989 papers:
- CASE-2015-DafleMSRR
- A two-phase gripper to reorient and grasp (NCD, MTM, HS, GFR, AR), pp. 1249–1255.
- CASE-2015-QuZJCL #2d
- A MEMS microgripper with two-axis actuators and force sensors for microscale mechanical characterization of soft materials (JQ, WZ, AJ, SSDC, XL), pp. 1620–1625.
- CASE-2015-SaksenaNKK #2d #assembly #automation #parametricity #using
- Automatic tuning of impedance parameter using configuration space for two dimensional assembly system (AS, TN, JK, KK), pp. 1110–1117.
- CASE-2015-ShinarTG #fault tolerance #robust
- Fault-tolerant robust capture zone with respect to two faults (JS, VT, VYG), pp. 1036–1041.
- CASE-2015-SuWCRT #adaptation #fuzzy #learning
- Adaptive PD fuzzy control with dynamic learning rate for two-wheeled balancing six degrees of freedom robotic arm (SFS, KJW, MCC, IJR, CCT), pp. 1258–1261.
- DATE-2015-RustLP #approximate #architecture
- QR-decomposition architecture based on two-variable numeric function approximation (JR, FL, SP), pp. 892–895.
- DATE-2015-RustP #approximate #design #multi
- Design method for multiplier-less two-variable numeric function approximation (JR, SP), pp. 948–953.
- DRR-2015-BideaultMCP #architecture #regular expression #using #word
- Spotting handwritten words and REGEX using a two stage BLSTM-HMM architecture (GB, LM, CC, TP).
- VLDB-2015-ZhouLLZ #graph #named #optimisation #performance
- GraphTwist: Fast Iterative Graph Computation with Two-tier Optimizations (YZ, LL, KL, QZ), pp. 1262–1273.
- ITiCSE-2015-AbidBA #education #refactoring
- Reflections on Teaching Refactoring: A Tale of Two Projects (SA, HAB, NA), pp. 225–230.
- ESOP-2015-FrielinghausPS #interprocedural
- Inter-procedural Two-Variable Herbrand Equalities (SSF, MP, HS), pp. 457–482.
- ICPC-2015-Roehm #comprehension #developer
- Two user perspectives in program comprehension: end users and developer users (TR), pp. 129–139.
- ICSME-2015-BavotaR #code review #quality
- Four eyes are better than two: On the impact of code reviews on software quality (GB, BR), pp. 81–90.
- ICSME-2015-NittaM #abstraction #why
- Delta extraction: An abstraction technique to comprehend why two objects could be related (NN, TM), pp. 61–70.
- MSR-2015-Zacchiroli #dataset #metadata #source code
- The Debsources Dataset: Two Decades of Debian Source Code Metadata (SZ), pp. 466–469.
- SCAM-2015-AivaloglouHH #dataset #scalability #spreadsheet
- A grammar for spreadsheet formulas evaluated on two large datasets (EA, DH, FH), pp. 121–130.
- STOC-2015-HardtP #bound #learning
- Tight Bounds for Learning a Mixture of Two Gaussians (MH, EP), pp. 753–760.
- CIAA-2015-Hulden #automaton #finite #regular expression
- From Two-Way to One-Way Finite Automata — Three Regular Expression-Based Methods (MH), pp. 176–187.
- DLT-2015-BianchiHK #automaton #liveness #on the #problem
- On the Size of Two-Way Reasonable Automata for the Liveness Problem (MPB, JH, IK), pp. 120–131.
- DLT-2015-CzybaST #automaton #finite #infinity #modelling
- Finite Automata Over Infinite Alphabets: Two Models with Transitions for Local Change (CC, CS, WT), pp. 203–214.
- ICALP-v1-2015-CsehHK
- Popular Matchings with Two-Sided Preferences and One-Sided Ties (ÁC, CCH, TK), pp. 367–379.
- ICALP-v1-2015-KawaseKY #graph
- Finding a Path in Group-Labeled Graphs with Two Labels Forbidden (YK, YK, YY), pp. 797–809.
- ICALP-v1-2015-WangW #algorithm #online
- Two-sided Online Bipartite Matching and Vertex Cover: Beating the Greedy Algorithm (YW, SCwW), pp. 1070–1081.
- ICALP-v2-2015-GiannakopoulosK
- Selling Two Goods Optimally (YG, EK), pp. 650–662.
- LATA-2015-AnselmoGM #2d #decidability
- Structure and Measure of a Decidable Class of Two-dimensional Codes (MA, DG, MM), pp. 315–327.
- LATA-2015-GamardR #2d
- Coverability in Two Dimensions (GG, GR), pp. 402–413.
- LATA-2015-HalavaNP #game studies #on the
- On Robot Games of Degree Two (VH, RN, IP), pp. 224–236.
- ICFP-2015-Russo #functional #haskell
- Functional pearl: two can keep a secret, if one of them uses Haskell (AR), pp. 280–288.
- CHI-2015-DittmarH #design
- Two-Level Personas for Nested Design Spaces (AD, MH), pp. 3265–3274.
- CSCW-2015-GaoXHYCF #collaboration #multi
- Two is Better Than One: Improving Multilingual Collaboration by Giving Two Machine Translation Outputs (GG, BX, DCH, ZY, DC, SRF), pp. 852–863.
- DUXU-DD-2015-Fernandez #analysis #health #human-computer #interactive
- Interactive Digital Storytelling and HCI Techniques Applied for Edutainment in Interactive Health Projects: Analysis of Two USC’s Labyrinth Projects (JIMF), pp. 621–633.
- HCI-IT-2015-KinemuchiKY
- Synchronization Between Utterance Rhythm and Body Movement in a Two-Person Greeting (KK, HK, TY), pp. 305–316.
- HCI-IT-2015-SatoAOO #analysis #automation #classification #image
- Automatic Classification Between Involuntary and Two Types of Voluntary Blinks Based on an Image Analysis (HS, KA, SO, MO), pp. 140–149.
- ICEIS-v2-2015-CanutMOPS #algorithm #case study #comparative #empirical #profiling
- A Comparative Study of Two Egocentric-based User Profiling Algorithms — Experiment in Delicious (CMFC, MM, SOa, AP, FS), pp. 632–639.
- ICML-2015-NarasimhanK0 #metric #optimisation #performance
- Optimizing Non-decomposable Performance Measures: A Tale of Two Classes (HN, PK, PJ), pp. 199–208.
- ICML-2015-PerolatSPP #approximate #game studies #markov #programming
- Approximate Dynamic Programming for Two-Player Zero-Sum Markov Games (JP, BS, BP, OP), pp. 1321–1329.
- ICML-2015-WeissN #alias #learning
- Learning Parametric-Output HMMs with Two Aliased States (RW, BN), pp. 635–644.
- RecSys-2015-SahebiB #collaboration
- It Takes Two to Tango: An Exploration of Domain Pairs for Cross-Domain Collaborative Filtering (SS, PB), pp. 131–138.
- SEKE-2015-NetoSZD #network #using
- Using implications from FCA to represent a two mode network data (SMN, MAJS, LEZ, SMD), pp. 256–259.
- ECMFA-2015-RossiniLGN #comparison #modelling #multi
- A Comparison of Two-Level and Multi-level Modelling for Cloud-Based Applications (AR, JdL, EG, NN), pp. 18–32.
- MoDELS-2015-LettnerEGP #case study #experience #feature model #industrial #lessons learnt #modelling #scalability
- Feature modeling of two large-scale industrial software systems: Experiences and lessons learned (DL, KE, PG, HP), pp. 386–395.
- ECOOP-2015-VekrisCJ #trust #type system #verification
- Trust, but Verify: Two-Phase Typing for Dynamic Languages (PV, BC, RJ), pp. 52–75.
- POPL-2015-Buneman #database #programming #question
- Databases and Programming: Two Subjects Divided by a Common Language? (PB), p. 487.
- CSL-2015-CartonD #transducer
- Aperiodic Two-way Transducers and FO-Transductions (OC, LD), pp. 160–174.
- CSL-2015-Charatonik0 #linear #logic #order
- Two-variable Logic with Counting and a Linear Order (WC, PW), pp. 631–647.
- CSL-2015-GasconST #polynomial #strict #unification
- Two-Restricted One Context Unification is in Polynomial Time (AG, MSS, AT), pp. 405–422.
- CSL-2015-Paperman #first-order #logic
- Finite-Degree Predicates and Two-Variable First-Order Logic (CP), pp. 616–630.
- ISSTA-2015-WangGMC #android #approach #clone detection #detection #named #scalability
- WuKong: a scalable and accurate two-phase approach to Android app clone detection (HW, YG, ZM, XC), pp. 71–82.
- LICS-2015-BlondinFGHM #2d #reachability
- Reachability in Two-Dimensional Vector Addition Systems with States Is PSPACE-Complete (MB, AF, SG, CH, PM), pp. 32–43.
- LICS-2015-ChatterjeeKK #markov #multi #process
- Unifying Two Views on Multiple Mean-Payoff Objectives in Markov Decision Processes (KC, ZK, JK), pp. 244–256.
- LICS-2015-KrebsV #bound #logic #refinement
- Universal Covers, Color Refinement, and Two-Variable Counting Logic: Lower Bounds for the Depth (AK, OV), pp. 689–700.
- LICS-2015-Place #quantifier #regular expression
- Separating Regular Languages with Two Quantifiers Alternations (TP), pp. 202–213.
- RTA-2015-KotsireasKS #design #equation #orthogonal #unification
- Constructing Orthogonal Designs in Powers of Two: Gröbner Bases Meet Equational Unification (ISK, TK, DES), pp. 241–256.
- WICSA-2014-JavedZ #architecture #comprehension #traceability
- The Supportive Effect of Traceability Links in Architecture-Level Software Understanding: Two Controlled Experiments (MAJ, UZ), pp. 215–224.
- CASE-2014-AfaghaniA #concurrent #online
- Advanced-collision-map-based on-line collision and deadlock avoidance between two robot manipulators with PTP commands (AYA, YA), pp. 1244–1251.
- CASE-2014-TrikiGX #approach #health
- A two-phase approach for periodic home health care planning (NT, TG, XX), pp. 518–523.
- CASE-2014-YangWQZ #clustering #multi #scheduling #tool support
- Optimal scheduling of single-arm multi-cluster tools with two-space buffering modules (FY, NW, YQ, MZ), pp. 75–80.
- DAC-2014-DengBZW #performance
- An Efficient Two-level DC Operating Points Finder for Transistor Circuits (JD, KB, YZ, NW), p. 6.
- DATE-2014-KimKKYL #design
- Coarse-grained Bubble Razor to exploit the potential of two-phase transparent latch designs (HK, DK, JJK, SY, SL), pp. 1–6.
- DATE-2014-MullerM #scheduling
- The schedulability region of two-level mixed-criticality systems based on EDF-VD (DM, AM), pp. 1–6.
- DocEng-2014-SouzaMH #metadata #named #using
- ARCTIC: metadata extraction from scientific papers in pdf using two-layer CRF (AS, VPM, CAH), pp. 121–130.
- DRR-2014-HajiABSP #approach #documentation #keyword
- Two-stage approach to keyword spotting in handwritten documents (MMH, MRA, TDB, CYS, DP), p. ?–12.
- HT-2014-ChengKWT #architecture #distributed #memory management #performance #rdf #scalability
- A two-tier index architecture for fast processing large RDF data over distributed memory (LC, SK, TEW, GT), pp. 300–302.
- ESOP-2014-MangalNY #analysis #interprocedural
- A Correspondence between Two Approaches to Interprocedural Analysis in the Presence of Join (RM, MN, HY), pp. 513–533.
- ICPC-2014-ShahinLL #architecture #comprehension #design
- Do architectural design decisions improve the understanding of software architecture? two controlled experiments (MS, PL, ZL), pp. 3–13.
- DLT-J-2013-AnselmoGM14 #2d #decidability
- Prefix Picture codes: a Decidable class of Two-Dimensional codes (MA, DG, MM), pp. 1017–1032.
- AFL-2014-BarashO
- Grammars with two-sided contexts (MB, AO), pp. 94–108.
- AFL-2014-CarninoL #ambiguity #automaton #on the
- On Determinism and Unambiguity of Weighted Two-way Automata (VC, SL), pp. 188–200.
- CIAA-2014-BiasiY #automaton
- Unary Languages Recognized by Two-Way One-Counter Automata (MDB, AY), pp. 148–161.
- CIAA-2014-GusevP #automaton
- Reset Thresholds of Automata with Two Cycle Lengths (VVG, EVP), pp. 200–210.
- DLT-2014-Berlinkov #algorithm #automaton #on the #problem
- On Two Algorithmic Problems about Synchronizing Automata — (Short Paper) (MVB), pp. 61–67.
- DLT-2014-BrzozowskiS #bound #complexity
- Upper Bounds on Syntactic Complexity of Left and Two-Sided Ideals (JAB, MS), pp. 13–24.
- ICALP-v1-2014-BjorklundH #polynomial
- Shortest Two Disjoint Paths in Polynomial Time (AB, TH), pp. 211–222.
- ICALP-v2-2014-CooperER #distributed #power of
- The Power of Two Choices in Distributed Voting (CC, RE, TR), pp. 435–446.
- LATA-2014-BednarovaG #automaton
- Two Double-Exponential Gaps for Automata with a Limited Pushdown (ZB, VG), pp. 113–125.
- LATA-2014-OttoM #automaton #order
- Extended Two-Way Ordered Restarting Automata for Picture Languages (FO, FM), pp. 541–552.
- SEFM-2014-DeganoFG #adaptation #reliability #static analysis
- A Two-Phase Static Analysis for Reliable Adaptation (PD, GLF, LG), pp. 347–362.
- CHI-2014-LiuGFXHK #analysis
- CHI 1994-2013: mapping two decades of intellectual progress through co-word analysis (YL, JG, DF, BX, SH, VK), pp. 3553–3562.
- CHI-2014-NgBW #interactive #mobile
- Investigating the effects of encumbrance on one- and two- handed interactions with mobile devices (AN, SAB, JHW), pp. 1981–1990.
- CHI-2014-SoloveyZPRM #performance #using
- Classifying driver workload using physiological and driving performance data: two field studies (ETS, MZ, EAGP, BR, BM), pp. 4057–4066.
- CHI-2014-TsandilasABB #coordination
- Coordination of tilt and touch in one- and two-handed use (TT, CA, AB, DB), pp. 2001–2004.
- CHI-2014-XuGFC
- Improving machine translation by showing two outputs (BX, GG, SRF, DC), pp. 3743–3746.
- CHI-2014-ZaczynskiW #design #game studies #guidelines #interactive
- Establishing design guidelines in interactive exercise gaming: preliminary data from two posing studies (MZ, ADW), pp. 1875–1884.
- DUXU-TMT-2014-SchmuntzschF #design #how #smarttech
- How Two become One — Creating Synergy Effects by Applying the Joint Interview Method to Design Wearable Technology (US, LHF), pp. 173–184.
- HIMI-AS-2014-Coelho #analysis
- Association of CCR and BCC Efficiencies to Market Variables in a Retrospective Two Stage Data Envelope Analysis (DAC), pp. 151–159.
- HIMI-DE-2014-KaramT #gesture #interactive #symmetry
- Two-Handed Interactive Menu: An Application of Asymmetric Bimanual Gestures and Depth Based Selection Techniques (HK, JT), pp. 187–198.
- HIMI-DE-2014-Rodriguez #algorithm #image #matlab #predict
- Prediction or Guess? Decide by Looking at Two Images Generated by a “MATLAB MySQL” Algorithm (CR0), pp. 87–97.
- CIKM-2014-LiuWZNZM #web
- From Skimming to Reading: A Two-stage Examination Model for Web Search (YL, CW, KZ, JYN, MZ, SM), pp. 849–858.
- ECIR-2014-HuangDHL #approach
- A Two-level Approach for Subtitle Alignment (JH, HD, XH, YL), pp. 468–473.
- ICML-c2-2014-WangSSMK #learning #metric
- Two-Stage Metric Learning (JW, KS, FS, SMM, AK), pp. 370–378.
- ICPR-2014-DuanHZCZ #image #segmentation #using
- A Two-Stage Image Segmentation Method Using Euler’s Elastica Regularized Mumford-Shah Model (YD, WH, JZ, HC, TZ), pp. 118–123.
- ICPR-2014-HuWSC #detection #framework #robust #using
- Robust Head-Shoulder Detection Using a Two-Stage Cascade Framework (RH, RW, SS, XC), pp. 2796–2801.
- ICPR-2014-ItohIS #2d #image #linear #using
- Two-Dimensional Global Image Registration Using Local Linear Property of Image Manifold (HI, AI, TS), pp. 3862–3867.
- ICPR-2014-OnoKKF #2d #automation #recognition #robust
- A Two-Dimensional Barcode with Robust Decoding against Distortion and Occlusion for Automatic Recognition of Garbage Bags (SO, YK, HK, SF), pp. 2879–2884.
- ICPR-2014-RingLRE #assessment #using
- A Two-Stage Regression Using Bioimpedance and Temperature for Hydration Assessment During Sports (MR, CL, MR, BE), pp. 4519–4524.
- ICPR-2014-TouaziMB #feature model #game studies
- Feature Selection Scheme Based on Zero-Sum Two-Player Game (AT, FM, DB), pp. 1342–1347.
- ICPR-2014-YuCK #distance #recognition #set #using
- Pill Recognition Using Imprint Information by Two-Step Sampling Distance Sets (JY, ZC, SiK), pp. 3156–3161.
- KDIR-2014-MeguebliKDP14a #personalisation #recommendation
- Stories Around You — A Two-Stage Personalized News Recommendation (YM, MK, BLD, FP), pp. 473–479.
- KDIR-2014-SuciuICDP #learning #word
- Learning Good Opinions from Just Two Words Is Not Bad (DAS, VVI, ACC, MD, RP), pp. 233–241.
- SEKE-2014-GaoKN #estimation #learning #quality #ranking
- Comparing Two Approaches for Adding Feature Ranking to Sampled Ensemble Learning for Software Quality Estimation (KG, TMK, AN), pp. 280–285.
- SEKE-2014-SantosM #detection #identification
- Identifying strategies on god class detection in two controlled experiments (JAMS, MGM), pp. 244–249.
- SEKE-2014-XuL14a #ontology #reasoning #semantics #using
- Two-Level Smart Search Engine Using Ontology-Based Semantic Reasoning (HX, AL), pp. 648–652.
- SIGIR-2014-LiDWDCZ #2d #query
- A two-dimensional click model for query auto-completion (YL, AD, HW, HD, YC, CZ), pp. 455–464.
- PADL-2014-SonPL #multi #prolog #source code
- Two Applications of the ASP-Prolog System: Decomposable Programs and Multi-context Systems (TCS, EP, TL), pp. 87–103.
- SAC-2014-SwamyIG #2d #image
- Two level reversible data hiding in 2D images (NRS, SI, PG), pp. 58–59.
- ICSE-2014-StolF #case study #crowdsourcing #development
- Two’s company, three’s a crowd: a case study of crowdsourcing software development (KJS, BF), pp. 187–198.
- CC-2014-FranzHKSV #c #compilation #named
- CBMC-GC: An ANSI C Compiler for Secure Two-Party Computations (MF, AH, SK, CS, HV), pp. 244–249.
- CAV-2014-HadareanBJBT #lazy evaluation
- A Tale of Two Solvers: Eager and Lazy Approaches to Bit-Vectors (LH, KB, DJ, CB, CT), pp. 680–695.
- LICS-CSL-2014-BlumensathCKPB #automaton #infinity #logic
- Two-way cost automata and cost logics over infinite trees (AB, TC, DK, PP, MVB), p. 9.
- LICS-CSL-2014-DemriD #logic
- Expressive completeness of separation logic with two variables and no separating conjunction (SD, MD), p. 10.
- CASE-2013-SunSZS #approach #optimisation
- A two-stage approach for VMAT treatment plan optimization (BS, JS, GZ, LS), pp. 455–460.
- CASE-2013-WangJLC #capacity #policy
- Integrated capacity allocation policies for a production service system with two-class customers and items (KW, ZJ, GL, JC), pp. 83–88.
- CASE-2013-ZhuGX #scheduling
- MDP-based appointment scheduling for one examination of two types of outpatients (LZ, NG, XX), pp. 764–769.
- DATE-2013-ChenL #2d #architecture #data access #memory management
- Dual-addressing memory architecture for two-dimensional memory access patterns (YHC, YYL), pp. 71–76.
- DATE-2013-Mueller-GritschnederLWGS #case study #framework #prototype #realtime
- A virtual prototyping platform for real-time systems with a case study for a two-wheeled robot (DMG, KL, EW, MG, US), pp. 1331–1334.
- ICDAR-2013-TarafdarPRRR #approach #documentation #visual notation #word
- A Two-Stage Approach for Word Spotting in Graphical Documents (AT, UP, PPR, NR, JYR), pp. 319–323.
- VLDB-2014-KaulWYJ13
- Finding Shortest Paths on Terrains by Killing Two Birds with One Stone (MK, RCWW, BY, CSJ), pp. 73–84.
- ITiCSE-2013-BillingsleyS #comparison #integration
- A comparison of two iterations of a software studio course based on continuous integration (WB, JS), pp. 213–218.
- DLT-J-2012-HromkovicKKS13 #automaton #logic #nondeterminism #representation
- Determinism vs. Nondeterminism for Two-Way Automata: Representing the Meaning of States by Logical Formulæ (JH, RK, RK, RS), pp. 955–978.
- CIAA-2013-GrathwohlHNR #parsing #regular expression
- Two-Pass Greedy Regular Expression Parsing (NBBG, FH, LN, UTR), pp. 60–71.
- CIAA-2013-PrusaMO #2d #automaton
- Comparing Two-Dimensional One-Marker Automata to Sgraffito Automata (DP, FM, FO), pp. 268–279.
- DLT-2013-AnselmoGM #2d
- Two Dimensional Prefix Codes of Pictures (MA, DG, MM), pp. 46–57.
- DLT-2013-Pin #regular expression
- An Explicit Formula for the Intersection of Two Polynomials of Regular Languages (JÉP), pp. 31–45.
- ICALP-v1-2013-DemainePRSSW #assembly
- The Two-Handed Tile Assembly Model Is Not Intrinsically Universal (EDD, MJP, TAR, RTS, SMS, DW), pp. 400–412.
- ICALP-v1-2013-KonradR #approximate #communication #streaming
- Approximating Semi-matchings in Streaming and in Two-Party Communication (CK, AR), pp. 637–649.
- ICALP-v2-2013-BenaimBCKLMW #complexity #finite #logic
- Complexity of Two-Variable Logic on Finite Trees (SB, MB, WC, EK, RL, FM, JW), pp. 74–88.
- ICALP-v2-2013-FearnleyJ #automaton #reachability
- Reachability in Two-Clock Timed Automata Is PSPACE-Complete (JF, MJ), pp. 212–223.
- LATA-2013-ChamparnaudDJM #regular expression
- Two-Sided Derivatives for Regular Expressions and for Hairpin Expressions (JMC, JPD, HJ, LM), pp. 202–213.
- LATA-2013-Souza #transducer
- Uniformisation of Two-Way Transducers (RdS), pp. 547–558.
- CHI-2013-DruckerFSHs #case study #data analysis #interface #named
- TouchViz: a case study comparing two interfaces for data analytics on tablets (SMD, DF, RS, JH, MMCS), pp. 2301–2310.
- CHI-2013-OulasvirtaRLZBVK
- Improving two-thumb text entry on touchscreen devices (AO, AR, WL, YZ, MB, KV, POK), pp. 2765–2774.
- DHM-HB-2013-BotterBCKME
- The Biomechanical and Physiological Effect of Two Dynamic Workstations (JB, EMB, DC, RK, SHvM, RPE), pp. 196–204.
- DUXU-CXC-2013-Chang #evaluation #segmentation #usability
- Usability Evaluation of Two Chinese Segmentation Methods in Subtitles to Scaffold Chinese Novice (CKC), pp. 28–37.
- DUXU-CXC-2013-MenardKD #behaviour #image #online
- Two Solitudes Revisited: A Cross-Cultural Exploration of Online Image Searcher’s Behaviors (EM, NK, JD), pp. 79–88.
- DUXU-NTE-2013-Schieder
- Merging Two Worlds Together (AS), pp. 199–204.
- HCI-AS-2013-AndujarEGM #learning
- Evaluating Engagement Physiologically and Knowledge Retention Subjectively through Two Different Learning Techniques (MA, JIE, JEG, PM), pp. 335–342.
- HCI-IMT-2013-EbisawaF #detection #using #video
- Head-Free, Remote Gaze Detection System Based on Pupil-Corneal Reflection Method with Using Two Video Cameras — One-Point and Nonlinear Calibrations (YE, KF), pp. 205–214.
- HCI-IMT-2013-GalatasPM #artificial reality #distance #multi #recognition #robust #speech #video
- Robust Multi-Modal Speech Recognition in Two Languages Utilizing Video and Distance Information from the Kinect (GG, GP, FM), pp. 43–48.
- HCI-IMT-2013-SchwallerBL #gesture #human-computer
- Two Handed Mid-Air Gestural HCI: Point + Command (MS, SB, DL), pp. 388–397.
- HIMI-D-2013-KoedaKN #estimation
- Relative Position Calibration between Two Haptic Devices Based on Minimum Variance Estimation (MK, YK, HN), pp. 72–79.
- CIKM-2013-BarahmandGY #comparison #design #interactive #network #physics #social
- A comparison of two physical data designs for interactive social networking actions (SB, SG, JY), pp. 949–958.
- CIKM-2013-BonomiX #algorithm #difference #mining #privacy
- A two-phase algorithm for mining sequential patterns with differential privacy (LB, LX), pp. 269–278.
- ECIR-2013-DangBC #information retrieval #learning #rank
- Two-Stage Learning to Rank for Information Retrieval (VD, MB, WBC), pp. 423–434.
- ICML-c3-2013-HonorioJ #bound #exponential #fault
- Two-Sided Exponential Concentration Bounds for Bayes Error Rate and Shannon Entropy (JH, TSJ), pp. 459–467.
- MLDM-2013-BijaksanaLA #classification
- A Pattern Based Two-Stage Text Classifier (MAB, YL, AA), pp. 169–182.
- SEKE-2013-HansenM #analysis #ecosystem #network #towards
- Towards a Network Ecology of Software Ecosystems: an Analysis of two OSGi Ecosystems (KMH, KM), pp. 326–331.
- SIGIR-2013-RossiMCS #performance #query #using
- Fast document-at-a-time query processing using two-tier indexes (CR, ESdM, ALC, ASdS), pp. 183–192.
- POPL-2013-UpadrastaC #scheduling #using
- Sub-polyhedral scheduling using (unit-)two-variable-per-inequality polyhedra (RU, AC), pp. 483–496.
- SAC-2013-BhattacharjeeJ #algorithm #named #repository #scalability #similarity
- CodeBlast: a two-stage algorithm for improved program similarity matching in large software repositories (AB, HMJ), pp. 846–852.
- SAC-2013-LeitaoC #adaptation #detection #optimisation #performance #using #xml
- Efficient XML duplicate detection using an adaptive two-level optimization (LL, PC), pp. 832–837.
- ICSE-2013-Kukreja #approach #requirements #towards
- Decision theoretic requirements prioritization: a two-step approach for sliding towards value realization (NK), pp. 1465–1467.
- HPCA-2013-BonannoCLMPS #branch #predict
- Two level bulk preload branch prediction (JB, AC, DL, UM, BP, AS), pp. 71–82.
- LCTES-2013-MehiaouiWPMNZBLG #clustering #distributed #optimisation
- A two-step optimization technique for functions placement, partitioning, and priority assignment in distributed systems (AM, EW, STP, CM, MDN, HZ, JPB, LL, SG), pp. 121–132.
- CSL-2013-ManuelZ #2d #logic
- Two-Variable Logic on 2-Dimensional Structures (AM, TZ), pp. 484–499.
- LICS-2013-CharatonikW #logic
- Two-Variable Logic with Counting and Trees (WC, PW), pp. 73–82.
- LICS-2013-FiliotGRS #finite #transducer
- From Two-Way to One-Way Finite State Transducers (EF, OG, PAR, FS), pp. 468–477.
- VMCAI-2013-ZhengS0LD0 #network #partial order #reduction #using
- State Space Reduction for Sensor Networks Using Two-Level Partial Order Reduction (MZ, DS, JS, YL, JSD, YG), pp. 515–535.
- CASE-2012-CostantinoDEFS #analysis #evaluation #fuzzy #novel #performance
- A novel fuzzy Data Envelopment Analysis methodology for performance evaluation in a two-stage supply chain (NC, MD, NE, MF, FS), pp. 974–979.
- CASE-2012-HanXZLW #concurrent #policy
- Two-stage deadlock prevention policy based on resource-transition circuits (LH, KX, MZ, HL, FW), pp. 741–746.
- CASE-2012-TonkeL #clustering #independence #scheduling
- Scheduling of a dual-armed cluster tool with two independent robot arms (DT, TEL), pp. 200–205.
- VLDB-2012-AlyAO #query
- Spatial Queries with Two kNN Predicates (AMA, WGA, MO), pp. 1100–1111.
- VLDB-2012-GuanYK #correlation #graph
- Measuring Two-Event Structural Correlations on Graphs (ZG, XY, LMK), pp. 1400–1411.
- MSR-2012-BirdN #development #distributed #open source #scalability #what
- Who? Where? What? Examining distributed development in two large open source projects (CB, NN), pp. 237–246.
- MSR-2012-SouzaC #debugging #ide #open source #verification
- Characterizing verification of bug fixes in two open source IDEs (RS, CC), pp. 70–73.
- AFL-J-2011-IbarraS12 #bound #linear
- Characterizations of Bounded semilinear Languages by One-Way and Two-Way Deterministic Machines (OHI, SS), pp. 1291–1306.
- DLT-J-2011-ZhengQL12 #automaton #finite #quantum
- Some Languages Recognized by Two-Way Finite Automata with Quantum and Classical States (SZ, DQ, LL), pp. 1117–1130.
- DLT-2012-Carton #transducer
- Two-Way Transducers with a Two-Way Output Tape (OC), pp. 263–272.
- DLT-2012-HromkovicKKS #automaton #logic #nondeterminism #representation
- Determinism vs. Nondeterminism for Two-Way Automata — Representing the Meaning of States by Logical Formulæ (JH, RK, RK, RS), pp. 24–39.
- DLT-2012-PrusaM #2d #automaton
- Two-Dimensional Sgraffito Automata (DP, FM), pp. 251–262.
- ICALP-v2-2012-OngT #game studies #recursion #semantics
- Two-Level Game Semantics, Intersection Types, and Recursion Schemes (CHLO, TT), pp. 325–336.
- LATA-2012-GeffertGP #automaton
- Two-Way Automata Making Choices Only at the Endmarkers (VG, BG, GP), pp. 264–276.
- LATA-2012-KaraST #automaton #logic #word
- Feasible Automata for Two-Variable Logic with Successor on Data Words (AK, TS, TT), pp. 351–362.
- CHI-2012-HarrisonH #2d #interactive #using
- Using shear as a supplemental two-dimensional input channel for rich touchscreen interaction (CH, SEH), pp. 3149–3152.
- CHI-2012-TeradaYI #adaptation #game studies
- Experimental investigation of human adaptation to change in agent’s strategy through a competitive two-player game (KT, SY, AI), pp. 2807–2810.
- CIKM-2012-AsadiL #documentation #generative #performance #ranking
- Fast candidate generation for two-phase document ranking: postings list intersection with bloom filters (NA, JL), pp. 2419–2422.
- CIKM-2012-DeepakVWS #documentation #segmentation
- Two-part segmentation of text documents (PD, KV, NW, SS), pp. 793–802.
- CIKM-2012-KurlandRS #clustering #predict #ranking
- Query-performance prediction and cluster ranking: two sides of the same coin (OK, FR, AS), pp. 2459–2462.
- ICML-2012-BootsG #identification #problem
- Two Manifold Problems with Applications to Nonlinear System Identification (BB, GJG), p. 8.
- ICML-2012-KumarNKD #classification #framework #kernel #learning #multi
- A Binary Classification Framework for Two-Stage Multiple Kernel Learning (AK, ANM, KK, HDI), p. 173.
- ICML-2012-NanCLC #optimisation
- Optimizing F-measure: A Tale of Two Approaches (NY, KMAC, WSL, HLC), p. 202.
- ICPR-2012-BoresB #monitoring #process
- Urban traffic monitoring from aerial LIDAR data with a Two-Level Marked Point Process model (AB, CB), pp. 1379–1382.
- ICPR-2012-JetleyBKN #documentation #hybrid #image #segmentation
- Two-stage hybrid binarization around fringe map based text line segmentation for document images (SJ, SB, VKK, AN), pp. 343–346.
- ICPR-2012-MaLWZH #authentication #multimodal #security
- Enhancing biometric security with wavelet quantization watermarking based two-stage multimodal authentication (BM, CL, YW, ZZ, DH), pp. 2416–2419.
- ICPR-2012-MurataS #optimisation
- Optimizing a triangular mesh by separately dealing with incorrectness of two patches (KM, YS), pp. 1318–1321.
- ICPR-2012-YeKC #classification #multi
- Combining general multi-class and specific two-class classifiers for improved customized ECG heartbeat classification (CY, BVKVK, MTC), pp. 2428–2431.
- KDD-2012-Davidson #clustering #comprehension #constraints
- Two approaches to understanding when constraints help clustering (ID), pp. 1312–1320.
- SEKE-2012-DingS #architecture #collaboration #mobile #using
- Proactive Two Way Mobile Advertisement Using a Collaborative Client Server Architecture (WD, XS), pp. 768–773.
- SEKE-2012-LobatoMNAM #risk management #synthesis
- Synthesizing Evidence on Risk Management: A Narrative Synthesis of two Mapping Studies (LLL, IdCM, PAdMSN, ESdA, SRdLM), pp. 641–646.
- REFSQ-2012-EngelsmanW #architecture #case study #enterprise #lessons learnt #requirements
- Goal-Oriented Requirements Engineering and Enterprise Architecture: Two Case Studies and Some Lessons Learned (WE, RW), pp. 306–320.
- SAC-2012-BromanFHA #comparison #domain-specific language #implementation
- A comparison of two metacompilation approaches to implementing a complex domain-specific language (DB, PF, GH, JÅ), pp. 1919–1921.
- SAC-2012-ChenNX #collaboration #recommendation
- A common neighbour based two-way collaborative recommendation method (LC, RN, YX), pp. 214–215.
- SAC-2012-ChiwiacowskyGMVG #algorithm #search-based
- A two-level procedure based on genetic algorithms to optimize an aeronautical composite structure (LDC, PG, RM, HFdCV, ATG), pp. 259–260.
- SAC-2012-SenarathneW #approach #coordination #multi
- A two-level approach for multi-robot coordinated exploration of unstructured environments (PGCNS, DW), pp. 274–279.
- SAC-2012-ShinC #comparative #evaluation #feedback #requirements #retrieval
- A comparative evaluation of two user feedback techniques for requirements trace retrieval (YS, JCH), pp. 1069–1074.
- SLE-2012-GuizzardiZ #concept #modelling
- A Common Foundational Theory for Bridging Two Levels in Ontology-Driven Conceptual Modeling (GG, VZ), pp. 286–310.
- CSL-2012-KieronskiM #logic #transitive
- Two-Variable Universal Logic with Transitive Closure (EK, JM), pp. 396–410.
- ICLP-2012-Lifschitz #logic programming #source code
- Two-Valued Logic Programs (VL), pp. 259–266.
- ICST-2012-Runeson #case study #collaboration #experience #industrial
- It Takes Two to Tango — An Experience Report on Industry — Academia Collaboration (PR), pp. 872–877.
- LICS-2012-KieronskiMPT #equivalence #first-order #logic
- Two-Variable First-Order Logic with Equivalence Closure (EK, JM, IPH, LT), pp. 431–440.
- DATE-2011-KeezerG #synthesis
- Two methods for 24 Gbps test signal synthesis (DCK, CEG), pp. 579–582.
- DRR-2011-RamirezO
- OMR of early plainchant manuscripts in square notation: a two-stage system (CR, JO), pp. 1–10.
- ICDAR-2011-AlvaroSB #2d #context-free grammar #probability #recognition #using
- Recognition of Printed Mathematical Expressions Using Two-Dimensional Stochastic Context-Free Grammars (FA, JAS, JMB), pp. 1225–1229.
- ICDAR-2011-GaoWJ #2d #optimisation #recognition
- A New Feature Optimization Method Based on Two-Directional 2DLDA for Handwritten Chinese Character Recognition (XG, WW, LJ), pp. 232–236.
- ICDAR-2011-ShaoWXZZ #distance
- Modified Two-Class LDA Based Compound Distance for Similar Handwritten Chinese Characters Discrimination (YS, CW, BX, RZ, LZ), pp. 653–657.
- PODS-2011-ShengT11b #2d #memory management #orthogonal
- New results on two-dimensional orthogonal range aggregation in external memory (CS, YT), pp. 129–139.
- VLDB-2011-GrosseLWFL #in memory
- Bridging Two Worlds with RICE Integrating R into the SAP In-Memory Computing Engine (PG, WL, TW, FF, WSL), pp. 1307–1317.
- ITiCSE-2011-Goldweber #learning #process #turing machine
- Two kinesthetic learning activities: turing machines and basic computer organization (MG), p. 335.
- CSMR-2011-AbbesKGA #comprehension #empirical
- An Empirical Study of the Impact of Two Antipatterns, Blob and Spaghetti Code, on Program Comprehension (MA, FK, YGG, GA), pp. 181–190.
- CSMR-2011-LeottaRRA #architecture #maintenance
- Comparing the Maintainability of Two Alternative Architectures of a Postal System: SOA vs. Non-SOA (ML, FR, GR, EA), pp. 317–320.
- ICPC-2011-Soh #comprehension
- Context and Vision: Studying Two Factors Impacting Program Comprehension (ZS), pp. 258–261.
- MSR-2011-BaysalDG
- A Tale of Two Browsers (OB, IJD, MWG), pp. 238–241.
- MSR-2011-GermanD #challenge #source code
- Apples vs. oranges?: an exploration of the challenges of comparing the source code of two software systems (DMG, JD), pp. 246–249.
- WCRE-2011-GravinoRST #comprehension #design pattern #documentation #source code
- Does the Documentation of Design Pattern Instances Impact on Source Code Comprehension? Results from Two Controlled Experiments (CG, MR, GS, GT), pp. 67–76.
- STOC-2011-KawarabayashiK #algorithm #approximate #problem
- Breaking o(n1/2)-approximation algorithms for the edge-disjoint paths problem with congestion two (KiK, YK), pp. 81–88.
- STOC-2011-ZewiB #approximate
- From affine to two-source extractors via approximate duality (NZ, EBS), pp. 177–186.
- CIAA-J-2010-CuiGKY11 #complexity
- State Complexity of Two Combined Operations: Catenation-Union and Catenation-Intersection (BC, YG, LK, SY), pp. 1797–1812.
- CIAA-J-2010-KufleitnerL11 #automaton #order
- Partially Ordered Two-Way BüChi Automata (MK, AL), pp. 1861–1876.
- AFL-2011-IbarraS #bound #linear
- Characterizations of Bounded Semilinear Languages by One-Way and Two-way Deterministic Machines (OHI, SS), pp. 211–224.
- AFL-2011-Umeo #2d #algorithm #automaton #implementation
- Recent Developments in Firing Squad Synchronization Algorithms for Two-Dimensional Cellular Automata and Their State-Efficient Implementations (HU), pp. 368–387.
- CIAA-2011-PajicPP #approach #finite #information management #transducer
- Information Extraction from Semi-structured Resources: A Two-Phase Finite State Transducers Approach (VP, GPL, MP), pp. 282–289.
- DLT-2011-CeceG #2d #automaton #online #simulation
- Simulations over Two-Dimensional On-Line Tessellation Automata (GC, AG), pp. 141–152.
- DLT-2011-IbarraY #on the #transducer
- On Two-Way Transducers (OHI, HCY), pp. 300–311.
- DLT-2011-KuncO #automaton #finite #using
- Describing Periodicity in Two-Way Deterministic Finite Automata Using Transformation Semigroups (MK, AO), pp. 324–336.
- ICALP-v1-2011-AllenderW #algebra #branch #on the #power of #source code
- On the Power of Algebraic Branching Programs of Width Two (EA, FW), pp. 736–747.
- CHI-2011-HazlewoodSC #case study
- Issues in evaluating ambient displays in the wild: two case studies (WRH, ES, KC), pp. 877–886.
- CHI-2011-KellyG #interactive
- An examination of two delivery modes for interactive search system experiments: remote and laboratory (DK, KG), pp. 1531–1540.
- CHI-2011-WobbrockJS #2d #fault #modelling #predict
- Modeling and predicting pointing errors in two dimensions (JOW, AJ, KS), pp. 1653–1656.
- CSCW-2011-JiangGH #3d #case study #video
- The video of Xland: two core use cases of 3D blog (YJ, RG, YH), pp. 583–584.
- CSCW-2011-MunsonRR #twitter
- Thanks and tweets: comparing two public displays (SAM, ER, PR), pp. 331–340.
- CSCW-2011-TangCDRSH #facebook #self
- A tale of two languages: strategic self-disclosure via language selection on facebook (DT, TC, ND, AR, WCS, JTH), pp. 387–390.
- DHM-2011-NeumannD #empirical #visual notation
- The Two-Point Visual Control Model of Steering — New Empirical Evidence (HN, BD), pp. 493–502.
- DHM-2011-QinTD #type system #using
- The Upper Extremity Loading during Typing Using One, Two and Three Fingers (JQ, MT, JTD), pp. 178–185.
- HCI-DDA-2011-AlTaboliL #design #interface #metric #visual notation
- Objective and Subjective Measures of Visual Aesthetics of Website Interface Design: The Two Sides of the Coin (AA, YL), pp. 35–44.
- HCI-ITE-2011-LinD #modelling #verification
- Verification of Two Models of Ballistic Movements (JFL, CGD), pp. 275–284.
- AdaEurope-2011-CarnevaliLPV #approach #design #formal method #scheduling #verification
- A Formal Approach to Design and Verification of Two-Level Hierarchical Scheduling Systems (LC, GL, AP, EV), pp. 118–131.
- CIKM-2011-DasSF #documentation #modelling
- Simultaneous joint and conditional modeling of documents tagged from two perspectives (PD, RKS, YF), pp. 1353–1362.
- CIKM-2011-MaLL #using
- Selecting related terms in query-logs using two-stage SimRank (YM, HL, YL), pp. 1969–1972.
- CIKM-2011-NavigliFSLA #ambiguity #categorisation #learning #modelling #semantics #word
- Two birds with one stone: learning semantic models for text categorization and word sense disambiguation (RN, SF, AS, OLdL, EA), pp. 2317–2320.
- CIKM-2011-RamanJS #learning #ranking
- Structured learning of two-level dynamic rankings (KR, TJ, PS), pp. 291–296.
- ECIR-2011-ArampatzisZC #database #image #multimodal #retrieval #scalability
- Dynamic Two-Stage Image Retrieval from Large Multimodal Databases (AA, KZ, SAC), pp. 326–337.
- ECIR-2011-ArampatzisZC11a #multimodal #retrieval
- Fusion vs. Two-Stage for Multimodal Retrieval (AA, KZ, SAC), pp. 759–762.
- KDD-2011-AchlioptasSB
- Two-locus association mapping in subquadratic time (PA, BS, KMB), pp. 726–734.
- KDD-2011-BoleyLPG #performance #random
- Direct local pattern sampling by efficient two-step random procedures (MB, CL, DP, TG), pp. 582–590.
- KDIR-2011-ArmengolP #case study #classification #information management #lazy evaluation #learning
- Combining Two Lazy Learning Methods for Classification and Knowledge Discovery — A Case Study for Malignant Melanoma Diagnosis (EA, SP), pp. 200–207.
- KDIR-2011-SethCRSB #analysis #query #similarity
- A Tale of Two (Similar) Cities — Inferring City Similarity through Geo-spatial Query Log Analysis (RS, MC, DR, DS, SB), pp. 179–189.
- KEOD-2011-IshakLA #approach #learning #modelling #ontology #probability #visual notation
- A Two-way Approach for Probabilistic Graphical Models Structure Learning and Ontology Enrichment (MBI, PL, NBA), pp. 189–194.
- KEOD-2011-SchmidtKL #automation #documentation #domain-specific language
- Domain Specific Language in Technical Solution Documents — Discussion of Two Approaches to Improve the Semi-automated Annotation (HXS, AK, UL), pp. 159–166.
- SIGIR-2011-ChatzichristofisZA #image #multimodal #retrieval
- Bag-of-visual-words vs global image descriptors on two-stage multimodal retrieval (SAC, KZ, AA), pp. 1251–1252.
- SIGIR-2011-LiWLKP #named #personalisation #recommendation #scalability
- SCENE: a scalable two-stage personalized news recommendation system (LL, DW, TL, DK, BP), pp. 125–134.
- SIGIR-2011-WengLCZZYZ #approach #documentation #query #retrieval
- Query by document via a decomposition-based two-level retrieval approach (LW, ZL, RC, YZ, YZ, LTY, LZ), pp. 505–514.
- MoDELS-2011-ReggioRSCD #modelling #precise #process
- A Precise Style for Business Process Modelling: Results from Two Controlled Experiments (GR, FR, GS, FDC, GD), pp. 138–152.
- MoDELS-2011-ReggioRSCD #modelling #precise #process
- A Precise Style for Business Process Modelling: Results from Two Controlled Experiments (GR, FR, GS, FDC, GD), pp. 138–152.
- OOPSLA-2011-BurckhardtLSYB #incremental #parallel
- Two for the price of one: a model for parallel and incremental computation (SB, DL, CS, JY, TB), pp. 427–444.
- PLATEAU-2011-SadowskiK #case study #evaluation #heuristic #parallel #programming language
- Heuristic evaluation of programming language features: two parallel programming case studies (CS, SK), pp. 9–14.
- QAPL-2011-Rutkowski #automaton #game studies
- Two-Player Reachability-Price Games on Single-Clock Timed Automata (MR), pp. 31–46.
- SAC-2011-GafurovBBY #authentication
- Fusion in fingerprint authentication: two finger types vs. two scanner types (DG, CB, PB, BY), pp. 13–18.
- SAC-2011-LiuZ #memory management #predict #realtime
- Exploiting time predictable two-level scratchpad memory for real-time systems (YL, WZ), pp. 395–396.
- SAC-2011-MacielH #commit #protocol #rest
- Extending timestamp-based two phase commit protocol for RESTful services to meet business rules (LAHdSM, CMH), pp. 778–785.
- PPoPP-2011-Ding #concurrent #parallel #programming
- Two examples of parallel programming without concurrency constructs (PP-CC) (CD), pp. 299–300.
- CSL-2011-Kieronski #decidability #linear #logic #order
- Decidability Issues for Two-Variable Logics with Several Linear Orders (EK), pp. 337–351.
- CSL-2011-LoschP #semantics
- Relating Two Semantics of Locally Scoped Names (SL, AMP), pp. 396–411.
- ICLP-2011-Zombori #information retrieval #logic #performance #reasoning
- Two Phase Description Logic Reasoning for Efficient Information Retrieval (ZZ), pp. 296–300.
- LICS-2011-BrazdilBCFK #markov #multi #process
- Two Views on Multiple Mean-Payoff Objectives in Markov Decision Processes (TB, VB, KC, VF, AK), pp. 33–42.
- LICS-2011-Figueira #decidability #logic #word
- A Decidable Two-Way Logic on Data Words (DF), pp. 365–374.
- LICS-2011-KontinenKLV #complexity #dependence #logic
- Complexity of Two-Variable Dependence Logic and IF-Logic (JK, AK, PL, JV), pp. 289–298.
- ASE-2010-BavotaLMO #refactoring
- A two-step technique for extract class refactoring (GB, ADL, AM, RO), pp. 151–154.
- CASE-2010-JingL #assembly #hybrid #scheduling
- A MILP-based batch scheduling for two-stage hybrid flowshop with sequence-dependent setups in semiconductor assembly and test manufacturing (XJ, ZL), pp. 87–92.
- CASE-2010-OuCGWL #energy
- A two-mass cantilever beam model for vibration energy harvesting applications (QO, XC, SG, ARW, NL), pp. 301–306.
- CASE-2010-ZhangWPTCPJ #analysis
- Micro-thermal-fluid transient analysis and active control for two-phase microelectronics cooling (TZ, JTW, YP, TT, JYC, RP, MKJ), pp. 750–755.
- DAC-2010-YanC
- Two-sided single-detour untangling for bus routing (JTY, ZWC), pp. 206–211.
- DocEng-2010-RivaSOMP #metric
- Two new aesthetic measures for item alignment (ADR, AKS, JBSdO, IHM, RFBP), pp. 263–266.
- HT-2010-HsiehPJNS #generative #hypermedia
- Assisting two-way mapping generation in hypermedia workspace (HwH, KP, AJ, GN, FMSI), pp. 99–108.
- VLDB-2010-Martinez-PalauDL
- Two-way Replacement Selection (XMP, DDS, JLLP), pp. 871–881.
- FoSSaCS-2010-AsarinCV #game studies
- Fair Adversaries and Randomization in Two-Player Games (EA, RCYF, DV), pp. 64–78.
- ICSM-2010-Alves #assessment #maintenance
- Assessment of product maintainability for two space domain simulators (TLA), pp. 1–7.
- ICSM-2010-LiSKC #empirical #maintenance
- Cost drivers of software corrective maintenance: An empirical study in two companies (JL, TS, JMWK, RC), pp. 1–8.
- STOC-2010-KalaiMV #learning
- Efficiently learning mixtures of two Gaussians (ATK, AM, GV), pp. 553–562.
- STOC-2010-Sherstov #bound
- Optimal bounds for sign-representing the intersection of two halfspaces by polynomials (AAS), pp. 523–532.
- AFL-J-2008-KlimaP10a
- Literally Idempotent Languages and their Varieties — Two Letter Case (OK, LP), pp. 761–780.
- AFL-J-2008-KutribMO10 #automaton #on the
- On Stateless Two-Pushdown Automata and Restarting Automata (MK, HM, FO), pp. 781–798.
- CIAA-2010-KufleitnerL #automaton #order
- Partially Ordered Two-Way Büchi Automata (MK, AL), pp. 181–190.
- CIAA-2010-KutribM
- Two-Party Watson-Crick Computations (MK, AM), pp. 191–200.
- DLT-2010-GeffertP #automaton
- Two-Way Unary Automata versus Logarithmic Space (VG, GP), pp. 197–208.
- DLT-2010-Giammarresi #2d
- A Brief Excursion Inside the Class of Tiling Recognizable Two-Dimensional Languages (DG), pp. 4–15.
- DLT-2010-LodayaPS
- Around Dot Depth Two (KL, PKP, SSS), pp. 303–315.
- CHI-2010-NakatsumaS #2d #communication #detection #network
- High accuracy position and orientation detection in two-dimensional communication network (KN, HS), pp. 2297–2306.
- CHI-2010-ViewegHSP #microblog #twitter #what
- Microblogging during two natural hazards events: what twitter may contribute to situational awareness (SV, ALH, KS, LP), pp. 1079–1088.
- ICEIS-HCI-2010-Campos #agile #case study #development #interactive
- Agile Development of Interactive Installations — Two Case Studies (PC), pp. 174–179.
- CIKM-2010-Nomoto #detection #similarity
- Two-tier similarity model for story link detection (TN), pp. 789–798.
- CIKM-2010-ZhouLBXL #information management #mining #reasoning #set
- Rough sets based reasoning and pattern mining for a two-stage information filtering system (XZ, YL, PB, YX, RYKL), pp. 1429–1432.
- ICML-2010-CortesMR #algorithm #kernel #learning
- Two-Stage Learning Kernel Algorithms (CC, MM, AR), pp. 239–246.
- ICPR-2010-Chicheva #2d #algorithm #data transformation #parallel #representation
- Parallel Algorithm of Two-Dimensional Discrete Cosine Transform Based on Special Data Representation (MAC), pp. 2326–2328.
- ICPR-2010-CordellaSFMF #classification #performance
- Combining Single Class Features for Improving Performance of a Two Stage Classifier (LPC, CDS, FF, CM, ASdF), pp. 4352–4355.
- ICPR-2010-HarirchiRMDG #algorithm #detection #using
- Two-Level Algorithm for MCs Detection in Mammograms Using Diverse-Adaboost-SVM (FH, PR, HAM, FD, MG), pp. 269–272.
- ICPR-2010-HuCY #estimation #interactive
- Hand Pointing Estimation for Human Computer Interaction Based on Two Orthogonal-Views (KH, SJC, LY), pp. 3760–3763.
- ICPR-2010-WangC #3d #estimation
- 3D Human Pose Estimation by an Annealed Two-Stage Inference Method (YKW, KYC), pp. 535–538.
- KDD-2010-SunCY #approach #reduction #scalability
- A scalable two-stage approach for a class of dimensionality reduction techniques (LS, BC, JY), pp. 313–322.
- KDIR-2010-BartikB #categorisation #documentation #web
- Two-phase Categorization of Web Documents (VB, RB), pp. 458–462.
- KEOD-2010-MurdockBA #ontology
- Two Methods for Evaluating Dynamic Ontologies (JM, CB, CA), pp. 110–122.
- SIGIR-2010-WeerkampBR
- A two-stage model for blog feed search (WW, KB, MdR), pp. 877–878.
- OOPSLA-2010-McCarthy #continuation
- The two-state solution: native and serializable continuations accord (JAM), pp. 567–582.
- PPDP-2010-Barbanerad #behaviour
- Two notions of sub-behaviour for session-based client/server systems (FB, Ud), pp. 155–164.
- RE-2010-EgyedGG #quality
- Effort and Quality of Recovering Requirements-to-Code Traces: Two Exploratory Experiments (AE, FG, PG), pp. 221–230.
- SAC-2010-GuoH #algorithm #clustering
- A two stage yard crane workload partitioning and job sequencing algorithm for container terminals (XG, SYH), pp. 2383–2388.
- SAC-2010-NaceraHAM #ad hoc #clustering #network
- A new two level hierarchy structuring for node partitioning in ad hoc networks (BN, HG, HA, MM), pp. 719–726.
- SAC-2010-PizzolatoAP #architecture #automation #recognition
- Automatic recognition of finger spelling for LIBRAS based on a two-layer architecture (EBP, MdSA, GCP), pp. 969–973.
- ICSE-2010-Kruchten #agile #architecture #development #question
- Software architecture and agile software development: a clash of two cultures? (PK), pp. 497–498.
- LDTA-2010-GiorgettiMTK #case study #java #source code #specification
- Specifying generic Java programs: two case studies (AG, CM, ET, OK), p. 8.
- SPLC-2010-BergerSLCW #product line #scalability
- Feature-to-Code Mapping in Two Large Product Lines (TB, SS, RL, KC, AW), pp. 498–499.
- CGO-2010-BorinWWLBHNRR #named #optimisation
- TAO: two-level atomicity for dynamic binary optimizations (EB, YW, CW, WL, MBJ, SH, EN, SR, RR), pp. 12–21.
- CGO-2010-Newburn
- There are at least two sides to every heterogeneous system (CCJN), p. 120.
- CSL-2010-SchwentickZ #logic #order
- Two-Variable Logic with Two Order Relations — (Extended Abstract) (TS, TZ), pp. 499–513.
- IJCAR-2010-MayerC #hybrid #logic #proving
- Herod and Pilate: Two Tableau Provers for Basic Hybrid Logic (MCM, SC), pp. 255–262.
- SAT-2010-Cotton #proving
- Two Techniques for Minimizing Resolution Proofs (SC), pp. 306–312.
- CASE-2009-LiZF #analysis
- Analysis of two-loop closed production systems (NL, LZ, WF), pp. 460–465.
- DATE-2009-Cilardo #architecture
- A new speculative addition architecture suitable for two’s complement operations (AC), pp. 664–669.
- ICDAR-2009-ChandaPFP #approach #identification
- Two-stage Approach for Word-wise Script Identification (SC, SP, KF, UP), pp. 926–930.
- ICDAR-2009-LouloudisSG #evaluation #novel #segmentation #word
- A Novel Two Stage Evaluation Methodology for Word Segmentation Techniques (GL, NS, BG), pp. 686–690.
- ITiCSE-2009-MarcosFM #education #uml
- The two states of the mind to teach UML (LdM, FF, JJM), p. 361.
- ITiCSE-2009-Mohr #novel #prolog
- Two novel prolog assignments (JM), p. 350.
- DLT-2009-BehleKR #quantifier #regular expression
- Regular Languages Definable by Majority Quantifiers with Two Variables (CB, AK, SR), pp. 91–102.
- DLT-2009-Kapoutsis #automaton #complexity #finite
- Size Complexity of Two-Way Finite Automata (CAK), pp. 47–66.
- DLT-2009-Shur #bound
- Two-Sided Bounds for the Growth Rates of Power-Free Languages (AMS), pp. 466–477.
- LATA-2009-Kasprzik
- Two Equivalent Regularizations for Tree Adjoining Grammars (AK), pp. 469–480.
- LATA-2009-MitranaT #network #on the
- On Accepting Networks of Evolutionary Processors with at Most Two Types of Nodes (VM, BT), pp. 588–600.
- CHI-2009-BrandtGLDK #learning #programming #web
- Two studies of opportunistic programming: interleaving web foraging, learning, and writing code (JB, PJG, JL, MD, SRK), pp. 1589–1598.
- HCI-AUII-2009-PirhonenK #comparison #design #interface
- Flight Searching — A Comparison of Two User-Interface Design Strategies (AP, NK), pp. 179–188.
- HCI-NIMT-2009-Pastel #2d #modelling
- Modeling the Difficulty for Centering Rectangles in One and Two Dimensions (RP), pp. 879–888.
- HCI-NT-2009-AgarwalP #how #interface #usability
- Building on the Usability Study: Two Explorations on How to Better Understand an Interface (AA, MP), pp. 385–394.
- HIMI-DIE-2009-BruinLB #case study #feedback #how
- How to Learn from Intelligent Products; The Structuring of Incoherent Field Feedback Data in Two Case Studies (RdB, YL, AB), pp. 227–232.
- HIMI-II-2009-HiremathPFFY #comparison
- Comparison of Pilot Recovery and Response Times in Two Types of Cockpits (VH, RWP, ROF, RGF, JPY), pp. 766–775.
- OCSC-2009-FalsteinR #multi
- The First Two W’s: Fostering Multicultural Awareness in Children (NF, NR), pp. 462–470.
- CAiSE-2009-MouratidisSJ #case study #experience #health #information management #lessons learnt
- Secure Information Systems Engineering: Experiences and Lessons Learned from Two Health Care Projects (HM, AS, JJ), pp. 231–245.
- CIKM-2009-LiuZ #classification #sentiment #using
- Cross-domain sentiment classification using a two-stage method (KL, JZ), pp. 1717–1720.
- ECIR-2009-NamNLL #difference #named
- DiffPost: Filtering Non-relevant Content Based on Content Difference between Two Consecutive Blog Posts (SHN, SHN, YL, JHL), pp. 791–795.
- ICML-2009-FloresGMP
- GAODE and HAODE: two proposals based on AODE to deal with continuous variables (MJF, JAG, AMM, JMP), pp. 313–320.
- KMIS-2009-SonntagM #image #information management #problem #query #repository #semantics
- Unifying Semantic Annotation and Querying in Biomedical Image Repositories — One Solution for Two Problems of Medical Knowledge Engineering (DS, MM), pp. 89–94.
- MLDM-2009-LoglisciM #mining #multi
- Mining Multiple Level Non-redundant Association Rules through Two-Fold Pruning of Redundancies (CL, DM), pp. 251–265.
- SIGIR-2009-Baeza-YatesMH #performance #trade-off #web
- Efficiency trade-offs in two-tier web search systems (RABY, VM, CH), pp. 163–170.
- SIGIR-2009-BenderskyCS #information retrieval #query #segmentation
- Two-stage query segmentation for information retrieval (MB, WBC, DAS), pp. 810–811.
- GPCE-2009-KongCY #parsing
- Abstract parsing for two-staged languages with concatenation (SK, WC, KY), pp. 109–116.
- RE-2009-GrossD #diagrams #process #requirements #uml
- EPC vs. UML Activity Diagram — Two Experiments Examining their Usefulness for Requirements Engineering (AG, JD), pp. 47–56.
- SAC-2009-BrooksI #classification #detection #novel #visual notation
- Visual detection of novel terrain via two-class classification (CAB, KI), pp. 1145–1150.
- SAC-2009-LiuLC #2d #mobile
- Two-dimensional non-photorealistic drawings on mobile devices (DSML, CHL, CIC), pp. 1843–1844.
- SAC-2009-ManuchSS #bound #self
- Two lower bounds for self-assemblies at temperature 1 (JM, LS, CS), pp. 808–809.
- SAC-2009-RobertsSG #interface
- Model interfaces for two-way obliviousness (NVR, ES, PCG), pp. 488–495.
- SAC-2009-TokoroTT #smarttech #using
- A pointing method using two accelerometers for wearable computing (YT, TT, MT), pp. 136–141.
- SLE-2009-BartolomeiCLS #api #migration #xml
- Study of an API Migration for Two XML APIs (TTB, KC, RL, TvdS), pp. 42–61.
- SPLC-2009-OLearyRRT #case study #experience #independence #process #research
- Important issues and key activities in product derivation: experiences from two independent research projects (PO, RR, IR, ST), pp. 121–130.
- CGO-2009-CollinB #embedded #taxonomy
- Two-Level Dictionary Code Compression: A New Scheme to Improve Instruction Code Density of Embedded Applications (MC, MB), pp. 231–242.
- ISMM-2009-JulaR #locality #memory management
- Two memory allocators that use hints to improve locality (AJ, LR), pp. 109–118.
- CSL-2009-CockettS #communication #on the #problem #word
- On the Word Problem for ΣΠ-Categories, and the Properties of Two-Way Communication (JRBC, LS), pp. 194–208.
- ICLP-2009-Li #algorithm #constraints #difference #functional #integer #research #summary
- Research Summary: Extending Elimination Algorithms for Functional Constraints to Solve Two Integer Variables per Inequality (CL), pp. 530–531.
- ICST-2009-PostS #bound #equivalence #functional #implementation #model checking #proving #using
- Proving Functional Equivalence of Two AES Implementations Using Bounded Model Checking (HP, CS), pp. 31–40.
- LICS-2009-KieronskiT #equivalence #finite #first-order #logic #on the #satisfiability
- On Finite Satisfiability of Two-Variable First-Order Logic with Equivalence Relations (EK, LT), pp. 123–132.
- ECSA-2008-MendezA #architecture #comparison #how
- How Do Agents Affect Modifiability? A Comparison between Two Architectures for Intelligent Virtual Environments for Training (GM, AdA), pp. 82–97.
- WICSA-2008-LaMantiaCMR #design #evolution #matrix #scalability #using
- Analyzing the Evolution of Large-Scale Software Systems Using Design Structure Matrices and Design Rule Theory: Two Exploratory Cases (MJL, YC, AM, JR), pp. 83–92.
- ASE-2008-MartinhoVD #approach #flexibility #modelling #process
- A Two-Step Approach for Modelling Flexibility in Software Processes (RM, JV, DD), pp. 427–430.
- CASE-2008-Andoh #identification #using
- Coulomb friction identification for mechatronic servo systems with limited strokes using two reference inputs (FA), pp. 265–272.
- CASE-2008-GeorgievA
- Two-stage robotic crystal mounting of protein crystals for X-ray data collection (AG, PKA), pp. 1019–1024.
- CASE-2008-VahediS #towards
- Towards output-sensitive computation of two-finger caging grasps (MV, AFvdS), pp. 73–78.
- DocEng-2008-Oliveira #algorithm #automation #documentation #layout
- Two algorithms for automatic document page layout (JBSdO), pp. 141–149.
- PODS-2008-GollapudiP #power of #similarity
- The power of two min-hashes for similarity search among hierarchical data objects (SG, RP), pp. 211–220.
- PEPM-2008-GillenwaterMSZTGO #hardware #static typing #using
- Synthesizable high level hardware descriptions: using statically typed two-level languages to guarantee verilog synthesizability (JG, GM, CS, AYZ, WT, JG, JO), pp. 41–50.
- PEPM-2008-Mu #algorithm #bound #problem
- Maximum segment sum is back: deriving algorithms for two segment problems with bounded lengths (SCM), pp. 31–39.
- STOC-2008-GordonHKL
- Complete fairness in secure two-party computation (SDG, CH, JK, YL), pp. 413–422.
- STOC-2008-KhotS #learning #on the
- On hardness of learning intersection of two halfspaces (SK, RS), pp. 345–354.
- AFL-2008-KlimaP
- Literally idempotent languages and their varieties — two letter case (OK, LP), pp. 220–231.
- AFL-2008-KutribMO #automaton #on the
- On Stateless Two-Pushdown Automata and Restarting Automata (MK, HM, FO), pp. 257–268.
- CIAA-2008-DolzhenkoJ #2d #complexity #on the #transducer
- On Complexity of Two Dimensional Languages Generated by Transducers (ED, NJ), pp. 181–190.
- DLT-2008-JiraskovaO #automaton #complexity #finite #on the
- On the State Complexity of Operations on Two-Way Finite Automata (GJ, AO), pp. 443–454.
- ICALP-A-2008-BorradaileK #graph #network #problem
- The Two-Edge Connectivity Survivable Network Problem in Planar Graphs (GB, PNK), pp. 485–501.
- ICALP-C-2008-KolesnikovR #authentication
- Password Mistyping in Two-Factor-Authenticated Key Exchange (VK, CR), pp. 702–714.
- LATA-2008-BaumeisterR #problem #reduction
- The Three-Color and Two-Color TantrixTM Rotation Puzzle Problems Are NP-Complete Via Parsimonious Reductions (DB, JR), pp. 76–87.
- LATA-2008-OttoP #2d #taxonomy
- A Two-Dimensional Taxonomy of Proper Languages of Lexicalized FRR-Automata (FO, MP), pp. 409–420.
- LATA-2008-Puzynina #2d #on the #word
- On Periodicity of Generalized Two-Dimensional Words (SP), pp. 440–451.
- ICFP-2008-AugustssonMS #domain-specific language #embedded #haskell #named
- Paradise: a two-stage DSL embedded in Haskell (LA, HM, GS), pp. 225–228.
- ICGT-2008-Horvath #approach #graph transformation #towards #verification
- Towards a Two Layered Verification Approach for Compiled Graph Transformation (ÁH), pp. 499–501.
- CHI-2008-LaukkanenIR #lazy evaluation #performance
- The cone and the lazy bubble: two efficient alternatives between the point cursor and the bubble cursor (JL, PI, KJR), pp. 309–312.
- CHI-2008-MoscovichH #multi #using
- Indirect mappings of multi-touch input using one and two hands (TM, JFH), pp. 1275–1284.
- CSCW-2008-DantecE
- The view from the trenches: organization, power, and technology at two nonprofit homeless outreach centers (CALD, WKE), pp. 589–598.
- SOFTVIS-2008-PilgrimD #3d #editing #framework #named #visual notation
- Gef3D: a framework for two-, two-and-a-half-, and three-dimensional graphical editors (JvP, KD), pp. 95–104.
- SOFTVIS-2008-XieKSDF #diagrams #sequence chart
- Assessing the benefits of synchronization-adorned sequence diagrams: two controlled experiments (SX, EK, REKS, LKD, SDF), pp. 9–18.
- CIKM-2008-HoefelE #classification #learning #sequence
- Learning a two-stage SVM/CRF sequence classifier (GH, CE), pp. 271–278.
- CIKM-2008-LiZBXL #information management #mining
- A two-stage text mining model for information filtering (YL, XZ, PB, YX, RYKL), pp. 1023–1032.
- ICPR-2008-JeongK #estimation
- Relative scale estimation between two camera motions (YJ, ISK), pp. 1–4.
- ICPR-2008-KasuyaKKO #estimation #robust #using
- Robust trajectory estimation of soccer players by using two cameras (NK, IK, YK, YO), pp. 1–4.
- ICPR-2008-KottiK #classification #database #gender #speech
- Gender classification in two Emotional Speech databases (MK, CK), pp. 1–4.
- ICPR-2008-NguyenLV #2d #locality
- Ridge Regression for Two Dimensional Locality Preserving Projection (NTN, WL, SV), pp. 1–4.
- ICPR-2008-PaclikLND #analysis #estimation #multi #using
- Variance estimation for two-class and multi-class ROC analysis using operating point averaging (PP, CL, JN, RPWD), pp. 1–4.
- ICPR-2008-ZengLH #analysis
- Analysis on two fishermethods and a synthesized discriminant projection (ZZ, CL, LH), pp. 1–4.
- KDD-2008-BhattacharyaGJ #categorisation #documentation #identification
- Structured entity identification and document categorization: two tasks with one joint model (IB, SG, SJ), pp. 25–33.
- POPL-2008-Voigtlander #parallel
- Much ado about two (pearl): a pearl on parallel prefix computation (JV), pp. 29–35.
- REFSQ-2008-StrohmaierHYAE #modelling
- Can Patterns Improve i* Modeling? Two Exploratory Studies (MS, JH, ESKY, JA, SME), pp. 153–167.
- SAC-2008-SeoKRK #2d #algorithm #deployment #search-based
- A genetic algorithm for sensor deployment based on two-dimensional operators (JHS, YHK, HBR, SJK), pp. 1812–1813.
- ASPLOS-2008-BhargavaSSM #2d
- Accelerating two-dimensional page walks for virtualized systems (RB, BS, FS, SM), pp. 26–35.
- HPDC-2008-PasqualiBCRL #scalability
- A two-level scheduler to dynamically schedule a stream of batch jobs in large-scale grids (MP, RB, GC, LR, DL), pp. 231–232.
- ICLP-2008-DemoenN #implementation
- Two WAM Implementations of Action Rules (BD, PLN), pp. 621–635.
- ICST-2008-WagnerDAWS #debugging #evaluation #java #tool support
- An Evaluation of Two Bug Pattern Tools for Java (SW, FD, MA, JW, MS), pp. 248–257.
- ASE-2007-AndrewsLM #generative #named #testing
- Nighthawk: a two-level genetic-random unit test data generator (JHA, FCHL, TM), pp. 144–153.
- CASE-2007-YangXL
- Two-Degree-of-Freedom Based Cross-Coupled Control for High-Accuracy Tracking Systems (JY, JX, ZL), pp. 950–955.
- DATE-2007-FaragES #2d #configuration management #using
- Improving utilization of reconfigurable resources using two dimensional compaction (AAEF, HMEB, SIS), pp. 135–140.
- DATE-2007-HongSCY #adaptation
- A two-tone test method for continuous-time adaptive equalizers (DH, SS, KTC, CPY), pp. 1283–1288.
- DATE-2007-SirowyWLV #clustering
- Two-level microprocessor-accelerator partitioning (SS, YW, SL, FV), pp. 313–318.
- HT-2007-Hall #hypermedia
- Back to the future with hypertext: a tale of two or three conferences (WH), pp. 179–180.
- ICDAR-2007-BhattacharyaGP07a #recognition
- A Two Stage Recognition Scheme for Handwritten Tamil Characters (UB, SKG, SKP), pp. 511–515.
- ICDAR-2007-ToujAA #segmentation #using
- Two Approaches for Arabic Script Recognition-Based Segmentation Using the Hough Transform (ST, NEBA, HA), pp. 654–658.
- ITiCSE-2007-CrescenziN #algorithm #experience #visualisation
- Fully integrating algorithm visualization into a cs2 course.: a two-year experience (PC, CN), pp. 296–300.
- ITiCSE-2007-HawthorneCK #education
- Curricular resources from the acm two-year college education committee (EKH, RDC, KJK), p. 309.
- ITiCSE-2007-XinogalosSD #education #experience #java
- Teaching java with BlueJ: a two-year experience (SX, MS, VD), p. 345.
- TACAS-2007-JurdzinskiLS #automaton #model checking #probability
- Model Checking Probabilistic Timed Automata with One or Two Clocks (MJ, FL, JS), pp. 170–184.
- CSMR-2007-LuciaDGR #approach #design pattern
- A Two Phase Approach to Design Pattern Recovery (ADL, VD, CG, MR), pp. 297–306.
- STOC-2007-Shpilka #multi
- Interpolation of depth-3 arithmetic circuits with two multiplication gates (AS), pp. 284–293.
- CIAA-2007-AnselmoGM #2d #automaton
- Tiling Automaton: A Computational Model for Recognizable Two-Dimensional Languages (MA, DG, MM), pp. 290–302.
- CIAA-2007-JonoskaP #2d #automaton #finite #representation
- Finite State Automata Representing Two-Dimensional Subshifts (NJ, JBP), pp. 277–289.
- DLT-2007-AnselmoGM #2d #nondeterminism
- From Determinism to Non-determinism in Recognizable Two-Dimensional Languages (MA, DG, MM), pp. 36–47.
- DLT-2007-Blanchet-SadriBP #set #word
- Two Element Unavoidable Sets of Partial Words (FBS, NCB, JP), pp. 96–107.
- ICALP-2007-CaryRS #finite #metric
- Paper Retraction: On the Hardness of Embeddings Between Two Finite Metrics (MC, AR, AS), p. 949.
- ICALP-2007-KatrielKU #nondeterminism #probability #problem
- Commitment Under Uncertainty: Two-Stage Stochastic Matching Problems (IK, CKM, EU), pp. 171–182.
- LATA-2007-AlhazovMR #network #predict
- Networks of Evolutionary Processors with Two Nodes Are Unpredictable (AA, CMV, YR), pp. 521–528.
- CHI-2007-ClarksonLCS #validation
- Revisiting and validating a model of two-thumb text entry (EC, KL, JC, TS), pp. 163–166.
- CHI-2007-HancockCC #3d #design #evaluation #interactive
- Shallow-depth 3d interaction: design and evaluation of one-, two- and three-touch techniques (MSH, MSTC, AC), pp. 1147–1156.
- DHM-2007-KuboTA
- Two Vibration Modes of a Human Body Sitting on a Car Seat- The Relationship Between Riding Discomfort Affected by the Material Properties of the Seat Cushion and the Two Vibration Modes (MK, FT, HA), pp. 894–903.
- HCI-IDU-2007-EvjemoAS #lessons learnt
- User Acceptance of Digital Tourist Guides Lessons Learnt from Two Field Studies (BE, SA, AS), pp. 746–755.
- HCI-IDU-2007-MorganN #development #interface #research
- Interface Between Two Disciplines — The Development of Theatre as a Research Tool (MM, AFN), pp. 184–193.
- HCI-IPT-2007-HavukumpuHGVN #artificial reality
- Comparing Two Head-Mounted Displays in Ultrasound Scanning (JH, JH, EG, PV, GN), pp. 597–604.
- HCI-MIE-2007-LeePL #finite #multi #recognition #transducer
- Multi-word Expression Recognition Integrated with Two-Level Finite State Transducer (KL, KSP, YSL), pp. 124–133.
- HIMI-MTT-2007-KarshEAHSMPSAKSB #case study #predict #quality
- Do Beliefs About Hospital Technologies Predict Nurses’ Perceptions of Their Ability to Provide Quality Care? A Study in Two Pediatric Hospitals (BTK, KE, SA, RJH, MS, KM, NP, TS, JA, RK, KS, RLB), pp. 77–83.
- HIMI-MTT-2007-MiyakeT #coordination #realtime
- Internal Timing Mechanism for Real-Time Coordination — Two Types of Control in Synchronized Tapping (YM, KT), pp. 876–883.
- ICEIS-AIDSS-2007-LiuCM #recognition #using
- Named Entity Recognition in Biomedical Literature Using Two-Layer Support Vector Machines (FL, YC, BM), pp. 39–48.
- ICEIS-DISI-2007-OsbornB #2d
- An insertion strategy for a two-dimensional spatial access method (WO, KB), pp. 295–300.
- ICEIS-SAIC-2007-ZarembaVMBCCVFT #challenge #comparison #semantics #towards #web #web service
- Towards Semantic Interoperabilty — In-depth Comparison of Two Approaches to Solving Semantic Web Service Challenge Mediation Tasks (MZ, TV, MM, MB, SC, DC, EDV, FMF, CT), pp. 413–421.
- CIKM-2007-JiangZ #adaptation #approach #classification #statistics
- A two-stage approach to domain adaptation for statistical classifiers (JJ, CZ), pp. 401–410.
- ECIR-2007-GengWLZ #ranking
- Fighting Link Spam with a Two-Stage Ranking Strategy (GG, CW, QL, YZ), pp. 699–702.
- ICML-2007-AndoZ #generative #learning
- Two-view feature generation model for semi-supervised learning (RKA, TZ), pp. 25–32.
- MLDM-2007-GomezF #2d #algorithm #evolution #hybrid #image #learning
- A Hybrid Algorithm Based on Evolution Strategies and Instance-Based Learning, Used in Two-Dimensional Fitting of Brightness Profiles in Galaxy Images (JCG, OF), pp. 716–726.
- SIGIR-2007-NtoulasC #correctness #policy
- Pruning policies for two-tiered inverted index with correctness guarantee (AN, JC), pp. 191–198.
- OOPSLA-2007-KuhneS #multi #programming
- Can programming be liberated from the two-level style: multi-level programming with deepjava (TK, DS), pp. 229–244.
- REFSQ-2007-HerrmannKD
- Exploring the Characteristics of NFR Methods — A Dialogue About Two Approaches (AH, DK, JD), pp. 320–334.
- SAC-2007-ShinH #analysis #automation #comparison #difference #process
- Comparison of two activity analyses for automatic differentiation: context-sensitive flow-insensitive vs. context-insensitive flow-sensitive (JS, PDH), pp. 1323–1329.
- LICS-2007-Bojanczyk #logic
- Two-way unary temporal logic over trees (MB), pp. 121–130.
- TLCA-2007-Kusmierek #problem #rank
- The Inhabitation Problem for Rank Two Intersection Types (DK), pp. 240–254.
- TLCA-2007-MostrousY #higher-order #mobile #process #type system
- Two Session Typing Systems for Higher-Order Mobile Processes (DM, NY), pp. 321–335.
- CASE-2006-BeghiLPS #black box #modelling #prototype
- Black-box modeling of a Two-Stroke Racing Motorcycle Engine for Virtual Prototyping Applications (AB, ML, SP, DS), pp. 280–285.
- CASE-2006-ShangYQ #algorithm #equation #linear
- Algorithm of Two-Step Eye-Hand Calibration by Resolving Linear Equations (YS, QY, ZQ), pp. 218–222.
- CASE-2006-SongL
- Two-Instant Reallocation in Two-Echelon Spare Parts Inventory Systems (HS, HCL), pp. 342–345.
- DATE-2006-CarbognaniBFKF #power management
- Two-phase resonant clocking for ultra-low-power hearing aid applications (FC, FB, NF, HK, WF), pp. 73–78.
- DATE-2006-YavariSR #design #hybrid
- Systematic and optimal design of CMOS two-stage opamps with hybrid cascode compensation (MY, OS, ÁRV), pp. 144–149.
- DRR-2006-ChenS #2d #recognition #verification
- Combining one- and two-dimensional signal recognition approaches to off-line signature verification (SC, SNS).
- PODS-2006-BojanczykDMSS #logic #reasoning #xml
- Two-variable logic on data trees and XML reasoning (MB, CD, AM, TS, LS), pp. 10–19.
- PODS-2006-CondonDHW #algorithm #pipes and filters #problem
- Flow algorithms for two pipelined filter ordering problems (AC, AD, LH, NW), pp. 193–202.
- VLDB-2006-HuangCLL #evolution #using #xml
- XML Evolution: A Two-phase XML Processing Model Using XML Prefiltering Techniques (CHH, TRC, JJL, HML), pp. 1215–1218.
- VLDB-2006-MoerkotteN #algorithm #analysis #generative #programming
- Analysis of Two Existing and One New Dynamic Programming Algorithm for the Generation of Optimal Bushy Join Trees without Cross Products (GM, TN), pp. 930–941.
- ITiCSE-2006-CampbellHK #education #process
- Activities of the ACM two-year college education committee (RDC, EKH, KJK), p. 321.
- CSMR-2006-MarchantTT #case study #industrial #legacy #metric #requirements
- A Metric of Confidence in Requirements Gathered from Legacy Systems: Two Industrial Case Studies (JM, CT, MT), pp. 355–361.
- STOC-2006-Feldman #approximate #learning #logic #query
- Hardness of approximate two-level logic minimization and PAC learning with membership queries (VF), pp. 363–372.
- DLT-2006-Ravikumar #automaton #finite #modelling #on the #probability
- On Some Variations of Two-Way Probabilistic Finite Automata Models (BR), pp. 443–454.
- ICALP-v2-2006-KarhumakiKO #communication
- Communication of Two Stacks and Rewriting (JK, MK, AO), pp. 468–479.
- FM-2006-CunhaOV #data transformation #type safety
- Type-Safe Two-Level Data Transformation (AC, JNO, JV), pp. 284–299.
- CHI-2006-DillonKCB #using #visual notation
- Visual search and reading tasks using ClearType and regular displays: two experiments (AD, LK, GOC, RGB), pp. 503–511.
- CHI-2006-EisensteinM #communication #evaluation
- Interacting with communication appliances: an evaluation of two computer vision-based selection techniques (JE, WEM), pp. 1111–1114.
- CHI-2006-FroehlichHSH
- The GlobeFish and the GlobeMouse: two new six degree of freedom input devices for graphics applications (BF, JH, VS, AH), pp. 191–199.
- CHI-2006-LatulipeMKC #named #symmetry
- symSpline: symmetric two-handed spline manipulation (CL, SM, CSK, CLAC), pp. 349–358.
- CSCW-2006-YankelovichKPWD #question
- Improving audio conferencing: are two ears better than one? (NY, JK, JP, MW, JMD), pp. 333–342.
- SOFTVIS-2006-Reichardt #2d #c++
- Two-dimensional C++ (JR), pp. 191–192.
- ICEIS-ISAS-2006-BlomqvistOS #enterprise #ontology
- Ontology Construction in an Enterprise Context: Comparing and Evaluating Two Approaches (EB, AÖ, KS), pp. 86–93.
- CIKM-2006-ShiN #adaptation #corpus #information retrieval #parallel
- Filtering or adapting: two strategies to exploit noisy parallel corpora for cross-language information retrieval (LS, JYN), pp. 814–815.
- ICML-2006-WangYL #2d
- Two-dimensional solution path for support vector regression (GW, DYY, FHL), pp. 993–1000.
- ICPR-v1-2006-Chen #adaptation #estimation
- Noise Variance Adaptive SEA for Motion Estimation: A Two-Stage Schema (WGC), pp. 31–34.
- ICPR-v1-2006-KimK06a #parametricity #using
- Estimating Intrinsic Parameters of Cameras using Two Arbitrary Rectangles (JSK, ISK), pp. 707–710.
- ICPR-v1-2006-WangKY #2d #analysis #linear #recognition
- Bilateral Two Dimensional Linear Discriminant Analysis for Stereo Face Recognition (JGW, HK, WYY), pp. 429–432.
- ICPR-v1-2006-ZhangGZ #database #orthogonal
- Recognizing Rotated Faces from Two Orthogonal Views in Mugshot Databases (XZ, YG, BZ), pp. 195–198.
- ICPR-v2-2006-InoueU #2d #analysis #linear
- Non-Iterative Two-Dimensional Linear Discriminant Analysis (KI, KU), pp. 540–543.
- ICPR-v2-2006-LuCSF
- Camera Calibration from Two Shadow Trajectories (FL, XC, YS, HF), pp. 1–4.
- ICPR-v2-2006-SanguansatAJM #2d #analysis #component #recognition
- Class-Specific Subspace-Based Two-Dimensional Principal Component Analysis for Face Recognition (PS, WA, SJ, SM), pp. 1246–1249.
- ICPR-v2-2006-UekiHK #2d #analysis #classification #linear
- Two-dimensional Heteroscedastic Linear Discriminant Analysis for Age-group Classification (KU, TH, TK), pp. 585–588.
- ICPR-v3-2006-AnLV #classification #performance
- Efficient Cross-validation of the Complete Two Stages in KFD Classifier Formulation (SA, WL, SV), pp. 240–244.
- ICPR-v3-2006-ChatelainHP #documentation
- A two-stage outlier rejection strategy for numerical field extraction in handwritten documents (CC, LH, TP), pp. 224–227.
- ICPR-v3-2006-XuJJG #2d #recognition
- Complete Two-Dimensional PCA for Face Recognition (AX, XJ, YJ, PG), pp. 481–484.
- ICPR-v4-2006-ArifBV
- A fusion methodology based on Dempster-Shafer evidence theory for two biometric applications (MA, TB, NV), pp. 590–593.
- ICPR-v4-2006-PerdochMC #geometry
- Epipolar Geometry from Two Correspondences (MP, JM, OC), pp. 215–219.
- ICPR-v4-2006-XieLYD #identification #robust
- Improved Two-stage Wiener Filter for Robust Speaker Identification (YX, ML, ZY, BD), pp. 310–313.
- ICPR-v4-2006-ZhangZX #segmentation
- A Two-level Method for Unsupervised Speaker-based Audio Segmentation (SZ, SZ, BX), pp. 298–301.
- SEKE-2006-YuC06a #evolution #maintenance #open source #reuse
- Two Perspectives on Open-Source Software Evolution: Maintenance and Reuse (LY, KC), pp. 737–742.
- SIGIR-2006-HeP #feedback
- Comparing two blind relevance feedback techniques (DH, YP), pp. 649–650.
- MoDELS-2006-Staron #case study #development #industrial #modelling
- Adopting Model Driven Software Development in Industry — A Case Study at Two Companies (MS), pp. 57–72.
- MoDELS-2006-Staron #case study #development #industrial #modelling
- Adopting Model Driven Software Development in Industry — A Case Study at Two Companies (MS), pp. 57–72.
- RE-2006-SoB #case study #experience #requirements
- Experiences of Requirements Engineering for Two Consecutive Versions of a Product at VLSC (JS, DMB), pp. 216–221.
- SAC-2006-DuranX #algorithm #scheduling #search-based
- The effects of two replacement strategies on a genetic algorithm for scheduling jobs on computational grids (BD, FX), pp. 960–961.
- SAC-2006-HabichWLP #clustering #set
- Two-phase clustering strategy for gene expression data sets (DH, TW, WL, CP), pp. 145–150.
- SAC-2006-IfinedoN #enterprise #metric #resource management
- Prioritization of enterprise resource planning (ERP) systems success measures: viewpoints of two organizational stakeholder groups (PI, NN), pp. 1554–1560.
- CSL-2006-CortierRZ #standard
- Relating Two Standard Notions of Secrecy (VC, MR, EZ), pp. 303–318.
- LICS-2006-BojanczykMSSD #logic #word
- Two-Variable Logic on Words with Data (MB, AM, TS, LS, CD), pp. 7–16.
- TestCom-2006-CavalliMMMQ #case study #generative #industrial #testing #tool support
- Application of Two Test Generation Tools to an Industrial Case Study (ARC, SM, WM, MM, YMQ), pp. 134–148.
- CASE-2005-ChangLJ #detection #fault #network #using
- Using a two-layer competitive Hopfield neural network for semiconductor wafer defect detection (CYC, SYL, MJ), pp. 301–306.
- DATE-2005-BhuniaMRR #novel #testing
- A Novel Low-overhead Delay Testing Technique for Arbitrary Two-Pattern Test Application (SB, HMM, AR, KR), pp. 1136–1141.
- DATE-2005-DingV #approach #megamodelling #modelling #performance
- A Two-Level Modeling Approach to Analog Circuit Performance Macromodeling (MD, RV), pp. 1088–1089.
- ICDAR-2005-GaoLV #algorithm #online #programming #segmentation
- A Two-stage Online Handwritten Chinese Character Segmentation Algorithm Based on Dynamic Programming (XG, PML, CVG), pp. 735–739.
- ICDAR-2005-HanL #approach #recognition #segmentation
- A two-stage handwritten character segmentation approach in mail address recognition (ZH, CPL), pp. 111–115.
- ICDAR-2005-LiangNSV #2d #algorithm #geometry #parsing #performance
- Efficient Geometric Algorithms for Parsing in Two Dimensions (PL, MN, MS, PAV), pp. 1172–1177.
- ICDAR-2005-WanW #modelling #online #statistics #verification
- On-Line Signature Verification With Two-Stage Statistical Models (LW, BW), pp. 282–286.
- VLDB-2005-KimWLL #n-gram #named #performance
- n-Gram/2L: A Space and Time Efficient Two-Level n-Gram Inverted Index Structure (MSK, KYW, JGL, MJL), pp. 325–336.
- CSEET-2005-NavarroH05a #design #how #prototype #scalability #student
- Scaling up: How Thirty-two Students Collaborated and Succeeded in Developing a Prototype Software Design Environment (EON, AvdH), pp. 155–162.
- ITiCSE-2005-BrusilovskyS #case study #self #student
- Engaging students to work with self-assessment questions: a study of two approaches (PB, SAS), pp. 251–255.
- ITiCSE-2005-CampbellHK #education
- Curricular projects of the ACM two-year college education committee (RDC, EKH, KJK), p. 361.
- ITiCSE-2005-PaisB #user interface
- Two possible approaches for an intermediate GUI course (RP, JPB), p. 365.
- TACAS-2005-LeinoMO #proving #quantifier #theorem proving
- A Two-Tier Technique for Supporting Quantifiers in a Lazily Proof-Explicating Theorem Prover (KRML, MM, XO), pp. 334–348.
- CSMR-2005-GreevyD #analysis #approach #correlation #using
- Correlating Features and Code Using a Compact Two-Sided Trace Analysis Approach (OG, SD), pp. 314–323.
- IWPC-2005-RevelleBC #case study #comprehension
- Understanding Concerns in Software: Insights Gained from Two Case Studies (MR, TB, DC), pp. 23–32.
- STOC-2005-AhnHL
- Covert two-party computation (LvA, NJH, JL), pp. 513–522.
- STOC-2005-Goncalves #graph
- Edge partition of planar sraphs into two outerplanar graphs (DG0), pp. 504–512.
- STOC-2005-SanghviV #complexity #random
- The round complexity of two-party random selection (SS, SPV), pp. 338–347.
- CIAA-2005-AnselmoM #2d #automaton #queue #simulation
- Simulating Two-Dimensional Recognizability by Pushdown and Queue Automata (MA, MM), pp. 43–53.
- CIAA-2005-ZdarekM #2d #automaton #finite #on the #pattern matching
- On Two-Dimensional Pattern Matching by Finite Automata (JZ, BM), pp. 329–340.
- DLT-2005-GeffertMP #automaton #finite
- Complementing Two-Way Finite Automata (VG, CM, GP), pp. 260–271.
- ICALP-2005-CaryRS #finite #metric #on the
- On the Hardness of Embeddings Between Two Finite Metrics (MC, AR, AS), pp. 1412–1423.
- ICALP-2005-TessonT #communication #complexity #strict
- Restricted Two-Variable Sentences, Circuits and Communication Complexity (PT, DT), pp. 526–538.
- CHI-2005-KarlsonBS #design
- AppLens and launchTile: two designs for one-handed thumb use on small devices (AKK, BBB, JS), pp. 201–210.
- CHI-2005-WangN #performance
- Less visible and wireless: two experiments on the effects of microphone type on users’ performance and perception (QW, CN), pp. 809–818.
- ICEIS-v1-2005-TrienekensKH #case study #enterprise #industrial
- Critical Success Factors in ERP Projects: Case Studies in Two Industrial Organizations in The Netherlands (JJMT, WK, RH), pp. 84–91.
- ICEIS-v5-2005-JaklicV #algorithm #documentation #image #preprocessor
- Two Simple Algorithms for Document Image Preprocessing — Making a Document Scanning Application More User-Friendly (AJ, BV), pp. 116–121.
- ICML-2005-HillD #adaptation #classification #problem
- Adapting two-class support vector classification methods to many class problems (SIH, AD), pp. 313–320.
- SEKE-2005-FekiMG #approach #integration #multi
- A Two-Phase Approach for Multidimensional Schemes Integration (JF, JM, FG), pp. 498–503.
- SEKE-2005-LiuCBGROA #analysis #approach #component #composition #quality #requirements #two-level grammar
- Quality of Service-Driven Requirements Analysis for Component Composition: A Two-Level Grammar+Approach (SHL, FC, BRB, JGG, RRR, AMO, MA), pp. 731–734.
- SEKE-2005-YeS #dependence #modelling #variability
- Modelling Feature Variability and Dependency in Two Views (HY, AS), pp. 661–664.
- SAC-2005-LiuBGROA #assurance #distributed #embedded #realtime #requirements
- Two-level assurance of QoS requirements for distributed real-time and embedded systems (SHL, BRB, JGG, RRR, AMO, MA), pp. 903–904.
- SAC-2005-Strangio #performance #protocol
- Efficient Diffie-Hellmann two-party key agreement protocols based on elliptic curves (MAS), pp. 324–331.
- SAC-2005-WuRBGM #2d #compilation
- A two-dimensional separation of concerns for compiler construction (XW, SR, BRB, JGG, MM), pp. 1365–1369.
- SAC-2005-XiaoLJ #clustering #on the #problem #scheduling
- On unit task linear-nonlinear two-cluster scheduling problem (ZX, WNL, JJFJ), pp. 713–717.
- COCV-J-2005-BlechGLM #code generation #comparison #correctness #higher-order #optimisation #proving
- Optimizing Code Generation from SSA Form: A Comparison Between Two Formal Correctness Proofs in Isabelle/HOL (JOB, SG, JL, SM), pp. 33–51.
- LICS-2005-KieronskiO #decidability #first-order #logic
- Small Substructures and Decidability Issues for First-Order Logic with Two Variables (EK, MO), pp. 448–457.
- TLCA-2005-AehligMO #decidability #higher-order #monad #recursion
- The Monadic Second Order Theory of Trees Given by Arbitrary Level-Two Recursion Schemes Is Decidable (KA, JGdM, CHLO), pp. 39–54.
- DATE-v1-2004-Gordon-RossVD #automation #embedded
- Automatic Tuning of Two-Level Caches to Embedded Applications (AGR, FV, ND), pp. 208–213.
- DATE-v2-2004-ShendeMB #communication #quantum
- Smaller Two-Qubit Circuits for Quantum Communication and Computation (VVS, ILM, SSB), pp. 980–987.
- DATE-v2-2004-YooYBJD #concept #design #multi #using
- Multi-Processor SoC Design Methodology Using a Concept of Two-Layer Hardware-Dependent Software (SY, MWY, AB, AAJ, MDN), pp. 1382–1383.
- ITiCSE-WGR-2004-Campbell #assurance #security
- IT security and data assurance: a new resource for two-year colleges (RDC), p. 20.
- ICSM-2004-LuoJZMS #analysis #case study #component #graph #object-oriented
- An Experimental Study of Two Graph Analysis Based Component Capture Methods for Object-Oriented Systems (JL, RJ, LZ, HM, JS), pp. 390–398.
- STOC-2004-AchlioptasN #graph #random
- The two possible values of the chromatic number of a random graph (DA, AN), pp. 587–593.
- STOC-2004-HarnikNRR #perspective
- Completeness in two-party secure computation: a computational view (DH, MN, OR, AR), pp. 252–261.
- CIAA-2004-PolcarM #2d #automaton #online #pattern matching
- Two-Dimensional Pattern Matching by Two-Dimensional Online Tessellation Automata (TP, BM), pp. 327–328.
- DLT-2004-AnselmoGM #2d #regular expression
- Regular Expressions for Two-Dimensional Languages Over One-Letter Alphabet (MA, DG, MM), pp. 63–75.
- DLT-2004-KurganskyyP #2d #automaton #finite #on the #power of
- On the Computation Power of Finite Automata in Two-dimensional Environments (OK, IP), pp. 261–271.
- ICALP-2004-DabrowskiP #equation #word
- Solving Two-Variable Word Equations (Extended Abstract) (RD, WP), pp. 408–419.
- ICGT-2004-RensinkSV #comparison #graph transformation #model checking
- Model Checking Graph Transformations: A Comparison of Two Approaches (AR, ÁS, DV), pp. 226–241.
- CAiSE-2004-NikiforovaK #approach #development #modelling
- Two-Hemisphere Model Driven Approach: Engineering Based Software Development (ON, MK), pp. 219–233.
- ICEIS-v2-2004-WuW04a #algorithm #comparison #set
- Result Comparison of Two Rough Set Based Discretization Algorithms (SW, WW), pp. 511–514.
- ICPR-v1-2004-LeungCCT
- B-Spline Snakes in Two Stages (CCL, CHC, FHYC, WKT), pp. 568–571.
- ICPR-v1-2004-LiangCP
- Uncalibrated Two-View Metrology (BL, ZC, NP), pp. 96–99.
- ICPR-v1-2004-MilgramSC #classification #modelling
- Two-Stage Classification System combining Model-Based and Discriminative Approaches (JM, RS, MC), pp. 152–155.
- ICPR-v2-2004-ParkYKJ #approach #recognition #segmentation #string
- A Two-Stage Approach for Segmentation and Recognition of Handwritten Digit Strings Collected from Mail Pieces (SP, YY, GK, SHJ), pp. 626–629.
- ICPR-v3-2004-CuiG #recognition
- Support Vector Machines for Face Recognition with Two-layer Generated Virtual Data (GC, WG), pp. 570–573.
- ICPR-v3-2004-FujimuraOT #3d #algorithm #re-engineering
- Improved 3D Head Reconstruction System based on Combining Shape-From-Silhouette with Two-Stage Stereo Algorithm (KF, YO, TT), pp. 127–130.
- ICPR-v3-2004-WuCW #estimation #image #visual notation
- Visual Line Estimation from a Single Image of Two Eyes (HW, QC, TW), pp. 290–293.
- ICPR-v4-2004-BelkhoucheQGJ #2d #image #using
- Binary Image Transformation Using Two-Dimensional Chaotic Maps (FB, UQ, IG, DJ), pp. 823–826.
- ICPR-v4-2004-ChoH #image
- Extending Dynamic Range of Two Color Images under Different Exposures (WhC, KSH), pp. 853–856.
- ICPR-v4-2004-ParkA #interactive #semantics
- Event Semantics in Two-person Interactions (SP, JKA), pp. 227–230.
- KDD-2004-YangLHG #mining #named #performance #query #xml
- 2PXMiner: an efficient two pass mining of frequent XML query patterns (LHY, MLL, WH, XG), pp. 731–736.
- SIGIR-2004-MaS #information management #using
- Information extraction using two-phase pattern discovery (LM, JS), pp. 534–535.
- SIGIR-2004-TaoZ #feedback #pseudo
- A two-stage mixture model for pseudo feedback (TT, CZ), pp. 486–487.
- PADL-2004-CorreasGCCH #implementation #persistent
- A Generic Persistence Model for (C)LP Systems (and Two Useful Implementations) (JC, JMG, MC, DC, MVH), pp. 104–119.
- SAC-2004-Al-HoumailyC #commit #named #protocol
- 1-2PC: the one-two phase atomic commit protocol (YJAH, PKC), pp. 684–691.
- SAC-2004-JulstromA #algorithm #hybrid #problem
- Two hybrid evolutionary algorithms for the rectilinear Steiner arborescence problem (BAJ, AA), pp. 980–984.
- SAC-2004-LiuCT #comparison
- A comparison of two view materialization approaches for disease surveillance system (ZL, PKC, FCT), pp. 754–755.
- CGO-2004-WuBQEF #predict
- The Accuracy of Initial Prediction in Two-Phase Dynamic Binary Translators (YW, MBJ, JQ, OE, JF), pp. 227–238.
- DAC-2003-AgarwalSB03a #metric
- Simple metrics for slew rate of RC circuits based on two circuit moments (KA, DS, DB), pp. 950–953.
- DATE-2003-OmanaRM #parallel
- High Speed and Highly Testable Parallel Two-Rail Code Checker (MO, DR, CM), pp. 10608–10615.
- DocEng-2003-PhelpsW
- Two diet plans for fat PDF (TAP, RW), pp. 175–184.
- ICDAR-2003-KaratzasA #image #segmentation #web
- Two Approaches for Text Segmentation in Web Images (DK, AA), pp. 131–136.
- ITiCSE-2003-CampbellHK #education
- Curricular projects of the ACM two-year college education committee (RDC, EKH, KJK), p. 222.
- ITiCSE-2003-CampbellHK03a
- The role of two-year colleges in educating the cyber-security workforce (RDC, EKH, KJK), p. 235.
- ITiCSE-2003-JulianoCK #architecture #education #using
- Observations from using two modes of teaching undergraduate computer architecture (BAJ, CHC, EK), p. 248.
- ESOP-2003-Comon-LundhC #security
- Security Properties: Two Agents Are Sufficient (HCL, VC), pp. 99–113.
- FoSSaCS-2003-Kieronski #transitive
- The Two-Variable Guarded Fragment with Transitive Guards Is 2EXPTIME-Hard (EK), pp. 299–312.
- TACAS-2003-FersmanMPY #analysis #scheduling #using
- Schedulability Analysis Using Two Clocks (EF, LM, PP, WY), pp. 224–239.
- IWPC-2003-DeanC #design
- Design Recovery of a Two Level System (TRD, YC), pp. 23–32.
- STOC-2003-JayramKS #complexity
- Two applications of information complexity (TSJ, RK, DS), pp. 673–682.
- STOC-2003-Lindell #bound
- Bounded-concurrent secure two-party computation without setup assumptions (YL), pp. 683–692.
- ICALP-2003-HromkovicS03a #automaton #finite #nondeterminism
- Nondeterminism versus Determinism for Two-Way Finite Automata: Generalizations of Sipser’s Separation (JH, GS), pp. 439–451.
- CHI-2003-EverittKLL #collaboration #design #distributed #physics
- Two worlds apart: bridging the gap between physical and virtual media for distributed design collaboration (KE, SRK, RL, JAL), pp. 553–560.
- AdaEurope-2003-Lamm #ada #design #education #java
- Booch’s Ada vs. Liskov’s Java: Two Approaches to Teaching Software Design (EL), pp. 102–112.
- ICEIS-v3-2003-BrowneSW #workflow
- A Two Tier, Goal-Driven Workflow Model for the Healthcare Domain (EDB, MS, JRW), pp. 32–39.
- ICEIS-v3-2003-NaumenkoW #modelling
- Two Approaches in System Modeling and Their Illustrations with MDA and RM-ODP (AN, AW), pp. 398–402.
- CIKM-2003-BroderCHSZ #evaluation #performance #process #query #retrieval #using
- Efficient query evaluation using a two-level retrieval process (AZB, DC, MH, AS, JYZ), pp. 426–434.
- ICML-2003-Bouckaert #algorithm #learning #testing
- Choosing Between Two Learning Algorithms Based on Calibrated Tests (RRB), pp. 51–58.
- ICML-2003-LachicheF #classification #multi #probability #using
- Improving Accuracy and Cost of Two-class and Multi-class Probabilistic Classifiers Using ROC Curves (NL, PAF), pp. 416–423.
- KDD-2003-KorenH #clustering #visualisation
- A two-way visualization method for clustered data (YK, DH), pp. 589–594.
- ECOOP-2003-ZibinG #2d #layout
- Two-Dimensional Bi-directional Object Layout (YZ, JYG), pp. 329–350.
- ICSE-2003-CasagniL #comparison #component #framework #multi
- Comparison of Two Component Frameworks: The FIPA-Compliant Multi-Agent System and The Web-Centric J2EE Platform (MC, ML), pp. 341–351.
- LDTA-2003-Hufflen #bibliography
- Mixing Two Bibliography Style Languages (JMH), pp. 628–642.
- LICS-2003-PistoreV #infinity
- The Planning Spectrum — One, Two, Three, Infinity (MP, MYV), pp. 234–243.
- RTA-2003-Verma #automaton #decidability #equation
- Two-Way Equational Tree Automata for AC-Like Theories: Decidability and Closure Properties (KNV), pp. 180–196.
- DATE-2002-KazmierskiC #design #distributed #framework
- A Two-Tier Distributed Electronic Design Framework (TJK, NC), pp. 227–231.
- HT-2002-VitaliFT #implementation
- Two implementations of XPointer (FV, FF, CT), pp. 145–146.
- ICSM-2002-MullerTH #programming
- Two Controlled Experiments Concerning the Usefulness of Assertions as a Means for Programming (MMM, RT, OH), pp. 84–92.
- STOC-2002-CanettiLOS #composition #multi
- Universally composable two-party and multi-party secure computation (RC, YL, RO, AS), pp. 494–503.
- CIAA-J-2000-Bruggemann-KleinW02 #automaton #nondeterminism
- The Regularity of Two-Way Nondeterministic Tree Automata Languages (ABK, DW), pp. 67–81.
- DLT-2002-Frougny #online
- On-Line Odometers for Two-Sided Symbolic Dynamical Systems (CF), pp. 405–416.
- DLT-2002-Holub #set #similarity
- A Unique Structure of Two-Generated Binary Equality Sets (SH), pp. 245–257.
- DLT-2002-IbarraDS #automaton #finite #safety #verification
- Safety Verification for Two-Way Finite Automata with Monotonic Counters (OHI, ZD, ZWS), pp. 326–338.
- DLT-2002-SasakiIIW #2d #bound #probability #turing machine
- A Space Lower Bound of Two-Dimensional Probabilistic Turing Machines (YS, KI, AI, YW), pp. 185–196.
- ICALP-2002-Bojanczyk #automaton #finite #modelling
- Two-Way Alternating Automata and Finite Models (MB), pp. 833–844.
- CHI-2002-IsokoskiK #comparison
- Comparison of two touchpad-based methods for numeric entry (PI, MK), pp. 25–32.
- ICEIS-2002-ViaeneBDVP #pattern matching #pattern recognition #proving #recognition #state of the art
- Proof Running Two State-Of-The-Art Pattern Recognition Techniques in the Field of Direct Marketing (SV, BB, GD, JV, DVdP), pp. 446–454.
- ICPR-v1-2002-CoquinB #image
- A New Method to Compute the Distortion Vector Field from Two Images (DC, PB), pp. 279–282.
- ICPR-v1-2002-DengT #novel #recognition
- A Novel Two-Layer PCA/MDA Scheme for Hand Posture Recognition (JD, HTT), pp. 283–286.
- ICPR-v1-2002-JeongKSS #gesture #linear #recognition #using
- Two-Hand Gesture Recognition using Coupled Switching Linear Model (MHJ, YK, NS, YS), pp. 9–12.
- ICPR-v1-2002-KimuraW #2d #detection #invariant
- An Extension of the Generalized Hough Transform to Realize Affine-Invariant Two-dimensional (2D) Shape Detection (AK, TW), pp. 65–69.
- ICPR-v1-2002-KubotaA #generative #image #linear
- Virtual View Generation by Linear Processing of Two Differently Focused Images (AK, KA), pp. 504–507.
- ICPR-v1-2002-LohRW #3d #modelling #process #using
- Refining 3D Models Using a Two-Stage Neural Network-Based Iterative Process (AWKL, MR, GAWW), pp. 172–175.
- ICPR-v1-2002-OkataniD #3d #estimation #image #robust #using
- Robust Estimation of Camera Translation Between Two Images Using a Camera With a 3D Orientation Sensor (TO, KD), pp. 275–278.
- ICPR-v2-2002-RothW #algorithm #matrix
- Some Improvements on Two Autocalibration Algorithms Based on the Fundamental Matrix (GR, AW), p. 312–?.
- ICPR-v2-2002-TaxD #classification #multi #using
- Using Two-Class Classifiers for Multiclass Classification (DMJT, RPWD), pp. 124–127.
- ICPR-v3-2002-JeongKSS02a #gesture #linear #recognition #using
- Two-Hand Gesture Recognition Using Coupled Switching Linear Model (MHJ, YK, NS, YS), pp. 529–532.
- ICPR-v3-2002-LefevreMV #classification #process #segmentation
- A Two Level Classifier Process for Audio Segmentation (SL, BM, NV), pp. 891–894.
- ICPR-v3-2002-SongCLC02a #image #recognition
- Graphics Recognition from Binary Images: One Step or Two Steps (JS, MC, MRL, SC), pp. 135–138.
- ICPR-v3-2002-TabboneW #2d #recognition #using
- Technical Symbols Recognition Using the Two-Dimensional Radon Transform (ST, LW), pp. 200–203.
- ICPR-v3-2002-WangBR #classification #recognition #word
- Combining HMM-Based Two-Pass Classifiers for Off-Line Word Recognition (WW, AB, GR), pp. 151–154.
- ICPR-v4-2002-FengWP #agile #analysis #case study #comparative #modelling
- A Comparative Study of Two Velocity ProfIle Models for Rapid Stroke Analysis (CF, AW, RP), p. 52–?.
- ICPR-v4-2002-TothCA #classification #fault
- A Two-Stage-Classifier for Defect Classification in Optical Media Inspection (DT, AC, TA), pp. 373–376.
- KDD-2002-ChenHS #algorithm
- A new two-phase sampling based algorithm for discovering association rules (BC, PJH, PS), pp. 462–468.
- SEKE-2002-BryantBARO #assembly #component #generative #specification #two-level grammar #using
- Formal specification of generative component assembly using two-level grammar (BRB, CCB, MA, RRR, AMO), pp. 209–212.
- SIGIR-2002-Kawatani #categorisation #difference #documentation #set #topic
- Topic difference factor extraction between two document sets and its application to text categorization (TK), pp. 137–144.
- SIGIR-2002-Kwok #precise #query
- Higher precision for two-word queries (KLK), pp. 395–396.
- SIGIR-2002-WhiteRJ #documentation #evaluation #ranking #using
- Finding relevant documents using top ranking sentences: an evaluation of two alternative schemes (RW, IR, JMJ), pp. 57–64.
- SIGIR-2002-ZhaiL #information retrieval #modelling
- Two-stage language models for information retrieval (CZ, JDL), pp. 49–56.
- LOPSTR-2002-SimonKH #abstract domain #difference #linear
- Two Variables per Linear Inequality as an Abstract Domain (AS, AK, JMH), pp. 71–89.
- CSL-2002-Kanovich
- Bijections between Partitions by Two-Directional Rewriting Techniques (MIK), pp. 44–58.
- DAC-2001-LeeNCKD #2d #detection
- Two-Dimensional Position Detection System with MEMS Accelerometer for MOUSE Applications (SL, GJN, JC, HK, AJD), pp. 852–857.
- DATE-2001-StuikysZDM #component
- Two approaches for developing generic components in VHDL (VS, GZ, RD, GM), p. 800.
- ICDAR-2001-BrittoSBS #string
- A Two-Stage HMM-Based System for Recognizing Handwritten Numeral Strings (AdSBJ, RS, FB, CYS), pp. 396–400.
- ICDAR-2001-JagerN #database #online
- Two On-Line Japanese Character Databases in Unipen Format (SJ, MN), pp. 566–571.
- ICDAR-2001-KogaMSF #2d #bottom-up #parsing #recognition #segmentation
- A Recognition Method of Machine-Printed Monetary Amounts Based on the Two-Dimensional Segmentation and the Bottom-up Parsing (MK, RM, HS, HF), pp. 968–971.
- ICDAR-2001-RoneeUS #2d #linear #recognition #using
- Handwritten Character Recognition Using Piecewise Linear Two-Dimensional Warping (MAR, SU, HS), pp. 39–43.
- ICDAR-2001-WangBKR #modelling #multi #recognition
- Multi-Branch and Two-Pass HMM Modeling Approaches for Off-Line Cursive Handwriting Recognition (WW, AB, AK, GR), pp. 231–235.
- ICDAR-2001-ZhaoCSW #approach #segmentation #using
- Handwritten Chinese Character Segmentation Using a Two-Stage Approach (SZ, ZC, PS, QW), pp. 179–183.
- ICDAR-2001-ZhaoL #documentation #kernel #recognition
- High-Precision Two-Kernel Chinese Character Recognition in General Document Processing Systems (SLZ, HJL), pp. 617–621.
- PODS-2001-FerraginaKMS #2d #string
- Two-dimensional Substring Indexing (PF, NK, SM, DS).
- FoSSaCS-2001-Bojanczyk #automaton #finite #graph #problem
- The Finite Graph Problem for Two-Way Alternating Automata (MB), pp. 88–103.
- IWPC-2001-AversanoCS #case study #comprehension #maintenance #process
- Understanding and Improving the Maintenance Process: A Method and Two Case Studies (LA, GC, SS), pp. 199–208.
- DLT-2001-GlasserS
- Level 5/2 of the Straubing-Thérien Hierarchy for Two-Letter Alphabets (CG, HS), pp. 251–261.
- DLT-2001-SchwentickTV #automaton
- Partially-Ordered Two-Way Automata: A New Characterization of DA (TS, DT, HV), pp. 239–250.
- ICFP-2001-Sheard #unification
- Generic Unification via Two-Level Types and Parameterized Modules (TS), pp. 86–97.
- CIKM-2001-RosenthalW #data access #documentation #question
- Document Release versus Data Access Controls: Two Sides of the Same Coin? (AR, GW), pp. 544–546.
- MLDM-2001-Perner #classification #question #reasoning
- Are Case-Based Reasoning and Dissimilarity-Based Classification Two Sides of the Same Coin? (PP), pp. 35–51.
- MLDM-2001-SchmidtG #abstraction #reasoning
- Temporal Abstractions and Case-Based Reasoning for Medical Course Data: Two Prognostic Applications (RS, LG), pp. 23–34.
- SEKE-2001-BastarrioaCDS #component #deployment #optimisation
- Two Optimization Techniques for Component-Based Systems Deployment (MCB, REC, SAD, AAS), pp. 153–162.
- SIGIR-2001-Broch
- Cite Me, Cite My References? (Scholarly Use of the ACM SIGIR Proceedings Based on Two Citation Indexes) (EB), pp. 446–447.
- SIGIR-2001-SaraivaMFMRZ #scalability
- Rank-Preserving Two-Level Caching for Scalable Search Engines (PCS, ESdM, RCF, WMJ, BARN, NZ), pp. 51–58.
- PPDP-2001-HernandezR #algorithm #development #logic programming #reuse #string
- Development Reuse and the Logic Program Derivation of Two String-Matching Algorithms (MH, DAR), pp. 38–48.
- PPDP-2001-PenaR #abstraction #functional #parallel #programming
- Parallel Functional Programming at Two Levels of Abstraction (RP, FR), pp. 187–198.
- SAC-2001-HousniTKP #algorithm #distributed
- A new distributed mutual exclusion algorithm for two groups (AH, MT, MSK, MSP), pp. 531–538.
- ICSE-2001-BifflG #estimation #fault #modelling
- Evaluating the Accuracy of Defect Estimation Models Based on Inspection Data from Two Inspection Cycles (SB, WG), pp. 145–154.
- CSL-2001-LutzSW #logic
- Modal Logic and the Two-Variable Fragment (CL, US, FW), pp. 247–261.
- IJCAR-2001-NivelleP #similarity
- A Resolution-Based Decision Procedure for the Two-Variable Fragment with Equality (HdN, IPH), pp. 211–225.
- RTA-2001-Bechet #interactive
- Universal Interaction Systems with Only Two Agents (DB), pp. 3–14.
- DAC-2000-WangKS #clustering #latency #memory management #scheduling
- Optimal two level partitioning and loop scheduling for hiding memory latency for DSP applications (ZW, MK, EHMS), pp. 540–545.
- DAC-2000-ZachariahCR #algorithm #novel
- A novel algorithm to extract two-node bridges (STZ, SC, CDR), pp. 790–793.
- DATE-2000-CiricYS #implementation #logic #using
- Delay Minimization and Technology Mapping of Two-Level Structures and Implementation Using Clock-Delayed Domino Logic (JC, GY, CS), pp. 277–282.
- TACAS-2000-AronsP #comparison #execution #verification
- A Comparison of Two Verification Methods for Speculative Instruction Execution (TA, AP), pp. 487–502.
- STOC-2000-Kilian #theorem
- More general completeness theorems for secure two-party computation (JK), pp. 316–324.
- CIAA-2000-Bruggemann-KleinW #automaton #nondeterminism
- Regularly Extended Two-Way Nondeterministic Tree Automata (ABK, DW), pp. 57–66.
- CIAA-2000-Kempe00a #transducer
- Part-of-Speech Tagging with Two Sequential Transducers (AK), pp. 337–339.
- CIAA-2000-Watson #algorithm
- Directly Constructing Minimal DFAs: Combining Two Algorithms by Brzozowski (BWW), pp. 311–317.
- WLC-2000-Brattka #exponential #modelling #recursion
- The Emperor’s New Recursiveness: The Epigraph of the Exponential Function in Two Models of Computability (VB), pp. 63–72.
- WLC-2000-LombardyS #on the
- On the Star Height of Rational Languages: A New Presentation for Two Old Results (SL, JS), pp. 266–285.
- WLC-2000-SchottS #algorithm #parallel #word
- Two Optimal Parallel Algorithms on the Commutation Class of a Word (RS, JCS), pp. 403–419.
- CHI-2000-MyersLY #using
- Two-handed input using a PDA and a mouse (BAM, KPL, BCY), pp. 41–48.
- CSCW-2000-JacksonAMM #behaviour #video
- Impact of video frame rate on communicative behaviour in two and four party groups (MJ, AHA, RM, JM), pp. 11–20.
- ICPR-v1-2000-Kanatani #3d #analysis #re-engineering #reliability
- Gauge-Based Reliability Analysis of 3-D Reconstruction from Two Uncalibrated Perspective Views (KiK), pp. 1076–1079.
- ICPR-v1-2000-Lopez-RubioMG #image #robust #segmentation
- A Robust Two-Stage System for Image Segmentation (ELR, JMP, JAGR), pp. 1606–1609.
- ICPR-v1-2000-SugayaO #algorithm #integration
- Stereo by Integration of Two Algorithms with/without Occlusion Handling (YS, YO), pp. 1109–1113.
- ICPR-v1-2000-WangT #composition #matrix
- An SVD Decomposition of Essential Matrix with Eight Solutions for the Relative Positions of Two Perspective Cameras (WW, HTT), pp. 1362–1365.
- ICPR-v2-2000-Kangas #classification #comparison #nearest neighbour #prototype #representation
- Comparison between Two Prototype Representation Schemes for a Nearest Neighbor Classifier (JK), pp. 2773–2776.
- ICPR-v2-2000-Pavlidis #2d #interface
- A New Paper/Computer Interface: Two-Dimensional Symbologies (TP), pp. 2145–2151.
- ICPR-v2-2000-SunOKAKT #algorithm #approximate #distance #reduction
- Two-Stage Computational Cost Reduction Algorithm Based on Mahalanobis Distance Approximations (FS, SO, NK, HA, SK, TT), pp. 2696–2699.
- ICPR-v2-2000-TangXM00a #classification
- Two-Step Classification Based on Scale Space (MT, JX, SM), pp. 2899–2902.
- ICPR-v3-2000-AcharyyaK #segmentation #using
- Two Texture Segmentation Using M-Band Wavelet Transform (MA, MKK), pp. 3405–3408.
- ICPR-v3-2000-ChoKN #image #interface #performance #using
- An Efficient Walkthrough from Two Images Using View Morphing and Spidery Mesh Interface (HSC, CHK, SN), pp. 3143–3146.
- ICPR-v3-2000-LiuH00a #detection #implementation
- Two Practical Issues in Canny’s Edge Detector Implementation (GL, RMH), pp. 3680–3682.
- ICPR-v3-2000-MostafaPF #classification
- A Two-Step Fuzzy-Bayesian Classification for High Dimensional Data (MGHM, TCP, AAF), pp. 3421–3424.
- ICPR-v3-2000-UchidaS #2d #linear
- Piecewise Linear Two-Dimensional Warping (SU, HS), pp. 3538–3541.
- ICPR-v4-2000-Kauppinen #fault #recognition
- A Two Stage Defect Recognition Method for Parquet Slab Grading (HK), pp. 4803–4806.
- KR-2000-IsmailS #problem #reasoning
- Two Problems with Reasoning and Acting in Time (HOI, SCS), pp. 355–365.
- ICRE-2000-Parnas00a
- Two Positions on Licensing (DLP), p. 154.
- SPLC-2000-PasettiP #concept #development #novel #product line
- Two Novel Concepts for systematic product line development (AP, WP), pp. 249–270.
- HPCA-2000-CappelloRE #clustering #modelling #performance #programming
- Investigating the Performance of Two Programming Models for Clusters of SMP PCs (FC, OR, DE), pp. 349–359.
- CADE-2000-AudemardBH #finite
- Two Techniques to Improve Finite Model Search (GA, BB, LH), pp. 302–308.
- LICS-2000-BussK #bound
- Resource-Bounded Continuity and Sequentiality for Type-Two Functionals (SRB, BMK), pp. 77–83.
- DAC-1999-Bening #logic #simulation
- A Two-State Methodology for RTL Logic Simulation (LB), pp. 672–677.
- DAC-1999-DoboliNDGV #behaviour #design #synthesis #using
- Behavioral Synthesis of Analog Systems Using Two-layered Design Space Exploration (AD, ANA, NRD, SG, RV), pp. 951–957.
- ICDAR-1999-CesariniFGS #approach #comprehension #documentation #multi
- A Two Level Knowledge Approach for Understanding Documents of a Multi-Class Domain (FC, EF, MG, GS), pp. 135–138.
- ICDAR-1999-ChoiO #network #recognition #using
- A Segmentation-free Recognition of Two Touching Numerals using Neural Network (SMC, ISO), pp. 253–256.
- ICDAR-1999-SuralD #algorithm #documentation #generative #image #parallel #segmentation
- A Two-step Algorithm and its Parallelization for the Generation of Minimum Containing Rectangles for Document Image Segmentation (SS, PKD), pp. 173–176.
- ICDAR-1999-SuralD99a #documentation #image #markov
- A Two-state Markov Chain Model of Degraded Document Images (SS, PKD), pp. 463–466.
- ICDAR-1999-UchidaS #2d #recognition #using
- Handwritten Character Recognition using Monotonic and Continuous Two-dimensional Warping (SU, HS), pp. 499–502.
- PODS-1999-ArgeSV #2d #on the
- On Two-Dimensional Indexability and Optimal Range Search Indexing (LA, VS, JSV), pp. 346–357.
- VLDB-1999-ChengGKLLQS #database #implementation #optimisation #query #semantics
- Implementation of Two Semantic Query Optimization Techniques in DB2 Universal Database (QC, JG, FK, TYCL, LL, XQ, KBS), pp. 687–698.
- ITiCSE-1999-Ackermann #education #internet
- Poster session. Internet curriculum. two courses: introductory and advanced (ECA), pp. 179–180.
- ICSM-1999-KrikhaarPSSV #architecture #process
- A Two-Phase Process for Software Architecture Improvement (RLK, AP, MPAS, MS, CV), pp. 371–380.
- WCRE-1999-DucasseRN #object-oriented #re-engineering
- Type-Check Elimination: Two Object-Oriented Reengineering Patterns (SD, TR, RN), p. 157–?.
- DLT-1999-Cassaigne #complexity
- Subword complexity and periodicity in two or more dimensions (JC), pp. 14–21.
- DLT-1999-FreundF
- Test tube systems: when two tubes are enough (RF, FF), pp. 338–350.
- ICALP-1999-EngelfrietH #finite #higher-order #logic #monad #transducer
- Two-Way Finite State Transducers and Monadic Second-Order Logic (JE, HJH), pp. 311–320.
- ICALP-1999-HromkovicS #automaton #finite #on the #power of
- On the Power of Las Vegas II. Two-Way Finite Automata (JH, GS), pp. 433–442.
- ICALP-1999-KimP #2d #linear
- Linear-Time Construction of Two-Dimensional Suffix Trees (DKK, KP), pp. 463–472.
- ICALP-1999-KirstenM #problem
- Two Techniques in the Area of the Star Problem (DK, JM), pp. 483–492.
- IFM-1999-ReedSG #deduction #development #formal method #model checking #reasoning
- Deductive Reasoning versus Model Checking: Two Formal Approaches for System Development (JNR, JES, FG), pp. 375–394.
- HCI-CCAD-1999-MurataFAI #2d #effectiveness
- Extending effective target width in Fitt’s law to two-dimensional pointing task (AM, MF, YA, HI), pp. 1236–1240.
- HCI-EI-1999-MarcusAFG99d #development #interface
- User-Interface Development: Lessons for the Future from two Past Projects (AM, JA, VF, EG), pp. 1227–1231.
- HCI-EI-1999-SophianC
- A Picture is Worth More Than Two Lines (CS, MEC), pp. 376–380.
- ICEIS-1999-DuKM #algorithm #mining #performance #reuse
- Two Fast Algorithms for Repeated Mining of Association Rules Based on Ressource Reuse (XD, KK, AM), pp. 65–73.
- ACIR-1999-FatemiM #representation #retrieval #video
- A Two-time Model for Video Content Representation and Retrieval (NF, PM).
- SEKE-1999-WieserHS #experience
- Push of Pull: Two Cognitive Modes of Systematic Experience Transfer at DaimlerChrysler (EW, FH, KS), pp. 186–204.
- SIGIR-1999-HoelscherS #web
- Searching on the Web: Two Types of Expertise (poster abstract) (CH, GS), pp. 305–306.
- TOOLS-ASIA-1999-LauderK #modelling
- Two-Level Modeling (AL, SK), pp. 108–117.
- TOOLS-EUROPE-1999-Roubine #repository
- Two or Three Things I Have Learnt about Repositories (OR), p. 7.
- RE-1999-BoehmAPKL #requirements
- Requirements Engineering, Expectations Management, and the Two Cultures (BWB, MAA, DP, JK, AL), pp. 14–22.
- SAC-1999-Lee #multi #scheduling
- Artificial Intelligence Search Methods for Multi-Machine Two-Stage Scheduling (IL), pp. 31–35.
- HPCA-1999-PlaatBH #difference #latency #parallel #scalability
- Sensitivity of Parallel Applications to Large Differences in Bandwidth and Latency in Two-Layer Interconnects (AP, HEB, RFHH), pp. 244–253.
- CADE-1999-Schmidt-SchaussS #decidability #equation
- Solvability of Context Equations with Two Context Variables is Decidable (MSS, KUS), pp. 67–81.
- LICS-1999-GanzingerMV #transitive
- The Two-Variable Guarded Fragment with Transitive Relations (HG, CM, MV), pp. 24–34.
- LICS-1999-GradelR
- Two-Variable Descriptions of Regularity (EG, ER), pp. 14–23.
- DATE-1998-ShaoC #approximate #design #using
- MCM Interconnect Design Using Two-Pole Approximation (JS, RMMC), pp. 544–548.
- FoSSaCS-1998-BottreauM #graph #normalisation
- Minor Searching, Normal Forms of Graph Relabelling: Two Applications Based on Enumerations by Graph Relabelling (AB, YM), pp. 110–124.
- FoSSaCS-1998-Moggi #category theory
- Functor Categories and Two-Level Languages (EM), pp. 211–225.
- ICSM-1998-NiessinkV #case study #maintenance
- Two Case Studies in Measuring Software Maintenance Effort (FN, HvV), pp. 76–85.
- IWPC-1998-DeursenK #agile #case study #cobol #comprehension
- Rapid System Understanding: Two COBOL Case Studies (AvD, TK), pp. 90–97.
- STOC-1998-TherienW #quantifier #word
- Over Words, Two Variables Are as Powerful as One Quantifier Alternation (DT, TW), pp. 234–240.
- FLOPS-1998-LedererD #programming
- Two-Stage Programming (EFAL, RAD), pp. 296–313.
- ICALP-1998-DyerG #algorithm #polynomial
- A Genuinely Polynomial-Time Algorithms for Sampling Two-Rowed Contingency Tables (MED, CSG), pp. 339–350.
- ICALP-1998-Vardi #automaton #reasoning
- Reasoning about The Past with Two-Way Automata (MYV), pp. 628–641.
- WIA-1998-Augros #automaton #finite #infinity #set #word
- Automata to Recognize Finite and Infinite Words with at Least Two Factorizations on a Given Finite Set (XA), pp. 220–225.
- FM-1998-FujitaRH #case study #experience #parallel #protocol #verification
- Two Real Formal Verification Experiences: ATM Switch Chip and Parallel Cache Protocol (MF, SPR, AJH), pp. 281–295.
- CHI-1998-BhavnaniJ #performance
- Delegation and Circumvention: Two Faces of Efficiency (SKB, BEJ), pp. 273–280.
- AdaEurope-1998-ArabanS #library #object-oriented
- A Two-Level Matching Mechanism for Object-Oriented Class Libraries (SA, ASMS), pp. 188–200.
- ICPR-1998-0002C #comparison #evaluation
- Experimental evaluation of two criteria for pattern comparison and alignment (CS, RC), pp. 146–153.
- ICPR-1998-BouletreauVSE #identifier #question
- Handwriting and signature: one or two personality identifiers? (VB, NV, RS, HE), pp. 1758–1760.
- ICPR-1998-Lehmann #algorithm #image #modelling
- A two-stage algorithm for model-based registration of medical images (TML), pp. 344–351.
- ICPR-1998-RodriguezMNZMP #classification
- A two-stage classifier for broken and blurred digits in forms (CR, JM, MN, AZ, JIM, JMP), pp. 1101–1105.
- ICPR-1998-UchidaS #2d #programming
- A monotonic and continuous two-dimensional warping based on dynamic programming (SU, HS), pp. 521–524.
- ICPR-1998-WatanabeT #2d #analysis #image
- An analysis system for two-dimensional gel electrophoresis images of genomic DNA (YW, KT), pp. 368–371.
- ICPR-1998-Yamada #pattern matching #query #retrieval #using
- Handwritten text retrieval using two-stage pattern matching with handwritten query (KY), pp. 621–625.
- KDD-1998-Domingos
- Occam’s Two Razors: The Sharp and the Blunt (PMD), pp. 37–43.
- SIGIR-1998-KwokC #ad hoc #query #retrieval
- Improving Two-Stage Ad-Hoc Retrieval for Short Queries (KLK, MC), pp. 250–256.
- SAC-1998-Kimm #2d #configuration management #pipes and filters #problem
- Two dimensional maximal elements problem on a reconfigurable optical pipelined bus system (HK), pp. 623–627.
- HPCA-1998-MackenzieKFLLAK #performance
- Exploiting Two-Case Delivery for Fast Protected Messaging (KM, JK, MF, WL, VL, AA, MFK), pp. 231–242.
- HPDC-1998-KanitkarD #transaction
- Two-Stage Transaction Processing in Client-Server DBMSs (VK, AD), pp. 98–105.
- LICS-1998-Dalen
- L. E. J. Brouwer’s Intuitionism: A Revolution in Two Installments (DvD), pp. 228–241.
- LICS-1998-KolaitisO #bound #first-order #logic #on the #problem
- On the Boundedness Problem for Two-Variable First-Order Logic (PGK, MO), pp. 513–524.
- DAC-1997-GuptaH #2d #generative #layout #named #optimisation
- CLIP: An Optimizing Layout Generator for Two-Dimensional CMOS Cells (AG, JPH), pp. 452–455.
- EDTC-1997-DufazaZ #generative #on the #pseudo #sequence #testing
- On the generation of pseudo-deterministic two-patterns test sequence with LFSRs (CD, YZ), pp. 69–76.
- EDTC-1997-SeongK #clustering #design #layout
- Two-way partitioning based on direction vector [layout design] (KSS, CMK), pp. 306–310.
- ICDAR-1997-ChaudhuriP
- An OCR System to Read Two Indian Language Scripts: Bangla and Devnagari (Hindi) (BBC, UP), pp. 1011–1015.
- ICDAR-1997-HoriuchiHYY #2d #normalisation #recognition #using
- Two-dimensional Extension of Nonlinear Normalization Method using Line Density for Character Recognition (TH, RH, HY, KY), pp. 511–514.
- CSMR-1997-Meltz #assessment
- Assessment of the options for Hardware-/Software-Reengineering of two KSG/GfS Full-Scope-Simulators (PM), pp. 140–143.
- PLDI-1997-SperberT #compilation #partial evaluation
- Two for the Price of One: Composing Partial Evaluation and Compilation (MS, PT), pp. 215–225.
- STOC-1997-Kleinberg #algorithm #nearest neighbour
- Two Algorithms for Nearest-Neighbor Search in High Dimensions (JMK), pp. 599–608.
- DLT-1997-Paun #distributed
- Two-Level Distributed H Systems (GP), pp. 309–327.
- CHI-1997-KurtenbachFBB #design #paradigm #user interface
- The Design of a GUI Paradigm based on Tablets, Two-hands, and Transparency (GK, GWF, TB, WB), pp. 35–42.
- HCI-SEC-1997-BlanchonF #what
- Asking Users About What They Mean: Two Experiments & Results (HB, LF), pp. 609–612.
- HCI-SEC-1997-KiyokawaTY #3d #design
- Manipulation Aid for Two-Handed 3-D Designing Within a Shared Virtual Environment (KK, HT, NY), pp. 937–940.
- SAC-1997-MoonLK #2d #clustering #search-based
- Genetic VLSI circuit partitioning with two-dimensional geographic crossover and zigzag mapping (BRM, YSL, CKK), pp. 274–278.
- ESEC-FSE-1997-PerryV
- The Tale of Two Projects — Abstract (DEP, LGV), pp. 521–522.
- LICS-1997-EtessamiVW #first-order #logic
- First-Order Logic with Two Variables and Unary Temporal Logic (KE, MYV, TW), pp. 228–235.
- LICS-1997-GradelOR #decidability #logic
- Two-Variable Logic with Counting is Decidable (EG, MO, ER), pp. 306–317.
- LICS-1997-PacholskiST #complexity #logic
- Complexity of Two-Variable Logic with Counting (LP, WS, LT), pp. 318–327.
- RTA-1997-Lafont #2d
- Two-Dimensional Rewriting (YL), pp. 228–229.
- DAC-1996-TelicheveskyKW #analysis #performance
- Efficient AC and Noise Analysis of Two-Tone RF Circuits (RT, KSK, JW), pp. 292–297.
- DAC-1996-TheobaldNW #heuristic #logic #named
- Espresso-HF: A Heuristic Hazard-Free Minimizer for Two-Level Logic (MT, SMN, TW), pp. 71–76.
- HT-1996-Kendall #hypermedia #set
- Hypertextual Dynamics in A Life Set for Two (RK), pp. 74–83.
- SIGMOD-1996-AchyutuniON #database #online #parallel
- Two Techniques for On-Line Index Modification in Shared Nothing Parallel Databases (KJA, EO, SBN), pp. 125–136.
- SIGMOD-1996-FukudaMMT #2d #algorithm #data mining #mining #using #visualisation
- Data Mining Using Two-Dimensional Optimized Accociation Rules: Scheme, Algorithms, and Visualization (TF, YM, SM, TT), pp. 13–23.
- SAS-1996-KellyMSS #analysis #constraints #incremental #logic programming #source code
- Two Applications of an Incremental Analysis Engine for (Constraint) Logic Programs (ADK, KM, HS, PJS), pp. 385–386.
- IFL-1996-RuncimanR #matter #profiling
- Two-Pass Heap Profiling: A Matter of Life and Death (CR, NR), pp. 222–232.
- TRI-Ada-1996-ParrishCLM #ada #assessment #learning #process #re-engineering
- Active Learning and Process Assessment: Two Experiments in an Ada-Based Software Engineering Course (ASP, DC, CL, DM), pp. 157–161.
- TRI-Ada-1996-Riley #ada #comparison #corba #development #distributed
- A Comparison of Two Approaches to Distributed Application Development in Ada: the Ada Distributed Systems Annex and CORBA (JDR), pp. 73–80.
- ICPR-1996-Aladjem #distance #optimisation #recursion
- Two-class pattern discrimination via recursive optimization of Patrick-Fisher distance (MEA), pp. 60–64.
- ICPR-1996-Chernov96a #2d #metric
- A metric unified treatment of two-dimensional FFT (VMC), pp. 662–669.
- ICPR-1996-DuttaM #comparison #performance
- Performance comparison of two evolutionary schemes (PD, DDM), pp. 659–663.
- ICPR-1996-Fainzilberg #recognition #statistics #why
- Why relevant features may be unuseful in statistical recognition of two classes (LF), pp. 730–734.
- ICPR-1996-LiM #3d #estimation
- 3D pose estimation from an n-degree planar curved feature in two perspective views (LL, SM), pp. 374–377.
- ICPR-1996-PaikCLL #multi #using
- Multiple recognizers system using two-stage combination (JP, SBC, KL, YL), pp. 581–585.
- ICPR-1996-TianT96a #3d #algorithm #image #search-based #sequence #using
- 3D shape recovery from two-color image sequences using a genetic algorithm (YlT, HTT), pp. 674–678.
- ICPR-1996-Zhang #geometry #image #lens #on the
- On the epipolar geometry between two images with lens distortion (ZZ), pp. 407–411.
- ICPR-1996-ZhangW #algorithm #parallel
- A parallel thinning algorithm with two-subiteration that generates one-pixel-wide skeletons (EYYZ, PSPW), pp. 457–461.
- KDD-1996-UrpaniWS #induction #named
- RITIO — Rule Induction Two In One (DU, XW, JS), pp. 339–342.
- SEKE-1996-VerlageDMM #process #synthesis
- A Synthesis of Two Process Support Approaches (MV, BD, FM, JM), pp. 59–68.
- SIGIR-1996-LiuLYR #2d #memory management #performance #proximity #query
- Efficient Processing of One and Two Dimensional Proximity Queries in Associative Memory (KLL, GJL, CTY, NR), pp. 138–146.
- SAC-1996-LeeHHC #case study #how #implementation #performance #problem #process #set
- Efficient implementations of two variant subset sum problems: a case study of how to process appraisal books resulting from fire-destroyed money (PL, FYH, CYH, HTC), pp. 230–237.
- HPCA-1996-AndersonK #adaptation #hybrid #protocol
- Two Adaptive Hybrid Cache Coherency Protocols (CA, ARK), pp. 303–313.
- CAV-1996-Fujita #verification
- Verification of Arithmetic Circuits by Comparing Two Similar Circuits (MF), pp. 159–168.
- ICDAR-v1-1995-StrathyS #classification #multi #network
- A two-stage multi-network OCR system with a soft pre-classifier and a network selector (NWS, CYS), pp. 78–81.
- ICDAR-v2-1995-JangKHK #recognition
- Two-stage recognition of freight train ID number under outdoor environment (JHJ, JHK, KSH, JHK), pp. 986–991.
- ICDAR-v2-1995-ZhouHL #classification #recognition
- A method of Jia Gu Wen recognition based on a two-level classification (XLZ, XCH, FL), pp. 833–836.
- STOC-1995-FeigeK #proving #random
- Impossibility results for recycling random bits in two-prover proof systems (UF, JK), pp. 457–468.
- STOC-1995-GhoshLMMPRRTZ #algorithm #analysis
- Tight analyses of two local load balancing algorithms (BG, FTL, BMM, SM, CGP, RR, AWR, RET, DZ), pp. 548–558.
- STOC-1995-Pulleyblank #problem
- Two Steiner tree packing problems (Extended Abstract) (WRP), pp. 383–387.
- STOC-1995-RaschleS #graph #recognition
- Recognition of graphs with threshold dimension two (TR, KS), pp. 650–661.
- DLT-1995-Giammarresi #2d #bibliography #finite
- Finite State Recognizability for Two-Dimensional Languages: A Brief Survey (DG), pp. 299–308.
- CIKM-1995-LiR
- PERF Join: An Alternative to Two-way Semijoin and Bloomjoin (ZL, KAR), pp. 137–144.
- ICML-1995-AbeLN #2d #algorithm #learning #online #using
- On-line Learning of Binary Lexical Relations Using Two-dimensional Weighted Majority Algorithms (NA, HL, AN), pp. 3–11.
- SIGIR-1995-Church #question
- One Term Or Two? (KWC), pp. 310–318.
- SIGIR-1995-WillieB #information management #interface #modelling
- Improving the Information Search Interface: the case for two search models (SW, PB), pp. 205–210.
- SIGIR-1995-Winograd #library
- Digital Libraries: Bridging the Two Cultures (TW), p. 2.
- SAC-1995-HuizingaH #distributed
- Two-level client caching and disconnected operation of notebook computers in distributed systems (DMH, KAH), pp. 390–395.
- SAC-1995-SaiedianM #case study #framework #process #quality
- A study of two frameworks for quality software process (HS, LMM), pp. 434–439.
- HPCA-1995-AndersonB #multi #performance
- Two Techniques for Improving Performance on Bus-Based Multiprocessors (CA, JLB), pp. 264–275.
- HPCA-1995-CunninghamA #2d #adaptation #fault tolerance
- Fault-Tolerant Adaptive Routing for Two-Dimensional Meshes (CMC, DRA), pp. 122–131.
- HPCA-1995-UpadhyayVM #2d #adaptation #performance
- Efficient and Balanced Adaptive Routing in Two-Dimensional Meshes (JU, VV, PM), pp. 112–121.
- ICLP-1995-BoyeM #aspect-oriented
- Two Aspects of Directional Types (JB, JM), pp. 747–761.
- ICLP-1995-ShiraiH #constraints #problem
- Two Approaches for Finite-Domain Constraint Satisfaction Problems — CP and CMGTP (YS, RH), pp. 249–263.
- LICS-1995-Otto
- Ptime Canonization for Two Variables with Counting (MO), pp. 342–352.
- RTA-1995-CorradiniGM #modelling #term rewriting
- Relating Two Categorial Models of Term Rewriting (AC, FG, UM), pp. 225–240.
- DAC-1994-SarabiSCP #2d #approach #array #design #logic #physics #synthesis
- A Comprehensive Approach to Logic Synthesis and Physical Design for Two-Dimensional Logic Arrays (AS, NS, MCJ, MAP), pp. 321–326.
- EDAC-1994-KeM #synthesis
- Synthesis of Delay-Verifiable Two-Level Circuits (WK, PRM), pp. 297–301.
- EDAC-1994-WangD #approximate #linear #optimisation #performance #using
- An Efficient Yield Optimization Method Using A Two Step Linear Approximation of Circuit Performance (ZW, SWD), pp. 567–571.
- VLDB-1994-OuzzaniAB #approach #top-down
- A Top-Down Approach for Two Level Serializability (MO, MAA, NLB), pp. 226–237.
- CSEE-1994-BoardmanM #experience #re-engineering #sequence
- A Two-Semester Undergraduate Sequence in Software Engineering: Architecutre & Experience (DBB, APM), pp. 5–22.
- CSEE-1994-JohnstonW #experience
- Building on Experience: An Undegraduate Course with Two Year-Long Projects (LJ, PWD), pp. 345–357.
- CSEE-1994-MooreP #experience #learning #re-engineering
- Learning by Doing: Goals & Experience of Two Software Engineering Project Courses (MMM, CP), pp. 151–164.
- STOC-1994-FeigeK #fault #protocol #proving
- Two prover protocols: low error at affordable rates (UF, JK), pp. 172–183.
- STOC-1994-JiangSV
- Two heads are better than two tapes (TJ, JIS, PMBV), pp. 668–675.
- ICALP-1994-AmirBF #2d
- Optimal Two-Dimensional Compressed Matching (AA, GB, MF), pp. 215–226.
- CHI-1994-KabbashBS94a
- Two-handed input in a compound task (PK, WB, AS), pp. 417–423.
- CHI-1994-MasuiN94b #editing #performance #predict
- Repeat and predict — two keys to efficient text editing (TM, KN), pp. 118–123.
- CHI-1994-MynattW94a #user interface #visual notation
- Nonvisual presentation of graphical user interfaces: contrasting two approaches (EDM, GW), pp. 166–172.
- CHI-1994-RiemanLYP94a #architecture #consistency #interface #reasoning #why
- Why is a raven like a writing desk?: lessons in interface consistency and analogical reasoning from two cognitive architectures (JR, CHL, RMY, PGP), pp. 438–444.
- AdaEurope-1994-Schneeweiss #object-oriented
- Shlaer/Mellor or Rumbaugh? A Discussion of two Popular Object-Oriented Methods (HS), pp. 155–161.
- CIKM-1994-HelalKF
- Quasi-Dynamic Two-Phase Locking (AH, THK, JF), pp. 211–218.
- KDD-1994-GregoryC #algorithm #modelling
- Two Algorithms for Inducing Causal Models from Data (DEG, PRC), pp. 73–84.
- SAC-1994-ChangCG #abstract interpretation #bottom-up #execution #logic programming #source code
- Abstract filters: improving bottom-up execution of logic programs by two-phase abstract interpretation (BMC, KMC, RG), pp. 388–393.
- SAC-1994-MortonTBS #2d #adaptation #finite #simulation
- An adaptive finite element methodology for 2D simulation of two-phase flow through porous media (DJM, JMT, ATB, PAS), pp. 357–362.
- HPDC-1994-Benslimane #bound #communication #finite #state machine
- Deciding Boundedness for Systems of Two Communicating Finite State Machines (AB), pp. 262–269.
- DAC-1993-ChakravartyG #algorithm #fault
- An Algorithm for Diagnosing Two-Line Bridging Faults in Combinational Circuits (SC, YG), pp. 520–524.
- DAC-1993-CoudertMF #logic
- A New Viewpoint on Two-Level Logic Minimization (OC, JCM, HF), pp. 625–630.
- DAC-1993-PapaefthymiouR #named
- TIM: A Timing Package for Two-Phase, Level-Clocked Circuitry (MCP, KHR), pp. 497–502.
- ICDAR-1993-KrtolicaM #algorithm #recognition
- Two-stage box connectivity algorithm for optical character recognition (RK, SM), pp. 179–182.
- ICDAR-1993-Viard-GaudinNB #2d #algorithm #approach #using
- A bar code location algorithm using a two-dimensional approach (CVG, NN, DB), pp. 45–48.
- VLDB-1993-LampsonL #commit #optimisation
- A New Presumed Commit Optimization for Two Phase Commit (BWL, DBL), pp. 630–640.
- STOC-1993-ChouK #2d #complexity
- Some complexity issues on the simply connected regions of the two-dimensional plane (AWC, KIK), pp. 1–10.
- DLT-1993-Gimmarresi #2d
- Two-Dimensional Languages and Recognizable Functions (DG), pp. 290–301.
- ICALP-1993-IbarraJTW #decidability
- New Decidability Results Concerning Two-way Counter Machines and Applications (OHI, TJ, NQT, HW), pp. 313–324.
- HCI-SHI-1993-LeeWV #2d #interactive #interface
- Interactive Haptic Interface: Two-Dimensional Form Perception for Blind Access to Computers (SL, SFW, GCV), pp. 190–195.
- INTERCHI-1993-NielsenP #empirical #heuristic #interface #usability
- Estimating the relative usability of two interfaces: heuristic, formal, and empirical methods compared (JN, VLP), pp. 214–221.
- AdaEurope-1993-KamradH #ada #case study #realtime
- Applying Ada 9X to Two Real-Time Applications: A Case Study (JMKI, JH), pp. 79–94.
- AdaEurope-1993-MancusiTRSPB #architecture
- Real and Virtual Interrupt Support: The Mapping of a CARTS Feature to Two Different Architectures (RM, JLT, MR, ENS, MP, CLB), pp. 314–329.
- TRI-Ada-1993-Byrnes #ada #migration
- Porting Applications Between Two Commercial Ada/Motif Bindings (CB), pp. 37–49.
- SEKE-1993-MochizukiYK #design #modelling #process
- Two Models for Describing Software Design Process: Object-Centered Model and Phase-Centered Model (SM, AY, TK), pp. 291–295.
- SAC-1993-FrederickSW #algorithm #metric #network #problem #search-based
- The Hamming Metric in Genetic Algorithms and Its Application to Two Network Problems (WGF, RLS, CMW), pp. 126–130.
- SAC-1993-Sabharwal93a #2d #3d #image #parametricity
- Recovering 3D Image Parameters from Corresponding Two 2D Images (CLS), pp. 402–409.
- DAC-1992-LeeM #logic #multi #simulation
- Two New Techniques for Compiled Multi-Delay Logic Simulation (YSL, PMM), pp. 420–423.
- DAC-1992-Malik #multi #network #optimisation #using
- Optimization of Primitive Gate Networks Using Multiple Output Two-Level Minimization (AAM), pp. 449–453.
- HT-ECHT-1992-MarshallR #case study #experience
- Two Years before the Mist: Experiences with Aquanet (CCM, RAR), pp. 53–62.
- STOC-1992-AmirBF #2d #independence
- Alphabet Independent Two Dimensional Matching (AA, GB, MF), pp. 59–68.
- STOC-1992-FeigeL92a #problem #proving
- Two-Prover One-Round Proof Systems: Their Power and Their Problems (Extended Abstract) (UF, LL), pp. 733–744.
- ICALP-1992-BodlaenderFW
- Two Strikes Against Perfect Phylogeny (HLB, MRF, TW), pp. 273–283.
- CHI-1992-BallasHP #aspect-oriented
- Evaluating Two Aspects of Direct Manipulation in Advanced Cockpits (JAB, CLH, MAP), pp. 127–134.
- CHI-1992-MacKenzieB #2d
- Extending Fitts’ Law to Two-Dimensional Tasks (ISM, WB), pp. 219–226.
- CSCW-1992-Harper #research #social
- Looking at Ourselves: An Examination of the Social Organisation of Two Research Laboratories (RHRH), pp. 330–337.
- SEKE-1992-AlcarazNHB #maintenance #monitoring #realtime
- Two Real-Time Expert Systems for Monitoring and Maintenance of Digital Exchanges (FA, MN, AH, JLB), pp. 364–369.
- PLILP-1992-SaidiB #debugging #two-level grammar
- Checking and Debugging of Two-level Grammars (SS, JFB), pp. 158–171.
- JICSLP-1992-AlferesP #logic programming #on the #semantics
- On Logic Program Semantics with Two Kinds of Negation (JJA, LMP), pp. 574–588.
- DAC-1991-ChenM #pipes and filters #scheduling
- Datapath Scheduling for Two-Level Pipelining (CYRC, MZM), pp. 603–606.
- DAC-1991-DoodWLS #2d #geometry
- A Two-Dimensional Topological Compactor With Octagonal Geometry (PdD, JW, EL, RS), pp. 727–731.
- DAC-1991-SoeK #logic #using
- Logic Minimization using Two-column Rectangle Replacement (SS, KK), pp. 470–473.
- DAC-1991-Wang #layout #novel
- Novel Routing Schemes for IC Layout, Part I: Two-Layer Channel Routing (DCW), pp. 49–53.
- PODS-1991-MalvestutoMR #2d #information management #statistics
- Suppressing Marginal Cells to Protect Sensitive Information in a Two-Dimensional Statistical Table (FMM, MM, MR), pp. 252–258.
- PLDI-1991-Launchbury #analysis #strict
- Strictness and Binding-Time Analyses: Two for the Price of One (JL), pp. 80–91.
- STOC-1991-CoffmanG #proving #scheduling
- Proof of the 4/3 Conjecture for Preemptive vs. Nonpreemptive Two-Processor Scheduling (EGCJ, MRG), pp. 241–248.
- STOC-1991-CohenM #algorithm #difference #linear
- Improved Algorithms for Linear Inequalities with Two Variables per Inequality (Extended Abstract) (EC, NM), pp. 145–155.
- STOC-1991-Kilian #game studies #theorem
- A General Completeness Theorem for Two-Party Games (JK), pp. 553–560.
- ICALP-1991-CuckerT #formal method #problem
- Two P-Complete Problems in the Theory of the Reals (FC, AT), pp. 556–565.
- ICALP-1991-JungSS #algorithm #constraints #parallel #precedence #scheduling
- A Parallel Algorithm for Two Processors Precedence Constraint Scheduling (HJ, MJS, PGS), pp. 417–428.
- VDME-1991-2-Woodcock91c #case study #refinement
- Two Refinement Case Studies (JW), pp. 118–140.
- CHI-1991-BorningT #interactive #network #video
- Two approaches to casual interaction over computer and video networks (AB, MT), pp. 13–19.
- CHI-1991-Grudin #convergence #development #named
- CSCW: the convergence of two development contexts (JG), pp. 91–97.
- AdaEurope-1991-GilbertTB #ada #embedded #experience #process #realtime #using
- Experience Developing two Ada Applications for Embedded Real-Time Systems Using Different Software Processes (BG, MT, GB), pp. 394–403.
- SIGIR-1991-AgostiCG #hypermedia #retrieval
- A Two-Level Hypertext Retrieval Model for Legal Data (MA, RC, GG), pp. 316–325.
- PLILP-1991-Davison
- From Parlog to Polka in two easy Steps (AD), pp. 171–182.
- ASPLOS-1991-CateG #file system #integration
- Integration of Compression and Caching for a Two-Level File System (VC, TRG), pp. 200–211.
- CAV-1991-SegerJ #using #verification
- A Two-Level Formal Verification Methodology using HOL and COSMOS (CJHS, JJJ), pp. 299–309.
- DAC-1990-MalikBNS #logic #multi
- Reduced Offsets for Two-Level Multi-Valued Logic Minimization (AAM, RKB, ARN, ALSV), pp. 290–296.
- VLDB-1990-Garcia-MolinaPH #algorithm
- Two Epoch Algorithms for Disaster Recovery (HGM, CAP, RBH), pp. 222–230.
- PLDI-1990-Horwitz #difference #identification #semantics
- Identifying the Semantic and Textual Differences Between Two Versions of a Program (SH), pp. 234–245.
- PLDI-1990-PughW #inheritance #layout #multi
- Two-Directional Record Layout for Multiple Inheritance (WP, GEW), pp. 85–91.
- STOC-1990-MillerT
- Separators in Two and Three Dimensions (GLM, WPT), pp. 300–309.
- ICALP-1990-Anselmo #automaton #multi
- Two-Way Automata with Multiplicity (MA), pp. 88–102.
- VDME-1990-LafontaineLS #formal method #towards
- Two Approaches towards the Formalisation of VDM (CL, YL, PYS), pp. 370–398.
- CAV-1990-Clarke #explosion #logic #model checking #problem
- Temporal Logic Model Checking: Two Techniques for Avoiding the State Explosion Problem (EMC), p. 1.
- DAC-1989-DaveP #generative #testing #using
- A Functional-Level Test Generation Methodology Using Two-level Representations (UJD, JHP), pp. 722–725.
- DAC-1989-IrwinO #2d #comparison #layout #matrix #tool support
- A Comparison of Four Two-dimensional Gate Matrix Layout Tools (MJI, RMO), pp. 698–701.
- DAC-1989-LinDY #2d #layout #matrix #synthesis
- Gate Matrix Layout Synthesis with Two-Dimensional Folding (IL, DHCD, SHCY), pp. 37–42.
- DAC-1989-ShinL #2d #algorithm #layout #performance
- An Efficient Two-Dimensional Layout Compaction Algorithm (HS, CYL), pp. 290–295.
- DAC-1989-VillaS #finite #implementation #logic #named #state machine
- NOVA: State Assignment of Finite State Machines for Optimal Two-level Logic Implementations (TV, ALSV), pp. 327–332.
- ICALP-1989-MehlhornP #source code
- Two Versus One Index Register and Modifiable Versus Non-modifiable Programs (KM, WJP), pp. 603–609.
- CHI-1989-Raskin
- Systemic implications of leap and an improved two-part cursor (JR), pp. 167–170.
- ML-1989-PagalloH #algorithm
- Two Algorithms That Learn DNF by Discovering Relevant Features (GP, DH), pp. 119–123.
- ML-1989-Selfridge #adaptation #case study #contest #learning
- Atoms of Learning II: Adaptive Strategies A Study of Two-Person Zero-Sum Competition (OGS), pp. 412–415.
- SEKE-1989-LeaC #agile #prototype
- A Two-Level Model for Software Rapid Prototyping (RJL, CGC), pp. 73–78.
- SOSP-1989-BarkleyL #bound #lazy evaluation
- A Lazy Buddy System Bounded by Two Coalescing Delays per Class (REB, TPL), pp. 167–176.
- DAC-1988-HillAHS #algorithm #fault #simulation
- A New Two Task Algorithm for Clock Mode Fault Simulation in Sequential Circuits (FJH, EA, WKH, GQS), pp. 583–586.
- PODS-1988-Kelter #concurrent #protocol #queue
- The Queue Protocol: A Deadlock-free Homogeneous Non-Two-Phase Locking Protocol (UK), pp. 142–151.
- STOC-1988-PintzSS #infinity #performance #testing
- Two Infinite Sets of Primes with Fast Primality Tests (JP, WLS, ES), pp. 504–509.
- ICALP-1988-LingasS #algorithm #graph #morphism #polynomial
- A Polynomial-Time Algorithm for Subgraph Isomorphism of Two-Connected Series-Parallel Graphs (AL, MMS), pp. 394–409.
- CSCW-1988-BjerknesB #evaluation
- The Memoirs of two Survivors: or the Evaluation of a Computer System for Cooperative Work (GB, TB), pp. 167–177.
- ML-1988-NatarajanT #framework #learning
- Two New Frameworks for Learning (BKN, PT), pp. 402–415.
- SIGIR-1988-YuM #information retrieval #learning
- Two Learning Schemes in Information Retrieval (CTY, HM), pp. 201–218.
- CCHSC-1988-WeisgerberW #pattern matching
- Two Tree Pattern Matchers for Code Selection (BW, RW), pp. 215–229.
- CADE-1988-MarcusR #automation #implementation #proving
- Two Automated Methods in Implementation Proofs (LM, TR), pp. 622–642.
- LICS-1988-Meyer #paradigm #semantics
- Semantical Paradigms: Notes for an Invited Lecture, with Two Appendices by Stavros S. Cosmadakis (ARM), pp. 236–253.
- PLDI-1987-Pittman #execution #hybrid #interpreter #performance
- Two-level hybrid interpreter/native code execution for combined space-time program efficiency (TP), pp. 150–152.
- STOC-1987-DietzS #algorithm #maintenance #order
- Two Algorithms for Maintaining Order in a List (PFD, DDS), pp. 365–372.
- STOC-1987-MaassSS #turing machine
- Two Tapes Are Better than One for Off-Line Turing Machines (WM, GS, ES), pp. 94–100.
- STOC-1987-Munro
- Searching a Two Key Table Under a Single Key (JIM), pp. 383–387.
- ESEC-1987-CartmellA #database #eclipse #interface
- The Eclipse Two-Tier Database Interface (JC, AA), pp. 129–137.
- DAC-1986-Sasao #generative #multi #named #synthesis #using
- MACDAS: multi-level AND-OR circuit synthesis using two-variable function generators (TS), pp. 86–93.
- DAC-1986-ShinSS #2d
- Two-dimensional compaction by “zone refining” (HS, ALSV, CHS), pp. 115–122.
- ESOP-1986-Nielson #code generation #correctness #metalanguage
- Correctness of Code Generation from a Two-Level Meta-Language (FN), pp. 30–40.
- ESOP-1986-NielsonN #aspect-oriented #metalanguage
- Pragmatic Aspects of Two-Level Denotational Meta-Languages (HRN, FN), pp. 133–143.
- STOC-1986-AjtaiBHKPRST #bound #branch #source code
- Two lower bounds for branching programs (MA, LB, PH, JK, PP, VR, ES, GT), pp. 30–38.
- STOC-1986-Bern #probability
- Two Probabilistic Results on Rectilinear Steiner Trees (MWB), pp. 433–441.
- STOC-1986-LuekerMR #difference #linear #programming
- Linear Programming with Two Variables per Inequality in Poly-Log Time (Preliminary Version) (GSL, NM, VR), pp. 196–205.
- ICALP-1986-AverbuchWG #algorithm #classification #polynomial
- Classification of all the Minimal Bilinear Algorithms for Computing the Coefficients of the Product of Two Polynomials Modulo a Polynomial (AA, SW, ZG), pp. 31–39.
- SIGIR-1986-Fuhr #modelling #probability #retrieval
- Two Models of Retrieval with Probabilistic Indexing (NF), pp. 249–257.
- DAC-1985-Marek-Sadowska #2d #layout
- Two-dimensional router for double layer layout (MMS), pp. 117–123.
- SIGMOD-1985-CliffordT #algebra #database #on the #relational
- On An Algebra For Historical Relational Databases: Two Views (JC, AUT), pp. 247–265.
- STOC-1985-FichHRW #bound #infinity #parallel
- One, Two, Three … Infinity: Lower Bounds for Parallel Computation (FEF, FMadH, PR, AW), pp. 48–58.
- STOC-1985-Vazirani #communication #complexity #generative #sequence #towards
- Towards a Strong Communication Complexity Theory or Generating Quasi-Random Sequences from Two Communicating Slightly-random Sources (Extended Abstract) (UVV), pp. 366–378.
- STOC-1985-VaziraniV #problem #scheduling
- The Two-Processor Scheduling Problem is in R-NC (UVV, VVV), pp. 11–21.
- ICSE-1985-KafuraC #metric #using #validation
- A Validation of Software Metrics Using Many Metrics and Two Resources (DGK, JC), pp. 378–385.
- ICSE-1985-YellinM #attribute grammar
- Two-Way Translators Based on Attribute Grammar Inversion (DMY, EMMM), pp. 36–42.
- RTA-1985-CosmadakisK #database #equation
- Two Applications of Equational Theories to Database Theory (SSC, PCK), pp. 107–123.
- RTA-1985-Hsiang #proving #term rewriting #theorem proving
- Two Results in Term Rewriting Theorem Proving (JH), pp. 301–324.
- DAC-1984-MarkovFB #2d #optimisation
- Optimization techniques for two-dimensional placement (LAM, JRF, JHB), pp. 652–654.
- STOC-1984-AdlerM #algorithm #bound #polynomial
- A Simplex Algorithm Whose Average Number of Steps is Bounded between Two Quadratic Functions of the Smaller Dimension (IA, NM), pp. 312–323.
- SIGIR-1984-Bollmann #axiom #evaluation #information retrieval #metric
- Two Axioms for Evaluation Measures in Information Retrieval (PB), pp. 233–245.
- ILPC-1984-Miklos84 #case study #comparison #logic programming #programming language
- A Comparison of two Logic Programming Languages: A Case Study (MS), pp. 41–51.
- VLDB-1983-DasguptaK #concurrent #database #protocol
- A Non-Two-Phase Locking Protocol for Concurrency Control in General Databases (PD, ZMK), pp. 92–94.
- VLDB-1983-LinN #multi
- Basic Timestamp, Multiple Version Timestamp, and Two-Phase Locking (WTKL, JN), pp. 109–119.
- STOC-1983-BorodinDFP #bound #branch #source code
- Bounds for Width Two Branching Programs (AB, DD, FEF, WJP), pp. 87–93.
- STOC-1983-DurisGPR #bound
- Two Nonlinear Lower Bounds (PD, ZG, WJP, RR), pp. 127–132.
- ICALP-1983-SpinradV #2d #morphism #partial order #recognition
- Recognition and Isomorphism of Two Dimensional Partial Orders (JPS, JV), pp. 676–686.
- DAC-1982-ChandrasekharB
- Optimum placement of two rectangular blocks (MSC, MAB), pp. 879–886.
- DAC-1982-CosmaiCMN #2d #interactive
- An interactive drafting system based on two dimensional primitives (GC, UC, PM, AN), pp. 521–529.
- DAC-1982-Hsu #2d #algorithm
- A new two-dimensional routing algorithm (CPH), pp. 46–50.
- DAC-1982-Pinter #on the
- On routing two-point nets across a channel (RYP), pp. 894–902.
- DAC-1982-WieselM #2d #problem
- Two-dimensional channel routing and channel intersection problems (MW, DAM), pp. 733–739.
- PODS-1982-MenasceN #commit #evaluation #performance #protocol
- Performance Evaluation of a Two-Phase Commit Based Protocol for DDBS (DAM, TN), pp. 247–255.
- PODS-1982-MohanFS #commutative #protocol
- Compatibility and Commutativity in Non-two-phase Locking Protocols (CM, DSF, AS), pp. 283–292.
- VLDB-1982-KedemMS #concurrent #performance #protocol
- An Efficient Deadlock Removal Scheme for Non-Two-Phase Locking Protocols (ZMK, CM, AS), pp. 91–97.
- STOC-1982-DurisG #nondeterminism
- Two Tapes are Better than One for Nondeterministic Machines (PD, ZG), pp. 1–7.
- STOC-1982-InoueTT #2d #turing machine
- Two-Dimensional Alternating Turing Machines (KI, IT, HT), pp. 37–46.
- GG-1982-Staples #evaluation #performance #representation
- Two-level expression representation for faster evaluation (JS), pp. 392–404.
- ILPC-1982-Blair82
- The Undecidability of Two Completeness Notions for the “Negation as Failure” (HAB), pp. 164–168.
- ILPC-1982-MaluszynskiN82 #comparison #logic programming #programming language #prolog
- A Comparison of the Logic Programming Language Prolog with Two-levels Grammars (JM, JFN), pp. 193–199.
- SIGMOD-1981-Lin #concurrent #database #distributed #evaluation #performance
- Performance Evaluation of Two Concurrency Control Mechanisms in a Distributed Database System (WTKL), pp. 84–92.
- STOC-1981-DurisG #automaton
- Fooling a Two-Way Automaton or One Pushdown Store Is Better Than One Counter for Two Way Machines (Preliminary Version) (PD, ZG), pp. 177–188.
- ICALP-1981-ItzhaikY #equivalence #linear
- A Decision Procedure for the Equivalence of Two DPDAs, One of Which is Linear (Extended Abstract) (YI, AY), pp. 229–237.
- ICSE-1981-BaerGGR #modelling #protocol #proving #specification
- The Two-Step Commitment Protocol: Modeling, Specification and Proof Methodology (JLB, GG, CG, GR), pp. 363–373.
- SOSP-1981-MitchellD #comparison
- A Comparison of Two Network-Based File Servers (JGM, JD), pp. 45–46.
- DAC-1980-GouldE #array #design #standard
- The standard transistor array (STAR): Part I A two-layer metal semicustom design system (JMG, TME), pp. 108–113.
- DAC-1980-LuebbertU
- Gate assignment and pack placement: Two approaches compared (FL, MU), pp. 472–482.
- VLDB-1980-KedemS #protocol
- Non-Two-Phase Locking Protocols with Shared and Exclusive Locks (ZMK, AS), pp. 309–317.
- STOC-1980-Tompa80a #algorithm #implementation #polynomial #sublinear #transitive
- Two Familiar Transitive Closure Algorithms which Admit No Polynomial Time, Sublinear Space Implementations (MT), pp. 333–338.
- SIGIR-1980-Bookstein #comparison #retrieval
- A Comparison of Two Weighting Schemes for Boolean Retrieval (AB), pp. 23–34.
- DAC-1979-Goto #2d #algorithm #layout #problem #slicing
- A two-dimensional placement algorithm for the master slice LSI layout problem (SG), pp. 11–17.
- VLDB-1979-KawazuMIT #algorithm #concurrent #database #detection #distributed
- Two-Phase Deadlock Detection Algorithm in Distributed Databases (SK, SM, KI, KT), pp. 360–367.
- VLDB-1979-QuintellaGOAL #case study #database #development #tool support
- A Methodologic Guide-Line for the Instalation of Data Base Development Tools and Data Administration Tools: Two Case Studies from Brazil (HMQ, GAdG, MRdO, LTdA, FRL), pp. 313–318.
- ICALP-1979-DembinskiM #equation #two-level grammar
- Two Level Grammars: CF-Grammars with Equation Schemes (PD, JM), pp. 171–187.
- ICALP-1979-FichB
- A Characterization of a Dot-Depth Two Analogue of Generalized Definite Languages (FEF, JAB), pp. 230–244.
- ICALP-1979-Heide #comparison #game studies #graph
- A Comparison Between Two Variations of a Pebble Game on Graphs (FMadH), pp. 411–421.
- ICALP-1979-Wegner #approach #decidability #two-level grammar
- Bracketed Two-Level Grammars — A Decidable and Practical Approach to Language Definitions (LMW), pp. 668–682.
- DAC-1978-Haims #2d #on the #problem
- On the optimum two-dimensional allocation problem (MJH), pp. 298–304.
- SIGMOD-1978-YamamotoTUI #design #multi #order
- Design of a Generalized Balanced Multiple-Valued File Organization Scheme of Order Two (SY, ST, KU, HI), pp. 47–51.
- STOC-1978-EngelfrietRS #transducer
- Tree Transducers, L Systems and Two-Way Machines (Extended Abstract) (JE, GR, GS), pp. 66–74.
- STOC-1978-SakodaS #automaton #finite #nondeterminism
- Nondeterminism and the Size of Two Way Finite Automata (WJS, MS), pp. 275–286.
- GG-1978-Hesse #graph grammar
- Two-Level Graph Grammars (WH), pp. 255–269.
- GG-1978-LuckL #2d #difference #generative #graph #parallel
- Two-Dimensional, Differential, Intercalary Plant Tissue Growth and Parallel Graph Generating and Graph Recurrence Systems (JL, HBL), pp. 284–300.
- GG-1978-Pfaltz #2d #graph grammar #network #set
- A Graph Grammar that Describes the Set of Two-Dimensional Surface Networks (JLP), pp. 379–388.
- DAC-1977-NishiokaKN #automation #layout
- A minicomputerized automatic layout system for two-layer printed wiring boards (IN, TK, HN), pp. 1–11.
- DAC-1976-WuS #algorithm #float
- A new routing algorithm for two-sided boards with floating vias (WW, DCS), pp. 151–160.
- STOC-1976-Schaefer #complexity #finite #game studies #problem
- Complexity of Decision Problems Based on Finite Two-Person Perfect-Information Games (TJS), pp. 41–49.
- STOC-1975-Fredman #probability #sorting
- Two Applications of a Probabilistic Search Technique: Sorting x + y and Building Balanced Search Trees (MLF), pp. 240–244.
- ICALP-1974-Wijngaarden #generative #power of #two-level grammar
- The Generative Power of Two-Level Grammars (AvW), pp. 9–16.
- STOC-1973-Constable #complexity
- Type Two Computational Complexity (RLC), pp. 108–121.
- STOC-1971-Rajlich #finite #parallel #transducer
- Absolutely Parallel Grammars and Two-Way Deterministic Finite-State Transducers (VR), pp. 132–137.
- STOC-1970-Chang #2d #analysis #using
- The Analysis of Two-Dimensional Patterns using Picture Processing Grammars (SKC), pp. 206–216.
- SOSP-1969-Karush #performance
- Two approaches for measuring the performance of time-sharing systems (ADK), pp. 159–166.
- SOSP-1969-VarehaRG
- Strategies for structuring two level memories in a paging environment (ALV, RMR, MMG), pp. 54–59.