-1982-CiesielskiK
An analytical method for compacting routing area in integrated circuits (MJC, EK), pp. 30–37.
DACDAC-1982-PitchumaniS #design #formal method #verification
A formal method for computer design verification (VP, EPS), pp. 809–814.
DACDAC-1982-TamminenS #data access #geometry #performance
The excell method for efficient geometric access to data (MT, RS), pp. 345–351.
SIGMODSIGMOD-1982-BernsteinB #calculus #performance #quantifier #relational #testing
Fast Methods for Testing Quantified Relational Calculus Assertions (PAB, BTB), pp. 39–50.
VLDBVLDB-1982-Leiss #database #statistics
Randomizing, A Practical Method for Protecting Statistical Databases Against Compromise (ELL), pp. 189–196.
PLDISCC-1982-BurkeF #fault
A Practical Method for Syntactic Error Diagnosis and Recovery (MGB, GAF), pp. 67–78.
PLDISCC-1982-KrummeA #code generation
A Practical Method for Code Generation Based on Exhaustive Search (DWK, DHA), pp. 185–196.
LISPLFP-1982-Hughes #combinator #implementation
Super Combinators: A New Implementation Method for Applicative Languages (RJMH), pp. 1–10.
SIGIRSIGIR-1982-BollmannKZ #education #information retrieval #named #research
FAKYR — A Method Base System for Education and Research in Information Retrieval (PB, EK, HZ), pp. 13–19.
ICSEICSE-1982-FutatsugiO #functional
A Hierarchical Structuring Method for Functional Software Systems (KF, KO), pp. 393–402.
ICSEICSE-1982-Runge
The Inspection Method Applied to Small Projects (BR), pp. 416–417.
ICSEICSE-1982-ShiratoriGN #communication #design #protocol
A New Design Language for Communication Protocols and a Systematic Design Method of Communication Systems (NS, JG, SN), pp. 403–413.
DACDAC-1981-HaferP #analysis #design #formal method #logic #specification
A formal method for the specification, analysis, and design of register-transfer level digital logic (LJH, ACP), pp. 846–853.
VLDBVLDB-1981-Sakai #concept #design #transaction
A Method for Defining Information Structures and Transactions in Conceptual Schema Design (HS), pp. 225–234.
VLDBVLDB-1981-Schlageter #concurrent #database #distributed
Optimistic Methods for Concurrency Control in Distributed Database Systems (GS), pp. 125–130.
ICSEICSE-1981-KomodaHKS #analysis #approach #modelling #requirements #using
An Innovative Approach to System Requirements Analysis by Using Structural Modeling Method (NK, KH, HK, HS), pp. 305–313.
ICSEICSE-1981-MoherS #re-engineering
Methods for Improving Controlled Experimentation in Software Engineering (TGM, GMS), pp. 224–234.
ICSEICSE-1981-RichardsonC #analysis #reliability
A Partition Analysis Method to Increase Program Reliability (DJR, LAC), pp. 244–253.
DACDAC-1980-GiambiasiMM #deduction #fault #simulation
Methods for generalized deductive fault simulation (NG, AM, DM), pp. 386–392.
DACDAC-1980-Miller #analysis #automation #design
Inter-active graphic methods for automating mechanical engineering design and analyses (JMM), pp. 114–128.
STOCSTOC-1980-Ukkonen #automaton #equivalence #realtime
A Decision Method for the Equivalence of some Non-Real-Time Deterministic Pushdown Automata (EU), pp. 29–38.
ICALPICALP-1980-BergstraT #data type #equation #finite #specification
A Characterisation of Computable Data Types by Means of a Finite Equational Specification Method (JAB, JVT), pp. 76–90.
AdaTFDA-1980-BundgaardS #ada #semantics
A Denotational (Static) Semantics Method for Defining Ada Context Conditions (JB, LS), pp. 21–212.
SIGIRSIGIR-1980-McGregorM #database
The Fact Database: A System Based on Inferential Methods (DRM, JRM), pp. 203–217.
SIGIRSIGIR-1980-Schek #database
Methods for the Administration of Textual Data in Database Systems (HJS), pp. 218–235.
POPLPOPL-1980-Kamin #data type #specification
Final Data Tye Specifications: A New Data Type Specification Method (SNK), pp. 131–138.
DACDAC-1979-DysartK #automation #bound #branch
An application of branch and bound method to automatic printed circuit board routing (LD, MK), pp. 494–499.
DACDAC-1979-KjelkerudT79a #logic #modelling #simulation
Methods of modelling digital devices for logic simulation (EK, OT), pp. 235–241.
DACDAC-1979-Zimmermann #design
The MIMOLA design system a computer aided digital processor design method (GZ), pp. 53–58.
SIGMODSIGMOD-1979-BadalP #analysis #performance #semantics #validation
Cost and Performance Analysis of Semantic Integrity Validation Methods (DZB, GJP), pp. 109–115.
VLDBVLDB-1979-KungR #concurrent #on the
On Optimistic Methods for Concurrency Control (HTK, JTR), p. 351.
ICALPICALP-1979-Ukkonen #bottom-up #lr #parsing
A Modification of the LR(k) Method for Constructing Compact Bottom-Up Parsers (EU), pp. 646–658.
ICSEICSE-1979-Mullery
CORE : A Method for Controlled Requirement Expression (GPM), pp. 126–135.
DACDAC-1978-AllisonG #3d #architecture #visual notation
The three-dimensional graphical input method for architecture (HCA, DPG), pp. 133–137.
DACDAC-1978-PreasG #automation #layout
Methods for hierarchical automatic layout of custom LSI circuit masks (BP, CWG), pp. 206–212.
VLDBVLDB-1978-FloryK #database #design #logic
A Model and a Method for Logical Data Base Design (AF, JK), pp. 333–341.
VLDBVLDB-1978-HuberL #information management
Information Protection by Method Base Systems (RH, PCL), pp. 420–426.
VLDBVLDB-1978-Kalinichenko #axiom #modelling
Data Models Transformation Method Based on Axiomatic Data Model Extension (LAK), pp. 549–555.
STOCSTOC-1978-Pratt #logic
A Practical Decision Method for Propositional Dynamic Logic: Preliminary Report (VRP), pp. 326–337.
POPLPOPL-1978-GlanvilleG #code generation #compilation
A New Method for Compiler Code Generation (RSG, SLG), pp. 231–240.
DACDAC-1977-SchulerC #fault #performance #simulation
An efficient method of fault simulation for digital circuits modeled from boolean gates and memories (DMS, RKC), pp. 230–238.
SIGMODSIGMOD-1976-Kahn #database #design #process
A Method for Describing Information Required by the Database Design Process (BKK), pp. 53–64.
VLDBVLDB-1976-SenkoA #abstraction #data access #physics
DIAM II and Levels of Abstraction — The Physical Device Level: A General Model for Access Methods (MES, EBA), pp. 79–94.
ICSEICSE-1976-EhrenbergerRO #program analysis #verification
Program Analysis — A Method for the Verification of Software for the Control of a Nuclear Reactor (WDE, GR, KO), pp. 611–616.
DACDAC-1975-Case #evaluation #sequence #statistics #testing
A statistical method for test sequence evaluation (GRC), pp. 257–260.
POPLPOPL-1975-Lipton #named #process #proving #reduction
Reduction: A New Method of Proving Properties of Systems of Processes (RJL), pp. 78–86.
POPLPOPL-1973-Beech #on the #pl-i #standard
On the Definitional Method of Standard PL/1 (DB), pp. 87–94.
DACDAC-1972-HightowerU #agile #testing
A method for rapid testing of beam crossover circuits (DWH, BAU), pp. 144–156.
SIGMODSIGFIDET-1972-Parker #data access #information retrieval
File Structures and Access Methods for a Geographic Information Retrieval System (JLP), pp. 383–393.
SIGMODSIGFIDET-1972-Smith #using
A Method for Data Translation Using the Stored Data Definition and Translation Task Group Languages (DCPS), pp. 107–124.
DACDAC-1971-Nagamine #automation #design #logic #source code
An automated method for designing logic circuit diagnostic programs (MN), pp. 236–241.
SIGIRSIGIR-1971-HuntK #data transformation #source code
A Heathkit Method for Building Data Management Programs (EH, GAK), pp. 117–131.
DACDAC-1970-Koga
A checking method of wiring (YK), pp. 173–177.
DACDAC-1970-Quiet #automation #source code
An automated method for producing diagnostic programs (EQ), pp. 132–137.
DACDAC-1970-RockwellP #analysis #finite
Computer aided input/output for use with the finite element method of structural analysis (RDR, DSP), pp. 315–334.
DACDAC-1967-Branin #analysis #network
Computer methods of network analysis (FHBJ).
DACSHARE-1964-Weindling #geometry
A method for the best geometric placement of units on a plane (MNW).
LISPLISP-1963-Minsky #garbage collection
Garbage Collector methods (MM), p. 10.

Bibliography of Software Language Engineering in Generated Hypertext (BibSLEIGH) is created and maintained by Dr. Vadim Zaytsev.
Hosted as a part of SLEBOK on GitHub.