2008 papers:
- CASE-2015-FeiAR #bound #clustering #resource management #symbolic computation #using
- Symbolic computation of boundary unsafe states in complex resource allocation systems using partitioning techniques (ZF, KÅ, SAR), pp. 799–806.
- CASE-2015-NguyenLK #composition #problem
- Decomposition techniques for urban consolidation problems (DTN, HCL, AK), pp. 57–62.
- CASE-2015-SrinivasanBSSR #automation #machine learning #modelling #network #using
- Modelling time-varying delays in networked automation systems with heterogeneous networks using machine learning techniques (SS, FB, GS, BS, SR), pp. 362–368.
- DAC-2015-ChenCX #classification #named #power management #video
- DaTuM: dynamic tone mapping technique for OLED display power saving based on video classification (XC, YC, CJX), p. 6.
- DAC-2015-LahiouelZT #smt #towards #using
- Towards enhancing analog circuits sizing using SMT-based techniques (OL, MHZ, ST), p. 6.
- DATE-2015-ChenWLL #debugging
- A breakpoint-based silicon debug technique with cycle-granularity for handshake-based SoC (HCC, CRW, KSML, KJL), pp. 1281–1284.
- DATE-2015-CourbonLFT #detection #hardware #performance
- A high efficiency hardware trojan detection technique based on fast SEM imaging (FC, PLM, JJAF, AT), pp. 788–793.
- DATE-2015-DiaoLWW #reduction
- A coupling area reduction technique applying ODC shifting (YD, TKL, XW, YLW), pp. 1461–1466.
- DATE-2015-LiXWNP #fine-grained #multi #power management #reduction #using
- Leakage power reduction for deeply-scaled FinFET circuits operating in multiple voltage regimes using fine-grained gate-length biasing technique (JL, QX, YW, SN, MP), pp. 1579–1582.
- DATE-2015-MuzaffarYSE #power management
- A pulsed-index technique for single-channel, low-power, dynamic signaling (SM, JY, AS, IAME), pp. 1485–1490.
- DATE-2015-RaiT #manycore #modelling
- A calibration based thermal modeling technique for complex multicore systems (DR, LT), pp. 1138–1143.
- SIGMOD-2015-IdreosPC #bibliography #data analysis
- Overview of Data Exploration Techniques (SI, OP, SC), pp. 277–281.
- VLDB-2015-EldawyAM #clustering
- Spatial Partitioning Techniques in Spatial Hadoop (AE, LA, MFM), pp. 1602–1613.
- ITiCSE-2015-KloosAP
- Tips and Techniques for MOOC Production (CDK, CAH, MPS), p. 329.
- ICSME-2015-NittaM #abstraction #why
- Delta extraction: An abstraction technique to comprehend why two objects could be related (NN, TM), pp. 61–70.
- SANER-2015-TianL #case study #comparative #debugging #effectiveness
- A comparative study on the effectiveness of part-of-speech tagging techniques on bug reports (YT, DL), pp. 570–574.
- SEFM-2015-ColomboDF #runtime #verification
- Investigating Instrumentation Techniques for ESB Runtime Verification (CC, GD, AF), pp. 99–107.
- SEFM-2015-RockaiSB #c #c++ #model checking
- Techniques for Memory-Efficient Model Checking of C and C++ Code (PR, VS, JB), pp. 268–282.
- GaM-2015-Moreau #graph
- Aggregation by Provenance Types: A Technique for Summarising Provenance Graphs (LM), pp. 129–144.
- CHI-2015-AchibetCLM #3d #interactive #modelling #named
- THING: Introducing a Tablet-based Interaction Technique for Controlling 3D Hand Models (MA, GC, AL, MM), pp. 317–326.
- CHI-2015-DamianTBSLA #behaviour #feedback #interactive #realtime #social #using
- Augmenting Social Interactions: Realtime Behavioural Feedback using Social Signal Processing Techniques (ID, CSST, TB, JS, KL, EA), pp. 565–574.
- CHI-2015-Gilbert #abstraction
- Open Book: A Socially-inspired Cloaking Technique that Uses Lexical Abstraction to Transform Messages (EG), pp. 477–486.
- CHI-2015-GuillonLN #visual notation
- Investigating Visual Feedforward for Target Expansion Techniques (MG, FL, LN), pp. 2777–2786.
- CHI-2015-LoboPA #comparison #evaluation #interactive
- An Evaluation of Interactive Map Comparison Techniques (MJL, EP, CA), pp. 3573–3582.
- CHI-2015-LoeppH0 #algorithm #information management #interactive #recommendation
- Blended Recommending: Integrating Interactive Information Filtering and Algorithmic Recommender Techniques (BL, KH, JZ), pp. 975–984.
- CHI-2015-PandeyRSNB #analysis #empirical #how #visualisation
- How Deceptive are Deceptive Visualizations?: An Empirical Analysis of Common Distortion Techniques (AVP, KR, MLS, ON, EB), pp. 1469–1478.
- CHI-2015-TangYBJT #feedback #visual notation
- Physio@Home: Exploring Visual Guidance and Feedback Techniques for Physiotherapy Exercises (RT, XDY, SB, JAJ, AT), pp. 4123–4132.
- DHM-EH-2015-KanazawaOWWTGH15a #analysis #experience
- Experience Factors Influence on Motion Technique of “The Way of Tea” by Motion Analysis (SK, TO, ZW, TW, YT, AG, HH), pp. 155–163.
- DHM-HM-2015-EndoYASSH #difference #process
- Effect of Skill Level Difference in the Polishing Process of the Maki-e Making Technique (AE, HY, CA, TS, YS, HH), pp. 24–34.
- DHM-HM-2015-KawabataXGH #comparison
- Comparison of KEMOMI Technique Between Master Craftsman and Unskilled Worker (SK, ZX, AG, HH), pp. 316–323.
- DHM-HM-2015-MigakiOTMKIH #experience
- The Relationship Between Mechanical Properties and the Method Technique of GFRP Plate by Hand Lay-up Method: Effect of the Workers Experience (MM, KO, RT, YM, EK, DI, HH), pp. 143–153.
- DHM-HM-2015-SuzukiKTGH
- An Investigation on Skillful Gel-Coat Techniques and its Application to Beginner’s Application (ES, TK, YT, AG, HH), pp. 182–191.
- DUXU-DD-2015-Fernandez #analysis #health #human-computer #interactive
- Interactive Digital Storytelling and HCI Techniques Applied for Edutainment in Interactive Health Projects: Analysis of Two USC’s Labyrinth Projects (JIMF), pp. 621–633.
- DUXU-IXD-2015-DasBRD #co-evolution #design #generative
- The Use of Generative Techniques in Co-design of mHealth Technology and Healthcare Services for COPD Patients (AD, SB, JR, YD), pp. 587–595.
- HCI-DE-2015-NakatsujiYKT #towards
- Airway Cursor: A Pointing Technique Based on Direction of Mouse Movement Towards a Targets (TN, KY, IK, YT), pp. 396–404.
- HCI-IT-2015-MullerLBSKSW #bibliography #data-driven #network #predict #using
- Using Neural Networks for Data-Driven Backchannel Prediction: A Survey on Input Features and Training Techniques (MM, DL, LB, MS, KK, SS, AW), pp. 329–340.
- HCI-UC-2015-Obwegeser #development #matter #why
- Entrepreneurial IS Development: Why Techniques Matter and Methods Don’t (NO), pp. 218–225.
- HIMI-IKC-2015-MatsudaOHT #analysis #automation #generative #multi #problem #testing #using
- Analysis of Multiple-Choice Tests Through Erroneous Choices Using a Technique of Automatic Problem Generation (NM, HO, TH, HT), pp. 362–369.
- HIMI-IKD-2015-YoshinoO #using
- Proposal of a Data Presentation Technique Using Four-Frame Cartoon Expression for a LifeLog System (TY, IO), pp. 235–246.
- LCT-2015-Sein-EchaluceBG #education #information management #social #using
- A Knowledge Management System to Classify Social Educational Resources Within a Subject Using Teamwork Techniques (MLSE, ÁFB, FJGP, MÁCG), pp. 510–519.
- SCSM-2015-ManssourSSFS #image #network #social #using #visualisation
- Using Information Visualization Techniques to Improve the Perception of the Organizations’ Image on Social Networks (IHM, MSS, CQS, AJF, FTS), pp. 55–66.
- CAiSE-2015-WeilerGS #detection #performance #runtime #twitter
- Run-Time and Task-Based Performance of Event Detection Techniques for Twitter (AW, MG, MHS), pp. 35–49.
- ICEIS-v1-2015-AnjosFBSGM #big data #search-based
- Genetic Mapping of Diseases through Big Data Techniques (JCSdA, BRF, JFB, RBS, CG, UM), pp. 279–286.
- ICEIS-v1-2015-BedoBOCCRTT #detection #effectiveness #image #performance #social #social media
- Techniques for Effective and Efficient Fire Detection from Social Media Images (MVNB, GB, WDO, MTC, AFC, JFRJ, AJMT, CTJ), pp. 34–45.
- ICEIS-v1-2015-PfaffK #automation #benchmark #classification #documentation #identification #metric #natural language
- Natural Language Processing Techniques for Document Classification in IT Benchmarking — Automated Identification of Domain Specific Terms (MP, HK), pp. 360–366.
- ICEIS-v1-2015-SouzaBGBE #learning #online
- Applying Ensemble-based Online Learning Techniques on Crime Forecasting (AJdS, APB, HMG, JPB, FE), pp. 17–24.
- ICEIS-v2-2015-KustersMT #agile #development #fault #injection
- The Impact of Lean Techniques on Factors Influencing Defect Injection in Software Development (RJK, FMM, JJMT), pp. 412–419.
- ICEIS-v3-2015-ValentimCM #analysis #case study #specification
- Evaluating an Inspection Technique for Use Case Specifications — Quantitative and Qualitative Analysis (NMCV, TC, JCM), pp. 13–24.
- KDD-2015-Pratt #machine learning #predict #protocol #proving
- Proof Protocol for a Machine Learning Technique Making Longitudinal Predictions in Dynamic Contexts (KBP), pp. 2049–2058.
- SEKE-2015-AffonsoLON #adaptation #framework #learning #self
- A Framework Based on Learning Techniques for Decision-making in Self-adaptive Software (FJA, GL, RAPO, EYN), pp. 24–29.
- SEKE-2015-CabrejosVMC #usability #web
- Evaluating Software Engineers’ Acceptance of a Technique and Tool for Web Usability Inspection (LJERC, AMRV, JCM, TC), pp. 140–145.
- SEKE-2015-FariasGSOV #architecture #composition #towards
- Toward an Architecture for Model Composition Techniques (KF, LG, MS, TCO, MV), pp. 656–659.
- SEKE-2015-LopesMBC #diagrams #named
- MoLVERIC: An Inspection Technique for MoLIC Diagrams (AL, ABM, SDJB, TC), pp. 13–17.
- SEKE-2015-ValentimCEP #how #usability
- How do software engineers apply an early usability inspection technique? A qualitative study (NMCV, TC, BJdSE, RP), pp. 686–691.
- SIGIR-2015-FarSBFH #on the
- On Term Selection Techniques for Patent Prior Art Search (MGF, SS, MRB, GF, DH), pp. 803–806.
- MoDELS-2015-ValentimROCM #case study #empirical #specification #usability
- A controlled experiment with Usability Inspection Techniques applied to Use Case Specifications: comparing the MIT 1 and the UCE techniques (NMCV, JR, ACO, TC, SM), pp. 206–215.
- PPDP-2015-Al-HumaimeedyF #multi #specification #verification
- Enhancing the specification and verification techniques of multiparty sessions in SOC (ASAH, MF), pp. 19–30.
- SAC-2015-BritoE #branch #named #performance #query
- BranchGuide: an indexing technique for efficient, lossless processing of branching path queries (TBV, GEdS), pp. 1086–1092.
- SAC-2015-CinalliMPG #multi #optimisation
- Collective preferences in evolutionary multi-objective optimization: techniques and potential contributions of collective intelligence (DC, LM, NSP, ACBG), pp. 133–138.
- SAC-2015-FernandesPCRP #detection #metaheuristic #network #statistics
- Statistical, forecasting and metaheuristic techniques for network anomaly detection (GF, EHMP, LFC, JJPCR, MLPJ), pp. 701–707.
- SAC-2015-GayathriK #rdf #rule-based
- Horn-rule based compression technique for RDF data (VG, PSK), pp. 396–401.
- SAC-2015-MinHJCH #distributed #performance #process #scalability
- An efficient backup-recovery technique to process large data in distributed key-value store (DM, TH, JJ, YC, JH), pp. 2072–2074.
- SAC-2015-MottaMSMPC #3d #image #re-engineering
- All-in-focus imaging technique used to improve 3D retinal fundus image reconstruction (DM, LdM, ACdS, RM, AP, LAVdC), pp. 26–31.
- SAC-2015-TizzeiABC #architecture #case study #product line #tool support #using
- Architecting cloud tools using software product line techniques: an exploratory study (LPT, LGA, MdB, RFGC), pp. 1441–1448.
- ICSE-v1-2015-GhotraMH #classification #fault #modelling #performance #predict
- Revisiting the Impact of Classification Techniques on the Performance of Defect Prediction Models (BG, SM, AEH), pp. 789–800.
- ICSE-v1-2015-PapadakisJHT #compilation #detection #effectiveness #empirical #equivalence #performance #scalability
- Trivial Compiler Equivalence: A Large Scale Empirical Study of a Simple, Fast and Effective Equivalent Mutant Detection Technique (MP, YJ, MH, YLT), pp. 936–946.
- ICSE-v2-2015-Imparato #android #testing #user interface
- A Combined Technique of GUI Ripping and Input Perturbation Testing for Android Apps (GI), pp. 760–762.
- ICSE-v2-2015-LutellierCGTRMK #architecture #dependence #using
- Comparing Software Architecture Recovery Techniques Using Accurate Dependencies (TL, DC, JG, LT, DR, NM, RK), pp. 69–78.
- ICSE-v2-2015-NetoTM #empirical #evaluation #testing
- An Initiative to Improve Reproducibility and Empirical Evaluation of Software Testing Techniques (FGdON, RT, PDLM), pp. 575–578.
- HPCA-2015-ZhaoY #analysis #distance #manycore #reuse #scalability
- Studying the impact of multicore processor scaling on directory techniques via reuse distance analysis (MZ, DY), pp. 590–602.
- SOSP-2015-KasikciSPPC #automation #sketching
- Failure sketching: a technique for automated root cause diagnosis of in-production failures (BK, BS, CP, GP, GC), pp. 344–360.
- CADE-2015-SatoW #dependence #encoding
- Encoding Dependency Pair Techniques and Control Strategies for Maximal Completion (HS, SW), pp. 152–162.
- CAV-2015-BozzanoCGM #analysis #modelling #performance #safety
- Efficient Anytime Techniques for Model-Based Safety Analysis (MB, AC, AG, CM), pp. 603–621.
- CSL-2015-GabbayGP
- Leaving the Nest: Nominal Techniques for Variables with Interleaving Scopes (MJG, DRG, DP), pp. 374–389.
- ICST-2015-Felbinger #assessment #model inference #quality #testing #using
- Test Suite Quality Assessment Using Model Inference Techniques (HF), pp. 1–2.
- ICST-2015-MahajanH #detection #html #locality #using
- Detection and Localization of HTML Presentation Failures Using Computer Vision-Based Techniques (SM, WGJH), pp. 1–10.
- ISSTA-2015-WangPO #fault #locality
- Evaluating the usefulness of IR-based fault localization techniques (QW, CP, AO), pp. 1–11.
- ASE-2014-Burke #feature model
- Utilizing feature location techniques for feature addition and feature enhancement (JTB), pp. 879–882.
- ASE-2014-CavalcantiMNAM #information retrieval #rule-based
- Combining rule-based and information retrieval techniques to assign software change requests (YCC, IdCM, PAdMSN, ESdA, SRdLM), pp. 325–330.
- ASE-2014-MaezawaNWH #ajax #using #validation
- Validating ajax applications using a delay-based mutation technique (YM, KN, HW, SH), pp. 491–502.
- ASE-2014-MahajanH #comparison #html #image #using
- Finding HTML presentation failures using image comparison techniques (SM, WGJH), pp. 91–96.
- CASE-2014-KernWGBM #estimation #machine learning #using
- COD and NH4-N estimation in the inflow of Wastewater Treatment Plants using Machine Learning Techniques (PK, CW, DG, MB, SFM), pp. 812–817.
- DAC-2014-Bhushan #injection #predict #visual notation
- A Rigorous Graphical Technique for Predicting Sub-harmonic Injection Locking in LC Oscillators (PB), p. 8.
- DAC-2014-ChenWLXY #optimisation #runtime
- Run-Time Technique for Simultaneous Aging and Power Optimization in GPGPUs (XC, YW, YL, YX, HY), p. 6.
- DAC-2014-GuoBS #modelling #self
- Modeling and Experimental Demonstration of Accelerated Self-Healing Techniques (XG, WB, MRS), p. 6.
- DAC-2014-LiS #monitoring #pipes and filters #robust #self
- Robust and In-Situ Self-Testing Technique for Monitoring Device Aging Effects in Pipeline Circuits (JL, MS), p. 6.
- DAC-2014-SchaffnerGSKB #approximate #complexity #linear #realtime #video
- An Approximate Computing Technique for Reducing the Complexity of a Direct-Solver for Sparse Linear Systems in Real-Time Video Processing (MS, FKG, AS, HK, LB), p. 6.
- DAC-2014-TsoutsosKM #design #hardware
- Advanced Techniques for Designing Stealthy Hardware Trojans (NGT, CK, MM), p. 4.
- DAC-2014-WeiWNP #physics #reverse engineering #using
- Reverse Engineering and Prevention Techniques for Physical Unclonable Functions Using Side Channels (SW, JBW, AN, MP), p. 6.
- DAC-2014-WendtKP #identification
- Techniques for Foundry Identification (JBW, FK, MP), p. 6.
- DAC-2014-ZalmanM #communication #low cost
- A Secure but still Safe and Low Cost Automotive Communication Technique (RZ, AM), p. 5.
- DATE-2014-AghaeePE #3d #performance
- An efficient temperature-gradient based burn-in technique for 3D stacked ICs (NA, ZP, PE), pp. 1–4.
- DATE-2014-BeneventiBVDB #analysis #identification #logic
- Thermal analysis and model identification techniques for a logic + WIDEIO stacked DRAM test chip (FB, AB, PV, DD, LB), pp. 1–4.
- DATE-2014-HoffmanRAA #analysis #fault #memory management
- Wear-out analysis of Error Correction Techniques in Phase-Change Memory (CH, LR, RA, GA), pp. 1–4.
- DATE-2014-MineoPAC #adaptation #energy #performance
- An adaptive transmitting power technique for energy efficient mm-wave wireless NoCs (AM, MP, GA, VC), pp. 1–6.
- DATE-2014-NepalLBR #approximate #automation #behaviour #named #synthesis
- ABACUS: A technique for automated behavioral synthesis of approximate computing circuits (KN, YL, RIB, SR), pp. 1–6.
- DATE-2014-PandeyV #analysis #fault #safety
- Transient errors resiliency analysis technique for automotive safety critical applications (SP, BV), pp. 1–4.
- DATE-2014-RanaC #analysis #named #reduction #scalability #simulation
- SSFB: A highly-efficient and scalable simulation reduction technique for SRAM yield analysis (MR, RC), pp. 1–6.
- DocEng-2014-SchmitzPD #automation #collaboration #metadata #tool support
- DH-CASE II: collaborative annotations in shared environments: metadata, tools and techniques in the digital humanities (PS, LP, QD), pp. 211–212.
- DRR-2014-Kavallieratou #documentation
- A slant removal technique for document page (EK), p. ?–11.
- FASE-2014-StruberRTC #crawling #information retrieval #modelling #using
- Splitting Models Using Information Retrieval and Model Crawling Techniques (DS, JR, GT, MC), pp. 47–62.
- CSMR-WCRE-2014-DamevskiSP #case study #code search
- A case study of paired interleaving for evaluating code search techniques (KD, DCS, LLP), pp. 54–63.
- IFM-2014-AsavoaeAR #interprocedural #semantics #slicing #towards
- Towards a Formal Semantics-Based Technique for Interprocedural Slicing (IMA, MA, AR), pp. 291–306.
- CHI-2014-CarringtonHK #design #mobile #smarttech
- Wearables and chairables: inclusive design of mobile input and output techniques for power wheelchair users (PC, AH, SKK), pp. 3103–3112.
- CHI-2014-GongSOHGKP #flexibility #interactive #multimodal #named
- PrintSense: a versatile sensing technique to support multimodal flexible surface interaction (NWG, JS, SO, SH, NEG, YK, JAP), pp. 1407–1410.
- CHI-2014-Hudson #3d #interactive
- Printing teddy bears: a technique for 3D printing of soft interactive objects (SEH), pp. 459–468.
- CHI-2014-Vicencio-MoreiraMGB #effectiveness #game studies
- The effectiveness (or lack thereof) of aim-assist techniques in first-person shooter games (RVM, RLM, CG, SB), pp. 937–946.
- DHM-2014-OkaGTNH #analysis
- Motion Analysis of the Pounding Technique Used for the Second Lining in the Fabrication of Traditional Japanese Hanging Scrolls (YO, AG, YT, CN, HH), pp. 55–65.
- DUXU-DI-2014-RugenhagenH #design #development #game studies #research
- Game Design Techniques in User Research Methods — A New Way to Reach the High Score in Development Teams (ER, TH), pp. 754–762.
- DUXU-TMT-2014-Bergamo #experience #prototype #user interface
- User Experience Technique in Computer Digital Arts Production: Paper Prototyping Used as Material to Define Intentionality (MLB), pp. 613–621.
- HCI-AIMT-2014-KuribaraMOST #named #using
- HandyScope: A Remote Control Technique Using Circular Widget on Tabletops (TK, YM, KO, BS, JT), pp. 69–80.
- HCI-AIMT-2014-PalomaresLR #evaluation #multi
- Study and Evaluation of Separability Techniques and Occlusion in Multitouch Surfaces (JP, MEL, AR), pp. 293–304.
- HCI-AS-2014-LeeYJ #predict #using
- Data Preloading Technique using Intention Prediction (SL, JY, DYJ), pp. 32–41.
- HCI-AS-2014-OgataII #smarttech #using
- Sweat Sensing Technique for Wearable Device Using Infrared Transparency (MO, MI, MI), pp. 323–331.
- HCI-TMT-2014-LatoschikF #multimodal #reuse #scalability
- Engineering Variance: Software Techniques for Scalable, Customizable, and Reusable Multimodal Processing (MEL, MF), pp. 308–319.
- HIMI-DE-2014-KaramT #gesture #interactive #symmetry
- Two-Handed Interactive Menu: An Application of Asymmetric Bimanual Gestures and Depth Based Selection Techniques (HK, JT), pp. 187–198.
- HIMI-DE-2014-KimH14a #embedded #interactive
- Label Embedded Treemapping: A Label Overlap Prevention Technique for Zoomable Treemaps and a User Interaction Technique (KK, JH), pp. 44–53.
- HIMI-DE-2014-TavaresB #interactive #user interface #visualisation
- A Step Beyond Visualization: Applying User Interface Techniques to Improve Satellite Data Interaction (TAT, HB), pp. 98–107.
- LCT-NLE-2014-FardounKCC #education
- Applying Gianni Rodari Techniques to Develop Creative Educational Environments (HMF, IAK, APC, JRC), pp. 388–397.
- SCSM-2014-Veglis #social #social media
- Moderation Techniques for Social Media Content (AAV), pp. 137–148.
- VISSOFT-2014-BlouinMBS #metamodelling #scalability #visualisation
- Slicing-Based Techniques for Visualizing Large Metamodels (AB, NM, BB, HAS), pp. 25–29.
- VISSOFT-2014-KuleszSB #spreadsheet
- Integrating Anomaly Diagnosis Techniques into Spreadsheet Environments (DK, JS, FB), pp. 11–19.
- ICEIS-v1-2014-DominguezAERLE #data mining #fuzzy #logic #mining #roadmap #using
- Advances in the Decision Making for Treatments of Chronic Patients Using Fuzzy Logic and Data Mining Techniques (MD, JA, JGE, IMR, JMLS, MJE), pp. 325–330.
- ICEIS-v1-2014-PengM #approximate #string
- Approximate String Matching Techniques (TP, CM), pp. 217–224.
- ICEIS-v1-2014-PintoNH #multi #optimisation
- Multi-objective Optimization of Investment Strategies — Based on Evolutionary Computation Techniques, in Volatile Environments (JMP, RFN, NH), pp. 480–488.
- ICEIS-v1-2014-ShakirIB #machine learning #topic
- Machine Learning Techniques for Topic Spotting (NS, EI, ISB), pp. 450–455.
- ICEIS-v2-2014-AbakumovA #assessment #enterprise #quality
- Quality Assessment Technique for Enterprise Information-management System Software (EMA, DMA), pp. 348–354.
- ICEIS-v2-2014-AntonioRF #embedded #modelling #process #validation #verification
- Verification and Validation Activities for Embedded Systems — A Feasibility Study on a Reading Technique for SysML Models (EAA, RR, SCPFF), pp. 233–240.
- ICEIS-v2-2014-SilvaMS #aspect-oriented #bibliography #evaluation #performance #programming
- A Systematic Review on Performance Evaluation of Aspect-Oriented Programming Techniques used to Implement Crosscutting Concerns (RFGdS, MdAM, MSS), pp. 5–13.
- ICEIS-v2-2014-SilvaTDO #process
- Combining the Spray Technique with Routes to Improve the Routing Process in VANETS (MJdS, FAT, SED, RARO), pp. 583–590.
- ICEIS-v2-2014-ThommazoRROHWF #traceability #using
- Using Artificial Intelligence Techniques to Enhance Traceability Links (ADT, RR, TRdO, GO, EMH, VW, SCPFF), pp. 26–38.
- ECIR-2014-AlsumN #summary #web
- Thumbnail Summarization Techniques for Web Archives (AA, MLN), pp. 299–310.
- ECIR-2014-LeeC #feedback #pseudo
- Cross-Language Pseudo-Relevance Feedback Techniques for Informal Text (CJL, WBC), pp. 260–272.
- ICML-c2-2014-MaryPN #algorithm #evaluation
- Improving offline evaluation of contextual bandit algorithms via bootstrapping techniques (JM, PP, ON), pp. 172–180.
- ICPR-2014-BuiNLYK #detection #order #statistics #using
- Boosted Stable Path for Staff-Line Detection Using Order Statistic Downscaling and Coarse-to-Fine Technique (HNB, ISN, GL, HJY, SHK), pp. 522–526.
- ICPR-2014-HollausDS #image #multi
- Improving OCR Accuracy by Applying Enhancement Techniques on Multispectral Images (FH, MD, RS), pp. 3080–3085.
- ICPR-2014-Mishra0M #clustering #database #on the #validation
- On Validation of Clustering Techniques for Bibliographic Databases (SM, SS, SM), pp. 3150–3155.
- ICPR-2014-MollerPB #analysis #quantifier #using
- Quantification of Actin Structures Using Unsupervised Pattern Analysis Techniques (BM, EP, NB), pp. 3251–3256.
- ICPR-2014-MoriKNK #detection #using #video
- Video Content Detection with Single Frame Level Accuracy Using Dynamic Thresholding Technique (MM, TK, HN, KK), pp. 2560–2565.
- KDD-2014-ZhengZLJXLSZLTLDLW #data mining #mining #optimisation #process
- Applying data mining techniques to address critical process optimization needs in advanced manufacturing (LZ, CZ, LL, YJ, WX, JL, CS, WZ, HL, LT, TL, BD, ML, PW), pp. 1739–1748.
- KEOD-2014-MartinL #library #retrieval
- Improving Knowledge Retrieval in Digital Libraries Applying Intelligent Techniques (AM, CL), pp. 445–453.
- KR-2014-LomuscioM #abstraction #atl #multi #specification #verification
- An Abstraction Technique for the Verification of Multi-Agent Systems Against ATL Specifications (AL, JM).
- MLDM-2014-KhasnabishSDS #detection #learning #programming language #source code #using
- Detecting Programming Language from Source Code Using Bayesian Learning Techniques (JNK, MS, JD, GS), pp. 513–522.
- RecSys-2014-Braunhofer #recommendation
- Hybridisation techniques for cold-starting context-aware recommender systems (MB), pp. 405–408.
- SEKE-2014-ChenHQJ #performance #static analysis #using
- Improving Static Analysis Performance Using Rule-Filtering Technique (DC, RH, BQ, SJ), pp. 19–24.
- SEKE-2014-MaazounBB #feature model
- Feature model recovery from product variants based on a cloning technique (JM, NB, HBA), pp. 431–436.
- SEKE-2014-ParkHL #power management #refactoring
- Investigation for Software Power Consumption of Code Refactoring Techniques (JJP, JEH, SHL), pp. 717–722.
- SEKE-2014-SantosRBC #elicitation #requirements #security
- Persona Security: A Technique for Supporting the Elicitation of Security Requirements (MADS, JR, RdSB, TC), pp. 603–608.
- SEKE-2014-SolariM #detection #empirical #fault #testing
- A Controlled Experiment to Explore Potentially Undetectable Defects for Testing Techniques (MS, SM), pp. 106–109.
- SIGIR-2014-Jones #retrieval #speech #tool support
- Speech search: techniques and tools for spoken content retrieval (GJFJ), p. 1287.
- AMT-2014-RentschlerWNHR #automation #clustering #legacy #model transformation
- Remodularizing Legacy Model Transformations with Automatic Clustering Techniques (AR, DW, QN, LH, RR), pp. 4–13.
- BX-2014-BrownlowP #integration
- Intersection Schemas as a Dataspace Integration Technique (RB, AP), pp. 92–99.
- MoDELS-2014-GomesBA #classification #model transformation #pattern matching #tool support
- Classification of Model Transformation Tools: Pattern Matching Techniques (CG, BB, VA), pp. 619–635.
- MoDELS-2014-GomesBA #classification #model transformation #pattern matching #tool support
- Classification of Model Transformation Tools: Pattern Matching Techniques (CG, BB, VA), pp. 619–635.
- RE-2014-Ionita #evaluation #identification #information management #risk management #security
- Context-sensitive Information security Risk identification and evaluation techniques (DI), pp. 485–488.
- SAC-2014-KumeNNS #dynamic analysis #framework
- A dynamic analysis technique to extract symptoms that suggest side effects in framework applications (IK, NN, MN, ES), pp. 1176–1178.
- SAC-2014-Umatani #calculus #implementation
- Practical implementation techniques of ambient calculus in conventional dynamic languages (SU), pp. 1345–1351.
- FSE-2014-ElbaumRP #development #integration #testing
- Techniques for improving regression testing in continuous integration development environments (SGE, GR, JP), pp. 235–245.
- FSE-2014-JoinerRJDG #performance #policy #weaving
- Efficient runtime-enforcement techniques for policy weaving (RJ, TWR, SJ, MD, VG), pp. 224–234.
- LCTES-2014-Whalley #data access #energy #performance
- Energy efficient data access techniques (DBW), p. 1.
- PPoPP-2014-BrownER
- A general technique for non-blocking trees (TB, FE, ER), pp. 329–342.
- SAT-2014-JarvisaloK #bound
- Conditional Lower Bounds for Failed Literals and Related Techniques (MJ, JHK), pp. 75–84.
- TAP-2014-ArcainiGR #abstraction #model checking #testing
- An Abstraction Technique for Testing Decomposable Systems by Model Checking (PA, AG, ER), pp. 36–52.
- ASE-2013-GarciaIM #analysis #architecture #comparative
- A comparative analysis of software architecture recovery techniques (JG, II, NM), pp. 486–496.
- DAC-2013-ChakrabortyLAP #physics
- A transmission gate physical unclonable function and on-chip voltage-to-digital conversion technique (RC, CL, DA, JP), p. 10.
- DAC-2013-ChoMCAM #design #evaluation #fault #injection #robust
- Quantitative evaluation of soft error injection techniques for robust system design (HC, SM, CYC, JAA, SM), p. 10.
- DAC-2013-KunduCSK
- An ATE assisted DFD technique for volume diagnosis of scan chains (SK, SC, IS, RK), p. 6.
- DAC-2013-YuanX #fault #logic #low cost #named #scalability
- InTimeFix: a low-cost and scalable technique for in-situ timing error masking in logic circuits (FY, QX), p. 6.
- DAC-2013-ZhanR #energy
- Techniques for energy-efficient power budgeting in data centers (XZ, SR), p. 7.
- DATE-2013-CabodiLV #bound #model checking #optimisation
- Optimization techniques for craig interpolant compaction in unbounded model checking (GC, CL, DV), pp. 1417–1422.
- DATE-2013-ChenWLL #automation #flexibility #process
- Automatic circuit sizing technique for the analog circuits with flexible TFTs considering process variation and bending effects (YLC, WRW, GRL, CNJL), pp. 1458–1461.
- DATE-2013-ChiangTWHCDN #array #configuration management #on the #order #synthesis #using
- On reconfigurable single-electron transistor arrays synthesis using reordering techniques (CEC, LFT, CYW, CYH, YCC, SD, VN), pp. 1807–1812.
- DATE-2013-GuoWLLLC #named
- DA-RAID-5: a disturb aware data protection technique for NAND flash storage systems (JG, WW, YZ, SL, HL, YC), pp. 380–385.
- DATE-2013-KahngLN #design #estimation #metamodelling #problem
- Enhanced metamodeling techniques for high-dimensional IC design estimation problems (ABK, BL, SN), pp. 1861–1866.
- DATE-2013-ParkCA #energy
- Non-speculative double-sampling technique to increase energy-efficiency in a high-performance processor (JP, AC, JAA), pp. 254–257.
- DATE-2013-PouyanAMR #adaptation #configuration management #design #implementation
- Design and implementation of an adaptive proactive reconfiguration technique for SRAM caches (PP, EA, FM, AR), pp. 1303–1306.
- DATE-2013-WangSCC #design #embedded #estimation #performance #reliability
- Accurate and efficient reliability estimation techniques during ADL-driven embedded processor design (ZW, KS, CC, AC), pp. 547–552.
- DocEng-2013-TomasiV #automation #collaboration #metadata
- Collaborative annotations in shared environments: metadata, vocabularies and techniques in the digital humanities (DH-CASE 2013) (FT, FV), pp. 283–284.
- HT-2013-LeginusDL #generative #graph
- Graph based techniques for tag cloud generation (ML, PD, RL), pp. 148–157.
- ICDAR-2013-GebhardtGSD #authentication #detection #documentation #using
- Document Authentication Using Printing Technique Features and Unsupervised Anomaly Detection (JG, MG, FS, AD), pp. 479–483.
- ICDAR-2013-MondalRRP #kernel #locality #performance #retrieval #word
- A Fast Word Retrieval Technique Based on Kernelized Locality Sensitive Hashing (TM, NR, JYR, UP), pp. 1195–1199.
- ICDAR-2013-PapandreouG #estimation #word
- A Coarse to Fine Skew Estimation Technique for Handwritten Words (AP, BG), pp. 225–229.
- VLDB-2013-BergamaschiGILV #data-driven #database #keyword #machine learning #named #relational #semantics
- QUEST: A Keyword Search System for Relational Data based on Semantic and Machine Learning Techniques (SB, FG, MI, RTL, YV), pp. 1222–1225.
- VLDB-2014-DasNLS13 #as a service #cpu #multitenancy #performance #relational
- CPU Sharing Techniques for Performance Isolation in Multitenant Relational Database-as-a-Service (SD, VRN, FL, MS), pp. 37–48.
- FASE-2013-HoferRWAG #empirical #evaluation #fault #locality #on the #spreadsheet
- On the Empirical Evaluation of Fault Localization Techniques for Spreadsheets (BH, AR, FW, RA, EG), pp. 68–82.
- TACAS-2013-AbdullaHHJR #concurrent #data type #specification #verification
- An Integrated Specification and Verification Technique for Highly Concurrent Data Structures (PAA, FH, LH, BJ, AR), pp. 324–338.
- ICPC-2013-EddyRKC #replication #source code #summary
- Evaluating source code summarization techniques: Replication and expansion (BPE, JAR, NAK, JCC), pp. 13–22.
- ICSM-2013-HillBBDLO #feature model #question
- Which Feature Location Technique is Better? (EH, AB, DB, BD, DL, RO), pp. 408–411.
- WCRE-2013-IshioHKO #automation #effectiveness #feature model #on the
- On the effectiveness of accuracy of automated feature location technique (TI, SH, HK, TO), pp. 381–390.
- ICALP-v1-2013-MegowV #scheduling
- Dual Techniques for Scheduling on a Machine with Varying Speed (NM, JV), pp. 745–756.
- LATA-2013-RotBR #equivalence #induction #proving
- Coinductive Proof Techniques for Language Equivalence (JR, MMB, JJMMR), pp. 480–492.
- CHI-2013-AlperBRIF #analysis #comparison #graph
- Weighted graph comparison techniques for brain connectivity analysis (BA, BB, NHR, TI, JDF), pp. 483–492.
- CHI-2013-AltSKS #interactive
- Interaction techniques for creating and exchanging content with public displays (FA, ASS, TK, AS), pp. 1709–1718.
- CHI-2013-JuhlinO #collaboration #design #gesture #interactive #on the
- On the relation of ordinary gestures to TV screens: general lessons for the design of collaborative interactive techniques (OJ, EÖ), pp. 919–930.
- CHI-2013-WalshFYD #analysis #design #framework
- FACIT PD: a framework for analysis and creation of intergenerational techniques for participatory design (GW, EF, JCY, AD), pp. 2893–2902.
- DHM-HB-2013-CaoJHK #assessment #modelling #using
- Ergonomic Assessment of Patient Barrow Lifting Technique Using Digital Human Modeling (WC, MJ, YH, MTK), pp. 20–29.
- DUXU-CXC-2013-AlhafzyAMA #experience #novel
- A Novel Reading Technique Application: Exploring Arabic Children Experience (MSA, EAA, HHM, MA), pp. 3–10.
- DUXU-PMT-2013-PenhaCSCB #evaluation #usability
- Ergonomic Evaluation of Usability with Users — Application of the Technique of Cooperative Evaluation (MP, WC, MMS, FC, MB), pp. 379–388.
- DUXU-WM-2013-GencerBZV #framework #machine learning #mobile #using
- A New Framework for Increasing User Engagement in Mobile Applications Using Machine Learning Techniques (MG, GB, ÖZ, TV), pp. 651–659.
- DUXU-WM-2013-LeNDP #interactive #process
- Scaffolding Computer Supported Argumentation Processes through Mini Map Based Interaction Techniques (NTL, SN, DD, NP), pp. 533–542.
- HCI-AS-2013-AndujarEGM #learning
- Evaluating Engagement Physiologically and Knowledge Retention Subjectively through Two Different Learning Techniques (MA, JIE, JEG, PM), pp. 335–342.
- HCI-AS-2013-MajimaMSS #learning
- A Proposal of the New System Model for Nursing Skill Learning Based on Cognition and Technique (YM, YM, MS, MS), pp. 134–143.
- HCI-III-2013-TsurudaHYI #generative #mobile #using
- Generation of Facial Expression Emphasized with Cartoon Techniques Using a Cellular-Phone-Type Teleoperated Robot with a Mobile Projector (YT, MH, HY, YI), pp. 391–400.
- HCI-IMT-2013-KinoshitaSG #navigation
- A Page Navigation Technique for Overlooking Content in a Digital Magazine (YK, MS, KG), pp. 456–461.
- HCI-IMT-2013-YoshikawaMKST #using
- A Remote Pointing Technique Using Pull-out (TY, YM, TK, BS, JT), pp. 416–426.
- HIMI-D-2013-NakanoOM #3d #artificial reality #using
- Leaning Origami Using 3D Mixed Reality Technique (AN, MO, HM), pp. 126–132.
- HIMI-LCCB-2013-Eschenbrenner #information management #self
- Enhancing Information Systems Users’ Knowledge and Skills Transference through Self-regulation Techniques (BE), pp. 16–24.
- ICEIS-J-2013-AlvesSCCCWGBGC13a #named #semantics #tool support #traceability #web
- Fairtrace: Applying Semantic Web Tools and Techniques to the Textile Traceability (BA, MS, FC, ALC, GC, DW, CG, BB, DG, PC), pp. 68–84.
- ICEIS-v1-2013-CoelhoAABB #industrial #network
- Deploying Nodes for Industrial Wireless Networks by Artificial Immune Systems Techniques (PHGC, JLMdA, JFMdA, LFdAB, AVdB), pp. 536–540.
- CIKM-2013-WhangG
- Disinformation techniques for entity resolution (SEW, HGM), pp. 715–720.
- CIKM-2013-ZhangLL #performance #privacy #robust #streaming
- An efficient and robust privacy protection technique for massive streaming choice-based information (JZ, XL, YL), pp. 1169–1172.
- KDD-2013-FriezeGT #algorithm #graph #mining #modelling #scalability
- Algorithmic techniques for modeling and mining large graphs (AMAzING) (AMF, AG, CET), p. 1523.
- KDIR-KMIS-2013-BaliBBG #information management #tool support #using
- Using Knowledge Management Tools and Techniques to Increase the Rate of Attendance at Breast Screening (RKB, JB, VB, MCG), pp. 344–350.
- KDIR-KMIS-2013-PereiraRT #data mining #mining #source code #student
- Extraction Student Dropout Patterns with Data Mining Techniques in Undergraduate Programs (RTP, ACR, JJT), pp. 136–142.
- KEOD-2013-ZouhaierDA #automation #generative #reasoning #using
- Automatic Generation of UIs for Disabled Users using Context-aware Techniques and Reasoning (LZ, YBH, LJBA), pp. 413–418.
- MLDM-2013-ValencioKMSM #3d #data mining #mining #visualisation
- 3D Geovisualisation Techniques Applied in Spatial Data Mining (CRV, TK, CAdM, RCGdS, JMM), pp. 57–68.
- SEKE-2013-AnchietaSM #case study #diagrams #identification #prototype #uml #user interface #using
- Using NLP Techniques for Identifying GUI Prototypes and UML Diagrams From Use Cases (RTA, RFdS, RSM), pp. 48–53.
- SEKE-2013-GaoKN #estimation #preprocessor #quality
- Exploring Ensemble-Based Data Preprocessing Techniques for Software Quality Estimation (KG, TMK, AN), pp. 612–617.
- SEKE-2013-LiuWL #analysis #detection #named #online #performance #pointer
- ELCD: an efficient online cycle detection technique for pointer analysis (FL, LW, BL), pp. 606–611.
- SEKE-2013-MarcalGCJ #identification #mining #repository #using
- Mining Software Repository to Identify Crosscutting Concerns Using Combined Techniques (S) (IM, REG, RCMC, COJ), pp. 338–343.
- SEKE-2013-Perez-CastilloGGFP #android #migration #user interface #visual notation
- ANDRIU. A Technique for Migrating Graphical User Interfaces to Android (S) (RPC, IGRdG, RGC, MFR, MP), pp. 516–519.
- SEKE-2013-WangKWN #case study #feature model #first-order #metric #statistics
- A Study on First Order Statistics-Based Feature Selection Techniques on Software Metric Data (HW, TMK, RW, AN), pp. 467–472.
- SEKE-2013-YuYLC #empirical #testing #web
- An Empirical Study of an Improved Web Application Fuzz Testing Technique (S) (LY, ZY, CL, FC), pp. 400–404.
- SIGIR-2013-HungTLA #benchmark #crowdsourcing #metric #named
- BATC: a benchmark for aggregation techniques in crowdsourcing (NQVH, NTT, NTL, KA), pp. 1079–1080.
- SIGIR-2013-MoshfeghiJ #behaviour #effectiveness #feedback #using
- An effective implicit relevance feedback technique using affective, physiological and behavioural features (YM, JMJ), pp. 133–142.
- SIGIR-2013-ShenWYC #multi #recommendation
- Multimedia recommendation: technology and techniques (JS, MW, SY, PC), p. 1131.
- SKY-2013-SuarezMFM #automation #generative #natural language #semantics #using
- Automatic Generation of Semantic Patterns using Techniques of Natural Language Processing (PS, VM, AF, JLM), pp. 34–44.
- MoDELS-2013-FondementMTWF #metamodelling
- Big Metamodels Are Evil — Package Unmerge — A Technique for Downsizing Metamodels (FF, PAM, LT, BW, GF), pp. 138–153.
- MoDELS-2013-NoyritGT #analysis #domain-specific language #integration #modelling #using
- Computer Assisted Integration of Domain-Specific Modeling Languages Using Text Analysis Techniques (FN, SG, FT), pp. 505–521.
- MoDELS-2013-FondementMTWF #metamodelling
- Big Metamodels Are Evil — Package Unmerge — A Technique for Downsizing Metamodels (FF, PAM, LT, BW, GF), pp. 138–153.
- MoDELS-2013-NoyritGT #analysis #domain-specific language #integration #modelling #using
- Computer Assisted Integration of Domain-Specific Modeling Languages Using Text Analysis Techniques (FN, SG, FT), pp. 505–521.
- OOPSLA-2013-Xu #named #optimisation #profiling #source code
- Resurrector: a tunable object lifetime profiling technique for optimizing real-world programs (G(X), pp. 111–130.
- SAC-2013-DurelliSADC #bibliography #mining
- A systematic review on mining techniques for crosscutting concerns (RSD, DSMS, NA, MED, VVdC), pp. 1080–1087.
- SAC-2013-TheodouliG #adaptation #data-driven #query #web #web service
- Adaptive memory-aware chunk sizing techniques for data-intensive queries over web services (AT, AG), pp. 826–831.
- ESEC-FSE-2013-JiangLZDSGS #design #embedded #multi #optimisation #using
- Design and optimization of multi-clocked embedded systems using formal technique (YJ, ZL, HZ, YD, XS, MG, JS), pp. 703–706.
- ICSE-2013-CotroneoPR #testing
- A learning-based method for combining testing techniques (DC, RP, SR), pp. 142–151.
- ICSE-2013-GivensCSY #grammar inference #user interface
- Exploring the internal state of user interfaces by combining computer vision techniques with grammatical inference (PG, AC, SS, TY), pp. 1165–1168.
- ASPLOS-2013-JogKNMKMID #array #concurrent #named #owl #performance #scheduling #thread
- OWL: cooperative thread array aware scheduling techniques for improving GPGPU performance (AJ, OK, NCN, AKM, MTK, OM, RI, CRD), pp. 395–406.
- CGO-2013-RodriguesCP #integer #performance #source code
- A fast and low-overhead technique to secure programs against integer overflows (RER, VHSC, FMQP), p. 11.
- LCTES-2013-MehiaouiWPMNZBLG #clustering #distributed #optimisation
- A two-step optimization technique for functions placement, partitioning, and priority assignment in distributed systems (AM, EW, STP, CM, MDN, HZ, JPB, LL, SG), pp. 121–132.
- PPoPP-2013-PadmanabhanCC #composition #streaming
- Decomposition techniques for optimal design-space exploration of streaming applications (SP, YC, RDC), pp. 285–286.
- CADE-2013-ReynoldsTGKDB #finite #quantifier #smt
- Quantifier Instantiation Techniques for Finite Model Finding in SMT (AR, CT, AG, SK, MD, CB), pp. 377–391.
- ICTSS-2013-FariaPC #consistency #diagrams #sequence chart #testing #tool support #uml
- Techniques and Toolset for Conformance Testing against UML Sequence Diagrams (JPF, ACRP, MVdC), pp. 180–195.
- ISSTA-2013-QiMLW #automation #effectiveness #fault #locality #program repair #using
- Using automated program repair for evaluating the effectiveness of fault localization techniques (YQ, XM, YL, CW), pp. 191–201.
- QoSA-2012-KrebsMK #metric #performance
- Metrics and techniques for quantifying performance isolation in cloud environments (RK, CM, SK), pp. 91–100.
- ASE-2012-Gabmeyer #model transformation #verification
- Formal verification techniques for model transformations specified by-demonstration (SG), pp. 390–393.
- CASE-2012-Kim #analysis #fuzzy #robust
- Robust stability analysis of T-S fuzzy systems with interval time-varying delays via a relaxation technique (SHK), pp. 829–832.
- DAC-2012-LiuARVG #component #multi #performance #synthesis
- Efficient multi-objective synthesis for microwave components based on computational intelligence techniques (BL, HA, SR, GAEV, GGEG), pp. 542–548.
- DAC-2012-PaekMSSK #markov #named #random
- PowerField: a transient temperature-to-power technique based on Markov random field theory (SP, SHM, WS, JS, LSK), pp. 630–635.
- DATE-2012-BozgaDHHLLT #analysis #embedded #modelling #state of the art #tool support
- State-of-the-art tools and techniques for quantitative modeling and analysis of embedded systems (MB, AD, AH, HH, KGL, AL, JT), pp. 370–375.
- DATE-2012-ChenLPCPWHWM #design
- Nano-Electro-Mechanical relays for FPGA routing: Experimental demonstration and a design technique (CC, WSL, RP, SC, JP, JW, RTH, HSPW, SM), pp. 1361–1366.
- DATE-2012-GerdesKURS #realtime
- Time analysable synchronisation techniques for parallelised hard real-time applications (MG, FK, TU, CR, PS), pp. 671–676.
- DATE-2012-HamoudaAK #automation #image #modelling #novel
- AIR (Aerial Image Retargeting): A novel technique for in-fab automatic model-based retargeting-for-yield (AYH, MA, KSK), pp. 1603–1608.
- DATE-2012-JiangEP #co-evolution #communication #constraints #design #distributed #embedded #realtime #security
- Co-design techniques for distributed real-time embedded systems with communication security constraints (KJ, PE, ZP), pp. 947–952.
- DATE-2012-MohammadiEEM #fault #injection #named
- SCFIT: A FPGA-based fault injection technique for SEU fault model (AM, ME, AE, SGM), pp. 586–589.
- DATE-2012-NasseryO
- An analytical technique for characterization of transceiver IQ imbalances in the loop-back mode (AN, SO), pp. 1084–1089.
- DATE-2012-PatilJCLYPLCC #logic
- Weighted area technique for electromechanically enabled logic computation with cantilever-based NEMS switches (SP, MWJ, CLC, DL, ZY, WEP, DJL, SAC, TC), pp. 727–732.
- DATE-2012-VatajeluF #evaluation #parametricity #performance #reliability
- Efficiency evaluation of parametric failure mitigation techniques for reliable SRAM operation (EIV, JF), pp. 1343–1348.
- SIGMOD-2012-HarthHS #data transformation #database #linked data #open data
- Database techniques for linked data management (AH, KH, RS), pp. 597–600.
- SIGMOD-2012-ZhouBL #clustering #distributed
- Advanced partitioning techniques for massively distributed computation (JZ, NB, WL), pp. 13–24.
- VLDB-2012-LiKNC #estimation #query #robust #sql #statistics #using
- Robust Estimation of Resource Consumption for SQL Queries using Statistical Techniques (JL, ACK, VRN, SC), pp. 1555–1566.
- ITiCSE-2012-Assiter #effectiveness
- Introvert educators: techniques to be effective in the traditional face-to-face CS classroom (KVA), p. 381.
- ITiCSE-2012-HeinesGR #music
- Techniques at the intersection of computing and music (JMH, GRG, SAR), p. 372.
- ESOP-2012-FajstrupGHMR #performance #reduction
- Trace Spaces: An Efficient New Technique for State-Space Reduction (LF, EG, EH, SM, MR), pp. 274–294.
- FASE-2012-RuscioMMPP #architecture #modelling
- Model-Driven Techniques to Enhance Architectural Languages Interoperability (DDR, IM, HM, PP, AP), pp. 26–42.
- CSMR-2012-IslamMSS #multi #semantics #testing
- A Multi-Objective Technique to Prioritize Test Cases Based on Latent Semantic Indexing (MMI, AM, AS, GS), pp. 21–30.
- CSMR-2012-Varro #maintenance #model transformation
- Keynote 2: A Bridge Over Troubled Water — Synergies between Model Transformation and Software Maintenance Techniques (DV), pp. 5–6.
- CSMR-2012-Villavicencio #maintenance #refactoring
- A New Software Maintenance Scenario Based on Refactoring Techniques (GV), pp. 341–346.
- PLDI-2012-OanceaR #logic #parallel
- Logical inference techniques for loop parallelization (CEO, LR), pp. 509–520.
- SAS-2012-Midtgaard0M #proving
- A Structural Soundness Proof for Shivers’s Escape Technique — A Case for Galois Connections (JM, MDA, MM), pp. 352–369.
- FM-2012-GrumbergMY #behaviour #model checking #modelling #uml
- Applying Software Model Checking Techniques for Behavioral UML Models (OG, YM, KY), pp. 277–292.
- FM-2012-NedunuriSC #algorithm #performance
- Theory and Techniques for Synthesizing Efficient Breadth-First Search Algorithms (SN, DRS, WRC), pp. 308–325.
- CHI-2012-GirouardTV #flexibility #interactive #named
- DisplayStacks: interaction techniques for stacks of flexible thin-film displays (AG, APT, RV), pp. 2431–2440.
- CHI-2012-HinckleyBPB #information management
- Informal information gathering techniques for active reading (KH, XB, MP, BB), pp. 1893–1896.
- CHI-2012-MasliT #community #online
- Evaluating compliance-without-pressure techniques for increasing participation in online communities (MM, LGT), pp. 2915–2924.
- CHI-2012-SchneiderSMESS #collaboration #named #student
- Phylo-Genie: engaging students in collaborative “tree-thinking” through tabletop techniques (BS, MS, LM, SE, OS, CS), pp. 3071–3080.
- CHI-2012-SeifriedRHS #interactive #scalability #undo
- Regional undo/redo techniques for large interactive surfaces (TS, CR, MH, SDS), pp. 2855–2864.
- CAiSE-2012-MahauxH #agile #information management #prototype
- Improvisational Theater for Information Systems: An Agile, Experience-Based, Prototyping Technique (MM, PH), pp. 699–700.
- EDOC-2012-BurattinMAS #analysis #declarative #process
- Techniques for a Posteriori Analysis of Declarative Processes (AB, FMM, WMPvdA, AS), pp. 41–50.
- ICEIS-v2-2012-AokiOOM #model checking #quality #requirements #specification #using
- Quality Improvement of Requirements Specification using Model Checking Technique (YA, SO, HO, SM), pp. 401–406.
- CIKM-2012-LiangZ #classification #performance
- An efficient and simple under-sampling technique for imbalanced time series classification (GL, CZ), pp. 2339–2342.
- ECIR-2012-AkerFSG #image #summary
- Investigating Summarization Techniques for Geo-Tagged Image Indexing (AA, XF, MS, RJG), pp. 472–475.
- KR-2012-BelardinelliLP #abstraction #verification
- An Abstraction Technique for the Verification of Artifact-Centric Systems (FB, AL, FP).
- MLDM-2012-Thombre #classification #network
- Comparing Logistic Regression, Neural Networks, C5.0 and M5′ Classification Techniques (AT), pp. 132–140.
- RecSys-2012-BelloginP #clustering #collaboration #graph #using
- Using graph partitioning techniques for neighbour selection in user-based collaborative filtering (AB, JP), pp. 213–216.
- SEKE-2012-CunhaCAM #modelling #product line #set
- A Set of Inspection Techniques on Software Product Line Models (RC, TC, ESdA, JCM), pp. 657–662.
- SEKE-2012-FernandesCB #usability #web
- Improving a Web Usability Inspection Technique through an Observational Study (PF, TC, BB), pp. 588–593.
- SEKE-2012-HossianG #concept #process #requirements
- Phases, Activities, and Techniques for a Requirements Conceptualization Process (AH, RGM), pp. 25–32.
- SEKE-2012-SouzaR #performance
- A proposal for the improvement of the technique of Earned Value Management utilizing the history of performance data (ADdS, ARCdR), pp. 753–758.
- SEKE-2012-VieiraVNC #elicitation #empirical #using
- Using Empirical Studies to Evaluate the REMO Requirement Elicitation Technique (SRCV, DV, RdN, TC), pp. 33–38.
- SEKE-2012-WangKWN #empirical #fault #metric #predict
- An Empirical Study of Software Metric Selection Techniques for Defect Prediction (HW, TMK, RW, AN), pp. 94–99.
- BX-2012-AnjorinVS #constraints #graph grammar #programming
- Complex Attribute Manipulation in TGGs with Constraint-Based Programming Techniques (AA, GV, AS), pp. 68–83.
- ECMFA-2012-VarroAS #pattern matching #unification
- Unification of Compiled and Interpreter-Based Pattern Matching Techniques (GV, AA, AS), pp. 368–383.
- SAC-2012-ChebaroKGJ #dynamic analysis #slicing #verification
- Program slicing enhances a verification technique combining static and dynamic analysis (OC, NK, AG, JJ), pp. 1284–1291.
- SAC-2012-GranitzerHJK #comparison #crowdsourcing #data transformation #metadata
- A comparison of metadata extraction techniques for crowdsourced bibliographic metadata management (MG, MH, KJ, RK), pp. 962–964.
- SAC-2012-MaggiorePBA #3d #compilation #performance #safety
- A compilation technique to increase X3D performance and safety (GM, FP, MB, MA), pp. 969–974.
- SAC-2012-ShatnawiM #bibliography #online #personalisation #statistics
- Statistical techniques for online personalized advertising: a survey (MS, NM), pp. 680–687.
- SAC-2012-ShinC #comparative #evaluation #feedback #requirements #retrieval
- A comparative evaluation of two user feedback techniques for requirements trace retrieval (YS, JCH), pp. 1069–1074.
- SAC-2012-ZingarelliAG #named
- RevGlyph: a technique for reverting anaglyph stereoscopic videos (MRUZ, LAdA, RG), pp. 1005–1011.
- FSE-2012-BeyerHKW #model checking #verification
- Conditional model checking: a technique to pass information between verifiers (DB, TAH, MEK, PW), p. 57.
- ICSE-2012-Bailey #adaptation #modelling #self
- Application of Self-Adaptive techniques to federated authorization models (CB), pp. 1495–1498.
- ICSE-2012-CarzanigaGMP #java #self
- A self-healing technique for Java applications (AC, AG, AM, NP), pp. 1445–1446.
- ICSE-2012-RogersGQB #documentation
- Exploring techniques for rationale extraction from existing documents (BR, JG, YQ, JEB), pp. 1313–1316.
- CGO-2012-JangLSL #automation #memory management #multi
- An automatic code overlaying technique for multicores with explicitly-managed memory hierarchies (CJ, JL, SS, JL), pp. 219–229.
- PPoPP-2012-DiceMS #design
- Lock cohorting: a general technique for designing NUMA locks (DD, VJM, NS), pp. 247–256.
- PPoPP-2012-FatourouK
- Revisiting the combining synchronization technique (PF, NDK), pp. 257–266.
- ICLP-2012-MarateaPR #machine learning
- Applying Machine Learning Techniques to ASP Solving (MM, LP, FR), pp. 37–48.
- ICST-2012-AlesioGNB #constraints #optimisation #realtime #testing #using
- Testing Deadline Misses for Real-Time Systems Using Constraint Optimization Techniques (SDA, AG, SN, LCB), pp. 764–769.
- ICST-2012-GotliebHB #constraints #programming #using
- Minimum Pairwise Coverage Using Constraint Programming Techniques (AG, AH, BB), pp. 773–774.
- ICST-2012-KauffmanK #framework #industrial #research #testing
- A Framework to Support Research in and Encourage Industrial Adoption of Regression Testing Techniques (JMK, GMK), pp. 907–908.
- ICTSS-2012-JohansenHFCEW #agile #automation #interactive #product line #testing
- A Technique for Agile and Automatic Interaction Testing for Product Lines (MFJ, ØH, FF, EC, JE, TW), pp. 39–54.
- IJCAR-2012-KuhlweinLTUH #bibliography #evaluation #scalability
- Overview and Evaluation of Premise Selection Techniques for Large Theory Mathematics (DK, TvL, ET, JU, TH), pp. 378–392.
- IJCAR-2012-Matiyasevich #automation #reasoning
- Enlarging the Scope of Applicability of Successful Techniques for Automated Reasoning in Mathematics (YM), p. 9.
- RTA-2012-ThiemannAN #formal method #multi #on the #order #termination
- On the Formalization of Termination Techniques based on Multiset Orderings (RT, GA, JN), pp. 339–354.
- SMT-2012-AzizWD #estimation #machine learning #problem #smt
- A Machine Learning Technique for Hardness Estimation of QFBV SMT Problems (MAA, AGW, NMD), pp. 57–66.
- ECSA-2011-JohnsenPL #architecture #specification #verification
- An Architecture-Based Verification Technique for AADL Specifications (AJ, PP, KL), pp. 105–113.
- ECSA-2011-NavarroCPR #architecture #model transformation #using
- Using Model Transformation Techniques for the Superimposition of Architectural Styles (EN, CEC, DEP, CR), pp. 379–387.
- ECSA-2011-TofanGA #architecture #grid
- Reducing Architectural Knowledge Vaporization by Applying the Repertory Grid Technique (DT, MG, PA), pp. 244–251.
- ASE-2011-ChenG #automation #documentation #retrieval #traceability
- Improving automated documentation to code traceability by combining retrieval techniques (XC, JCG), pp. 223–232.
- CASE-2011-Bonhomme #petri net #realtime #scheduling
- A symbolic schedulability technique of real-time systems modeled by P-Time Petri nets (PB), pp. 582–587.
- DAC-2011-AadithyaVDR #impact analysis #named #predict #probability #random
- MUSTARD: a coupled, stochastic/deterministic, discrete/continuous technique for predicting the impact of random telegraph noise on SRAMs and DRAMs (KVA, SV, AD, JSR), pp. 292–297.
- DAC-2011-NowrozWR #modelling #using
- Improved post-silicon power modeling using AC lock-in techniques (ANN, GW, SR), pp. 101–106.
- DAC-2011-WeiP #security #using
- Integrated circuit security techniques using variable supply voltage (SW, MP), pp. 248–253.
- DATE-2011-AcquavivaPOS #power management #reliability
- System level techniques to improve reliability in high power microcontrollers for automotive applications (AA, MP, MO, MS), pp. 1123–1124.
- DATE-2011-BalasubramanianSMNDKMPPVT #low cost #power management #robust
- Circuit and DFT techniques for robust and low cost qualification of a mixed-signal SoC with integrated power management system (LB, PS, RKM, PN, RKD, ADK, SM, SP, HP, RCV, ST), pp. 551–554.
- DATE-2011-ChanSGK #on the
- On the efficacy of NBTI mitigation techniques (TBC, JS, PG, RK), pp. 932–937.
- DATE-2011-EbrahimiMA #fault #named #safety
- ScTMR: A scan chain-based error recovery technique for TMR systems in safety-critical applications (ME, SGM, HA), pp. 298–292.
- DATE-2011-FerentD #automation #design #similarity
- A symbolic technique for automated characterization of the uniqueness and similarity of analog circuit design features (CF, AD), pp. 1212–1217.
- DATE-2011-JuanGM #3d #evaluation #multi #process #statistics
- Statistical thermal evaluation and mitigation techniques for 3D Chip-Multiprocessors in the presence of process variations (DCJ, SG, DM), pp. 383–388.
- DATE-2011-KamalAP
- Timing variation-aware custom instruction extension technique (MK, AAK, MP), pp. 1517–1520.
- DATE-2011-LiuS #continuation #optimisation #performance
- An efficient mask optimization method based on homotopy continuation technique (FL, XS), pp. 1053–1058.
- DATE-2011-MeynardRFGHD
- Enhancement of simple electro-magnetic attacks by pre-characterization in frequency domain and demodulation techniques (OM, DR, FF, SG, NH, JLD), pp. 1004–1009.
- DATE-2011-MistryAFH #power management
- Sub-clock power-gating technique for minimising leakage power during active mode (JNM, BMAH, DF, SH), pp. 106–111.
- DATE-2011-ReimerPSB #integration #orthogonal
- Integration of orthogonal QBF solving techniques (SR, FP, CS, BB), pp. 149–154.
- DATE-2011-SterponeCMWF #configuration management #power management
- A new reconfigurable clock-gating technique for low power SRAM-based FPGAs (LS, LC, DM, SW, FF), pp. 752–757.
- DATE-2011-TinoK #architecture #generative #multi
- Multi-objective Tabu Search based topology generation technique for application-specific Network-on-Chip architectures (AT, GNK), pp. 485–490.
- DATE-2011-WangCC #self
- An all-digital built-in self-test technique for transfer function characterization of RF PLLs (PYW, HMC, KTC), pp. 359–364.
- DATE-2011-WangKAWMA #energy #simulation #using
- Accelerated simulation of tunable vibration energy harvesting systems using a linearised state-space technique (LW, TJK, BMAH, ASW, GVM, INAG), pp. 1267–1272.
- DATE-2011-WeddellMA #power management
- Ultra low-power photovoltaic MPPT technique for indoor and outdoor wireless sensor nodes (ASW, GVM, BMAH), pp. 905–908.
- ICDAR-2011-AlaeiPNK #documentation #estimation
- A Painting Based Technique for Skew Estimation of Scanned Documents (AA, UP, PN, FK), pp. 299–303.
- ICDAR-2011-EraqiA #online #recognition #segmentation
- An On-line Arabic Handwriting Recognition System: Based on a New On-line Graphemes Segmentation Technique (HME, SAA), pp. 409–413.
- ICDAR-2011-FerilliBEB #recognition
- A Contour-Based Progressive Technique for Shape Recognition (SF, TMAB, FE, MB), pp. 723–727.
- ICDAR-2011-PapandreouG #detection #novel
- A Novel Skew Detection Technique Based on Vertical Projections (AP, BG), pp. 384–388.
- ICDAR-2011-RashidSB #evaluation #recognition
- An Evaluation of HMM-Based Techniques for the Recognition of Screen Rendered Text (SFR, FS, TMB), pp. 1260–1264.
- ICDAR-2011-SmithGSL #evaluation
- Evaluation of Voting with Form Dropout Techniques for Ballot Vote Counting (EHBS, SG, RS, DPL), pp. 473–477.
- ICDAR-2011-SokratisK
- A Tool for Tuning Binarization Techniques (SV, EK), pp. 1–5.
- ICDAR-2011-SuLT #documentation #image
- Combination of Document Image Binarization Techniques (BS, SL, CLT), pp. 22–26.
- SIGMOD-2011-HanPLKY #analysis #graph #performance
- iGraph in action: performance analysis of disk-based graph indexing techniques (WSH, MDP, JL, RK, JXY), pp. 1241–1242.
- SIGMOD-2011-HerodotouBB #optimisation #query
- Query optimization techniques for partitioned tables (HH, NB, SB), pp. 49–60.
- VLDB-2011-FloratouPST #pipes and filters
- Column-Oriented Storage Techniques for MapReduce (AF, JMP, EJS, ST), pp. 419–429.
- VLDB-2011-GrecoST #termination
- Stratification Criteria and Rewriting Techniques for Checking Chase Termination (SG, FS, IT), pp. 1158–1168.
- ITiCSE-2011-TaylorK #injection #security #student
- Security injections: modules to help students remember, understand, and apply secure coding techniques (BT, SK), pp. 3–7.
- CSMR-2011-AlawnehH #abstraction #communication #pattern matching #pattern recognition #recognition
- Pattern Recognition Techniques Applied to the Abstraction of Traces of Inter-Process Communication (LA, AHL), pp. 211–220.
- ICPC-2011-DitGPA #feature model #identifier #question
- Can Better Identifier Splitting Techniques Help Feature Location? (BD, LG, DP, GA), pp. 11–20.
- ICPC-2011-Sharafi #analysis #architecture #visualisation
- A Systematic Analysis of Software Architecture Visualization Techniques (ZS), pp. 254–257.
- ICSM-2011-PirzadehHS #analysis #execution #mining
- Exploiting text mining techniques in the analysis of execution traces (HP, AHL, MS), pp. 223–232.
- ICSM-2011-VasilescuSB #case study #metric
- You can’t control the unfamiliar: A study on the relations between aggregation techniques for software metrics (BV, AS, MvdB), pp. 313–322.
- WCRE-2011-Beard #debugging #information retrieval #locality #using
- Extending Bug Localization Using Information Retrieval and Code Clone Location Techniques (MDB), pp. 425–428.
- WCRE-2011-BeardKEL #debugging #information retrieval #locality
- Measuring the Accuracy of Information Retrieval Based Bug Localization Techniques (MDB, NAK, LHE, SKL), pp. 124–128.
- WCRE-2011-DaviesRW #debugging #dependence #evaluation
- A Preliminary Evaluation of Text-based and Dependency-based Techniques for Determining the Origins of Bugs (SD, MR, MW), pp. 201–210.
- PLDI-2011-BestMMRFB #scheduling
- Synchronization via scheduling: techniques for efficiently managing shared state (MJB, SM, CM, MR, AF, AB), pp. 640–652.
- SAS-2011-HuangZ #concurrent #debugging #performance #source code
- An Efficient Static Trace Simplification Technique for Debugging Concurrent Programs (JH, CZ), pp. 163–179.
- SEFM-2011-TschannenFNM #object-oriented #source code #verification
- Usable Verification of Object-Oriented Programs by Combining Static and Dynamic Techniques (JT, CAF, MN, BM), pp. 382–398.
- SFM-2011-ForejtKNP #automation #probability #verification
- Automated Verification Techniques for Probabilistic Systems (VF, MZK, GN, DP), pp. 53–113.
- GT-VMT-2011-GogollaHXZ #visual notation
- Exploring (Meta-)Model Snapshots by Combining Visual and Textual Techniques (MG, LH, JX, JZ).
- CHI-2011-BlanchO #benchmark #metric #paradigm
- Benchmarking pointing techniques with distractors: adding a density factor to Fitts’ pointing paradigm (RB, MO), pp. 1629–1638.
- CHI-2011-FailyF
- Persona cases: a technique for grounding personas (SF, IF), pp. 2267–2270.
- CHI-2011-HasanGI
- Comet and target ghost: techniques for selecting moving targets (KH, TG, PI), pp. 839–848.
- CHI-2011-HollinworthH
- Cursor relocation techniques to help older adults find “lost” cursors (NH, FH), pp. 863–866.
- CHI-2011-JamilOPKS #collaboration #interactive #learning
- The effects of interaction techniques on talk patterns in collaborative peer learning around interactive tables (IJ, KO, MJP, AK, SS), pp. 3043–3052.
- CHI-2011-KhalilbeigiLMS #interactive #named
- Xpaaand: interaction techniques for rollable displays (MK, RL, MM, JS), pp. 2729–2732.
- CHI-2011-LuL #gesture #mobile #user interface #using
- Gesture avatar: a technique for operating mobile user interfaces using gestures (HL, YL), pp. 207–216.
- CHI-2011-SrikulwongO #case study #comparative #representation #smarttech
- A comparative study of tactile representation techniques for landmarks on a wearable device (MS, EO), pp. 2029–2038.
- CHI-2011-TamakiMR #named #using
- PossessedHand: techniques for controlling human hands using electrical muscles stimuli (ET, TM, JR), pp. 543–552.
- DUXU-v2-2011-TsaoCY #case study #design #image
- A Study on the Expected Image and Relevant Design Techniques in Different Product-Use Stages (YCT, BC, YPY), pp. 655–663.
- DUXU-v2-2011-WynnS #data analysis #low cost #video
- Motivating Change and Reducing Cost with the Discount Video Data Analysis Technique (JW, JDS), pp. 321–328.
- HCD-2011-YajimaSY #comprehension #problem #visualisation
- Understanding the Business Realities: An Interview Technique Which Can Visualize the Job Problems (AY, YS, TY), pp. 449–457.
- HCI-ITE-2011-DadgariS
- New Techniques for Merging Text Versions (DD, WS), pp. 331–340.
- HCI-ITE-2011-FahnC #gesture #interactive #recognition
- Hidden-Markov-Model-Based Hand Gesture Recognition Techniques Used for a Human-Robot Interaction System (CSF, KYC), pp. 248–258.
- HCI-ITE-2011-NebeKJF #interactive #multi #using
- Exploiting New Interaction Techniques for Disaster Control Management Using Multitouch-, Tangible- and Pen-Based-Interaction (KN, FK, HJ, HF), pp. 100–109.
- HCI-UA-2011-VellaVR #people
- Investigating Drag and Drop Techniques for Older People with Cognitive Impairment (FV, NV, PR), pp. 530–538.
- HIMI-v1-2011-YanoAFJ #modelling #performance #predict #process
- Feasibility Study of Predictive Human Performance Modeling Technique in Field Activities (NY, TA, SF, BEJ), pp. 180–189.
- HIMI-v2-2011-TanerYNB #generative #performance #scalability
- An Efficient and Scalable Meeting Minutes Generation and Presentation Technique (BT, CY, AON, SB), pp. 345–352.
- ICEIS-v1-2011-NiknafsSRR #analysis #comparative #predict
- Comparative Analysis of Three Techniques for Predictions in Time Series Having Repetitive Patterns (AN, BS, MMR, GR), pp. 177–182.
- ICEIS-v1-2011-YamaguchiDF #guidelines #process #visualisation
- Guidelines for the Choice of Visualization Techniques Applied in the Process of Knowledge Extraction (JKY, MMD, CF), pp. 183–189.
- CIKM-2011-Bradford #implementation #scalability #semantics
- Implementation techniques for large-scale latent semantic indexing applications (RBB), pp. 339–344.
- CIKM-2011-CostantiniN #clustering #image
- Image clustering fusion technique based on BFS (LC, RN), pp. 2093–2096.
- ECIR-2011-HerbertSG #information retrieval #query
- Combining Query Translation Techniques to Improve Cross-Language Information Retrieval (BH, GS, IG), pp. 712–715.
- KDD-2011-LinSM #adaptation #modelling #online #topic #twitter
- Smoothing techniques for adaptive online language models: topic tracking in tweet streams (JL, RS, WM), pp. 422–429.
- KDD-2011-McCloskeyKIKB #behaviour #data mining #mining #using
- From market baskets to mole rats: using data mining techniques to analyze RFID data describing laboratory animal behavior (DPM, MEK, SPI, IK, SBM), pp. 301–306.
- KDD-2011-ZhengSTLLC #challenge #data mining #information management #mining #mobile
- Applying data mining techniques to address disaster information management challenges on mobile devices (LZ, CS, LT, TL, SL, SCC), pp. 283–291.
- KDIR-2011-ClariziaCSGN #graph #novel #query
- A Novel Query Expansion Technique based on a Mixed Graph of Terms (FC, FC, MDS, LG, PN), pp. 84–93.
- MLDM-2011-AdolfHHCH #analysis #grid #power management
- Techniques for Improving Filters in Power Grid Contingency Analysis (RA, DH, MH, YC, ZH), pp. 599–611.
- RecSys-2011-BaltrunasLR #matrix #recommendation
- Matrix factorization techniques for context aware recommendation (LB, BL, FR), pp. 301–304.
- RecSys-2011-KatzOSRS #collaboration #using #wiki
- Using Wikipedia to boost collaborative filtering techniques (GK, NO, BS, LR, GS), pp. 285–288.
- SEKE-2011-YuLFC #composition #testing
- A Regression Test Technique for Analyzing the Functionalities of Service Composition (HY, DL, GF, LC), pp. 578–582.
- SIGIR-2011-SandenZ #classification #multi #music
- Enhancing multi-label music genre classification through ensemble techniques (CS, JZZ), pp. 705–714.
- POPL-2011-JoishaSBBC #automation #compilation #effectiveness #optimisation #parallel #reuse #thread
- A technique for the effective and automatic reuse of classical compiler optimizations on multithreaded code (PGJ, RSS, PB, HJB, DRC), pp. 623–636.
- SAC-2011-AhnAHS #component #fault tolerance #framework
- Fault tolerant framework and techniques for component-based autonomous robot systems (HA, SCA, JH, SYS), pp. 566–572.
- SAC-2011-BabichCPK #abstraction #case study #eclipse #fault #object-oriented #predict #using
- Using a class abstraction technique to predict faults in OO classes: a case study through six releases of the Eclipse JDT (DB, PJC, JFP, BMGK), pp. 1419–1424.
- SAC-2011-DebroyW #equivalence #fault #locality #on the
- On the equivalence of certain fault localization techniques (VD, WEW), pp. 1457–1463.
- SAC-2011-TrindadeR #3d #multi #navigation #using
- Improving 3D navigation in multiscale environments using cubemap-based techniques (DRT, ABR), pp. 1215–1221.
- SAC-2011-YouCXLZ #effectiveness #empirical #testing
- An empirical study on the effectiveness of time-aware test case prioritization techniques (DY, ZC, BX, BL, CZ), pp. 1451–1456.
- ICSE-2011-TofanGA #architecture #grid #using
- Capturing tacit architectural knowledge using the repertory grid technique (DT, MG, PA), pp. 916–919.
- LDTA-2011-JohnstoneSB #named
- LDT: a language definition technique (AJ, ES, MvdB), p. 9.
- CC-2011-LameedH #array #compilation #jit #matlab #semantics #staged
- Staged Static Techniques to Efficiently Implement Array Copy Semantics in a MATLAB JIT Compiler (NL, LJH), pp. 22–41.
- HPCA-2011-LiuLNMMH #hardware
- Hardware/software techniques for DRAM thermal management (SL, BL, AN, SOM, GM, NH), pp. 515–525.
- ISMM-2011-GarnerBF #evaluation
- A comprehensive evaluation of object scanning techniques (RG, SMB, DF), pp. 33–42.
- LCTES-2011-BhagatGSG #effectiveness #optimisation
- Global productiveness propagation: a code optimization technique to speculatively prune useless narrow computations (IB, EG, FJS, AG), pp. 161–170.
- LCTES-2011-JangKLKYKKR #architecture #clustering #configuration management
- An instruction-scheduling-aware data partitioning technique for coarse-grained reconfigurable architectures (CJ, JK, JL, HSK, DY, SK, HK, SR), pp. 151–160.
- PPoPP-2011-MurarasuWBBP #algorithm #data type #grid #scalability
- Compact data structure and scalable algorithms for the sparse grid technique (AFM, JW, GB, DB, DP), pp. 25–34.
- ICLP-2011-Bottalico #consistency #hybrid #simulation
- Consistency Techniques for Hybrid Simulations (MB), pp. 255–260.
- ICST-2011-ChenCZXF #clustering #testing #using
- Using semi-supervised clustering to improve regression test selection techniques (SC, ZC, ZZ, BX, YF), pp. 1–10.
- ICTSS-2011-MammarCJMO #c #detection #source code #testing #using
- Using Testing Techniques for Vulnerability Detection in C Programs (AM, ARC, WJ, WM, EMdO), pp. 80–96.
- ICTSS-2011-ShinboH #communication #detection #empirical #mobile
- An Empirical Study on Applying Anomaly Detection Technique to Detecting Software and Communication Failures in Mobile Data Communication Services (HS, TH), pp. 195–208.
- ISSTA-2011-ParninO #automation #debugging #question
- Are automated debugging techniques actually helping programmers? (CP, AO), pp. 199–209.
- TAP-2011-BueJM #approximate #generative #modelling #testing
- Association of Under-Approximation Techniques for Generating Tests from Models (PCB, JJ, PAM), pp. 51–68.
- ECSA-2010-ChristensenHL #architecture #assurance #lightweight #quality #using
- Lightweight and Continuous Architectural Software Quality Assurance Using the aSQA Technique (HBC, KMH, BL), pp. 118–132.
- ASE-2010-BavotaLMO #refactoring
- A two-step technique for extract class refactoring (GB, ADL, AM, RO), pp. 151–154.
- ASE-2010-HilliardMMP #architecture #framework #megamodelling
- Realizing architecture frameworks through megamodelling techniques (RH, IM, HM, PP), pp. 305–308.
- CASE-2010-RoutrayRS #clustering #detection #fault #reduction
- Data reduction and clustering techniques for fault detection and diagnosis in automotives (AR, AR, SS), pp. 326–331.
- DAC-2010-NowrozCR #monitoring
- Thermal monitoring of real processors: techniques for sensor allocation and full characterization (ANN, RC, SR), pp. 56–61.
- DATE-2010-CarterNG #design
- Design techniques for cross-layer resilience (NPC, HN, DSG), pp. 1023–1028.
- DATE-2010-ChandraPA #on the
- On the efficacy of write-assist techniques in low voltage nanoscale SRAMs (VC, CP, RCA), pp. 345–350.
- DATE-2010-ChenQM #generative #performance #satisfiability #testing
- Efficient decision ordering techniques for SAT-based test generation (MC, XQ, PM), pp. 490–495.
- DATE-2010-DammMHG #modelling #network #simulation #transaction #using
- Using Transaction Level Modeling techniques for wireless sensor network simulation (MD, JM, JH, CG), pp. 1047–1052.
- DATE-2010-HuangCLH #robust
- A robust ADC code hit counting technique (JLH, KYC, MHL, XLH), pp. 1749–1754.
- DATE-2010-Kheradmand-BoroujeniPL #independence #novel #process
- AVGS-Mux style: A novel technology and device independent technique for reducing power and compensating process variations in FPGA fabrics (BKB, CP, YL), pp. 339–344.
- DATE-2010-LiuFG #optimisation #performance
- An accurate and efficient yield optimization method for analog circuits based on computing budget allocation and memetic search technique (BL, FVF, GGEG), pp. 1106–1111.
- DATE-2010-LiuNCMP #reduction
- Post-placement temperature reduction techniques (WL, AN, AC, EM, MP), pp. 634–637.
- DATE-2010-QaziTDSC #analysis #performance #reduction
- Loop flattening & spherical sampling: Highly efficient model reduction techniques for SRAM yield analysis (MQ, MT, LD, DS, AC), pp. 801–806.
- DATE-2010-SubramanyanSSL #execution #fault tolerance #multi #performance
- Multiplexed redundant execution: A technique for efficient fault tolerance in chip multiprocessors (PS, VS, KKS, EL), pp. 1572–1577.
- DATE-2010-UbarDRJ #parallel #simulation
- Parallel X-fault simulation with critical path tracing technique (RU, SD, JR, AJ), pp. 879–884.
- VLDB-2010-HanLPY #framework #graph #named
- iGraph: A Framework for Comparisons of Disk-Based Graph Indexing Techniques (WSH, JL, MDP, JXY), pp. 449–459.
- VLDB-2010-Samet #database #multi #similarity
- Techniques for Similarity Searching in Multimedia Databases (HS), pp. 1649–1650.
- FASE-2010-KelsenM #composition
- A Modular Model Composition Technique (PK, QM), pp. 173–187.
- FASE-2010-LauterburgKMA #heuristic #partial order #reduction
- Evaluating Ordering Heuristics for Dynamic Partial-Order Reduction Techniques (SL, RKK, DM, GA), pp. 308–322.
- CSMR-2010-MadaniGPGA #identifier #recognition #source code #speech #using #word
- Recognizing Words from Source Code Identifiers Using Speech Recognition Techniques (NM, LG, MDP, YGG, GA), pp. 68–77.
- CSMR-2010-MaiaBFG #hybrid #impact analysis #object-oriented
- The Hybrid Technique for Object-Oriented Software Change Impact Analysis (MCOM, RAB, JCAdF, DDSG), pp. 252–255.
- ICPC-2010-BarbourYZ #clone detection #detection #scalability
- A Technique for Just-in-Time Clone Detection in Large Scale Systems (LB, HY, YZ), pp. 76–79.
- WCRE-2010-BittencourtSGM #automation #information retrieval #modelling #using
- Improving Automated Mapping in Reflexion Models Using Information Retrieval Techniques (RAB, GJdSS, DDSG, GCM), pp. 163–172.
- WCRE-2010-HaiducAMM #automation #on the #source code #summary
- On the Use of Automated Text Summarization Techniques for Summarizing Source Code (SH, JA, LM, AM), pp. 35–44.
- IFM-2010-Baier #distributed #model checking #on the #random
- On Model Checking Techniques for Randomized Distributed Systems (CB), pp. 1–11.
- IFM-2010-HulsbuschKRSSW #comparison #model transformation #semantics
- Showing Full Semantics Preservation in Model Transformation — A Comparison of Techniques (MH, BK, AR, MS, CS, HW), pp. 183–198.
- CHI-2010-BaillyLG #linear #multi
- Finger-count & radial-stroke shortcuts: 2 techniques for augmenting linear menus on multi-touch surfaces (GB, EL, YG), pp. 591–594.
- CHI-2010-CherubiniGOO #persuasion #self #social
- Social tagging revamped: supporting the users’ need of self-promotion through persuasive techniques (MC, AG, RdO, NO), pp. 985–994.
- CHI-2010-FuGN #3d #multi #scalability #simulation
- Multi-touch techniques for exploring large-scale 3D astrophysical simulations (CWF, WBG, JAN), pp. 2213–2222.
- CHI-2010-MoffattM #fault #named
- Steadied-bubbles: combining techniques to address pen-based pointing errors for younger and older adults (KM, JM), pp. 1125–1134.
- CHI-2010-WalshDGFGHBF #co-evolution #design
- Layered elaboration: a new technique for co-design with children (GW, AD, MLG, EF, EG, LH, EMB, SF), pp. 1237–1240.
- SOFTVIS-2010-FrischD #diagrams #visualisation
- Off-screen visualization techniques for class diagrams (MF, RD), pp. 163–172.
- ICEIS-AIDSS-2010-CuzzocreaFP #abstraction #analysis #collaboration #effectiveness #flexibility #mining #process
- Effective Analysis of Flexible Collaboration Processes by Way of Abstraction and Mining Techniques (AC, FF, LP), pp. 157–166.
- ICEIS-AIDSS-2010-LampertiZ #lazy evaluation
- Diagnosis of Active Systems by Lazy Techniques (GL, MZ), pp. 171–180.
- ICEIS-AIDSS-2010-Vilas-BoasSPSR #data mining #mining #predict
- Hourly Prediction of Organ Failure and Outcome in Intensive Care based on Data Mining Techniques (MVB, MFS, FP, ÁMS, FR), pp. 270–277.
- ICEIS-DISI-2010-PreisslerHL #data type #streaming
- Process-based Data Streaming in Service-oriented Environments — Application and Technique (SP, DH, WL), pp. 40–49.
- ICEIS-ISAS-2010-ClariziaGN #identification #query #web
- A New Technique for Identification of Relevant Web Pages in Informational Queries Results (FC, LG, PN), pp. 70–79.
- CIKM-2010-HeZS #documentation #version control
- Improved index compression techniques for versioned document collections (JH, JZ, TS), pp. 1239–1248.
- CIKM-2010-KaliciakSWP #hybrid #image #novel #retrieval
- Novel local features with hybrid sampling technique for image retrieval (LK, DS, NW, JP), pp. 1557–1560.
- ICPR-2010-AlvaroS #recognition
- Comparing Several Techniques for Offline Recognition of Printed Mathematical Symbols (FA, JAS), pp. 1953–1956.
- ICPR-2010-BruneauGP #parametricity #probability
- Aggregation of Probabilistic PCA Mixtures with a Variational-Bayes Technique Over Parameters (PB, MG, FP), pp. 702–705.
- ICPR-2010-Casarrubias-VargasPB #machine learning #navigation #visual notation
- EKF-SLAM and Machine Learning Techniques for Visual Robot Navigation (HCV, APB, EBC), pp. 396–399.
- ICPR-2010-DaoS #recognition #robust
- A Robust Recognition Technique for Dense Checkerboard Patterns (VND, MS), pp. 3081–3084.
- ICPR-2010-KimL #markov #monte carlo #optimisation #random #using
- Continuous Markov Random Field Optimization Using Fusion Move Driven Markov Chain Monte Carlo Technique (WK, KML), pp. 1364–1367.
- ICPR-2010-KunduD #image #security
- Lossless ROI Medical Image Watermarking Technique with Enhanced Security and High Payload Embedding (MKK, SD), pp. 1457–1460.
- ICPR-2010-MalakutiA #monitoring #towards
- Towards an Intelligent Bed Sensor: Non-intrusive Monitoring of Sleep Irregularities with Computer Vision Techniques (KM, ABA), pp. 4004–4007.
- ICPR-2010-RathgebU #performance #recognition
- Attacking Iris Recognition: An Efficient Hill-Climbing Technique (CR, AU), pp. 1217–1220.
- ICPR-2010-StrucDP #recognition #robust
- Confidence Weighted Subspace Projection Techniques for Robust Face Recognition in the Presence of Partial Occlusions (VS, SD, NP), pp. 1334–1338.
- ICPR-2010-TianSK #evaluation
- Task-Oriented Evaluation of Super-Resolution Techniques (LT, AS, HK), pp. 493–498.
- KDD-2010-DangB #clustering #linear
- A hierarchical information theoretic technique for the discovery of non linear alternative clusterings (XHD, JB), pp. 573–582.
- KDD-2010-SunCY #approach #reduction #scalability
- A scalable two-stage approach for a class of dimensionality reduction techniques (LS, BC, JY), pp. 313–322.
- KDD-2010-ZhengSTLLCH #data mining #mining #network #using
- Using data mining techniques to address critical information exchange needs in disaster affected public-private networks (LZ, CS, LT, TL, SL, SCC, VH), pp. 125–134.
- KMIS-2010-DienstAHF #knowledge base #visual notation
- Applying Fusion Techniques to Graphical Methods for Knowledge based Processing of Product use Information (SD, FA, AH, MF), pp. 136–142.
- KMIS-2010-DotoliF #multi #optimisation
- A Hierarchical Vendor Selection Optimization Technique for Multiple Sourcing (MD, MF), pp. 195–200.
- RecSys-2010-JamaliE #matrix #network #recommendation #social #trust
- A matrix factorization technique with trust propagation for recommendation in social networks (MJ, ME), pp. 135–142.
- SEKE-2010-CostaBR
- Software Project Portfolio Selection: a Modern Portfolio Theory Based Technique (HRC, MdOB, ARR), pp. 387–392.
- SEKE-2010-DuanCZQY #clustering #slicing #testing
- Improving Cluster Selection Techniques of Regression Testing by Slice Filtering (YD, ZC, ZZ, JQ, ZY), pp. 253–258.
- SEKE-2010-KhoshgoftaarG #machine learning #metric #novel #re-engineering #using
- Software Engineering with Computational Intelligence and Machine Learning A Novel Software Metric Selection Technique Using the Area Under ROC Curves (TMK, KG), pp. 203–208.
- SEKE-2010-PaikariRR #case study #comparative #fault #predict #reasoning #using
- A Comparative Study of Attribute Weighting Techniques for Software Defect Prediction Using Case-based Reasoning (EP, MMR, GR), pp. 380–386.
- SEKE-2010-WangKG #classification #feature model #quality
- Ensemble Feature Selection Technique for Software Quality Classification (HW, TMK, KG), pp. 215–220.
- SEKE-2010-WangPACC #analysis #automation #process
- An Automatic Failure Mode and Effect Analysis Technique for Processes Defined in the Little-JIL Process Definition Language (DW, JP, GSA, LAC, BC), pp. 765–770.
- SEKE-2010-XuDWG #evaluation #fault #locality
- An Evaluation of Tie-Breaking Strategies for Fault Localization Techniques (XX, VD, WEW, DG), pp. 123–128.
- SIGIR-2010-HustonC #query
- Evaluating verbose query processing techniques (SH, WBC), pp. 291–298.
- MoDELS-v1-2010-LucioBA #automation #model transformation #validation
- A Technique for Automatic Validation of Model Transformations (LL, BB, VA), pp. 136–150.
- MoDELS-v1-2010-SchrammPHV #agile #development #enterprise #modelling #user interface
- Rapid UI Development for Enterprise Applications: Combining Manual and Model-Driven Techniques (AS, AP, MH, LV), pp. 271–285.
- MoDELS-v2-2010-LoniewskiIA #bibliography #development #modelling #requirements
- A Systematic Review of the Use of Requirements Engineering Techniques in Model-Driven Development (GL, EI, SA), pp. 213–227.
- RE-2010-SultanovH #requirements
- Application of Swarm Techniques to Requirements Engineering: Requirements Tracing (HS, JHH), pp. 211–220.
- SAC-2010-GhoshS #constraints #design #energy #performance
- Efficient mapping and voltage islanding technique for energy minimization in NoC under design constraints (PG, AS), pp. 535–541.
- SAC-2010-PelosiP #mobile #named
- SMaC: spatial map caching technique for mobile devices (GP, GP), pp. 1829–1830.
- SAC-2010-RodriguesNPM #parallel #thread
- A new technique for data privatization in user-level threads and its use in parallel applications (ERR, POAN, JP, CLM), pp. 2149–2154.
- SAC-2010-ShestakovS #clustering #web
- Host-IP clustering technique for deep web characterization (DS, TS), pp. 874–875.
- FSE-2010-JalbertS #concurrent #debugging #effectiveness #source code
- A trace simplification technique for effective debugging of concurrent programs (NJ, KS), pp. 57–66.
- FSE-2010-XuKKRC #testing #trade-off
- Directed test suite augmentation: techniques and tradeoffs (ZX, YK, MK, GR, MBC), pp. 257–266.
- ICSE-2010-Ma #analysis #constraints #testing #theorem proving
- Constraint solving techniques for software testing and analysis (FM), pp. 417–420.
- ICSE-2010-RuscioMMPP #generative
- Developing next generation ADLs through MDE techniques (DDR, IM, HM, PP, AP), pp. 85–94.
- SPLC-2010-CetinaGFP #design #guidelines #product line #prototype
- Designing and Prototyping Dynamic Software Product Lines: Techniques and Guidelines (CC, PG, JF, VP), pp. 331–345.
- HPCA-2010-GreskampKT #configuration management #multi #named #performance #thread
- LeadOut: Composing low-overhead frequency-enhancing techniques for single-thread performance in configurable multicores (BG, URK, JT), pp. 1–12.
- HPDC-2010-MarinCG #web
- New caching techniques for web search engines (MM, VGC, CGP), pp. 215–226.
- ICLP-2010-Zwirchmayr10 #analysis
- Cutting-Edge Timing Analysis Techniques (JZ), pp. 303–305.
- ICLP-J-2010-BrummayerJ #debugging #development #testing
- Testing and debugging techniques for answer set solver development (RB, MJ), pp. 741–758.
- ICST-2010-BertoliniMAF #evaluation #testing #user interface
- GUI Testing Techniques Evaluation by Designed Experiments (CB, AM, EA, CF), pp. 235–244.
- ICST-2010-NagahawatteD #effectiveness #fault #testing
- The Effectiveness of Regression Testing Techniques in Reducing the Occurrence of Residual Defects (PN, HD), pp. 79–88.
- SAT-2010-Cotton #proving
- Two Techniques for Minimizing Resolution Proofs (SC), pp. 306–312.
- SAT-2010-MillerKLB #bound #design #encoding #model checking
- Encoding Techniques, Craig Interpolants and Bounded Model Checking for Incomplete Designs (CM, SK, MDTL, BB), pp. 194–208.
- WICSA-ECSA-2009-BritoRL #architecture #fault tolerance #verification
- Verifying architectural variabilities in software fault tolerance techniques (PHSB, CMFR, RdL), pp. 231–240.
- ASE-2009-AliADW #fault #locality
- Evaluating the Accuracy of Fault Localization Techniques (SA, JHA, TD, WW), pp. 76–87.
- CASE-2009-BeraN #using
- A Simple instrumentation calibration technique for Electrical Impedance Tomography (EIT) using a 16-electrode phantom (TKB, JN), pp. 347–352.
- DAC-2009-BaumannSP #architecture #assessment #design #embedded #robust
- Architectural assessment of design techniques to improve speed and robustness in embedded microprocessors (TB, DSL, CP), pp. 947–950.
- DAC-2009-BonnyH #named #performance
- LICT: left-uncompressed instructions compression technique to improve the decoding performance of VLIW processors (TB, JH), pp. 903–906.
- DAC-2009-BowmanTWLKDB
- Circuit techniques for dynamic variation tolerance (KAB, JT, CW, SLL, TK, VD, SYB), pp. 4–7.
- DAC-2009-CochranR
- Spectral techniques for high-resolution thermal characterization with limited sensor data (RC, SR), pp. 478–483.
- DAC-2009-FeySD #bound #fault tolerance #using
- Computing bounds for fault tolerance using formal techniques (GF, AS, RD), pp. 190–195.
- DAC-2009-Geilen #data flow #graph #reduction
- Reduction techniques for synchronous dataflow graphs (MG), pp. 911–916.
- DAC-2009-GhaniN #approximate #grid #performance #power management #using #verification
- Fast vectorless power grid verification using an approximate inverse technique (NHAG, FNN), pp. 184–189.
- DAC-2009-JamaaLM #array #multi
- Decoding nanowire arrays fabricated with the multi-spacer patterning technique (MHBJ, YL, GDM), pp. 77–82.
- DAC-2009-MarcilioSAR #behaviour #novel #verification
- A novel verification technique to uncover out-of-order DUV behaviors (GM, LCVdS, BA, SR), pp. 448–453.
- DAC-2009-VillenaS #automation #modelling #multi #named
- ARMS — automatic residue-minimization based sampling for multi-point modeling techniques (JFV, LMS), pp. 951–956.
- DAC-2009-Wong #canonical #performance
- An efficient passivity test for descriptor systems via canonical projector techniques (NW), pp. 957–962.
- DAC-2009-ZengZNGGS #optimisation #scheduling #using
- Scheduling the FlexRay bus using optimization techniques (HZ, WZ, MDN, AG, PG, ALSV), pp. 874–877.
- DATE-2009-0002CWCXY #optimisation
- Gate replacement techniques for simultaneous leakage and aging optimization (YW, XC, WW, YC, YX, HY), pp. 328–333.
- DATE-2009-GhasemzadehJSJ #communication #network
- Communication minimization for in-network processing in body sensor networks: A buffer assignment technique (HG, NJ, MS, RJ), pp. 358–363.
- DATE-2009-GopalakrishnanK #algebra #polynomial #synthesis
- Algebraic techniques to enhance common sub-expression elimination for polynomial system synthesis (SG, PK), pp. 1452–1457.
- DATE-2009-KorhonenK #identification
- A loopback-based INL test method for D/A and A/D converters employing a stimulus identification technique (EK, JK), pp. 1650–1655.
- DATE-2009-NeyDGPVBG #fault
- A new design-for-test technique for SRAM core-cell stability faults (AN, LD, PG, SP, AV, MB, VG), pp. 1344–1348.
- DATE-2009-PaciBB #adaptation #bias #communication #effectiveness #variability
- Effectiveness of adaptive supply voltage and body bias as post-silicon variability compensation techniques for full-swing and low-swing on-chip communication channels (GP, DB, LB), pp. 1404–1409.
- DATE-2009-Perry #design #modelling #quality #synthesis
- Model Based Design needs high level synthesis — A collection of high level synthesis techniques to improve productivity and quality of results for model based electronic design (SP), pp. 1202–1207.
- DATE-2009-YangH #parallel #pipes and filters #scheduling
- Pipelined data parallel task mapping/scheduling technique for MPSoC (HY, SH), pp. 69–74.
- DocEng-2009-Hassan09a #documentation #graph #interactive #named #using
- GraphWrap: a system for interactive wrapping of pdf documents using graph matching techniques (TH), pp. 247–248.
- HT-2009-BraP #adaptation #framework #hypermedia
- Dynamic and adaptive hypertext: generic frameworks, approaches and techniques (PDB, MP), pp. 387–388.
- ICDAR-2009-EmmanouilidisBP #classification #development #evaluation #locality
- Development and Evaluation of Text Localization Techniques Based on Structural Texture Features and Neural Classifiers (CE, CB, NP), pp. 1270–1274.
- ICDAR-2009-FerilliBEB #analysis #layout
- A Distance-Based Technique for Non-Manhattan Layout Analysis (SF, MB, FE, TMAB), pp. 231–235.
- ICDAR-2009-Hassan #documentation #graph #using
- User-Guided Wrapping of PDF Documents Using Graph Matching Techniques (TH), pp. 631–635.
- ICDAR-2009-KleberS #bibliography #documentation #re-engineering
- A Survey of Techniques for Document and Archaeology Artefact Reconstruction (FK, RS), pp. 1061–1065.
- ICDAR-2009-LouloudisSG #evaluation #novel #segmentation #word
- A Novel Two Stage Evaluation Methodology for Word Segmentation Techniques (GL, NS, BG), pp. 686–690.
- ICDAR-2009-NtirogiannisGP #adaptation #documentation #image #logic
- A Modified Adaptive Logical Level Binarization Technique for Historical Document Images (KN, BG, IP), pp. 1171–1175.
- ICDAR-2009-ShiSG
- A Steerable Directional Local Profile Technique for Extraction of Handwritten Arabic Text Lines (ZS, SS, VG), pp. 176–180.
- ICDAR-2009-ShivakumaraPT #detection #difference #video
- A Gradient Difference Based Technique for Video Text Detection (PS, TQP, CLT), pp. 156–160.
- ICDAR-2009-ShivakumaraPT09a #detection #robust #video
- A Robust Wavelet Transform Based Technique for Video Text Detection (PS, TQP, CLT), pp. 1285–1289.
- ICDAR-2009-StamatopoulosGP #documentation #evaluation #image #performance
- A Methodology for Document Image Dewarping Techniques Performance Evaluation (NS, BG, IP), pp. 956–960.
- SIGMOD-2009-TsirogiannisHSWG #query
- Query processing techniques for solid state drives (DT, SH, MAS, JLW, GG), pp. 59–72.
- VLDB-2009-CheemaLZWZ #lazy evaluation #monitoring #performance
- Lazy Updates: An Efficient Technique to Continuously Monitoring Reverse kNN (MAC, XL, YZ, WW, WZ), pp. 1138–1149.
- VLDB-2009-DaiGBBL #analysis #interactive #named
- TIAMAT: a Tool for Interactive Analysis of Microdata Anonymization Techniques (CD, GG, EB, JWB, NL), pp. 1618–1621.
- ITiCSE-2009-BlasGMB #analysis #automation #composition #using
- Automatic E-learning contents composition by using gap analysis techniques (JMdB, JMG, LdM, RB), p. 369.
- WRLA-2008-Rodriguez09
- Combining Techniques to Reduce State Space and Prove Strong Properties (DER), pp. 267–280.
- ESOP-2009-RajanTSL #composition #design #named #policy #verification #web #web service
- Tisa: A Language Design and Modular Verification Technique for Temporal Policies in Web Services (HR, JT, SMS, GTL), pp. 333–347.
- TACAS-2009-OrzanWW #equation #static analysis
- Static Analysis Techniques for Parameterised Boolean Equation Systems (SO, WW, TACW), pp. 230–245.
- ICPC-J-2008-RoyCK09 #approach #clone detection #comparison #detection #evaluation #tool support
- Comparison and evaluation of code clone detection techniques and tools: A qualitative approach (CKR, JRC, RK), pp. 470–495.
- CSMR-2009-NunesKSNGL #implementation #multi #product line
- Comparing Stability of Implementation Techniques for Multi-agent System Product Lines (CN, UK, CS, IN, AFG, CJPdL), pp. 229–232.
- ICPC-2009-PortoMF #comprehension #named #visualisation
- CRISTA: A tool to support code comprehension based on visualization and reading technique (DP, MGM, SCPFF), pp. 285–286.
- ICPC-2009-RevelleP #case study #feature model
- An exploratory study on assessing feature location techniques (MR, DP), pp. 218–222.
- ICSM-2009-AmalfitanoFT #behaviour #internet #modelling #reverse engineering
- Experimenting a reverse engineering technique for modelling the behaviour of rich internet applications (DA, ARF, PT), pp. 571–574.
- ICSM-2009-BettenburgSH #empirical #off the shelf #risk management #using
- An empirical study on the risks of using off-the-shelf techniques for processing mailing list data (NB, ES, AEH), pp. 539–542.
- ICSM-2009-FokaefsTCS #clustering #object-oriented #using
- Decomposing object-oriented class modules using an agglomerative clustering technique (MF, NT, AC, JS), pp. 93–101.
- ICSM-2009-Harrold #reuse #testing
- Reduce, reuse, recycle, recover: Techniques for improved regression testing (MJH), p. 5.
- ICSM-2009-NaslavskyZR #modelling #testing
- A model-based regression test selection technique (LN, HZ, DJR), pp. 515–518.
- SCAM-2009-SpaccoW #lightweight
- Lightweight Techniques for Tracking Unique Program Statements (JS, CCW), pp. 99–108.
- WCRE-1999-BacchelliDLR99a #benchmark #lightweight #metric #source code
- Benchmarking Lightweight Techniques to Link E-Mails and Source Code (AB, MD, ML, RR), pp. 205–214.
- WCRE-1999-TangHZ99a #identification
- Techniques for Identifying the Country Origin of Mailing List Participants (RT, AEH, YZ), pp. 36–40.
- PLDI-2009-JoshiPSN #detection #program analysis #random
- A randomized dynamic program analysis technique for detecting real deadlocks (PJ, CSP, KS, MN), pp. 110–120.
- SEFM-2009-BertoliniM #model checking #probability #testing #user interface #using
- Using Probabilistic Model Checking to Evaluate GUI Testing Techniques (CB, AM), pp. 115–124.
- CHI-2009-GuoYS #interactive
- Touch and toys: new techniques for interaction with a remote group of robots (CG, JEY, ES), pp. 491–500.
- CHI-2009-KratzB #feedback #gesture #mobile #recognition #visual notation
- Unravelling seams: improvoing mobile gesture recognition with visual feedback techniques (SGK, RB), pp. 937–940.
- CHI-2009-LudwigPT #interactive #novel
- Path selection: a novel interaction technique for mapping applications (ML, RP, LGT), pp. 2309–2318.
- CHI-2009-MaedaIA
- Arrow tag: a direction-key-based technique for rapidly selecting hyperlinks while gazing at a screen (AM, HI, MA), pp. 1025–1028.
- CHI-2009-MatejkaGLF #design #evaluation #multi
- The design and evaluation of multi-finger mouse emulation techniques (JM, TG, JL, GWF), pp. 1073–1082.
- CHI-2009-PinelleBNM #coordination #evaluation
- An evaluation of coordination techniques for protecting objects and territories in tabletop groupware (DP, MB, MAN, RLM), pp. 2129–2138.
- CHI-2009-RahmanGIS
- Tilt techniques: investigating the dexterity of wrist-based input (MR, SG, PI, SS), pp. 1943–1952.
- CHI-2009-SauvanLLC #human-computer #interface #performance
- A performance model of selection techniques for p300-based brain-computer interfaces (JBS, AL, FL, GC), pp. 2205–2208.
- CHI-2009-WhiteF #named #visualisation
- SiteLens: situated visualization techniques for urban site visits (SW, SF), pp. 1117–1120.
- DHM-2009-PandithLD #evaluation #using
- The Impact of Change in Software on Satisfaction: Evaluation Using Critical Incident Technique (CIT) (AP, ML, VGD), pp. 717–726.
- HCD-2009-RashidQ #evaluation #interactive #smarttech
- Interaction Techniques for Binding Smartphones: A Desirability Evaluation (UR, AJQ), pp. 120–128.
- HCI-NIMT-2009-FahnKW #realtime #recognition
- Real-Time Face Tracking and Recognition Based on Particle Filtering and AdaBoosting Techniques (CSF, MJK, KYW), pp. 198–207.
- HCI-NIMT-2009-HurY #data analysis #multi #named #sorting
- SimulSort: Multivariate Data Exploration through an Enhanced Sorting Technique (IH, JSY), pp. 684–693.
- HCI-NIMT-2009-ItoMT #3d #graph #visualisation
- Sphere Anchored Map: A Visualization Technique for Bipartite Graphs in 3D (TI, KM, JT), pp. 811–820.
- HCI-NIMT-2009-SuzukiMT #interactive #interface #using
- Interaction Technique for a Pen-Based Interface Using Finger Motions (YS, KM, JT), pp. 503–512.
- HCI-NT-2009-AsahiIF #evaluation #usability
- A Usability Evaluation Method Applying AHP and Treemap Techniques (TA, TI, SF), pp. 195–203.
- HCI-NT-2009-MorandiniCS #prototype #validation #web
- A Prototype to Validate ErgoCoIn: A Web Site Ergonomic Inspection Technique (MM, WdAC, DLS), pp. 339–348.
- HCI-VAD-2009-BaldirisFMG #adaptation #machine learning
- Adaptation Decisions and Profiles Exchange among Open Learning Management Systems Based on Agent Negotiations and Machine Learning Techniques (SB, RF, CM, SG), pp. 12–20.
- HIMI-DIE-2009-NelsonV #self
- Effects of a Mnemonic Technique on Subsequent Recall of Assigned and Self-generated Passwords (DN, KPLV), pp. 693–701.
- HIMI-II-2009-MinC #approach #generative #personalisation #privacy
- An Interactive-Content Technique Based Approach to Generating Personalized Advertisement for Privacy Protection (WHM, YGC), pp. 185–191.
- AdaEurope-2009-BuchsLC #generative #model checking #modelling #process #testing
- Model Checking Techniques for Test Generation from Business Process Models (DB, LL, AC), pp. 59–74.
- CAiSE-2009-JiangBBM #effectiveness #quality
- Measuring and Comparing Effectiveness of Data Quality Techniques (LJ, DB, AB, JM), pp. 171–185.
- ICEIS-AIDSS-2009-ChenC #data mining #mining
- The Role of Data Mining Techniques in Emergency Management (NC, AC), pp. 118–123.
- ICEIS-AIDSS-2009-ZanchettinL #design #hybrid #network #optimisation
- Hybrid Optimization Technique for Artificial Neural Networks Design (CZ, TBL), pp. 242–247.
- ICEIS-DISI-2009-SantosB #optimisation #performance #query
- A Bit-selector Technique for Performance Optimization of Decision-support Queries (RJS, JB), pp. 151–157.
- ICEIS-ISAS-2009-Damij #effectiveness #modelling #process
- An Effective Process Modelling Technique (ND), pp. 298–303.
- ICEIS-J-2009-NollR #concept #traceability #using
- Concepts-Based Traceability: Using Experiments to Evaluate Traceability Techniques (RPN, MBR), pp. 539–550.
- ICEIS-SAIC-2009-BalzanoSL #ajax #collaboration #realtime #web
- A Scheme of Strategies for Real-time Web Collaboration based on AJAX/Comet Techniques for Live RIA (WB, MRDS, LDL), pp. 35–40.
- CIKM-2009-KriegelKOPRM #database #named
- OSSOBOOK: database and knowledgemanagement techniques for archaeozoology (HPK, PK, HO, JP, MR, CHvdM), pp. 2091–2092.
- ECIR-2009-FoleyS #collaboration #evaluation #information retrieval
- Synchronous Collaborative Information Retrieval: Techniques and Evaluation (CF, AFS), pp. 42–53.
- ECIR-2009-JohoHJ #collaboration #information retrieval
- Revisiting IR Techniques for Collaborative Search Strategies (HJ, DH, JMJ), pp. 66–77.
- ECIR-2009-PohlM #metric
- Measurement Techniques and Caching Effects (SP, AM), pp. 691–695.
- KDIR-2009-ValiatiTGGBT #multi #taxonomy #visualisation
- Multidimensional Information Visualization Techniques — Evaluating a Taxonomy of Tasks with the Participation of the Users (ERdAV, JT, AFG, MAG, LLB, JRT), pp. 311–314.
- KMIS-2009-RadeschutzM #analysis #optimisation #process
- Extended Analysis Techniques for a Comprehensive Business Process Optimization (SR, BM), pp. 77–82.
- KMIS-2009-WiilMG #information management #process #tool support
- Knowledge Management Processes, Tools and Techniques for Counterterrorism (UKW, NM, JG), pp. 29–36.
- MLDM-2009-QureshiZ #quality #using
- Using Resampling Techniques for Better Quality Discretization (TQ, DAZ), pp. 68–81.
- SEKE-2009-AbdallahAA #multi #optimisation #visual notation
- A Payload Optimization Technique for Multimedia Visual Cryptographye (MHA, RIAK, RAAD), pp. 703–708.
- SEKE-2009-BarbosaB #elicitation #process #requirements #towards
- Towards the Selection of the Most Suitable Elicitation Technique Through a Defined Requirements Elicitation Process (MWB, GARB), pp. 33–36.
- SEKE-2009-PortoMF #comprehension #visualisation
- The Use of Reading Technique and Visualization for Program Understanding (DP, MGM, SCPFF), pp. 386–391.
- SEKE-2009-SalamahBBPFC #specification #tool support #validation
- Enhancing Property Specification Tools With Validation Techniques (SS, MDB, EB, SP, DF, LC), pp. 487–492.
- TOOLS-EUROPE-2009-KnorreckAP #design #performance #simulation
- Fast Simulation Techniques for Design Space Exploration (DK, LA, RP), pp. 308–327.
- SAC-2009-AktemurK #case study #comparative #library
- A comparative study of techniques to write customizable libraries (BA, SK), pp. 522–529.
- SAC-2009-BriggsA #algebra #constraints #parametricity #specification
- Algebraic specification techniques for parametric types with logic-based constraints (DB, SA), pp. 1890–1897.
- SAC-2009-DemailleLS #abstract syntax tree #effectiveness #named #parsing #using
- TWEAST: a simple and effective technique to implement concrete-syntax AST rewriting using partial parsing (AD, RL, BS), pp. 1924–1929.
- SAC-2009-MacielH #architecture #rest #transaction #using
- An optimistic technique for transactions control using REST architectural style (LAHdSM, CMH), pp. 664–669.
- SAC-2009-MoallemL #distributed #grid #scheduling #using
- Using artificial life techniques for distributed grid job scheduling (AM, SAL), pp. 1091–1097.
- SAC-2009-ZhangLZZZZ #first-order #linear #optimisation
- Optimizing techniques for saturated arithmetic with first-order linear recurrence (WZ, LL, CZ, HZ, BZ, CZ), pp. 1883–1889.
- LDTA-2008-Dolstra09 #domain-specific language #functional #lazy evaluation #performance
- Maximal Laziness: An Efficient Interpretation Technique for Purely Functional DSLs (ED), pp. 81–99.
- CC-2009-CampanoniSAC #compilation #jit #manycore
- Dynamic Look Ahead Compilation: A Technique to Hide JIT Compilation Latencies in Multicore Environment (SC, MS, GA, SCR), pp. 220–235.
- CGO-2009-Baev
- Techniques for Region-Based Register Allocation (IDB), pp. 147–156.
- HPCA-2009-EbrahimiMP #data type #hybrid #linked data #open data
- Techniques for bandwidth-efficient prefetching of linked data structures in hybrid prefetching systems (EE, OM, YNP), pp. 7–17.
- HPCA-2009-PowellBEMSY #named #parametricity #runtime #using
- CAMP: A technique to estimate per-structure power at run-time using a few simple parameters (MDP, AB, JSE, SSM, BRS, SMY), pp. 289–300.
- PPoPP-2009-BhateleBK #api #case study
- Topology aware task mapping techniques: an api and case study (AB, EJB, LVK), pp. 301–302.
- PPoPP-2009-NicolauLK #performance
- Techniques for efficient placement of synchronization primitives (AN, GL, AK), pp. 199–208.
- CAV-2009-DilligDA #integer #linear #proving
- Cuts from Proofs: A Complete and Practical Technique for Solving Linear Inequalities over Integers (ID, TD, AA), pp. 233–247.
- CAV-2009-KahlonWG #partial order #reduction
- Monotonic Partial Order Reduction: An Optimal Symbolic Partial Order Reduction Technique (VK, CW, AG), pp. 398–413.
- ICLP-2009-Paolucci #natural language #research #summary #tool support
- Research Summary: Intelligent Natural Language Processing Techniques and Tools (AP), pp. 536–537.
- ICST-2009-BertoliniPdM #automation #black box #empirical #evaluation #testing #user interface
- An Empirical Evaluation of Automated Black Box Testing Techniques for Crashing GUIs (CB, GP, Md, AM), pp. 21–30.
- SAT-2009-Chen #hybrid #reasoning #satisfiability
- Building a Hybrid SAT Solver via Conflict-Driven, Look-Ahead and XOR Reasoning Techniques (JC), pp. 298–311.
- SAT-2009-HaimW #machine learning #using
- Restart Strategy Selection Using Machine Learning Techniques (SH, TW), pp. 312–325.
- SAT-2009-HsuM #named #novel #probability
- VARSAT: Integrating Novel Probabilistic Inference Techniques with DPLL Search (EIH, SAM), pp. 377–390.
- SAT-2009-Vardi #satisfiability
- Symbolic Techniques in Propositional Satisfiability Solving (MYV), pp. 2–3.
- CBSE-2008-LumpeGS #component #interface #reduction
- State Space Reduction Techniques for Component Interfaces (ML, LG, JGS), pp. 130–145.
- ECSA-2008-DamaseviciusST #component #design #diagrams #feature model #generative #metaprogramming #ontology #using
- Domain Ontology-Based Generative Component Design Using Feature Diagrams and Meta-programming Techniques (RD, VS, JT), pp. 338–341.
- DAC-2008-FaviC #communication
- Techniques for fully integrated intra-/inter-chip optical communication (CF, EC), pp. 343–344.
- DAC-2008-GorjiaraG #architecture #automation #refinement
- Automatic architecture refinement techniques for customizing processing elements (BG, DG), pp. 379–384.
- DAC-2008-LuSHWX #effectiveness #multi #optimisation
- Customizing computation accelerators for extensible multi-issue processors with effective optimization techniques (YSL, LS, LH, ZW, NX), pp. 197–200.
- DAC-2008-OzisikyilmazMC #design #machine learning #performance #using
- Efficient system design space exploration using machine learning techniques (BÖ, GM, ANC), pp. 966–969.
- DATE-2008-GizopoulosRMS #case study #fault
- Soft Errors: System Effects, Protection Techniques and Case Studies (DG, KR, SM, PS).
- DATE-2008-Katoen #analysis #design #embedded #evaluation #modelling #roadmap
- Quantitative Evaluation in Embedded System Design: Trends in Modeling and Analysis Techniques (JPK), pp. 86–87.
- DATE-2008-LiCZ #novel
- A Novel Technique for Improving Temperature Independency of Ring-ADC (SL, HC, FZ), pp. 694–697.
- DATE-2008-NeyGPVBG
- A Design-for-Diagnosis Technique for SRAM Write Drivers (AN, PG, SP, AV, MB, VG), pp. 1480–1485.
- DATE-2008-RedaelliSS #anti #configuration management #scheduling
- Task Scheduling with Configuration Prefetching and Anti-Fragmentation techniques on Dynamically Reconfigurable Systems (FR, MDS, DS), pp. 519–522.
- DATE-2008-StratigopoulosTM #estimation #parametricity
- A General Method to Evaluate RF BIST Techniques Based on Non-parametric Density Estimation (HGDS, JT, SM), pp. 68–73.
- DATE-2008-VemuJAPG #concurrent #detection #fault #logic #low cost
- A low-cost concurrent error detection technique for processor control logic (RV, AJ, JAA, SP, RG), pp. 897–902.
- DATE-2008-VersenSSD #analysis #locality
- Test Instrumentation for a Laser Scanning Localization Technique for Analysis of High Speed DRAM devices (MV, AS, JS, DD), pp. 776–779.
- DocEng-2008-KumarS #automation #documentation #n-gram #using
- Automatic keyphrase extraction from scientific documents using N-gram filtration technique (NK, KS), pp. 199–208.
- DRR-2008-ShafaitKB #adaptation #image #implementation #performance #using
- Efficient implementation of local adaptive thresholding techniques using integral images (FS, DK, TMB), p. 681510.
- SIGMOD-2008-AulbachGJKR #as a service #database #multitenancy
- Multi-tenant databases for software as a service: schema-mapping techniques (SA, TG, DJ, AK, JR), pp. 1195–1206.
- SIGMOD-2008-PeiHTL #nondeterminism #probability #query #summary #tutorial
- Query answering techniques on uncertain and probabilistic data: tutorial summary (JP, MH, YT, XL), pp. 1357–1364.
- VLDB-2008-LizorkinVGT #optimisation
- Accuracy estimate and optimization techniques for SimRank computation (DL, PV, MNG, DT), pp. 422–433.
- VLDB-2008-SansL #xml
- Prefix based numbering schemes for XML: techniques, applications and performances (VS, DL), pp. 1564–1573.
- VLDB-2008-ShaoSZ #challenge #database #effectiveness #performance #scalability #similarity #video
- Challenges and techniques for effective and efficient similarity search in large video databases (JS, HTS, XZ), pp. 1598–1603.
- CSEET-2008-SalamahG #education #model checking #specification #using
- A Technique for Using Model Checkers to Teach Formal Specifications (SS, AQG), pp. 181–188.
- FASE-2008-DattaE #component #named
- COMP-REF: A Technique to Guide the Delegation of Responsibilities to Components in Software Systems (SD, RvE), pp. 332–346.
- TACAS-2008-BakewellG #game studies #model checking #on the fly
- On-the-Fly Techniques for Game-Based Software Model Checking (AB, DRG), pp. 78–92.
- TACAS-2008-Malik #hardware #verification
- Hardware Verification: Techniques, Methodology and Solutions (SM), p. 1.
- ICPC-2008-AbadiNS #specification #traceability
- A Traceability Technique for Specifications (AA, MN, YS), pp. 103–112.
- ICPC-2008-RoyC #clone detection #comparison #detection
- Scenario-Based Comparison of Clone Detection Techniques (CKR, JRC), pp. 153–162.
- ICSM-2008-CornelissenMZ #assessment #reduction
- An assessment methodology for trace reduction techniques (BC, LM, AZ), pp. 107–116.
- SCAM-2008-Anderson #industrial #static analysis
- 90% Perspiration: Engineering Static Analysis Techniques for Industrial Applications (PA), pp. 3–12.
- WCRE-2008-DuszynskiKNHS #comparison #visualisation
- Variant Comparison — A Technique for Visualizing Software Variants (SD, JK, MN, DH, CS), pp. 229–233.
- PLDI-2008-Kahlon #alias #analysis #named #pointer #scalability
- Bootstrapping: a technique for scalable flow and context-sensitive pointer alias analysis (VK), pp. 249–259.
- FLOPS-2008-MellarkodG #constraints #reasoning #set #theorem proving
- Integrating Answer Set Reasoning with Constraint Solving Techniques (VSM, MG), pp. 15–31.
- CIAA-2008-PaunPR #question
- Hopcroft’s Minimization Technique: Queues or Stacks? (AP, MP, ARP), pp. 78–91.
- CHI-2008-AliakseyeuILS #evaluation #interface #multi #named
- Multi-flick: an evaluation of flick-based scrolling techniques for pen interfaces (DA, PI, AL, SS), pp. 1689–1698.
- CHI-2008-ChenGDLA #navigation
- Navigation techniques for dual-display e-book readers (NC, FG, MD, CL, MA), pp. 1779–1788.
- CHI-2008-YataniPBN #gesture #named #using
- Escape: a target selection technique using visually-cued gestures (KY, KP, MWB, MWN), pp. 285–294.
- SOFTVIS-2008-FrischDB #diagrams #semantics #towards #uml
- Towards seamless semantic zooming techniques for UML diagrams (MF, RD, TB), pp. 207–208.
- SOFTVIS-2008-NestorTBCH #product line #visualisation
- Applying visualisation techniques in software product lines (DN, ST, GB, CC, PH), pp. 175–184.
- ICEIS-DISI-2008-SellamiBAR #challenge #scalability
- Study of Challenges and Techniques in Large Scale Matching (SS, ANB, YA, RR), pp. 355–361.
- ICEIS-HCI-2008-HornungBT #web
- Assistive Technologies and Techniques for Web Based EGOV in Developing Countries (HHH, MCCB, CdAT), pp. 248–255.
- ICEIS-ISAS2-2008-CabreroGP #predict
- Combining Different Change Prediction Techniques (DCM, JG, MP), pp. 57–63.
- ICEIS-ISAS2-2008-ParvathyVB #analysis #case study #comparative #correlation #documentation #traceability
- A Comparative Study of Document Correlation Techniques for Traceability Analysis (AGP, BGV, RB), pp. 64–69.
- ICEIS-ISAS2-2008-RaoRO #elicitation #ontology
- Knowledge Elicitation Techniques for Deriving Competency Questions for Ontologies (LR, HR, KMOB), pp. 105–110.
- ICEIS-J-2008-WengXLN08a #estimation #performance #recommendation
- An Efficient Neighbourhood Estimation Technique for Making Recommendations (LTW, YX, YL, RN), pp. 253–264.
- CIKM-2008-ChakaravarthyGRM #documentation #performance
- Efficient techniques for document sanitization (VTC, HG, PR, MKM), pp. 843–852.
- CIKM-2008-LiuLNBMG #dataset #feature model #performance #preprocessor #realtime #scalability
- Real-time data pre-processing technique for efficient feature extraction in large scale datasets (YL, LVL, RSN, KB, PM, CLG), pp. 981–990.
- ECIR-2008-HannahMO #analysis #graph
- Analysis of Link Graph Compression Techniques (DH, CM, IO), pp. 596–601.
- ICPR-2008-AmatoMHGV
- Background subtraction technique based on chromaticity and intensity patterns (AA, MM, IHC, JG, JV), pp. 1–4.
- ICPR-2008-FerilliBBE #comprehension #documentation #incremental #layout #machine learning
- Incremental machine learning techniques for document layout understanding (SF, MB, TMAB, FE), pp. 1–4.
- ICPR-2008-GatosPP #adaptation #documentation #image #multi #using
- Improved document image binarization by using a combination of multiple binarization techniques and adapted edge information (BG, IP, SJP), pp. 1–4.
- ICPR-2008-RicamatoMT #comparison #empirical
- MCS-based balancing techniques for skewed classes: An empirical comparison (MTR, CM, FT), pp. 1–4.
- ICPR-2008-SahaB #clustering #multi #symmetry #using
- A new multiobjective simulated annealing based clustering technique using stability and symmetry (SS, SB), pp. 1–4.
- ICPR-2008-SatoOKI #image #realtime
- Real-time image-based rendering system for virtual city based on image compression technique and eigen texture method (RS, SO, HK, KI), pp. 1–4.
- ICPR-2008-YenCWWC #using #video
- A scene-based video watermarking technique using SVMs (SHY, HWC, CJW, PSPW, MCC), pp. 1–4.
- RecSys-2008-Kwon #rating #recommendation #using
- Improving top-n recommendation techniques using rating variance (YK), pp. 307–310.
- SEKE-2008-AssawamekinSP #automation #multi #ontology #requirements #traceability #using
- Automated Multiperspective Requirements Traceability Using Ontology Matching Technique (NA, TS, CP), pp. 460–465.
- SEKE-2008-Fuad #architecture #distributed #program transformation #self
- Code Transformation Techniques and Management Architecture for Self-manageable Distributed Applications (MMF), pp. 315–320.
- SEKE-2008-HittleG #fault #file system #injection #testing #using
- Fault Injection Testing of User-space File Systems Using Traditional and Aspect-based Techniques (JH, SG), pp. 873–876.
- SEKE-2008-Rajapakse #mobile #taxonomy
- Techniques for De-fragmenting Mobile Applications: A Taxonomy (DCR), pp. 923–928.
- SEKE-2008-TubiioLR #bibliography #elicitation #perspective
- Obtaining Well-Founded Practices about Elicitation Techniques by Means of an Update of a Previous Systematic Review (ÓDT, ML, FR), pp. 769–772.
- SIGIR-2008-Murray #library #modelling #process
- Extending language modeling techniques to models of search and browsing activity in a digital library (GCM), p. 900.
- SIGIR-2008-TanWC #detection #sentiment #using
- Combining learn-based and lexicon-based techniques for sentiment detection without using labeled examples (ST, YW, XC), pp. 743–744.
- ICMT-2008-Wagelaar #composition #model transformation #rule-based
- Composition Techniques for Rule-Based Model Transformation Languages (DW), pp. 152–167.
- ECOOP-2008-DrossopoulouFMS #framework #invariant #verification
- A Unified Framework for Verification Techniques for Object Invariants (SD, AF, PM, AJS), pp. 412–437.
- GPCE-2008-MendoncaWCC #compilation #feature model #modelling #performance #scalability
- Efficient compilation techniques for large scale feature models (MM, AW, KC, DDC), pp. 13–22.
- RE-2008-FeatherHMU #analysis #deployment #requirements #using
- Guiding Technology Deployment Decisions using a Quantitative Requirements Analysis Technique (MSF, KAH, RMM, SU), pp. 271–276.
- REFSQ-2008-BendjennaZC #distributed #elicitation #process
- Enhancing Elicitation Technique Selection Process in a Cooperative Distributed Environment (HB, NZ, PJC), pp. 23–36.
- SAC-2008-BabarZCT #integration #requirements
- Three integration approaches for map and B-SCP requirements engineering techniques (AB, DZ, KC, VT), pp. 650–655.
- SAC-2008-BuenoTT #algorithm #data access #effectiveness #metric #optimisation
- An algorithm for effective deletion and a new optimization technique for metric access methods (RB, AJMT, CTJ), pp. 1034–1035.
- SAC-2008-CastroS #image #multi #network
- Restoring images with a multiscale neural network based technique (APAdC, JDSdS), pp. 1693–1697.
- SAC-2008-GarciaT #security #semantics #using #web #web service
- Web service security management using semantic web techniques (DZGG, MBFdT), pp. 2256–2260.
- SAC-2008-SchiabelSA #detection #image #segmentation
- Segmentation technique for detecting suspect masses in dense breast digitized images as a tool for mammography CAD schemes (HS, VTS, MFA), pp. 1333–1337.
- SAC-2008-ZhouTBAG #ambiguity #graph #named #query
- Gcon: a graph-based technique for resolving ambiguity in query translation candidates (DZ, MT, TJB, HA, JG), pp. 1566–1573.
- SAC-2008-ZuikeviciuteP #database #replication
- Conflict-aware load-balancing techniques for database replication (VZ, FP), pp. 2169–2173.
- FSE-2008-DufourRS #java #scalability
- A scalable technique for characterizing the usage of temporaries in framework-intensive Java applications (BD, BGR, GS), pp. 59–70.
- ICSE-2008-GoldschmidtRW #case study #evaluation #maintenance #performance
- A case study evaluation of maintainability and performance of persistency techniques (TG, RR, JW), pp. 401–410.
- SPLC-2008-AlvesSBRSRPR #analysis #case study #information retrieval
- An Exploratory Study of Information Retrieval Techniques in Domain Analysis (VA, CS, LB, AR, PS, PR, CP, AR), pp. 67–76.
- ICLP-2008-Cipriano #constraints #modelling #on the #programming #tool support
- On the Hybridization of Constraint Programming and Local Search Techniques: Models and Software Tools (RC), pp. 803–804.
- ICST-2008-KimCKK #model checking
- Pre-testing Flash Device Driver through Model Checking Techniques (MK, YC, YK, HK), pp. 475–484.
- ICST-2008-MetsaKM #aspect-oriented #testing
- Comparing Aspects with Conventional Techniques for Increasing Testability (JM, MK, TM), pp. 387–395.
- QoSA-2007-PaceC #architecture #design #quality #using
- Using Planning Techniques to Assist Quality-Driven Architectural Design Exploration (JADP, MRC), pp. 33–52.
- ASE-2007-ChenH #adaptation #evaluation
- An evaluation scheme of adaptive configuration techniques (HC, SH), pp. 493–496.
- ASE-2007-Czarnecki #evolution #generative #reuse
- Software reuse and evolution with generative techniques (KC), p. 575.
- ASE-2007-Gawley #automation #feature model #identification #modelling #variability
- Automating the identification of variability realisation techniques from feature models (RG), pp. 555–558.
- ASE-2007-RaysideM #memory management #profiling
- Object ownership profiling: a technique for finding and fixing memory leaks (DR, LM), pp. 194–203.
- CASE-2007-LamLY #automation #framework #sketching #using
- Robot Drawing Techniques for Contoured Surface Using an Automated Sketching Platform (JHML, KWL, YY), pp. 735–740.
- CASE-2007-LuimulaSPPAL #mobile #ubiquitous #using
- Improving the Remote Control of a Mobile Robot Using Positioning and Ubiquitous Techniques (ML, KS, TP, SP, JA, AL), pp. 1027–1033.
- CASE-2007-LuXL #development #implementation
- Development and implementation of NURBS interpolator with look-ahead technique (YL, JX, ZL), pp. 134–139.
- CASE-2007-SahlanGS
- Properties of Frequency Weighted Balanced Truncation Techniques (SS, AG, VS), pp. 765–770.
- CASE-2007-VidalA #visual notation
- Window-Matching Techniques with Kalman Filtering for an Improved Object Visual Tracking (FdBV, VHCA), pp. 829–834.
- DAC-2007-BhatiaGTMM #equivalence #multi #performance #validation
- Leveraging Semi-Formal and Sequential Equivalence Techniques for Multimedia SOC Performance Validation (LB, JG, PT, RSM, SHM), pp. 69–74.
- DAC-2007-BurnsKMBTD #analysis #comparative #design #statistics
- Comparative Analysis of Conventional and Statistical Design Techniques (SMB, MK, NM, KAB, JT, VD), pp. 238–243.
- DAC-2007-HariziHOB #analysis #modelling #performance
- Efficient Modeling Techniques for Dynamic Voltage Drop Analysis (HH, RH, MO, EB), pp. 706–711.
- DAC-2007-MangHH #distributed #effectiveness #physics #synthesis
- Techniques for Effective Distributed Physical Synthesis (FYCM, WH, PHH), pp. 859–864.
- DAC-2007-Vardi #verification
- Formal Techniques for SystemC Verification; Position Paper (MYV), pp. 188–192.
- DATE-2007-ChoudhuryRRM #interactive #memory management
- Interactive presentation: Single-ended coding techniques for off-chip interconnects to commodity memory (MRC, KR, SR, KM), pp. 1072–1077.
- DATE-2007-DabrowskiR #interactive
- Interactive presentation: Boosting SER test for RF transceivers by simple DSP technique (JD, RR), pp. 719–724.
- DATE-2007-GodardDTS #design #embedded #evaluation #reliability
- Evaluation of design for reliability techniques in embedded flash memories (BG, JMD, LT, GS), pp. 1593–1598.
- DATE-2007-NepalBMPZ #design #interactive #multi
- Interactive presentation: Techniques for designing noise-tolerant multi-level combinational circuits (KN, RIB, JLM, WRP, AZ), pp. 576–581.
- DATE-2007-ParkPH #memory management #novel #stack
- A novel technique to use scratch-pad memory for stack management (SP, HwP, SH), pp. 1478–1483.
- DATE-2007-SafarpourV #abstraction #automation #debugging #design #refinement
- Abstraction and refinement techniques in automated design debugging (SS, AGV), pp. 1182–1187.
- DATE-2007-SanchezSSR #automation #effectiveness #generative #interactive #source code
- Interactive presentation: An enhanced technique for the automatic generation of effective diagnosis-oriented test programs for processor (ES, MS, GS, MSR), pp. 1158–1163.
- DATE-2007-SavojAAGH #performance
- A new technique for characterization of digital-to-analog converters in high-speed systems (JS, AAA, AA, BWG, MAH), pp. 433–438.
- DATE-2007-SeongM #performance #taxonomy #using
- An efficient code compression technique using application-aware bitmask and dictionary selection methods (SWS, PM), pp. 582–587.
- DATE-2007-ZamoraKM #distributed #network #video
- Distributed power-management techniques for wireless network video systems (NHZ, JCK, RM), pp. 564–569.
- DRR-2007-Marosi #adaptation #algorithm #architecture #industrial
- Industrial OCR approaches: architecture, algorithms, and adaptation techniques (IM).
- ICDAR-2007-LiLT #keyword #performance
- A Fast Keyword-Spotting Technique (LL, SJL, CLT), pp. 68–72.
- ICDAR-2007-MakridisNG #documentation #performance #segmentation #word
- An Efficient Word Segmentation Technique for Historical and Degraded Machine-Printed Documents (MM, NAN, BG), pp. 178–182.
- VLDB-2007-TatbulCZ #distributed #performance
- Staying FIT: Efficient Load Shedding Techniques for Distributed Stream Processing (NT, UÇ, SBZ), pp. 159–170.
- ITiCSE-2007-JiWC #detection #source code
- A source code linearization technique for detecting plagiarized programs (JHJ, GW, HGC), pp. 73–77.
- ESOP-2007-Pitts #equivalence #higher-order
- Techniques for Contextual Equivalence in Higher-Order, Typed Languages (AMP), p. 1.
- FASE-2007-ReisMP #integration #modelling #product line #testing
- Integration Testing in Software Product Line Engineering: A Model-Based Technique (SR, AM, KP), pp. 321–335.
- CSMR-2007-HeymansBW #interactive #migration #scalability #testing
- Testing Techniques for the Cross-platform Migration of Very Large Interactive Applications (LH, TVdB, BW), pp. 323–324.
- ICPC-2007-RoyURD #case study #mining
- Evaluating Aspect Mining Techniques: A Case Study (CKR, MGU, BR, TRD), pp. 167–176.
- ICSM-2007-Arcelli #reverse engineering
- Working Session on Reverse Engineering techniques for Application Portfolio Management — RE4APM 2007 - (FA), pp. 495–496.
- ICSM-2007-JoshiO #named
- SCARPE: A Technique and Tool for Selective Capture and Replay of Program Executions (SJ, AO), pp. 234–243.
- WCRE-2007-Cornelissen #architecture #dynamic analysis #re-engineering
- Dynamic Analysis Techniques for the Reconstruction of Architectural Views (BC), pp. 281–284.
- WCRE-2007-LorenzoFMTV #web #web service
- Turning Web Applications into Web Services by Wrapping Techniques (GDL, ARF, LM, PT, VV), pp. 199–208.
- PEPM-2007-BurchettCK #functional #named #optimisation
- Lowering: a static optimization technique for transparent functional reactivity (KB, GHC, SK), pp. 71–80.
- CHI-2007-Gerber #design
- Improvisation principles and techniques for design (EG), pp. 1069–1072.
- CHI-2007-GuiardDC #documentation #evaluation #navigation
- Quantifying degree of goal directedness in document navigation: application to the evaluation of the perspective-drag technique (YG, YD, OC), pp. 327–336.
- CHI-2007-HancockCC #3d #design #evaluation #interactive
- Shallow-depth 3d interaction: design and evaluation of one-, two- and three-touch techniques (MSH, MSTC, AC), pp. 1147–1156.
- CHI-2007-JonesBHX #mobile #novel
- Questions not answers: a novel mobile search technique (MJ, GB, RH, PLX), pp. 155–158.
- CHI-2007-ReillyI #evaluation #visualisation
- White rooms and morphing don’t mix: setting and the evaluation of visualization techniques (DFR, KMI), pp. 111–120.
- CHI-2007-VogelB #interface #named #using
- Shift: a technique for operating pen-based interfaces using touch (DV, PB), pp. 657–666.
- HCI-IDU-2007-Forsman #experience #human-computer #research #tool support #using
- After Hurricane Katrina: Post Disaster Experience Research Using HCI Tools and Techniques (CF), pp. 78–87.
- HCI-IDU-2007-ResterPWHMPO #evaluation #interactive
- Mixing Evaluation Methods for Assessing the Utility of an Interactive InfoVis Technique (MR, MP, SW, KH, SM, CP, SO), pp. 604–613.
- HCI-IPT-2007-AdnanNA #evaluation #visualisation
- An Experimental Evaluation of Information Visualization Techniques and Decision Style (WAWA, NLMN, RA), pp. 143–150.
- HCI-IPT-2007-LeeC #design #interface #visual notation
- Interface Design Technique Considering Visual Cohesion-Rate by Object Unit (CML, OBC), pp. 72–81.
- HCI-IPT-2007-Misue #graph #visualisation
- Anchored Maps: Visualization Techniques for Drawing Bipartite Graphs (KM), pp. 106–114.
- HCI-MIE-2007-KoLKJL #case study #evaluation #personalisation #recommendation #user satisfaction
- A Study on User Satisfaction Evaluation About the Recommendation Techniques of a Personalized EPG System on Digital TV (SMK, YJL, MHK, YGJ, SWL), pp. 909–917.
- HIMI-MTT-2007-AkutsuFMS #image
- Hierarchical Image Gathering Technique for Browsing Surveillance Camera Images (WA, TF, HNM, TS), pp. 383–390.
- HIMI-MTT-2007-ShiIL #query #using #visual notation
- Facilitating Visual Queries in the TreeMap Using Distortion Techniques (KS, PI, PCL), pp. 345–353.
- VISSOFT-2007-PaddaSM #visualisation
- Visualization Patterns: A Context-Sensitive Tool to Evaluate Visualization Techniques (HKP, AS, SPM), pp. 88–91.
- ICEIS-AIDSS-2007-AlevizosKPSB #fuzzy #information retrieval #multi
- Fuzzy Interval Number (FIN) Techniques for Multilingual and Cross Language Information Retrieval (TA, VGK, SEP, CS, PB), pp. 348–355.
- ICEIS-DISI-2007-AouicheL #comparison #estimation
- UNASSSUMING view-size estimation techniques in OLAP — an experimental comparison (KA, DL), pp. 145–150.
- ICEIS-J-2007-Novacek07a #automation #documentation #information management #integration #scalability #taxonomy
- Automatic Knowledge Acquisition and Integration Technique: Application to Large Scale Taxonomy Extraction and Document Annotation (VN), pp. 160–172.
- ICEIS-J-2007-RuizB07a #documentation
- Summarizing Structured Documents through a Fractal Technique (MDR, ABB), pp. 328–340.
- ICEIS-SAIC-2007-ChenC #bottom-up #detection #difference #process
- A Simulation-Based Difference Detection Technique for Bottom-Up Process Reconciliation (XC, PWHC), pp. 72–77.
- ICEIS-SAIC-2007-RezguiN #categorisation #composition #ontology #semantics #using
- Ontology-Based Dynamic Service Composition Using Semantic Relatedness and Categorization Techniques (YR, SN), pp. 113–120.
- ICEIS-SAIC-2007-RuizB #documentation #using
- Summarizing Documents Using Fractal Techniques (MDR, ABB), pp. 26–33.
- ICML-2007-Yairi #locality #reduction
- Map building without localization by dimensionality reduction techniques (TY), pp. 1071–1078.
- KDD-2007-FastFMTJGK #detection #preprocessor #relational
- Relational data pre-processing techniques for improved securities fraud detection (ASF, LF, MEM, BJT, DJ, HGG, JK), pp. 941–949.
- KDD-2007-ParkP #collaboration #ranking
- Applying collaborative filtering techniques to movie search for better ranking and browsing (STP, DMP), pp. 550–559.
- MLDM-2007-FranceC #development #evaluation #metric #reduction
- Development of an Agreement Metric Based Upon the RAND Index for the Evaluation of Dimensionality Reduction Techniques, with Applications to Mapping Customer Data (SLF, JDC), pp. 499–517.
- MLDM-2007-SadoddinG #case study #comparative #data mining #detection #machine learning #mining
- A Comparative Study of Unsupervised Machine Learning and Data Mining Techniques for Intrusion Detection (RS, AAG), pp. 404–418.
- SEKE-2007-KirnerC #empirical #evaluation #requirements #specification #uml
- Evaluation of the OORT Techniques for Inspection of Requirements Specifications in UML: an Empirical Study (TGK, ERdC), p. 649–?.
- SIGIR-2007-BalasubramanianAC #comparison #retrieval
- A comparison of sentence retrieval techniques (NB, JA, WBC), pp. 813–814.
- SIGIR-2007-KoAS #effectiveness #feedback #generative #pseudo #using
- An effective snippet generation method using the pseudo relevance feedback technique (YK, HA, JS), pp. 711–712.
- MoDELS-2007-JacksonS #reasoning
- Constructive Techniques for Meta- and Model-Level Reasoning (EKJ, JS), pp. 405–419.
- MoDELS-2007-JacksonS #reasoning
- Constructive Techniques for Meta- and Model-Level Reasoning (EKJ, JS), pp. 405–419.
- GPCE-2007-WinterM #generative #java #library #migration #programming
- Generative programming techniques for Java library migration (VLW, AM), pp. 185–196.
- QAPL-2007-PierroHW #analysis #data flow #on the #probability
- On Probabilistic Techniques for Data Flow Analysis (ADP, CH, HW), pp. 59–77.
- RE-2007-DekhtyarHSHD #assessment #integration #requirements
- Technique Integration for Requirements Assessment (AD, JHH, SKS, EAH, OD), pp. 141–150.
- REFSQ-2007-AlkkiomakiS #architecture #case study #functional #integration #modelling #requirements #uml
- Integration Use Cases — An Applied UML Technique for Modeling Functional Requirements in Service Oriented Architecture (VA, KS), pp. 190–202.
- REFSQ-2007-RinkeW #how #modelling #requirements
- Defining Reference Models for Modelling Qualities: How Requirements Engineering Techniques Can Help (TR, TW), pp. 335–340.
- SAC-MT-J-2006-CabotT07 #constraints #ocl
- Transformation techniques for OCL constraints (JC, ET), pp. 179–195.
- SAC-2007-CiferriCFTS #performance #query
- Horizontal fragmentation as a technique to improve the performance of drill-down and roll-up queries (CDdAC, RRC, DTF, AJMT, FdFdS), pp. 494–499.
- SAC-2007-KimKK #energy #mobile
- Energy-efficient disk replacement and file placement techniques for mobile systems with hard disks (YJK, KTK, JK), pp. 693–698.
- SAC-2007-LebbahMR #constraints #implementation #performance #reduction #using
- Using constraint techniques for a safe and fast implementation of optimality-based reduction (YL, CM, MR), pp. 326–331.
- SAC-2007-LodhiG #design #effectiveness
- Design of a simple and effective object-to-relational mapping technique (FL, MAG), pp. 1445–1449.
- SAC-2007-MansmannS #visualisation
- Exploring OLAP aggregates with hierarchical visualization techniques (SM, MHS), pp. 1067–1073.
- SAC-2007-TrutaC #incremental #maintenance #optimisation
- K-anonymization incremental maintenance and optimization techniques (TMT, AC), pp. 380–387.
- ESEC-FSE-2007-Kwiatkowska #modelling #tool support #verification
- Quantitative verification: models techniques and tools (MZK), pp. 449–458.
- ICSE-2007-ClauseO #debugging
- A Technique for Enabling and Supporting Debugging of Field Failures (JAC, AO), pp. 261–270.
- ICSE-2007-GrahamKW #architecture #trade-off
- Agility and Experimentation: Practical Techniques for Resolving Architectural Tradeoffs (TCNG, RK, CW), pp. 519–528.
- ICSE-2007-KarailaS #case study #experience #industrial #metaprogramming #visual notation
- Applying Template Meta-Programming Techniques for a Domain-Specific Visual Language — An Industrial Experience Report (MK, TS), pp. 571–580.
- CGO-2007-FultonS #compilation #java #realtime #source code
- Compilation Techniques for Real-Time Java Programs (MF, MGS), pp. 221–231.
- HPCA-2007-PuttaswamyL #3d #architecture
- Thermal Herding: Microarchitecture Techniques for Controlling Hotspots in High-Performance 3D-Integrated Processors (KP, GHL), pp. 193–204.
- LCTES-2007-XuT #named
- Tetris: a new register pressure control technique for VLIW processors (WX, RT), pp. 113–122.
- CADE-2007-UnelT #incremental
- An Incremental Technique for Automata-Based Decision Procedures (GÜ, DT), pp. 100–115.
- ICLP-2007-Gebser #programming #set
- Advanced Techniques for Answer Set Programming (MG), pp. 458–459.
- ICLP-2007-Morozov #analysis #design #logic programming #visual notation
- Visual Logic Programming Method Based on Structural Analysis and Design Technique (AAM), pp. 436–437.
- ISSTA-2007-TzorefUY #automation #concurrent #debugging
- Instrumenting where it hurts: an automatic concurrent debugging technique (RT, SU, EYT), pp. 27–38.
- TAP-2007-GallRT #execution #refinement #symbolic computation #testing
- Symbolic Execution Techniques for Refinement Testing (PLG, NR, AT), pp. 131–148.
- TestCom-FATES-2007-GromovW #model checking #testing
- Testing and Model-Checking Techniques for Diagnosis (MG, TACW), pp. 138–154.
- QoSA-2006-Grunske #component #evaluation #integration #safety #standard #towards
- Towards an Integration of Standard Component-Based Safety Evaluation Techniques with SaveCCM (LG), pp. 199–213.
- ASE-2006-dAmorimPXME #automation #classification #comparison #empirical #generative #object-oriented #testing
- An Empirical Comparison of Automated Generation and Classification Techniques for Object-Oriented Unit Testing (Md, CP, TX, DM, MDE), pp. 59–68.
- ASE-2006-Singer #evaluation #testing #tool support
- Testing Tools and Techniques: A Mini-Tutorial on Evaluation Methods for ASE (JS), pp. 371–374.
- CASE-2006-LamiriX #using
- Operating Rooms Planning Using Lagrangian Relaxation Technique (ML, XX), pp. 176–181.
- DAC-2006-GhoshMKR #power management #reduction #self
- Self-calibration technique for reduction of hold failures in low-power nano-scaled SRAM (SG, SM, KK, KR), pp. 971–976.
- DAC-2006-LaiR #megamodelling #multi #performance #robust
- A multilevel technique for robust and efficient extraction of phase macromodels of digitally controlled oscillators (XL, JSR), pp. 1017–1022.
- DAC-2006-WaghmodeLS #scalability
- Buffer insertion in large circuits with constructive solution search techniques (MW, ZL, WS), pp. 296–301.
- DATE-2006-BernardiSSSR #cost analysis #effectiveness
- An effective technique for minimizing the cost of processor software-based diagnosis in SoCs (PB, ES, MS, GS, MSR), pp. 412–417.
- DATE-2006-Kundu #analysis #design
- A design for failure analysis (DFFA) technique to ensure incorruptible signatures (SK), pp. 309–310.
- DATE-2006-LaMeresK #encoding #induction
- Bus stuttering: an encoding technique to reduce inductive noise in off-chip data transmission (BJL, SPK), pp. 522–527.
- DATE-2006-ScharwachterHLAM #hardware #interprocedural #multi #network #optimisation #thread #using
- An interprocedural code optimization technique for network processors using hardware multi-threading support (HS, MH, RL, GA, HM), pp. 919–924.
- DocEng-2006-LecerfC #documentation #learning
- Document annotation by active learning techniques (LL, BC), pp. 125–127.
- SIGMOD-2006-VuHCL #database #performance #scalability #similarity
- A non-linear dimensionality-reduction technique for fast similarity search in large databases (KV, KAH, HC, SDL), pp. 527–538.
- VLDB-2006-0002OIA #documentation #named #xml
- FIX: Feature-based Indexing Technique for XML Documents (NZ, MTÖ, IFI, AA), pp. 259–270.
- VLDB-2006-HuangCLL #evolution #using #xml
- XML Evolution: A Two-phase XML Processing Model Using XML Prefiltering Techniques (CHH, TRC, JJL, HML), pp. 1215–1218.
- VLDB-2006-SteinleAGL #dependence #generative #mining #novel
- Mapping Moving Landscapes by Mining Mountains of Logs: Novel Techniques for Dependency Model Generation (MS, KA, SG, CL), pp. 1093–1102.
- CSEET-2006-Frailey06a #education #experience #industrial
- Experience Teaching Barry Boehm’s Techniques in Industrial and Academic Settings (DJF), pp. 219–225.
- FASE-2006-MinK #automation #component
- A Technique to Represent and Generate Components in MDA/PIM for Automation (HGM, SDK), pp. 293–307.
- ICPC-2006-LawrieFB #assessment #information retrieval #quality #using
- Leveraged Quality Assessment using Information Retrieval Techniques (DJL, HF, DB), pp. 149–158.
- ICPC-2006-LuciaFOT #effectiveness #information retrieval #question #traceability
- Can Information Retrieval Techniques Effectively Support Traceability Link Recovery? (ADL, FF, RO, GT), pp. 307–316.
- ICSM-2006-JaffriK #performance #using
- Efficient Delivery of Software Updates Using Advanced Compression Techniques (TJ, KK), pp. 267–268.
- ICALP-v2-2006-Yan #automaton #bound
- Lower Bounds for Complementation of ω-Automata Via the Full Automata Technique (QY), pp. 589–600.
- CHI-2006-BenkoWB #multi #precise
- Precise selection techniques for multi-touch screens (HB, ADW, PB), pp. 1263–1272.
- CHI-2006-BlaskoNF #interactive #mobile #prototype #string
- Prototyping retractable string-based interaction techniques for dual-display mobile devices (GB, CN, SF), pp. 369–372.
- CHI-2006-EisensteinM #communication #evaluation
- Interacting with communication appliances: an evaluation of two computer vision-based selection techniques (JE, WEM), pp. 1111–1114.
- CHI-2006-KoM #editing #framework #implementation #interactive #named #tool support
- Barista: An implementation framework for enabling new tools, interaction techniques and views in code editors (AJK, BAM), pp. 387–396.
- CHI-2006-LiWL #analysis #design #testing
- Design and experimental analysis of continuous location tracking techniques for Wizard of Oz testing (YL, EW, JAL), pp. 1019–1022.
- CHI-2006-PrabakerBC #authoring #documentation #evaluation #programming #using
- An evaluation of using programming by demonstration and guided walkthrough techniques for authoring and utilizing documentation (MP, LDB, VC), pp. 241–250.
- SOFTVIS-2006-KerrenMS #algorithm #education #novel
- Novel algorithm explanation techniques for improving algorithm teaching (AK, TM, EMS), pp. 175–176.
- SOFTVIS-2006-RhodesKR #algorithm #animation #comprehension #interactive
- The importance of interactive questioning techniques in the comprehension of algorithm animations (PR, EK, BR), pp. 183–184.
- EDOC-2006-HosslerBS #modelling
- Significant Productivity Enhancement through Model Driven Techniques: A Success Story (JH, MB, SS), pp. 367–373.
- ICEIS-AIDSS-2006-MarinagiAKS #fuzzy #information retrieval
- Fuzzy Interval Number (FIN) Techniques for Cross Language Information Retrieval (CM, TA, VGK, CS), pp. 249–256.
- ICEIS-AIDSS-2006-ThuD #predict #risk management #using
- Predicting Cardiovascular Risks — Using POSSUM, PPOSSUM and Neural Net Techniques (TNTT, DND), pp. 230–234.
- CIKM-2006-MacdonaldO #adaptation #data fusion
- Voting for candidates: adapting data fusion techniques for an expert search task (CM, IO), pp. 387–396.
- ECIR-2006-HoenkampD #semantics
- A Fingerprinting Technique for Evaluating Semantics Based Indexing (EH, SvD), pp. 397–406.
- ICML-2006-BanerjeeGdN #modelling #optimisation #visual notation
- Convex optimization techniques for fitting sparse Gaussian graphical models (OB, LEG, Ad, GN), pp. 89–96.
- ICML-2006-Garcke
- Regression with the optimised combination technique (JG), pp. 321–328.
- ICPR-v1-2006-BauckhageK #detection #multi #performance
- Fast, Illumination Insensitive Face Detection Based on Multilinear Techniques and Curvature Features (CB, TK), pp. 507–510.
- ICPR-v1-2006-LublinermanOZC #linear #process #recognition #using #validation
- Activity Recognition from Silhouettes using Linear Systems and Model (In)validation Techniques (RL, NO, DZ, OIC), pp. 347–350.
- ICPR-v1-2006-Ueshiba #bidirectional #implementation #performance #realtime
- An Efficient Implementation Technique of Bidirectional Matching for Real-time Trinocular Stereo Vision (TU), pp. 1076–1079.
- ICPR-v2-2006-KimYL #estimation #image #interactive #modelling #parametricity #random #segmentation #using
- New MRF Parameter Estimation Technique for Texture Image Segmentation using Hierarchical GMRF Model Based on Random Spatial Interaction and Mean Field Theory (DHK, IDY, SUL), pp. 365–368.
- ICPR-v2-2006-SenerU #analysis #component #independence #invariant #normalisation #using
- A New Affine Invariant Curve Normalization Technique Using Independent Component Analysis (SS, MU), p. 48.
- ICPR-v2-2006-SolemOH #segmentation
- Initialization Techniques for Segmentation with the Chan-Vese Model (JES, NCO, AH), pp. 171–174.
- ICPR-v4-2006-ChenLL #using #video
- Video Scene Extraction Using Mosaic Technique (LHC, YCL, HYML), pp. 723–726.
- ICPR-v4-2006-HeCTW
- Key Techniques and Methods for Imaging Iris in Focus (YH, JC, TT, YW), pp. 557–561.
- ICPR-v4-2006-LinHH #embedded #video
- An embedded watermark technique in video for copyright protection (YRL, HYH, WHH), pp. 795–798.
- ICPR-v4-2006-LuC #3d
- Accurate 3D Scanning of Swaying Human Body Parts by One Projection Based on OIMP Technique (CL, GC), pp. 1–4.
- ICPR-v4-2006-LuC06a #3d #analysis #metric #using
- Practical 3-D Shape Measurement Using Optimal Intensity-Modulated Projection and Intensity-Phase Analysis Techniques (CL, GC), pp. 870–873.
- ICPR-v4-2006-MaierHNNHRS #evaluation #recognition #speech
- Intelligibility of Children with Cleft Lip and Palate: Evaluation by Speech Recognition Techniques (AKM, CH, EN, EN, TH, FR, MS), pp. 274–277.
- ICPR-v4-2006-TripathiJG #image #novel
- Novel DCT and DWT based Watermarking Techniques for Digital Images (ST, RCJ, VG), pp. 358–361.
- KDD-2006-ManiyarN #algorithm #data mining #mining #using #visual notation #visualisation
- Visual data mining using principled projection algorithms and information visualization techniques (DMM, ITN), pp. 643–648.
- SEKE-2006-BittencourtTC #rule-based
- Rule-Based Systems Combining AI Techniques into a Legal Agent-based Intelligent Tutoring System (IIB, MT, EdBC), pp. 35–40.
- SEKE-2006-GrauCFN #analysis #comparative #modelling
- A Comparative Analysis of i*Agent-Oriented Modelling Techniques (GG, CC, XF, FN), pp. 657–663.
- SEKE-2006-KuleszaLAG #aspect-oriented #generative #using
- Customizing Aspect-Oriented Variabilities using Generative Techniques (UK, CJPdL, PSCA, AG), pp. 17–22.
- SIGIR-2006-HeP #feedback
- Comparing two blind relevance feedback techniques (DH, YP), pp. 649–650.
- ECMDA-FA-2006-WagelaarS #comparison #model transformation
- A Comparison of Configuration Techniques for Model Transformations (DW, RVDS), pp. 331–345.
- MoDELS-2006-PonsG #ocl #specification #verification
- An OCL-Based Technique for Specifying and Verifying Refinement-Oriented Transformations in MDE (CP, DG), pp. 646–660.
- MoDELS-2006-PonsG #ocl #specification #verification
- An OCL-Based Technique for Specifying and Verifying Refinement-Oriented Transformations in MDE (CP, DG), pp. 646–660.
- OOPSLA-2006-BockischADM #adaptation #virtual machine
- Adapting virtual machine techniques for seamless aspect support (CB, MA, TD, MM), pp. 109–124.
- GPCE-2006-Moreno #generative
- Creating custom containers with generative techniques (GAM), pp. 29–38.
- LOPSTR-2006-LeuschelCE #logic programming #online #partial evaluation #source code #using
- Supervising Offline Partial Evaluation of Logic Programs Using Online Techniques (ML, SJC, DE), pp. 43–59.
- LOPSTR-2006-MantelSK #data flow #proving #security #verification
- Combining Different Proof Techniques for Verifying Information Flow Security (HM, HS, TK), pp. 94–110.
- POPL-2006-OlinskyLR #composition #implementation #specification #staged
- Staged allocation: a compositional technique for specifying and implementing procedure calling conventions (RO, CL, NR), pp. 409–421.
- RE-2006-DavisTHJM #bibliography #effectiveness #elicitation #empirical #perspective #requirements
- Effectiveness of Requirements Elicitation Techniques: Empirical Results Derived from a Systematic Review (AMD, ÓDT, AMH, NJJ, AMM), pp. 176–185.
- SAC-2006-Bellur #consistency #object-oriented #on the #using #workflow
- On using OO techniques to establish workflow conformance (UB), pp. 1447–1448.
- SAC-2006-Cuzzocrea #multi
- An accuracy-aware compression technique for multidimensional data cubes (AC), pp. 515–516.
- SAC-2006-DubeyJA #keyword #source code
- A deterministic technique for extracting keyword based grammar rules from programs (AD, PJ, SKA), pp. 1631–1632.
- SAC-2006-KatsimpaPSTT #modelling #reverse engineering #using
- Application modeling using reverse engineering techniques (TK, YP, ES, GT, AKT), pp. 1250–1255.
- SAC-2006-LeeYKKK #ad hoc #distributed #mobile #network
- Distributed IPv6 addressing technique for mobile ad-hoc networks (DL, JY, HK, KK, KK), pp. 1156–1160.
- SAC-2006-MorimotoSGC #security #specification #standard #verification
- A security specification verification technique based on the international standard ISO/IEC 15408 (SM, SS, YG, JC), pp. 1802–1803.
- SAC-2006-OrshanskyWCX #analysis #robust #statistics
- Interval-based robust statistical techniques for non-negative convex functions, with application to timing analysis of computer chips (MO, WSW, MC, GX), pp. 1645–1649.
- SAC-2006-PirkolaTKJ #named #quality #word
- FITE-TRT: a high quality translation technique for OOV words (AP, JT, HK, KJ), pp. 1043–1049.
- SAC-2006-SinghXMH #geometry #linear #locality #problem #programming #using
- Solving the brachytherapy seed localization problem using geometric and linear programming techniques (VS, LM, JX, KRH), pp. 229–234.
- SAC-2006-TsvetinovUC #ranking
- Dominance and ranking issues applying interval techniques in pre-negotiations for services (PET, AU, TC), pp. 887–888.
- SAC-2006-XuC
- Improving address space randomization with a dynamic offset randomization technique (HX, SJC), pp. 384–391.
- FSE-2006-DoR #empirical #modelling #testing
- An empirical study of regression testing techniques incorporating context and lifetime factors and improved cost-benefit models (HD, GR), pp. 141–151.
- FSE-2006-DwyerPE #detection #fault
- Controlling factors in evaluating path-sensitive error detection techniques (MBD, SP, SGE), pp. 92–104.
- ICSE-2006-Deng #challenge #component #deployment #enterprise #framework #generative
- Resolving component deployment & configuration challenges for enterprise DRE systems via frameworks & generative techniques (GD), pp. 945–948.
- ICSE-2006-JarzabekP #industrial #research #reuse #towards
- Research journey towards industrial application of reuse technique (SJ, UP), pp. 608–611.
- ICSE-2006-Komuro #case study #development #experience #process
- Experiences of applying SPC techniques to software development processes (MK), pp. 577–584.
- ICSE-2006-TwalaCS #predict
- Ensemble of missing data techniques to improve software prediction accuracy (BT, MC, MJS), pp. 909–912.
- ICSE-2006-Xie #effectiveness #modelling #testing #user interface
- Developing cost-effective model-based techniques for GUI testing (QX), pp. 997–1000.
- ICSE-2006-ZhongZM #comparison #reduction #testing
- An experimental comparison of four test suite reduction techniques (HZ, LZ, HM), pp. 636–640.
- SPLC-2006-HallsteinsenSSF #adaptation #product line #using
- Using Product Line Techniques to Build Adaptive Systems (SOH, ES, AS, JF), pp. 141–150.
- ASPLOS-2006-AdamsA #comparison #hardware
- A comparison of software and hardware techniques for x86 virtualization (KA, OA), pp. 2–13.
- HPCA-2006-IsciM
- Phase characterization for power: evaluating control-flow-based and event-counter-based techniques (CI, MM), pp. 121–132.
- HPCA-2006-KumarA #concurrent #detection #fault #performance
- Reducing resource redundancy for concurrent error detection techniques in high performance microprocessors (SK, AA), pp. 212–221.
- OSDI-2006-ZhouCABEHNB #named #using
- SafeDrive: Safe and Recoverable Extensions Using Language-Based Techniques (FZ, JC, ZRA, IB, RE, MH, GCN, EAB), pp. 45–60.
- PPoPP-2006-AlamVAG #performance #simulation
- Performance characterization of molecular dynamics techniques for biomolecular simulations (SRA, JSV, PKA, AG), pp. 59–68.
- AMOST-J-2005-Paradkar06 #case study #detection #effectiveness #fault #generative #modelling #testing
- A quest for appropriate software fault models: Case studies on fault detection effectiveness of model-based test generation techniques (AMP), pp. 949–959.
- CAV-2006-LahiriNO #abstraction #performance #smt
- SMT Techniques for Fast Predicate Abstraction (SKL, RN, AO), pp. 424–437.
- ICLP-2006-Pientka #framework #logic #performance #verification
- Overcoming Performance Barriers: Efficient Verification Techniques for Logical Frameworks (BP), pp. 3–10.
- IJCAR-2006-JiaZ #finite #morphism
- A Powerful Technique to Eliminate Isomorphism in Finite Model Search (XJ, JZ), pp. 318–331.
- ISSTA-2006-Wagner #analysis #detection #quality
- A model and sensitivity analysis of the quality economics of defect-detection techniques (SW0), pp. 73–84.
- TestCom-2006-GastonGRT #execution #symbolic computation
- Symbolic Execution Techniques for Test Purpose Definition (CG, PLG, NR, AT), pp. 1–18.
- CBSE-2005-GuH #component #implementation #modelling #realtime #scheduling #synthesis
- Real-Time Scheduling Techniques for Implementation Synthesis from Component-Based Software Models (ZG, ZH), pp. 235–250.
- CBSE-2005-TansalarakC #component #ranking
- Finding a Needle in the Haystack: A Technique for Ranking Matches Between Components (NT, KTC), pp. 171–186.
- ASE-2005-JonesH #automation #empirical #evaluation
- Empirical evaluation of the tarantula automatic fault-localization technique (JAJ, MJH), pp. 273–282.
- DAC-2005-AbdollahiFP #effectiveness
- An effective power mode transition technique in MTCMOS circuits (AA, FF, MP), pp. 37–42.
- DAC-2005-HuLWD #analysis #integration #novel #using
- Analysis of full-wave conductor system impedance over substrate using novel integration techniques (XH, JHL, JW, LD), pp. 147–152.
- DAC-2005-KimYH #using
- Trace-driven HW/SW cosimulation using virtual synchronization technique (DK, YY, SH), pp. 345–348.
- DAC-2005-KrenikB #network
- Cognitive radio techniques for wide area networks (WK, AB), pp. 409–412.
- DAC-2005-LiSB #bound #effectiveness #problem
- Effective bounding techniques for solving unate and binate covering problems (XYL, MFMS, FB), pp. 385–390.
- DAC-2005-MengBISLK #algorithm #design #estimation #performance
- MP core: algorithm and design techniques for efficient channel estimation in wireless applications (YM, APB, RAI, TS, HL, RK), pp. 297–302.
- DAC-2005-RoyannezMDWSBBCSDSPRK #design #framework #reduction
- A design platform for 90-nm leakage reduction techniques (PR, HM, FD, MW, MS, LB, JB, HC, GS, JD, DS, BP, CR, UK), pp. 549–550.
- DAC-2005-TschanzBD
- Variation-tolerant circuits: circuit solutions and techniques (JT, KAB, VD), pp. 762–763.
- DAC-2005-YuanQ #reduction
- Enhanced leakage reduction Technique by gate replacement (LY, GQ), pp. 47–50.
- DAC-2005-ZykovMJVS #architecture #novel #performance #trade-off
- High performance computing on fault-prone nanotechnologies: novel microarchitecture techniques exploiting reliability-delay trade-offs (AVZ, EM, MFJ, GdV, AS), pp. 270–273.
- DATE-2005-Abdel-HamidTA #design
- A Public-Key Watermarking Technique for IP Designs (ATAH, ST, EMA), pp. 330–335.
- DATE-2005-BhuniaMRR #novel #testing
- A Novel Low-overhead Delay Testing Technique for Arbitrary Two-Pattern Test Application (SB, HMM, AR, KR), pp. 1136–1141.
- DATE-2005-ChandrasekarH #fault #generative #incremental #integration #learning #performance #satisfiability #testing
- Integration of Learning Techniques into Incremental Satisfiability for Efficient Path-Delay Fault Test Generation (KC, MSH), pp. 1002–1007.
- DATE-2005-DasygenisBDCST #energy #memory management #performance
- A Memory Hierarchical Layer Assigning and Prefetching Technique to Overcome the Memory Performance/Energy Bottleneck (MD, EB, BD, FC, DS, AT), pp. 946–947.
- DATE-2005-ElbazTSGABBR #bibliography #encryption #hardware
- Hardware Engines for Bus Encryption: A Survey of Existing Techniques (RE, LT, GS, PG, CA, MB, CB, JBR), pp. 40–45.
- DATE-2005-HamannE #optimisation #search-based
- TDMA Time Slot and Turn Optimization with Evolutionary Search Techniques (AH, RE), pp. 312–317.
- DATE-2005-IshiharaF #power management
- A Way Memoization Technique for Reducing Power Consumption of Caches in Application Specific Integrated Processors (TI, FF), pp. 358–363.
- DATE-2005-LiWYY #named #performance #power management
- Q-DPM: An Efficient Model-Free Dynamic Power Management Technique (ML, XW, RY, XY), pp. 526–527.
- DATE-2005-Lopez-OngilGPE #fault #performance
- Techniques for Fast Transient Fault Grading Based on Autonomous Emulation (CLO, MGV, MPG, LEA), pp. 308–309.
- DATE-2005-LopezCLS #estimation #quality
- A High Quality/Low Computational Cost Technique for Block Matching Motion Estimation (SL, GMC, JFL, RS), pp. 2–7.
- DATE-2005-ManquinhoM #bound #effectiveness #optimisation #pseudo
- Effective Lower Bounding Techniques for Pseudo-Boolean Optimization (VMM, JPMS), pp. 660–665.
- DATE-2005-MarconCMSRH #energy
- Exploring NoC Mapping Strategies: An Energy and Timing Aware Technique (CAMM, NLVC, FGM, AAS, IMR, FH), pp. 502–507.
- DATE-2005-NeiroukhS #statistics #using
- Improving the Process-Variation Tolerance of Digital Circuits Using Gate Sizing and Statistical Techniques (ON, XS), pp. 294–299.
- DATE-2005-ScholiveBRFR #generative #testing
- Mutation Sampling Technique for the Generation of Structural Test Data (MS, VB, CR, MLF, BR), pp. 1022–1023.
- DATE-2005-Simunic #power management
- Power Saving Techniques for Wireless LANs (TS), pp. 96–97.
- DocEng-2005-HuangCL #documentation #performance #xml
- Prefiltering techniques for efficient XML document processing (CHH, TRC, HML), pp. 149–158.
- HT-2005-BerlangaG #adaptation #design #learning #modelling #navigation #specification #using
- Modelling adaptive navigation support techniques using the IMS learning design specification (AJB, FJG), pp. 148–150.
- ICDAR-2005-CeciBM #comprehension #documentation #image #learning #logic #relational #statistics
- Relational Learning techniques for Document Image Understanding: Comparing Statistical and Logical approaches (MC, MB, DM), pp. 473–477.
- ICDAR-2005-HamzaBS
- Neural Based Binarization Techniques (HH, AB, ES), pp. 317–321.
- ICDAR-2005-LeeH #performance #recognition
- Performance Improvement Techniques for Chinese Character Recognition (HJL, JTH), pp. 710–715.
- ICDAR-2005-LiuCL #identification #image #machine learning #using
- Language Identification of Character Images Using Machine Learning Techniques (YHL, FC, CCL), pp. 630–634.
- ICDAR-2005-MethasateMST #recognition
- The feature Combination Technique for Off-line Thai Character Recognition System (IM, SM, SSt, TT), pp. 1006–1009.
- ICDAR-2005-MihovSRDN #comparative #corpus #evaluation
- A Corpus for Comparative Evaluation of OCR Software and Postcorrection Techniques (SM, KUS, CR, VD, VN), pp. 162–166.
- ICDAR-2005-MiyazakiUS #named #recognition
- Mosaicing-by-recognition: a technique for video-based text recognition (HM, SU, HS), pp. 904–908.
- ICDAR-2005-ShiG #documentation #multi #segmentation
- Multi-scale Techniques for Document Page Segmentation (ZS, VG), pp. 1020–1024.
- ICDAR-2005-ShivakumaraKVRN #documentation #estimation #image #using #word
- A New Moments based Skew Estimation Technique using Pixels in the Word for Binary Document Images (PS, GHK, HSV, SR, MRRN), pp. 151–156.
- ICDAR-2005-ZakosV #documentation #novel #retrieval #web
- A Novel Context Matching Based Technique for Web Document Retrieval (JZ, BV), pp. 909–914.
- SIGMOD-2005-ChenLL #on the #pattern matching #using #xml
- On Boosting Holism in XML Twig Pattern Matching using Structural Indexing Techniques (TC, JL, TWL), pp. 455–466.
- SIGMOD-2005-LiMTPT #data type #evaluation #semantics
- Semantics and Evaluation Techniques for Window Aggregates in Data Streams (JL, DM, KT, VP, PAT), pp. 311–322.
- VLDB-2005-KoudasS #approximate #concept
- Approximate Joins: Concepts and Techniques (NK, DS), p. 1363.
- VLDB-2005-ZhangHJLZ #cost analysis #learning #query #statistics #xml
- Statistical Learning Techniques for Costing XML Queries (NZ, PJH, VJ, GML, CZ), pp. 289–300.
- CSEET-2005-Sindre #case study #communication #education #experience #game studies #student
- Teaching Oral Communication Techniques in RE by Student-Student Role Play: Initial Experiences (GS), pp. 85–92.
- ITiCSE-2005-Ghafarian #education #re-engineering #reverse engineering
- Reverse engineering technique to enhance software engineering education (AG), p. 354.
- ITiCSE-2005-MedeirosDGM #programming #using
- Using a PC simulator to illustrate input-output programming techniques (PDM, VD, MCG, RFM), p. 388.
- TACAS-2005-LeinoMO #proving #quantifier #theorem proving
- A Two-Tier Technique for Supporting Quantifiers in a Lazily Proof-Explicating Theorem Prover (KRML, MM, XO), pp. 334–348.
- CSMR-2005-DubeyAJ #keyword #set #source code
- A Technique for Extracting Keyword Based Rules from a Set of Programs (AD, SKA, PJ), pp. 217–225.
- CSMR-2005-ZaidmanCDP #comprehension #execution #mining #process
- Applying Webmining Techniques to Execution Traces to Support the Program Comprehension Process (AZ, TC, SD, JP), pp. 134–142.
- ICSM-2005-AntoniolPH #maintenance #optimisation #search-based
- Search-Based Techniques Applied to Optimization of Project Planning for a Massive Maintenance Project (GA, MDP, MH), pp. 240–249.
- ICSM-2005-DemeyerDN #object-oriented #re-engineering
- Object-Oriented Reengineering: Patterns and Techniques (SD, SD, ON), pp. 723–724.
- ICSM-2005-DoR #empirical #fault #testing
- A Controlled Experiment Assessing Test Case Prioritization Techniques via Mutation Faults (HD, GR), pp. 411–420.
- ICSM-2005-OdaS #diagrams #generative #version control
- Generative Technique of Version Control Systems for Software Diagrams (TO, MS), pp. 515–524.
- ICSM-2005-SprenkleSGPS #comparison #empirical #reduction #testing #web
- An Empirical Comparison of Test Suite Reduction Techniques for User-Session-Based Testing of Web Applications (SS, SS, EG, LLP, ALS), pp. 587–596.
- ICSM-2005-WillmorE #testing
- A Safe Regression Test Selection Technique for Database-Driven Applications (DW, SME), pp. 421–430.
- IWPC-2005-CeccatoMMMTT #comparison #mining
- A Qualitative Comparison of Three Aspect Mining Techniques (MC, MM, KM, LM, PT, TT), pp. 13–22.
- IWPC-2005-MarcusRBPS #concept #object-oriented
- Static Techniques for Concept Location in Object-Oriented Code (AM, VR, JB, MP, AS), pp. 33–42.
- SCAM-2005-Singer #code generation #concept #debugging
- Concept Assignment as a Debugging Technique for Code Generators (JS), pp. 75–86.
- STOC-2005-BriestKV #approximate #design
- Approximation techniques for utilitarian mechanism design (PB, PK, BV), pp. 39–48.
- ICALP-2005-Pous #bisimulation
- Up-to Techniques for Weak Bisimulation (DP), pp. 730–741.
- IFM-2005-MalikR #adaptation #case study #comparative #embedded #specification
- Adaptive Techniques for Specification Matching in Embedded Systems: A Comparative Study (RM, PSR), pp. 33–52.
- CHI-2005-ArroyoBS #feedback #named #persuasion
- Waterbot: exploring feedback and persuasive techniques at the sink (EA, LB, TS), pp. 631–639.
- CHI-2005-HolmanVATJ #interactive
- Paper windows: interaction techniques for digital paper (DH, RV, MA, NFT, DJ), pp. 591–599.
- CHI-2005-IachelloA #adaptation #design #evaluation #privacy #ubiquitous
- Privacy and proportionality: adapting legal evaluation techniques to inform design in ubiquitous computing (GI, GDA), pp. 91–100.
- CHI-2005-LiHGL #analysis #user interface
- Experimental analysis of mode switching techniques in pen-based user interfaces (YL, KH, ZG, JAL), pp. 461–470.
- CHI-2005-NacentaASG #comparison #multi
- A comparison of techniques for multi-display reaching (MAN, DA, SS, CG), pp. 371–380.
- CAiSE-2005-HoppenbrouwersPW #comprehension #modelling #requirements
- Understanding the Requirements on Modelling Techniques (SH, HAP, TPvdW), pp. 262–276.
- ICEIS-v1-2005-ArandaVCP #elicitation #tool support
- Choosing Groupware Tools and Elicitation Techniques According to Stakeholders’ Features (GNA, AV, AC, MP), pp. 68–75.
- ICEIS-v1-2005-XuePQZ #database #hybrid #scalability #string
- The Hybrid Digital Tree: A New Indexing Technique for Large String Databases (QX, SP, GQ, QZ), pp. 115–121.
- ICEIS-v3-2005-EspositoMORS #data mining #detection #mining #novel #realtime
- Real Time Detection of Novel Attacks by Means of Data Mining Techniques (ME, CM, FO, SPR, CS), pp. 120–127.
- ICML-2005-CortesMW #learning
- A general regression technique for learning transductions (CC, MM, JW), pp. 153–160.
- SEKE-2005-ChanCT #adaptation #random testing #reduction #testing
- Adaptive Random Testing with Filtering: An Overhead Reduction Technique (KPC, TYC, DT), pp. 292–299.
- SEKE-2005-ChangL #compilation #data-driven
- Compiler Techniques for Data Driven Languages with Superlinear Speed-up (LHC, ELL), pp. 543–549.
- SEKE-2005-YangLH #reasoning
- An Ontology-Supported Case-Based Reasoning Technique for FAQ Proxy Service (SYY, PCL, CSH), pp. 639–644.
- SIGIR-2005-HoenkampD #semantics
- Evaluating semantic indexing techniques through cross-language fingerprinting (EH, SvD), pp. 609–610.
- MoDELS-2005-ShenP #analysis #aspect-oriented #modelling #performance #uml #using
- Performance Analysis of UML Models Using Aspect-Oriented Modeling Techniques (HS, DCP), pp. 156–170.
- MoDELS-2005-ShenP #analysis #aspect-oriented #modelling #performance #uml #using
- Performance Analysis of UML Models Using Aspect-Oriented Modeling Techniques (HS, DCP), pp. 156–170.
- GPCE-2005-JunJ #framework #generative #maintenance
- Applying a Generative Technique for Enhanced Genericity and Maintainability on the J2EE Platform (YJ, SJ), pp. 237–255.
- RE-2005-AvesaniBPS #machine learning #requirements #scalability
- Facing Scalability Issues in Requirements Prioritization with Machine Learning Techniques (PA, CB, AP, AS), pp. 297–306.
- SAC-2005-AgyemangBA #mining #n-gram #using #web
- Mining web content outliers using structure oriented weighting techniques and N-grams (MA, KB, RA), pp. 482–487.
- SAC-2005-Casale #analysis #mining #network #performance #web
- Combining queueing networks and web usage mining techniques for web performance analysis (GC), pp. 1699–1703.
- SAC-2005-HiransakolwongHKVL #adaptation #distance #image #retrieval
- An adaptive distance computation technique for image retrieval systems (NH, KAH, SK, KV, SDL), pp. 1195–1199.
- SAC-2005-JanejaA #detection #linear #named #semantics #statistics
- LS3: a Linear Semantic Scan Statistic technique for detecting anomalous windows (VPJ, VA), pp. 493–497.
- SAC-2005-YimKK #memory management #performance
- A fast start-up technique for flash memory based computing systems (KSY, JK, KK), pp. 843–849.
- ESEC-FSE-2005-HaranKOPS #classification #execution
- Applying classification techniques to remotely-collected program execution data (MH, AFK, AO, AAP, APS), pp. 146–155.
- GTTSE-2005-KrahnR #generative #lightweight #refactoring
- Techniques for Lightweight Generator Refactoring (HK, BR), pp. 437–446.
- ICSE-2005-Fox #dependence #machine learning #statistics
- Addressing software dependability with statistical and machine learning techniques (AF), p. 8.
- ICSE-2005-LeonMP #data flow #empirical #evaluation #testing
- An empirical evaluation of test case filtering techniques based on exercising complex information flows (DL, WM, AP), pp. 412–421.
- CGO-2005-BerndlVZB #flexibility #performance #thread #virtual machine
- Context Threading: A Flexible and Efficient Dispatch Technique for Virtual Machine Interpreters (MB, BV, MZ, ADB), pp. 15–26.
- CGO-2005-ZillesN
- Reactive Techniques for Controlling Software Speculation (CBZ, NN), pp. 305–316.
- HPCA-2005-YiKSLH #simulation
- Characterizing and Comparing Prevailing Simulation Techniques (JJY, SVK, RS, DJL, DMH), pp. 266–277.
- HPDC-2005-TierneyG #clustering #workflow
- Techniques for tuning workflows in cluster environments (BT, DKG), pp. 303–305.
- LCTES-2005-BriskMNS #taxonomy
- A dictionary construction technique for code compression systems with echo instructions (PB, JM, AN, MS), pp. 105–114.
- PPoPP-2005-JungLLH #adaptation #architecture #execution #multi #smt
- Adaptive execution techniques for SMT multiprocessor architectures (CJ, DL, JL, SH), pp. 236–246.
- PPoPP-2005-SuraFWMLP #compilation #consistency #java #performance #source code
- Compiler techniques for high performance sequentially consistent java programs (ZS, XF, CLW, SPM, JL, DAP), pp. 2–13.
- SAT-J-2004-PanV05 #satisfiability
- Search vs. Symbolic Techniques in Satisfiability Solving (GP, MYV), pp. 235–250.
- AMOST-2005-Paradkar #case study #detection #effectiveness #fault #generative #modelling #testing
- Case studies on fault detection effectiveness of model based test generation techniques (AMP).
- CADE-2005-UrbanT #higher-order
- Nominal Techniques in Isabelle/HOL (CU, CT), pp. 38–53.
- ICLP-2005-GallagherHB #analysis #scalability
- Techniques for Scaling Up Analyses Based on Pre-interpretations (JPG, KSH, GB), pp. 280–296.
- SAT-2005-LewisSB #satisfiability
- Speedup Techniques Utilized in Modern SAT Solvers (MDTL, TS, BB), pp. 437–443.
- ASE-2004-RysselbergheD #clone detection #detection #perspective #refactoring
- Evaluating Clone Detection Techniques from a Refactoring Perspective (FVR, SD), pp. 336–339.
- DAC-2004-DingM #logic #novel
- A novel technique to improve noise immunity of CMOS dynamic logic circuits (LD, PM), pp. 900–903.
- DAC-2004-ParkCYC #power management #testing
- A new state assignment technique for testing and low power (SP, SC, SY, MJC), pp. 510–513.
- DAC-2004-YangKM #architecture #named #optimisation
- Divide-and-concatenate: an architecture level optimization technique for universal hash functions (BY, RK, DAM), pp. 614–617.
- DATE-v1-2004-ChangYL
- Value-Conscious Cache: Simple Technique for Reducing Cache Access Power (YJC, CLY, FL), pp. 16–21.
- DATE-v1-2004-DimopoulosL #performance #sequence #set #testing
- Efficient Static Compaction of Test Sequence Sets through the Application of Set Covering Techniques (MGD, PL), pp. 194–201.
- DATE-v1-2004-IsseninBMD #analysis #memory management #reuse
- Data Reuse Analysis Technique for Software-Controlled Memory Hierarchies (II, EB, MM, ND), pp. 202–207.
- DATE-v1-2004-NathkeBHB #automation #behaviour #generative
- Hierarchical Automatic Behavioral Model Generation of Nonlinear Analog Circuits Based on Nonlinear Symbolic Techniques (LN, VB, LH, EB), pp. 442–447.
- DATE-v1-2004-OngHCW #multi #random
- Random Jitter Extraction Technique in a Multi-Gigahertz Signal (CKO, DH, KTC, LCW), pp. 286–291.
- DATE-v1-2004-ZambrenoCSN #flexibility #hardware #using
- Flexible Software Protection Using Hardware/Software Codesign Techniques (JZ, ANC, RS, BN), pp. 636–641.
- DATE-v2-2004-Feldmann #linear #order #reduction #scalability
- Model Order Reduction Techniques for Linear Systems with Large Numbers of Terminals (PF), pp. 944–947.
- DATE-v2-2004-LampropoulosAR #using
- Minimization of Crosstalk Noise, Delay and Power Using a Modified Bus Invert Technique (ML, BMAH, PMR), pp. 1372–1373.
- DATE-v2-2004-MineKKWA #hybrid #linear #performance #reduction #simulation
- Hybrid Reduction Technique for Efficient Simulation of Linear/Nonlinear Mixed Circuits (TM, HK, AK, TW, HA), pp. 1327–1333.
- DATE-v2-2004-TehranipourNC #flexibility #testing
- Nine-Coded Compression Technique with Application to Reduced Pin-Count Testing and Flexible On-Chip Decompression (MHT, MN, KC), pp. 1284–1289.
- DATE-v2-2004-VerbauwhedeSPK #architecture #design #embedded #energy #multi #performance
- Architectures and Design Techniques for Energy Efficient Embedded DSP and Multimedia Processing (IV, PS, CP, BK), pp. 988–995.
- DATE-v2-2004-WangLC #fault #hardware #hybrid #testing
- Hybrid Delay Scan: A Low Hardware Overhead Scan-Based Delay Test Technique for High Fault Coverage and Compact Test Sets (SW, XL, STC), pp. 1296–1301.
- DocEng-2004-Dymetman #authoring #documentation #editing #predict
- Chart-parsing techniques and the prediction of valid editing moves in structured document authoring (MD), pp. 229–238.
- DocEng-2004-QuintV #authoring #documentation #xml
- Techniques for authoring complex XML documents (VQ, IV), pp. 115–123.
- SIGMOD-2004-DasGR #approximate
- Approximation Techniques for Spatial Data (AD, JG, MR), pp. 695–706.
- SIGMOD-2004-RizviMSR #data access #fine-grained #query
- Extending Query Rewriting Techniques for Fine-Grained Access Control (SR, AOM, SS, PR), pp. 551–562.
- VLDB-2004-JohnsonKCKV #matrix #order #scalability #using
- Compressing Large Boolean Matrices using Reordering Techniques (DSJ, SK, JC, SK, SV), pp. 13–23.
- ICSM-2004-Basili #dependence #empirical #evolution
- Empirically Evolving Software Techniques: The High Dependability Computing Project (VRB), p. 3.
- ICSM-2004-BruntinkDTE #clone detection #detection #evaluation #identification
- An Evaluation of Clone Detection Techniques for Identifying Crosscutting Concerns (MB, AvD, TT, RvE), pp. 200–209.
- ICSM-2004-DeelstraSNB #named #product line #variability
- COSVAM: A Technique for Assessing Software Variability in Software Product Families (SD, MS, JN, JB), pp. 458–462.
- IWPC-2004-DistantePT #perspective #reverse engineering #towards #transaction #web
- Towards a Technique for Reverse Engineering Web Transactions from a User’s Perspective (DD, TP, SRT), pp. 142–150.
- SCAM-2004-SuWHM #pipes and filters
- Software De-Pipelining Technique (BS, JW, EWH, JM), pp. 7–16.
- SCAM-2004-WahlerSGF #clone detection #detection #source code
- Clone Detection in Source Code by Frequent Itemset Techniques (VW, DS, JWvG, GF), pp. 128–135.
- SCAM-2004-XuLZS #clustering
- Program Restructuring Through Clustering Techniques (XX, CHL, MZ, AS), pp. 75–84.
- WCRE-2004-LakhotiaP #analysis #research #tool support
- Virus Analysis: Techniques, Tools, and Research Issues (AL, PP), p. 2.
- CIAA-2004-Ibarra #infinity
- Automata-Theoretic Techniques for Analyzing Infinite-State Systems (OHI), p. 1.
- ICALP-2004-FranceschiniG #data type #string
- A General Technique for Managing Strings in Comparison-Driven Data Structures (GF, RG), pp. 606–617.
- SEFM-2004-SchuleS #comparison #infinity #model checking #verification
- Global vs. Local Model Checking: A Comparison of Verification Techniques for Infinite State Systems (TS, KS), pp. 67–76.
- SEFM-2004-ZhangXW #constraints #execution #generative #symbolic computation #testing #theorem proving #using
- Path-Oriented Test Data Generation Using Symbolic Execution and Constraint Solving Techniques (JZ, CX, XW), pp. 242–250.
- IFL-2004-EversAK #functional #programming #user interface #visual notation
- A Functional Programming Technique for Forms in Graphical User Interfaces (SE, PA, JK), pp. 35–51.
- CHI-2004-WigdorB #comparison #concurrent #mobile
- A comparison of consecutive and concurrent input text entry techniques for mobile phones (DW, RB), pp. 81–88.
- CAiSE-2004-SalinesiEZ #approach #evolution #modelling #requirements #similarity #using
- A Systematic Approach to Express IS Evolution Requirements Using Gap Modelling and Similarity Modelling Techniques (CS, AE, IZ), pp. 338–352.
- ICEIS-v2-2004-BelsisGSD #implementation #information management #security
- Implementing Knowledge Management Techniques for Security Purposes (PB, SG, CS, ID), pp. 535–540.
- ICEIS-v2-2004-KooptiwootS #mining #set #using
- Mining the Relationships in the Form of the Predisposing Factors and Coincident Factors Among Numerical Dynamic Attributes in Time Series Data Set by Using the Combination of Some Existing Techniques (SK, MAS), pp. 327–334.
- ICEIS-v2-2004-MararCPF #adaptation #detection
- Adaptative Techniques for the Human Faces Detection (JFM, DC, OP, EF), pp. 465–468.
- ICEIS-v2-2004-PachonVRST #industrial #process
- Practical Application of KDD Techniques to an Industrial Process (VP, JMV, FR, JCRS, JMT), pp. 309–314.
- ICEIS-v2-2004-TagarelliTG #clustering #linear #mining #programming
- Mining Scientific Results Through the Combined Use of Clustering and Linear Programming Techniques (AT, IT, SG), pp. 84–91.
- CIKM-2004-MaZMS #framework #learning #query #similarity #using
- A framework for refining similarity queries using learning techniques (YM, QZ, SM, DYS), pp. 158–159.
- CIKM-2004-MegalooikonomouLW #analysis #database #performance #reduction #similarity
- A dimensionality reduction technique for efficient similarity analysis of time series databases (VM, GL, QW), pp. 160–161.
- CIKM-2004-MekhaldiLI #clustering #documentation #speech #using
- Using bi-modal alignment and clustering techniques for documents and speech thematic segmentations (DM, DL, RI), pp. 69–77.
- ECIR-2004-WeigelMBS #information retrieval #performance #xml
- Content-Aware DataGuides: Interleaving IR and DB Indexing Techniques for Efficient Retrieval of Textual XML Data (FW, HM, FB, KUS), pp. 378–393.
- ICPR-v1-2004-HoriSNK #detection #multi #realtime #using
- A Real-Time Multi Face Detection Technique Using Positive-Negative Lines-of-Face Template (YH, KS, YN, TK), pp. 765–768.
- ICPR-v2-2004-MachadoMC #adaptation #clustering #image #using
- The Influence of the Noise in the Restoration of Solar Radio Images using Adaptive Regularization Techniques Based on Clustering (WRSM, NDAM, JERC), pp. 371–374.
- ICPR-v2-2004-VijayaMS #classification #clustering #performance #sequence
- An Efficient Technique for Protein Sequence Clustering and Classification (PAV, MNM, DKS), pp. 447–450.
- ICPR-v3-2004-ParedesV #fault #learning #nearest neighbour #prototype #reduction
- Learning Prototypes and Distances (LPD). A Prototype Reduction Technique based on Nearest Neighbor Error Minimization (RP, EV), pp. 442–445.
- ICPR-v4-2004-IkeuchiNHO #representation
- Representing Cultural Heritage in Digital Forms for VR Systems through Computer Vision Techniques (KI, AN, KH, TO), pp. 1–6.
- ICPR-v4-2004-KandimallaNG
- Snake-based Technique for Plasmapause Tracking (RMK, TSN, DLG), pp. 376–379.
- ICPR-v4-2004-LiuC #adaptation #image
- An Adaptive Data Hiding Technique for Binary Images (THL, LWC), pp. 831–834.
- ICPR-v4-2004-SinghS #comparison #detection #image
- A Comparison of Image Enhancement Techniques for Explosive Detection (MS, SS), pp. 811–814.
- ICPR-v4-2004-ViswanathMB #classification #nearest neighbour #pattern matching #pattern recognition #performance #recognition #synthesis
- A Pattern Synthesis Technique with an Efficient Nearest Neighbor Classifier for Binary Pattern Recognition (PV, MNM, SB), pp. 416–419.
- KDD-2004-SteinbachTK
- Support envelopes: a technique for exploring the structure of association patterns (MS, PNT, VK), pp. 296–305.
- KR-2004-DohertySL #approximate #ontology #query
- Approximative Query Techniques for Agents with Heterogeneous Ontologies and Perceptive Capabilities (PD, AS, WL), pp. 459–468.
- KR-2004-HaarslevM #documentation #optimisation #owl #rdf
- Optimization Techniques for Retrieving Resources Described in OWL/RDF Documents: First Results (VH, RM), pp. 163–174.
- SEKE-2004-Cruz-LemusGORP #diagrams #fuzzy #predict #statechart #uml #using
- Predicting UML Statechart Diagrams Understandability Using Fuzzy Logic-Based Techniques (JACL, MG, JAO, FPR, MP), pp. 238–245.
- SEKE-2004-MouhoubSS
- Formal Description Techniques for CSPs and TCSPs (MM, SS, AS), pp. 406–410.
- SIGIR-2004-ShahC #retrieval
- Evaluating high accuracy retrieval techniques (CS, WBC), pp. 2–9.
- SIGIR-2004-Willett #information retrieval #named
- Chemoinformatics: an application domain for information retrieval techniques (PW0), p. 393.
- UML-2004-CorreaW #modelling #ocl #refactoring #uml
- Applying Refactoring Techniques to UML/OCL Models (ALC, CMLW), pp. 173–187.
- RE-2004-NurmulianiZW #requirements #sorting #using
- Using Card Sorting Technique to Classify Requirements Change (NN, DZ, SPW), pp. 240–248.
- SAC-2004-BaggioWE #scheduling #workflow
- Applying scheduling techniques to minimize the number of late jobs in workflow systems (GB, JW, CAE), pp. 1396–1403.
- SAC-2004-BourasKM #personalisation
- A web-page fragmentation technique for personalized browsing (CB, VK, IM), pp. 1146–1147.
- SAC-2004-Engelen #code generation #embedded #web #web service #xml
- Code generation techniques for developing light-weight XML Web services for embedded devices (RvE), pp. 854–861.
- SAC-2004-ZaneroS #detection #learning
- Unsupervised learning techniques for an intrusion detection system (SZ, SMS), pp. 412–419.
- ICSE-2004-Card #re-engineering #statistics
- Statistical Techniques for Software Engineering Practice (DNC), pp. 722–723.
- ICSE-2004-Dong #modelling #semantics #web
- Software Modeling Techniques and the Semantic Web (JSD), pp. 724–725.
- CC-2004-KralFLUW #compilation
- FFT Compiler Techniques (SK, FF, JL, CWU, PW), pp. 217–231.
- HPCA-2004-GniadyHL #power management
- Program Counter Based Techniques for Dynamic Power Management (CG, YCH, YHL), pp. 24–35.
- OSDI-2004-CandeaKFFF #named
- Microreboot — A Technique for Cheap Recovery (GC, SK, YF, GF, AF), pp. 31–44.
- RTA-2004-Takai #abstract interpretation #term rewriting #using #verification
- A Verification Technique Using Term Rewriting Systems and Abstract Interpretation (TT), pp. 119–133.
- SAT-2004-PanV #satisfiability
- Search vs. Symbolic Techniques in Satisfiability Solving (GP, MYV), pp. 137–146.
- ASE-2003-DiazTB #automation #metaheuristic #testing #using
- Automated Software Testing Using a Metaheuristic Technique Based on Tabu Search (ED, JT, RB), pp. 310–313.
- DAC-2003-BeniniMMOPP #analysis #design #difference #energy
- Energy-aware design techniques for differential power analysis protection (LB, AM, EM, EO, FP, MP), pp. 36–41.
- DAC-2003-ChoiK #design #embedded #layout #memory management #performance
- Memory layout techniques for variables utilizing efficient DRAM access modes in embedded system design (YC, TK), pp. 881–886.
- DAC-2003-HsuTCT #debugging
- Advanced techniques for RTL debugging (YCH, BT, YAC, FST), pp. 362–367.
- DAC-2003-HuaQB #energy #multi #reduction
- Energy reduction techniques for multimedia applications with tolerance to deadline misses (SH, GQ, SSB), pp. 131–136.
- DAC-2003-KouroussisN #grid #independence #power management #verification
- A static pattern-independent technique for power grid voltage integrity verification (DK, FNN), pp. 99–104.
- DAC-2003-KwonK
- Optimal voltage allocation techniques for dynamically variable voltage processors (WCK, TK), pp. 125–130.
- DAC-2003-LeeKBS #analysis
- Analysis and minimization techniques for total leakage considering gate oxide leakage (DL, WK, DB, DS), pp. 175–180.
- DAC-2003-RaghunathanSG #bibliography #communication #energy #performance
- A survey of techniques for energy efficient on-chip communication (VR, MBS, RKG), pp. 900–905.
- DAC-2003-ReshadiMD #flexibility #performance #set #simulation
- Instruction set compiled simulation: a technique for fast and flexible instruction set simulation (MR, PM, NDD), pp. 758–763.
- DAC-2003-RootWT #behaviour #metric #modelling #simulation
- New techniques for non-linear behavioral modeling of microwave/RF ICs from simulation and nonlinear microwave measurements (DER, JW, NT), pp. 85–90.
- DAC-2003-TsaiDVI #reduction #scalability
- Implications of technology scaling on leakage reduction techniques (YFT, DD, NV, MJI), pp. 187–190.
- DAC-2003-VasudevanR #using
- Computation of noise spectral density in switched capacitor circuits using the mixed-frequency-time technique (VV, MR), pp. 538–541.
- DAC-2003-WangM #multi #network #optimisation #power management #using
- On-chip power supply network optimization using multigrid-based technique (KW, MMS), pp. 113–118.
- DAC-2003-WongMP #case study #design
- Design techniques for sensor appliances: foundations and light compass case study (JLW, SM, MP), pp. 66–71.
- DATE-2003-BurbidgeTR #automation #embedded #monitoring
- Techniques for Automatic On Chip Closed Loop Transfer Function Monitoring For Embedded Charge Pump Phase Locked Loops (MJB, JT, AR), pp. 10496–10503.
- DATE-2003-ChengP #encoding #interface #power management #visual notation
- Chromatic Encoding: A Low Power Encoding Technique for Digital Visual Interface (WCC, MP), pp. 10694–10699.
- DATE-2003-GouraryRUZM #analysis #simulation
- A New Simulation Technique for Periodic Small-Signal Analysis (MMG, SGR, SLU, MMZ, BJM), pp. 10244–10249.
- DATE-2003-HaubeltTFM #satisfiability #synthesis
- SAT-Based Techniques in System Synthesis (CH, JT, RF, BM), pp. 11168–11169.
- DATE-2003-KnieserWPWM
- A Technique for High Ratio LZW Compression (MJK, FGW, CAP, DJW, DRM), pp. 10116–10121.
- DATE-2003-Novak #comparison
- Comparison of Test Pattern Decompression Techniques (ON), pp. 11182–11183.
- DATE-2003-RoychoudhuryMK #debugging #protocol #using
- Using Formal Techniques to Debug the AMBA System-on-Chip Bus Protocol (AR, TM, SRK), pp. 10828–10833.
- DATE-2003-WangM #multi #optimisation #using
- Power/Ground Mesh Area Optimization Using Multigrid-Based Technique (KW, MMS), pp. 10850–10855.
- DocEng-2003-GarainDMC #pattern matching
- Compression of scan-digitized Indian language printed text: a soft pattern matching technique (UG, SD, AM, BBC), pp. 185–192.
- ICDAR-2003-BlumensteinVB #feature model #novel #recognition
- A Novel Feature Extraction Technique for the Recognition of Segmented Handwritten Characters (MB, BV, HB), pp. 137–141.
- ICDAR-2003-ChangC #algorithm #component #using
- A Component-Labeling Algorithm Using Contour Tracing Technique (FC, CJC), pp. 741–745.
- ICDAR-2003-ChaudhurySVH #documentation #image #interactive
- Devising Interactive Access Techniques for Indian Language Document Images (SC, GS, AV, GH), pp. 885–889.
- ICDAR-2003-HoqueSHFD #documentation #modelling #named #novel
- SAGENT: A Novel Technique for Document Modeling for Secure Access and Distribution (SH, HS, GH, MCF, FD), pp. 1257–1261.
- VLDB-2003-CeriM #tool support #web
- Constructing and integrating data-centric Web Applications: Methods, Tools, and Techniques (SC, IM), p. 1151.
- VLDB-2003-HankinsP #adaptation
- Data Morphing: An Adaptive, Cache-Conscious Storage Technique (RAH, JMP), pp. 417–428.
- VLDB-2003-KraftSRM #optimisation #sequence #sql
- Coarse-Grained Optimization: Techniques for Rewriting SQL Statement Sequences (TK, HS, RR, BM), pp. 488–499.
- VLDB-2003-LernerS #named #optimisation #order #query
- AQuery: Query Language for Ordered Data, Optimization Techniques, and Experiments (AL, DS), pp. 345–356.
- VLDB-2003-MeekPK #biology #named #online #sequence
- OASIS: An Online and Accurate Technique for Local-alignment Searches on Biological Sequences (CM, JMP, SK), pp. 910–921.
- VLDB-2003-QianZXP #multi
- The ND-Tree: A Dynamic Indexing Technique for Multidimensional Non-ordered Discrete Data Spaces (GQ, QZ, QX, SP), pp. 620–631.
- ITiCSE-2003-HollowayR #development #programming #student #using
- Development of a MLE by students for students using extreme programming techniques (JH, MR), p. 225.
- ITiCSE-2003-LassCBCPHZ #off the shelf #scalability #tool support #using
- Tools and techniques for large scale grading using Web-based commercial off-the-shelf software (RNL, CDC, NTB, BWC, JLP, NH, PZ), pp. 168–172.
- ESOP-2003-AltisenCMR #using
- Using Controller-Synthesis Techniques to Build Property-Enforcing Layers (KA, AC, FM, ÉR), pp. 174–188.
- TACAS-2003-AmlaKMM #analysis #bound #model checking
- Experimental Analysis of Different Techniques for Bounded Model Checking (NA, RPK, KLM, RM), pp. 34–48.
- CSMR-2003-SaeedMBHS #algorithm #clustering
- Software Clustering Techniques and the Use of Combined Algorithm (MS, OM, HAB, SZH, SMS), pp. 301–306.
- SCAM-2003-BinkleyH #algorithm #analysis #graph #optimisation #performance #reachability #scalability #source code
- Results from a Large-Scale Study of Performance Optimization Techniques for Source Code Analyses Based on Graph Reachability Algorithms (DB, MH), p. 203–?.
- SCAM-2003-Martel #clustering #static analysis
- Improving the Static Analysis of Loops by Dynamic Partitioning Techniques (MM), pp. 13–21.
- PLDI-2003-SuganumaYN #compilation #java
- A region-based compilation technique for a Java just-in-time compiler (TS, TY, TN), pp. 312–323.
- SAS-2003-FieldGRY #abstraction #complexity #type system #verification
- Typestate Verification: Abstraction Techniques and Complexity Results (JF, DG, GR, EY), pp. 439–462.
- CIAA-2003-TozawaH #xml
- XML Schema Containment Checking Based on Semi-implicit Techniques (AT, MH), pp. 213–225.
- CHI-2003-BaudischR #named #visualisation
- Halo: a technique for visualizing off-screen objects (PB, RR), pp. 481–488.
- CHI-2003-BrewsterLBHT #interactive #multimodal #smarttech
- Multimodal “eyes-free” interaction techniques for wearable devices (SAB, JL, MB, MH, ST), pp. 473–480.
- VISSOFT-2003-EichelbergerG #diagrams #layout #state of the art #uml
- UML Class Diagrams – State of the Art in Layout Techniques (HE, JWvG), pp. 30–34.
- VISSOFT-2003-Hamou-LhadjL #complexity #execution #object-oriented
- Techniques for Reducing the Complexity of Object-Oriented Execution Traces (AHL, TCL), pp. 35–40.
- AdaEurope-2003-GreinKW #ada #bibliography #physics
- A Survey of Physical Unit Handling Techniques in Ada (CG, DAK, FW), pp. 258–270.
- CAiSE-2003-Saeki #development #information management #metric
- Embedding Metrics into Information Systems Development Methods: An Application of Method Engineering Technique (MS), pp. 374–389.
- ICEIS-v1-2003-WongL #multi #performance #recursion #streaming #video
- Recursive Patching — An Efficient Technique for Multicast Video Streaming (YWW, JYBL), pp. 306–312.
- CIKM-2003-LinK #mining #using #web
- Question answering from the web using knowledge annotation and knowledge mining techniques (JJL, BK), pp. 116–123.
- CIKM-2003-RamaswamyILD #detection #performance #web
- Techniques for efficient fragment detection in web pages (LR, AI, LL, FD), pp. 516–519.
- CIKM-2003-Sifer #coordination #interface #visual notation
- A visual interface technique for exploring OLAP data with coordinated dimension hierarchies (MS), pp. 532–535.
- CIKM-2003-TaoFP #estimation #multi #query
- The power-method: a comprehensive estimation technique for multi-dimensional queries (YT, CF, DP), pp. 83–90.
- KDD-2003-DuZ #data mining #mining #privacy #random #using
- Using randomized response techniques for privacy-preserving data mining (WD, JZZ), pp. 505–510.
- SEKE-2003-AstesianoMMR #execution #multi #prototype #specification
- From Requirement Specification to Prototype Execution: a Combination of Multiview Use-Case Driven Methods and Agent-Oriented Techniques (EA, MM, VM, GR), pp. 578–585.
- SEKE-2003-BeaverS #data analysis #modelling #quality
- Spatial Data Analysis as a Software Quality Modeling Technique (JMB, GAS), pp. 74–77.
- SEKE-2003-LoC #architecture #clustering #component #design
- Application of Clustering Techniques to Component Architecture Design (ScL, JhC), pp. 699–705.
- SEKE-2003-RafiqueA #information management #performance
- An Efficient Knowledge Management Technique for finding Association Rules (FR, AA), pp. 245–249.
- SIGIR-2003-AntoniukN
- A light weight PDA-friendly collection fusion technique (JA, MAN), pp. 439–440.
- ECOOP-2003-ConradiMAHBP #empirical #industrial #modelling #object-oriented #uml
- Object-Oriented Reading Techniques for Inspection of UML Models — An Industrial Experiment (RC, PM, TA, LCH, GAB, AP), pp. 483–500.
- RE-2003-HickeyD #elicitation #how #question
- Elicitation Technique Selection: How Do Experts Do It? (AMH, AMD), p. 169–?.
- SAC-2003-HuaJVT #algebra #analysis #approach #data mining #mining #named #performance #using
- ADMiRe: An Algebraic Approach to System Performance Analysis Using Data Mining Techniques (KAH, NJ, RV, DAT), pp. 490–496.
- SAC-2003-LanzenbergerMOP #behaviour #visualisation
- Applying Information Visualization Techniques to Capture and Explore the Course of Cognitive Behavioral Therapy (ML, SM, SO, CP), pp. 268–274.
- SAC-2003-LiBKLZ #3d #framework #performance
- A Framework of Individually-Focused Teleconferencing (IFT) via an Efficient 3D Reprojection Technique (QL, CB, CK, TL, SZ), pp. 951–955.
- SAC-2003-ZhangP #algorithm #effectiveness #performance
- A Fast and Effective Steganalytic Technique Against JSteg-like Algorithms (TZ, XP), pp. 307–311.
- ESEC-FSE-2003-JarzabekS #adaptation #composition #metaprogramming
- Eliminating redundancies with a “composition with adaptation” meta-programming technique (SJ, SL), pp. 237–246.
- ESEC-FSE-2003-SyD #consistency #generative #interprocedural #testing
- Consistency techniques for interprocedural test data generation (NTS, YD), pp. 108–117.
- ICSE-2003-SeyboldGMM #adaptation #effectiveness #layout #modelling #visual notation
- An Effective Layout Adaptation Technique for a Graphical Modeling Tool (CS, MG, SM, NMS), pp. 826–827.
- CGO-2003-GibertSG #clustering #distributed #memory management #scheduling
- Local Scheduling Techniques for Memory Coherence in a Clustered VLIW Processor with a Distributed Data Cache (EG, FJS, AG), pp. 193–203.
- CGO-2003-SmelyanskiyMDL #constraints #scheduling
- Predicate-Aware Scheduling: A Technique for Reducing Resource Constraints (MS, SAM, ESD, HHSL), pp. 169–178.
- HPCA-2003-JosephBM #performance
- Control Techniques to Eliminate Voltage Emergencies in High Performance Processors (RJ, DMB, MM), pp. 79–90.
- HPCA-2003-KimYDYD #architecture #performance
- Performance Enhancement Techniques for InfiniBand? Architecture (EJK, KHY, CRD, MSY, JD), pp. 253–262.
- FATES-2003-HahnleW #proving #testing #theorem proving #using
- Using a Software Testing Technique to Improve Theorem Proving (RH, AW), pp. 30–41.
- RTA-2003-BartheS #framework #induction #validation
- Validation of the JavaCard Platform with Implicit Induction Techniques (GB, SS), pp. 337–351.
- ASE-2002-LoerH #analysis #interactive #model checking #towards
- Towards Usable and Relevant Model Checking Techniques for the Analysis of Dependable Interactive Systems (KL, MDH), pp. 223–226.
- DAC-2002-AnisMEA #automation #clustering #performance #power management #reduction #using
- Dynamic and leakage power reduction in MTCMOS circuits using an automated efficient gate clustering technique (MA, MM, MIE, SA), pp. 480–485.
- DAC-2002-BartleyGB #comparison #pseudo #random testing #testing #verification
- A comparison of three verification techniques: directed testing, pseudo-random testing and property checking (MB, DG, TB), pp. 819–823.
- DAC-2002-CadambiMA #functional #hardware #performance #scalability #simulation
- A fast, inexpensive and scalable hardware acceleration technique for functional simulation (SC, CM, PA), pp. 570–575.
- DAC-2002-DaemsGS #modelling #performance
- An efficient optimization--based technique to generate posynomial performance models for analog integrated circuits (WD, GGEG, WMCS), pp. 431–436.
- DAC-2002-HrkicL #named #synthesis
- S-Tree: a technique for buffered routing tree synthesis (MH, JL), pp. 578–583.
- DAC-2002-JiangB #logic #simulation #specification #synthesis #using
- Software synthesis from synchronous specifications using logic simulation techniques (YJ, RKB), pp. 319–324.
- DAC-2002-KangSC #power management #synthesis
- An optimal voltage synthesis technique for a power-efficient satellite application (DIK, JS, SPC), pp. 492–497.
- DAC-2002-KurzwegLMKC #modelling #performance
- A fast optical propagation technique for modeling micro-optical systems (TPK, SPL, JAM, MK, DMC), pp. 236–241.
- DAC-2002-NohlBSLMH #architecture #flexibility #performance #simulation
- A universal technique for fast and flexible instruction-set architecture simulation (AN, GB, OS, RL, HM, AH), pp. 22–27.
- DAC-2002-SiegmundM #communication #declarative #hardware #novel #protocol #specification #synthesis
- A novel synthesis technique for communication controller hardware from declarative data communication protocol specifications (RS, DM), pp. 602–607.
- DAC-2002-ZengAA #identification #using
- False timing path identification using ATPG techniques and delay-based information (JZ, MSA, JAA), pp. 562–565.
- DATE-2002-AchterenDCL #reuse
- Data Reuse Exploration Techniques for Loop-Dominated Application (TVA, GD, FC, RL), pp. 428–435.
- DATE-2002-Al-ArsG #fault #in memory #memory management #modelling #testing
- Modeling Techniques and Tests for Partial Faults in Memory Devices (ZAA, AJvdG), pp. 89–93.
- DATE-2002-BecerZBPH #analysis #using
- Analysis of Noise Avoidance Techniques in DSM Interconnects Using a Complete Crosstalk Noise Model (MRB, VZ, DB, RP, INH), pp. 456–463.
- DATE-2002-BerrojoGCRSEL #injection
- New Techniques for Speeding-Up Fault-Injection Campaigns (LB, IG, FC, MSR, GS, LE, CL), pp. 847–852.
- DATE-2002-BlasquezHFLBHB #industrial #verification
- Formal Verification Techniques: Industrial Status and Perspectives (JB, MvH, AF, JLL, DB, CH, PB), p. 1050.
- DATE-2002-ChenS #scheduling #synthesis
- Power-Manageable Scheduling Technique for Control Dominated High-Level Synthesis (CC, MS), pp. 1016–1020.
- DATE-2002-HalambiSBDN #compilation #performance #reduction #using
- An Efficient Compiler Technique for Code Size Reduction Using Reduced Bit-Width ISAs (AH, AS, PB, NDD, AN), pp. 402–408.
- DATE-2002-Hieu #analysis #design #feedback #linear #optimisation
- Optimization Techniques for Design of General and Feedback Linear Analog Amplifier with Symbolic Analysis (TcH), p. 1104.
- DATE-2002-LuchettaMP #comparison #fault
- Critical Comparison among Some Analog Fault Diagnosis Procedures Based on Symbolic Techniques (AL, SM, MCP), p. 1105.
- DATE-2002-MartinezAQSK #encoding #implementation #power management
- An Encoding Technique for Low Power CMOS Implementations of Controllers (MM, MJA, JMQ, HS, MK), p. 1083.
- DATE-2002-PaskoVS #c++ #design
- Techniques to Evolve a C++ Based System Design Language (RP, SV, PS), pp. 302–309.
- SIGMOD-2002-LiGS
- Skew handling techniques in sort-merge join (WL, DG, RTS), pp. 169–180.
- SIGMOD-2002-ShashaB #database
- Database tuning: principles, experiments, and troubleshooting techniques (part II) (DS, PB), p. 637.
- SIGMOD-2002-ShashaB02a #database
- Database tuning: principles, experiments, and troubleshooting techniques (part I) (DS, PB), p. 637.
- VLDB-2002-ParkMC #query #recursion #xml
- Structural Function Inlining Technique for Structurally Recursive XML Queries (CWP, JKM, CWC), pp. 83–94.
- VLDB-2002-ShashaB #database
- Database Tuning: Principles, Experiments, and Troubleshooting Techniques (DS, PB).
- ITiCSE-2002-Clear #performance
- A diagnostic technique for addressing group performance in capstone projects (TC), p. 196.
- FASE-2002-BaresiGMP #design #metamodelling #tool support #web
- Meta-modeling Techniques Meet Web Application Design Tools (LB, FG, LM, PP), pp. 294–307.
- FoSSaCS-2002-Srba #commutative
- Note on the Tableau Technique for Commutative Transition Systems (JS), pp. 387–401.
- SCAM-J-2001-BartoliniP02 #embedded #program transformation
- A cache-aware program transformation technique suitable for embedded systems (SB, CAP), pp. 783–795.
- ICSM-2002-MalishevskyRE #modelling #testing #trade-off
- Modeling the Cost-Benefits Tradeoffs for Regression Testing Techniques (AGM, GR, SGE), pp. 204–213.
- ICSM-2002-OrsoRH #java
- A Technique for Dynamic Updating of Java Software (AO, AR, MJH), pp. 649–658.
- IWPC-2002-Hamou-LhadjL #analysis #execution #scalability
- Compression Techniques to Simplify the Analysis of Large Execution Traces (AHL, TCL), pp. 159–168.
- SCAM-2002-BischofBLRV #matlab #source code
- Combining Source Transformation and Operator Overloading Techniques to Compute Derivatives for MATLAB Programs (CHB, HMB, BL, AR, AV), pp. 65–72.
- STOC-2002-Charikar #algorithm #estimation #similarity
- Similarity estimation techniques from rounding algorithms (MC), pp. 380–388.
- ICALP-2002-Mannila #data mining #mining #problem
- Local and Global Methods in Data Mining: Basic Techniques and Open Problems (HM), pp. 57–68.
- FME-2002-Rusu #generative #testing #using #verification
- Verification Using Test Generation Techniques (VR), pp. 252–271.
- IFM-2002-HoenickeO #process #specification
- Combining Specification Techniques for Processes, Data and Time (JH, ERO), pp. 245–266.
- CHI-2002-HinckleyCBM #analysis
- Quantitative analysis of scrolling techniques (KH, EC, SB, TM), pp. 65–72.
- VISSOFT-2002-RillingSB #analysis #complexity #concept #source code #visualisation
- The CONCEPT Project — Applying Source Code Analysis to Reduce Information Complexity of Static and Dynamic Visualization Techniques (JR, AS, CB), p. 90.
- ICEIS-2002-SanchezSVACD #data mining #mining #using
- Using Data Mining Techniques to Analyze Correspondences between Partitions (DS, JMS, MAVM, VA, JC, GD), pp. 179–186.
- ICEIS-2002-Sierra-AlonsoCMP #development #information management #process #requirements #web
- Incorporating Knowledge Engineering Techniques to Requirements Capture in the MIDAS Web Applications Development Process (ASA, PC, EM, JEPM), pp. 782–787.
- ICEIS-2002-ViaeneBDVP #pattern matching #pattern recognition #proving #recognition #state of the art
- Proof Running Two State-Of-The-Art Pattern Recognition Techniques in the Field of Direct Marketing (SV, BB, GD, JV, DVdP), pp. 446–454.
- CIKM-2002-ChenGS #rank
- I/O-efficient techniques for computing pagerank (YYC, QG, TS), pp. 549–557.
- CIKM-2002-LiuH #classification #identification #music
- A singer identification technique for content-based classification of MP3 music objects (CCL, CSH), pp. 438–445.
- ICPR-v1-2002-SuriWGSL #comparison #image #state of the art
- A Comparison of State-of-the-Art Diffusion Imaging Techniques for Smoothing Medical/Non-Medical Image Data (JSS, DW, JG, SS, SL), p. 508–?.
- ICPR-v2-2002-AbabsaRMD #2d #3d #automation
- 2D/3D Automatic Matching Technique for 3D Recovering of Free Form Objects (FA, DR, MM, JYD), pp. 430–433.
- ICPR-v2-2002-Amin #learning #prototype #using
- Prototyping Structural Description Using Decision Tree Learning Techniques (AA), pp. 76–79.
- ICPR-v2-2002-CesarBB #graph #optimisation #probability #recognition #using
- Inexact Graph Matching Using Stochastic Optimization Techniques for Facial Feature Recognition (RMC, EB, IB), pp. 465–468.
- ICPR-v2-2002-FrantiVK #bound #clustering
- Branch-and-Bound Technique for Solving Optimal Clustering (PF, OV, TK), pp. 232–235.
- ICPR-v2-2002-HowellB #interactive #visual notation
- Active Vision Techniques for Visually Mediated Interaction (AJH, HB), pp. 296–299.
- ICPR-v2-2002-PolatYS #multi #using
- Multiple Complex Object Tracking Using A Combined Technique (EP, MY, RS), pp. 717–720.
- ICPR-v2-2002-RiviereMMTPF #graph #learning #markov #random #relational #using
- Relational Graph Labelling Using Learning Techniques and Markov Random Fields (DR, JFM, JMM, FT, DPO, VF), pp. 172–175.
- ICPR-v3-2002-BlosteinCZ #compilation #diagrams #recognition
- Applying Compiler Techniques to Diagram Recognition (DB, JRC, RZ), pp. 123–126.
- ICPR-v3-2002-BrakensiekKR #adaptation #normalisation #online #recognition
- Comparing Normalization and Adaptation Techniques for On-Line Handwriting Recognition (AB, AK, GR), pp. 73–76.
- ICPR-v3-2002-FengH #performance
- Confidence Guided Progressive Search and Fast Match Techniques for High Performance Chinese/English OCR (ZDF, QH), pp. 89–92.
- ICPR-v3-2002-VuoriL #automation #clustering #comparison
- A Comparison of Techniques for Automatic Clustering of Handwritten Characters (VV, JL), pp. 168–171.
- KDD-2002-ChungC #clustering #cvs #information retrieval #named
- CVS: a Correlation-Verification based Smoothing technique on information retrieval and term clustering (CYC, BC), pp. 469–474.
- KDD-2002-VlachosDGKK #classification #reduction #visualisation
- Non-linear dimensionality reduction techniques for classification and visualization (MV, CD, DG, GK, NK), pp. 645–651.
- SEKE-2002-AndaS #case study #modelling #towards
- Towards an inspection technique for use case models (BA, DIKS), pp. 127–134.
- SIGIR-2002-McNameeM #query
- Comparing cross-language query expansion techniques by degrading translation resources (PM, JM), pp. 159–166.
- ECOOP-2002-ArnoldR #effectiveness
- Thin Guards: A Simple and Effective Technique for Reducing the Penalty of Dynamic Class Loading (MA, BGR), pp. 498–524.
- RE-2002-FantechiGLM #analysis #case study
- Application of Linguistic Techniques for Use Case Analysis (AF, SG, GL, AM), pp. 157–164.
- RE-2002-Hardiman #named #requirements
- REDEST — 14 Best Practice SME Experiments with Innovative Requirements Gathering Techniques (SH), p. 191.
- RE-2002-LloydRA #distributed #effectiveness #elicitation #requirements
- Effectiveness of Elicitation Techniques in Distributed Requirements Engineering (WJL, MBR, JDA), pp. 311–318.
- ICSE-2002-DunsmoreRW #development #evaluation #object-oriented
- Further investigations into the development and evaluation of reading techniques for object-oriented code inspection (AD, MR, MW), pp. 47–57.
- ICSE-2002-HausmannHT #approach #case study #detection #functional #graph transformation #requirements #static analysis
- Detection of conflicting functional requirements in a use case-driven approach: a static analysis technique based on graph transformation (JHH, RH, GT), pp. 105–115.
- ICSE-2002-KimP #testing
- A history-based test prioritization technique for regression testing in resource constrained environments (JMK, AAP), pp. 119–129.
- CC-2002-AgrawalLS #graph
- Evaluating a Demand Driven Technique for Call Graph Construction (GA, JL, QS), pp. 29–45.
- HPCA-2002-SkadronAS #locality #modelling
- Control-Theoretic Techniques and Thermal-RC Modeling for Accurate and Localized Dynamic Thermal Management (KS, TFA, MRS), pp. 17–28.
- HPDC-2002-CoreyJV #adaptation #architecture #empirical #grid #parametricity
- Local Discovery of System Architecture — Application Parameter Sensitivity: An Empirical Technique for Adaptive Grid Applications (IC, JRJ, JSV), p. 399–?.
- HPDC-2002-WeigleF #automation #comparison #distributed
- A Comparison of TCP Automatic Tuning Techniques for Distributed Computing (EW, WcF), p. 265–?.
- LCTES-SCOPES-2002-HunlethC #aspect-oriented #programming #using
- Footprint and feature management using aspect-oriented programming techniques (FH, RC), pp. 38–45.
- CAV-2002-ClarkeGKS #abstraction #machine learning #satisfiability #using
- SAT Based Abstraction-Refinement Using ILP and Machine Learning Techniques (EMC, AG, JHK, OS), pp. 265–279.
- CSL-2002-Kanovich
- Bijections between Partitions by Two-Directional Rewriting Techniques (MIK), pp. 44–58.
- WICSA-2001-Ommering #deployment #independence
- Techniques for Independent Deployment to Build Product Populations (RCvO), p. 55–?.
- ASE-2001-BiemanGA #java
- A Technique for Mutation of Java Objects (JMB, SG, RTA), pp. 337–340.
- DAC-2001-ChangWM #logic #using
- Layout-Driven Hot-Carrier Degradation Minimization Using Logic Restructuring Techniques (CWJC, KW, MMS), pp. 97–102.
- DAC-2001-GuptaSKDGN #design #synthesis
- Speculation Techniques for High Level Synthesis of Control Intensive Designs (SG, NS, SK, NDD, RKG, AN), pp. 269–272.
- DAC-2001-KimCL #estimation #logic
- A Static Estimation Technique of Power Sensitivity in Logic Circuits (TK, KSC, CLL), pp. 215–219.
- DAC-2001-KimJSLK #optimisation #using
- Coupling Delay Optimization by Temporal Decorrelation using Dual Threshold Voltage Technique (KWK, SOJ, PS, CLL, SMK), pp. 732–737.
- DAC-2001-MeguerdichianKMPP #design #named #optimisation
- MetaCores: Design and Optimization Techniques (SM, FK, AM, DP, MP), pp. 585–590.
- DAC-2001-Qu #component #detection
- Publicly Detectable Techniques for the Protection of Virtual Components (GQ), pp. 474–479.
- DAC-2001-RaahemifarA #detection #fault
- Fault Characterizations and Design-for-Testability Technique for Detecting IDDQ Faults in CMOS/BiCMOS Circuits (KR, MA), pp. 313–316.
- DATE-2001-CheungWC #clustering #logic #using
- Further improve circuit partitioning using GBAW logic perturbation techniques (CCC, YLW, DIC), pp. 233–239.
- DATE-2001-GianiSHA #performance
- Efficient spectral techniques for sequential ATPG (AG, SS, MSH, VDA), pp. 204–208.
- DATE-2001-ShinKC #optimisation
- An operation rearrangement technique for power optimization in VLIM instruction fetch (DS, JK, NC), p. 809.
- DATE-2001-VareaA #embedded #modelling #petri net #specification
- Dual transitions petri net based modelling technique for embedded systems specification (MV, BMAH), pp. 566–571.
- DocEng-2001-Papamarkos #documentation #fuzzy
- A technique for fuzzy document binarization (NP), pp. 152–156.
- ICDAR-2001-BrakensiekKR #adaptation #online #recognition
- Comparing Adaptation Techniques for On-Line Handwriting Recognition (AB, AK, GR), pp. 486–490.
- ICDAR-2001-ElgammalI01a #documentation #hybrid #identification #image
- Techniques for Language Identification for Hybrid Arabic-English Document Images (AME, MAI), pp. 1100–1104.
- ICDAR-2001-GatosP #image #performance #segmentation #set
- Applying Fast Segmentation Techniques at a Binary Image Represented by a Set of Non-Overlapping Blocks (BG, NP), pp. 1147–1153.
- ICDAR-2001-KimSJL #clustering #segmentation #word
- Word Segmentation in Handwritten Korean Text Lines Based on Gap Clustering Techniques (SHK, CYS, SJ, GL), pp. 189–193.
- ICDAR-2001-SrihariCL #pattern matching #pattern recognition #recognition #using
- Establishing Handwriting Individuality Using Pattern Recognition Techniques (SNS, SHC, SL), p. 1195–?.
- VLDB-2001-BerckenS #evaluation
- An Evaluation of Generic Bulk Loading Techniques (JVdB, BS), pp. 461–470.
- VLDB-2001-BohmMSW #evaluation #performance #query #similarity
- Fast Evaluation Techniques for Complex Similarity Queries (KB, MM, HJS, RW), pp. 211–220.
- ITiCSE-2001-Xizhe #configuration management #evaluation
- Evaluation technique of software configuration management (JX), p. 186.
- TACAS-2001-Carvajal-SchiaffinoDC #bound #petri net #validation
- Combining Structural and Enumerative Techniques for the Validation of Bounded Petri Nets (RCS, GD, GC), pp. 435–449.
- TACAS-2001-TiwariRSS #generative #invariant
- A Technique for Invariant Generation (AT, HR, HS, NS), pp. 113–127.
- ICSM-2001-AtkinsonG #analysis #data flow #implementation #performance #scalability #source code
- Implementation Techniques for Efficient Data-Flow Analysis of Large Programs (DCA, WGG), pp. 52–61.
- ICSM-2001-DeanCSM #design #legacy #using
- Using Design Recovery Techniques to Transform Legacy Systems (TRD, JRC, KAS, AJM), pp. 622–631.
- IWPC-2001-FoxDHH #comprehension
- Backward Conditioning: A New Program Specialisation Technique and Its Application to Program Comprehension (CF, SD, MH, RMH), pp. 89–97.
- SCAM-2001-BartoliniP #embedded #performance
- An Object Level Transformation Technique to Improve the Performance of Embedded Applications (SB, CAP), pp. 26–34.
- SAS-2001-MesnardN #logic programming #source code #static analysis #termination
- Applying Static Analysis Techniques for Inferring Termination Conditions of Logic Programs (FM, UN), pp. 93–110.
- CIAA-2001-KatritzkeMT #automaton #clustering #finite #image #using
- Enhancements of Partitioning Techniques for Image Compression Using Weighted Finite Automata (FK, WM, MT), pp. 177–189.
- ICALP-2001-FeigeL #source code
- The RPR2 Rounding Technique for Semidefinite Programs (UF, ML), pp. 213–224.
- FME-2001-LaurentMW #simulation #using #verification
- Using Formal Verification Techniques to Reduce Simulation and Test Effort (OL, PM, VW), pp. 465–477.
- ICFP-2001-Hinze #implementation
- A Simple Implementation Technique for Priority Search Queues (RH), pp. 110–121.
- CHI-2001-Muller #analysis
- Layered participatory analysis: new developments in the CARD technique (MJM), pp. 90–97.
- CAiSE-2001-BielkowiczT #comparison #evaluation #process #specification
- A Comparison and Evaluation of Data Requirement Specification Techniques in SSADM and the Unified Process (PB, TTT), pp. 46–59.
- CAiSE-2001-WieringaJ #design #tool support
- Techniques for Reactive System Design: The Tools in TRADE (RW, DNJ), pp. 93–107.
- ICEIS-v1-2001-DiazTO #machine learning #using
- A Knowledge-Acquisition Methodology for a Blast Furnace Expert System Using Machine Learning Techniques (ED, JT, FO), pp. 336–339.
- ICEIS-v1-2001-RossiterNH #modelling #semistructured data
- A Universal Technique for Relating Heterogeneous Data Models (BNR, DAN, MAH), pp. 96–103.
- CIKM-2001-TsikrikaL #data fusion #web
- Merging Techniques for Performing Data Fusion on the Web (TT, ML), pp. 127–134.
- ICML-2001-PapagelisK #using
- Breeding Decision Trees Using Evolutionary Techniques (AP, DK), pp. 393–400.
- ICML-2001-Thollard #algorithm #grammar inference #probability
- Improving Probabilistic Grammatical Inference Core Algorithms with Post-processing Techniques (FT), pp. 561–568.
- KDD-2001-HueglinV #data mining #mining
- Data mining techniques to improve forecast accuracy in airline business (CH, FV), pp. 438–442.
- SEKE-2001-BastarrioaCDS #component #deployment #optimisation
- Two Optimization Techniques for Component-Based Systems Deployment (MCB, REC, SAD, AAS), pp. 153–162.
- SEKE-2001-FillottraniEK #logic programming #modelling #object-oriented #uml
- Applying Logic Programming Techniques to Object-Oriented Modeling in UML (PRF, EE, SK), pp. 228–235.
- SEKE-2001-Perez-MartinezS #case study #information management #requirements
- Application of Knowledge Acquisition Techniques to Requirements Capture: A Case Study (JEPM, ASA), pp. 53–60.
- SEKE-2001-Vegas #question #testing #what
- What Information is Relevant when Selecting Testing Techniques? (SV), pp. 45–52.
- SIGIR-2001-Lam-AdesinaJ #feedback #summary
- Applying Summarization Techniques for Term Selection in Relevance Feedback (AMLA, GJFJ), pp. 1–9.
- TOOLS-USA-2001-GanesanS #component #design #named
- O2BC: A Technique for the Design of Component-Based Applications (RG, SS), pp. 46–55.
- LOPSTR-2001-PotikasRG #datalog #nondeterminism #source code
- A Transformation Technique for Datalog Programs Based on Non-deterministic Constructs (PP, PR, MG), pp. 25–45.
- PADL-2001-GuptaT #generative #logic programming #web
- Logic Programming Techniques for Dynamic VRML Web Content Generation (AG, PT), pp. 93–107.
- POPL-2001-Kandemir #compilation #locality
- A compiler technique for improving whole-program locality (MTK), pp. 179–192.
- SAC-2001-LarocheBS #composition #markov #process
- A new decomposition technique for solving Markov decision processes (PL, YB, RS), pp. 12–16.
- SAC-2001-VasilakosAP #network
- Application of computational intelligence techniques in active networks (AVV, KGA, WP), pp. 448–455.
- ICSE-2001-ButlerBCE #generative #product line
- Generative Techniques for Product Lines (GB, DSB, KC, UWE), pp. 760–761.
- ICSE-2001-ShullRB #using
- Improving Software Inspections by Using Reading Techniques (FS, IR, VRB), pp. 726–727.
- CC-2001-KandemirU #array #locality #optimisation #unification
- Array Unification: A Locality Optimization Technique (MTK), pp. 259–273.
- HPDC-2001-DramlitschAS #distributed #performance
- Efficient Techniques for Distributed Computing (TD, GA, ES), pp. 435–436.
- LCTES-OM-2001-KangCS #design #distributed #power management #realtime #synthesis
- Power-Aware Design Synthesis Techniques for Distributed Real-Time Systems (DIK, SPC, JS), pp. 20–28.
- LCTES-OM-2001-KimH #embedded #hybrid #power management #realtime #runtime #scalability
- Hybrid Run-time Power Management Technique for Real-time Embedded System with Voltage Scalable Processor (MK, SH), pp. 11–19.
- IJCAR-2001-GiunchigliaMTZ #heuristic #optimisation #satisfiability
- Evaluating Search Heuristics and Optimization Techniques in Propositional Satisfiability (EG, MM, AT, DZ), pp. 347–363.
- IJCAR-2001-Middeldorp #approximate #automaton #dependence #graph #using
- Approximating Dependency Graphs Using Tree Automata Techniques (AM), pp. 593–610.
- IJCAR-2001-NieuwenhuisHRV #evaluation #on the #proving #theorem proving
- On the Evaluation of Indexing Techniques for Theorem Proving (RN, TH, AR, AV), pp. 257–271.
- ASE-2000-Monroy #abduction #recursion
- The Use of Abduction and Recursion-Editor Techniques for the Correction of Faulty Conjectures (RM), pp. 91–100.
- DAC-2000-HuangC #composition #constraints
- Assertion checking by combined word-level ATPG and modular arithmetic constraint-solving techniques (CYH, KTC), pp. 118–123.
- DAC-2000-KirovskiLWP #forensics #tool support
- Forensic engineering techniques for VLSI CAD tools (DK, DTL, JLW, MP), pp. 581–586.
- DAC-2000-UmKL #fine-grained #optimisation #power management #synthesis
- A fine-grained arithmetic optimization technique for high-performance/low-power data path synthesis (JU, TK, CLL), pp. 98–103.
- DATE-2000-AnghelN #detection #evaluation #fault #reduction
- Cost Reduction and Evaluation of a Temporary Faults Detecting Technique (LA, MN), pp. 591–598.
- DATE-2000-GanesanV00a #clustering #configuration management #design #latency
- An Integrated Temporal Partitioning and Partial Reconfiguration Technique for Design Latency Improvement (SG, RV), pp. 320–325.
- DATE-2000-HiroseY #reduction
- A Bus Delay Reduction Technique Considering Crosstalk (KH, HY), pp. 441–445.
- DATE-2000-IshiharaY #embedded #reduction
- A Power Reduction Technique with Object Code Merging for Application Specific Embedded Processors (TI, HY), pp. 617–623.
- DATE-2000-KimLS #embedded #optimisation
- Free MDD-Based Software Optimization Techniques for Embedded Systems (CK, LL, ALSV), pp. 14–18.
- DATE-2000-LajoloRDL #design #performance
- Efficient Power Co-Estimation Techniques for System-on-Chip Design (ML, AR, SD, LL), pp. 27–34.
- DATE-2000-LyseckyVG #latency
- Techniques for Reducing Read Latency of Core Bus Wrappers (RLL, FV, TG), pp. 84–91.
- DATE-2000-ManquinhoS #algorithm #on the #satisfiability #using
- On Using Satisfiability-Based Pruning Techniques in Covering Algorithms (VMM, JPMS), pp. 356–363.
- SIGMOD-2000-ChangBCLLS #linear #optimisation #query
- The Onion Technique: Indexing for Linear Optimization Queries (YCC, LDB, VC, CSL, MLL, JRS), pp. 391–402.
- SIGMOD-2000-OhHP #database #effectiveness #performance #scalability #video
- Efficient and Cost-effective Techniques for Browsing and Indexing Large Video Databases (JHO, KAH), pp. 415–426.
- VLDB-2000-ChristopheBPV #database #named #scalability
- PicoDMBS: Scaling Down Database Techniques for the Smartcard (CB, LB, PP, PV), pp. 11–20.
- TACAS-2000-BodeveixF #infinity #named #validation
- FMona: A Tool for Expressing Validation Techniques over Infinite State Systems (JPB, MF), pp. 204–219.
- WCRE-J-1997-GirardK00 #comparison #data type
- A comparison of abstract data types and objects recovery techniques (JFG, RK), pp. 149–181.
- CSMR-2000-SartipiKM #architecture #data mining #design #mining #using
- Architectural Design Recovery using Data Mining Techniques (KS, KK, FM), pp. 129–140.
- ICSM-2000-WuPC #component #evolution #maintenance
- Techniques of Maintaining Evolving Component-based Software (YW, DP, MHC), pp. 236–246.
- IWPC-2000-KoschkeE #clustering #evaluation #framework
- A Framework for Experimental Evaluation of Clustering Techniques (RK, TE), pp. 201–210.
- IWPC-2000-RifkinD #case study #comprehension
- Program Comprehension Techniques Improve Software Inspections: A Case Study (SR, LED), pp. 131–138.
- CHI-2000-PoupyrevWF #3d
- Non-isomorphic 3D rotational techniques (IP, SW, SF), pp. 540–547.
- ICEIS-2000-HeathC #communication #mobile #multi
- Application of a Virtual Connection Tree over Multiple Access Techniques for 3G Mobile Communication Systems (AH, RAC), pp. 531–532.
- ICEIS-2000-OommenR #comparison #empirical #optimisation #query
- An Empirical Comparison of Histogram-Like Techniques for Query Optimization (BJO, LR), pp. 71–78.
- CIKM-2000-KimL #clustering #documentation #information management
- A Semi-Supervised Document Clustering Technique for Information Organization (HjK, SgL), pp. 30–37.
- ICML-2000-CampbellTB #network #polynomial #reduction
- Dimension Reduction Techniques for Training Polynomial Networks (WMC, KT, SVB), pp. 119–126.
- ICML-2000-LaneB #interface #learning #reduction
- Data Reduction Techniques for Instance-Based Learning from Human/Computer Interface Data (TL, CEB), pp. 519–526.
- ICPR-v1-2000-BaillardHB #3d #segmentation #set
- Cooperation between Level Set Techniques and Dense 3D Registration for the Segmentation of Brain Structures (CB, PH, CB), pp. 1991–1994.
- ICPR-v1-2000-ChabbiP #image
- A Generic Relaxation Technique for Hierarchic Stereo Chain Matching of Uncalibrated Images (HC, SP), pp. 1746–1749.
- ICPR-v1-2000-StevensB #comparison #image #refinement
- Image Comparison Techniques in the Context of Scene Refinement (MRS, JRB), pp. 1685–1688.
- ICPR-v2-2000-BollePR #authentication #evaluation
- Evaluation Techniques for Biometrics-Based Authentication Systems (FRR) (RMB, SP, NKR), pp. 2831–2837.
- ICPR-v2-2000-HuangHS #automation #recognition
- A New Automatic Quasar Recognition Technique Based on PCA and the Hough Transform (LyH, ZH, FS), pp. 2499–2502.
- ICPR-v2-2000-JuanV #classification #edit distance #normalisation #on the #performance #string
- On the Use of Normalized Edit Distances and an Efficient k-NN Search Technique (k-AESA) for Fast and Accurate String Classification (AJ, EV), pp. 2676–2679.
- ICPR-v2-2000-Scheunders #image #multi #using
- Multispectral Image Fusion Using Local Mapping Techniques (PS), pp. 2311–2314.
- ICPR-v3-2000-GreenbergAKD #image #using
- Fingerprint Image Enhancement Using Filtering Techniques (SG, MA, DK, ID), pp. 3326–3329.
- ICPR-v3-2000-Manduchi #clustering #segmentation
- A Cluster Grouping Technique for Texture Segmentation (RM), pp. 7072–7075.
- ICPR-v3-2000-Papamarkos #network #reduction #using
- Using Local Features in a Neural Network Based Gray-Level Reduction Technique (NP), pp. 7037–7040.
- ICPR-v3-2000-TomazevicLP #comparison
- A Comparison of Retrospective Shading Correction Techniques (DT, BL, FP), pp. 3568–3571.
- ICPR-v3-2000-WerthS #bidirectional #correlation #framework #novel #refinement
- A Novel Bidirectional Framework for Control and Refinement of Area Based Correlation Techniques (PW, SS), pp. 3738–3741.
- ICPR-v4-2000-BrakensiekWR #documentation #hybrid #modelling #n-gram #recognition
- Improved Degraded Document Recognition with Hybrid Modeling Techniques and Character N-Grams (AB, DW, GR), pp. 4438–4441.
- ICPR-v4-2000-ChetverikovNV #comparison
- Comparison of Tracking Techniques Applied to Digital PIV (DC, MN, JV), pp. 4619–4622.
- ICPR-v4-2000-DoermannM #evaluation #performance #tool support #video
- Tools and Techniques for Video Performance Evaluation (DSD, DM), pp. 4167–4170.
- ICPR-v4-2000-Hata #visual notation
- Practical Visual Inspection Techniques — Optics, Micro-Electronics and Advanced Software Technology (SH), pp. 4114–4117.
- ICPR-v4-2000-ShihWL
- A Calibration-Free Gaze Tracking Technique (SWS, YTW, JL), pp. 4201–4204.
- KDD-2000-DhondGV #data mining #mining #optimisation
- Data mining techniques for optimizing inventories for electronic commerce (AD, AG, SV), pp. 480–486.
- KDD-2000-TalbertF #analysis #empirical
- An empirical analysis of techniques for constructing and searching k-dimensional trees (DAT, DHF), pp. 26–33.
- ECOOP-2000-EckelG #empirical #optimisation
- Empirical Study of Object-Layout Strategies and Optimization Techniques (NE, JYG), pp. 394–421.
- OOPSLA-2000-IshizakiKYKN #case study #compilation #java
- A study of devirtualization techniques for a JavaTM Just-In-Time compiler (KI, MK, TY, HK, TN), pp. 294–310.
- TOOLS-EUROPE-2000-Meyer00a #functional #programming
- Programming with Agents: Combining O-O and Functional Techniques (BM), p. 460.
- TOOLS-USA-2000-Anton #agile #development #effectiveness #object-oriented
- Effective Strategies and Techniques for Rapid Object-Oriented Application Development (MA), pp. 407–408.
- TOOLS-USA-2000-Potter
- Object Structuring Techniques (JP), pp. 443–444.
- LOPSTR-J-2000-ColvinHS #composition #logic programming #refinement
- A Technique for Modular Logic Program Refinement (RC, IJH, PAS), pp. 38–56.
- PPDP-2000-BagnaraZH #analysis #evaluation
- Enhanced sharing analysis techniques: a comprehensive evaluation (RB, EZ, PMH), pp. 103–114.
- ICRE-2000-Saeki #aspect-oriented #case study #reuse
- Patterns and Aspects for Use Cases: Reuse Techniques for Use Case Descriptions (MS), p. 62.
- SAC-2000-Caraca-ValenteLM #modelling
- Functions, Rules and Models: Three Complementary Techniques for Analyzing Strength Data (JPCV, ILC, CM), pp. 60–64.
- ICSE-2000-BasiliLSR #tutorial #using
- Improving software inspections by using reading techniques (tutorial session) (VRB, OL, FS, IR), p. 836.
- ICSE-2000-BriandLW #assessment #comparison #cost analysis #modelling
- A replicated assessment and comparison of common software cost modeling techniques (LCB, TL, IW), pp. 377–386.
- ICSE-2000-DangK #approximate #infinity #model checking #realtime
- Three approximation techniques for ASTRAL symbolic model checking of infinite state real-time systems (ZD, RAK), pp. 345–354.
- ICSE-2000-KeidarKLS #incremental #proving #simulation
- An inheritance-based technique for building simulation proofs incrementally (IK, RK, NAL, AAS), pp. 478–487.
- CC-2000-UhWWJBC #effectiveness
- Techniques for Effectively Exploiting a Zero Overhead Loop Buffer (GRU, YW, DBW, SJ, CB, VC), pp. 157–172.
- CC-2000-YuR #parallel #runtime
- Techniques for Reducing the Overhead of Run-Time Parallelization (HY, LR), pp. 232–248.
- HPCA-2000-KarlssonDS #data type #linked data #open data
- A Prefetching Technique for Irregular Accesses to Linked Data Structures (MK, FD, PS), pp. 206–217.
- HPCA-2000-NeefsVB #latency #multi
- A Technique for High Bandwidth and Deterministic Low Latency Load/Store Accesses to Multiple Cache Banks (HN, HV, KDB), pp. 313–324.
- HPDC-2000-KurmannMRS #communication #performance
- Speculative Defragmentation — A Technique to Improve the Communication Software Efficiency for Gigabit Ethernet (CK, MM, FR, TS), pp. 131–138.
- CADE-2000-AudemardBH #finite
- Two Techniques to Improve Finite Model Search (GA, BB, LH), pp. 302–308.
- CAV-2000-AnnichiniAB #parametricity #reasoning
- Symbolic Techniques for Parametric Reasoning about Counter and Clock Systems (AA, EA, AB), pp. 419–434.
- RTA-2000-ContejeanCM #physics
- Rewriting Techniques in Theoretical Physics (EC, AC, BM), pp. 80–94.
- TestCom-2000-AmyotL
- Structural Coverage For LOTOS — a Probe Insertion Technique (DA, LL), pp. 19–34.
- TestCom-2000-RyuKKS #design #generative #testing #using
- Interoperability Test Suite Generation for the TCP Data Part Using Experimental Design Techniques (JR, MK, SK, SS), pp. 127–142.
- ASE-1999-BesseCL #automation #generative #protocol #testing
- An Automatic and Optimized Test Generation Technique Applying to TCP/IP Protocol (CB, ARC, DL), pp. 73–80.
- ASE-1999-MiceliSG #design #detection #metric
- A Metric Based Technique for Design Flaws Detection and Correction (TM, HAS, RG), pp. 307–310.
- ASE-1999-Pecheur #clustering #file system #modelling #verification
- Advanced Modelling and Verification Techniques Applied to a Cluster File System (CP), pp. 119–126.
- DAC-1999-CaldwellCKMPQW #design #effectiveness
- Effective Iterative Techniques for Fingerprinting Design IP (AEC, HJC, ABK, SM, MP, GQ, JLW), pp. 843–848.
- DAC-1999-GunupudiN #using
- Model-Reduction of Nonlinear Circuits Using Krylov-Space Techniques (PKG, MSN), pp. 13–16.
- DAC-1999-HashimotoOT #design #power management #reduction
- A Practical Gate Resizing Technique Considering Glitch Reduction for Low Power Design (MH, HO, KT), pp. 446–451.
- DAC-1999-HongP #behaviour #synthesis
- Behavioral Synthesis Techniques for Intellectual Property Protection (IH, MP), pp. 849–854.
- DAC-1999-LakshminarayanaRKJD #optimisation #performance
- Common-Case Computation: A High-Level Technique for Power and Performance Optimization (GL, AR, KSK, NKJ, SD), pp. 56–61.
- DAC-1999-MukherjeeSML #layout #novel #synthesis
- Wave Steering in YADDs: A Novel Non-Iterative Synthesis and Layout Technique (AM, RS, MMS, SIL), pp. 466–471.
- DAC-1999-Oliveira #design #robust
- Robust Techniques for Watermarking Sequential Circuit Designs (ALO), pp. 837–842.
- DAC-1999-QuWP #problem
- Optimization-Intensive Watermarking Techniques for Decision Problems (GQ, JLW, MP), pp. 33–36.
- DAC-1999-SantosJ #order #performance
- A Reordering Technique for Efficient Code Motion (LCVdS, JAGJ), pp. 296–299.
- DAC-1999-YehKSW #design #layout
- Layout Techniques Supporting the Use of Dual Supply Voltages for Cell-based Designs (CWY, YSK, SJS, JSW), pp. 62–67.
- DATE-1999-CostaSC #modelling #performance
- Efficient Techniques for Accurate Extraction and Modeling of Substrate Coupling in Mixed-Signal IC’s (JPC, LMS, MC), pp. 396–400.
- DATE-1999-DabrowskiP #case study #experience #modelling
- Experiences with Modeling of Analog and Mixed A/D Systems Based on PWL Technique (JD, AP), pp. 790–791.
- DATE-1999-FeldmanKL #modelling #performance
- Efficient Techniques for Modeling Chip-Level Interconnect, Substrate and Package Parasitics (PF, SK, DEL), pp. 418–417.
- DATE-1999-MaurerS #performance #simulation
- Software Bit-Slicing: A Technique for Improving Simulation Performance (PMM, WJS), pp. 786–787.
- DATE-1999-MillanEECC #logic #optimisation
- Integrating Symbolic Techniques in ATPG-Based Sequential Logic Optimization (ESM, LE, JAE, SC, FC), pp. 516–520.
- DATE-1999-StrehlT #diagrams #model checking #petri net
- Interval Diagram Techniques for Symbolic Model Checking of Petri Nets (KS, LT), pp. 756–757.
- ICDAR-1999-BrakensiekKWWR #evaluation #hybrid #modelling #online #performance #recognition #using
- Performance Evaluation of a New Hybrid Modeling Technique for Handwriting Recognition using On-Line and Off-Line Data (AB, AK, DW, WW, GR), pp. 446–449.
- ICDAR-1999-FukudaSTXS #analysis
- A Technique of Mathematical Expression Structure Analysis for the Handwriting Input System (RF, IS, FT, MX, MS), pp. 131–134.
- ICDAR-1999-LehalD #detection #documentation
- A Range Free Skew Detection Technique for Digitized Gurmukhi Script Documents (GSL, RD), pp. 147–152.
- ICDAR-1999-MaY #documentation #estimation #image
- An Enhanced Skew Angle Estimation Technique for Binary Document Images (HM, ZY), pp. 165–168.
- SIGMOD-1999-MankuRL #dataset #online #order #performance #random #scalability #statistics
- Random Sampling Techniques for Space Efficient Online Computation of Order Statistics of Large Datasets (GSM, SR, BGL), pp. 251–262.
- SIGMOD-1999-MaratheS #array #query
- Query Processing Techniques for Arrays (APM, KS), pp. 323–334.
- VLDB-1999-ChengGKLLQS #database #implementation #optimisation #query #semantics
- Implementation of Two Semantic Query Optimization Techniques in DB2 Universal Database (QC, JG, FK, TYCL, LL, XQ, KBS), pp. 687–698.
- TACAS-1999-BuchholzK #analysis #composition #distributed #tool support
- Modular State Level Analysis of Distributed Systems Techniques and Tool Support (PB, PK), pp. 420–434.
- TACAS-1999-Hirschkoff #bisimulation #on the #using #verification
- On the Benefits of Using the Up-To Techniques for Bisimulation Verification (DH), pp. 285–299.
- TACAS-1999-MarchignoliM #analysis #automation #composition #encryption #protocol #verification
- Automatic Verification of Cryptographic Protocols through Compositional Analysis Techniques (DM, FM), pp. 148–162.
- CSMR-1999-GranjaJ #testing
- Techniques for Regression Testing: Selecting Test Case Sets Tailored to Possibly Modified Functionalities (IG, MJ), pp. 2–13.
- IWPC-1999-PatenaudeMDL #assessment #java #quality
- Extending Software Quality Assessment Techniques to Java Systems (JFP, EM, MD, BL), pp. 49–56.
- PASTE-1999-LiangH #analysis #data flow #equivalence #performance #pointer
- Equivalence Analysis: A General Technique to Improve the Efficiency of Data-flow Analyses in the Presence of Pointers (DL, MJH), pp. 39–46.
- PASTE-1999-NaumovichCC #analysis #data flow #partial order #performance #using #verification
- Using Partial Order Techniques to Improve Performance of Data Flow Analysis Based Verification (GN, LAC, JMC), pp. 57–65.
- WCRE-1999-GannodC #design #framework #reverse engineering
- A Framework for Classifying and Comparing Software Reverse Engineering and Design Recovery Techniques (GCG, BHCC), pp. 77–88.
- PLDI-1999-SongL #locality
- New Tiling Techniques to Improve Cache Temporal Locality (YS, ZL), pp. 215–228.
- SAS-1999-Soffa #analysis #data flow #named #precise #scalability #tutorial
- Tutorial: Techniques to Improve the Scalability and Precision of Data Flow Analysis (MLS), pp. 355–356.
- FLOPS-1999-Kuhnemann #comparison #deforestation #functional #source code #transducer
- Comparison of Deforestation Techniques for Functional Programs and for Tree Transducers (AK), pp. 114–130.
- ICALP-1999-ComptonD #encryption #protocol #proving
- Proof Techniques for Cryptographic Protocols (KJC, SD), pp. 25–39.
- ICALP-1999-GrossiI #data type #linked data #maintenance #multi #open data #performance
- Efficient Techniques for Maintaining Multidimensional Keys in Linked Data Structures (RG, GFI), pp. 372–381.
- ICALP-1999-KirstenM #problem
- Two Techniques in the Area of the Star Problem (DK, JM), pp. 483–492.
- FM-v2-1999-KnightFH #tool support
- Tool Support for Production Use of Formal Techniques (JCK, PTF, BRH), p. 1854.
- FM-v2-1999-LeavensB #specification
- Enhancing the Pre- and Postcondition Technique for More Expressive Specifications (GTL, ALB), pp. 1087–1106.
- FM-v2-1999-Nakajima #algebra #development #framework #object-oriented #specification #using
- Using Algebraic Specification Techniques in Development of Object-Oriented Frameworks (SN), pp. 1664–1683.
- FM-v2-1999-RandimbivololonaSBPRS #approach #proving
- Applying Formal Proof Techniques to Avionics Software: A Pragmatic Approach (FR, JS, PB, AP, JR, DS), pp. 1798–1815.
- FM-v2-1999-SchatzH
- Integrating Formal Description Techniques (BS, FH), pp. 1206–1225.
- IFM-1999-Deiss #approach
- An Approach to the Combination of Formal Description Techniques: Statecharts and TLA (TD), pp. 231–250.
- ICFP-1999-Crary #parametricity #proving
- A Simple Proof Technique for Certain Parametricity Results (KC), pp. 82–89.
- ICFP-1999-ZdancewicGM #programming language #proving
- Principals in Programming Languages: A Syntactic Proof Technique (SZ, DG, JGM), pp. 197–207.
- CHI-1999-SalzmanDL #multi #visualisation
- VR’s Frames of Reference: A Visualization Technique for Mastering Abstract Multidimensional Information (MCS, CJD, RBL), pp. 489–495.
- HCI-CCAD-1999-OshibaT #3d #modelling
- Three-dimensional modeling environment “claymore” based on augmented direct manipulation technique (TO, JT), pp. 1075–1079.
- HCI-CCAD-1999-YuCK #approximate #multi #using
- Dynamic event filtering technique using multi-level path approximation in a shared virtual environment (SJY, YCC, KK), pp. 583–587.
- HCI-EI-1999-HertzumJ
- The Evaluator Effect during First-Time Use of the Cognitive Walkthrough Technique (MH, NEJ), pp. 1063–1067.
- HCI-EI-1999-SakaiN #automation #documentation #image #mobile
- OCR-Oriented Automatic Document Orientation Correcting Technique for Mobile Image Scanners (KS, TN), pp. 223–227.
- HCI-EI-1999-Schreiber-Ehle #adaptation #component #user interface
- Adaptable GUIs Based on the Componentware Technique (SSE), pp. 636–640.
- CAiSE-1999-RalyteRP
- Method Enhancement with Scenario Based Techniques (JR, CR, VP), pp. 103–118.
- CAiSE-1999-SadiqO #graph #identification #modelling #process #reduction
- Applying Graph Reduction Techniques for Identifying Structural Conflicts in Process Models (WS, MEO), pp. 195–209.
- ICEIS-1999-FerreiraMS #interactive #visualisation
- Supporting Decisions Concerning Location-Routing of Obnoxious Facilities: An Application Example of Visualization and Interaction Techniques (CF, ABdM, BSS), pp. 74–81.
- CIKM-1999-GhandeharizadehK #comparison #multi
- A Comparison of Alternative Continuous Display Techniques with Heterogeneous Multi-Zone Disks (SG, SHK), pp. 442–449.
- CIKM-1999-HuLL #clustering #scheduling
- Indexing Techniques for Wireless Data Broadcast Under Data Clustering and Scheduling (QH, WCL, DLL), pp. 351–358.
- CIKM-1999-Scoggins
- A Practitioners’ View of Techniques Used in Data Warehousing for Sifting Through Data to Provide Information (JTS), pp. 3–4.
- ICML-1999-ZhengWT #lazy evaluation #learning #naive bayes
- Lazy Bayesian Rules: A Lazy Semi-Naive Bayesian Learning Technique Competitive to Boosting Decision Trees (ZZ, GIW, KMT), pp. 493–502.
- KDD-1999-Cerquides #induction
- Applying General Bayesian Techniques to Improve TAN Induction (JC), pp. 292–296.
- KDD-1999-ManiDBD #data mining #mining #modelling #statistics
- Statistics and Data Mining Techniques for Lifetime Value Modeling (DRM, JD, AB, PD), pp. 94–103.
- KDD-T-1999-KeimH #clustering #scalability #set
- Clustering Techniques for Large Data Sets — from the Past to the Future (DAK, AH), pp. 141–181.
- MLDM-1999-AltamuraELM #documentation #learning
- Symbolic Learning Techniques in Paper Document Processing (OA, FE, FAL, DM), pp. 159–173.
- OOPSLA-1999-TravassosSFB #design #detection #fault #object-oriented #quality #using
- Detecting Defects in Object-Oriented Designs: Using Reading Techniques to Increase Software Quality (GT, FS, MF, VRB), pp. 47–56.
- TOOLS-ASIA-1999-LiXXZ
- Strategies and Techniques of Freeze/Melt (YL, YX, GX, ZZ), pp. 98–107.
- TOOLS-ASIA-1999-Zhou #analysis #assessment #object-oriented #using
- Risk Analysis and Assessment Using Object-Oriented Techniques (BZ), pp. 142–145.
- TOOLS-EUROPE-1999-Edwards #java #programming #using #visual notation
- Visual Programming: Tips and Techniques 3/4 Using VisualAge for Java (SE), p. 413.
- TOOLS-EUROPE-1999-Taentzer #modelling #object-oriented #visual notation
- Adding Visual Rules to Object-Oriented Modeling Techniques (GT), pp. 275–284.
- TOOLS-PACIFIC-1999-FavreC #algebra #specification #uml
- Integrating UML and Algebraic Specification Techniques (LF, SC), pp. 151–162.
- TOOLS-USA-1999-AlexanderO #analysis #polymorphism #testing
- Analysis Techniques for Testing Polymorphic Relationships (RTA, AJO), p. 104–?.
- TOOLS-USA-1999-Anton #agile #development #effectiveness #object-oriented
- Effective Strategies and Techniques for Rapid Object-Oriented Application Development (MPA), pp. 505–517.
- TOOLS-USA-1999-Parnas99a
- Systematic Techniques for Inspecting Critical Software (DLP), p. 410.
- TOOLS-USA-1999-PeriyasamyAM #object-oriented #validation #verification
- Verification and Validation Techniques of Object-Oriented Software Systems (KP, VSA, DM), p. 413–?.
- SAC-1999-SonahI #adaptation #evaluation #performance
- Performance Evaluation of New Adaptive Object Replacement Techniques for VOD Systems (BS, MRI), pp. 437–442.
- SAC-1999-Taylor #finite #induction #pattern matching #using
- Exon/Intron Discrimination Using the Finite Induction Pattern Matching Technique (PAT), pp. 41–45.
- ICSE-1999-BriandESWM #assessment #comparison #estimation #modelling
- An Assessment and Comparison of Common Software Cost Estimation Modeling Techniques (LCB, KEE, DS, IW, KM), pp. 313–322.
- ICSE-1999-Leinbach #agile #internet #using
- Successfully Deliver Internet Applications Using Rapid Software Techniques (CL), pp. 624–625.
- CC-1999-RubinBR #data type #recursion
- Virtual Cache Line: A New Technique to Improve Cache Exploitation for Recursive Data Structures (SR, DB, MR), pp. 259–273.
- HPDC-1999-KangGGH #automation #design #distributed #realtime
- Techniques for Automating Distributed Real-Time Applications Design (DIK, RG, LG, JKH), pp. 156–163.
- CSL-1999-ArtsG #erlang #process #verification
- Applying Rewriting Techniques to the Verification of Erlang Processes (TA, JG), pp. 96–110.
- LICS-1999-BorealeNP #encryption #process #proving
- Proof Techniques for Cryptographic Processes (MB, RDN, RP), pp. 157–166.
- ASE-1998-MaoSL #case study #machine learning #reuse #using #verification
- Reusability Hypothesis Verification using Machine Learning Techniques: A Case Study (YM, HAS, HL), pp. 84–93.
- DAC-1998-ChenOIB #analysis #architecture #validation
- Validation of an Architectural Level Power Analysis Technique (RYC, RMO, MJI, RSB), pp. 242–245.
- DAC-1998-ChenR #megamodelling
- A Power Macromodeling Technique Based on Power Sensitivity (ZC, KR), pp. 678–683.
- DAC-1998-El-MalehKR #learning #performance
- A Fast Sequential Learning Technique for Real Circuits with Application to Enhancing ATPG Performance (AHEM, MK, JR), pp. 625–631.
- DAC-1998-GhoshDJ #low cost #performance #testing
- A Fast and Low Cost Testing Technique for Core-Based System-on-Chip (IG, SD, NKJ), pp. 542–547.
- DAC-1998-KahngLMMMPTWW
- Watermarking Techniques for Intellectual Property Protection (ABK, JL, WHMS, SM, ILM, MP, PT, HW, GW), pp. 776–781.
- DAC-1998-LuoWA #functional #hybrid #performance #simulation
- Hybrid Techniques for Fast Functional Simulation (YL, TW, AA), pp. 664–667.
- DAC-1998-MassoudMBW #layout
- Layout Techniques for Minimizing On-Chip Interconnect Self Inductance (YM, SSM, TB, JW), pp. 566–571.
- DAC-1998-PandaDENB #design #incremental #migration #named
- Migration: A New Technique to Improve Synthesized Designs Through Incremental Customization (RP, AD, TE, JN, DB), pp. 388–391.
- DAC-1998-UsamiIIKTHATK #design #power management #scalability
- Design Methodology of Ultra Low-Power MPEG4 Codec Core Exploiting Voltage Scaling Techniques (KU, MI, TI, MK, MT, MH, HA, TT, TK), pp. 483–488.
- DAC-1998-ZhongAMM #case study #configuration management #problem #satisfiability #using
- Using Reconfigurable Computing Techniques to Accelerate Problems in the CAD Domain: A Case Study with Boolean Satisfiability (PZ, PA, SM, MM), pp. 194–199.
- DATE-1998-BeniniMSMS #encoding #optimisation
- Address Bus Encoding Techniques for System-Level Power Optimization (LB, GDM, DS, EM, CS), pp. 861–866.
- DATE-1998-CornoPRV
- Exploiting Symbolic Techniques for Partial Scan Flip Flop Selection (FC, PP, MSR, MV), pp. 670–677.
- DATE-1998-CostaCS #modelling #performance #simulation
- Efficient Techniques for Accurate Modeling and Simulation of Substrate Coupling in Mixed-Signal IC’s (JPC, MC, LMS), pp. 892–898.
- DATE-1998-FlottesPRV #effectiveness #performance
- Scanning Datapaths: A Fast and Effective Partial Scan Selection Technique (MLF, RP, BR, LV), pp. 921–922.
- DATE-1998-KimuraI #analysis #design
- A Unified Technique for PCB/MCM Design by Combining Electromagnetic Field Analysis with Circuit Simulator (HK, NI), pp. 951–952.
- DATE-1998-MetraRMPPFZSS #novel #testing
- Novel Technique for Testing FPGAs (CM, MR, GAM, JMP, SP, JF, YZ, DS, GRS), pp. 89–94.
- DATE-1998-RenovellAB #implementation #multi
- Optimized Implementations of the Multi-Configuration DFT Technique for Analog Circuits (MR, FA, YB), pp. 815–821.
- DATE-1998-RudnickVECPR #generative #performance #testing #using
- Fast Sequential Circuit Test Generation Using High-Level and Gate-Level Techniques (EMR, RV, AE, FC, PP, MSR), pp. 570–576.
- DATE-1998-YarmolikHW #performance #self
- Self-Adjusting Output Data Compression: An Efficient BIST Technique for RAMs (VNY, SH, HJW), pp. 173–179.
- SIGMOD-1998-BerchtoldBK #towards
- The Pyramid-Technique: Towards Breaking the Curse of Dimensionality (SB, CB, HPK), pp. 142–153.
- VLDB-1998-Amer-YahiaCD #database #relational
- Bulk-Loading Techniques for Object Databases and an Application to Relational Data (SAY, SC, CD), pp. 534–545.
- VLDB-1998-SilversteinBMU #mining #scalability
- Scalable Techniques for Mining Causal Structures (CS, SB, RM, JDU), pp. 594–605.
- CSMR-1998-KawabeMUO #classification #problem
- Variable Classification Technique and Application to the Year 2000 Problem (KK, AM, SU, AO), pp. 44–51.
- ICSM-1998-CherinkaOR #maintenance #off the shelf #programming #question #static analysis
- Maintaining a COTS Integrated Solution — Are Traditional Static Analysis Techniques Sufficient for this New Programming Methodology? (RC, CMO, JR), pp. 160–169.
- ICSM-1998-OcaC #data mining #identification #mining #using
- Identification of Data Cohesive Subsystems Using Data Mining Techniques (CMdO, DLC), pp. 16–23.
- ICSM-1998-VokolosF #difference #empirical #evaluation #testing
- Empirical Evaluation of the Textual Differencing Regression Testing Technique (FIV, PGF), pp. 44–53.
- IWPC-1998-BrandSV #harmful #legacy #parsing
- Current Parsing Techniques in Software Renovation Considered Harmful (MvdB, MPAS, CV), pp. 108–117.
- STOC-1998-Huber #approximate
- Exact Sampling and Approximate Counting Techniques (MH), pp. 31–40.
- FM-1998-BussowGHH #integration #modelling #tool support
- An Open Environment for the Integration of Hetereogenous Modelling Techniques and Tools (RB, WG, WH, SH), pp. 184–195.
- TAGT-1998-Faulstich #graph transformation #using
- Using Graph Transformation Techniques for Integrating Information from the WWW (LF), pp. 426–441.
- TAGT-1998-Rudolf #constraints #graph #pattern matching #performance
- Utilizing Constraint Satisfaction Techniques for Efficient Graph Pattern Matching (MR), pp. 238–251.
- CHI-1998-MacKenzieO #comparison
- A Comparison of Three Selection Techniques for Touchpads (ISM, AO), pp. 336–343.
- CSCW-1998-ZhaoS #image
- Evaluating Image Filtering Based Techniques in Media Space Applications (QAZ, JTS), pp. 11–18.
- CAiSE-1998-BrinkkemperSH #assembly
- Assembly Techniques for Method Engineering (SB, MS, FH), pp. 381–400.
- CAiSE-1998-LacroixSC #approach #database #information management #query #web
- Information Extraction and Database Techniques: A User-Oriented Approach to Querying the Web (ZL, AS, RC), pp. 289–304.
- CIKM-1998-DirckzeG #mobile #multi #transaction
- A Toggle Transaction Management Technique for Mobile Multidatabases (RAD, LG), pp. 371–377.
- CIKM-1998-PalopoliSU #automation #database #detection
- An Automatic Techniques for Detecting Type Conflicts in Database Schemes (LP, DS, DU), pp. 306–313.
- CIKM-1998-SaracEA #estimation
- Iterated DFT Based Techniques for Join Size Estimation (KS, ÖE, AEA), pp. 348–355.
- ICPR-1998-Heikkila #bound #detection
- Moment and curvature preserving technique for accurate ellipse boundary detection (JH), pp. 734–737.
- ICPR-1998-HuTT #random
- Direct triangle extraction by a randomized Hough technique (ZH, MT, HTT), pp. 717–719.
- ICPR-1998-KanekoH #detection #using #video
- Cut detection technique from MPEG compressed video using likelihood ratio test (TK, OH), pp. 1476–1480.
- ICPR-1998-KangOC #3d #graph #using
- Character grouping technique using 3D neighborhood graphs in raster map (YBK, SYO, HGC), pp. 1092–1094.
- ICPR-1998-PetersS #realtime
- A real-time variable sampling technique: DIEM (MWP, AS), pp. 316–321.
- ICPR-1998-YangH #parametricity #self
- An intrinsic parameters self-calibration technique for active vision system (CY, ZH), pp. 67–69.
- KDD-1998-BerchtoldJR #data mining #diagrams #independence #mining #visual notation
- Independence Diagrams: A Technique for Visual Data Mining (SB, HVJ, KAR), pp. 139–143.
- KDD-1998-ParthasarathyZL #memory management #mining #parallel
- Memory Placement Techniques for Parallel Association Mining (SP, MJZ, WL), pp. 304–308.
- SIGIR-1998-FrenchPVEP #database #empirical
- Evaluating Database Selection Techniques: A Testbed and Experiment (JCF, ALP, CLV, TE, KJP), pp. 121–129.
- SIGIR-1998-Larkey #automation #categorisation #using
- Automatic Essay Grading Using Text Categorization Techniques (LSL), pp. 90–95.
- SIGIR-1998-WechslerMS #documentation #retrieval
- New Techniques for Open-Vocabulary Spoken Document Retrieval (MW, EM, PS), pp. 20–27.
- OOPSLA-1998-DolbyC #automation #evaluation
- An Evaluation of Automatic Object Inline Allocation Techniques (JD, AAC), pp. 1–20.
- ICRE-1998-MillardLT #elicitation #game studies #requirements #using
- Child’s Play: Using Techniques Developed to Elicit Requirements from Children with Adults (NM, PL, KT), pp. 66–73.
- SAC-1998-SabinY #database #information retrieval
- Integrating information retrieval techniques with traditional DB methods in a Web-based database browser (RES, TKY), pp. 760–766.
- ICSE-1998-DevanbuFS #re-engineering
- Techniques for Trusted Software Engineering (PTD, PWLF, SGS), pp. 126–135.
- ICSE-1998-GravesHKPR #empirical #testing
- An Empirical Study of Regression Test Selection Techniques (TLG, MJH, JMK, AAP, GR), pp. 188–197.
- ASPLOS-1998-Le #execution #runtime
- An Out-of-Order Execution Technique for Runtime Binary Translators (BCL), pp. 151–158.
- CC-1998-StumpelTK #architecture #compilation
- VLIW Compilation Techniques for Superscalar Architectures (ES, MT, UK), pp. 234–248.
- HPCA-1998-MowyCL #comparative #distributed #evaluation #latency #memory management
- Comparative Evaluation of Latency Tolerance Techniques for Software Distributed Shared Memory (TCM, CQCC, AKWL), pp. 300–311.
- HPCA-1998-VengroffG #branch #estimation #performance #predict #re-engineering
- Partial Sampling with Reverse State Reconstruction: A New Technique for Branch Predictor Performance Estimation (DEV, GRG), pp. 342–351.
- ISMM-1998-Pirinen #incremental
- Barrier Techniques for Incremental Tracing (PPP), pp. 20–25.
- LCTES-1998-LundqvistS #analysis #simulation #using
- Integrating Path and Timing Analysis Using Instruction-Level Simulation Techniques (TL, PS), pp. 1–15.
- CAV-1998-Bolignano #encryption #model checking #protocol #verification
- Integrating Proof-Based and Model-Checking Techniques for the Formal Verification of Cryptographic Protocols (DB), pp. 77–87.
- CAV-1998-ElgaardKM
- MONA 1.x: New Techniques for WS1S and WS2S (JE, NK, AM), pp. 516–520.
- ISSTA-1998-GotliebBR #automation #constraints #generative #testing #theorem proving #using
- Automatic Test Data Generation Using Constraint Solving Techniques (AG, BB, MR), pp. 53–62.
- LICS-1998-FernandezM #equivalence #induction #interactive
- Coinductive Techniques for Operational Equivalence of Interaction Nets (MF, IM), pp. 321–332.
- DAC-1997-CroixW #logic #performance #synthesis
- A Fast And Accurate Technique To Optimize Characterization Tables For Logic Synthesis (JFC, DFW), pp. 337–340.
- DAC-1997-GrundmannDAR #design #performance #using
- Designing High Performance CMOS Microprocessors Using Full Custom Techniques (WJG, DD, RLA, NLR), pp. 722–727.
- DAC-1997-RaghunathanDJW #control flow #design #power management
- Power Management Techniques for Control-Flow Intensive Designs (AR, SD, NKJ, KW), pp. 429–434.
- EDTC-1997-CabodiCLQ #synthesis #verification
- Verification and synthesis of counters based on symbolic techniques (GC, PC, LL, SQ), pp. 176–181.
- EDTC-1997-ChakrabortyM #bound #functional #parallel #programmable #testing
- A programmable boundary scan technique for board-level, parallel functional duplex march testing of word-oriented multiport static RAMs (KC, PM), pp. 330–334.
- EDTC-1997-ChiusanoCPR #graph #hybrid #problem
- Hybrid symbolic-explicit techniques for the graph coloring problem (SC, FC, PP, MSR), pp. 422–426.
- EDTC-1997-CornoPRR #sequence #testing
- New static compaction techniques of test sequences for sequential circuits (FC, PP, MR, MSR), pp. 37–43.
- EDTC-1997-GrotkerSM #data flow #modelling #named
- PCC: a modeling technique for mixed control/data flow systems (TG, RS, HM), pp. 482–486.
- EDTC-1997-GuLKP #analysis #testing
- A controller testability analysis and enhancement technique (XG, EL, KK, ZP), pp. 153–157.
- ICDAR-1997-Ali #documentation #image
- An Object/Segment Oriented Skew-Correction Technique for Document Images (MBHA), pp. 671–674.
- ICDAR-1997-EspositoMSAG #library #machine learning #semantics
- Information Capture and Semantic Indexing of Digital Libraries through Machine Learning Techniques (FE, DM, GS, CDA, GdG), pp. 722–727.
- ICDAR-1997-SolihinL
- Mathematical properties of the native integral ratio handwriting and text extraction technique (YS, GL), p. 1102–?.
- ICDAR-1997-WatanabeHYT #normalisation
- Normalization Techniques of Handwritten Numerals for Gabor Filters (MW, YH, TY, ST), p. 303–?.
- ICDAR-1997-WongMX #fault tolerance #recognition
- A Chinese Bank Check Recognition System Based on the Fault Tolerant Technique (SW, FM, SX), pp. 1038–1042.
- VLDB-1997-WhiteheadSM #information retrieval #using
- GTE SuperPages: Using IR Techniques for Searching Complex Objects (SDW, HS, MM), pp. 553–557.
- ICSM-1997-Abd-El-Hafiz #composition #comprehension #knowledge-based
- Effects of Decomposition Techniques on Knowledge-Based Program Understanding (SKAEH), p. 21–?.
- WCRE-1997-GirardKS #architecture #comparison #comprehension #data type #detection #encapsulation
- Comparison of Abstract Data Type and Abstract State Encapsulation Detection Techniques for Architectural Understanding (JFG, RK, GS), pp. 66–75.
- PEPM-1997-MarinescuG #concurrent #source code
- Partial-Evaluation Techniques for Concurrent Programs (MM, BG), pp. 47–62.
- PLDI-1997-DinizR #adaptation #effectiveness #feedback
- Dynamic Feedback: An Effective Technique for Adaptive Computing (PCD, MCR), pp. 71–84.
- STOC-1997-KaoLPST
- General Techniques for Comparing Unrooted Evolutionary Trees (MYK, TWL, TMP, WKS, HFT), pp. 54–65.
- STOC-1997-LaffertyR
- Spectral Techniques for Expander Codes (JDL, DNR), pp. 160–167.
- WIA-1997-Ziadi #automaton #clustering #problem #set #sorting
- Sorting and Doubling Techniques for Set Partitioning and Automata Minimization Problems (DZ), pp. 241–251.
- FME-1997-MartinJ #analysis #concurrent #network #performance #process #scalability
- An Efficient Technique for Deadlock Analysis of Large Scale Process Networks (JMRM, SAJ), pp. 418–441.
- CHI-1997-AraiAH #named
- PaperLink: A Technique for Hyperlinking from Real Paper to Electronic Content (TA, DA, SEH), pp. 327–334.
- CHI-1997-EdwardsM #collaboration #named
- Timewarp: Techniques for Autonomous Collaboration (WKE, EDM), pp. 218–225.
- HCI-CC-1997-FoxBBBB #design
- Human Factors Techniques for Designing the Virtual Mission Operations Center (JAF, JB, RB, PB, MB), pp. 737–740.
- HCI-CC-1997-SavidisVS #library
- Embedding Scanning Techniques Accessible to Motor-Impaired Users in the WINDOWS Object Library (AS, GV, CS), pp. 429–432.
- HCI-SEC-1997-BaconS #3d #representation
- Hybridization of Classical Documentary Techniques and Techniques of Three Dimensional Representation in Space: Dynamical Constitution of Virtual Scenes (JB, XS), pp. 925–928.
- HCI-SEC-1997-Dormann #design #web
- Web Pages: Designing with Rhetorical Techniques (CD), pp. 799–802.
- HCI-SEC-1997-Ficarra #evaluation #multi
- Method and Techniques for the Evaluation of Multimedia Applications (FVCF), pp. 635–638.
- HCI-SEC-1997-OhashiYE #interface #using
- A Real World Oriented Interface Technique Using Computer Vision (TO, TY, TE), pp. 949–952.
- HCI-SEC-1997-Rauterberg #case study #game studies #interactive #user interface #video
- Natural User Interface (NUI): A Case Study of a Video Based Interaction Technique for a Computer Game (MR), pp. 253–256.
- HCI-SEC-1997-RauterbergBKM #case study #interactive #user interface #video
- Natural User Interfaces (NUI): A Case Study of a Video Based Interaction Technique for CAD Systems (MR, MB, HK, MM), pp. 929–932.
- AdaEurope-1997-Waterman #ada #testing
- Techniques for Testing Ada 95 (SRW), pp. 278–291.
- TRI-Ada-1997-Yu #component #object-oriented #reuse #using
- Using Object-Oriented Techniques to Develop Reusable Components (HY), pp. 117–124.
- CAiSE-1997-TryfonaPH #behaviour #experience #modelling
- Modeling Behavior of Geographic Objects: An Experience with the Object Modeling Technique (NT, DP, TH), pp. 347–359.
- ACIR-1997-StewartD #bibliography #perspective #profiling
- User Profiling Techniques: A Critical Review (SS, JD).
- CIKM-1997-JonesR
- View Materialization Techniques for Complex Hierarchical Objects (MCJ, EAR), pp. 222–229.
- ICML-1997-Drucker #using
- Improving Regressors using Boosting Techniques (HD), pp. 107–115.
- ICML-1997-WilsonM
- Instance Pruning Techniques (DRW, TRM), pp. 403–411.
- KDD-1997-BergstenSS #analysis #data mining #machine learning #mining
- Applying Data Mining and Machine Learning Techniques to Submarine Intelligence Analysis (UB, JS, PS), pp. 127–130.
- KDD-1997-FeldmanKZ #data mining #documentation #mining #visualisation
- Visualization Techniques to Explore Data Mining Results for Document Collections (RF, WK, AZ), pp. 16–23.
- SIGIR-1997-BallesterosC #information retrieval #query
- Phrasal Translation and Query Expansion Techniques for Cross-language Information Retrieval (LB, WBC), pp. 84–91.
- SIGIR-1997-KlavansTJ #automation #effectiveness #multi #natural language #semiparsing #speech
- Effective Use of Natural Language Processing Techniques for Automatic Conflation of Multi-Word Terms: The Role of Derivational Morphology, Part of Speech Tagging, and Shallow Parsing (ET, JK, CJ), pp. 148–155.
- TOOLS-PACIFIC-1997-Henderson-Sellers #generative #named #object-oriented
- OPEN: A Third Generation OO Methodology — Advanced Tasks and Techniques (BHS), pp. 363–365.
- TOOLS-USA-1997-Ege #design #encapsulation
- Class Design: Advanced Encapsulation Techniques (RKE), p. 376.
- TOOLS-USA-1997-GilH #debugging #generative #source code #testing #using
- T++: A Test Case Generator Using a Debugging Information Based Technique for Source Code Manipulation (JYG, BH), pp. 272–281.
- RE-1997-Sutcliffe #approach #requirements
- A Technique Combination Approach to Requirements Engineering (AGS), p. 65–?.
- SAC-1997-GudivadaBA #artificial reality #database #retrieval
- A retrieval technique for virtual reality databases (VNG, JNB, RA), pp. 328–333.
- ESEC-FSE-1997-WoodRBM #detection #empirical #fault
- Comparing and Combining Software Defect Detection Techniques: A Replicated Empirical Study (MW, MR, AB, JM), pp. 262–277.
- ICSE-1997-GoelS #data analysis #re-engineering #tutorial
- Software Engineering Data Analysis Techniques (Tutorial) (ALG, MS), pp. 667–668.
- ASF+SDF-1997-MoreauK #commutative #compilation #normalisation
- Compilation techniques for associative-commutative normalisation (PEM, HK), p. 11.
- CAV-1997-Berry #design #verification
- Boolean and 2-adic Numbers Based Techniques for Verifying Synchronous Design (GB), p. 303.
- CAV-1997-PardoH #abstraction #automation #calculus #model checking #μ-calculus
- Automatic Abstraction Techniques for Propositional μ-calculus Model Checking (AP, GDH), pp. 12–23.
- TLCA-1997-Lenisa #induction #semantics #λ-calculus
- Semantic Techniques for Deriving Coinductive Characterizations of Observational Equivalences for λ-calculi (ML), pp. 248–266.
- DAC-1996-Burch #verification
- Techniques for Verifying Superscalar Microprocessors (JRB), pp. 552–557.
- DAC-1996-DesaiY #cpu #design #simulation #using #verification
- A Systematic Technique for Verifying Critical Path Delays in a 300MHz Alpha CPU Design Using Circuit Simulation (MPD, YTY), pp. 125–130.
- DAC-1996-FerrandiFMPS #automaton #network #optimisation
- Symbolic Optimization of FSM Networks Based on Sequential ATPG Techniques (FF, FF, EM, MP, DS), pp. 467–470.
- DAC-1996-HuangCC #fault #verification
- Error Correction Based on Verification Techniques (SYH, KCC, KTC), pp. 258–261.
- DAC-1996-IyerK #architecture #named #self #synthesis
- Introspection: A Low Overhead Binding Technique During Self-Diagnosing Microarchitecture Synthesis (BI, RK), pp. 137–142.
- DAC-1996-KudvaGJ #distributed
- A Technique for Synthesizing Distributed Burst-mode Circuits (PK, GG, HMJ), pp. 67–70.
- DAC-1996-LillisCLH #performance #trade-off
- New Performance Driven Routing Techniques With Explicit Area/Delay Tradeoff and Simultaneous Wire Sizing (JL, CKC, TTYL, CYH), pp. 395–400.
- DAC-1996-MonahanB #analysis #concurrent #optimisation
- Concurrent Analysis Techniques for Data Path Timing Optimization (CM, FB), pp. 47–50.
- DAC-1996-MonteiroDAM #power management #scheduling
- Scheduling Techniques to Enable Power Management (JM, SD, PA, AM), pp. 349–352.
- DAC-1996-RoychowdhuryM #scalability
- Homotopy Techniques for Obtaining a DC Solution of Large-Scale MOS Circuits (JSR, RCM), pp. 286–291.
- DAC-1996-Sheehan #performance
- An AWE Technique for Fast Printed Circuit Board Delays (BNS), pp. 539–543.
- HT-1996-JoyceKMSU #complexity #design #generative #problem #visual notation #visualisation #web
- Visual Metaphor and the Problem of Complexity in the Design of Web Sites: Techniques for Generating, Recognizing and Visualizing Structure (MJ, RK, SM, BS, JMU), p. 257.
- SIGMOD-1996-AchyutuniON #database #online #parallel
- Two Techniques for On-Line Index Modification in Shared Nothing Parallel Databases (KJA, EO, SBN), pp. 125–136.
- SIGMOD-1996-BunemanDHS #optimisation #query #semistructured data
- A Query Language and Optimization Techniques for Unstructured Data (PB, SBD, GGH, DS), pp. 505–516.
- SIGMOD-1996-Han #data mining #mining
- Data Mining Techniques (JH), p. 545.
- SIGMOD-1996-HellersteinN #execution #query
- Query Execution Techniques for Caching Expensive Methods (JMH, JFN), pp. 423–434.
- SIGMOD-1996-LibkinMW #array #design #implementation #multi #optimisation #query
- A Query Language for Multidimensional Arrays: Design, Implementation, and Optimization Techniques (LL, RM, LW), pp. 228–239.
- SIGMOD-1996-SimmenSM #optimisation #order
- Fundamental Techniques for Order Optimization (DES, EJS, TM), pp. 57–67.
- VLDB-1996-BerckenS #data access #multi #query
- Query Processing Techniques for Multiversion Access Methods (JVdB, BS), pp. 168–179.
- VLDB-1996-DiwanRSS #clustering
- Clustering Techniques for Minimizing External Path Length (AAD, SR, SS, SS), pp. 342–353.
- VLDB-1996-ViverosNR #data mining #health #information management #mining
- Applying Data Mining Techniques to a Health Insurance Information System (MSV, JPN, MJR), pp. 286–294.
- ITiCSE-1996-Ellis #design #experience #implementation #industrial #multi #testing
- Design, implementation and testing techniques for multimedia industrial experience projects (AEE), pp. 119–121.
- TACAS-1996-ChouP #model checking #partial order #reduction #verification
- Formal Verification of a Partial-Order Reduction Technique for Model Checking (CTC, DP), pp. 241–257.
- ICSM-1996-GannodC #c #reverse engineering #source code #using
- Using Informal and Formal Techniques for the Reverse Engineering of C Programs (GCG, BHCC), pp. 265–274.
- ICSM-1996-WildeC #comprehension #experience
- Early field experience with the Software Reconnaissance technique for program comprehension (NW, CC), pp. 312–318.
- WCRE-1996-GannodC #c #reverse engineering #source code #using
- Using Informal and Formal Techniques for the Reverse Engineering of C Programs (GCG, BHCC), pp. 249–258.
- WCRE-1996-WildeC #comprehension #experience
- Early Field Experience with the Software Recounaissance Technique for Program Comprehension (NW, CC), pp. 270–276.
- CSCW-1996-HudsonS #privacy #trade-off
- Techniques for Addressing Fundamental Privacy and Disruption Tradeoffs in Awareness Support Systems (SEH, IES), pp. 248–257.
- CAiSE-1996-CastanoA #analysis #process #unification
- Techniques for Process Analysis and Unification (SC, VDA), pp. 234–254.
- CIKM-1996-Pulido #graph #query #recursion #traversal #using
- Recursive Query Processing Using Graph Traversal Techniques (EP), pp. 37–44.
- ICML-1996-Suzuki #algorithm #learning #network #performance #using
- Learning Bayesian Belief Networks Based on the Minimum Description Length Principle: An Efficient Algorithm Using the B & B Technique (JS), pp. 462–470.
- ICPR-1996-AminBHMC #information management
- A knowledge acquisition technique for recognizing handprinted Chinese characters (AA, MB, AGH, AM, PC), pp. 254–258.
- ICPR-1996-BhattacharyaCP #segmentation #set
- An MLP-based texture segmentation technique which does not require a feature set (UB, BBC, SKP), pp. 805–809.
- ICPR-1996-CorreiaCSN #visual notation
- Optical flow techniques applied to the calibration of visual perception experiments (MVC, AJCC, JAS, LMN), pp. 498–502.
- ICPR-1996-CoxRZ #image #quote #segmentation
- “Ratio regions”: a technique for image segmentation (IJC, SR, YZ), pp. 557–564.
- ICPR-1996-DistasiNV #image #recursion
- A B-tree based recursive technique for image coding (RD, MN, SV), pp. 670–674.
- ICPR-1996-FredL #clustering
- A minimum code length technique for clustering of syntactic patterns (ALNF, JMNL), pp. 680–684.
- ICPR-1996-GriffinKWM
- Techniques for the interpretation of thermal paint coated samples (AG, JK, TW, JM), pp. 959–963.
- ICPR-1996-HamamotoMIHT #anti #evaluation #network
- Evaluation of an anti-regularization technique in neural networks (YH, YM, HI, TH, ST), pp. 205–208.
- ICPR-1996-HuangHH #adaptation #estimation #performance #video
- Adaptive early jump-out technique for fast motion estimation in video coding (HCH, YPH, WLH), pp. 864–868.
- ICPR-1996-Jaeger #optimisation #recognition #using
- Recovering writing traces in off-line handwriting recognition: using a global optimization technique (SJ0), pp. 150–154.
- ICPR-1996-LuoTB #algorithm #fuzzy #multi
- A new multilevel line-based stereo vision algorithm based on fuzzy techniques (AL, WT, HB), pp. 383–387.
- ICPR-1996-MottlMBK #image #problem
- Hidden tree-like quasi-Markov model and generalized technique for a class of image processing problems (VM, IBM, AB, AK), pp. 715–719.
- ICPR-1996-NewmanTBC #image #segmentation
- A volumetric segmentation technique for diagnosis and surgical planning in lower torso CT images (TSN, NT, SLB, PLC), pp. 553–557.
- ICPR-1996-PeiH96a #algorithm #complexity #detection #symmetry
- A low complexity algorithm for detecting rotational symmetry based on the Hough transform technique (SCP, JHH), pp. 492–496.
- KDD-1996-IglesiaDR #database #heuristic #using
- Discovering Knowledge in Commercial Databases Using Modern Heuristic Techniques (BdlI, JCWD, VJRS), pp. 44–49.
- KDD-1996-LakshminarayanHGS #machine learning #using
- Imputation of Missing Data Using Machine Learning Techniques (KL, SAH, RPG, TS), pp. 140–145.
- ECOOP-1996-KonoKM #distributed #implementation #memory management #using
- An Implementation Method of Migratable Distributed Objects Using an RPC Technique Integrated with Virtual Memory Management (KK, KK, TM), pp. 295–315.
- ICRE-1996-Brackett #requirements
- Ripe Fruit in Requirements Engineering: Techniques You Can Exploit NOW (JWB), pp. 42–43.
- ICRE-1996-Hudlicka #comparison #elicitation #requirements
- Requirements Elicitation with Indirect Knowledge Elicitation Techniques: Comparison of Three Methods (EH), pp. 4–11.
- ICRE-1996-Macaulay #requirements
- Requirements for Requirements Engineering Technique (LAM), pp. 157–164.
- SAC-1996-BaishE #modelling #predict #quality
- Intelligent prediction techniques for software quality models (EB, CE), pp. 565–569.
- SAC-1996-DamianiF #fuzzy #reuse
- Fuzzy techniques for software reuse (ED, MGF), pp. 552–557.
- ICSE-1996-Hoare #how #proving #reliability
- The Role of Formal Techniques: Past, Current and Future or How Did Software Get so Reliable without Proof? (Extended Abstract) (CARH), pp. 233–234.
- CC-1996-PfahlerP #comparison #pipes and filters #scheduling
- A Comparison of Modulo Scheduling Techniques for Software Pipelining (PP, GP), pp. 18–32.
- HPDC-1996-SolimanE #adaptation #clustering #distributed #performance #simulation
- An Efficient Clustered Adaptive-Risk Technique for Distributed Simulation (HMS, ASE), pp. 383–391.
- CAV-1996-BensalemLS #automation #generative #invariant
- Powerful Techniques for the Automatic Generation of Invariants (SB, YL, HS), pp. 323–335.
- CAV-1996-ClarkeGZ #algorithm #proving #theorem proving #using #verification
- Verifying the SRT Division Algorithm Using Theorem Proving Techniques (EMC, SMG, XZ), pp. 111–122.
- CAV-1996-FernandezJJV #generative #on the fly #testing #using #verification
- Using On-The-Fly Verification Techniques for the Generation of test Suites (JCF, CJ, TJ, CV), pp. 348–359.
- RTA-1996-Madlener #monad
- Applications of Rewrite Techniques in Monoids and Rings (Abstract) (KM), p. 260.
- DAC-1995-DevadasM #bibliography #optimisation #power management
- A Survey of Optimization Techniques Targeting Low Power VLSI Circuits (SD, SM), pp. 242–247.
- DAC-1995-FabbroFCG #modelling #probability #standard #worst-case
- An Assigned Probability Technique to Derive Realistic Worst-Case Timing Models of Digital Standard Cells (ADF, BF, LC, CG), pp. 702–706.
- DAC-1995-JainMF #learning #verification
- Advanced Verification Techniques Based on Learning (JJ, RM, MF), pp. 420–426.
- DAC-1995-LiaoDKTW #embedded #optimisation
- Code Optimization Techniques for Embedded DSP Microprocessors (SYL, SD, KK, SWKT, ARW), pp. 599–604.
- DAC-1995-PotkonjakS #constraints #named
- Rephasing: A Transformation Technique for the Manipulation of Timing Constraints (MP, MBS), pp. 107–112.
- ICDAR-v2-1995-AriasKC #performance
- Efficient techniques for telephone company line drawing interpretation (JFA, RK, AKC), pp. 795–798.
- ICDAR-v2-1995-HisamitsuMSFN #fault
- Optimal techniques in OCR error correction for Japanese texts (TH, KM, YS, HF, YN), pp. 1014–1017.
- ICDAR-v2-1995-LeeLK #online #recognition #using
- On-line cursive script recognition using an island-driven search technique (SHL, HL, JHK), pp. 886–889.
- SIGMOD-1995-ChaudhuriDY #execution #optimisation #query
- Join Queries with External Text Sources: Execution and Optimization Techniques (SC, UD, TWY), pp. 410–422.
- VLDB-1995-EicklerGK #evaluation #performance
- A Performance Evaluation of OID Mapping Techniques (AE, CAG, DK), pp. 18–29.
- CSEE-1995-FranceL #comprehension #requirements #specification
- Understanding the Role of Formal Specification Techniques in Requirements Engineering (RBF, MMLP), pp. 207–221.
- ICSM-1995-BarrosBEQV #automation #impact analysis
- Supporting impact analysis: a semi-automated technique and associated tool (SB, TB, AE, JPQ, JFV), pp. 42–51.
- WCRE-1995-LakhotiaG #classification #evaluation #towards
- Toward Experimental Evaluation of Subsystem Classification Recovery Techniques (AL, JMG), pp. 262–269.
- PEPM-1995-Deutsch #abstract interpretation #data type #induction #modelling #pointer #semantics
- Semantic models and abstract interpretation techniques for inductive data structures and pointers (AD), pp. 226–229.
- CHI-1995-HixTJ #concept #interactive #testing
- Pre-Screen Projection: From Concept to Testing of a New Interaction Technique (DH, JNT, RJKJ), pp. 226–233.
- CHI-1995-KabbashB #using
- The “Prince” Technique: Fitts’ Law and Selection Using Area Cursors (PK, WB), pp. 273–279.
- CHI-1995-LampingRP #geometry #scalability #visualisation
- A Focus+Context Technique Based on Hyperbolic Geometry for Visualizing Large Hierarchies (JL, RR, PP), pp. 401–408.
- AdaEurope-1995-Brown #ada #safety
- The Practical Application of Safety Techniques on an Ada Based Project (RB), pp. 51–57.
- CAiSE-1995-GeppertD #database #reuse
- Strategies and Techniques: Reusable Artifacts for the Construction of Database Management Systems (AG, KRD), pp. 297–310.
- CIKM-1995-Graves #design #knowledge base #search-based
- Application of Knowledge Base Design Techniques to Genetic Markers (MG), pp. 348–354.
- CIKM-1995-IkejiF #adaptation #query #using
- Computation of Partial Query Results Using An Adaptive Stratified Sampling Technique (ACI, FF), pp. 145–149.
- KDD-1995-Klosgen #database #information management
- Anonymization Techniques for Knowledge Discovery in Databases (WK), pp. 186–191.
- SIGIR-1995-Klein #performance #retrieval
- Efficient Recompression Techniques for Dynamic Full-Text Retrieval Systems (STK), pp. 39–47.
- OOPSLA-1995-AgesenH #comparison #feedback #object-oriented #optimisation #type inference
- Type Feedback vs. Concrete Type Inference: A Comparison of Optimization Techniques for Object-Oriented Languages (OA, UH), pp. 91–107.
- SAC-1995-FiedlerLDL #using
- Optimal initialization of mixed-layer model using the adjoint technique (RF, SL, SKD, JML), pp. 91–95.
- SAC-1995-HoeltingSW #approximate #problem
- Approximation techniques for variations of the p-median problem (CJH, DAS, RLW), pp. 293–299.
- ESEC-1995-KamstiesL #detection #empirical #evaluation
- An Empirical Evaluation of Three Defect-Detection Techniques (EK, CML), pp. 362–383.
- ASF+SDF-1995-Klint #asf+sdf #evolution #ide #implementation
- The Evolution of Implementation Techniques in the ASF+SDF Meta-environment (PK), pp. 5–26.
- HPCA-1995-AndersonB #multi #performance
- Two Techniques for Improving Performance on Bus-Based Multiprocessors (CA, JLB), pp. 264–275.
- HPCA-1995-CitronR #using
- Creating a Wider Bus Using Caching Techniques (DC, LR), pp. 90–99.
- IWMM-1995-PlainfosseS #bibliography #distributed #garbage collection
- A Survey of Distributed Garbage Collection Techniques (DP, MS), pp. 211–249.
- CAV-1995-GribomontR #named #verification
- CAVEAT: Technique and Tool for Computer Aided VErification And Transformation (EPG, DR), pp. 70–83.
- ICLP-1995-BarthB #finite
- Finite Domain and Cutting Plane Techniques in CLP(PB) (PB, AB), pp. 133–147.
- ICLP-1995-Hausman #erlang #hybrid #implementation
- Hybrid Implementation Techniques in Erlang BEAM (BH), p. 816.
- RTA-1995-BaaderS #algebra #constraints #perspective #theorem proving
- Combination of Constraint Solving Techniques: An Algebraic POint of View (FB, KUS), pp. 352–366.
- RTA-1995-Matiyasevich #logic #on the
- On Some Mathematical Logic Contributions to Rewriting Techniques: Lost Heritage (Abstract) (YM), p. 1.
- RTA-1995-StickelZ #problem
- Studying Quasigroup Identities by Rewriting Techniques: Problems and First Results (MES, HZ), pp. 450–456.
- DAC-1994-CabodiCQ #traversal
- Auxiliary Variables for Extending Symbolic Traversal Techniques to Data Paths (GC, PC, SQ), pp. 289–293.
- DAC-1994-HuYD #performance #verification
- New Techniques for Efficient Verification with Implicitly Conjoined BDDs (AJH, GY, DLD), pp. 276–282.
- DAC-1994-Murphy #standard
- Partnering with EDA Vendors: Tips, Techniques, and the Role of Standards (SM), pp. 131–134.
- DAC-1994-NagumoNNMM #fault #named #reduction #using
- VFSIM: Vectorized Fault Simulator Using a Reduction Technique Excluding Temporarily Unobservable Faults (TN, MN, TN, MM, SM), pp. 510–515.
- DAC-1994-PotkonjakD #optimisation #resource management #testing #using
- Optimizing Resource Utilization and Testability Using Hot Potato Techniques (MP, SD), pp. 201–205.
- DAC-1994-RiessDJ #clustering #scalability #using
- Partitioning Very Large Circuits Using Analytical Placement Techniques (BMR, KD, FMJ), pp. 646–651.
- DAC-1994-SilvaS
- Dynamic Search-Space Pruning Techniques in Path Sensitization (JPMS, KAS), pp. 705–711.
- EDAC-1994-AhmedCC #approach #fault #modelling #optimisation #using
- A Model-based Approach to Analog Fault Diagnosis using Techniques from Optimisation (SA, PYKC, PC), p. 665.
- EDAC-1994-HirechFGR #design #simulation #testing
- A Redefinable Symbolic Simulation Technique to Testability Design Rules Checking (MH, OF, AG, EHR), p. 668.
- PODS-1994-HuaLL #clustering
- A Decomposition-Based Simulated Annealing Technique for Data Clustering (KAH, SDL, WKL), pp. 117–128.
- PODS-1994-LibkinW #set
- New Techniques for Studying Set Languages, Bag Languages and Aggregate Functions (LL, LW), pp. 155–166.
- PODS-1994-RamaswamyS
- Path Caching: A Technique for Optimal External Searching (SR, SS), pp. 25–35.
- VLDB-1994-PoulovassilisS #algebra #database #optimisation #programming language #query
- Investigation of Algebraic Query Optimisation Techniques for Database Programming Languages (AP, CS), pp. 415–426.
- CSEE-1994-HabraD #re-engineering #student
- Putting into Practice Advanced Software Engineering Techniques through Students Project (NH, ED), pp. 303–316.
- ESOP-1994-Boerio #higher-order #polymorphism #λ-calculus
- Extending Pruning Techniques to Polymorphic Second order λ-Calculus (LB), pp. 120–134.
- PLDI-1994-DavidsonJ #memory management
- Memory Access Coalescing: A technique for Eliminating Redundant memory Accesses (JWD, SJ), pp. 186–195.
- PLDI-1994-EbciogluGKSZ #compilation
- VLIW Compilation Techniques in a Superscalar Environment (KE, RDG, KCK, GMS, IZ), pp. 36–48.
- STOC-1994-AlonK #graph #random
- A spectral technique for coloring random 3-colorable graphs (preliminary version) (NA, NK), pp. 346–355.
- FME-1994-CuellarWB #design #effectiveness #industrial #verification
- Combining the Design of Industrial Systems with Effective Verification Techniques (JC, IW, DB), pp. 639–658.
- FME-1994-Lindsay #on the #verification
- On transferring VDM verification techniques to Z (PAL), pp. 190–213.
- FME-1994-MartinT #verification
- Verification Techniques for LOTOS (UM, MT), pp. 83–92.
- TAGT-1994-ArnborgP #bound #graph #subclass
- A Technique for Recognizing Graphs of Bounded Treewidth with Application to Subclasses of Partial 2-Paths (SA, AP), pp. 469–486.
- CHI-1994-ChaseSHH94a #behaviour #development #evaluation #representation
- Development and evaluation of a taxonomical model of behavioral representation techniques (JDC, RSS, HRH, DH), pp. 159–165.
- CHI-1994-Oviatt94a #interface
- Interface techniques for minimizing disfluent input to spoken language systems (SLO), pp. 205–210.
- ICML-1994-ZelleMK #bottom-up #induction #logic programming #top-down
- Combining Top-down and Bottom-up Techniques in Inductive Logic Programming (JMZ, RJM, JBK), pp. 343–351.
- SEKE-1994-FarrellRT #exclamation #object-oriented
- Giving KBS an OO! — object-oriented techniques and KADS (VF, DR, ST), pp. 298–305.
- SIGIR-1994-Hoch #analysis #classification #documentation #information retrieval #using
- Using IR Techniques for Text Classification in Document Analysis (RH), pp. 31–40.
- ECOOP-1994-MoreiraC #analysis #object-oriented
- Combining Object-Oriented Analysis and Formal Description Techniques (AMDM, RGC), pp. 344–364.
- TOOLS-EUROPE-1994-Cook #development
- Essential Techniques for O-O Development (SC), p. 527.
- TOOLS-EUROPE-1994-McKim94a #education #object-oriented
- Teaching Object-Oriented Techniques (JCM), p. 533.
- PLILP-1994-MaraistS #functional #graph #reduction
- A Graph Reduction Technique with Sharing across Narrowings for Functional-Logic Languages (JM, FSKS), pp. 355–369.
- PLILP-1994-Voronkov #bottom-up #implementation
- An Implementation Technique for a Class of Bottom-Up Procedures (AV), pp. 147–164.
- POPL-1994-BosschereDGK #interprocedural #optimisation
- Call Forwarding: A Simple Interprocedural Optimization Technique for Dynamically Typed Languages (KDB, SKD, DG, SK), pp. 409–420.
- ICRE-1994-AcostaBRS #agile #case study #prototype #requirements
- A case study of applying rapid prototyping techniques in the Requirements Engineering Environment (RDA, CLB, WER, JLS), pp. 66–73.
- SAC-1994-HalgamugeG #fuzzy #industrial
- Fuzzy neural fusion techniques for industrial applications (SKH, MG), pp. 136–141.
- ICSE-1994-Gaudel #specification
- Formal Specification Techniques (Extended Abstract) (MCG), pp. 223–227.
- ICSE-1994-RothermelH #framework #testing
- A Framework for Evaluating Regression Test Selection Techniques (GR, MJH), pp. 201–210.
- ASPLOS-1994-ArgadeCT #monitoring #operating system #runtime
- A Technique for Monitoring Run-Time Dynamics of an Operating System and a Microprocessor Executing User Applications (PVA, DKC, CT), pp. 122–131.
- ASPLOS-1994-LaudonGH #multi #named #thread
- Interleaving: A Multithreading Technique Targeting Multiprocessors and Workstations (JL, AG, MH), pp. 308–318.
- HPDC-1994-ChiuC #distributed #fault tolerance #performance
- Process-Replication Technique for Fault Tolerance and Performance Improvement in Distributed Computing Systems (JFC, GMC), pp. 236–243.
- CADE-1994-DomenjoudKR #equation
- Combination Techniques for Non-Disjoint Equational Theories (ED, FK, CR), pp. 267–281.
- LICS-1994-BachmairG #transitive
- Rewrite Techniques for Transitive Relations (LB, HG), pp. 384–393.
- DAC-1993-ChickermaneRBP
- Non-Scan Design-for-Testability Techniques for Sequential Circuits (VC, EMR, PB, JHP), pp. 236–241.
- DAC-1993-ChuML #finite #performance #state machine
- An Efficient Critical Race-Free State Assignment Technique for Asynchronous Finite State Machines (TAC, NM, CKCL), pp. 2–6.
- DAC-1993-KawarabayashiSS #verification
- A Verification Technique for Gated Clock (MK, NVS, ALSV), pp. 123–127.
- DAC-1993-SeawrightB #performance #synthesis
- High-Level Symbolic Construction Technique for High Performance Sequential Synthesis (AS, FB), pp. 424–428.
- DAC-1993-StamoulisH #correlation #probability #simulation
- Improved Techniques for Probabilistic Simulation Including Signal Correlation Effects (GIS, INH), pp. 379–383.
- HT-1993-Perlman #hypermedia #information retrieval #tool support
- Information Retrieval Techniques for Hypertext in the Semi-Structured Toolkit (GP), pp. 260–267.
- STOC-1993-ColeMS #array #configuration management #fault #multi #self
- Multi-scale self-simulation: a technique for reconfiguring arrays with faults (RC, BMM, RKS), pp. 561–572.
- WSA-1993-CharlierDMH #abstract interpretation #algorithm #fixpoint #optimisation #performance #prolog
- Optimization Techniques for General Purpose Fixpoint Algorithms — Practical Efficiency for the Abstract Interpretation of Prolog (BLC, OD, LM, PVH), pp. 15–26.
- FME-1993-ValmariKCL #analysis #reachability
- Putting Advanced Reachability Analysis Techniques Together: the “ARA” Tool (AV, JK, MC, ML), pp. 597–616.
- HCI-ACS-1993-Ala-Siuru #case study #experience #specification #user interface #using
- Using QFD Techniques in User Interface Specification: First Experiences (PAS), pp. 456–461.
- HCI-ACS-1993-Badham #design #implementation
- Implementing Smart Manufacturing: Some Techniques for Designer/User Cooperation (RJB), pp. 62–67.
- HCI-SHI-1993-BauerR #development #interactive
- New Techniques for Interaction in Virtual Worlds — Contents of Development and Examples (WB, OR), pp. 687–692.
- HCI-SHI-1993-ChaseHHSB #behaviour #design #representation #user interface
- A Model of Behavioral Techniques for Representing User Interface Designs (JDC, HRH, DH, RSS, JLB), pp. 861–866.
- HCI-SHI-1993-KirbyH #analysis #design
- An Analysis Technique for User Centered Design (JK, HH), pp. 991–996.
- HCI-SHI-1993-LeungA #taxonomy #visual notation
- A Taxonomy of Distortion-Oriented Techniques for Graphical Data Presentation (YKL, MDA), pp. 104–109.
- INTERCHI-1993-Potter #automation #programming #user interface
- Guiding automation with pixels (abstract): a technique for programming in the user interface (RP), p. 530.
- INTERCHI-1993-Tognazzini #design #interface
- Principles, techniques, and ethics of stage magic and their application to human interface design (BT), pp. 355–362.
- TRI-Ada-1993-Cernosek #ada #modelling #named #representation
- ROMAN-9X: A Technique for Representing Object Models in Ada 9X Notation (GJC), pp. 385–406.
- SEKE-1993-EspositoMS #information management #machine learning #refinement
- Machine Learning Techniques for Knowledge Acquisition and Refinement (FE, DM, GS), pp. 319–323.
- SEKE-1993-Juzgado #knowledge-based #testing
- Application of Testing Techniques in Conventional Software to Knowledge-Based Software (NJJ), pp. 282–284.
- SIGIR-1993-FujiiC #comparison #retrieval
- A Comparison of Indexing Techniques for Japanese Text Retrieval (HF, WBC), pp. 237–246.
- OOPSLA-1993-BalK #runtime #using
- Object Distribution in Orca using Compile-Time and Run-Time Techniques (HEB, MFK), pp. 162–177.
- TOOLS-EUROPE-1993-CoulangeR #object-oriented #statistics
- Object-Oriented Techniques at Work: Facts and Statistics (BC, AR), pp. 89–94.
- TOOLS-PACIFIC-1993-LingD #comparison #concurrent #object-oriented #paradigm #specification #using
- A Comparison of Techniques for Specifying Concurrent Systems Using the Object-Oriented Paradigm (SL, BD), pp. 155–177.
- TOOLS-USA-1993-ChandlerH #education #object-oriented
- Teaching Object Oriented at University Level: Techniques for Success (JMC, SCH), pp. 619–626.
- TOOLS-USA-1993-Page-Jones93a #object-oriented
- Object-Orientation and Structured Techniques: Overlaps and Conflicts (MPJ), p. 573.
- LOPSTR-1993-MaddenHGB #automation #generative #performance #proving #source code #theorem proving
- A General Technique for Automatically Generating Efficient Programs Through the Use of Proof Planning (Abstract) (PM, JH, IG, AB), pp. 64–66.
- LOPSTR-1993-Vargas-VeraRI #editing #prolog #source code
- Combining Prolog Programs in a Techniques Editing System (Abstract) (MVV, DSR, RI), pp. 82–84.
- LOPSTR-1993-Vasconcelos #design #programming #prolog
- Designing Prolog Programming Techniques (WWV), pp. 85–99.
- ICRE-1993-FenselAS #analysis #semantics
- Giving Structured Analysis Techniques a Formal and Operational Semantics with KARL (DF, JA, RS), pp. 267–286.
- RE-1993-GoguenL #elicitation #requirements
- Techniques for requirements elicitation (JAG, CL), pp. 152–164.
- SAC-1993-StrateW #algorithm #multi #programming
- Load Balancing Techniques for Dynamic Programming Algorithms on Hypercube Multiprocessors (SAS, RLW), pp. 562–569.
- SAC-1993-TanLJH #reuse #specification
- The Data Derivation Model: A Program Specification Technique That Improves Reusability (HBKT, TWL, SJ, YSH), pp. 95–102.
- SAC-1993-VeezhinathanKT #bound #branch #hybrid
- A Hybrid of Neural Net and Branch and Bound Techniques for Seismic Horizon Tracking (JV, FK, JT), pp. 173–178.
- FSE-1993-Bergadano #generative #learning #testing
- Test Case Generation by Means of Learning Techniques (FB), pp. 149–162.
- ICSE-1993-FranklW #comparison #data flow #detection #testing
- An Analytical Comparison of the Fault-Detecting Ability of Data Flow Testing Techniques (PGF, EJW), pp. 415–424.
- ICSE-1993-MukherjeaS #algorithm #animation #comprehension #debugging
- Applying Algorithm Animation Techniques for Program Tracing, Debugging, and Understanding (SM, JTS), pp. 456–465.
- PPoPP-1993-WagnerC #implementation #named #performance
- Leapfrogging: A Portable Technique for Implementing Efficient Futures (DBW, BC), pp. 208–217.
- ICLP-1993-CarlssonG #automation #constraints #using
- Automatic Frequency Assignment for Cellular Telephones Using Constraint Satisfaction Techniques (MC, MG), pp. 647–665.
- ICLP-1993-Gusikhin #integration #prolog #scheduling
- Integration of Traditional Scheduling Techniques and AI on Prolog Basis (OYG), p. 841.
- ILPS-1993-Vargas-VeraVR #editing #prolog #scalability #source code #using
- Building Large-Scale Prolog Programs using a Techniques Editing System (MVV, WWV, DSR), p. 636.
- ISSTA-1993-CorbettA #bound #concurrent #realtime
- A Practical Technique for Bounding the Time Between Events in Concurrent Real-Time Systems (JCC, GSA), pp. 110–116.
- ISSTA-1993-Goradia #effectiveness #impact analysis
- Dynamic Impact Analysis: A Cost-Effective Technique to Enforce Error-Propagation (TG), pp. 171–181.
- RTA-1993-BaaderS #problem
- Combination Techniques and Decision Problems for Disunification (FB, KUS), pp. 301–315.
- RTA-1993-Bachmair #proving #theorem proving
- Rewrite Techniques in Theorem Proving (Abstract) (LB), p. 1.
- RTA-1993-LevyA #order #term rewriting
- Bi-rewriting, a Term Rewriting Technique for Monotonic Order Relations (JL, JAC), pp. 17–31.
- DAC-1992-GeurtsCM #throughput
- Time Constrained Allocation and Assignment Techniques for High Throughput Signal Processing (WG, FC, HDM), pp. 124–127.
- DAC-1992-HamadaCC #equation #estimation
- A Wire Length Estimation Technique Utilizing Neighborhood Density Equations (TH, CKC, PMC), pp. 57–61.
- DAC-1992-LeeM #logic #multi #simulation
- Two New Techniques for Compiled Multi-Delay Logic Simulation (YSL, PMM), pp. 420–423.
- DAC-1992-WangW #graph #optimisation
- A Graph Theoretic Technique to Speed up Floorplan Area Optimization (TCW, DFW), pp. 62–68.
- PODS-1992-Jakobsson #evaluation #on the #query
- On Tree-Based Techniques for Query Evaluation (HJ), pp. 380–392.
- SIGMOD-1992-TsangarisN #clustering #on the #performance
- On the Performance of Object Clustering Techniques (MMT, JFN), pp. 144–153.
- VLDB-1992-ZobelMS #database #performance
- An Efficient Indexing Technique for Full Text Databases (JZ, AM, RSD), pp. 352–362.
- PLDI-1992-Lucco #parallel #scheduling #source code
- A Dynamic Scheduling Technique for Irregular Parallel Programs (SL), pp. 200–211.
- CHI-1992-Muller #design #using
- Retrospective on a year of participatory design using the PICTIVE technique (MJM), pp. 455–462.
- CAiSE-1992-IpH #diagrams #information management #knowledge base #lifecycle #modelling #process
- A Knowledge Based Technique for the Process Modelling of Information Systems: The Object Life Cycle Diagram (SI, TH), pp. 164–186.
- KR-1992-BaaderHNPF #analysis #empirical #optimisation #representation
- An Empirical Analysis of Optimization Techniques for Terminological Representation Systems, or Making KRIS Get a Move On (FB, BH, BN, HJP, EF), pp. 270–281.
- KR-1992-XiongSS #backtracking #scheduling
- Intelligent Backtracking Techniques for Job Shop Scheduling (YX, NMS, KPS), pp. 14–23.
- ML-1992-Segre #multi #on the
- On Combining Multiple Speedup Techniques (AMS), pp. 400–405.
- SIGIR-1992-BlossevilleHMP #analysis #automation #classification #documentation #natural language #statistics
- Automatic Document Classification: Natural Language Processing, Statistical Analysis, and Expert System Techniques used together (MJB, GH, MGM, NP), pp. 51–58.
- ECOOP-1992-Gabelgaard #implementation #object-oriented #programming #using
- Using Object-Oriented Programming Techniques for Implementing ISDN Supplementary Services (BG), pp. 213–232.
- TOOLS-EUROPE-1992-Lano #object-oriented #specification
- Object-Oriented Specification Techniques (KL), p. 403.
- TOOLS-EUROPE-1992-NilssonB #object-oriented #specification #tool support
- Tools for Object Oriented Formal Specification Technique (GN, PB), pp. 349–358.
- TOOLS-PACIFIC-1992-Henderson-Sellers92a #analysis #design
- Techniques and Notation for Analysis and Design (BHS), p. 236.
- PLILP-1992-Alexandre #logic programming #source code
- A technique for Transforming Logic Programs by Fold-Unfold Transformations (FA), pp. 202–216.
- PLILP-1992-DorochevskyV #garbage collection
- Binding Techniques and Garbage Collection for OR-Parallel CLP Systems (MD, AV), pp. 39–53.
- PLILP-1992-EnglebertCRH #abstract interpretation #algorithm #evaluation #optimisation #prolog
- Generic Abstract Interpretation Algorithms For Prolog: Tow Optimization Techniques and Their Experimental Evaluation (VE, BLC, DR, PVH), pp. 310–325.
- ICSE-1992-Fairley #estimation
- Recent Advances in Software Estimation Techniques (REF), pp. 382–391.
- ICSE-1992-PodgurskiP #automation #behaviour #component #retrieval #reuse
- Behavior Sampling: A Technique for Automated Retrieval of Reusable Components (AP, LP), pp. 349–360.
- IWMM-1992-Wilson #garbage collection
- Uniprocessor Garbage Collection Techniques (PRW), pp. 1–42.
- CAV-1992-JainKG #scalability #towards #verification
- Towards a Verification Technique for Large Synchronous Circuits (PJ, PK, GG), pp. 109–122.
- CAV-1992-PoelZ #development #parallel
- Layering Techniques for Development of Parallel Systems (MP, JZ), pp. 16–29.
- IWPTS-1992-LidongJL #consistency #multi #optimisation #sequence #testing
- A Further Optimization Technique for Conformance Testing Based on Multiple UIO Sequences (ZL, LJ, HL), pp. 229–235.
- DAC-1991-JuS #identification #incremental
- Incremental Techniques for the Identification of Statically Sensitizable Critical Paths (YCJ, RAS), pp. 541–546.
- DAC-1991-LoboP #optimisation #scheduling
- Redundant Operator Creation: A Scheduling Optimization Technique (DAL, BMP), pp. 775–778.
- SIGMOD-1991-BeckerSW
- Spatial Priority Search: An Access Technique for Scaleless Maps (BB, HWS, PW), pp. 128–137.
- SIGMOD-1991-Jagadish #retrieval
- A Retrieval Technique for Similar Shapes (HVJ), pp. 208–217.
- SIGMOD-1991-KolovsonS #multi
- Segment Indexes: Dynamic Indexing Techniques for Multi-Dimensional Interval Data (CPK, MS), pp. 138–147.
- PEPM-1991-Meyer #imperative #partial evaluation
- Techniques for Partial Evaluation of Imperative Languages (UM), pp. 94–105.
- PLDI-1991-Jain #pipes and filters #scheduling
- Circular Scheduling: A New Technique to Perform Software Pipelining (SJ), pp. 219–228.
- VDME-1991-1-Jonkers
- Upgrading the Pre- and Postcondition Technique (HBMJ), pp. 428–456.
- VDME-1991-1-ZaveJ #specification
- Techniques for Partial Specification and Specification of Switching Systems (PZ, MJ), pp. 511–525.
- FPCA-1991-Chiueh #architecture #garbage collection
- An Architectural Technique for Cache-level Garbage Collection (TcC), pp. 520–537.
- CHI-1991-JeffriesMWU #comparison #evaluation #user interface
- User interface evaluation in the real world: a comparison of four techniques (RJ, JRM, CW, KU), pp. 119–124.
- CHI-1991-LundellN #development #modelling
- Human factors in software development: models, techniques, and outcomes (JL, MN), pp. 145–151.
- CHI-1991-Myers #specification #spreadsheet #user interface #visual notation
- Graphical techniques in a spreadsheet for specifying user interfaces (BAM), pp. 243–249.
- AdaEurope-1991-ColombiniTP #ada #realtime
- Ada as High Level Language for Real-Time Systems Exploiting RDBMS Techniques (CC, AdT, RP), pp. 384–393.
- KDD-1991-ChanW #classification #database #statistics
- Statistical Technique for Extracting Classificatory Knowledge from Databases (KCCC, AKCW), pp. 107–124.
- KR-1991-Baalen #automation #design #satisfiability
- The Completeness of DRAT, A Technique for Automatic Design of Satisfiability Procedures (JVB), pp. 514–525.
- KR-1991-ProvanP
- The Utility of Consistency-Based Diagnostic Techniques (GMP, DLP), pp. 461–472.
- ML-1991-MartinSC #information management
- Knowledge Acquisition Combining Analytical and Empirrcal Techniques (MM, RS, UC), pp. 657–661.
- ML-1991-Wixson #composition #learning #scalability
- Scaling Reinforcement Learning Techniques via Modularity (LEW), pp. 3368–372.
- SIGIR-1991-JarvelinN #database #deduction #integration #retrieval
- Advanced Retrieval From Heterogeneous Fact Databases: Integration of Data Retrieval, Conversion, Aggregation and Deductive Techniques (KJ, TN), pp. 173–182.
- ECOOP-1991-LippeF #implementation
- Implementation Techniques for Integral Version Management (EL, GF), pp. 342–359.
- TOOLS-USA-1991-Henderson-Sellers #analysis #design
- Techniques and Notation for Analysis and Design (BHS), pp. 403–404.
- TOOLS-USA-1991-Vaishnavi #modelling #object-oriented
- Object-Oriented Modeling Techniques (VKV), pp. 347–348.
- PLILP-1991-GiannottiH #detection #recursion #specification
- A Technique for Recursive Invariance Detection and Selective Program Specification (FG, MVH), pp. 323–334.
- ICSE-1991-Litke #implementation #process #towards
- Toward new Techniques to Assess the Software Implementation Process (JDL), pp. 74–82.
- CAV-1991-MaoM #automation #equivalence #finite #proving #state machine
- An Automated Proof Technique for Finite-State Machine Equivalence (WM, GJM), pp. 233–243.
- ICLP-1991-JayaramanN #implementation #logic programming
- Implementation Techniques for Scoping Constructs in Logic Programming (BJ, GN), pp. 871–886.
- ICLP-1991-KorslootT #compilation #concurrent #logic programming #programming language
- Compilation Techniques for Nondeterminate Flat Concurrent Logic Programming Languages (MK, ET), pp. 457–471.
- RTA-1991-Avenhaus #equation #induction #proving #theorem
- Proving Equational and Inductive Theorems by Completion and Embedding Techniques (JA), pp. 361–373.
- RTA-1991-RameshR #incremental #normalisation #performance #term rewriting
- Incremental Techniques for Efficient Normalization of Nonlinear Rewrite Systems (RR, IVR), pp. 335–347.
- DAC-1990-Bryant #simulation
- Symbolic Simulation — Techniques and Applications (REB), pp. 517–521.
- DAC-1990-MaurerW #simulation
- Techniques for Unit-Delay Compiled Simulation (PMM, ZW), pp. 480–484.
- DAC-1990-SinghC #layout #matrix #order
- A Transistor Reordering Technique for Gate Matrix Layout (US, CYRC), pp. 462–467.
- PODS-1990-Plambeck #optimisation #query #recursion
- Semigroup Techniques in Recursive Query Optimization (TEP), pp. 145–153.
- SIGMOD-1990-Orenstein #comparison #parametricity #query
- A Comparison of Spatial Query Processing Techniques for Native and Parameter Spaces (JAO), pp. 343–352.
- ESOP-1990-JourdanP #analysis
- Techniques for Improving Grammar Flow Analysis (MJ, DP), pp. 240–255.
- STOC-1990-Vishkin #pattern matching #performance
- Deterministic Sampling-A New Technique for Fast Pattern Matching (UV), pp. 170–180.
- STOC-1990-Zuckerman #bound
- A Technique for Lower Bounding the Cover Time (DZ), pp. 254–259.
- VDME-1990-Dahl #object-oriented
- Object Orientation and Formal Techniques (OJD), pp. 1–11.
- LFP-1990-MohrKH #lazy evaluation #parallel #source code
- Lazy Task Creation: A Technique for Increasing the Granularity of Parallel Programs (EM, DAK, RHHJ), pp. 185–197.
- CHI-1990-DillonET #cost analysis
- Measuring the true cost of command selection: techniques and results (RFD, JDE, JWT), pp. 19–26.
- CHI-1990-Hudson #adaptation #feedback #semantics
- Adaptive semantic snaping — a technique for semantic feedback at the lexical level (SEH), pp. 65–70.
- CHI-1990-Jacob #eye tracking #interactive #what
- What you look at is what you get: eye movement-based interaction techniques (RJKJ), pp. 11–18.
- CAiSE-1990-BrinkkemperH #concept #development #requirements #specification
- The Conceptual Task Model: a Specification Technique between Requirements Engineering and Program Development (Extended abstract) (SB, AHMtH), pp. 228–250.
- ML-1990-LytinenM #comparison #learning
- A Comparison of Learning Techniques in Second Language Learning (SLL, CEM), pp. 377–383.
- SEKE-1990-KuoSHL #estimation
- Applying DSS Techniques in Software Cost Estimation (SCK, GPS, SNH, YSL), pp. 228–233.
- SEKE-1990-StovskyW #design #re-engineering
- The Role of Traditional Engineering Design Techniques in Software Engineering (MPS, BWW), pp. 84–89.
- SIGIR-1990-RabittiZ #database #multi
- A Dynamic Signature Technique for Multimedia Databases (FR, PZ), pp. 193–210.
- OOPSLA-ECOOP-1990-PurchaseW #fault #object-oriented #parallel #specification
- Message Pattern Specifications: A New Technique for Handling Errors in Parallel Object Oriented Systems (JAP, RLW), pp. 116–125.
- ALP-1990-Batarekh #fixpoint
- Fixpoint Techniques for Non-Monotone Maps (AB), pp. 132–143.
- CC-1990-Dobler #hybrid #parsing #top-down
- A Hybrid Top-Down Parsing Technique (Abstract) (HD), pp. 210–211.
- CC-1990-Kasyanov #programming #tool support
- Tools and Techniques of Annotated Programming (VNK), pp. 117–131.
- PPoPP-1990-TickI #logic programming #parallel #programming language
- Programming Techniques for Efficiently Exploiting Parallelism in Logic Programming Languages (ET, NI), pp. 31–39.
- CADE-1990-OhlbachH #compilation #logic #tutorial
- Tutorial on Compilation techniques for Logics (HJO, AH), p. 683.
- CAV-1990-BuyM #liveness #proving
- A Proof Lattice-Based Technique for Analyzing Liveness of Resource Controllers (UAB, RM), pp. 292–301.
- CAV-1990-Clarke #explosion #logic #model checking #problem
- Temporal Logic Model Checking: Two Techniques for Avoiding the State Explosion Problem (EMC), p. 1.
- CLP-1990-SchreyeVB90 #detection #graph #horn clause #query #strict #using
- A Practical Technique for Detecting Non-terminating Queries for a Restricted Class of Horn Clauses, Using Directed, Weighted Graphs (DDS, KV, MB), pp. 649–663.
- CLP-1990-UedaM90 #haskell #implementation
- A New Implementation Technique for Flat GHC (KU, MM), pp. 3–17.
- CSL-1990-Vollmer #revisited
- The Gap-Language-Technique Revisited (HV), pp. 389–399.
- LICS-1990-CleavelandS #proving #specification #using
- When is “Partial” Adequate? A Logic-Based Proof Technique Using Partial Specifications (RC, BS), pp. 440–449.
- DAC-1989-FujiharaSIY #automation #named #optimisation #performance
- DYNAJUST: An Efficient Automatic Routing Technique Optimizing Delay Conditions (YF, YS, YI, MY), pp. 791–794.
- DAC-1989-HerrigelF #optimisation
- An Analytic Optimization Technique for Placement of Macro-Cells (AH, WF), pp. 376–381.
- SIGMOD-1989-CopelandK #comparison
- A Comparison Of High-Availability Media Recovery Techniques (GPC, TWK), pp. 98–109.
- SIGMOD-1989-Swami #combinator #heuristic #optimisation #query #scalability
- Optimization of Large Join Queries: Combining Heuristic and Combinatorial Techniques (ANS), pp. 367–376.
- PLDI-1989-BalasundaramK #data access #parallel
- A Technique for Summarizing Data Access and Its Use in Parallelism Enhancing Transformations (VB, KK), pp. 41–53.
- PLDI-1989-BernsteinGGKMNP #compilation #optimisation
- Spill Code Minimization Techniques for Optimizing Compilers (DB, DQG, MCG, HK, YM, IN, RYP), pp. 258–263.
- PLDI-1989-Venkatesh #evaluation #framework #program analysis #specification
- A Framework for Construction and Evaluation of High-Level Specifications for Program Analysis Techniques (GAV), pp. 1–12.
- STOC-1989-ReifS #geometry #named #random
- Polling: A New Randomized Sampling Technique for Computational Geometry (JHR, SS), pp. 394–404.
- ICALP-1989-Allender
- Limitations of the Upward Separation Technique (Preliminary Version) (EA), pp. 18–30.
- ICALP-1989-EppsteinG #algorithm #combinator #parallel
- Parallel Algorithmic Techniques for Combinatorial Computation (DE, ZG), pp. 304–318.
- ICALP-1989-Parisi-Presicce #composition #design #graph grammar
- Modular System Design Applying Graph Grammars Techniques (FPP), pp. 621–636.
- ICALP-1989-Toran #combinator #complexity
- A Combinatorial Technique for Separating Counting Complexity Classes (JT), pp. 733–744.
- CHI-1989-Gutierrez #problem #prototype
- Prototyping techniques for different problem contexts (OG), pp. 259–264.
- CAiSE-1989-Rolland #automation #future of #modelling #on the #tool support #why
- On the Future of Modelling — Why Current CASE Tools Insist on Supporting 20 Years Old Methods and Techniques (CR).
- OOPSLA-1989-RussoC #design #memory management #multi #object-oriented #operating system #using
- Virtual Memory and Backing Storage Management in Multiprocessor Operating Systems Using Object-Oriented Design Techniques (VFR, RHC), pp. 267–278.
- ICSE-1989-YoungT #detection #fault #taxonomy
- Rethinking the Taxonomy of Fault Detection Techniques (MY, RNT), pp. 53–62.
- ASPLOS-1989-GibsonHKKP #array #scalability
- Failure Correction Techniques for Large Disk Arrays (GAG, LH, RMK, RHK, DAP), pp. 123–132.
- SOSP-1989-BoloskyFS #effectiveness #memory management
- Simple But Effective Techniques for NUMA Memory Management (WJB, RPF, MLS), pp. 19–31.
- SOSP-1989-HutchinsonPAO #design #kernel
- RPC in the x-Kernel: Evaluating New Design Techniques (NCH, LLP, MBA, SWO), pp. 91–101.
- NACLP-1989-InamuraIRN #evaluation #multi #optimisation #using
- Optimizing Techniques Using the MRB and Their Evaluation on the Multi-PSI/V2 (YI, NI, KR, KN), pp. 907–921.
- NACLP-1989-Lakhotia #programming #prolog #source code
- Incorporating “Programming Techniques” into Prolog Programs (AL), pp. 426–440.
- RTA-1989-AvenhausDM #named #performance #proving #theorem proving
- THEOPOGLES — An efficient Theorem Prover based on Rewrite-Techniques (JA, JD, JM), pp. 538–541.
- RTA-1989-Reddy #synthesis
- Rewriting Techniques for Program Synthesis (USR), pp. 388–403.
- TAV-1989-RichardsonAO #process #programming #testing
- Integrating Testing Techniques Through Process Programming (DJR, SLA, LJO), pp. 219–228.
- DAC-1988-Zimmerman #estimation
- A New Area and Shape Function Estimation Technique for VLSI Layouts (GZ), pp. 60–65.
- SIGMOD-1988-KumarS #semantics #transaction
- Semantics Based Transaction Management Techniques for Replicated Data (AK, MS), pp. 117–125.
- VLDB-1988-SeegerK #data access #design #implementation #performance
- Techniques for Design and Implementation of Efficient Spatial Access Methods (BS, HPK), pp. 360–371.
- ESOP-1988-AikenN #parallel #pipes and filters
- Perfect Pipelining: A New Loop Parallelization Technique (AA, AN), pp. 221–235.
- ESOP-1988-GiegerichS #parsing #pattern matching
- Code Selection Techniques: Pattern Matching, Tree Parsing, and Inversion of Derivors (RG, KS), pp. 247–268.
- PLDI-1988-Lam #effectiveness #pipes and filters #scheduling
- Software Pipelining: An Effective Scheduling Technique for VLIW Machines (MSL), pp. 318–328.
- Best-of-PLDI-1988-Lam88a #effectiveness #pipes and filters #scheduling
- Software pipelining: an effective scheduling technique for VLIW machines (with retrospective) (MSL), pp. 244–256.
- ICALP-1988-Culik #decidability #equivalence #problem #proving
- New Techniques for Proving the Decidability of Equivalence Problems (KCI), pp. 162–175.
- SIGIR-1988-JacobsR #information retrieval #natural language
- Natural Language Techniques for Intelligent Information Retrieval (PSJ, LFR), pp. 85–99.
- ICSE-1988-DucasseE #automation #bibliography #debugging
- A Review of Automated Debugging Systems: Knowledge, Strategies, and Techniques (MD, AME), pp. 162–173.
- PPEALS-1988-GuptaS #parallel #performance
- Compile-time Techniques for Efficient Utilization of Parallel Memories (RG, MLS), pp. 235–246.
- JICSCP-1988-Waern88 #abstract interpretation #implementation #prolog
- An Implementation Technique for the Abstract Interpretation of Prolog (AW), pp. 700–710.
- LICS-1988-DershowitzO #term rewriting
- Proof-Theoretic Techniques for Term Rewriting Theory (ND, MO), pp. 104–111.
- DAC-1987-ChandrasekharPC #design #hardware #term rewriting #verification
- Application of Term Rewriting Techniques to Hardware Design Verification (MSC, JPP, KWC), pp. 277–282.
- DAC-1987-KoukaS #data analysis #design
- An Application of Exploratory Data Analysis Techniques to Floorplan Design (EFMK, GS), pp. 654–658.
- DAC-1987-KrasniewskiP #low cost #self
- Circular Self-Test Path: A Low-Cost BIST Technique (AK, SP), pp. 407–415.
- DAC-1987-Subrahmanyam #deduction #named
- LCS — A Leaf Cell Synthesizer Employing Formal Deduction Techniques (PAS), pp. 459–465.
- VLDB-1987-Gardarin #datalog #recursion #source code
- Magic Functions: A Technique to Optimize Extended Datalog Recursive Programs (GG), pp. 21–30.
- VLDB-1987-NoeW #concurrent #performance
- Measured Performance of Time Interval Concurrency Control Techniques (JDN, DBW), pp. 359–367.
- PLDI-1987-ChaseH #debugging #source code
- Selective interpretation as a technique for debugging computationally intensive programs (BBC, RTH), pp. 113–124.
- SIGIR-1987-ChouekaFKS #query
- Improved Techniques for Processing Queries in Full-Text Systems (YC, ASF, STK, ES), pp. 306–315.
- ECOOP-1987-LoomisSR #concept #design #modelling
- An Object Modelling Technique for Conceptual Design (MESL, AVS, JER), pp. 192–202.
- ESEC-1987-HennellHR #automation #embedded #realtime #testing
- Automated Testing Techniques for Real-Time Embedded Software (MAH, DH, IJR), pp. 244–253.
- ESEC-1987-Obst #string
- Delta Technique and String-to-String Correction (WO), pp. 64–68.
- ICSE-1987-Royce #concept #development #scalability
- Managing the Development of Large Software Systems: Concepts and Techniques (WWR), pp. 328–339.
- ASPLOS-1987-WeissS #case study #compilation #pipes and filters
- A Study of Scalar Compilation Techniques for Pipelined Supercomputers (SW, JES), pp. 105–109.
- RTA-1987-Rety
- Improving Basic Narrowing Techniques (PR), pp. 228–241.
- SLP-1987-SekiF87 #logic programming #source code
- Notes on Transformation Techniques for Generate and Test Logic Programs (HS, KF), pp. 215–223.
- DAC-1986-HwangKN #modelling #verification
- An accuration delay modeling technique for switch-level timing verification (SHH, YHK, ARN), pp. 227–233.
- DAC-1986-McFarland #behaviour #bottom-up #design #hardware #synthesis #using
- Using bottom-up design techniques in the synthesis of digital hardware from abstract behavioral descriptions (MCM), pp. 474–480.
- DAC-1986-PreasK #automation #bibliography #tutorial
- Automatic placement a review of current techniques (tutorial session) (BP, PGK), pp. 622–629.
- VLDB-1986-ValduriezKC #implementation
- Implementation Techniques of Complex Objects (PV, SK, GPC), pp. 101–110.
- ESOP-1986-GlaserH #implementation
- Another Implementation Technique for Applicative Languages (HG, SH), pp. 70–81.
- STOC-1986-ColeV #algorithm #design #metaprogramming #parallel
- Deterministic coin tossing and accelerating cascades: micro and macro techniques for designing parallel algorithms (RC, UV), pp. 206–219.
- LFP-1986-FairbairnW #code generation #functional
- Code Generation Techniques for Functional Languages (JF, SW), pp. 94–104.
- SIGIR-1986-JacoG #information retrieval
- An Information Retrieval System Based on Artificial Intelligence Techniques (DDJ, GG), pp. 214–220.
- SIGIR-1986-Thurmair #architecture #information retrieval
- A Common Architecture for Different Text Processing Techniques in an Information Retrieval Environment (GT), pp. 138–143.
- OOPSLA-1986-Ingalls #morphism #multi #polymorphism
- A Simple Technique for Handling Multiple Polymorphism (DHHI), pp. 347–349.
- DAC-1985-Camposano #design #synthesis
- Synthesis techniques for digital systems design (RC), pp. 475–481.
- DAC-1985-HughesLR #automation #design #distributed #execution #tool support
- A technique for distributed execution of design automation tools (SCH, DBL, CJR), pp. 23–30.
- DAC-1985-MiyoshiKTNA #logic #simulation
- Speed up techniques of logic simulation (MM, YK, OT, YN, NA), pp. 812–815.
- DAC-1985-OdawaraIW #knowledge-based
- Knowledge-based placement technique for printed wiring boards (GO, KI, KW), pp. 616–622.
- SIGMOD-1985-EickL #database #design #using
- Acquisition of Terminological Knowledge Using Database Design Techniques (CFE, PCL), pp. 84–94.
- SIGMOD-1985-FushimiKNTM #adaptation #algorithm #clustering #evaluation #multi #performance
- Algorithm and Performance Evaluation of Adaptive Multidimensional Clustering Technique (SF, MK, MN, HT, TMO), pp. 308–318.
- SIGMOD-1985-OzsoyogluOM #physics #summary
- A Language and a Physical Organization Technique for Summary Tables (GÖ, ZMÖ, FM), pp. 3–16.
- ICALP-1985-ChazelleG #geometry
- Fractional Cascading: A Data Structuring Technique with Geometric Applications (BC, LJG), pp. 90–100.
- ICALP-1985-Gunter
- A Universal Domain Technique for Profinite Posets (CAG), pp. 232–243.
- ICSE-1985-Tavendale #prototype #specification
- A Technique for Prototyping Directly from a Specification (RDT), pp. 224–229.
- SLP-1985-Narain85 #evaluation #lazy evaluation #logic
- A Technique for Doing Lazy Evaluation in Logic (SN), pp. 261–269.
- DAC-1984-DasguptaGRWW #clustering #design #testing
- Chip partitioning aid: A design technique for partitionability and testability in VLSI (SD, MCG, RAR, RGW, TWW), pp. 203–208.
- DAC-1984-GuillaumeK #named #proximity
- MINUPROX — an advanced proximity correction technique for the IBM EL-2 electron beam tool (WJG, AK), pp. 452–453.
- DAC-1984-MarkovFB #2d #optimisation
- Optimization techniques for two-dimensional placement (LAM, JRF, JHB), pp. 652–654.
- DAC-1984-SuL #functional #testing
- Functional testing techniques for digital LSI/VLSI systems (SYHS, TL), pp. 517–528.
- SIGMOD-1984-DeWittKOSSW #database #implementation #in memory #memory management
- Implementation Techniques for Main Memory Database Systems (DJD, RHK, FO, LDS, MS, DAW), pp. 1–8.
- SIGMOD-1984-Fedorowicz #database #evaluation #multi #using
- Database Evaluation Using Multiple Regression Techniques (JF), pp. 70–76.
- SCC-1984-KellerPPM #case study #experience
- Tree transformation techniques and experiences (SEK, JAP, TFP, SPM), pp. 190–201.
- STOC-1984-GabowBT #geometry #problem #scalability
- Scaling and Related Techniques for Geometry Problems (HNG, JLB, RET), pp. 135–143.
- STOC-1984-HochbaumS #approximate #graph #problem
- Powers of Graphs: A Powerful Approximation Technique for Bottleneck Problems (DSH, DBS), pp. 324–333.
- STOC-1984-VardiW #automaton #logic #source code
- Automata Theoretic Techniques for Modal Logics of Programs (Extended Abstract) (MYV, PW), pp. 446–456.
- SIGIR-1984-Zarri #information retrieval
- Some Remarks About the Inference Techniques of RESEDA, an “Intelligent” Information Retrieval System (GPZ), pp. 281–300.
- CADE-1984-KapurK #proving
- A Natural Proof System Based on rewriting Techniques (DK, BK), pp. 53–64.
- SLP-1984-UeharaOKT84 #bibliography #bottom-up #implementation #logic #parsing
- A Bottom-Up Parser Based on Predicate Logic: A Survey of the Formalism and its Implementation Technique (KU, RO, OK, JT), pp. 220–227.
- DAC-1983-KedemW #layout
- Graph-optimization techniques for IC layout and compaction (GK, HW), pp. 113–120.
- DAC-1983-OdawaraIK #clustering
- Partitioning and placement technique for bus-structured PWB (GO, KI, TK), pp. 449–456.
- DAC-1983-ShellyT #statistics #verification
- Statistical techniques of timing verification (JHS, DRT), pp. 396–402.
- PODS-1983-HsuM #composition #concurrent #database
- Hierarchical Database Decomposition — A Technique for Database Concurrency Control (MH, SEM), pp. 182–191.
- PODS-1983-ImielinskiL #database #problem #relational
- Inverting Relational Expressions — A Uniform and Natural Technique for Various Database Problems (TI, WLJ), pp. 305–311.
- STOC-1983-Gabow #network #performance #problem #reduction
- An Efficient Reduction Technique for Degree-Constrained Subgraph and Bidirected Network Flow Problems (HNG), pp. 448–456.
- SIGIR-1983-Croft #information retrieval
- Applications for Information Retrieval Techniques in the Office (WBC), pp. 18–23.
- SIGIR-1983-Kukich #automation #database #generative #knowledge-based #natural language
- Knowledge-Based Report Generations: A Technique for Automatically Generating Natural Language Reports from Databases (KK), pp. 246–250.
- SIGIR-1983-Zarri #information management #information retrieval #representation #using
- Reseda, An Information Retrieval System Using Artificial Intelligence and Knowledge Representation Techniques (GPZ), pp. 189–195.
- DAC-1982-DeesK #automation
- Automated rip-up and reroute techniques (WADJ, PGK), pp. 432–439.
- DAC-1982-HachtelNS #array #logic #programmable
- Techniques for programmable logic array folding (GDH, ARN, ALSV), pp. 147–155.
- DAC-1982-KawatoUHS #interactive #logic #synthesis
- An interactive logic synthesis system based upon AI techniques (NK, TU, SH, TS), pp. 858–864.
- DAC-1982-MaruyamaUKS #design #hardware #verification
- A verification technique for hardware designs (FM, TU, NK, TS), pp. 832–841.
- DAC-1982-MudgeRLA #image #layout #validation
- Cellular image processing techniques for VLSI circuit layout validation and routing (TNM, RAR, RML, DEA), pp. 537–543.
- DAC-1982-OdawaraIK
- Arbitrarily-sized module location technique in the lop system (GO, KI, TK), pp. 718–726.
- SIGMOD-1982-ImielinskiL82a #database
- A Technique for Translating States Between Database Schemata (TI, WLJ), pp. 61–68.
- SIGMOD-1982-Longstaff #named #query
- ERQ: Controlled Inference and Instruction Techniques for DBMS Query Languages (JL), pp. 111–117.
- SIGMOD-1982-X #multi
- A Multi-Group Technique for Data Compression (KAH, MAB), pp. 284–292.
- SCC-1982-Kipps #cobol #compilation #experience #migration
- Experience with Porting Techniques on a COBOL 74 Compiler (IMK), pp. 15–21.
- STOC-1982-PachlKR #algorithm #bound #distributed #proving
- A Technique for Proving Lower Bounds for Distributed Maximum-Finding Algorithms (JKP, EK, DR), pp. 378–382.
- SIGIR-1982-RaghavanI #case study #clustering #comparative
- Techniques for Measuring the Stability of Clustering: A Comparative Study (VVR, MYLI), pp. 209–237.
- ICSE-1982-RappsW #analysis #data flow #testing
- Data Flow Analysis Techniques for Test Data Selection (SR, EJW), pp. 272–278.
- ILPC-1982-BarbutiDL82 #logic programming #proving #source code #towards
- Toward an Inductionless Technique for Proving Properties of Logic Programs (RB, PD, GL), pp. 175–181.
- DAC-1981-Krohn #simulation
- Vector coding techniques for high speed digital simulation (HEK), pp. 525–529.
- DAC-1981-Sherwood #logic #modelling #simulation
- A MOS modelling technique for 4-state true-value hierarchical logic simulation or Karnough knowledge (WS), pp. 775–785.
- VLDB-1981-EggersOS #scalability #statistics
- A Compression Technique for Large Statistical Data-Bases (SJE, FO, AS), pp. 424–434.
- VLDB-1981-Soderlund #assessment #concurrent #database #modelling
- Concurrent Data Base Reorganization — Assessment of a Powerful Technique through Modeling (LS), pp. 499–509.
- SIGIR-1981-StorerE #clustering #validation
- Experiments on the Application of Clustering Techniques to Data Validation (Abstract) (WFS, CME), pp. 88–89.
- DAC-1980-CoxC #array #automation #standard
- The Standard Transistor Array (star) (Part II automatic cell placement techniques) (GWC, BDC), pp. 451–457.
- DAC-1980-ShiraishiH #performance #slicing
- Efficient placement and routing techniques for master slice LSI (HS, FH), pp. 458–464.
- DAC-1980-Ulrich #flexibility #logic #performance #simulation
- Table lookup techniques for fast and flexible digital logic simulation (EU), pp. 560–563.
- DAC-1980-Yates #analysis #design #metric #process
- Design process analysis: A measurement and analysis technique (KDY), pp. 420–421.
- SIGMOD-1980-ChangF #clustering #database #design #physics
- A Dynamic Clustering Technique for Physical Database Design (JMC, KsF), pp. 188–199.
- LISP-1980-Marti #compilation #concurrent #control flow #lisp
- Compilation Techniques for a Control-Flow Concurrent LISP System (JM), pp. 203–207.
- DAC-1979-CarlsonPC #3d #data transformation #design
- The use of color and 3-D temporal and spatial data management techniques in computer-aided design (WEC, REP, CC), pp. 32–38.
- DAC-1979-Chang #layout #recognition #using
- LSI layout checking using bipolar device recognition technique (CSC), pp. 95–101.
- DAC-1979-Darringer #hardware #verification
- The application of program verification techniques to hardware verification (JAD), pp. 375–381.
- DAC-1979-Harvel #automation #design #effectiveness
- Cost effective data entry techniques for design automation (JTH), p. 382.
- DAC-1979-Johnson79a #layout
- PC board layout techniques (DRJ), pp. 337–343.
- DAC-1979-Sherwood #hybrid #logic #scheduling
- A hybrid scheduling technique for hierarchical logic simulators or “Close Encounters of the Simulated Kind” (WS), pp. 249–254.
- STOC-1979-Berman #axiom #semantics
- A Completeness Technique for D-Axiomatizable Semantics (FB), pp. 160–166.
- SIGIR-1979-Jamieson #implementation #retrieval #scalability #using
- The Economic Implementation of Experimental Retrieval Techniques on a Very Large Scale Using an Intelligent Terminal (SHJ), pp. 45–51.
- ICSE-1979-BelfordBH #case study #development #effectiveness #re-engineering
- Central Flow Control Software Development: A Case Study of the Effectiveness of Software Engineering Techniques (PCB, RAB, TLH), pp. 85–93.
- ICSE-1979-LauberBGS #automation #design #realtime #specification
- EPOS : A Specification and Design Technique for Computer Controlled Real-time Automation Systems (RL, JB, PG, HS), pp. 245–250.
- ICSE-1979-Ploedereder #program analysis #verification
- Pragmatic Techniques for Program Analysis and Verification (EP), pp. 63–72.
- ICSE-1979-Scowen #quality #source code
- A New Technique for Improving the Quality of Computer Programs (RSS), pp. 73–78.
- DAC-1978-Dasarathy #automation #design
- Automated techniques for product-grading systems design (BVD), pp. 290–296.
- DAC-1978-Larsen #generative
- Versatile mask generation techniques for custom microelectronic devices (RPL), pp. 193–198.
- DAC-1978-Marlett #generative #named #testing
- EBT: A comprehensive test generation technique for highly sequential circuits (RM), pp. 335–339.
- DAC-1978-ShahY #cost analysis #design
- A practical technique for benefit-cost analysis of Computer-Aided Design and Drafting Systems (RRS, GYY).
- DAC-1978-TokoroSITIO #simulation
- A module level simulation technique for systems composed of LSI’s and MSI’s (MT, MS, MI, ET, TI, HO), pp. 418–427.
- VLDB-1978-Ashany #analysis #classification #database #matrix #retrieval #scalability
- Application of Sparse Matrix Techniques to Search, Retrieval, Classification and Relationship Analysis in Large Data Base Systems — SPARCOM (RA), pp. 499–516.
- VLDB-1978-Schkolnick #bibliography #database #design #physics
- A Survey of Physical Database Design Methodology and Techniques (MS), pp. 474–487.
- STOC-1978-Miller #morphism #on the
- On the n^log n Isomorphism Technique: A Preliminary Report (GLM), pp. 51–58.
- STOC-1978-ThatcherWW #data type #power of #specification
- Data Type Specification: Parameterization and the Power of Specification Techniques (JWT, EGW, JBW), pp. 119–132.
- DAC-1977-ArmstrongW #simulation
- Simulation techniques for microprocessors (JRA, GW), pp. 225–229.
- DAC-1977-RuehliSG #optimisation
- Analytical power/timing optimization technique for digital system (AER, PKWS, GG), pp. 142–146.
- DAC-1977-Smith77a #automation #design #re-engineering #tutorial
- Software engineering techniques in design automation&madash;a tutorial (RJSI), pp. 495–507.
- STOC-1977-GonnetM #analysis
- The Analysis of an Improved Hashing Technique (GHG, JIM), pp. 113–121.
- DAC-1976-GoldsteinL #optimisation
- Common feature techniques for discrete optimization (AJG, ABL), pp. 232–244.
- DAC-1976-HananSA
- Some experimental results on placement techniques (MH, PKWS, BJA), pp. 214–224.
- DAC-1976-JonesN #assessment #programming
- A quantitative assessment of IBM’s programming productivity techniques (LCJ, DAN), pp. 344–353.
- DAC-1976-Robinson #specification
- Specification techniques (LR), pp. 470–478.
- DAC-1976-RozeboomC #generative #implementation #testing
- An implementation of computer aided test generation techniques (RWR, JJC), pp. 194–202.
- DAC-1976-WilsonS #comparison
- An analytic technique for router comparison (DCW, RJSI), pp. 251–258.
- POPL-1976-LowR #automation #data type
- Techniques for the Automatic Selection of Data Structures (JRL, PR), pp. 58–67.
- ICSE-1976-BensonM #development #evaluation #quality
- A Laboratory for the Development and Evaluation of BMD Software Quality Enhancement Techniques (JPB, RAM), pp. 106–109.
- ICSE-1976-GerhartY #abstraction #backtracking #programming
- Control Structure Abstractions of the Backtracking Programming Technique (Abstract) (SLG, LY), p. 391.
- ICSE-1976-MasheyS #documentation #tool support
- Documentation Tools and Techniques (JRM, DWS), pp. 177–181.
- ICSE-1976-TeichroewH #analysis #documentation #information management #named
- PSL/PSA: A Computer-Aided Technique for Structured Documentation and Analysis of Information Processing Systems (Abstract) (DT, EAHI), p. 2.
- DAC-1975-Bern #experience
- John Hancock’s experience with productivity techniques (NFB), pp. 62–68.
- DAC-1975-BlainLR #industrial
- The system bal: a technique for spreading the use of CAD techniques within an industrial environment (GB, AL, JCR), pp. 77–84.
- DAC-1975-ThompsonB75a #implementation #logic #multi #re-engineering #simulation
- The software engineering technique of data hiding as applied to multi-level model implementation of logical devices in digital simulation (EWT, NB), pp. 195–201.
- DAC-1975-Valle #layout #relational
- Relational data handling techniques in integrated circuit mask layout procedures (GV), pp. 407–413.
- STOC-1975-Fredman #probability #sorting
- Two Applications of a Probabilistic Search Technique: Sorting x + y and Building Balanced Search Trees (MLF), pp. 240–244.
- DAC-1974-DudnikS
- A computer aided land use study technique (EED, WS), pp. 237–247.
- DAC-1974-Rubin
- An iterative technique for printed wire routing (FR), pp. 308–313.
- DAC-1974-Wang #algorithm #clustering
- A partitioning technique for LSI chips including a bunching algorithm (PTW), p. 91.
- DAC-1974-WilsonS #comparison
- An experimental comparison of force directed placement techniques (DCW, RJSI), pp. 194–199.
- SIGFIDET-1974-Whitney #data transformation #implementation #relational
- Relational Data Management Implementation Techniques (VKMW), pp. 321–350.
- ICALP-1974-Lang #nondeterminism #parsing #performance
- Deterministic Techniques for Efficient Non-Deterministic Parsers (BL), pp. 255–269.
- DAC-1973-SzygendaL #functional #logic #simulation
- Integrated techniques for functional and gate-level digital logic simulation (SAS, AAL), pp. 159–172.
- DAC-1972-Grant #architecture #design #problem #proximity #using
- Combining proximity criteria with nature-of-the-spot criteria in architectural and urban design space planning problems using a computer-aided space allocation technique: A proposed technique and an example of its application (DPG), pp. 197–202.
- DAC-1972-MahS
- Techniques of gate assignment (LM, LS), pp. 63–71.
- DAC-1972-UlrichBW #analysis #logic #simulation
- Fault-test analysis techniques based on logic simulation (EGU, TEB, LRW), pp. 111–115.
- SIGFIDET-1972-BachmanB #architecture #process
- Architecture Definition Technique: Its Objectives Theory, Process, Facilities and Practice (CWB, JB), pp. 257–305.
- STOC-1972-AhoU #lr #parsing
- A Technique for Speeding Up LR(k) Parsers (AVA, JDU), pp. 251–263.
- ICALP-1972-WeissMS #algebra #context-free grammar #parsing
- Algebraic Parsing Techniques for Context-Free Languages (SFW, GM, DFS), pp. 493–498.
- DAC-1971-White #layout #named
- RELATE: Relationship layout technique (RNW), p. 221.
- SIGIR-1971-MulfordR #scalability
- Data Compression Techniques for Economic Processing of Large Commercial Files (JEM, RKR), pp. 207–215.
- DAC-1969-Dov #research #simulation
- Misuse and limitations of simulation as a business research technique: Some comments (AGBD), pp. 323–331.
- DAC-1969-Sr #modelling
- Cellular wiring and the cellular modeling technique (RBHS), pp. 25–41.
- DAC-1968-KlemetsmoMW #automation #process
- Graphic display techniques in the automated interconnection process (RRK, GAM, AIW).
- DAC-1967-Malakoff #analysis
- Coupling graphics and circuit analysis techniques (JLM).
- SHARE-1966-Feigin #design #optimisation
- Use of design optimization techniques at Norden (LF).
- SHARE-1965-Fountain #requirements #simulation #testing
- A general computer simulation technique for assessments and testing requirements (JHF).
- SHARE-1965-Morrissey
- System techniques for time-sharing (JHM).