633 papers:
- CASE-2015-LuSJSX #approach #multi #nondeterminism #programming
- A chance constrained programming approach for multi-product multi-stage integrated production planning under internal and external uncertainties (SL, HS, CJ, HS, LX), pp. 880–885.
- CASE-2015-MeddouriDF #analysis #generative #induction #performance #predict #using
- Performance analysis of an autonomous induction generator under different operating conditions using predictive control (SM, LAD, LF), pp. 1118–1124.
- CASE-2015-YuYS #multi
- Motion planning and manipulation of multiple nanowires simultaneouly under electric-fields in fluid suspension (KY, JY, JS), pp. 489–494.
- DAC-2015-BockHKS #algorithm #modelling
- Local search algorithms for timing-driven placement under arbitrary delay models (AB, SH, NK, US), p. 6.
- DAC-2015-GangopadhyayNR #power management
- Integrated power management in IoT devices under wide dynamic ranges of operation (SG, SBN, AR), p. 6.
- DAC-2015-HuangCZL #behaviour #named #realtime #scheduling
- PASS: priority assignment of real-time tasks with dynamic suspending behavior under fixed-priority scheduling (WHH, JJC, HZ, CL), p. 6.
- DAC-2015-JangPGB #self
- Self-correcting STTRAM under magnetic field attacks (JWJ, JP, SG, SB), p. 6.
- DAC-2015-RoyLUP #multi #named #optimisation #paradigm #performance
- OSFA: a new paradigm of gate-sizing for power/performance optimizations under multiple operating conditions (SR, DL, JU, DZP), p. 6.
- DATE-2015-PaoneRPZSS #constraints #framework #performance
- Customization of OpenCL applications for efficient task mapping under heterogeneous platform constraints (EP, FR, GP, VZ, IS, CS), pp. 736–741.
- DATE-2015-WangWXWWYDLMW #adaptation #process
- Adaptively tolerate power-gating-induced power/ground noise under process variations (ZW, XW, JX, XW, ZW, PY, LHKD, HL, RKVM, ZW), pp. 483–488.
- HT-2015-AhlersM #challenge #collaboration #concept #network #semantics
- Everything is Filed under “File”: Conceptual Challenges in Applying Semantic Search to Network Shares for Collaborative Work (DA, MM), pp. 327–328.
- PODS-2015-KoutrisW #complexity #consistency #constraints #query #self
- The Data Complexity of Consistent Query Answering for Self-Join-Free Conjunctive Queries Under Primary Key Constraints (PK, JW), pp. 17–29.
- SIGMOD-2015-MishimaF #database #middleware #migration #named
- Madeus: Database Live Migration Middleware under Heavy Workloads for Cloud Environment (TM, YF), pp. 315–329.
- SIGMOD-2015-SongZWY #constraints #named
- SCREEN: Stream Data Cleaning under Speed Constraints (SS, AZ, JW, PSY), pp. 827–841.
- ICSME-2015-CodobanRDB #case study #developer #how #lens #why
- Software history under the lens: A study on why and how developers examine it (MC, SSR, DD, BB), pp. 1–10.
- SCAM-2015-GhafariGR #automation #identification #testing
- Automatically identifying focal methods under test in unit test cases (MG, CG, KR), pp. 61–70.
- ICALP-v1-2015-BjorklundDH #exponential #problem #random #set #strict
- The Parity of Set Systems Under Random Restrictions with Applications to Exponential Time Problems (AB, HD, TH), pp. 231–242.
- LATA-2015-VerdierR #constraints #reachability #specification
- Quotient of Acceptance Specifications Under Reachability Constraints (GV, JBR), pp. 299–311.
- DUXU-IXD-2015-KarbayR #case study
- The Turkish Central Doctor Rendezvous System Under Spotlight: A User Study with Turkish Senior Users (EBK, KR), pp. 628–637.
- HIMI-IKC-2015-ZhouI #adaptation #behaviour
- Effect of Adaptive Caution on Driver’s Lane-Change Behavior under Cognitively Distracted Condition (HZ, MI), pp. 262–271.
- ICML-2015-GasseAE #classification #composition #multi #on the #set
- On the Optimality of Multi-Label Classification under Subset Zero-One Loss for Distributions Satisfying the Composition Property (MG, AA, HE), pp. 2531–2539.
- ICML-2015-HallakSMM #learning #modelling
- Off-policy Model-based Learning under Unknown Factored Dynamics (AH, FS, TAM, SM), pp. 711–719.
- ICML-2015-RichmanM #classification #constraints
- Dynamic Sensing: Better Classification under Acquisition Constraints (OR, SM), pp. 267–275.
- ICML-2015-WuGS #combinator #feedback #finite #identification #on the
- On Identifying Good Options under Combinatorially Structured Feedback in Finite Noisy Environments (YW, AG, CS), pp. 1283–1291.
- KDD-2015-Kaban #bound #random
- Improved Bounds on the Dot Product under Random Projection and Random Sign Projection (AK), pp. 487–496.
- KDD-2015-LeeWK #consistency #constraints #difference #privacy
- Maximum Likelihood Postprocessing for Differential Privacy under Consistency Constraints (JL, YW, DK), pp. 635–644.
- OOPSLA-2015-DietrichHS #analysis #java #points-to
- Giga-scale exhaustive points-to analysis for Java in under a minute (JD, NH, BS), pp. 535–551.
- SAC-2015-BechetCCC #constraints #mining #multi #sequence
- Sequence mining under multiple constraints (NB, PC, TC, BC), pp. 908–914.
- SAC-2015-BrideJM #approximate #generative #testing
- Tri-modal under-approximation of event systems for test generation (HB, JJ, PAM), pp. 1737–1744.
- SAC-2015-MainiS #communication #distributed #multi #using
- Distributed task servicing using multiple robots with human-in-the-loop under limited communication range (PM, PBS), pp. 301–306.
- SAC-2015-OliveiraLV #framework #performance #security #web #web service
- Characterizing the performance of web service frameworks under security attacks (RAO, NL, MV), pp. 1711–1718.
- ESEC-FSE-2015-MorenoCGS #adaptation #approach #model checking #nondeterminism #probability #self
- Proactive self-adaptation under uncertainty: a probabilistic model checking approach (GAM, JC, DG, BRS), pp. 1–12.
- ASPLOS-2015-MishraZLH #approach #constraints #energy #modelling #performance #probability #visual notation
- A Probabilistic Graphical Model-based Approach for Minimizing Energy Under Performance Constraints (NM, HZ, JDL, HH), pp. 267–281.
- ASPLOS-2015-WangJZY #memory management #named #reliability
- SD-PCM: Constructing Reliable Super Dense Phase Change Memory under Write Disturbance (RW, LJ, YZ, JY), pp. 19–31.
- ICLP-2015-LeeMW #logic #markov #semantics
- Markov Logic Style Weighted Rules under the Stable Model Semantics (JL, YM, YW).
- VMCAI-2015-DanMVY #abstraction #effectiveness #memory management #modelling #verification
- Effective Abstractions for Verification under Relaxed Memory Models (AMD, YM, MTV, EY), pp. 449–466.
- QoSA-2014-EtxeberriaTCS #hardware #nondeterminism #parametricity
- Performance-based selection of software and hardware features under parameter uncertainty (LE, CT, VC, GS), pp. 23–32.
- CASE-2014-HaoLGC #effectiveness #flexibility #markov #network #nondeterminism #problem #scheduling
- An effective Markov network based EDA for flexible job shop scheduling problems under uncertainty (XCH, LL, MG, CFC), pp. 131–136.
- CASE-2014-LeeJMC #framework #identification #recognition #robust
- Iterative identification framework for robust hand-written digit recognition under extremely noisy conditions (HL, SJ, TM, NYC), pp. 728–733.
- CASE-2014-ZhangHSL #coordination
- Inventory hedging and coordination under inventory-level-dependent demand (TZ, GQH, YS, SL), pp. 658–664.
- DAC-2014-RehmanKSSH #adaptation #code generation #dependence #named #process #reliability
- dTune: Leveraging Reliable Code Generation for Adaptive Dependability Tuning under Process Variation and Aging-Induced Effects (SR, FK, DS, MS, JH), p. 6.
- DAC-2014-SutariaRZRMC #modelling #random #simulation #validation
- BTI-Induced Aging under Random Stress Waveforms: Modeling, Simulation and Silicon Validation (KS, AR, RZ, RR, YM, YC), p. 6.
- DATE-2014-BanerjeeD #calculus #constraints #generative #random #realtime #sequence
- Acceptance and random generation of event sequences under real time calculus constraints (KB, PD), pp. 1–6.
- DATE-2014-GangopadhyayLNR #adaptation #analysis #linear #modelling #performance
- Modeling and analysis of digital linear dropout regulators with adaptive control for high efficiency under wide dynamic range digital loads (SG, YL, SBN, AR), pp. 1–6.
- DATE-2014-RehmanKSH #compilation #reliability
- Compiler-driven dynamic reliability management for on-chip systems under variabilities (SR, FK, MS, JH), pp. 1–4.
- DocEng-2014-Fan0N #using
- Paper stitching using maximum tolerant seam under local distortions (WF, JS, SN), pp. 35–44.
- SIGMOD-2014-AilamakiLTPP #how #multi
- How to stop under-utilization and love multicores (AA, EL, PT, DP, IP), pp. 189–192.
- SIGMOD-2014-IleanaCDK #constraints #query
- Complete yet practical search for minimal query reformulations under constraints (II, BC, AD, YK), pp. 1015–1026.
- VLDB-2014-KonstantinidisA #constraints #integration #optimisation #scalability
- Optimizing the Chase: Scalable Data Integration under Constraints (GK, JLA), pp. 1869–1880.
- VLDB-2014-LiHMW #algorithm #difference #privacy #query
- A Data- and Workload-Aware Query Answering Algorithm for Range Queries Under Differential Privacy (CL, MH, GM, YW), pp. 341–352.
- VLDB-2014-SongCY0 #constraints
- Repairing Vertex Labels under Neighborhood Constraints (SS, HC, JXY, LC), pp. 987–998.
- WRLA-2014-AlrahmanABL #concurrent #maude #memory management #modelling #question #source code
- Can We Efficiently Check Concurrent Programs Under Relaxed Memory Models in Maude? (YAA, MA, AB, ALL), pp. 21–41.
- CSMR-WCRE-2014-HoraEADV #api #evolution #named
- APIEvolutionMiner: Keeping API evolution under control (AH, AE, NA, SD, MTV), pp. 420–424.
- SAS-2014-BakhirkinBP #abstraction #analysis #approximate
- Backward Analysis via over-Approximate Abstraction and under-Approximate Subtraction (AB, JB, NP), pp. 34–50.
- STOC-2014-ImKM #algorithm #constraints #scheduling
- Competitive algorithms from competitive equilibria: non-clairvoyant scheduling under polyhedral constraints (SI, JK, KM), pp. 313–322.
- ICALP-v1-2014-CanonneR #probability #testing
- Testing Probability Distributions Underlying Aggregated Data (CLC, RR), pp. 283–295.
- ICALP-v1-2014-DvirOS #equivalence #testing
- Testing Equivalence of Polynomials under Shifts (ZD, RMdO, AS), pp. 417–428.
- FM-2014-MaricS #hardware #memory management #transaction #verification
- Verification of a Transactional Memory Manager under Hardware Failures and Restarts (OM, CS), pp. 449–464.
- CHI-2014-HernandezPRC
- Under pressure: sensing stress of computer users (JH, PP, AR, MC), pp. 51–60.
- CHI-2014-LeeLKKHC #approach
- An EEG-based approach for evaluating audio notifications under ambient sounds (YCL, WCL, JTK, LWK, YTH, FYC), pp. 3817–3826.
- CHI-2014-MasseyLW #repository
- Cloudy forecast: an exploration of the factors underlying shared repository use (CM, TL, SW), pp. 2461–2470.
- CHI-2014-PolitisBP #multimodal
- Evaluating multimodal driver displays under varying situational urgency (IP, SAB, FEP), pp. 4067–4076.
- DUXU-DP-2014-MukherjeeWHCR #design #tool support
- Designing Financial Literacy and Saving Tools for the Unbanked and under-banked in Brazil (AM, CW, SH, FC, WR), pp. 71–80.
- DUXU-TMT-2014-Greiner-PetterM #design
- Reframing Design under Technical Conditions (MGP, CM), pp. 96–103.
- DUXU-TMT-2014-SakamotoM #elicitation #interactive #mobile #named #perspective #requirements
- M4REMAIP: Method for Requirements Elicitation Based on Mobile Applications under an Interaction Perspective (SGS, LCdM), pp. 74–85.
- ICEIS-v1-2014-KozievitchHNT #data fusion #image #retrieval
- Exploring Data Fusion under the Image Retrieval Domain (NPK, CSH, JN, RdST), pp. 171–178.
- ICML-c2-2014-AzarLB #correlation #feedback #online #optimisation #probability
- Online Stochastic Optimization under Correlated Bandit Feedback (MGA, AL, EB), pp. 1557–1565.
- ICML-c2-2014-GunasekarRG #constraints #exponential #matrix #product line
- Exponential Family Matrix Completion under Structural Constraints (SG, PR, JG), pp. 1917–1925.
- ICML-c2-2014-KpotufeSJS #consistency
- Consistency of Causal Inference under the Additive Noise Model (SK, ES, DJ, BS), pp. 478–486.
- ICML-c2-2014-LiuZBP #dependence #modelling #multi #testing #visual notation
- Multiple Testing under Dependence via Semiparametric Graphical Models (JL, CZ, ESB, DP), pp. 955–963.
- ICML-c2-2014-WangHS #learning
- Active Transfer Learning under Model Shift (XW, TKH, JS), pp. 1305–1313.
- ICML-c2-2014-WangL #estimation #metric #robust
- Robust Inverse Covariance Estimation under Noisy Measurements (JKW, SdL), pp. 928–936.
- ICML-c2-2014-WenYG #learning #nondeterminism #robust
- Robust Learning under Uncertain Test Distributions: Relating Covariate Shift to Model Misspecification (JW, CNY, RG), pp. 631–639.
- ICPR-2014-DanismanBD #evaluation #gender #normalisation #recognition
- Cross-Database Evaluation of Normalized Raw Pixels for Gender Recognition under Unconstrained Settings (TD, IMB, CD), pp. 3144–3149.
- ICPR-2014-FerisBPS #detection
- Appearance-Based Object Detection Under Varying Environmental Conditions (RF, LMGB, SP, MTS), pp. 166–171.
- ICPR-2014-HuynhR #image
- Recovery of Spectral Sensitivity Functions from a Colour Chart Image under Unknown Spectrally Smooth Illumination (CPH, ARK), pp. 708–713.
- ICPR-2014-JoshiGG #automation #predict #using #visual notation
- Automatic Prediction of Perceived Traits Using Visual Cues under Varied Situational Context (JJ, HG, RG), pp. 2855–2860.
- ICPR-2014-KaradagV #image #markov #random
- Fusion of Image Segmentations under Markov, Random Fields (ÖÖK, FTYV), pp. 930–935.
- ICPR-2014-KimK #estimation #image #multi #pattern matching #robust
- Robust Surface Pattern Matching for Ball Spin Estimation with Multi-exposed Images Under Varying Illumination Conditions (JK, MK), pp. 4560–4563.
- ICPR-2014-MesterC #statistics
- When Patches Match — A Statistical View on Matching under Illumination Variation (RM, CC), pp. 4364–4369.
- ICPR-2014-QuLWXT #framework #robust #set
- Robust Point Set Matching under Variational Bayesian Framework (HBQ, JCL, JQW, LX, HJT), pp. 58–63.
- ICPR-2014-SattaGB #gender #information management #recognition
- Children Gender Recognition Under Unconstrained Conditions Based on Contextual Information (RS, JG, LB), pp. 357–362.
- ICPR-2014-SongSLZZC #detection #image
- Corner Detection in Images Under Different Noise Levels (YS, YS, SL, CZ, JZ, HC), pp. 906–911.
- ICPR-2014-VilaltaGM #adaptation #classification
- Domain Adaptation under Data Misalignment: An Application to Cepheid Variable Star Classification (RV, KDG, LM), pp. 3660–3665.
- KDD-2014-LuIBL #recommendation #social
- Optimal recommendations under attraction, aversion, and social influence (WL, SI, SB, LVSL), pp. 811–820.
- KDD-2014-LuM #difference #estimation #exponential #graph #privacy #random
- Exponential random graph estimation under differential privacy (WL, GM), pp. 921–930.
- KR-2014-Lin14a #axiom #first-order #higher-order #induction #semantics
- A First-Order Semantics for Golog and ConGolog under a Second-Order Induction Axiom for Situations (FL).
- SAC-2014-SpiegelJA #classification #distance #performance
- Fast time series classification under lucky time warping distance (SS, BJJ, SA), pp. 71–78.
- LICS-CSL-2014-LosemannM #query
- MSO queries on trees: enumerating answers under updates (KL, WM), p. 10.
- QoSA-2013-TrubianiMCAG #analysis #architecture #modelling #nondeterminism #performance
- Model-based performance analysis of software architectures under uncertainty (CT, IM, VC, AA, LG), pp. 69–78.
- CASE-2013-DotoliEFPST #network #realtime
- A real time traffic management model for regional railway networks under disturbances (MD, NE, MF, AP, FS, BT), pp. 892–897.
- CASE-2013-LinG #detection #framework #network #optimisation #synthesis
- Synthesis and optimization of a Bayesian belief network based observation platform for anomaly detection under partial and unreliable observations (WCL, HEG), pp. 51–58.
- CASE-2013-SunSS #optimisation #scheduling
- Integrated operating room scheduling optimization under particularly workload constrain of surgeon (BS, JS, LS), pp. 972–977.
- CASE-2013-WangBR #modelling #monitoring #using
- Model based unbalance monitoring using augmented observer in rotor systems under the consideration of gyroscopic effect (ZW, MB, SR), pp. 59–64.
- DAC-2013-AxerE #fault #probability #scheduling
- Stochastic response-time guarantee for non-preemptive, fixed-priority scheduling under errors (PA, RE), p. 7.
- DAC-2013-BanerjeeDSC #adaptation #constraints #energy #performance #realtime
- Real-time use-aware adaptive MIMO RF receiver systems for energy efficiency under BER constraints (DB, SKD, SS, AC), p. 7.
- DAC-2013-CalimeraMP #constraints #energy #fault #scheduling
- Energy-optimal SRAM supply voltage scheduling under lifetime and error constraints (AC, EM, MP), p. 6.
- DAC-2013-LuoCH #design #nondeterminism
- Design of cyberphysical digital microfluidic biochips under completion-time uncertainties in fluidic operations (YL, KC, TYH), p. 7.
- DAC-2013-YousofshahiOLH #capacity #identification #nondeterminism
- Gene modification identification under flux capacity uncertainty (MY, MO, KL, SH), p. 5.
- DATE-2013-ChenRSIFC #analysis #process
- A SPICE-compatible model of graphene nano-ribbon field-effect transistors enabling circuit-level delay and power analysis under process variation (YYC, AR, AS, GI, GF, DC), pp. 1789–1794.
- DATE-2013-Hara-AzumiFKT #process
- Instruction-set extension under process variation and aging effects (YHA, FF, SK, MBT), pp. 182–187.
- DATE-2013-LuZ #constraints #fault
- Retiming for Soft Error Minimization Under Error-Latching Window Constraints (YL, HZ), pp. 1008–1013.
- PODS-2013-AgarwalAHPYZ #nearest neighbour #nondeterminism
- Nearest neighbor searching under uncertainty II (PKA, BA, SHP, JMP, KY, WZ), pp. 115–126.
- VLDB-2014-KaranasosKM13 #capacity #constraints #named #scalability
- Delta: Scalable Data Dissemination under Capacity Constraints (KK, AK, IM), pp. 217–228.
- ESOP-2013-JagadeesanPPR #composition #memory management #modelling #reasoning
- Quarantining Weakness — Compositional Reasoning under Relaxed Memory Models (Extended Abstract) (RJ, GP, CP, JR), pp. 492–511.
- TACAS-2013-AbdullaACLR #automation #precise
- Memorax, a Precise and Sound Tool for Automatic Fence Insertion under TSO (PAA, MFA, YFC, CL, AR), pp. 530–536.
- TACAS-2013-KempfBM #nondeterminism #probability #scheduling
- As Soon as Probable: Optimal Scheduling under Stochastic Uncertainty (JFK, MB, OM), pp. 385–400.
- STOC-2013-AndoniGMP #sketching
- Homomorphic fingerprints under misalignments: sketching edit and shift distances (AA, AG, AM, EP), pp. 931–940.
- STOC-2013-Bernstein #graph #maintenance
- Maintaining shortest paths under deletions in weighted directed graphs: [extended abstract] (AB), pp. 725–734.
- STOC-2013-BrandaoH #metric #quantum #theorem
- Quantum de finetti theorems under local measurements with applications (FGSLB, AWH), pp. 861–870.
- IFL-2013-HackettHJ #approach #optimisation #recursion #source code
- The Under-Performing Unfold: A new approach to optimising corecursive programs (JH, GH, MJ), p. 1.
- DUXU-WM-2013-GotzeCKSB #concept #evaluation
- Evaluation of a New Cockpit Color Concept under Mesopic Lighting for Urban Driving (MG, ASC, AK, TS, KB), pp. 359–366.
- HCI-AMTE-2013-FedericiBM #assessment #evaluation #framework #interactive #process
- Environmental Evaluation of a Rehabilitation Aid Interaction under the Framework of the Ideal Model of Assistive Technology Assessment Process (SF, SB, MLM), pp. 203–210.
- HIMI-D-2013-WuCLB #evaluation #usability
- Usability Evaluation of the Universal Computer Workstation under Supine, Sitting and Standing Postures (HCW, MCC, CLL, MYB), pp. 151–156.
- EDOC-2013-GuediHMN
- Sizing the Underlying Factorization Structure of a Class Model (AOG, MH, AM, CN), pp. 167–172.
- ICEIS-v3-2013-HsuK #case study
- A Study of Cognitive Effort of Decision Makers with Different NC under Framing (CWH, ClK), pp. 75–82.
- ICML-c1-2013-RamdasS #optimisation #probability
- Optimal rates for stochastic convex optimization under Tsybakov noise condition (AR, AS), pp. 365–373.
- ICML-c3-2013-0002YY #linear
- Guaranteed Sparse Recovery under Linear Transformation (JL, LY, JY), pp. 91–99.
- ICML-c3-2013-ChenCM #robust
- Robust Sparse Regression under Adversarial Corruption (YC, CC, SM), pp. 774–782.
- ICML-c3-2013-DalalyanHMS #learning #modelling #programming
- Learning Heteroscedastic Models by Convex Programming under Group Sparsity (ASD, MH, KM, JS), pp. 379–387.
- ICML-c3-2013-JoulaniGS #feedback #learning #online
- Online Learning under Delayed Feedback (PJ, AG, CS), pp. 1453–1461.
- ICML-c3-2013-MenonNAC #algorithm #classification #consistency #on the #statistics
- On the Statistical Consistency of Algorithms for Binary Classification under Class Imbalance (AKM, HN, SA, SC), pp. 603–611.
- ICML-c3-2013-ZhangSMW #adaptation
- Domain Adaptation under Target and Conditional Shift (KZ, BS, KM, ZW), pp. 819–827.
- KDD-2013-AbbassiMT #constraints
- Diversity maximization under matroid constraints (ZA, VSM, MT), pp. 32–40.
- KEOD-2013-NogueiraG #multi #nondeterminism #programming #set
- Supply Chain Tracing of Multiple Products under Uncertainty and Incomplete Information — An Application of Answer Set Programming (MLN, NPG), pp. 399–406.
- MLDM-2013-WilliamsHFR #classification #distance #evaluation #probability
- Area under the Distance Threshold Curve as an Evaluation Measure for Probabilistic Classifiers (SW, MH, JDF, DSR), pp. 644–657.
- QAPL-2013-GazeauMP #difference #privacy #semantics
- Preserving differential privacy under finite-precision semantics (IG, DM, CP), pp. 1–18.
- SAC-2013-BellatrecheBCM #algorithm #clustering #incremental #query
- Horizontal partitioning of very-large data warehouses under dynamically-changing query workloads via incremental algorithms (LB, RB, AC, SM), pp. 208–210.
- SAC-2013-VukovicD #distributed #estimation #on the #security
- On the security of distributed power system state estimation under targeted attacks (OV, GD), pp. 666–672.
- ICSE-2013-EsfahaniMR #architecture #named #nondeterminism
- GuideArch: guiding the exploration of architectural solution space under uncertainty (NE, SM, KR), pp. 43–52.
- CAV-2013-KroeningLW #approximate #c #detection #performance #source code
- Under-Approximating Loops in C Programs for Fast Counterexample Detection (DK, ML, GW), pp. 381–396.
- CAV-2013-PauleveAK #approximate #automaton #network #reachability #scalability #set
- Under-Approximating Cut Sets for Reachability in Large Scale Automata Networks (LP, GA, HK), pp. 69–84.
- ICST-2013-AbadABCFGMMRV #bound #contract #generative #incremental #satisfiability #testing
- Improving Test Generation under Rich Contracts by Tight Bounds and Incremental SAT Solving (PA, NA, VSB, DC, MFF, JPG, TSEM, MMM, NR, IV), pp. 21–30.
- WICSA-ECSA-2012-SzlenkZK #architecture #modelling #requirements
- Modelling Architectural Decisions under Changing Requirements (MS, AZ, SK), pp. 211–214.
- CASE-2012-LiuS #injection #modelling #validation
- Modeling and experimental validation of air-fuel ratio under individual cylinder fuel injection for port-injection engines (YL, TS), pp. 256–260.
- CASE-2012-TangLY #nondeterminism #using
- Tracking control of a compliant XY nano-positioner under plant uncertainty using a transfigured loop-shaping H∞ controller (HT, YL, QY), pp. 103–108.
- DAC-2012-KarakonstantisRBB #fault #on the
- On the exploitation of the inherent error resilience of wireless systems under unreliable silicon (GK, CR, CB, AB), pp. 510–515.
- DAC-2012-MengKC #3d #constraints #energy #manycore #optimisation #performance
- Optimizing energy efficiency of 3-D multicore systems with stacked DRAM under power and thermal constraints (JM, KK, AKC), pp. 648–655.
- DAC-2012-VelamalaSSC #matter #physics #predict #statistics
- Physics matters: statistical aging prediction under trapping/detrapping (JBV, KS, TS, YC), pp. 139–144.
- DATE-2012-JiangSCBP #algorithm #constraints #generative #memory management #on the
- On the optimality of K longest path generation algorithm under memory constraints (JJ, MS, AC, BB, IP), pp. 418–423.
- DATE-2012-LinWCCCHYS #analysis #functional #mutation testing #probability
- A probabilistic analysis method for functional qualification under Mutation Analysis (HYL, CYW, SCC, YCC, HMC, CYH, YCY, CCS), pp. 147–152.
- DATE-2012-WanK #embedded #monitoring
- Monitoring active filters under automotive aging scenarios with embedded instrument (JW, HGK), pp. 1096–1101.
- HT-2012-KlienS #analysis #network
- Short links under attack: geographical analysis of spam in a URL shortener network (FK, MS), pp. 83–88.
- PODS-2012-AgarwalESZ #nearest neighbour #nondeterminism
- Nearest-neighbor searching under uncertainty (PKA, AE, SS, WZ), pp. 225–236.
- SIGMOD-2012-PengYZWY #difference #multi #named #privacy
- DP-tree: indexing multi-dimensional data under differential privacy (abstract only) (SP, YY, ZZ, MW, YY), p. 864.
- VLDB-2012-AngelKSS #identification #maintenance #realtime #streaming
- Dense Subgraph Maintenance under Streaming Edge Weight Updates for Real-time Story Identification (AA, NK, NS, DS), pp. 574–585.
- VLDB-2012-LiM #adaptation #difference #privacy #query
- An Adaptive Mechanism for Accurate Query Answering under Differential Privacy (CL, GM), pp. 514–525.
- VLDB-2012-YuanZWXYH #difference #optimisation #privacy #query #rank
- Low-Rank Mechanism: Optimizing Batch Queries under Differential Privacy (GY, ZZ, MW, XX, YY, ZH), pp. 1352–1363.
- VLDB-2012-ZhangZXYW #analysis #difference #functional #privacy
- Functional Mechanism: Regression Analysis under Differential Privacy (JZ, ZZ, XX, YY, MW), pp. 1364–1375.
- VLDB-2013-CalvaneseGLV12 #database #graph #query #relational
- Query Processing under GLAV Mappings for Relational and Graph Databases (DC, GDG, ML, MYV), pp. 61–72.
- FASE-2012-EckhardtMAMW
- Stable Availability under Denial of Service Attacks through Formal Patterns (JE, TM, MA, JM, MW), pp. 78–93.
- TACAS-2012-AbdullaACLR
- Counter-Example Guided Fence Insertion under TSO (PAA, MFA, YFC, CL, AR), pp. 204–219.
- TACAS-2012-AlbarghouthiGC #approximate
- From Under-Approximations to Over-Approximations and Back (AA, AG, MC), pp. 157–172.
- TACAS-2012-ChadhaMV #reachability
- Reachability under Contextual Locking (RC, PM, MV), pp. 437–450.
- WRLA-2012-BaeM #locality #model checking
- Model Checking LTLR Formulas under Localized Fairness (KB, JM), pp. 99–117.
- STOC-2012-GargMSV #algorithm
- A complementary pivot algorithm for markets under separable, piecewise-linear concave utilities (JG, RM, MAS, VVV), pp. 1003–1016.
- DLT-2012-ManeaMN #permutation
- The Avoidability of Cubes under Permutations (FM, MM, DN), pp. 416–427.
- ICALP-v1-2012-AzarG #constraints #linear #performance
- Efficient Submodular Function Maximization under Linear Packing Constraints (YA, IG), pp. 38–50.
- ICALP-v1-2012-BalcanL #clustering
- Clustering under Perturbation Resilience (MFB, YL), pp. 63–74.
- ICALP-v1-2012-BuchbinderNRS #algorithm #approximate #constraints #online #rank
- Approximation Algorithms for Online Weighted Rank Function Maximization under Matroid Constraints (NB, JN, RR, MS), pp. 145–156.
- ICALP-v2-2012-ChiesaBEP #complexity
- Computational Complexity of Traffic Hijacking under BGP and S-BGP (MC, GDB, TE, MP), pp. 476–487.
- ICGT-2012-GadducciLV #approximate #infinity #modelling
- Exploiting Over- and Under-Approximations for Infinite-State Counterpart Models (FG, ALL, AV), pp. 51–65.
- AdaEurope-2012-MartinezV #component #development #modelling #requirements
- Handling Synchronization Requirements under Separation of Concerns in Model-Driven Component-Based Development (PLM, TV), pp. 89–104.
- CAiSE-2012-BoerLBGAGTBAA #distributed #information management #interface #named
- RadioMarché: Distributed Voice- and Web-Interfaced Market Information Systems under Rural Conditions (VdB, PDL, AB, NBG, CvA, CG, WT, SB, MA, HA), pp. 518–532.
- CIKM-2012-DuttingHW #recommendation #trust
- Maximizing revenue from strategic recommendations under decaying trust (PD, MH, IW), pp. 2283–2286.
- CIKM-2012-LiangZ #classification #performance
- An efficient and simple under-sampling technique for imbalanced time series classification (GL, CZ), pp. 2339–2342.
- CIKM-2012-LiYHCS #mvc #network #robust
- Measuring robustness of complex networks under MVC attack (RHL, JXY, XH, HC, ZS), pp. 1512–1516.
- CIKM-2012-WangYYLM
- Diversionary comments under political blog posts (JW, CTY, PSY, BL, WM), pp. 1789–1793.
- ICML-2012-PlessisS #learning
- Semi-Supervised Learning of Class Balance under Class-Prior Change by Distribution Matching (MCdP, MS), p. 159.
- ICML-2012-XuWC #learning
- The Greedy Miser: Learning under Test-time Budgets (ZEX, KQW, OC), p. 169.
- ICML-2012-YuS #analysis #kernel
- Analysis of Kernel Mean Matching under Covariate Shift (YY, CS), p. 150.
- ICPR-2012-FangC #re-engineering
- Dense reconstruction by stereo-motion under perspective camera model (MF, RC), pp. 2480–2483.
- ICPR-2012-GuK #learning #online #visual notation
- Grassmann manifold online learning and partial occlusion handling for visual object tracking under Bayesian formulation (IYHG, ZHK), pp. 1463–1466.
- ICPR-2012-KanekoTAT
- Daylight spectrum model under weather conditions from clear sky to cloudy (EK, MT, HA, MT), pp. 1438–1435.
- ICPR-2012-KawabataK #approach #multi #using
- Plane based multi camera calibration under unknown correspondence using ICP-like approach (SK, YK), pp. 3700–3703.
- ICPR-2012-MadabusiG #detection #image
- Edge detection for facial images under noisy conditions (SM, SVG), pp. 2689–2693.
- ICPR-2012-MichaelsenS #precise
- Estimating the precision of under-water video-mosaics (EM, NSN), pp. 775–779.
- ICPR-2012-NikanA #recognition #using
- Human face recognition under occlusion using LBP and entropy weighted voting (SN, MA), pp. 1699–1702.
- ICPR-2012-TurkovKM #concept #pattern matching #pattern recognition #problem #recognition
- The Bayesian logistic regression in pattern recognition problems under concept drift (PAT, OK, VM), pp. 2976–2979.
- KDD-2012-RakthanmanonCMBWZZK #mining #sequence
- Searching and mining trillions of time series subsequences under dynamic time warping (TR, BJLC, AM, GEAPAB, MBW, QZ, JZ, EJK), pp. 262–270.
- KDD-2012-Zhang #challenge #information management
- A new challenge of information processing under the 21st century (BZ), p. 224.
- KMIS-2012-LageA12a #approach #process
- Information and Knowledge Sharing in Inter-organizational Relationships under the Process Approach (EL, BA), pp. 273–276.
- KR-2012-GrauJKZ #constraints #evolution #ontology #semantics
- Ontology Evolution Under Semantic Constraints (BCG, EJR, EK, DZ).
- KR-2012-WangZZZ #equivalence #logic programming #source code
- Forgetting in Logic Programs under Strong Equivalence (YW, YZ, YZ, MZ).
- OOPSLA-2012-TamayoABS #behaviour #comprehension #database
- Understanding the behavior of database operations under program control (JMT, AA, NGB, MS), pp. 983–996.
- SAC-2012-GrooteOW #case study #experience #formal method
- Experience report on developing the Front-end client unit under the control of formal methods (JFG, AO, JHW), pp. 1183–1190.
- SAC-2012-MinervinidF #concept #learning #logic #probability
- Learning probabilistic Description logic concepts: under different Assumptions on missing knowledge (PM, Cd, NF), pp. 378–383.
- HPCA-2012-SuhAD #markov #multi #named #reliability
- MACAU: A Markov model for reliability evaluations of caches under Single-bit and Multi-bit Upsets (JS, MA, MD), pp. 3–14.
- HPDC-2012-LohrmannWK #constraints
- Massively-parallel stream processing under QoS constraints with Nephele (BL, DW, OK), pp. 271–282.
- ICST-2012-TonellaMNJLH #approximate #execution #modelling
- Finding the Optimal Balance between Over and Under Approximation of Models Inferred from Execution Logs (PT, AM, DCN, YJ, KL, MH), pp. 21–30.
- IJCAR-2012-ChekolEGL #query
- SPARQL Query Containment under RDFS Entailment Regime (MWC, JE, PG, NL), pp. 134–148.
- SAT-2012-NadelR #performance #satisfiability
- Efficient SAT Solving under Assumptions (AN, VR), pp. 242–255.
- QoSA-ISARCS-2011-MeedeniyaMAG #architecture #evaluation #nondeterminism #reliability
- Architecture-based reliability evaluation under uncertainty (IM, IM, AA, LG), pp. 85–94.
- DAC-2011-HaddadN #analysis #grid #power management #using
- Power grid correction using sensitivity analysis under an RC model (PAH, FNN), pp. 688–693.
- DAC-2011-HuangQFQ #constraints #realtime #throughput
- Throughput maximization for periodic real-time systems under the maximal temperature constraint (HH, GQ, JF, MQ), pp. 363–368.
- DAC-2011-IqbalSH #dependence #fault #monte carlo #named #power management #probability #scheduling
- SEAL: soft error aware low power scheduling by Monte Carlo state space under the influence of stochastic spatial and temporal dependencies (NI, MAS, JH), pp. 134–139.
- DAC-2011-KernZSNT #network
- Accuracy of ethernet AVB time synchronization under varying temperature conditions for automotive networks (AK, HZ, TS, JN, JT), pp. 597–602.
- DAC-2011-LeeJ #framework #modelling #named #process
- CACTI-FinFET: an integrated delay and power modeling framework for FinFET-based caches under process variations (CYL, NKJ), pp. 866–871.
- DATE-2011-HuangQ #constraints #energy #realtime
- Leakage aware energy minimization for real-time systems under the maximum temperature constraint (HH, GQ), pp. 479–484.
- DATE-2011-VatajeluF #analysis #in memory #memory management #robust
- Robustness analysis of 6T SRAMs in memory retention mode under PVT variations (EIV, JF), pp. 980–985.
- DRR-2011-Saund #challenge #documentation
- Scientific challenges underlying production document processing (ES), pp. 1–10.
- PODS-2011-KimelfeldS #constraints
- Finding a minimal tree pattern under neighborhood constraints (BK, YS), pp. 235–246.
- SIGMOD-2011-Quiane-RuizPSD #pipes and filters
- RAFT at work: speeding-up mapreduce applications under task and node failures (JAQR, CP, JS, JD), pp. 1225–1228.
- VLDB-2011-ChiMH #incremental #linear #named #scheduling
- iCBS: Incremental Costbased Scheduling under Piecewise Linear SLAs (YC, HJM, HH), pp. 563–574.
- VLDB-2011-OrsiP #constraints #ontology #optimisation #query
- Optimizing Query Answering under Ontological Constraints (GO, AP), pp. 1004–1015.
- FoSSaCS-2011-BorealePP #information management
- Asymptotic Information Leakage under One-Try Attacks (MB, FP, MP), pp. 396–410.
- ICPC-2011-SyerAH #behaviour #case study #comprehension #industrial
- Industrial Case Study on Supporting the Comprehension of System Behaviour under Load (MDS, BA, AEH), pp. 215–216.
- PLDI-2011-ZhouCC #algorithm #execution
- An SSA-based algorithm for optimal speculative code motion under an execution profile (HZ, WC, FCC), pp. 98–108.
- CHI-2011-ReederBCRV #usability
- More than skin deep: measuring effects of the underlying model on access-control system usability (RWR, LB, LFC, MKR, KV), pp. 2065–2074.
- HCI-ITE-2011-AbeOO #analysis #detection #image
- Eye-gaze Detection by Image Analysis under Natural Light (KA, SO, MO), pp. 176–184.
- HIMI-v1-2011-WatanabeMNMN #generative #metric
- Support for Generation of Sympathetic Embodied Awareness: Measurement of Hand Contact Improvisation under Load Fluctuation Stress (TW, YM, GN, NM, HN), pp. 508–518.
- HIMI-v2-2011-NguyenBRHVSB #how #multi
- How Data Comm Methods and Multi-dimensional Traffic Displays Influence Pilot Workload under Trajectory Based Operations (JHN, LPB, RCR, MH, KPLV, TZS, VB), pp. 507–515.
- ICEIS-v1-2011-ChengL #anti #network
- An Anti-phishing Model for Ecommerce under a Network Environment (YC, GL), pp. 400–404.
- ICEIS-v2-2011-JiaWLW #higher-order #research
- The Research on Stability of Supply Chain under High Order Delay (SJ, LW, CL, QW), pp. 361–367.
- ICEIS-v3-2011-Li11d #bibliography #modelling
- A Survey on Inventory Models Under Trade Credit (ML), pp. 511–516.
- ICEIS-v3-2011-Zhu #e-commerce #information management
- The Information System of Bank Under the e-Commerce Environment (LZ), pp. 554–558.
- CIKM-2011-WangL #framework #learning #named #rank
- CoRankBayes: bayesian learning to rank under the co-training framework and its application in keyphrase extraction (CW, SL), pp. 2241–2244.
- ICML-2011-MeyerBS #approach #constraints #linear
- Linear Regression under Fixed-Rank Constraints: A Riemannian Approach (GM, SB, RS), pp. 545–552.
- KMIS-2011-CostantinoDFS #analysis #evaluation #nondeterminism #using
- A Model using Data Envelopment Analysis for the Cross Evaluation of Suppliers under Uncertainty (NC, MD, MF, FS), pp. 152–157.
- MLDM-2011-ArmstrongD #database #scalability
- Unsupervised Discovery of Motifs under Amplitude Scaling and Shifting in Time Series Databases (TA, ED), pp. 539–552.
- SIGIR-2011-PolitzS #constraints #learning #rank
- Learning to rank under tight budget constraints (CP, RS), pp. 1173–1174.
- RE-2011-Waldmann #agile #constraints #development #requirements #what
- There’s never enough time: Doing requirements under resource constraints, and what requirements engineering can learn from agile development (BW), pp. 301–305.
- SAC-2011-ChenHT #clustering #power management #quality #requirements
- Power management schemes for heterogeneous clusters under quality of service requirements (JJC, KH, LT), pp. 546–553.
- SAC-2011-FormigaLSDT #assessment #matrix #recognition #scalability
- An assessment of data matrix barcode recognition under scaling, rotation and cylindrical warping (AdAF, RDL, SJS, GD, MT), pp. 266–267.
- SAC-2011-KimPHC #adaptation #network #peer-to-peer
- Adaptive link recovery scheme for structured peer-to-peer networks under churn (SK, GP, JH, YC), pp. 611–615.
- SAC-2011-Zhang #analysis #constraints #geometry #graph #problem
- Well-constrained completion for under-constrained geometric constraint problem based on connectivity analysis of graph (GFZ), pp. 1094–1099.
- PPoPP-2011-RoyHH #consistency #memory management
- Weak atomicity under the x86 memory consistency model (AR, SH, TLH), pp. 291–292.
- CAV-2011-BaeM #ltl #model checking #parametricity
- State/Event-Based LTL Model Checking under Parametric Generalized Fairness (KB, JM), pp. 132–148.
- ICLP-J-2011-RiguzziS #nondeterminism #reasoning
- The PITA system: Tabling and answer subsumption for reasoning under uncertainty (FR, TS), pp. 433–449.
- TAP-2011-BueJM #approximate #generative #modelling #testing
- Association of Under-Approximation Techniques for Generating Tests from Models (PCB, JJ, PAM), pp. 51–68.
- CASE-2010-LinYG
- Sensor configuration selection for discrete-event systems under unreliable observations (WCL, TSY, HEG), pp. 477–484.
- CASE-2010-MazierXS #scheduling
- Scheduling inpatient admission under high demand of emergency patients (AM, XX, MS), pp. 792–797.
- DAC-2010-ChenDC #synthesis
- Clock tree synthesis under aggressive buffer insertion (YYC, CD, DC), pp. 86–89.
- DAC-2010-HuangX #performance #process #scheduling
- Performance yield-driven task allocation and scheduling for MPSoCs under process variation (LH, QX), pp. 326–331.
- DAC-2010-SilvaPS #analysis #modelling #parametricity
- Speedpath analysis under parametric timing models (LGeS, JRP, LMS), pp. 268–273.
- DAC-2010-XieD #predict #variability
- Representative path selection for post-silicon timing prediction under variability (LX, AD), pp. 386–391.
- DAC-2010-XiongW #algorithm #constraints #grid #linear #performance #power management #verification
- An efficient dual algorithm for vectorless power grid verification under linear current constraints (XX, JW), pp. 837–842.
- DATE-2010-GanapathyCGR #estimation #modelling #multi #variability
- Circuit propagation delay estimation through multivariate regression-based modeling under spatio-temporal variability (SG, RC, AG, AR), pp. 417–422.
- DATE-2010-HuangX10a #constraints #energy #multi #reliability #scheduling
- Energy-efficient task allocation and scheduling for multi-mode MPSoCs under lifetime reliability constraint (LH, QX), pp. 1584–1589.
- PODS-2010-LiHRMM #difference #linear #optimisation #privacy #query
- Optimizing linear counting queries under differential privacy (CL, MH, VR, GM, AM), pp. 123–134.
- VLDB-2010-BeskalesIG #constraints #dependence #functional
- Sampling the Repairs of Functional Dependency Violations under Hard Constraints (GB, IFI, LG), pp. 197–207.
- VLDB-2010-WeiRM #quality #xml
- Achieving High Output Quality under Limited Resources through Structure-based Spilling in XML Streams (MW, EAR, MM), pp. 1267–1278.
- WRLA-2010-AsavoaeA #abstraction #framework #semantics #𝕂
- Collecting Semantics under Predicate Abstraction in the 𝕂 Framework (IMA, MA), pp. 123–139.
- CSMR-2010-MarchettoTR #ajax #approximate #modelling
- Under and Over Approximation of State Models Recovered for Ajax Applications (AM, PT, FR), pp. 236–239.
- ICPC-2010-SharifM #eye tracking #identifier
- An Eye Tracking Study on camelCase and under_score Identifier Styles (BS, JIM), pp. 196–205.
- ICSM-2010-QusefOL #testing #traceability
- Recovering traceability links between unit tests and classes under test: An improved method (AQ, RO, ADL), pp. 1–10.
- STOC-2010-CardinalFJJM #algorithm #sorting
- Sorting under partial information (without the ellipsoid algorithm) (JC, SF, GJ, RMJ, JIM), pp. 359–368.
- STOC-2010-DworkNPR #difference #privacy
- Differential privacy under continual observation (CD, MN, TP, GNR), pp. 715–724.
- STOC-2010-FraigniaudG #network #on the
- On the searchability of small-world networks with arbitrary underlying structure (PF, GG), pp. 389–398.
- ICALP-v2-2010-ChristodoulouLP
- Contention Resolution under Selfishness (GC, KL, EP), pp. 430–441.
- CIKM-2010-WangML #constraints #ranking
- Ranking under temporal constraints (LW, DM, JJL), pp. 79–88.
- ICML-2010-BordesUW #ambiguity #learning #ranking #semantics
- Label Ranking under Ambiguous Supervision for Learning Semantic Correspondences (AB, NU, JW), pp. 103–110.
- ICML-2010-Yu #convergence #difference
- Convergence of Least Squares Temporal Difference Methods Under General Conditions (HY), pp. 1207–1214.
- ICPR-2010-CanavanJRZYS #classification #evaluation #multi
- Evaluation of Multi-frame Fusion Based Face Classification Under Shadow (SJC, BJ, MR, YZ, LY, JRS), pp. 1265–1268.
- ICPR-2010-Demirci #performance #retrieval
- Efficient Shape Retrieval Under Partial Matching (MFD), pp. 3057–3060.
- ICPR-2010-DornaikaR #estimation
- Person-Specific Face Shape Estimation under Varying Head Pose from Single Snapshots (FD, BR), pp. 3496–3499.
- ICPR-2010-HendrikseVS #verification
- Verification Under Increasing Dimensionality (AH, RNJV, LJS), pp. 589–592.
- ICPR-2010-IwahoriIWKFK #performance
- Extending Fast Marching Method under Point Light Source Illumination and Perspective Projection (YI, KI, RJW, HK, SF, KK), pp. 1650–1653.
- ICPR-2010-LiangLXL #composition #image #perspective
- Face Hallucination under an Image Decomposition Perspective (YL, JHL, XX, WL), pp. 2158–2161.
- ICPR-2010-PatrauceanGC #identification #invariant #using
- Bubble Tag Identification Using an Invariant — Under — Perspective Signature (VP, PG, JC), pp. 408–411.
- ICPR-2010-ScandaliarisS #invariant
- Discriminant and Invariant Color Model for Tracking under Abrupt Illumination Changes (JS, AS), pp. 1840–1843.
- ICPR-2010-ScandaliarisVS #analysis #comparative #detection #image #video
- Comparative Analysis for Detecting Objects Under Cast Shadows in Video Images (JS, MV, AS), pp. 4577–4580.
- ICPR-2010-UekiSI #adaptation #estimation
- Perceived Age Estimation under Lighting Condition Change by Covariate Shift Adaptation (KU, MS, YI), pp. 3400–3403.
- ICPR-2010-XuHL10a #how #image #recognition #robust
- Raw vs. Processed: How to Use the Raw and Processed Images for Robust Face Recognition under Varying Illumination (LX, LH, CL), pp. 2692–2695.
- ICPR-2010-ZhangHTW #3d #evaluation #framework #modelling #using
- 3D Model Based Vehicle Tracking Using Gradient Based Fitness Evaluation under Particle Filter Framework (ZZ, KH, TT, YW), pp. 1771–1774.
- KDD-2010-AttenbergP #classification #learning #modelling #why
- Why label when you can search?: alternatives to active learning for applying human resources to build classification models under extreme class imbalance (JA, FJP), pp. 423–432.
- KDD-2010-ZouGL #database #graph #nondeterminism #probability #semantics
- Discovering frequent subgraphs over uncertain graph databases under probabilistic semantics (ZZ, HG, JL), pp. 633–642.
- KDIR-2010-GohrSH #documentation #evolution #social #visual notation
- Visually Summarizing the Evolution of Documents under a Social Tag (AG, MS, AH), pp. 85–94.
- KR-2010-GebserGISSTV #biology #consistency #network #nondeterminism #predict #programming #scalability #set
- Repair and Prediction (under Inconsistency) in Large Biological Networks with Answer Set Programming (MG, CG, MI, TS, AS, ST, PV).
- KR-2010-GiacomoPS #constraints
- Generalized Planning with Loops under Strong Fairness Constraints (GDG, FP, SS).
- KR-2010-LarbiKM
- A Characterization of Optimality Criteria for Decision Making under Complete Ignorance (RBL, SK, PM).
- KR-2010-XiaoLMQ #consistency #metric #multi #nondeterminism #satisfiability #semantics
- Computing Inconsistency Measurements under Multi-Valued Semantics by Partial Max-SAT Solvers (GX, ZL, YM, GQ).
- RecSys-2010-DeryKRS #nondeterminism #recommendation
- Iterative voting under uncertainty for group recommender systems (LND, MK, LR, BS), pp. 265–268.
- SEKE-2010-KhoshgoftaarG #machine learning #metric #novel #re-engineering #using
- Software Engineering with Computational Intelligence and Machine Learning A Novel Software Metric Selection Technique Using the Area Under ROC Curves (TMK, KG), pp. 203–208.
- REFSQ-2010-BrillSK #case study #question #requirements
- Videos vs. Use Cases: Can Videos Capture More Requirements under Time Pressure? (OB, KS, EK), pp. 30–44.
- SAC-2010-GhoshS #constraints #design #energy #performance
- Efficient mapping and voltage islanding technique for energy minimization in NoC under design constraints (PG, AS), pp. 535–541.
- SAC-2010-SardanaJ #network
- Dual-level defense for networks under DDoS attacks (AS, RCJ), pp. 733–734.
- ICLP-J-2010-Delgrande #approach #logic programming #semantics #set #source code
- A program-level approach to revising logic programs under the answer set semantics (JPD), pp. 565–580.
- CASE-2009-KarnikTS #capacity #modelling #nondeterminism #robust
- Robust models for manufacturing capacity planning under demand uncertainty (AK, CST, AS), pp. 310–315.
- CASE-2009-XuK #nondeterminism
- Discrete event control under nondeterministic partial observation (SX, RK), pp. 127–132.
- CASE-2009-ZiedSN #maintenance #probability #random
- An optimal production/maintenance planning under stochastic random demand, service level and failure rate (ZH, SD, NR), pp. 292–297.
- DAC-2009-HanumaiahRVC #constraints #manycore #throughput
- Throughput optimal task allocation under thermal constraints for multi-core processors (VH, RR, SBKV, KSC), pp. 776–781.
- DAC-2009-LuSZZYZ #analysis #process #reliability #statistics
- Statistical reliability analysis under process variation and aging effects (YL, LS, HZ, HZ, FY, XZ), pp. 514–519.
- DAC-2009-PanKOMC #process
- Selective wordline voltage boosting for caches to manage yield under process variations (YP, JK, SO, GM, SWC), pp. 57–62.
- DAC-2009-YeLCC #analysis #layout #process #variability
- Variability analysis under layout pattern-dependent rapid-thermal annealing process (YY, FL, MC, YC), pp. 551–556.
- DATE-2009-CongG #energy #multi #performance #scheduling
- Energy efficient multiprocessor task scheduling under input-dependent variation (JC, KG), pp. 411–416.
- DATE-2009-FahmyRJ #bound #distributed #memory management #multi #on the #realtime #transaction
- On bounding response times under software transactional memory in distributed multiprocessor real-time systems (SFF, BR, EDJ), pp. 688–693.
- DATE-2009-HanumaiahVC #constraints #manycore #performance
- Performance optimal speed control of multi-core processors under thermal constraints (VH, SBKV, KSC), pp. 1548–1551.
- DATE-2009-LudoviciVMRGLGB #constraints #design
- Assessing fat-tree topologies for regular network-on-chip design under nanoscale technology constraints (DL, FGV, SM, CGR, MEG, PL, GNG, DB), pp. 562–565.
- DATE-2009-OzturkK #compilation #execution #memory management #using
- Using dynamic compilation for continuing execution under reduced memory availability (ÖÖ, MTK), pp. 1373–1378.
- ICDAR-2009-ZhouLT #recognition
- Character Recognition under Severe Perspective Distortion (PZ, LL, CLT), pp. 676–680.
- TACAS-2009-VechevYY
- Inferring Synchronization under Limited Observability (MTV, EY, GY), pp. 139–154.
- CSMR-2009-RompaeyD #testing #traceability
- Establishing Traceability Links between Unit Test Cases and Units under Test (BVR, SD), pp. 209–218.
- ICPC-2009-BinkleyDLM
- To camelcase or under_score (DB, MD, DL, CM), pp. 158–167.
- STOC-2009-LeeMNS #constraints
- Non-monotone submodular maximization under matroid and knapsack constraints (JL, VSM, VN, MS), pp. 323–332.
- LATA-2009-Moore #data access #documentation #generative #problem
- The Halting Problem and Undecidability of Document Generation under Access Control for Tree Updates (NM), pp. 601–613.
- DHM-2009-Sugiyama
- Harmonic Gait under Primitive DOF for Biped Robot (SS), pp. 150–159.
- HCI-VAD-2009-TamaokiTM #user interface
- Developing Some User Interfaces of TV under Enormous Channels Environment (ST, TT, HM), pp. 624–631.
- ICEIS-J-2009-Al-NoryBN #composition #framework #nondeterminism
- A Service Composition Framework for Decision Making under Uncertainty (MTAN, AB, HN), pp. 363–375.
- ICEIS-J-2009-BittencourtBCPVDL #modelling #semantics #web
- Modeling JADE Agents from GAIA Methodology under the Perspective of Semantic Web (IIB, PB, EdBC, JPP, DV, DD, HPLL), pp. 780–789.
- CIKM-2009-CaoCYX #recommendation
- Enhancing recommender systems under volatile userinterest drifts (HC, EC, JY, HX), pp. 1257–1266.
- ECIR-2009-DonmezC #learning #optimisation #rank
- Active Sampling for Rank Learning via Optimizing the Area under the ROC Curve (PD, JGC), pp. 78–89.
- SEKE-2009-McElroyR #approach #nondeterminism
- A Layered Approach for Planning Releases under Uncertain Capacities (JM, GR), pp. 649–654.
- ECOOP-2009-SteimannT #java #refactoring #source code
- From Public to Private to Absent: Refactoring Java Programs under Constrained Accessibility (FS, AT), pp. 419–443.
- SAC-2009-CorreaNBC #evaluation #health
- Evaluation of VR medical training applications under the focus of professionals of the health area (CGC, FLSN, AB, PMCJ), pp. 821–825.
- SAC-2009-HeinenE #2d #evaluation #modelling #similarity #visual notation
- Evaluation of visual attention models under 2D similarity transformations (MRH, PME), pp. 1156–1160.
- SAC-2009-WangDLL #performance #process
- An efficient and accurate lattice for pricing derivatives under a jump-diffusion process (CJW, TSD, YDL, YCL), pp. 966–970.
- CADE-2009-CiobacaDK #convergence #equation #protocol #security
- Computing Knowledge in Security Protocols under Convergent Equational Theories (SC, SD, SK), pp. 355–370.
- CAV-2009-FarzanMS
- Meta-analysis for Atomicity Violations under Nested Locking (AF, PM, FS), pp. 248–262.
- CAV-2009-SunLDP #flexibility #named #towards #verification
- PAT: Towards Flexible Verification under Fairness (JS, YL, JSD, JP), pp. 709–714.
- ICLP-2009-DelgrandeSTW #logic programming #semantics #set #source code
- Merging Logic Programs under Answer Set Semantics (JPD, TS, HT, SW), pp. 160–174.
- ICLP-2009-HolldoblerR #logic programming #semantics #source code
- Logic Programs under Three-Valued Lukasiewicz Semantics (SH, CDPKR), pp. 464–478.
- ICST-2009-AydalPUW #modelling #specification #testing #validation
- Putting Formal Specifications under the Magnifying Glass: Model-based Testing for Validation (EGA, RFP, MU, JW), pp. 131–140.
- ICST-2009-DavidLLN #testing
- Timed Testing under Partial Observability (AD, KGL, SL, BN), pp. 61–70.
- RTA-2009-ThiemannS
- Loops under Strategies (RT, CS), pp. 17–31.
- TAP-2009-AyraultHP #development
- Development of a Generic Voter under FoCal (PA, TH, FP), pp. 10–26.
- CASE-2008-PatilS #adaptation #nondeterminism
- Adapting product and supply chain systems under severe uncertainty (LP, KS), pp. 285–290.
- CASE-2008-StirlingN #coordination #nash
- Rational coordination under risk: Coherence and the Nash bargain (WCS, MSN), pp. 122–127.
- DAC-2008-CaseKMB
- Merging nodes under sequential observability (MLC, VNK, AM, RKB), pp. 540–545.
- DAC-2008-HurstMB #constraints #scalability
- Scalable min-register retiming under timing and initializability constraints (APH, AM, RKB), pp. 534–539.
- DAC-2008-YeLNC #modelling #simulation #statistics
- Statistical modeling and simulation of threshold variation under dopant fluctuations and line-edge roughness (YY, FL, SRN, YC), pp. 900–905.
- DATE-2008-Brand #design #manycore #optimisation
- Optimization of Design Flows for Multi-Core x86 Microprocessors in 45 and 32nm Technologies under Productivity Considerations (HJB), pp. 938–939.
- DATE-2008-CalimeraBM #constraints #performance #power management
- Optimal MTCMOS Reactivation Under Power Supply Noise and Performance Constraints (AC, LB, EM), pp. 973–978.
- DATE-2008-FranchinoBF #protocol
- Time Properties of the BuST Protocol under the NPA Budget Allocation Scheme (GF, GCB, TF), pp. 1051–1056.
- DATE-2008-JungP #nondeterminism #power management
- Resilient Dynamic Power Management under Uncertainty (HJ, MP), pp. 224–229.
- DATE-2008-XueSSQ #clustering #constraints #effectiveness #memory management #scheduling
- Effective Loop Partitioning and Scheduling under Memory and Register Dual Constraints (CJX, EHMS, ZS, MQ), pp. 1202–1207.
- VLDB-2008-AvanesF #adaptation #constraints #network #resource management #scheduling #workflow
- Adaptive workflow scheduling under resource allocation constraints and network dynamics (AA, JCF), pp. 1631–1637.
- VLDB-2008-DeutchM08a #modelling #nondeterminism #query
- Querying web-based applications under models of uncertainty (DD, TM), pp. 1659–1665.
- VLDB-2008-LuM #database #named #strict
- AuditGuard: a system for database auditing under retention restrictions (WL, GM), pp. 1484–1487.
- VLDB-2008-MoonCDHZ #database #evolution #query #transaction
- Managing and querying transaction-time databases under schema evolution (HJM, CC, AD, CYH, CZ), pp. 882–895.
- TACAS-2008-LalTKR #analysis #bound #concurrent #interprocedural #source code
- Interprocedural Analysis of Concurrent Programs Under a Context Bound (AL, TT, NK, TWR), pp. 282–298.
- ICALP-A-2008-FanelliFM #convergence #game studies
- The Speed of Convergence in Congestion Games under Best-Response Dynamics (AF, MF, LM), pp. 796–807.
- ICEIS-ISAS1-2008-Yang #flexibility #information management
- Better IT Governance for Organizations — A Model for Improving Flexibility and Capabilities of Strategic Information Systems Planning (SISP) through EA and BPR under e-Business Environment (JY), pp. 30–41.
- ECIR-2008-EuachongprasitR #multi #normalisation #performance #retrieval #scalability
- Efficient Multimedia Time Series Data Retrieval Under Uniform Scaling and Normalisation (WE, CAR), pp. 506–513.
- ICPR-2008-BitsakosYYF #symmetry
- Bilateral symmetry of object silhouettes under perspective projection (KB, HY, LY, CF), pp. 1–4.
- ICPR-2008-GuZ #metric #similarity
- A similarity measure under Log-Euclidean metric for stereo matching (QG, JZ), pp. 1–4.
- ICPR-2008-LiT08a #recognition
- Character recognition under severe perspective distortion (LL, CLT), pp. 1–4.
- ICPR-2008-MerchanOS #identification #image
- Identification and pose under severe occlusion in range images (PM, AAO, SS), pp. 1–4.
- ICPR-2008-VanacloigOGG #constraints #people #realtime #recognition
- People and luggage recognition in airport surveillance under real-time constraints (VLAV, JARO, GAG, JMVG), pp. 1–4.
- ICPR-2008-VazquezRC #image #recognition
- A new image division for LBP method to improve face recognition under varying lighting conditions (HMV, EBGR, YCM), pp. 1–4.
- ICPR-2008-WangWH #matrix
- Structure and motion factorization under quasi-perspective projection with missing data in tracking matrix (GW, QMJW, WH), pp. 1–4.
- KDD-2008-WuLCC #learning #symmetry
- Asymmetric support vector machines: low false-positive learning under the user tolerance (SHW, KPL, CMC, MSC), pp. 749–757.
- KR-2008-CaliGK #constraints #infinity #query #relational
- Taming the Infinite Chase: Query Answering under Expressive Relational Constraints (AC, GG, MK), pp. 70–80.
- KR-2008-DelgrandeSTW #logic programming #semantics #set #source code
- Belief Revision of Logic Programs under Answer Set Semantics (JPD, TS, HT, SW), pp. 411–421.
- SIGIR-2008-HeMO #metric #retrieval #using
- Retrieval sensitivity under training using different measures (BH, CM, IO), pp. 67–74.
- SAC-2008-BatistaDF #grid #nondeterminism #scheduling
- Scheduling grid tasks under uncertain demands (DMB, ACD, NLSdF), pp. 2041–2045.
- SAC-2008-CardenasG #architecture #comparison #network #performance
- Performance comparison of Flow Aware Networking (FAN) architectures under GridFTP traffic (CC, MG), pp. 2079–2084.
- SAC-2008-SchmitzAA #implementation #nondeterminism #order
- A method for defining the implementation order of software projects under uncertainty (EAS, AJA, CMdA), pp. 844–845.
- PPoPP-2008-ZhaiWYH #compilation #concurrent #optimisation #thread
- Compiler optimizations for parallelizing general-purpose applications under thread-level speculation (AZ, SW, PCY, GH), pp. 271–272.
- CAV-2008-LalR #analysis #bound #concurrent
- Reducing Concurrent Analysis Under a Context Bound to Sequential Analysis (AL, TWR), pp. 37–51.
- ICLP-2008-OetschT #semantics
- Program Correspondence under the Answer-Set Semantics: The Non-ground Case (JO, HT), pp. 591–605.
- ICLP-2008-PuhrerTW #source code
- Elimination of Disjunction and Negation in Answer-Set Programs under Hyperequivalence (JP, HT, SW), pp. 561–575.
- ICLP-2008-Riguzzi #logic programming #semantics #source code
- Inference with Logic Programs with Annotated Disjunctions under the Well Founded Semantics (FR), pp. 667–671.
- RTA-2008-EndrullisV #reduction
- Reduction Under Substitution (JE, RCdV), pp. 425–440.
- CASE-2007-YooG #analysis #network #process
- Intruder Activity Analysis under Unreliable Sensor Networks (TSY, HEG), pp. 578–584.
- DAC-2007-ChenZ #performance #process
- Fast Min-Cost Buffer Insertion under Process Variations (RC, HZ), pp. 338–343.
- DAC-2007-KangKIAR #estimation #metric #online #reliability #using
- Characterization and Estimation of Circuit Reliability Degradation under NBTI using On-Line IDDQ Measurement (KK, KK, AEI, MAA, KR), pp. 358–363.
- DAC-2007-LiuS #predict #process #scalability #statistics
- Confidence Scalable Post-Silicon Statistical Delay Prediction under Process Variations (QL, SSS), pp. 497–502.
- DATE-2007-AtasuDMLOD #constraints #optimisation
- Optimizing instruction-set extensible processors under data bandwidth constraints (KA, RGD, OM, WL, CCÖ, GD), pp. 588–593.
- DATE-2007-GrossschadlTRHM #constraints #energy #evaluation #implementation #memory management
- Energy evaluation of software implementations of block ciphers under memory constraints (JG, ST, CR, MH, MM), pp. 1110–1115.
- DATE-2007-JungP #nondeterminism #power management
- Dynamic power management under uncertain information (HJ, MP), pp. 1060–1065.
- DATE-2007-NiM #self
- Self-heating-aware optimal wire sizing under Elmore delay model (MN, SOM), pp. 1373–1378.
- DATE-2007-WatanabeKINN #constraints #energy #interactive #multi #performance #scheduling
- Interactive presentation: Task scheduling under performance constraints for reducing the energy consumption of the GALS multi-processor SoC (RW, MK, MI, HN, TN), pp. 797–802.
- DATE-2007-ZhuZCXZ #grid #probability #process
- A sparse grid based spectral stochastic collocation method for variations-aware capacitance extraction of interconnects under nanometer process technology (HZ, XZ, WC, JX, DZ), pp. 1514–1519.
- SIGMOD-2007-BeyerHRSG #estimation #multi #on the
- On synopses for distinct-value estimation under multiset operations (KSB, PJH, BR, YS, RG), pp. 199–210.
- SAS-2007-GoubaultP #approximate
- Under-Approximations of Computations in Real Numbers Based on Generalized Affine Arithmetic (EG, SP), pp. 137–152.
- ICALP-2007-DershowitzT #complexity #proving
- Complexity of Propositional Proofs Under a Promise (ND, IT), pp. 291–302.
- ICALP-2007-KatrielKU #nondeterminism #probability #problem
- Commitment Under Uncertainty: Two-Stage Stochastic Matching Problems (IK, CKM, EU), pp. 171–182.
- GT-VMT-2007-WrobelEP #framework #graph #product line
- Graph-Based Engineering Systems — A Family of Software Applications and their Underlying Framework (GW, REE, MP).
- DHM-2007-OhS #behaviour #comprehension #nondeterminism
- Understanding RUTH: Creating Believable Behaviors for a Virtual Human Under Uncertainty (IO, MS), pp. 443–452.
- ICEIS-AIDSS-2007-ChanL #nondeterminism #rule-based
- Rule Based Stability Criteria for Coalition Formation Under Uncertainty (CKC, HfL), pp. 171–177.
- ICEIS-DISI-2007-DangelmaierRHBKDT #information management #named #reliability
- OOPUS — a production planning information system to assure high delivery reliability under short-term demand changes and production disturbances (WD, TR, TH, DB, DK, AD, TT), pp. 423–432.
- ICEIS-EIS-2007-Sarbo #logic #on the
- On the Logic Underlying Common Sense (JJS), pp. 395–400.
- KDD-2007-Fayyad #internet #mining #web
- From mining the web to inventing the new sciences underlying the internet (UMF), pp. 2–3.
- KDD-2007-YankovKMCZ #detection #scalability
- Detecting time series motifs under uniform scaling (DY, EJK, JM, BYcC, VBZ), pp. 844–853.
- SEKE-2007-YasudaM #concurrent
- Tree Hash Under Concurrency Control (KY, TM), pp. 574–579.
- SAC-2007-ThierryMS #constraints #geometry #towards
- Towards an homogeneous handling of under-constrained and well-constrained systems of geometric constraints (SEBT, PM, PS), pp. 773–777.
- ESEC-FSE-2007-FosterEKMRU #composition #constraints #model checking
- Model checking service compositions under resource constraints (HF, WE, JK, JM, DSR, SU), pp. 225–234.
- LCTES-2007-BouchezDR #complexity #on the
- On the complexity of spill everywhere under SSA form (FB, AD, FR), pp. 103–112.
- CAV-2007-AmitRRSY #abstraction #comparison #verification
- Comparison Under Abstraction for Verifying Linearizability (DA, NR, TWR, MS, EY), pp. 477–490.
- CSL-2007-Murawski
- Bad Variables Under Control (ASM), pp. 558–572.
- ICLP-2007-GrecoM #consistency #database #query #semantics
- Querying and Repairing Inconsistent Databases Under Three-Valued Semantics (SG, CM), pp. 149–164.
- ISSTA-2007-EnglerD #automation #execution #scalability
- Under-constrained execution: making automatic code destruction easy and scalable (DRE, DD), pp. 1–4.
- VMCAI-2007-BallK #approximate #source code
- Better Under-Approximation of Programs by Hiding Variables (TB, OK), pp. 314–328.
- CASE-2006-WuN #constraints #evaluation #network #reliability
- Evaluation of the Reliability of Emergency Networks under Time Constraints (WwW, XxN), pp. 259–263.
- DAC-2006-AksoyCFM #constraints #integer #linear #optimisation #programming #satisfiability #synthesis #using
- Optimization of area under a delay constraint in digital filter synthesis using SAT-based integer linear programming (LA, EACdC, PFF, JM), pp. 669–674.
- DAC-2006-AnanthanR #physics #process
- A fully physical model for leakage distribution under process variations in Nanoscale double-gate CMOS (HA, KR), pp. 413–418.
- DAC-2006-HerreraV #embedded #framework #modelling #specification
- A framework for embedded system specification under different models of computation in SystemC (FH, EV), pp. 911–914.
- DAC-2006-HuebbersDI #parametricity #performance #process
- Computation of accurate interconnect process parameter values for performance corners under process variations (FH, AD, YII), pp. 797–800.
- DAC-2006-LinZ #algorithm #constraints #performance
- An efficient retiming algorithm under setup and hold constraints (CL, HZ), pp. 945–950.
- DAC-2006-PandeyG #communication #constraints #scalability #statistics #synthesis
- Statistical on-chip communication bus synthesis and voltage scaling under timing yield constraint (SP, MG), pp. 663–668.
- DAC-2006-SinghMPO #nondeterminism #runtime
- Gain-based technology mapping for minimum runtime leakage under input vector uncertainty (AKS, MM, RP, MO), pp. 522–527.
- DAC-2006-WangZ #bound
- Optimal jumper insertion for antenna avoidance under ratio upper-bound (JW, HZ), pp. 761–766.
- DATE-2006-CherrounDF #constraints #equation #scheduling #using
- Scheduling under resource constraints using dis-equations (HC, AD, PF), pp. 1067–1072.
- DATE-2006-HealyVEBLLL #architecture #performance #trade-off
- Microarchitectural floorplanning under performance and thermal tradeoff (MBH, MV, ME, CSB, SKL, HHSL, GHL), pp. 1288–1293.
- DATE-2006-HsuCK #constraints #energy #multi #realtime #synthesis
- Multiprocessor synthesis for periodic hard real-time tasks under a given energy constraint (HRH, JJC, TWK), pp. 1061–1066.
- DATE-2006-PaulKKAR #design #estimation #performance #reliability
- Temporal performance degradation under NBTI: estimation and design for improved reliability of nanoscale circuits (BCP, KK, HK, MAA, KR), pp. 780–785.
- DATE-2006-PomeranzR06a #fault
- Test compaction for transition faults under transparent-scan (IP, SMR), pp. 1264–1269.
- DATE-2006-ZhouW #constraints #self
- Software-based self-test of processors under power constraints (JZ, HJW), pp. 430–435.
- PODS-2006-MotwaniX #evolution #graph #modelling #random #web
- Evolution of page popularity under random web graph models (RM, YX), pp. 134–142.
- VLDB-2006-KeoghWXLV #distance #metric
- LB_Keogh Supports Exact Indexing of Shapes under Rotation Invariance with Arbitrary Representations and Distance Measures (EJK, LW, XX, SHL, MV), pp. 882–893.
- STOC-2006-KushilevitzLR #composition #protocol #security
- Information-theoretically secure protocols and security under composition (EK, YL, TR), pp. 109–118.
- DLT-2006-ItoLS #bound
- Closure of Language Classes Under Bounded Duplication (MI, PL, KST), pp. 238–247.
- ICALP-v1-2006-Kapoutsis
- Small Sweeping 2NFAs Are Not Closed Under Complement (CAK), pp. 144–156.
- ICALP-v2-2006-AlurCZ #refinement
- Preserving Secrecy Under Refinement (RA, PC, SZ), pp. 107–118.
- ICML-2006-DenisMR #classification #learning #naive bayes #performance
- Efficient learning of Naive Bayes classifiers under class-conditional classification noise (FD, CNM, LR), pp. 265–272.
- ICML-2006-NarasimhanVS #constraints #latency #markov #modelling #online
- Online decoding of Markov models under latency constraints (MN, PAV, MS), pp. 657–664.
- ICPR-v1-2006-DoYC #detection #estimation #using
- Skin Color Detection through Estimation and Conversion of Illuminant Color using Sclera Region of Eye under Varying Illumination (HCD, JYY, SIC), pp. 327–330.
- ICPR-v1-2006-GimelfarbLMD #concurrent #image
- Concurrent Stereo under Photometric Image Distortions (GLG, JL, JM, PD), pp. 111–114.
- ICPR-v1-2006-HadidP #approach #detection #hybrid
- A Hybrid Approach to Face Detection under Unconstrained Environments (AH, MP), pp. 227–230.
- ICPR-v1-2006-ParkAB #detection #metric #performance
- Efficient Measurement of Eye Blinking under Various Illumination Conditions for Drowsiness Detection Systems (IP, JHA, HB), pp. 383–386.
- ICPR-v1-2006-ShimawakiSMS #estimation #image #sequence #video
- Estimation of Ball Route under Overlapping with Players and Lines in Soccer Video Image Sequence (TS, TS, JM, YS), pp. 359–362.
- ICPR-v1-2006-TongSS #estimation
- Continuous-Discrete Filtering for Cardiac Kinematics Estimation under Spatio-Temporal Biomechanical Constrains (ST, AJS, PS), pp. 167–170.
- ICPR-v1-2006-TongWZJ #multi #using
- Facial Feature Tracking using a Multi-State Hierarchical Shape Model under Varying Face Pose and Facial Expression (YT, YW, ZZ, QJ), pp. 283–286.
- ICPR-v1-2006-YingZ06a #image #using
- Using Sphere Images for Calibrating Fisheye Cameras under the Unified Imaging Model of the Central Catadioptric and Fisheye Cameras (XY, HZ), pp. 539–542.
- ICPR-v2-2006-BarakatB #using
- Rule Extraction from Support Vector Machines: Measuring the Explanation Capability Using the Area under the ROC Curve (NHB, APB), pp. 812–815.
- ICPR-v2-2006-CorneliusL #detection #symmetry
- Detecting Rotational Symmetry Under Affine Projection (HC, GL), pp. 292–295.
- ICPR-v3-2006-BalciAF
- Subpixel Alignment of MRI Data Under Cartesian and Log-Polar Sampling (MB, MA, HF), pp. 607–610.
- ICPR-v3-2006-QingSCG #probability #recognition
- Face Recognition under Varying Lighting Based on the Probabilistic Model of Gabor Phase (LQ, SS, XC, WG), pp. 1139–1142.
- ICPR-v3-2006-ShenLCF #video
- Video Completion for Perspective Camera Under Constrained Motion (YS, FL, XC, HF), pp. 63–66.
- ICPR-v4-2006-TaxD #linear #optimisation
- Linear model combining by optimizing the Area under the ROC curve (DMJT, RPWD), pp. 119–122.
- ICPR-v4-2006-ZhaoG #detection #robust
- Robust Eye Detection under Active Infrared Illumination (SZ, RRG), pp. 481–484.
- KDD-2006-FanD #bias #classification #framework #performance #testing
- Reverse testing: an efficient framework to select amongst classifiers under sample selection bias (WF, ID), pp. 147–156.
- KR-2006-SardinaGLL #nondeterminism #on the #strict
- On the Limits of Planning over Belief States under Strict Uncertainty (SS, GDG, YL, HJL), pp. 463–471.
- KR-2006-Straccia #logic programming #query #source code
- Query Answering under the Any-World Assumption for Normal Logic Programs (US), pp. 329–339.
- SIGIR-2006-ZhangOFM #analysis #linear #recommendation
- Analysis of a low-dimensional linear model under recommendation attacks (SZ, YO, JF, FM), pp. 517–524.
- GPCE-2006-BromanNF #constraints #equation #using
- Determining over- and under-constrained systems of equations using structural constraint delta (DB, KN, PF), pp. 151–160.
- ICLP-2006-PontelliS #logic programming #semantics #set #source code
- Justifications for Logic Programs Under Answer Set Semantics (EP, TCS), pp. 196–210.
- ICLP-2006-WittocxVMDB #semantics
- Predicate Introduction Under Stable and Well-Founded Semantics (JW, JV, MM, MD, MB), pp. 242–256.
- RTA-2006-BournezG #proving #termination
- Proving Positive Almost Sure Termination Under Strategies (OB, FG), pp. 357–371.
- CASE-2005-LauS #evaluation #multi
- Evaluation of time-varying availability in multi-echelon inventory system under combat damage (HCL, HS), pp. 226–231.
- DAC-2005-ChangS #analysis #correlation #power management #process
- Full-chip analysis of leakage power under process variations, including spatial correlations (HC, SSS), pp. 523–528.
- DAC-2005-ManiDO #algorithm #constraints #performance #statistics
- An efficient algorithm for statistical minimization of total power under timing yield constraints (MM, AD, MO), pp. 309–314.
- DAC-2005-Pomeranz #detection
- N-detection under transparent-scan (IP), pp. 129–134.
- DAC-2005-XuNC #constraints #design #embedded #multi #optimisation
- Multi-frequency wrapper design and optimization for embedded cores under average power constraints (QX, NN, KC), pp. 123–128.
- DATE-2005-DattaBMBR #design #modelling #pipes and filters #process #statistics
- Statistical Modeling of Pipeline Delay and Design of Pipeline under Process Variation to Enhance Yield in sub-100nm Technologies (AD, SB, SM, NB, KR), pp. 926–931.
- DATE-2005-MajhiAGLEB #evaluation #industrial #memory management #testing
- Memory Testing Under Different Stress Conditions: An Industrial Evaluation (AKM, MA, GG, ML, SE, FB), pp. 438–443.
- DATE-2005-WuRJ #energy #realtime #scheduling
- Energy-Efficient, Utility Accrual Real-Time Scheduling Under the Unimodal Arbitrary Arrival Model (HW, BR, EDJ), pp. 474–479.
- DRR-2005-HopkinsA #framework #open source #recognition
- A Fourier-descriptor-based character recognition engine implemented under the Gamera open-source document-processing framework (JH, TLA), pp. 111–118.
- PODS-2005-SakuraiYF #distance #named #performance #similarity
- FTW: fast similarity search under the time warping distance (YS, MY, CF), pp. 326–337.
- TACAS-2005-Jiang #invariant #on the
- On Some Transformation Invariants Under Retiming and Resynthesis (JHRJ), pp. 413–428.
- ICALP-2005-AtseriasDG #finite
- Preservation Under Extensions on Well-Behaved Finite Structures (AA, AD, MG), pp. 1437–1449.
- ICEIS-v1-2005-KarydisNPM #distance #network #retrieval
- Musical Retrieval in P2P Networks under the Warping Distance (IK, AN, ANP, YM), pp. 100–107.
- CIKM-2005-GriecoLRR #algorithm #consistency #dependence #query
- Consistent query answering under key and exclusion dependencies: algorithms and experiments (LG, DL, RR, MR), pp. 792–799.
- KDD-2005-YanFB #constraints #industrial
- Enhancing the lift under budget constraints: an application in the mutual fund industry (LY, MF, PB), pp. 509–515.
- RE-2005-RegevW #requirements
- Where do Goals Come from: the Underlying Principles of Goal-Oriented Requirements Engineering (GR, AW), pp. 353–362.
- SAC-2005-KimKS #database #optimisation #sequence
- Optimization of subsequence matching under time warping in time-series databases (MSK, SWK, MS), pp. 581–586.
- LCTES-2005-ZhangP #compilation #migration #performance
- Efficient application migration under compiler guidance (KZ, SP), pp. 10–20.
- AMOST-2005-CaiL #detection #fault #test coverage #testing
- The effect of code coverage on fault detection under different testing profiles (XC, MRL).
- ICLP-2005-NomikosRW #equivalence #semantics
- A Sufficient Condition for Strong Equivalence Under the Well-Founded Semantics (CN, PR, WWW), pp. 414–415.
- LICS-2005-Rossman
- Existential Positive Types and Preservation under Homomorphisisms (BR), pp. 467–476.
- DAC-2004-ChoiPR #algorithm #novel #process
- Novel sizing algorithm for yield improvement under process variation in nanometer technology (SHC, BCP, KR), pp. 454–459.
- DAC-2004-Pomeranz #functional #generative #on the #testing
- On the generation of scan-based test sets with reachable states for testing under functional operation conditions (IP), pp. 928–933.
- DATE-v1-2004-HuM #architecture #communication #constraints #energy #realtime #scheduling
- Energy-Aware Communication and Task Scheduling for Network-on-Chip Architectures under Real-Time Constraints (JH, RM), pp. 234–239.
- HT-2004-Kolb #hypermedia
- Twin media: hypertext structure under pressure (DK), pp. 26–27.
- PODS-2004-AtseriasDK #morphism #on the #query
- On Preservation under Homomorphisms and Unions of Conjunctive Queries (AA, AD, PGK), pp. 319–329.
- PODS-2004-NashL #data access #first-order #query
- Processing First-Order Queries under Limited Access Patterns (AN, BL), pp. 307–318.
- SAS-2004-Schmidt #approximate #logic
- Closed and Logical Relations for Over- and Under-Approximation of Powersets (DAS), pp. 22–37.
- ICALP-2004-AbadiC #equation #protocol #security
- Deciding Knowledge in Security Protocols Under Equational Theories (MA, VC), pp. 46–58.
- IFM-2004-WangRL #csp #independence #reachability
- Relating Data Independent Trace Checks in CSP with UNITY Reachability under a Normality Assumption (XW, AWR, RL), pp. 247–266.
- ICEIS-v4-2004-JahankhaniY #e-commerce #framework
- Underlying Platform of the E-Commerce System: J2EE vs. NET (HJ, MY), pp. 250–257.
- CIKM-2004-HoreHIM #constraints
- Indexing text data under space constraints (BH, HH, BRI, SM), pp. 198–207.
- ICML-2004-HerschtalR #optimisation #using
- Optimising area under the ROC curve using gradient descent (AH, BR).
- ICML-2004-Zadrozny #bias #classification #learning
- Learning and evaluating classifiers under sample selection bias (BZ).
- ICPR-v1-2004-PnevmatikakisP #comparison
- Comparison of Eigenface-Based Feature Vectors under Different Impairments (AP, LP), pp. 296–299.
- ICPR-v1-2004-WeiL #recognition #robust
- Robust Face Recognition under Lighting Variations (SDW, SHL), pp. 354–357.
- ICPR-v2-2004-CourteilleCDG #towards
- Towards Shape from Shading under Realistic Photographic Conditions (FC, AC, JDD, PG), pp. 277–280.
- ICPR-v3-2004-DuOSS #estimation
- Reflectance Estimation from Motion under Complex Illumination (FD, TO, YS, AS), pp. 218–222.
- ICPR-v3-2004-JoshiC
- Photometric Stereo Under Blurred Observations (MVJ, SC), pp. 169–172.
- ICPR-v3-2004-LiMH
- New Method for Sparse Point-Sets Matching with Underlying Non-Rigidity (BL, QM, HH), pp. 8–11.
- ICPR-v3-2004-MakiharaSS #interactive #learning #online #recognition
- Online Learning of Color Transformation for Interactive Object Recognition under Various Lighting Conditions (YM, YS, NS), pp. 161–164.
- ICPR-v3-2004-ShimizuYO #image
- Super-Resolution under Image Deformation (MS, TY, MO), pp. 586–589.
- ICPR-v4-2004-ChoH #image
- Extending Dynamic Range of Two Color Images under Different Exposures (WhC, KSH), pp. 853–856.
- ICPR-v4-2004-WangJ #detection #multi
- Multi-View Face Detection under Complex Scene based on Combined SVMs (PW, QJ), pp. 179–182.
- SAC-2004-PaulussenZHBPL #nondeterminism #scheduling
- Patient scheduling under uncertainty (TOP, AZ, AH, LB, AP, WL), pp. 309–310.
- ICLP-2004-Pearce #logic programming #semantics #set #source code
- Simplifying Logic Programs Under Answer Set Semantics (DP), pp. 210–224.
- DAC-2003-AtasuPI #architecture #automation #constraints
- Automatic application-specific instruction-set extensions under microarchitectural constraints (KA, LP, PI), pp. 256–261.
- DAC-2003-El-GamalBBHMOP #implementation #performance
- Fast, cheap and under control: the next implementation fabric (AEG, IB, AB, CH, PM, ZOB, LTP), pp. 354–355.
- DAC-2003-SzymanekK #constraints #graph
- Partial task assignment of task graphs under heterogeneous resource constraints (RS, KK), pp. 244–249.
- DATE-2003-KimSLLNN #data flow #distributed #graph
- Distributed Synchronous Control Units for Dataflow Graphs under Allocation of Telescopic Arithmetic Units (EK, HS, JGL, DIL, HN, TN), pp. 10276–10281.
- PODS-2003-GrahneT #constraints #query #using
- Query containment and rewriting using views for regular path queries under constraints (GG, AT), pp. 111–122.
- VLDB-2003-KoudasGGSV #approximate #constraints #optimisation #parametricity #performance #query
- Efficient Approximation Of Optimization Queries Under Parametric Aggregation Constraints (SG, DG, NK, DS, MV), pp. 778–789.
- VLDB-2003-VelegrakisMP #adaptation #evolution
- Mapping Adaptation under Evolving Schemas (YV, RJM, LP), pp. 584–595.
- TACAS-2003-AbdeddaimAM #nondeterminism #on the #scheduling
- On Optimal Scheduling under Uncertainty (YA, EA, OM), pp. 240–253.
- ICEIS-v1-2003-BouchouALD #automaton #constraints #validation #xml
- Extending Tree Automata to Model XML Validation Under Element and Attribute Constraints (BB, MHFA, DL, DD), pp. 184–190.
- ICEIS-v1-2003-KaramEII #algorithm #constraints #maintenance
- The Enhanced Greedy Interchange Algorithm for the Selection of Materialized Views Under a Maintenance Cost Constraint in Data Warehouses (OHK, MES, OI, RI), pp. 279–284.
- CIKM-2003-TangZ #mining #multi
- Mining multiple phenotype structures underlying gene expression profiles (CT, AZ), pp. 418–425.
- ICML-2003-KubicaMCS #analysis #collaboration #graph #performance #query
- Finding Underlying Connections: A Fast Graph-Based Method for Link Analysis and Collaboration Queries (JK, AWM, DC, JGS), pp. 392–399.
- SEKE-2003-Ngo-TheR #nondeterminism #requirements
- Requirements Negotiation under Incompleteness and Uncertainty (ANT, GR), pp. 586–593.
- SAC-2003-FuT
- A Dynamic Load Distribution Strategy for Systems Under High Task Variation and Heavy Traffic (BF, ZT), pp. 1031–1037.
- ICLP-2003-EiterF #equivalence #logic programming #semantics #source code
- Uniform Equivalence of Logic Programs under the Stable Model Semantics (TE, MF), pp. 224–238.
- DATE-2002-HuangLWG #constraints
- Maze Routing with Buffer Insertion under Transition Time Constraints (LDH, ML, DFW, YG), pp. 702–707.
- DATE-2002-SulimmaKNV #constant
- Improving Placement under the Constant Delay Model (KS, WK, IN, LPPPvG), pp. 677–682.
- DATE-2002-VandersteenWDV #evaluation #performance
- High-Frequency Nonlinear Amplifier Model for the Efficient Evaluation of Inband Distortion Under Nonlinear Load-Pull Conditions (GV, PW, SD, FV), pp. 586–590.
- VLDB-2002-SenkulKT #constraints #framework #logic #resource management #scheduling #workflow
- A Logical Framework for Scheduling Workflows under Resource Allocation Constraints (PS, MK, IHT), pp. 694–705.
- SAS-2002-PierroHW #approximate
- Analysing Approximate Confinement under Uniform Attacks (ADP, CH, HW), pp. 310–325.
- ICALP-2002-LungoFNV #constraints #re-engineering
- Discrete Tomography: Reconstruction under Periodicity Constraints (ADL, AF, MN, LV), pp. 38–56.
- ICALP-2002-Merkle #probability #sequence
- The Kolmogorov-Loveland Stochastic Sequences Are Not Closed under Selecting Subsequences (WM), pp. 390–400.
- IFM-2002-BarradasB #liveness #proving #specification
- Specification and Proof of Liveness Properties under Fairness Assumptions in B Event Systems (HRB, DB), pp. 360–379.
- CSCW-2002-PalenS #mobile
- Voice-mail diary studies for naturalistic data capture under mobile conditions (LP, MCS), pp. 87–95.
- CAiSE-2002-CaliCGL #constraints #integration
- Data Integration under Integrity Constraints (AC, DC, GDG, ML), pp. 262–279.
- ICML-2002-FerriFH #learning #using
- Learning Decision Trees Using the Area Under the ROC Curve (CF, PAF, JHO), pp. 139–146.
- ICPR-v1-2002-TengLCH #robust
- Robust Computation of Optical Flow under Non-Uniform Illumination Variations (CHT, SHL, YSC, WHH), pp. 327–330.
- ICPR-v2-2002-JoganLWB #locality #mobile
- Mobile Robot Localization Under Varying Illumination (MJ, AL, HW, HB), pp. 741–744.
- ICPR-v3-2002-FortunaSC #comparison #recognition
- A Comparison of PCA and ICA for Object Recognition Under Varying Illumination (JF, DCS, DWC), pp. 11–15.
- ICPR-v3-2002-JohnsonB #identification #metric
- Relationship between Identification Metrics: Expected Confusion and Area Under a ROC Curve (AYJ, AFB), pp. 662–666.
- ICPR-v3-2002-KimKRK #image #robust
- A Robust License-Plate Extraction Method under Complex Image Conditions (SK, DK, YR, GK), pp. 216–219.
- ICPR-v4-2002-ZhuJFL #eye tracking #information retrieval #realtime
- Combining Kalman Filtering and Mean Shift for Real Time Eye Tracking under Active IR Illumination (ZZ, QJ, KF, KL), p. 318–?.
- KDD-2002-ChudovaS #markov #sequence
- Pattern discovery in sequences under a Markov assumption (DC, PS), pp. 153–162.
- LSO-2002-NeuB #comprehension #learning #process #simulation
- Learning and Understanding a Software Process through Simulation of Its Underlying Model (HN, UBK), pp. 81–93.
- SEKE-2002-HarzallahLT #education #modelling #named
- CommOnCV: modelling the competencies underlying a curriculum vitae (MH, ML, FT), pp. 65–71.
- SEKE-2002-PaganelliP #automation #design #interactive #re-engineering #web
- Automatic reconstruction of the underlying interaction design of web applications (LP, FP), pp. 439–445.
- SAC-2002-CarlssonJ #difference #game studies
- Differences between the iterated prisoner’s dilemma and the chicken game under noisy conditions (BC, KIJ), pp. 42–48.
- CAV-2002-BarnerG #approximate #model checking #reduction #symmetry
- Combining Symmetry Reduction and Under-Approximation for Symbolic Model Checking (SB, OG), pp. 93–106.
- DAC-2001-DoboliV #constraints #design #synthesis
- Integrated High-Level Synthesis and Power-Net Routing for Digital Design under Switching Noise Constraints (AD, RV), pp. 629–634.
- DAC-2001-LepakLH #constraints
- Simultaneous Shield Insertion and Net Ordering under Explicit RLC Noise Constraint (KML, IL, LH), pp. 199–202.
- DAC-2001-LiuCBK #constraints #embedded #power management #scheduling
- Power-Aware Scheduling under Timing Constraints for Mission-Critical Embedded Systems (JL, PHC, NB, FJK), pp. 840–845.
- DATE-2001-Chen #grid #on the #power management
- On the impact of on-chip inductance on signal nets under the influence of power grid noise (TC), pp. 451–459.
- DATE-2001-Doboli #constraints #design #embedded #latency
- Integrated hardware-software co-synthesis for design of embedded systems under power and latency constraints (AD), pp. 612–619.
- DATE-2001-GaoW #algorithm #graph #modelling
- A graph based algorithm for optimal buffer insertion under accurate delay models (YG, DFW), pp. 535–539.
- DATE-2001-SarkarK #constraints
- Repeater block planning under simultaneous delay and transition time constraints (PS, CKK), pp. 540–545.
- ICDAR-2001-JinT #composition #locality #using
- Text Area Localization under Complex-Background Using Wavelet Decomposition (NJ, YYT), pp. 1126–1130.
- STOC-2001-IckingM #3d #bound #complexity #diagrams #distance
- A tight bound for the complexity of voroni diagrams under polyhedral convex distance functions in 3D (CI, LM), pp. 316–321.
- ICALP-2001-Woeginger #constraints #on the #precedence #scheduling
- On the Approximability of Average Completion Time Scheduling under Precedence Constraints (GJW), pp. 887–897.
- AdaEurope-2001-KallbergS #architecture #evolution
- Ship System 2000, a Stable Architecture under Continuous Evolution (BK, RS), pp. 371–379.
- SIGAda-2001-KallbergS #architecture #evolution
- Ship system 2000, a stable architecture under continuous evolution (BK, RS), pp. 47–52.
- CIKM-2001-Collins-ThompsonSD #string
- Improved String Matching Under Noisy Channel Conditions (KCT, CS, STD), pp. 357–364.
- CIKM-2001-ParkKCP #approach #database #effectiveness #named #sequence
- Prefix-Querying: An Approach for Effective Subsequence Matching Under Time Warping in Sequence Databases (SP, SWK, JSC, SP), pp. 255–262.
- HPDC-2001-NatrajanFHGWCB #case study #experience #grid #using
- Studying Protein Folding on the Grid: Experiences Using CHARMM on NPACI Resources under Legion (AN, ADF, MAH, ASG, NWD, MC, CLBI), pp. 14–21.
- IJCAR-2001-AngerKL #logic programming #reasoning #semantics #set #source code
- NoMoRe : A System for Non-monotonic Reasoning with Logic Programs under Answer Set Semantics (CA, KK, TL), pp. 325–330.
- SAT-2001-BuningZ #satisfiability
- Satisfiable Formulas Closed Under Replacement (HKB, XZ), pp. 48–58.
- DAC-2000-Chakrabarty #architecture #constraints #design
- Design of system-on-a-chip test access architectures under place-and-route and power constraints (KC), pp. 432–437.
- DAC-2000-CongY
- Routing tree construction under fixed buffer locations (JC, XY), pp. 379–384.
- DATE-2000-VardanianM #concurrent #detection #fault
- Improving the Error Detection Ability of Concurrent Checkers by Observation Point Insertion in the Circuit Under Check (VAV, LBM), p. 762.
- WRLA-2000-KirchnerG #normalisation #proving #termination
- Termination and normalisation under strategy Proofs in ELAN (HK, IG), pp. 93–120.
- PLDI-2000-CierniakLS #java #optimisation
- Practicing JUDO: Java under dynamic optimizations (MC, GYL, JMS), pp. 13–26.
- ICML-2000-EspositoFFS #refinement
- Ideal Theory Refinement under Object Identity (FE, NF, SF, GS), pp. 263–270.
- ICPR-v1-2000-RomdhaniPG #scalability
- A Generic Face Appearance Model of Shape and Texture under Very Large Pose Variations from Profile to Profile Views (SR, AP, SG), pp. 5060–5063.
- ICPR-v1-2000-SorianoMHL #detection #video
- Skin Detection in Video under Changing Illumination Conditions (MS, BM, SH, ML), pp. 1839–1842.
- ICPR-v1-2000-YiW #3d #recognition
- 3D Artificial Objects Recognition under Virtual Environment (MY, PSPW), pp. 1995–1998.
- ICPR-v2-2000-FredL #clustering #difference
- Clustering Under a Hypothesis of Smooth Dissimilarity Increments (ALNF, JMNL), pp. 2190–2194.
- ICPR-v3-2000-ChoiL #analysis #distance
- Stability Analysis of Medial Axis Transform under Relative Hausdorff Distance (SWC, SWL), pp. 3139–3142.
- ICPR-v3-2000-DaoudiM #invariant #multi #representation
- New Multiscale Planar Shape Invariant Representation under a General Affine Transformations (MD, SM), pp. 3794–3797.
- ICPR-v4-2000-TauberLD #retrieval #visual notation
- Locale-Based Visual Object Retrieval under Illumination Change (ZT, ZNL, MSD), pp. 4043–4046.
- TOOLS-ASIA-2000-XuHWC #corba #persistent #web
- A Strategy for Persistent Object Service under CORBA and WEB Environment (DX, XH, JW, YC), pp. 100–107.
- TOOLS-USA-2000-Lauinger00a
- Good Software under Bad Conditions (TL), pp. 433–434.
- SAC-2000-ChenAZ #network
- Broadcasting Under Network Ignorance Scenario (XC, HA, SZ), pp. 615–619.
- CL-2000-EiterFLPP #information management
- Planning under Incomplete Knowledge (TE, WF, NL, GP, AP), pp. 807–821.
- DATE-1999-BuhlerPKB #approach #performance #process #simulation #using
- Efficient Switching Activity Simulation under a Real Delay Model Using a Bitparallel Approach (MB, MP, KK, UGB), p. 459–?.
- SIGMOD-1999-RundensteinerKZWLLN #evolution #maintenance
- Evolvable View Environment (EVE): Non-Equivalent View Maintenance under Schema Changes (EAR, AK, XZ, AvW, YL, AJL, AN), pp. 553–555.
- STOC-1999-Bar-NoyGNS #approximate #multi #realtime #scheduling #throughput
- Approximating the Throughput of Multiple Machines Under Real-Time Scheduling (ABN, SG, JN, BS), pp. 622–631.
- CIKM-1999-HuLL #clustering #scheduling
- Indexing Techniques for Wireless Data Broadcast Under Data Clustering and Scheduling (QH, WCL, DLL), pp. 351–358.
- ICML-1999-NgHR #policy #theory and practice
- Policy Invariance Under Reward Transformations: Theory and Application to Reward Shaping (AYN, DH, SJR), pp. 278–287.
- PODS-1998-CalvaneseGL #constraints #decidability #on the #query
- On the Decidability of Query Containment under Constraints (DC, GDG, ML), pp. 149–158.
- ICFP-1998-GibbonsJ
- The Under-Appreciated Unfold (JG, GJ), pp. 273–279.
- ICPR-1998-LeiW #detection #novel #symmetry
- A novel method for detecting and localising of reflectional and rotational symmetry under weak perspective projection (YL, KCW), pp. 417–419.
- ICPR-1998-PengZB #automation #recognition
- A fully automated face recognition system under different conditions (HP, CZ, ZB), pp. 1223–1225.
- ICPR-1998-SeoAH #video
- Video augmentation by image-based rendering under the perspective camera model (YS, MHA, KSH), pp. 1694–1696.
- ICPR-1998-WengH #learning #recognition #sequence
- Sensorimotor action sequence learning with application to face recognition under discourse (J(W, WSH), pp. 252–254.
- KR-1998-DuboisGPZ
- Making Decision in a Qualitative Setting: from Decision under Uncertaintly to Case-based Decision (DD, LG, HP, AZ), pp. 594–607.
- SAC-1998-HuizingaS #linux
- File hoarding under NFS and Linux (DMH, HS), pp. 409–415.
- SAC-1998-LiII #algorithm #constraints #estimation #recursion
- A recursive time estimation algorithm for program traces under resource constraints (DL, YI, NI), pp. 635–640.
- ISSTA-1998-MitchellZ #empirical #reliability #testing
- An Experiment in Estimating Reliability Growth Under Both Representative and Directed Testing (BM, SJZ), pp. 32–41.
- ASE-1997-Sucrow #graph grammar #human-computer #interactive #specification
- Formal Specification of Human-Computer Interaction by Graph Grammars under Consideration of Information Resources (BS), pp. 28–35.
- DAC-1997-PomeranzR #approach #fault #multi #simulation #using
- Fault Simulation under the Multiple Observation Time Approach using Backward Implications (IP, SMR), pp. 608–613.
- DAC-1997-TianS #agile #fault #parametricity #simulation
- Rapid Frequency-Domain Analog Fault Simulation Under Parameter Tolerances (MWT, CJRS), pp. 275–280.
- EDTC-1997-ManichF #process
- Maximizing the weighted switching activity in combinational CMOS circuits under the variable delay model (SM, JF), pp. 597–602.
- HCI-CC-1997-MetakidesGW #user interface
- User Interface Software & Technology (UIST) Under ESPRIT: Current Work and Future Directions (GM, AG, JW), pp. 485–488.
- KDD-1997-ProvostF #analysis #classification #comparison #performance #visualisation
- Analysis and Visualization of Classifier Performance: Comparison under Imprecise Class and Cost Distributions (FJP, TF), pp. 43–48.
- PLILP-1997-Xi #abstraction #evaluation
- Evaluation Under λ Abstraction (HX), pp. 259–273.
- CAV-1997-GyurisS #model checking #on the fly #symmetry
- On-the-Fly Model Checking Under Fairness That Exploits Symmetry (VG, APS), pp. 232–243.
- DAC-1996-ChenCW96a
- Optimal Wire-Sizing Formular Under the Elmore Delay Model (CPC, YPC, DFW), pp. 487–490.
- DAC-1996-KahngM #analysis
- Analysis of RC Interconnections Under Ramp Input (ABK, SM), pp. 533–538.
- DAC-1996-KudvaGJN #multi #network #synthesis
- Synthesis for Hazard-free Customized CMOS Complex-Gate Networks Under Multiple-Input Changes (PK, GG, HMJ, SMN), pp. 77–82.
- ICPR-1996-HoriuchiYY #nondeterminism #robust
- Robust relaxation method for structural matching under uncertainty (TH, KY, HY), pp. 176–180.
- ICPR-1996-YuCXY #3d #approximate #higher-order
- 3D shape and motion by SVD under higher-order approximation of perspective projection (HY, QC, GX, MY), pp. 456–460.
- DAC-1995-XiD #power management #process
- Buffer Insertion and Sizing Under Process Variations for Low Power Clock Distribution (JGX, WWMD), pp. 491–496.
- ICDAR-v2-1995-JangKHK #recognition
- Two-stage recognition of freight train ID number under outdoor environment (JHJ, JHK, KSH, JHK), pp. 986–991.
- STOC-1995-NisanT #symmetry
- Symmetric logspace is closed under complement (NN, ATS), pp. 140–146.
- ICALP-1995-Henzinger #approximate
- Approximating Minimum Cuts under Insertions (MRH), pp. 280–291.
- ICALP-1995-MetivierRW #set #word
- Computing the Closure of Sets of Words Under Partial Commutations (YM, GR, PAW), pp. 75–86.
- FPCA-1995-Rittri #polymorphism #recursion
- Dimension Inference Under Polymorphic Recursion (MR), pp. 147–159.
- LOPSTR-1995-Renault #logic programming #proving #source code #towards
- Towards a Complete Proof Procedure to Prove Properties of Normal Logic Programs under the Completion (SR), pp. 204–218.
- CAV-1995-DillW #approximate #realtime #verification
- Verification of Real-Time Systems by Successive Over and Under Approximation (DLD, HWT), pp. 409–422.
- CAV-1995-EmersonS #approach #model checking #symmetry
- Utilizing Symmetry when Model Checking under Fairness Assumptions: An Automata-theoretic Approach (EAE, APS), pp. 309–324.
- DAC-1994-Sapatnekar #optimisation
- RC Interconnect Optimization Under the Elmore Delay Model (SSS), pp. 387–391.
- HT-ECHT-1994-Haake #hypermedia #implementation
- Under CoVer: The Implementation of a Contextual Version Server for Hypertext Applications (AH), pp. 81–93.
- ICALP-1994-Sanchez-CousoF #analysis #pattern matching #probability
- Average-Case Analysis of Pattern-Matching in Trees under the BST Probability Model (JRSC, MIFC), pp. 178–190.
- AdaEurope-1994-NunezP #constraints #development #lightweight #process
- Development of a Lightweight Object-Based Software Process Model Under Pragmatic Constraints (FJN, RP), pp. 231–257.
- TRI-Ada-1994-Kempe #ada #data type
- Abstract Data Types are Under Full Control with Ada 9X (MK), pp. 141–152.
- KR-1994-TanP #evaluation #nondeterminism #specification
- Specification and Evaluation of Preferences Under Uncertainty (SWT, JP), pp. 530–539.
- ICRE-1994-Soares #concept #process #specification
- Underlying concepts in process specification (JOPS), pp. 48–52.
- SAC-1994-LeeA #c++
- C++ style class support under FIG Forth (YML, DJA), pp. 341–345.
- DAC-1993-LeeJW #behaviour #synthesis
- Behavioral Synthesis of Highly Testable Data Paths under the Non-Scan and Partial Scan Environments (TCL, NKJ, WW), pp. 292–297.
- ICDAR-1993-MykaG #automation #documentation #hypermedia #re-engineering #using
- Using electronic facsimiles of documents for automatic reconstruction of underlying hypertext structures (AM, UG), pp. 528–532.
- PODS-1993-ChenW #evaluation #query #semantics
- Query Evaluation under the Well Founded Semantics (WC, DSW), pp. 168–179.
- FME-1993-RossL #consistency #maintenance #specification
- Maintaining Consistency Under Changes to Formal Specifications (KJR, PAL), pp. 558–577.
- ICML-1993-Idestam-Almquist #anti #recursion
- Generalization under Implication by Recursive Anti-unification (PIA), pp. 151–158.
- RE-1993-JarkeBRSV #bibliography #requirements
- Theories underlying requirements engineering: an overview of NATURE at Genesis (MJ, JABJ, CR, AGS, YV), pp. 19–31.
- CAV-1993-LincolnR #algorithm #consistency #fault #hybrid #interactive #verification
- The Formal Verification of an Algorithm for Interactive Consistency under a Hybrid Fault Model (PL, JMR), pp. 292–304.
- ICLP-1993-BolD
- The Underlying Search for Magic Templates and Tabulation (RNB, LD), pp. 793–811.
- DAC-1992-ChaudharyP #algorithm #constraints
- A Near Optimal Algorithm for Technology Mapping Minimizing Area under Delay Constraints (KC, MP), pp. 492–498.
- DAC-1992-LeeP #constraints #functional #generative #testing
- Hierarchical Test Generation under Intensive Global Functional Constraints (JL, JHP), pp. 261–266.
- LFP-1992-Henessey #lisp #named #performance
- WCL: Delivering Efficient Common Lisp Applications Under Unix (WH), pp. 260–269.
- CHI-1992-MulliganDNPRR #constraints #design
- Designing Usable Systems Under Real-World Constraints: A Practitioners Forum (RMM, MD, JN, SEP, DR, SER), pp. 149–152.
- DAC-1991-ChengDK #design #generative #robust #standard #synthesis #testing
- Robust Delay-Fault Test Generation and Synthesis for Testability Under A Standard Scan Design Methodology (KTC, SD, KK), pp. 80–86.
- STOC-1991-BeigelRS
- PP Is Closed Under Intersection (Extended Abstract) (RB, NR, DAS), pp. 1–9.
- STOC-1991-CoffmanCGJMSWY #analysis #case study
- Fundamental Discrepancies between Average-Case Analyses under Discrete and Continuous Distributions: A Bin Packing Case Study (EGCJ, CC, MRG, DSJ, LAM, PWS, RRW, MY), pp. 230–240.
- ISLP-1991-Nakayama #principle #program transformation #proving
- Program Transformation under the Principle of Proof as Program (HN), pp. 626–640.
- IWPTS-1991-CorbiS #embedded #protocol #testing
- Common Abstract Test Suite for the Connection Oriented Presentation Protocol Embedded Under Different Application Contexts (CC, GS), pp. 143–149.
- DAC-1990-HwangHL #constraints #heuristic #scheduling
- Optimum and Heuristic Data Path Scheduling Under Resource Constraints (CTH, YCH, YLL), pp. 65–70.
- DAC-1990-KuM #constraints #scheduling
- Relative Scheduling Under Timing Constraints (DCK, GDM), pp. 59–64.
- VLDB-1990-MuntzL #analysis #array #performance
- Performance Analysis of Disk Arrays under Failure (RRM, JCSL), pp. 162–173.
- STOC-1990-Hastad #generative #pseudo
- Pseudo-Random Generators under Uniform Assumptions (JH), pp. 395–404.
- STOC-1990-SchmidtS #analysis
- The Analysis of Closed Hashing under Limited Randomness (Extended Abstract) (JPS, AS), pp. 224–234.
- SEKE-1990-SunK #development
- Graphics Application Development Under Window Environment (TSS, CYK), pp. 234–238.
- JICSCP-1988-SekiI88 #evaluation #query #source code
- A Query Evaluation Method for Stratified Programs Under the Extended CWA (HS, HI), pp. 195–211.
- VLDB-1987-AtzeniC #database #dependence #functional #independence
- Independent Database Schemes under Functional and Inclusion Dependencies (PA, EPFC), pp. 159–166.
- STOC-1987-Munro
- Searching a Two Key Table Under a Single Key (JIM), pp. 383–387.
- ICALP-1987-Josko #liveness #model checking
- Modelchecking of CTL Formulae under Liveness Assumptions (BJ), pp. 280–289.
- ICSE-1987-CurtisKSI #modelling #on the #process
- On Building Software Process Models Under the Lamppost (BC, HK, VYS, NI), pp. 96–105.
- CADE-1986-BuningL #first-order #satisfiability
- Classes of First Order Formulas Under Various Satisfiability Definitions (HKB, TL), pp. 553–563.
- RTA-1985-Fortenbach #algebra #commutative #unification
- An Algebraic Approch to Unification Under Assoiativity and Commutativity (AF), pp. 381–397.
- PODS-1982-JohnsonK #dependence #functional #query #testing
- Testing Containment of Conjunctive Queries Under Functional and Inclusion Dependencies (DSJ, ACK), pp. 164–169.
- STOC-1982-Bach #algorithm #performance
- Fast Algorithms under the Extended Riemann Hypothesis: A Concrete Estimate (EB), pp. 290–295.
- STOC-1981-Simon #bound #complexity #probability #turing machine
- Space-Bounded Probabilistic Turing Machine Complexity Classes Are Closed under Complement (Preliminary Version) (JS), pp. 158–167.
- ICALP-1980-Vitanyi #on the #power of #realtime #specification
- On the Power of Real-Time Machines Under Varying Specifications (Extended Abstract) (PMBV), pp. 658–671.
- ICALP-1979-CremersH #requirements
- Arbitration and Queuing Under Limited Shared Storage Requirements (Preliminary Report) (ABC, TNH), pp. 147–160.
- ICALP-1978-AlbertMR #generative
- Simple EOL Forms under Uniform Interpretation Generating CF Languages (JA, HAM, GR), pp. 1–14.
- ICALP-1977-Streinu #finite #ll
- LL(k) Languages are Closed Under Union with Finite Languages (IS), pp. 504–508.
- ICALP-1974-DilgerR #monad #strict
- Monadic Program Schemes Under Restricted Classes of Free Interpretations (WD, PR), pp. 547–561.
- DAC-1972-Dudnik #architecture #nondeterminism #optimisation
- Optimization of planning and architectural decisions under conditions of uncertain demand (EED), pp. 213–219.
- STOC-1970-Lewis70a #product line
- Closure of Families of Languages under Substitution Operators (DJL), pp. 100–108.