80 papers:
DAC-2015-RajendranVK #detection- Detecting malicious modifications of data in third-party intellectual property cores (JR, VV, RK), p. 6.
MSR-2015-MirakhorliC #architecture #debugging- Modifications, Tweaks, and Bug Fixes in Architectural Tactics (MM, JCH), pp. 377–380.
LATA-2015-CreignouKMMOV #problem- Parameterized Enumeration for Modification Problems (NC, RK, AM, JSM, FO, HV), pp. 524–536.
KDD-2015-OkumuraST #analysis #classification #incremental #linear #problem- Quick Sensitivity Analysis for Incremental Data Modification and Its Application to Leave-one-out CV in Linear Classification Problems (SO, YS, IT), pp. 885–894.
DocEng-2014-MartinsP #documentation #multi #named #reuse- ActiveTimesheets: extending web-based multimedia documents with dynamic modification and reuse features (DSM, MdGCP), pp. 3–12.
CAiSE-2014-MalhotraMNL #database #towards- Towards a Form Based Dynamic Database Schema Creation and Modification System (KM, SM, SBN, MDDL), pp. 595–609.
ICEIS-v1-2014-CruzRFC #behaviour #implementation- Norm-based Behavior Modification in Reflex Agents — An Implementation in JAMDER 2.0 (FISC, RMRJ, ESSF, MIC), pp. 497–504.
ICML-c2-2014-KurrasLB #geometry #graph- The f-Adjusted Graph Laplacian: a Diagonal Modification with a Geometric Interpretation (SK, UvL, GB), pp. 1530–1538.
ICPR-2014-IwahoriFWB #image #network- Neural Network Based Image Modification for Shape from Observed SEM Images (YI, KF, RJW, MKB), pp. 2131–2136.
KEOD-2014-ChamekhTB #concept #multi #ontology- Ontology Modification in a Multi-User Concept — Conflict Resolution (FC, GT, DB), pp. 296–303.
Onward-2014-TaeumelPSLH #data-driven #development- Interleaving of Modification and Use in Data-driven Tool Development (MT, MP, BS, JL, RH), pp. 185–200.
DAC-2013-YousofshahiOLH #capacity #identification #nondeterminism- Gene modification identification under flux capacity uncertainty (MY, MO, KL, SH), p. 5.
DRR-2013-AzawiLB #documentation #layout- WFST-based ground truth alignment for difficult historical documents with text modification and layout variations (MIAAA, ML, TMB).
CSEET-2013-ArdisBCVI #education #re-engineering #source code #using- Using GSwE2009 in the creation and modification of graduate software engineering programs and related curricula (MAA, SB, LC, DV, SI), pp. 109–118.
SIGIR-2013-HeBV #multi #query- Characterizing stages of a multi-session complex search task through direct and indirect query modifications (JH, MB, APdV), pp. 897–900.
SAC-2013-CamposFHV #personalisation #query #ranking #using #xml- XML search personalization strategies using query expansion, reranking and a search engine modification (LMdC, JMFL, JFH, EVL), pp. 872–877.
DATE-2012-ChangCM #analysis- RTL analysis and modifications for improving at-speed test (KHC, HZC, ILM), pp. 400–405.
ICSM-2012-HigoK #consistency #detection #how #nondeterminism- How often do unintended inconsistencies happen? Deriving modification patterns and detecting overlooked code fragments (YH, SK), pp. 222–231.
WCRE-2012-LavoieKMZ #clone detection #detection #nearest neighbour #repository #using- Inferring Repository File Structure Modifications Using Nearest-Neighbor Clone Detection (TL, FK, EM, YZ), pp. 325–334.
ECIR-2012-HollinkHV #query- Explaining Query Modifications — An Alternative Interpretation of Term Addition and Removal (VH, JH, APdV), pp. 1–12.
VLDB-2011-SewallCKSD #architecture #manycore #named #parallel- PALM: Parallel Architecture-Friendly Latch-Free Modifications to B+ Trees on Many-Core Processors (JS, JC, CK, NS, PD), pp. 795–806.
FASE-2011-EhrigET #graph #using #version control- A Formal Resolution Strategy for Operation-Based Conflicts in Model Versioning Using Graph Modifications (HE, CE, GT), pp. 202–216.
ICPC-2011-TothVBG #complexity #metric #predict #process- Adding Process Metrics to Enhance Modification Complexity Prediction (GT, AZV, ÁB, TG), pp. 201–204.
DRR-2010-SankarasubramaniamNVK #approach #detection #documentation- Detecting modifications in paper documents: a coding approach (YS, BN, KV, AK), pp. 1–10.
ICGT-2010-TaentzerELW #detection #graph #version control- Conflict Detection for Model Versioning Based on Graph Modifications (GT, CE, PL, MW), pp. 171–186.
ICSE-2010-SteimannT #behaviour #constraints #generative- From behaviour preservation to behaviour modification: constraint-based mutant generation (FS, AT), pp. 425–434.
VLDB-2009-MishimaN #database #middleware #named #replication- Pangea: An Eager Database Replication Middleware guaranteeing Snapshot Isolation without Modification of Database Servers (TM, HN), pp. 1066–1077.
ICPC-2008-McMeekinKCC #comprehension #developer #taxonomy- Checklist Inspections and Modifications: Applying Bloom’s Taxonomy to Categorise Developer Comprehension (DAM, BRvK, EC, DJAC), pp. 224–229.
ICPR-2008-XuanSCTTL #image- Reversible binary image data hiding by run-length histogram modification (GX, YQS, PC, XT, JT, JL), pp. 1–4.
DATE-2007-JayakumarK #algorithm- An algorithm to minimize leakage through simultaneous input vector control and circuit modification (NJ, SPK), pp. 618–623.
HCI-IPT-2007-ImPKL- Modification of Plastic Optical Fiber for Side-Illumination (MHI, EJP, CHK, MSL), pp. 1123–1129.
ICPR-v2-2006-ChenSYCG #detection- Modification of the AdaBoost-based Detector for Partially Occluded Faces (JC, SS, SY, XC, WG), pp. 516–519.
ICDAR-2005-IshitaniFS #analysis #classification #documentation #xml- Table Structure Analysis Based on Cell Classification and Cell Modification for XML Document Transformation (YI, KF, KS), pp. 1247–1252.
SIGMOD-2005-BohannonFFR #constraints #cost analysis #effectiveness #heuristic- A Cost-Based Model and Effective Heuristic for Repairing Constraints by Value Modification (PB, MF, WF, RR), pp. 143–154.
IWPC-2005-OSheaE #abstraction #java- An Investigation of Java Abstraction Usage for Program Modifications (PO, CE), pp. 65–74.
SAC-2005-PowerSPS #query- Protecting sensitive patient data via query modification (DJP, MS, EAP, ACS), pp. 224–230.
ICSM-2004-German #empirical #fine-grained- An Empirical Study of Fine-Grained Software Modifications (DMG), pp. 316–325.
IWPC-2004-KorelT #comprehension #modelling- Understanding Modifications in State-Based Models (BK, LHT), pp. 246–250.
CAiSE-2004-EderKM #detection #slicing- Analysing Slices of Data Warehouses to Detect Structural Modifications (JE, CK, DM), pp. 492–505.
ICPR-v1-2004-Kazanov04a #image- Modification of Watershed Transformation for Images, Containing Small Objects (MK), pp. 612–615.
ICPR-v2-2004-AmanoAM #generative #recognition- Modification Table Form Generation System based on the Form Recognition (AA, NA, MM), pp. 659–662.
ICPR-v4-2004-PeiZ #image #multi- Hiding Multiple Data in Color Images by Histogram Modification (SCP, YCZ), pp. 799–802.
ICDAR-2003-GrecoILSS- Bank-check Processing System: Modifications Due to the New European Currency (NG, DI, MGL, AS, LS), pp. 343–348.
DATE-2002-Leveugle #automation #detection #fault- Automatic Modifications of High Level VHDL Descriptions for Fault Detection or Tolerance (RL), pp. 837–841.
SCAM-2002-Baxter #analysis #parallel #source code- Parallel Support for Source Code Analysis and Modification (IDB), p. 3–?.
ICPR-v3-2002-SmolkaSPV #on the #performance- On the Fast Modification of the Vector Median Filter (BS, MS, KNP, ANV), pp. 931–934.
ICLP-2002-HayashiCO #execution #logic programming- Integrating Planning, Action Execution, Knowledge Updates and Plan Modifications via Logic Programming (HH, KC, AO), p. 477.
ICSM-2001-OtaniY #component #network #off the shelf- A Customization Method for Network Management Functions without Modification of Off-the-Shelf Components (TO, YY), pp. 460–469.
SIGIR-2001-MillerRS #algorithm #matrix #using- Modifications of Kleinberg’s HITS Algorithm Using Matrix Exponentiation and WebLog Records (JCM, GR, FS), pp. 444–445.
SIGIR-2001-RuthvenRL #abduction #empirical #query #using- Empirical Investigations on Query Modification Using Abductive Explanations (IR, CJvR, ML), pp. 181–189.
ICPR-v2-2000-IwamuraOA #estimation #fault- A Modification of Eigenvalues to Compensate Estimation Errors of Eigenvectors (MI, SO, HA), pp. 2378–2381.
ICPR-v3-2000-CorrSHMS- Discrete Chebyshev Transform — A Natural Modification of the DCT (PC, DS, PH, JM, FJS), pp. 7154–3255.
DATE-1999-MurgaiF #on the- On Reducing Transitions Through Data Modifications (RM, MF), p. 82–?.
OOPSLA-1998-Leino #specification- Data Groups: Specifying the Modification of Extended State (KRML), pp. 144–153.
ISSTA-1998-StocksRLZ #context-sensitive grammar #problem- Comparing Flow and Context Sensitivity on the Modification-Side-Effects Problem (PS, BGR, WL, SZ), pp. 21–31.
ICDAR-1997-EigenmannN #evaluation #multi #network- Modification of Hard-Limiting Multilayer Neural Networks for Confidence Evaluation (RE, JAN), pp. 1087–1091.
HPCA-1997-MarkatosK #kernel #operating system- User-Level DMA without Operating System Kernel Modification (EPM, MK), pp. 322–331.
SIGMOD-1996-AchyutuniON #database #online #parallel- Two Techniques for On-Line Index Modification in Shared Nothing Parallel Databases (KJA, EO, SBN), pp. 125–136.
ICSM-1996-GefenS #case study #maintenance- The non-homogeneous maintenance periods: a case study of software modifications (DG, SLS), pp. 134–141.
ICSM-1995-ShimomuraOCO #independence- An independent software-modification method (TS, YO, TC, TO), pp. 214–221.
ICSM-1994-JacksonL #semantics- Semantic Diff: A Tool for Summarizing the Effects of Modifications (DJ, DAL), pp. 243–252.
ICSM-1994-Jacquot #programming- Programming Through Disciplined Modification (JPJ), pp. 362–371.
CAiSE-1994-AbererKF #database #design #object-oriented #query- Designing a User-Oriented Query Modification Facility in Object-Oriented Database Systems (KA, WK, ALF), pp. 380–393.
VLDB-1993-Grefen #approach #declarative #specification #theory and practice #transaction- Combining Theory and Practice in Integrity Control: A Declarative Approach to the Specification of a Transaction Modification Subsystem (PWPJG), pp. 581–591.
CIKM-1993-GolverRO #hybrid #pattern matching #pattern recognition #recognition #self- Hybrid Pattern Recognition System Capable of Self-Modification (CWG, NSVR, EMO), pp. 239–244.
SAC-1993-Bruck #design #migration #named- Migration: A Model for Design by Modification (RB), pp. 71–76.
SIGIR-1991-Kwok #adaptation #architecture #network #query- Query Modification and Expansion in a Network with Adaptive Architecture (KLK), pp. 192–201.
ECOOP-1991-Barbedette #object-oriented #persistent- Schema Modifications in the LISPO2 Persistent Object-Oriented Language (GB), pp. 77–96.
DAC-1990-Hojati #layout #optimisation- Layout Optimization by Pattern Modification (RH), pp. 632–637.
CLP-1990-Paakki90 #attribute grammar #compilation- A Logic-Based Modification of Attribute Grammars for Practical Compiler Writing (JP), pp. 203–217.
DAC-1989-TheWC #layout- VIA Minimization by Layout Modification (KST, DFW, JC), pp. 799–802.
ECOOP-1988-WegnerZ #incremental #inheritance #what- Inheritance as an Incremental Modification Mechanism or What Like Is and Isn’t Like (PW, SBZ), pp. 55–77.
OOPSLA-1987-PenneyS #object-oriented- Class Modification in the GemStone Object-Oriented DBMS (DJP, JS), pp. 111–117.
ICALP-1982-BerklingF #functional #programming language #λ-calculus- A Modification of the λ-Calculus as a Base for Functional Programming Languages (KJB, EF), pp. 35–47.
DAC-1980-BiehlGH #optimisation #problem- Optimization of the influence of problem modifications on given microprogrammed controllers (GB, WG, PSH), pp. 309–317.
ICALP-1979-Ukkonen #bottom-up #lr #parsing- A Modification of the LR(k) Method for Constructing Compact Bottom-Up Parsers (EU), pp. 646–658.
SIGMOD-1977-Sharman #approach #database #interactive #named- Update-by-Dialogue: An Interactive Approach to Database Modification (GCHS), pp. 21–29.
POPL-1977-DershowitzM #automation #evolution #source code- The Evolution of Programs: A System for Automatic Program Modification (ND, ZM), pp. 144–154.
ICSE-1976-KnudsenBS- A Modification Request Control System (DBK, AB, LRS), pp. 187–192.
SIGMOD-1975-Stonebraker #constraints #implementation #query- Implementation of Integrity Constraints and Views by Query Modification (MS), pp. 65–78.