BibSLEIGH
BibSLEIGH corpus
BibSLEIGH tags
BibSLEIGH bundles
BibSLEIGH people
CC-BY
Open Knowledge
XHTML 1.0 W3C Rec
CSS 2.1 W3C CanRec
email twitter
Used together with:
use (316)
base (252)
model (181)
system (158)
data (150)

Stem techniqu$ (all stems)

2008 papers:

CASECASE-2015-FeiAR #bound #clustering #resource management #symbolic computation #using
Symbolic computation of boundary unsafe states in complex resource allocation systems using partitioning techniques (ZF, , SAR), pp. 799–806.
CASECASE-2015-NguyenLK #composition #problem
Decomposition techniques for urban consolidation problems (DTN, HCL, AK), pp. 57–62.
CASECASE-2015-SrinivasanBSSR #automation #machine learning #modelling #network #using
Modelling time-varying delays in networked automation systems with heterogeneous networks using machine learning techniques (SS, FB, GS, BS, SR), pp. 362–368.
DACDAC-2015-ChenCX #classification #named #power management #video
DaTuM: dynamic tone mapping technique for OLED display power saving based on video classification (XC, YC, CJX), p. 6.
DACDAC-2015-LahiouelZT #smt #towards #using
Towards enhancing analog circuits sizing using SMT-based techniques (OL, MHZ, ST), p. 6.
DATEDATE-2015-ChenWLL #debugging
A breakpoint-based silicon debug technique with cycle-granularity for handshake-based SoC (HCC, CRW, KSML, KJL), pp. 1281–1284.
DATEDATE-2015-CourbonLFT #detection #hardware #performance
A high efficiency hardware trojan detection technique based on fast SEM imaging (FC, PLM, JJAF, AT), pp. 788–793.
DATEDATE-2015-DiaoLWW #reduction
A coupling area reduction technique applying ODC shifting (YD, TKL, XW, YLW), pp. 1461–1466.
DATEDATE-2015-LiXWNP #fine-grained #multi #power management #reduction #using
Leakage power reduction for deeply-scaled FinFET circuits operating in multiple voltage regimes using fine-grained gate-length biasing technique (JL, QX, YW, SN, MP), pp. 1579–1582.
DATEDATE-2015-MuzaffarYSE #power management
A pulsed-index technique for single-channel, low-power, dynamic signaling (SM, JY, AS, IAME), pp. 1485–1490.
DATEDATE-2015-RaiT #manycore #modelling
A calibration based thermal modeling technique for complex multicore systems (DR, LT), pp. 1138–1143.
SIGMODSIGMOD-2015-IdreosPC #bibliography #data analysis
Overview of Data Exploration Techniques (SI, OP, SC), pp. 277–281.
VLDBVLDB-2015-EldawyAM #clustering
Spatial Partitioning Techniques in Spatial Hadoop (AE, LA, MFM), pp. 1602–1613.
ITiCSEITiCSE-2015-KloosAP
Tips and Techniques for MOOC Production (CDK, CAH, MPS), p. 329.
ICSMEICSME-2015-NittaM #abstraction #why
Delta extraction: An abstraction technique to comprehend why two objects could be related (NN, TM), pp. 61–70.
SANERSANER-2015-TianL #case study #comparative #debugging #effectiveness
A comparative study on the effectiveness of part-of-speech tagging techniques on bug reports (YT, DL), pp. 570–574.
SEFMSEFM-2015-ColomboDF #runtime #verification
Investigating Instrumentation Techniques for ESB Runtime Verification (CC, GD, AF), pp. 99–107.
SEFMSEFM-2015-RockaiSB #c #c++ #model checking
Techniques for Memory-Efficient Model Checking of C and C++ Code (PR, VS, JB), pp. 268–282.
GaMGaM-2015-Moreau #graph
Aggregation by Provenance Types: A Technique for Summarising Provenance Graphs (LM), pp. 129–144.
CHICHI-2015-AchibetCLM #3d #interactive #modelling #named
THING: Introducing a Tablet-based Interaction Technique for Controlling 3D Hand Models (MA, GC, AL, MM), pp. 317–326.
CHICHI-2015-DamianTBSLA #behaviour #feedback #interactive #realtime #social #using
Augmenting Social Interactions: Realtime Behavioural Feedback using Social Signal Processing Techniques (ID, CSST, TB, JS, KL, EA), pp. 565–574.
CHICHI-2015-Gilbert #abstraction
Open Book: A Socially-inspired Cloaking Technique that Uses Lexical Abstraction to Transform Messages (EG), pp. 477–486.
CHICHI-2015-GuillonLN #visual notation
Investigating Visual Feedforward for Target Expansion Techniques (MG, FL, LN), pp. 2777–2786.
CHICHI-2015-LoboPA #comparison #evaluation #interactive
An Evaluation of Interactive Map Comparison Techniques (MJL, EP, CA), pp. 3573–3582.
CHICHI-2015-LoeppH0 #algorithm #information management #interactive #recommendation
Blended Recommending: Integrating Interactive Information Filtering and Algorithmic Recommender Techniques (BL, KH, JZ), pp. 975–984.
CHICHI-2015-PandeyRSNB #analysis #empirical #how #visualisation
How Deceptive are Deceptive Visualizations?: An Empirical Analysis of Common Distortion Techniques (AVP, KR, MLS, ON, EB), pp. 1469–1478.
CHICHI-2015-TangYBJT #feedback #visual notation
Physio@Home: Exploring Visual Guidance and Feedback Techniques for Physiotherapy Exercises (RT, XDY, SB, JAJ, AT), pp. 4123–4132.
HCIDHM-EH-2015-KanazawaOWWTGH15a #analysis #experience
Experience Factors Influence on Motion Technique of “The Way of Tea” by Motion Analysis (SK, TO, ZW, TW, YT, AG, HH), pp. 155–163.
HCIDHM-HM-2015-EndoYASSH #difference #process
Effect of Skill Level Difference in the Polishing Process of the Maki-e Making Technique (AE, HY, CA, TS, YS, HH), pp. 24–34.
HCIDHM-HM-2015-KawabataXGH #comparison
Comparison of KEMOMI Technique Between Master Craftsman and Unskilled Worker (SK, ZX, AG, HH), pp. 316–323.
HCIDHM-HM-2015-MigakiOTMKIH #experience
The Relationship Between Mechanical Properties and the Method Technique of GFRP Plate by Hand Lay-up Method: Effect of the Workers Experience (MM, KO, RT, YM, EK, DI, HH), pp. 143–153.
HCIDHM-HM-2015-SuzukiKTGH
An Investigation on Skillful Gel-Coat Techniques and its Application to Beginner’s Application (ES, TK, YT, AG, HH), pp. 182–191.
HCIDUXU-DD-2015-Fernandez #analysis #health #human-computer #interactive
Interactive Digital Storytelling and HCI Techniques Applied for Edutainment in Interactive Health Projects: Analysis of Two USC’s Labyrinth Projects (JIMF), pp. 621–633.
HCIDUXU-IXD-2015-DasBRD #co-evolution #design #generative
The Use of Generative Techniques in Co-design of mHealth Technology and Healthcare Services for COPD Patients (AD, SB, JR, YD), pp. 587–595.
HCIHCI-DE-2015-NakatsujiYKT #towards
Airway Cursor: A Pointing Technique Based on Direction of Mouse Movement Towards a Targets (TN, KY, IK, YT), pp. 396–404.
HCIHCI-IT-2015-MullerLBSKSW #bibliography #data-driven #network #predict #using
Using Neural Networks for Data-Driven Backchannel Prediction: A Survey on Input Features and Training Techniques (MM, DL, LB, MS, KK, SS, AW), pp. 329–340.
HCIHCI-UC-2015-Obwegeser #development #matter #why
Entrepreneurial IS Development: Why Techniques Matter and Methods Don’t (NO), pp. 218–225.
HCIHIMI-IKC-2015-MatsudaOHT #analysis #automation #generative #multi #problem #testing #using
Analysis of Multiple-Choice Tests Through Erroneous Choices Using a Technique of Automatic Problem Generation (NM, HO, TH, HT), pp. 362–369.
HCIHIMI-IKD-2015-YoshinoO #using
Proposal of a Data Presentation Technique Using Four-Frame Cartoon Expression for a LifeLog System (TY, IO), pp. 235–246.
HCILCT-2015-Sein-EchaluceBG #education #information management #social #using
A Knowledge Management System to Classify Social Educational Resources Within a Subject Using Teamwork Techniques (MLSE, ÁFB, FJGP, MÁCG), pp. 510–519.
HCISCSM-2015-ManssourSSFS #image #network #social #using #visualisation
Using Information Visualization Techniques to Improve the Perception of the Organizations’ Image on Social Networks (IHM, MSS, CQS, AJF, FTS), pp. 55–66.
CAiSECAiSE-2015-WeilerGS #detection #performance #runtime #twitter
Run-Time and Task-Based Performance of Event Detection Techniques for Twitter (AW, MG, MHS), pp. 35–49.
ICEISICEIS-v1-2015-AnjosFBSGM #big data #search-based
Genetic Mapping of Diseases through Big Data Techniques (JCSdA, BRF, JFB, RBS, CG, UM), pp. 279–286.
ICEISICEIS-v1-2015-BedoBOCCRTT #detection #effectiveness #image #performance #social #social media
Techniques for Effective and Efficient Fire Detection from Social Media Images (MVNB, GB, WDO, MTC, AFC, JFRJ, AJMT, CTJ), pp. 34–45.
ICEISICEIS-v1-2015-PfaffK #automation #benchmark #classification #documentation #identification #metric #natural language
Natural Language Processing Techniques for Document Classification in IT Benchmarking — Automated Identification of Domain Specific Terms (MP, HK), pp. 360–366.
ICEISICEIS-v1-2015-SouzaBGBE #learning #online
Applying Ensemble-based Online Learning Techniques on Crime Forecasting (AJdS, APB, HMG, JPB, FE), pp. 17–24.
ICEISICEIS-v2-2015-KustersMT #agile #development #fault #injection
The Impact of Lean Techniques on Factors Influencing Defect Injection in Software Development (RJK, FMM, JJMT), pp. 412–419.
ICEISICEIS-v3-2015-ValentimCM #analysis #case study #specification
Evaluating an Inspection Technique for Use Case Specifications — Quantitative and Qualitative Analysis (NMCV, TC, JCM), pp. 13–24.
KDDKDD-2015-Pratt #machine learning #predict #protocol #proving
Proof Protocol for a Machine Learning Technique Making Longitudinal Predictions in Dynamic Contexts (KBP), pp. 2049–2058.
SEKESEKE-2015-AffonsoLON #adaptation #framework #learning #self
A Framework Based on Learning Techniques for Decision-making in Self-adaptive Software (FJA, GL, RAPO, EYN), pp. 24–29.
SEKESEKE-2015-CabrejosVMC #usability #web
Evaluating Software Engineers’ Acceptance of a Technique and Tool for Web Usability Inspection (LJERC, AMRV, JCM, TC), pp. 140–145.
SEKESEKE-2015-FariasGSOV #architecture #composition #towards
Toward an Architecture for Model Composition Techniques (KF, LG, MS, TCO, MV), pp. 656–659.
SEKESEKE-2015-LopesMBC #diagrams #named
MoLVERIC: An Inspection Technique for MoLIC Diagrams (AL, ABM, SDJB, TC), pp. 13–17.
SEKESEKE-2015-ValentimCEP #how #usability
How do software engineers apply an early usability inspection technique? A qualitative study (NMCV, TC, BJdSE, RP), pp. 686–691.
SIGIRSIGIR-2015-FarSBFH #on the
On Term Selection Techniques for Patent Prior Art Search (MGF, SS, MRB, GF, DH), pp. 803–806.
MoDELSMoDELS-2015-ValentimROCM #case study #empirical #specification #usability
A controlled experiment with Usability Inspection Techniques applied to Use Case Specifications: comparing the MIT 1 and the UCE techniques (NMCV, JR, ACO, TC, SM), pp. 206–215.
PPDPPPDP-2015-Al-HumaimeedyF #multi #specification #verification
Enhancing the specification and verification techniques of multiparty sessions in SOC (ASAH, MF), pp. 19–30.
SACSAC-2015-BritoE #branch #named #performance #query
BranchGuide: an indexing technique for efficient, lossless processing of branching path queries (TBV, GEdS), pp. 1086–1092.
SACSAC-2015-CinalliMPG #multi #optimisation
Collective preferences in evolutionary multi-objective optimization: techniques and potential contributions of collective intelligence (DC, LM, NSP, ACBG), pp. 133–138.
SACSAC-2015-FernandesPCRP #detection #metaheuristic #network #statistics
Statistical, forecasting and metaheuristic techniques for network anomaly detection (GF, EHMP, LFC, JJPCR, MLPJ), pp. 701–707.
SACSAC-2015-GayathriK #rdf #rule-based
Horn-rule based compression technique for RDF data (VG, PSK), pp. 396–401.
SACSAC-2015-MinHJCH #distributed #performance #process #scalability
An efficient backup-recovery technique to process large data in distributed key-value store (DM, TH, JJ, YC, JH), pp. 2072–2074.
SACSAC-2015-MottaMSMPC #3d #image #re-engineering
All-in-focus imaging technique used to improve 3D retinal fundus image reconstruction (DM, LdM, ACdS, RM, AP, LAVdC), pp. 26–31.
SACSAC-2015-TizzeiABC #architecture #case study #product line #tool support #using
Architecting cloud tools using software product line techniques: an exploratory study (LPT, LGA, MdB, RFGC), pp. 1441–1448.
ICSEICSE-v1-2015-GhotraMH #classification #fault #modelling #performance #predict
Revisiting the Impact of Classification Techniques on the Performance of Defect Prediction Models (BG, SM, AEH), pp. 789–800.
ICSEICSE-v1-2015-PapadakisJHT #compilation #detection #effectiveness #empirical #equivalence #performance #scalability
Trivial Compiler Equivalence: A Large Scale Empirical Study of a Simple, Fast and Effective Equivalent Mutant Detection Technique (MP, YJ, MH, YLT), pp. 936–946.
ICSEICSE-v2-2015-Imparato #android #testing #user interface
A Combined Technique of GUI Ripping and Input Perturbation Testing for Android Apps (GI), pp. 760–762.
ICSEICSE-v2-2015-LutellierCGTRMK #architecture #dependence #using
Comparing Software Architecture Recovery Techniques Using Accurate Dependencies (TL, DC, JG, LT, DR, NM, RK), pp. 69–78.
ICSEICSE-v2-2015-NetoTM #empirical #evaluation #testing
An Initiative to Improve Reproducibility and Empirical Evaluation of Software Testing Techniques (FGdON, RT, PDLM), pp. 575–578.
HPCAHPCA-2015-ZhaoY #analysis #distance #manycore #reuse #scalability
Studying the impact of multicore processor scaling on directory techniques via reuse distance analysis (MZ, DY), pp. 590–602.
SOSPSOSP-2015-KasikciSPPC #automation #sketching
Failure sketching: a technique for automated root cause diagnosis of in-production failures (BK, BS, CP, GP, GC), pp. 344–360.
CADECADE-2015-SatoW #dependence #encoding
Encoding Dependency Pair Techniques and Control Strategies for Maximal Completion (HS, SW), pp. 152–162.
CAVCAV-2015-BozzanoCGM #analysis #modelling #performance #safety
Efficient Anytime Techniques for Model-Based Safety Analysis (MB, AC, AG, CM), pp. 603–621.
CSLCSL-2015-GabbayGP
Leaving the Nest: Nominal Techniques for Variables with Interleaving Scopes (MJG, DRG, DP), pp. 374–389.
ICSTICST-2015-Felbinger #assessment #model inference #quality #testing #using
Test Suite Quality Assessment Using Model Inference Techniques (HF), pp. 1–2.
ICSTICST-2015-MahajanH #detection #html #locality #using
Detection and Localization of HTML Presentation Failures Using Computer Vision-Based Techniques (SM, WGJH), pp. 1–10.
ISSTAISSTA-2015-WangPO #fault #locality
Evaluating the usefulness of IR-based fault localization techniques (QW, CP, AO), pp. 1–11.
ASEASE-2014-Burke #feature model
Utilizing feature location techniques for feature addition and feature enhancement (JTB), pp. 879–882.
ASEASE-2014-CavalcantiMNAM #information retrieval #rule-based
Combining rule-based and information retrieval techniques to assign software change requests (YCC, IdCM, PAdMSN, ESdA, SRdLM), pp. 325–330.
ASEASE-2014-MaezawaNWH #ajax #using #validation
Validating ajax applications using a delay-based mutation technique (YM, KN, HW, SH), pp. 491–502.
ASEASE-2014-MahajanH #comparison #html #image #using
Finding HTML presentation failures using image comparison techniques (SM, WGJH), pp. 91–96.
CASECASE-2014-KernWGBM #estimation #machine learning #using
COD and NH4-N estimation in the inflow of Wastewater Treatment Plants using Machine Learning Techniques (PK, CW, DG, MB, SFM), pp. 812–817.
DACDAC-2014-Bhushan #injection #predict #visual notation
A Rigorous Graphical Technique for Predicting Sub-harmonic Injection Locking in LC Oscillators (PB), p. 8.
DACDAC-2014-ChenWLXY #optimisation #runtime
Run-Time Technique for Simultaneous Aging and Power Optimization in GPGPUs (XC, YW, YL, YX, HY), p. 6.
DACDAC-2014-GuoBS #modelling #self
Modeling and Experimental Demonstration of Accelerated Self-Healing Techniques (XG, WB, MRS), p. 6.
DACDAC-2014-LiS #monitoring #pipes and filters #robust #self
Robust and In-Situ Self-Testing Technique for Monitoring Device Aging Effects in Pipeline Circuits (JL, MS), p. 6.
DACDAC-2014-SchaffnerGSKB #approximate #complexity #linear #realtime #video
An Approximate Computing Technique for Reducing the Complexity of a Direct-Solver for Sparse Linear Systems in Real-Time Video Processing (MS, FKG, AS, HK, LB), p. 6.
DACDAC-2014-TsoutsosKM #design #hardware
Advanced Techniques for Designing Stealthy Hardware Trojans (NGT, CK, MM), p. 4.
DACDAC-2014-WeiWNP #physics #reverse engineering #using
Reverse Engineering and Prevention Techniques for Physical Unclonable Functions Using Side Channels (SW, JBW, AN, MP), p. 6.
DACDAC-2014-WendtKP #identification
Techniques for Foundry Identification (JBW, FK, MP), p. 6.
DACDAC-2014-ZalmanM #communication #low cost
A Secure but still Safe and Low Cost Automotive Communication Technique (RZ, AM), p. 5.
DATEDATE-2014-AghaeePE #3d #performance
An efficient temperature-gradient based burn-in technique for 3D stacked ICs (NA, ZP, PE), pp. 1–4.
DATEDATE-2014-BeneventiBVDB #analysis #identification #logic
Thermal analysis and model identification techniques for a logic + WIDEIO stacked DRAM test chip (FB, AB, PV, DD, LB), pp. 1–4.
DATEDATE-2014-HoffmanRAA #analysis #fault #memory management
Wear-out analysis of Error Correction Techniques in Phase-Change Memory (CH, LR, RA, GA), pp. 1–4.
DATEDATE-2014-MineoPAC #adaptation #energy #performance
An adaptive transmitting power technique for energy efficient mm-wave wireless NoCs (AM, MP, GA, VC), pp. 1–6.
DATEDATE-2014-NepalLBR #approximate #automation #behaviour #named #synthesis
ABACUS: A technique for automated behavioral synthesis of approximate computing circuits (KN, YL, RIB, SR), pp. 1–6.
DATEDATE-2014-PandeyV #analysis #fault #safety
Transient errors resiliency analysis technique for automotive safety critical applications (SP, BV), pp. 1–4.
DATEDATE-2014-RanaC #analysis #named #reduction #scalability #simulation
SSFB: A highly-efficient and scalable simulation reduction technique for SRAM yield analysis (MR, RC), pp. 1–6.
DocEngDocEng-2014-SchmitzPD #automation #collaboration #metadata #tool support
DH-CASE II: collaborative annotations in shared environments: metadata, tools and techniques in the digital humanities (PS, LP, QD), pp. 211–212.
DRRDRR-2014-Kavallieratou #documentation
A slant removal technique for document page (EK), p. ?–11.
FASEFASE-2014-StruberRTC #crawling #information retrieval #modelling #using
Splitting Models Using Information Retrieval and Model Crawling Techniques (DS, JR, GT, MC), pp. 47–62.
SANERCSMR-WCRE-2014-DamevskiSP #case study #code search
A case study of paired interleaving for evaluating code search techniques (KD, DCS, LLP), pp. 54–63.
IFMIFM-2014-AsavoaeAR #interprocedural #semantics #slicing #towards
Towards a Formal Semantics-Based Technique for Interprocedural Slicing (IMA, MA, AR), pp. 291–306.
CHICHI-2014-CarringtonHK #design #mobile #smarttech
Wearables and chairables: inclusive design of mobile input and output techniques for power wheelchair users (PC, AH, SKK), pp. 3103–3112.
CHICHI-2014-GongSOHGKP #flexibility #interactive #multimodal #named
PrintSense: a versatile sensing technique to support multimodal flexible surface interaction (NWG, JS, SO, SH, NEG, YK, JAP), pp. 1407–1410.
CHICHI-2014-Hudson #3d #interactive
Printing teddy bears: a technique for 3D printing of soft interactive objects (SEH), pp. 459–468.
CHICHI-2014-Vicencio-MoreiraMGB #effectiveness #game studies
The effectiveness (or lack thereof) of aim-assist techniques in first-person shooter games (RVM, RLM, CG, SB), pp. 937–946.
HCIDHM-2014-OkaGTNH #analysis
Motion Analysis of the Pounding Technique Used for the Second Lining in the Fabrication of Traditional Japanese Hanging Scrolls (YO, AG, YT, CN, HH), pp. 55–65.
HCIDUXU-DI-2014-RugenhagenH #design #development #game studies #research
Game Design Techniques in User Research Methods — A New Way to Reach the High Score in Development Teams (ER, TH), pp. 754–762.
HCIDUXU-TMT-2014-Bergamo #experience #prototype #user interface
User Experience Technique in Computer Digital Arts Production: Paper Prototyping Used as Material to Define Intentionality (MLB), pp. 613–621.
HCIHCI-AIMT-2014-KuribaraMOST #named #using
HandyScope: A Remote Control Technique Using Circular Widget on Tabletops (TK, YM, KO, BS, JT), pp. 69–80.
HCIHCI-AIMT-2014-PalomaresLR #evaluation #multi
Study and Evaluation of Separability Techniques and Occlusion in Multitouch Surfaces (JP, MEL, AR), pp. 293–304.
HCIHCI-AS-2014-LeeYJ #predict #using
Data Preloading Technique using Intention Prediction (SL, JY, DYJ), pp. 32–41.
HCIHCI-AS-2014-OgataII #smarttech #using
Sweat Sensing Technique for Wearable Device Using Infrared Transparency (MO, MI, MI), pp. 323–331.
HCIHCI-TMT-2014-LatoschikF #multimodal #reuse #scalability
Engineering Variance: Software Techniques for Scalable, Customizable, and Reusable Multimodal Processing (MEL, MF), pp. 308–319.
HCIHIMI-DE-2014-KaramT #gesture #interactive #symmetry
Two-Handed Interactive Menu: An Application of Asymmetric Bimanual Gestures and Depth Based Selection Techniques (HK, JT), pp. 187–198.
HCIHIMI-DE-2014-KimH14a #embedded #interactive
Label Embedded Treemapping: A Label Overlap Prevention Technique for Zoomable Treemaps and a User Interaction Technique (KK, JH), pp. 44–53.
HCIHIMI-DE-2014-TavaresB #interactive #user interface #visualisation
A Step Beyond Visualization: Applying User Interface Techniques to Improve Satellite Data Interaction (TAT, HB), pp. 98–107.
HCILCT-NLE-2014-FardounKCC #education
Applying Gianni Rodari Techniques to Develop Creative Educational Environments (HMF, IAK, APC, JRC), pp. 388–397.
HCISCSM-2014-Veglis #social #social media
Moderation Techniques for Social Media Content (AAV), pp. 137–148.
VISSOFTVISSOFT-2014-BlouinMBS #metamodelling #scalability #visualisation
Slicing-Based Techniques for Visualizing Large Metamodels (AB, NM, BB, HAS), pp. 25–29.
VISSOFTVISSOFT-2014-KuleszSB #spreadsheet
Integrating Anomaly Diagnosis Techniques into Spreadsheet Environments (DK, JS, FB), pp. 11–19.
ICEISICEIS-v1-2014-DominguezAERLE #data mining #fuzzy #logic #mining #roadmap #using
Advances in the Decision Making for Treatments of Chronic Patients Using Fuzzy Logic and Data Mining Techniques (MD, JA, JGE, IMR, JMLS, MJE), pp. 325–330.
ICEISICEIS-v1-2014-PengM #approximate #string
Approximate String Matching Techniques (TP, CM), pp. 217–224.
ICEISICEIS-v1-2014-PintoNH #multi #optimisation
Multi-objective Optimization of Investment Strategies — Based on Evolutionary Computation Techniques, in Volatile Environments (JMP, RFN, NH), pp. 480–488.
ICEISICEIS-v1-2014-ShakirIB #machine learning #topic
Machine Learning Techniques for Topic Spotting (NS, EI, ISB), pp. 450–455.
ICEISICEIS-v2-2014-AbakumovA #assessment #enterprise #quality
Quality Assessment Technique for Enterprise Information-management System Software (EMA, DMA), pp. 348–354.
ICEISICEIS-v2-2014-AntonioRF #embedded #modelling #process #validation #verification
Verification and Validation Activities for Embedded Systems — A Feasibility Study on a Reading Technique for SysML Models (EAA, RR, SCPFF), pp. 233–240.
ICEISICEIS-v2-2014-SilvaMS #aspect-oriented #bibliography #evaluation #performance #programming
A Systematic Review on Performance Evaluation of Aspect-Oriented Programming Techniques used to Implement Crosscutting Concerns (RFGdS, MdAM, MSS), pp. 5–13.
ICEISICEIS-v2-2014-SilvaTDO #process
Combining the Spray Technique with Routes to Improve the Routing Process in VANETS (MJdS, FAT, SED, RARO), pp. 583–590.
ICEISICEIS-v2-2014-ThommazoRROHWF #traceability #using
Using Artificial Intelligence Techniques to Enhance Traceability Links (ADT, RR, TRdO, GO, EMH, VW, SCPFF), pp. 26–38.
ECIRECIR-2014-AlsumN #summary #web
Thumbnail Summarization Techniques for Web Archives (AA, MLN), pp. 299–310.
ECIRECIR-2014-LeeC #feedback #pseudo
Cross-Language Pseudo-Relevance Feedback Techniques for Informal Text (CJL, WBC), pp. 260–272.
ICMLICML-c2-2014-MaryPN #algorithm #evaluation
Improving offline evaluation of contextual bandit algorithms via bootstrapping techniques (JM, PP, ON), pp. 172–180.
ICPRICPR-2014-BuiNLYK #detection #order #statistics #using
Boosted Stable Path for Staff-Line Detection Using Order Statistic Downscaling and Coarse-to-Fine Technique (HNB, ISN, GL, HJY, SHK), pp. 522–526.
ICPRICPR-2014-HollausDS #image #multi
Improving OCR Accuracy by Applying Enhancement Techniques on Multispectral Images (FH, MD, RS), pp. 3080–3085.
ICPRICPR-2014-Mishra0M #clustering #database #on the #validation
On Validation of Clustering Techniques for Bibliographic Databases (SM, SS, SM), pp. 3150–3155.
ICPRICPR-2014-MollerPB #analysis #quantifier #using
Quantification of Actin Structures Using Unsupervised Pattern Analysis Techniques (BM, EP, NB), pp. 3251–3256.
ICPRICPR-2014-MoriKNK #detection #using #video
Video Content Detection with Single Frame Level Accuracy Using Dynamic Thresholding Technique (MM, TK, HN, KK), pp. 2560–2565.
KDDKDD-2014-ZhengZLJXLSZLTLDLW #data mining #mining #optimisation #process
Applying data mining techniques to address critical process optimization needs in advanced manufacturing (LZ, CZ, LL, YJ, WX, JL, CS, WZ, HL, LT, TL, BD, ML, PW), pp. 1739–1748.
KEODKEOD-2014-MartinL #library #retrieval
Improving Knowledge Retrieval in Digital Libraries Applying Intelligent Techniques (AM, CL), pp. 445–453.
KRKR-2014-LomuscioM #abstraction #atl #multi #specification #verification
An Abstraction Technique for the Verification of Multi-Agent Systems Against ATL Specifications (AL, JM).
MLDMMLDM-2014-KhasnabishSDS #detection #learning #programming language #source code #using
Detecting Programming Language from Source Code Using Bayesian Learning Techniques (JNK, MS, JD, GS), pp. 513–522.
RecSysRecSys-2014-Braunhofer #recommendation
Hybridisation techniques for cold-starting context-aware recommender systems (MB), pp. 405–408.
SEKESEKE-2014-ChenHQJ #performance #static analysis #using
Improving Static Analysis Performance Using Rule-Filtering Technique (DC, RH, BQ, SJ), pp. 19–24.
SEKESEKE-2014-MaazounBB #feature model
Feature model recovery from product variants based on a cloning technique (JM, NB, HBA), pp. 431–436.
SEKESEKE-2014-ParkHL #power management #refactoring
Investigation for Software Power Consumption of Code Refactoring Techniques (JJP, JEH, SHL), pp. 717–722.
SEKESEKE-2014-SantosRBC #elicitation #requirements #security
Persona Security: A Technique for Supporting the Elicitation of Security Requirements (MADS, JR, RdSB, TC), pp. 603–608.
SEKESEKE-2014-SolariM #detection #empirical #fault #testing
A Controlled Experiment to Explore Potentially Undetectable Defects for Testing Techniques (MS, SM), pp. 106–109.
SIGIRSIGIR-2014-Jones #retrieval #speech #tool support
Speech search: techniques and tools for spoken content retrieval (GJFJ), p. 1287.
AMTAMT-2014-RentschlerWNHR #automation #clustering #legacy #model transformation
Remodularizing Legacy Model Transformations with Automatic Clustering Techniques (AR, DW, QN, LH, RR), pp. 4–13.
BXBX-2014-BrownlowP #integration
Intersection Schemas as a Dataspace Integration Technique (RB, AP), pp. 92–99.
MODELSMoDELS-2014-GomesBA #classification #model transformation #pattern matching #tool support
Classification of Model Transformation Tools: Pattern Matching Techniques (CG, BB, VA), pp. 619–635.
MODELSMoDELS-2014-GomesBA #classification #model transformation #pattern matching #tool support
Classification of Model Transformation Tools: Pattern Matching Techniques (CG, BB, VA), pp. 619–635.
RERE-2014-Ionita #evaluation #identification #information management #risk management #security
Context-sensitive Information security Risk identification and evaluation techniques (DI), pp. 485–488.
SACSAC-2014-KumeNNS #dynamic analysis #framework
A dynamic analysis technique to extract symptoms that suggest side effects in framework applications (IK, NN, MN, ES), pp. 1176–1178.
SACSAC-2014-Umatani #calculus #implementation
Practical implementation techniques of ambient calculus in conventional dynamic languages (SU), pp. 1345–1351.
FSEFSE-2014-ElbaumRP #development #integration #testing
Techniques for improving regression testing in continuous integration development environments (SGE, GR, JP), pp. 235–245.
FSEFSE-2014-JoinerRJDG #performance #policy #weaving
Efficient runtime-enforcement techniques for policy weaving (RJ, TWR, SJ, MD, VG), pp. 224–234.
LCTESLCTES-2014-Whalley #data access #energy #performance
Energy efficient data access techniques (DBW), p. 1.
PPoPPPPoPP-2014-BrownER
A general technique for non-blocking trees (TB, FE, ER), pp. 329–342.
ICSTSAT-2014-JarvisaloK #bound
Conditional Lower Bounds for Failed Literals and Related Techniques (MJ, JHK), pp. 75–84.
TAPTAP-2014-ArcainiGR #abstraction #model checking #testing
An Abstraction Technique for Testing Decomposable Systems by Model Checking (PA, AG, ER), pp. 36–52.
ASEASE-2013-GarciaIM #analysis #architecture #comparative
A comparative analysis of software architecture recovery techniques (JG, II, NM), pp. 486–496.
DACDAC-2013-ChakrabortyLAP #physics
A transmission gate physical unclonable function and on-chip voltage-to-digital conversion technique (RC, CL, DA, JP), p. 10.
DACDAC-2013-ChoMCAM #design #evaluation #fault #injection #robust
Quantitative evaluation of soft error injection techniques for robust system design (HC, SM, CYC, JAA, SM), p. 10.
DACDAC-2013-KunduCSK
An ATE assisted DFD technique for volume diagnosis of scan chains (SK, SC, IS, RK), p. 6.
DACDAC-2013-YuanX #fault #logic #low cost #named #scalability
InTimeFix: a low-cost and scalable technique for in-situ timing error masking in logic circuits (FY, QX), p. 6.
DACDAC-2013-ZhanR #energy
Techniques for energy-efficient power budgeting in data centers (XZ, SR), p. 7.
DATEDATE-2013-CabodiLV #bound #model checking #optimisation
Optimization techniques for craig interpolant compaction in unbounded model checking (GC, CL, DV), pp. 1417–1422.
DATEDATE-2013-ChenWLL #automation #flexibility #process
Automatic circuit sizing technique for the analog circuits with flexible TFTs considering process variation and bending effects (YLC, WRW, GRL, CNJL), pp. 1458–1461.
DATEDATE-2013-ChiangTWHCDN #array #configuration management #on the #order #synthesis #using
On reconfigurable single-electron transistor arrays synthesis using reordering techniques (CEC, LFT, CYW, CYH, YCC, SD, VN), pp. 1807–1812.
DATEDATE-2013-GuoWLLLC #named
DA-RAID-5: a disturb aware data protection technique for NAND flash storage systems (JG, WW, YZ, SL, HL, YC), pp. 380–385.
DATEDATE-2013-KahngLN #design #estimation #metamodelling #problem
Enhanced metamodeling techniques for high-dimensional IC design estimation problems (ABK, BL, SN), pp. 1861–1866.
DATEDATE-2013-ParkCA #energy
Non-speculative double-sampling technique to increase energy-efficiency in a high-performance processor (JP, AC, JAA), pp. 254–257.
DATEDATE-2013-PouyanAMR #adaptation #configuration management #design #implementation
Design and implementation of an adaptive proactive reconfiguration technique for SRAM caches (PP, EA, FM, AR), pp. 1303–1306.
DATEDATE-2013-WangSCC #design #embedded #estimation #performance #reliability
Accurate and efficient reliability estimation techniques during ADL-driven embedded processor design (ZW, KS, CC, AC), pp. 547–552.
DocEngDocEng-2013-TomasiV #automation #collaboration #metadata
Collaborative annotations in shared environments: metadata, vocabularies and techniques in the digital humanities (DH-CASE 2013) (FT, FV), pp. 283–284.
HTHT-2013-LeginusDL #generative #graph
Graph based techniques for tag cloud generation (ML, PD, RL), pp. 148–157.
ICDARICDAR-2013-GebhardtGSD #authentication #detection #documentation #using
Document Authentication Using Printing Technique Features and Unsupervised Anomaly Detection (JG, MG, FS, AD), pp. 479–483.
ICDARICDAR-2013-MondalRRP #kernel #locality #performance #retrieval #word
A Fast Word Retrieval Technique Based on Kernelized Locality Sensitive Hashing (TM, NR, JYR, UP), pp. 1195–1199.
ICDARICDAR-2013-PapandreouG #estimation #word
A Coarse to Fine Skew Estimation Technique for Handwritten Words (AP, BG), pp. 225–229.
VLDBVLDB-2013-BergamaschiGILV #data-driven #database #keyword #machine learning #named #relational #semantics
QUEST: A Keyword Search System for Relational Data based on Semantic and Machine Learning Techniques (SB, FG, MI, RTL, YV), pp. 1222–1225.
VLDBVLDB-2014-DasNLS13 #as a service #cpu #multitenancy #performance #relational
CPU Sharing Techniques for Performance Isolation in Multitenant Relational Database-as-a-Service (SD, VRN, FL, MS), pp. 37–48.
FASEFASE-2013-HoferRWAG #empirical #evaluation #fault #locality #on the #spreadsheet
On the Empirical Evaluation of Fault Localization Techniques for Spreadsheets (BH, AR, FW, RA, EG), pp. 68–82.
TACASTACAS-2013-AbdullaHHJR #concurrent #data type #specification #verification
An Integrated Specification and Verification Technique for Highly Concurrent Data Structures (PAA, FH, LH, BJ, AR), pp. 324–338.
ICPCICPC-2013-EddyRKC #replication #source code #summary
Evaluating source code summarization techniques: Replication and expansion (BPE, JAR, NAK, JCC), pp. 13–22.
ICSMEICSM-2013-HillBBDLO #feature model #question
Which Feature Location Technique is Better? (EH, AB, DB, BD, DL, RO), pp. 408–411.
WCREWCRE-2013-IshioHKO #automation #effectiveness #feature model #on the
On the effectiveness of accuracy of automated feature location technique (TI, SH, HK, TO), pp. 381–390.
ICALPICALP-v1-2013-MegowV #scheduling
Dual Techniques for Scheduling on a Machine with Varying Speed (NM, JV), pp. 745–756.
LATALATA-2013-RotBR #equivalence #induction #proving
Coinductive Proof Techniques for Language Equivalence (JR, MMB, JJMMR), pp. 480–492.
CHICHI-2013-AlperBRIF #analysis #comparison #graph
Weighted graph comparison techniques for brain connectivity analysis (BA, BB, NHR, TI, JDF), pp. 483–492.
CHICHI-2013-AltSKS #interactive
Interaction techniques for creating and exchanging content with public displays (FA, ASS, TK, AS), pp. 1709–1718.
CHICHI-2013-JuhlinO #collaboration #design #gesture #interactive #on the
On the relation of ordinary gestures to TV screens: general lessons for the design of collaborative interactive techniques (OJ, ), pp. 919–930.
CHICHI-2013-WalshFYD #analysis #design #framework
FACIT PD: a framework for analysis and creation of intergenerational techniques for participatory design (GW, EF, JCY, AD), pp. 2893–2902.
HCIDHM-HB-2013-CaoJHK #assessment #modelling #using
Ergonomic Assessment of Patient Barrow Lifting Technique Using Digital Human Modeling (WC, MJ, YH, MTK), pp. 20–29.
HCIDUXU-CXC-2013-AlhafzyAMA #experience #novel
A Novel Reading Technique Application: Exploring Arabic Children Experience (MSA, EAA, HHM, MA), pp. 3–10.
HCIDUXU-PMT-2013-PenhaCSCB #evaluation #usability
Ergonomic Evaluation of Usability with Users — Application of the Technique of Cooperative Evaluation (MP, WC, MMS, FC, MB), pp. 379–388.
HCIDUXU-WM-2013-GencerBZV #framework #machine learning #mobile #using
A New Framework for Increasing User Engagement in Mobile Applications Using Machine Learning Techniques (MG, GB, ÖZ, TV), pp. 651–659.
HCIDUXU-WM-2013-LeNDP #interactive #process
Scaffolding Computer Supported Argumentation Processes through Mini Map Based Interaction Techniques (NTL, SN, DD, NP), pp. 533–542.
HCIHCI-AS-2013-AndujarEGM #learning
Evaluating Engagement Physiologically and Knowledge Retention Subjectively through Two Different Learning Techniques (MA, JIE, JEG, PM), pp. 335–342.
HCIHCI-AS-2013-MajimaMSS #learning
A Proposal of the New System Model for Nursing Skill Learning Based on Cognition and Technique (YM, YM, MS, MS), pp. 134–143.
HCIHCI-III-2013-TsurudaHYI #generative #mobile #using
Generation of Facial Expression Emphasized with Cartoon Techniques Using a Cellular-Phone-Type Teleoperated Robot with a Mobile Projector (YT, MH, HY, YI), pp. 391–400.
HCIHCI-IMT-2013-KinoshitaSG #navigation
A Page Navigation Technique for Overlooking Content in a Digital Magazine (YK, MS, KG), pp. 456–461.
HCIHCI-IMT-2013-YoshikawaMKST #using
A Remote Pointing Technique Using Pull-out (TY, YM, TK, BS, JT), pp. 416–426.
HCIHIMI-D-2013-NakanoOM #3d #artificial reality #using
Leaning Origami Using 3D Mixed Reality Technique (AN, MO, HM), pp. 126–132.
HCIHIMI-LCCB-2013-Eschenbrenner #information management #self
Enhancing Information Systems Users’ Knowledge and Skills Transference through Self-regulation Techniques (BE), pp. 16–24.
ICEISICEIS-J-2013-AlvesSCCCWGBGC13a #named #semantics #tool support #traceability #web
Fairtrace: Applying Semantic Web Tools and Techniques to the Textile Traceability (BA, MS, FC, ALC, GC, DW, CG, BB, DG, PC), pp. 68–84.
ICEISICEIS-v1-2013-CoelhoAABB #industrial #network
Deploying Nodes for Industrial Wireless Networks by Artificial Immune Systems Techniques (PHGC, JLMdA, JFMdA, LFdAB, AVdB), pp. 536–540.
CIKMCIKM-2013-WhangG
Disinformation techniques for entity resolution (SEW, HGM), pp. 715–720.
CIKMCIKM-2013-ZhangLL #performance #privacy #robust #streaming
An efficient and robust privacy protection technique for massive streaming choice-based information (JZ, XL, YL), pp. 1169–1172.
KDDKDD-2013-FriezeGT #algorithm #graph #mining #modelling #scalability
Algorithmic techniques for modeling and mining large graphs (AMAzING) (AMF, AG, CET), p. 1523.
KDIRKDIR-KMIS-2013-BaliBBG #information management #tool support #using
Using Knowledge Management Tools and Techniques to Increase the Rate of Attendance at Breast Screening (RKB, JB, VB, MCG), pp. 344–350.
KDIRKDIR-KMIS-2013-PereiraRT #data mining #mining #source code #student
Extraction Student Dropout Patterns with Data Mining Techniques in Undergraduate Programs (RTP, ACR, JJT), pp. 136–142.
KEODKEOD-2013-ZouhaierDA #automation #generative #reasoning #using
Automatic Generation of UIs for Disabled Users using Context-aware Techniques and Reasoning (LZ, YBH, LJBA), pp. 413–418.
MLDMMLDM-2013-ValencioKMSM #3d #data mining #mining #visualisation
3D Geovisualisation Techniques Applied in Spatial Data Mining (CRV, TK, CAdM, RCGdS, JMM), pp. 57–68.
SEKESEKE-2013-AnchietaSM #case study #diagrams #identification #prototype #uml #user interface #using
Using NLP Techniques for Identifying GUI Prototypes and UML Diagrams From Use Cases (RTA, RFdS, RSM), pp. 48–53.
SEKESEKE-2013-GaoKN #estimation #preprocessor #quality
Exploring Ensemble-Based Data Preprocessing Techniques for Software Quality Estimation (KG, TMK, AN), pp. 612–617.
SEKESEKE-2013-LiuWL #analysis #detection #named #online #performance #pointer
ELCD: an efficient online cycle detection technique for pointer analysis (FL, LW, BL), pp. 606–611.
SEKESEKE-2013-MarcalGCJ #identification #mining #repository #using
Mining Software Repository to Identify Crosscutting Concerns Using Combined Techniques (S) (IM, REG, RCMC, COJ), pp. 338–343.
SEKESEKE-2013-Perez-CastilloGGFP #android #migration #user interface #visual notation
ANDRIU. A Technique for Migrating Graphical User Interfaces to Android (S) (RPC, IGRdG, RGC, MFR, MP), pp. 516–519.
SEKESEKE-2013-WangKWN #case study #feature model #first-order #metric #statistics
A Study on First Order Statistics-Based Feature Selection Techniques on Software Metric Data (HW, TMK, RW, AN), pp. 467–472.
SEKESEKE-2013-YuYLC #empirical #testing #web
An Empirical Study of an Improved Web Application Fuzz Testing Technique (S) (LY, ZY, CL, FC), pp. 400–404.
SIGIRSIGIR-2013-HungTLA #benchmark #crowdsourcing #metric #named
BATC: a benchmark for aggregation techniques in crowdsourcing (NQVH, NTT, NTL, KA), pp. 1079–1080.
SIGIRSIGIR-2013-MoshfeghiJ #behaviour #effectiveness #feedback #using
An effective implicit relevance feedback technique using affective, physiological and behavioural features (YM, JMJ), pp. 133–142.
SIGIRSIGIR-2013-ShenWYC #multi #recommendation
Multimedia recommendation: technology and techniques (JS, MW, SY, PC), p. 1131.
SKYSKY-2013-SuarezMFM #automation #generative #natural language #semantics #using
Automatic Generation of Semantic Patterns using Techniques of Natural Language Processing (PS, VM, AF, JLM), pp. 34–44.
MODELSMoDELS-2013-FondementMTWF #metamodelling
Big Metamodels Are Evil — Package Unmerge — A Technique for Downsizing Metamodels (FF, PAM, LT, BW, GF), pp. 138–153.
MODELSMoDELS-2013-NoyritGT #analysis #domain-specific language #integration #modelling #using
Computer Assisted Integration of Domain-Specific Modeling Languages Using Text Analysis Techniques (FN, SG, FT), pp. 505–521.
MODELSMoDELS-2013-FondementMTWF #metamodelling
Big Metamodels Are Evil — Package Unmerge — A Technique for Downsizing Metamodels (FF, PAM, LT, BW, GF), pp. 138–153.
MODELSMoDELS-2013-NoyritGT #analysis #domain-specific language #integration #modelling #using
Computer Assisted Integration of Domain-Specific Modeling Languages Using Text Analysis Techniques (FN, SG, FT), pp. 505–521.
OOPSLAOOPSLA-2013-Xu #named #optimisation #profiling #source code
Resurrector: a tunable object lifetime profiling technique for optimizing real-world programs (G(X), pp. 111–130.
SACSAC-2013-DurelliSADC #bibliography #mining
A systematic review on mining techniques for crosscutting concerns (RSD, DSMS, NA, MED, VVdC), pp. 1080–1087.
SACSAC-2013-TheodouliG #adaptation #data-driven #query #web #web service
Adaptive memory-aware chunk sizing techniques for data-intensive queries over web services (AT, AG), pp. 826–831.
ESEC-FSEESEC-FSE-2013-JiangLZDSGS #design #embedded #multi #optimisation #using
Design and optimization of multi-clocked embedded systems using formal technique (YJ, ZL, HZ, YD, XS, MG, JS), pp. 703–706.
ICSEICSE-2013-CotroneoPR #testing
A learning-based method for combining testing techniques (DC, RP, SR), pp. 142–151.
ICSEICSE-2013-GivensCSY #grammar inference #user interface
Exploring the internal state of user interfaces by combining computer vision techniques with grammatical inference (PG, AC, SS, TY), pp. 1165–1168.
ASPLOSASPLOS-2013-JogKNMKMID #array #concurrent #named #owl #performance #scheduling #thread
OWL: cooperative thread array aware scheduling techniques for improving GPGPU performance (AJ, OK, NCN, AKM, MTK, OM, RI, CRD), pp. 395–406.
CGOCGO-2013-RodriguesCP #integer #performance #source code
A fast and low-overhead technique to secure programs against integer overflows (RER, VHSC, FMQP), p. 11.
LCTESLCTES-2013-MehiaouiWPMNZBLG #clustering #distributed #optimisation
A two-step optimization technique for functions placement, partitioning, and priority assignment in distributed systems (AM, EW, STP, CM, MDN, HZ, JPB, LL, SG), pp. 121–132.
PPoPPPPoPP-2013-PadmanabhanCC #composition #streaming
Decomposition techniques for optimal design-space exploration of streaming applications (SP, YC, RDC), pp. 285–286.
CADECADE-2013-ReynoldsTGKDB #finite #quantifier #smt
Quantifier Instantiation Techniques for Finite Model Finding in SMT (AR, CT, AG, SK, MD, CB), pp. 377–391.
ICTSSICTSS-2013-FariaPC #consistency #diagrams #sequence chart #testing #tool support #uml
Techniques and Toolset for Conformance Testing against UML Sequence Diagrams (JPF, ACRP, MVdC), pp. 180–195.
ISSTAISSTA-2013-QiMLW #automation #effectiveness #fault #locality #program repair #using
Using automated program repair for evaluating the effectiveness of fault localization techniques (YQ, XM, YL, CW), pp. 191–201.
QoSAQoSA-2012-KrebsMK #metric #performance
Metrics and techniques for quantifying performance isolation in cloud environments (RK, CM, SK), pp. 91–100.
ASEASE-2012-Gabmeyer #model transformation #verification
Formal verification techniques for model transformations specified by-demonstration (SG), pp. 390–393.
CASECASE-2012-Kim #analysis #fuzzy #robust
Robust stability analysis of T-S fuzzy systems with interval time-varying delays via a relaxation technique (SHK), pp. 829–832.
DACDAC-2012-LiuARVG #component #multi #performance #synthesis
Efficient multi-objective synthesis for microwave components based on computational intelligence techniques (BL, HA, SR, GAEV, GGEG), pp. 542–548.
DACDAC-2012-PaekMSSK #markov #named #random
PowerField: a transient temperature-to-power technique based on Markov random field theory (SP, SHM, WS, JS, LSK), pp. 630–635.
DATEDATE-2012-BozgaDHHLLT #analysis #embedded #modelling #state of the art #tool support
State-of-the-art tools and techniques for quantitative modeling and analysis of embedded systems (MB, AD, AH, HH, KGL, AL, JT), pp. 370–375.
DATEDATE-2012-ChenLPCPWHWM #design
Nano-Electro-Mechanical relays for FPGA routing: Experimental demonstration and a design technique (CC, WSL, RP, SC, JP, JW, RTH, HSPW, SM), pp. 1361–1366.
DATEDATE-2012-GerdesKURS #realtime
Time analysable synchronisation techniques for parallelised hard real-time applications (MG, FK, TU, CR, PS), pp. 671–676.
DATEDATE-2012-HamoudaAK #automation #image #modelling #novel
AIR (Aerial Image Retargeting): A novel technique for in-fab automatic model-based retargeting-for-yield (AYH, MA, KSK), pp. 1603–1608.
DATEDATE-2012-JiangEP #co-evolution #communication #constraints #design #distributed #embedded #realtime #security
Co-design techniques for distributed real-time embedded systems with communication security constraints (KJ, PE, ZP), pp. 947–952.
DATEDATE-2012-MohammadiEEM #fault #injection #named
SCFIT: A FPGA-based fault injection technique for SEU fault model (AM, ME, AE, SGM), pp. 586–589.
DATEDATE-2012-NasseryO
An analytical technique for characterization of transceiver IQ imbalances in the loop-back mode (AN, SO), pp. 1084–1089.
DATEDATE-2012-PatilJCLYPLCC #logic
Weighted area technique for electromechanically enabled logic computation with cantilever-based NEMS switches (SP, MWJ, CLC, DL, ZY, WEP, DJL, SAC, TC), pp. 727–732.
DATEDATE-2012-VatajeluF #evaluation #parametricity #performance #reliability
Efficiency evaluation of parametric failure mitigation techniques for reliable SRAM operation (EIV, JF), pp. 1343–1348.
SIGMODSIGMOD-2012-HarthHS #data transformation #database #linked data #open data
Database techniques for linked data management (AH, KH, RS), pp. 597–600.
SIGMODSIGMOD-2012-ZhouBL #clustering #distributed
Advanced partitioning techniques for massively distributed computation (JZ, NB, WL), pp. 13–24.
VLDBVLDB-2012-LiKNC #estimation #query #robust #sql #statistics #using
Robust Estimation of Resource Consumption for SQL Queries using Statistical Techniques (JL, ACK, VRN, SC), pp. 1555–1566.
ITiCSEITiCSE-2012-Assiter #effectiveness
Introvert educators: techniques to be effective in the traditional face-to-face CS classroom (KVA), p. 381.
ITiCSEITiCSE-2012-HeinesGR #music
Techniques at the intersection of computing and music (JMH, GRG, SAR), p. 372.
ESOPESOP-2012-FajstrupGHMR #performance #reduction
Trace Spaces: An Efficient New Technique for State-Space Reduction (LF, EG, EH, SM, MR), pp. 274–294.
FASEFASE-2012-RuscioMMPP #architecture #modelling
Model-Driven Techniques to Enhance Architectural Languages Interoperability (DDR, IM, HM, PP, AP), pp. 26–42.
CSMRCSMR-2012-IslamMSS #multi #semantics #testing
A Multi-Objective Technique to Prioritize Test Cases Based on Latent Semantic Indexing (MMI, AM, AS, GS), pp. 21–30.
CSMRCSMR-2012-Varro #maintenance #model transformation
Keynote 2: A Bridge Over Troubled Water — Synergies between Model Transformation and Software Maintenance Techniques (DV), pp. 5–6.
CSMRCSMR-2012-Villavicencio #maintenance #refactoring
A New Software Maintenance Scenario Based on Refactoring Techniques (GV), pp. 341–346.
PLDIPLDI-2012-OanceaR #logic #parallel
Logical inference techniques for loop parallelization (CEO, LR), pp. 509–520.
SASSAS-2012-Midtgaard0M #proving
A Structural Soundness Proof for Shivers’s Escape Technique — A Case for Galois Connections (JM, MDA, MM), pp. 352–369.
FMFM-2012-GrumbergMY #behaviour #model checking #modelling #uml
Applying Software Model Checking Techniques for Behavioral UML Models (OG, YM, KY), pp. 277–292.
FMFM-2012-NedunuriSC #algorithm #performance
Theory and Techniques for Synthesizing Efficient Breadth-First Search Algorithms (SN, DRS, WRC), pp. 308–325.
CHICHI-2012-GirouardTV #flexibility #interactive #named
DisplayStacks: interaction techniques for stacks of flexible thin-film displays (AG, APT, RV), pp. 2431–2440.
CHICHI-2012-HinckleyBPB #information management
Informal information gathering techniques for active reading (KH, XB, MP, BB), pp. 1893–1896.
CHICHI-2012-MasliT #community #online
Evaluating compliance-without-pressure techniques for increasing participation in online communities (MM, LGT), pp. 2915–2924.
CHICHI-2012-SchneiderSMESS #collaboration #named #student
Phylo-Genie: engaging students in collaborative “tree-thinking” through tabletop techniques (BS, MS, LM, SE, OS, CS), pp. 3071–3080.
CHICHI-2012-SeifriedRHS #interactive #scalability #undo
Regional undo/redo techniques for large interactive surfaces (TS, CR, MH, SDS), pp. 2855–2864.
CAiSECAiSE-2012-MahauxH #agile #information management #prototype
Improvisational Theater for Information Systems: An Agile, Experience-Based, Prototyping Technique (MM, PH), pp. 699–700.
EDOCEDOC-2012-BurattinMAS #analysis #declarative #process
Techniques for a Posteriori Analysis of Declarative Processes (AB, FMM, WMPvdA, AS), pp. 41–50.
ICEISICEIS-v2-2012-AokiOOM #model checking #quality #requirements #specification #using
Quality Improvement of Requirements Specification using Model Checking Technique (YA, SO, HO, SM), pp. 401–406.
CIKMCIKM-2012-LiangZ #classification #performance
An efficient and simple under-sampling technique for imbalanced time series classification (GL, CZ), pp. 2339–2342.
ECIRECIR-2012-AkerFSG #image #summary
Investigating Summarization Techniques for Geo-Tagged Image Indexing (AA, XF, MS, RJG), pp. 472–475.
KRKR-2012-BelardinelliLP #abstraction #verification
An Abstraction Technique for the Verification of Artifact-Centric Systems (FB, AL, FP).
MLDMMLDM-2012-Thombre #classification #network
Comparing Logistic Regression, Neural Networks, C5.0 and M5′ Classification Techniques (AT), pp. 132–140.
RecSysRecSys-2012-BelloginP #clustering #collaboration #graph #using
Using graph partitioning techniques for neighbour selection in user-based collaborative filtering (AB, JP), pp. 213–216.
SEKESEKE-2012-CunhaCAM #modelling #product line #set
A Set of Inspection Techniques on Software Product Line Models (RC, TC, ESdA, JCM), pp. 657–662.
SEKESEKE-2012-FernandesCB #usability #web
Improving a Web Usability Inspection Technique through an Observational Study (PF, TC, BB), pp. 588–593.
SEKESEKE-2012-HossianG #concept #process #requirements
Phases, Activities, and Techniques for a Requirements Conceptualization Process (AH, RGM), pp. 25–32.
SEKESEKE-2012-SouzaR #performance
A proposal for the improvement of the technique of Earned Value Management utilizing the history of performance data (ADdS, ARCdR), pp. 753–758.
SEKESEKE-2012-VieiraVNC #elicitation #empirical #using
Using Empirical Studies to Evaluate the REMO Requirement Elicitation Technique (SRCV, DV, RdN, TC), pp. 33–38.
SEKESEKE-2012-WangKWN #empirical #fault #metric #predict
An Empirical Study of Software Metric Selection Techniques for Defect Prediction (HW, TMK, RW, AN), pp. 94–99.
BXBX-2012-AnjorinVS #constraints #graph grammar #programming
Complex Attribute Manipulation in TGGs with Constraint-Based Programming Techniques (AA, GV, AS), pp. 68–83.
ECMFAECMFA-2012-VarroAS #pattern matching #unification
Unification of Compiled and Interpreter-Based Pattern Matching Techniques (GV, AA, AS), pp. 368–383.
SACSAC-2012-ChebaroKGJ #dynamic analysis #slicing #verification
Program slicing enhances a verification technique combining static and dynamic analysis (OC, NK, AG, JJ), pp. 1284–1291.
SACSAC-2012-GranitzerHJK #comparison #crowdsourcing #data transformation #metadata
A comparison of metadata extraction techniques for crowdsourced bibliographic metadata management (MG, MH, KJ, RK), pp. 962–964.
SACSAC-2012-MaggiorePBA #3d #compilation #performance #safety
A compilation technique to increase X3D performance and safety (GM, FP, MB, MA), pp. 969–974.
SACSAC-2012-ShatnawiM #bibliography #online #personalisation #statistics
Statistical techniques for online personalized advertising: a survey (MS, NM), pp. 680–687.
SACSAC-2012-ShinC #comparative #evaluation #feedback #requirements #retrieval
A comparative evaluation of two user feedback techniques for requirements trace retrieval (YS, JCH), pp. 1069–1074.
SACSAC-2012-ZingarelliAG #named
RevGlyph: a technique for reverting anaglyph stereoscopic videos (MRUZ, LAdA, RG), pp. 1005–1011.
FSEFSE-2012-BeyerHKW #model checking #verification
Conditional model checking: a technique to pass information between verifiers (DB, TAH, MEK, PW), p. 57.
ICSEICSE-2012-Bailey #adaptation #modelling #self
Application of Self-Adaptive techniques to federated authorization models (CB), pp. 1495–1498.
ICSEICSE-2012-CarzanigaGMP #java #self
A self-healing technique for Java applications (AC, AG, AM, NP), pp. 1445–1446.
ICSEICSE-2012-RogersGQB #documentation
Exploring techniques for rationale extraction from existing documents (BR, JG, YQ, JEB), pp. 1313–1316.
CGOCGO-2012-JangLSL #automation #memory management #multi
An automatic code overlaying technique for multicores with explicitly-managed memory hierarchies (CJ, JL, SS, JL), pp. 219–229.
PPoPPPPoPP-2012-DiceMS #design
Lock cohorting: a general technique for designing NUMA locks (DD, VJM, NS), pp. 247–256.
PPoPPPPoPP-2012-FatourouK
Revisiting the combining synchronization technique (PF, NDK), pp. 257–266.
ICLPICLP-2012-MarateaPR #machine learning
Applying Machine Learning Techniques to ASP Solving (MM, LP, FR), pp. 37–48.
ICSTICST-2012-AlesioGNB #constraints #optimisation #realtime #testing #using
Testing Deadline Misses for Real-Time Systems Using Constraint Optimization Techniques (SDA, AG, SN, LCB), pp. 764–769.
ICSTICST-2012-GotliebHB #constraints #programming #using
Minimum Pairwise Coverage Using Constraint Programming Techniques (AG, AH, BB), pp. 773–774.
ICSTICST-2012-KauffmanK #framework #industrial #research #testing
A Framework to Support Research in and Encourage Industrial Adoption of Regression Testing Techniques (JMK, GMK), pp. 907–908.
ICTSSICTSS-2012-JohansenHFCEW #agile #automation #interactive #product line #testing
A Technique for Agile and Automatic Interaction Testing for Product Lines (MFJ, ØH, FF, EC, JE, TW), pp. 39–54.
IJCARIJCAR-2012-KuhlweinLTUH #bibliography #evaluation #scalability
Overview and Evaluation of Premise Selection Techniques for Large Theory Mathematics (DK, TvL, ET, JU, TH), pp. 378–392.
IJCARIJCAR-2012-Matiyasevich #automation #reasoning
Enlarging the Scope of Applicability of Successful Techniques for Automated Reasoning in Mathematics (YM), p. 9.
RTARTA-2012-ThiemannAN #formal method #multi #on the #order #termination
On the Formalization of Termination Techniques based on Multiset Orderings (RT, GA, JN), pp. 339–354.
SMTSMT-2012-AzizWD #estimation #machine learning #problem #smt
A Machine Learning Technique for Hardness Estimation of QFBV SMT Problems (MAA, AGW, NMD), pp. 57–66.
ECSAECSA-2011-JohnsenPL #architecture #specification #verification
An Architecture-Based Verification Technique for AADL Specifications (AJ, PP, KL), pp. 105–113.
ECSAECSA-2011-NavarroCPR #architecture #model transformation #using
Using Model Transformation Techniques for the Superimposition of Architectural Styles (EN, CEC, DEP, CR), pp. 379–387.
ECSAECSA-2011-TofanGA #architecture #grid
Reducing Architectural Knowledge Vaporization by Applying the Repertory Grid Technique (DT, MG, PA), pp. 244–251.
ASEASE-2011-ChenG #automation #documentation #retrieval #traceability
Improving automated documentation to code traceability by combining retrieval techniques (XC, JCG), pp. 223–232.
CASECASE-2011-Bonhomme #petri net #realtime #scheduling
A symbolic schedulability technique of real-time systems modeled by P-Time Petri nets (PB), pp. 582–587.
DACDAC-2011-AadithyaVDR #impact analysis #named #predict #probability #random
MUSTARD: a coupled, stochastic/deterministic, discrete/continuous technique for predicting the impact of random telegraph noise on SRAMs and DRAMs (KVA, SV, AD, JSR), pp. 292–297.
DACDAC-2011-NowrozWR #modelling #using
Improved post-silicon power modeling using AC lock-in techniques (ANN, GW, SR), pp. 101–106.
DACDAC-2011-WeiP #security #using
Integrated circuit security techniques using variable supply voltage (SW, MP), pp. 248–253.
DATEDATE-2011-AcquavivaPOS #power management #reliability
System level techniques to improve reliability in high power microcontrollers for automotive applications (AA, MP, MO, MS), pp. 1123–1124.
DATEDATE-2011-BalasubramanianSMNDKMPPVT #low cost #power management #robust
Circuit and DFT techniques for robust and low cost qualification of a mixed-signal SoC with integrated power management system (LB, PS, RKM, PN, RKD, ADK, SM, SP, HP, RCV, ST), pp. 551–554.
DATEDATE-2011-ChanSGK #on the
On the efficacy of NBTI mitigation techniques (TBC, JS, PG, RK), pp. 932–937.
DATEDATE-2011-EbrahimiMA #fault #named #safety
ScTMR: A scan chain-based error recovery technique for TMR systems in safety-critical applications (ME, SGM, HA), pp. 298–292.
DATEDATE-2011-FerentD #automation #design #similarity
A symbolic technique for automated characterization of the uniqueness and similarity of analog circuit design features (CF, AD), pp. 1212–1217.
DATEDATE-2011-JuanGM #3d #evaluation #multi #process #statistics
Statistical thermal evaluation and mitigation techniques for 3D Chip-Multiprocessors in the presence of process variations (DCJ, SG, DM), pp. 383–388.
DATEDATE-2011-KamalAP
Timing variation-aware custom instruction extension technique (MK, AAK, MP), pp. 1517–1520.
DATEDATE-2011-LiuS #continuation #optimisation #performance
An efficient mask optimization method based on homotopy continuation technique (FL, XS), pp. 1053–1058.
DATEDATE-2011-MeynardRFGHD
Enhancement of simple electro-magnetic attacks by pre-characterization in frequency domain and demodulation techniques (OM, DR, FF, SG, NH, JLD), pp. 1004–1009.
DATEDATE-2011-MistryAFH #power management
Sub-clock power-gating technique for minimising leakage power during active mode (JNM, BMAH, DF, SH), pp. 106–111.
DATEDATE-2011-ReimerPSB #integration #orthogonal
Integration of orthogonal QBF solving techniques (SR, FP, CS, BB), pp. 149–154.
DATEDATE-2011-SterponeCMWF #configuration management #power management
A new reconfigurable clock-gating technique for low power SRAM-based FPGAs (LS, LC, DM, SW, FF), pp. 752–757.
DATEDATE-2011-TinoK #architecture #generative #multi
Multi-objective Tabu Search based topology generation technique for application-specific Network-on-Chip architectures (AT, GNK), pp. 485–490.
DATEDATE-2011-WangCC #self
An all-digital built-in self-test technique for transfer function characterization of RF PLLs (PYW, HMC, KTC), pp. 359–364.
DATEDATE-2011-WangKAWMA #energy #simulation #using
Accelerated simulation of tunable vibration energy harvesting systems using a linearised state-space technique (LW, TJK, BMAH, ASW, GVM, INAG), pp. 1267–1272.
DATEDATE-2011-WeddellMA #power management
Ultra low-power photovoltaic MPPT technique for indoor and outdoor wireless sensor nodes (ASW, GVM, BMAH), pp. 905–908.
ICDARICDAR-2011-AlaeiPNK #documentation #estimation
A Painting Based Technique for Skew Estimation of Scanned Documents (AA, UP, PN, FK), pp. 299–303.
ICDARICDAR-2011-EraqiA #online #recognition #segmentation
An On-line Arabic Handwriting Recognition System: Based on a New On-line Graphemes Segmentation Technique (HME, SAA), pp. 409–413.
ICDARICDAR-2011-FerilliBEB #recognition
A Contour-Based Progressive Technique for Shape Recognition (SF, TMAB, FE, MB), pp. 723–727.
ICDARICDAR-2011-PapandreouG #detection #novel
A Novel Skew Detection Technique Based on Vertical Projections (AP, BG), pp. 384–388.
ICDARICDAR-2011-RashidSB #evaluation #recognition
An Evaluation of HMM-Based Techniques for the Recognition of Screen Rendered Text (SFR, FS, TMB), pp. 1260–1264.
ICDARICDAR-2011-SmithGSL #evaluation
Evaluation of Voting with Form Dropout Techniques for Ballot Vote Counting (EHBS, SG, RS, DPL), pp. 473–477.
ICDARICDAR-2011-SokratisK
A Tool for Tuning Binarization Techniques (SV, EK), pp. 1–5.
ICDARICDAR-2011-SuLT #documentation #image
Combination of Document Image Binarization Techniques (BS, SL, CLT), pp. 22–26.
SIGMODSIGMOD-2011-HanPLKY #analysis #graph #performance
iGraph in action: performance analysis of disk-based graph indexing techniques (WSH, MDP, JL, RK, JXY), pp. 1241–1242.
SIGMODSIGMOD-2011-HerodotouBB #optimisation #query
Query optimization techniques for partitioned tables (HH, NB, SB), pp. 49–60.
VLDBVLDB-2011-FloratouPST #pipes and filters
Column-Oriented Storage Techniques for MapReduce (AF, JMP, EJS, ST), pp. 419–429.
VLDBVLDB-2011-GrecoST #termination
Stratification Criteria and Rewriting Techniques for Checking Chase Termination (SG, FS, IT), pp. 1158–1168.
ITiCSEITiCSE-2011-TaylorK #injection #security #student
Security injections: modules to help students remember, understand, and apply secure coding techniques (BT, SK), pp. 3–7.
CSMRCSMR-2011-AlawnehH #abstraction #communication #pattern matching #pattern recognition #recognition
Pattern Recognition Techniques Applied to the Abstraction of Traces of Inter-Process Communication (LA, AHL), pp. 211–220.
ICPCICPC-2011-DitGPA #feature model #identifier #question
Can Better Identifier Splitting Techniques Help Feature Location? (BD, LG, DP, GA), pp. 11–20.
ICPCICPC-2011-Sharafi #analysis #architecture #visualisation
A Systematic Analysis of Software Architecture Visualization Techniques (ZS), pp. 254–257.
ICSMEICSM-2011-PirzadehHS #analysis #execution #mining
Exploiting text mining techniques in the analysis of execution traces (HP, AHL, MS), pp. 223–232.
ICSMEICSM-2011-VasilescuSB #case study #metric
You can’t control the unfamiliar: A study on the relations between aggregation techniques for software metrics (BV, AS, MvdB), pp. 313–322.
WCREWCRE-2011-Beard #debugging #information retrieval #locality #using
Extending Bug Localization Using Information Retrieval and Code Clone Location Techniques (MDB), pp. 425–428.
WCREWCRE-2011-BeardKEL #debugging #information retrieval #locality
Measuring the Accuracy of Information Retrieval Based Bug Localization Techniques (MDB, NAK, LHE, SKL), pp. 124–128.
WCREWCRE-2011-DaviesRW #debugging #dependence #evaluation
A Preliminary Evaluation of Text-based and Dependency-based Techniques for Determining the Origins of Bugs (SD, MR, MW), pp. 201–210.
PLDIPLDI-2011-BestMMRFB #scheduling
Synchronization via scheduling: techniques for efficiently managing shared state (MJB, SM, CM, MR, AF, AB), pp. 640–652.
SASSAS-2011-HuangZ #concurrent #debugging #performance #source code
An Efficient Static Trace Simplification Technique for Debugging Concurrent Programs (JH, CZ), pp. 163–179.
SEFMSEFM-2011-TschannenFNM #object-oriented #source code #verification
Usable Verification of Object-Oriented Programs by Combining Static and Dynamic Techniques (JT, CAF, MN, BM), pp. 382–398.
SFMSFM-2011-ForejtKNP #automation #probability #verification
Automated Verification Techniques for Probabilistic Systems (VF, MZK, GN, DP), pp. 53–113.
GT-VMTGT-VMT-2011-GogollaHXZ #visual notation
Exploring (Meta-)Model Snapshots by Combining Visual and Textual Techniques (MG, LH, JX, JZ).
CHICHI-2011-BlanchO #benchmark #metric #paradigm
Benchmarking pointing techniques with distractors: adding a density factor to Fitts’ pointing paradigm (RB, MO), pp. 1629–1638.
CHICHI-2011-FailyF
Persona cases: a technique for grounding personas (SF, IF), pp. 2267–2270.
CHICHI-2011-HasanGI
Comet and target ghost: techniques for selecting moving targets (KH, TG, PI), pp. 839–848.
CHICHI-2011-HollinworthH
Cursor relocation techniques to help older adults find “lost” cursors (NH, FH), pp. 863–866.
CHICHI-2011-JamilOPKS #collaboration #interactive #learning
The effects of interaction techniques on talk patterns in collaborative peer learning around interactive tables (IJ, KO, MJP, AK, SS), pp. 3043–3052.
CHICHI-2011-KhalilbeigiLMS #interactive #named
Xpaaand: interaction techniques for rollable displays (MK, RL, MM, JS), pp. 2729–2732.
CHICHI-2011-LuL #gesture #mobile #user interface #using
Gesture avatar: a technique for operating mobile user interfaces using gestures (HL, YL), pp. 207–216.
CHICHI-2011-SrikulwongO #case study #comparative #representation #smarttech
A comparative study of tactile representation techniques for landmarks on a wearable device (MS, EO), pp. 2029–2038.
CHICHI-2011-TamakiMR #named #using
PossessedHand: techniques for controlling human hands using electrical muscles stimuli (ET, TM, JR), pp. 543–552.
HCIDUXU-v2-2011-TsaoCY #case study #design #image
A Study on the Expected Image and Relevant Design Techniques in Different Product-Use Stages (YCT, BC, YPY), pp. 655–663.
HCIDUXU-v2-2011-WynnS #data analysis #low cost #video
Motivating Change and Reducing Cost with the Discount Video Data Analysis Technique (JW, JDS), pp. 321–328.
HCIHCD-2011-YajimaSY #comprehension #problem #visualisation
Understanding the Business Realities: An Interview Technique Which Can Visualize the Job Problems (AY, YS, TY), pp. 449–457.
HCIHCI-ITE-2011-DadgariS
New Techniques for Merging Text Versions (DD, WS), pp. 331–340.
HCIHCI-ITE-2011-FahnC #gesture #interactive #recognition
Hidden-Markov-Model-Based Hand Gesture Recognition Techniques Used for a Human-Robot Interaction System (CSF, KYC), pp. 248–258.
HCIHCI-ITE-2011-NebeKJF #interactive #multi #using
Exploiting New Interaction Techniques for Disaster Control Management Using Multitouch-, Tangible- and Pen-Based-Interaction (KN, FK, HJ, HF), pp. 100–109.
HCIHCI-UA-2011-VellaVR #people
Investigating Drag and Drop Techniques for Older People with Cognitive Impairment (FV, NV, PR), pp. 530–538.
HCIHIMI-v1-2011-YanoAFJ #modelling #performance #predict #process
Feasibility Study of Predictive Human Performance Modeling Technique in Field Activities (NY, TA, SF, BEJ), pp. 180–189.
HCIHIMI-v2-2011-TanerYNB #generative #performance #scalability
An Efficient and Scalable Meeting Minutes Generation and Presentation Technique (BT, CY, AON, SB), pp. 345–352.
ICEISICEIS-v1-2011-NiknafsSRR #analysis #comparative #predict
Comparative Analysis of Three Techniques for Predictions in Time Series Having Repetitive Patterns (AN, BS, MMR, GR), pp. 177–182.
ICEISICEIS-v1-2011-YamaguchiDF #guidelines #process #visualisation
Guidelines for the Choice of Visualization Techniques Applied in the Process of Knowledge Extraction (JKY, MMD, CF), pp. 183–189.
CIKMCIKM-2011-Bradford #implementation #scalability #semantics
Implementation techniques for large-scale latent semantic indexing applications (RBB), pp. 339–344.
CIKMCIKM-2011-CostantiniN #clustering #image
Image clustering fusion technique based on BFS (LC, RN), pp. 2093–2096.
ECIRECIR-2011-HerbertSG #information retrieval #query
Combining Query Translation Techniques to Improve Cross-Language Information Retrieval (BH, GS, IG), pp. 712–715.
KDDKDD-2011-LinSM #adaptation #modelling #online #topic #twitter
Smoothing techniques for adaptive online language models: topic tracking in tweet streams (JL, RS, WM), pp. 422–429.
KDDKDD-2011-McCloskeyKIKB #behaviour #data mining #mining #using
From market baskets to mole rats: using data mining techniques to analyze RFID data describing laboratory animal behavior (DPM, MEK, SPI, IK, SBM), pp. 301–306.
KDDKDD-2011-ZhengSTLLC #challenge #data mining #information management #mining #mobile
Applying data mining techniques to address disaster information management challenges on mobile devices (LZ, CS, LT, TL, SL, SCC), pp. 283–291.
KDIRKDIR-2011-ClariziaCSGN #graph #novel #query
A Novel Query Expansion Technique based on a Mixed Graph of Terms (FC, FC, MDS, LG, PN), pp. 84–93.
MLDMMLDM-2011-AdolfHHCH #analysis #grid #power management
Techniques for Improving Filters in Power Grid Contingency Analysis (RA, DH, MH, YC, ZH), pp. 599–611.
RecSysRecSys-2011-BaltrunasLR #matrix #recommendation
Matrix factorization techniques for context aware recommendation (LB, BL, FR), pp. 301–304.
RecSysRecSys-2011-KatzOSRS #collaboration #using #wiki
Using Wikipedia to boost collaborative filtering techniques (GK, NO, BS, LR, GS), pp. 285–288.
SEKESEKE-2011-YuLFC #composition #testing
A Regression Test Technique for Analyzing the Functionalities of Service Composition (HY, DL, GF, LC), pp. 578–582.
SIGIRSIGIR-2011-SandenZ #classification #multi #music
Enhancing multi-label music genre classification through ensemble techniques (CS, JZZ), pp. 705–714.
POPLPOPL-2011-JoishaSBBC #automation #compilation #effectiveness #optimisation #parallel #reuse #thread
A technique for the effective and automatic reuse of classical compiler optimizations on multithreaded code (PGJ, RSS, PB, HJB, DRC), pp. 623–636.
SACSAC-2011-AhnAHS #component #fault tolerance #framework
Fault tolerant framework and techniques for component-based autonomous robot systems (HA, SCA, JH, SYS), pp. 566–572.
SACSAC-2011-BabichCPK #abstraction #case study #eclipse #fault #object-oriented #predict #using
Using a class abstraction technique to predict faults in OO classes: a case study through six releases of the Eclipse JDT (DB, PJC, JFP, BMGK), pp. 1419–1424.
SACSAC-2011-DebroyW #equivalence #fault #locality #on the
On the equivalence of certain fault localization techniques (VD, WEW), pp. 1457–1463.
SACSAC-2011-TrindadeR #3d #multi #navigation #using
Improving 3D navigation in multiscale environments using cubemap-based techniques (DRT, ABR), pp. 1215–1221.
SACSAC-2011-YouCXLZ #effectiveness #empirical #testing
An empirical study on the effectiveness of time-aware test case prioritization techniques (DY, ZC, BX, BL, CZ), pp. 1451–1456.
ICSEICSE-2011-TofanGA #architecture #grid #using
Capturing tacit architectural knowledge using the repertory grid technique (DT, MG, PA), pp. 916–919.
LDTALDTA-2011-JohnstoneSB #named
LDT: a language definition technique (AJ, ES, MvdB), p. 9.
CCCC-2011-LameedH #array #compilation #jit #matlab #semantics #staged
Staged Static Techniques to Efficiently Implement Array Copy Semantics in a MATLAB JIT Compiler (NL, LJH), pp. 22–41.
HPCAHPCA-2011-LiuLNMMH #hardware
Hardware/software techniques for DRAM thermal management (SL, BL, AN, SOM, GM, NH), pp. 515–525.
ISMMISMM-2011-GarnerBF #evaluation
A comprehensive evaluation of object scanning techniques (RG, SMB, DF), pp. 33–42.
LCTESLCTES-2011-BhagatGSG #effectiveness #optimisation
Global productiveness propagation: a code optimization technique to speculatively prune useless narrow computations (IB, EG, FJS, AG), pp. 161–170.
LCTESLCTES-2011-JangKLKYKKR #architecture #clustering #configuration management
An instruction-scheduling-aware data partitioning technique for coarse-grained reconfigurable architectures (CJ, JK, JL, HSK, DY, SK, HK, SR), pp. 151–160.
PPoPPPPoPP-2011-MurarasuWBBP #algorithm #data type #grid #scalability
Compact data structure and scalable algorithms for the sparse grid technique (AFM, JW, GB, DB, DP), pp. 25–34.
ICLPICLP-2011-Bottalico #consistency #hybrid #simulation
Consistency Techniques for Hybrid Simulations (MB), pp. 255–260.
ICSTICST-2011-ChenCZXF #clustering #testing #using
Using semi-supervised clustering to improve regression test selection techniques (SC, ZC, ZZ, BX, YF), pp. 1–10.
ICTSSICTSS-2011-MammarCJMO #c #detection #source code #testing #using
Using Testing Techniques for Vulnerability Detection in C Programs (AM, ARC, WJ, WM, EMdO), pp. 80–96.
ICTSSICTSS-2011-ShinboH #communication #detection #empirical #mobile
An Empirical Study on Applying Anomaly Detection Technique to Detecting Software and Communication Failures in Mobile Data Communication Services (HS, TH), pp. 195–208.
ISSTAISSTA-2011-ParninO #automation #debugging #question
Are automated debugging techniques actually helping programmers? (CP, AO), pp. 199–209.
TAPTAP-2011-BueJM #approximate #generative #modelling #testing
Association of Under-Approximation Techniques for Generating Tests from Models (PCB, JJ, PAM), pp. 51–68.
ECSAECSA-2010-ChristensenHL #architecture #assurance #lightweight #quality #using
Lightweight and Continuous Architectural Software Quality Assurance Using the aSQA Technique (HBC, KMH, BL), pp. 118–132.
ASEASE-2010-BavotaLMO #refactoring
A two-step technique for extract class refactoring (GB, ADL, AM, RO), pp. 151–154.
ASEASE-2010-HilliardMMP #architecture #framework #megamodelling
Realizing architecture frameworks through megamodelling techniques (RH, IM, HM, PP), pp. 305–308.
CASECASE-2010-RoutrayRS #clustering #detection #fault #reduction
Data reduction and clustering techniques for fault detection and diagnosis in automotives (AR, AR, SS), pp. 326–331.
DACDAC-2010-NowrozCR #monitoring
Thermal monitoring of real processors: techniques for sensor allocation and full characterization (ANN, RC, SR), pp. 56–61.
DATEDATE-2010-CarterNG #design
Design techniques for cross-layer resilience (NPC, HN, DSG), pp. 1023–1028.
DATEDATE-2010-ChandraPA #on the
On the efficacy of write-assist techniques in low voltage nanoscale SRAMs (VC, CP, RCA), pp. 345–350.
DATEDATE-2010-ChenQM #generative #performance #satisfiability #testing
Efficient decision ordering techniques for SAT-based test generation (MC, XQ, PM), pp. 490–495.
DATEDATE-2010-DammMHG #modelling #network #simulation #transaction #using
Using Transaction Level Modeling techniques for wireless sensor network simulation (MD, JM, JH, CG), pp. 1047–1052.
DATEDATE-2010-HuangCLH #robust
A robust ADC code hit counting technique (JLH, KYC, MHL, XLH), pp. 1749–1754.
DATEDATE-2010-Kheradmand-BoroujeniPL #independence #novel #process
AVGS-Mux style: A novel technology and device independent technique for reducing power and compensating process variations in FPGA fabrics (BKB, CP, YL), pp. 339–344.
DATEDATE-2010-LiuFG #optimisation #performance
An accurate and efficient yield optimization method for analog circuits based on computing budget allocation and memetic search technique (BL, FVF, GGEG), pp. 1106–1111.
DATEDATE-2010-LiuNCMP #reduction
Post-placement temperature reduction techniques (WL, AN, AC, EM, MP), pp. 634–637.
DATEDATE-2010-QaziTDSC #analysis #performance #reduction
Loop flattening & spherical sampling: Highly efficient model reduction techniques for SRAM yield analysis (MQ, MT, LD, DS, AC), pp. 801–806.
DATEDATE-2010-SubramanyanSSL #execution #fault tolerance #multi #performance
Multiplexed redundant execution: A technique for efficient fault tolerance in chip multiprocessors (PS, VS, KKS, EL), pp. 1572–1577.
DATEDATE-2010-UbarDRJ #parallel #simulation
Parallel X-fault simulation with critical path tracing technique (RU, SD, JR, AJ), pp. 879–884.
VLDBVLDB-2010-HanLPY #framework #graph #named
iGraph: A Framework for Comparisons of Disk-Based Graph Indexing Techniques (WSH, JL, MDP, JXY), pp. 449–459.
VLDBVLDB-2010-Samet #database #multi #similarity
Techniques for Similarity Searching in Multimedia Databases (HS), pp. 1649–1650.
FASEFASE-2010-KelsenM #composition
A Modular Model Composition Technique (PK, QM), pp. 173–187.
FASEFASE-2010-LauterburgKMA #heuristic #partial order #reduction
Evaluating Ordering Heuristics for Dynamic Partial-Order Reduction Techniques (SL, RKK, DM, GA), pp. 308–322.
CSMRCSMR-2010-MadaniGPGA #identifier #recognition #source code #speech #using #word
Recognizing Words from Source Code Identifiers Using Speech Recognition Techniques (NM, LG, MDP, YGG, GA), pp. 68–77.
CSMRCSMR-2010-MaiaBFG #hybrid #impact analysis #object-oriented
The Hybrid Technique for Object-Oriented Software Change Impact Analysis (MCOM, RAB, JCAdF, DDSG), pp. 252–255.
ICPCICPC-2010-BarbourYZ #clone detection #detection #scalability
A Technique for Just-in-Time Clone Detection in Large Scale Systems (LB, HY, YZ), pp. 76–79.
WCREWCRE-2010-BittencourtSGM #automation #information retrieval #modelling #using
Improving Automated Mapping in Reflexion Models Using Information Retrieval Techniques (RAB, GJdSS, DDSG, GCM), pp. 163–172.
WCREWCRE-2010-HaiducAMM #automation #on the #source code #summary
On the Use of Automated Text Summarization Techniques for Summarizing Source Code (SH, JA, LM, AM), pp. 35–44.
IFMIFM-2010-Baier #distributed #model checking #on the #random
On Model Checking Techniques for Randomized Distributed Systems (CB), pp. 1–11.
IFMIFM-2010-HulsbuschKRSSW #comparison #model transformation #semantics
Showing Full Semantics Preservation in Model Transformation — A Comparison of Techniques (MH, BK, AR, MS, CS, HW), pp. 183–198.
CHICHI-2010-BaillyLG #linear #multi
Finger-count & radial-stroke shortcuts: 2 techniques for augmenting linear menus on multi-touch surfaces (GB, EL, YG), pp. 591–594.
CHICHI-2010-CherubiniGOO #persuasion #self #social
Social tagging revamped: supporting the users’ need of self-promotion through persuasive techniques (MC, AG, RdO, NO), pp. 985–994.
CHICHI-2010-FuGN #3d #multi #scalability #simulation
Multi-touch techniques for exploring large-scale 3D astrophysical simulations (CWF, WBG, JAN), pp. 2213–2222.
CHICHI-2010-MoffattM #fault #named
Steadied-bubbles: combining techniques to address pen-based pointing errors for younger and older adults (KM, JM), pp. 1125–1134.
CHICHI-2010-WalshDGFGHBF #co-evolution #design
Layered elaboration: a new technique for co-design with children (GW, AD, MLG, EF, EG, LH, EMB, SF), pp. 1237–1240.
SOFTVISSOFTVIS-2010-FrischD #diagrams #visualisation
Off-screen visualization techniques for class diagrams (MF, RD), pp. 163–172.
ICEISICEIS-AIDSS-2010-CuzzocreaFP #abstraction #analysis #collaboration #effectiveness #flexibility #mining #process
Effective Analysis of Flexible Collaboration Processes by Way of Abstraction and Mining Techniques (AC, FF, LP), pp. 157–166.
ICEISICEIS-AIDSS-2010-LampertiZ #lazy evaluation
Diagnosis of Active Systems by Lazy Techniques (GL, MZ), pp. 171–180.
ICEISICEIS-AIDSS-2010-Vilas-BoasSPSR #data mining #mining #predict
Hourly Prediction of Organ Failure and Outcome in Intensive Care based on Data Mining Techniques (MVB, MFS, FP, ÁMS, FR), pp. 270–277.
ICEISICEIS-DISI-2010-PreisslerHL #data type #streaming
Process-based Data Streaming in Service-oriented Environments — Application and Technique (SP, DH, WL), pp. 40–49.
ICEISICEIS-ISAS-2010-ClariziaGN #identification #query #web
A New Technique for Identification of Relevant Web Pages in Informational Queries Results (FC, LG, PN), pp. 70–79.
CIKMCIKM-2010-HeZS #documentation #version control
Improved index compression techniques for versioned document collections (JH, JZ, TS), pp. 1239–1248.
CIKMCIKM-2010-KaliciakSWP #hybrid #image #novel #retrieval
Novel local features with hybrid sampling technique for image retrieval (LK, DS, NW, JP), pp. 1557–1560.
ICPRICPR-2010-AlvaroS #recognition
Comparing Several Techniques for Offline Recognition of Printed Mathematical Symbols (FA, JAS), pp. 1953–1956.
ICPRICPR-2010-BruneauGP #parametricity #probability
Aggregation of Probabilistic PCA Mixtures with a Variational-Bayes Technique Over Parameters (PB, MG, FP), pp. 702–705.
ICPRICPR-2010-Casarrubias-VargasPB #machine learning #navigation #visual notation
EKF-SLAM and Machine Learning Techniques for Visual Robot Navigation (HCV, APB, EBC), pp. 396–399.
ICPRICPR-2010-DaoS #recognition #robust
A Robust Recognition Technique for Dense Checkerboard Patterns (VND, MS), pp. 3081–3084.
ICPRICPR-2010-KimL #markov #monte carlo #optimisation #random #using
Continuous Markov Random Field Optimization Using Fusion Move Driven Markov Chain Monte Carlo Technique (WK, KML), pp. 1364–1367.
ICPRICPR-2010-KunduD #image #security
Lossless ROI Medical Image Watermarking Technique with Enhanced Security and High Payload Embedding (MKK, SD), pp. 1457–1460.
ICPRICPR-2010-MalakutiA #monitoring #towards
Towards an Intelligent Bed Sensor: Non-intrusive Monitoring of Sleep Irregularities with Computer Vision Techniques (KM, ABA), pp. 4004–4007.
ICPRICPR-2010-RathgebU #performance #recognition
Attacking Iris Recognition: An Efficient Hill-Climbing Technique (CR, AU), pp. 1217–1220.
ICPRICPR-2010-StrucDP #recognition #robust
Confidence Weighted Subspace Projection Techniques for Robust Face Recognition in the Presence of Partial Occlusions (VS, SD, NP), pp. 1334–1338.
ICPRICPR-2010-TianSK #evaluation
Task-Oriented Evaluation of Super-Resolution Techniques (LT, AS, HK), pp. 493–498.
KDDKDD-2010-DangB #clustering #linear
A hierarchical information theoretic technique for the discovery of non linear alternative clusterings (XHD, JB), pp. 573–582.
KDDKDD-2010-SunCY #approach #reduction #scalability
A scalable two-stage approach for a class of dimensionality reduction techniques (LS, BC, JY), pp. 313–322.
KDDKDD-2010-ZhengSTLLCH #data mining #mining #network #using
Using data mining techniques to address critical information exchange needs in disaster affected public-private networks (LZ, CS, LT, TL, SL, SCC, VH), pp. 125–134.
KMISKMIS-2010-DienstAHF #knowledge base #visual notation
Applying Fusion Techniques to Graphical Methods for Knowledge based Processing of Product use Information (SD, FA, AH, MF), pp. 136–142.
KMISKMIS-2010-DotoliF #multi #optimisation
A Hierarchical Vendor Selection Optimization Technique for Multiple Sourcing (MD, MF), pp. 195–200.
RecSysRecSys-2010-JamaliE #matrix #network #recommendation #social #trust
A matrix factorization technique with trust propagation for recommendation in social networks (MJ, ME), pp. 135–142.
SEKESEKE-2010-CostaBR
Software Project Portfolio Selection: a Modern Portfolio Theory Based Technique (HRC, MdOB, ARR), pp. 387–392.
SEKESEKE-2010-DuanCZQY #clustering #slicing #testing
Improving Cluster Selection Techniques of Regression Testing by Slice Filtering (YD, ZC, ZZ, JQ, ZY), pp. 253–258.
SEKESEKE-2010-KhoshgoftaarG #machine learning #metric #novel #re-engineering #using
Software Engineering with Computational Intelligence and Machine Learning A Novel Software Metric Selection Technique Using the Area Under ROC Curves (TMK, KG), pp. 203–208.
SEKESEKE-2010-PaikariRR #case study #comparative #fault #predict #reasoning #using
A Comparative Study of Attribute Weighting Techniques for Software Defect Prediction Using Case-based Reasoning (EP, MMR, GR), pp. 380–386.
SEKESEKE-2010-WangKG #classification #feature model #quality
Ensemble Feature Selection Technique for Software Quality Classification (HW, TMK, KG), pp. 215–220.
SEKESEKE-2010-WangPACC #analysis #automation #process
An Automatic Failure Mode and Effect Analysis Technique for Processes Defined in the Little-JIL Process Definition Language (DW, JP, GSA, LAC, BC), pp. 765–770.
SEKESEKE-2010-XuDWG #evaluation #fault #locality
An Evaluation of Tie-Breaking Strategies for Fault Localization Techniques (XX, VD, WEW, DG), pp. 123–128.
SIGIRSIGIR-2010-HustonC #query
Evaluating verbose query processing techniques (SH, WBC), pp. 291–298.
MODELSMoDELS-v1-2010-LucioBA #automation #model transformation #validation
A Technique for Automatic Validation of Model Transformations (LL, BB, VA), pp. 136–150.
MODELSMoDELS-v1-2010-SchrammPHV #agile #development #enterprise #modelling #user interface
Rapid UI Development for Enterprise Applications: Combining Manual and Model-Driven Techniques (AS, AP, MH, LV), pp. 271–285.
MODELSMoDELS-v2-2010-LoniewskiIA #bibliography #development #modelling #requirements
A Systematic Review of the Use of Requirements Engineering Techniques in Model-Driven Development (GL, EI, SA), pp. 213–227.
RERE-2010-SultanovH #requirements
Application of Swarm Techniques to Requirements Engineering: Requirements Tracing (HS, JHH), pp. 211–220.
SACSAC-2010-GhoshS #constraints #design #energy #performance
Efficient mapping and voltage islanding technique for energy minimization in NoC under design constraints (PG, AS), pp. 535–541.
SACSAC-2010-PelosiP #mobile #named
SMaC: spatial map caching technique for mobile devices (GP, GP), pp. 1829–1830.
SACSAC-2010-RodriguesNPM #parallel #thread
A new technique for data privatization in user-level threads and its use in parallel applications (ERR, POAN, JP, CLM), pp. 2149–2154.
SACSAC-2010-ShestakovS #clustering #web
Host-IP clustering technique for deep web characterization (DS, TS), pp. 874–875.
FSEFSE-2010-JalbertS #concurrent #debugging #effectiveness #source code
A trace simplification technique for effective debugging of concurrent programs (NJ, KS), pp. 57–66.
FSEFSE-2010-XuKKRC #testing #trade-off
Directed test suite augmentation: techniques and tradeoffs (ZX, YK, MK, GR, MBC), pp. 257–266.
ICSEICSE-2010-Ma #analysis #constraints #testing #theorem proving
Constraint solving techniques for software testing and analysis (FM), pp. 417–420.
ICSEICSE-2010-RuscioMMPP #generative
Developing next generation ADLs through MDE techniques (DDR, IM, HM, PP, AP), pp. 85–94.
SPLCSPLC-2010-CetinaGFP #design #guidelines #product line #prototype
Designing and Prototyping Dynamic Software Product Lines: Techniques and Guidelines (CC, PG, JF, VP), pp. 331–345.
HPCAHPCA-2010-GreskampKT #configuration management #multi #named #performance #thread
LeadOut: Composing low-overhead frequency-enhancing techniques for single-thread performance in configurable multicores (BG, URK, JT), pp. 1–12.
HPDCHPDC-2010-MarinCG #web
New caching techniques for web search engines (MM, VGC, CGP), pp. 215–226.
ICLPICLP-2010-Zwirchmayr10 #analysis
Cutting-Edge Timing Analysis Techniques (JZ), pp. 303–305.
ICLPICLP-J-2010-BrummayerJ #debugging #development #testing
Testing and debugging techniques for answer set solver development (RB, MJ), pp. 741–758.
ICSTICST-2010-BertoliniMAF #evaluation #testing #user interface
GUI Testing Techniques Evaluation by Designed Experiments (CB, AM, EA, CF), pp. 235–244.
ICSTICST-2010-NagahawatteD #effectiveness #fault #testing
The Effectiveness of Regression Testing Techniques in Reducing the Occurrence of Residual Defects (PN, HD), pp. 79–88.
ICSTSAT-2010-Cotton #proving
Two Techniques for Minimizing Resolution Proofs (SC), pp. 306–312.
ICSTSAT-2010-MillerKLB #bound #design #encoding #model checking
Encoding Techniques, Craig Interpolants and Bounded Model Checking for Incomplete Designs (CM, SK, MDTL, BB), pp. 194–208.
WICSA-ECSAWICSA-ECSA-2009-BritoRL #architecture #fault tolerance #verification
Verifying architectural variabilities in software fault tolerance techniques (PHSB, CMFR, RdL), pp. 231–240.
ASEASE-2009-AliADW #fault #locality
Evaluating the Accuracy of Fault Localization Techniques (SA, JHA, TD, WW), pp. 76–87.
CASECASE-2009-BeraN #using
A Simple instrumentation calibration technique for Electrical Impedance Tomography (EIT) using a 16-electrode phantom (TKB, JN), pp. 347–352.
DACDAC-2009-BaumannSP #architecture #assessment #design #embedded #robust
Architectural assessment of design techniques to improve speed and robustness in embedded microprocessors (TB, DSL, CP), pp. 947–950.
DACDAC-2009-BonnyH #named #performance
LICT: left-uncompressed instructions compression technique to improve the decoding performance of VLIW processors (TB, JH), pp. 903–906.
DACDAC-2009-BowmanTWLKDB
Circuit techniques for dynamic variation tolerance (KAB, JT, CW, SLL, TK, VD, SYB), pp. 4–7.
DACDAC-2009-CochranR
Spectral techniques for high-resolution thermal characterization with limited sensor data (RC, SR), pp. 478–483.
DACDAC-2009-FeySD #bound #fault tolerance #using
Computing bounds for fault tolerance using formal techniques (GF, AS, RD), pp. 190–195.
DACDAC-2009-Geilen #data flow #graph #reduction
Reduction techniques for synchronous dataflow graphs (MG), pp. 911–916.
DACDAC-2009-GhaniN #approximate #grid #performance #power management #using #verification
Fast vectorless power grid verification using an approximate inverse technique (NHAG, FNN), pp. 184–189.
DACDAC-2009-JamaaLM #array #multi
Decoding nanowire arrays fabricated with the multi-spacer patterning technique (MHBJ, YL, GDM), pp. 77–82.
DACDAC-2009-MarcilioSAR #behaviour #novel #verification
A novel verification technique to uncover out-of-order DUV behaviors (GM, LCVdS, BA, SR), pp. 448–453.
DACDAC-2009-VillenaS #automation #modelling #multi #named
ARMS — automatic residue-minimization based sampling for multi-point modeling techniques (JFV, LMS), pp. 951–956.
DACDAC-2009-Wong #canonical #performance
An efficient passivity test for descriptor systems via canonical projector techniques (NW), pp. 957–962.
DACDAC-2009-ZengZNGGS #optimisation #scheduling #using
Scheduling the FlexRay bus using optimization techniques (HZ, WZ, MDN, AG, PG, ALSV), pp. 874–877.
DATEDATE-2009-0002CWCXY #optimisation
Gate replacement techniques for simultaneous leakage and aging optimization (YW, XC, WW, YC, YX, HY), pp. 328–333.
DATEDATE-2009-GhasemzadehJSJ #communication #network
Communication minimization for in-network processing in body sensor networks: A buffer assignment technique (HG, NJ, MS, RJ), pp. 358–363.
DATEDATE-2009-GopalakrishnanK #algebra #polynomial #synthesis
Algebraic techniques to enhance common sub-expression elimination for polynomial system synthesis (SG, PK), pp. 1452–1457.
DATEDATE-2009-KorhonenK #identification
A loopback-based INL test method for D/A and A/D converters employing a stimulus identification technique (EK, JK), pp. 1650–1655.
DATEDATE-2009-NeyDGPVBG #fault
A new design-for-test technique for SRAM core-cell stability faults (AN, LD, PG, SP, AV, MB, VG), pp. 1344–1348.
DATEDATE-2009-PaciBB #adaptation #bias #communication #effectiveness #variability
Effectiveness of adaptive supply voltage and body bias as post-silicon variability compensation techniques for full-swing and low-swing on-chip communication channels (GP, DB, LB), pp. 1404–1409.
DATEDATE-2009-Perry #design #modelling #quality #synthesis
Model Based Design needs high level synthesis — A collection of high level synthesis techniques to improve productivity and quality of results for model based electronic design (SP), pp. 1202–1207.
DATEDATE-2009-YangH #parallel #pipes and filters #scheduling
Pipelined data parallel task mapping/scheduling technique for MPSoC (HY, SH), pp. 69–74.
DocEngDocEng-2009-Hassan09a #documentation #graph #interactive #named #using
GraphWrap: a system for interactive wrapping of pdf documents using graph matching techniques (TH), pp. 247–248.
HTHT-2009-BraP #adaptation #framework #hypermedia
Dynamic and adaptive hypertext: generic frameworks, approaches and techniques (PDB, MP), pp. 387–388.
ICDARICDAR-2009-EmmanouilidisBP #classification #development #evaluation #locality
Development and Evaluation of Text Localization Techniques Based on Structural Texture Features and Neural Classifiers (CE, CB, NP), pp. 1270–1274.
ICDARICDAR-2009-FerilliBEB #analysis #layout
A Distance-Based Technique for Non-Manhattan Layout Analysis (SF, MB, FE, TMAB), pp. 231–235.
ICDARICDAR-2009-Hassan #documentation #graph #using
User-Guided Wrapping of PDF Documents Using Graph Matching Techniques (TH), pp. 631–635.
ICDARICDAR-2009-KleberS #bibliography #documentation #re-engineering
A Survey of Techniques for Document and Archaeology Artefact Reconstruction (FK, RS), pp. 1061–1065.
ICDARICDAR-2009-LouloudisSG #evaluation #novel #segmentation #word
A Novel Two Stage Evaluation Methodology for Word Segmentation Techniques (GL, NS, BG), pp. 686–690.
ICDARICDAR-2009-NtirogiannisGP #adaptation #documentation #image #logic
A Modified Adaptive Logical Level Binarization Technique for Historical Document Images (KN, BG, IP), pp. 1171–1175.
ICDARICDAR-2009-ShiSG
A Steerable Directional Local Profile Technique for Extraction of Handwritten Arabic Text Lines (ZS, SS, VG), pp. 176–180.
ICDARICDAR-2009-ShivakumaraPT #detection #difference #video
A Gradient Difference Based Technique for Video Text Detection (PS, TQP, CLT), pp. 156–160.
ICDARICDAR-2009-ShivakumaraPT09a #detection #robust #video
A Robust Wavelet Transform Based Technique for Video Text Detection (PS, TQP, CLT), pp. 1285–1289.
ICDARICDAR-2009-StamatopoulosGP #documentation #evaluation #image #performance
A Methodology for Document Image Dewarping Techniques Performance Evaluation (NS, BG, IP), pp. 956–960.
SIGMODSIGMOD-2009-TsirogiannisHSWG #query
Query processing techniques for solid state drives (DT, SH, MAS, JLW, GG), pp. 59–72.
VLDBVLDB-2009-CheemaLZWZ #lazy evaluation #monitoring #performance
Lazy Updates: An Efficient Technique to Continuously Monitoring Reverse kNN (MAC, XL, YZ, WW, WZ), pp. 1138–1149.
VLDBVLDB-2009-DaiGBBL #analysis #interactive #named
TIAMAT: a Tool for Interactive Analysis of Microdata Anonymization Techniques (CD, GG, EB, JWB, NL), pp. 1618–1621.
ITiCSEITiCSE-2009-BlasGMB #analysis #automation #composition #using
Automatic E-learning contents composition by using gap analysis techniques (JMdB, JMG, LdM, RB), p. 369.
WRLAWRLA-2008-Rodriguez09
Combining Techniques to Reduce State Space and Prove Strong Properties (DER), pp. 267–280.
ESOPESOP-2009-RajanTSL #composition #design #named #policy #verification #web #web service
Tisa: A Language Design and Modular Verification Technique for Temporal Policies in Web Services (HR, JT, SMS, GTL), pp. 333–347.
TACASTACAS-2009-OrzanWW #equation #static analysis
Static Analysis Techniques for Parameterised Boolean Equation Systems (SO, WW, TACW), pp. 230–245.
ICPCICPC-J-2008-RoyCK09 #approach #clone detection #comparison #detection #evaluation #tool support
Comparison and evaluation of code clone detection techniques and tools: A qualitative approach (CKR, JRC, RK), pp. 470–495.
CSMRCSMR-2009-NunesKSNGL #implementation #multi #product line
Comparing Stability of Implementation Techniques for Multi-agent System Product Lines (CN, UK, CS, IN, AFG, CJPdL), pp. 229–232.
ICPCICPC-2009-PortoMF #comprehension #named #visualisation
CRISTA: A tool to support code comprehension based on visualization and reading technique (DP, MGM, SCPFF), pp. 285–286.
ICPCICPC-2009-RevelleP #case study #feature model
An exploratory study on assessing feature location techniques (MR, DP), pp. 218–222.
ICSMEICSM-2009-AmalfitanoFT #behaviour #internet #modelling #reverse engineering
Experimenting a reverse engineering technique for modelling the behaviour of rich internet applications (DA, ARF, PT), pp. 571–574.
ICSMEICSM-2009-BettenburgSH #empirical #off the shelf #risk management #using
An empirical study on the risks of using off-the-shelf techniques for processing mailing list data (NB, ES, AEH), pp. 539–542.
ICSMEICSM-2009-FokaefsTCS #clustering #object-oriented #using
Decomposing object-oriented class modules using an agglomerative clustering technique (MF, NT, AC, JS), pp. 93–101.
ICSMEICSM-2009-Harrold #reuse #testing
Reduce, reuse, recycle, recover: Techniques for improved regression testing (MJH), p. 5.
ICSMEICSM-2009-NaslavskyZR #modelling #testing
A model-based regression test selection technique (LN, HZ, DJR), pp. 515–518.
SCAMSCAM-2009-SpaccoW #lightweight
Lightweight Techniques for Tracking Unique Program Statements (JS, CCW), pp. 99–108.
WCREWCRE-1999-BacchelliDLR99a #benchmark #lightweight #metric #source code
Benchmarking Lightweight Techniques to Link E-Mails and Source Code (AB, MD, ML, RR), pp. 205–214.
WCREWCRE-1999-TangHZ99a #identification
Techniques for Identifying the Country Origin of Mailing List Participants (RT, AEH, YZ), pp. 36–40.
PLDIPLDI-2009-JoshiPSN #detection #program analysis #random
A randomized dynamic program analysis technique for detecting real deadlocks (PJ, CSP, KS, MN), pp. 110–120.
SEFMSEFM-2009-BertoliniM #model checking #probability #testing #user interface #using
Using Probabilistic Model Checking to Evaluate GUI Testing Techniques (CB, AM), pp. 115–124.
CHICHI-2009-GuoYS #interactive
Touch and toys: new techniques for interaction with a remote group of robots (CG, JEY, ES), pp. 491–500.
CHICHI-2009-KratzB #feedback #gesture #mobile #recognition #visual notation
Unravelling seams: improvoing mobile gesture recognition with visual feedback techniques (SGK, RB), pp. 937–940.
CHICHI-2009-LudwigPT #interactive #novel
Path selection: a novel interaction technique for mapping applications (ML, RP, LGT), pp. 2309–2318.
CHICHI-2009-MaedaIA
Arrow tag: a direction-key-based technique for rapidly selecting hyperlinks while gazing at a screen (AM, HI, MA), pp. 1025–1028.
CHICHI-2009-MatejkaGLF #design #evaluation #multi
The design and evaluation of multi-finger mouse emulation techniques (JM, TG, JL, GWF), pp. 1073–1082.
CHICHI-2009-PinelleBNM #coordination #evaluation
An evaluation of coordination techniques for protecting objects and territories in tabletop groupware (DP, MB, MAN, RLM), pp. 2129–2138.
CHICHI-2009-RahmanGIS
Tilt techniques: investigating the dexterity of wrist-based input (MR, SG, PI, SS), pp. 1943–1952.
CHICHI-2009-SauvanLLC #human-computer #interface #performance
A performance model of selection techniques for p300-based brain-computer interfaces (JBS, AL, FL, GC), pp. 2205–2208.
CHICHI-2009-WhiteF #named #visualisation
SiteLens: situated visualization techniques for urban site visits (SW, SF), pp. 1117–1120.
HCIDHM-2009-PandithLD #evaluation #using
The Impact of Change in Software on Satisfaction: Evaluation Using Critical Incident Technique (CIT) (AP, ML, VGD), pp. 717–726.
HCIHCD-2009-RashidQ #evaluation #interactive #smarttech
Interaction Techniques for Binding Smartphones: A Desirability Evaluation (UR, AJQ), pp. 120–128.
HCIHCI-NIMT-2009-FahnKW #realtime #recognition
Real-Time Face Tracking and Recognition Based on Particle Filtering and AdaBoosting Techniques (CSF, MJK, KYW), pp. 198–207.
HCIHCI-NIMT-2009-HurY #data analysis #multi #named #sorting
SimulSort: Multivariate Data Exploration through an Enhanced Sorting Technique (IH, JSY), pp. 684–693.
HCIHCI-NIMT-2009-ItoMT #3d #graph #visualisation
Sphere Anchored Map: A Visualization Technique for Bipartite Graphs in 3D (TI, KM, JT), pp. 811–820.
HCIHCI-NIMT-2009-SuzukiMT #interactive #interface #using
Interaction Technique for a Pen-Based Interface Using Finger Motions (YS, KM, JT), pp. 503–512.
HCIHCI-NT-2009-AsahiIF #evaluation #usability
A Usability Evaluation Method Applying AHP and Treemap Techniques (TA, TI, SF), pp. 195–203.
HCIHCI-NT-2009-MorandiniCS #prototype #validation #web
A Prototype to Validate ErgoCoIn: A Web Site Ergonomic Inspection Technique (MM, WdAC, DLS), pp. 339–348.
HCIHCI-VAD-2009-BaldirisFMG #adaptation #machine learning
Adaptation Decisions and Profiles Exchange among Open Learning Management Systems Based on Agent Negotiations and Machine Learning Techniques (SB, RF, CM, SG), pp. 12–20.
HCIHIMI-DIE-2009-NelsonV #self
Effects of a Mnemonic Technique on Subsequent Recall of Assigned and Self-generated Passwords (DN, KPLV), pp. 693–701.
HCIHIMI-II-2009-MinC #approach #generative #personalisation #privacy
An Interactive-Content Technique Based Approach to Generating Personalized Advertisement for Privacy Protection (WHM, YGC), pp. 185–191.
AdaEuropeAdaEurope-2009-BuchsLC #generative #model checking #modelling #process #testing
Model Checking Techniques for Test Generation from Business Process Models (DB, LL, AC), pp. 59–74.
CAiSECAiSE-2009-JiangBBM #effectiveness #quality
Measuring and Comparing Effectiveness of Data Quality Techniques (LJ, DB, AB, JM), pp. 171–185.
ICEISICEIS-AIDSS-2009-ChenC #data mining #mining
The Role of Data Mining Techniques in Emergency Management (NC, AC), pp. 118–123.
ICEISICEIS-AIDSS-2009-ZanchettinL #design #hybrid #network #optimisation
Hybrid Optimization Technique for Artificial Neural Networks Design (CZ, TBL), pp. 242–247.
ICEISICEIS-DISI-2009-SantosB #optimisation #performance #query
A Bit-selector Technique for Performance Optimization of Decision-support Queries (RJS, JB), pp. 151–157.
ICEISICEIS-ISAS-2009-Damij #effectiveness #modelling #process
An Effective Process Modelling Technique (ND), pp. 298–303.
ICEISICEIS-J-2009-NollR #concept #traceability #using
Concepts-Based Traceability: Using Experiments to Evaluate Traceability Techniques (RPN, MBR), pp. 539–550.
ICEISICEIS-SAIC-2009-BalzanoSL #ajax #collaboration #realtime #web
A Scheme of Strategies for Real-time Web Collaboration based on AJAX/Comet Techniques for Live RIA (WB, MRDS, LDL), pp. 35–40.
CIKMCIKM-2009-KriegelKOPRM #database #named
OSSOBOOK: database and knowledgemanagement techniques for archaeozoology (HPK, PK, HO, JP, MR, CHvdM), pp. 2091–2092.
ECIRECIR-2009-FoleyS #collaboration #evaluation #information retrieval
Synchronous Collaborative Information Retrieval: Techniques and Evaluation (CF, AFS), pp. 42–53.
ECIRECIR-2009-JohoHJ #collaboration #information retrieval
Revisiting IR Techniques for Collaborative Search Strategies (HJ, DH, JMJ), pp. 66–77.
ECIRECIR-2009-PohlM #metric
Measurement Techniques and Caching Effects (SP, AM), pp. 691–695.
KDIRKDIR-2009-ValiatiTGGBT #multi #taxonomy #visualisation
Multidimensional Information Visualization Techniques — Evaluating a Taxonomy of Tasks with the Participation of the Users (ERdAV, JT, AFG, MAG, LLB, JRT), pp. 311–314.
KMISKMIS-2009-RadeschutzM #analysis #optimisation #process
Extended Analysis Techniques for a Comprehensive Business Process Optimization (SR, BM), pp. 77–82.
KMISKMIS-2009-WiilMG #information management #process #tool support
Knowledge Management Processes, Tools and Techniques for Counterterrorism (UKW, NM, JG), pp. 29–36.
MLDMMLDM-2009-QureshiZ #quality #using
Using Resampling Techniques for Better Quality Discretization (TQ, DAZ), pp. 68–81.
SEKESEKE-2009-AbdallahAA #multi #optimisation #visual notation
A Payload Optimization Technique for Multimedia Visual Cryptographye (MHA, RIAK, RAAD), pp. 703–708.
SEKESEKE-2009-BarbosaB #elicitation #process #requirements #towards
Towards the Selection of the Most Suitable Elicitation Technique Through a Defined Requirements Elicitation Process (MWB, GARB), pp. 33–36.
SEKESEKE-2009-PortoMF #comprehension #visualisation
The Use of Reading Technique and Visualization for Program Understanding (DP, MGM, SCPFF), pp. 386–391.
SEKESEKE-2009-SalamahBBPFC #specification #tool support #validation
Enhancing Property Specification Tools With Validation Techniques (SS, MDB, EB, SP, DF, LC), pp. 487–492.
TOOLSTOOLS-EUROPE-2009-KnorreckAP #design #performance #simulation
Fast Simulation Techniques for Design Space Exploration (DK, LA, RP), pp. 308–327.
SACSAC-2009-AktemurK #case study #comparative #library
A comparative study of techniques to write customizable libraries (BA, SK), pp. 522–529.
SACSAC-2009-BriggsA #algebra #constraints #parametricity #specification
Algebraic specification techniques for parametric types with logic-based constraints (DB, SA), pp. 1890–1897.
SACSAC-2009-DemailleLS #abstract syntax tree #effectiveness #named #parsing #using
TWEAST: a simple and effective technique to implement concrete-syntax AST rewriting using partial parsing (AD, RL, BS), pp. 1924–1929.
SACSAC-2009-MacielH #architecture #rest #transaction #using
An optimistic technique for transactions control using REST architectural style (LAHdSM, CMH), pp. 664–669.
SACSAC-2009-MoallemL #distributed #grid #scheduling #using
Using artificial life techniques for distributed grid job scheduling (AM, SAL), pp. 1091–1097.
SACSAC-2009-ZhangLZZZZ #first-order #linear #optimisation
Optimizing techniques for saturated arithmetic with first-order linear recurrence (WZ, LL, CZ, HZ, BZ, CZ), pp. 1883–1889.
LDTALDTA-2008-Dolstra09 #domain-specific language #functional #lazy evaluation #performance
Maximal Laziness: An Efficient Interpretation Technique for Purely Functional DSLs (ED), pp. 81–99.
CCCC-2009-CampanoniSAC #compilation #jit #manycore
Dynamic Look Ahead Compilation: A Technique to Hide JIT Compilation Latencies in Multicore Environment (SC, MS, GA, SCR), pp. 220–235.
CGOCGO-2009-Baev
Techniques for Region-Based Register Allocation (IDB), pp. 147–156.
HPCAHPCA-2009-EbrahimiMP #data type #hybrid #linked data #open data
Techniques for bandwidth-efficient prefetching of linked data structures in hybrid prefetching systems (EE, OM, YNP), pp. 7–17.
HPCAHPCA-2009-PowellBEMSY #named #parametricity #runtime #using
CAMP: A technique to estimate per-structure power at run-time using a few simple parameters (MDP, AB, JSE, SSM, BRS, SMY), pp. 289–300.
PPoPPPPoPP-2009-BhateleBK #api #case study
Topology aware task mapping techniques: an api and case study (AB, EJB, LVK), pp. 301–302.
PPoPPPPoPP-2009-NicolauLK #performance
Techniques for efficient placement of synchronization primitives (AN, GL, AK), pp. 199–208.
CAVCAV-2009-DilligDA #integer #linear #proving
Cuts from Proofs: A Complete and Practical Technique for Solving Linear Inequalities over Integers (ID, TD, AA), pp. 233–247.
CAVCAV-2009-KahlonWG #partial order #reduction
Monotonic Partial Order Reduction: An Optimal Symbolic Partial Order Reduction Technique (VK, CW, AG), pp. 398–413.
ICLPICLP-2009-Paolucci #natural language #research #summary #tool support
Research Summary: Intelligent Natural Language Processing Techniques and Tools (AP), pp. 536–537.
ICSTICST-2009-BertoliniPdM #automation #black box #empirical #evaluation #testing #user interface
An Empirical Evaluation of Automated Black Box Testing Techniques for Crashing GUIs (CB, GP, Md, AM), pp. 21–30.
ICSTSAT-2009-Chen #hybrid #reasoning #satisfiability
Building a Hybrid SAT Solver via Conflict-Driven, Look-Ahead and XOR Reasoning Techniques (JC), pp. 298–311.
ICSTSAT-2009-HaimW #machine learning #using
Restart Strategy Selection Using Machine Learning Techniques (SH, TW), pp. 312–325.
ICSTSAT-2009-HsuM #named #novel #probability
VARSAT: Integrating Novel Probabilistic Inference Techniques with DPLL Search (EIH, SAM), pp. 377–390.
ICSTSAT-2009-Vardi #satisfiability
Symbolic Techniques in Propositional Satisfiability Solving (MYV), pp. 2–3.
CBSECBSE-2008-LumpeGS #component #interface #reduction
State Space Reduction Techniques for Component Interfaces (ML, LG, JGS), pp. 130–145.
ECSAECSA-2008-DamaseviciusST #component #design #diagrams #feature model #generative #metaprogramming #ontology #using
Domain Ontology-Based Generative Component Design Using Feature Diagrams and Meta-programming Techniques (RD, VS, JT), pp. 338–341.
DACDAC-2008-FaviC #communication
Techniques for fully integrated intra-/inter-chip optical communication (CF, EC), pp. 343–344.
DACDAC-2008-GorjiaraG #architecture #automation #refinement
Automatic architecture refinement techniques for customizing processing elements (BG, DG), pp. 379–384.
DACDAC-2008-LuSHWX #effectiveness #multi #optimisation
Customizing computation accelerators for extensible multi-issue processors with effective optimization techniques (YSL, LS, LH, ZW, NX), pp. 197–200.
DACDAC-2008-OzisikyilmazMC #design #machine learning #performance #using
Efficient system design space exploration using machine learning techniques (, GM, ANC), pp. 966–969.
DATEDATE-2008-GizopoulosRMS #case study #fault
Soft Errors: System Effects, Protection Techniques and Case Studies (DG, KR, SM, PS).
DATEDATE-2008-Katoen #analysis #design #embedded #evaluation #modelling #roadmap
Quantitative Evaluation in Embedded System Design: Trends in Modeling and Analysis Techniques (JPK), pp. 86–87.
DATEDATE-2008-LiCZ #novel
A Novel Technique for Improving Temperature Independency of Ring-ADC (SL, HC, FZ), pp. 694–697.
DATEDATE-2008-NeyGPVBG
A Design-for-Diagnosis Technique for SRAM Write Drivers (AN, PG, SP, AV, MB, VG), pp. 1480–1485.
DATEDATE-2008-RedaelliSS #anti #configuration management #scheduling
Task Scheduling with Configuration Prefetching and Anti-Fragmentation techniques on Dynamically Reconfigurable Systems (FR, MDS, DS), pp. 519–522.
DATEDATE-2008-StratigopoulosTM #estimation #parametricity
A General Method to Evaluate RF BIST Techniques Based on Non-parametric Density Estimation (HGDS, JT, SM), pp. 68–73.
DATEDATE-2008-VemuJAPG #concurrent #detection #fault #logic #low cost
A low-cost concurrent error detection technique for processor control logic (RV, AJ, JAA, SP, RG), pp. 897–902.
DATEDATE-2008-VersenSSD #analysis #locality
Test Instrumentation for a Laser Scanning Localization Technique for Analysis of High Speed DRAM devices (MV, AS, JS, DD), pp. 776–779.
DocEngDocEng-2008-KumarS #automation #documentation #n-gram #using
Automatic keyphrase extraction from scientific documents using N-gram filtration technique (NK, KS), pp. 199–208.
DRRDRR-2008-ShafaitKB #adaptation #image #implementation #performance #using
Efficient implementation of local adaptive thresholding techniques using integral images (FS, DK, TMB), p. 681510.
SIGMODSIGMOD-2008-AulbachGJKR #as a service #database #multitenancy
Multi-tenant databases for software as a service: schema-mapping techniques (SA, TG, DJ, AK, JR), pp. 1195–1206.
SIGMODSIGMOD-2008-PeiHTL #nondeterminism #probability #query #summary #tutorial
Query answering techniques on uncertain and probabilistic data: tutorial summary (JP, MH, YT, XL), pp. 1357–1364.
VLDBVLDB-2008-LizorkinVGT #optimisation
Accuracy estimate and optimization techniques for SimRank computation (DL, PV, MNG, DT), pp. 422–433.
VLDBVLDB-2008-SansL #xml
Prefix based numbering schemes for XML: techniques, applications and performances (VS, DL), pp. 1564–1573.
VLDBVLDB-2008-ShaoSZ #challenge #database #effectiveness #performance #scalability #similarity #video
Challenges and techniques for effective and efficient similarity search in large video databases (JS, HTS, XZ), pp. 1598–1603.
CSEETCSEET-2008-SalamahG #education #model checking #specification #using
A Technique for Using Model Checkers to Teach Formal Specifications (SS, AQG), pp. 181–188.
FASEFASE-2008-DattaE #component #named
COMP-REF: A Technique to Guide the Delegation of Responsibilities to Components in Software Systems (SD, RvE), pp. 332–346.
TACASTACAS-2008-BakewellG #game studies #model checking #on the fly
On-the-Fly Techniques for Game-Based Software Model Checking (AB, DRG), pp. 78–92.
TACASTACAS-2008-Malik #hardware #verification
Hardware Verification: Techniques, Methodology and Solutions (SM), p. 1.
ICPCICPC-2008-AbadiNS #specification #traceability
A Traceability Technique for Specifications (AA, MN, YS), pp. 103–112.
ICPCICPC-2008-RoyC #clone detection #comparison #detection
Scenario-Based Comparison of Clone Detection Techniques (CKR, JRC), pp. 153–162.
ICSMEICSM-2008-CornelissenMZ #assessment #reduction
An assessment methodology for trace reduction techniques (BC, LM, AZ), pp. 107–116.
SCAMSCAM-2008-Anderson #industrial #static analysis
90% Perspiration: Engineering Static Analysis Techniques for Industrial Applications (PA), pp. 3–12.
WCREWCRE-2008-DuszynskiKNHS #comparison #visualisation
Variant Comparison — A Technique for Visualizing Software Variants (SD, JK, MN, DH, CS), pp. 229–233.
PLDIPLDI-2008-Kahlon #alias #analysis #named #pointer #scalability
Bootstrapping: a technique for scalable flow and context-sensitive pointer alias analysis (VK), pp. 249–259.
FLOPSFLOPS-2008-MellarkodG #constraints #reasoning #set #theorem proving
Integrating Answer Set Reasoning with Constraint Solving Techniques (VSM, MG), pp. 15–31.
CIAACIAA-2008-PaunPR #question
Hopcroft’s Minimization Technique: Queues or Stacks? (AP, MP, ARP), pp. 78–91.
CHICHI-2008-AliakseyeuILS #evaluation #interface #multi #named
Multi-flick: an evaluation of flick-based scrolling techniques for pen interfaces (DA, PI, AL, SS), pp. 1689–1698.
CHICHI-2008-ChenGDLA #navigation
Navigation techniques for dual-display e-book readers (NC, FG, MD, CL, MA), pp. 1779–1788.
CHICHI-2008-YataniPBN #gesture #named #using
Escape: a target selection technique using visually-cued gestures (KY, KP, MWB, MWN), pp. 285–294.
SOFTVISSOFTVIS-2008-FrischDB #diagrams #semantics #towards #uml
Towards seamless semantic zooming techniques for UML diagrams (MF, RD, TB), pp. 207–208.
SOFTVISSOFTVIS-2008-NestorTBCH #product line #visualisation
Applying visualisation techniques in software product lines (DN, ST, GB, CC, PH), pp. 175–184.
ICEISICEIS-DISI-2008-SellamiBAR #challenge #scalability
Study of Challenges and Techniques in Large Scale Matching (SS, ANB, YA, RR), pp. 355–361.
ICEISICEIS-HCI-2008-HornungBT #web
Assistive Technologies and Techniques for Web Based EGOV in Developing Countries (HHH, MCCB, CdAT), pp. 248–255.
ICEISICEIS-ISAS2-2008-CabreroGP #predict
Combining Different Change Prediction Techniques (DCM, JG, MP), pp. 57–63.
ICEISICEIS-ISAS2-2008-ParvathyVB #analysis #case study #comparative #correlation #documentation #traceability
A Comparative Study of Document Correlation Techniques for Traceability Analysis (AGP, BGV, RB), pp. 64–69.
ICEISICEIS-ISAS2-2008-RaoRO #elicitation #ontology
Knowledge Elicitation Techniques for Deriving Competency Questions for Ontologies (LR, HR, KMOB), pp. 105–110.
ICEISICEIS-J-2008-WengXLN08a #estimation #performance #recommendation
An Efficient Neighbourhood Estimation Technique for Making Recommendations (LTW, YX, YL, RN), pp. 253–264.
CIKMCIKM-2008-ChakaravarthyGRM #documentation #performance
Efficient techniques for document sanitization (VTC, HG, PR, MKM), pp. 843–852.
CIKMCIKM-2008-LiuLNBMG #dataset #feature model #performance #preprocessor #realtime #scalability
Real-time data pre-processing technique for efficient feature extraction in large scale datasets (YL, LVL, RSN, KB, PM, CLG), pp. 981–990.
ECIRECIR-2008-HannahMO #analysis #graph
Analysis of Link Graph Compression Techniques (DH, CM, IO), pp. 596–601.
ICPRICPR-2008-AmatoMHGV
Background subtraction technique based on chromaticity and intensity patterns (AA, MM, IHC, JG, JV), pp. 1–4.
ICPRICPR-2008-FerilliBBE #comprehension #documentation #incremental #layout #machine learning
Incremental machine learning techniques for document layout understanding (SF, MB, TMAB, FE), pp. 1–4.
ICPRICPR-2008-GatosPP #adaptation #documentation #image #multi #using
Improved document image binarization by using a combination of multiple binarization techniques and adapted edge information (BG, IP, SJP), pp. 1–4.
ICPRICPR-2008-RicamatoMT #comparison #empirical
MCS-based balancing techniques for skewed classes: An empirical comparison (MTR, CM, FT), pp. 1–4.
ICPRICPR-2008-SahaB #clustering #multi #symmetry #using
A new multiobjective simulated annealing based clustering technique using stability and symmetry (SS, SB), pp. 1–4.
ICPRICPR-2008-SatoOKI #image #realtime
Real-time image-based rendering system for virtual city based on image compression technique and eigen texture method (RS, SO, HK, KI), pp. 1–4.
ICPRICPR-2008-YenCWWC #using #video
A scene-based video watermarking technique using SVMs (SHY, HWC, CJW, PSPW, MCC), pp. 1–4.
RecSysRecSys-2008-Kwon #rating #recommendation #using
Improving top-n recommendation techniques using rating variance (YK), pp. 307–310.
SEKESEKE-2008-AssawamekinSP #automation #multi #ontology #requirements #traceability #using
Automated Multiperspective Requirements Traceability Using Ontology Matching Technique (NA, TS, CP), pp. 460–465.
SEKESEKE-2008-Fuad #architecture #distributed #program transformation #self
Code Transformation Techniques and Management Architecture for Self-manageable Distributed Applications (MMF), pp. 315–320.
SEKESEKE-2008-HittleG #fault #file system #injection #testing #using
Fault Injection Testing of User-space File Systems Using Traditional and Aspect-based Techniques (JH, SG), pp. 873–876.
SEKESEKE-2008-Rajapakse #mobile #taxonomy
Techniques for De-fragmenting Mobile Applications: A Taxonomy (DCR), pp. 923–928.
SEKESEKE-2008-TubiioLR #bibliography #elicitation #perspective
Obtaining Well-Founded Practices about Elicitation Techniques by Means of an Update of a Previous Systematic Review (ÓDT, ML, FR), pp. 769–772.
SIGIRSIGIR-2008-Murray #library #modelling #process
Extending language modeling techniques to models of search and browsing activity in a digital library (GCM), p. 900.
SIGIRSIGIR-2008-TanWC #detection #sentiment #using
Combining learn-based and lexicon-based techniques for sentiment detection without using labeled examples (ST, YW, XC), pp. 743–744.
ICMTICMT-2008-Wagelaar #composition #model transformation #rule-based
Composition Techniques for Rule-Based Model Transformation Languages (DW), pp. 152–167.
ECOOPECOOP-2008-DrossopoulouFMS #framework #invariant #verification
A Unified Framework for Verification Techniques for Object Invariants (SD, AF, PM, AJS), pp. 412–437.
GPCEGPCE-2008-MendoncaWCC #compilation #feature model #modelling #performance #scalability
Efficient compilation techniques for large scale feature models (MM, AW, KC, DDC), pp. 13–22.
RERE-2008-FeatherHMU #analysis #deployment #requirements #using
Guiding Technology Deployment Decisions using a Quantitative Requirements Analysis Technique (MSF, KAH, RMM, SU), pp. 271–276.
REFSQREFSQ-2008-BendjennaZC #distributed #elicitation #process
Enhancing Elicitation Technique Selection Process in a Cooperative Distributed Environment (HB, NZ, PJC), pp. 23–36.
SACSAC-2008-BabarZCT #integration #requirements
Three integration approaches for map and B-SCP requirements engineering techniques (AB, DZ, KC, VT), pp. 650–655.
SACSAC-2008-BuenoTT #algorithm #data access #effectiveness #metric #optimisation
An algorithm for effective deletion and a new optimization technique for metric access methods (RB, AJMT, CTJ), pp. 1034–1035.
SACSAC-2008-CastroS #image #multi #network
Restoring images with a multiscale neural network based technique (APAdC, JDSdS), pp. 1693–1697.
SACSAC-2008-GarciaT #security #semantics #using #web #web service
Web service security management using semantic web techniques (DZGG, MBFdT), pp. 2256–2260.
SACSAC-2008-SchiabelSA #detection #image #segmentation
Segmentation technique for detecting suspect masses in dense breast digitized images as a tool for mammography CAD schemes (HS, VTS, MFA), pp. 1333–1337.
SACSAC-2008-ZhouTBAG #ambiguity #graph #named #query
Gcon: a graph-based technique for resolving ambiguity in query translation candidates (DZ, MT, TJB, HA, JG), pp. 1566–1573.
SACSAC-2008-ZuikeviciuteP #database #replication
Conflict-aware load-balancing techniques for database replication (VZ, FP), pp. 2169–2173.
FSEFSE-2008-DufourRS #java #scalability
A scalable technique for characterizing the usage of temporaries in framework-intensive Java applications (BD, BGR, GS), pp. 59–70.
ICSEICSE-2008-GoldschmidtRW #case study #evaluation #maintenance #performance
A case study evaluation of maintainability and performance of persistency techniques (TG, RR, JW), pp. 401–410.
SPLCSPLC-2008-AlvesSBRSRPR #analysis #case study #information retrieval
An Exploratory Study of Information Retrieval Techniques in Domain Analysis (VA, CS, LB, AR, PS, PR, CP, AR), pp. 67–76.
ICLPICLP-2008-Cipriano #constraints #modelling #on the #programming #tool support
On the Hybridization of Constraint Programming and Local Search Techniques: Models and Software Tools (RC), pp. 803–804.
ICSTICST-2008-KimCKK #model checking
Pre-testing Flash Device Driver through Model Checking Techniques (MK, YC, YK, HK), pp. 475–484.
ICSTICST-2008-MetsaKM #aspect-oriented #testing
Comparing Aspects with Conventional Techniques for Increasing Testability (JM, MK, TM), pp. 387–395.
QoSAQoSA-2007-PaceC #architecture #design #quality #using
Using Planning Techniques to Assist Quality-Driven Architectural Design Exploration (JADP, MRC), pp. 33–52.
ASEASE-2007-ChenH #adaptation #evaluation
An evaluation scheme of adaptive configuration techniques (HC, SH), pp. 493–496.
ASEASE-2007-Czarnecki #evolution #generative #reuse
Software reuse and evolution with generative techniques (KC), p. 575.
ASEASE-2007-Gawley #automation #feature model #identification #modelling #variability
Automating the identification of variability realisation techniques from feature models (RG), pp. 555–558.
ASEASE-2007-RaysideM #memory management #profiling
Object ownership profiling: a technique for finding and fixing memory leaks (DR, LM), pp. 194–203.
CASECASE-2007-LamLY #automation #framework #sketching #using
Robot Drawing Techniques for Contoured Surface Using an Automated Sketching Platform (JHML, KWL, YY), pp. 735–740.
CASECASE-2007-LuimulaSPPAL #mobile #ubiquitous #using
Improving the Remote Control of a Mobile Robot Using Positioning and Ubiquitous Techniques (ML, KS, TP, SP, JA, AL), pp. 1027–1033.
CASECASE-2007-LuXL #development #implementation
Development and implementation of NURBS interpolator with look-ahead technique (YL, JX, ZL), pp. 134–139.
CASECASE-2007-SahlanGS
Properties of Frequency Weighted Balanced Truncation Techniques (SS, AG, VS), pp. 765–770.
CASECASE-2007-VidalA #visual notation
Window-Matching Techniques with Kalman Filtering for an Improved Object Visual Tracking (FdBV, VHCA), pp. 829–834.
DACDAC-2007-BhatiaGTMM #equivalence #multi #performance #validation
Leveraging Semi-Formal and Sequential Equivalence Techniques for Multimedia SOC Performance Validation (LB, JG, PT, RSM, SHM), pp. 69–74.
DACDAC-2007-BurnsKMBTD #analysis #comparative #design #statistics
Comparative Analysis of Conventional and Statistical Design Techniques (SMB, MK, NM, KAB, JT, VD), pp. 238–243.
DACDAC-2007-HariziHOB #analysis #modelling #performance
Efficient Modeling Techniques for Dynamic Voltage Drop Analysis (HH, RH, MO, EB), pp. 706–711.
DACDAC-2007-MangHH #distributed #effectiveness #physics #synthesis
Techniques for Effective Distributed Physical Synthesis (FYCM, WH, PHH), pp. 859–864.
DACDAC-2007-Vardi #verification
Formal Techniques for SystemC Verification; Position Paper (MYV), pp. 188–192.
DATEDATE-2007-ChoudhuryRRM #interactive #memory management
Interactive presentation: Single-ended coding techniques for off-chip interconnects to commodity memory (MRC, KR, SR, KM), pp. 1072–1077.
DATEDATE-2007-DabrowskiR #interactive
Interactive presentation: Boosting SER test for RF transceivers by simple DSP technique (JD, RR), pp. 719–724.
DATEDATE-2007-GodardDTS #design #embedded #evaluation #reliability
Evaluation of design for reliability techniques in embedded flash memories (BG, JMD, LT, GS), pp. 1593–1598.
DATEDATE-2007-NepalBMPZ #design #interactive #multi
Interactive presentation: Techniques for designing noise-tolerant multi-level combinational circuits (KN, RIB, JLM, WRP, AZ), pp. 576–581.
DATEDATE-2007-ParkPH #memory management #novel #stack
A novel technique to use scratch-pad memory for stack management (SP, HwP, SH), pp. 1478–1483.
DATEDATE-2007-SafarpourV #abstraction #automation #debugging #design #refinement
Abstraction and refinement techniques in automated design debugging (SS, AGV), pp. 1182–1187.
DATEDATE-2007-SanchezSSR #automation #effectiveness #generative #interactive #source code
Interactive presentation: An enhanced technique for the automatic generation of effective diagnosis-oriented test programs for processor (ES, MS, GS, MSR), pp. 1158–1163.
DATEDATE-2007-SavojAAGH #performance
A new technique for characterization of digital-to-analog converters in high-speed systems (JS, AAA, AA, BWG, MAH), pp. 433–438.
DATEDATE-2007-SeongM #performance #taxonomy #using
An efficient code compression technique using application-aware bitmask and dictionary selection methods (SWS, PM), pp. 582–587.
DATEDATE-2007-ZamoraKM #distributed #network #video
Distributed power-management techniques for wireless network video systems (NHZ, JCK, RM), pp. 564–569.
DRRDRR-2007-Marosi #adaptation #algorithm #architecture #industrial
Industrial OCR approaches: architecture, algorithms, and adaptation techniques (IM).
ICDARICDAR-2007-LiLT #keyword #performance
A Fast Keyword-Spotting Technique (LL, SJL, CLT), pp. 68–72.
ICDARICDAR-2007-MakridisNG #documentation #performance #segmentation #word
An Efficient Word Segmentation Technique for Historical and Degraded Machine-Printed Documents (MM, NAN, BG), pp. 178–182.
VLDBVLDB-2007-TatbulCZ #distributed #performance
Staying FIT: Efficient Load Shedding Techniques for Distributed Stream Processing (NT, , SBZ), pp. 159–170.
ITiCSEITiCSE-2007-JiWC #detection #source code
A source code linearization technique for detecting plagiarized programs (JHJ, GW, HGC), pp. 73–77.
ESOPESOP-2007-Pitts #equivalence #higher-order
Techniques for Contextual Equivalence in Higher-Order, Typed Languages (AMP), p. 1.
FASEFASE-2007-ReisMP #integration #modelling #product line #testing
Integration Testing in Software Product Line Engineering: A Model-Based Technique (SR, AM, KP), pp. 321–335.
CSMRCSMR-2007-HeymansBW #interactive #migration #scalability #testing
Testing Techniques for the Cross-platform Migration of Very Large Interactive Applications (LH, TVdB, BW), pp. 323–324.
ICPCICPC-2007-RoyURD #case study #mining
Evaluating Aspect Mining Techniques: A Case Study (CKR, MGU, BR, TRD), pp. 167–176.
ICSMEICSM-2007-Arcelli #reverse engineering
Working Session on Reverse Engineering techniques for Application Portfolio Management — RE4APM 2007 - (FA), pp. 495–496.
ICSMEICSM-2007-JoshiO #named
SCARPE: A Technique and Tool for Selective Capture and Replay of Program Executions (SJ, AO), pp. 234–243.
WCREWCRE-2007-Cornelissen #architecture #dynamic analysis #re-engineering
Dynamic Analysis Techniques for the Reconstruction of Architectural Views (BC), pp. 281–284.
WCREWCRE-2007-LorenzoFMTV #web #web service
Turning Web Applications into Web Services by Wrapping Techniques (GDL, ARF, LM, PT, VV), pp. 199–208.
PEPMPEPM-2007-BurchettCK #functional #named #optimisation
Lowering: a static optimization technique for transparent functional reactivity (KB, GHC, SK), pp. 71–80.
CHICHI-2007-Gerber #design
Improvisation principles and techniques for design (EG), pp. 1069–1072.
CHICHI-2007-GuiardDC #documentation #evaluation #navigation
Quantifying degree of goal directedness in document navigation: application to the evaluation of the perspective-drag technique (YG, YD, OC), pp. 327–336.
CHICHI-2007-HancockCC #3d #design #evaluation #interactive
Shallow-depth 3d interaction: design and evaluation of one-, two- and three-touch techniques (MSH, MSTC, AC), pp. 1147–1156.
CHICHI-2007-JonesBHX #mobile #novel
Questions not answers: a novel mobile search technique (MJ, GB, RH, PLX), pp. 155–158.
CHICHI-2007-ReillyI #evaluation #visualisation
White rooms and morphing don’t mix: setting and the evaluation of visualization techniques (DFR, KMI), pp. 111–120.
CHICHI-2007-VogelB #interface #named #using
Shift: a technique for operating pen-based interfaces using touch (DV, PB), pp. 657–666.
HCIHCI-IDU-2007-Forsman #experience #human-computer #research #tool support #using
After Hurricane Katrina: Post Disaster Experience Research Using HCI Tools and Techniques (CF), pp. 78–87.
HCIHCI-IDU-2007-ResterPWHMPO #evaluation #interactive
Mixing Evaluation Methods for Assessing the Utility of an Interactive InfoVis Technique (MR, MP, SW, KH, SM, CP, SO), pp. 604–613.
HCIHCI-IPT-2007-AdnanNA #evaluation #visualisation
An Experimental Evaluation of Information Visualization Techniques and Decision Style (WAWA, NLMN, RA), pp. 143–150.
HCIHCI-IPT-2007-LeeC #design #interface #visual notation
Interface Design Technique Considering Visual Cohesion-Rate by Object Unit (CML, OBC), pp. 72–81.
HCIHCI-IPT-2007-Misue #graph #visualisation
Anchored Maps: Visualization Techniques for Drawing Bipartite Graphs (KM), pp. 106–114.
HCIHCI-MIE-2007-KoLKJL #case study #evaluation #personalisation #recommendation #user satisfaction
A Study on User Satisfaction Evaluation About the Recommendation Techniques of a Personalized EPG System on Digital TV (SMK, YJL, MHK, YGJ, SWL), pp. 909–917.
HCIHIMI-MTT-2007-AkutsuFMS #image
Hierarchical Image Gathering Technique for Browsing Surveillance Camera Images (WA, TF, HNM, TS), pp. 383–390.
HCIHIMI-MTT-2007-ShiIL #query #using #visual notation
Facilitating Visual Queries in the TreeMap Using Distortion Techniques (KS, PI, PCL), pp. 345–353.
VISSOFTVISSOFT-2007-PaddaSM #visualisation
Visualization Patterns: A Context-Sensitive Tool to Evaluate Visualization Techniques (HKP, AS, SPM), pp. 88–91.
ICEISICEIS-AIDSS-2007-AlevizosKPSB #fuzzy #information retrieval #multi
Fuzzy Interval Number (FIN) Techniques for Multilingual and Cross Language Information Retrieval (TA, VGK, SEP, CS, PB), pp. 348–355.
ICEISICEIS-DISI-2007-AouicheL #comparison #estimation
UNASSSUMING view-size estimation techniques in OLAP — an experimental comparison (KA, DL), pp. 145–150.
ICEISICEIS-J-2007-Novacek07a #automation #documentation #information management #integration #scalability #taxonomy
Automatic Knowledge Acquisition and Integration Technique: Application to Large Scale Taxonomy Extraction and Document Annotation (VN), pp. 160–172.
ICEISICEIS-J-2007-RuizB07a #documentation
Summarizing Structured Documents through a Fractal Technique (MDR, ABB), pp. 328–340.
ICEISICEIS-SAIC-2007-ChenC #bottom-up #detection #difference #process
A Simulation-Based Difference Detection Technique for Bottom-Up Process Reconciliation (XC, PWHC), pp. 72–77.
ICEISICEIS-SAIC-2007-RezguiN #categorisation #composition #ontology #semantics #using
Ontology-Based Dynamic Service Composition Using Semantic Relatedness and Categorization Techniques (YR, SN), pp. 113–120.
ICEISICEIS-SAIC-2007-RuizB #documentation #using
Summarizing Documents Using Fractal Techniques (MDR, ABB), pp. 26–33.
ICMLICML-2007-Yairi #locality #reduction
Map building without localization by dimensionality reduction techniques (TY), pp. 1071–1078.
KDDKDD-2007-FastFMTJGK #detection #preprocessor #relational
Relational data pre-processing techniques for improved securities fraud detection (ASF, LF, MEM, BJT, DJ, HGG, JK), pp. 941–949.
KDDKDD-2007-ParkP #collaboration #ranking
Applying collaborative filtering techniques to movie search for better ranking and browsing (STP, DMP), pp. 550–559.
MLDMMLDM-2007-FranceC #development #evaluation #metric #reduction
Development of an Agreement Metric Based Upon the RAND Index for the Evaluation of Dimensionality Reduction Techniques, with Applications to Mapping Customer Data (SLF, JDC), pp. 499–517.
MLDMMLDM-2007-SadoddinG #case study #comparative #data mining #detection #machine learning #mining
A Comparative Study of Unsupervised Machine Learning and Data Mining Techniques for Intrusion Detection (RS, AAG), pp. 404–418.
SEKESEKE-2007-KirnerC #empirical #evaluation #requirements #specification #uml
Evaluation of the OORT Techniques for Inspection of Requirements Specifications in UML: an Empirical Study (TGK, ERdC), p. 649–?.
SIGIRSIGIR-2007-BalasubramanianAC #comparison #retrieval
A comparison of sentence retrieval techniques (NB, JA, WBC), pp. 813–814.
SIGIRSIGIR-2007-KoAS #effectiveness #feedback #generative #pseudo #using
An effective snippet generation method using the pseudo relevance feedback technique (YK, HA, JS), pp. 711–712.
MODELSMoDELS-2007-JacksonS #reasoning
Constructive Techniques for Meta- and Model-Level Reasoning (EKJ, JS), pp. 405–419.
MODELSMoDELS-2007-JacksonS #reasoning
Constructive Techniques for Meta- and Model-Level Reasoning (EKJ, JS), pp. 405–419.
GPCEGPCE-2007-WinterM #generative #java #library #migration #programming
Generative programming techniques for Java library migration (VLW, AM), pp. 185–196.
QAPLQAPL-2007-PierroHW #analysis #data flow #on the #probability
On Probabilistic Techniques for Data Flow Analysis (ADP, CH, HW), pp. 59–77.
RERE-2007-DekhtyarHSHD #assessment #integration #requirements
Technique Integration for Requirements Assessment (AD, JHH, SKS, EAH, OD), pp. 141–150.
REFSQREFSQ-2007-AlkkiomakiS #architecture #case study #functional #integration #modelling #requirements #uml
Integration Use Cases — An Applied UML Technique for Modeling Functional Requirements in Service Oriented Architecture (VA, KS), pp. 190–202.
REFSQREFSQ-2007-RinkeW #how #modelling #requirements
Defining Reference Models for Modelling Qualities: How Requirements Engineering Techniques Can Help (TR, TW), pp. 335–340.
SACSAC-MT-J-2006-CabotT07 #constraints #ocl
Transformation techniques for OCL constraints (JC, ET), pp. 179–195.
SACSAC-2007-CiferriCFTS #performance #query
Horizontal fragmentation as a technique to improve the performance of drill-down and roll-up queries (CDdAC, RRC, DTF, AJMT, FdFdS), pp. 494–499.
SACSAC-2007-KimKK #energy #mobile
Energy-efficient disk replacement and file placement techniques for mobile systems with hard disks (YJK, KTK, JK), pp. 693–698.
SACSAC-2007-LebbahMR #constraints #implementation #performance #reduction #using
Using constraint techniques for a safe and fast implementation of optimality-based reduction (YL, CM, MR), pp. 326–331.
SACSAC-2007-LodhiG #design #effectiveness
Design of a simple and effective object-to-relational mapping technique (FL, MAG), pp. 1445–1449.
SACSAC-2007-MansmannS #visualisation
Exploring OLAP aggregates with hierarchical visualization techniques (SM, MHS), pp. 1067–1073.
SACSAC-2007-TrutaC #incremental #maintenance #optimisation
K-anonymization incremental maintenance and optimization techniques (TMT, AC), pp. 380–387.
ESEC-FSEESEC-FSE-2007-Kwiatkowska #modelling #tool support #verification
Quantitative verification: models techniques and tools (MZK), pp. 449–458.
ICSEICSE-2007-ClauseO #debugging
A Technique for Enabling and Supporting Debugging of Field Failures (JAC, AO), pp. 261–270.
ICSEICSE-2007-GrahamKW #architecture #trade-off
Agility and Experimentation: Practical Techniques for Resolving Architectural Tradeoffs (TCNG, RK, CW), pp. 519–528.
ICSEICSE-2007-KarailaS #case study #experience #industrial #metaprogramming #visual notation
Applying Template Meta-Programming Techniques for a Domain-Specific Visual Language — An Industrial Experience Report (MK, TS), pp. 571–580.
CGOCGO-2007-FultonS #compilation #java #realtime #source code
Compilation Techniques for Real-Time Java Programs (MF, MGS), pp. 221–231.
HPCAHPCA-2007-PuttaswamyL #3d #architecture
Thermal Herding: Microarchitecture Techniques for Controlling Hotspots in High-Performance 3D-Integrated Processors (KP, GHL), pp. 193–204.
LCTESLCTES-2007-XuT #named
Tetris: a new register pressure control technique for VLIW processors (WX, RT), pp. 113–122.
CADECADE-2007-UnelT #incremental
An Incremental Technique for Automata-Based Decision Procedures (, DT), pp. 100–115.
ICLPICLP-2007-Gebser #programming #set
Advanced Techniques for Answer Set Programming (MG), pp. 458–459.
ICLPICLP-2007-Morozov #analysis #design #logic programming #visual notation
Visual Logic Programming Method Based on Structural Analysis and Design Technique (AAM), pp. 436–437.
ISSTAISSTA-2007-TzorefUY #automation #concurrent #debugging
Instrumenting where it hurts: an automatic concurrent debugging technique (RT, SU, EYT), pp. 27–38.
TAPTAP-2007-GallRT #execution #refinement #symbolic computation #testing
Symbolic Execution Techniques for Refinement Testing (PLG, NR, AT), pp. 131–148.
FATESTestCom-FATES-2007-GromovW #model checking #testing
Testing and Model-Checking Techniques for Diagnosis (MG, TACW), pp. 138–154.
QoSAQoSA-2006-Grunske #component #evaluation #integration #safety #standard #towards
Towards an Integration of Standard Component-Based Safety Evaluation Techniques with SaveCCM (LG), pp. 199–213.
ASEASE-2006-dAmorimPXME #automation #classification #comparison #empirical #generative #object-oriented #testing
An Empirical Comparison of Automated Generation and Classification Techniques for Object-Oriented Unit Testing (Md, CP, TX, DM, MDE), pp. 59–68.
ASEASE-2006-Singer #evaluation #testing #tool support
Testing Tools and Techniques: A Mini-Tutorial on Evaluation Methods for ASE (JS), pp. 371–374.
CASECASE-2006-LamiriX #using
Operating Rooms Planning Using Lagrangian Relaxation Technique (ML, XX), pp. 176–181.
DACDAC-2006-GhoshMKR #power management #reduction #self
Self-calibration technique for reduction of hold failures in low-power nano-scaled SRAM (SG, SM, KK, KR), pp. 971–976.
DACDAC-2006-LaiR #megamodelling #multi #performance #robust
A multilevel technique for robust and efficient extraction of phase macromodels of digitally controlled oscillators (XL, JSR), pp. 1017–1022.
DACDAC-2006-WaghmodeLS #scalability
Buffer insertion in large circuits with constructive solution search techniques (MW, ZL, WS), pp. 296–301.
DATEDATE-2006-BernardiSSSR #cost analysis #effectiveness
An effective technique for minimizing the cost of processor software-based diagnosis in SoCs (PB, ES, MS, GS, MSR), pp. 412–417.
DATEDATE-2006-Kundu #analysis #design
A design for failure analysis (DFFA) technique to ensure incorruptible signatures (SK), pp. 309–310.
DATEDATE-2006-LaMeresK #encoding #induction
Bus stuttering: an encoding technique to reduce inductive noise in off-chip data transmission (BJL, SPK), pp. 522–527.
DATEDATE-2006-ScharwachterHLAM #hardware #interprocedural #multi #network #optimisation #thread #using
An interprocedural code optimization technique for network processors using hardware multi-threading support (HS, MH, RL, GA, HM), pp. 919–924.
DocEngDocEng-2006-LecerfC #documentation #learning
Document annotation by active learning techniques (LL, BC), pp. 125–127.
SIGMODSIGMOD-2006-VuHCL #database #performance #scalability #similarity
A non-linear dimensionality-reduction technique for fast similarity search in large databases (KV, KAH, HC, SDL), pp. 527–538.
VLDBVLDB-2006-0002OIA #documentation #named #xml
FIX: Feature-based Indexing Technique for XML Documents (NZ, MTÖ, IFI, AA), pp. 259–270.
VLDBVLDB-2006-HuangCLL #evolution #using #xml
XML Evolution: A Two-phase XML Processing Model Using XML Prefiltering Techniques (CHH, TRC, JJL, HML), pp. 1215–1218.
VLDBVLDB-2006-SteinleAGL #dependence #generative #mining #novel
Mapping Moving Landscapes by Mining Mountains of Logs: Novel Techniques for Dependency Model Generation (MS, KA, SG, CL), pp. 1093–1102.
CSEETCSEET-2006-Frailey06a #education #experience #industrial
Experience Teaching Barry Boehm’s Techniques in Industrial and Academic Settings (DJF), pp. 219–225.
FASEFASE-2006-MinK #automation #component
A Technique to Represent and Generate Components in MDA/PIM for Automation (HGM, SDK), pp. 293–307.
ICPCICPC-2006-LawrieFB #assessment #information retrieval #quality #using
Leveraged Quality Assessment using Information Retrieval Techniques (DJL, HF, DB), pp. 149–158.
ICPCICPC-2006-LuciaFOT #effectiveness #information retrieval #question #traceability
Can Information Retrieval Techniques Effectively Support Traceability Link Recovery? (ADL, FF, RO, GT), pp. 307–316.
ICSMEICSM-2006-JaffriK #performance #using
Efficient Delivery of Software Updates Using Advanced Compression Techniques (TJ, KK), pp. 267–268.
ICALPICALP-v2-2006-Yan #automaton #bound
Lower Bounds for Complementation of ω-Automata Via the Full Automata Technique (QY), pp. 589–600.
CHICHI-2006-BenkoWB #multi #precise
Precise selection techniques for multi-touch screens (HB, ADW, PB), pp. 1263–1272.
CHICHI-2006-BlaskoNF #interactive #mobile #prototype #string
Prototyping retractable string-based interaction techniques for dual-display mobile devices (GB, CN, SF), pp. 369–372.
CHICHI-2006-EisensteinM #communication #evaluation
Interacting with communication appliances: an evaluation of two computer vision-based selection techniques (JE, WEM), pp. 1111–1114.
CHICHI-2006-KoM #editing #framework #implementation #interactive #named #tool support
Barista: An implementation framework for enabling new tools, interaction techniques and views in code editors (AJK, BAM), pp. 387–396.
CHICHI-2006-LiWL #analysis #design #testing
Design and experimental analysis of continuous location tracking techniques for Wizard of Oz testing (YL, EW, JAL), pp. 1019–1022.
CHICHI-2006-PrabakerBC #authoring #documentation #evaluation #programming #using
An evaluation of using programming by demonstration and guided walkthrough techniques for authoring and utilizing documentation (MP, LDB, VC), pp. 241–250.
SOFTVISSOFTVIS-2006-KerrenMS #algorithm #education #novel
Novel algorithm explanation techniques for improving algorithm teaching (AK, TM, EMS), pp. 175–176.
SOFTVISSOFTVIS-2006-RhodesKR #algorithm #animation #comprehension #interactive
The importance of interactive questioning techniques in the comprehension of algorithm animations (PR, EK, BR), pp. 183–184.
EDOCEDOC-2006-HosslerBS #modelling
Significant Productivity Enhancement through Model Driven Techniques: A Success Story (JH, MB, SS), pp. 367–373.
ICEISICEIS-AIDSS-2006-MarinagiAKS #fuzzy #information retrieval
Fuzzy Interval Number (FIN) Techniques for Cross Language Information Retrieval (CM, TA, VGK, CS), pp. 249–256.
ICEISICEIS-AIDSS-2006-ThuD #predict #risk management #using
Predicting Cardiovascular Risks — Using POSSUM, PPOSSUM and Neural Net Techniques (TNTT, DND), pp. 230–234.
CIKMCIKM-2006-MacdonaldO #adaptation #data fusion
Voting for candidates: adapting data fusion techniques for an expert search task (CM, IO), pp. 387–396.
ECIRECIR-2006-HoenkampD #semantics
A Fingerprinting Technique for Evaluating Semantics Based Indexing (EH, SvD), pp. 397–406.
ICMLICML-2006-BanerjeeGdN #modelling #optimisation #visual notation
Convex optimization techniques for fitting sparse Gaussian graphical models (OB, LEG, Ad, GN), pp. 89–96.
ICMLICML-2006-Garcke
Regression with the optimised combination technique (JG), pp. 321–328.
ICPRICPR-v1-2006-BauckhageK #detection #multi #performance
Fast, Illumination Insensitive Face Detection Based on Multilinear Techniques and Curvature Features (CB, TK), pp. 507–510.
ICPRICPR-v1-2006-LublinermanOZC #linear #process #recognition #using #validation
Activity Recognition from Silhouettes using Linear Systems and Model (In)validation Techniques (RL, NO, DZ, OIC), pp. 347–350.
ICPRICPR-v1-2006-Ueshiba #bidirectional #implementation #performance #realtime
An Efficient Implementation Technique of Bidirectional Matching for Real-time Trinocular Stereo Vision (TU), pp. 1076–1079.
ICPRICPR-v2-2006-KimYL #estimation #image #interactive #modelling #parametricity #random #segmentation #using
New MRF Parameter Estimation Technique for Texture Image Segmentation using Hierarchical GMRF Model Based on Random Spatial Interaction and Mean Field Theory (DHK, IDY, SUL), pp. 365–368.
ICPRICPR-v2-2006-SenerU #analysis #component #independence #invariant #normalisation #using
A New Affine Invariant Curve Normalization Technique Using Independent Component Analysis (SS, MU), p. 48.
ICPRICPR-v2-2006-SolemOH #segmentation
Initialization Techniques for Segmentation with the Chan-Vese Model (JES, NCO, AH), pp. 171–174.
ICPRICPR-v4-2006-ChenLL #using #video
Video Scene Extraction Using Mosaic Technique (LHC, YCL, HYML), pp. 723–726.
ICPRICPR-v4-2006-HeCTW
Key Techniques and Methods for Imaging Iris in Focus (YH, JC, TT, YW), pp. 557–561.
ICPRICPR-v4-2006-LinHH #embedded #video
An embedded watermark technique in video for copyright protection (YRL, HYH, WHH), pp. 795–798.
ICPRICPR-v4-2006-LuC #3d
Accurate 3D Scanning of Swaying Human Body Parts by One Projection Based on OIMP Technique (CL, GC), pp. 1–4.
ICPRICPR-v4-2006-LuC06a #3d #analysis #metric #using
Practical 3-D Shape Measurement Using Optimal Intensity-Modulated Projection and Intensity-Phase Analysis Techniques (CL, GC), pp. 870–873.
ICPRICPR-v4-2006-MaierHNNHRS #evaluation #recognition #speech
Intelligibility of Children with Cleft Lip and Palate: Evaluation by Speech Recognition Techniques (AKM, CH, EN, EN, TH, FR, MS), pp. 274–277.
ICPRICPR-v4-2006-TripathiJG #image #novel
Novel DCT and DWT based Watermarking Techniques for Digital Images (ST, RCJ, VG), pp. 358–361.
KDDKDD-2006-ManiyarN #algorithm #data mining #mining #using #visual notation #visualisation
Visual data mining using principled projection algorithms and information visualization techniques (DMM, ITN), pp. 643–648.
SEKESEKE-2006-BittencourtTC #rule-based
Rule-Based Systems Combining AI Techniques into a Legal Agent-based Intelligent Tutoring System (IIB, MT, EdBC), pp. 35–40.
SEKESEKE-2006-GrauCFN #analysis #comparative #modelling
A Comparative Analysis of i*Agent-Oriented Modelling Techniques (GG, CC, XF, FN), pp. 657–663.
SEKESEKE-2006-KuleszaLAG #aspect-oriented #generative #using
Customizing Aspect-Oriented Variabilities using Generative Techniques (UK, CJPdL, PSCA, AG), pp. 17–22.
SIGIRSIGIR-2006-HeP #feedback
Comparing two blind relevance feedback techniques (DH, YP), pp. 649–650.
ECMFAECMDA-FA-2006-WagelaarS #comparison #model transformation
A Comparison of Configuration Techniques for Model Transformations (DW, RVDS), pp. 331–345.
MODELSMoDELS-2006-PonsG #ocl #specification #verification
An OCL-Based Technique for Specifying and Verifying Refinement-Oriented Transformations in MDE (CP, DG), pp. 646–660.
MODELSMoDELS-2006-PonsG #ocl #specification #verification
An OCL-Based Technique for Specifying and Verifying Refinement-Oriented Transformations in MDE (CP, DG), pp. 646–660.
OOPSLAOOPSLA-2006-BockischADM #adaptation #virtual machine
Adapting virtual machine techniques for seamless aspect support (CB, MA, TD, MM), pp. 109–124.
GPCEGPCE-2006-Moreno #generative
Creating custom containers with generative techniques (GAM), pp. 29–38.
LOPSTRLOPSTR-2006-LeuschelCE #logic programming #online #partial evaluation #source code #using
Supervising Offline Partial Evaluation of Logic Programs Using Online Techniques (ML, SJC, DE), pp. 43–59.
LOPSTRLOPSTR-2006-MantelSK #data flow #proving #security #verification
Combining Different Proof Techniques for Verifying Information Flow Security (HM, HS, TK), pp. 94–110.
POPLPOPL-2006-OlinskyLR #composition #implementation #specification #staged
Staged allocation: a compositional technique for specifying and implementing procedure calling conventions (RO, CL, NR), pp. 409–421.
RERE-2006-DavisTHJM #bibliography #effectiveness #elicitation #empirical #perspective #requirements
Effectiveness of Requirements Elicitation Techniques: Empirical Results Derived from a Systematic Review (AMD, ÓDT, AMH, NJJ, AMM), pp. 176–185.
SACSAC-2006-Bellur #consistency #object-oriented #on the #using #workflow
On using OO techniques to establish workflow conformance (UB), pp. 1447–1448.
SACSAC-2006-Cuzzocrea #multi
An accuracy-aware compression technique for multidimensional data cubes (AC), pp. 515–516.
SACSAC-2006-DubeyJA #keyword #source code
A deterministic technique for extracting keyword based grammar rules from programs (AD, PJ, SKA), pp. 1631–1632.
SACSAC-2006-KatsimpaPSTT #modelling #reverse engineering #using
Application modeling using reverse engineering techniques (TK, YP, ES, GT, AKT), pp. 1250–1255.
SACSAC-2006-LeeYKKK #ad hoc #distributed #mobile #network
Distributed IPv6 addressing technique for mobile ad-hoc networks (DL, JY, HK, KK, KK), pp. 1156–1160.
SACSAC-2006-MorimotoSGC #security #specification #standard #verification
A security specification verification technique based on the international standard ISO/IEC 15408 (SM, SS, YG, JC), pp. 1802–1803.
SACSAC-2006-OrshanskyWCX #analysis #robust #statistics
Interval-based robust statistical techniques for non-negative convex functions, with application to timing analysis of computer chips (MO, WSW, MC, GX), pp. 1645–1649.
SACSAC-2006-PirkolaTKJ #named #quality #word
FITE-TRT: a high quality translation technique for OOV words (AP, JT, HK, KJ), pp. 1043–1049.
SACSAC-2006-SinghXMH #geometry #linear #locality #problem #programming #using
Solving the brachytherapy seed localization problem using geometric and linear programming techniques (VS, LM, JX, KRH), pp. 229–234.
SACSAC-2006-TsvetinovUC #ranking
Dominance and ranking issues applying interval techniques in pre-negotiations for services (PET, AU, TC), pp. 887–888.
SACSAC-2006-XuC
Improving address space randomization with a dynamic offset randomization technique (HX, SJC), pp. 384–391.
FSEFSE-2006-DoR #empirical #modelling #testing
An empirical study of regression testing techniques incorporating context and lifetime factors and improved cost-benefit models (HD, GR), pp. 141–151.
FSEFSE-2006-DwyerPE #detection #fault
Controlling factors in evaluating path-sensitive error detection techniques (MBD, SP, SGE), pp. 92–104.
ICSEICSE-2006-Deng #challenge #component #deployment #enterprise #framework #generative
Resolving component deployment & configuration challenges for enterprise DRE systems via frameworks & generative techniques (GD), pp. 945–948.
ICSEICSE-2006-JarzabekP #industrial #research #reuse #towards
Research journey towards industrial application of reuse technique (SJ, UP), pp. 608–611.
ICSEICSE-2006-Komuro #case study #development #experience #process
Experiences of applying SPC techniques to software development processes (MK), pp. 577–584.
ICSEICSE-2006-TwalaCS #predict
Ensemble of missing data techniques to improve software prediction accuracy (BT, MC, MJS), pp. 909–912.
ICSEICSE-2006-Xie #effectiveness #modelling #testing #user interface
Developing cost-effective model-based techniques for GUI testing (QX), pp. 997–1000.
ICSEICSE-2006-ZhongZM #comparison #reduction #testing
An experimental comparison of four test suite reduction techniques (HZ, LZ, HM), pp. 636–640.
SPLCSPLC-2006-HallsteinsenSSF #adaptation #product line #using
Using Product Line Techniques to Build Adaptive Systems (SOH, ES, AS, JF), pp. 141–150.
ASPLOSASPLOS-2006-AdamsA #comparison #hardware
A comparison of software and hardware techniques for x86 virtualization (KA, OA), pp. 2–13.
HPCAHPCA-2006-IsciM
Phase characterization for power: evaluating control-flow-based and event-counter-based techniques (CI, MM), pp. 121–132.
HPCAHPCA-2006-KumarA #concurrent #detection #fault #performance
Reducing resource redundancy for concurrent error detection techniques in high performance microprocessors (SK, AA), pp. 212–221.
OSDIOSDI-2006-ZhouCABEHNB #named #using
SafeDrive: Safe and Recoverable Extensions Using Language-Based Techniques (FZ, JC, ZRA, IB, RE, MH, GCN, EAB), pp. 45–60.
PPoPPPPoPP-2006-AlamVAG #performance #simulation
Performance characterization of molecular dynamics techniques for biomolecular simulations (SRA, JSV, PKA, AG), pp. 59–68.
AMOSTAMOST-J-2005-Paradkar06 #case study #detection #effectiveness #fault #generative #modelling #testing
A quest for appropriate software fault models: Case studies on fault detection effectiveness of model-based test generation techniques (AMP), pp. 949–959.
CAVCAV-2006-LahiriNO #abstraction #performance #smt
SMT Techniques for Fast Predicate Abstraction (SKL, RN, AO), pp. 424–437.
ICLPICLP-2006-Pientka #framework #logic #performance #verification
Overcoming Performance Barriers: Efficient Verification Techniques for Logical Frameworks (BP), pp. 3–10.
IJCARIJCAR-2006-JiaZ #finite #morphism
A Powerful Technique to Eliminate Isomorphism in Finite Model Search (XJ, JZ), pp. 318–331.
ISSTAISSTA-2006-Wagner #analysis #detection #quality
A model and sensitivity analysis of the quality economics of defect-detection techniques (SW0), pp. 73–84.
ICTSSTestCom-2006-GastonGRT #execution #symbolic computation
Symbolic Execution Techniques for Test Purpose Definition (CG, PLG, NR, AT), pp. 1–18.
CBSECBSE-2005-GuH #component #implementation #modelling #realtime #scheduling #synthesis
Real-Time Scheduling Techniques for Implementation Synthesis from Component-Based Software Models (ZG, ZH), pp. 235–250.
CBSECBSE-2005-TansalarakC #component #ranking
Finding a Needle in the Haystack: A Technique for Ranking Matches Between Components (NT, KTC), pp. 171–186.
ASEASE-2005-JonesH #automation #empirical #evaluation
Empirical evaluation of the tarantula automatic fault-localization technique (JAJ, MJH), pp. 273–282.
DACDAC-2005-AbdollahiFP #effectiveness
An effective power mode transition technique in MTCMOS circuits (AA, FF, MP), pp. 37–42.
DACDAC-2005-HuLWD #analysis #integration #novel #using
Analysis of full-wave conductor system impedance over substrate using novel integration techniques (XH, JHL, JW, LD), pp. 147–152.
DACDAC-2005-KimYH #using
Trace-driven HW/SW cosimulation using virtual synchronization technique (DK, YY, SH), pp. 345–348.
DACDAC-2005-KrenikB #network
Cognitive radio techniques for wide area networks (WK, AB), pp. 409–412.
DACDAC-2005-LiSB #bound #effectiveness #problem
Effective bounding techniques for solving unate and binate covering problems (XYL, MFMS, FB), pp. 385–390.
DACDAC-2005-MengBISLK #algorithm #design #estimation #performance
MP core: algorithm and design techniques for efficient channel estimation in wireless applications (YM, APB, RAI, TS, HL, RK), pp. 297–302.
DACDAC-2005-RoyannezMDWSBBCSDSPRK #design #framework #reduction
A design platform for 90-nm leakage reduction techniques (PR, HM, FD, MW, MS, LB, JB, HC, GS, JD, DS, BP, CR, UK), pp. 549–550.
DACDAC-2005-TschanzBD
Variation-tolerant circuits: circuit solutions and techniques (JT, KAB, VD), pp. 762–763.
DACDAC-2005-YuanQ #reduction
Enhanced leakage reduction Technique by gate replacement (LY, GQ), pp. 47–50.
DACDAC-2005-ZykovMJVS #architecture #novel #performance #trade-off
High performance computing on fault-prone nanotechnologies: novel microarchitecture techniques exploiting reliability-delay trade-offs (AVZ, EM, MFJ, GdV, AS), pp. 270–273.
DATEDATE-2005-Abdel-HamidTA #design
A Public-Key Watermarking Technique for IP Designs (ATAH, ST, EMA), pp. 330–335.
DATEDATE-2005-BhuniaMRR #novel #testing
A Novel Low-overhead Delay Testing Technique for Arbitrary Two-Pattern Test Application (SB, HMM, AR, KR), pp. 1136–1141.
DATEDATE-2005-ChandrasekarH #fault #generative #incremental #integration #learning #performance #satisfiability #testing
Integration of Learning Techniques into Incremental Satisfiability for Efficient Path-Delay Fault Test Generation (KC, MSH), pp. 1002–1007.
DATEDATE-2005-DasygenisBDCST #energy #memory management #performance
A Memory Hierarchical Layer Assigning and Prefetching Technique to Overcome the Memory Performance/Energy Bottleneck (MD, EB, BD, FC, DS, AT), pp. 946–947.
DATEDATE-2005-ElbazTSGABBR #bibliography #encryption #hardware
Hardware Engines for Bus Encryption: A Survey of Existing Techniques (RE, LT, GS, PG, CA, MB, CB, JBR), pp. 40–45.
DATEDATE-2005-HamannE #optimisation #search-based
TDMA Time Slot and Turn Optimization with Evolutionary Search Techniques (AH, RE), pp. 312–317.
DATEDATE-2005-IshiharaF #power management
A Way Memoization Technique for Reducing Power Consumption of Caches in Application Specific Integrated Processors (TI, FF), pp. 358–363.
DATEDATE-2005-LiWYY #named #performance #power management
Q-DPM: An Efficient Model-Free Dynamic Power Management Technique (ML, XW, RY, XY), pp. 526–527.
DATEDATE-2005-Lopez-OngilGPE #fault #performance
Techniques for Fast Transient Fault Grading Based on Autonomous Emulation (CLO, MGV, MPG, LEA), pp. 308–309.
DATEDATE-2005-LopezCLS #estimation #quality
A High Quality/Low Computational Cost Technique for Block Matching Motion Estimation (SL, GMC, JFL, RS), pp. 2–7.
DATEDATE-2005-ManquinhoM #bound #effectiveness #optimisation #pseudo
Effective Lower Bounding Techniques for Pseudo-Boolean Optimization (VMM, JPMS), pp. 660–665.
DATEDATE-2005-MarconCMSRH #energy
Exploring NoC Mapping Strategies: An Energy and Timing Aware Technique (CAMM, NLVC, FGM, AAS, IMR, FH), pp. 502–507.
DATEDATE-2005-NeiroukhS #statistics #using
Improving the Process-Variation Tolerance of Digital Circuits Using Gate Sizing and Statistical Techniques (ON, XS), pp. 294–299.
DATEDATE-2005-ScholiveBRFR #generative #testing
Mutation Sampling Technique for the Generation of Structural Test Data (MS, VB, CR, MLF, BR), pp. 1022–1023.
DATEDATE-2005-Simunic #power management
Power Saving Techniques for Wireless LANs (TS), pp. 96–97.
DocEngDocEng-2005-HuangCL #documentation #performance #xml
Prefiltering techniques for efficient XML document processing (CHH, TRC, HML), pp. 149–158.
HTHT-2005-BerlangaG #adaptation #design #learning #modelling #navigation #specification #using
Modelling adaptive navigation support techniques using the IMS learning design specification (AJB, FJG), pp. 148–150.
ICDARICDAR-2005-CeciBM #comprehension #documentation #image #learning #logic #relational #statistics
Relational Learning techniques for Document Image Understanding: Comparing Statistical and Logical approaches (MC, MB, DM), pp. 473–477.
ICDARICDAR-2005-HamzaBS
Neural Based Binarization Techniques (HH, AB, ES), pp. 317–321.
ICDARICDAR-2005-LeeH #performance #recognition
Performance Improvement Techniques for Chinese Character Recognition (HJL, JTH), pp. 710–715.
ICDARICDAR-2005-LiuCL #identification #image #machine learning #using
Language Identification of Character Images Using Machine Learning Techniques (YHL, FC, CCL), pp. 630–634.
ICDARICDAR-2005-MethasateMST #recognition
The feature Combination Technique for Off-line Thai Character Recognition System (IM, SM, SSt, TT), pp. 1006–1009.
ICDARICDAR-2005-MihovSRDN #comparative #corpus #evaluation
A Corpus for Comparative Evaluation of OCR Software and Postcorrection Techniques (SM, KUS, CR, VD, VN), pp. 162–166.
ICDARICDAR-2005-MiyazakiUS #named #recognition
Mosaicing-by-recognition: a technique for video-based text recognition (HM, SU, HS), pp. 904–908.
ICDARICDAR-2005-ShiG #documentation #multi #segmentation
Multi-scale Techniques for Document Page Segmentation (ZS, VG), pp. 1020–1024.
ICDARICDAR-2005-ShivakumaraKVRN #documentation #estimation #image #using #word
A New Moments based Skew Estimation Technique using Pixels in the Word for Binary Document Images (PS, GHK, HSV, SR, MRRN), pp. 151–156.
ICDARICDAR-2005-ZakosV #documentation #novel #retrieval #web
A Novel Context Matching Based Technique for Web Document Retrieval (JZ, BV), pp. 909–914.
SIGMODSIGMOD-2005-ChenLL #on the #pattern matching #using #xml
On Boosting Holism in XML Twig Pattern Matching using Structural Indexing Techniques (TC, JL, TWL), pp. 455–466.
SIGMODSIGMOD-2005-LiMTPT #data type #evaluation #semantics
Semantics and Evaluation Techniques for Window Aggregates in Data Streams (JL, DM, KT, VP, PAT), pp. 311–322.
VLDBVLDB-2005-KoudasS #approximate #concept
Approximate Joins: Concepts and Techniques (NK, DS), p. 1363.
VLDBVLDB-2005-ZhangHJLZ #cost analysis #learning #query #statistics #xml
Statistical Learning Techniques for Costing XML Queries (NZ, PJH, VJ, GML, CZ), pp. 289–300.
CSEETCSEET-2005-Sindre #case study #communication #education #experience #game studies #student
Teaching Oral Communication Techniques in RE by Student-Student Role Play: Initial Experiences (GS), pp. 85–92.
ITiCSEITiCSE-2005-Ghafarian #education #re-engineering #reverse engineering
Reverse engineering technique to enhance software engineering education (AG), p. 354.
ITiCSEITiCSE-2005-MedeirosDGM #programming #using
Using a PC simulator to illustrate input-output programming techniques (PDM, VD, MCG, RFM), p. 388.
TACASTACAS-2005-LeinoMO #proving #quantifier #theorem proving
A Two-Tier Technique for Supporting Quantifiers in a Lazily Proof-Explicating Theorem Prover (KRML, MM, XO), pp. 334–348.
CSMRCSMR-2005-DubeyAJ #keyword #set #source code
A Technique for Extracting Keyword Based Rules from a Set of Programs (AD, SKA, PJ), pp. 217–225.
CSMRCSMR-2005-ZaidmanCDP #comprehension #execution #mining #process
Applying Webmining Techniques to Execution Traces to Support the Program Comprehension Process (AZ, TC, SD, JP), pp. 134–142.
ICSMEICSM-2005-AntoniolPH #maintenance #optimisation #search-based
Search-Based Techniques Applied to Optimization of Project Planning for a Massive Maintenance Project (GA, MDP, MH), pp. 240–249.
ICSMEICSM-2005-DemeyerDN #object-oriented #re-engineering
Object-Oriented Reengineering: Patterns and Techniques (SD, SD, ON), pp. 723–724.
ICSMEICSM-2005-DoR #empirical #fault #testing
A Controlled Experiment Assessing Test Case Prioritization Techniques via Mutation Faults (HD, GR), pp. 411–420.
ICSMEICSM-2005-OdaS #diagrams #generative #version control
Generative Technique of Version Control Systems for Software Diagrams (TO, MS), pp. 515–524.
ICSMEICSM-2005-SprenkleSGPS #comparison #empirical #reduction #testing #web
An Empirical Comparison of Test Suite Reduction Techniques for User-Session-Based Testing of Web Applications (SS, SS, EG, LLP, ALS), pp. 587–596.
ICSMEICSM-2005-WillmorE #testing
A Safe Regression Test Selection Technique for Database-Driven Applications (DW, SME), pp. 421–430.
IWPCIWPC-2005-CeccatoMMMTT #comparison #mining
A Qualitative Comparison of Three Aspect Mining Techniques (MC, MM, KM, LM, PT, TT), pp. 13–22.
IWPCIWPC-2005-MarcusRBPS #concept #object-oriented
Static Techniques for Concept Location in Object-Oriented Code (AM, VR, JB, MP, AS), pp. 33–42.
SCAMSCAM-2005-Singer #code generation #concept #debugging
Concept Assignment as a Debugging Technique for Code Generators (JS), pp. 75–86.
STOCSTOC-2005-BriestKV #approximate #design
Approximation techniques for utilitarian mechanism design (PB, PK, BV), pp. 39–48.
ICALPICALP-2005-Pous #bisimulation
Up-to Techniques for Weak Bisimulation (DP), pp. 730–741.
IFMIFM-2005-MalikR #adaptation #case study #comparative #embedded #specification
Adaptive Techniques for Specification Matching in Embedded Systems: A Comparative Study (RM, PSR), pp. 33–52.
CHICHI-2005-ArroyoBS #feedback #named #persuasion
Waterbot: exploring feedback and persuasive techniques at the sink (EA, LB, TS), pp. 631–639.
CHICHI-2005-HolmanVATJ #interactive
Paper windows: interaction techniques for digital paper (DH, RV, MA, NFT, DJ), pp. 591–599.
CHICHI-2005-IachelloA #adaptation #design #evaluation #privacy #ubiquitous
Privacy and proportionality: adapting legal evaluation techniques to inform design in ubiquitous computing (GI, GDA), pp. 91–100.
CHICHI-2005-LiHGL #analysis #user interface
Experimental analysis of mode switching techniques in pen-based user interfaces (YL, KH, ZG, JAL), pp. 461–470.
CHICHI-2005-NacentaASG #comparison #multi
A comparison of techniques for multi-display reaching (MAN, DA, SS, CG), pp. 371–380.
CAiSECAiSE-2005-HoppenbrouwersPW #comprehension #modelling #requirements
Understanding the Requirements on Modelling Techniques (SH, HAP, TPvdW), pp. 262–276.
ICEISICEIS-v1-2005-ArandaVCP #elicitation #tool support
Choosing Groupware Tools and Elicitation Techniques According to Stakeholders’ Features (GNA, AV, AC, MP), pp. 68–75.
ICEISICEIS-v1-2005-XuePQZ #database #hybrid #scalability #string
The Hybrid Digital Tree: A New Indexing Technique for Large String Databases (QX, SP, GQ, QZ), pp. 115–121.
ICEISICEIS-v3-2005-EspositoMORS #data mining #detection #mining #novel #realtime
Real Time Detection of Novel Attacks by Means of Data Mining Techniques (ME, CM, FO, SPR, CS), pp. 120–127.
ICMLICML-2005-CortesMW #learning
A general regression technique for learning transductions (CC, MM, JW), pp. 153–160.
SEKESEKE-2005-ChanCT #adaptation #random testing #reduction #testing
Adaptive Random Testing with Filtering: An Overhead Reduction Technique (KPC, TYC, DT), pp. 292–299.
SEKESEKE-2005-ChangL #compilation #data-driven
Compiler Techniques for Data Driven Languages with Superlinear Speed-up (LHC, ELL), pp. 543–549.
SEKESEKE-2005-YangLH #reasoning
An Ontology-Supported Case-Based Reasoning Technique for FAQ Proxy Service (SYY, PCL, CSH), pp. 639–644.
SIGIRSIGIR-2005-HoenkampD #semantics
Evaluating semantic indexing techniques through cross-language fingerprinting (EH, SvD), pp. 609–610.
MODELSMoDELS-2005-ShenP #analysis #aspect-oriented #modelling #performance #uml #using
Performance Analysis of UML Models Using Aspect-Oriented Modeling Techniques (HS, DCP), pp. 156–170.
MODELSMoDELS-2005-ShenP #analysis #aspect-oriented #modelling #performance #uml #using
Performance Analysis of UML Models Using Aspect-Oriented Modeling Techniques (HS, DCP), pp. 156–170.
GPCEGPCE-2005-JunJ #framework #generative #maintenance
Applying a Generative Technique for Enhanced Genericity and Maintainability on the J2EE Platform (YJ, SJ), pp. 237–255.
RERE-2005-AvesaniBPS #machine learning #requirements #scalability
Facing Scalability Issues in Requirements Prioritization with Machine Learning Techniques (PA, CB, AP, AS), pp. 297–306.
SACSAC-2005-AgyemangBA #mining #n-gram #using #web
Mining web content outliers using structure oriented weighting techniques and N-grams (MA, KB, RA), pp. 482–487.
SACSAC-2005-Casale #analysis #mining #network #performance #web
Combining queueing networks and web usage mining techniques for web performance analysis (GC), pp. 1699–1703.
SACSAC-2005-HiransakolwongHKVL #adaptation #distance #image #retrieval
An adaptive distance computation technique for image retrieval systems (NH, KAH, SK, KV, SDL), pp. 1195–1199.
SACSAC-2005-JanejaA #detection #linear #named #semantics #statistics
LS3: a Linear Semantic Scan Statistic technique for detecting anomalous windows (VPJ, VA), pp. 493–497.
SACSAC-2005-YimKK #memory management #performance
A fast start-up technique for flash memory based computing systems (KSY, JK, KK), pp. 843–849.
ESEC-FSEESEC-FSE-2005-HaranKOPS #classification #execution
Applying classification techniques to remotely-collected program execution data (MH, AFK, AO, AAP, APS), pp. 146–155.
GTTSEGTTSE-2005-KrahnR #generative #lightweight #refactoring
Techniques for Lightweight Generator Refactoring (HK, BR), pp. 437–446.
ICSEICSE-2005-Fox #dependence #machine learning #statistics
Addressing software dependability with statistical and machine learning techniques (AF), p. 8.
ICSEICSE-2005-LeonMP #data flow #empirical #evaluation #testing
An empirical evaluation of test case filtering techniques based on exercising complex information flows (DL, WM, AP), pp. 412–421.
CGOCGO-2005-BerndlVZB #flexibility #performance #thread #virtual machine
Context Threading: A Flexible and Efficient Dispatch Technique for Virtual Machine Interpreters (MB, BV, MZ, ADB), pp. 15–26.
CGOCGO-2005-ZillesN
Reactive Techniques for Controlling Software Speculation (CBZ, NN), pp. 305–316.
HPCAHPCA-2005-YiKSLH #simulation
Characterizing and Comparing Prevailing Simulation Techniques (JJY, SVK, RS, DJL, DMH), pp. 266–277.
HPDCHPDC-2005-TierneyG #clustering #workflow
Techniques for tuning workflows in cluster environments (BT, DKG), pp. 303–305.
LCTESLCTES-2005-BriskMNS #taxonomy
A dictionary construction technique for code compression systems with echo instructions (PB, JM, AN, MS), pp. 105–114.
PPoPPPPoPP-2005-JungLLH #adaptation #architecture #execution #multi #smt
Adaptive execution techniques for SMT multiprocessor architectures (CJ, DL, JL, SH), pp. 236–246.
PPoPPPPoPP-2005-SuraFWMLP #compilation #consistency #java #performance #source code
Compiler techniques for high performance sequentially consistent java programs (ZS, XF, CLW, SPM, JL, DAP), pp. 2–13.
ICSTSAT-J-2004-PanV05 #satisfiability
Search vs. Symbolic Techniques in Satisfiability Solving (GP, MYV), pp. 235–250.
AMOSTAMOST-2005-Paradkar #case study #detection #effectiveness #fault #generative #modelling #testing
Case studies on fault detection effectiveness of model based test generation techniques (AMP).
CADECADE-2005-UrbanT #higher-order
Nominal Techniques in Isabelle/HOL (CU, CT), pp. 38–53.
ICLPICLP-2005-GallagherHB #analysis #scalability
Techniques for Scaling Up Analyses Based on Pre-interpretations (JPG, KSH, GB), pp. 280–296.
ICSTSAT-2005-LewisSB #satisfiability
Speedup Techniques Utilized in Modern SAT Solvers (MDTL, TS, BB), pp. 437–443.
ASEASE-2004-RysselbergheD #clone detection #detection #perspective #refactoring
Evaluating Clone Detection Techniques from a Refactoring Perspective (FVR, SD), pp. 336–339.
DACDAC-2004-DingM #logic #novel
A novel technique to improve noise immunity of CMOS dynamic logic circuits (LD, PM), pp. 900–903.
DACDAC-2004-ParkCYC #power management #testing
A new state assignment technique for testing and low power (SP, SC, SY, MJC), pp. 510–513.
DACDAC-2004-YangKM #architecture #named #optimisation
Divide-and-concatenate: an architecture level optimization technique for universal hash functions (BY, RK, DAM), pp. 614–617.
DATEDATE-v1-2004-ChangYL
Value-Conscious Cache: Simple Technique for Reducing Cache Access Power (YJC, CLY, FL), pp. 16–21.
DATEDATE-v1-2004-DimopoulosL #performance #sequence #set #testing
Efficient Static Compaction of Test Sequence Sets through the Application of Set Covering Techniques (MGD, PL), pp. 194–201.
DATEDATE-v1-2004-IsseninBMD #analysis #memory management #reuse
Data Reuse Analysis Technique for Software-Controlled Memory Hierarchies (II, EB, MM, ND), pp. 202–207.
DATEDATE-v1-2004-NathkeBHB #automation #behaviour #generative
Hierarchical Automatic Behavioral Model Generation of Nonlinear Analog Circuits Based on Nonlinear Symbolic Techniques (LN, VB, LH, EB), pp. 442–447.
DATEDATE-v1-2004-OngHCW #multi #random
Random Jitter Extraction Technique in a Multi-Gigahertz Signal (CKO, DH, KTC, LCW), pp. 286–291.
DATEDATE-v1-2004-ZambrenoCSN #flexibility #hardware #using
Flexible Software Protection Using Hardware/Software Codesign Techniques (JZ, ANC, RS, BN), pp. 636–641.
DATEDATE-v2-2004-Feldmann #linear #order #reduction #scalability
Model Order Reduction Techniques for Linear Systems with Large Numbers of Terminals (PF), pp. 944–947.
DATEDATE-v2-2004-LampropoulosAR #using
Minimization of Crosstalk Noise, Delay and Power Using a Modified Bus Invert Technique (ML, BMAH, PMR), pp. 1372–1373.
DATEDATE-v2-2004-MineKKWA #hybrid #linear #performance #reduction #simulation
Hybrid Reduction Technique for Efficient Simulation of Linear/Nonlinear Mixed Circuits (TM, HK, AK, TW, HA), pp. 1327–1333.
DATEDATE-v2-2004-TehranipourNC #flexibility #testing
Nine-Coded Compression Technique with Application to Reduced Pin-Count Testing and Flexible On-Chip Decompression (MHT, MN, KC), pp. 1284–1289.
DATEDATE-v2-2004-VerbauwhedeSPK #architecture #design #embedded #energy #multi #performance
Architectures and Design Techniques for Energy Efficient Embedded DSP and Multimedia Processing (IV, PS, CP, BK), pp. 988–995.
DATEDATE-v2-2004-WangLC #fault #hardware #hybrid #testing
Hybrid Delay Scan: A Low Hardware Overhead Scan-Based Delay Test Technique for High Fault Coverage and Compact Test Sets (SW, XL, STC), pp. 1296–1301.
DocEngDocEng-2004-Dymetman #authoring #documentation #editing #predict
Chart-parsing techniques and the prediction of valid editing moves in structured document authoring (MD), pp. 229–238.
DocEngDocEng-2004-QuintV #authoring #documentation #xml
Techniques for authoring complex XML documents (VQ, IV), pp. 115–123.
SIGMODSIGMOD-2004-DasGR #approximate
Approximation Techniques for Spatial Data (AD, JG, MR), pp. 695–706.
SIGMODSIGMOD-2004-RizviMSR #data access #fine-grained #query
Extending Query Rewriting Techniques for Fine-Grained Access Control (SR, AOM, SS, PR), pp. 551–562.
VLDBVLDB-2004-JohnsonKCKV #matrix #order #scalability #using
Compressing Large Boolean Matrices using Reordering Techniques (DSJ, SK, JC, SK, SV), pp. 13–23.
ICSMEICSM-2004-Basili #dependence #empirical #evolution
Empirically Evolving Software Techniques: The High Dependability Computing Project (VRB), p. 3.
ICSMEICSM-2004-BruntinkDTE #clone detection #detection #evaluation #identification
An Evaluation of Clone Detection Techniques for Identifying Crosscutting Concerns (MB, AvD, TT, RvE), pp. 200–209.
ICSMEICSM-2004-DeelstraSNB #named #product line #variability
COSVAM: A Technique for Assessing Software Variability in Software Product Families (SD, MS, JN, JB), pp. 458–462.
IWPCIWPC-2004-DistantePT #perspective #reverse engineering #towards #transaction #web
Towards a Technique for Reverse Engineering Web Transactions from a User’s Perspective (DD, TP, SRT), pp. 142–150.
SCAMSCAM-2004-SuWHM #pipes and filters
Software De-Pipelining Technique (BS, JW, EWH, JM), pp. 7–16.
SCAMSCAM-2004-WahlerSGF #clone detection #detection #source code
Clone Detection in Source Code by Frequent Itemset Techniques (VW, DS, JWvG, GF), pp. 128–135.
SCAMSCAM-2004-XuLZS #clustering
Program Restructuring Through Clustering Techniques (XX, CHL, MZ, AS), pp. 75–84.
WCREWCRE-2004-LakhotiaP #analysis #research #tool support
Virus Analysis: Techniques, Tools, and Research Issues (AL, PP), p. 2.
CIAACIAA-2004-Ibarra #infinity
Automata-Theoretic Techniques for Analyzing Infinite-State Systems (OHI), p. 1.
ICALPICALP-2004-FranceschiniG #data type #string
A General Technique for Managing Strings in Comparison-Driven Data Structures (GF, RG), pp. 606–617.
SEFMSEFM-2004-SchuleS #comparison #infinity #model checking #verification
Global vs. Local Model Checking: A Comparison of Verification Techniques for Infinite State Systems (TS, KS), pp. 67–76.
SEFMSEFM-2004-ZhangXW #constraints #execution #generative #symbolic computation #testing #theorem proving #using
Path-Oriented Test Data Generation Using Symbolic Execution and Constraint Solving Techniques (JZ, CX, XW), pp. 242–250.
IFLIFL-2004-EversAK #functional #programming #user interface #visual notation
A Functional Programming Technique for Forms in Graphical User Interfaces (SE, PA, JK), pp. 35–51.
CHICHI-2004-WigdorB #comparison #concurrent #mobile
A comparison of consecutive and concurrent input text entry techniques for mobile phones (DW, RB), pp. 81–88.
CAiSECAiSE-2004-SalinesiEZ #approach #evolution #modelling #requirements #similarity #using
A Systematic Approach to Express IS Evolution Requirements Using Gap Modelling and Similarity Modelling Techniques (CS, AE, IZ), pp. 338–352.
ICEISICEIS-v2-2004-BelsisGSD #implementation #information management #security
Implementing Knowledge Management Techniques for Security Purposes (PB, SG, CS, ID), pp. 535–540.
ICEISICEIS-v2-2004-KooptiwootS #mining #set #using
Mining the Relationships in the Form of the Predisposing Factors and Coincident Factors Among Numerical Dynamic Attributes in Time Series Data Set by Using the Combination of Some Existing Techniques (SK, MAS), pp. 327–334.
ICEISICEIS-v2-2004-MararCPF #adaptation #detection
Adaptative Techniques for the Human Faces Detection (JFM, DC, OP, EF), pp. 465–468.
ICEISICEIS-v2-2004-PachonVRST #industrial #process
Practical Application of KDD Techniques to an Industrial Process (VP, JMV, FR, JCRS, JMT), pp. 309–314.
ICEISICEIS-v2-2004-TagarelliTG #clustering #linear #mining #programming
Mining Scientific Results Through the Combined Use of Clustering and Linear Programming Techniques (AT, IT, SG), pp. 84–91.
CIKMCIKM-2004-MaZMS #framework #learning #query #similarity #using
A framework for refining similarity queries using learning techniques (YM, QZ, SM, DYS), pp. 158–159.
CIKMCIKM-2004-MegalooikonomouLW #analysis #database #performance #reduction #similarity
A dimensionality reduction technique for efficient similarity analysis of time series databases (VM, GL, QW), pp. 160–161.
CIKMCIKM-2004-MekhaldiLI #clustering #documentation #speech #using
Using bi-modal alignment and clustering techniques for documents and speech thematic segmentations (DM, DL, RI), pp. 69–77.
ECIRECIR-2004-WeigelMBS #information retrieval #performance #xml
Content-Aware DataGuides: Interleaving IR and DB Indexing Techniques for Efficient Retrieval of Textual XML Data (FW, HM, FB, KUS), pp. 378–393.
ICPRICPR-v1-2004-HoriSNK #detection #multi #realtime #using
A Real-Time Multi Face Detection Technique Using Positive-Negative Lines-of-Face Template (YH, KS, YN, TK), pp. 765–768.
ICPRICPR-v2-2004-MachadoMC #adaptation #clustering #image #using
The Influence of the Noise in the Restoration of Solar Radio Images using Adaptive Regularization Techniques Based on Clustering (WRSM, NDAM, JERC), pp. 371–374.
ICPRICPR-v2-2004-VijayaMS #classification #clustering #performance #sequence
An Efficient Technique for Protein Sequence Clustering and Classification (PAV, MNM, DKS), pp. 447–450.
ICPRICPR-v3-2004-ParedesV #fault #learning #nearest neighbour #prototype #reduction
Learning Prototypes and Distances (LPD). A Prototype Reduction Technique based on Nearest Neighbor Error Minimization (RP, EV), pp. 442–445.
ICPRICPR-v4-2004-IkeuchiNHO #representation
Representing Cultural Heritage in Digital Forms for VR Systems through Computer Vision Techniques (KI, AN, KH, TO), pp. 1–6.
ICPRICPR-v4-2004-KandimallaNG
Snake-based Technique for Plasmapause Tracking (RMK, TSN, DLG), pp. 376–379.
ICPRICPR-v4-2004-LiuC #adaptation #image
An Adaptive Data Hiding Technique for Binary Images (THL, LWC), pp. 831–834.
ICPRICPR-v4-2004-SinghS #comparison #detection #image
A Comparison of Image Enhancement Techniques for Explosive Detection (MS, SS), pp. 811–814.
ICPRICPR-v4-2004-ViswanathMB #classification #nearest neighbour #pattern matching #pattern recognition #performance #recognition #synthesis
A Pattern Synthesis Technique with an Efficient Nearest Neighbor Classifier for Binary Pattern Recognition (PV, MNM, SB), pp. 416–419.
KDDKDD-2004-SteinbachTK
Support envelopes: a technique for exploring the structure of association patterns (MS, PNT, VK), pp. 296–305.
KRKR-2004-DohertySL #approximate #ontology #query
Approximative Query Techniques for Agents with Heterogeneous Ontologies and Perceptive Capabilities (PD, AS, WL), pp. 459–468.
KRKR-2004-HaarslevM #documentation #optimisation #owl #rdf
Optimization Techniques for Retrieving Resources Described in OWL/RDF Documents: First Results (VH, RM), pp. 163–174.
SEKESEKE-2004-Cruz-LemusGORP #diagrams #fuzzy #predict #statechart #uml #using
Predicting UML Statechart Diagrams Understandability Using Fuzzy Logic-Based Techniques (JACL, MG, JAO, FPR, MP), pp. 238–245.
SEKESEKE-2004-MouhoubSS
Formal Description Techniques for CSPs and TCSPs (MM, SS, AS), pp. 406–410.
SIGIRSIGIR-2004-ShahC #retrieval
Evaluating high accuracy retrieval techniques (CS, WBC), pp. 2–9.
SIGIRSIGIR-2004-Willett #information retrieval #named
Chemoinformatics: an application domain for information retrieval techniques (PW0), p. 393.
UMLUML-2004-CorreaW #modelling #ocl #refactoring #uml
Applying Refactoring Techniques to UML/OCL Models (ALC, CMLW), pp. 173–187.
RERE-2004-NurmulianiZW #requirements #sorting #using
Using Card Sorting Technique to Classify Requirements Change (NN, DZ, SPW), pp. 240–248.
SACSAC-2004-BaggioWE #scheduling #workflow
Applying scheduling techniques to minimize the number of late jobs in workflow systems (GB, JW, CAE), pp. 1396–1403.
SACSAC-2004-BourasKM #personalisation
A web-page fragmentation technique for personalized browsing (CB, VK, IM), pp. 1146–1147.
SACSAC-2004-Engelen #code generation #embedded #web #web service #xml
Code generation techniques for developing light-weight XML Web services for embedded devices (RvE), pp. 854–861.
SACSAC-2004-ZaneroS #detection #learning
Unsupervised learning techniques for an intrusion detection system (SZ, SMS), pp. 412–419.
ICSEICSE-2004-Card #re-engineering #statistics
Statistical Techniques for Software Engineering Practice (DNC), pp. 722–723.
ICSEICSE-2004-Dong #modelling #semantics #web
Software Modeling Techniques and the Semantic Web (JSD), pp. 724–725.
CCCC-2004-KralFLUW #compilation
FFT Compiler Techniques (SK, FF, JL, CWU, PW), pp. 217–231.
HPCAHPCA-2004-GniadyHL #power management
Program Counter Based Techniques for Dynamic Power Management (CG, YCH, YHL), pp. 24–35.
OSDIOSDI-2004-CandeaKFFF #named
Microreboot — A Technique for Cheap Recovery (GC, SK, YF, GF, AF), pp. 31–44.
RTARTA-2004-Takai #abstract interpretation #term rewriting #using #verification
A Verification Technique Using Term Rewriting Systems and Abstract Interpretation (TT), pp. 119–133.
SATSAT-2004-PanV #satisfiability
Search vs. Symbolic Techniques in Satisfiability Solving (GP, MYV), pp. 137–146.
ASEASE-2003-DiazTB #automation #metaheuristic #testing #using
Automated Software Testing Using a Metaheuristic Technique Based on Tabu Search (ED, JT, RB), pp. 310–313.
DACDAC-2003-BeniniMMOPP #analysis #design #difference #energy
Energy-aware design techniques for differential power analysis protection (LB, AM, EM, EO, FP, MP), pp. 36–41.
DACDAC-2003-ChoiK #design #embedded #layout #memory management #performance
Memory layout techniques for variables utilizing efficient DRAM access modes in embedded system design (YC, TK), pp. 881–886.
DACDAC-2003-HsuTCT #debugging
Advanced techniques for RTL debugging (YCH, BT, YAC, FST), pp. 362–367.
DACDAC-2003-HuaQB #energy #multi #reduction
Energy reduction techniques for multimedia applications with tolerance to deadline misses (SH, GQ, SSB), pp. 131–136.
DACDAC-2003-KouroussisN #grid #independence #power management #verification
A static pattern-independent technique for power grid voltage integrity verification (DK, FNN), pp. 99–104.
DACDAC-2003-KwonK
Optimal voltage allocation techniques for dynamically variable voltage processors (WCK, TK), pp. 125–130.
DACDAC-2003-LeeKBS #analysis
Analysis and minimization techniques for total leakage considering gate oxide leakage (DL, WK, DB, DS), pp. 175–180.
DACDAC-2003-RaghunathanSG #bibliography #communication #energy #performance
A survey of techniques for energy efficient on-chip communication (VR, MBS, RKG), pp. 900–905.
DACDAC-2003-ReshadiMD #flexibility #performance #set #simulation
Instruction set compiled simulation: a technique for fast and flexible instruction set simulation (MR, PM, NDD), pp. 758–763.
DACDAC-2003-RootWT #behaviour #metric #modelling #simulation
New techniques for non-linear behavioral modeling of microwave/RF ICs from simulation and nonlinear microwave measurements (DER, JW, NT), pp. 85–90.
DACDAC-2003-TsaiDVI #reduction #scalability
Implications of technology scaling on leakage reduction techniques (YFT, DD, NV, MJI), pp. 187–190.
DACDAC-2003-VasudevanR #using
Computation of noise spectral density in switched capacitor circuits using the mixed-frequency-time technique (VV, MR), pp. 538–541.
DACDAC-2003-WangM #multi #network #optimisation #power management #using
On-chip power supply network optimization using multigrid-based technique (KW, MMS), pp. 113–118.
DACDAC-2003-WongMP #case study #design
Design techniques for sensor appliances: foundations and light compass case study (JLW, SM, MP), pp. 66–71.
DATEDATE-2003-BurbidgeTR #automation #embedded #monitoring
Techniques for Automatic On Chip Closed Loop Transfer Function Monitoring For Embedded Charge Pump Phase Locked Loops (MJB, JT, AR), pp. 10496–10503.
DATEDATE-2003-ChengP #encoding #interface #power management #visual notation
Chromatic Encoding: A Low Power Encoding Technique for Digital Visual Interface (WCC, MP), pp. 10694–10699.
DATEDATE-2003-GouraryRUZM #analysis #simulation
A New Simulation Technique for Periodic Small-Signal Analysis (MMG, SGR, SLU, MMZ, BJM), pp. 10244–10249.
DATEDATE-2003-HaubeltTFM #satisfiability #synthesis
SAT-Based Techniques in System Synthesis (CH, JT, RF, BM), pp. 11168–11169.
DATEDATE-2003-KnieserWPWM
A Technique for High Ratio LZW Compression (MJK, FGW, CAP, DJW, DRM), pp. 10116–10121.
DATEDATE-2003-Novak #comparison
Comparison of Test Pattern Decompression Techniques (ON), pp. 11182–11183.
DATEDATE-2003-RoychoudhuryMK #debugging #protocol #using
Using Formal Techniques to Debug the AMBA System-on-Chip Bus Protocol (AR, TM, SRK), pp. 10828–10833.
DATEDATE-2003-WangM #multi #optimisation #using
Power/Ground Mesh Area Optimization Using Multigrid-Based Technique (KW, MMS), pp. 10850–10855.
DocEngDocEng-2003-GarainDMC #pattern matching
Compression of scan-digitized Indian language printed text: a soft pattern matching technique (UG, SD, AM, BBC), pp. 185–192.
ICDARICDAR-2003-BlumensteinVB #feature model #novel #recognition
A Novel Feature Extraction Technique for the Recognition of Segmented Handwritten Characters (MB, BV, HB), pp. 137–141.
ICDARICDAR-2003-ChangC #algorithm #component #using
A Component-Labeling Algorithm Using Contour Tracing Technique (FC, CJC), pp. 741–745.
ICDARICDAR-2003-ChaudhurySVH #documentation #image #interactive
Devising Interactive Access Techniques for Indian Language Document Images (SC, GS, AV, GH), pp. 885–889.
ICDARICDAR-2003-HoqueSHFD #documentation #modelling #named #novel
SAGENT: A Novel Technique for Document Modeling for Secure Access and Distribution (SH, HS, GH, MCF, FD), pp. 1257–1261.
VLDBVLDB-2003-CeriM #tool support #web
Constructing and integrating data-centric Web Applications: Methods, Tools, and Techniques (SC, IM), p. 1151.
VLDBVLDB-2003-HankinsP #adaptation
Data Morphing: An Adaptive, Cache-Conscious Storage Technique (RAH, JMP), pp. 417–428.
VLDBVLDB-2003-KraftSRM #optimisation #sequence #sql
Coarse-Grained Optimization: Techniques for Rewriting SQL Statement Sequences (TK, HS, RR, BM), pp. 488–499.
VLDBVLDB-2003-LernerS #named #optimisation #order #query
AQuery: Query Language for Ordered Data, Optimization Techniques, and Experiments (AL, DS), pp. 345–356.
VLDBVLDB-2003-MeekPK #biology #named #online #sequence
OASIS: An Online and Accurate Technique for Local-alignment Searches on Biological Sequences (CM, JMP, SK), pp. 910–921.
VLDBVLDB-2003-QianZXP #multi
The ND-Tree: A Dynamic Indexing Technique for Multidimensional Non-ordered Discrete Data Spaces (GQ, QZ, QX, SP), pp. 620–631.
ITiCSEITiCSE-2003-HollowayR #development #programming #student #using
Development of a MLE by students for students using extreme programming techniques (JH, MR), p. 225.
ITiCSEITiCSE-2003-LassCBCPHZ #off the shelf #scalability #tool support #using
Tools and techniques for large scale grading using Web-based commercial off-the-shelf software (RNL, CDC, NTB, BWC, JLP, NH, PZ), pp. 168–172.
ESOPESOP-2003-AltisenCMR #using
Using Controller-Synthesis Techniques to Build Property-Enforcing Layers (KA, AC, FM, ÉR), pp. 174–188.
TACASTACAS-2003-AmlaKMM #analysis #bound #model checking
Experimental Analysis of Different Techniques for Bounded Model Checking (NA, RPK, KLM, RM), pp. 34–48.
CSMRCSMR-2003-SaeedMBHS #algorithm #clustering
Software Clustering Techniques and the Use of Combined Algorithm (MS, OM, HAB, SZH, SMS), pp. 301–306.
SCAMSCAM-2003-BinkleyH #algorithm #analysis #graph #optimisation #performance #reachability #scalability #source code
Results from a Large-Scale Study of Performance Optimization Techniques for Source Code Analyses Based on Graph Reachability Algorithms (DB, MH), p. 203–?.
SCAMSCAM-2003-Martel #clustering #static analysis
Improving the Static Analysis of Loops by Dynamic Partitioning Techniques (MM), pp. 13–21.
PLDIPLDI-2003-SuganumaYN #compilation #java
A region-based compilation technique for a Java just-in-time compiler (TS, TY, TN), pp. 312–323.
SASSAS-2003-FieldGRY #abstraction #complexity #type system #verification
Typestate Verification: Abstraction Techniques and Complexity Results (JF, DG, GR, EY), pp. 439–462.
CIAACIAA-2003-TozawaH #xml
XML Schema Containment Checking Based on Semi-implicit Techniques (AT, MH), pp. 213–225.
CHICHI-2003-BaudischR #named #visualisation
Halo: a technique for visualizing off-screen objects (PB, RR), pp. 481–488.
CHICHI-2003-BrewsterLBHT #interactive #multimodal #smarttech
Multimodal “eyes-free” interaction techniques for wearable devices (SAB, JL, MB, MH, ST), pp. 473–480.
VISSOFTVISSOFT-2003-EichelbergerG #diagrams #layout #state of the art #uml
UML Class Diagrams – State of the Art in Layout Techniques (HE, JWvG), pp. 30–34.
VISSOFTVISSOFT-2003-Hamou-LhadjL #complexity #execution #object-oriented
Techniques for Reducing the Complexity of Object-Oriented Execution Traces (AHL, TCL), pp. 35–40.
AdaEuropeAdaEurope-2003-GreinKW #ada #bibliography #physics
A Survey of Physical Unit Handling Techniques in Ada (CG, DAK, FW), pp. 258–270.
CAiSECAiSE-2003-Saeki #development #information management #metric
Embedding Metrics into Information Systems Development Methods: An Application of Method Engineering Technique (MS), pp. 374–389.
ICEISICEIS-v1-2003-WongL #multi #performance #recursion #streaming #video
Recursive Patching — An Efficient Technique for Multicast Video Streaming (YWW, JYBL), pp. 306–312.
CIKMCIKM-2003-LinK #mining #using #web
Question answering from the web using knowledge annotation and knowledge mining techniques (JJL, BK), pp. 116–123.
CIKMCIKM-2003-RamaswamyILD #detection #performance #web
Techniques for efficient fragment detection in web pages (LR, AI, LL, FD), pp. 516–519.
CIKMCIKM-2003-Sifer #coordination #interface #visual notation
A visual interface technique for exploring OLAP data with coordinated dimension hierarchies (MS), pp. 532–535.
CIKMCIKM-2003-TaoFP #estimation #multi #query
The power-method: a comprehensive estimation technique for multi-dimensional queries (YT, CF, DP), pp. 83–90.
KDDKDD-2003-DuZ #data mining #mining #privacy #random #using
Using randomized response techniques for privacy-preserving data mining (WD, JZZ), pp. 505–510.
SEKESEKE-2003-AstesianoMMR #execution #multi #prototype #specification
From Requirement Specification to Prototype Execution: a Combination of Multiview Use-Case Driven Methods and Agent-Oriented Techniques (EA, MM, VM, GR), pp. 578–585.
SEKESEKE-2003-BeaverS #data analysis #modelling #quality
Spatial Data Analysis as a Software Quality Modeling Technique (JMB, GAS), pp. 74–77.
SEKESEKE-2003-LoC #architecture #clustering #component #design
Application of Clustering Techniques to Component Architecture Design (ScL, JhC), pp. 699–705.
SEKESEKE-2003-RafiqueA #information management #performance
An Efficient Knowledge Management Technique for finding Association Rules (FR, AA), pp. 245–249.
SIGIRSIGIR-2003-AntoniukN
A light weight PDA-friendly collection fusion technique (JA, MAN), pp. 439–440.
ECOOPECOOP-2003-ConradiMAHBP #empirical #industrial #modelling #object-oriented #uml
Object-Oriented Reading Techniques for Inspection of UML Models — An Industrial Experiment (RC, PM, TA, LCH, GAB, AP), pp. 483–500.
RERE-2003-HickeyD #elicitation #how #question
Elicitation Technique Selection: How Do Experts Do It? (AMH, AMD), p. 169–?.
SACSAC-2003-HuaJVT #algebra #analysis #approach #data mining #mining #named #performance #using
ADMiRe: An Algebraic Approach to System Performance Analysis Using Data Mining Techniques (KAH, NJ, RV, DAT), pp. 490–496.
SACSAC-2003-LanzenbergerMOP #behaviour #visualisation
Applying Information Visualization Techniques to Capture and Explore the Course of Cognitive Behavioral Therapy (ML, SM, SO, CP), pp. 268–274.
SACSAC-2003-LiBKLZ #3d #framework #performance
A Framework of Individually-Focused Teleconferencing (IFT) via an Efficient 3D Reprojection Technique (QL, CB, CK, TL, SZ), pp. 951–955.
SACSAC-2003-ZhangP #algorithm #effectiveness #performance
A Fast and Effective Steganalytic Technique Against JSteg-like Algorithms (TZ, XP), pp. 307–311.
ESEC-FSEESEC-FSE-2003-JarzabekS #adaptation #composition #metaprogramming
Eliminating redundancies with a “composition with adaptation” meta-programming technique (SJ, SL), pp. 237–246.
ESEC-FSEESEC-FSE-2003-SyD #consistency #generative #interprocedural #testing
Consistency techniques for interprocedural test data generation (NTS, YD), pp. 108–117.
ICSEICSE-2003-SeyboldGMM #adaptation #effectiveness #layout #modelling #visual notation
An Effective Layout Adaptation Technique for a Graphical Modeling Tool (CS, MG, SM, NMS), pp. 826–827.
CGOCGO-2003-GibertSG #clustering #distributed #memory management #scheduling
Local Scheduling Techniques for Memory Coherence in a Clustered VLIW Processor with a Distributed Data Cache (EG, FJS, AG), pp. 193–203.
CGOCGO-2003-SmelyanskiyMDL #constraints #scheduling
Predicate-Aware Scheduling: A Technique for Reducing Resource Constraints (MS, SAM, ESD, HHSL), pp. 169–178.
HPCAHPCA-2003-JosephBM #performance
Control Techniques to Eliminate Voltage Emergencies in High Performance Processors (RJ, DMB, MM), pp. 79–90.
HPCAHPCA-2003-KimYDYD #architecture #performance
Performance Enhancement Techniques for InfiniBand? Architecture (EJK, KHY, CRD, MSY, JD), pp. 253–262.
FATESFATES-2003-HahnleW #proving #testing #theorem proving #using
Using a Software Testing Technique to Improve Theorem Proving (RH, AW), pp. 30–41.
RTARTA-2003-BartheS #framework #induction #validation
Validation of the JavaCard Platform with Implicit Induction Techniques (GB, SS), pp. 337–351.
ASEASE-2002-LoerH #analysis #interactive #model checking #towards
Towards Usable and Relevant Model Checking Techniques for the Analysis of Dependable Interactive Systems (KL, MDH), pp. 223–226.
DACDAC-2002-AnisMEA #automation #clustering #performance #power management #reduction #using
Dynamic and leakage power reduction in MTCMOS circuits using an automated efficient gate clustering technique (MA, MM, MIE, SA), pp. 480–485.
DACDAC-2002-BartleyGB #comparison #pseudo #random testing #testing #verification
A comparison of three verification techniques: directed testing, pseudo-random testing and property checking (MB, DG, TB), pp. 819–823.
DACDAC-2002-CadambiMA #functional #hardware #performance #scalability #simulation
A fast, inexpensive and scalable hardware acceleration technique for functional simulation (SC, CM, PA), pp. 570–575.
DACDAC-2002-DaemsGS #modelling #performance
An efficient optimization--based technique to generate posynomial performance models for analog integrated circuits (WD, GGEG, WMCS), pp. 431–436.
DACDAC-2002-HrkicL #named #synthesis
S-Tree: a technique for buffered routing tree synthesis (MH, JL), pp. 578–583.
DACDAC-2002-JiangB #logic #simulation #specification #synthesis #using
Software synthesis from synchronous specifications using logic simulation techniques (YJ, RKB), pp. 319–324.
DACDAC-2002-KangSC #power management #synthesis
An optimal voltage synthesis technique for a power-efficient satellite application (DIK, JS, SPC), pp. 492–497.
DACDAC-2002-KurzwegLMKC #modelling #performance
A fast optical propagation technique for modeling micro-optical systems (TPK, SPL, JAM, MK, DMC), pp. 236–241.
DACDAC-2002-NohlBSLMH #architecture #flexibility #performance #simulation
A universal technique for fast and flexible instruction-set architecture simulation (AN, GB, OS, RL, HM, AH), pp. 22–27.
DACDAC-2002-SiegmundM #communication #declarative #hardware #novel #protocol #specification #synthesis
A novel synthesis technique for communication controller hardware from declarative data communication protocol specifications (RS, DM), pp. 602–607.
DACDAC-2002-ZengAA #identification #using
False timing path identification using ATPG techniques and delay-based information (JZ, MSA, JAA), pp. 562–565.
DATEDATE-2002-AchterenDCL #reuse
Data Reuse Exploration Techniques for Loop-Dominated Application (TVA, GD, FC, RL), pp. 428–435.
DATEDATE-2002-Al-ArsG #fault #in memory #memory management #modelling #testing
Modeling Techniques and Tests for Partial Faults in Memory Devices (ZAA, AJvdG), pp. 89–93.
DATEDATE-2002-BecerZBPH #analysis #using
Analysis of Noise Avoidance Techniques in DSM Interconnects Using a Complete Crosstalk Noise Model (MRB, VZ, DB, RP, INH), pp. 456–463.
DATEDATE-2002-BerrojoGCRSEL #injection
New Techniques for Speeding-Up Fault-Injection Campaigns (LB, IG, FC, MSR, GS, LE, CL), pp. 847–852.
DATEDATE-2002-BlasquezHFLBHB #industrial #verification
Formal Verification Techniques: Industrial Status and Perspectives (JB, MvH, AF, JLL, DB, CH, PB), p. 1050.
DATEDATE-2002-ChenS #scheduling #synthesis
Power-Manageable Scheduling Technique for Control Dominated High-Level Synthesis (CC, MS), pp. 1016–1020.
DATEDATE-2002-HalambiSBDN #compilation #performance #reduction #using
An Efficient Compiler Technique for Code Size Reduction Using Reduced Bit-Width ISAs (AH, AS, PB, NDD, AN), pp. 402–408.
DATEDATE-2002-Hieu #analysis #design #feedback #linear #optimisation
Optimization Techniques for Design of General and Feedback Linear Analog Amplifier with Symbolic Analysis (TcH), p. 1104.
DATEDATE-2002-LuchettaMP #comparison #fault
Critical Comparison among Some Analog Fault Diagnosis Procedures Based on Symbolic Techniques (AL, SM, MCP), p. 1105.
DATEDATE-2002-MartinezAQSK #encoding #implementation #power management
An Encoding Technique for Low Power CMOS Implementations of Controllers (MM, MJA, JMQ, HS, MK), p. 1083.
DATEDATE-2002-PaskoVS #c++ #design
Techniques to Evolve a C++ Based System Design Language (RP, SV, PS), pp. 302–309.
SIGMODSIGMOD-2002-LiGS
Skew handling techniques in sort-merge join (WL, DG, RTS), pp. 169–180.
SIGMODSIGMOD-2002-ShashaB #database
Database tuning: principles, experiments, and troubleshooting techniques (part II) (DS, PB), p. 637.
SIGMODSIGMOD-2002-ShashaB02a #database
Database tuning: principles, experiments, and troubleshooting techniques (part I) (DS, PB), p. 637.
VLDBVLDB-2002-ParkMC #query #recursion #xml
Structural Function Inlining Technique for Structurally Recursive XML Queries (CWP, JKM, CWC), pp. 83–94.
VLDBVLDB-2002-ShashaB #database
Database Tuning: Principles, Experiments, and Troubleshooting Techniques (DS, PB).
ITiCSEITiCSE-2002-Clear #performance
A diagnostic technique for addressing group performance in capstone projects (TC), p. 196.
FASEFASE-2002-BaresiGMP #design #metamodelling #tool support #web
Meta-modeling Techniques Meet Web Application Design Tools (LB, FG, LM, PP), pp. 294–307.
FoSSaCSFoSSaCS-2002-Srba #commutative
Note on the Tableau Technique for Commutative Transition Systems (JS), pp. 387–401.
SCAMSCAM-J-2001-BartoliniP02 #embedded #program transformation
A cache-aware program transformation technique suitable for embedded systems (SB, CAP), pp. 783–795.
ICSMEICSM-2002-MalishevskyRE #modelling #testing #trade-off
Modeling the Cost-Benefits Tradeoffs for Regression Testing Techniques (AGM, GR, SGE), pp. 204–213.
ICSMEICSM-2002-OrsoRH #java
A Technique for Dynamic Updating of Java Software (AO, AR, MJH), pp. 649–658.
IWPCIWPC-2002-Hamou-LhadjL #analysis #execution #scalability
Compression Techniques to Simplify the Analysis of Large Execution Traces (AHL, TCL), pp. 159–168.
SCAMSCAM-2002-BischofBLRV #matlab #source code
Combining Source Transformation and Operator Overloading Techniques to Compute Derivatives for MATLAB Programs (CHB, HMB, BL, AR, AV), pp. 65–72.
STOCSTOC-2002-Charikar #algorithm #estimation #similarity
Similarity estimation techniques from rounding algorithms (MC), pp. 380–388.
ICALPICALP-2002-Mannila #data mining #mining #problem
Local and Global Methods in Data Mining: Basic Techniques and Open Problems (HM), pp. 57–68.
FMFME-2002-Rusu #generative #testing #using #verification
Verification Using Test Generation Techniques (VR), pp. 252–271.
IFMIFM-2002-HoenickeO #process #specification
Combining Specification Techniques for Processes, Data and Time (JH, ERO), pp. 245–266.
CHICHI-2002-HinckleyCBM #analysis
Quantitative analysis of scrolling techniques (KH, EC, SB, TM), pp. 65–72.
VISSOFTVISSOFT-2002-RillingSB #analysis #complexity #concept #source code #visualisation
The CONCEPT Project — Applying Source Code Analysis to Reduce Information Complexity of Static and Dynamic Visualization Techniques (JR, AS, CB), p. 90.
ICEISICEIS-2002-SanchezSVACD #data mining #mining #using
Using Data Mining Techniques to Analyze Correspondences between Partitions (DS, JMS, MAVM, VA, JC, GD), pp. 179–186.
ICEISICEIS-2002-Sierra-AlonsoCMP #development #information management #process #requirements #web
Incorporating Knowledge Engineering Techniques to Requirements Capture in the MIDAS Web Applications Development Process (ASA, PC, EM, JEPM), pp. 782–787.
ICEISICEIS-2002-ViaeneBDVP #pattern matching #pattern recognition #proving #recognition #state of the art
Proof Running Two State-Of-The-Art Pattern Recognition Techniques in the Field of Direct Marketing (SV, BB, GD, JV, DVdP), pp. 446–454.
CIKMCIKM-2002-ChenGS #rank
I/O-efficient techniques for computing pagerank (YYC, QG, TS), pp. 549–557.
CIKMCIKM-2002-LiuH #classification #identification #music
A singer identification technique for content-based classification of MP3 music objects (CCL, CSH), pp. 438–445.
ICPRICPR-v1-2002-SuriWGSL #comparison #image #state of the art
A Comparison of State-of-the-Art Diffusion Imaging Techniques for Smoothing Medical/Non-Medical Image Data (JSS, DW, JG, SS, SL), p. 508–?.
ICPRICPR-v2-2002-AbabsaRMD #2d #3d #automation
2D/3D Automatic Matching Technique for 3D Recovering of Free Form Objects (FA, DR, MM, JYD), pp. 430–433.
ICPRICPR-v2-2002-Amin #learning #prototype #using
Prototyping Structural Description Using Decision Tree Learning Techniques (AA), pp. 76–79.
ICPRICPR-v2-2002-CesarBB #graph #optimisation #probability #recognition #using
Inexact Graph Matching Using Stochastic Optimization Techniques for Facial Feature Recognition (RMC, EB, IB), pp. 465–468.
ICPRICPR-v2-2002-FrantiVK #bound #clustering
Branch-and-Bound Technique for Solving Optimal Clustering (PF, OV, TK), pp. 232–235.
ICPRICPR-v2-2002-HowellB #interactive #visual notation
Active Vision Techniques for Visually Mediated Interaction (AJH, HB), pp. 296–299.
ICPRICPR-v2-2002-PolatYS #multi #using
Multiple Complex Object Tracking Using A Combined Technique (EP, MY, RS), pp. 717–720.
ICPRICPR-v2-2002-RiviereMMTPF #graph #learning #markov #random #relational #using
Relational Graph Labelling Using Learning Techniques and Markov Random Fields (DR, JFM, JMM, FT, DPO, VF), pp. 172–175.
ICPRICPR-v3-2002-BlosteinCZ #compilation #diagrams #recognition
Applying Compiler Techniques to Diagram Recognition (DB, JRC, RZ), pp. 123–126.
ICPRICPR-v3-2002-BrakensiekKR #adaptation #normalisation #online #recognition
Comparing Normalization and Adaptation Techniques for On-Line Handwriting Recognition (AB, AK, GR), pp. 73–76.
ICPRICPR-v3-2002-FengH #performance
Confidence Guided Progressive Search and Fast Match Techniques for High Performance Chinese/English OCR (ZDF, QH), pp. 89–92.
ICPRICPR-v3-2002-VuoriL #automation #clustering #comparison
A Comparison of Techniques for Automatic Clustering of Handwritten Characters (VV, JL), pp. 168–171.
KDDKDD-2002-ChungC #clustering #cvs #information retrieval #named
CVS: a Correlation-Verification based Smoothing technique on information retrieval and term clustering (CYC, BC), pp. 469–474.
KDDKDD-2002-VlachosDGKK #classification #reduction #visualisation
Non-linear dimensionality reduction techniques for classification and visualization (MV, CD, DG, GK, NK), pp. 645–651.
SEKESEKE-2002-AndaS #case study #modelling #towards
Towards an inspection technique for use case models (BA, DIKS), pp. 127–134.
SIGIRSIGIR-2002-McNameeM #query
Comparing cross-language query expansion techniques by degrading translation resources (PM, JM), pp. 159–166.
ECOOPECOOP-2002-ArnoldR #effectiveness
Thin Guards: A Simple and Effective Technique for Reducing the Penalty of Dynamic Class Loading (MA, BGR), pp. 498–524.
RERE-2002-FantechiGLM #analysis #case study
Application of Linguistic Techniques for Use Case Analysis (AF, SG, GL, AM), pp. 157–164.
RERE-2002-Hardiman #named #requirements
REDEST — 14 Best Practice SME Experiments with Innovative Requirements Gathering Techniques (SH), p. 191.
RERE-2002-LloydRA #distributed #effectiveness #elicitation #requirements
Effectiveness of Elicitation Techniques in Distributed Requirements Engineering (WJL, MBR, JDA), pp. 311–318.
ICSEICSE-2002-DunsmoreRW #development #evaluation #object-oriented
Further investigations into the development and evaluation of reading techniques for object-oriented code inspection (AD, MR, MW), pp. 47–57.
ICSEICSE-2002-HausmannHT #approach #case study #detection #functional #graph transformation #requirements #static analysis
Detection of conflicting functional requirements in a use case-driven approach: a static analysis technique based on graph transformation (JHH, RH, GT), pp. 105–115.
ICSEICSE-2002-KimP #testing
A history-based test prioritization technique for regression testing in resource constrained environments (JMK, AAP), pp. 119–129.
CCCC-2002-AgrawalLS #graph
Evaluating a Demand Driven Technique for Call Graph Construction (GA, JL, QS), pp. 29–45.
HPCAHPCA-2002-SkadronAS #locality #modelling
Control-Theoretic Techniques and Thermal-RC Modeling for Accurate and Localized Dynamic Thermal Management (KS, TFA, MRS), pp. 17–28.
HPDCHPDC-2002-CoreyJV #adaptation #architecture #empirical #grid #parametricity
Local Discovery of System Architecture — Application Parameter Sensitivity: An Empirical Technique for Adaptive Grid Applications (IC, JRJ, JSV), p. 399–?.
HPDCHPDC-2002-WeigleF #automation #comparison #distributed
A Comparison of TCP Automatic Tuning Techniques for Distributed Computing (EW, WcF), p. 265–?.
LCTESLCTES-SCOPES-2002-HunlethC #aspect-oriented #programming #using
Footprint and feature management using aspect-oriented programming techniques (FH, RC), pp. 38–45.
CAVCAV-2002-ClarkeGKS #abstraction #machine learning #satisfiability #using
SAT Based Abstraction-Refinement Using ILP and Machine Learning Techniques (EMC, AG, JHK, OS), pp. 265–279.
CSLCSL-2002-Kanovich
Bijections between Partitions by Two-Directional Rewriting Techniques (MIK), pp. 44–58.
WICSAWICSA-2001-Ommering #deployment #independence
Techniques for Independent Deployment to Build Product Populations (RCvO), p. 55–?.
ASEASE-2001-BiemanGA #java
A Technique for Mutation of Java Objects (JMB, SG, RTA), pp. 337–340.
DACDAC-2001-ChangWM #logic #using
Layout-Driven Hot-Carrier Degradation Minimization Using Logic Restructuring Techniques (CWJC, KW, MMS), pp. 97–102.
DACDAC-2001-GuptaSKDGN #design #synthesis
Speculation Techniques for High Level Synthesis of Control Intensive Designs (SG, NS, SK, NDD, RKG, AN), pp. 269–272.
DACDAC-2001-KimCL #estimation #logic
A Static Estimation Technique of Power Sensitivity in Logic Circuits (TK, KSC, CLL), pp. 215–219.
DACDAC-2001-KimJSLK #optimisation #using
Coupling Delay Optimization by Temporal Decorrelation using Dual Threshold Voltage Technique (KWK, SOJ, PS, CLL, SMK), pp. 732–737.
DACDAC-2001-MeguerdichianKMPP #design #named #optimisation
MetaCores: Design and Optimization Techniques (SM, FK, AM, DP, MP), pp. 585–590.
DACDAC-2001-Qu #component #detection
Publicly Detectable Techniques for the Protection of Virtual Components (GQ), pp. 474–479.
DACDAC-2001-RaahemifarA #detection #fault
Fault Characterizations and Design-for-Testability Technique for Detecting IDDQ Faults in CMOS/BiCMOS Circuits (KR, MA), pp. 313–316.
DATEDATE-2001-CheungWC #clustering #logic #using
Further improve circuit partitioning using GBAW logic perturbation techniques (CCC, YLW, DIC), pp. 233–239.
DATEDATE-2001-GianiSHA #performance
Efficient spectral techniques for sequential ATPG (AG, SS, MSH, VDA), pp. 204–208.
DATEDATE-2001-ShinKC #optimisation
An operation rearrangement technique for power optimization in VLIM instruction fetch (DS, JK, NC), p. 809.
DATEDATE-2001-VareaA #embedded #modelling #petri net #specification
Dual transitions petri net based modelling technique for embedded systems specification (MV, BMAH), pp. 566–571.
DocEngDocEng-2001-Papamarkos #documentation #fuzzy
A technique for fuzzy document binarization (NP), pp. 152–156.
ICDARICDAR-2001-BrakensiekKR #adaptation #online #recognition
Comparing Adaptation Techniques for On-Line Handwriting Recognition (AB, AK, GR), pp. 486–490.
ICDARICDAR-2001-ElgammalI01a #documentation #hybrid #identification #image
Techniques for Language Identification for Hybrid Arabic-English Document Images (AME, MAI), pp. 1100–1104.
ICDARICDAR-2001-GatosP #image #performance #segmentation #set
Applying Fast Segmentation Techniques at a Binary Image Represented by a Set of Non-Overlapping Blocks (BG, NP), pp. 1147–1153.
ICDARICDAR-2001-KimSJL #clustering #segmentation #word
Word Segmentation in Handwritten Korean Text Lines Based on Gap Clustering Techniques (SHK, CYS, SJ, GL), pp. 189–193.
ICDARICDAR-2001-SrihariCL #pattern matching #pattern recognition #recognition #using
Establishing Handwriting Individuality Using Pattern Recognition Techniques (SNS, SHC, SL), p. 1195–?.
VLDBVLDB-2001-BerckenS #evaluation
An Evaluation of Generic Bulk Loading Techniques (JVdB, BS), pp. 461–470.
VLDBVLDB-2001-BohmMSW #evaluation #performance #query #similarity
Fast Evaluation Techniques for Complex Similarity Queries (KB, MM, HJS, RW), pp. 211–220.
ITiCSEITiCSE-2001-Xizhe #configuration management #evaluation
Evaluation technique of software configuration management (JX), p. 186.
TACASTACAS-2001-Carvajal-SchiaffinoDC #bound #petri net #validation
Combining Structural and Enumerative Techniques for the Validation of Bounded Petri Nets (RCS, GD, GC), pp. 435–449.
TACASTACAS-2001-TiwariRSS #generative #invariant
A Technique for Invariant Generation (AT, HR, HS, NS), pp. 113–127.
ICSMEICSM-2001-AtkinsonG #analysis #data flow #implementation #performance #scalability #source code
Implementation Techniques for Efficient Data-Flow Analysis of Large Programs (DCA, WGG), pp. 52–61.
ICSMEICSM-2001-DeanCSM #design #legacy #using
Using Design Recovery Techniques to Transform Legacy Systems (TRD, JRC, KAS, AJM), pp. 622–631.
IWPCIWPC-2001-FoxDHH #comprehension
Backward Conditioning: A New Program Specialisation Technique and Its Application to Program Comprehension (CF, SD, MH, RMH), pp. 89–97.
SCAMSCAM-2001-BartoliniP #embedded #performance
An Object Level Transformation Technique to Improve the Performance of Embedded Applications (SB, CAP), pp. 26–34.
SASSAS-2001-MesnardN #logic programming #source code #static analysis #termination
Applying Static Analysis Techniques for Inferring Termination Conditions of Logic Programs (FM, UN), pp. 93–110.
CIAACIAA-2001-KatritzkeMT #automaton #clustering #finite #image #using
Enhancements of Partitioning Techniques for Image Compression Using Weighted Finite Automata (FK, WM, MT), pp. 177–189.
ICALPICALP-2001-FeigeL #source code
The RPR2 Rounding Technique for Semidefinite Programs (UF, ML), pp. 213–224.
FMFME-2001-LaurentMW #simulation #using #verification
Using Formal Verification Techniques to Reduce Simulation and Test Effort (OL, PM, VW), pp. 465–477.
ICFPICFP-2001-Hinze #implementation
A Simple Implementation Technique for Priority Search Queues (RH), pp. 110–121.
CHICHI-2001-Muller #analysis
Layered participatory analysis: new developments in the CARD technique (MJM), pp. 90–97.
CAiSECAiSE-2001-BielkowiczT #comparison #evaluation #process #specification
A Comparison and Evaluation of Data Requirement Specification Techniques in SSADM and the Unified Process (PB, TTT), pp. 46–59.
CAiSECAiSE-2001-WieringaJ #design #tool support
Techniques for Reactive System Design: The Tools in TRADE (RW, DNJ), pp. 93–107.
ICEISICEIS-v1-2001-DiazTO #machine learning #using
A Knowledge-Acquisition Methodology for a Blast Furnace Expert System Using Machine Learning Techniques (ED, JT, FO), pp. 336–339.
ICEISICEIS-v1-2001-RossiterNH #modelling #semistructured data
A Universal Technique for Relating Heterogeneous Data Models (BNR, DAN, MAH), pp. 96–103.
CIKMCIKM-2001-TsikrikaL #data fusion #web
Merging Techniques for Performing Data Fusion on the Web (TT, ML), pp. 127–134.
ICMLICML-2001-PapagelisK #using
Breeding Decision Trees Using Evolutionary Techniques (AP, DK), pp. 393–400.
ICMLICML-2001-Thollard #algorithm #grammar inference #probability
Improving Probabilistic Grammatical Inference Core Algorithms with Post-processing Techniques (FT), pp. 561–568.
KDDKDD-2001-HueglinV #data mining #mining
Data mining techniques to improve forecast accuracy in airline business (CH, FV), pp. 438–442.
SEKESEKE-2001-BastarrioaCDS #component #deployment #optimisation
Two Optimization Techniques for Component-Based Systems Deployment (MCB, REC, SAD, AAS), pp. 153–162.
SEKESEKE-2001-FillottraniEK #logic programming #modelling #object-oriented #uml
Applying Logic Programming Techniques to Object-Oriented Modeling in UML (PRF, EE, SK), pp. 228–235.
SEKESEKE-2001-Perez-MartinezS #case study #information management #requirements
Application of Knowledge Acquisition Techniques to Requirements Capture: A Case Study (JEPM, ASA), pp. 53–60.
SEKESEKE-2001-Vegas #question #testing #what
What Information is Relevant when Selecting Testing Techniques? (SV), pp. 45–52.
SIGIRSIGIR-2001-Lam-AdesinaJ #feedback #summary
Applying Summarization Techniques for Term Selection in Relevance Feedback (AMLA, GJFJ), pp. 1–9.
TOOLSTOOLS-USA-2001-GanesanS #component #design #named
O2BC: A Technique for the Design of Component-Based Applications (RG, SS), pp. 46–55.
LOPSTRLOPSTR-2001-PotikasRG #datalog #nondeterminism #source code
A Transformation Technique for Datalog Programs Based on Non-deterministic Constructs (PP, PR, MG), pp. 25–45.
PADLPADL-2001-GuptaT #generative #logic programming #web
Logic Programming Techniques for Dynamic VRML Web Content Generation (AG, PT), pp. 93–107.
POPLPOPL-2001-Kandemir #compilation #locality
A compiler technique for improving whole-program locality (MTK), pp. 179–192.
SACSAC-2001-LarocheBS #composition #markov #process
A new decomposition technique for solving Markov decision processes (PL, YB, RS), pp. 12–16.
SACSAC-2001-VasilakosAP #network
Application of computational intelligence techniques in active networks (AVV, KGA, WP), pp. 448–455.
ICSEICSE-2001-ButlerBCE #generative #product line
Generative Techniques for Product Lines (GB, DSB, KC, UWE), pp. 760–761.
ICSEICSE-2001-ShullRB #using
Improving Software Inspections by Using Reading Techniques (FS, IR, VRB), pp. 726–727.
CCCC-2001-KandemirU #array #locality #optimisation #unification
Array Unification: A Locality Optimization Technique (MTK), pp. 259–273.
HPDCHPDC-2001-DramlitschAS #distributed #performance
Efficient Techniques for Distributed Computing (TD, GA, ES), pp. 435–436.
LCTESLCTES-OM-2001-KangCS #design #distributed #power management #realtime #synthesis
Power-Aware Design Synthesis Techniques for Distributed Real-Time Systems (DIK, SPC, JS), pp. 20–28.
LCTESLCTES-OM-2001-KimH #embedded #hybrid #power management #realtime #runtime #scalability
Hybrid Run-time Power Management Technique for Real-time Embedded System with Voltage Scalable Processor (MK, SH), pp. 11–19.
IJCARIJCAR-2001-GiunchigliaMTZ #heuristic #optimisation #satisfiability
Evaluating Search Heuristics and Optimization Techniques in Propositional Satisfiability (EG, MM, AT, DZ), pp. 347–363.
IJCARIJCAR-2001-Middeldorp #approximate #automaton #dependence #graph #using
Approximating Dependency Graphs Using Tree Automata Techniques (AM), pp. 593–610.
IJCARIJCAR-2001-NieuwenhuisHRV #evaluation #on the #proving #theorem proving
On the Evaluation of Indexing Techniques for Theorem Proving (RN, TH, AR, AV), pp. 257–271.
ASEASE-2000-Monroy #abduction #recursion
The Use of Abduction and Recursion-Editor Techniques for the Correction of Faulty Conjectures (RM), pp. 91–100.
DACDAC-2000-HuangC #composition #constraints
Assertion checking by combined word-level ATPG and modular arithmetic constraint-solving techniques (CYH, KTC), pp. 118–123.
DACDAC-2000-KirovskiLWP #forensics #tool support
Forensic engineering techniques for VLSI CAD tools (DK, DTL, JLW, MP), pp. 581–586.
DACDAC-2000-UmKL #fine-grained #optimisation #power management #synthesis
A fine-grained arithmetic optimization technique for high-performance/low-power data path synthesis (JU, TK, CLL), pp. 98–103.
DATEDATE-2000-AnghelN #detection #evaluation #fault #reduction
Cost Reduction and Evaluation of a Temporary Faults Detecting Technique (LA, MN), pp. 591–598.
DATEDATE-2000-GanesanV00a #clustering #configuration management #design #latency
An Integrated Temporal Partitioning and Partial Reconfiguration Technique for Design Latency Improvement (SG, RV), pp. 320–325.
DATEDATE-2000-HiroseY #reduction
A Bus Delay Reduction Technique Considering Crosstalk (KH, HY), pp. 441–445.
DATEDATE-2000-IshiharaY #embedded #reduction
A Power Reduction Technique with Object Code Merging for Application Specific Embedded Processors (TI, HY), pp. 617–623.
DATEDATE-2000-KimLS #embedded #optimisation
Free MDD-Based Software Optimization Techniques for Embedded Systems (CK, LL, ALSV), pp. 14–18.
DATEDATE-2000-LajoloRDL #design #performance
Efficient Power Co-Estimation Techniques for System-on-Chip Design (ML, AR, SD, LL), pp. 27–34.
DATEDATE-2000-LyseckyVG #latency
Techniques for Reducing Read Latency of Core Bus Wrappers (RLL, FV, TG), pp. 84–91.
DATEDATE-2000-ManquinhoS #algorithm #on the #satisfiability #using
On Using Satisfiability-Based Pruning Techniques in Covering Algorithms (VMM, JPMS), pp. 356–363.
SIGMODSIGMOD-2000-ChangBCLLS #linear #optimisation #query
The Onion Technique: Indexing for Linear Optimization Queries (YCC, LDB, VC, CSL, MLL, JRS), pp. 391–402.
SIGMODSIGMOD-2000-OhHP #database #effectiveness #performance #scalability #video
Efficient and Cost-effective Techniques for Browsing and Indexing Large Video Databases (JHO, KAH), pp. 415–426.
VLDBVLDB-2000-ChristopheBPV #database #named #scalability
PicoDMBS: Scaling Down Database Techniques for the Smartcard (CB, LB, PP, PV), pp. 11–20.
TACASTACAS-2000-BodeveixF #infinity #named #validation
FMona: A Tool for Expressing Validation Techniques over Infinite State Systems (JPB, MF), pp. 204–219.
WCREWCRE-J-1997-GirardK00 #comparison #data type
A comparison of abstract data types and objects recovery techniques (JFG, RK), pp. 149–181.
CSMRCSMR-2000-SartipiKM #architecture #data mining #design #mining #using
Architectural Design Recovery using Data Mining Techniques (KS, KK, FM), pp. 129–140.
ICSMEICSM-2000-WuPC #component #evolution #maintenance
Techniques of Maintaining Evolving Component-based Software (YW, DP, MHC), pp. 236–246.
IWPCIWPC-2000-KoschkeE #clustering #evaluation #framework
A Framework for Experimental Evaluation of Clustering Techniques (RK, TE), pp. 201–210.
IWPCIWPC-2000-RifkinD #case study #comprehension
Program Comprehension Techniques Improve Software Inspections: A Case Study (SR, LED), pp. 131–138.
CHICHI-2000-PoupyrevWF #3d
Non-isomorphic 3D rotational techniques (IP, SW, SF), pp. 540–547.
ICEISICEIS-2000-HeathC #communication #mobile #multi
Application of a Virtual Connection Tree over Multiple Access Techniques for 3G Mobile Communication Systems (AH, RAC), pp. 531–532.
ICEISICEIS-2000-OommenR #comparison #empirical #optimisation #query
An Empirical Comparison of Histogram-Like Techniques for Query Optimization (BJO, LR), pp. 71–78.
CIKMCIKM-2000-KimL #clustering #documentation #information management
A Semi-Supervised Document Clustering Technique for Information Organization (HjK, SgL), pp. 30–37.
ICMLICML-2000-CampbellTB #network #polynomial #reduction
Dimension Reduction Techniques for Training Polynomial Networks (WMC, KT, SVB), pp. 119–126.
ICMLICML-2000-LaneB #interface #learning #reduction
Data Reduction Techniques for Instance-Based Learning from Human/Computer Interface Data (TL, CEB), pp. 519–526.
ICPRICPR-v1-2000-BaillardHB #3d #segmentation #set
Cooperation between Level Set Techniques and Dense 3D Registration for the Segmentation of Brain Structures (CB, PH, CB), pp. 1991–1994.
ICPRICPR-v1-2000-ChabbiP #image
A Generic Relaxation Technique for Hierarchic Stereo Chain Matching of Uncalibrated Images (HC, SP), pp. 1746–1749.
ICPRICPR-v1-2000-StevensB #comparison #image #refinement
Image Comparison Techniques in the Context of Scene Refinement (MRS, JRB), pp. 1685–1688.
ICPRICPR-v2-2000-BollePR #authentication #evaluation
Evaluation Techniques for Biometrics-Based Authentication Systems (FRR) (RMB, SP, NKR), pp. 2831–2837.
ICPRICPR-v2-2000-HuangHS #automation #recognition
A New Automatic Quasar Recognition Technique Based on PCA and the Hough Transform (LyH, ZH, FS), pp. 2499–2502.
ICPRICPR-v2-2000-JuanV #classification #edit distance #normalisation #on the #performance #string
On the Use of Normalized Edit Distances and an Efficient k-NN Search Technique (k-AESA) for Fast and Accurate String Classification (AJ, EV), pp. 2676–2679.
ICPRICPR-v2-2000-Scheunders #image #multi #using
Multispectral Image Fusion Using Local Mapping Techniques (PS), pp. 2311–2314.
ICPRICPR-v3-2000-GreenbergAKD #image #using
Fingerprint Image Enhancement Using Filtering Techniques (SG, MA, DK, ID), pp. 3326–3329.
ICPRICPR-v3-2000-Manduchi #clustering #segmentation
A Cluster Grouping Technique for Texture Segmentation (RM), pp. 7072–7075.
ICPRICPR-v3-2000-Papamarkos #network #reduction #using
Using Local Features in a Neural Network Based Gray-Level Reduction Technique (NP), pp. 7037–7040.
ICPRICPR-v3-2000-TomazevicLP #comparison
A Comparison of Retrospective Shading Correction Techniques (DT, BL, FP), pp. 3568–3571.
ICPRICPR-v3-2000-WerthS #bidirectional #correlation #framework #novel #refinement
A Novel Bidirectional Framework for Control and Refinement of Area Based Correlation Techniques (PW, SS), pp. 3738–3741.
ICPRICPR-v4-2000-BrakensiekWR #documentation #hybrid #modelling #n-gram #recognition
Improved Degraded Document Recognition with Hybrid Modeling Techniques and Character N-Grams (AB, DW, GR), pp. 4438–4441.
ICPRICPR-v4-2000-ChetverikovNV #comparison
Comparison of Tracking Techniques Applied to Digital PIV (DC, MN, JV), pp. 4619–4622.
ICPRICPR-v4-2000-DoermannM #evaluation #performance #tool support #video
Tools and Techniques for Video Performance Evaluation (DSD, DM), pp. 4167–4170.
ICPRICPR-v4-2000-Hata #visual notation
Practical Visual Inspection Techniques — Optics, Micro-Electronics and Advanced Software Technology (SH), pp. 4114–4117.
ICPRICPR-v4-2000-ShihWL
A Calibration-Free Gaze Tracking Technique (SWS, YTW, JL), pp. 4201–4204.
KDDKDD-2000-DhondGV #data mining #mining #optimisation
Data mining techniques for optimizing inventories for electronic commerce (AD, AG, SV), pp. 480–486.
KDDKDD-2000-TalbertF #analysis #empirical
An empirical analysis of techniques for constructing and searching k-dimensional trees (DAT, DHF), pp. 26–33.
ECOOPECOOP-2000-EckelG #empirical #optimisation
Empirical Study of Object-Layout Strategies and Optimization Techniques (NE, JYG), pp. 394–421.
OOPSLAOOPSLA-2000-IshizakiKYKN #case study #compilation #java
A study of devirtualization techniques for a JavaTM Just-In-Time compiler (KI, MK, TY, HK, TN), pp. 294–310.
TOOLSTOOLS-EUROPE-2000-Meyer00a #functional #programming
Programming with Agents: Combining O-O and Functional Techniques (BM), p. 460.
TOOLSTOOLS-USA-2000-Anton #agile #development #effectiveness #object-oriented
Effective Strategies and Techniques for Rapid Object-Oriented Application Development (MA), pp. 407–408.
TOOLSTOOLS-USA-2000-Potter
Object Structuring Techniques (JP), pp. 443–444.
LOPSTRLOPSTR-J-2000-ColvinHS #composition #logic programming #refinement
A Technique for Modular Logic Program Refinement (RC, IJH, PAS), pp. 38–56.
PPDPPPDP-2000-BagnaraZH #analysis #evaluation
Enhanced sharing analysis techniques: a comprehensive evaluation (RB, EZ, PMH), pp. 103–114.
REICRE-2000-Saeki #aspect-oriented #case study #reuse
Patterns and Aspects for Use Cases: Reuse Techniques for Use Case Descriptions (MS), p. 62.
SACSAC-2000-Caraca-ValenteLM #modelling
Functions, Rules and Models: Three Complementary Techniques for Analyzing Strength Data (JPCV, ILC, CM), pp. 60–64.
ICSEICSE-2000-BasiliLSR #tutorial #using
Improving software inspections by using reading techniques (tutorial session) (VRB, OL, FS, IR), p. 836.
ICSEICSE-2000-BriandLW #assessment #comparison #cost analysis #modelling
A replicated assessment and comparison of common software cost modeling techniques (LCB, TL, IW), pp. 377–386.
ICSEICSE-2000-DangK #approximate #infinity #model checking #realtime
Three approximation techniques for ASTRAL symbolic model checking of infinite state real-time systems (ZD, RAK), pp. 345–354.
ICSEICSE-2000-KeidarKLS #incremental #proving #simulation
An inheritance-based technique for building simulation proofs incrementally (IK, RK, NAL, AAS), pp. 478–487.
CCCC-2000-UhWWJBC #effectiveness
Techniques for Effectively Exploiting a Zero Overhead Loop Buffer (GRU, YW, DBW, SJ, CB, VC), pp. 157–172.
CCCC-2000-YuR #parallel #runtime
Techniques for Reducing the Overhead of Run-Time Parallelization (HY, LR), pp. 232–248.
HPCAHPCA-2000-KarlssonDS #data type #linked data #open data
A Prefetching Technique for Irregular Accesses to Linked Data Structures (MK, FD, PS), pp. 206–217.
HPCAHPCA-2000-NeefsVB #latency #multi
A Technique for High Bandwidth and Deterministic Low Latency Load/Store Accesses to Multiple Cache Banks (HN, HV, KDB), pp. 313–324.
HPDCHPDC-2000-KurmannMRS #communication #performance
Speculative Defragmentation — A Technique to Improve the Communication Software Efficiency for Gigabit Ethernet (CK, MM, FR, TS), pp. 131–138.
CADECADE-2000-AudemardBH #finite
Two Techniques to Improve Finite Model Search (GA, BB, LH), pp. 302–308.
CAVCAV-2000-AnnichiniAB #parametricity #reasoning
Symbolic Techniques for Parametric Reasoning about Counter and Clock Systems (AA, EA, AB), pp. 419–434.
RTARTA-2000-ContejeanCM #physics
Rewriting Techniques in Theoretical Physics (EC, AC, BM), pp. 80–94.
ICTSSTestCom-2000-AmyotL
Structural Coverage For LOTOS — a Probe Insertion Technique (DA, LL), pp. 19–34.
ICTSSTestCom-2000-RyuKKS #design #generative #testing #using
Interoperability Test Suite Generation for the TCP Data Part Using Experimental Design Techniques (JR, MK, SK, SS), pp. 127–142.
ASEASE-1999-BesseCL #automation #generative #protocol #testing
An Automatic and Optimized Test Generation Technique Applying to TCP/IP Protocol (CB, ARC, DL), pp. 73–80.
ASEASE-1999-MiceliSG #design #detection #metric
A Metric Based Technique for Design Flaws Detection and Correction (TM, HAS, RG), pp. 307–310.
ASEASE-1999-Pecheur #clustering #file system #modelling #verification
Advanced Modelling and Verification Techniques Applied to a Cluster File System (CP), pp. 119–126.
DACDAC-1999-CaldwellCKMPQW #design #effectiveness
Effective Iterative Techniques for Fingerprinting Design IP (AEC, HJC, ABK, SM, MP, GQ, JLW), pp. 843–848.
DACDAC-1999-GunupudiN #using
Model-Reduction of Nonlinear Circuits Using Krylov-Space Techniques (PKG, MSN), pp. 13–16.
DACDAC-1999-HashimotoOT #design #power management #reduction
A Practical Gate Resizing Technique Considering Glitch Reduction for Low Power Design (MH, HO, KT), pp. 446–451.
DACDAC-1999-HongP #behaviour #synthesis
Behavioral Synthesis Techniques for Intellectual Property Protection (IH, MP), pp. 849–854.
DACDAC-1999-LakshminarayanaRKJD #optimisation #performance
Common-Case Computation: A High-Level Technique for Power and Performance Optimization (GL, AR, KSK, NKJ, SD), pp. 56–61.
DACDAC-1999-MukherjeeSML #layout #novel #synthesis
Wave Steering in YADDs: A Novel Non-Iterative Synthesis and Layout Technique (AM, RS, MMS, SIL), pp. 466–471.
DACDAC-1999-Oliveira #design #robust
Robust Techniques for Watermarking Sequential Circuit Designs (ALO), pp. 837–842.
DACDAC-1999-QuWP #problem
Optimization-Intensive Watermarking Techniques for Decision Problems (GQ, JLW, MP), pp. 33–36.
DACDAC-1999-SantosJ #order #performance
A Reordering Technique for Efficient Code Motion (LCVdS, JAGJ), pp. 296–299.
DACDAC-1999-YehKSW #design #layout
Layout Techniques Supporting the Use of Dual Supply Voltages for Cell-based Designs (CWY, YSK, SJS, JSW), pp. 62–67.
DATEDATE-1999-CostaSC #modelling #performance
Efficient Techniques for Accurate Extraction and Modeling of Substrate Coupling in Mixed-Signal IC’s (JPC, LMS, MC), pp. 396–400.
DATEDATE-1999-DabrowskiP #case study #experience #modelling
Experiences with Modeling of Analog and Mixed A/D Systems Based on PWL Technique (JD, AP), pp. 790–791.
DATEDATE-1999-FeldmanKL #modelling #performance
Efficient Techniques for Modeling Chip-Level Interconnect, Substrate and Package Parasitics (PF, SK, DEL), pp. 418–417.
DATEDATE-1999-MaurerS #performance #simulation
Software Bit-Slicing: A Technique for Improving Simulation Performance (PMM, WJS), pp. 786–787.
DATEDATE-1999-MillanEECC #logic #optimisation
Integrating Symbolic Techniques in ATPG-Based Sequential Logic Optimization (ESM, LE, JAE, SC, FC), pp. 516–520.
DATEDATE-1999-StrehlT #diagrams #model checking #petri net
Interval Diagram Techniques for Symbolic Model Checking of Petri Nets (KS, LT), pp. 756–757.
ICDARICDAR-1999-BrakensiekKWWR #evaluation #hybrid #modelling #online #performance #recognition #using
Performance Evaluation of a New Hybrid Modeling Technique for Handwriting Recognition using On-Line and Off-Line Data (AB, AK, DW, WW, GR), pp. 446–449.
ICDARICDAR-1999-FukudaSTXS #analysis
A Technique of Mathematical Expression Structure Analysis for the Handwriting Input System (RF, IS, FT, MX, MS), pp. 131–134.
ICDARICDAR-1999-LehalD #detection #documentation
A Range Free Skew Detection Technique for Digitized Gurmukhi Script Documents (GSL, RD), pp. 147–152.
ICDARICDAR-1999-MaY #documentation #estimation #image
An Enhanced Skew Angle Estimation Technique for Binary Document Images (HM, ZY), pp. 165–168.
SIGMODSIGMOD-1999-MankuRL #dataset #online #order #performance #random #scalability #statistics
Random Sampling Techniques for Space Efficient Online Computation of Order Statistics of Large Datasets (GSM, SR, BGL), pp. 251–262.
SIGMODSIGMOD-1999-MaratheS #array #query
Query Processing Techniques for Arrays (APM, KS), pp. 323–334.
VLDBVLDB-1999-ChengGKLLQS #database #implementation #optimisation #query #semantics
Implementation of Two Semantic Query Optimization Techniques in DB2 Universal Database (QC, JG, FK, TYCL, LL, XQ, KBS), pp. 687–698.
TACASTACAS-1999-BuchholzK #analysis #composition #distributed #tool support
Modular State Level Analysis of Distributed Systems Techniques and Tool Support (PB, PK), pp. 420–434.
TACASTACAS-1999-Hirschkoff #bisimulation #on the #using #verification
On the Benefits of Using the Up-To Techniques for Bisimulation Verification (DH), pp. 285–299.
TACASTACAS-1999-MarchignoliM #analysis #automation #composition #encryption #protocol #verification
Automatic Verification of Cryptographic Protocols through Compositional Analysis Techniques (DM, FM), pp. 148–162.
CSMRCSMR-1999-GranjaJ #testing
Techniques for Regression Testing: Selecting Test Case Sets Tailored to Possibly Modified Functionalities (IG, MJ), pp. 2–13.
IWPCIWPC-1999-PatenaudeMDL #assessment #java #quality
Extending Software Quality Assessment Techniques to Java Systems (JFP, EM, MD, BL), pp. 49–56.
PASTEPASTE-1999-LiangH #analysis #data flow #equivalence #performance #pointer
Equivalence Analysis: A General Technique to Improve the Efficiency of Data-flow Analyses in the Presence of Pointers (DL, MJH), pp. 39–46.
PASTEPASTE-1999-NaumovichCC #analysis #data flow #partial order #performance #using #verification
Using Partial Order Techniques to Improve Performance of Data Flow Analysis Based Verification (GN, LAC, JMC), pp. 57–65.
WCREWCRE-1999-GannodC #design #framework #reverse engineering
A Framework for Classifying and Comparing Software Reverse Engineering and Design Recovery Techniques (GCG, BHCC), pp. 77–88.
PLDIPLDI-1999-SongL #locality
New Tiling Techniques to Improve Cache Temporal Locality (YS, ZL), pp. 215–228.
SASSAS-1999-Soffa #analysis #data flow #named #precise #scalability #tutorial
Tutorial: Techniques to Improve the Scalability and Precision of Data Flow Analysis (MLS), pp. 355–356.
FLOPSFLOPS-1999-Kuhnemann #comparison #deforestation #functional #source code #transducer
Comparison of Deforestation Techniques for Functional Programs and for Tree Transducers (AK), pp. 114–130.
ICALPICALP-1999-ComptonD #encryption #protocol #proving
Proof Techniques for Cryptographic Protocols (KJC, SD), pp. 25–39.
ICALPICALP-1999-GrossiI #data type #linked data #maintenance #multi #open data #performance
Efficient Techniques for Maintaining Multidimensional Keys in Linked Data Structures (RG, GFI), pp. 372–381.
ICALPICALP-1999-KirstenM #problem
Two Techniques in the Area of the Star Problem (DK, JM), pp. 483–492.
FMFM-v2-1999-KnightFH #tool support
Tool Support for Production Use of Formal Techniques (JCK, PTF, BRH), p. 1854.
FMFM-v2-1999-LeavensB #specification
Enhancing the Pre- and Postcondition Technique for More Expressive Specifications (GTL, ALB), pp. 1087–1106.
FMFM-v2-1999-Nakajima #algebra #development #framework #object-oriented #specification #using
Using Algebraic Specification Techniques in Development of Object-Oriented Frameworks (SN), pp. 1664–1683.
FMFM-v2-1999-RandimbivololonaSBPRS #approach #proving
Applying Formal Proof Techniques to Avionics Software: A Pragmatic Approach (FR, JS, PB, AP, JR, DS), pp. 1798–1815.
FMFM-v2-1999-SchatzH
Integrating Formal Description Techniques (BS, FH), pp. 1206–1225.
IFMIFM-1999-Deiss #approach
An Approach to the Combination of Formal Description Techniques: Statecharts and TLA (TD), pp. 231–250.
ICFPICFP-1999-Crary #parametricity #proving
A Simple Proof Technique for Certain Parametricity Results (KC), pp. 82–89.
ICFPICFP-1999-ZdancewicGM #programming language #proving
Principals in Programming Languages: A Syntactic Proof Technique (SZ, DG, JGM), pp. 197–207.
CHICHI-1999-SalzmanDL #multi #visualisation
VR’s Frames of Reference: A Visualization Technique for Mastering Abstract Multidimensional Information (MCS, CJD, RBL), pp. 489–495.
HCIHCI-CCAD-1999-OshibaT #3d #modelling
Three-dimensional modeling environment “claymore” based on augmented direct manipulation technique (TO, JT), pp. 1075–1079.
HCIHCI-CCAD-1999-YuCK #approximate #multi #using
Dynamic event filtering technique using multi-level path approximation in a shared virtual environment (SJY, YCC, KK), pp. 583–587.
HCIHCI-EI-1999-HertzumJ
The Evaluator Effect during First-Time Use of the Cognitive Walkthrough Technique (MH, NEJ), pp. 1063–1067.
HCIHCI-EI-1999-SakaiN #automation #documentation #image #mobile
OCR-Oriented Automatic Document Orientation Correcting Technique for Mobile Image Scanners (KS, TN), pp. 223–227.
HCIHCI-EI-1999-Schreiber-Ehle #adaptation #component #user interface
Adaptable GUIs Based on the Componentware Technique (SSE), pp. 636–640.
CAiSECAiSE-1999-RalyteRP
Method Enhancement with Scenario Based Techniques (JR, CR, VP), pp. 103–118.
CAiSECAiSE-1999-SadiqO #graph #identification #modelling #process #reduction
Applying Graph Reduction Techniques for Identifying Structural Conflicts in Process Models (WS, MEO), pp. 195–209.
ICEISICEIS-1999-FerreiraMS #interactive #visualisation
Supporting Decisions Concerning Location-Routing of Obnoxious Facilities: An Application Example of Visualization and Interaction Techniques (CF, ABdM, BSS), pp. 74–81.
CIKMCIKM-1999-GhandeharizadehK #comparison #multi
A Comparison of Alternative Continuous Display Techniques with Heterogeneous Multi-Zone Disks (SG, SHK), pp. 442–449.
CIKMCIKM-1999-HuLL #clustering #scheduling
Indexing Techniques for Wireless Data Broadcast Under Data Clustering and Scheduling (QH, WCL, DLL), pp. 351–358.
CIKMCIKM-1999-Scoggins
A Practitioners’ View of Techniques Used in Data Warehousing for Sifting Through Data to Provide Information (JTS), pp. 3–4.
ICMLICML-1999-ZhengWT #lazy evaluation #learning #naive bayes
Lazy Bayesian Rules: A Lazy Semi-Naive Bayesian Learning Technique Competitive to Boosting Decision Trees (ZZ, GIW, KMT), pp. 493–502.
KDDKDD-1999-Cerquides #induction
Applying General Bayesian Techniques to Improve TAN Induction (JC), pp. 292–296.
KDDKDD-1999-ManiDBD #data mining #mining #modelling #statistics
Statistics and Data Mining Techniques for Lifetime Value Modeling (DRM, JD, AB, PD), pp. 94–103.
KDDKDD-T-1999-KeimH #clustering #scalability #set
Clustering Techniques for Large Data Sets — from the Past to the Future (DAK, AH), pp. 141–181.
MLDMMLDM-1999-AltamuraELM #documentation #learning
Symbolic Learning Techniques in Paper Document Processing (OA, FE, FAL, DM), pp. 159–173.
OOPSLAOOPSLA-1999-TravassosSFB #design #detection #fault #object-oriented #quality #using
Detecting Defects in Object-Oriented Designs: Using Reading Techniques to Increase Software Quality (GT, FS, MF, VRB), pp. 47–56.
TOOLSTOOLS-ASIA-1999-LiXXZ
Strategies and Techniques of Freeze/Melt (YL, YX, GX, ZZ), pp. 98–107.
TOOLSTOOLS-ASIA-1999-Zhou #analysis #assessment #object-oriented #using
Risk Analysis and Assessment Using Object-Oriented Techniques (BZ), pp. 142–145.
TOOLSTOOLS-EUROPE-1999-Edwards #java #programming #using #visual notation
Visual Programming: Tips and Techniques 3/4 Using VisualAge for Java (SE), p. 413.
TOOLSTOOLS-EUROPE-1999-Taentzer #modelling #object-oriented #visual notation
Adding Visual Rules to Object-Oriented Modeling Techniques (GT), pp. 275–284.
TOOLSTOOLS-PACIFIC-1999-FavreC #algebra #specification #uml
Integrating UML and Algebraic Specification Techniques (LF, SC), pp. 151–162.
TOOLSTOOLS-USA-1999-AlexanderO #analysis #polymorphism #testing
Analysis Techniques for Testing Polymorphic Relationships (RTA, AJO), p. 104–?.
TOOLSTOOLS-USA-1999-Anton #agile #development #effectiveness #object-oriented
Effective Strategies and Techniques for Rapid Object-Oriented Application Development (MPA), pp. 505–517.
TOOLSTOOLS-USA-1999-Parnas99a
Systematic Techniques for Inspecting Critical Software (DLP), p. 410.
TOOLSTOOLS-USA-1999-PeriyasamyAM #object-oriented #validation #verification
Verification and Validation Techniques of Object-Oriented Software Systems (KP, VSA, DM), p. 413–?.
SACSAC-1999-SonahI #adaptation #evaluation #performance
Performance Evaluation of New Adaptive Object Replacement Techniques for VOD Systems (BS, MRI), pp. 437–442.
SACSAC-1999-Taylor #finite #induction #pattern matching #using
Exon/Intron Discrimination Using the Finite Induction Pattern Matching Technique (PAT), pp. 41–45.
ICSEICSE-1999-BriandESWM #assessment #comparison #estimation #modelling
An Assessment and Comparison of Common Software Cost Estimation Modeling Techniques (LCB, KEE, DS, IW, KM), pp. 313–322.
ICSEICSE-1999-Leinbach #agile #internet #using
Successfully Deliver Internet Applications Using Rapid Software Techniques (CL), pp. 624–625.
CCCC-1999-RubinBR #data type #recursion
Virtual Cache Line: A New Technique to Improve Cache Exploitation for Recursive Data Structures (SR, DB, MR), pp. 259–273.
HPDCHPDC-1999-KangGGH #automation #design #distributed #realtime
Techniques for Automating Distributed Real-Time Applications Design (DIK, RG, LG, JKH), pp. 156–163.
CSLCSL-1999-ArtsG #erlang #process #verification
Applying Rewriting Techniques to the Verification of Erlang Processes (TA, JG), pp. 96–110.
LICSLICS-1999-BorealeNP #encryption #process #proving
Proof Techniques for Cryptographic Processes (MB, RDN, RP), pp. 157–166.
ASEASE-1998-MaoSL #case study #machine learning #reuse #using #verification
Reusability Hypothesis Verification using Machine Learning Techniques: A Case Study (YM, HAS, HL), pp. 84–93.
DACDAC-1998-ChenOIB #analysis #architecture #validation
Validation of an Architectural Level Power Analysis Technique (RYC, RMO, MJI, RSB), pp. 242–245.
DACDAC-1998-ChenR #megamodelling
A Power Macromodeling Technique Based on Power Sensitivity (ZC, KR), pp. 678–683.
DACDAC-1998-El-MalehKR #learning #performance
A Fast Sequential Learning Technique for Real Circuits with Application to Enhancing ATPG Performance (AHEM, MK, JR), pp. 625–631.
DACDAC-1998-GhoshDJ #low cost #performance #testing
A Fast and Low Cost Testing Technique for Core-Based System-on-Chip (IG, SD, NKJ), pp. 542–547.
DACDAC-1998-KahngLMMMPTWW
Watermarking Techniques for Intellectual Property Protection (ABK, JL, WHMS, SM, ILM, MP, PT, HW, GW), pp. 776–781.
DACDAC-1998-LuoWA #functional #hybrid #performance #simulation
Hybrid Techniques for Fast Functional Simulation (YL, TW, AA), pp. 664–667.
DACDAC-1998-MassoudMBW #layout
Layout Techniques for Minimizing On-Chip Interconnect Self Inductance (YM, SSM, TB, JW), pp. 566–571.
DACDAC-1998-PandaDENB #design #incremental #migration #named
Migration: A New Technique to Improve Synthesized Designs Through Incremental Customization (RP, AD, TE, JN, DB), pp. 388–391.
DACDAC-1998-UsamiIIKTHATK #design #power management #scalability
Design Methodology of Ultra Low-Power MPEG4 Codec Core Exploiting Voltage Scaling Techniques (KU, MI, TI, MK, MT, MH, HA, TT, TK), pp. 483–488.
DACDAC-1998-ZhongAMM #case study #configuration management #problem #satisfiability #using
Using Reconfigurable Computing Techniques to Accelerate Problems in the CAD Domain: A Case Study with Boolean Satisfiability (PZ, PA, SM, MM), pp. 194–199.
DATEDATE-1998-BeniniMSMS #encoding #optimisation
Address Bus Encoding Techniques for System-Level Power Optimization (LB, GDM, DS, EM, CS), pp. 861–866.
DATEDATE-1998-CornoPRV
Exploiting Symbolic Techniques for Partial Scan Flip Flop Selection (FC, PP, MSR, MV), pp. 670–677.
DATEDATE-1998-CostaCS #modelling #performance #simulation
Efficient Techniques for Accurate Modeling and Simulation of Substrate Coupling in Mixed-Signal IC’s (JPC, MC, LMS), pp. 892–898.
DATEDATE-1998-FlottesPRV #effectiveness #performance
Scanning Datapaths: A Fast and Effective Partial Scan Selection Technique (MLF, RP, BR, LV), pp. 921–922.
DATEDATE-1998-KimuraI #analysis #design
A Unified Technique for PCB/MCM Design by Combining Electromagnetic Field Analysis with Circuit Simulator (HK, NI), pp. 951–952.
DATEDATE-1998-MetraRMPPFZSS #novel #testing
Novel Technique for Testing FPGAs (CM, MR, GAM, JMP, SP, JF, YZ, DS, GRS), pp. 89–94.
DATEDATE-1998-RenovellAB #implementation #multi
Optimized Implementations of the Multi-Configuration DFT Technique for Analog Circuits (MR, FA, YB), pp. 815–821.
DATEDATE-1998-RudnickVECPR #generative #performance #testing #using
Fast Sequential Circuit Test Generation Using High-Level and Gate-Level Techniques (EMR, RV, AE, FC, PP, MSR), pp. 570–576.
DATEDATE-1998-YarmolikHW #performance #self
Self-Adjusting Output Data Compression: An Efficient BIST Technique for RAMs (VNY, SH, HJW), pp. 173–179.
SIGMODSIGMOD-1998-BerchtoldBK #towards
The Pyramid-Technique: Towards Breaking the Curse of Dimensionality (SB, CB, HPK), pp. 142–153.
VLDBVLDB-1998-Amer-YahiaCD #database #relational
Bulk-Loading Techniques for Object Databases and an Application to Relational Data (SAY, SC, CD), pp. 534–545.
VLDBVLDB-1998-SilversteinBMU #mining #scalability
Scalable Techniques for Mining Causal Structures (CS, SB, RM, JDU), pp. 594–605.
CSMRCSMR-1998-KawabeMUO #classification #problem
Variable Classification Technique and Application to the Year 2000 Problem (KK, AM, SU, AO), pp. 44–51.
ICSMEICSM-1998-CherinkaOR #maintenance #off the shelf #programming #question #static analysis
Maintaining a COTS Integrated Solution — Are Traditional Static Analysis Techniques Sufficient for this New Programming Methodology? (RC, CMO, JR), pp. 160–169.
ICSMEICSM-1998-OcaC #data mining #identification #mining #using
Identification of Data Cohesive Subsystems Using Data Mining Techniques (CMdO, DLC), pp. 16–23.
ICSMEICSM-1998-VokolosF #difference #empirical #evaluation #testing
Empirical Evaluation of the Textual Differencing Regression Testing Technique (FIV, PGF), pp. 44–53.
IWPCIWPC-1998-BrandSV #harmful #legacy #parsing
Current Parsing Techniques in Software Renovation Considered Harmful (MvdB, MPAS, CV), pp. 108–117.
STOCSTOC-1998-Huber #approximate
Exact Sampling and Approximate Counting Techniques (MH), pp. 31–40.
FMFM-1998-BussowGHH #integration #modelling #tool support
An Open Environment for the Integration of Hetereogenous Modelling Techniques and Tools (RB, WG, WH, SH), pp. 184–195.
ICGTTAGT-1998-Faulstich #graph transformation #using
Using Graph Transformation Techniques for Integrating Information from the WWW (LF), pp. 426–441.
ICGTTAGT-1998-Rudolf #constraints #graph #pattern matching #performance
Utilizing Constraint Satisfaction Techniques for Efficient Graph Pattern Matching (MR), pp. 238–251.
CHICHI-1998-MacKenzieO #comparison
A Comparison of Three Selection Techniques for Touchpads (ISM, AO), pp. 336–343.
CSCWCSCW-1998-ZhaoS #image
Evaluating Image Filtering Based Techniques in Media Space Applications (QAZ, JTS), pp. 11–18.
CAiSECAiSE-1998-BrinkkemperSH #assembly
Assembly Techniques for Method Engineering (SB, MS, FH), pp. 381–400.
CAiSECAiSE-1998-LacroixSC #approach #database #information management #query #web
Information Extraction and Database Techniques: A User-Oriented Approach to Querying the Web (ZL, AS, RC), pp. 289–304.
CIKMCIKM-1998-DirckzeG #mobile #multi #transaction
A Toggle Transaction Management Technique for Mobile Multidatabases (RAD, LG), pp. 371–377.
CIKMCIKM-1998-PalopoliSU #automation #database #detection
An Automatic Techniques for Detecting Type Conflicts in Database Schemes (LP, DS, DU), pp. 306–313.
CIKMCIKM-1998-SaracEA #estimation
Iterated DFT Based Techniques for Join Size Estimation (KS, ÖE, AEA), pp. 348–355.
ICPRICPR-1998-Heikkila #bound #detection
Moment and curvature preserving technique for accurate ellipse boundary detection (JH), pp. 734–737.
ICPRICPR-1998-HuTT #random
Direct triangle extraction by a randomized Hough technique (ZH, MT, HTT), pp. 717–719.
ICPRICPR-1998-KanekoH #detection #using #video
Cut detection technique from MPEG compressed video using likelihood ratio test (TK, OH), pp. 1476–1480.
ICPRICPR-1998-KangOC #3d #graph #using
Character grouping technique using 3D neighborhood graphs in raster map (YBK, SYO, HGC), pp. 1092–1094.
ICPRICPR-1998-PetersS #realtime
A real-time variable sampling technique: DIEM (MWP, AS), pp. 316–321.
ICPRICPR-1998-YangH #parametricity #self
An intrinsic parameters self-calibration technique for active vision system (CY, ZH), pp. 67–69.
KDDKDD-1998-BerchtoldJR #data mining #diagrams #independence #mining #visual notation
Independence Diagrams: A Technique for Visual Data Mining (SB, HVJ, KAR), pp. 139–143.
KDDKDD-1998-ParthasarathyZL #memory management #mining #parallel
Memory Placement Techniques for Parallel Association Mining (SP, MJZ, WL), pp. 304–308.
SIGIRSIGIR-1998-FrenchPVEP #database #empirical
Evaluating Database Selection Techniques: A Testbed and Experiment (JCF, ALP, CLV, TE, KJP), pp. 121–129.
SIGIRSIGIR-1998-Larkey #automation #categorisation #using
Automatic Essay Grading Using Text Categorization Techniques (LSL), pp. 90–95.
SIGIRSIGIR-1998-WechslerMS #documentation #retrieval
New Techniques for Open-Vocabulary Spoken Document Retrieval (MW, EM, PS), pp. 20–27.
OOPSLAOOPSLA-1998-DolbyC #automation #evaluation
An Evaluation of Automatic Object Inline Allocation Techniques (JD, AAC), pp. 1–20.
REICRE-1998-MillardLT #elicitation #game studies #requirements #using
Child’s Play: Using Techniques Developed to Elicit Requirements from Children with Adults (NM, PL, KT), pp. 66–73.
SACSAC-1998-SabinY #database #information retrieval
Integrating information retrieval techniques with traditional DB methods in a Web-based database browser (RES, TKY), pp. 760–766.
ICSEICSE-1998-DevanbuFS #re-engineering
Techniques for Trusted Software Engineering (PTD, PWLF, SGS), pp. 126–135.
ICSEICSE-1998-GravesHKPR #empirical #testing
An Empirical Study of Regression Test Selection Techniques (TLG, MJH, JMK, AAP, GR), pp. 188–197.
ASPLOSASPLOS-1998-Le #execution #runtime
An Out-of-Order Execution Technique for Runtime Binary Translators (BCL), pp. 151–158.
CCCC-1998-StumpelTK #architecture #compilation
VLIW Compilation Techniques for Superscalar Architectures (ES, MT, UK), pp. 234–248.
HPCAHPCA-1998-MowyCL #comparative #distributed #evaluation #latency #memory management
Comparative Evaluation of Latency Tolerance Techniques for Software Distributed Shared Memory (TCM, CQCC, AKWL), pp. 300–311.
HPCAHPCA-1998-VengroffG #branch #estimation #performance #predict #re-engineering
Partial Sampling with Reverse State Reconstruction: A New Technique for Branch Predictor Performance Estimation (DEV, GRG), pp. 342–351.
ISMMISMM-1998-Pirinen #incremental
Barrier Techniques for Incremental Tracing (PPP), pp. 20–25.
LCTESLCTES-1998-LundqvistS #analysis #simulation #using
Integrating Path and Timing Analysis Using Instruction-Level Simulation Techniques (TL, PS), pp. 1–15.
CAVCAV-1998-Bolignano #encryption #model checking #protocol #verification
Integrating Proof-Based and Model-Checking Techniques for the Formal Verification of Cryptographic Protocols (DB), pp. 77–87.
CAVCAV-1998-ElgaardKM
MONA 1.x: New Techniques for WS1S and WS2S (JE, NK, AM), pp. 516–520.
ISSTAISSTA-1998-GotliebBR #automation #constraints #generative #testing #theorem proving #using
Automatic Test Data Generation Using Constraint Solving Techniques (AG, BB, MR), pp. 53–62.
LICSLICS-1998-FernandezM #equivalence #induction #interactive
Coinductive Techniques for Operational Equivalence of Interaction Nets (MF, IM), pp. 321–332.
DACDAC-1997-CroixW #logic #performance #synthesis
A Fast And Accurate Technique To Optimize Characterization Tables For Logic Synthesis (JFC, DFW), pp. 337–340.
DACDAC-1997-GrundmannDAR #design #performance #using
Designing High Performance CMOS Microprocessors Using Full Custom Techniques (WJG, DD, RLA, NLR), pp. 722–727.
DACDAC-1997-RaghunathanDJW #control flow #design #power management
Power Management Techniques for Control-Flow Intensive Designs (AR, SD, NKJ, KW), pp. 429–434.
DATEEDTC-1997-CabodiCLQ #synthesis #verification
Verification and synthesis of counters based on symbolic techniques (GC, PC, LL, SQ), pp. 176–181.
DATEEDTC-1997-ChakrabortyM #bound #functional #parallel #programmable #testing
A programmable boundary scan technique for board-level, parallel functional duplex march testing of word-oriented multiport static RAMs (KC, PM), pp. 330–334.
DATEEDTC-1997-ChiusanoCPR #graph #hybrid #problem
Hybrid symbolic-explicit techniques for the graph coloring problem (SC, FC, PP, MSR), pp. 422–426.
DATEEDTC-1997-CornoPRR #sequence #testing
New static compaction techniques of test sequences for sequential circuits (FC, PP, MR, MSR), pp. 37–43.
DATEEDTC-1997-GrotkerSM #data flow #modelling #named
PCC: a modeling technique for mixed control/data flow systems (TG, RS, HM), pp. 482–486.
DATEEDTC-1997-GuLKP #analysis #testing
A controller testability analysis and enhancement technique (XG, EL, KK, ZP), pp. 153–157.
ICDARICDAR-1997-Ali #documentation #image
An Object/Segment Oriented Skew-Correction Technique for Document Images (MBHA), pp. 671–674.
ICDARICDAR-1997-EspositoMSAG #library #machine learning #semantics
Information Capture and Semantic Indexing of Digital Libraries through Machine Learning Techniques (FE, DM, GS, CDA, GdG), pp. 722–727.
ICDARICDAR-1997-SolihinL
Mathematical properties of the native integral ratio handwriting and text extraction technique (YS, GL), p. 1102–?.
ICDARICDAR-1997-WatanabeHYT #normalisation
Normalization Techniques of Handwritten Numerals for Gabor Filters (MW, YH, TY, ST), p. 303–?.
ICDARICDAR-1997-WongMX #fault tolerance #recognition
A Chinese Bank Check Recognition System Based on the Fault Tolerant Technique (SW, FM, SX), pp. 1038–1042.
VLDBVLDB-1997-WhiteheadSM #information retrieval #using
GTE SuperPages: Using IR Techniques for Searching Complex Objects (SDW, HS, MM), pp. 553–557.
ICSMEICSM-1997-Abd-El-Hafiz #composition #comprehension #knowledge-based
Effects of Decomposition Techniques on Knowledge-Based Program Understanding (SKAEH), p. 21–?.
WCREWCRE-1997-GirardKS #architecture #comparison #comprehension #data type #detection #encapsulation
Comparison of Abstract Data Type and Abstract State Encapsulation Detection Techniques for Architectural Understanding (JFG, RK, GS), pp. 66–75.
PEPMPEPM-1997-MarinescuG #concurrent #source code
Partial-Evaluation Techniques for Concurrent Programs (MM, BG), pp. 47–62.
PLDIPLDI-1997-DinizR #adaptation #effectiveness #feedback
Dynamic Feedback: An Effective Technique for Adaptive Computing (PCD, MCR), pp. 71–84.
STOCSTOC-1997-KaoLPST
General Techniques for Comparing Unrooted Evolutionary Trees (MYK, TWL, TMP, WKS, HFT), pp. 54–65.
STOCSTOC-1997-LaffertyR
Spectral Techniques for Expander Codes (JDL, DNR), pp. 160–167.
CIAAWIA-1997-Ziadi #automaton #clustering #problem #set #sorting
Sorting and Doubling Techniques for Set Partitioning and Automata Minimization Problems (DZ), pp. 241–251.
FMFME-1997-MartinJ #analysis #concurrent #network #performance #process #scalability
An Efficient Technique for Deadlock Analysis of Large Scale Process Networks (JMRM, SAJ), pp. 418–441.
CHICHI-1997-AraiAH #named
PaperLink: A Technique for Hyperlinking from Real Paper to Electronic Content (TA, DA, SEH), pp. 327–334.
CHICHI-1997-EdwardsM #collaboration #named
Timewarp: Techniques for Autonomous Collaboration (WKE, EDM), pp. 218–225.
HCIHCI-CC-1997-FoxBBBB #design
Human Factors Techniques for Designing the Virtual Mission Operations Center (JAF, JB, RB, PB, MB), pp. 737–740.
HCIHCI-CC-1997-SavidisVS #library
Embedding Scanning Techniques Accessible to Motor-Impaired Users in the WINDOWS Object Library (AS, GV, CS), pp. 429–432.
HCIHCI-SEC-1997-BaconS #3d #representation
Hybridization of Classical Documentary Techniques and Techniques of Three Dimensional Representation in Space: Dynamical Constitution of Virtual Scenes (JB, XS), pp. 925–928.
HCIHCI-SEC-1997-Dormann #design #web
Web Pages: Designing with Rhetorical Techniques (CD), pp. 799–802.
HCIHCI-SEC-1997-Ficarra #evaluation #multi
Method and Techniques for the Evaluation of Multimedia Applications (FVCF), pp. 635–638.
HCIHCI-SEC-1997-OhashiYE #interface #using
A Real World Oriented Interface Technique Using Computer Vision (TO, TY, TE), pp. 949–952.
HCIHCI-SEC-1997-Rauterberg #case study #game studies #interactive #user interface #video
Natural User Interface (NUI): A Case Study of a Video Based Interaction Technique for a Computer Game (MR), pp. 253–256.
HCIHCI-SEC-1997-RauterbergBKM #case study #interactive #user interface #video
Natural User Interfaces (NUI): A Case Study of a Video Based Interaction Technique for CAD Systems (MR, MB, HK, MM), pp. 929–932.
AdaEuropeAdaEurope-1997-Waterman #ada #testing
Techniques for Testing Ada 95 (SRW), pp. 278–291.
AdaTRI-Ada-1997-Yu #component #object-oriented #reuse #using
Using Object-Oriented Techniques to Develop Reusable Components (HY), pp. 117–124.
CAiSECAiSE-1997-TryfonaPH #behaviour #experience #modelling
Modeling Behavior of Geographic Objects: An Experience with the Object Modeling Technique (NT, DP, TH), pp. 347–359.
ECIRACIR-1997-StewartD #bibliography #perspective #profiling
User Profiling Techniques: A Critical Review (SS, JD).
CIKMCIKM-1997-JonesR
View Materialization Techniques for Complex Hierarchical Objects (MCJ, EAR), pp. 222–229.
ICMLICML-1997-Drucker #using
Improving Regressors using Boosting Techniques (HD), pp. 107–115.
ICMLICML-1997-WilsonM
Instance Pruning Techniques (DRW, TRM), pp. 403–411.
KDDKDD-1997-BergstenSS #analysis #data mining #machine learning #mining
Applying Data Mining and Machine Learning Techniques to Submarine Intelligence Analysis (UB, JS, PS), pp. 127–130.
KDDKDD-1997-FeldmanKZ #data mining #documentation #mining #visualisation
Visualization Techniques to Explore Data Mining Results for Document Collections (RF, WK, AZ), pp. 16–23.
SIGIRSIGIR-1997-BallesterosC #information retrieval #query
Phrasal Translation and Query Expansion Techniques for Cross-language Information Retrieval (LB, WBC), pp. 84–91.
SIGIRSIGIR-1997-KlavansTJ #automation #effectiveness #multi #natural language #semiparsing #speech
Effective Use of Natural Language Processing Techniques for Automatic Conflation of Multi-Word Terms: The Role of Derivational Morphology, Part of Speech Tagging, and Shallow Parsing (ET, JK, CJ), pp. 148–155.
TOOLSTOOLS-PACIFIC-1997-Henderson-Sellers #generative #named #object-oriented
OPEN: A Third Generation OO Methodology — Advanced Tasks and Techniques (BHS), pp. 363–365.
TOOLSTOOLS-USA-1997-Ege #design #encapsulation
Class Design: Advanced Encapsulation Techniques (RKE), p. 376.
TOOLSTOOLS-USA-1997-GilH #debugging #generative #source code #testing #using
T++: A Test Case Generator Using a Debugging Information Based Technique for Source Code Manipulation (JYG, BH), pp. 272–281.
RERE-1997-Sutcliffe #approach #requirements
A Technique Combination Approach to Requirements Engineering (AGS), p. 65–?.
SACSAC-1997-GudivadaBA #artificial reality #database #retrieval
A retrieval technique for virtual reality databases (VNG, JNB, RA), pp. 328–333.
ESECESEC-FSE-1997-WoodRBM #detection #empirical #fault
Comparing and Combining Software Defect Detection Techniques: A Replicated Empirical Study (MW, MR, AB, JM), pp. 262–277.
ICSEICSE-1997-GoelS #data analysis #re-engineering #tutorial
Software Engineering Data Analysis Techniques (Tutorial) (ALG, MS), pp. 667–668.
ASF+SDFASF+SDF-1997-MoreauK #commutative #compilation #normalisation
Compilation techniques for associative-commutative normalisation (PEM, HK), p. 11.
CAVCAV-1997-Berry #design #verification
Boolean and 2-adic Numbers Based Techniques for Verifying Synchronous Design (GB), p. 303.
CAVCAV-1997-PardoH #abstraction #automation #calculus #model checking #μ-calculus
Automatic Abstraction Techniques for Propositional μ-calculus Model Checking (AP, GDH), pp. 12–23.
TLCATLCA-1997-Lenisa #induction #semantics #λ-calculus
Semantic Techniques for Deriving Coinductive Characterizations of Observational Equivalences for λ-calculi (ML), pp. 248–266.
DACDAC-1996-Burch #verification
Techniques for Verifying Superscalar Microprocessors (JRB), pp. 552–557.
DACDAC-1996-DesaiY #cpu #design #simulation #using #verification
A Systematic Technique for Verifying Critical Path Delays in a 300MHz Alpha CPU Design Using Circuit Simulation (MPD, YTY), pp. 125–130.
DACDAC-1996-FerrandiFMPS #automaton #network #optimisation
Symbolic Optimization of FSM Networks Based on Sequential ATPG Techniques (FF, FF, EM, MP, DS), pp. 467–470.
DACDAC-1996-HuangCC #fault #verification
Error Correction Based on Verification Techniques (SYH, KCC, KTC), pp. 258–261.
DACDAC-1996-IyerK #architecture #named #self #synthesis
Introspection: A Low Overhead Binding Technique During Self-Diagnosing Microarchitecture Synthesis (BI, RK), pp. 137–142.
DACDAC-1996-KudvaGJ #distributed
A Technique for Synthesizing Distributed Burst-mode Circuits (PK, GG, HMJ), pp. 67–70.
DACDAC-1996-LillisCLH #performance #trade-off
New Performance Driven Routing Techniques With Explicit Area/Delay Tradeoff and Simultaneous Wire Sizing (JL, CKC, TTYL, CYH), pp. 395–400.
DACDAC-1996-MonahanB #analysis #concurrent #optimisation
Concurrent Analysis Techniques for Data Path Timing Optimization (CM, FB), pp. 47–50.
DACDAC-1996-MonteiroDAM #power management #scheduling
Scheduling Techniques to Enable Power Management (JM, SD, PA, AM), pp. 349–352.
DACDAC-1996-RoychowdhuryM #scalability
Homotopy Techniques for Obtaining a DC Solution of Large-Scale MOS Circuits (JSR, RCM), pp. 286–291.
DACDAC-1996-Sheehan #performance
An AWE Technique for Fast Printed Circuit Board Delays (BNS), pp. 539–543.
HTHT-1996-JoyceKMSU #complexity #design #generative #problem #visual notation #visualisation #web
Visual Metaphor and the Problem of Complexity in the Design of Web Sites: Techniques for Generating, Recognizing and Visualizing Structure (MJ, RK, SM, BS, JMU), p. 257.
SIGMODSIGMOD-1996-AchyutuniON #database #online #parallel
Two Techniques for On-Line Index Modification in Shared Nothing Parallel Databases (KJA, EO, SBN), pp. 125–136.
SIGMODSIGMOD-1996-BunemanDHS #optimisation #query #semistructured data
A Query Language and Optimization Techniques for Unstructured Data (PB, SBD, GGH, DS), pp. 505–516.
SIGMODSIGMOD-1996-Han #data mining #mining
Data Mining Techniques (JH), p. 545.
SIGMODSIGMOD-1996-HellersteinN #execution #query
Query Execution Techniques for Caching Expensive Methods (JMH, JFN), pp. 423–434.
SIGMODSIGMOD-1996-LibkinMW #array #design #implementation #multi #optimisation #query
A Query Language for Multidimensional Arrays: Design, Implementation, and Optimization Techniques (LL, RM, LW), pp. 228–239.
SIGMODSIGMOD-1996-SimmenSM #optimisation #order
Fundamental Techniques for Order Optimization (DES, EJS, TM), pp. 57–67.
VLDBVLDB-1996-BerckenS #data access #multi #query
Query Processing Techniques for Multiversion Access Methods (JVdB, BS), pp. 168–179.
VLDBVLDB-1996-DiwanRSS #clustering
Clustering Techniques for Minimizing External Path Length (AAD, SR, SS, SS), pp. 342–353.
VLDBVLDB-1996-ViverosNR #data mining #health #information management #mining
Applying Data Mining Techniques to a Health Insurance Information System (MSV, JPN, MJR), pp. 286–294.
ITiCSEITiCSE-1996-Ellis #design #experience #implementation #industrial #multi #testing
Design, implementation and testing techniques for multimedia industrial experience projects (AEE), pp. 119–121.
TACASTACAS-1996-ChouP #model checking #partial order #reduction #verification
Formal Verification of a Partial-Order Reduction Technique for Model Checking (CTC, DP), pp. 241–257.
ICSMEICSM-1996-GannodC #c #reverse engineering #source code #using
Using Informal and Formal Techniques for the Reverse Engineering of C Programs (GCG, BHCC), pp. 265–274.
ICSMEICSM-1996-WildeC #comprehension #experience
Early field experience with the Software Reconnaissance technique for program comprehension (NW, CC), pp. 312–318.
WCREWCRE-1996-GannodC #c #reverse engineering #source code #using
Using Informal and Formal Techniques for the Reverse Engineering of C Programs (GCG, BHCC), pp. 249–258.
WCREWCRE-1996-WildeC #comprehension #experience
Early Field Experience with the Software Recounaissance Technique for Program Comprehension (NW, CC), pp. 270–276.
CSCWCSCW-1996-HudsonS #privacy #trade-off
Techniques for Addressing Fundamental Privacy and Disruption Tradeoffs in Awareness Support Systems (SEH, IES), pp. 248–257.
CAiSECAiSE-1996-CastanoA #analysis #process #unification
Techniques for Process Analysis and Unification (SC, VDA), pp. 234–254.
CIKMCIKM-1996-Pulido #graph #query #recursion #traversal #using
Recursive Query Processing Using Graph Traversal Techniques (EP), pp. 37–44.
ICMLICML-1996-Suzuki #algorithm #learning #network #performance #using
Learning Bayesian Belief Networks Based on the Minimum Description Length Principle: An Efficient Algorithm Using the B & B Technique (JS), pp. 462–470.
ICPRICPR-1996-AminBHMC #information management
A knowledge acquisition technique for recognizing handprinted Chinese characters (AA, MB, AGH, AM, PC), pp. 254–258.
ICPRICPR-1996-BhattacharyaCP #segmentation #set
An MLP-based texture segmentation technique which does not require a feature set (UB, BBC, SKP), pp. 805–809.
ICPRICPR-1996-CorreiaCSN #visual notation
Optical flow techniques applied to the calibration of visual perception experiments (MVC, AJCC, JAS, LMN), pp. 498–502.
ICPRICPR-1996-CoxRZ #image #quote #segmentation
“Ratio regions”: a technique for image segmentation (IJC, SR, YZ), pp. 557–564.
ICPRICPR-1996-DistasiNV #image #recursion
A B-tree based recursive technique for image coding (RD, MN, SV), pp. 670–674.
ICPRICPR-1996-FredL #clustering
A minimum code length technique for clustering of syntactic patterns (ALNF, JMNL), pp. 680–684.
ICPRICPR-1996-GriffinKWM
Techniques for the interpretation of thermal paint coated samples (AG, JK, TW, JM), pp. 959–963.
ICPRICPR-1996-HamamotoMIHT #anti #evaluation #network
Evaluation of an anti-regularization technique in neural networks (YH, YM, HI, TH, ST), pp. 205–208.
ICPRICPR-1996-HuangHH #adaptation #estimation #performance #video
Adaptive early jump-out technique for fast motion estimation in video coding (HCH, YPH, WLH), pp. 864–868.
ICPRICPR-1996-Jaeger #optimisation #recognition #using
Recovering writing traces in off-line handwriting recognition: using a global optimization technique (SJ0), pp. 150–154.
ICPRICPR-1996-LuoTB #algorithm #fuzzy #multi
A new multilevel line-based stereo vision algorithm based on fuzzy techniques (AL, WT, HB), pp. 383–387.
ICPRICPR-1996-MottlMBK #image #problem
Hidden tree-like quasi-Markov model and generalized technique for a class of image processing problems (VM, IBM, AB, AK), pp. 715–719.
ICPRICPR-1996-NewmanTBC #image #segmentation
A volumetric segmentation technique for diagnosis and surgical planning in lower torso CT images (TSN, NT, SLB, PLC), pp. 553–557.
ICPRICPR-1996-PeiH96a #algorithm #complexity #detection #symmetry
A low complexity algorithm for detecting rotational symmetry based on the Hough transform technique (SCP, JHH), pp. 492–496.
KDDKDD-1996-IglesiaDR #database #heuristic #using
Discovering Knowledge in Commercial Databases Using Modern Heuristic Techniques (BdlI, JCWD, VJRS), pp. 44–49.
KDDKDD-1996-LakshminarayanHGS #machine learning #using
Imputation of Missing Data Using Machine Learning Techniques (KL, SAH, RPG, TS), pp. 140–145.
ECOOPECOOP-1996-KonoKM #distributed #implementation #memory management #using
An Implementation Method of Migratable Distributed Objects Using an RPC Technique Integrated with Virtual Memory Management (KK, KK, TM), pp. 295–315.
REICRE-1996-Brackett #requirements
Ripe Fruit in Requirements Engineering: Techniques You Can Exploit NOW (JWB), pp. 42–43.
REICRE-1996-Hudlicka #comparison #elicitation #requirements
Requirements Elicitation with Indirect Knowledge Elicitation Techniques: Comparison of Three Methods (EH), pp. 4–11.
REICRE-1996-Macaulay #requirements
Requirements for Requirements Engineering Technique (LAM), pp. 157–164.
SACSAC-1996-BaishE #modelling #predict #quality
Intelligent prediction techniques for software quality models (EB, CE), pp. 565–569.
SACSAC-1996-DamianiF #fuzzy #reuse
Fuzzy techniques for software reuse (ED, MGF), pp. 552–557.
ICSEICSE-1996-Hoare #how #proving #reliability
The Role of Formal Techniques: Past, Current and Future or How Did Software Get so Reliable without Proof? (Extended Abstract) (CARH), pp. 233–234.
CCCC-1996-PfahlerP #comparison #pipes and filters #scheduling
A Comparison of Modulo Scheduling Techniques for Software Pipelining (PP, GP), pp. 18–32.
HPDCHPDC-1996-SolimanE #adaptation #clustering #distributed #performance #simulation
An Efficient Clustered Adaptive-Risk Technique for Distributed Simulation (HMS, ASE), pp. 383–391.
CAVCAV-1996-BensalemLS #automation #generative #invariant
Powerful Techniques for the Automatic Generation of Invariants (SB, YL, HS), pp. 323–335.
CAVCAV-1996-ClarkeGZ #algorithm #proving #theorem proving #using #verification
Verifying the SRT Division Algorithm Using Theorem Proving Techniques (EMC, SMG, XZ), pp. 111–122.
CAVCAV-1996-FernandezJJV #generative #on the fly #testing #using #verification
Using On-The-Fly Verification Techniques for the Generation of test Suites (JCF, CJ, TJ, CV), pp. 348–359.
RTARTA-1996-Madlener #monad
Applications of Rewrite Techniques in Monoids and Rings (Abstract) (KM), p. 260.
DACDAC-1995-DevadasM #bibliography #optimisation #power management
A Survey of Optimization Techniques Targeting Low Power VLSI Circuits (SD, SM), pp. 242–247.
DACDAC-1995-FabbroFCG #modelling #probability #standard #worst-case
An Assigned Probability Technique to Derive Realistic Worst-Case Timing Models of Digital Standard Cells (ADF, BF, LC, CG), pp. 702–706.
DACDAC-1995-JainMF #learning #verification
Advanced Verification Techniques Based on Learning (JJ, RM, MF), pp. 420–426.
DACDAC-1995-LiaoDKTW #embedded #optimisation
Code Optimization Techniques for Embedded DSP Microprocessors (SYL, SD, KK, SWKT, ARW), pp. 599–604.
DACDAC-1995-PotkonjakS #constraints #named
Rephasing: A Transformation Technique for the Manipulation of Timing Constraints (MP, MBS), pp. 107–112.
ICDARICDAR-v2-1995-AriasKC #performance
Efficient techniques for telephone company line drawing interpretation (JFA, RK, AKC), pp. 795–798.
ICDARICDAR-v2-1995-HisamitsuMSFN #fault
Optimal techniques in OCR error correction for Japanese texts (TH, KM, YS, HF, YN), pp. 1014–1017.
ICDARICDAR-v2-1995-LeeLK #online #recognition #using
On-line cursive script recognition using an island-driven search technique (SHL, HL, JHK), pp. 886–889.
SIGMODSIGMOD-1995-ChaudhuriDY #execution #optimisation #query
Join Queries with External Text Sources: Execution and Optimization Techniques (SC, UD, TWY), pp. 410–422.
VLDBVLDB-1995-EicklerGK #evaluation #performance
A Performance Evaluation of OID Mapping Techniques (AE, CAG, DK), pp. 18–29.
CSEETCSEE-1995-FranceL #comprehension #requirements #specification
Understanding the Role of Formal Specification Techniques in Requirements Engineering (RBF, MMLP), pp. 207–221.
ICSMEICSM-1995-BarrosBEQV #automation #impact analysis
Supporting impact analysis: a semi-automated technique and associated tool (SB, TB, AE, JPQ, JFV), pp. 42–51.
WCREWCRE-1995-LakhotiaG #classification #evaluation #towards
Toward Experimental Evaluation of Subsystem Classification Recovery Techniques (AL, JMG), pp. 262–269.
PEPMPEPM-1995-Deutsch #abstract interpretation #data type #induction #modelling #pointer #semantics
Semantic models and abstract interpretation techniques for inductive data structures and pointers (AD), pp. 226–229.
CHICHI-1995-HixTJ #concept #interactive #testing
Pre-Screen Projection: From Concept to Testing of a New Interaction Technique (DH, JNT, RJKJ), pp. 226–233.
CHICHI-1995-KabbashB #using
The “Prince” Technique: Fitts’ Law and Selection Using Area Cursors (PK, WB), pp. 273–279.
CHICHI-1995-LampingRP #geometry #scalability #visualisation
A Focus+Context Technique Based on Hyperbolic Geometry for Visualizing Large Hierarchies (JL, RR, PP), pp. 401–408.
AdaEuropeAdaEurope-1995-Brown #ada #safety
The Practical Application of Safety Techniques on an Ada Based Project (RB), pp. 51–57.
CAiSECAiSE-1995-GeppertD #database #reuse
Strategies and Techniques: Reusable Artifacts for the Construction of Database Management Systems (AG, KRD), pp. 297–310.
CIKMCIKM-1995-Graves #design #knowledge base #search-based
Application of Knowledge Base Design Techniques to Genetic Markers (MG), pp. 348–354.
CIKMCIKM-1995-IkejiF #adaptation #query #using
Computation of Partial Query Results Using An Adaptive Stratified Sampling Technique (ACI, FF), pp. 145–149.
KDDKDD-1995-Klosgen #database #information management
Anonymization Techniques for Knowledge Discovery in Databases (WK), pp. 186–191.
SIGIRSIGIR-1995-Klein #performance #retrieval
Efficient Recompression Techniques for Dynamic Full-Text Retrieval Systems (STK), pp. 39–47.
OOPSLAOOPSLA-1995-AgesenH #comparison #feedback #object-oriented #optimisation #type inference
Type Feedback vs. Concrete Type Inference: A Comparison of Optimization Techniques for Object-Oriented Languages (OA, UH), pp. 91–107.
SACSAC-1995-FiedlerLDL #using
Optimal initialization of mixed-layer model using the adjoint technique (RF, SL, SKD, JML), pp. 91–95.
SACSAC-1995-HoeltingSW #approximate #problem
Approximation techniques for variations of the p-median problem (CJH, DAS, RLW), pp. 293–299.
ESECESEC-1995-KamstiesL #detection #empirical #evaluation
An Empirical Evaluation of Three Defect-Detection Techniques (EK, CML), pp. 362–383.
ASF+SDFASF+SDF-1995-Klint #asf+sdf #evolution #ide #implementation
The Evolution of Implementation Techniques in the ASF+SDF Meta-environment (PK), pp. 5–26.
HPCAHPCA-1995-AndersonB #multi #performance
Two Techniques for Improving Performance on Bus-Based Multiprocessors (CA, JLB), pp. 264–275.
HPCAHPCA-1995-CitronR #using
Creating a Wider Bus Using Caching Techniques (DC, LR), pp. 90–99.
ISMMIWMM-1995-PlainfosseS #bibliography #distributed #garbage collection
A Survey of Distributed Garbage Collection Techniques (DP, MS), pp. 211–249.
CAVCAV-1995-GribomontR #named #verification
CAVEAT: Technique and Tool for Computer Aided VErification And Transformation (EPG, DR), pp. 70–83.
ICLPICLP-1995-BarthB #finite
Finite Domain and Cutting Plane Techniques in CLP(PB) (PB, AB), pp. 133–147.
ICLPICLP-1995-Hausman #erlang #hybrid #implementation
Hybrid Implementation Techniques in Erlang BEAM (BH), p. 816.
RTARTA-1995-BaaderS #algebra #constraints #perspective #theorem proving
Combination of Constraint Solving Techniques: An Algebraic POint of View (FB, KUS), pp. 352–366.
RTARTA-1995-Matiyasevich #logic #on the
On Some Mathematical Logic Contributions to Rewriting Techniques: Lost Heritage (Abstract) (YM), p. 1.
RTARTA-1995-StickelZ #problem
Studying Quasigroup Identities by Rewriting Techniques: Problems and First Results (MES, HZ), pp. 450–456.
DACDAC-1994-CabodiCQ #traversal
Auxiliary Variables for Extending Symbolic Traversal Techniques to Data Paths (GC, PC, SQ), pp. 289–293.
DACDAC-1994-HuYD #performance #verification
New Techniques for Efficient Verification with Implicitly Conjoined BDDs (AJH, GY, DLD), pp. 276–282.
DACDAC-1994-Murphy #standard
Partnering with EDA Vendors: Tips, Techniques, and the Role of Standards (SM), pp. 131–134.
DACDAC-1994-NagumoNNMM #fault #named #reduction #using
VFSIM: Vectorized Fault Simulator Using a Reduction Technique Excluding Temporarily Unobservable Faults (TN, MN, TN, MM, SM), pp. 510–515.
DACDAC-1994-PotkonjakD #optimisation #resource management #testing #using
Optimizing Resource Utilization and Testability Using Hot Potato Techniques (MP, SD), pp. 201–205.
DACDAC-1994-RiessDJ #clustering #scalability #using
Partitioning Very Large Circuits Using Analytical Placement Techniques (BMR, KD, FMJ), pp. 646–651.
DACDAC-1994-SilvaS
Dynamic Search-Space Pruning Techniques in Path Sensitization (JPMS, KAS), pp. 705–711.
DATEEDAC-1994-AhmedCC #approach #fault #modelling #optimisation #using
A Model-based Approach to Analog Fault Diagnosis using Techniques from Optimisation (SA, PYKC, PC), p. 665.
DATEEDAC-1994-HirechFGR #design #simulation #testing
A Redefinable Symbolic Simulation Technique to Testability Design Rules Checking (MH, OF, AG, EHR), p. 668.
PODSPODS-1994-HuaLL #clustering
A Decomposition-Based Simulated Annealing Technique for Data Clustering (KAH, SDL, WKL), pp. 117–128.
PODSPODS-1994-LibkinW #set
New Techniques for Studying Set Languages, Bag Languages and Aggregate Functions (LL, LW), pp. 155–166.
PODSPODS-1994-RamaswamyS
Path Caching: A Technique for Optimal External Searching (SR, SS), pp. 25–35.
VLDBVLDB-1994-PoulovassilisS #algebra #database #optimisation #programming language #query
Investigation of Algebraic Query Optimisation Techniques for Database Programming Languages (AP, CS), pp. 415–426.
CSEETCSEE-1994-HabraD #re-engineering #student
Putting into Practice Advanced Software Engineering Techniques through Students Project (NH, ED), pp. 303–316.
ESOPESOP-1994-Boerio #higher-order #polymorphism #λ-calculus
Extending Pruning Techniques to Polymorphic Second order λ-Calculus (LB), pp. 120–134.
PLDIPLDI-1994-DavidsonJ #memory management
Memory Access Coalescing: A technique for Eliminating Redundant memory Accesses (JWD, SJ), pp. 186–195.
PLDIPLDI-1994-EbciogluGKSZ #compilation
VLIW Compilation Techniques in a Superscalar Environment (KE, RDG, KCK, GMS, IZ), pp. 36–48.
STOCSTOC-1994-AlonK #graph #random
A spectral technique for coloring random 3-colorable graphs (preliminary version) (NA, NK), pp. 346–355.
FMFME-1994-CuellarWB #design #effectiveness #industrial #verification
Combining the Design of Industrial Systems with Effective Verification Techniques (JC, IW, DB), pp. 639–658.
FMFME-1994-Lindsay #on the #verification
On transferring VDM verification techniques to Z (PAL), pp. 190–213.
FMFME-1994-MartinT #verification
Verification Techniques for LOTOS (UM, MT), pp. 83–92.
ICGTTAGT-1994-ArnborgP #bound #graph #subclass
A Technique for Recognizing Graphs of Bounded Treewidth with Application to Subclasses of Partial 2-Paths (SA, AP), pp. 469–486.
CHICHI-1994-ChaseSHH94a #behaviour #development #evaluation #representation
Development and evaluation of a taxonomical model of behavioral representation techniques (JDC, RSS, HRH, DH), pp. 159–165.
CHICHI-1994-Oviatt94a #interface
Interface techniques for minimizing disfluent input to spoken language systems (SLO), pp. 205–210.
ICMLICML-1994-ZelleMK #bottom-up #induction #logic programming #top-down
Combining Top-down and Bottom-up Techniques in Inductive Logic Programming (JMZ, RJM, JBK), pp. 343–351.
SEKESEKE-1994-FarrellRT #exclamation #object-oriented
Giving KBS an OO! — object-oriented techniques and KADS (VF, DR, ST), pp. 298–305.
SIGIRSIGIR-1994-Hoch #analysis #classification #documentation #information retrieval #using
Using IR Techniques for Text Classification in Document Analysis (RH), pp. 31–40.
ECOOPECOOP-1994-MoreiraC #analysis #object-oriented
Combining Object-Oriented Analysis and Formal Description Techniques (AMDM, RGC), pp. 344–364.
TOOLSTOOLS-EUROPE-1994-Cook #development
Essential Techniques for O-O Development (SC), p. 527.
TOOLSTOOLS-EUROPE-1994-McKim94a #education #object-oriented
Teaching Object-Oriented Techniques (JCM), p. 533.
PPDPPLILP-1994-MaraistS #functional #graph #reduction
A Graph Reduction Technique with Sharing across Narrowings for Functional-Logic Languages (JM, FSKS), pp. 355–369.
PPDPPLILP-1994-Voronkov #bottom-up #implementation
An Implementation Technique for a Class of Bottom-Up Procedures (AV), pp. 147–164.
POPLPOPL-1994-BosschereDGK #interprocedural #optimisation
Call Forwarding: A Simple Interprocedural Optimization Technique for Dynamically Typed Languages (KDB, SKD, DG, SK), pp. 409–420.
REICRE-1994-AcostaBRS #agile #case study #prototype #requirements
A case study of applying rapid prototyping techniques in the Requirements Engineering Environment (RDA, CLB, WER, JLS), pp. 66–73.
SACSAC-1994-HalgamugeG #fuzzy #industrial
Fuzzy neural fusion techniques for industrial applications (SKH, MG), pp. 136–141.
ICSEICSE-1994-Gaudel #specification
Formal Specification Techniques (Extended Abstract) (MCG), pp. 223–227.
ICSEICSE-1994-RothermelH #framework #testing
A Framework for Evaluating Regression Test Selection Techniques (GR, MJH), pp. 201–210.
ASPLOSASPLOS-1994-ArgadeCT #monitoring #operating system #runtime
A Technique for Monitoring Run-Time Dynamics of an Operating System and a Microprocessor Executing User Applications (PVA, DKC, CT), pp. 122–131.
ASPLOSASPLOS-1994-LaudonGH #multi #named #thread
Interleaving: A Multithreading Technique Targeting Multiprocessors and Workstations (JL, AG, MH), pp. 308–318.
HPDCHPDC-1994-ChiuC #distributed #fault tolerance #performance
Process-Replication Technique for Fault Tolerance and Performance Improvement in Distributed Computing Systems (JFC, GMC), pp. 236–243.
CADECADE-1994-DomenjoudKR #equation
Combination Techniques for Non-Disjoint Equational Theories (ED, FK, CR), pp. 267–281.
LICSLICS-1994-BachmairG #transitive
Rewrite Techniques for Transitive Relations (LB, HG), pp. 384–393.
DACDAC-1993-ChickermaneRBP
Non-Scan Design-for-Testability Techniques for Sequential Circuits (VC, EMR, PB, JHP), pp. 236–241.
DACDAC-1993-ChuML #finite #performance #state machine
An Efficient Critical Race-Free State Assignment Technique for Asynchronous Finite State Machines (TAC, NM, CKCL), pp. 2–6.
DACDAC-1993-KawarabayashiSS #verification
A Verification Technique for Gated Clock (MK, NVS, ALSV), pp. 123–127.
DACDAC-1993-SeawrightB #performance #synthesis
High-Level Symbolic Construction Technique for High Performance Sequential Synthesis (AS, FB), pp. 424–428.
DACDAC-1993-StamoulisH #correlation #probability #simulation
Improved Techniques for Probabilistic Simulation Including Signal Correlation Effects (GIS, INH), pp. 379–383.
HTHT-1993-Perlman #hypermedia #information retrieval #tool support
Information Retrieval Techniques for Hypertext in the Semi-Structured Toolkit (GP), pp. 260–267.
STOCSTOC-1993-ColeMS #array #configuration management #fault #multi #self
Multi-scale self-simulation: a technique for reconfiguring arrays with faults (RC, BMM, RKS), pp. 561–572.
SASWSA-1993-CharlierDMH #abstract interpretation #algorithm #fixpoint #optimisation #performance #prolog
Optimization Techniques for General Purpose Fixpoint Algorithms — Practical Efficiency for the Abstract Interpretation of Prolog (BLC, OD, LM, PVH), pp. 15–26.
FMFME-1993-ValmariKCL #analysis #reachability
Putting Advanced Reachability Analysis Techniques Together: the “ARA” Tool (AV, JK, MC, ML), pp. 597–616.
HCIHCI-ACS-1993-Ala-Siuru #case study #experience #specification #user interface #using
Using QFD Techniques in User Interface Specification: First Experiences (PAS), pp. 456–461.
HCIHCI-ACS-1993-Badham #design #implementation
Implementing Smart Manufacturing: Some Techniques for Designer/User Cooperation (RJB), pp. 62–67.
HCIHCI-SHI-1993-BauerR #development #interactive
New Techniques for Interaction in Virtual Worlds — Contents of Development and Examples (WB, OR), pp. 687–692.
HCIHCI-SHI-1993-ChaseHHSB #behaviour #design #representation #user interface
A Model of Behavioral Techniques for Representing User Interface Designs (JDC, HRH, DH, RSS, JLB), pp. 861–866.
HCIHCI-SHI-1993-KirbyH #analysis #design
An Analysis Technique for User Centered Design (JK, HH), pp. 991–996.
HCIHCI-SHI-1993-LeungA #taxonomy #visual notation
A Taxonomy of Distortion-Oriented Techniques for Graphical Data Presentation (YKL, MDA), pp. 104–109.
CHIINTERCHI-1993-Potter #automation #programming #user interface
Guiding automation with pixels (abstract): a technique for programming in the user interface (RP), p. 530.
CHIINTERCHI-1993-Tognazzini #design #interface
Principles, techniques, and ethics of stage magic and their application to human interface design (BT), pp. 355–362.
AdaTRI-Ada-1993-Cernosek #ada #modelling #named #representation
ROMAN-9X: A Technique for Representing Object Models in Ada 9X Notation (GJC), pp. 385–406.
SEKESEKE-1993-EspositoMS #information management #machine learning #refinement
Machine Learning Techniques for Knowledge Acquisition and Refinement (FE, DM, GS), pp. 319–323.
SEKESEKE-1993-Juzgado #knowledge-based #testing
Application of Testing Techniques in Conventional Software to Knowledge-Based Software (NJJ), pp. 282–284.
SIGIRSIGIR-1993-FujiiC #comparison #retrieval
A Comparison of Indexing Techniques for Japanese Text Retrieval (HF, WBC), pp. 237–246.
OOPSLAOOPSLA-1993-BalK #runtime #using
Object Distribution in Orca using Compile-Time and Run-Time Techniques (HEB, MFK), pp. 162–177.
TOOLSTOOLS-EUROPE-1993-CoulangeR #object-oriented #statistics
Object-Oriented Techniques at Work: Facts and Statistics (BC, AR), pp. 89–94.
TOOLSTOOLS-PACIFIC-1993-LingD #comparison #concurrent #object-oriented #paradigm #specification #using
A Comparison of Techniques for Specifying Concurrent Systems Using the Object-Oriented Paradigm (SL, BD), pp. 155–177.
TOOLSTOOLS-USA-1993-ChandlerH #education #object-oriented
Teaching Object Oriented at University Level: Techniques for Success (JMC, SCH), pp. 619–626.
TOOLSTOOLS-USA-1993-Page-Jones93a #object-oriented
Object-Orientation and Structured Techniques: Overlaps and Conflicts (MPJ), p. 573.
LOPSTRLOPSTR-1993-MaddenHGB #automation #generative #performance #proving #source code #theorem proving
A General Technique for Automatically Generating Efficient Programs Through the Use of Proof Planning (Abstract) (PM, JH, IG, AB), pp. 64–66.
LOPSTRLOPSTR-1993-Vargas-VeraRI #editing #prolog #source code
Combining Prolog Programs in a Techniques Editing System (Abstract) (MVV, DSR, RI), pp. 82–84.
LOPSTRLOPSTR-1993-Vasconcelos #design #programming #prolog
Designing Prolog Programming Techniques (WWV), pp. 85–99.
REICRE-1993-FenselAS #analysis #semantics
Giving Structured Analysis Techniques a Formal and Operational Semantics with KARL (DF, JA, RS), pp. 267–286.
RERE-1993-GoguenL #elicitation #requirements
Techniques for requirements elicitation (JAG, CL), pp. 152–164.
SACSAC-1993-StrateW #algorithm #multi #programming
Load Balancing Techniques for Dynamic Programming Algorithms on Hypercube Multiprocessors (SAS, RLW), pp. 562–569.
SACSAC-1993-TanLJH #reuse #specification
The Data Derivation Model: A Program Specification Technique That Improves Reusability (HBKT, TWL, SJ, YSH), pp. 95–102.
SACSAC-1993-VeezhinathanKT #bound #branch #hybrid
A Hybrid of Neural Net and Branch and Bound Techniques for Seismic Horizon Tracking (JV, FK, JT), pp. 173–178.
FSEFSE-1993-Bergadano #generative #learning #testing
Test Case Generation by Means of Learning Techniques (FB), pp. 149–162.
ICSEICSE-1993-FranklW #comparison #data flow #detection #testing
An Analytical Comparison of the Fault-Detecting Ability of Data Flow Testing Techniques (PGF, EJW), pp. 415–424.
ICSEICSE-1993-MukherjeaS #algorithm #animation #comprehension #debugging
Applying Algorithm Animation Techniques for Program Tracing, Debugging, and Understanding (SM, JTS), pp. 456–465.
PPoPPPPoPP-1993-WagnerC #implementation #named #performance
Leapfrogging: A Portable Technique for Implementing Efficient Futures (DBW, BC), pp. 208–217.
ICLPICLP-1993-CarlssonG #automation #constraints #using
Automatic Frequency Assignment for Cellular Telephones Using Constraint Satisfaction Techniques (MC, MG), pp. 647–665.
ICLPICLP-1993-Gusikhin #integration #prolog #scheduling
Integration of Traditional Scheduling Techniques and AI on Prolog Basis (OYG), p. 841.
ICLPILPS-1993-Vargas-VeraVR #editing #prolog #scalability #source code #using
Building Large-Scale Prolog Programs using a Techniques Editing System (MVV, WWV, DSR), p. 636.
ISSTAISSTA-1993-CorbettA #bound #concurrent #realtime
A Practical Technique for Bounding the Time Between Events in Concurrent Real-Time Systems (JCC, GSA), pp. 110–116.
ISSTAISSTA-1993-Goradia #effectiveness #impact analysis
Dynamic Impact Analysis: A Cost-Effective Technique to Enforce Error-Propagation (TG), pp. 171–181.
RTARTA-1993-BaaderS #problem
Combination Techniques and Decision Problems for Disunification (FB, KUS), pp. 301–315.
RTARTA-1993-Bachmair #proving #theorem proving
Rewrite Techniques in Theorem Proving (Abstract) (LB), p. 1.
RTARTA-1993-LevyA #order #term rewriting
Bi-rewriting, a Term Rewriting Technique for Monotonic Order Relations (JL, JAC), pp. 17–31.
DACDAC-1992-GeurtsCM #throughput
Time Constrained Allocation and Assignment Techniques for High Throughput Signal Processing (WG, FC, HDM), pp. 124–127.
DACDAC-1992-HamadaCC #equation #estimation
A Wire Length Estimation Technique Utilizing Neighborhood Density Equations (TH, CKC, PMC), pp. 57–61.
DACDAC-1992-LeeM #logic #multi #simulation
Two New Techniques for Compiled Multi-Delay Logic Simulation (YSL, PMM), pp. 420–423.
DACDAC-1992-WangW #graph #optimisation
A Graph Theoretic Technique to Speed up Floorplan Area Optimization (TCW, DFW), pp. 62–68.
PODSPODS-1992-Jakobsson #evaluation #on the #query
On Tree-Based Techniques for Query Evaluation (HJ), pp. 380–392.
SIGMODSIGMOD-1992-TsangarisN #clustering #on the #performance
On the Performance of Object Clustering Techniques (MMT, JFN), pp. 144–153.
VLDBVLDB-1992-ZobelMS #database #performance
An Efficient Indexing Technique for Full Text Databases (JZ, AM, RSD), pp. 352–362.
PLDIPLDI-1992-Lucco #parallel #scheduling #source code
A Dynamic Scheduling Technique for Irregular Parallel Programs (SL), pp. 200–211.
CHICHI-1992-Muller #design #using
Retrospective on a year of participatory design using the PICTIVE technique (MJM), pp. 455–462.
CAiSECAiSE-1992-IpH #diagrams #information management #knowledge base #lifecycle #modelling #process
A Knowledge Based Technique for the Process Modelling of Information Systems: The Object Life Cycle Diagram (SI, TH), pp. 164–186.
KRKR-1992-BaaderHNPF #analysis #empirical #optimisation #representation
An Empirical Analysis of Optimization Techniques for Terminological Representation Systems, or Making KRIS Get a Move On (FB, BH, BN, HJP, EF), pp. 270–281.
KRKR-1992-XiongSS #backtracking #scheduling
Intelligent Backtracking Techniques for Job Shop Scheduling (YX, NMS, KPS), pp. 14–23.
ICMLML-1992-Segre #multi #on the
On Combining Multiple Speedup Techniques (AMS), pp. 400–405.
SIGIRSIGIR-1992-BlossevilleHMP #analysis #automation #classification #documentation #natural language #statistics
Automatic Document Classification: Natural Language Processing, Statistical Analysis, and Expert System Techniques used together (MJB, GH, MGM, NP), pp. 51–58.
ECOOPECOOP-1992-Gabelgaard #implementation #object-oriented #programming #using
Using Object-Oriented Programming Techniques for Implementing ISDN Supplementary Services (BG), pp. 213–232.
TOOLSTOOLS-EUROPE-1992-Lano #object-oriented #specification
Object-Oriented Specification Techniques (KL), p. 403.
TOOLSTOOLS-EUROPE-1992-NilssonB #object-oriented #specification #tool support
Tools for Object Oriented Formal Specification Technique (GN, PB), pp. 349–358.
TOOLSTOOLS-PACIFIC-1992-Henderson-Sellers92a #analysis #design
Techniques and Notation for Analysis and Design (BHS), p. 236.
PPDPPLILP-1992-Alexandre #logic programming #source code
A technique for Transforming Logic Programs by Fold-Unfold Transformations (FA), pp. 202–216.
PPDPPLILP-1992-DorochevskyV #garbage collection
Binding Techniques and Garbage Collection for OR-Parallel CLP Systems (MD, AV), pp. 39–53.
PPDPPLILP-1992-EnglebertCRH #abstract interpretation #algorithm #evaluation #optimisation #prolog
Generic Abstract Interpretation Algorithms For Prolog: Tow Optimization Techniques and Their Experimental Evaluation (VE, BLC, DR, PVH), pp. 310–325.
ICSEICSE-1992-Fairley #estimation
Recent Advances in Software Estimation Techniques (REF), pp. 382–391.
ICSEICSE-1992-PodgurskiP #automation #behaviour #component #retrieval #reuse
Behavior Sampling: A Technique for Automated Retrieval of Reusable Components (AP, LP), pp. 349–360.
ISMMIWMM-1992-Wilson #garbage collection
Uniprocessor Garbage Collection Techniques (PRW), pp. 1–42.
CAVCAV-1992-JainKG #scalability #towards #verification
Towards a Verification Technique for Large Synchronous Circuits (PJ, PK, GG), pp. 109–122.
CAVCAV-1992-PoelZ #development #parallel
Layering Techniques for Development of Parallel Systems (MP, JZ), pp. 16–29.
ICTSSIWPTS-1992-LidongJL #consistency #multi #optimisation #sequence #testing
A Further Optimization Technique for Conformance Testing Based on Multiple UIO Sequences (ZL, LJ, HL), pp. 229–235.
DACDAC-1991-JuS #identification #incremental
Incremental Techniques for the Identification of Statically Sensitizable Critical Paths (YCJ, RAS), pp. 541–546.
DACDAC-1991-LoboP #optimisation #scheduling
Redundant Operator Creation: A Scheduling Optimization Technique (DAL, BMP), pp. 775–778.
SIGMODSIGMOD-1991-BeckerSW
Spatial Priority Search: An Access Technique for Scaleless Maps (BB, HWS, PW), pp. 128–137.
SIGMODSIGMOD-1991-Jagadish #retrieval
A Retrieval Technique for Similar Shapes (HVJ), pp. 208–217.
SIGMODSIGMOD-1991-KolovsonS #multi
Segment Indexes: Dynamic Indexing Techniques for Multi-Dimensional Interval Data (CPK, MS), pp. 138–147.
PEPMPEPM-1991-Meyer #imperative #partial evaluation
Techniques for Partial Evaluation of Imperative Languages (UM), pp. 94–105.
PLDIPLDI-1991-Jain #pipes and filters #scheduling
Circular Scheduling: A New Technique to Perform Software Pipelining (SJ), pp. 219–228.
FMVDME-1991-1-Jonkers
Upgrading the Pre- and Postcondition Technique (HBMJ), pp. 428–456.
FMVDME-1991-1-ZaveJ #specification
Techniques for Partial Specification and Specification of Switching Systems (PZ, MJ), pp. 511–525.
FPCAFPCA-1991-Chiueh #architecture #garbage collection
An Architectural Technique for Cache-level Garbage Collection (TcC), pp. 520–537.
CHICHI-1991-JeffriesMWU #comparison #evaluation #user interface
User interface evaluation in the real world: a comparison of four techniques (RJ, JRM, CW, KU), pp. 119–124.
CHICHI-1991-LundellN #development #modelling
Human factors in software development: models, techniques, and outcomes (JL, MN), pp. 145–151.
CHICHI-1991-Myers #specification #spreadsheet #user interface #visual notation
Graphical techniques in a spreadsheet for specifying user interfaces (BAM), pp. 243–249.
AdaEuropeAdaEurope-1991-ColombiniTP #ada #realtime
Ada as High Level Language for Real-Time Systems Exploiting RDBMS Techniques (CC, AdT, RP), pp. 384–393.
KDDKDD-1991-ChanW #classification #database #statistics
Statistical Technique for Extracting Classificatory Knowledge from Databases (KCCC, AKCW), pp. 107–124.
KRKR-1991-Baalen #automation #design #satisfiability
The Completeness of DRAT, A Technique for Automatic Design of Satisfiability Procedures (JVB), pp. 514–525.
KRKR-1991-ProvanP
The Utility of Consistency-Based Diagnostic Techniques (GMP, DLP), pp. 461–472.
ICMLML-1991-MartinSC #information management
Knowledge Acquisition Combining Analytical and Empirrcal Techniques (MM, RS, UC), pp. 657–661.
ICMLML-1991-Wixson #composition #learning #scalability
Scaling Reinforcement Learning Techniques via Modularity (LEW), pp. 3368–372.
SIGIRSIGIR-1991-JarvelinN #database #deduction #integration #retrieval
Advanced Retrieval From Heterogeneous Fact Databases: Integration of Data Retrieval, Conversion, Aggregation and Deductive Techniques (KJ, TN), pp. 173–182.
ECOOPECOOP-1991-LippeF #implementation
Implementation Techniques for Integral Version Management (EL, GF), pp. 342–359.
TOOLSTOOLS-USA-1991-Henderson-Sellers #analysis #design
Techniques and Notation for Analysis and Design (BHS), pp. 403–404.
TOOLSTOOLS-USA-1991-Vaishnavi #modelling #object-oriented
Object-Oriented Modeling Techniques (VKV), pp. 347–348.
PPDPPLILP-1991-GiannottiH #detection #recursion #specification
A Technique for Recursive Invariance Detection and Selective Program Specification (FG, MVH), pp. 323–334.
ICSEICSE-1991-Litke #implementation #process #towards
Toward new Techniques to Assess the Software Implementation Process (JDL), pp. 74–82.
CAVCAV-1991-MaoM #automation #equivalence #finite #proving #state machine
An Automated Proof Technique for Finite-State Machine Equivalence (WM, GJM), pp. 233–243.
ICLPICLP-1991-JayaramanN #implementation #logic programming
Implementation Techniques for Scoping Constructs in Logic Programming (BJ, GN), pp. 871–886.
ICLPICLP-1991-KorslootT #compilation #concurrent #logic programming #programming language
Compilation Techniques for Nondeterminate Flat Concurrent Logic Programming Languages (MK, ET), pp. 457–471.
RTARTA-1991-Avenhaus #equation #induction #proving #theorem
Proving Equational and Inductive Theorems by Completion and Embedding Techniques (JA), pp. 361–373.
RTARTA-1991-RameshR #incremental #normalisation #performance #term rewriting
Incremental Techniques for Efficient Normalization of Nonlinear Rewrite Systems (RR, IVR), pp. 335–347.
DACDAC-1990-Bryant #simulation
Symbolic Simulation — Techniques and Applications (REB), pp. 517–521.
DACDAC-1990-MaurerW #simulation
Techniques for Unit-Delay Compiled Simulation (PMM, ZW), pp. 480–484.
DACDAC-1990-SinghC #layout #matrix #order
A Transistor Reordering Technique for Gate Matrix Layout (US, CYRC), pp. 462–467.
PODSPODS-1990-Plambeck #optimisation #query #recursion
Semigroup Techniques in Recursive Query Optimization (TEP), pp. 145–153.
SIGMODSIGMOD-1990-Orenstein #comparison #parametricity #query
A Comparison of Spatial Query Processing Techniques for Native and Parameter Spaces (JAO), pp. 343–352.
ESOPESOP-1990-JourdanP #analysis
Techniques for Improving Grammar Flow Analysis (MJ, DP), pp. 240–255.
STOCSTOC-1990-Vishkin #pattern matching #performance
Deterministic Sampling-A New Technique for Fast Pattern Matching (UV), pp. 170–180.
STOCSTOC-1990-Zuckerman #bound
A Technique for Lower Bounding the Cover Time (DZ), pp. 254–259.
FMVDME-1990-Dahl #object-oriented
Object Orientation and Formal Techniques (OJD), pp. 1–11.
LISPLFP-1990-MohrKH #lazy evaluation #parallel #source code
Lazy Task Creation: A Technique for Increasing the Granularity of Parallel Programs (EM, DAK, RHHJ), pp. 185–197.
CHICHI-1990-DillonET #cost analysis
Measuring the true cost of command selection: techniques and results (RFD, JDE, JWT), pp. 19–26.
CHICHI-1990-Hudson #adaptation #feedback #semantics
Adaptive semantic snaping — a technique for semantic feedback at the lexical level (SEH), pp. 65–70.
CHICHI-1990-Jacob #eye tracking #interactive #what
What you look at is what you get: eye movement-based interaction techniques (RJKJ), pp. 11–18.
CAiSECAiSE-1990-BrinkkemperH #concept #development #requirements #specification
The Conceptual Task Model: a Specification Technique between Requirements Engineering and Program Development (Extended abstract) (SB, AHMtH), pp. 228–250.
ICMLML-1990-LytinenM #comparison #learning
A Comparison of Learning Techniques in Second Language Learning (SLL, CEM), pp. 377–383.
SEKESEKE-1990-KuoSHL #estimation
Applying DSS Techniques in Software Cost Estimation (SCK, GPS, SNH, YSL), pp. 228–233.
SEKESEKE-1990-StovskyW #design #re-engineering
The Role of Traditional Engineering Design Techniques in Software Engineering (MPS, BWW), pp. 84–89.
SIGIRSIGIR-1990-RabittiZ #database #multi
A Dynamic Signature Technique for Multimedia Databases (FR, PZ), pp. 193–210.
OOPSLAOOPSLA-ECOOP-1990-PurchaseW #fault #object-oriented #parallel #specification
Message Pattern Specifications: A New Technique for Handling Errors in Parallel Object Oriented Systems (JAP, RLW), pp. 116–125.
PPDPALP-1990-Batarekh #fixpoint
Fixpoint Techniques for Non-Monotone Maps (AB), pp. 132–143.
CCCC-1990-Dobler #hybrid #parsing #top-down
A Hybrid Top-Down Parsing Technique (Abstract) (HD), pp. 210–211.
CCCC-1990-Kasyanov #programming #tool support
Tools and Techniques of Annotated Programming (VNK), pp. 117–131.
PPoPPPPoPP-1990-TickI #logic programming #parallel #programming language
Programming Techniques for Efficiently Exploiting Parallelism in Logic Programming Languages (ET, NI), pp. 31–39.
CADECADE-1990-OhlbachH #compilation #logic #tutorial
Tutorial on Compilation techniques for Logics (HJO, AH), p. 683.
CAVCAV-1990-BuyM #liveness #proving
A Proof Lattice-Based Technique for Analyzing Liveness of Resource Controllers (UAB, RM), pp. 292–301.
CAVCAV-1990-Clarke #explosion #logic #model checking #problem
Temporal Logic Model Checking: Two Techniques for Avoiding the State Explosion Problem (EMC), p. 1.
ICLPCLP-1990-SchreyeVB90 #detection #graph #horn clause #query #strict #using
A Practical Technique for Detecting Non-terminating Queries for a Restricted Class of Horn Clauses, Using Directed, Weighted Graphs (DDS, KV, MB), pp. 649–663.
ICLPCLP-1990-UedaM90 #haskell #implementation
A New Implementation Technique for Flat GHC (KU, MM), pp. 3–17.
CSLCSL-1990-Vollmer #revisited
The Gap-Language-Technique Revisited (HV), pp. 389–399.
LICSLICS-1990-CleavelandS #proving #specification #using
When is “Partial” Adequate? A Logic-Based Proof Technique Using Partial Specifications (RC, BS), pp. 440–449.
DACDAC-1989-FujiharaSIY #automation #named #optimisation #performance
DYNAJUST: An Efficient Automatic Routing Technique Optimizing Delay Conditions (YF, YS, YI, MY), pp. 791–794.
DACDAC-1989-HerrigelF #optimisation
An Analytic Optimization Technique for Placement of Macro-Cells (AH, WF), pp. 376–381.
SIGMODSIGMOD-1989-CopelandK #comparison
A Comparison Of High-Availability Media Recovery Techniques (GPC, TWK), pp. 98–109.
SIGMODSIGMOD-1989-Swami #combinator #heuristic #optimisation #query #scalability
Optimization of Large Join Queries: Combining Heuristic and Combinatorial Techniques (ANS), pp. 367–376.
PLDIPLDI-1989-BalasundaramK #data access #parallel
A Technique for Summarizing Data Access and Its Use in Parallelism Enhancing Transformations (VB, KK), pp. 41–53.
PLDIPLDI-1989-BernsteinGGKMNP #compilation #optimisation
Spill Code Minimization Techniques for Optimizing Compilers (DB, DQG, MCG, HK, YM, IN, RYP), pp. 258–263.
PLDIPLDI-1989-Venkatesh #evaluation #framework #program analysis #specification
A Framework for Construction and Evaluation of High-Level Specifications for Program Analysis Techniques (GAV), pp. 1–12.
STOCSTOC-1989-ReifS #geometry #named #random
Polling: A New Randomized Sampling Technique for Computational Geometry (JHR, SS), pp. 394–404.
ICALPICALP-1989-Allender
Limitations of the Upward Separation Technique (Preliminary Version) (EA), pp. 18–30.
ICALPICALP-1989-EppsteinG #algorithm #combinator #parallel
Parallel Algorithmic Techniques for Combinatorial Computation (DE, ZG), pp. 304–318.
ICALPICALP-1989-Parisi-Presicce #composition #design #graph grammar
Modular System Design Applying Graph Grammars Techniques (FPP), pp. 621–636.
ICALPICALP-1989-Toran #combinator #complexity
A Combinatorial Technique for Separating Counting Complexity Classes (JT), pp. 733–744.
CHICHI-1989-Gutierrez #problem #prototype
Prototyping techniques for different problem contexts (OG), pp. 259–264.
CAiSECAiSE-1989-Rolland #automation #future of #modelling #on the #tool support #why
On the Future of Modelling — Why Current CASE Tools Insist on Supporting 20 Years Old Methods and Techniques (CR).
OOPSLAOOPSLA-1989-RussoC #design #memory management #multi #object-oriented #operating system #using
Virtual Memory and Backing Storage Management in Multiprocessor Operating Systems Using Object-Oriented Design Techniques (VFR, RHC), pp. 267–278.
ICSEICSE-1989-YoungT #detection #fault #taxonomy
Rethinking the Taxonomy of Fault Detection Techniques (MY, RNT), pp. 53–62.
ASPLOSASPLOS-1989-GibsonHKKP #array #scalability
Failure Correction Techniques for Large Disk Arrays (GAG, LH, RMK, RHK, DAP), pp. 123–132.
SOSPSOSP-1989-BoloskyFS #effectiveness #memory management
Simple But Effective Techniques for NUMA Memory Management (WJB, RPF, MLS), pp. 19–31.
SOSPSOSP-1989-HutchinsonPAO #design #kernel
RPC in the x-Kernel: Evaluating New Design Techniques (NCH, LLP, MBA, SWO), pp. 91–101.
ICLPNACLP-1989-InamuraIRN #evaluation #multi #optimisation #using
Optimizing Techniques Using the MRB and Their Evaluation on the Multi-PSI/V2 (YI, NI, KR, KN), pp. 907–921.
ICLPNACLP-1989-Lakhotia #programming #prolog #source code
Incorporating “Programming Techniques” into Prolog Programs (AL), pp. 426–440.
RTARTA-1989-AvenhausDM #named #performance #proving #theorem proving
THEOPOGLES — An efficient Theorem Prover based on Rewrite-Techniques (JA, JD, JM), pp. 538–541.
RTARTA-1989-Reddy #synthesis
Rewriting Techniques for Program Synthesis (USR), pp. 388–403.
ISSTATAV-1989-RichardsonAO #process #programming #testing
Integrating Testing Techniques Through Process Programming (DJR, SLA, LJO), pp. 219–228.
DACDAC-1988-Zimmerman #estimation
A New Area and Shape Function Estimation Technique for VLSI Layouts (GZ), pp. 60–65.
SIGMODSIGMOD-1988-KumarS #semantics #transaction
Semantics Based Transaction Management Techniques for Replicated Data (AK, MS), pp. 117–125.
VLDBVLDB-1988-SeegerK #data access #design #implementation #performance
Techniques for Design and Implementation of Efficient Spatial Access Methods (BS, HPK), pp. 360–371.
ESOPESOP-1988-AikenN #parallel #pipes and filters
Perfect Pipelining: A New Loop Parallelization Technique (AA, AN), pp. 221–235.
ESOPESOP-1988-GiegerichS #parsing #pattern matching
Code Selection Techniques: Pattern Matching, Tree Parsing, and Inversion of Derivors (RG, KS), pp. 247–268.
PLDIPLDI-1988-Lam #effectiveness #pipes and filters #scheduling
Software Pipelining: An Effective Scheduling Technique for VLIW Machines (MSL), pp. 318–328.
PLDIBest-of-PLDI-1988-Lam88a #effectiveness #pipes and filters #scheduling
Software pipelining: an effective scheduling technique for VLIW machines (with retrospective) (MSL), pp. 244–256.
ICALPICALP-1988-Culik #decidability #equivalence #problem #proving
New Techniques for Proving the Decidability of Equivalence Problems (KCI), pp. 162–175.
SIGIRSIGIR-1988-JacobsR #information retrieval #natural language
Natural Language Techniques for Intelligent Information Retrieval (PSJ, LFR), pp. 85–99.
ICSEICSE-1988-DucasseE #automation #bibliography #debugging
A Review of Automated Debugging Systems: Knowledge, Strategies, and Techniques (MD, AME), pp. 162–173.
PPoPPPPEALS-1988-GuptaS #parallel #performance
Compile-time Techniques for Efficient Utilization of Parallel Memories (RG, MLS), pp. 235–246.
ICLPJICSCP-1988-Waern88 #abstract interpretation #implementation #prolog
An Implementation Technique for the Abstract Interpretation of Prolog (AW), pp. 700–710.
LICSLICS-1988-DershowitzO #term rewriting
Proof-Theoretic Techniques for Term Rewriting Theory (ND, MO), pp. 104–111.
DACDAC-1987-ChandrasekharPC #design #hardware #term rewriting #verification
Application of Term Rewriting Techniques to Hardware Design Verification (MSC, JPP, KWC), pp. 277–282.
DACDAC-1987-KoukaS #data analysis #design
An Application of Exploratory Data Analysis Techniques to Floorplan Design (EFMK, GS), pp. 654–658.
DACDAC-1987-KrasniewskiP #low cost #self
Circular Self-Test Path: A Low-Cost BIST Technique (AK, SP), pp. 407–415.
DACDAC-1987-Subrahmanyam #deduction #named
LCS — A Leaf Cell Synthesizer Employing Formal Deduction Techniques (PAS), pp. 459–465.
VLDBVLDB-1987-Gardarin #datalog #recursion #source code
Magic Functions: A Technique to Optimize Extended Datalog Recursive Programs (GG), pp. 21–30.
VLDBVLDB-1987-NoeW #concurrent #performance
Measured Performance of Time Interval Concurrency Control Techniques (JDN, DBW), pp. 359–367.
PLDIPLDI-1987-ChaseH #debugging #source code
Selective interpretation as a technique for debugging computationally intensive programs (BBC, RTH), pp. 113–124.
SIGIRSIGIR-1987-ChouekaFKS #query
Improved Techniques for Processing Queries in Full-Text Systems (YC, ASF, STK, ES), pp. 306–315.
ECOOPECOOP-1987-LoomisSR #concept #design #modelling
An Object Modelling Technique for Conceptual Design (MESL, AVS, JER), pp. 192–202.
ESECESEC-1987-HennellHR #automation #embedded #realtime #testing
Automated Testing Techniques for Real-Time Embedded Software (MAH, DH, IJR), pp. 244–253.
ESECESEC-1987-Obst #string
Delta Technique and String-to-String Correction (WO), pp. 64–68.
ICSEICSE-1987-Royce #concept #development #scalability
Managing the Development of Large Software Systems: Concepts and Techniques (WWR), pp. 328–339.
ASPLOSASPLOS-1987-WeissS #case study #compilation #pipes and filters
A Study of Scalar Compilation Techniques for Pipelined Supercomputers (SW, JES), pp. 105–109.
RTARTA-1987-Rety
Improving Basic Narrowing Techniques (PR), pp. 228–241.
ICLPSLP-1987-SekiF87 #logic programming #source code
Notes on Transformation Techniques for Generate and Test Logic Programs (HS, KF), pp. 215–223.
DACDAC-1986-HwangKN #modelling #verification
An accuration delay modeling technique for switch-level timing verification (SHH, YHK, ARN), pp. 227–233.
DACDAC-1986-McFarland #behaviour #bottom-up #design #hardware #synthesis #using
Using bottom-up design techniques in the synthesis of digital hardware from abstract behavioral descriptions (MCM), pp. 474–480.
DACDAC-1986-PreasK #automation #bibliography #tutorial
Automatic placement a review of current techniques (tutorial session) (BP, PGK), pp. 622–629.
VLDBVLDB-1986-ValduriezKC #implementation
Implementation Techniques of Complex Objects (PV, SK, GPC), pp. 101–110.
ESOPESOP-1986-GlaserH #implementation
Another Implementation Technique for Applicative Languages (HG, SH), pp. 70–81.
STOCSTOC-1986-ColeV #algorithm #design #metaprogramming #parallel
Deterministic coin tossing and accelerating cascades: micro and macro techniques for designing parallel algorithms (RC, UV), pp. 206–219.
LISPLFP-1986-FairbairnW #code generation #functional
Code Generation Techniques for Functional Languages (JF, SW), pp. 94–104.
SIGIRSIGIR-1986-JacoG #information retrieval
An Information Retrieval System Based on Artificial Intelligence Techniques (DDJ, GG), pp. 214–220.
SIGIRSIGIR-1986-Thurmair #architecture #information retrieval
A Common Architecture for Different Text Processing Techniques in an Information Retrieval Environment (GT), pp. 138–143.
OOPSLAOOPSLA-1986-Ingalls #morphism #multi #polymorphism
A Simple Technique for Handling Multiple Polymorphism (DHHI), pp. 347–349.
DACDAC-1985-Camposano #design #synthesis
Synthesis techniques for digital systems design (RC), pp. 475–481.
DACDAC-1985-HughesLR #automation #design #distributed #execution #tool support
A technique for distributed execution of design automation tools (SCH, DBL, CJR), pp. 23–30.
DACDAC-1985-MiyoshiKTNA #logic #simulation
Speed up techniques of logic simulation (MM, YK, OT, YN, NA), pp. 812–815.
DACDAC-1985-OdawaraIW #knowledge-based
Knowledge-based placement technique for printed wiring boards (GO, KI, KW), pp. 616–622.
SIGMODSIGMOD-1985-EickL #database #design #using
Acquisition of Terminological Knowledge Using Database Design Techniques (CFE, PCL), pp. 84–94.
SIGMODSIGMOD-1985-FushimiKNTM #adaptation #algorithm #clustering #evaluation #multi #performance
Algorithm and Performance Evaluation of Adaptive Multidimensional Clustering Technique (SF, MK, MN, HT, TMO), pp. 308–318.
SIGMODSIGMOD-1985-OzsoyogluOM #physics #summary
A Language and a Physical Organization Technique for Summary Tables (, ZMÖ, FM), pp. 3–16.
ICALPICALP-1985-ChazelleG #geometry
Fractional Cascading: A Data Structuring Technique with Geometric Applications (BC, LJG), pp. 90–100.
ICALPICALP-1985-Gunter
A Universal Domain Technique for Profinite Posets (CAG), pp. 232–243.
ICSEICSE-1985-Tavendale #prototype #specification
A Technique for Prototyping Directly from a Specification (RDT), pp. 224–229.
ICLPSLP-1985-Narain85 #evaluation #lazy evaluation #logic
A Technique for Doing Lazy Evaluation in Logic (SN), pp. 261–269.
DACDAC-1984-DasguptaGRWW #clustering #design #testing
Chip partitioning aid: A design technique for partitionability and testability in VLSI (SD, MCG, RAR, RGW, TWW), pp. 203–208.
DACDAC-1984-GuillaumeK #named #proximity
MINUPROX — an advanced proximity correction technique for the IBM EL-2 electron beam tool (WJG, AK), pp. 452–453.
DACDAC-1984-MarkovFB #2d #optimisation
Optimization techniques for two-dimensional placement (LAM, JRF, JHB), pp. 652–654.
DACDAC-1984-SuL #functional #testing
Functional testing techniques for digital LSI/VLSI systems (SYHS, TL), pp. 517–528.
SIGMODSIGMOD-1984-DeWittKOSSW #database #implementation #in memory #memory management
Implementation Techniques for Main Memory Database Systems (DJD, RHK, FO, LDS, MS, DAW), pp. 1–8.
SIGMODSIGMOD-1984-Fedorowicz #database #evaluation #multi #using
Database Evaluation Using Multiple Regression Techniques (JF), pp. 70–76.
PLDISCC-1984-KellerPPM #case study #experience
Tree transformation techniques and experiences (SEK, JAP, TFP, SPM), pp. 190–201.
STOCSTOC-1984-GabowBT #geometry #problem #scalability
Scaling and Related Techniques for Geometry Problems (HNG, JLB, RET), pp. 135–143.
STOCSTOC-1984-HochbaumS #approximate #graph #problem
Powers of Graphs: A Powerful Approximation Technique for Bottleneck Problems (DSH, DBS), pp. 324–333.
STOCSTOC-1984-VardiW #automaton #logic #source code
Automata Theoretic Techniques for Modal Logics of Programs (Extended Abstract) (MYV, PW), pp. 446–456.
SIGIRSIGIR-1984-Zarri #information retrieval
Some Remarks About the Inference Techniques of RESEDA, an “Intelligent” Information Retrieval System (GPZ), pp. 281–300.
CADECADE-1984-KapurK #proving
A Natural Proof System Based on rewriting Techniques (DK, BK), pp. 53–64.
ICLPSLP-1984-UeharaOKT84 #bibliography #bottom-up #implementation #logic #parsing
A Bottom-Up Parser Based on Predicate Logic: A Survey of the Formalism and its Implementation Technique (KU, RO, OK, JT), pp. 220–227.
DACDAC-1983-KedemW #layout
Graph-optimization techniques for IC layout and compaction (GK, HW), pp. 113–120.
DACDAC-1983-OdawaraIK #clustering
Partitioning and placement technique for bus-structured PWB (GO, KI, TK), pp. 449–456.
DACDAC-1983-ShellyT #statistics #verification
Statistical techniques of timing verification (JHS, DRT), pp. 396–402.
PODSPODS-1983-HsuM #composition #concurrent #database
Hierarchical Database Decomposition — A Technique for Database Concurrency Control (MH, SEM), pp. 182–191.
PODSPODS-1983-ImielinskiL #database #problem #relational
Inverting Relational Expressions — A Uniform and Natural Technique for Various Database Problems (TI, WLJ), pp. 305–311.
STOCSTOC-1983-Gabow #network #performance #problem #reduction
An Efficient Reduction Technique for Degree-Constrained Subgraph and Bidirected Network Flow Problems (HNG), pp. 448–456.
SIGIRSIGIR-1983-Croft #information retrieval
Applications for Information Retrieval Techniques in the Office (WBC), pp. 18–23.
SIGIRSIGIR-1983-Kukich #automation #database #generative #knowledge-based #natural language
Knowledge-Based Report Generations: A Technique for Automatically Generating Natural Language Reports from Databases (KK), pp. 246–250.
SIGIRSIGIR-1983-Zarri #information management #information retrieval #representation #using
Reseda, An Information Retrieval System Using Artificial Intelligence and Knowledge Representation Techniques (GPZ), pp. 189–195.
DACDAC-1982-DeesK #automation
Automated rip-up and reroute techniques (WADJ, PGK), pp. 432–439.
DACDAC-1982-HachtelNS #array #logic #programmable
Techniques for programmable logic array folding (GDH, ARN, ALSV), pp. 147–155.
DACDAC-1982-KawatoUHS #interactive #logic #synthesis
An interactive logic synthesis system based upon AI techniques (NK, TU, SH, TS), pp. 858–864.
DACDAC-1982-MaruyamaUKS #design #hardware #verification
A verification technique for hardware designs (FM, TU, NK, TS), pp. 832–841.
DACDAC-1982-MudgeRLA #image #layout #validation
Cellular image processing techniques for VLSI circuit layout validation and routing (TNM, RAR, RML, DEA), pp. 537–543.
DACDAC-1982-OdawaraIK
Arbitrarily-sized module location technique in the lop system (GO, KI, TK), pp. 718–726.
SIGMODSIGMOD-1982-ImielinskiL82a #database
A Technique for Translating States Between Database Schemata (TI, WLJ), pp. 61–68.
SIGMODSIGMOD-1982-Longstaff #named #query
ERQ: Controlled Inference and Instruction Techniques for DBMS Query Languages (JL), pp. 111–117.
SIGMODSIGMOD-1982-X #multi
A Multi-Group Technique for Data Compression (KAH, MAB), pp. 284–292.
PLDISCC-1982-Kipps #cobol #compilation #experience #migration
Experience with Porting Techniques on a COBOL 74 Compiler (IMK), pp. 15–21.
STOCSTOC-1982-PachlKR #algorithm #bound #distributed #proving
A Technique for Proving Lower Bounds for Distributed Maximum-Finding Algorithms (JKP, EK, DR), pp. 378–382.
SIGIRSIGIR-1982-RaghavanI #case study #clustering #comparative
Techniques for Measuring the Stability of Clustering: A Comparative Study (VVR, MYLI), pp. 209–237.
ICSEICSE-1982-RappsW #analysis #data flow #testing
Data Flow Analysis Techniques for Test Data Selection (SR, EJW), pp. 272–278.
ICLPILPC-1982-BarbutiDL82 #logic programming #proving #source code #towards
Toward an Inductionless Technique for Proving Properties of Logic Programs (RB, PD, GL), pp. 175–181.
DACDAC-1981-Krohn #simulation
Vector coding techniques for high speed digital simulation (HEK), pp. 525–529.
DACDAC-1981-Sherwood #logic #modelling #simulation
A MOS modelling technique for 4-state true-value hierarchical logic simulation or Karnough knowledge (WS), pp. 775–785.
VLDBVLDB-1981-EggersOS #scalability #statistics
A Compression Technique for Large Statistical Data-Bases (SJE, FO, AS), pp. 424–434.
VLDBVLDB-1981-Soderlund #assessment #concurrent #database #modelling
Concurrent Data Base Reorganization — Assessment of a Powerful Technique through Modeling (LS), pp. 499–509.
SIGIRSIGIR-1981-StorerE #clustering #validation
Experiments on the Application of Clustering Techniques to Data Validation (Abstract) (WFS, CME), pp. 88–89.
DACDAC-1980-CoxC #array #automation #standard
The Standard Transistor Array (star) (Part II automatic cell placement techniques) (GWC, BDC), pp. 451–457.
DACDAC-1980-ShiraishiH #performance #slicing
Efficient placement and routing techniques for master slice LSI (HS, FH), pp. 458–464.
DACDAC-1980-Ulrich #flexibility #logic #performance #simulation
Table lookup techniques for fast and flexible digital logic simulation (EU), pp. 560–563.
DACDAC-1980-Yates #analysis #design #metric #process
Design process analysis: A measurement and analysis technique (KDY), pp. 420–421.
SIGMODSIGMOD-1980-ChangF #clustering #database #design #physics
A Dynamic Clustering Technique for Physical Database Design (JMC, KsF), pp. 188–199.
LISPLISP-1980-Marti #compilation #concurrent #control flow #lisp
Compilation Techniques for a Control-Flow Concurrent LISP System (JM), pp. 203–207.
DACDAC-1979-CarlsonPC #3d #data transformation #design
The use of color and 3-D temporal and spatial data management techniques in computer-aided design (WEC, REP, CC), pp. 32–38.
DACDAC-1979-Chang #layout #recognition #using
LSI layout checking using bipolar device recognition technique (CSC), pp. 95–101.
DACDAC-1979-Darringer #hardware #verification
The application of program verification techniques to hardware verification (JAD), pp. 375–381.
DACDAC-1979-Harvel #automation #design #effectiveness
Cost effective data entry techniques for design automation (JTH), p. 382.
DACDAC-1979-Johnson79a #layout
PC board layout techniques (DRJ), pp. 337–343.
DACDAC-1979-Sherwood #hybrid #logic #scheduling
A hybrid scheduling technique for hierarchical logic simulators or “Close Encounters of the Simulated Kind” (WS), pp. 249–254.
STOCSTOC-1979-Berman #axiom #semantics
A Completeness Technique for D-Axiomatizable Semantics (FB), pp. 160–166.
SIGIRSIGIR-1979-Jamieson #implementation #retrieval #scalability #using
The Economic Implementation of Experimental Retrieval Techniques on a Very Large Scale Using an Intelligent Terminal (SHJ), pp. 45–51.
ICSEICSE-1979-BelfordBH #case study #development #effectiveness #re-engineering
Central Flow Control Software Development: A Case Study of the Effectiveness of Software Engineering Techniques (PCB, RAB, TLH), pp. 85–93.
ICSEICSE-1979-LauberBGS #automation #design #realtime #specification
EPOS : A Specification and Design Technique for Computer Controlled Real-time Automation Systems (RL, JB, PG, HS), pp. 245–250.
ICSEICSE-1979-Ploedereder #program analysis #verification
Pragmatic Techniques for Program Analysis and Verification (EP), pp. 63–72.
ICSEICSE-1979-Scowen #quality #source code
A New Technique for Improving the Quality of Computer Programs (RSS), pp. 73–78.
DACDAC-1978-Dasarathy #automation #design
Automated techniques for product-grading systems design (BVD), pp. 290–296.
DACDAC-1978-Larsen #generative
Versatile mask generation techniques for custom microelectronic devices (RPL), pp. 193–198.
DACDAC-1978-Marlett #generative #named #testing
EBT: A comprehensive test generation technique for highly sequential circuits (RM), pp. 335–339.
DACDAC-1978-ShahY #cost analysis #design
A practical technique for benefit-cost analysis of Computer-Aided Design and Drafting Systems (RRS, GYY).
DACDAC-1978-TokoroSITIO #simulation
A module level simulation technique for systems composed of LSI’s and MSI’s (MT, MS, MI, ET, TI, HO), pp. 418–427.
VLDBVLDB-1978-Ashany #analysis #classification #database #matrix #retrieval #scalability
Application of Sparse Matrix Techniques to Search, Retrieval, Classification and Relationship Analysis in Large Data Base Systems — SPARCOM (RA), pp. 499–516.
VLDBVLDB-1978-Schkolnick #bibliography #database #design #physics
A Survey of Physical Database Design Methodology and Techniques (MS), pp. 474–487.
STOCSTOC-1978-Miller #morphism #on the
On the n^log n Isomorphism Technique: A Preliminary Report (GLM), pp. 51–58.
STOCSTOC-1978-ThatcherWW #data type #power of #specification
Data Type Specification: Parameterization and the Power of Specification Techniques (JWT, EGW, JBW), pp. 119–132.
DACDAC-1977-ArmstrongW #simulation
Simulation techniques for microprocessors (JRA, GW), pp. 225–229.
DACDAC-1977-RuehliSG #optimisation
Analytical power/timing optimization technique for digital system (AER, PKWS, GG), pp. 142–146.
DACDAC-1977-Smith77a #automation #design #re-engineering #tutorial
Software engineering techniques in design automation&madash;a tutorial (RJSI), pp. 495–507.
STOCSTOC-1977-GonnetM #analysis
The Analysis of an Improved Hashing Technique (GHG, JIM), pp. 113–121.
DACDAC-1976-GoldsteinL #optimisation
Common feature techniques for discrete optimization (AJG, ABL), pp. 232–244.
DACDAC-1976-HananSA
Some experimental results on placement techniques (MH, PKWS, BJA), pp. 214–224.
DACDAC-1976-JonesN #assessment #programming
A quantitative assessment of IBM’s programming productivity techniques (LCJ, DAN), pp. 344–353.
DACDAC-1976-Robinson #specification
Specification techniques (LR), pp. 470–478.
DACDAC-1976-RozeboomC #generative #implementation #testing
An implementation of computer aided test generation techniques (RWR, JJC), pp. 194–202.
DACDAC-1976-WilsonS #comparison
An analytic technique for router comparison (DCW, RJSI), pp. 251–258.
POPLPOPL-1976-LowR #automation #data type
Techniques for the Automatic Selection of Data Structures (JRL, PR), pp. 58–67.
ICSEICSE-1976-BensonM #development #evaluation #quality
A Laboratory for the Development and Evaluation of BMD Software Quality Enhancement Techniques (JPB, RAM), pp. 106–109.
ICSEICSE-1976-GerhartY #abstraction #backtracking #programming
Control Structure Abstractions of the Backtracking Programming Technique (Abstract) (SLG, LY), p. 391.
ICSEICSE-1976-MasheyS #documentation #tool support
Documentation Tools and Techniques (JRM, DWS), pp. 177–181.
ICSEICSE-1976-TeichroewH #analysis #documentation #information management #named
PSL/PSA: A Computer-Aided Technique for Structured Documentation and Analysis of Information Processing Systems (Abstract) (DT, EAHI), p. 2.
DACDAC-1975-Bern #experience
John Hancock’s experience with productivity techniques (NFB), pp. 62–68.
DACDAC-1975-BlainLR #industrial
The system bal: a technique for spreading the use of CAD techniques within an industrial environment (GB, AL, JCR), pp. 77–84.
DACDAC-1975-ThompsonB75a #implementation #logic #multi #re-engineering #simulation
The software engineering technique of data hiding as applied to multi-level model implementation of logical devices in digital simulation (EWT, NB), pp. 195–201.
DACDAC-1975-Valle #layout #relational
Relational data handling techniques in integrated circuit mask layout procedures (GV), pp. 407–413.
STOCSTOC-1975-Fredman #probability #sorting
Two Applications of a Probabilistic Search Technique: Sorting x + y and Building Balanced Search Trees (MLF), pp. 240–244.
DACDAC-1974-DudnikS
A computer aided land use study technique (EED, WS), pp. 237–247.
DACDAC-1974-Rubin
An iterative technique for printed wire routing (FR), pp. 308–313.
DACDAC-1974-Wang #algorithm #clustering
A partitioning technique for LSI chips including a bunching algorithm (PTW), p. 91.
DACDAC-1974-WilsonS #comparison
An experimental comparison of force directed placement techniques (DCW, RJSI), pp. 194–199.
SIGMODSIGFIDET-1974-Whitney #data transformation #implementation #relational
Relational Data Management Implementation Techniques (VKMW), pp. 321–350.
ICALPICALP-1974-Lang #nondeterminism #parsing #performance
Deterministic Techniques for Efficient Non-Deterministic Parsers (BL), pp. 255–269.
DACDAC-1973-SzygendaL #functional #logic #simulation
Integrated techniques for functional and gate-level digital logic simulation (SAS, AAL), pp. 159–172.
DACDAC-1972-Grant #architecture #design #problem #proximity #using
Combining proximity criteria with nature-of-the-spot criteria in architectural and urban design space planning problems using a computer-aided space allocation technique: A proposed technique and an example of its application (DPG), pp. 197–202.
DACDAC-1972-MahS
Techniques of gate assignment (LM, LS), pp. 63–71.
DACDAC-1972-UlrichBW #analysis #logic #simulation
Fault-test analysis techniques based on logic simulation (EGU, TEB, LRW), pp. 111–115.
SIGMODSIGFIDET-1972-BachmanB #architecture #process
Architecture Definition Technique: Its Objectives Theory, Process, Facilities and Practice (CWB, JB), pp. 257–305.
STOCSTOC-1972-AhoU #lr #parsing
A Technique for Speeding Up LR(k) Parsers (AVA, JDU), pp. 251–263.
ICALPICALP-1972-WeissMS #algebra #context-free grammar #parsing
Algebraic Parsing Techniques for Context-Free Languages (SFW, GM, DFS), pp. 493–498.
DACDAC-1971-White #layout #named
RELATE: Relationship layout technique (RNW), p. 221.
SIGIRSIGIR-1971-MulfordR #scalability
Data Compression Techniques for Economic Processing of Large Commercial Files (JEM, RKR), pp. 207–215.
DACDAC-1969-Dov #research #simulation
Misuse and limitations of simulation as a business research technique: Some comments (AGBD), pp. 323–331.
DACDAC-1969-Sr #modelling
Cellular wiring and the cellular modeling technique (RBHS), pp. 25–41.
DACDAC-1968-KlemetsmoMW #automation #process
Graphic display techniques in the automated interconnection process (RRK, GAM, AIW).
DACDAC-1967-Malakoff #analysis
Coupling graphics and circuit analysis techniques (JLM).
DACSHARE-1966-Feigin #design #optimisation
Use of design optimization techniques at Norden (LF).
DACSHARE-1965-Fountain #requirements #simulation #testing
A general computer simulation technique for assessments and testing requirements (JHF).
DACSHARE-1965-Morrissey
System techniques for time-sharing (JHM).

Bibliography of Software Language Engineering in Generated Hypertext (BibSLEIGH) is created and maintained by Dr. Vadim Zaytsev.
Hosted as a part of SLEBOK on GitHub.